190
Volume 27, Number 1 July 15, 2019 ISSN:1521-1398 PRINT,1572-9206 ONLINE Journal of Computational Analysis and Applications EUDOXUS PRESS,LLC

Journal of Computational Analysis and Applicationseudoxuspress.com/images/JOCAAA-VOL-27-2019-ISSUE-1.pdf · Volume 27, Number 1 July 15, 2019 . ISSN:1521-1398 PRINT,1572-9206 ONLINE

  • Upload
    others

  • View
    0

  • Download
    0

Embed Size (px)

Citation preview

Page 1: Journal of Computational Analysis and Applicationseudoxuspress.com/images/JOCAAA-VOL-27-2019-ISSUE-1.pdf · Volume 27, Number 1 July 15, 2019 . ISSN:1521-1398 PRINT,1572-9206 ONLINE

Volume 27, Number 1 July 15, 2019 ISSN:1521-1398 PRINT,1572-9206 ONLINE

Journal of Computational Analysis and Applications EUDOXUS PRESS,LLC

Page 2: Journal of Computational Analysis and Applicationseudoxuspress.com/images/JOCAAA-VOL-27-2019-ISSUE-1.pdf · Volume 27, Number 1 July 15, 2019 . ISSN:1521-1398 PRINT,1572-9206 ONLINE

Journal of Computational Analysis and Applications ISSNno.’s:1521-1398 PRINT,1572-9206 ONLINE SCOPE OF THE JOURNAL An international publication of Eudoxus Press, LLC (fifteen times annually) Editor in Chief: George Anastassiou Department of Mathematical Sciences, University of Memphis, Memphis, TN 38152-3240, U.S.A [email protected] http://www.msci.memphis.edu/~ganastss/jocaaa The main purpose of "J.Computational Analysis and Applications" is to publish high quality research articles from all subareas of Computational Mathematical Analysis and its many potential applications and connections to other areas of Mathematical Sciences. Any paper whose approach and proofs are computational,using methods from Mathematical Analysis in the broadest sense is suitable and welcome for consideration in our journal, except from Applied Numerical Analysis articles. Also plain word articles without formulas and proofs are excluded. The list of possibly connected mathematical areas with this publication includes, but is not restricted to: Applied Analysis, Applied Functional Analysis, Approximation Theory, Asymptotic Analysis, Difference Equations, Differential Equations, Partial Differential Equations, Fourier Analysis, Fractals, Fuzzy Sets, Harmonic Analysis, Inequalities, Integral Equations, Measure Theory, Moment Theory, Neural Networks, Numerical Functional Analysis, Potential Theory, Probability Theory, Real and Complex Analysis, Signal Analysis, Special Functions, Splines, Stochastic Analysis, Stochastic Processes, Summability, Tomography, Wavelets, any combination of the above, e.t.c. "J.Computational Analysis and Applications" is a peer-reviewed Journal. See the instructions for preparation and submission of articles to JoCAAA. Assistant to the Editor: Dr.Razvan Mezei,[email protected], Madison,WI,USA. Journal of Computational Analysis and Applications(JoCAAA) is published by EUDOXUS PRESS,LLC,1424 Beaver Trail Drive,Cordova,TN38016,USA,[email protected] http://www.eudoxuspress.com. Annual Subscription Prices:For USA and Canada,Institutional:Print $800, Electronic OPEN ACCESS. Individual:Print $400. For any other part of the world add $160 more(handling and postages) to the above prices for Print. No credit card payments. Copyright©2019 by Eudoxus Press,LLC,all rights reserved.JoCAAA is printed in USA. JoCAAA is reviewed and abstracted by AMS Mathematical Reviews,MATHSCI,and Zentralblaat MATH. It is strictly prohibited the reproduction and transmission of any part of JoCAAA and in any form and by any means without the written permission of the publisher.It is only allowed to educators to Xerox articles for educational purposes.The publisher assumes no responsibility for the content of published papers.

2

Page 3: Journal of Computational Analysis and Applicationseudoxuspress.com/images/JOCAAA-VOL-27-2019-ISSUE-1.pdf · Volume 27, Number 1 July 15, 2019 . ISSN:1521-1398 PRINT,1572-9206 ONLINE

Editorial Board

Associate Editors of Journal of Computational Analysis and Applications

Francesco Altomare Dipartimento di Matematica Universita' di Bari Via E.Orabona, 4 70125 Bari, ITALY Tel+39-080-5442690 office +39-080-3944046 home +39-080-5963612 Fax [email protected] Approximation Theory, Functional Analysis, Semigroups and Partial Differential Equations, Positive Operators. Ravi P. Agarwal Department of Mathematics Texas A&M University - Kingsville 700 University Blvd. Kingsville, TX 78363-8202 tel: 361-593-2600 [email protected] Differential Equations, Difference Equations, Inequalities George A. Anastassiou Department of Mathematical Sciences The University of Memphis Memphis, TN 38152,U.S.A Tel.901-678-3144 e-mail: [email protected] Approximation Theory, Real Analysis, Wavelets, Neural Networks, Probability, Inequalities. J. Marshall Ash Department of Mathematics De Paul University 2219 North Kenmore Ave. Chicago, IL 60614-3504 773-325-4216 e-mail: [email protected] Real and Harmonic Analysis Dumitru Baleanu Department of Mathematics and Computer Sciences, Cankaya University, Faculty of Art and Sciences, 06530 Balgat, Ankara, Turkey, [email protected]

Fractional Differential Equations Nonlinear Analysis, Fractional Dynamics Carlo Bardaro Dipartimento di Matematica e Informatica Universita di Perugia Via Vanvitelli 1 06123 Perugia, ITALY TEL+390755853822 +390755855034 FAX+390755855024 E-mail [email protected] Web site: http://www.unipg.it/~bardaro/ Functional Analysis and Approximation Theory, Signal Analysis, Measure Theory, Real Analysis.

Martin Bohner Department of Mathematics and Statistics, Missouri S&T Rolla, MO 65409-0020, USA [email protected] web.mst.edu/~bohner Difference equations, differential equations, dynamic equations on time scale, applications in economics, finance, biology. Jerry L. Bona Department of Mathematics The University of Illinois at Chicago 851 S. Morgan St. CS 249 Chicago, IL 60601 e-mail:[email protected] Partial Differential Equations, Fluid Dynamics Luis A. Caffarelli Department of Mathematics The University of Texas at Austin Austin, Texas 78712-1082 512-471-3160 e-mail: [email protected] Partial Differential Equations George Cybenko Thayer School of Engineering

3

Page 4: Journal of Computational Analysis and Applicationseudoxuspress.com/images/JOCAAA-VOL-27-2019-ISSUE-1.pdf · Volume 27, Number 1 July 15, 2019 . ISSN:1521-1398 PRINT,1572-9206 ONLINE

Dartmouth College 8000 Cummings Hall, Hanover, NH 03755-8000 603-646-3843 (X 3546 Secr.) e-mail:[email protected] Approximation Theory and Neural Networks Sever S. Dragomir School of Computer Science and Mathematics, Victoria University, PO Box 14428, Melbourne City, MC 8001, AUSTRALIA Tel. +61 3 9688 4437 Fax +61 3 9688 4050 [email protected] Inequalities, Functional Analysis, Numerical Analysis, Approximations, Information Theory, Stochastics. Oktay Duman TOBB University of Economics and Technology, Department of Mathematics, TR-06530, Ankara, Turkey, [email protected] Classical Approximation Theory, Summability Theory, Statistical Convergence and its Applications Saber N. Elaydi Department Of Mathematics Trinity University 715 Stadium Dr. San Antonio, TX 78212-7200 210-736-8246 e-mail: [email protected] Ordinary Differential Equations, Difference Equations J .A. Goldstein Department of Mathematical Sciences The University of Memphis Memphis, TN 38152 901-678-3130 [email protected] Partial Differential Equations, Semigroups of Operators H. H. Gonska Department of Mathematics University of Duisburg Duisburg, D-47048 Germany

011-49-203-379-3542 e-mail: [email protected] Approximation Theory, Computer Aided Geometric Design John R. Graef Department of Mathematics University of Tennessee at Chattanooga Chattanooga, TN 37304 USA [email protected] Ordinary and functional differential equations, difference equations, impulsive systems, differential inclusions, dynamic equations on time scales, control theory and their applications Weimin Han Department of Mathematics University of Iowa Iowa City, IA 52242-1419 319-335-0770 e-mail: [email protected] Numerical analysis, Finite element method, Numerical PDE, Variational inequalities, Computational mechanics Tian-Xiao He Department of Mathematics and Computer Science P.O. Box 2900, Illinois Wesleyan University Bloomington, IL 61702-2900, USA Tel (309)556-3089 Fax (309)556-3864 [email protected] Approximations, Wavelet, Integration Theory, Numerical Analysis, Analytic Combinatorics Margareta Heilmann Faculty of Mathematics and Natural Sciences, University of Wuppertal Gaußstraße 20 D-42119 Wuppertal, Germany, [email protected] Approximation Theory (Positive Linear Operators) Xing-Biao Hu Institute of Computational Mathematics AMSS, Chinese Academy of Sciences Beijing, 100190, CHINA [email protected]

4

Page 5: Journal of Computational Analysis and Applicationseudoxuspress.com/images/JOCAAA-VOL-27-2019-ISSUE-1.pdf · Volume 27, Number 1 July 15, 2019 . ISSN:1521-1398 PRINT,1572-9206 ONLINE

Computational Mathematics Jong Kyu Kim Department of Mathematics Kyungnam University Masan Kyungnam,631-701,Korea Tel 82-(55)-249-2211 Fax 82-(55)-243-8609 [email protected] Nonlinear Functional Analysis, Variational Inequalities, Nonlinear Ergodic Theory, ODE, PDE, Functional Equations. Robert Kozma Department of Mathematical Sciences The University of Memphis Memphis, TN 38152, USA [email protected] Neural Networks, Reproducing Kernel Hilbert Spaces, Neural Percolation Theory Mustafa Kulenovic Department of Mathematics University of Rhode Island Kingston, RI 02881,USA [email protected] Differential and Difference Equations Irena Lasiecka Department of Mathematical Sciences University of Memphis Memphis, TN 38152 PDE, Control Theory, Functional Analysis, [email protected]

Burkhard Lenze Fachbereich Informatik Fachhochschule Dortmund University of Applied Sciences Postfach 105018 D-44047 Dortmund, Germany e-mail: [email protected] Real Networks, Fourier Analysis, Approximation Theory Hrushikesh N. Mhaskar Department Of Mathematics California State University Los Angeles, CA 90032 626-914-7002 e-mail: [email protected] Orthogonal Polynomials, Approximation Theory, Splines, Wavelets, Neural Networks

Ram N. Mohapatra Department of Mathematics University of Central Florida Orlando, FL 32816-1364 tel.407-823-5080 [email protected] Real and Complex Analysis, Approximation Th., Fourier Analysis, Fuzzy Sets and Systems Gaston M. N'Guerekata Department of Mathematics Morgan State University Baltimore, MD 21251, USA tel: 1-443-885-4373 Fax 1-443-885-8216 Gaston.N'[email protected] [email protected] Nonlinear Evolution Equations, Abstract Harmonic Analysis, Fractional Differential Equations, Almost Periodicity & Almost Automorphy M.Zuhair Nashed Department Of Mathematics University of Central Florida PO Box 161364 Orlando, FL 32816-1364 e-mail: [email protected] Inverse and Ill-Posed problems, Numerical Functional Analysis, Integral Equations, Optimization, Signal Analysis Mubenga N. Nkashama Department OF Mathematics University of Alabama at Birmingham Birmingham, AL 35294-1170 205-934-2154 e-mail: [email protected] Ordinary Differential Equations, Partial Differential Equations Vassilis Papanicolaou Department of Mathematics National Technical University of Athens Zografou campus, 157 80 Athens, Greece tel:: +30(210) 772 1722 Fax +30(210) 772 1775 [email protected] Partial Differential Equations, Probability

5

Page 6: Journal of Computational Analysis and Applicationseudoxuspress.com/images/JOCAAA-VOL-27-2019-ISSUE-1.pdf · Volume 27, Number 1 July 15, 2019 . ISSN:1521-1398 PRINT,1572-9206 ONLINE

Choonkil Park Department of Mathematics Hanyang University Seoul 133-791 S. Korea, [email protected] Functional Equations Svetlozar (Zari) Rachev, Professor of Finance, College of Business, and Director of Quantitative Finance Program, Department of Applied Mathematics & Statistics Stonybrook University 312 Harriman Hall, Stony Brook, NY 11794-3775 tel: +1-631-632-1998, [email protected] Alexander G. Ramm Mathematics Department Kansas State University Manhattan, KS 66506-2602 e-mail: [email protected] Inverse and Ill-posed Problems, Scattering Theory, Operator Theory, Theoretical Numerical Analysis, Wave Propagation, Signal Processing and Tomography Tomasz Rychlik Polish Academy of Sciences Instytut Matematyczny PAN 00-956 Warszawa, skr. poczt. 21 ul. Śniadeckich 8 Poland [email protected] Mathematical Statistics, Probabilistic Inequalities Boris Shekhtman Department of Mathematics University of South Florida Tampa, FL 33620, USA Tel 813-974-9710 [email protected] Approximation Theory, Banach spaces, Classical Analysis T. E. Simos Department of Computer Science and Technology Faculty of Sciences and Technology University of Peloponnese GR-221 00 Tripolis, Greece Postal Address: 26 Menelaou St.

Anfithea - Paleon Faliron GR-175 64 Athens, Greece [email protected] Numerical Analysis H. M. Srivastava Department of Mathematics and Statistics University of Victoria Victoria, British Columbia V8W 3R4 Canada tel.250-472-5313; office,250-477-6960 home, fax 250-721-8962 [email protected] Real and Complex Analysis, Fractional Calculus and Appl., Integral Equations and Transforms, Higher Transcendental Functions and Appl.,q-Series and q-Polynomials, Analytic Number Th. I. P. Stavroulakis Department of Mathematics University of Ioannina 451-10 Ioannina, Greece [email protected] Differential Equations Phone +3-065-109-8283 Manfred Tasche Department of Mathematics University of Rostock D-18051 Rostock, Germany [email protected] rostock.de Numerical Fourier Analysis, Fourier Analysis, Harmonic Analysis, Signal Analysis, Spectral Methods, Wavelets, Splines, Approximation Theory Roberto Triggiani Department of Mathematical Sciences University of Memphis Memphis, TN 38152 PDE, Control Theory, Functional Analysis, [email protected]

Juan J. Trujillo University of La Laguna Departamento de Analisis Matematico C/Astr.Fco.Sanchez s/n 38271. LaLaguna. Tenerife. SPAIN Tel/Fax 34-922-318209 [email protected]

6

Page 7: Journal of Computational Analysis and Applicationseudoxuspress.com/images/JOCAAA-VOL-27-2019-ISSUE-1.pdf · Volume 27, Number 1 July 15, 2019 . ISSN:1521-1398 PRINT,1572-9206 ONLINE

Fractional: Differential Equations-Operators-Fourier Transforms, Special functions, Approximations, and Applications Ram Verma International Publications 1200 Dallas Drive #824 Denton, TX 76205, USA [email protected] Applied Nonlinear Analysis, Numerical Analysis, Variational Inequalities, Optimization Theory, Computational Mathematics, Operator Theory

Xiang Ming Yu Department of Mathematical Sciences Southwest Missouri State University Springfield, MO 65804-0094 417-836-5931 [email protected] Classical Approximation Theory, Wavelets Xiao-Jun Yang State Key Laboratory for Geomechanics and Deep Underground Engineering, China University of Mining and Technology, Xuzhou 221116, China Local Fractional Calculus and Applications, Fractional Calculus and Applications, General Fractional Calculus and Applications, Variable-order Calculus and Applications, Viscoelasticity and Computational methods for Mathematical [email protected]

Richard A. Zalik Department of Mathematics Auburn University Auburn University, AL 36849-5310 USA. Tel 334-844-6557 office 678-642-8703 home Fax 334-844-6555 [email protected] Approximation Theory, Chebychev Systems, Wavelet Theory

Ahmed I. Zayed Department of Mathematical Sciences DePaul University 2320 N. Kenmore Ave. Chicago, IL 60614-3250 773-325-7808 e-mail: [email protected] Shannon sampling theory, Harmonic analysis and wavelets, Special functions and orthogonal polynomials, Integral transforms Ding-Xuan Zhou Department Of Mathematics City University of Hong Kong 83 Tat Chee Avenue Kowloon, Hong Kong 852-2788 9708,Fax:852-2788 8561 e-mail: [email protected] Approximation Theory, Spline functions, Wavelets Xin-long Zhou Fachbereich Mathematik, Fachgebiet Informatik Gerhard-Mercator-Universitat Duisburg Lotharstr.65, D-47048 Duisburg, Germany e-mail:[email protected] duisburg.de Fourier Analysis, Computer-Aided Geometric Design, Computational Complexity, Multivariate Approximation Theory, Approximation and Interpolation Theory Jessada Tariboon Department of Mathematics, King Mongkut's University of Technology N. Bangkok 1518 Pracharat 1 Rd., Wongsawang, Bangsue, Bangkok, Thailand 10800 [email protected], Time scales, Differential/Difference Equations, Fractional Differential Equations

7

Page 8: Journal of Computational Analysis and Applicationseudoxuspress.com/images/JOCAAA-VOL-27-2019-ISSUE-1.pdf · Volume 27, Number 1 July 15, 2019 . ISSN:1521-1398 PRINT,1572-9206 ONLINE

Instructions to Contributors

Journal of Computational Analysis and Applications An international publication of Eudoxus Press, LLC, of TN.

Editor in Chief: George Anastassiou

Department of Mathematical Sciences University of Memphis

Memphis, TN 38152-3240, U.S.A.

1. Manuscripts files in Latex and PDF and in English, should be submitted via email to the Editor-in-Chief: Prof.George A. Anastassiou Department of Mathematical Sciences The University of Memphis Memphis,TN 38152, USA. Tel. 901.678.3144 e-mail: [email protected] Authors may want to recommend an associate editor the most related to the submission to possibly handle it. Also authors may want to submit a list of six possible referees, to be used in case we cannot find related referees by ourselves. 2. Manuscripts should be typed using any of TEX,LaTEX,AMS-TEX,or AMS-LaTEX and according to EUDOXUS PRESS, LLC. LATEX STYLE FILE. (Click HERE to save a copy of the style file.)They should be carefully prepared in all respects. Submitted articles should be brightly typed (not dot-matrix), double spaced, in ten point type size and in 8(1/2)x11 inch area per page. Manuscripts should have generous margins on all sides and should not exceed 24 pages. 3. Submission is a representation that the manuscript has not been published previously in this or any other similar form and is not currently under consideration for publication elsewhere. A statement transferring from the authors(or their employers,if they hold the copyright) to Eudoxus Press, LLC, will be required before the manuscript can be accepted for publication.The Editor-in-Chief will supply the necessary forms for this transfer.Such a written transfer of copyright,which previously was assumed to be implicit in the act of submitting a manuscript,is necessary under the U.S.Copyright Law in order for the publisher to carry through the dissemination of research results and reviews as widely and effective as possible.

8

Page 9: Journal of Computational Analysis and Applicationseudoxuspress.com/images/JOCAAA-VOL-27-2019-ISSUE-1.pdf · Volume 27, Number 1 July 15, 2019 . ISSN:1521-1398 PRINT,1572-9206 ONLINE

4. The paper starts with the title of the article, author's name(s) (no titles or degrees), author's affiliation(s) and e-mail addresses. The affiliation should comprise the department, institution (usually university or company), city, state (and/or nation) and mail code. The following items, 5 and 6, should be on page no. 1 of the paper. 5. An abstract is to be provided, preferably no longer than 150 words. 6. A list of 5 key words is to be provided directly below the abstract. Key words should express the precise content of the manuscript, as they are used for indexing purposes. The main body of the paper should begin on page no. 1, if possible. 7. All sections should be numbered with Arabic numerals (such as: 1. INTRODUCTION) . Subsections should be identified with section and subsection numbers (such as 6.1. Second-Value Subheading). If applicable, an independent single-number system (one for each category) should be used to label all theorems, lemmas, propositions, corollaries, definitions, remarks, examples, etc. The label (such as Lemma 7) should be typed with paragraph indentation, followed by a period and the lemma itself. 8. Mathematical notation must be typeset. Equations should be numbered consecutively with Arabic numerals in parentheses placed flush right, and should be thusly referred to in the text [such as Eqs.(2) and (5)]. The running title must be placed at the top of even numbered pages and the first author's name, et al., must be placed at the top of the odd numbed pages. 9. Illustrations (photographs, drawings, diagrams, and charts) are to be numbered in one consecutive series of Arabic numerals. The captions for illustrations should be typed double space. All illustrations, charts, tables, etc., must be embedded in the body of the manuscript in proper, final, print position. In particular, manuscript, source, and PDF file version must be at camera ready stage for publication or they cannot be considered. Tables are to be numbered (with Roman numerals) and referred to by number in the text. Center the title above the table, and type explanatory footnotes (indicated by superscript lowercase letters) below the table. 10. List references alphabetically at the end of the paper and number them consecutively. Each must be cited in the text by the appropriate Arabic numeral in square brackets on the baseline. References should include (in the following order): initials of first and middle name, last name of author(s) title of article,

9

Page 10: Journal of Computational Analysis and Applicationseudoxuspress.com/images/JOCAAA-VOL-27-2019-ISSUE-1.pdf · Volume 27, Number 1 July 15, 2019 . ISSN:1521-1398 PRINT,1572-9206 ONLINE

name of publication, volume number, inclusive pages, and year of publication. Authors should follow these examples: Journal Article 1. H.H.Gonska,Degree of simultaneous approximation of bivariate functions by Gordon operators, (journal name in italics) J. Approx. Theory, 62,170-191(1990). Book 2. G.G.Lorentz, (title of book in italics) Bernstein Polynomials (2nd ed.), Chelsea,New York,1986. Contribution to a Book 3. M.K.Khan, Approximation properties of beta operators,in(title of book in italics) Progress in Approximation Theory (P.Nevai and A.Pinkus,eds.), Academic Press, New York,1991,pp.483-495. 11. All acknowledgements (including those for a grant and financial support) should occur in one paragraph that directly precedes the References section. 12. Footnotes should be avoided. When their use is absolutely necessary, footnotes should be numbered consecutively using Arabic numerals and should be typed at the bottom of the page to which they refer. Place a line above the footnote, so that it is set off from the text. Use the appropriate superscript numeral for citation in the text. 13. After each revision is made please again submit via email Latex and PDF files of the revised manuscript, including the final one. 14. Effective 1 Nov. 2009 for current journal page charges, contact the Editor in Chief. Upon acceptance of the paper an invoice will be sent to the contact author. The fee payment will be due one month from the invoice date. The article will proceed to publication only after the fee is paid. The charges are to be sent, by money order or certified check, in US dollars, payable to Eudoxus Press, LLC, to the address shown on the Eudoxus homepage. No galleys will be sent and the contact author will receive one (1) electronic copy of the journal issue in which the article appears. 15. This journal will consider for publication only papers that contain proofs for their listed results.

10

Page 11: Journal of Computational Analysis and Applicationseudoxuspress.com/images/JOCAAA-VOL-27-2019-ISSUE-1.pdf · Volume 27, Number 1 July 15, 2019 . ISSN:1521-1398 PRINT,1572-9206 ONLINE

On common fixed point theorems of weakly compatiblemappings in fuzzy metric spaces

Afshan Batool1, Tayyab Kamran2, Dong Yun Shin3 and Choonkil Park4

1,2Department of Mathematics, Quaid-i-Azam University, Islamabad, Pakistan3Department of Mathematics, University of Seoul, Seoul 02504, Korea4Research Institute for Natural Sciences, Hanyang University, Seoul 04763, [email protected], [email protected], [email protected], [email protected]

Abstract: The purpose of this paper is to obtain common fixed point theorem in-volving two pair of weakly compatible mappings in complete fuzzy metric spaces. Somerelated results and illustrative examples are also discussed.

Keywords: common fixed point; weakly compatible mapping; complete fuzzy metric space; coinci-

dence point; point of coincidence

2010 MSC: 47H10, 54E50, 54E40, 46S50.

1. Introduction and preliminaries

Let (X, d) be a metric space. A mapping T : X → X is said to be contraction ifthere exists α ∈ (0, 1) such that for all x, y ∈ X,

d(Tx, Ty) ≤ αd(x, y). (1)

If the metric space (X, d) is complete, then the mapping satisfying (1) has a uniquefixed point.Rhoades [11] assumed a weakly contractive mapping f : X → X which satisfies thecondition

d(fx, fy) ≤ d(x, y)− ϕ(d(x, y)), (2)

where x, y ∈ X and ϕ : [0,∞) → [0,∞) is a continuous and nondecreasing functionsuch that ϕ(t) = 0 if and only if t = 0. Rhoades [11] obtained the following extension.

Theorem 1.1. ([11]) Let T : X → X be a weakly contractive mapping, where (X, d) isa complete metric space. Then T has a unique fixed point.

Dutta and Choudhury [7] introduced a new generalization of contraction principlein the following theorem.

Theorem 1.2. ([7]) Let (X, d) be a complete metric space and let T : X → X be aself-mapping satisfying the inequality

ψ(d(fx, fy)) ≤ ψ(d(x, y))− ϕ(d(x, y)) (3)

for all x, y ∈ X, where φ, ϕ : [0,∞) → [0,∞) are both continuous and monotonenondecreasing functions with ψ(t) = ϕ(t) = 0 if and only if t = 0. Then T has a uniquefixed point.

0Corresponding authors: [email protected] (Dong Yun Shin), [email protected] (Choonkil Park)

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 27, NO.1, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

11 BATOOL ET AL 11-18

Page 12: Journal of Computational Analysis and Applicationseudoxuspress.com/images/JOCAAA-VOL-27-2019-ISSUE-1.pdf · Volume 27, Number 1 July 15, 2019 . ISSN:1521-1398 PRINT,1572-9206 ONLINE

Common fixed point theorems of weakly compatible mappings

Several researchers have studied the existence of fixed points and common fixed pointsof mappings (see [1, 2, 3, 4, 5, 6, 8, 9, 10, 12]).

In this article, we give a fixed point theorem for contraction maps in complete fuzzymetric space, which improves and generalizes the above-mentioned result of Dutta andChoudhury.

We recall some definitions before giving the main result of this article.

Definition 1.3. A binary operation ∗ : [0, 1]2 → [0, 1] is called a continuous t-norm if([0, 1], ∗) is an Abelian topological monoid, i.e.,

(1) ∗ is associative and commutative;(2) ∗ is continuous;(3) a ∗ 1 = a for all a ∈ [0, 1];(4) a ∗ b ≤ c ∗ d whenever a ≤ c and b ≤ d for all a, b, c, d ∈ [0, 1].

Definition 1.4. A 3-tuple (X,M, ∗) is called a fuzzy metric space if X is an arbitraryset, ∗ is a continuous t-norm and M is a fuzzy set on X2×(0,∞) satisfying the followingconditions:

(1) M(x, y, t) > 0,(2) M(x, y, t) = 1 if and only if x = y,(3) M(x, y, t) = M(y, x, t),(4) M(x, y, t) ∗M(y, z, s) ≤M(x, z, t+ s),(5) M(x, y, .) : (0,∞)→ [0, 1] is continuous,for all x, y, z ∈ X and t, s > 0.

Definition 1.5. Let f and g be self-maps on a set X. If w = fx = gx for some x ∈ X,then x is called coincidence point of f and g, and w is called a point of coincidence off and g.

Definition 1.6. Let f and g be two self-maps on a set X. Then f and g are said tobe weakly compatible if they commute at every coincidence point.

2. Main results

Theorem 2.1. Let (X,M, t) be a complete fuzzy metric space, and let E be a nonemptyclosed subset of X. Let S, T : E → E and I, J : E → X be mappings satisfyingT (E) ⊂ I(E) and S(E) ⊂ J(E) and for every x, y ∈ X,

ψ(M(Sx, Ty, t)) ≤ ψ(MI,J(x, y))− ϕ(MI,J(x, y)), (4)

where ψ : [0,∞)→ [0,∞) is a continuous and nondecreasing function such that ψ(t) = 0if and only if t = 0. ϕ : [0,∞)→ [0,∞) is a lower semi-continuous function such thatϕ(t) = 0 if and only if t = 0, and

MI,J(x, y) = maxM(Ix, Jy, t),M(Ix, Sx, t),M(Jy, Ty, t), (5)

1

2

(M(Ix, Ty, t) +M(Jy, Sx, t)

).

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 27, NO.1, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

12 BATOOL ET AL 11-18

Page 13: Journal of Computational Analysis and Applicationseudoxuspress.com/images/JOCAAA-VOL-27-2019-ISSUE-1.pdf · Volume 27, Number 1 July 15, 2019 . ISSN:1521-1398 PRINT,1572-9206 ONLINE

A. Batool, T. Kamran, D. Y. Shin, C. Park

If one of S(E), T (E), I(E), JE is a closed subset of X, then S, I and T, J have aunique point of coincidence in X. Moreover, if S, I and T, J are weakly compatible,then S, T, I and J have a unique common fixed point in X.

Proof. Let x0 be an arbitrary point in X. Since T (E) ⊂ I(E) and S(E) ⊂ J(E), wecan define the sequences xn and yn in X by

y2n−1 = Sx2n−2 = Jx2n−1, y2n = Tx2n−1 = Ix2n, n = 1, 2, · · · .

Suppose that yn0 = yn0+1 for some n0. Then the sequence yn is constant for n ≥ n0.Indeed, let n0 = 2k. Then y2k = y2k+1 and it follows from (4) that

ψ(M(y2k+1, y2k+2, t)) = ψ(M(Sx2k, Tx2k+1, t))

≤ ψ(MI,J(x2k, x2k+1))− ϕ(MI,J(x2k, x2k+1)),(6)

where

MI,J(x2k, x2k+1)

= maxM(y2k, y2k+1, t),M(y2k, Sx2k, t),M(y2k+1, Tx2k+1, t),

1

2

(M(y2k, Tx2k+1, t) +M(y2k+1, Sx2k, t)

)= max

0, 0,M(y2k+1, y2k+2, t),

1

2

(M(y2k, y2k+2, t) + 0

)= max

M(y2k+1, y2k+2, t),

1

2M(y2k, y2k+2, t)

= M(y2k+1, y2k+2, t).

By (6), we get

ψ(M(y2k+1, y2k+2, t)) ≤ ψ(M(y2k+1, y2k+2, t))− ϕ(M(y2k+1, y2k+2, t)),

and so ϕ(M(y2k+1, y2k+2, t)) ≤ 0 and y2k+1 = y2k+2.Similarly, if n0 = 2k+ 1, then one easily obtains that y2k+2 = y2k+3 and the sequenceyn is constant (starting from some n0). Therefore, S, I and T, J have a point ofcoincidence in X.

Now, suppose that M(yn, yn+1, t) > 0 for each n. We shall show that for eachn = 0, 1, · · · ,

M(yn+1, yn+2, t) ≤MI,J(xn, xn+1) = M(yn, yn+1, t). (7)

Using (4), we obtain that

ψ(M(y2n+1, y2n+2, t)) = ψ(M(Sx2n, Tx2n+1, t))

≤ ψ(MI,J(x2n, x2n+1))− ϕ(MI,J(x2n, x2n+1))

< ψ(MI,J(x2n, x2n+1)).

(8)

On the other hand, the control function ψ is nondecreasing. Then

M(y2n+1, y2n+2, t) ≤MI,J(x2n, x2n+1). (9)

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 27, NO.1, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

13 BATOOL ET AL 11-18

Page 14: Journal of Computational Analysis and Applicationseudoxuspress.com/images/JOCAAA-VOL-27-2019-ISSUE-1.pdf · Volume 27, Number 1 July 15, 2019 . ISSN:1521-1398 PRINT,1572-9206 ONLINE

Common fixed point theorems of weakly compatible mappings

Moreover, we have

MI,J(x2n, x2n+1)

= maxM(y2n, y2n+1, t),M(y2n, Sx2n, t),M(y2n+1, Tx2n+1, t),

1

2

(M(y2n, Tx2n+1, t) +M(y2n+1, Sx2n, t)

)= max

M(y2n, y2n+1, t),M(y2n, y2n+1, t),

M(y2n+1, y2n+2, t),1

2M(y2n, y2n+2, t)

≤ max

M(y2n, y2n+1, t),M(y2n+1, y2n+2, t),

1

2

(M(y2n, y2n+1, t) +M(y2n+1, y2n+2)

)≤ max

M(y2n, y2n+1, t),M(y2n+1, y2n+2, t)

.

If M(y2n+1, y2n+2, t) ≥ M(y2n, y2n+1, t), then by using the last inequality and (9), wehave MI,J(x2n, x2n+1) = M(y2n+1, y2n+2, t) and (8) implies that

ψ(M(y2n+1, y2n+2, t)) = ψ(M(Sx2n, Tx2n+1, t))

≤ ψ(M(y2n+1, y2n+2, t))− ϕ(M(y2n+1, y2n+2, t)),

which is only possible when M(y2n+1, y2n+2, t) = 0. It is a contradiction. HenceM(y2n+1, y2n+2, t) ≤ M(y2n, y2n+1, t) and MI,J(x2n, x2n+1) ≤ M(y2n, y2n+1, t). By defi-nition, MI,J(x2n, x2n+1) ≥M(y2n, y2n+1, t), and so (7) is proved for M(y2n+1, y2n+2, t).

In a similar way, one can obtain that

M(y2n+3, y2n+2, t) ≤MI,J(x2n+2, x2n+1) = M(y2n+2, y2n+1, t).

So (7) holds for each n ∈ N.It follows that the sequence M(yn, yn+1, t) is nondecreasing and the limit

limn→∞

M(yn, yn+1, t) = limn→∞

MI,J(xn, xn+1)

exists. We denote this limit by d∗. We have d∗ ≥ 0.Suppose that d∗ > 0. Then

ψ(M(yn+1, yn+2, t)) ≤ ψ(MI,J(xn, xn+1))− ϕ(MI,J(xn, xn+1)).

Passing to the (upper) limit when n→∞, we get

ψ(d∗) ≤ ψ(d∗)− lim infn→∞

ϕ(MI,J(xn, xn+1)) ≤ ψ(d∗)− ϕ(d∗),

i.e., ϕ(d∗) ≤ 0. Using the properties of control functions, we get that d∗ = 0, which isa contradiction. Hence we have limn→∞M(yn, yn+1, t) = 0.Now we show that yn is a Cauchy sequence in X.It is enough to prove that y2n is a Cauchy sequence. Suppose the contrary. Then,

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 27, NO.1, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

14 BATOOL ET AL 11-18

Page 15: Journal of Computational Analysis and Applicationseudoxuspress.com/images/JOCAAA-VOL-27-2019-ISSUE-1.pdf · Volume 27, Number 1 July 15, 2019 . ISSN:1521-1398 PRINT,1572-9206 ONLINE

A. Batool, T. Kamran, D. Y. Shin, C. Park

for some ε > 0, there exist subsequences y2n(k) and y2m(k) of y2n such that n(k)is the smallest index satisfying

n(k) > m(k) and M(yn(k), ym(k), t) ≥ ε.

In particular, M(yn(k)−2, ym(k), t) < ε. Using the triangle inequality and the knownrelation |d(x, z)− d(x, y)| ≤ d(x, z), we obtain that

limk→∞

M(y2n(k), y2m(k), t) = limk→∞

M(y2n(k), y2m(k)−1, t) = limk→∞

M(y2n(k)+1, y2m(k), t)

= limk→∞

M(y2n(k)+1, y2m(k)−1, t) = ε.

By the definition of M(x, y, t) and by using the previous limits, we get that

limk→∞

MI,J(x2n(k), x2m(k)−1) = ε.

Indeed,

MI,J(x2n(k), x2m(k)−1)

= maxM(y2n(k), y2m(k)−1, t),M(y2n(k), y2n(k)+1, t),M(y2m(k)−1, y2m(k), t),

1

2

(M(y2n(k), y2m(k), t) +M(y2n(k)+1, y2m(k)−1, t)

)→ max

ε, 0, 0,

1

2(ε+ ε)

= ε.

Applying (4), we obtain

ψ(M(y2n(k)+1, y2m(k), t)) = ψ(M(Sx2n(k), Tx2m(k)−1, t))

≤ ψ(MI,J(x2n(k), x2m(k)−1))− ϕ(MI,J(x2n(k), x2m(k)−1)).

Passing to the limit k →∞, we obtain that ψ(ε) ≤ ψ(ε)−ϕ(ε), which is a contradiction.Therefore, yn is a Cauchy sequence in the complete metric (X, d). So there existsu ∈ X such that limn→∞ yn = u.

On the other hand, E is closed and yn ⊂ E. Then u ∈ E. Suppose that I(E) isclosed. Then there exists v ∈ E such that

u = Iv. (10)

We claim that Sv = u. Using (4) and (10), we have

ψ(M(Sv, y2n, t)) = ψ(M(Sv, Tx2n−1, t)) ≤ ψ(MI,J(v, x2n−1))−ϕ(MI,J(v, x2n−1)), (11)

where

MI,J(v, x2n−1) = maxM(y2n−1, u, t),M(u, Sv, t),M(y2n−1, Tx2n−1, t),

1

2

(M(y2n−1, Sv, t) +M(u, Tx2n−1, t)

)→ max

0,M(u, Sv, t), 0,

1

2M(u, Sv, t)

= M(u, Sv, t).

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 27, NO.1, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

15 BATOOL ET AL 11-18

Page 16: Journal of Computational Analysis and Applicationseudoxuspress.com/images/JOCAAA-VOL-27-2019-ISSUE-1.pdf · Volume 27, Number 1 July 15, 2019 . ISSN:1521-1398 PRINT,1572-9206 ONLINE

Common fixed point theorems of weakly compatible mappings

Passing to the limit when n→∞ in (11), we get

ψ(M(u, Sv, t)) ≤ ψ(M(u, Sv, t))− ϕ(M(u, Sv, t)).

It follows thatu = Sv. (12)

Since u = Sv ∈ SE ⊂ JE, there exists w ∈ E such that

u = Jw. (13)

We claim that Tw = u. By (4), we get

ψ(M(u, Tw, t)) = ψ(M(Sv, Tw, t)) ≤ ψ(MI,J(v, w))− ϕ(MI,J(v, w)),

where

MI,J(v, w) = maxM(u, u, t),M(Iv, Sv, t),M(Jw, Tw, t),

1

2

(M(Jw, Sv, t) +M(Iv, Tw, t)

)= max

0, 0,M(u, Tw, t),

1

2M(u, Tw, t)

= M(u, Tw, t).

Hence (2) implies that

ψ(M(u, Tw, t)) ≤ ψ(M(u, Tw, t))− ϕ(M(u, Tw, t)).

It follows thatu = Tw. (14)

Combining (10) and (12) yieldsu = Iv = Sv, (15)

that is, u is a point of coincidence of I and S. Combining (13) and (14) yields

u = Jw = Tw, (16)

that is, u is a point of coincidence of J and T .To prove the uniqueness property of u, suppose that u

′is another point of coincidence

of I and S, that is,

u′= Iv

′= Sv

for some v′ ∈ E. By (4), we have

ψ(M(u′, u, t)) = ψ(M(Sv

′, Tw, t)) ≤ ψ(MI,J(v

′, w))− ϕ(MI,J(v

′, w)),

where

MI,J(v′, w) = max

M(u

′, u, t), 0, 0,

1

2

(M(u

′, u, t) +M(u

′, u, t)

)= M(u

′, u, t).

It follows from (2) that u′= u.

Now, suppose that u is another point of coincidence of J and T , that is,

u = jw′= Tw

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 27, NO.1, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

16 BATOOL ET AL 11-18

Page 17: Journal of Computational Analysis and Applicationseudoxuspress.com/images/JOCAAA-VOL-27-2019-ISSUE-1.pdf · Volume 27, Number 1 July 15, 2019 . ISSN:1521-1398 PRINT,1572-9206 ONLINE

A. Batool, T. Kamran, D. Y. Shin, C. Park

for some w′ ∈ E. Using (4), we obtain

ψ(M(u, u, t)) = ψ(M(Sv, Tw, t′)) ≤ ψ(MI,J(v, w

′))− ϕ(MI,J(v, w

′)),

where

MI,J(v, w′) = max

M(u, u, t), 0, 0,

1

2

(M(u, u, t) +M(u, u, t)

)= M(u, u, t).

It follows from (2) that u = u.Therefore, u is the unique point of coincidence of S, I and T, J.

Now, if S, I and T, J are weakly compatible, then by (15) and (16), we haveSu = S(Iv) = I(Sv) = Iu = w1 and Tu = T (Jw) = J(Tw) = Ju = w2. By (4), wehave

ψ(M(w1, w2, t)) = ψ(M(Su, Tu, t)) ≤ ψ(MI,J(u, u))− ϕ(MI,J(u, u)),

where

MI,J(u, u) = maxM(w1, w2, t), 0, 0,

1

2

(M(w1, w2, t) +M(w1, w2, t)

)= M(w1, w2, t).

It follows that w1 = w2, that is,

Su = Iu = Tu = Ju. (17)

By (4) and (17), we have

ψ(M(Sv, Tu, t)) ≤ ψ(MI,J(v, u)− ϕ(MI,J(v, u)),

where

MI,J(v, u) = maxM(Iv, Ju, t),M(Iv, Sv, t),M(Ju, Tu, t),

1

2

(M(Iv, Tu, t) +M(Sv, Tu, t)

)= max

M(Sv, Tu, t), 0, 0,

1

2

(M(Sv, Tu, t) +M(Sv, Tu, t)

)= M(Sv, Tu, t).

Therefore, we deduce that Sv = Tu, that is, u = Tu. It follows from (17) that

u = Su = Iu = Tu = Ju.

Then u is the unique common fixed point of S, I, J and T .The rest of the proof is similar to the above case and so the rest will be omitted.

Example 2.2. Let X = [0, 1] be equipped with the natural metric d(x, y) = |x−y|. Nowfor t ∈ [0,∞) define

M(x, y, t) =

0 if t = 0 and x, y ∈ Xt

t+|x−y| if t 6= 0 and x, y ∈ X.

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 27, NO.1, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

17 BATOOL ET AL 11-18

Page 18: Journal of Computational Analysis and Applicationseudoxuspress.com/images/JOCAAA-VOL-27-2019-ISSUE-1.pdf · Volume 27, Number 1 July 15, 2019 . ISSN:1521-1398 PRINT,1572-9206 ONLINE

Common fixed point theorems of weakly compatible mappings

Clearly, (X,M, ∗) is a fuzzy metric on X, where ∗ is defined as a ∗ b = ab. This fuzzymetric space is complete.

Let E = 0, 12, 1 and we define T, S : E → E as

T0 = T1 = 0 and T 12

= 1, Sx = 0.We also define I, J : E → X asI0 = I1 = 0 and I 1

2= 1, J0 = J1 = 0 and J 1

2= 1.

The functions ψ : ϕ : [0,∞)→ [0,∞) are defined asψ(t) = t and ϕ(t) = t

4.

Thenψ(M(Sx, Ty, t)) ≤ ψ(MI,J(x, y))− ϕ(MI,J(x, y)).

References

[1] I. Beg, M. Abbas, Coincidence point and invariant approximation for mappings satisfying gener-alized weak contractive condition, Fixed Point Theory Appl. 2006, Article ID 74503 (2006).

[2] G.A. Anastassiou, I.K. Argyros, Approximating fixed points with applications in fractional cal-culus, J. Comput. Anal. Appl. 21 (2016), 1225–1242.

[3] S. Banach, Sur les oprations dans les ensembles abstraits et leur application aux quations intgrales,Fund. Math. 3 (1922), 133–181.

[4] A. Batool, T. Kamran, S. Jang, C. Park, Generalized ϕ-weak contractive fuzzy mappings andrelated fixed point results on complete metric space, J. Comput. Anal. Appl. 21 (2016), 729–737.

[5] V. Berinde, Approximating fixed points of weak ϕ-contractions, Fixed Point Theory 4 (2003),131–142.

[6] C. E. Chidume, H. Zegeye, S. J. Aneke, Approximation of fixed points of weakly contractivenonself maps in Banach spaces, J. Math. Anal. Appl. 270 (2002), 189–199.

[7] P. N. Dutta, B. S. Choudhury, A generalization of contraction principle in metric spaces, FixedPoint Theory Appl. 2008, Article ID 406368 (2008).

[8] G. Jungck, B. E. Rhoades, Fixed points for set valued functions without continuity, Indian J.Pure Appl. Math. 29 (1998), 227–238.

[9] J. H. Mai, X. H. Liu, Fixed points of weakly contractive maps and boundedness of orbits, FixedPoint Theory Appl. 2007, Article ID 20962 (2007).

[10] S. Moradi, Z. Fathi, E. Analouee, The common fixed point of single-valued generalized ϕf -weaklycontractive mappings, Appl. Math. Lett. 24 (2011), 771–776.

[11] B.E. Rhoades, Some theorems on weakly contractive maps, Nonlinear Anal. 47 (2001), 2683–2693.[12] Q. Zhang, Y. Song, Y Fixed point theory for generalized ϕ-weak contractions, Appl. Math. Lett.

22 (2009), 75–78.

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 27, NO.1, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

18 BATOOL ET AL 11-18

Page 19: Journal of Computational Analysis and Applicationseudoxuspress.com/images/JOCAAA-VOL-27-2019-ISSUE-1.pdf · Volume 27, Number 1 July 15, 2019 . ISSN:1521-1398 PRINT,1572-9206 ONLINE

Analysis of latent CHIKV dynamics model with time delays

Ahmed. M. Elaiw, Taofeek O. Alade and Saud M. Alsulami

Department of Mathematics, Faculty of Science, King Abdulaziz University,

P.O. Box 80203, Jeddah 21589, Saudi Arabia.

Email: a m [email protected] (A. Elaiw)

Abstract

This paper proposes a latent Chikungunya viral infection model with saturated incidence rate. To take

into account the time lag between the initial viral contacts uninfected monocytes and the production of new

active CHIKV particles the model is incorporated by intracellular discrete or distributed time delays. We

study the qualitative behavior of the model. Using the method of Lyapunov function, we established the

global stability of the steady states of the model. The effect of the time delay on the stability of the steady

states has also been shown by numerical simulations.

Keywords: Chikungunya virus infection; Latency; Time delay; Global stability; Lyapunov function.

1 Introduction

Mathematical analysis of viral infection models plays a substantial role in understanding the dynamics of human

viruses (such as HIV, HCV, HBV, HTLV and Chikungunya virus). The models have been developed to mainly

describe the relation among virus particles, uninfected target cells and infected cells [1]-[15]. The effect of

Cytotoxic T Lymphocytes (CTL) immune response or humoral immune response has also been modeled (see

e.g. [10]-[15]. Two main classes of mathematical models of viral infection have been proposed in the literature.

The first class of models are given by ordinary differential equations. The second class of models is given by

delay differential equations which incorporate the time lag between the initial viral contacts a target cell and

the production of new active viruses. Modeling the virus dynamics with two types of infected cells, latently

infected cells and actively infected cells has been studied by several researchers (see e.g. [2] and [14]). The

latent viral infection model has been formulated as [2]:

S(t) = µ− aS(t)− bV (t)S(t), (1)

L(t) = (1− ρ)bV (t)S(t)− (θ + λ)L(t), (2)

I(t) = ρbV (t)S(t) + λL(t)− εI(t), (3)

V (t) = mI(t)− rV (t), (4)

where, S, L, I and V are the concentrations of uninfected cells, latently infected cells, actively infected cells and

free virus particles. Parameters a and µ represent the death rate and birth rate constants of the uninfected cells,

respectively. The uninfected cells become infected at rate bSV , where b is a constant. The parameters θ, ε and

r denote the death rate constants of the latently infected cells, actively infected cells and free virus particles,

respectively. An actively infected cell produces an average number m of virus particles. The parameter λ is the

latent to active transmission rate constant. A fraction (1−ρ) of infected cells is assumed to be latently infected

cells and the remaining ρ becomes actively infected cells, where 0 < ρ < 1.

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 27, NO.1, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

19 ELAIW ET AL 19-36

Page 20: Journal of Computational Analysis and Applicationseudoxuspress.com/images/JOCAAA-VOL-27-2019-ISSUE-1.pdf · Volume 27, Number 1 July 15, 2019 . ISSN:1521-1398 PRINT,1572-9206 ONLINE

Chikungunya virus (CHIKV) is an alphavirus and is transmitted to humans by Aedes aegypti and Aedes

albopictus mosquitos. In the CHIKV literature, most of the mathematical models have been presented to

describe the disease transmission in mosquito and human populations (see e.g. [17]-[22]). However, only few

works have devoted for mathematical modeling of the dynamics of the CHIKV within host. In 2017, Wang

and Liu [16] have presented a mathematical model for in host CHIKV infection model without considering the

latent infection.

The objective of this paper is to propose a CHIKV infection model which improves the model presented in

[16] by taking into account (i) two types of infected monocytes, latently infected monocytes and actively infected

monocytes, (ii) two types of discrete or distributed time delays (iii) saturated incidence rate which is suitable

to model the nonlinear dynamics of the CHIKV especially when its concentration is high. We investigate the

nonnegativity and boundedness of the solutions of the CHIKV dynamics model. We show that the CHIKV

dynamics is governed by one bifurcation parameter (the basic reproduction numbers R0). We use Lyapunov

direct method to establish the global stability of the model’s equilibria.

2 CHIKV model with discrete time delays

We consider a within-host CHIKV dynamics model with latently infected monocytes taking into account two

discrete time delays.

S(t) = µ− aS(t)− bV (t)S(t)

1 + πV (t), (5)

L(t) =(1− ρ)e−δ1τ1bV (t− τ1)S(t− τ1)

1 + πV (t− τ1)− (θ + λ)L(t), (6)

I(t) =ρe−δ2τ2bV (t− τ2)S(t− τ2)

1 + πV (t− τ2)+ λL(t)− εI(t), (7)

V (t) = mI(t)− rV (t)− qB(t)V (t), (8)

B(t) = η + cB(t)V (t)− δB(t), (9)

where, S, L, I, V , and B are the concentrations of uninfected monocytes, latently infected monocytes, actively

infected monocytes CHIKV particles and B cells, respectively. The CHIKV particles are attacked by the B

cells at rate qV B. The B cells are produced at constant rate η, proliferated at rate cBV and die at rate

δB. τ1 denotes the time between the CHIKV contacts the uninfected monocytes and latent infection, while τ2

denotes the time between monocytes infection and the production of active CHIKV particles. The probability

of latently and actively infected monocytes surviving to the age of τ1 and τ2 are represented by e−δ1τ1 and

e−δ2τ2 , respectively, where δ1 and δ2 are. We consider the following initial conditions:

S(ϑ) = ϕ1(ϑ), L(ϑ) = ϕ2(ϑ), I(ϑ) = ϕ3(ϑ), V (ϑ) = ϕ4(ϑ), B(ϑ) = ϕ5(ϑ),

ϕi(ϑ) ≥ 0, ϑ ∈ [−τ, 0] and ϕi ∈ C ([−τ, 0] ,R≥0) , i = 1, 2, ..., 5, (10)

where τ = max τ1, τ2 and C is the Banach space of continuous functions mapping the interval [−τ, 0] into

R≥0 with norm ‖ϕj‖ = sup−τ≤ϑ≤0

|ϕj(ϑ)| . Then the uniqueness of the solution for t > 0 is guaranteed [23].

2.1 Preliminaries

In this subsection we show the nonnegativity and boundedness of solutions as well as the existence of the steady

states of system (5)-(9).

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 27, NO.1, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

20 ELAIW ET AL 19-36

Page 21: Journal of Computational Analysis and Applicationseudoxuspress.com/images/JOCAAA-VOL-27-2019-ISSUE-1.pdf · Volume 27, Number 1 July 15, 2019 . ISSN:1521-1398 PRINT,1572-9206 ONLINE

Lemma 1. The solutions of system (5)-(9) with the initial states (10) are nonnegative and ultimately

bounded.

Proof. From Eqs. (5) and (9) we have S∣∣∣S=0

= µ > 0 and B∣∣∣B=0

= η > 0. Thus, S(t) > 0 and B(t) > 0

for all t ≥ 0. Moreover, for t ∈ [0, τ ] we have

L(t) = ϕ2(0)e−(θ+λ)t +

∫ t

0

((1− ρ)e−δ1τ1bS(ω − τ1)V (ω − τ1)

1 + πV (ω − τ1)

)e−(θ+λ)(t−ω)dω ≥ 0,

I(t) = ϕ3(0)e−εt +

∫ t

0

(ρe−δ2τ2bS(ω − τ2)V (ω − τ2)

1 + πV (ω − τ2)+ λL(ω)

)e−ε(t−ω)dω ≥ 0,

V (t) = ϕ4(0)e−

t∫0

(c+qB(u))u+

∫ t

0

mI(ω)e−

t∫ω

(c+qB(u))dudω ≥ 0.

By recursive argument, we get L(t) ≥ 0, I(t) ≥ 0 and V (t) ≥ 0 for all t ≥ 0.

Next, we establish the boundedness of the model’s solutions. The nonnegativity of the model’s solution

implies that dS(t)dt ≤ µ− aS(t), which yields lim

t→∞supS(t) ≤ µ

a . Let us define

X1(t) = (1− ρ)e−δ1τ1S(t− τ1) + L(t),

then

X1(t) = (1− ρ)e−δ1τ1(µ− aS(t− τ1)− bV (t− τ1)S(t− τ1)

1 + πV (t− τ1)

)+ (1− ρ)e−δ1τ1

bV (t− τ1)S(t− τ1)

1 + πV (t− τ1)− (θ + λ)L(t)

≤ µ(1− ρ)e−δ1τ1 − σ1((1− ρ)e−δ1τ1S(t− τ1) + L(t)

)≤ µ(1− ρ)− σ1X1(t),

where σ1 = mina, θ + λ. Then, limt→∞

supX1(t) ≤M1, and limt→∞

supL(t) ≤M1, where M1 = µ(1−ρ)σ1

. Let

X2(t) = ρe−δ2τ2S(t− τ2) + I(t) +ε

2mV (t) +

εq

2mcB(t),

then we get

X2(t) = ρe−δ2τ2(µ− aS(t− τ2)− bV (t− τ2)S(t− τ2)

1 + πV (t− τ2)

)+ ρe−δ2τ2

bV (t− τ2)S(t− τ2)

1 + πV (t− τ2)+ λL(t)− εI(t)

2m(mI(t)− rV (t)− qV (t)B(t)) +

εq

2mc(η + cB(t)V (t)− δB(t))

= ρµe−δ2τ2 − ρe−δ2τ2aS(t− τ2) + λL(t)− ε

2I(t) +

εqη

2mc− εr

2mV (t)− εqδ

2mcB(t)

≤ ρµ+ λM1 +εqη

2mc− σ2

(ρe−δ2τ2S(t− τ2) + I(t) +

ε

2mV (t) +

εq

2mcB(t)

)= ρµ+ λM1 +

εqη

2mc− σ2X2(t),

where σ2 = mina, ε2 , r, δ. It follows that limt→∞

sup I(t) ≤ M2, limt→∞

supV (t) ≤ M3 and limt→∞

supB(t) ≤

M4, where M2 = ρµ+λM1

σ2+ εqη

2mcσ2, M3 = 2m

ε and M4 = 2mcεq . This shows the ultimate boundedness of

S(t), L(t), I(t), V (t) and B(t).

Lemma 2. For system (5)-(9) there exists a threshold parameter R0 > 0, such that

(i) if R0 ≤ 1, then there exists only one positive steady state, virus-free steady state Q0.

(i) if R0 > 1, then in addition to Q0, there exists an endemic steady state Q1

Proof.

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 27, NO.1, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

21 ELAIW ET AL 19-36

Page 22: Journal of Computational Analysis and Applicationseudoxuspress.com/images/JOCAAA-VOL-27-2019-ISSUE-1.pdf · Volume 27, Number 1 July 15, 2019 . ISSN:1521-1398 PRINT,1572-9206 ONLINE

To calculate the steady states we let the R.H.S of system (5)-(9) be equal zero

0 = µ− aS − bV S

1 + πV, (11)

0 = (1− ρ)e−δ1τ1bV S

1 + πV− (θ + λ)L, (12)

0 =ρe−δ2τ2bV S

1 + πV+ λL− εI, (13)

0 = mI − rV − qV B, (14)

0 = η + cBV − δB. (15)

From Eqs. (11)-(15) we obtain

S =µ (1 + πV )

bV + a (1 + πV ), L =

(1− ρ)e−δ1τ1bV S

(1 + πV ) (θ + λ), I =

bβV S

ε (1 + πV ) (θ + λ), B =

η

δ − cV. (16)

where β = λ(1− ρ)e−δ1τ1 + ρe−δ2τ2(θ + λ). Substituting Eq. (16) into Eq. (14) we have[mµbβ

ε (θ + λ) (bV + a (1 + πV ))− r − qη

δ − cV

]V = 0. (17)

Equation (17) has two possibilities:

(i) V = 0 which gives the virus-free steady state Q0 = (S0, L0, I0, V0, B0) = (µa , 0, 0, 0,ηδ ),

(ii) V 6= 0 which givesmµbβ

ε (θ + λ) (bV + a (1 + πV ))− r − qη

δ − cV= 0. (18)

Equation (18) takes the form P1V2 − P2V + P3 = 0, where

P1 = rεc(θ + λ)(b+ πa),

P2 = −rεca(θ + λ) +mµbc(β) + ε (rδ + qη) (θ + λ)(b+ πa),

P3 = mρbµδ(θ + λ)e−δ2τ2 +mµbλδ(1− ρ)e−δ1τ1 − εa (rδ + qη) (θ + λ).

The constants P1, P2 and P3 can be rewritten as

P1 = rεc(θ + λ)(b+ πa),

P2 =εca (rδ + qη) (θ + λ)

δ(R0 − 1) + ε (rδ + qη) (θ + λ)(b+ πa) +

caqεη(θ + λ)

δ,

P3 = εa (rδ + qη) (θ + λ)(R0 − 1),

where

R0 =mµbδβ

εa(rδ + qη)(θ + λ).

Let

Θ1(V ) = P1V2 − P2V + P3 = 0. (19)

If R0 > 1, then P2 > 0 and P3 > 0. We have Θ1(0) = P3 > 0, Θ1

(δc

)= − qεη(θ+λ)(ca+δ(b+πa))c < 0, and

Θ′1(0) = −P2 < 0. Then, Eq. (19) has two positive roots

V1 =P2 −

√P 22 − 4P1P3

2P1<δ

cand V2 =

P2 +√P 22 − 4P1P3

2P1>δ

c.

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 27, NO.1, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

22 ELAIW ET AL 19-36

Page 23: Journal of Computational Analysis and Applicationseudoxuspress.com/images/JOCAAA-VOL-27-2019-ISSUE-1.pdf · Volume 27, Number 1 July 15, 2019 . ISSN:1521-1398 PRINT,1572-9206 ONLINE

If V = V2, then from Eq. (16) we get B2 = ηδ−cV2

< 0. Thus, when R0 > 1, a positive endemic steady state

Q1 = (S1, L1, I1, V1, B1) will appear, where

S1 =µ (1 + πV1)

bV1 + a (1 + πV1), L1 =

bµV1(1− ρ)e−δ1τ1

(θ + λ)(bV1 + a (1 + πV1)), I1 =

bµβV1ε(θ + λ)(bV1 + a (1 + πV1))

,

V1 =ρ2 −

√ρ22 − 4ρ1ρ32ρ1

, B1 =η

δ − cV1.

The parameter R0 represents the basic reproduction number.

2.2 Global stability

We define H(x) = x − lnx − 1. Clearly, H(1) = 0 and H(u) ≥ 0 for u > 0. Denote (S,L, I, V,B) =

(S(t), L(t), I(t), V (t), B(t)).

Theorem 1. Suppose that R0 ≤ 1, then Q0 is globally asymptotically stable (GAS).

Proof. We define a Lyapunov functional Y0 as:

Y0(S,L, I, V,B) =

θ + λ

)S0H

(S

S0

)+

λ

θ + λL+ I +

ε

mV +

εq

mcB0H

(B

B0

)+λ(1− ρ)e−δ1τ1

θ + λ

∫ τ1

0

bV (t− ϑ)S(t− ϑ)

1 + πV (t− ϑ)dϑ+ ρe−δ2τ2

∫ τ2

0

bV (t− ϑ)S(t− ϑ)

1 + πV (t− ϑ)dϑ. (20)

Note that, Y0(S,L, I, V,B) > 0 for all S,L, I, V,B > 0 and Y0(S0, 0, 0, 0, B0) = 0. CalculatingdY0dt

along the

trajectories of (5)-(9) we get

dY0dt

θ + λ

(1− S0

S

)(µ− aS − bV S

1 + πV

)+

λ

θ + λ

((1− ρ)e−δ1τ1bV (t− τ1)S(t− τ1)

1 + πV (t− τ1)− (θ + λ)L

)+ρe−δ2τ2bV (t− τ2)S(t− τ2)

1 + πV (t− τ2)

+ λL− εI +ε

m(mI − rV − qV B) +

εq

mc

(1− B0

B

)(η + cBV − δB)

+λ(1− ρ)e−δ1τ1

θ + λ

(bV S

1 + πV− bV (t− τ1)S(t− τ1)

1 + πV (t− τ1)

)+ ρe−δ2τ2

(bV S

1 + πV− bV (t− τ2)S(t− τ2)

1 + πV (t− τ2)

)= − aβ

θ + λ

(S − S0)2

S+

β

θ + λ

bS0V

1 + πV− εrV

m− εqB0V

m+

εq

mc

(1− B0

B

)(δB0 − δB)

= − aβ

θ + λ

(S − S0)2

S− εqδ

mc

(B −B0)2

B+ε(rδ + qη)

(mµbδβ

εa(rδ + qη)(θ + λ)(1 + πV )− 1

)V

= − aβ

θ + λ

(S − S0)2

S− εqδ

mc

(B −B0)2

B+ε(rδ + qη)

mδ(R0 − 1)V − ε(rδ + qη)R0πV

2

mδ(1 + πV ). (21)

Therefore,dY0dt≤ 0 holds if R0 ≤ 1. Further,

dY0dt

= 0 if and only if S = S0, B = B0 and V = 0. By LaSalle’s

invariance principle, Q0 is GAS.

In the next theorem we show the global stability of Q1.

Theorem 2. Suppose that R0 > 1, then Q1 is GAS.

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 27, NO.1, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

23 ELAIW ET AL 19-36

Page 24: Journal of Computational Analysis and Applicationseudoxuspress.com/images/JOCAAA-VOL-27-2019-ISSUE-1.pdf · Volume 27, Number 1 July 15, 2019 . ISSN:1521-1398 PRINT,1572-9206 ONLINE

Proof. Consider

Y1(S,L, I, V,B) =β

θ + λS1H

(S

S1

)+

λ

θ + λL1H

(L

L1

)+ I1H

(I

I1

)+

ε

mV1H

(V

V1

)+

εq

mcB1H

(B

B1

)+λ(1− ρ)e−δ1τ1

θ + λ

bS1V11 + πV1

∫ τ1

0

H

(V (t− ϑ)S(t− ϑ)(1 + πV1)

S1V1 (1 + πV (t− ϑ))

)dϑ

+ ρe−δ2τ2bS1V1

1 + πV1

∫ τ2

0

H

(V (t− ϑ)S(t− ϑ)(1 + πV1)

S1V1 (1 + πV (t− ϑ))

)dϑ.

We have Y1(S,L, I, V,B) > 0 for all S,L, I, V,B > 0 and Y1(S1, L1, I1, V1, B1) = 0. CalculatingdY1dt

along the

trajectories of (5)-(9) we get

dY1dt

θ + λ

(1− S1

S

)(µ− aS − bV S

1 + πV

)+

λ

θ + λ

(1− L1

L

)((1− ρ)e−δ1τ1bV (t− τ1)S(t− τ1)

1 + πV (t− τ1)− (θ + λ)L

)+

(1− I1

I

)(ρe−δ2τ2bV (t− τ2)S(t− τ2)

1 + πV (t− τ2)+ λL− εI

)+

ε

m

(1− V1

V

)(mI − rV − qV B)

+εq

mc

(1− B1

B

)(η + cBV − δB) +

λ(1− ρ)e−δ1τ1

θ + λ

(bV S

1 + πV− bV (t− τ1)S(t− τ1)

1 + πV (t− τ1)

)+λ(1− ρ)e−δ1τ1

θ + λ

bS1V11 + πV1

ln

(V (t− τ1)S(t− τ1)(1 + πV )

V S (1 + πV (t− τ1))

)+ ρe−δ2τ2

(bV S

1 + πV− bV (t− τ2)S(t− τ2)

1 + πV (t− τ2)

)+ ρe−δ2τ2

bS1V11 + πV1

ln

(V (t− τ2)S(t− τ2)(1 + πV )

V S (1 + πV (t− τ2))

). (22)

Applying

µ = aS1 +bS1V1

1 + πV1, η = δB1 − cB1V1,

we obtain

dY1dt

θ + λ

(1− S1

S

)(aS1 − aS) +

β

θ + λ

bS1V11 + πV1

(1− S1

S

)+

β

θ + λ

bS1V

1 + πV

− λ(1− ρ)e−δ1τ1

θ + λ

bV (t− τ1)S(t− τ1)L1

1 + πV (t− τ1)L+ λL1 − ρe−δ2τ2

bV (t− τ2)S(t− τ2)I11 + πV (t− τ2)I

− λLI1I

+ εI1 −εIV1V

− rεV

m+rεV1m

+εqBV1m

+εq

mc

(1− B1

B

)(δB1 − δB)− εqB1V

m− εqB1V1

m+εqB1V1m

(B1

B

)+

bS1V11 + πV1

[λ(1− ρ)e−δ1τ1

θ + λln

(V (t− τ1)S(t− τ1)(1 + πV )

V S (1 + πV (t− τ1))

)+ ρe−δ2τ2 ln

(V (t− τ2)S(t− τ2)(1 + πV )

V S (1 + πV (t− τ2))

)].

Using the equilibrium conditions for Q1:

(1− ρ)e−δ1τ1bS1V1

1 + πV1= (θ + λ)L1, ρe

−δ1τ1 bS1V11 + πV1

+ λL1 = εI1, mI1 = rV1 + qB1V1,

we get

εI1 =β

θ + λ

bS1V1(1 + πV1)

,rεV1m

θ + λ

bS1V1(1 + πV1)

− εqB1V1m

,

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 27, NO.1, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

24 ELAIW ET AL 19-36

Page 25: Journal of Computational Analysis and Applicationseudoxuspress.com/images/JOCAAA-VOL-27-2019-ISSUE-1.pdf · Volume 27, Number 1 July 15, 2019 . ISSN:1521-1398 PRINT,1572-9206 ONLINE

and

dY1dt

= − aβ

θ + λ

(S − S1)2

S+λ(1− ρ)e−δ1τ1

θ + λ

bS1V1(1 + πV1)

(1− S1

S

)+ ρe−δ2τ2

bS1V11 + πV1

(1− S1

S

)+

θ + λ

)bS1V1

1 + πV1

((1 + πV1)V

(1 + πV )V1− V

V1

)− λ(1− ρ)e−δ1τ1

θ + λ

bS1V11 + πV1

V (t− τ1)S(t− τ1)(1 + πV1)L1

(1 + πV (t− τ1))S1V1L+λ(1− ρ)e−δ1τ1

θ + λ

bS1V1(1 + πV1)

− ρe−δ2τ2 bS1V11 + πV1

V (t− τ2)S(t− τ2)(1 + πV1)I1(1 + πV (t− τ2))S1V1I

− λ(1− ρ)e−δ1τ1

θ + λ

bS1V11 + πV1

I1L

L1I

+λ(1− ρ)

θ + λe−δ1τ1

bS1V1(1 + πV1)

+ ρe−δ2τ2bS1V1

(1 + πV1)− λ(1− ρ)e−δ1τ1

θ + λ

bS1V11 + πV1

IV1I1V

− ρe−δ2τ2 bS1V11 + πV1

IV1I1V

+λ(1− ρ)e−δ1τ1

θ + λ

bS1V1(1 + πV1)

+ ρe−δ2τ2bS1V1

(1 + πV1)

− 2εqB1V1m

+εqBV1m

+εqB1V1m

(B1

B

)− εqδ

mc

(B −B1)2

B

+bS1V1

1 + πV1

[λ(1− ρ)e−δ1τ1

θ + λln

(V (t− τ1)S(t− τ1)(1 + πV )

V S (1 + πV (t− τ1))

)+ ρe−δ2τ2 ln

(V (t− τ2)S(t− τ2)(1 + πV )

V S (1 + πV (t− τ2))

)].

Using the following equalities:

ln

(V (t− τ1)S(t− τ1)(1 + πV )

V S (1 + πV (t− τ1))

)= ln

(S1

S

)+ ln

(IV1I1V

)+ ln

(LI1L1I

)+ ln

(1 + πV

1 + πV1

)+ ln

(V (t− τ1)S(t− τ1)(1 + πV1)L1

(1 + πV (t− τ1))S1V1L

),

ln

(V (t− τ2)S(t− τ2)(1 + πV )

V S (1 + πV (t− τ2))

)= ln

(S1

S

)+ ln

(IV1I1V

)+ ln

(1 + πV

1 + πV1

)+ ln

(V (t− τ2)S(t− τ2)(1 + πV1)I1

(1 + πV (t− τ2))S1V1I

),

we get

dY1dt

= − aβ

θ + λ

(S − S1)2

S+

β

θ + λ

bS1V11 + πV1

(−1 +

(1 + πV1)V

(1 + πV )V1− V

V1+

1 + πV

1 + πV1

)+λ(1− ρ)e−δ1τ1

θ + λ

bS1V1(1 + πV1)

[1− S1

S+ ln

(S1

S

)]+λ(1− ρ)e−δ1τ1

θ + λ

bS1V1(1 + πV1)

[1− IV1

I1V+ ln

(IV1I1V

)]+λ(1− ρ)e−δ1τ1

θ + λ

bS1V1(1 + πV1)

[1− V (t− τ1)S(t− τ1)(1 + πV1)L1

(1 + πV (t− τ1))S1V1L+ ln

(V (t− τ1)S(t− τ1)(1 + πV1)L1

(1 + πV (t− τ1))S1V1L

)]+λ(1− ρ)e−δ1τ1

θ + λ

bS1V1(1 + πV1)

[1− 1 + πV

1 + πV1+ ln

(1 + πV

1 + πV1

)]+λ(1− ρ)e−δ1τ1

θ + λ

bS1V1(1 + πV1)

[1− LI1

L1I+ ln

(LI1L1I

)]+ ρe−δ2τ2

bS1V11 + πV1

[1− S1

S+ ln

(S1

S

)]+ ρe−δ2τ2

bS1V1(1 + πV1)

[1− IV1

I1V+ ln

(IV1I1V

)]+ ρe−δ2τ2

bS1V11 + πV1

[1− V (t− τ2)S(t− τ2)(1 + πV1)I1

(1 + πV (t− τ2))S1V1I+ ln

(V (t− τ2)S(t− τ2)(1 + πV1)I1

(1 + πV (t− τ2))S1V1I

)]+ ρe−δ2τ2

bS1V11 + πV1

[1− 1 + πV

1 + πV1+ ln

(1 + πV

1 + πV1

)]− εqδ

mc

(B −B1)2

B− εqB1V1

m

[2− B

B1− B1

B

]

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 27, NO.1, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

25 ELAIW ET AL 19-36

Page 26: Journal of Computational Analysis and Applicationseudoxuspress.com/images/JOCAAA-VOL-27-2019-ISSUE-1.pdf · Volume 27, Number 1 July 15, 2019 . ISSN:1521-1398 PRINT,1572-9206 ONLINE

= −aβ(S − S1)2

(θ + λ)S− εqη

mcB1

(B −B1)2

B− β

θ + λ

πbS1(V − V1)2

(1 + πV )(1 + πV1)2− λ(1− ρ)e−δ1τ1

θ + λ

bS1V1(1 + πV1)

[H

(S1

S

)+H

(IV1I1V

)+H

(1 + πV

1 + πV1

)+H

(V (t− τ1)S(t− τ1)(1 + πV1)L1

(1 + πV (t− τ1))S1V1L

)+H

(LI1L1I

)]− ρe−δ2τ2 bS1V1

(1 + πV1)

[H

(S1

S

)+H

(IV1I1V

)+H

(1 + πV

1 + πV1

)+H

(V (t− τ2)S(t− τ2)(1 + πV1)I1

(1 + πV (t− τ2))S1V1I

)]. (23)

It can be seen that if R0 > 1, thendY1dt≤ 0 for all S,L, I, V,B > 0 and

dY1dt

= 0 if and only if S = S1,

L = L1, I = I1, V = V1, and B = B1. It follows from LaSalle’s invariance principle that, Q1 is GAS.

3 CHIKV model with delay-distributed

We suggest a dynamical model for within-host CHIKV infection with latently infected monocytes taking into

account the distributed delays.

S(t) = µ− aS(t)− bV (t)S(t)

1 + πV (t), (24)

L(t) = (1− ρ)b

∫ κ1

0

ξ1(τ)e−δ1τV (t− τ)S(t− τ)

1 + πV (t− τ)dτ − (θ + λ)L(t), (25)

I(t) = ρb

∫ κ2

0

ξ2(τ)e−δ2τV (t− τ)S(t− τ)

1 + πV (t− τ)dτ + λL(t)− εI(t), (26)

V (t) = mI(t)− rV (t)− qV (t)B(t), (27)

B(t) = η + cB(t)V (t)− δB(t). (28)

where, ξ1(τ) and ξ2(τ) are probability distribution functions which satisfy ξ1(τ) > 0 and ξ2(τ) > 0, and∫ κ1

0

ξ1(τ)dτ =

∫ κ2

0

ξ2(τ)dτ = 1,

∫ κ1

0

ξ1(u)enudu <∞,∫ κ2

0

ξ2(u)enudu <∞, (29)

where n is a positive number. Let

E =

∫ κ1

0

ξ1(τ)e−δ1τdτ and K =

∫ κ2

0

ξ2(τ)e−δ2τdτ

Then 0 < E ≤ 1, 0 < K ≤ 1. The initial conditions for model (24)-(28) take the form

S(ϕ) = ψ1(ϕ), L(ϕ) = ψ2(ϕ), I(ϕ) = ψ3(ϕ),

V (ϕ) = ψ4(ϕ), B(ϕ) = ψ5(ϕ),

ψj(ϕ) ≥ 0, ϕ ∈ [−`, 0], j = 1, ..., 5, (30)

where ` = maxκ1, κ2, ψj ∈ C([−`, 0],R≥0). This guarantees the uniqueness of solution of the system [23].

3.1 Preliminaries

Lemma 3. The solutions of system (24)-(28) with the initial states (30) are nonnegative and ultimately

bounded.

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 27, NO.1, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

26 ELAIW ET AL 19-36

Page 27: Journal of Computational Analysis and Applicationseudoxuspress.com/images/JOCAAA-VOL-27-2019-ISSUE-1.pdf · Volume 27, Number 1 July 15, 2019 . ISSN:1521-1398 PRINT,1572-9206 ONLINE

Proof. From Lemma 1 we have S(t) > 0 and B(t) > 0 for all t ≥ 0. Moreover, one can show that for t ≥ 0

L(t) = e−(θ+λ)tψ2(0) + (1− ρ)b

∫ t

0

e−(θ+λ)(t−u)∫ κ1

0

e−δ1τξ1(τ)S(u− τ)V (u− τ)

1 + πV (u− τ)dτdu ≥ 0,

I(t) = e−εtψ3(0) + ρb

∫ t

0

e−ε(t−u)(∫ κ2

0

e−δ2τξ2(τ)S(u− τ)V (u− τ)

1 + πV (u− τ)dτ + λL(u)

)du ≥ 0,

V (t) = e−

t∫0

(c+qB(u))uψ4(0) +

∫ t

0

mI(ω)e−

t∫ω

(c+qB(u))dudω ≥ 0.

From (24), we have limt→∞

supS(t) ≤ µa . Let T1(t) = (1− ρ)

∫ κ1

0ξ1(τ)e−δ1τS(t− τ)dτ + L(t), then

T1(t) = (1− ρ)

∫ κ1

0

ξ1(τ)e−δ1τ(µ− aS(t− τ)− bV (t− τ)S(t− τ)

1 + πV (t− τ)

)dτ

+ (1− ρ)b

∫ κ1

0

ξ1(τ)e−δ1τV (t− τ)S(t− τ)

1 + πV (t− τ)dτ − (θ + λ)L(t)

≤ µ(1− ρ)E − σ1(

(1− ρ)

∫ κ1

0

ξ1(τ)e−δ1τS(t− τ)dτ + L(t)

)≤ µ(1− ρ)− σ1T1(t).

It follows that, limt→∞

supT1(t) ≤M1. Since∫ κ1

0ξ1(τ)e−δ1τS(t− τ)dτ > 0, then lim

t→∞supL(t) ≤M1. Let

T2(t) = ρ

∫ κ2

0

ξ2(τ)e−δ2τS(t− τ)dτ + I(t) +ε

2mV (t) +

εq

2mcB(t),

then we have

T2(t) = ρ

∫ κ2

0

ξ2(τ)e−δ2τ(µ− aS(t− τ)− bV (t− τ)S(t− τ)

1 + πV (t− τ)

)dτ

+ ρb

∫ κ2

0

ξ2(τ)e−δ2τV (t− τ)S(t− τ)

1 + πV (t− τ)dτ + λL(t)− εI(t)

2m(mI(t)− rV (t)− qV (t)B(t)) +

εq

2mc(η + cB(t)V (t)− δB(t))

≤ µρK + λL1 − σ2(ρ

∫ κ2

0

ξ2(τ)e−δ2τS(t− τ)dτ + I(t) +ε

2mV (t) +

εq

2mcB(t)

)≤ µρ+ λL1 − σ2T2(t).

Then limt→∞

supT2(t) ≤ M2. It follows that limt→∞

sup I(t) ≤ M2, limt→∞

supV (t) ≤ M3 and limt→∞

supB(t) ≤ M4.

Therefore S(t), L(t), I(t), V (t), and B(t) are ultimately bounded.

Lemma 4. For system (24)-(28) there exists a threshold parameter RD0 > 0, such that

(i) if RD0 ≤ 1, then there exists only one positive steady state, virus-free steady state Q0.

(i) if RD0 > 1, then in addition to Q0, there exists an endemic steady state Q1

Proof. Similar to the proof of Lemma 2 we can show that if RD0 ≤ 1 then there exists Q0 = (S0, 0, 0, 0, B0),

where S0 = µa and B0 = η

δ , and if RD0 > 1 then there exists Q1 = (S1, L1, I1, V1, B1), with

S1 =µ (1 + πV1)

bV1 + a (1 + πV1), L1 =

E(1− ρ)bµV1(θ + λ)(bV1 + a (1 + πV1))

, I1 =bµV1γ

ε(θ + λ)(bV1 + a (1 + πV1)),

V1 =PD2 −

√(PD2)2 − 4PD1 P

D3

2PD1<δ

c, B1 =

η

δ − cV1,

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 27, NO.1, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

27 ELAIW ET AL 19-36

Page 28: Journal of Computational Analysis and Applicationseudoxuspress.com/images/JOCAAA-VOL-27-2019-ISSUE-1.pdf · Volume 27, Number 1 July 15, 2019 . ISSN:1521-1398 PRINT,1572-9206 ONLINE

where

γ = Eλ(1− ρ) +Kρ(θ + λ), PD1 = rεc(θ + λ)(b+ πa),

PD2 =εca (rδ + qη) (θ + λ)

δ(RD0 − 1) + ε (rδ + qη) (θ + λ)(b+ πa) +

caqεη(θ + λ)

δ,

PD3 = εa (rδ + qη) (θ + λ)(RD0 − 1).

The basic reproduction number for system (24)-(28) is defined as

RD0 =mµbδγ

εa(rδ + qη)(θ + λ).

3.2 Global stability

In this section we construct suitable Lyapunov functions to prove that the steady states Q0 and Q1 of system

(24)-(28) are GAS.

Theorem 3. Suppose that RD0 ≤ 1, then Q0 is GAS.

Proof. Let us define Y D0 (S,L, I, V,B) as:

Y D0 =γ

θ + λS0H

(S

S0

)+

λ

θ + λL+ I +

ε

mV +

εq

mcB0H

(B

B0

)+λ(1− ρ)b

θ + λ

∫ κ1

0

ξ1(τ)e−δ1τ∫ τ

0

V (t− ϑ)S(t− ϑ)

1 + πV (t− ϑ)dϑdτ + ρb

∫ κ2

0

ξ2(τ)e−δ2τ∫ τ

0

V (t− ϑ)S(t− ϑ)

1 + πV (t− ϑ)dϑdτ. (31)

Note that, Y D0 (S,L, I, V,B) > 0 for all S,L, I, V,B > 0 and Y D0 (S0, 0, 0, 0, B0) = 0. CalculatingdY D0dt

along

the trajectories of (24)-(28) we get

dY D0dt

θ + λ

(1− S0

S

)(µ− aS − bV S

1 + πV

)+

λ

θ + λ

((1− ρ)b

∫ κ1

0

ξ1(τ)e−δ1τV (t− τ)S(t− τ)

1 + πV (t− τ)dτ − (θ + λ)L

)+ ρb

∫ κ2

0

ξ2(τ)e−δ2τV (t− τ)S(t− τ)

1 + πV (t− τ)dτ + λL− εI +

ε

m(mI − rV − qV B)

+εq

mc

(1− B0

B

)(η + cBV − δB) +

λ(1− ρ)

θ + λ

∫ κ1

0

ξ1(τ)e−δ1τ(

bV S

1 + πV− bV (t− τ)S(t− τ)

1 + πV (t− τ)

)dτ

+ ρb

∫ κ2

0

ξ2(τ)e−δ2τ(

bV S

1 + πV− bV (t− τ)S(t− τ)

1 + πV (t− τ)

)dτ

= − aγ

θ + λ

(S − S0)2

S+

(θ + λ)

)bS0V

1 + πV− εrV

m− εqB0V

m+

εq

mc

(1− B0

B

)(δB0 − δB)

= − aγ

θ + λ

(S − S0)2

S− εqδ

mc

(B −B0)2

B+ε(rδ + qη)

mδ(RD0 − 1)V − ε(rδ + qη)RD0 πV 2

mδ(1 + πV ). (32)

Therefore,dY D0dt≤ 0 holds if RD0 ≤ 1. Further,

dY D0dt

= 0 if and only if S = S0, B = B0, V = 0. Applying

LaSalle’s invariance principle, we get that Q0 is GAS .

Theorem 4. Suppose that RD0 > 1, then Q1 is GAS.

Proof. Consider

Y D1 (S,L, I, V,B) =γ

θ + λS1H

(S

S1

)+

λ

θ + λL1H

(L

L1

)+ I1H

(I

I1

)+

ε

mV1H

(V

V1

)+

εq

mcB1H

(B

B1

)+λ(1− ρ)

θ + λ

bS1V11 + πV1

∫ κ1

0

ξ1(τ)e−δ1τ∫ τ

0

H

(V (t− ϑ)S(t− ϑ)(1 + πV1)

S1V1 (1 + πV (t− ϑ))

)dϑdτ

+ρbS1V11 + πV1

∫ κ2

0

ξ2(τ)e−δ2τ∫ τ

0

H

(V (t− ϑ)S(t− ϑ)(1 + πV1)

S1V1 (1 + πV (t− ϑ))

)dϑdτ.

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 27, NO.1, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

28 ELAIW ET AL 19-36

Page 29: Journal of Computational Analysis and Applicationseudoxuspress.com/images/JOCAAA-VOL-27-2019-ISSUE-1.pdf · Volume 27, Number 1 July 15, 2019 . ISSN:1521-1398 PRINT,1572-9206 ONLINE

We have Y D1 (S,L, I, V,B) > 0 for all S,L, I, V,B > 0 and Y D1 (S1, L1, I1, V1, B1) = 0. CalculatingdY D1dt

along

the trajectories of (24)-(28) we get

dY D1dt

θ + λ

(1− S1

S

)(µ− aS − bV S

1 + πV

)+

λ

θ + λ

(1− L1

L

)((1− ρ)b

∫ κ1

0

ξ1(τ)e−δ1τV (t− τ)S(t− τ)

1 + πV (t− τ)dτ − (θ + λ)L

)+

(1− I1

I

)(ρb

∫ κ2

0

ξ2(τ)e−δ2τV (t− τ)S(t− τ)

1 + πV (t− τ)dτ + λL− εI

)+

ε

m

(1− V1

V

)(mI − rV − qV B)

+εq

mc

(1− B1

B

)(η + cBV − δB) +

λ(1− ρ)

(θ + λ)

∫ κ1

0

ξ1(τ)e−δ1τ(

bV S

1 + πV− bV (t− τ)S(t− τ)

1 + πV (t− τ)

)dτ

+λ(1− ρ)

(θ + λ)

bS1V11 + πV1

∫ κ1

0

ξ1(τ)e−δ1τ ln

(V (t− τ)S(t− τ)(1 + πV )

V S (1 + πV (t− τ))

)dτ

+ ρ

∫ κ2

0

ξ2(τ)e−δ2τ(

bV S

1 + πV− bV (t− τ)S(t− τ)

1 + πV (t− τ)

)dτ

+ρbS1V11 + πV1

∫ κ2

0

ξ2(τ)e−δ2τ ln

(V (t− τ)S(t− τ)(1 + πV )

V S (1 + πV (t− τ))

)dτ. (33)

Applying

µ = aS1 +bS1V1

1 + πV1, η = δB1 − cB1V1,

we obtain

dY D1dt

θ + λ

(1− S1

S

)(aS1 − aS) +

θ + λ

)bS1V1

1 + πV1

(1− S1

S

)+

γ

θ + λ

bS1V

1 + πV− λ(1− ρ)b

θ + λ

∫ κ1

0

ξ1(τ)e−δ1τV (t− τ)S(t− τ)L1

(1 + πV (t− τ))Ldτ + λL1

− ρb∫ κ2

0

ξ2(τ)e−δ2τV (t− τ)S(t− τ)I1(1 + πV (t− τ)) I

dτ − λLI1I

+ εI1 −εIV1V− rεV

m+rεV1m

+εqBV1m

+εq

mc

(1− B1

B

)(δB1 − δB)− εqB1V

m− εqB1V1

m+εqB1V1m

(B1

B

)+λ(1− ρ)

θ + λ

bS1V11 + πV1

∫ κ1

0

ξ1(τ)e−δ1τ ln

(V (t− τ)S(t− τ)(1 + πV )

V S (1 + πV (t− τ))

)dτ

+ρbS1V11 + πV1

∫ κ2

0

ξ2(τ)e−δ2τ ln

(V (t− τ)S(t− τ)(1 + πV )

V S (1 + πV (t− τ))

)dτ.

The components of the steady state Q1 satisfy

E(1− ρ)bS1V1

1 + πV1= (θ + λ)L1, Kρ

bS1V11 + πV1

+ λL1 = εI1, mI1 = rV1 + qB1V1,

then

εI1 =γ

θ + λ

bS1V1(1 + πV1)

,rεV1m

θ + λ

bS1V1(1 + πV1)

− εqB1V1m

,

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 27, NO.1, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

29 ELAIW ET AL 19-36

Page 30: Journal of Computational Analysis and Applicationseudoxuspress.com/images/JOCAAA-VOL-27-2019-ISSUE-1.pdf · Volume 27, Number 1 July 15, 2019 . ISSN:1521-1398 PRINT,1572-9206 ONLINE

and

dY D1dt

= − aγ

θ + λ

(S − S1)2

S+Eλ(1− ρ)

θ + λ

bS1V11 + πV1

(1− S1

S

)+Kρ

bS1V1(1 + πV1)

(1− S1

S

)+

θ + λ

)bS1V1

1 + πV1

((1 + πV1)V

(1 + πV )V1− V

V1

)− λ(1− ρ)

θ + λ

bS1V11 + πV1

∫ κ1

0

ξ1(τ)e−δ1τV (t− τ)S(t− τ)(1 + πV1)L1

(1 + πV (t− τ))S1V1Ldτ +

Eλ(1− ρ)

θ + λ

bS1V1(1 + πV1)

− ρbS1V11 + πV1

∫ κ2

0

ξ2(τ)e−δ2τV (t− τ)S(t− τ)(1 + πV1)I1

(1 + πV (t− τ))S1V1Idτ − Eλ(1− ρ)

θ + λ

bS1V11 + πV1

I1L

L1I

+Eλ(1− ρ)

θ + λ

bS1V1(1 + πV1)

+KρbS1V1

(1 + πV1)− Eλ(1− ρ)

θ + λ

bS1V11 + πV1

IV1I1V

−Kρ bS1V11 + πV1

IV1I1V

+Eλ(1− ρ)

θ + λ

bS1V1(1 + πV1)

+KρbS1V1

(1 + πV1)− 2εqB1V1

m+εqBV1m

+εqB1V1m

(B1

B

)− εqδ

mc

(B −B1)2

B+λ(1− ρ)

(θ + λ)

bS1V11 + πV1

∫ κ1

0

ξ1(τ)e−δ1τ ln

(V (t− τ)S(t− τ)(1 + πV )

V S (1 + πV (t− τ))

)dτ

+ρbS1V11 + πV1

∫ κ2

0

ξ2(τ)e−δ2τ ln

(V (t− τ)S(t− τ)(1 + πV )

V S (1 + πV (t− τ))

)dτ.

Utilizing the following equalities

ln

(V (t− τ)S(t− τ)(1 + πV )

V S (1 + πV (t− τ))

)= ln

(S1

S

)+ ln

(IV1I1V

)+ ln

(1 + πV

1 + πV1

)+ ln

(LI1L1I

)+ ln

(V (t− τ)S(t− τ)(1 + πV1)L1

(1 + πV (t− τ))S1V1L

),

ln

(V (t− τ)S(t− τ)(1 + πV )

V S (1 + πV (t− τ))

)= ln

(S1

S

)+ ln

(IV1I1V

)+ ln

(1 + πV

1 + πV1

)+ ln

(V (t− τ)S(t− τ)(1 + πV1)I1

(1 + πV (t− τ))S1V1I

),

we have

dY D1dt

= − aγ

θ + λ

(S − S1)2

S+

γ

θ + λ

bS1V11 + πV1

(−1 +

(1 + πV1)V

(1 + πV )V1− V

V1+

1 + πV

1 + πV1

)+Eλ(1− ρ)

(θ + λ)

bS1V1(1 + πV1)

[1− S1

S+ ln

(S1

S

)]+Eλ(1− ρ)

(θ + λ)

bS1V1(1 + πV1)

[1− IV1

I1V+ ln

(IV1I1V

)]+Eλ(1− ρ)

θ + λ

bS1V11 + πV1

1

E

∫ κ1

0

ξ1(τ)e−δ1τ[1− V (t− τ)S(t− τ)(1 + πV1)L1

(1 + πV (t− τ))S1V1L

+ ln

(V (t− τ)S(t− τ)(1 + πV1)L1

(1 + πV (t− τ))S1V1L

)]dτ

+Eλ(1− ρ)

θ + λ

bS1V11 + πV1

[1− 1 + πV

1 + πV1+ ln

(1 + πV

1 + πV1

)]+Eλ(1− ρ)

θ + λ

bS1V1(1 + πV1)

[1− LI1

L1I+ ln

(LI1L1I

)]+Kρ

bS1V1(1 + πV1)

[1− S1

S+ ln

(S1

S

)]+Kρ

bS1V11 + πV1

[1− IV1

I1V+ ln

(IV1I1V

)]+Kρ

bS1V11 + πV1

1

K

∫ κ2

0

ξ2(τ)e−δ2τ[1− V (t− τ)S(t− τ)(1 + πV1)I1

(1 + πV (t− τ))S1V1I

+ ln

(V (t− τ)S(t− τ)(1 + πV1)I1

(1 + πV (t− τ))S1V1I

)]dτ

+KρbS1V1

(1 + πV1)

[1− 1 + πV

1 + πV1+ ln

(1 + πV

1 + πV1

)]− εqδ

mc

(B −B1)2

B− εqB1V1

m

[2− B

B1− B1

B

]

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 27, NO.1, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

30 ELAIW ET AL 19-36

Page 31: Journal of Computational Analysis and Applicationseudoxuspress.com/images/JOCAAA-VOL-27-2019-ISSUE-1.pdf · Volume 27, Number 1 July 15, 2019 . ISSN:1521-1398 PRINT,1572-9206 ONLINE

= −a(

γ

θ + λ

)(S − S1)2

S−(

γ

θ + λ

)πbS1(V − V1)2

(1 + πV )(1 + πV1)2

− εqη

mcB1

(B −B1)2

B− Eλ(1− ρ)

θ + λ

bS1V11 + πV1

[H

(S1

S

)+H

(IV1I1V

)+H

(1 + πV

1 + πV1

)+H

(LI1L1I

)+

1

E

∫ κ1

0

ξ1(τ)e−δ1τH

(V (t− τ)S(t− τ)(1 + πV1)L1

(1 + πV (t− τ))S1V1L

)dτ

]−Kρ bS1V1

(1 + πV1)

[H

(S1

S

)+H

(IV1I1V

)+H

(1 + πV

1 + πV1

)+

1

K

∫ κ2

0

ξ2(τ)e−δ2τH

(V (t− τ)S(t− τ)(1 + πV1)I1

(1 + πV (t− τ))S1V1I

)dτ

].

It can be seen that if RD0 > 1, then S1, L1, I1, V1, B1 > 0 anddY D1dt

≤ 0 for all S,L, I, V,B > 0. We have

dY D1dt

= 0 if and only if S = S1, L = L1, I = I1, V = V1, B = B1 and H = 0. Then using from LaSalle’s

invariance principle, we show that Q1 is GAS.

4 Numerical simulations

Next we conduct numerical simulations for system (5)-(9). The values of the parameters are listed in Table 1.

We let τi = τ1 = τ2. The following initial conditions are used:

ϕ1(ϑ) = 1.7, ϕ2(ϑ) = 0.4, ϕ3(ϑ) = 0.6, ϕ4(ϑ) = 0.6, ϕ5(ϑ) = 1.6, ϑ ∈ [−τi, 0]

In Figures 1-5, we show the evolution of the five states of the system S, L, I, V andB with respect to the

time. The effect of τi on the stability of Q0 and Q1 is also shown. We can see that, for smaller values of τi

e.g. τi = 0.0, 0.5, 1.0 and 2.0, the corresponding values of R0 satisfy R0 > 1, and the trajectory of the system

converges to the steady states Q1. This confirm the results of Theorem 2 that Q1 is GAS. On the the other

hand, when τi become larger e.g. τi = 3.0 and 5.0, then R0 < 1, and the system has one steady state Q0. and

according to Theorem 1 it is GAS. For this case, the concentrations of the uninfected monocytes and B cells

return to their values S0 = µa = 2.2885 and B0 = η

δ = 1.1207, respectively, while the CHIKV particles are

cleared from the body.

Let τ cr be the critical value of the parameter τi, such that

R0 =bmδµ(λ(1− ρ)e−δ1τ

cr

+ ρ(θ + λ)e−δ1τcr

)

εa(rδ + qη)(θ + λ)= 1.

Using the data given in Table 1 we obtain τ cr = 2.01206. The value of R0 for different values of τi are listed in

Table 2. We can observed that as τi is increased then R0 is decreased. Moreover, we have the following cases:

(i) if 0 ≤ τi < 2.01206, then Q1 exists and it is GAS,

(ii) if τi ≥ 2.01206, then Q0 is GAS. It is clearly seen that, an increasing in time delay will stabilize the

system around Q0. Biologicaly, the time delay has a similar effect as the antiviral treatment which can be used

to eliminate the CHIKV. We observe that, when the delay period is sufficiently long the CHIKV replication will

be cleared.

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 27, NO.1, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

31 ELAIW ET AL 19-36

Page 32: Journal of Computational Analysis and Applicationseudoxuspress.com/images/JOCAAA-VOL-27-2019-ISSUE-1.pdf · Volume 27, Number 1 July 15, 2019 . ISSN:1521-1398 PRINT,1572-9206 ONLINE

Table 1: The values of the parameters of model (5)-(9).

Parameter Value Parameter Value

µ 1.826 m 2.02

π 0.1 q 0.5964

c 1.2129 r 0.4418

a 0.7979 η 1.402

θ 0.5 δ1 0.5

λ 0.1 τ1 varied

ε 0.4441 τ2 varied

δ 1.251 b 0.5

ρ 0.5

Table 2: The values of steady states, R0 for model (5)-(9) with different values of τi.

τi Steady states R0

0.0 Q1 = (1.6788, 0.4054, 0.6390, 0.6152, 2.7772) 2.7347

0.5 Q1 = (1.7636, 0.2718, 0.4284, 0.4986, 2.1694) 2.1298

1.0 Q1 = (1.8827, 0.1637, 0.2580, 0.3562, 1.7120) 1.6587

1.5 Q1 = (2.0497, 0.0750, 0.1182, 0.1895, 1.3729) 1.2918

2.0 Q1 = (2.2819, 0.0016, 0.0025, 0.0046, 1.1257) 1.0060

2.01206 Q0 = (2.2885, 0, 0, 0, 1.1207) 1.0000

2.5 Q0 = (2.2885, 0, 0, 0, 1.1207) 0.7835

3.0 Q0 = (2.2885, 0, 0, 0, 1.1207) 0.6102

3.5 Q0 = (2.2885, 0, 0, 0, 1.1207) 0.4752

4.0 Q0 = (2.2885, 0, 0, 0, 1.1207) 0.3701

4.5 Q0 = (2.2885, 0, 0, 0, 1.1207) 0.2882

5.0 Q0 = (2.2885, 0, 0, 0, 1.1207) 0.2245

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 27, NO.1, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

32 ELAIW ET AL 19-36

Page 33: Journal of Computational Analysis and Applicationseudoxuspress.com/images/JOCAAA-VOL-27-2019-ISSUE-1.pdf · Volume 27, Number 1 July 15, 2019 . ISSN:1521-1398 PRINT,1572-9206 ONLINE

Time

0 10 20 30 40 50 60

Un

in

fected

m

on

ocy

tes

1.6

1.7

1.8

1.9

2

2.1

2.2

2.3

τi= 5.0 τ

i= 3.0

τi= 2.0

τi= 1.0

τi= 0.5

τi= 0.0

Figure 1: The evolution of uninfected monocytes.

Time

0 10 20 30 40 50 60

Laten

tly in

fected

m

on

ocytes

0

0.05

0.1

0.15

0.2

0.25

0.3

0.35

0.4

0.45τ

i= 0.0

τi= 0.5

τi= 1.0

τi= 2.0

τi= 3.0

τi= 5.0

Figure 2: The evolution of latently infected monocytes.

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 27, NO.1, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

33 ELAIW ET AL 19-36

Page 34: Journal of Computational Analysis and Applicationseudoxuspress.com/images/JOCAAA-VOL-27-2019-ISSUE-1.pdf · Volume 27, Number 1 July 15, 2019 . ISSN:1521-1398 PRINT,1572-9206 ONLINE

Time

0 10 20 30 40 50 60

Actively in

fected

m

on

ocytes

0

0.1

0.2

0.3

0.4

0.5

0.6

0.7τ

i= 0.0

τi= 0.5

τi= 1.0

τi= 2.0τ

i= 3.0

τi= 5.0

Figure 3: The evolution of actively infected monocytes.

Time

0 10 20 30 40 50 60

Free C

HIK

V p

articles

0

0.1

0.2

0.3

0.4

0.5

0.6

0.7

0.8

τi= 0.0

τi= 0.5

τi= 1.0

τi= 2.0

τi= 3.0

τi= 5.0

Figure 4: The evolution of free CHIKV particles.

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 27, NO.1, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

34 ELAIW ET AL 19-36

Page 35: Journal of Computational Analysis and Applicationseudoxuspress.com/images/JOCAAA-VOL-27-2019-ISSUE-1.pdf · Volume 27, Number 1 July 15, 2019 . ISSN:1521-1398 PRINT,1572-9206 ONLINE

Time

0 10 20 30 40 50 60

B cells

1

1.5

2

2.5

i= 0.0

τi= 0.5

τi= 1.0

τi= 2.0τ

i= 3.0

τi= 5.0

Figure 5: The evolution of B cells.

5 Acknowledgment

This article was funded by the Deanship of Scientific Research (DSR) at King Abdulaziz University, Jeddah.

The authors, therefore, acknowledge with thanks DSR for technical and financial support.

References

[1] M. A. Nowak and C. R. M. Bangham, Population dynamics of immune responses to persistent viruses,

Science, 272 (1996) 74-79.

[2] D.S. Callaway, and A.S. Perelson, HIV-1 infection and low steady state viral loads, Bull. Math. Biol., 64

(2002), 29-64.

[3] C. Connell McCluskey, Y. Yang, Global stability of a diffusive virus dynamics model with general incidence

function and time delay, Nonlinear Analysis: Real World Applications, 25 (2015), 64-78.

[4] A. M. Elaiw and S.A. Azoz, Global properties of a class of HIV infection models with Beddington-DeAngelis

functional response, Mathematical Methods in the Applied Sciences, 36 (2013), 383-394.

[5] A. M. Elaiw, Global properties of a class of HIV models, Nonlinear Analysis: Real World Applications, 11

(2010), 2253-2263.

[6] G. Huang, Y. Takeuchi and W. Ma, Lyapunov functionals for delay differential equations model of viral

infections, SIAM J. Appl. Math., 70(7) (2010), 2693-2708.

[7] D. Huang, X. Zhang, Y. Guo, and H. Wang, Analysis of an HIV infection model with treatments and

delayed immune response, Applied Mathematical Modelling, 40(4) (2016), 3081-3089.

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 27, NO.1, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

35 ELAIW ET AL 19-36

Page 36: Journal of Computational Analysis and Applicationseudoxuspress.com/images/JOCAAA-VOL-27-2019-ISSUE-1.pdf · Volume 27, Number 1 July 15, 2019 . ISSN:1521-1398 PRINT,1572-9206 ONLINE

[8] K. Wang, A. Fan, and A. Torres, Global properties of an improved hepatitis B virus model, Nonlinear

Analysis: Real World Applications, 11 (2010), 3131-3138.

[9] A. U. Neumann, N. P. Lam, H. Dahari, D. R. Gretch, T. E. Wiley, T. J, Layden, and A. S. Perelson,

Hepatitis C viral dynamics in vivo and the antiviral efficacy of interferon-alpha therapy, Science, 282

(1998), 103-107.

[10] A. M. Elaiw, A. A. Raezah and A. S. Alofi, Stability of delay-distributed virus dynamics model with cell-to-

cell transmission and CTL immune response, Journal of Computational Analysis and Applications, 25(8)

(2018), 1518-1531.

[11] X. Shi, X. Zhou, and X. Son, Dynamical behavior of a delay virus dynamics model with CTL immune

response, Nonlinear Analysis: Real World Applications, 11 (2010), 1795-1809.

[12] H. Shu, L. Wang and J. Watmough, Global stability of a nonlinear viral infection model with infinitely

distributed intracellular delays and CTL imune responses, SIAM Journal of Applied Mathematics, 73(3)

(2013), 1280-1302.

[13] A. M. Elaiw, A. M. Althiabi, M. A. Alghamdi and N. Bellomo, Dynamical behavior of a general HIV-1

infection model with HAART and cellular reservoirs, Journal of Computational Analysis and Applications,

24(4) (2018), 728-743.

[14] A. M. Elaiw and N. H. AlShamrani, Global stability of humoral immunity virus dynamics models with

nonlinear infection rate and removal, Nonlinear Analysis: Real World Applications, 26, (2015), 161-190.

[15] A. M. Elaiw and N. H. AlShamrani, Stability of a general delay-distributed virus dynamics model with

multi-staged infected progression and immune response, Mathematical Methods in the Applied Sciences,

40(3) (2017), 699-719.

[16] Y. Wang, X. Liu, Stability and Hopf bifurcation of a within-host chikungunya virus infection model with

two delays, Mathematics and Computers in Simulation, 138 (2017), 31-48.

[17] Y. Dumont, F. Chiroleu, Vector control for the chikungunya disease, Mathematical Biosciences and Engi-

neering, 7 (2010), 313-345.

[18] Y. Dumont, J. M. Tchuenche, Mathematical studies on the sterile insect technique for the chikungunya

disease and aedes albopictus, Journal of Mathematical Biology 65(5) (2012), 809-854.

[19] D. Moulay, M. Aziz-Alaoui, M.Cadivel, The chikungunya disease: modeling, vector and transmission global

dynamics, Mathematical Biosciences, 229 (2011) 50-63.

[20] C. A. Manore, K. S. Hickmann, S. Xu, H. J. Wearing, J. M. Hyman, Comparing dengue and chikungunya

emergence and endemic transmission in A. aegypti and A. albopictus, Journal of Theoretical Biology 356

(2014), 174-191.

[21] L. Yakob, A.C. Clements, A mathematical model of chikungunya dynamics and control: the major epidemic

on Reunion Island, PLoS One, 8 (2013), e57448.

[22] X. Liu, and P. Stechlinski, Application of control strategies to a seasonal model of chikungunya disease,

Applied Mathematical Modelling, 39 (2015), 3194-3220.

[23] J. K. Hale and S. M. Verduyn Lunel, Introduction to Functional Differential Equations, Springer Verlag,

New York, 1993.

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 27, NO.1, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

36 ELAIW ET AL 19-36

Page 37: Journal of Computational Analysis and Applicationseudoxuspress.com/images/JOCAAA-VOL-27-2019-ISSUE-1.pdf · Volume 27, Number 1 July 15, 2019 . ISSN:1521-1398 PRINT,1572-9206 ONLINE

Dynamical behavior of MERS-CoV model with discrete delays

H. Batarfi, A. Elaiw and A. Alshareef

Department of Mathematics, Faculty of Science, King Abdulaziz University,

P.O. Box 80203, Jeddah 21589, Saudi Arabia

Emails: [email protected] (H. Batarfi),

a m [email protected] (A. Elaiw),

[email protected] (A. Alshareef)

Abstract

A nonlinear mathematical model for Middle East Respiratory Syndrome Corona Virus (MERS-CoV)

with two discrete time delays is proposed and analyzed. We show that the solutions of the model are

nonnegative and bounded. We derive the basic reproduction number for the MERS-CoV model, R0. we

prove that if R0 ≤ 1 then there exists a disease-free equilibrium P0 and R0 > 1 then in addition to P0

the model has an endemic equilibrium P ∗. Utilizing Lyapunov method, the global asymptotic stability of

disease-free equilibrium of the proposed model is obtained. The dynamical behaviour of the model is also

shown by numerical simulations.

Keywords: Infectious diseases; global stability; Lyapunov functional.

1 Introduction

Mathematical of infectious diseases have received the attention of several researchers during the past decides.

Some of the models are given by a set of ODEs (see e.g. [1]-[12]). For some disease such as influenza, on

adequate contact with an infective, a susceptible individual becomes exposed, that is, infected but not infective.

This individual stays in exposed class for a certain latent period before becoming infective. This period can been

described as delays on the spread of infectious diseases, and thus, delays should be incorporated into infection

term in the system. As a result, the models are given by DDEs (see e.g. [13]-[19]). There are two types of time

delays: (i) discrete delay, where the time delay is assumed to be constant (see e.g. [13]-[15]), (ii) distributed

delays, where the time delay is assumed to be random parameter taken from probability distributed function

(see e.g. [16]-[19]). Recently, Chowell et al. [20] have studied the spread of a Middle East Respiratory Syndrome

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 27, NO.1, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

37 Batarfi ET AL 37-49

Page 38: Journal of Computational Analysis and Applicationseudoxuspress.com/images/JOCAAA-VOL-27-2019-ISSUE-1.pdf · Volume 27, Number 1 July 15, 2019 . ISSN:1521-1398 PRINT,1572-9206 ONLINE

Corona virus (MERS-CoV) by using a SEIR-type compartmental transmission model as:

dS

dt= −β S (Ii + Is + `H)

N− α, (1)

dEidt

= α− k Ei, (2)

dEsdt

=β S (Ii + Is + `H)

N− k Es, (3)

dIidt

= k ρc,iEi − γa Ii − γI,i Ii (4)

dAidt

= k (1− ρc,i)Ei, (5)

dIsdt

= k ρc,sEs − γa Is − γI,s Is, (6)

dAsdt

= k (1− ρc,s)Es, (7)

dH

dt= γa (Ii + Is)− γrH, (8)

dR

dt= γrH + γI,i Ii + γI,s Is. (9)

In model (1)-(9), the populations divided into 9 compartment: susceptible individuals S, individuals exposed

to the zoonotic reservoir Ei or to infectious humans Es, infectious and symptomatic individuals arising from

reservoir Ii, or from human-to-human transmission Is, asymptomatic and non-infectious individuals arising from

environmental/animal exposure Ai or arising from human-to-human transmission As, hospitalized individuals

H, and removed individuals after recovery or disease-induced death R [20]. Susceptible individuals are infected

uniformly at random from the zoonotic reservoir at rate α. The parameter β is the mean human-to-human

transmission rate per day, ` is relative transmissibility of hospitalized cases, 1k mean latent period (days), ρc,i

is proportion of symptomatic and infectious cases among index cases, ρs,i denote to proportion of symptomatic

and infectious cases among secondary cases, ρh,i proportion of hospitalized individuals among symptomatic and

infectious index cases, ρh,s is proportion of hospitalized individuals among symptomatic and infectious secondary

cases, 1γI,i

represent the mean infectious period among primary cases (days), 1γI,s

is the mean infectious period

among secondary cases (days), 1γa

is the mean time from symptom onset to hospital admission (days) and 1γr

denote to mean length of hospital stay (days). Chowell et al., assume that the asymptomatic individuals do not

contribute to the transmission process. Moreover, the basic properties of model (1)-(9) are not well studied.

Therefore, the aim of this paper is to study the effect of asymptomatic individuals on the transmission of MERS-

CoV. Our proposed model is a modification of model (1)-(9) by incorporate the asymptomatic individuals as

a carrier individuals. We assume that the first scenario describes only the carrier cases and the second one

describes the infected cases which demonstrate symptoms. We introduce two types of discrete time delays into

the MERS-CoV model. We study the basic properties of the model such as nonnegativity and boundedness of

the solutions, stability analysis of the equilibria. At the end we perform some numerical simulations.

2 The MERS-CoV model

In this section, we propose a MERS-CoV model with two discrete delays . Let us define

Υ(t) = S(t)(βIc(t) + γIm(t) + `H(t)).

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 27, NO.1, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

38 Batarfi ET AL 37-49

Page 39: Journal of Computational Analysis and Applicationseudoxuspress.com/images/JOCAAA-VOL-27-2019-ISSUE-1.pdf · Volume 27, Number 1 July 15, 2019 . ISSN:1521-1398 PRINT,1572-9206 ONLINE

Then we propose the following model:

S(t) = b−Υ(t)− d1S(t), (10)

Ec(t) = p e−µ1τ1Υ(t− τ1)− (kρ1 + d2)Ec(t), (11)

Em(t) = (1− p)e−µ2τ2Υ(t− τ2)− (kρ2 + d3)Em(t), (12)

Ic(t) = k ρ1Ec(t)− γaIc(t)− qIc(t)− γ1Ic(t)− d4Ic(t), (13)

Im(t) = k ρ2Em(t)− γaIm(t)− γ2Im(t) + qIc(t)− d5Im(t), (14)

H(t) = γa(Ic(t) + Im(t))− γrH(t)− d6H(t), (15)

R(t) = γ1Ic(t) + γ2Im(t) + γrH(t)− d7R(t), (16)

where S is susceptible individuals, Ec exposed individuals to carrier, Em exposed individuals to infected, Ic

carrier individuals, Im infected individuals, H hospitalized infected and R recovered individuals. The parameters

τ1 ≥ 0 and τ2 ≥ 0 represents for the time between contact the susceptible individuals with exposed to carrier Ec

and exposed to infected Em, respectively. The factors e−µ1τ1and e−µ2τ2 are the probability that an individuals

survives during the delay periods [0, τ1] and [0, τ2], respectively. The other parameters are defined in section 6.

The initial conditions of system (10)-(16) are given by

S(θ) = ϕ1(θ), Ec(θ) = ϕ2(θ), Em(θ) = ϕ3(θ),

Ic(θ) = ϕ4(θ), Im(θ) = ϕ5(θ), H(θ) = ϕ6(θ), R(θ) = ϕ7(θ),

ϕi(θ) ≥ 0, θ ∈ [−%, 0], i = 1, ..., 7,

(17)

where, % = max τ1, τ2] and (ϕ1(θ), ϕ2(θ), ..., ϕ7(θ)) ∈ C ([−%, 0],R7≥0) where C is the Banach space of con-

tinuous functions mapping the interval [−%, 0] into R7≥ 0. By the fundamental theory of functional differential

equations [21], system (10)-(16) has a unique solution satisfying the initial conditions.

3 Nonnegativity and boundedness

In this section, we will study the nonnegativity and boundedness of the model’s solutions.

Theorem 1. The solutions of system (10)-(16) are nonnegative and there exist a positive number Q such

that the compact set:

Γ = (S, Ec, Em, Ic, Im, H, R) ∈ R7≥ 0 : 0 ≤ S, Ec, Em, Ic, Im, H, R ≤ Q

is positively invariant.

Proof First, we show the nonnegativity solutions, we will write the system in the matrix form as Y = φ(Y ),

where Y = (S, Ec, Em, Ic, Im, H, R)T and φ = (φ1, φ2, φ3, φ4, φ5, φ6, φ7)T . Then,

φ1(Y )

φ2(Y )

φ3(Y )

φ4(Y )

φ5(Y )

φ6(Y )

φ7(Y )

=

b−Υ(t)− d1 S(t)

p e−µ1 τ1 Υ(t− τ1)− k ρ1Ec(t)− d2Ec(t)(1− p) e−µ2 τ2 Υ(t− τ2)− k ρ2Em(t)− d3Em(t)

k ρ1Ec(t)− γa Ic(t)− q Ic(t)− γ1 Ic(t)− d4 Ic(t)k ρ2Em(t)− γa Im(t)− γ2 Im(t) + q Ic(t)− d5 Im(t)

γa (Ic(t) + Im(t))− γrH(t)− d6H(t)

γ1 Ic(t) + γ2 Im(t) + γrH(t)− d7R(t)

.

It is easy to see that functions φi satisfies the following condition

φi(Y (t))|Yi(t)=0,Y (t)∈R7>0≥ 0 .

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 27, NO.1, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

39 Batarfi ET AL 37-49

Page 40: Journal of Computational Analysis and Applicationseudoxuspress.com/images/JOCAAA-VOL-27-2019-ISSUE-1.pdf · Volume 27, Number 1 July 15, 2019 . ISSN:1521-1398 PRINT,1572-9206 ONLINE

Due to lemma 2 in [22], any solution of (10 )-(16) with initial (17) is such that Y (t) ∈ R7≥0 for all t ≥ 0. Next,

we prove the ultimate bound of the solutions of system (10)-(16). Let us define

L(t) = p e−µ1τ1S(t− τ1) + (1− p) e−µ2τ2S(t− τ2) + Ec(t) + Em(t) + Ic(t) + Im(t) +H(t) +R(t).

Then,

L(t) = p e−µ1τ1 (b−Υ(t− τ1)− d1S(t− τ1))

+ (1− p) e−µ2τ2 (b−Υ(t− τ2)− d1 S(t− τ2))

+ p e−µ1τ1 Υ(t− τ1)− k ρ1Ec(t)− d2Ec(t)

+ (1− p)e−µ2τ2 Υ(t− τ2)− kρ2Em(t)− d3Em(t)

+ k ρ1Ec(t)− γa Ic(t)− q Ic(t)− γ1 Ic(t)− d4 Ic(t)

+ k ρ2Em(t)− γa Im(t)− γ2 Im(t) + q Ic(t)− d5 Im(t) + γa (Ic(t) + Im(t))

− γrH(t)− d6H(t) + γ1 Ic(t) + γ2 Im(t) + γrH(t)− d7R(t),

= (p e−µ1τ1 + (1− p) e−µ2τ2) b− p e−µ1τ1 d1 S(t− τ1)− (1− p) e−µ2τ2d1 S(t− τ2)

− d2Ec(t)− d3Em(t)− d4Ic(t)− d5Im(t)− d6H(t)− d7R(t)

≤ b− dL(t),

where d = mindi, i = 1, .., 7. It follows that, lim supt→∞ L(t) ≤ Q, where Q = bd. Then,

lim supt→∞ S(t) ≤ Q, lim supt→∞Ec(t) ≤ Q, lim supt→∞Em(t) ≤ Q, lim supt→∞ Ic(t) ≤Q, lim supt→∞ Im(t) ≤ Q, lim supt→∞H(t) ≤ Q, and lim supt→∞R(t) ≤ Q.

4 Equilibria and biological thresholds

To calculated the equilibria of model (10)-(16), we put the R.H.S of Eqs. (10)-(16) equals zero, we get

b− S (d1 + β Ic + γ Im + `H) = 0, (18)

p e−µ1τ1S (β Ic + γ Im + `H)− a1Ec = 0, (19)

(1− p) e−µ2τ2S( (β Ic + γ Im + `H)− a2Em, = 0, (20)

λ1Ec − a3 Ic = 0, (21)

λ2Em − a4 Im + q Ic = 0, (22)

γa (Ic + Im)− a5H = 0, (23)

γ1 Ic + γ2 Im + γrH − d7R = 0, (24)

where

a1 = k ρ1 + d2, a2 = k ρ2 + d3

a3 = γa + γ1 + q + d4, a4 = γa + γ2 + d5,

a5 = γr + d6, λ1 = kρ1, λ2 = kρ2.

Solving system (18)-(24), we find that the system has two equilibria

• The disease-free equilibrium

P0 = (S0, 0, 0, 0, 0, 0, 0) =

(b

d1, 0, 0, 0, 0, 0, 0

). (25)

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 27, NO.1, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

40 Batarfi ET AL 37-49

Page 41: Journal of Computational Analysis and Applicationseudoxuspress.com/images/JOCAAA-VOL-27-2019-ISSUE-1.pdf · Volume 27, Number 1 July 15, 2019 . ISSN:1521-1398 PRINT,1572-9206 ONLINE

• The endemic equilibrium

P ∗ = (S∗, E∗c , E∗m, I

∗c , I∗m, H

∗, R∗), (26)

where

S∗ =a0A1

, E∗c =p(A2 − a0 d1 eµ2 τ2)

a1A3, E∗m =

(1− p) (A4 − a0 d1 eµ1τ1)

a2A3,

I∗c =λ1 p (A2 − a0 d1 eµ2τ2)

a1 a3A3, I∗m =

A5 + a2 (A6 − 2 a1 a3A7)

a1 a2 a3 a4A3,

H∗ =γa (2 a1 a3 (a2A10 +A9)−A8)

a0A3, R∗ =

A11 − a1 a3 (A12 + a2A13)

d1 a0A3,

and

a0 = a1 a2 a3 a4 a5,

A1 = ((a4β + γ q)a5 + γa`(q + a4))a2λ1 p e(−µ1τ1) + (1− p)λ2 a3 a1 (a5γ + `γa) e(−µ2τ2),

A2 = ((a4β + γ q)a5 + γa`(q + a4))a2λ1 p b e(−µ1τ1+µ2τ2) + (1− p)λ2 b a3 a1 (a5γ + `γa),

A3 = ((a4β + γ q)a5 + γa`(q + a4))a2λ1 p e(µ2τ2) + (1− p)λ2 a3 a1 (a5γ + `γa) e(µ1τ1),

A4 = ((a4β + γ q)a5 + γa`(q + a4))a2λ1 p b+ (1− p)λ2 a3 a1 b (a5γ + `γa) e(µ1τ1−µ2τ2),

A5 = b λ22 a21 a

23 (p− 1)2 (a5γ + `γa) eµ1τ1−µ2τ2 ,

A6 = q b λ21 ((a4β + γ q) a5 + ` γa (q + a4)) p2a2 e−µ1τ1+µ2τ2 ,

A7 = −1

2d1λ2 a1 a3 a4 a5 (p− 1) eµ1τ1 + λ1

(1

2d1 e

µ2τ2 q a2 a4 a5

+ b

((1

2a4β + γ q

)a5 + `γa

(q +

1

2a4

))(p− 1)λ2

)p,

A8 = b λ21 ((a4β + γ q) a5 + ` γa (q + a4)) (q + a4) p2a22 e−µ1τ1+µ2τ2 ,

A9 = −1

2(bλ22 a1 a3 (p− 1)2 (a5γ + `γa) eµ1τ1−µ2τ2),

A10 = −1

2d1λ2 a1 a3 a4a5 (p− 1) eµ1τ1 + λ1

1

2d1 a2 a4 a5 (q + a4) eµ2τ2

+ b (p− 1)

(((1

2β +

1

)a4 + γ

)a5 + `γa (q + a4)

)λ2 p,

A11 = b λ21 ((a4γ1 + γ2 q) a5 + γrγa (q + a4)) p2 a22 ((a4β + γ q) a5 + `γa (q + a4)) e−µ1τ1+µ2τ2 ,

A12 = −bλ22 a1 a3 (p− 1)2 (a5γ2 + γaγr) (a5γ + ` γa) eµ1τ1−µ2τ2 ,

A13 = −d1λ2 a1 a3 a4 a5 (p− 1) (a5 γ2 + γaγr) eµ1τ1 + λ1 (((a4γ1 + γ2 q) a5

+ γrγa (q + a4)) a4 a2 a5 d1 eµ2τ2 + λ2 b (((βγ2 + γ γ1) a4 + 2γ γ2 q) a

25

+ γa (((β + γ)γr + `(γ1 + γ2)) a4 + 2 q (γ γr + γ2`)) a5 + 2`γ2aγr(q + a4)) (p− 1)) p.

4.1 Calculating the basic reproduction number

We will apply the next generation method [23] to determine the basic reproduction number R0 for system

(10)-(16). We follow the following steps

(i) We evaluated the matrix F at P0 as:

F =

0 0 p e−µ1τ1 β b

d1p e−µ1τ1 γ b

d1p e−µ1τ1 ` b

d1

0 0 (1− p) e−µ2τ2 β bd1

(1− p) e−µ2τ2 γ bd1

(1− p) e−µ2τ2 ` bd1

0 0 0 0 0

0 0 0 0 0

0 0 0 0 0

.

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 27, NO.1, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

41 Batarfi ET AL 37-49

Page 42: Journal of Computational Analysis and Applicationseudoxuspress.com/images/JOCAAA-VOL-27-2019-ISSUE-1.pdf · Volume 27, Number 1 July 15, 2019 . ISSN:1521-1398 PRINT,1572-9206 ONLINE

(ii) We get the matrix V at P0 as:

V =

a1 0 0 0 0

0 a2 0 0 0

−λ1 0 a3 0 0

0 −λ2 −q a4 0

0 0 −γa −γa a5

.

(iii) Finally, the basic reproduction number is given by

R0 = ρ(FV −1) = A1 S0

a0.

4.2 Existence of equilibria

Theorem 2. For system (10)-(16), we have

(i) If R0 ≤ 1, then there exists only one positive equilibria P0.

(ii) If R0 > 1, then there exist two positive equilibria P0 and P ∗.

Proof We have

S∗ =a0A1

=S0

R0,

E∗c =p (A2 − a0 d1 eµ2 τ2)

a1A3=

p

a1A3

(A2

eµ2τ2− a0 d1

)=

p

a1A3(bA1 − a0 d1) =

p

a1A3(R0 − 1),

E∗m =(1− p)(A4 − a0 d1 eµ1τ1)

a2A3=

(1− p)a2A3

(A4

eµ1τ1− a0 d1

),

=(1− p)a2A3

(bA1 − a0 d1) =(1− p)a2A3

(R0 − 1).

From Eq. (13)-(16), we have

I∗c =λ1a3E∗c =

λ1a3

p

a1A3(R0 − 1) =

λ1 p

a1 a3A3(R0 − 1), (27)

I∗m =1

a4(λ2E

∗m + q I∗c ) = C1(R0 − 1), (28)

H∗ =1

a5(γa(I∗c + I∗m)) = C2 (R0 − 1)), (29)

R∗ =1

d7(γ1I

∗c + γ2I

∗m + γrH

∗) = C3(R0 − 1), (30)

where,

C1 =1

a4(λ2

(1− p)a2A3

+ qλ1 p

a1 a3A3),

C2 =γaa5

(λ1 p

a1 a3A3+

1

a4(λ2

(1− p)a2A3

+ qλ1 p

a1 a3A3)),

C3 =1

d7(γ1

λ1 p

a1 a3A3+ γ2 C1 + γr C2 ).

(31)

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 27, NO.1, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

42 Batarfi ET AL 37-49

Page 43: Journal of Computational Analysis and Applicationseudoxuspress.com/images/JOCAAA-VOL-27-2019-ISSUE-1.pdf · Volume 27, Number 1 July 15, 2019 . ISSN:1521-1398 PRINT,1572-9206 ONLINE

5 Global stability analysis of P0

In this section, we use Lyapunov function and LaSalle’s invariance principle to establish the global stability of

P0.

Theorem 3. For system (10)-(16), if R0 ≤ 1, then P0 is GAS.

Proof We define the following Lyapunov functional

W0 = S0

(S

S0− 1− ln

S

S0

)+ ε1Ec + ε2Em + ε3Ic + ε4Im + ε5H

+ ε6

∫ τ1

0

S(t− s)(βIc(t− s) + γIm(t− s) + `H(t− s)) ds

+ ε7

∫ τ2

0

S(t− s)(βIc(t− s) + γIm(t− s) + `H(t− s)) ds.

The time derivative of W0 along the trajectory of system (10)-(16) is given by

dW0

dt=

(1− S0

S(t)

)(b− S(t) (β Ic(t) + γ Im(t) + `H(t))− d1 S(t))

+ ε1 (p e−µ1τ1 S(t− τ1) (β Ic(t− τ1) + γ Im(t− τ1) + `H(t− τ1))− a1Ec(t))

+ ε2 ((1− p) e−µ2τ2 S(t− τ2) (β Ic(t− τ2) + γ Im(t− τ2) + `H(t− τ2))− a2Em(t))

+ ε3 (λ1Ec(t)− a3Ic(t)) + ε4 (λ2Em(t)− a4Im(t) + q Ic(t)) + ε5 (γa(Ic(t) + Im)− a5H(t))

+ ε6 (S(t) (β Ic(t) + γ Im(t) + `H(t))) − (S(t− τ1) (β Ic(t− τ1) + γ Im(t− τ1) + `H(t− τ1)))

+ ε7 (S(t) (β Ic(t) + γ Im(t) + `H(t))) − (S(t− τ2) (β Ic(t− τ2) + γ Im(t− τ2) + `H(t− τ2))),

(32)

The parameters εi, i = 1, ..., 7 are chosen such that

ε6 + ε7 = 1, (33)

p ε1 e−µ1τ1 − ε6 = 0, (34)

(1− p) ε2 e−µ2τ2 − ε7 = 0, (35)

−ε1 a1 + λ1ε3 = 0, (36)

−ε2 a2 + λ2ε4 = 0, (37)

−a3 ε3 + q ε4 + γa ε5 + βS0 = 0, (38)

−a4 ε4 + γa ε5 + γS0 = 0. (39)

Solving Eqs. (33)-(39), we get

ε5 =G(1−R0) + `S0

a5,

where

G =a1a2a3a4a5

γa(λ1pa2 (a4 + q) e−µ1τ1 + λ2 e−µ2τ2 a1 a3 (1− p)).

We can see that ε5 > 0 if R0 ≤ 1.

From Eqs. (34)-(38) we get

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 27, NO.1, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

43 Batarfi ET AL 37-49

Page 44: Journal of Computational Analysis and Applicationseudoxuspress.com/images/JOCAAA-VOL-27-2019-ISSUE-1.pdf · Volume 27, Number 1 July 15, 2019 . ISSN:1521-1398 PRINT,1572-9206 ONLINE

ε4 =1

a4(γa ε5 + γS0) > 0.

ε3 =1

a3(qε4 + γaε5 + βS0) > 0.

ε2 =λ2ε4a2

> 0.

ε1 =λ1 ε3a1

> 0.

ε7 = (1− p) ε2 e−µ2τ2 > 0.

ε6 = p ε1 e−µ1τ1 > 0,

Thus, Eq. (32) becomesdW0

dt= −b (S − S0)2

S+ (`S0 − a5ε5)H, (40)

we have

`S0 − a5ε5 = G(R0 − 1).

. ThendW0

dt= −b (S − S0)2

S+G

a5(R0 − 1)H, (41)

From Eq (41), dW0

dt ≤ 0 if R0 ≤ 1. Then, dW0

dt equal to zero if S = S0 andH = 0. Let Ω =

(S,Ec, Em, Ic, Im, H,R) : S = S0, H = 0. From system (10)-(16), if H = 0, then H = 0 and 0 = γa(Ic + Im).

Since, Ic ≥ 0, Im ≥ 0 then Ic = 0, Im = 0, ⇒ Ic = ˙Im = 0. From system (10)-(16), we have 0 = Ic = λ1Ec ⇒Ec = 0. Similarly, we have 0 = ˙Im = λ2Em ⇒ Em = 0. Finally, R(t) = −d7R it follows thatR→ 0 as t →∞.

From LaSalle’s invariance principle, P0 is GAS in Γ.

6 Numerical simulations and discussions

In this section, we introduce the numerical results of system (10)-(16). We consider the following initial condi-

tions

IC :S(θ) = 600, Ec(θ) = 30, Em(θ) = 80, Ic(θ) = 3, Im(θ) = 12, H(θ) = 8, R(θ) = 40,

θ ∈ [−maxτ1, τ2, 0]. we use the values of the parameters in Table 1. In addition we choose µ1 = µ2 = 1.

We study the following cases:

6.1 Effect of parameters β, γ and ` on the stability of equilibria:

In this case, we fix the values τ1 = τ2 = 0.01. Figure 1 shows the evaluation of system states for two scenarios:

i) R0 ≤ 1. We choose β = 0.002, γ = 0.0001, and ` = 0.0001 then we compute R0 = 0.23. We can see from

the figure that the states of the system approach P0 = (1000, 0, 0, 0, 0, 0, 0). This means that according to

Theorem 3 P0 is GAS.

ii) R0 > 1. We choose β = 0.02, γ = 0.001, and ` = 0.001 then we compute R0 = 2.37 and P ∗ =

(421.6, 55.4, 129.2, 5.08, 20.9, 14.5, 72.4). Then P ∗ exists and this confirm the results of Theorem 2. Figure

1 shows that the states of the system converge to P ∗.

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 27, NO.1, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

44 Batarfi ET AL 37-49

Page 45: Journal of Computational Analysis and Applicationseudoxuspress.com/images/JOCAAA-VOL-27-2019-ISSUE-1.pdf · Volume 27, Number 1 July 15, 2019 . ISSN:1521-1398 PRINT,1572-9206 ONLINE

Table 1: The parameters values of MERS-CoV model

Symbol Parameter Value

b Rate of generation of new susceptible individuals 100

β Rate constant of transmission for carriers Varied

γ Rate constant of symptomatically infected individuals Varied

` Relative transmissibility of hospitalized cases Varied

γa Mean time from carrier and infected to hospital admission (days) 0.3

d1 Death rate of susceptible individuals 0.1

d2 Death rate of exposed to carrier 0.2

d3 Death rate of exposed to infected individuals 0.2

d4 Death rate of carrier individuals 0.2

d5 Death rate of infected individuals 0.3

d6 Death rate of hospitalized individuals 0.4

d7 Death rate of recovered individuals 0.1

k Mean latent period 0.19

ρ1 = ρ2 Proportion of carrier and infected cases 0.58

γ1 = γ2 Mean infectious period 0.2

γr Mean length of hospital stay 0.14

p Rate of infected individual who becomes carrier 0.3

q Rate of carrier individual who becomes infected 0.5

6.2 Effect of the time delays on the asymptotic behaviour of the equilibria:

In this case, we take the values β = 0.02, γ = 0.001, and ` = 0.001. Let us consider the case τ1 = τ2 = τ .

In Table 2, we present the values of R0 and the equilibria of system (10)-(16) with different values of τ .From

Table 2: Values of R0 and steady states of system (10)-(16) with different values of τ

τ R0 Steady states

0.067 2.24 P ∗ = (446.37, 50.07, 116.83, 4.6, 18.97, 13.09, 65.46)

0.082 2.21 P ∗ = (453.12, 48.73, 113.69, 4.47, 18.97, 12.74, 63.70)

0.67 1.23 P ∗ = (815.79, 9.12, 21.27, 0.84, 3.45, 2.38, 11.92)

0.8735928143 1.00 P0 = (1000, 0, 0, 0, 0, 0, 0)

1.2 0.72 P0 = (1000, 0, 0, 0, 0, 0, 0)

1.5 0.5 P0 = (1000, 0, 0, 0, 0, 0, 0)

2.5 0.19 P0 = (1000, 0, 0, 0, 0, 0, 0)

3.1 0.11 P0 = (1000, 0, 0, 0, 0, 0, 0)

3.5 0.07 P0 = (1000, 0, 0, 0, 0, 0, 0)

Table 2, we can observe that the value of R0 is decreased as τ is increased. Moreover, for small values of τ ,

P ∗ exists and for large values of τ the system moved from P ∗ to P0 with is GAS. Figures 2 shows the effect of

the parameter τ on the evaluation of the states of the system. We can see that as the time delay parameter is

increased, the number of susceptible individuals are increased and tend to its normal number, while the number

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 27, NO.1, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

45 Batarfi ET AL 37-49

Page 46: Journal of Computational Analysis and Applicationseudoxuspress.com/images/JOCAAA-VOL-27-2019-ISSUE-1.pdf · Volume 27, Number 1 July 15, 2019 . ISSN:1521-1398 PRINT,1572-9206 ONLINE

of individuals in other groups is reduced and tends to zero. It means that, the time delay play the role of

controlling the disease transmission.

(a) Evaluation of S(t). (b) Evaluation of Ec(t).

(c) Evaluation of Em(t). (d) Evaluation of Ic(t).

(e) Evaluation of carrier Im(t). (f) Evaluation of H(t).

(g) Evaluation of R(t).

Figure 1: The evaluations of the system states (10)-(16) with two delays τ1 = τ2 = 0.01.

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 27, NO.1, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

46 Batarfi ET AL 37-49

Page 47: Journal of Computational Analysis and Applicationseudoxuspress.com/images/JOCAAA-VOL-27-2019-ISSUE-1.pdf · Volume 27, Number 1 July 15, 2019 . ISSN:1521-1398 PRINT,1572-9206 ONLINE

.

0 10 20 30 40 50 60 70 80400

500

600

700

800

900

1000

Time

Suse

cpti

ble

grou

p

τ = 0.06τ=0.8τ=1.5

(a) Evaluation of S(t).

0 10 20 30 40 50 60 70 800

10

20

30

40

50

60

Time

Exp

osed

to

carr

ier

grou

p

τ = 0.06τ=0.8τ=1.5

(b) Evaluation of Ec(t).

0 10 20 30 40 50 60 70 800

20

40

60

80

100

120

140

Time

Exp

osed

gro

up

τ = 0.06τ=0.8τ=1.5

(c) Evaluation of Em(t).

0 10 20 30 40 50 60 70 800

1

2

3

4

5

6

Time

Car

rier

gro

up

τ = 0.06τ=0.8τ=1.5

(d) Evaluation of Ic(t).

0 10 20 30 40 50 60 70 800

5

10

15

20

25

Time

Infe

cted

gro

up

τ = 0.06τ=0.8τ=1.5

(e) Evaluation of carrier Im(t).

0 10 20 30 40 50 60 70 800

5

10

15

Time

Hos

pitl

aize

d gr

oup

τ = 0.06τ=0.8τ=1.5

(f) Evaluation of H(t).

0 10 20 30 40 50 60 70 800

10

20

30

40

50

60

70

Time

Rec

over

ed g

roup

τ = 0.06τ=0.8τ=1.5

(g) Evaluation of R(t).

Figure 2: The evaluations of system (10) -(16) with different values of τ .

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 27, NO.1, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

47 Batarfi ET AL 37-49

Page 48: Journal of Computational Analysis and Applicationseudoxuspress.com/images/JOCAAA-VOL-27-2019-ISSUE-1.pdf · Volume 27, Number 1 July 15, 2019 . ISSN:1521-1398 PRINT,1572-9206 ONLINE

7 Conclusion

We have proposed a MERS-CoV model with two times delay. We have obtained the biological threshold, the

basic reproduction number R0. The existence of the model’s equilibria has been proven. The global asymptotic

stability of the disease free equilibria P0 has been investigated by constructing Lyapunov functional and using

LaSalle’s invariance principle. To support our theoretical results, we have presented the numerical simulations.

References

[1] Rachsh, A., and Torres, D., (2015), Mathematical modelling, simulation, and optimal control of 2014 Ebola

outbreak in West Africa, Discrete Dynamics in Nature and Society, Vol. 2015, 1-9.

[2] Elaiw, A., (2012), Global properties of a class of virus infection models with multi target cells, Nonlinear

Dynamics , Vol.69, 423-435.

[3] Wester, T., (2015), Analysis and simulation of a mathematical model of Ebola virus dynamics in vivo,

Society for Industrial and Applied Mathematics, Vol. 8, 236-256.

[4] Ullah, R., Zaman, G., and Islam, S., (2013), Stability analysis of a general SIR epidemic model, VFAST

Transactions on Mathematics, Vol. 1, 16-20.

[5] Ma, X., Zhou, Y., and Cao, H., (2013), Global stability of the endemic equilibrium of a discrete SIR epidemic

model, Advances in Difference Equations, Vol. 2013, 1-19.

[6] Korobeinikov, A., (2004), Lyapunov functions and global properties for SEIR and SEIS epidemic models,

Mathematical Medicine and Biology, Vol. 21, 75-83.

[7] Grigorieva, E., Khailov, E., and Korobeinikov A., (2016), Optimal control for a SIR epidemic model with

nonlinear incident rate, Mathematical Modelling of Natural Phenomena, Vol. 11, 89-104.

[8] Ledzewicz, U., and Schattler, H., (2011), On optimal Singular control for a general SIR-model with vacci-

nation and treatment, Discrete and Continuous Dynamical System, Vol. 2011, 981-990.

[9] Bakare1, E., Nwagwo, A., and Danso-Addo, E., (2014), Optimal control analysis of an SIR epidemic model

with constant recruitment, International Journal of Applied Mathematical Research, Vol. 3, 273-285.

[10] Kara, T., and Batabyalb, A., (2011), Stability analysis and optimal control of an SIR epidemic model with

vaccination, BioSystems, Vol. 104, 127-135.

[11] Grigorieva, E., Khailov, E., and Korobeinikov, A., (2015), Optimal control for an epidemic in populations

of varying size, American Institute of Mathematical Sciences, Vol. 2015, 549-561.

[12] Pinho, M., and Nogueira, F., (2017), On application of optimal control to SEIR normalized models: pros

and cons, Mathematical Biosciences and Engineering, Vol. 14, 111-126.

[13] Rui Xu, (2013), Global dynamics of a delayed epidemic model with latency and relapse, Nonlinear Analysis:

Modelling and Control, Vol. 18, 250-263.

[14] Gau, S., Chen, L., and Teng, Z., (2008), Pulse vaccination of an SEIR epidemic model with time delay,

Nonlinear Analysis: Real world Applications, Vol. 9, 599-607.

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 27, NO.1, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

48 Batarfi ET AL 37-49

Page 49: Journal of Computational Analysis and Applicationseudoxuspress.com/images/JOCAAA-VOL-27-2019-ISSUE-1.pdf · Volume 27, Number 1 July 15, 2019 . ISSN:1521-1398 PRINT,1572-9206 ONLINE

[15] Gao, S., Teng, Z., and Xie, D., (2008), The effects of pulse vaccination on SEIR model with two time delays,

Applied Mathematics and Computation, Vol. 201, 282-292.

[16] Connell McCluskey, C., (2010), Complete global stability for an SIR epidemic model with delay distributed

or discrete, Nonlinear Analysis: Real World Applications, Vol. 11, 55-59.

[17] Enatsu, Y., and Nakata, Y., (2010), Global stability for a class of discrete SIR epidemic models, Mathe-

matical Bioscience and Engineering, Vol. 7, 347-361.

[18] Beretta, E., and Takeuchi, Y., (1997), Convergence results in SIR epidemic models with varying population

size, Nonlinear Analysis: Theory, Methods and Application, Vol. 28, 1909-1921.

[19] Enatsu, Y., Yukihiko and Muroya, Y., (2012), Global stability of SIRS epidemic models with a class of

nonlinear incidence rate and distributed delayes, Acta Mathematical Scientia, Vol. 32, 851-865.

[20] Chowell, G., Blumberg, S., Simonsen, L., Miller, M., and Viboud, C., (2014), Synthesizing data and models

for the spread of MERS-CoV, 2013:Key role of index cases and hospital transmission, Epidemics, Vol. 9,

40-51.

[21] Hale, J., and Lunel, S., (1993), Introduction to functional differential equations, Science and Business

Media.

[22] X. Yang, L.S. Chen and J.F. Chen, (1996), Permanence and positive periodic solution for the single-species

nonautonomous delay diffusive models, Computers and Mathematics with Applications, Vol. 32, 109-116.

[23] Heffernan, J., smith, R., and Wahl, L., (2005), Perspectives on the basic reproduction ratio, Journal of the

Royal Society Interface, Vol. 2, 281-293.

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 27, NO.1, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

49 Batarfi ET AL 37-49

Page 50: Journal of Computational Analysis and Applicationseudoxuspress.com/images/JOCAAA-VOL-27-2019-ISSUE-1.pdf · Volume 27, Number 1 July 15, 2019 . ISSN:1521-1398 PRINT,1572-9206 ONLINE

CONVEXITY AND HYPERCONVEXITY IN FUZZY METRIC

SPACE

EBRU YIGIT AND HAKAN EFE

Abstract. In this paper, firstly we give the definion of fuzzy convex met-

ric, in a different way. Then we introduce the concept of hyperconvexity in

fuzzy metric space and prove that every fuzzy hyperconvex metric space iscomplete. Also it is proved that for m−seperable fuzzy metric spaces, fuzzy

m−hyperconvexity is equivalent to fuzzy hyperconvexity.

1. INTRODUCTION

The concept of convex metric space has been studied by many authors, in somedifferent ways [7, 9, 11, 14, 15]. After that, some authors examined this conceptfor fuzzy metric space by using the definition of fuzzy metric which is introducedby George and Veeremani [1], for example; Thanithamil [4] introduced the convexstructure in fuzzy metric spaces and Vosoughi and Hosseni [8] gave the definionof metrically convex fuzzy metric space (X,M, ∗). The other common concept formetric space is hyperconvexity which was introduced by Aronszajn and Panitch-pakdi [10] in 1956. Since then many interesting works have been appeared forhyperconvex spaces [5, 11, 13].

In this paper, we give the notion of fuzzy convex metric space by using the closedballs, in a different way. Also, we introduce a new notion for fuzzy metric spacewhich is called fuzzy hyperconvex metric space. One of the main result of thispaper is that every fuzzy hyperconvex metric space is complete. Also, the fuzzym−hyperconvexity is introduced for any cardinal m ≥ 3, which is a weaker propertythan fuzzy hyperconvexity. The definition m−seperability for fuzzy metric space isused, so the other result for this paper is that for any m−seperable fuzzy metricspaces, fuzzy m−hyperconvexity is equivalent to fuzzy hyperconvexity.

2. PRELIMINARIES

Definition 1. [6] A binary operation ∗ : [0, 1]× [0, 1]→ [0, 1] is continuous t-normif ∗ satisfies the following conditions:

(i) ∗ is commutative and associative;(ii) ∗ is continuous;(iii) a ∗ 1 = a for all a ∈ [0, 1] ;(iv) a ∗ b ≤ c ∗ d whenever a ≤ c and b ≤ d, for a, b, c, d ∈ [0, 1] .

Remark 1. [1] (i) For any r1 ∈ (0, 1) with r1 > r2, there exist r3 ∈ (0, 1) such thatr1 ∗ r3 ≥ r2.

Date: July 8, 2017.

1991 Mathematics Subject Classification. 46S40, 54A40 .Key words and phrases. convexity, hyperconvexity, fuzzy metric space.

1

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 27, NO.1, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

50 YIGIT ET AL 50-58

Page 51: Journal of Computational Analysis and Applicationseudoxuspress.com/images/JOCAAA-VOL-27-2019-ISSUE-1.pdf · Volume 27, Number 1 July 15, 2019 . ISSN:1521-1398 PRINT,1572-9206 ONLINE

2 EBRU YIGIT AND HAKAN EFE

(ii) For any r4 ∈ (0, 1) , there exist r5 ∈ (0, 1) such that r5 ∗ r5 ≥ r4.

Definition 2. [1] The 3-tuple (X,M, ∗) is said to be a fuzzy metric space if X isan arbitrary set, ∗ is a continuous t-norm and M is a fuzzy set on X2 × (0,∞)satisfying the following conditions, for all x, y, z ∈ X and s, t > 0:

(FM-1) M(x, y, t) > 0,(FM-2) M(x, y, t) = 1 if and only if x = y,(FM-3) M(x, y, t) = M(y, x, t),(FM-4) M(x, z, t+ s) ≥M(x, y, t) ∗M(y, z, s),(FM-5) M(x, y, .) : (0,∞)→ [0, 1] is continuous.

Example 1. [1] (Induced fuzzy metric). Let (X, d) be a metric space. Definea ∗ b = min a, b for all ∀a, b ∈ [0, 1] and let M be fuzzy set on X ×X × (0,∞) asfollows:

M(x, y, t) =ktn

ktn +md(x, y), k,m, n ∈ R+.

Then (X,M, ∗) is a fuzzy metric space. In this example by taking k = m = n = 1,we get

M(x, y, t) =t

t+ d(x, y).

We call this fuzzy metric induced by a metric d the standard fuzzy metric.

Definition 3. [1] Let (X,M, ∗) be a fuzzy metric space and let r ∈ (0, 1), t > 0 andx ∈ X. The open ball and the closed ball with center x and radius r with respect tot are defined as follows, respectively

BM (x, r, t) = y ∈ X : M(x, y, t) > 1− r

BM (x, r, t) = y ∈ X : M(x, y, t) ≥ 1− r .

Remark 2. [1] Every open ball is an open set and every closed ball is a closed setin a fuzzy metric space (X,M, ∗).

Theorem 1. [1] Let (X,M, ∗) be a fuzzy metric space. Define

τM = A ⊂ X : ∀ x ∈ A, ∃r ∈ (0, 1) and t > 0 3 BM (x, r, t) ⊂ A .

Then τM is a topology on X.

Definition 4. [1] Let (X,M, ∗) be a fuzzy metric space. Then(a) A sequence xn in X is said to be Cauchy sequence if for each ε > 0 and

each t > 0, there exists n0 ∈ N such that M(xn, xm, t) > 1− ε, for all n,m ≥ n0.(b) (X,M, ∗) is called complete if every Cauchy sequence is convergent with re-

spect to τM .

Definition 5. [3] Let (X,M, ∗) be a fuzzy metric space. A collection of setsFnn∈N is said to have fuzzy diameter zero if and only if for each pair r, t > 0,(r ∈ (0, 1) and t > 0), there exists n ∈ N such that M(x, y, t) > 1 − r for allx, y ∈ Fn.

Remark 3. [3] A non-empty subset F of a fuzzy metric space X has fuzzy diameterzero if and only if F is a singleton set.

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 27, NO.1, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

51 YIGIT ET AL 50-58

Page 52: Journal of Computational Analysis and Applicationseudoxuspress.com/images/JOCAAA-VOL-27-2019-ISSUE-1.pdf · Volume 27, Number 1 July 15, 2019 . ISSN:1521-1398 PRINT,1572-9206 ONLINE

CONVEXITY AND HYPERCONVEXITY IN FUZZY METRIC SPACE 3

Theorem 2. [3] A necessary and sufficient condition that a fuzzy metric space(X,M, ∗) be complete is that every nested sequence of non-empty closed sets Fn∞n=1

with fuzzy diameter zero have non-empty intersection. And the element x ∈⋂n∈N

Fn

is unique.

Definition 6. [12] Let (X,M, ∗) be a fuzzy metric space. Let the mappings δA(t) :(0,∞) −→ [0, 1] be defined as

δA(t) = infx,y∈A

supε<t

M(x, y, ε).

The constant δA = supt>0

δA(t) will be called fuzzy diameter of set A. If δA = 1 the

set A will be called F-strongly bounded.

Definition 7. [11] Let (X, d) be a metric space. We say that X is metrically convexif for any points x1, x2 ∈ X and positive numbers α and β such that d(x1, x2) ≤α + β, there exists z ∈ X such that d(x1, z) ≤ α and d(x2, z) ≤ β, or equivalentlyz ∈ B(x1, α) ∩ B(x2, β).

Definition 8. [11] Let (X, d) be a metric space and Γ be an index set. The metricspace X is said to has the ball intersection property (BIP in short) if

⋂α∈Γ

Bα 6= ∅

for any collection of closed balls (Bα)α∈Γ such that⋂

α∈Γf

Bα 6= ∅, for any finite

subset Γf ⊂ Γ.

Definition 9. [11] Let (X, d) be a metric space and Γ be an index set. The metricspace X is said to be hyperconvex if

⋂α∈Γ

B(xα, rα) 6= ∅ for any collection of points

xαα∈Γ in X and positive numbers rαα∈Γ such that d(xα, xβ) ≤ rα + rβ for anyα and β in Γ.

Example 2. [11] The real line R is hyperconvex with the usual metric d.

Example 3. [11] The infinite dimensional Banach space l∞ is hyperconvex.

Definition 10. [10] A metric space (X, d) is called m−seperable if it contains adense subset of cardinal < m.

3. MAIN RESULTS

Before we give the definition of fuzzy metrically convexity, we give the followingLemma for the definition to be clear.

Lemma 1. Let (X,M, ∗) be a fuzzy metric space, x1, x2 ∈ X, r1, r2 ∈ (0, 1) andt1, t2 ∈ (0,∞). If BM (x1, r1, t1) ∩ BM (x2, r2, t2) 6= ∅ then M(x1, x2, t1 + t2) ≥(1− r1) ∗ (1− r2) for any x1, x2 ∈ X and each pair of r1, t1 > 0 and r2, t2 > 0.

Proof. Let BM (x1, r1, t1) ∩ BM (x2, r2, t2) 6= ∅. Then there exists z ∈ X such that

z ∈ BM (x1, r1, t1) ∩ BM (x2, r2, t2)

=⇒ z ∈ BM (x1, r1, t1) and z ∈ BM (x2, r2, t2)

=⇒ M(x1, z, t1) ≥ (1− r1) and M(x2, z, t2) ≥ (1− r2).

By the Definition 1-(vi) we have M(x1, z, t1)∗M(x2, z, t2) ≥ (1−r1)∗(1−r2) and bythe condition (FM-4) of fuzzy metric we get M(x1, x2, t1+t2) ≥ (1−r1)∗(1−r2).

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 27, NO.1, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

52 YIGIT ET AL 50-58

Page 53: Journal of Computational Analysis and Applicationseudoxuspress.com/images/JOCAAA-VOL-27-2019-ISSUE-1.pdf · Volume 27, Number 1 July 15, 2019 . ISSN:1521-1398 PRINT,1572-9206 ONLINE

4 EBRU YIGIT AND HAKAN EFE

The converse of Lemma 1 may not be true. Example 4 explain this situation.

Example 4. Let X = N. Define a ∗ b = a.b for all ∀a, b ∈ [0, 1] and let M be fuzzyset on N× N× (0,∞) as follows:

M(x, y, t) =min x, y+ t

max x, y+ t.

In this case we know that M is a fuzzy metric on N. If we choose t1 = 1, t2 = 1,r1 = 0.3, r2 = 0.5, x1 = 3 and x2 = 10 then the inequality M(x1, x2, t1 + t2) ≥(1−r1)∗(1−r2) is satisfied but BM (3, 0.3, 1)∩BM (10, 0.5, 1) = ∅ and so we can notfind any point z ∈ X such that M(x1, z, t1) ≥ (1− r1) and M(x2, z, t2) ≥ (1− r2).

Consequently, when the converse of Lemma 1 also be true, we give Definition 11.

Definition 11. Let (X,M, ∗) be a fuzzy metric space. We say that X is fuzzymetrically convex if for any points x1, x2 ∈ X and for each pair r1, t1 > 0 andr2, t2 > 0 (r1, r2 ∈ (0, 1) and t1, t2 ∈ (0,∞)) such that M(x1, x2, t1 + t2) ≥ (1 −r1)∗(1−r2), there exists z ∈ X such that M(x1, z, t1) ≥ (1−r1) and M(x2, z, t2) ≥(1− r2) or equivalently z ∈ BM (x1, r1, t1) ∩ BM (x2, r2, t2).

Example 5. Let the metric space (X, d) be metrically convex. Define continuoust-norm as a ∗ b = a.b for all ∀a, b ∈ [0, 1] and let M be fuzzy set on X ×X × (0,∞)as follows:

M(x, y, t) = e−d(x,y)

t .

Then the 3-tuple (X,M, ∗) is a fuzzy metric space and under these conditions(X,M, ∗) is fuzzy metrically convex. Indeed, let (X, d) be metrically convex then forany points x1, x2 ∈ X and positive numbers α and β such that d(x1, x2) ≤ α + β,there exists z ∈ X such that d(x1, z) ≤ α and d(x2, z) ≤ β, or equivalentlyz ∈ B(x1, α) ∩ B(x2, β). Take α = −t1 ln(1 − r1) and β = −t2 ln(1 − r2). Bythe choices of α, β, the inequality M(x1, x2, t1 + t2) ≥ (1− r1) ∗ (1− r2) is satisfiedand also r1, r2 ∈ (0, 1). By using the metrically convexity of (X, d);

d(x1, z) ≤ −t1 ln(1− r1) and d(x2, z) ≤ −t2 ln(1− r2)

=⇒ −d(x1, z) ≥ t1 ln(1− r1) and − d(x2, z) ≥ t2 ln(1− r2)

=⇒ e−d(x1,z) ≥ et1 ln(1−r1) and e−d(x2,z) ≥ et2 ln(1−r2)

=⇒ e−d(x1,z)

t1 ≥ (1− r1) and e−d(x2,z)

t2 ≥ (1− r2)

=⇒ M(x1, z, t1) ≥ (1− r1) and M(x2, z, t2) ≥ (1− r2).

This implies that z ∈ BM (x1, r1, t1) ∩ BM (x2, r2, t2), then the fuzzy metric space(X,M, ∗) is fuzzy metrically convex.

Definition 12. Let (X,M, ∗) be a metric space, Γ be an index set, ri ∈ (0, 1)and ti ∈ (0,∞) for all i ∈ Γ. The fuzzy metric space X is said to has the ballintersection property (BIP in short) if

⋂i∈Γ

BM (xi, ri, ti) 6= ∅ for any collection of

closed balls (BM (xi, ri, ti))i∈Γ such that⋂i∈Γf

BM (xi, ri, ti) 6= ∅ for any finite subset

Γf ⊂ Γ.

Definition 13. Let (X,M, ∗) be a metric space, Γ be an index set, ri ∈ (0, 1) andti ∈ (0,∞) for all i ∈ Γ. The fuzzy metric space X is said to be fuzzy hyperconvex

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 27, NO.1, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

53 YIGIT ET AL 50-58

Page 54: Journal of Computational Analysis and Applicationseudoxuspress.com/images/JOCAAA-VOL-27-2019-ISSUE-1.pdf · Volume 27, Number 1 July 15, 2019 . ISSN:1521-1398 PRINT,1572-9206 ONLINE

CONVEXITY AND HYPERCONVEXITY IN FUZZY METRIC SPACE 5

if for any indexed class of closed balls BM (xi, ri, ti) in X, satifying the conditionthat

M(xi, xj , ti + tj) ≥ (1− ri) ∗ (1− rj)for all i, j ∈ Γ, the intersection

⋂i∈Γ

BM (xi, ri, ti) 6= ∅.

Theorem 3. Let (X = R, d) be the usual metric space. Consider the standard fuzzymetric M where M(x, y, t) = t

t+d(x,y) with a ∗ b = min a, b for all a, b ∈ (0, 1).

Then (X,M, ∗) is fuzzy metrically hyperconvex (or fuzzy hyperconvex).

Proof. Since (R, d) is hyperconvex, for any collection of closed balls B(xα, rα)satisfying the condition that d(xα, xβ) ≤ rα + rβ for any α and β in Γ, the in-tersection

⋂α∈Γ

B(xα, rα) 6= ∅. Now choose Rα = rαtα+rα

ve Rβ =rβ

tβ+rβ. It

is clear that Rα, Rβ ∈ (0, 1) and by these choices and the minimum t-norm,M(xα, xβ , tα + tβ) ≥ (1 − Rα) ∗ (1 − Rβ) = min (1−Rα), (1−Rβ) = (1 − Rα)(without lost generality we can take Rα ≥ Rβ) is satisfied. By the hyperconvexityof (R, d);⋂

α∈Γ

B(xα, rα) 6= ∅, for all α ∈ Γ , then there exsists z ∈ X such that

z ∈⋂α∈Γ

B(xα, rα)

=⇒ d(xα, z) ≤ rα=⇒ tα + d(xα, z) ≤ tα + rα

=⇒ tαtα + d(xα, z)

≥ tαtα + rα

=⇒ M(xα, z, tα) ≥ 1−Rα=⇒ z ∈ BM (xα, rα, tα), for all α ∈ Γ

=⇒ z ∈⋂i∈Γ

BM (xα, rα, tα).

So (R,M, ∗) is fuzzy hyperconvex.

Example 6. In particular if we take t = 1 in the Theorem 3 M becomes M(x, y) =1

1+d(x,y) . M is stationary fuzzy metric on R with the continuous minimum t-norm

and (R,M, ∗) is fuzzy hyperconvex.

Proposition 1. If the space (X,M, ∗) is fuzzy hyperconvex then it has the ballintersection property.

Proof. Let (X,M, ∗) be fuzzy hyperconvex and be⋂i∈Γf

BM (xi, ri, ti) 6= ∅ for any

finite subset Γf ⊂ Γ. Then it follows that⋂i∈Γf

BM (xi, ri, ti) 6= ∅, then there exists z ∈ X such that

z ∈⋂i∈Γf

BM (xi, ri, ti) for i = 1, 2, ..., n

=⇒ z ∈ BM (x1, r1, t1) ∩ BM (x2, r2, t2) ∩ ... ∩ BM (xn, rn, tn)

=⇒ M(x1, z, t1) ≥ (1− r1),M(x2, z, t2) ≥ (1− r2), ...,M(xn, z, tn) ≥ (1− rn)

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 27, NO.1, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

54 YIGIT ET AL 50-58

Page 55: Journal of Computational Analysis and Applicationseudoxuspress.com/images/JOCAAA-VOL-27-2019-ISSUE-1.pdf · Volume 27, Number 1 July 15, 2019 . ISSN:1521-1398 PRINT,1572-9206 ONLINE

6 EBRU YIGIT AND HAKAN EFE

so M(xi, z, ti) ≥ (1− ri) and M(xj , z, tj) ≥ (1− rj) for arbitrary i, j ∈ Γf . By thecondition (FM-4)

(3.1) M(xi, xj , ti + tj) ≥M(xi, z, ti) ∗M(xj , z, tj) ≥ (1− ri) ∗ (1− rj).

Since (X,M, ∗) is fuzzy hyperconvex and the inequality (3.1) is satisfied for alli, j ∈ Γ, then

⋂i∈Γ

BM (xi, ri, ti) 6= ∅ for all i ∈ Γ and so (X,M, ∗) has the ball

intersection property.

Theorem 4. Any fuzzy metric space (X,M, ∗) which has the ball intersection prop-erty is complete. In particular any fuzzy hyperconvex metric space is complete.

Proof. Let (X,M, ∗) be a fuzzy metric space which has ball intersection propertyand let xn be a Cauchy sequence in X. For any n ≥ 1, take the set

rn = suptn>0

infm≥n

sups<tn

M(xn, xm, s)

.

Consider the collection of closed balls(BM (xn, rn, tn)

)n≥1

. Since xn is Cauchy

and by the choice of rn, for m ≥ n we have M(xn, xm, tn) ≥ 1 − rn i.e rn hasfuzzy diameter zero. Now we examine this situation for any finite index n1 < n2 <... < nk. For n1 < n2 < ... < nk, we have

M(xn1, xnk , tn1

) ≥ 1−rn1, M(xn2

, xnk , tn2) ≥ 1−rn2

, ..., M(xnk , xnk , tnk) ≥ 1−rnkwhich means that

xn1, xn2

, ..., xnk ∈ BM (xn1, rn1

, tn1)

xn2, ..., xnk ∈ BM (xn2

, rn2, tn2

)

...

xnk ∈ BM (xnk , rnk , tnk)

therefore

xnk ∈ BM (xn1, rn1

, tn1) ∩ BM (xn2

, rn2, tn2

) ∩ ... ∩ BM (xnk , rnk , tnk).

SinceX has the ball intersection property, then we may conclude that⋂n≥1

BM (xn, rn, tn) 6=

∅ for any n ∈ N. Since xn is a Cauchy sequence and rn has fuzzy diameterzero, the intersection

⋂n≥1

BM (xn, rn, tn) is reduced to one point z which is the limit

of the sequence xn. So indeed, the point z ∈⋂n≥1

BM (xn, rn, tn) then for each

pair of rn, tn > 0 there exists n1 ∈ N such that M(xn, z, tn) > 1−rn for all n ≥ n1.Therefore, M(xn, z, tn) converges to 1 when n −→∞, for each tn > 0 and (X,M, ∗)is complete.

Proposition 2. Fuzzy hyperconvexity is equivalent to the ball intersection propertyand fuzzy metrically convexity.

Proof. If (X,M, ∗) is fuzzy hyperconvex, by Proposition 1 X satisfies the ball in-tersection property and it is easy to see that X is fuzzy convex metric space.Conversely, if two closed balls BM (xi, ri, ti) and BM (xj , rj , tj) satisfy the relationM(xi, xj , ti+tj) ≥ (1−ri)∗(1−rj), they must intersect since X has ball intersectionproperty.

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 27, NO.1, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

55 YIGIT ET AL 50-58

Page 56: Journal of Computational Analysis and Applicationseudoxuspress.com/images/JOCAAA-VOL-27-2019-ISSUE-1.pdf · Volume 27, Number 1 July 15, 2019 . ISSN:1521-1398 PRINT,1572-9206 ONLINE

CONVEXITY AND HYPERCONVEXITY IN FUZZY METRIC SPACE 7

Now we give the definition of fuzzy m−hyperconvexity. Note that fuzzy m-hyperconvexity is a weaker property than fuzzy hyperconvexity. The definitions offuzzy hyperconvexity and fuzzy m−hyperconvexity can be considered structurallysimilar.

Definition 14. Let (X,M, ∗) be a metric space, Γ be an index set such thatcard(Γ)< m, ri ∈ (0, 1) and ti ∈ (0,∞) for all i ∈ Γ. The fuzzy metric space X issaid to be fuzzy m−hyperconvex if for any indexed class of closed balls BM (xi, ri, ti)in X, satifying the condition that

M(xi, xj , ti + tj) ≥ (1− ri) ∗ (1− rj)for all i, j ∈ Γ, the intersection

⋂i∈Γ

BM (xi, ri, ti) 6= ∅.

Proposition 3. (i) It is clear that fuzzy hyperconvexity is stronger than fuzzym−hyperconvexity, which is stronger than fuzzy n−hyperconvexity if n < m.

(ii) It is easy to see that every fuzzy metric space (X,M, ∗) is fuzzy 1−hyperconvex.

Theorem 5. For m = 3, fuzzy 3−hyperconvexity is equivalent to fuzzy metricallyconvexity.

Proof. Let (X,M, ∗) be fuzzy 3−hyperconvex. Since card(Γ)< m = 3, the index setΓ is Γ = 1, 2. It follows that for any points x1, x2 ∈ X and for each pair r1, t1 > 0and r2, t2 > 0 (r1, r2 ∈ (0, 1) and t1, t2 ∈ (0,∞)) such that M(x1, x2, t1 + t2) ≥(1 − r1) ∗ (1 − r2), there exists z ∈ X such that M(x1, z, t1) ≥ (1 − r1) andM(x2, z, t2) ≥ (1− r2). This means that (X,M, ∗) is fuzzy metrically convex.

Conversely, Let (X,M, ∗) be fuzzy metrically convex. Then for Γ = 1, 2, wehave BM (x1, r1, t1) ∩ BM (x2, r2, t2) 6= ∅. So for any indexed class of closed ballsBM (xi, ri, ti) in X, satifying the condition that

M(xi, xj , ti + tj) ≥ (1− ri) ∗ (1− rj)

for all i, j ∈ Γ = 1, 2, the intersection2⋂i=1

BM (xi, ri, ti) 6= ∅. So (X,M, ∗) is fuzzy

3−hyperconvex.

Definition 15. A fuzzy metric space (X,M, ∗) is called m−seperable if it containsa dense subset of cardinal (K) < m where K ⊂ Γ, Γ is index set. (This definitionis the same with Definition 10 except for the spaces.)

Note that when n < m, m−seperability is weaker than n−seperability for anyfuzzy metric space (X,M, ∗). m−seperability for a finite cardinal m means thatthe fuzzy metric space (X,M, ∗) is a finite set, and at the same time it contains atmost m− 1 points.

Theorem 6. If the fuzzy metric space (X,M, ∗) is fuzzy m−hyperconvex and atthe same time m−seperable, then it is fuzzy hyperconvex.

Proof. Consider an arbitrary indexed family of closed balls BM (xi, ri, ti) satisfyingthe condition that M(xi, xj , ti + tj) ≥ (1− ri) ∗ (1− rj), for all i, j ∈ Γ. Let X befuzzy m-hyperconvex and let pk, k ∈ K with card(K)< m, be an indexed set of

points, which is dense in X. Take the pair of r′

k, t′

k > 0 as follows, respectively

r′

k, t′

k = ′′the infimum of all r ∈ (0, 1) and the infimum of all t > 0(3.2)

such that ∃ i ∈ Γ with BM (xi, ri, ti) ⊂ BM (pk, r, t)′′.

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 27, NO.1, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

56 YIGIT ET AL 50-58

Page 57: Journal of Computational Analysis and Applicationseudoxuspress.com/images/JOCAAA-VOL-27-2019-ISSUE-1.pdf · Volume 27, Number 1 July 15, 2019 . ISSN:1521-1398 PRINT,1572-9206 ONLINE

8 EBRU YIGIT AND HAKAN EFE

Now we claim that the class of closed balls BM (pk, r′

k, t′

k), k ∈ K, satisfies therequirement of fuzzy m−hyperconvexity. So indeed, take any indices k, l ∈ K andarbitrary ε ∈ (0, 1) and arbitrary ε

′> 0. By (3.2) there exist i, j ∈ Γ such that

(3.3) BM (xi, ri, ti) ⊂ BM (pk, r′

k + ε, t′

k + ε′)

and

(3.4) BM (xj , rj , tj) ⊂ BM (pl, r′

l + ε, t′

l + ε′).

SinceX is fuzzym−hyperconvex, there exist a point q in BM (xi, ri, ti)∩BM (xj , rj , tj),

at the same time by (3.3), (3.4) q is in BM (pk, r′

k+ε, t′

k+ε′)∩ BM (pl, r

l +ε, t′

l+ε′).Then,

q ∈ BM (pk, r′

k + ε, t′

k + ε′) ∩ BM (pl, r

l + ε, t′

l + ε′)

=⇒ M(pk, q, t′

k + ε′) ≥ 1− (r

k + ε) and M(pl, q, t′

l + ε′) ≥ 1− (r

l + ε)

=⇒ M(pk, pl, t′

k + t′

l + 2ε′) ≥

[1− (r

k + ε)]∗[1− (r

l + ε)].(3.5)

Since ε ∈ (0, 1) and ε′ > 0 are arbitrary, by (3.5) we find the requirement for

m−hyperconvexity for the collection of closed balls BM (pk, r′

k, t′

k), k ∈ K. So,

there is a point x in⋂k∈K

BM (pk, r′

k, t′

k).

Now we need to show that x ∈ BM (xi, ri, ti), for all i ∈ Γ, i.e. M(x, xi, ti) ≥ 1−rito see the fuzzy hyperconvexity of X. For this, take an arbitrary ε ∈ (0, 1) and

arbitrary ε′ > 0. Since the set pk, k ∈ K is dense in X, there exists a point pkfor each xi ∈ X such that

(3.6) M(xi, pk, ε′) > 1− ε.

Therefore

BM (xi, ri, ti) ⊂ BM (pk, ri + ε, ti + ε′).

Due to the choices of r′

k and t′

k, it follows that BM (pk, r′

k, t′

k) ⊂ BM (pk, ri+ε, ti+ε′)

and so, we get that r′

k ≤ ri+ε and t′

k ≤ ti+ε′.Therefore, by the triangle inequalityfor fuzzy metric (i.e. the condition (FM-4)),

M(x, xi, ti + 2ε′) ≥ M(x, pk, ti + ε

′) ∗M(pk, xi, ε

′)

≥ M(x, pk, t′

k) ∗M(pk, xi, ε′)

> (1− r′

k) ∗ (1− ε)≥ [1− (ri + ε)] ∗ (1− ε).

Since ε and ε′ is arbitrary, M(x, xi, ti) ≥ 1−ri. This means that x ∈⋂i∈Γ

BM (xi, ri, ti)

and so X is fuzzy hyperconvex.

Remark 4. It is clear that if the fuzzy metric space (X,M, ∗) is m−seperable andthe space X has finite number of points, then we can not mention fuzzy m−hyperconvexity.So indeed, since fuzzy m−hyperconvexity (m ≥ 3) implies the fuzzy metrically con-vexity (Proposition 2), X can not be a finite set except when the set is reduced to asingle point.

Consequently, Teorem 6 indicate this situation i.e. if the fuzzy metric space(X,M, ∗) is fuzzy m− hyperconvex and m−seperable then (X,M, ∗) is fuzzy hyper-convex.

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 27, NO.1, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

57 YIGIT ET AL 50-58

Page 58: Journal of Computational Analysis and Applicationseudoxuspress.com/images/JOCAAA-VOL-27-2019-ISSUE-1.pdf · Volume 27, Number 1 July 15, 2019 . ISSN:1521-1398 PRINT,1572-9206 ONLINE

CONVEXITY AND HYPERCONVEXITY IN FUZZY METRIC SPACE 9

References

[1] A.George and P.Veeramani, On some results in fuzzy metric spaces, Fuzzy Sets and Systems,

64(3), 395-399 (1994).[2] A.George and P.Veeramani, Some theorems in fuzzy metric spaces, Journal of Fuzzy Mathe-

matics, 3, 933-940 (1995).[3] A.George and P.Veeramani, On some results of analysis for fuzzy metric spaces, Fuzzy Sets

and Systems, 90(3), 365-368 (1997).

[4] A.Thanithamil and P.Thirunavukarasu, Some Results in Fuzzy Metric Spaces with ConvexStructure, International Journal of Mathematical Analysis, 8(57), 2827-2836 (2014).

[5] B.Miesch, M.Pavon, Ball intersection properties in metric Spaces, arXiv preprint

arXiv:1610.03307 (2016).[6] B.Schweizer and A.Sklar, Statistical metric spaces, Pacific J. Math, 10(3), 313-334 (1960).

[7] B.K.Sharma and C.L.Dewangan, Fixed point theorem in convex metric space, Novi Sad

Journal of Mathematics, 25(1), 9-18 (1995).[8] H.Vosoughi and S.J.Hosseini Ghoncheh, Extension of fuzzy contraction mappings, Iranian

Journal of Fuzzy Systems, 9(5), 1-6 (2014).

[9] K.Menger, Untersuchungen uber allegemeine Metrik, Math. Ann., 100, 75–63 (1928).[10] N.Aronszajn and P.Panitchpakdi, Extension of uniformly continuous transformations and

hyperconvex metric spaces, Pacific J. Math, 6, 405–439. MR 18:917c (1956).

[11] R.Esp´ınola and M.A.Khamsi, Introduction to hyperconvex spaces, in Handbook ofMetric Fixed Point Theory (W. A. Kirk and B. Sims, eds.), Kluwer Acad. Publ.,

Dordrecht,2001,pp.391-435.[12] S.N.Jesic, N.A.Babacev and R.M.Nikolic, A common fixed point theorem in fuzzy metric

spaces with nonlinear contractive type condition defined using Φ-function, In Abstract and

Applied Analysis (Vol. 2013). Hindawi Publishing Corporation (2013).[13] S.Park, Fixed point theorems in hyperconvex metric spaces, Nonlinear Analysis: Theory,

Methods & Applications, 37(4), 467-472 (1999).

[14] T.Shimizu, Fixed Points of Multivalued Nonexpansive Mappings in Certain Convex MetricSpaces, Nonlinear Analysıs and Convex Analysıs, (1998).

[15] W.Takahashi, A convexity in metric space and nonexpansive mappings, I. In Kodai Mathe-

matical Seminar Reports (Vol. 22, No. 2, pp. 142-149). Department of Mathematics, TokyoInstitute of Technology (1970).

Graduate School of Natural and Applied Science Gazi University Teknikokullar,

Ankara, 06500, TURKEYE-mail address: [email protected]

Department of Mathematics Faculty of Science Gazi University Teknikokullar, Ankara,

06500, TURKEYE-mail address: [email protected]

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 27, NO.1, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

58 YIGIT ET AL 50-58

Page 59: Journal of Computational Analysis and Applicationseudoxuspress.com/images/JOCAAA-VOL-27-2019-ISSUE-1.pdf · Volume 27, Number 1 July 15, 2019 . ISSN:1521-1398 PRINT,1572-9206 ONLINE

ON GENERALIZATIONS OF A REVERSE HARDY-HILBERT’STYPE INEQUALITY

ZHENGPING ZHANG, GAOWEN XI

Abstract. By introducing a parameter α and using the expression of the β functionestablishing the inequality of the weight coefficient, a generalizations of the reverseHardy-Hilbert’s type inequality is proved. As applications, some equivalent form anda number of particular cases are obtained.

1. Introduction

Let p > 1, 1p

+ 1q

= 1, an ≥ 0, bn ≥ 0, and 0 <∑∞

n=0 apn < ∞, 0 <

∑∞n=0 b

qn < ∞,

then

∞∑n=0

∞∑m=0

ambnm+ n+ 1

sin(π/p)

(∞∑n=0

apn

)1/p( ∞∑n=0

bqn

)1/q

, (1.1)

and

∞∑n=1

∞∑m=1

ambnmaxm,n

< pq

∞∑n=1

apn

1p∞∑n=1

bqn

1q

, (1.2)

where the constant πsin π

pand pq is best possible for each inequality respectively.

Inequality (1.1) is Hardy-Hilbert’s inequality. Inequality (1.2) is a Hilbert’s type in-equality [1].

For (1.1), Yang et al. [7], [8], [9], [10] and [11] gave some strengthened versions andextensions as follows:

∞∑n=0

∞∑m=0

ambnm+ n+ 1

<

∞∑n=0

[π − 7

5(√n+ 3)

]a2n

∞∑n=0

[π − 7

5(√n+ 3)

]b2n

1/2

; (1.3)

∞∑n=0

∞∑m=0

ambnm+ n+ 1

<

∞∑n=0

sin(π/p)− ln2− C

(2n+ 1)1+1/p

]apn

1/p

×

∞∑n=0

sin(π/p)− ln 2− C

(2n+ 1)1+1/q

]bqn

1/q

, (1.4)

2010 Mathematics Subject Classification: 26D15.Key Words:Hardy-Hilbert’s inequality; weight coefficient; β function; reverse; generalizations .

1

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 27, NO.1, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

59 ZHENGPING ZHANG ET AL 59-65

Page 60: Journal of Computational Analysis and Applicationseudoxuspress.com/images/JOCAAA-VOL-27-2019-ISSUE-1.pdf · Volume 27, Number 1 July 15, 2019 . ISSN:1521-1398 PRINT,1572-9206 ONLINE

2 ZHENGPING ZHANG, GAOWEN XI

where ln 2− C = 0.1159315+ (C is the Euler constant).

∞∑n=0

∞∑m=0

ambn(m+ n+ 1)λ

< B

(p+ λ− 2

p,q + λ− 2

q

) ∞∑n=0

(n+1

2)1−λapn

1/p

×

∞∑n=0

(n+1

2)1−λbqn

1/q

, (1.5)

where the constant B(p+λ−2

p, q+λ−2

q

)is the best possible ( 2−minp, q < λ ≤ 2).

∞∑n=0

∞∑m=0

ambn(m+ n+ 1)λ

< B

p,λ

q

) ∞∑n=0

(n+1

2)p−1−λapn

1/p

×

∞∑n=0

(n+1

2)q−1−λbqn

1/q

. (1.6)

where the constant B(λp, λ

q) is the best possible ( 0 < λ ≤ minp, q).

∞∑n=0

∞∑m=0

ambn(m+ n+ 1)λ

< B

((r − 2)t+ λ

r,(s− 2)t+ λ

s

) ∞∑n=0

(n+1

2)p(1−t+

2t−λr

)−1apn

1/p

×

∞∑n=0

(n+1

2)q(1−t+

2t−λs

)−1bqn

1/q

, (1.7)

where the constantB( (r−2)t+λr

, (s−2)t+λs

) is the best possible ( r > 1, 1r+1s

= 1, t ∈ [0, 1],2−minr, st < λ ≤ 2−minr, st+ minr, s).

In [5] and [6], Xi gave a generalizations and reinforcements of inequalities (1.2:

∞∑n=1

∞∑m=1

ambnmax(mλ, nλ)

<

∞∑n=1

[κ (λ )− 1

3qnq+λ−2q

]n1−λapn

1p

×

∞∑n=1

[κ (λ )− 1

3pnp+λ−2p

]n1−λbqn

1q

, (1.8)

∞∑n=1

∞∑m=1

ambnmaxmλ + A, nλ +B

<

∞∑n=1

[κ(λ)− 1

nq+λ−2q

(1

3q− B

1 +B

)]n1−λapn

1p

×

∞∑n=1

[κ(λ)− 1

np+λ−2p

(1

3p− A

1 + A

)]n1−λbqn

1q

, (1.9)

where κ(λ) = p qλ(p+λ−2)(q+λ−2) > 0, 2−minp, q < λ ≤ 2, 0 ≤ A ≤ B ≤ min 1

3p−1 ,1

3q−1.For the reverse Hardy-Hilbert’s inequality, recently, Yang [12] gave a reverse form of

inequalities (1.5), (1.6) and (1.7) for λ = 2. In [4], Xi gave an extension of the aboveYang’s work for 1.5 ≤ λ < 3:

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 27, NO.1, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

60 ZHENGPING ZHANG ET AL 59-65

Page 61: Journal of Computational Analysis and Applicationseudoxuspress.com/images/JOCAAA-VOL-27-2019-ISSUE-1.pdf · Volume 27, Number 1 July 15, 2019 . ISSN:1521-1398 PRINT,1572-9206 ONLINE

ON GENERALIZATIONS OF A REVERSE HARDY-HILBERT’S TYPE INEQUALITY 3

∞∑n=0

∞∑m=0

ambn(m+ n+ 1)λ

>2

λ− 1

∞∑n=0

(n+ 1)2−λ

2n+ 3− λ

[1− (λ− 1)2

4(n+ 1)2

]apn

1/p

×

∞∑n=0

(n+ 1)2−λ

2n+ 3− λbqn

1/q

, (1.10)

where 0 < p < 1, 1p

+ 1q

= 1, 1.5 ≤ λ < 3 and an ≥ 0, bn > 0, such that 0 <∑∞n=0

(n+1)2−λapn2n+3−λ <∞, 0 <

∑∞n=0

(n+1)2−λbqn2n+3−λ <∞.

In this paper, by introducing a parameter α and using the expression of the β functionestablishing the inequality of the weight coefficient. The purpose of this paper is togive a generalization of inequality (1.10).

For this, we need the following expression of the β function B(p, q) (see [3])

B(p, q) = B(q, p) =

∫ ∞0

1

(1 + u)p+qup−1du (p, q > 0), (1.11)

and the following inequality [8]:∫ ∞0

f(x)dx+1

2f(0) <

∞∑m=0

f(m) <

∫ ∞0

f(x)dx+1

2f(0)− 1

12f ′(0) (1.12)

where f(x) ∈ C3[0, ∞), and∫∞0f(x)dx < ∞, (−1)nf (n)(x) > 0, f (n)(∞) = 0(n =

0, 1, 2, 3).

2. Main Results

Lemma 2.1. Let N0 be the set of non-negative integers, N be the set of positiveintegers and R be the set of real numbers. The weight coefficient ωλ(n, α) is defined by

ωλ(n, α) =∞∑m=0

1

(m+ n+ α)λ, n ∈ N0, 1.5 ≤ λ < 3, α ≥ 1.

Then we have

2(n+ α)2−λ

(λ− 1)(2n+ 2α− λ+ 1)

[1− (λ− 1)2

4(n+ α)2

]< ωλ(n, α)

<2(n+ α)2−λ

(λ− 1)(2n+ 2α− λ+ 1). (2.1)

Proof If n ∈ N0, let f(x) = 1(x+n+α)λ

, x ∈ [0, ∞). By (1.12), we obtain

ωλ(n, α) >

∫ ∞0

dx

(x+ n+ α)λ+

1

2(n+ α)λ=

1

(λ− 1)(n+ α)λ−1+

1

2(n+ α)λ.

ωλ(n, α) <

∫ ∞0

1

(x+ n+ α)λdx+

1

2(n+ α)λ+

λ

12(n+ α)λ+1

=1

(λ− 1)(n+ α)λ−1+

1

2(n+ α)λ+

λ

12(n+ α)λ+1.

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 27, NO.1, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

61 ZHENGPING ZHANG ET AL 59-65

Page 62: Journal of Computational Analysis and Applicationseudoxuspress.com/images/JOCAAA-VOL-27-2019-ISSUE-1.pdf · Volume 27, Number 1 July 15, 2019 . ISSN:1521-1398 PRINT,1572-9206 ONLINE

4 ZHENGPING ZHANG, GAOWEN XI

Since we find[1

(λ− 1)(n+ α)λ−1+

1

2(n+ α)λ

] [2(n+ α)λ−1 − (λ− 1)(n+ α)λ−2

]=

2

λ− 1− λ− 1

2(n+ α)2,

[1

(λ− 1)(n+ α)λ−1+

1

2(n+ α)λ+

1

12(n+ α)λ+1

] [2(n+ α)λ−1 − (λ− 1)(n+ α)λ−2

]=

2

λ− 1− 2λ− 3

6(n+ α)2− λ(λ− 1)

12(n+ α)3.

Then we obtain

1

(λ− 1)(n+ α)λ−1+

1

2(n+ α)λ=

2(n+ α)2−λ

(λ− 1)(2n+ 2α− λ+ 1)

[1− (λ− 1)2

4(n+ α)2

],

1

(λ− 1)(n+ α)λ−1+

1

2(n+ α)λ+

1

12(n+ α)λ+1=

2(n+ α)2−λ

(λ− 1)(2n+ 2α− λ+ 1)

×[1− (2λ− 3)(λ− 1)

12(n+ α)2− λ(λ− 1)2

24(n+ α)3

].

Sine 1.5 ≤ λ < 3, α ≥ 1, so 2(n+α)2−λ

(λ−1)(2n+2α−λ+1)> 0, (2λ−3)(λ−1)

12(n+α)2≥ 0, λ(λ−1)2

24(n+α)3> 0. Then we

have (2.1). The lemma is proved.

Theorem 2.2. Let 0 < p < 1, 1p+ 1

q= 1, 1.5 ≤ λ < 3, α ≥ 1, and an ≥ 0, bn > 0, such

that 0 <∑∞

n=0(n+α)2−λ

2n+2α−λ+1

[1− (λ−1)2

4(n+α)2

]apn < ∞, 0 <

∑∞n=0

(n+α)2−λ

2n+2α−λ+1bqn < ∞. Then we

have

∞∑n=0

∞∑m=0

ambn(m+ n+ α)λ

>2

λ− 1

∞∑n=0

(n+ α)2−λ

2n+ 2α− λ+ 1

[1− (λ− 1)2

4(n+ α)2

]apn

1/p

×

∞∑n=0

(n+ α)2−λ

2n+ 2α− λ+ 1bqn

1/q

. (2.2)

Proof By the reverse Holder ’s inequality [2], we have

∞∑n=0

∞∑m=0

ambn(m+ n+ α)λ

=∞∑n=0

∞∑m=0

am

(m+ n+ α)λp

· bn

(m+ n+ α)λq

∞∑m=0

∞∑n=0

apm(m+ n+ α)λ

1p

·

∞∑n=0

∞∑m=0

bqn(m+ n+ α)λ

1q

=

∞∑m=0

ωλ(m,α)apm

1p

·

∞∑n=0

ωλ(n, α)bqn

1q

·

Since 0 < p < 1 and q < 0, then by (2.1), we obtain (2.2). The theorem is proved.In Theorem 2.2, for α = 1 we have

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 27, NO.1, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

62 ZHENGPING ZHANG ET AL 59-65

Page 63: Journal of Computational Analysis and Applicationseudoxuspress.com/images/JOCAAA-VOL-27-2019-ISSUE-1.pdf · Volume 27, Number 1 July 15, 2019 . ISSN:1521-1398 PRINT,1572-9206 ONLINE

ON GENERALIZATIONS OF A REVERSE HARDY-HILBERT’S TYPE INEQUALITY 5

Corollary 2.3. Let 0 < p < 1, 1p

+ 1q

= 1, 1.5 ≤ λ < 3 and an ≥ 0, bn > 0, such that

0 <∑∞

n=0(n+1)2−λapn2n+3−λ <∞, 0 <

∑∞n=0

(n+1)2−λbqn2n+3−λ <∞. Then we have

∞∑n=0

∞∑m=0

ambn(m+ n+ 1)λ

>2

λ− 1

∞∑n=0

(n+ 1)2−λ

2n+ 3− λ

[1− (λ− 1)2

4(n+ 1)2

]apn

1/p

×

∞∑n=0

(n+ 1)2−λ

2n+ 3− λbqn

1/q

. (2.3)

Remark. Inequality (2.3) is inequality (1.10). Hence, inequality (2.2) is anextension inequality (1.10)

Theorem 2.4. Let 0 < p < 1, 1p

+ 1q

= 1, 1.5 ≤ λ < 3, α ≥ 1, and an ≥ 0, such that

0 <∑∞

n=0(n+α)2−λapn2n+2α−λ+1

<∞. Then we have

∞∑n=0

[(n+ α)2−λ

2n+ 2α− λ+ 1

]1−p [ ∞∑m=0

am(m+ n+ α)λ

]p

>

(2

λ− 1

)p ∞∑n=0

(n+ α)2−λ

2n+ 2α− λ+ 1

[1− (λ− 1)2

4(n+ α)2

]apn. (2.4)

Inequalities (2.4) and (2.2) are equivalent.

Proof Let

bn =

[(n+ 1)2−λ

2n+ 2α− λ+ 1

]1−p [ ∞∑m=0

am(m+ n+ α)λ

]p−1, n ∈ N0.

By (2.2), we have∞∑n=0

(n+ 1)2−λbqn2n+ 2α− λ+ 1

p

=

∞∑n=0

[(n+ 1)2−λ

2n+ 2α− λ+ 1

]1−p [ ∞∑m=0

am(m+ n+ α)λ

]pp

=

∞∑n=0

∞∑m=0

ambn(m+ n+ α)λ

p

≥(

2

λ− 1

)p ∞∑n=0

(n+ α)2−λ

2n+ 2α− λ+ 1

[1− (λ− 1)2

4(n+ α)2

]apn

×

∞∑n=0

(n+ α)2−λbqn2n+ 2α− λ+ 1

p−1

.

Then we obtain

∞∑n=0

(n+ α)2−λbqn2n+ 2α− λ+ 1

=∞∑n=0

[(n+ α)2−λ

2n+ 2α− λ+ 1

]1−p [ ∞∑m=0

am(m+ n+ α)λ

]p

≥(

2

λ− 1

)p ∞∑n=0

(n+ α)2−λ

2n+ 2α− λ+ 1

[1− (λ− 1)2

4(n+ α)2

]apn. (2.5)

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 27, NO.1, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

63 ZHENGPING ZHANG ET AL 59-65

Page 64: Journal of Computational Analysis and Applicationseudoxuspress.com/images/JOCAAA-VOL-27-2019-ISSUE-1.pdf · Volume 27, Number 1 July 15, 2019 . ISSN:1521-1398 PRINT,1572-9206 ONLINE

6 ZHENGPING ZHANG, GAOWEN XI

If∑∞

n=0(n+α)2−λbqn2n+2α−λ+1

=∞, then in view of

0 <∞∑n=0

(n+ α)2−λapn2n+ 2α− λ+ 1

[1− (λ− 1)2

4(n+ α)2

]≤

∞∑n=0

(n+ α)2−λapn2n+ 2α− λ+ 1

<∞

and (2.5), we have

∞∑n=0

[(n+ α)2−λ

2n+ 2α− λ+ 1

]1−p [ ∞∑m=0

am(m+ n+ α)λ

]p>

(2

λ− 1

)p×∞∑n=0

(n+ α)λ−2

2n+ 2α− λ+ 1

[1− (λ− 1)2

4(n+ α)2

]apn;

if 0 <∑∞

n=0(n+α)λ−2bqn2n+2α−λ+1

<∞, then by (2.2), we find

∞∑n=0

[(n+ α)2−λ

2n+ 2α− λ+ 1

]1−p [ ∞∑m=0

am(m+ n+ α)λ

]p>

(2

λ− 1

)p×∞∑n=0

(n+ α)2−λ

2n+ 2α− λ+ 1

[1− (λ− 1)2

4(n+ α)2

]apn.

Hence we obtain (2.4).On the other-hand, by the reverse Holder ’s inequality [2], we have

∞∑n=0

∞∑m=0

ambn(m+ n+ α)λ

=

[∞∑n=0

(n+ α)λ−2q (2n+ 2α− λ+ 1)

1q

∞∑m=0

am(m+ n+ α)λ

]

×

[bn

(n+ α)λ−2q (2n+ 2α− λ+ 1)

1q

]

∞∑n=0

[(n+ α)2−λ

2n+ 2α− λ+ 1

]1−p [ ∞∑m=0

am(m+ n+ α)λ

]p 1p

×

∞∑n=0

(n+ α)2−λbqn2n+ 2α− λ+ 1

1q

.

Hence by (2.4), it follows

∞∑n=0

∞∑m=0

ambn(m+ n+ α)λ

>2

λ− 1

∞∑n=0

(n+ α)2−λapn2n+ 2α− λ+ 1

[1− (λ− 1)2

4(n+ α)2

] 1p

×

∞∑n=0

(n+ α)2−λbqn2n+ 2α− λ+ 1

1q

.

Then, (2.4) and (2.2) are equivalent. The theorem is proved.In (2.4), for α = 1, we have

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 27, NO.1, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

64 ZHENGPING ZHANG ET AL 59-65

Page 65: Journal of Computational Analysis and Applicationseudoxuspress.com/images/JOCAAA-VOL-27-2019-ISSUE-1.pdf · Volume 27, Number 1 July 15, 2019 . ISSN:1521-1398 PRINT,1572-9206 ONLINE

ON GENERALIZATIONS OF A REVERSE HARDY-HILBERT’S TYPE INEQUALITY 7

Corollary 2.5. Let 1.5 ≤ λ < 3, 0 < p < 1, 1p+ 1q

= 1, an ≥ 0, 0 <∑∞

n=0(n+1)2−λapn2n−λ+3

<

∞, Then we have∞∑n=0

[(n+ 1)2−λ

2n− λ+ 3

]1−p [ ∞∑m=0

am(m+ n+ 1)λ

]p

>

(2

λ− 1

)p ∞∑n=0

(n+ 1)2−λ

2n− λ+ 3

[1− (λ− 1)2

4(n+ 1)2

]apn. (2.6)

Inequalities (2.6) and (2.3) are equivalent.

References

[1] G. Hardy , J. Littlewood and G. Polya, Inequalities, Cambridge University Press Cambridge,1952.

[2] J. Kuang, Applied Inequalities, Sandong Science and Technology Press, Jinan, 2004.[3] Z. Wang and G. Dunren, An Introduction to Special Function, Science Press, Beijing,1979.[4] G. Xi, A Reverse Hardy-Hilbert-Type Inequality, Journal of Inequalities and Applications, Volume

2007, Art. No. 79758.[5] G. Xi, On generalizations and reinforcements of a Hilbert’s type inequality, Rocky Mountain

Journal of Mathematics, 42.1(2012): 329-337.[6] G. Xi, A generalization of the Hilbert’s type inequality, Mathematical Inequalities & Applications,

18.4(2015): 1501-1510.[7] B. Yang and L. Debnath, Some Inequalities Involing π and an Application to Hilbert’s Inequality,

Applied Mathematics Leters, 12(1999), 101-105.[8] B. Yang and L. Debnath, On a New Generalization of Hardy-Hilbert’s Inequality and Its Appli-

cations, Journal of Mathematical Analysis and Applications, 233(1999), 484-497.[9] B. Yang , On a Strengthened Version of the More AccurateHardy-Hilbert’s Inequality, Acta Math-

ematica Sinica , 42:6(1999), 1103-1110.[10] B. Yang, Themistocles M. Rassias, On a New Extension of Hilbert’s Inequality, Mathematics

Inequalities and Applications, 8:4(2005), 575-582.[11] B. Yang, On a New Extension of Hilbert’s Inequality With Some Parameters, Acta Math. Hungar,

108:4(2005), 337-350.[12] B. Yang, A Reverse of the Hardy-Hilbert’s Type Inequality, Journal of Southwest China Normal

University(Natural Science Edition), 30:6(2005),1012-1015.

College of Mathematics and Physics, Chongqing University of Science and Tech-nology, Chongqing, 401331, P. R. China,

E-mail address: [email protected]

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 27, NO.1, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

65 ZHENGPING ZHANG ET AL 59-65

Page 66: Journal of Computational Analysis and Applicationseudoxuspress.com/images/JOCAAA-VOL-27-2019-ISSUE-1.pdf · Volume 27, Number 1 July 15, 2019 . ISSN:1521-1398 PRINT,1572-9206 ONLINE

Dunkl generalization ofq-Szasz-Mirakjan-Kantrovich type operators and

approximation

Abdullah Alotaibi1) and M. Mursaleen1,2)

1)Operator Theory and Applications Research Group, Department ofMathematics, Faculty of Science, King Abdulaziz University, P. O. Box 80203,

Jeddah 21589, Saudi Arabia2)Department of Mathematics, Aligarh Muslim University, Aligarh–202002,

[email protected]; [email protected]

Abstract

The purpose of this paper is to introduce a modification of q-Dunkl generalization of

exponential functions. These types of operators modification enables better error estimation

on the interval [ 12 ,∞) than the classical ones. We obtain some approximation results via well

known Korovkin’s type theorem. Convergence properties by using the modulus of continuity

and the rate of convergence of the operators for functions belonging to the Lipschitz class are

also presented.

Keywords and phrases: q-integers; Dunkl analogue; Szasz operator; q- Szasz-Mirakjan-

Kantrovich; modulus of continuity; Peetre’s K-functional.

AMS Subject Classification (2010): 41A25, 41A36, 33C45.

1. Introduction and preliminaries

In 1912, S.N Bernstein [1] introduced the following sequence of operatorsBn : C[0, 1]→ C[0, 1] defined by

Bn(f ;x) =n∑k=0

(n

k

)xk(1− x)n−kf

(k

n

), x ∈ [0, 1] (1.1)

for n ∈ N and f ∈ C[0, 1].In 1950, for x ≥ 0, Szasz [17] introduced the operators

Sn(f ;x) = e−nx∞∑k=0

(nx)k

k!f

(k

n

), f ∈ C[0,∞). (1.2)

In the field of approximation theory, the application of q-calculus emergedas a new area in the field of approximation theory. The first q-analogue ofthe well-known Bernstein polynomials was introduced by Lupas by applyingthe idea of q-integers [5]. In 1997 Phillips [14] considered another q-analogueof the classical Bernstein polynomials. Later on, many authors introduced q-generalizations of various operators and investigated several approximation prop-erties [6, 7, 8, 9, 10, 11, 12, 13].

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 27, NO.1, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

66 Alotaibi ET AL 66-76

Page 67: Journal of Computational Analysis and Applicationseudoxuspress.com/images/JOCAAA-VOL-27-2019-ISSUE-1.pdf · Volume 27, Number 1 July 15, 2019 . ISSN:1521-1398 PRINT,1572-9206 ONLINE

2

We now present some basic definitions and concept details of the q-calculuswhich are used in this paper.

Let k ∈ N0 and q ∈ (0, 1) then q-integer [k]q is defined as

[k]q =

1−qk1−q if q 6= 1,

k if q = 1.

The q-factorial [k]q! is defined as

[k]q! =

[k]q[k − 1]q · · · [1]q if k ∈ N,

1 if k = 0,

and for k ∈ N, q-binomial coefficient

[kr

]q

is defined by[kr

]q

=[k]q!

[r]q![k − r]q!, 1 ≤ r ≤ k,

with

[k0

]q

= 1 and

[kr

]q

= 0 for r > k.

There are two q-analogue of the exponential function ex

eq(x) =∞∑k=0

xk

[k]q!=

1

(1− (1− q)x)∞q, |x| < 1

1− q, |q| < 1,

and

Eq(x) =∞∑k=0

qk(k−1)

2xk

[k]q!= (1 + (1− q)x)∞q , |q| < 1,

where

(1− x)∞q =∞∏j=0

(1− qjx).

Our investigation is to construct a linear positive operators generated bygeneralization of exponential function for defined by [15]

eµ(x) =∞∑n=0

xn

γµ(n).

Here

γµ(2k) =22kk!Γ

(k + µ+ 1

2

)Γ(µ+ 1

2

) ,

and

γµ(2k + 1) =22k+1k!Γ

(k + µ+ 3

2

)Γ(µ+ 1

2

) .

The recursion formula for γµ is given by

γµ(k + 1) = (k + 1 + 2µθk+1)γµ(k), k = 0, 1, 2, · · · ,

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 27, NO.1, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

67 Alotaibi ET AL 66-76

Page 68: Journal of Computational Analysis and Applicationseudoxuspress.com/images/JOCAAA-VOL-27-2019-ISSUE-1.pdf · Volume 27, Number 1 July 15, 2019 . ISSN:1521-1398 PRINT,1572-9206 ONLINE

3

where µ > −12

and

θk =

0 if k ∈ 2N1 if k ∈ 2N + 1.

Sucu [16] defined a Dunkl analogue of Szasz operators via a generalization of theexponential function [15] as follows:

S∗n(f ;x) :=1

eµ(nx)

∞∑k=0

(nx)k

γµ(k)f

(k + 2µθk

n

), (1.3)

where x ≥ 0, f ∈ C[0,∞), µ ≥ 0, n ∈ N.Cheikh et al., [2] stated the q-Dunkl classical q-Hermite type polynomials and gavedefinitions of q-Dunkl analogues of exponential functions and recursion relationsfor µ > −1

2and 0 < q < 1.

eµ,q(x) =∞∑n=0

xn

γµ,q(n), x ∈ [0,∞) (1.4)

Eµ,q(x) =∞∑n=0

qn(n−1)

2 xn

γµ,q(n), x ∈ [0,∞) (1.5)

γµ,q(n+ 1) =

(1− q2µθn+1+n+1

1− q

)γµ,q(n), n ∈ N, (1.6)

θn =

0 if n ∈ 2N,1 if n ∈ 2N + 1.

An explicit formula for γµ,q(n) is

γµ,q(n) =(q2µ+1, q2)[n+1

2](q

2, q2)[n2]

(1− q)nγµ,q(n), n ∈ N.

And some of the special cases of γµ,q(n) are defined as:

γµ,q(0) = 1, γµ,q(1) =1− q2µ+1

1− q, γµ,q(2) =

(1− q2µ+1

1− q

)(1− q2

1− q

),

γµ,q(3) =

(1− q2µ+1

1− q

)(1− q2

1− q

)(1− q2µ+3

1− q

),

γµ,q(4) =

(1− q2µ+1

1− q

)(1− q2

1− q

)(1− q2µ+3

1− q

)(1− q4

1− q

).

In [4], Gurhan Icoz gave the Dunkl generalization of Szasz operators viaq-calculus as:

Dn,q(f ;x) =1

eµ,q([n]qx)

∞∑k=0

([n]qx)k

γµ,q(k)f

(1− q2µθk+k

1− qn

), (1.7)

for µ > 12, x ≥ 0, 0 < q < 1 and f ∈ C[0,∞).

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 27, NO.1, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

68 Alotaibi ET AL 66-76

Page 69: Journal of Computational Analysis and Applicationseudoxuspress.com/images/JOCAAA-VOL-27-2019-ISSUE-1.pdf · Volume 27, Number 1 July 15, 2019 . ISSN:1521-1398 PRINT,1572-9206 ONLINE

4

Previous studies demonstrate that providing a better error estimation forpositive linear operators plays an important role in approximation theory, whichallows us to approximate much faster to the function being approximated.

Motivated essentially by by Icoz [4] the recent investigation of Dunkl gen-eralization of Szasz-Mirakjan operators via q-calculus we have showed that ourmodified operators have better error estimation than [4]. We have proved severalapproximation results. We have successfully extended these results and modifyingthe results of papers [4].

2. Construction of operators and moments estimation

We modify the q Dunkl analogue of Szasz-operators [4].

Let r[n]q(x) be a sequence of real-valued continuous functions defined on[0,∞) with 0 ≤ r[n]q <∞. Then we define

D?n,q(f ;x) =

1

eµ,q([n]qr[n]q(x))

∞∑k=0

([n]qr[n]q(x))k

γµ,q(k)f

(1− q2µθk+k

1− qn

). (2.1)

Now, if we replace r[n]q(x) as

r[n]q(x) = x− 1

2[n]q, where

1

2n≤ x <

1

1− qnand n ∈ N. (2.2)

Then for any 12n≤ x < 1

1−qn , 0 < q < 1, µ > 12n

and n ∈ N we have

D∗n,q(f ;x) =1

eµ,q

(2[n]qx−1

2

) ∞∑k=0

(2[n]qx− 1)k

2kγµ,q(k)f

(1− q2µθk+k

1− qn

). (2.3)

where eµ,q(x), γµ,q are defined in (1.4),(1.6) by [16] and f ∈ Cζ [0,∞) withζ ≥ 0 and

Cζ [0,∞) = f ∈ C[0,∞) :| f(t) |≤M(1 + t)ζ , for some M > 0, ζ > 0. (2.4)

Lemma 2.1. Let D∗n,q(. ; .) be the operators given by (2.3). Then for each12n≤ x < 1

1−qn , n ∈ N, we have we have the following identities:

(1) D∗n,q(1;x) = 1,

(2) D∗n,q(t;x) = r[n]q(x) = x− 12[n]q

,

(3) x2+(q2µ[1− 2µ]q

eµ,q(q[n]qr[n]q (x))

eµ,q([n]qr[n]q (x))− 1)

x[n]q− 1

4[n]2q

(2q2µ[1− 2µ]q

eµ,q(q[n]qr[n]q (x))

eµ,q([n]qr[n]q (x))− 1)≤

D∗n,q(t2;x) ≤ x2 + ([1 + 2µ]q − 1) x

[n]q− 1

4[n]2q(2[1 + 2µ]q − 1).

Proof. (1) D∗n,q(1;x) = 1eµ,q([n]qr[n]q (x))

∑∞k=0

([n]qr[n]q (x))k

γµ(k)= 1.

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 27, NO.1, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

69 Alotaibi ET AL 66-76

Page 70: Journal of Computational Analysis and Applicationseudoxuspress.com/images/JOCAAA-VOL-27-2019-ISSUE-1.pdf · Volume 27, Number 1 July 15, 2019 . ISSN:1521-1398 PRINT,1572-9206 ONLINE

5

(2)

D∗n,q(t;x) =1

eµ,q([n]qr[n]q(x))

∞∑k=0

([n]qr[n]q(x))k

γµ(k)

(1− q2µθk+k

1− qn

)

=1

[n]qeµ,q([n]qr[n]q(x))

∞∑k=1

([n]qr[n]q(x))k

γµ(k − 1)

= x− 1

2[n]q

(3)

D∗n,q(t2;x) =

1

eµ,q([n]qr[n]q(x))

∞∑k=0

([n]qr[n]q(x))k

γµ(k)

(1− q2µθk+k

1− qn

)2

=1

[n]2qeµ,q([n]qr[n]q(x))

∞∑k=0

([n]qr[n]q(x))k

γµ(k − 1)

(1− q2µθk+k

1− q

)

=1

[n]2qeµ,q([n]qr[n]q(x))

∞∑k=0

([n]qr[n]q(x))k+1

γµ(k)

(1− q2µθk+1+k+1

1− q

).

From [4] we know that

[2µθk+1 + k + 1]q = [2µθk + k]q + q2µθk+k[2µ(−1)k + 1]q, (2.5)

Now by separating to the even and odd terms and using (2.5), we get

D∗n,q(t2;x) =

1

[n]2qeµ,q([n]qr[n]q(x))

∞∑k=0

([n]qr[n]q(x))k+1

γµ(k)

(1− q2µθk+1+k+1

1− q

)

+[1 + 2µ]q

[n]2qeµ,q([n]qr[n]q(x))

∞∑k=0

([n]qr[n]q(x))2k+1

γµ(2k)q2µθ2k+2k

+[1− 2µ]q

[n]2qeµ,q([n]qr[n]q(x))

∞∑k=0

([n]qr[n]q(x))2k+2

γµ(2k)q2µθ2k+1+2k+1.

We know the inequality

[1− 2µ]q ≤ [1 + 2µ]q. (2.6)

Therefore by using (2.6) we have

D∗n,q(t2;x) ≥ (r[n]q(x))2 +

r[n]q(x)[1− 2µ]q

[n]qeµ,q([n]qr[n]q(x))

∞∑k=0

(q[n]qr[n]q(x))2k

γµ(2k)

+q2µr[n]q(x)[1− 2µ]q

[n]qeµ,q([n]qr[n]q(x))

∞∑k=0

(q[n]qr[n]q(x))2k+1

γµ(2k + 1)

≥ (r[n]q(x))2 + q2µ[1− 2µ]qeµ,q(q[n]qr[n]q(x))

eµ,q([n]qr[n]q(x))

r[n]q(x)

[n]q.

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 27, NO.1, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

70 Alotaibi ET AL 66-76

Page 71: Journal of Computational Analysis and Applicationseudoxuspress.com/images/JOCAAA-VOL-27-2019-ISSUE-1.pdf · Volume 27, Number 1 July 15, 2019 . ISSN:1521-1398 PRINT,1572-9206 ONLINE

6

Similarly on the other hand we have

D∗n,q(t2;x) ≤ (r[n]q(x))2 + [1 + 2µ]q

r[n]q(x)

[n]q.

Which completes the proof.

Lemma 2.2. Let the operators D∗n,q(. ; .) be given by (2.3). Then for each

x ≥ 12n, n ∈ N, we have

(1) D∗n,q(t− x;x) = − 12[n]q

,

(2) D∗n,q((t− x)2;x) ≤ [1 + 2µ]qx

[n]q− 1

4[n]2q(2[1 + 2µ]q − 1).

3. Main results

We obtain the Korovkin’s type approximation properties for our operatorsdefined by (2.3).

Let CB(R+) be the set of all bounded and continuous functions on R+ =[0,∞), which is linear normed space with

‖ f ‖CB= supx≥0| f(x) | .

Let

H := f : x ∈ [0,∞),f(x)

1 + x2is convergent as x→∞.

Remark 3.1. By lemma 2.1, it is clear that the positive liner operators D∗n,qgiven by (2.3) preserve a linear functions, that is for φ(y) = cy + d, c, d ∈R(Real numbers), D∗n,q(φ;x) = φ(x) for all x ≥ 1

2n, n ∈ N.

Now, fix b > 12

and consider the lattice homomorphism Hb : C[0,∞] → C[0, b]

defined by Hb(f) = f∣∣[0,b]

for every f ∈ C[0,∞], where f∣∣[0,b]

denotes the restric-

tion of the domain of f to the interval [0, b]. In this case for each j = 0, 1, 2, wehave

limHb

(D∗n,q(ej)

)= Hb(ej) uniformly on

[12, b]. (3.1)

Thus, by using (3.1) and with the universal Korovkin-type property withrespect to the monotone operators. And hence we have the following Korovkin-type approximation result.

Theorem 3.2. Let D∗n,q(. ; .) be the operators defined by (2.3). Then for anyfunction f ∈ Cζ [0,∞) ∩H, ζ ≥ 2,

limn→∞

D∗n,q(f ;x) = f(x)

is uniformly on each compact subset of [0,∞), where x ∈[12, b], 1

2< b <∞.

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 27, NO.1, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

71 Alotaibi ET AL 66-76

Page 72: Journal of Computational Analysis and Applicationseudoxuspress.com/images/JOCAAA-VOL-27-2019-ISSUE-1.pdf · Volume 27, Number 1 July 15, 2019 . ISSN:1521-1398 PRINT,1572-9206 ONLINE

7

Proof. The proof is based on Lemma 2.1 and well known Korovkin’s theoremregarding the convergence of a sequence of linear and positive operators, so it isenough to prove the conditions

limn→∞

D∗n,q((tj;x) = xj, j = 0, 1, 2, as n→∞

uniformly on [0, 1].Clearly 1

[n]q→ 0 (n→∞) we have

limn→∞

D∗n,q(t;x) = x, limn→∞

D∗n,q(t2;x) = x2.

Which complete the proof.

We recall the weighted spaces of the functions on R+, which are defined asfollows:

Pρ(R+) = f :| f(x) |≤Mfρ(x) ,Qρ(R+) =

f : f ∈ Pρ(R+) ∩ C[0,∞)

,

Qkρ(R+) =

f : f ∈ Qρ(R+) and lim

x→∞

f(x)

ρ(x)= k(k is a constant)

,

where ρ(x) = 1 + x2 is a weight function and Mf is a constant depending only

on f . Note that Qρ(R+) is a normed space with the norm ‖ f ‖ρ= supx≥0|f(x)|ρ(x)

.

Lemma 3.3. ([3]) The linear positive operators Ln, n ≥ 1 act from Qρ(R+) →Pρ(R+) if and only if

‖ Ln(ϕ;x) ‖≤ Kϕ(x),

where ϕ(x) = 1 + x2, x ∈ R+ and K is a positive constant.

Theorem 3.4. ([3]) Let Lnn≥1 be a sequence of positive linear operators actingfrom Qρ(R+)→ Pρ(R+) and satisfying the condition

limn→∞

‖ Ln(ρτ )− ρτ ‖ϕ= 0, τ = 0, 1, 2.

Then for any function f ∈ Qkρ(R+), we have

limn→∞

‖ Ln(f ;x)− f ‖ϕ= 0.

Theorem 3.5. Let D∗n,q(. ; .) be the operators defined by (2.3). Then for each

function f ∈ Qkρ(R+) we have

limn→∞

‖ D∗n,q(f ;x)− f ‖ρ= 0.

Proof. From Lemma 2.1 and Theorem 3.4 for τ = 0, the first condition is fulfilled.Therefore

limn→∞

‖ D∗n,q(1;x)− 1 ‖ρ= 0.

Similarly From Lemma 2.1 and Theorem 3.4 for τ = 1, 2 we have that

supx∈[0,∞)

| D∗n,q(t;x)− x |1 + x2

≤ 1

2[n]qsup

x∈[0,∞)

1

1 + x2

=1

2[n]q,

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 27, NO.1, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

72 Alotaibi ET AL 66-76

Page 73: Journal of Computational Analysis and Applicationseudoxuspress.com/images/JOCAAA-VOL-27-2019-ISSUE-1.pdf · Volume 27, Number 1 July 15, 2019 . ISSN:1521-1398 PRINT,1572-9206 ONLINE

8

which imply that

limn→∞

‖ D∗n,q(t;x)− x ‖ρ= 0.

supx∈[0,∞)

| D∗n,q(t2;x)− x2 |1 + x2

≤ | [1 + 2µ]q − 1 |[n]q

supx∈[0,∞)

x

1 + x2

+1

4[n]2q| [1 + 2µ]q − 1 | sup

x∈[0,∞)

1

1 + x2

which imply that

limn→∞

‖ D∗n,q(t2;x)− x2 ‖ρ= 0.

This complete the proof.

4. Rate of Convergence

Here we calculate the rate of convergence of operators (2.3) by means ofmodulus of continuity and Lipschitz type maximal functions.

Let f ∈ CB[0,∞], the space of all bounded and continuous functions on[0,∞) and x ≥ 1

2n, n ∈ N. Then for δ > 0, the modulus of continuity of f

denoted by ω(f, δ) gives the maximum oscillation of f in any interval of lengthnot exceeding δ > 0 and it is given by

ω(f, δ) = sup|t−x|≤δ

| f(t)− f(x) |, t ∈ [0,∞). (4.1)

It is known that limδ→0+ ω(f, δ) = 0 for f ∈ CB[0,∞) and for any δ > 0 one has

| f(t)− f(x) |≤(| t− x |

δ+ 1

)ω(f, δ). (4.2)

Theorem 4.1. Let D∗n,q(. ; .) be the operators defined by (2.3). Then for f ∈CB[0,∞), x ≥ 1

2nand n ∈ N we have

| D∗n,q(f ;x)− f(x) |≤ 2ω (f ; δn,x) ,

where CB[0,∞) is the space of uniformly continuous bounded functions on R+,ω(f, δ) is the modulus of continuity of the function f ∈ CB[0,∞) defined in (4.1)and

δn,x =

√[1 + 2µ]q

x

[n]q− 1

4[n]2q(2[1 + 2µ]q − 1). (4.3)

Proof. We prove it by using (4.1), (4.2) and Cauchy-Schwarz inequality we caneasily get

| D∗n,q(f ;x)− f(x) | ≤

1 +1

δ

(D∗n,q(t− x)2;x

) 12

ω(f ; δ)

if we choose δ = δn,x and by applying the result (2) of Lemma 2.2 complete theproof.

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 27, NO.1, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

73 Alotaibi ET AL 66-76

Page 74: Journal of Computational Analysis and Applicationseudoxuspress.com/images/JOCAAA-VOL-27-2019-ISSUE-1.pdf · Volume 27, Number 1 July 15, 2019 . ISSN:1521-1398 PRINT,1572-9206 ONLINE

9

Remark 4.2. For the operators Dn,q(. ; .) defined by (1.7) we may write that, forevery f ∈ CB[0,∞), x ≥ 0 and n ∈ N

| Dn,q(f ;x)− f(x) |≤ 2ω (f ;λn,x) , (4.4)

where by [4] we have

λn,x =√Dn,q((t− x)2;x) ≤

√[1 + 2µ]q

x

[n]q. (4.5)

Now we claim that the error estimation in Theorem 4.1 is better than thatof (4.4) provided f ∈ CB[0,∞) and x ≥ 1

2n, n ∈ N. Indeed, for x ≥ 1

2n, µ ≥ 1

2nand n ∈ N, it is guarantees that

D∗n,q((t− x)2;x) ≤ Dn,q((t− x)2;x), (4.6)

[1 + 2µ]qx

[n]q− 1

4[n]2q(2[1 + 2µ]q − 1) ≤ [1 + 2µ]q

x

[n]q. (4.7)

Which imply that√[1 + 2µ]q

x

[n]q− 1

4[n]2q(2[1 + 2µ]q − 1) ≤

√[1 + 2µ]q

x

[n]q. (4.8)

Now we give the rate of convergence of the operators D∗n,q(f ;x) defined in(2.3) in terms of the elements of the usual Lipschitz class LipM(ν).

Let f ∈ CB[0,∞), M > 0 and 0 < ν ≤ 1. The class LipM(ν) is defined as

LipM(ν) = f :| f(ζ1)− f(ζ2) |≤M | ζ1 − ζ2 |ν (ζ1, ζ2 ∈ [0,∞)) (4.9)

Theorem 4.3. Let D∗n,q(. ; .) be the operator defined in (2.3).Then for eachf ∈ LipM(ν), (M > 0, 0 < ν ≤ 1) satisfying (4.9) we have

| D∗n,q(f ;x)− f(x) |≤M (δn,x)ν2

where δn,x is given in Theorem 4.1.

Proof. We prove it by using (4.9) and Holder inequality.

| D∗n,q(f ;x)− f(x) | ≤ | D∗n,q(f(t)− f(x);x) |≤ D∗n,q (| f(t)− f(x) |;x)

≤ |MD∗n,q (| t− x |ν ;x) .

Therefore

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 27, NO.1, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

74 Alotaibi ET AL 66-76

Page 75: Journal of Computational Analysis and Applicationseudoxuspress.com/images/JOCAAA-VOL-27-2019-ISSUE-1.pdf · Volume 27, Number 1 July 15, 2019 . ISSN:1521-1398 PRINT,1572-9206 ONLINE

10

| D∗n,q(f ;x)− f(x) |

≤ M[n]q

eµ,q([n]qr[n]q(x))

∞∑k=0

([n]qr[n]q(x))k

γµ,q(k)

∣∣∣∣1− q2µθk+k1− qn− x∣∣∣∣νdt

≤ M[n]q

eµ,q([n]qr[n]q(x))

∞∑k=0

(([n]qr[n]q(x))k

γµ,q(k)

) 2−ν2

×(

([n]qr[n]q(x))k

γµ,q(k)

) ν2∣∣∣∣1− q2µθk+k1− qn

− x∣∣∣∣νdt

≤ M

(n

eµ,q([n]qr[n]q(x))

∞∑k=0

([n]qr[n]q(x))k

γµ,q(k)dt

) 2−ν2

×

([n]q

eµ,q([n]qr[n]q(x))

∞∑k=0

([n]qr[n]q(x))k

γµ,q(k)

∣∣∣∣1− q2µθk+k1− qn− x∣∣∣∣2dt

) ν2

= M(D∗n,q(t− x)2;x

) ν2 .

Which complete the proof.

Let CB[0,∞) denote the space of all bounded and continuous functions onR+ = [0,∞) and

C2B(R+) = g ∈ CB(R+) : g′, g′′ ∈ CB(R+), (4.10)

with the norm

‖ g ‖C2B(R+)=‖ g ‖CB(R+) + ‖ g′ ‖CB(R+) + ‖ g′′ ‖CB(R+), (4.11)

also

‖ g ‖CB(R+)= supx∈R+

| g(x) | . (4.12)

Theorem 4.4. Let D∗n,q(. ; .) be the operator defined in (2.3). Then for any

g ∈ C2B(R+) we have

| D∗n,q(f ;x)− f(x) |≤(− 1

2[n]q

)+δn,x2

‖ g ‖C2

B(R+),

where δn,x is given in Theorem 4.1.

Proof. Let g ∈ C2B(R+), then by using the generalized mean value theorem in the

Taylor series expansion we have

g(t) = g(x) + g′(x)(t− x) + g′′(ψ)(t− x)2

2, ψ ∈ (x, t).

By applying linearity property on D∗n,q, we have

D∗n,q(g, x)− g(x) = g′(x)D∗n,q ((t− x);x) +g′′(ψ)

2D∗n,q

((t− x)2;x

),

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 27, NO.1, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

75 Alotaibi ET AL 66-76

Page 76: Journal of Computational Analysis and Applicationseudoxuspress.com/images/JOCAAA-VOL-27-2019-ISSUE-1.pdf · Volume 27, Number 1 July 15, 2019 . ISSN:1521-1398 PRINT,1572-9206 ONLINE

11

which imply that

| D∗n,q(g;x)−g(x) |≤(− 1

2[n]q

)‖ g′ ‖CB(R+) +

([1 + 2µ]q

x[n]q− 1

4[n]2q(2[1 + 2µ]q − 1)

) ‖g′′‖CB(R+)

2.

From (4.11) we have ‖ g′ ‖CB [0,∞)≤‖ g ‖C2B [0,∞).

| D∗n,q(g;x)−g(x) |≤(− 1

2[n]q

)‖ g ‖C2

B(R+) +(

[1 + 2µ]qx

[n]q− 1

4[n]2q(2[1 + 2µ]q − 1)

) ‖g‖C2B

(R+)

2.

This completes the proof from 2 of Lemma 2.2.

AcknowledgementThis project was funded by the Deanship of Scientific Research (DSR) at KingAbdulaziz University, Jeddah, under grant no. G-312-130-38. The authors, there-fore, acknowledge with thanks DSR for technical and financial support.

References

[1] S.N. Bernstein, Demonstration du theoreme de Weierstrass fondee sur le calcul des prob-abilites, Commun. Soc. Math. Kharkow, 2(13) (2012), 1–2.

[2] B. Cheikh, Y. Gaied, M. Zaghouani, A q-Dunkl-classical q-Hermite type polynomials,Georgian Math. J., 21(2) (2014), 125–137.

[3] A. D. Gadzhiev, The convergence problem for a sequence of positive linear operators onunbounded sets and theorems analogues to that of PP Korovkin. Soviet MathematicsDoklady, 15(5) (1974), 1453-1436.

[4] G. Icoz, B. Cekim, Dunkl generalization of Szasz operators via q-calculus, Jour. Ineq.Appl., 284:(2015), 2015.

[5] A. Lupas, A q-analogue of the Bernstein operator, In Seminar on Numerical and StatisticalCalculus, University of Cluj-Napoca, Cluj-Napoca 9 (1987), 85–92.

[6] N.I. Mahmudov, V. Gupta, On certain q-analogue of Szasz Kantorovich operators, J. Appl.Math. Comput., 37 (2011), 407–419.

[7] M. Mursaleen, K.J. Ansari, Approximation of q-Stancu-Beta operators which preserve x2,Bull. Malaysian Math. Sci. Soc., DOI: 10.1007/s40840-015-0146-9.

[8] M. Mursaleen, A. Khan, Statistical approximation properties of modified q- Stancu-Betaoperators, Bull. Malays. Math. Sci. Soc. (2), 36(3) (2013), 683–690.

[9] M. Mursaleen, A. Khan, Generalized q-Bernstein-Schurer operators and some approxima-tion theorems, Jour. Function Spaces Appl., Volume (2013), Article ID 719834, 7 pages.

[10] M. Mursaleen, Faisal Khan, Asif Khan, Approximation properties for modified q-bernstein-kantorovich operators, Numerical Functional Analysis and Optimization, 36(9) (2015)1178–1197.

[11] M. Mursaleen, Faisal Khan, Asif Khan, Approximation properties for King’s type modifiedq-Bernstein-Kantorovich operators, Math. Meth. Appl. Sci., 38 (2015) 5242–5252.

[12] M. Orkcu, O. Dogru, Weighted statistical approximation by Kantorovich type q-SzaszMirakjan operators, Appl. Math. Comput., 217 (2011), 7913–7919.

[13] M. Orkcu, O. Dogru, q-Szasz-Mirakyan-Kantorovich type operators preserving some testfunctions, Applied Mathematics Letters 24 (2011), 1588-1593.

[14] G.M. Phillips, Bernstein polynomials based on the q- integers, Ann. Numer. Math., 4(1997), 511–518.

[15] M. Rosenblum, Generalized Hermite polynomials and the Bose-like oscillator calculus,Oper. Theory, Adv. Appl., 73 (1994), 369–396.

[16] S. Sucu, Dunkl analogue of Szasz operators, Appl. Math. Comput., 244 (2014), 42–48.[17] O. Szasz, Generalization of S. Bernstein’s polynomials to the infinite interval, J. Res. Natl.

Bur. Stand., 45 (1950), 239–245.

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 27, NO.1, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

76 Alotaibi ET AL 66-76

Page 77: Journal of Computational Analysis and Applicationseudoxuspress.com/images/JOCAAA-VOL-27-2019-ISSUE-1.pdf · Volume 27, Number 1 July 15, 2019 . ISSN:1521-1398 PRINT,1572-9206 ONLINE

Pointwise error estimates for spherical hybrid interpolation ∗

Chunmei Ding Ming Li Feilong Cao

Department of Applied Mathematics, College of Sciences, China Jiliang University,Hangzhou 310018, Zhejiang Province, P R China.

E-mail: [email protected]

Abstract

This paper studies pointwise error estimates for spherical hybrid interpolation, which com-bines spherical polynomials together with spherical radial basis functions constructed by astrictly positive definite zonal kernel. The study is first carried out in the native space asso-ciated with the kernel, and then refined error estimates for a target function in a still smallerspace are established.

MSC(2000): 41A17, 41A30Keywords: Sphere; Interpolation; Approximation; Pointwise Error

1 Introduction

In recent years, fitting a surface to scattered data arising from sampling an unknown functiondefined on an underlying manifold comes up frequently in applied problems. If the underlyingmanifold is S2, the unit sphere embedded in the Euclidean space R3, then there are applications toastrophysics, meteorology, geodesy, geophysics and other areas (see [5, 6, 27]). Amongst approach-es for scattered data interpolation and approximation on S2, many authors have used sphericalpolynomials or spherical radial basis functions (see [5, 6, 9, 12, 18, 20, 25, 26, 27, 13, 2]). Moti-vated by the fact that the spherical radial basis functions are helpful to handle scattered data andrapid changes, at the same time, the spherical polynomials contribute to handle the slowly varyinglarge-scale features, a hybrid interpolation scheme was given in [23].

The hybrid interpolation scheme combines spherical radial basis functions together with spher-ical polynomials, that is a little different from interpolation by radial basis functions constructedfrom conditionally positive definite kernels (in which case a polynomial part is needed to make thetheory work, see [8]). Sloan and Sommariva [23] restricted their attention to the case of strictlypositive definite kernels, so that the polynomial component is voluntary rather than forced.

This paper studies the hybrid interpolation problem in an appropriate native space Nφ ofcontinuous functions on S2, which is defined by an underlying strictly positive definite kernel φ.We use the method in [23] to get the pointwise error estimate for the hybrid interpolation.

It is known that if φ is smooth, the native space Nφ is small in the sense that it is composedof very smooth functions. That is so called “native space barrier” problem and there are severalliteratures focus on it. We refer the readers to [10, 11, 15, 16, 17] for more details. In this paper,we combine the approach which was used by Levesley and Sun in [10] with the techniques in [24],and embed the smooth radial basis functions in a larger native space generated by a less smoothkernel ψ and still use the hybrid interpolation associated with the smooth kernel φ to interpolatethe target function from the larger native space. In the process of obtaining the correspondingerror estimates, we will use the “norming set” method developed by Jetter in [9] and a special caseof the general Bernstein-type inequality established by Ditzian [4].

This paper is organized as follows. In Section 2, we give some notations and preliminary results.The hybrid interpolation is introduced and the crucial condition for the scheme to be well defined

∗Supported by the National Natural Science Foundation of China (No. 61672477)

1

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 27, NO.1, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

77 Chunmei Ding ET AL 77-84

Page 78: Journal of Computational Analysis and Applicationseudoxuspress.com/images/JOCAAA-VOL-27-2019-ISSUE-1.pdf · Volume 27, Number 1 July 15, 2019 . ISSN:1521-1398 PRINT,1572-9206 ONLINE

C. Ding et al.: Pointwise error estimates for spherical hybrid interpolation

and discussed in Subsection 2.2, and native space and Sobolev space are introduced in Subsection2.3. Finally, the pointwise errors are estimated in Section 3.

In the following, we adopt the following convention regarding symbols. Let C be a positiveconstant, whose value will be different at different occurrence even within the same formula. Thesymbol A ∼ B means that there exist positive constant C1 and C2 such that C1B ≤ A ≤ C2B.

2 Preliminaries

Let S2 be the unit sphere embedded in the Euclidean space R3, i.e.,

S2 :=x := (x1, x2, x3) ∈ R3 : x21 + x22 + x23 = 1

.

For integer l ≥ 0, the restriction to S2 of a homogeneous harmonic polynomial with degree l iscalled a spherical harmonic of degree l. The class of all spherical harmonics with degree l is denotedby Hl, and it is well know that spherical harmonics of different degrees are orthogonal with respectto the L2(S2) inner product

〈f, g〉 :=

∫S2f(x)g(x)dω(x),

where dω denotes surface measure on S2. Hence, if we choose an orthogonal basis Yl,k : k =1, . . . , 2l + 1 for each Hl, then the set Yl,k : l = 0, 1, . . . , k = 1, . . . , 2l + 1 is an orthogonalbasis for L2(S2). The class of all spherical harmonics with total degree l ≤ L is denoted by PL.

Of course, PL =⊕L

l=0Hl, and the dimension of Hl is 2l + 1 and that of PL is (L+ 1)2.We denote by Lp(S2) the space of p-integrable functions on S2 endowed with the norms

‖f‖∞ := ‖f‖L∞(S2) := ess supx∈S2|f(x)|, p =∞,

and

‖f‖p := ‖f‖Lp(S2) :=

∫S2|f(x)|pdω(x)

1/p

<∞, 1 ≤ p <∞.

The well known addition formula is given by (see [14])

2l+1∑k=1

Yl,k(x)Yl,k(y) =2l + 1

4πPl(x · y),

where Pl is the Legendre polynomial with degree l and dimension three, which is normalized suchthat Pl(1) = 1, and satisfies the orthogonality relation (see [14])∫ 1

−1Pk(t)Pj(t)dt =

2

2l + 1δk,j ,

where the symbol δk,j denotes the usual Kronecker symbol.The addition formula also yields the following useful relation

2l+1∑k=1

|Yl,k(x)Yl,k(y)| ≤2l+1∑k=1

Y 2l,k(x) =

2l + 1

4π, x, y ∈ S2. (2.1)

2.1 Strictly positive definite kernel

Definition 2.1 (see [27]). A continuous and symmetric function φ : S2 × S2 −→ R is calledpositive definite kernel, if, for any N ∈ N+, α = (αi)i=1,...,N ∈ RN and x1, . . . , xN ⊂ S2, wehave

N∑i=1

N∑j=1

αiαjφ(xi, xj) ≥ 0.

When for any N distinct points x1, . . . , xN, the above quadratic form is positive for all α =(αi)i=1,...,N ∈ RN/0, then φ is called strictly positive definite kernel.

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 27, NO.1, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

78 Chunmei Ding ET AL 77-84

Page 79: Journal of Computational Analysis and Applicationseudoxuspress.com/images/JOCAAA-VOL-27-2019-ISSUE-1.pdf · Volume 27, Number 1 July 15, 2019 . ISSN:1521-1398 PRINT,1572-9206 ONLINE

C. Ding et al.: Pointwise error estimates for spherical hybrid interpolation

A kernel φ is called rotational invariant, if φ(ρx, ρy) = φ(x, y) for all x, y ∈ S2 and for allrotations ρ. It can be shown that a continuous rotational invariant kernel depends only on thedistance between x and y, that is, there is a function ϕ : [−1, 1] → R , such that ϕ(xy) = φ(x, y)for all x, y ∈ S2 (see [22]). Therefore, a rotational invariant kernel is also called a zonal kernel inthe literature.

Schoenberg characterized the positive definite zonal kernels in [21] and the notation of strictlypositive definiteness on spheres was first introduced by Xu and Cheney [28]. It is important tocharacterize all the strictly positive definite functions on spheres and such an endeavor has beentaken by Ron and Sun in [19]. In [3], Chen et al. established a necessary and sufficient conditionfor strictly positive definite zonal kernels: the kernel φ is strictly positive definite and zonal if andonly if

φ(x, y) =∞∑l=0

al

2l+1∑k=1

Yl,k(x)Yl,k(y) =∞∑l=0

(2l + 1)al4π

Pl(x · y),

with al ≥ 0 for all l,∑∞l=0 lal < ∞ and al > 0 for infinitely many even values of l and infinitely

many odd values of l.

2.2 The hybrid interpolation

Assume that we are given a strictly positive definite kernel φ(·, ·) and a set of distinct pointsX = x1, . . . , xN ⊂ S2. Then for a target function f ∈ C(S2) we can take the hybrid interpolationfor f in the form

IX,Lf =

N∑j=1

αjφ(·, xj) +

L∑l=0

2l+1∑k=1

βl,kYl,k,

where we fix L ≥ 0 as the desired degree of the polynomial component of the hybrid interpola-tion and the coefficients αjNj=1 , βl,kk=1,...,2l+1, l=0,...,L are determined by the interpolationconditions

IX,Lf(xi) = f(xi), i = 1, . . . , N, (2.2)

and also (in order to give a square linear system) the side conditions

N∑j=1

αjp(xj) = 0, ∀p ∈ PL.

In order to give the conditions which will make sure that the interpolation is exist and unique,we shall impose a condition on the point set X.

Definition 2.2 (see [23, Definition 3.1]). The set X = x1, . . . , xN ⊂ S2 is said to be PL-unisolvent if

p ∈ PL, p(xj) = 0 for j = 1, . . . , N ⇒ p = 0.

For the analysis of the interpolation error in the later sections it is convenient to define afinite-dimensional space VX,L within the interpolation IX,Lf lies.

VX,L :=

N∑j=1

αjφ(·, xj) + q : q ∈ PL, αj ∈ R for j = 1, . . . , N, andN∑j=1

αjp(xj) = 0, ∀p ∈ PL.

The following Theorem 2.1 gives a crucial condition for the interpolation to be well defined,whose proof can be find in [23].

Theorem 2.1 Let φ(·, ·) be a strictly positive definite kernel, let L ≥ 0 and X = x1, . . . , xN ⊂ S2be a set of distinct points which is PL -unisolvent. Then for each f ∈ C(S2) there exists a uniqueIX,Lf ∈ VX,L that satisfies the interpolation conditions in (2.2).

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 27, NO.1, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

79 Chunmei Ding ET AL 77-84

Page 80: Journal of Computational Analysis and Applicationseudoxuspress.com/images/JOCAAA-VOL-27-2019-ISSUE-1.pdf · Volume 27, Number 1 July 15, 2019 . ISSN:1521-1398 PRINT,1572-9206 ONLINE

C. Ding et al.: Pointwise error estimates for spherical hybrid interpolation

2.3 Native space and Sobolev space

Here and in the other sections we assume that the strictly positive definite kernel φ is zonal andhas the expansion

φ(x, y) =∞∑l=0

al

2l+1∑k=1

Yl,k(x)Yl,k(y) (2.3)

with al > 0 for all l,∑∞l=0 lal < ∞, in which case the series of the right side in (2.3) converges

uniformly for x, y ∈ S2.For f, g ∈ L2(S2), they can be represented by their Fourier series

f =∞∑l=0

2l+1∑k=1

fl,kYl,k, g =∞∑l=0

2l+1∑k=1

gl,kYl,k,

respectively. With respect to the inner product expressed as (see [27])

(f, g)Nφ =∞∑l=0

2l+1∑k=1

fl,kgl,kal

,

the native space Nφ, which is the subspace of L2(S2), can be defined by

Nφ :=

f ∈ L2(S2) : ‖f‖2Nφ =

∞∑l=0

2l+1∑k=1

|fl,k|2

al<∞

.

It is easy to verify that the native space Nφ is a reproducing kernel Hilbert space with reproducingkernel φ(·, ·), that is,

(f, φ(·, x))Nφ = f(x), x ∈ S2, f ∈ Nφ.

When al ∼ (l + 1)−2s for l = 0, 1, . . . , the native space Nφ is norm equivalent to the Sobolevspace Hs:

Hs :=

f ∈ L2(S2) : ‖f‖2Hs =

∞∑l=0

2l+1∑k=1

(l + 1)2s|fl,k|2 <∞

,

and the Sobolev embedding theorem in [7] implies that if s > 1, then the space Hs is continuouslyembedded in C(S2), so that Hs is a reproducing kernel Hilbert space.

3 Pointwise error estimates

As we can see that the uniqueness result in Theorem 2.1 ensures the existence and uniqueness ofthe lagrangians lj := lj,X,L : S2 → R, which is defined by

lj ∈ VX,L, lj(xi) = δi,j , i, j = 1, . . . , N.

The following Theorem 3.1 is a little different from the obtained result in [23] and it is thedifference that helps us to extend the error estimates for hybrid interpolation to Lp norm in thenext section.

Theorem 3.1 Let φ ∈ C(S2 × S2) be a strictly positive definite kernel defined in (2.3), and letX = x1, . . . , xN ⊂ S2 be a PL-unisolvent set of distinct points on S2. For f ∈ Nφ, let IX,Lf ∈VX,L be the hybrid interpolation defined in Section 2.2. Then for a fixed x ∈ S2, we have

|f(x)− IX,Lf(x)| ≤ ‖f − IX,Lf‖NφPφ,X,L(x),

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 27, NO.1, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

80 Chunmei Ding ET AL 77-84

Page 81: Journal of Computational Analysis and Applicationseudoxuspress.com/images/JOCAAA-VOL-27-2019-ISSUE-1.pdf · Volume 27, Number 1 July 15, 2019 . ISSN:1521-1398 PRINT,1572-9206 ONLINE

C. Ding et al.: Pointwise error estimates for spherical hybrid interpolation

where Pφ,X,L is the power function defined by

Pφ,X,L(x) =

φ(x, x)− 2N∑j=1

lj(x)φ(x, xj) +N∑i=1

N∑j=1

li(x)lj(x)φ(xi, xj)

1/2

.

Proof. With the help of the reproducing property of φ, we can rewrite the form of IX,Lf as

IX,Lf(x) =N∑j=1

f(xj)lj(x) =N∑j=1

(f, φ(·, xj))Nφ lj(x) =

f, N∑j=1

φ(·, xj)lj(x)

, x ∈ S2.

Since we also have f(x) = (f, φ(·, x))Nφ , x ∈ S2, from the reproducing property of φ, for IX,Lf ∈VX,L, we have, since VX,L ⊂ Nφ,IX,Lf, φ(·, x)−

N∑j=1

φ(·, xj)lj(x)

= IX,Lf(x)−N∑j=1

lj(x)IX,Lf(xj) = 0,

here the Lagrange representation of IX,Lf ∈ VX,L ensures that

N∑j=1

lj(x)IX,Lf(xj) = IX,Lf(x), ∀x ∈ S2.

So the pointwise error turns into

f(x)− IX,Lf(x) =

f − IX,Lf, φ(·, x)−N∑j=1

φ(·, xj)lj(x)

, (3.4)

and by the Cauchy-Schwarz inequality, we have

|f(x)− IX,Lf(x)| ≤ ‖f − IX,Lf‖NφPφ,X,L(x), x ∈ S2,

where Pφ,X,L is the power function defined by

Pφ,X,L(x) =

∥∥∥∥∥∥φ(·, x)−N∑j=1

φ(·, xj)lj(x)

∥∥∥∥∥∥Nφ

, x ∈ S2.

On using the definition ‖ · ‖ = (·, ·)1/2Nφ and the reproducing property of φ, the power function turnsinto

Pφ,X,L(x) =

φ(x, x)− 2N∑j=1

lj(x)φ(x, xj) +N∑i=1

N∑j=1

li(x)lj(x)φ(xi, xj)

1/2

,

completing the proof of Theorem 3.1.The following Lemma 3.1 is taken from [27] and it is also established by Sloan and Sommariva

in [23].

Lemma 3.1 (see [23, Lemma 5.3]). Let φ ∈ C(S2 × S2) be a strictly positive definite kernel onS2, and assume that X = x1, . . . , xN ⊂ S2 is a PL- unisolvent set of distinct points on S2. Fora fixed x ∈ S2, we define the quadratic functional Lx : RN → R by

Lx(α) := φ(x, x)− 2N∑j=1

αjφ(x, xj) +N∑i=1

N∑j=1

αiαjφ(xi, xj), α = (α1, . . . , αN ).

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 27, NO.1, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

81 Chunmei Ding ET AL 77-84

Page 82: Journal of Computational Analysis and Applicationseudoxuspress.com/images/JOCAAA-VOL-27-2019-ISSUE-1.pdf · Volume 27, Number 1 July 15, 2019 . ISSN:1521-1398 PRINT,1572-9206 ONLINE

C. Ding et al.: Pointwise error estimates for spherical hybrid interpolation

Then the minimum of Lx(α) on the set

Mx,L :=

α ∈ RN :N∑j=1

αjp(xj) = p(x), ∀p ∈ PL

,

is achieved by the vector (l1(x), . . . , lN (x)), that is, Lx(l1(x), . . . , lN (x)) ≤ Lx(α), for all α ∈Mx,L.

Follows from Theorem 3.1 and 3.1, we can easily obtain the next Theorem 3.2.

Theorem 3.2 Under the conditions of Theorem 3.1, for a fixed x ∈ S2, we have

|f(x)− IX,Lf(x)| ≤ ‖f − IX,Lf‖Nφ (Lx(α))1/2

,

for any real number αj := αj(x), j = 1, . . . , N , such that∑Nj=1 αjp(xj) = p(x), for all p ∈ PL,

and

Lx(α) := φ(x, x)− 2N∑j=1

αjφ(x, xj) +N∑i=1

N∑j=1

αiαjφ(xi, xj).

The error estimates are general expressed in terms of the mesh norm of X = x1, . . . , xN ⊂ S2,which is defined by

hX := supx∈S2

infxj∈X

d(x, xj),

where d(x, xj) = arccos(x · xj) is the geodesic distance between xj and x.Next, we state the following Lemma 3.2, whose proof can be found in [27, Corollary 17.12].

Lemma 3.2 Suppose that X = x1, . . . , xN ⊂ S2 has mesh norm hX ≤ 12L for some integer

L ≥ 1. Then there exist functions αj : S2 → R for j = 1, . . . , N such that

(i)∑Nj=1 αj(x)p(xj) = p(x), ∀p ∈ PL, ∀x ∈ S2,

(ii)∑Nj=1 |αj(x)| ≤ 2, ∀x ∈ S2.

With the above obtained results we can provide the following crucial result about the pointwiseerror estimate for the hybrid interpolation.

Theorem 3.3 Let φ ∈ C(S2 × S2) be a strictly positive definite kernel defined by (2.3) and al ∼(l + 1)−2s, s > 1. Assume that integer L ≥ 1 and that X = x1, . . . , xN ⊂ S2 is a set of distinctpoints on S2 with mesh norm 1/(2L + 2) < hX ≤ 1/(2L). For f ∈ Nφ, let IX,Lf ∈ VX,L be thehybrid interpolation defined in Section 2.2. Then for a fixed x ∈ S2, we have

|f(x)− IX,Lf(x)| ≤ Chs−1X ‖f − IX,Lf‖Nφ .

Proof. Because hX ≤ 12L , it follows that for each x ∈ S2 there exists α = α(x) ∈ RN satisfying

(i) and (ii) in Lemma 3.2. For (i), it means that a polynomial p ∈ PL that vanishes at x1, . . . , xNmust vanish identically, which verify that X = x1, . . . , xN ⊂ S2 is a PL -unisolvent set of distinct

points on S2. By using Theorem 3.2, we only have to give the estimate of the factor(Lx(α)

)1/2,

Lx(α) := φ(x, x)− 2N∑j=1

αjφ(x, xj) +N∑i=1

N∑j=1

αiαjφ(xi, xj)

=1

∞∑l=0

(2l + 1)al

[Pl(x · x)−

N∑j=1

αjPl(x · xj)−N∑j=1

αj(Pl(x · xj)−

N∑i=1

αiPl(xi · xj))],

in which the terms with l ≤ L vanish by property (i) of Lemma 3.2. Hence

Lx(α) :=1

∞∑l=L+1

(2l + 1)al

(Pl(x · x)− 2

N∑j=1

αjPl(x · xj) +N∑i=1

N∑j=1

αiαjPl(xi · xj)),

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 27, NO.1, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

82 Chunmei Ding ET AL 77-84

Page 83: Journal of Computational Analysis and Applicationseudoxuspress.com/images/JOCAAA-VOL-27-2019-ISSUE-1.pdf · Volume 27, Number 1 July 15, 2019 . ISSN:1521-1398 PRINT,1572-9206 ONLINE

C. Ding et al.: Pointwise error estimates for spherical hybrid interpolation

and since |Pl(z)| ≤ 1,∑Nj=1 |αj | ≤ 2 and al ∼ (l + 1)−2s, we have

|Lx(α)| ≤ 1

∞∑l=L+1

(2l + 1)al

1 + 2N∑j=1

|αj |+N∑i=1

N∑j=1

|αi||αj |

≤ C

∞∑l=L+1

(2l + 1)al ≤ C∞∑

l=L+1

(l + 1)−2s+1

≤ C

∫ ∞L

(x+ 1)−2s+1dx = C(L+ 1)−2s+2 ≤ Ch2s−2X .

With the help of Theorem 3.2, we see that

|f(x)− IX,Lf(x)| ≤ Chs−1X ‖f − IX,Lf‖Nφ .

This completes the proof of Theorem 3.3.

References

[1] S. C. Brenner, R. L. Scott, The Mathematical Theory of Finite Element Methods, Springer,New York, 1994.

[2] F. Cao, M. Li, Spherical data fitting by multiscale moving least squares, Applied Math. Model.,39 (2015) 3448-3458.

[3] D. Chen, V. A. Menegatto, X. Sun, A necessary and sufficient condition for strictly positivedefinite functions on spheres, Proc. Amer. Math. Soc., 131 (2003) 2733-2740.

[4] Z. Ditzian, Fractional derivatives and best approximation, Acta. Math. Hungar., 81 (1998)323-348.

[5] G. E. Fasshauer, L. L. Schumaker, Scattered data fitting on the sphere, in MathematicalMethods for Curves and Surfaces II (M. Dælen, T. Lyche, and L. L. Schumaker, eds. ),Vanderbilt University Press, Nashville, TN, (1998) 117-166.

[6] W. Freeden, T. Gervens, M. Schreiner, Constructive Approximation on the Sphere, OxfordUniversity Press Inc., New York, 1998.

[7] P. B. Gilkey, The Index Theorem and the Heat Equation, Publish or Perish, Boston, MA,1974.

[8] M. v. Golitschek, W. A. Light, Interpolation by polynomials and radial basis functions onspheres, Constr. Approx., 17 (2001) 1-18.

[9] K. Jetter, J. Stockler, J. D. Ward, Error estimates for scattered data interpolation on spheres,Math. Comp., 68 (1999) 733-747.

[10] J. Levesley, X. Sun, Approximation in rough native spaces by shifts of smooth kernels onspheres, J. Approx. Theory, 133 (2005) 269-283.

[11] J. Levesley, X. Sun, Corrigendum to and two open questions arising from the article “Approx-imation in rough native spaces by shifts of smooth kernels on spheres” [J. Approx. Theory,133 (2005) 269-283], J. Approx. Theory, 138 (2006) 124-127.

[12] Q. T. Le Gia, F. J. Narcowich, J. D. Ward, H. Wendland, Continuous and discrete least-squares approximation by radial basis functions on spheres, J. Approx. Theory, 143 (2006)124-133.

[13] M. Li, F. L. Cao, Local uniform error estimates for spherical basis functions interpolation,Math. Meth. Applied Sci., 37 (2014) 1364-1376.

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 27, NO.1, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

83 Chunmei Ding ET AL 77-84

Page 84: Journal of Computational Analysis and Applicationseudoxuspress.com/images/JOCAAA-VOL-27-2019-ISSUE-1.pdf · Volume 27, Number 1 July 15, 2019 . ISSN:1521-1398 PRINT,1572-9206 ONLINE

C. Ding et al.: Pointwise error estimates for spherical hybrid interpolation

[14] C. Muller, Spherical Harmonics, Lecture Notes in Mathematics, Vol. 17, Springer-Verlag,Berlin, 1966.

[15] F. J. Narcowich, R. Schaback, J. D. Ward, Approximation in Sobolev spaces by kernel expan-sions, J. Approx. Theory, 114 (2002) 70-83.

[16] F. J. Narcowich, J. D. Ward, Scattered data interpolation on spheres: Error estimates andlocally supported basis functions, SIAM J. Math. Anal., 33 (2002) 1393-1410.

[17] F. J. Narcowich, X. Sun, J. D. Ward, H. Wendland, Direct and inverse sobolev error estimatesfor scattered data interpolation via spherical basis functions, Found. Comput. Math., (2007)369-390.

[18] F. J. Narcowich, X. Sun, J. D. Ward, Approximation power of RBFs and their associatedSBFs: A connection, Adv. Comput. Math., 27 (2007) 107-124.

[19] A. Ron, X. Sun, Strictly positive definite functions on spheres in Enclidean spaces, Math.Comp., 65 (1996) 1513-1530.

[20] R. Schaback, Improved error bounds for scattered data interpolation by radial basis functions,Math. Comp., 68 (1999) 201-216.

[21] I. J. Schoenberg, Positive definite functions on spheres, Duke Math. J., 9 (1942) 96-108.

[22] E. M. Stein, G. Weiss, Introduction to Fourier Analysis on Euclidean Spaces, Princeton Uni-versity Press, Princetion, NJ, 1971.

[23] I. H. Sloan, A. Sommariva, Approximation on the sphere using radial basis function pluspolynomials, Adv. Comput. Math., 29 (2008) 147-177.

[24] I. H. Sloan, H. Wendland, Inf-sup condition for spherical polynomials and radial basis functionson spheres, Math. Comp., 78 (2009) 1319-1331.

[25] I. H. Sloan, Polynomial interpolation and hyperinterpolation over general regions, J. Approx.Theory, 83 (1995) 238-254.

[26] I. H. Sloan, R. S. Womersley, Constructive polynomial approximation on the sphere, J. Ap-prox. Theory, 103 (2000) 91-118.

[27] H. Wendland, Scattered Data Approximation, Cambridge University Press, Cambridge, Uk,2005.

[28] Y. Xu, E. W. Cheney, Strictly positive definite functions on spheres, Proc. Amer. Math. Soc.,116 (1992) 977-981.

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 27, NO.1, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

84 Chunmei Ding ET AL 77-84

Page 85: Journal of Computational Analysis and Applicationseudoxuspress.com/images/JOCAAA-VOL-27-2019-ISSUE-1.pdf · Volume 27, Number 1 July 15, 2019 . ISSN:1521-1398 PRINT,1572-9206 ONLINE

INVESTIGATING DYNAMICS OF THE RATIONAL DIFFERENCE EQUATION

xn+1 =xn−1

A+Bxnxn−1

MALEK GHAZEL, TAHER S. HASSAN, AND AHMED M. MOSALLEM

Abstract. This paper is devoted to investigate the dynamics of the rational dierence equation

xn+1 =xn−1

A+Bxnxn−1

with arbitrary initial conditions A and B as nonzero real numbers. The solution is obtained and analyt-ical study and asymptotic behavior are investigated. The forbidden set is determined. The existence ofperiodic and oscillatory solutions are discussed. Our results are illustrated with numerical simulations.

1. Introduction

The study of dierence equation has been of great interest and many spectacular developments havebeen witnessed in the last decade. They are also used to present many numerical schemes in an easiestmanner [116]. This is largely due to the fact that it appears as direct mathematical models describingreal life situations in physics and engineering [5, 6], biology [8], game theory [7, 9, 10, 12, 13, 19] andeconomy [14, 15]. Therefore, the study of behavior and global stability of nonlinear dierence equationsis of paramount importance and rational dierence equations are one of the most practical classes ofequations. Immense literature is available on the second order dierence equations of the form

xn+1 =α+ βxn + γxn−1A+Bxn + Cxn−1

,

where α, β, γ, A, B and C and the initial conditions x−1, x0 are real numbers. In a particular case whenγ = C = 0, this equation is known as the rst order Riccati dierence equation which can also be written

in the form xn+1 = a +b

xn. The results such as Agarwal et al [17], investigated the global stability,

periodic nature and solved some particular cases of the dierence equation

xn+1 = a+dxn−lxn−kb− cxn−s

.

Elsayed [18] studied the dynamical behavior and gave the solution of the dierence equation

xn+1 =xn−5

±1± xn−2xn−5.

Aloqeili [11] found the solution of the dierence equation

xn+1 =xn−1

a− xnxn−1.

Cinar [20] determined the global stability and obtained the positive solutions of the following dierenceequation

xn+1 =axn−1

1 + bxnxn−1.

1991 Mathematics Subject Classication. 34K13, 34K05, 34K20, 39A10.

Key words and phrases. Rational dierence equations, Stability, Innite products, Forbidden set, Asymptotic behavior,Periodicity, Oscillation, Numerical Simulation.

1

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 27, NO.1, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

85 MALEK GHAZEL ET AL 85-103

Page 86: Journal of Computational Analysis and Applicationseudoxuspress.com/images/JOCAAA-VOL-27-2019-ISSUE-1.pdf · Volume 27, Number 1 July 15, 2019 . ISSN:1521-1398 PRINT,1572-9206 ONLINE

2 M. GHAZEL, T. S. HASSAN, AND A. M. MOSALLEM

Elabbasy et al [21, 22] obtained the solution in some particular cases and studied the global stability,periodicity of the following dierence equations

xn+1 = axn −bxn

cxn − dxn−1and xn+1 =

αxn−kβ + γΠk

p=0xn−p.

The problem of existence of solutions for a given dierence equation is of great importance. The primaryaim is to nd the set F of all initial values at which the solution of the given equation is not dened for allnatural number n. The set of this nature is called the forbidden set of the equation. In order to avoid theappearance of the forbidden set, the common assumption used by some authors, while studying rationaldierence equations, is to choose positive initial values and coecients. The interest of this problem hasincreased in the literature recently [2325]. Azizi [26] found the forbidden set of the second order rationalRiccati dierence equation. Also, Balibrea et al [27] gave sucient conditions for a rational dierenceequation of order two to be not uniformly eventually positive outside a bounded set. Camouzis et al [28]described the forbidden set of the dierence equation

xn+1 = p+xn−1xn

.

In [29] Sedaghat studied the existence of solutions of certain singular dierence equations. Stevic [30]studied the domains for which the solutions of some equations and systems of dierence equations arenot well-dened.

The study of existence of oscillatory solutions (periodic or aperiodic) of dierence equations is in agreat concern and it is extremely useful in the behavior of mathematical models describing real livesituations, for some results in this area. Ladas [31] studied the oscillation of positive solutions about thepositive steady state N in the delay logistic dierence equation

Nn+1 = Nn exp

r − r m∑j=0

pjNn−j

,

which describes that the population growth is not continuous but seasonal.Matti [32] studied the oscillations in some nonlinear economic relationships modeled by a dierenceequations. Sedaghat [33] studied the oscillations and chaos in a discrete model of combat. See alsorelated results [3437].

Motivated by above, in this paper, we will present complete analytical study and asymptotic behaviorof the solutions of the more general second order dierence equation

(1.1) xn+1 =xn−1

A+Bxnxn−1, x0 = c and x−1 = d,

with arbitrary parameters A and B. To the best of our knowledge, the analysis for convergence, oscil-lation and periodicity of equation (1.1) have not been considered till now and other results extend andimprove existing results in the literature, especially those established in [11,20].

Throughout the paper we use the convention that N = 0, 1, 2, . . . ,m∏

p=n

ap = 1 and

m∑p=n

ap = 0, where

(ap)p is a sequence of real numbers and m < n for m,n ∈ Z and the cases when AB = 0 and A+B 6= 0are trivial, therefore we will assume that A 6= 0 and B 6= 0.

2. Stability analysis of the equilibrium points

Before stating stability analysis of the equilibrium points, we begin with the following theorem whichwill given equilibrium points of Eq. (1.1).

Theorem 1. Let (xn)n≥−1 be a solution of Eq. (1.1).

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 27, NO.1, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

86 MALEK GHAZEL ET AL 85-103

Page 87: Journal of Computational Analysis and Applicationseudoxuspress.com/images/JOCAAA-VOL-27-2019-ISSUE-1.pdf · Volume 27, Number 1 July 15, 2019 . ISSN:1521-1398 PRINT,1572-9206 ONLINE

INVESTIGATING DYNAMICS 3

(1) If B(1−A) ≤ 0, then the Eq. (1.1) has a unique equilibrium point x1 = 0.(2) If B(1−A) > 0, then the Eq. (1.1) has exactly three equilibrium points

x1 = 0 and x2,3 = ±√

1−AB

.

Proof. Let x be a equilibrium point of Eq. (1.1). It is easy to see that

x = 0 or x2 =1−AB

.

This completes the proof.

Now, we will prove the following stability analysis of the equilibrium points for equation (1.1).

Theorem 2. Let (xn)n≥−1 be a solution of Eq. (1.1). Then:

(1) For A < 0, the characteristic equation about the equilibrium point x1 has no real roots.(2) For 0 < A < 1, the equilibrium point x1 is a repeller.(3) For A = 1, the equilibrium point x1 is nonhyperbolic.(4) For A > 1, the equilibrium point x1 is locally asymptotically stable.

Moreover, for B(1−A) > 0,

(i) The equilibrium points x2,3 are nonhyperbolic.(ii) If 0 < |A| < 1, then the equilibrium points x2,3 are unstable.

Proof. Denote by U := (u0, u1) an arbitrary point in the good set of Eq. (1.1) and x be an equilibriumpoint of Eq. (1.1), recall that the characteristic equation about the equilibrium point x is dened as

(2.2) λ2 − q0λ− q1 = 0,

where qk =∂F

∂uk(x, x), k = 0, 1 with F (u0, u1) =

u1A+Bu0u1

. Since the partial derivative of the function

F are

(2.3)∂F

∂u0=

−Bu1(A+Bu0u1)2

and∂F

∂u1=

A

(A+Bu0u1)2,

so, for the equilibrium point x1 = 0, the coecients of the characteristic equation are q0 =∂F

∂u0(0, 0) = 0

and q1 =∂F

∂u1(0, 0) =

1

A. Hence the characteristic equation about the equilibrium point x1 is

(2.4) λ2 − 1

A= 0.

Thus, we have the following cases:

(1) If A < 0, then the Eq. (2.4) has no real roots.

(2) If 0 < A < 1, then the real roots of Eq. (2.4) are ±√

1

A, their absolute values are greater than

one which implies that the equilibrium point x1 is a repeller.(3) If A = 1, then the real roots of Eq. (2.4) are ±1, so x1 is nonhyperbolic.(4) If A > 1, then all real roots of Eq. (2.4) have absolute value less than one, so x1 is locally

asymptotically stable.

In the case when B(1 − A) > 0, two new equilibrium points appear x2 and x3. According to theEq. (2.3), the coecients q0 and q1 of their characteristic equations are the same and they are given asq0 = A− 1 and q1 = A, so the characteristic equation about xk, k = 2, 3 is

λ2 − (A− 1)λ−A = 0,

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 27, NO.1, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

87 MALEK GHAZEL ET AL 85-103

Page 88: Journal of Computational Analysis and Applicationseudoxuspress.com/images/JOCAAA-VOL-27-2019-ISSUE-1.pdf · Volume 27, Number 1 July 15, 2019 . ISSN:1521-1398 PRINT,1572-9206 ONLINE

4 M. GHAZEL, T. S. HASSAN, AND A. M. MOSALLEM

which has −1 and A as real roots, then x2 and x3 are nonhyperbolic. Furthermore, if |A| < 1, then x2and x3 are unstable. This completes the proof.

3. Analytical expressions of (xn)n≥−1

In this section, we give some analytical expressions of the sequence (xn)n≥−1, where (xn)n≥−1 is asolution of Eq. (1.1).

Theorem 3. Let (xn)n≥−1 be a solution of Eq. (1.1). Then for all integer n ∈ N,

(3.5) x2n−1 = d

n−1∏p=0

A2p +Bcd

2p−1∑k=0

Ak

A2p+1 +Bcd

2p∑k=0

Ak

,

and

(3.6) x2n = cn−1∏p=0

A2p+1 +Bcd

2p∑k=0

Ak

A2p+2 +Bcd

2p+1∑k=0

Ak

.

Proof. We show it by induction. First we have

x−1 = d

−1∏p=0

A2p +Bcd

2p−1∑k=0

Ak

A2p+1 +Bcd

2p∑k=0

Ak

= d

and

x0 = c−1∏p=0

A2p+1 +Bcd

2p∑k=0

Ak

A2p+2 +Bcd

2p+1∑k=0

Ak

= c

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 27, NO.1, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

88 MALEK GHAZEL ET AL 85-103

Page 89: Journal of Computational Analysis and Applicationseudoxuspress.com/images/JOCAAA-VOL-27-2019-ISSUE-1.pdf · Volume 27, Number 1 July 15, 2019 . ISSN:1521-1398 PRINT,1572-9206 ONLINE

INVESTIGATING DYNAMICS 5

This shows that (3.5) and (3.6) hold for n = 0. Assume (3.5) and (3.6) hold with n replaced by somek ∈ N. From Eq. (1.1) we get

x2(k+1)−1 = x2k+1 =x2k−1

A+Bx2kx2k−1

=(dn−1∏p=0

(A2p +Bcd

2p−1∑k=0

Ak) n−1∏

p=0

(A2p+2 +Bcd

2p+1∑k=0

Ak))/

( n−1∏p=0

(A2p+1 +Bcd

2p∑k=0

Ak)

[A

n−1∏p=0

(A2p+2 +Bcd

2p+1∑k=0

Ak)

+Bcdn−1∏p=0

(A2p +Bcd

2p−1∑k=0

Ak)])

= dk∏

p=0

(A2p +Bcd

∑2p−1k=0 Ak

A2p+1 +Bcd∑2p

k=0Ak

).

and

x2(k+1) = x2k+1+1 =x2k

A+Bx2k+1x2k

=(ck−1∏p=0

(A2p+1 +Bcd

2p∑k=0

Ak) k∏

p=0

(A2p+1 +Bcd

2p∑k=0

Ak))/

( k∏p=1

(A2p +Bcd

2p−1∑k=0

Ak)

[A

k∏p=0

(A2p+1 +Bcd

2p∑k=0

Ak)

+Bcd

k−1∏p=0

(A2p+1 +Bcd

2p∑k=0

Ak)])

= ck∏

p=0

( A2p+1 +Bcd

2p∑k=0

Ak

A2p+2 +Bcd

2p+1∑k=0

Ak

).

This shows that (3.5) and (3.6) hold for k+ 1. Therefore, (3.5) and (3.6) hold for n ∈ N. This completesthe proof.

Corollary 4. Let (xn)n≥−1 be a solution of Eq. (1.1). Then:

(1) for A 6= 1,

(3.7) x2n−1 = dn−1∏p=0

(A− 1 +Bcd)A2p −Bcd(A− 1 +Bcd)A2p+1 −Bcd

,

and

x2n = cn−1∏p=0

(A− 1 +Bcd)A2p+1 −Bcd(A− 1 +Bcd)A2p+2 −Bcd

.

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 27, NO.1, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

89 MALEK GHAZEL ET AL 85-103

Page 90: Journal of Computational Analysis and Applicationseudoxuspress.com/images/JOCAAA-VOL-27-2019-ISSUE-1.pdf · Volume 27, Number 1 July 15, 2019 . ISSN:1521-1398 PRINT,1572-9206 ONLINE

6 M. GHAZEL, T. S. HASSAN, AND A. M. MOSALLEM

(2) for A = 1,

(3.8) x2n−1 = dn−1∏p=0

( 1 + 2pBcd

1 + (2p+ 1)Bcd

),

and

x2n = cn−1∏p=0

(1 + (2p+ 1)Bcd

1 + (2p+ 2)Bcd

).

Proof. It is sucient to use in the (3.5) and (3.6), the identity

p∑k=0

xk =1− xp+1

1− x,

where p is a nonnegative integer and x is a real numbers dierent of one, and the proof is directly obtained.

4. Main Results

4.1. The forbidden set. The determination of the set of all initial conditions through which the solutionof a given dierence equation is dened for all n ∈ N is in general a problem of great diculty. Thisproblem leads to introduce the notion of forbidden set.

Denition 1. Consider a dierence equation of order k in N

(4.9) xn+1 = F (xn, xn−1, ..., xn−(k−1)) for n ∈ N,

where F = F (u0, u1, ..., uk−1) is a function that maps on some subset Ω in Rk, and let (x0, x−1, . . . , x−k+1) ∈Ω be the vector of initial conditions of the Eq. (4.9). The forbidden set of Eq. (4.9) is the set denotedF dened as the set of all vectors of initial conditions (x0, x−1, ..., x−k+1) through which the solutionof Eq. (4.9) is not dened for all positive integer n. The good set G is the complementary in Ω of theforbidden set, consequently, the solution (xn)n of Eq. (4.9) is well dened for all n ∈ N if and only if(x0, x−1, ..., x−k+1) ∈ G.

When we obtain the analytic expression of the solution for a given dierence equation, the determina-tion of the forbidden set becomes more easy to obtain. However it can be gotten in some particular casesby the mean of substitution, in the following Theorem, we give the forbidden set in the case when A = 1.

Theorem 5. Let (xn)n≥−1 be a solution of the Eq. (1.1) and F be the forbidden set of the sequence

(xn)n≥−1. If A = 1, then

F =

(c, d) ∈ R2 such that cd ∈−1

nB, n ∈ N

.

Proof. The sequence (xn)n≥−1 satises the equation

Bxn+1xn =Bxnxn−1

A+Bxnxn−1, x−1 = d, x0 = c,

Hence,

(4.10) A+Bxn+1xn = A+ 1− A

A+Bxnxn−1.

Let (yn)n≥0 be the sequence dened as

(4.11) yn := A+Bxnxn−1,

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 27, NO.1, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

90 MALEK GHAZEL ET AL 85-103

Page 91: Journal of Computational Analysis and Applicationseudoxuspress.com/images/JOCAAA-VOL-27-2019-ISSUE-1.pdf · Volume 27, Number 1 July 15, 2019 . ISSN:1521-1398 PRINT,1572-9206 ONLINE

INVESTIGATING DYNAMICS 7

So the Eq. (4.10) can be written as

yn+1 = A+ 1− A

yn,

which is a rst order Ricatti dierence equation. If A = 1, then

yn+1 = 2− 1

ynfor n ∈ N.

Let n ∈ N, for yn to exist a necessary and sucient condition are that for all integer 0 ≤ k ≤ n − 1,yk 6= 0,

y0 6= 0 is equivalent to cd 6= −1

B,

y1 6= 0 is equivalent to y0 6= 0 and y0 6=1

2,

and

y2 6= 0 i y0 /∈

0,1

2,

2

3

.

By induction, we can easily prove that for all n ∈ N,

yn 6= 0 i for all k ≤ n+ 1, y0 6=k − 1

k.

So the forbidden set of the sequence Y = (yn)n≥0 is FY = n− 1

n, n ∈ N. Now, let n ∈ N, y0 =

n− 1

n

is equivalent to 1+Bcd =n− 1

nwhich is equivalent to cd =

−1

nB. Thus, the forbidden set of the sequence

(xn)n≥−1 is given by

F =

(c, d) ∈ R2 such that cd ∈−1

nB, n ∈ N

.

The proof is complete.

This results can be immediately found by using Corollary 4. Also, in the case when A 6= 1, theforbidden set F of Eq. (1.1) can be easily obtained by using Corollary 4 as in the following theorem.

Theorem 6. Let (xn)n≥−1 be a solution of the Eq. (1.1). Suppose that A 6= 1, then the forbidden set ofthe sequence (xn)n≥−1 is

F =

(c, d) ∈ R2 such that

A = −1 and cd =

1

Bor

A 6= −1 and cd ∈ (1−A)An

B(An − 1), n ∈ N

,

.

4.2. Convergence. In this section, we study the asymptotic behavior of a solution of the dierence Eq.(1.1).

4.2.1. The case when 0 < |A| < 1.

Theorem 7. Let (xn)n≥−1 be a solution of the Eq. (1.1). Assume that |A| < 1, then the subsequences(x2n−1) and (x2n) converge.

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 27, NO.1, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

91 MALEK GHAZEL ET AL 85-103

Page 92: Journal of Computational Analysis and Applicationseudoxuspress.com/images/JOCAAA-VOL-27-2019-ISSUE-1.pdf · Volume 27, Number 1 July 15, 2019 . ISSN:1521-1398 PRINT,1572-9206 ONLINE

8 M. GHAZEL, T. S. HASSAN, AND A. M. MOSALLEM

Proof. Using Corollary 4, we obtain

x2n−1 = dn−1∏p=0

(A− 1 +Bcd)A2p −Bcd(A− 1 +Bcd)A2p+1 −Bcd

= dn−1∏p=0

1− A−1+BcdBcd A2p

1− A−1+BcdBcd A2p+1

= dn−1∏p=0

Up,

where

Up :=1− αA2p

1− αA2p+1with α :=

A− 1 +Bcd

Bcd.

One of the following cases holds: For p big enough, Up is always is in (0, 1) or lies greater than one, thisallows us to apply of the Taylor expansion to the sequence (Up)p≥0 which gives that

Up is asymptotically equivalent to 1− α(A− 1)A2p,

which is the general term of convergent innite product, thus (x2n−1) converges.Again by using Corollary 4, we get

x2n = cn−1∏p=0

(A− 1 +Bcd)A2p+1 −Bcd(A− 1 +Bcd)A2p+2 −Bcd

= cn−1∏p=0

1− A−1+BcdBcd A2p+1

1− A−1+BcdBcd A2p+2

= c

n−1∏p=0

Tp,

where

Tp :=1− αA2p+1

1− αA2p+2with α =

A− 1 +Bcd

Bcd.

Hence,

Tp is asymptotically equivalent to 1− α(1−A)A2p+1,

the last term is the general term of convergent innite product, then (x2n)n converges. This completedthe proof.

4.2.2. The case when A = −1.

Lemma 8. Let (xn)n≥−1 be a solution of the Eq. (1.1). Assume that A = −1, then

(1) The subsequence (x2n−1)n converges i Bcd ∈ (−∞, 0) ∪ [2,∞).(2) The subsequence (x2n)n converges i Bcd ∈ (0, 2].

Proof. 1. Replacing A by −1 in Corollary (4), for the subsequence (x2n−1)n, we obtain

x2n−1 = d(−2

2− 2Bcd)n

=d

(Bcd− 1)n,

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 27, NO.1, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

92 MALEK GHAZEL ET AL 85-103

Page 93: Journal of Computational Analysis and Applicationseudoxuspress.com/images/JOCAAA-VOL-27-2019-ISSUE-1.pdf · Volume 27, Number 1 July 15, 2019 . ISSN:1521-1398 PRINT,1572-9206 ONLINE

INVESTIGATING DYNAMICS 9

then

(x2n−1)n converges i

|Bcd− 1| > 1,orBcd− 1 = 1,

the last system is equivalent to Bcd ∈ (−∞, 0) ∪ [2,∞).2. To prove the second part of the Theorem, we replace A by (−1) in Corollary (4) for the subse-

quence (x2n)n, we get

x2n = c(2Bcd− 2

−2

)n= c(1−Bcd)n,

then

(x2n)n converges i

|Bcd− 1| < 1,orBcd− 1 = 1,

the last system holds i Bcd ∈ (0, 2]. As a result, the proof is completed.

Remark 1. Using the computation in the proof of Lemma (8), we can easily deduce that when A = −1,we have

(1) If Bcd ∈ (−∞, 0) ∪ (2,∞), then (x2n−1) converges to zero and (|x2n|) goes to innity.(2) If Bcd ∈ (0, 2), then (|x2n−1|) goes to innity and (x2n) converges to zero.(3) If Bcd = 2, then the subsequences (x2n−1) and (x2n) are constant, x2n−1 = d and x2n = c.

The following theorem is now proved.

Theorem 9. Let (xn)n≥−1 be a solution of the Eq. (1.1). Assume that A = −1, then

The whole sequence (xn)n≥−1 converges i B > 0 and c = d = ±√

2

B.

In this case, (xn)n≥−1 is constant and equal ±√

2

B.

4.2.3. The case when A = 1.

Theorem 10. Let (xn)n≥−1 be a solution of the Eq. (1.1). Assume that A = 1, then (xn)n≥−1 convergesto zero.

Proof. Replacing A by 1, then by Eq. (3.8),

x2n−1 = d

n−1∏p=0

( 1 + 2pBcd

1 + (2p+ 1)Bcd

)= d

n−1∏p=0

Vp,

where (Vp)p≥1 is the sequence dened as

(4.12) Vp = 1− Bcd

1 + (2p+ 1)Bcd.

It can be easily veried that there exists a positive integer r0 such that for all p ≥ r0, we have Vp ∈ (0, 1).Therefore, if p is big enough, the x2n−1 is then written in innite series form as

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 27, NO.1, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

93 MALEK GHAZEL ET AL 85-103

Page 94: Journal of Computational Analysis and Applicationseudoxuspress.com/images/JOCAAA-VOL-27-2019-ISSUE-1.pdf · Volume 27, Number 1 July 15, 2019 . ISSN:1521-1398 PRINT,1572-9206 ONLINE

10 M. GHAZEL, T. S. HASSAN, AND A. M. MOSALLEM

(4.13) x2n−1 = d( r0−1∏

p=0

Vp

)exp

( n−1∑p=r0

lnVp

).

We have lnVp is equivalent to−1

2pwhich is a general term divergence innite series, since for all p ≥ r0

Vp ∈ (0, 1), then the innite series∑p≥r0

lnVp goes to −∞, consequently (x2n−1)n converges to zero.

Although the proof of the convergence of the subsequence (x2n)n to zero can be done similarly, we describein order to use its notations in the sequel, from Eq. (3.7), we can see that

x2n = cn−1∏p=0

(1 + (2p+ 1)Bcd

1 + (2p+ 2)Bcd

)= c

n−1∏p=0

Wp,

where (Wp)p≥0 is the sequence dened as

(4.14) Wp = 1− Bcd

1 + (2p+ 2)Bcd.

Similarly, it can be easily checked that there exist a positive integer s0 such that for all p ≥ s0, we haveWp ∈ (0, 1). Hence if p is big enough, the subsequence x2n is then written as

(4.15) x2n = c( s0−1∏

p=0

Wp

)exp

( n−1∑p=s0

lnWp

).

We have lnWp is equivalent to−1

2pwhich is a general term divergence innite series, since for all p ≥ s0

Wp ∈ (0, 1), then the innite series

n−1∑p=s0

lnWp goes to −∞, consequently (x2n)n converges to zero. This

complete the proof of Theorem.

4.2.4. The case when |A| > 1.

Theorem 11. Let (xn)n≥−1 be a solution of the Eq. (1.1). Assume that |A| > 1, then

(1) The subsequences (x2n−1)n and (x2n)n converges.(2) The whole sequence (xn)n≥−1 converge i

A− 1 +Bcd 6= 0or

(1−A)B > 0 and c = d = ±√

1−AB

.

Proof. We distinguish two cases:

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 27, NO.1, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

94 MALEK GHAZEL ET AL 85-103

Page 95: Journal of Computational Analysis and Applicationseudoxuspress.com/images/JOCAAA-VOL-27-2019-ISSUE-1.pdf · Volume 27, Number 1 July 15, 2019 . ISSN:1521-1398 PRINT,1572-9206 ONLINE

INVESTIGATING DYNAMICS 11

(1) (I) If A− 1 +Bcd 6= 0, then using Corollary (4),

x2n−1 = dn−1∏p=0

( (A− 1 +Bcd)A2p −Bcd(A− 1 +Bcd)A2p+1 −Bcd

)

= dn−1∏p=0

( 1− Bcd

(A− 1 +Bcd)A2p

A(1− Bcd

(A− 1 +Bcd)A2p+1)

)

=d

An

n−1∏p=0

Yp,

where (Yp)p≥0 is the sequence dened as

Yp =1− β

A2p

1− β

A2p+1

and β =Bcd

A− 1 +Bcd.

It can be easily veried that for p big enough, always Yp is in the interval (0, 1) or lies in theinterval (1,∞). The Taylor expansion applied to the sequence (Yp)p≥0 gives

(Yp)p≥0 is equivalent to 1 + β(1

A− 1)

1

A2p,

the last term is a general term of convergent innite product so (x2n−1)n converges to zero. Aneasy calculus gives that

x2n =c

An

n−1∏p=0

Zp,

where (Zp)p≥0 is the sequence dened as

Zp =1− β

A2p+1

1− β

A2p+2

,

we have

(Zp)p≥0 is asymptotically equivalent to 1 + β(1

A− 1)

1

A2p+1,

the last term is a general term of convergent innite product, so (x2n)n converges to zero.(II) If A−1+Bcd = 0, then the subsequences (x2n−1)n and (x2n)n are constant x2n−1 = d and

x2n = c, so they converge. By the calculus in the preview part of the proof, if A− 1 +Bcd 6= 0,then the whole sequence (xn)n≥−1 converges to zero. When A− 1 +Bcd = 0 that is

(4.16) cd =1−AB

,

the subsequences (x2n−1)n and (x2n)n are constant equal d and c respectively, then the wholesequence (xn)n≥−1 converges if and only if c = d, using Eq. (4.16) the last proposition is

equivalent to c = d = ±√

1−AB

, for this to can hold it is necessary and sucient that (1−A)B >

0. Hence, the proof is achieved.

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 27, NO.1, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

95 MALEK GHAZEL ET AL 85-103

Page 96: Journal of Computational Analysis and Applicationseudoxuspress.com/images/JOCAAA-VOL-27-2019-ISSUE-1.pdf · Volume 27, Number 1 July 15, 2019 . ISSN:1521-1398 PRINT,1572-9206 ONLINE

12 M. GHAZEL, T. S. HASSAN, AND A. M. MOSALLEM

4.3. Oscillation about the equilibrium point x1 = 0. In this section, we study the oscillation thesolution of dierence Eq. (1.1) about the equilibrium point x1 = 0.

Theorem 12. Let (xn)n≥−1 be a solution of the Eq. (1.1). Assume that |A| < 1, then the subsequences(x2n−1)n and (x2n)n converge, then

(1) For |A| < 1

(xn)n≥−1 is oscillatory about zero i cd( n0−1∏

p=0

Up

)(m0−1∏p=0

Tp

)< 0,

where (Up)p, (Tp)p are the sequences dened in the proof of Theorem (7) and n0, m0, are integerssuch that, for all p ≥ n0, Up is positive and for all p ≥ m0, Tp is positive.

(2) For A = −1, (xn)n≥−1 is oscillatory about zero.(3) For A = 1,

(xn)n≥−1 is oscillatory about zero i cd

r0−1∏p=0

Vp

s0−1∏p=0

Wp < 0,

where (Vp)p≥1, (Wp)p≥0, r0 and s0 are dened in the proof of Theorem (10).(4) For |A| > 1,

(xn)n≥−1 is oscillatory about zero i

A− 1 +Bcd = 0 and cd < 0,or

A− 1 +Bcd 6= 0 and

A < −1,or

A > 1 and cd

p0−1∏p=0

Yp

q0−1∏p=0

Zp < 0,

where (Yp)p≥1, (Zp)p≥0, p0 and q0 are dened in the proof of Theorem (11).

Proof. 1. For |A| < 1 The sequences (x2n−1)n and (x2n)n have a constant signs which are these of

d

n0−1∏p=0

Up and c

m0−1∏p=0

Tp,

respectively, so we can immediately obtain the aimed result.

2. For A = −1, in this case x2n−1 =d

(Bcd− 1)nand x2n−1 = c(1− Bcd)n. Hence, if Bcd− 1 < 0,

then (x2n−1)n and therefore (xn)n is oscillatory about zero. If Bcd − 1 > 0, then (x2n)n andtherefore (xn)n is oscillatory about zero.

3. For A = 1, the Eq. (4.13) and (4.15) give

x2n−1 = d

r0−1∏p=0

Vp exp( n−1∑

p=r0

lnVp

),

and

x2n = c

q0−1∏p=0

Wp exp( n−1∑

p=q0

lnWp

),

in this case the sequences (x2n−1)n and (x2n)n have a constant signs which are these of

d

r0−1∏p=0

Vp and c

q0−1∏p=0

Wp,

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 27, NO.1, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

96 MALEK GHAZEL ET AL 85-103

Page 97: Journal of Computational Analysis and Applicationseudoxuspress.com/images/JOCAAA-VOL-27-2019-ISSUE-1.pdf · Volume 27, Number 1 July 15, 2019 . ISSN:1521-1398 PRINT,1572-9206 ONLINE

INVESTIGATING DYNAMICS 13

respectively, we nd that (xn)n is oscillatory about zero i

cd

r0−1∏p=0

Vp

q0−1∏p=0

Wp < 0.

4. For |A| > 1, if A− 1 + Bcd = 0, then the subsequences are constant (x2n−1)n and (x2n)n equald and c respectively, so (xn)n is oscillatory about zero i cd < 0. If A − 1 + Bcd 6= 0, the thesequence (xn)n≥−1 converges to zero and we have

x2n−1 =d

An

n−1∏p=0

Yp and x2n =c

An

n−1∏p=0

Zp,

where (Yp)p and (Zp)p are the sequences dened in the proof of Theorem (11). It has been seenthat there exists integers p0 and q0 such that for all p ≥ p0, Yp is positive and for all p ≥ q0, Zp

is positive, then for n big enough, the sign of dn−1∏p=0

Yp and cn−1∏p=0

Zp are constant. Then, we have

the following cases:(a) When A < −1, the sequence (x2n−1)n and consequently (xn)n≥−1 are oscillatory about zero.

(b) When A > 1, the sign of x2n−1 is that of d

p0−1∏p=0

Yp and the sign of x2n is that of c

q0−1∏p=0

Zp.

Thus, we can immediately have the target result and the proof is complete.

4.4. Periodicity. Firstly, we recall the following Lemma, which describes sucient conditions for Eq.(1.1) to have a periodic solution.

Lemma 13. Let (xn)n≥−k+1 be a solution of Eq. (1.1). Suppose that there are real numbers lr, r =0, 1, ..., p− 1 such that

limn→∞

xpn+r = lr for all r = 0, 1, ..., p− 1.

Finally, let (yn)n≥−k+1 be the periodic-p sequence such that

yr = lr for all r = 0, 1, ..., p− 1.

Then (yn)n≥−k+1 is a periodic-p solution of Eq. (1.1).

Note that the zero sequence is a solution of Eq. (1.1) corresponding to the initial conditions x−1 = 0and x0 = 0, this solution is called trivial solution of of Eq. (1.1). The periodicity results are given by thefollowing Theorem

Theorem 14. Let (xn)n≥−1 be a solution of the Eq. (1.1).

(1) For |A| < 1, Eq. (1.1) has a nontrivial periodic-2 solution.

(2) For A = −1, Eq. (1.1) has a nontrivial periodic-2 solution if and only if cd =2

B.

(3) For A = 1, Eq. (1.1) has no nontrivial periodic-2 solution.

(4) For |A| > 1, Eq. (1.1) has a nontrivial periodic-2 solution if and only if cd =1−AB

.

Proof. 1. If |A| < 1, then by Theorem (7), the subsequences (x2n−1)n and (x2n)n converge, let l1and l0 be their limits respectively. Applying Lemma (13), it follow that the sequence

l1, l0, l1, l0, ...

is a periodic-2 solution of Eq. (1.1).2. Suppose that A = −1, we distinguish two cases:

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 27, NO.1, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

97 MALEK GHAZEL ET AL 85-103

Page 98: Journal of Computational Analysis and Applicationseudoxuspress.com/images/JOCAAA-VOL-27-2019-ISSUE-1.pdf · Volume 27, Number 1 July 15, 2019 . ISSN:1521-1398 PRINT,1572-9206 ONLINE

14 M. GHAZEL, T. S. HASSAN, AND A. M. MOSALLEM

(a) If Bcd 6= 2, then using Lemma (8), every solution of Eq. (1.1) is unbounded, so Eq. (1.1)has no periodic solutions.

(b) If Bcd = 2, then using Lemma (8), the subsequences (x2n−1)n and (x2n)n are constantx2n−1 = d and x2n = c, therefore (xn)n≥−1 is the periodic-2 solution

d, c, d, c, ... .

3. If A = 1, then by using the proof of Theorem (10), every solution of of Eq. (1.1) converges tozero, so Eq. (1.1) has no nontrivial solution.

4. If |A| > 1, we distinguish two cases:(a) If A − 1 + Bcd 6= 0, then by using the proof of Theorem (11), every solution of Eq. (1.1)

converges to zero, so Eq. (1.1) has no nontrivial solution.(b) If A−1+Bcd = 0, then by Theorem (11), the subsequences (x2n−1)n and (x2n)n are constant

x2n−1 = d and x2n = c, consequently (xn)n≥−1 is the periodic-2 solution d, c, d, c,. . .This achieves the proof.

5. Numerical simulation

(1) The case |A| < 1 is illustrated in Fig. (1), in which we set A =1

2, B = 4, c = 3 and d = 2.

The subsequences (x2n−1)n and (x2n)n converge. This is coherent with Theorem (7).

(2) In Fig. (2) (case A = −1 and Bcd ∈ (−∞, 0) ∪ (2,∞), we choose A = −1, B =1

2, c = 1

and d = −2. The subsequence (x2n−1)n converges to zero and the subsequence (|x2n|)n goes toinnity and oscillates about zero which matches Lemma (8), Remark (1) and Theorem (12).

(3) The case A = −1 and Bcd ∈ (0, 2) is studied using the parameters values A = −1, B =1

2, c = 3

and d = 1. The subsequence (|x2n−1|)n goes to innity and the subsequence (x2n)n converges tozero as depicted in Fig. (3) which is coherent to Lemma (8), Remark (1) and Theorem (12).

(4) In order to illustrate the case A = −1 and Bcd = 2, we choose A = −1, B =1

2, c = 1 and

d = 4. In Fig. (4), it is shown that the subsequences (x2n−1)n and (x2n)n are constant x2n−1 = dand x2n = c which agrees Lemma (8) and Remark (1), consequently (xn)n≥−1 is the periodic-2solution

d, c, d, c, ... .

This is in harmony with Theorem (14).(5) The case A = 1 is investigated using the parameters values A = 1, B = 3, c = 0.5 and d = 3. In

Fig. (5), the simulation results show that the whole sequence (xn)n≥−1 converges to zero whichmatches Theorem (10).

(6) The case |A| > 1 and A−1+Bcd 6= 0 can be taken by choosing A = 5, B = 1, c = 3 and d = 0.5.The whole sequence (xn)n≥−1 converges to zero as depicted in Fig. (6) which is coherent toTheorem (11).

(7) Fig. (7) illustrates the case |A| > 1 and A − 1 + Bcd = 0, we choose A = 5, B = 1, c = 2 andd = −2, the subsequences (x2n−1)n and (x2n)n are constant: x2n−1 = d and x2n = c, we obtaina periodic-2 solution. This case is justied analytically in the proofs of Theorems (11), (12) and(14).

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 27, NO.1, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

98 MALEK GHAZEL ET AL 85-103

Page 99: Journal of Computational Analysis and Applicationseudoxuspress.com/images/JOCAAA-VOL-27-2019-ISSUE-1.pdf · Volume 27, Number 1 July 15, 2019 . ISSN:1521-1398 PRINT,1572-9206 ONLINE

INVESTIGATING DYNAMICS 15

0 1 0 2 0 3 0 4 0 5 0- 1

0

1

2

3

X 2 n - 1 X 2 nX n

n

b )

0 1 0 2 0 3 0 4 0- 1

0

1

2

3

4

X n

n

a )

Figure 1. |A| < 1, A− 1 +Bcd 6= 0: (x2n−1)n and (x2n)n converge.

0 1 0 2 0 3 0- 1 0 0- 8 0- 6 0- 4 0- 2 0

02 04 06 08 0

1 0 0

X 2 n - 1 X 2 n

X n

n

b )

0 2 0 4 0 6 0 8 0 1 0 0- 1 . 0

- 0 . 5

0 . 0

0 . 5

1 . 0

1 . 5

2 . 0

X n

n

a )

Figure 2. A = −1 and Bcd ∈ (−∞, 0)∪(2,∞): (x2n−1)n converges to zero and (|x2n|)ngoes to innity, the solution is unbounded.

Acknowledgement

The authors thank the Deanship of Research at the University of Hail, Saudi Arabia, for funding thiswork under Grant no. 0150287.

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 27, NO.1, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

99 MALEK GHAZEL ET AL 85-103

Page 100: Journal of Computational Analysis and Applicationseudoxuspress.com/images/JOCAAA-VOL-27-2019-ISSUE-1.pdf · Volume 27, Number 1 July 15, 2019 . ISSN:1521-1398 PRINT,1572-9206 ONLINE

16 M. GHAZEL, T. S. HASSAN, AND A. M. MOSALLEM

0 5 1 0 1 5 2 0 2 5 3 0 3 5 4 0 4 5 5 0- 10123456789

1 0

X n

X 2 n - 1 X 2 n

n

b )

0 2 0 4 0 6 0 8 0 1 0 0- 2

0

2

4

6

8

1 0

X n

n

a )

Figure 3. A = −1 and Bcd ∈ (0, 2): (|x2n−1|)n goes to innity and (x2n)n convergesto zero, the solution is unbounded.

0 1 0 2 0 3 0 4 0 5 00

1

2

3

4

5

X n

n0 1 0 2 0 3 0 4 0 5 0

- 1

0

1

2

3

4

5X n

X 2 n - 1 X 2 n

n

b )a )

Figure 4. A = −1 and Bcd = 2: (x2n−1)n and (x2n)n are constants, (xn)n is periodic-2 solution.

0 1 0 2 0 3 0 4 0 5 0- 1

0

1

2

3

X n

n

a )0 5 1 0 1 5 2 0 2 5 3 0 3 5 4 0 4 5 5 0

0

1

2

3

X n

X 2 n - 1 X 2 n

n

b )

Figure 5. A = 1: the solution converges to zero.

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 27, NO.1, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

100 MALEK GHAZEL ET AL 85-103

Page 101: Journal of Computational Analysis and Applicationseudoxuspress.com/images/JOCAAA-VOL-27-2019-ISSUE-1.pdf · Volume 27, Number 1 July 15, 2019 . ISSN:1521-1398 PRINT,1572-9206 ONLINE

INVESTIGATING DYNAMICS 17

0 5 1 0 1 5 2 0 2 5 3 0 3 5 4 0 4 5 5 0

0

1

2

3

X n

X 2 n - 1 X 2 n

n0 1 0 2 0 3 0 4 0 5 0

- 1

0

1

2

3

Xn

n

a ) b )

Figure 6. |A| > 1 and A− 1 +Bcd 6= 0: the solution converges to zero.

0 1 0 2 0 3 0 4 0 5 0- 3

- 2

- 1

0

1

2

3

X n

n0 5 1 0 1 5 2 0 2 5 3 0 3 5 4 0 4 5 5 0

- 3

- 2

- 1

0

1

2

3X n

X 2 n - 1 X 2 n

n

a ) b )

Figure 7. |A| > 1 and A − 1 + Bcd = 0: (x2n−1)n and (x2n)n are constants, (xn)n isperiodic-2 solution.

References

[1] R. Karatas, C. Cinar, D. Simsek, On positive solutions of the dierence equation xn+1 = xn−5/(1 + xn−2xn−5), Int.Journal of Contemp. Math. Sciences 1(10) (2006) 494500.

[2] E. M. Elsayed, Bratislav D. Iricanin, On a max-type and a min-type dierence equation, Appl. Math. Comput. 215(2009) 608614.

[3] H. A. El-Morshedy, E. Liz, Globally attracting xed points in higher order discrete population models, J. Math. Biology53 (2006) 365384.

[4] H. El-Metwally, E. M. Elsayed, H. El-Morshedy, Dynamics of some rational dierence equations, J. Comput. Anal.Applic. 18 (2015) 9931003.

[5] E. M. Elabbasy, A. A. Elsadany, Y. Zhang, Bifurcation analysis and chaos in a discrete reduced Lorenz system, Appl.Math. Comput. 228(1) (2014) 184194.

[6] R. P. Agarwal, A. M. A. El-Sayed, S. M. Salman, Fractional-order Chua's system discretization, bifurcation and chaos,Advances in Dierence Equations 320 (2013) 13 pages.

[7] S. S. Askar, A. M. Alshamrani, K. Alnowibet, The arising of cooperation in Cournot duopoly games, Appl. Math.Comput. 273 (2016) 535542.

[8] A. E. Matouk, A. A. Elsadany, E. Ahmed, H. N. Agiza, Dynamical behavior of fractional-order Hastings-Powell foodchain model and its discretization, Communications in Nonlinear Science and Numerical Simulation 27(1-3) (2015)153167.

[9] E. Ahmed, A. S. Hegazi, On dynamical multi-team and signaling games, Appl. Math. Comput. 172(1) (2006) 524530.

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 27, NO.1, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

101 MALEK GHAZEL ET AL 85-103

Page 102: Journal of Computational Analysis and Applicationseudoxuspress.com/images/JOCAAA-VOL-27-2019-ISSUE-1.pdf · Volume 27, Number 1 July 15, 2019 . ISSN:1521-1398 PRINT,1572-9206 ONLINE

18 M. GHAZEL, T. S. HASSAN, AND A. M. MOSALLEM

[10] S. S. Askar, The impact of cost uncertainty on Cournot oligopoly game with concave demand function. Appl. Math.Comput. 232 (2014) 144149.

[11] A. A. Elsadany, A. E. Matouk, Dynamic Cournot duopoly game with delay, Journal of Complex Systems 2014ArticleID 384843 (2014) 7 pages.

[12] A. A. Elsadany, H. N. Agiza, E. M. Elabbasy, Complex dynamics and chaos control of heterogeneous quadropoly game,Appl. Math. Comput. 219(24) (2013) 1111011118.

[13] E. Ahmed, A. A. Elsadany, Tonu Puu, On Bertrand duopoly game with dierentiated goods, Appl. Math. Comput.251(15) (2015) 169179.

[14] V. L. Kocic, G. Ladas, I.W. Rodrigues, On the rational recursive sequences, J. Math. Anal. Appl. 173 (1993) 127157,Chapman and Hall/CRC Boca Raton (2002).

[15] L. A. Moye, A.S. Kapadia, Dierence equations with public health applications, (2000)Marcel Dekker, Inc.[16] A. A. Elsadany, A dynamic Cournot duopoly model with dierent strategies, Journal of the Egyptian Mathematical

Society 23(1) (2015) 5661.[17] R. P. Agarwal, E. M. Elsayed, Periodicity and stability of solutions of higher order rational dierence equation,

Advanced Studies in Contemporary Mathematics 17(2) (2008) 181201.[18] E. M. Elsayed, Dynamics of a rational recursive sequences, International Journal of Dierence Equations 4(2) (2009)

185200.[19] M. Aloqeili, Dynamics of a rational dierence equation, Appl. Math. Comput. 176(2) (2006) 768774.

[20] C. Cinar, On the positive solutions of the dierence equation xn+1 =axn−1

1 + bxnxn−1, Appl. Math. Comput. 156 (2004)

587590.

[21] E. M. Elabbasy, H. El-Metwalli, E. M. Elsayed, On the dierence equation xn+1 = axn −bxn

cxn − dxn−1, Adv. Dier.

Equ. 2006 Article ID 82579 (2006) 10 pages.

[22] E. M. Elabbasy, H. El-Metwalli, E. M. Elsayed, On the dierence equation xn+1 =αxn−k

β + γ∏k

i=0 xn−i

, J. Conc. Appl.

Math. 5(2) (2007) 101113.[23] E. A. Grove, G. Ladas, Periodicities in Nonlinear Dierence Equations, Chapman and Hall/CRC Press, London/Boca

Raton (2005).[24] M. R. S. Kulenovic, G. Ladas, Dynamics of Second Order Rational Dierence Equations with Open Problems and

Conjectures, Chapman and Hall/CRC Press, London/Boca Raton (2002).[25] J. Rubi-Masseg, Global periodicity and openness of the set of solutions for discrete dynamical systems, J. Dier. Equ.

Appl. 15 (2009) 569578.[26] R. Azizi, Global behaviour of the rational Riccati dierence equation of order two: the general case, J. Dier. Equ.

Appl. 18 (2012) 947961.[27] F Balibrea and A Cascales, Eventually positive solutions in rational dierence equations,

Comp and Math with Appl 64(7) (2012) 22752281.

[28] E. Camouzis, R. Devault, The forbidden set of xn+1 = p +xn−1

xn, Special Session of the American Mathematical

Society Meeying, Part II, San Diego (2002).[29] H Sedaghat, Existence of solutions of certain singular dierence equations, J. Dier. Equ. Appl., 6 535561 (2000).[30] S Stevic, Domains of undenable solutions of some equations and systems of dierence equations, Appl Math Comput,

219 1120611213 (2013).[31] G. Ladas, Recent developments in the oscillation of delay dierence equations, In: Int Conf. on Dierential Equations,

Theory Appl. Stab. Control, pp (1989) 710.[32] L. Matti, Oscillations in some nonlinear economic relationships, Chaos, Solitons and Fractals, 7 (1996) 22352245.[33] H. Sedaghat, Converges, oscillations, and chaos in a discrete model of combat, SIAM 44 (2002) 7492.[34] L. Erbe, T. S. Hassan, A. Peterson, S. H. Saker, Interval oscillation criteria for forced second-order nonlinear delay

dynamic equations with oscillatory potential. Dyn. Contin. Discrete Impuls. Syst. Ser. A Math. Anal. 17 (2010) no. 4533542.

[35] T. S. Hassan, Interval oscillation for second order nonlinear dierential equations with a damping term. Serdica Math.J. 34 (2008) no. 4 715732.

[36] E. M. Elabbasy, T. S. Hassan, Interval oscillation for second order sublinear dierential equations with a dampingterm. Int. J. Dyn. Syst. Dier. Equ. 1 (2008) no. 4 291299.

[37] T. S. Hassan, Oscillation criteria for second-order nonlinear dynamic equations. Adv. Dierence Equ. 2012, 2012:17113 pp.

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 27, NO.1, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

102 MALEK GHAZEL ET AL 85-103

Page 103: Journal of Computational Analysis and Applicationseudoxuspress.com/images/JOCAAA-VOL-27-2019-ISSUE-1.pdf · Volume 27, Number 1 July 15, 2019 . ISSN:1521-1398 PRINT,1572-9206 ONLINE

INVESTIGATING DYNAMICS 19

Department of Mathematics, Faculty of Science,University of Hail, Hail 2440, Saudi Arabia.

E-mail address: [email protected]

Department of Mathematics, Faculty of Science, Mansoura University Mansoura, 35516, Egypt.

E-mail address: [email protected]

Department of Mathematics, Faculty of Science,University of Hail, Hail 2440, Saudi Arabia.

E-mail address: [email protected]

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 27, NO.1, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

103 MALEK GHAZEL ET AL 85-103

Page 104: Journal of Computational Analysis and Applicationseudoxuspress.com/images/JOCAAA-VOL-27-2019-ISSUE-1.pdf · Volume 27, Number 1 July 15, 2019 . ISSN:1521-1398 PRINT,1572-9206 ONLINE

Lp approximation errors for hybrid interpolation on the unit

sphere ∗

Chunmei Ding Ming Li Feilong Cao

Department of Applied Mathematics, College of Sciences, China Jiliang University,Hangzhou 310018, Zhejiang Province, P R China.

E-mail: [email protected]

Abstract

This paper discusses Lp approximation error estimates for hybrid interpolation on the unitsphere. This interpolation scheme is integrated by spherical polynomials and radial basisfunctions. The smooth radial basis functions generated by a strictly positive definite zonalkernel are embedded in a larger native space generated by a less smooth kernel, and the errorestimates for hybrid interpolation to a target function from the larger native space are given.In a sense, the results of this paper show that the hybrid interpolation associated with thesmooth kernel enjoys the same order of error estimate as hybrid interpolation associated withthe less smooth kernel for a target function from the rough native space.

MSC(2000): 41A17, 41A30Keywords: Sphere; Interpolation; Approximation; Error

1 Introduction

Recently, fitting spherical scattered data comes up in many application areas, such as astrophysics,meteorology, geodesy, geophysics, and so on [5, 6, 29]. As interpolation or approximation tools,spherical polynomials or spherical radial basis functions were used to handle spherical scattereddata in more studies [5, 6, 11, 14, 20, 22, 27, 28, 29, 15, 2]. Since spherical polynomials can handlethe slowly varying large-scale features, and spherical radial basis functions are helpful to handlescattered and rapidly changed data, Sloan and Sommariv [25] introduced a hybrid interpolationscheme, which combines spherical radial basis functions together with spherical polynomials, andrestricts the radial basis functions to the case of strictly positive definite kernels, so that thepolynomial component is voluntary rather than forced.

This paper studies the hybrid interpolation in an appropriate native space Nφ of continuousfunctions on the unit sphere, which is defined by a underlying strictly positive definite kernel φ.We apply the approach used by Hubbert and Morton [9, 10] to obtain error estimates in Lp norm.However, if the target function is from a subspace of the native space Nφ, we then adopt the inf-supcondition [26] and the method of constructing a convolution kernel to improve the error estimates.

So called “native space barrier” problem means that if φ is smooth, then the native space Nφis small. There have been much literature to focus on it, for example, [12, 13, 17, 18, 19]. Inthis paper, we employ the approach in [12] and the techniques in [26], and embed the smoothradial basis functions in a larger native space generated by a less smooth kernel ψ. At same time,we utilize the hybrid interpolation associated with the smooth kernel φ to interpolate the targetfunction from the larger native space. In the process of error estimates, the “norming set” methoddeveloped by Jetter [11] and a special case of the general Bernstein-type inequality in [4] are used.

This paper is organized as follows. Section 2 is preliminary, which is related to introducingnotations, hybrid interpolation and its crucial condition, native space, and Sobolev space. The Lpapproximation error estimates are established in Section 3. In Section 4, for a target function f

∗Supported by the National Natural Science Foundation of China (No. 61672477)

1

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 27, NO.1, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

104 Chunmei Ding ET AL 104-117

Page 105: Journal of Computational Analysis and Applicationseudoxuspress.com/images/JOCAAA-VOL-27-2019-ISSUE-1.pdf · Volume 27, Number 1 July 15, 2019 . ISSN:1521-1398 PRINT,1572-9206 ONLINE

C. Ding et al.: Lp approximation error for hybrid interpolation on the unit sphere

in a subspace of the original native space, we improve the global Lp-error estimates. In Section 5,we still use the hybrid interpolation defined in Section 2 to interpolate and approximate a targetfunction f from a larger native space generated by a less smooth kernel.

2 Preliminaries

This paper uses C to denote a positive constant, whose value may be different at different occur-rence even within the same formula. The symbol A ∼ B means that there exist positive constantC1 and C2 such that C1B ≤ A ≤ C2B.

We use S2 :=x := (x1, x2, x3) ∈ R3 : x21 + x22 + x23 = 1

to denote the unit sphere embedded

in the Euclidean space R3, and denote by Lp(S2) the space of p-integrable functions on S2 endowedwith the norms ‖f‖∞ := ‖f‖L∞(S2) := esssupx∈S2 |f(x)|(p = ∞), and ‖f‖p := ‖f‖Lp(S2) :=∫

S2 |f(x)|pdω(x)1/p

< ∞(1 ≤ p < ∞). The so called spherical harmonic with degree l is therestriction to S2 of a homogeneous harmonic polynomial with degree l ≥ 0. The class of allspherical harmonics with degree l is denoted by Hl, and the class of all spherical harmonics withtotal degree l ≤ L is denoted by PL. Clearly, spherical harmonics with different degrees areorthogonal with respect to the L2(S2) inner product: 〈f, g〉 :=

∫S2 f(x)g(x)dω(x), where dω is

surface measure on S2.The famous addition formula

∑2l+1k=1 Yl,k(x)Yl,k(y) = 2l+1

4π Pl(x · y) yields the following usefulrelation [16]:

2l+1∑k=1

|Yl,k(x)Yl,k(y)| ≤2l+1∑k=1

Y 2l,k(x) =

2l + 1

4π, x, y ∈ S2. (2.1)

Here Pl is the Legendre polynomial with degree l and dimension three, which is normalized such

that Pl(1) = 1, and satisfies the orthogonality relation:∫ 1

−1 Pk(t)Pj(t)dt = 22l+1δk,j , where the

symbol δk,j denotes the usual Kronecker symbol.The definition of strictly positive definite kernel is given by

Definition 2.1 (see [29]). A continuous and symmetric function φ : S2 × S2 −→ R is calledpositive definite kernel, if, for any N ∈ N+, α = (αi)i=1,...,N ∈ RN and x1, . . . , xN ⊂ S2, wehave

N∑i=1

N∑j=1

αiαjφ(xi, xj) ≥ 0.

When for any N distinct points x1, . . . , xN, the above quadratic form is positive for all α =(αi)i=1,...,N ∈ RN/0, then φ is called strictly positive definite kernel.

We say that a kernel φ is called rotational invariant if φ(ρx, ρy) = φ(x, y) for all x, y ∈ S2and for all rotations ρ. So a continuous rotational invariant kernel depends only on the distancebetween x and y [24], that is, there is a function ϕ : [−1, 1]→ R , such that ϕ(xy) = φ(x, y) for allx, y ∈ S2. Therefore, a rotational invariant kernel is also called a zonal kernel. In [23], Schoenbergcharacterized the positive definite zonal kernels. In [30], Xu and Cheney introduced the notationof strictly positive definiteness on the sphere. Clearly, it is important to characterize all the strictlypositive definite functions on the sphere, and such an endeavor has been taken by Ron and Sun in[21]. In [3], Chen et al. established a necessary and sufficient condition for strictly positive definitezonal kernels: the kernel φ is strictly positive definite and zonal if and only if

φ(x, y) =∞∑l=0

al

2l+1∑k=1

Yl,k(x)Yl,k(y) =∞∑l=0

(2l + 1)al4π

Pl(x · y),

with al ≥ 0 for all l,∑∞l=0 lal < ∞ and al > 0 for infinitely many even values of l and infinitely

many odd values of l.

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 27, NO.1, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

105 Chunmei Ding ET AL 104-117

Page 106: Journal of Computational Analysis and Applicationseudoxuspress.com/images/JOCAAA-VOL-27-2019-ISSUE-1.pdf · Volume 27, Number 1 July 15, 2019 . ISSN:1521-1398 PRINT,1572-9206 ONLINE

C. Ding et al.: Lp approximation error for hybrid interpolation on the unit sphere

For given strictly positive definite kernel φ(·, ·), a set of distinct points X = x1, . . . , xN ⊂ S2,and target function f ∈ C(S2), we take the hybrid interpolation for f in the form

IX,Lf =N∑j=1

αjφ(·, xj) +L∑l=0

2l+1∑k=1

βl,kYl,k,

where we fix L ≥ 0 as the desired degree of the polynomial component of the hybrid interpola-tion and the coefficients αjNj=1 , βl,kk=1,...,2l+1, l=0,...,L are determined by the interpolationconditions

IX,Lf(xi) = f(xi), i = 1, . . . , N, (2.2)

and also (in order to give a square linear system) the side conditions∑Nj=1 αjp(xj) = 0, ∀p ∈ PL.

Now we give a condition on the point set X, which makes sure that the interpolation is existand unique.

Definition 2.2 (see [25, Definition 3.1]). The set X = x1, . . . , xN ⊂ S2 is said to be PL-unisolvent if

p ∈ PL, p(xj) = 0 for j = 1, . . . , N ⇒ p = 0.

In order to analyze the interpolation error in the later sections it is convenient to define afinite-dimensional space VX,L within the interpolation IX,Lf lies.

VX,L :=

N∑j=1

αjφ(·, xj) + q : q ∈ PL, αj ∈ R for j = 1, . . . , N, andN∑j=1

αjp(xj) = 0, ∀p ∈ PL.

The following Theorem 2.1 gives a crucial condition for the interpolation to be well defined,whose proof can be find in [25].

Theorem 2.1 Let φ(·, ·) be a strictly positive definite kernel, and X = x1, . . . , xN ⊂ S2 be aset of distinct points which is PL -unisolvent for L ≥ 0. Then for each f ∈ C(S2) there exists aunique IX,Lf ∈ VX,L that satisfies the interpolation conditions in (2.2).

In this paper, we assume that the strictly positive definite kernel φ is zonal and has the expansion

φ(x, y) =∞∑l=0

al

2l+1∑k=1

Yl,k(x)Yl,k(y) (2.3)

with al > 0 for all l,∑∞l=0 lal < ∞, in which case the series of the right side in (2.3) converges

uniformly for x, y ∈ S2.For f, g ∈ L2(S2), they can be represented by their Fourier series f =

∑∞l=0

∑2l+1k=1 fl,kYl,k

and g =∑∞l=0

∑2l+1k=1 gl,kYl,k, respectively. With respect to the inner product expressed as (see

[29]) (f, g)Nφ =∑∞l=0

∑2l+1k=1

fl,kgl,kal

, the native space Nφ, which is the subspace of L2(S2), can bedefined by

Nφ :=

f ∈ L2(S2) : ‖f‖2Nφ =

∞∑l=0

2l+1∑k=1

|fl,k|2

al<∞

.

It is easy to verify that the native space Nφ is a reproducing kernel Hilbert space with reproducingkernel φ(·, ·), that is, (f, φ(·, x))Nφ = f(x), x ∈ S2, f ∈ Nφ.

When al ∼ (l + 1)−2s for l = 0, 1, . . . , the native space Nφ is norm equivalent to the Sobolevspace Hs:

Hs :=

f ∈ L2(S2) : ‖f‖2Hs =

∞∑l=0

2l+1∑k=1

(l + 1)2s|fl,k|2 <∞

,

and the Sobolev embedding theorem in [7] implies that if s > 1, then the space Hs is continuouslyembedded in C(S2), so that Hs is a reproducing kernel Hilbert space.

The error estimates are general expressed in terms of the mesh norm of X = x1, . . . , xN ⊂ S2,which is defined by hX := supx∈S2 infxj∈X d(x, xj), where d(x, xj) = arccos(x · xj) is the geodesicdistance between xj and x.

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 27, NO.1, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

106 Chunmei Ding ET AL 104-117

Page 107: Journal of Computational Analysis and Applicationseudoxuspress.com/images/JOCAAA-VOL-27-2019-ISSUE-1.pdf · Volume 27, Number 1 July 15, 2019 . ISSN:1521-1398 PRINT,1572-9206 ONLINE

C. Ding et al.: Lp approximation error for hybrid interpolation on the unit sphere

3 Global error estimates for Lp norm

We first give the following three lemmas, which can be found in [9] and [10].

Lemma 3.1 Let d ≥ 1 be an integer and set M := 2√d and δd := 1

4(d+1)3/2. Let M1 be an arbitrary

positive number, θ ∈ (0, π3 ) and set h0 := θM+M1+δd

. Then for any h ∈ (0, h0), there exists a set of

points Zh ⊂ Sd such that Sd =⋃z∈Zh D(z,Mh). Here we denote by D(x0, γ) the spherical cap with

center x0 and angle γ, i.e., D(x0, γ) :=x ∈ Sd : x · x0 > cos γ

, and then denote by A(x0, γ) the

volume of D(x0, γ), i.e., A(x0, γ) := Ωd∫ γ0

sind−1 θdθ, where Ωd denotes the volume of Sd. Let FAdenote the characteristic function of a set A ⊂ Sd. There exists a positive integer Q independentof h such that ∑

z∈Zh

FD(z,M ′h) ≤ Q, where M′

= M +M1.

Further, the cardinality of Zh is bounded above by CQh−d, where CQ is independent of h.

Lemma 3.2 Let z ∈ Sd and X = xiNi=1 denote a set of distinct points on Sd. Let s ∈ [k, k + 1],where k > d

2 is a positive integer. There exist positive numbers C1 and C2 such that if we let

M1 > maxC1 − 2d1/2, 0 be a fixed positive number and let

h0 =C2

3M2, where M2 = 2d1/2 +M1,

then, assuming that X has mesh norm h := hX ∈ (0, h0), there exists an extension operatorED(z,M2h) : Hs(D(z,M2h)) −→ Hs(Sd) satisfying(1) (ED(z,M2h)f)|D(z,M2h) = f , for all f ∈ Hs(D(z,M2h)),(2) there exists a positive constant C, independent of h and z such that

‖ED(z,M2h)f‖Hs(Sd) ≤ C‖f‖Hs(D(z,M2h)),

for all f ∈ Hs(D(z,M2h)) such that f(ξ) = 0 for ξ ∈ X⋂D(z,M2h).

Lemma 3.3 Let s > 0 and let M1 be any positive number. Let h ∈ (0, h0) and let Zh denote thecorresponding quasi-uniform mesh for Sd from Lemma 3.1. Then, for any f ∈ Hs(Sd), we have∑

z∈Zh

‖f‖2Hs(D(z,M2h))≤ Q‖f‖2Hs(Sd),

where Q is the constant (independent of h) from Lemma 3.1.

We are now ready to state the main results for the error estimates of the hybrid interpolationin Lp norm.

Theorem 3.1 Let φ ∈ C(S2× S2) be a strictly positive definite kernel on S2, having the represen-tation in (2.3) and al ∼ (l+1)−2s. Assume that integer L ≥ 1 and X = x1, . . . , xN ⊂ S2 is a setof distinct points on S2 with mesh norm 1/(2L+ 2) < hX ≤ 1/(2L). For f ∈ Nφ, let IX,Lf ∈ VX,Lbe the hybrid interpolation defined in Section 2. Then we have

‖f − IX,Lf‖Lp(S2) ≤ Ch2p+s−1X ‖f − IX,Lf‖Nφ , p ∈ [2,+∞),

and‖f − IX,Lf‖Lp(S2) ≤ Ch

sX‖f − IX,Lf‖Nφ , p ∈ [1, 2),

where the constant C is independent of f and hX .

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 27, NO.1, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

107 Chunmei Ding ET AL 104-117

Page 108: Journal of Computational Analysis and Applicationseudoxuspress.com/images/JOCAAA-VOL-27-2019-ISSUE-1.pdf · Volume 27, Number 1 July 15, 2019 . ISSN:1521-1398 PRINT,1572-9206 ONLINE

C. Ding et al.: Lp approximation error for hybrid interpolation on the unit sphere

Proof. For the case S2, we can take d = 2 in Lemma 3.1, Lemma 3.2 and Lemma 3.3. Byusing Lemma 3.1, for arbitrary 1 ≤ p <∞, we have

‖f − IX,Lf‖pLp(S2) =

∫S2|(f − IX,Lf)(ξ)|pdω(ξ) ≤

∑z∈Zh

∫D(z,Mh)

|(f − IX,Lf)(ξ)|pdω(ξ), (3.4)

where M = 23/2. This step motivates us to consider the error estimates locally. In particular,f − IX,Lf is continuous on D(z,Mh), which is a compact subset of S2, so there exists a point

ξz ∈ D(z,Mh) where f − IX,Lf attains its maximum. Now we can write

‖f − IX,Lf‖pLp(S2) ≤∑z∈Zh

|(f − IX,Lf)(ξ)|p∫D(z,Mh)

dω(ξ) ≤ Ch2X∑z∈Zh

|(f − IX,Lf)(ξ)|p, (3.5)

where the constant C satisfies A(z,Mh) ≤ Ch2X . We know that f − IX,Lf ∈ Nφ and Nφ is normequivalent to the Sobolev space Hs. Now, rather than consider f − IX,Lf , we choose instead toconsider the restriction f − IX,Lf

∣∣D(z,M2h)

, where M2 = 23/2 +M1.

We should choose a suitable M1 to fit the conditions of Lemma 3.2, because we can find constantC1, C2 such that

2C2L

3> C1,

2C2L

3> 23/2.

So set h0 = 12L , M1 = 2C2L

3 −23/2, and M2 = 2C2L3 , then it is easy to prove that Lemma 3.2 holds.

If we let vz := f − IX,Lf∣∣D(z,M2h)

and use Lemma 3.2, we have

(E1) ED(z,M2h)vz ∈ Hs(S2),(E2) ED(z,M2h)vz(ξ) = 0 for all ξ ∈ X

⋂D(z,M2h),

(E3) there exists a positive constant C, independent of hX and z such that∥∥ED(z,M2h)vz∥∥Hs(S2)

≤ C‖vz‖Hs(D(z,M2h)).

Hence, with the help of Theorem and (E3) we can obtain

|(f − IX,Lf)(ξz)| =∣∣ED(z,M2h)vz(ξz)

∣∣ ≤ Chs−1X

∥∥ED(z,M2h)vz∥∥Nφ

≤ Chs−1X

∥∥ED(z,M2h)vz∥∥Hs≤ Chs−1X ‖vz‖Hs(D(z,M2h))

.

Substituting this into (3.5) gives

‖f − IX,Lf‖pLp(S2) ≤ Ch2+p(s−1)X

∑z∈Zh

‖vz‖pHs(D(z,M2h)). (3.6)

For p ∈ [2,∞) we use Jensen’s inequality [1]∑Ni=1 a

pi ≤

(∑Ni=1 a

2i

) p2

followed by Lemma 3.3 to

give

‖f − IX,Lf‖pLp(S2) ≤ Ch2+p(s−1)X

(∑z∈Zh

∥∥∥f − IX,Lf ∣∣D(z,M2h)

∥∥∥2Hs(D(z,M2h))

)p/2

≤ Ch2+p(s−1)X

(‖f − IX,Lf‖2Hs(S2)

)p/2≤ Ch2+p(s−1)X ‖f − IX,Lf‖pNφ .

Finally, taking the p-th root gives

‖f − IX,Lf‖Lp(S2) ≤ Ch2p+s−1X ‖f − IX,Lf‖Nφ , p ∈ [2,+∞), (3.7)

where the constant C is independent of f and hX .For p ∈ [1, 2) we conduct the same steps as above, however we replace Jensen’s inequality with

N∑i=1

api ≤ N1− p2

(N∑i=1

a2i

) p2

.

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 27, NO.1, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

108 Chunmei Ding ET AL 104-117

Page 109: Journal of Computational Analysis and Applicationseudoxuspress.com/images/JOCAAA-VOL-27-2019-ISSUE-1.pdf · Volume 27, Number 1 July 15, 2019 . ISSN:1521-1398 PRINT,1572-9206 ONLINE

C. Ding et al.: Lp approximation error for hybrid interpolation on the unit sphere

Moreover, we use the fact that the cardinality of Zh is bounded by CQh−2 (see Lemma 3.1), and

we obtain

‖f − IX,Lf‖pLp(S2) ≤ ChpsX

(∑z∈Zh

∥∥∥f − IX,Lf ∣∣D(z,M2h)

∥∥∥2Hs(D(z,M2h))

)p/2

≤ ChpsX

(‖f − IX,Lf‖2Hs(S2)

)p/2≤ ChpsX ‖f − IX,Lf‖

pNφ .

Finally, taking the p-th root gives

‖f − IX,Lf‖Lp(S2) ≤ ChsX‖f − IX,Lf‖Nφ , p ∈ [1, 2), (3.8)

where the constant C is independent of f and hX .Combining (3.7) and (3.8) yields Theorem 3.1.

4 Inf-sup condition and improved global error estimates

As we can see that the factor ‖f−IX,Lf‖Nφ in Theorem 3.1 may be harder to estimate than factor‖f‖Nφ . Considering the fact that the hybrid interpolation defined in Section 2 is different fromthe interpolation scheme only by radial basis functions constructed from strictly positive definitekernels or conditionally positive definite kernels (see [10, ]), we should find the other method tocharacterize the relationship between ‖f − IX,Lf‖Nφ and ‖f‖Nφ . The following Inf-sup conditionis quoted from [26], whose method is helpful to “tidy up” the error results in Theorem 3.1.

Theorem 4.1 (see [26, Theorem 6.1]). Let φ ∈ C(S2 × S2) be a strictly positive definite kernelon S2, having the representation in (2.3) and al ∼ (l + 1)−2s. Then there exist constants γ > 0and τ > 0 depending only on s such that for all L ≥ 1 and all X = x1, . . . , xN ⊂ S2 satisfyinghX ≤ τ/L, the following inequality holds:

supv∈RX\0

(p, v)Nφ‖v‖Nφ

≥ γ‖p‖Nφ , p ∈ PL, (4.9)

where RX = spanφ(·, x1), . . . , φ(·, xN ).

In order to use the same method in [26], we simply denote that IX,Lf = uX,L + pX,L, where

pX,L =∑Ll=0

∑2l+1k=1 βl,kYl,k, and uX,L =

∑Nj=1 φ(·, xj).

For a given f ∈ Nφ, the interpolation conditions IX,Lf(xi) = f(xi), i = 1, . . . , N, and the side

conditions∑Nj=1 αjq(xj) = 0, ∀q ∈ PL, are equivalent to

(uX,L, vX)Nφ + (pX,L, vX)Nφ = (f, vX)Nφ , vX ∈ RX , (4.10)

and(q, uX,L)Nφ = 0, ∀q ∈ PL. (4.11)

Now we can write the target function f ∈ Nφ in an analogous way to IX,Lf as f := u + p,where p ∈ PL and u ∈ Nφ are defined by (p, q)Nφ = (f, q)Nφ , q ∈ PL, which means that p is theNφ-orthogonal project of f onto PL.

Similar to (4.10) and (4.11), we have

(u, v)Nφ + (p, v)Nφ = (f, v)Nφ , vX ∈ RX , (4.12)

and(q, u)Nφ = 0, q ∈ PL. (4.13)

By subtracting (4.10) from (4.12) (with v replaced by vX) and (4.11) from (4.13), we can obtain

(u− uX,L, vX)Nφ + (p− pX,L, vX)Nφ = 0, vX ∈ RX , (4.14)

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 27, NO.1, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

109 Chunmei Ding ET AL 104-117

Page 110: Journal of Computational Analysis and Applicationseudoxuspress.com/images/JOCAAA-VOL-27-2019-ISSUE-1.pdf · Volume 27, Number 1 July 15, 2019 . ISSN:1521-1398 PRINT,1572-9206 ONLINE

C. Ding et al.: Lp approximation error for hybrid interpolation on the unit sphere

and(q, u− uX,L)Nφ = 0, q ∈ PL. (4.15)

Now we define uX ∈ RX to be the Nφ-orthogonal project of u onto RX , that is,

(uX , vX)Nφ = (u, vX)Nφ , vX ∈ RX . (4.16)

From (4.14), (4.15) and (4.16), we clearly have

(uX − uX,L, vX)Nφ + (p− pX,L, vX)Nφ = 0, vX ∈ RX , (4.17)

and(q, uX − uX,L)Nφ = (q, uX − u)Nφ , q ∈ PL. (4.18)

With the help of Theorem 4.1, we have

‖p− pX,L‖Nφ ≤ 1

γsup

vX∈RX\0

(p− pX,L, vX)Nφ‖vX‖Nφ

=1

γsup

vX∈RX\0

(uX,L − uX , vX)Nφ‖vX‖Nφ

≤ 1

γ‖uX,L − uX‖Nφ .

By using (4.17) with vX = uX − uX,L and (4.18), we also have

‖uX − uX,L‖2Nφ = −(p− pX,L, uX − uX,L)Nφ = −(p− pX,L, uX − u)Nφ

≤ ‖p− pX,L‖Nφ‖uX − u‖Nφ ≤1

γ‖uX,L − uX‖Nφ‖uX − u‖Nφ .

So we obtain that

‖uX − uX,L‖Nφ ≤1

γ‖uX − u‖Nφ ≤ C‖uX − u‖Nφ , (4.19)

and

‖p− pX,L‖Nφ ≤1

γ2‖uX − u‖Nφ ≤ C‖uX − u‖Nφ . (4.20)

With the above inequalities (4.19) and (4.20), we can establish the following Theorem 4.2,which indicates the relationship between ‖f − IX,Lf‖Nφ and ‖f‖Nφ .

Theorem 4.2 Let φ ∈ C(S2× S2) be a strictly positive definite kernel on S2, having the represen-tation in (2.3) and al ∼ (l+ 1)−2s, s > 1. Assume that integer L ≥ 1 and X = x1, . . . , xN ⊂ S2is a set of distinct points on S2 with mesh norm hX ≤ τ/L, where τ is as in Theorem 4.1. Forf ∈ Nφ, let IX,Lf ∈ VX,L be the hybrid interpolation defined in Section 2. Then we have

‖f − IX,Lf‖Nφ ≤ C infq∈PL

‖f − q‖Nφ ≤ C‖f‖Nφ .

Proof. Using the representation IX,Lf = uX,L + pX,L, f = u+ p and (4.19), (4.20) we have

‖f − IX,Lf‖Nφ ≤ ‖u− uX,L‖Nφ + ‖p− pX,L‖Nφ≤ ‖uX − u‖Nφ + ‖uX − uX,L‖Nφ + ‖p− pX,L‖Nφ ≤ C‖uX − u‖Nφ ,

and also we have ‖uX − u‖Nφ ≤ ‖u‖Nφ = ‖f − p‖Nφ = infq∈PL ‖f − q‖Nφ , which yields ‖f −IX,Lf‖Nφ ≤ C infq∈PL ‖f − q‖Nφ ≤ C‖f‖Nφ , and the proof of Theorem 4.2 is completed.

Combining Theorem 4.2 with Theorem 3.1, we can easily verify the following Corollary 4.1.

Corollary 4.1 Under the conditions of Theorem 3.1 apart from the mesh norm 1/(2L + 2) <hX ≤ min1/(2L), τ/L, where τ is as in Theorem 4.1. For f ∈ Nφ, let IX,Lf ∈ VX,L be thehybrid interpolation defined in Section 2. Then we have

‖f − IX,Lf‖Lp(S2) ≤ Ch2p+s−1X ‖f‖Nφ , p ∈ [2,+∞),

and‖f − IX,Lf‖Lp(S2) ≤ Ch

sX‖f‖Nφ , p ∈ [1, 2),

where the constant C is independent of f and hX .

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 27, NO.1, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

110 Chunmei Ding ET AL 104-117

Page 111: Journal of Computational Analysis and Applicationseudoxuspress.com/images/JOCAAA-VOL-27-2019-ISSUE-1.pdf · Volume 27, Number 1 July 15, 2019 . ISSN:1521-1398 PRINT,1572-9206 ONLINE

C. Ding et al.: Lp approximation error for hybrid interpolation on the unit sphere

In the rest part of this section, unlike the above arguments we used to perform the “cleaner”error estimates in Corollary 4.1, we will show that improved global error estimates are available,provided that the target function f belongs to a certain subspace of Nφ, which defined by Nφ∗φ.This procedure is the same as in [10] and the following Definition 4.1 is about the convolutionkernel of φ, which generates the corresponding native space Nφ∗φ.

Definition 4.1 Let φ be a strictly positive definite zonal kernel that defined in (2.3) We definethe convolution kernel of φ by

(φ ∗ φ)(x, y) :=

∫S2φ(x, z)φ(y, z)dω(z), x, y ∈ S2.

Working in terms of Fourier expansions, we have (φ ∗ φ)(x, y) :=∑∞l=0 a

2l

∑2l+1k=1 Yl,k(x)Yl,k(y).

Executing the same arguments as in Section 2, we know that the native space Nφ∗φ associatedwith kernel (φ ∗ φ)(·, ·) can be defined by

Nφ∗φ :=

f ∈ L2(S2) : ‖f‖2Nφ∗φ =

∞∑l=0

2l+1∑k=1

|fl,k|2

a2l<∞

,

and it is a reproducing kernel Hilbert space with the reproducing kernel (φ ∗ φ)(·, ·).When al ∼ (l + 1)−2s for l = 0, 1, . . . and s > 1, we know that the native space Nφ is

norm equivalent to the Sobolev space Hs. So Nφ∗φ ∼= H2s ⊂ Hs∼= Nφ, where ∼= denotes norm

equivalence. Obviously, we see Nφ∗φ ⊂ Nφ.The following Lemma 4.1 gives a crucial inequality, which is helpful to improve the global error

estimates of the hybrid interpolation for a target function f ∈ Nφ∗φ.

Lemma 4.1 Let u ∈ Nφ∗φ and uX ∈ RX be the Nφ-orthogonal project of u onto RX , which hasthe property as in (4.16), then we have

‖uX − u‖2Nφ ≤ ‖u‖Nφ∗φ · ‖uX − u‖L2(S2), (4.21)

where RX is the same as in Theorem 4.1.

Proof. By using (4.16), the definition of (·, ·)Nφ∗φ , and Cauchy-Schwarz inequality respectively,we have

‖uX − u‖2Nφ = (u, uX − u)Nφ =∞∑l=0

2l+1∑k=1

ul,k ·(ul,k −

( uX)l,k)al

( ∞∑l=0

2l+1∑k=1

|ul,k|2

a2l

)1/2( ∞∑l=0

2l+1∑k=1

(ul,k −

( uX)l,k)2)1/2

≤ ‖u‖Nφ∗φ · ‖uX − u‖L2(S2)

With this in place we can provide the following improved global error estimates.

Theorem 4.3 Under the conditions of Corollary 4.1 and assume further that f ∈ Nφ∗φ, we have

‖f − IX,Lf‖Lp(S2) ≤ Ch2p+2s−1X ‖f‖Nφ∗φ , p ∈ [2,+∞), (4.22)

and‖f − IX,Lf‖Lp(S2) ≤ Ch

2sX ‖f‖Nφ∗φ , p ∈ [1, 2), (4.23)

where the constant C is independent of f and hX .

Proof. First we have, from Theorem 3.1, with p = 2, that

‖uX − u‖L2(S2) ≤ ChsX‖uX − u‖Nφ .

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 27, NO.1, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

111 Chunmei Ding ET AL 104-117

Page 112: Journal of Computational Analysis and Applicationseudoxuspress.com/images/JOCAAA-VOL-27-2019-ISSUE-1.pdf · Volume 27, Number 1 July 15, 2019 . ISSN:1521-1398 PRINT,1572-9206 ONLINE

C. Ding et al.: Lp approximation error for hybrid interpolation on the unit sphere

Substituting this into (4.21) gives

‖uX − u‖2Nφ ≤ ChsX‖u‖Nφ∗φ · ‖uX − u‖Nφ . (4.24)

So,‖uX − u‖Nφ ≤ ChsX‖u‖Nφ∗φ . (4.25)

Using the same procedure as in the proof of Theorem 4.2, we see that

‖f − IX,Lf‖Nφ ≤ ‖u− uX,L‖Nφ + ‖p− pX,L‖Nφ ≤ C‖uX − u‖Nφ ≤ ChsX‖u‖Nφ∗φ .

Clearly,

‖u‖Nφ∗φ = ‖f − p‖Nφ∗φ = infq∈PL

‖f − q‖Nφ∗φ ≤ ‖f‖Nφ∗φ , (4.26)

which implies‖f − IX,Lf‖Nφ ≤ ChsX‖f‖Nφ∗φ . (4.27)

With the help of Theorem 3.1 we see

‖f − IX,Lf‖Lp(S2) ≤ Ch2p+2s−1X ‖f‖Nφ∗φ , p ∈ [2,+∞),

and‖f − IX,Lf‖Lp(S2) ≤ Ch

2sX ‖f‖Nφ∗φ , p ∈ [1, 2),

where the constant C is independent of f and hX .

5 Hybrid interpolation for rough native space

In order to generate a larger native space than Nφ, we should give a new kernel defined in the form

ψ(x, y) =∞∑l=0

bl

2l+1∑k=1

Yl,k(x)Yl,k(y), (5.28)

with bl > 0 for all l, and∑∞l=0 lbl <∞.

With respect to the inner product expressed as (f, g)Nψ =∑∞l=0

∑2l+1k=1

fl,kgl,kbl

, the native spaceNψ may alternatively be characterized as the following set

Nψ :=

f ∈ L2(S2) : ‖f‖2Nψ =

∞∑l=0

2l+1∑k=1

|fl,k|2

bl<∞

.

Assuming that bl > al, for all l = 0, 1, . . . , we then see that Nφ ⊂ Nψ.Next, we will consider the error estimates for the hybrid interpolation of a target function

f ∈ Nψ ⊃ Nφ. Obviously, if we take the hybrid interpolation associated with the less smooth

kernel ψ in the form IX,L,ψf =∑Nj=1 αjψ(·, xj) +

∑Ll=0

∑2l+1k=1 βl,kYl,k, then Theorem 3.1 above

still holds for f ∈ Nψ. However, motivated by the idea in [12], we still take the initial hybridinterpolation IX,L,φf in the form

IX,L,φf =N∑j=1

αjφ(·, xj) +L∑l=0

2l+1∑k=1

βl,kYl,k, (5.29)

and consider the error estimate ‖f − IX,L,φf‖Lp(S2).

Lemma 5.1 Let α be a nonnegative real number, and let M be the multiplier operator definedon PL (embedded in C(S2)) by M(p) =

∑Ll=0(λl)

α∑2l+1k=1 cl,kYl,k, where p =

∑Ll=0

∑2l+1k=1 cl,kYl,k.

Then we have ‖M(p)‖ ≤ C(λL)α‖p‖, where C is a constant independent of p and L.

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 27, NO.1, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

112 Chunmei Ding ET AL 104-117

Page 113: Journal of Computational Analysis and Applicationseudoxuspress.com/images/JOCAAA-VOL-27-2019-ISSUE-1.pdf · Volume 27, Number 1 July 15, 2019 . ISSN:1521-1398 PRINT,1572-9206 ONLINE

C. Ding et al.: Lp approximation error for hybrid interpolation on the unit sphere

Lemma 5.1 is a special case of Theorem 3.2 in [4].

Lemma 5.2 Let X = x1, . . . , xN ⊂ S2 satisfying hX ≤ 1/(2L), then for any linear functionalσ on PL (embedded in C(S2)), such that ‖σ‖∗ = 1, there exist N real numbers αj := αj(x) (x is

fixed) with∑Nj=1 |αj | ≤ 2, so that σ(f) =

∑Nj=1 αjδj(f) for all f ∈ PL, where δj denotes the point

evaluation functional at the point xj in X.

The proof of the following Lemma 5.3 can be found in [29, Corollary 17.12].

Lemma 5.3 Suppose that X = x1, . . . , xN ⊂ S2 has mesh norm hX ≤ 12L for some integer

L ≥ 1. Then there exist functions αj : S2 → R for j = 1, . . . , N such that

(i)∑Nj=1 αj(x)p(xj) = p(x), ∀p ∈ PL, ∀x ∈ S2,

(ii)∑Nj=1 |αj(x)| ≤ 2, ∀x ∈ S2.

The following Theorem 5.1 is about the pointwise error estimate |f(x)− IX,L,φf(x)|, by whichwe can obtain the global error estimate ‖f − IX,L,φf‖Lp(S2).

Theorem 5.1 Let φ ∈ C(S2 × S2) be a strictly positive definite kernel defined by (2.3), let ψ ∈C(S2×S2) be a strictly positive definite kernel on S2, having the representation in (5.28), bl/al = λlfor l ≥ 1 and bl ∼ (l+ 1)−2s, s > 1, l ≥ 0. Assume that integer L ≥ 1 and X = x1, . . . , xN ⊂ S2is a set of distinct points on S2 with mesh norm 1/(2L + 2) < hX ≤ 1/(2L). For f ∈ Nψ, letIX,L,φf ∈ VX,L be the hybrid interpolation defined in (5.29). Then for a fixed x ∈ S2, we have

|f(x)− IX,L,φf(x)| ≤ Chs−1X ‖f − IX,L,φf‖Nψ .

Proof. For ∀f ∈ Nψ, we simply take the hybrid interpolation associated with the smooth kernel

φ by IX,L,φf(x) = uX,L,φ + pX,L, where uX,L,φ =∑Nj=1 αjφ(·, xj), xj ∈ X = x1, x2, . . . , xN,

and pX,L =∑Ll=0

∑2l+1k=1 βl,kYl,k, such that IX,L,φf(xj) = f(xj)(j = 1, 2, . . . , N).

However, if we just use the hybrid interpolation associated with the less smooth kernel ψ, wehave IX,L,ψf(x) = uX,L,ψ +p′X,L, where uX,L,ψ =

∑Nj=1 γjψ(·, xj), xj ∈ X = x1, x2, . . . , xN, and

p′X,L =∑Ll=0

∑2l+1k=1 β

′l,kYl,k.

First, we consider the estimate of ‖ψ(·, x)−uX,L,ψ‖Nψ . Using the same method as that in [12],we have

‖ψ(·, x)− uX,L,ψ‖Nψ = supv∈Nψ‖v‖Nψ=1

(ψ(·, x)− uX,L,ψ, v)Nψ

= supv∈Nψ‖v‖Nψ=1

∞∑l=0

b−1l

2l+1∑k=1

vl,k

bl N∑j=1

γjYl,k(xj)− blYl,k(x)

= supv∈Nψ‖v‖Nψ=1

∞∑l=0

2l+1∑k=1

vl,k

N∑j=1

γjYl,k(xj)− Yl,k(x)

.

By using Lemma 5.3, for a fixed x, we see that there exist N real numbers γj with∑Nj=1 |γj | ≤ 2

such thatN∑j=1

γjYl,k(xj) = Yl,k(x), l = 0, 1, . . . , L, (5.30)

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 27, NO.1, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

113 Chunmei Ding ET AL 104-117

Page 114: Journal of Computational Analysis and Applicationseudoxuspress.com/images/JOCAAA-VOL-27-2019-ISSUE-1.pdf · Volume 27, Number 1 July 15, 2019 . ISSN:1521-1398 PRINT,1572-9206 ONLINE

C. Ding et al.: Lp approximation error for hybrid interpolation on the unit sphere

which yields

‖ψ(·, x)− uX,L,ψ‖Nψ = supv∈Nψ‖v‖Nψ=1

∞∑l=L+1

2l+1∑k=1

vl,k

N∑j=1

γjYl,k(xj)− Yl,k(x)

= supv∈Nψ‖v‖Nψ=1

N∑j=1

γj

∞∑l=L+1

2l+1∑k=1

vl,kYl,k(xj)−∞∑

l=L+1

2l+1∑k=1

vl,kYl,k(x)

≤ supv∈Nψ‖v‖Nψ=1

N∑j=1

|γj |

∣∣∣∣∣∞∑

l=L+1

2l+1∑k=1

vl,kYl,k(xj)

∣∣∣∣∣+ sup

v∈Nψ‖v‖Nψ=1

∣∣∣∣∣∞∑

l=L+1

2l+1∑k=1

vl,kYl,k(x)

∣∣∣∣∣ .By using the Cauchy-Schwarz inequality, (5.30) and the relation in (2.1), we see that

‖ψ(·, x)− uX,L,ψ‖Nψ ≤N∑j=1

|γj | maxxj∈X

( ∞∑l=L+1

bl

2l+1∑k=1

Y 2l,k(xj)

) 12

supv∈Nψ‖v‖Nψ=1

( ∞∑l=L+1

2l+1∑k=1

v2l,kbl

) 12

+

( ∞∑l=L+1

bl

2l+1∑k=1

Y 2l,k(x)

) 12

t supv∈Nψ‖v‖Nψ=1

( ∞∑l=L+1

2l+1∑k=1

v2l,kbl

) 12

≤ 2

( ∞∑l=L+1

bl2l + 1

) 12

+

( ∞∑l=L+1

bl2l + 1

) 12

≤ C1

( ∞∑l=L+1

(2l + 1)bl

) 12

≤ C1

( ∞∑l=L+1

(l + 1)−2s+1

) 12

≤ C1(L+ 1)−s+1 ≤ C1hs−1X . (5.31)

Next we consider the estimate of ‖ψ(·, x) − uX,L,φ‖Nψ , in which we will use Lemma 5.1 andLemma 5.2.

‖ψ(·, x)− uX,L,φ‖Nψ = supv∈Nψ‖v‖Nψ=1

(ψ(·, x)− uX,L,φ, v)Nψ

= supv∈Nψ‖v‖Nψ=1

∞∑l=0

b−1l

2l+1∑k=1

vl,k

al N∑j=1

αjYl,k(xj)− blYl,k(x)

= supv∈Nψ‖v‖Nψ=1

∞∑l=0

b−1l al

2l+1∑k=1

vl,k

N∑j=1

αjYl,k(xj)−blalYl,k(x)

.

Let TL be the multiplier operator defined on PL (embedded in C(S2)) by TL(Yl,k) = blalYl,k, for

each l = 0, 1, . . . , L and all k = 1, 2, . . . , 2l+ 1, and extended linearly throughout PL. Let σ be thelinear functional on PL defined by σ = δx TL. That is σ(p) = (TL(p))(x) for each p ∈ PL. ByLemma 5.1 with α = 1 and the assumption that bl/al = λl, l ≥ 1, we have

|σ(p)| = |(TL(p))(x)| ≤ ‖TL(p)‖ ≤ CλL‖p‖ = CbLaL‖p‖,

in which C is a constant independent of p and L. Then by Lemma 5.2, there exist N real numbersαj with

∑Nj=1 |αj | ≤ 2C bL

aLsuch that

N∑j=1

αjYl,k(xj) =blalYl,k(x), l = 0, 1, . . . , L. (5.32)

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 27, NO.1, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

114 Chunmei Ding ET AL 104-117

Page 115: Journal of Computational Analysis and Applicationseudoxuspress.com/images/JOCAAA-VOL-27-2019-ISSUE-1.pdf · Volume 27, Number 1 July 15, 2019 . ISSN:1521-1398 PRINT,1572-9206 ONLINE

C. Ding et al.: Lp approximation error for hybrid interpolation on the unit sphere

With the help of (5.32), we see that

‖ψ(·, x)− uX,L,φ‖Nψ = supv∈Nψ‖v‖Nψ=1

∞∑l=L+1

b−1l al

2l+1∑k=1

vl,k

N∑j=1

αjYl,k(xj)−blalYl,k(x)

= supv∈Nψ‖v‖Nψ=1

N∑j=1

αj

∞∑l=L+1

b−1l al

2l+1∑k=1

vl,kYl,k(xj)−∞∑

l=L+1

2l+1∑k=1

vl,kYl,k(x)

≤ supv∈Nψ‖v‖Nψ=1

N∑j=1

|αj |

∣∣∣∣∣∞∑

l=L+1

albl

2l+1∑k=1

vl,kYl,k(xj)

∣∣∣∣∣+ sup

v∈Nψ‖v‖Nψ=1

∣∣∣∣∣∞∑

l=L+1

2l+1∑k=1

vl,kYl,k(x)

∣∣∣∣∣ .Using the Cauchy-Schwarz inequality, we see that

‖ψ(·, x)− uX,L,φ‖Nψ ≤N∑j=1

|αj | maxxj∈X

( ∞∑l=L+1

a2lbl

2l+1∑k=1

Y 2l,k(xj)

) 12

supv∈Nψ‖v‖Nψ=1

( ∞∑l=L+1

2l+1∑k=1

v2l,kbl

) 12

+

( ∞∑l=L+1

bl

2l+1∑k=1

Y 2l,k(x)

) 12

supv∈Nψ‖v‖Nψ=1

( ∞∑l=L+1

2l+1∑k=1

v2l,kbl

) 12

.

With the help of∑Nj=1 |αj | ≤ 2C bL

aL, bl > al and the relation in (2.1), we have

‖ψ(·, x)− uX,L,φ‖Nψ ≤ 2CbLaL

( ∞∑l=L+1

a2lbl

2l + 1

) 12

+

( ∞∑l=L+1

bl2l + 1

) 12

≤ 2CbLaL

( ∞∑l=L+1

bl2l + 1

) 12

+

( ∞∑l=L+1

bl2l + 1

) 12

≤ C2

( ∞∑l=L+1

(2l + 1)bl

) 12

≤ C2

( ∞∑l=L+1

(l + 1)−2s+1

) 12

≤ C2(L+ 1)−s+1 ≤ C2hs−1X . (5.33)

With the above obtained results, we can provide the following pointwise error estimate:

|f(x)− IX,L,φf(x)| =∣∣∣(f − IX,L,φf, ψ(·, x))Nψ

∣∣∣=

∣∣∣ (f − IX,L,φf, ψ(·, x)− uX,L,φ)Nψ + (f − IX,L,φf, uX,L,ψ)Nψ

+ (f − IX,L,φf, uX,L,φ − uX,L,ψ)Nψ

∣∣∣ := |I1 + I2 + I3| .

It is easy to verify that

I2 : = (f − IX,L,φf, uX,L,ψ)Nψ =

f − IX,L,φf, N∑j=1

γjψ(·, xj)

=N∑j=1

γj (f(xj)− IX,L,φf(xj)) = 0.

With the help of (5.33), we have

|I1| :=∣∣∣ (f − IX,L,φf, ψ(·, x)− uX,L,φ)Nψ

∣∣∣ ≤ ‖f − IX,L,φf‖Nψ‖ψ(·, x)− uX,L,φ‖Nψ≤ C2h

s−1X ‖f − IX,L,φf‖Nψ .

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 27, NO.1, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

115 Chunmei Ding ET AL 104-117

Page 116: Journal of Computational Analysis and Applicationseudoxuspress.com/images/JOCAAA-VOL-27-2019-ISSUE-1.pdf · Volume 27, Number 1 July 15, 2019 . ISSN:1521-1398 PRINT,1572-9206 ONLINE

C. Ding et al.: Lp approximation error for hybrid interpolation on the unit sphere

We denote I4 := (f − IX,L,φf, ψ(·, x)− uX,L,ψ)Nψ so that we have I3 = I4 − I1.

With the help of (5.31) we can see that

|I4| =∣∣∣ (f − IX,L,φf, ψ(·, x)− uX,L,ψ)Nψ

∣∣∣ ≤ ‖f − IX,L,φf‖Nψ‖ψ(·, x)− uX,L,ψ‖Nψ≤ C1h

s−1X ‖f − IX,L,φf‖Nψ ,

which yields |I3| ≤ (C1 + C2)hs−1X ‖f − IX,L,φf‖Nψ . Then

|f(x)− IX,L,φf(x)| ≤ |I1|+ |I2|+ |I3| ≤ (C1 + 2C2)hs−1X ‖f − IX,L,φf‖Nψ≤ Chs−1X ‖f − IX,L,φf‖Nψ .

This completes the proof of Theorem 5.1.Having the pointwise error estimate in Theorem 5.1, we can perform the same steps in Theorem

3.1, where the local-global strategy is the key to establish the error estimates. So we are now readyto state the error estimates of the hybrid interpolation for a target function f ∈ Nψ for Lp norm.

Theorem 5.2 Under the conditions of Theorem 5.1, we have

‖f − IX,L,φf‖Lp(S2) ≤ Ch2p+s−1X ‖f − IX,L,φf‖Nψ , p ∈ [2,+∞), (5.34)

and‖ f − IX,L,φf ‖Lp(S2)≤ Ch

sX ‖ f − IX,L,φf ‖Nψ , p ∈ [1, 2), (5.35)

where the constant C is independent of f and hX .

References

[1] S. C. Brenner, R. L. Scott, The Mathematical Theory of Finite Element Methods, Springer,New York, 1994.

[2] F. Cao, M. Li, Spherical data fitting by multiscale moving least squares, Applied Math. Model.,39 (2015) 3448-3458.

[3] D. Chen, V. A. Menegatto, X. Sun, A necessary and sufficient condition for strictly positivedefinite functions on spheres, Proc. Amer. Math. Soc., 131 (2003) 2733-2740.

[4] Z. Ditzian, Fractional derivatives and best approximation, Acta. Math. Hungar., 81 (1998)323-348.

[5] G. E. Fasshauer, L. L. Schumaker, Scattered data fitting on the sphere, in MathematicalMethods for Curves and Surfaces II (M. Dælen, T. Lyche, and L. L. Schumaker, eds. ),Vanderbilt University Press, Nashville, TN, (1998) 117-166.

[6] W. Freeden, T. Gervens, M. Schreiner, Constructive Approximation on the Sphere, OxfordUniversity Press Inc., New York, 1998.

[7] P. B. Gilkey, The Index Theorem and the Heat Equation, Publish or Perish, Boston, MA,1974.

[8] M. v. Golitschek, W. A. Light, Interpolation by polynomials and radial basis functions onspheres, Constr. Approx., 17 (2001) 1-18.

[9] S. Hubbert, T. M. Morton, A Duchon framework for the sphere, J. Approx. Theory, 129 (2004)28-57.

[10] S. Hubbert, T. M. Morton, Lp-error estimates for radial basis function interpolation on thesphere, J. Approx. Theory, 129 (2004) 58-77.

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 27, NO.1, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

116 Chunmei Ding ET AL 104-117

Page 117: Journal of Computational Analysis and Applicationseudoxuspress.com/images/JOCAAA-VOL-27-2019-ISSUE-1.pdf · Volume 27, Number 1 July 15, 2019 . ISSN:1521-1398 PRINT,1572-9206 ONLINE

C. Ding et al.: Lp approximation error for hybrid interpolation on the unit sphere

[11] K. Jetter, J. Stockler, J. D. Ward, Error estimates for scattered data interpolation on spheres,Math. Comp., 68 (1999) 733-747.

[12] J. Levesley, X. Sun, Approximation in rough native spaces by shifts of smooth kernels onspheres, J. Approx. Theory, 133 (2005) 269-283.

[13] J. Levesley, X. Sun, Corrigendum to and two open questions arising from the article “Approx-imation in rough native spaces by shifts of smooth kernels on spheres” [J. Approx. Theory,133 (2005) 269-283], J. Approx. Theory, 138 (2006) 124-127.

[14] Q. T. Le Gia, F. J. Narcowich, J. D. Ward, H. Wendland, Continuous and discrete least-squares approximation by radial basis functions on spheres, J. Approx. Theory, 143 (2006)124-133.

[15] M. Li, F. Cao, Local uniform error estimates for spherical basis functions interpolation, Math.Meth. Applied Sci., 37 (2014) 1364-1376.

[16] C. Muller, Spherical Harmonics, Lecture Notes in Mathematics, Vol. 17, Springer-Verlag,Berlin, 1966.

[17] F. J. Narcowich, R. Schaback, J. D. Ward, Approximation in Sobolev spaces by kernel expan-sions, J. Approx. Theory, 114 (2002) 70-83.

[18] F. J. Narcowich, J. D. Ward, Scattered data interpolation on spheres: Error estimates andlocally supported basis functions, SIAM J. Math. Anal., 33 (2002) 1393-1410.

[19] F. J. Narcowich, X. Sun, J. D. Ward, H. Wendland, Direct and inverse sobolev error estimatesfor scattered data interpolation via spherical basis functions, Found. Comput. Math., (2007)369-390.

[20] F. J. Narcowich, X. Sun, J. D. Ward, Approximation power of RBFs and their associatedSBFs: A connection, Adv. Comput. Math., 27 (2007) 107-124.

[21] A. Ron, X. Sun, Strictly positive definite functions on spheres in Enclidean spaces, Math.Comp., 65 (1996) 1513-1530.

[22] R. Schaback, Improved error bounds for scattered data interpolation by radial basis functions,Math. Comp., 68 (1999) 201-216.

[23] I. J. Schoenberg, Positive definite functions on spheres, Duke Math. J., 9 (1942) 96-108.

[24] E. M. Stein, G. Weiss, Introduction to Fourier Analysis on Euclidean Spaces, Princeton Uni-versity Press, Princetion, NJ, 1971.

[25] I. H. Sloan, A. Sommariva, Approximation on the sphere using radial basis function pluspolynomials, Adv. Comput. Math., 29 (2008) 147-177.

[26] I. H. Sloan, H. Wendland, Inf-sup condition for spherical polynomials and radial basis functionson spheres, Math. Comp., 78 (2009) 1319-1331.

[27] I. H. Sloan, Polynomial interpolation and hyperinterpolation over general regions, J. Approx.Theory, 83 (1995) 238-254.

[28] I. H. Sloan, R. S. Womersley, Constructive polynomial approximation on the sphere, J. Ap-prox. Theory, 103 (2000) 91-118.

[29] H. Wendland, Scattered Data Approximation, Cambridge University Press, Cambridge, Uk,2005.

[30] Y. Xu, E. W. Cheney, Strictly positive definite functions on spheres, Proc. Amer. Math. Soc.,116 (1992) 977-981.

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 27, NO.1, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

117 Chunmei Ding ET AL 104-117

Page 118: Journal of Computational Analysis and Applicationseudoxuspress.com/images/JOCAAA-VOL-27-2019-ISSUE-1.pdf · Volume 27, Number 1 July 15, 2019 . ISSN:1521-1398 PRINT,1572-9206 ONLINE

Some best approximation formulas and inequalities for theBateman’s G−function

Ahmed Hegazi1, Mansour Mahmoud2,Ahmed Talat3 and Hesham Moustafa4

1,2,4Mansoura University, Faculty of Science, Mathematics Department, Mansoura 35516, Egypt.

3Port Said University, Faculty of Science, Mathematics and Computer Sciences Department,

Port Said, Egypt.

1 [email protected], [email protected],

3a−t−[email protected], [email protected]

.

.

Abstract

In the paper, the authors established two best approximation formulas for the Bateman’sG−function. Also, they studied the completely monotonicity of some functions involvingG(x). Some new inequalities are deduced for the function and its derivative such as

1

2ln

[1 +

2x + a

x2 + 2x + 43

]< G(x + 2) <

1

2ln

[1 +

2x + b

x2 + 2x + 43

], x > 0

where a = 3 and b = e4−1612 are the best possible constants. Our results improve some recent

inequalities about the function G(x).

2010 Mathematics Subject Classification: 33B15, 26D15, 41A25, 26A48.

Key Words: Digamma function, Bateman G−function , best approximation, completelymonotonic, monotonicity, bounds, rate of convergence, best possible constant.

1 Introduction.

In 2010, Mortici [21] presented the following Lemma which is considered as a powerful tool toconstructing asymptotic expansions and to measure the rate of convergence:

Lemma 1.1. If τss∈N is convergent to zero and there exist h in R and k > 1 such that

lims→∞

sk(τs − τs+1) = h, (1)

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 27, NO.1, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

118 Ahmed Hegazi ET AL 118-135

Page 119: Journal of Computational Analysis and Applicationseudoxuspress.com/images/JOCAAA-VOL-27-2019-ISSUE-1.pdf · Volume 27, Number 1 July 15, 2019 . ISSN:1521-1398 PRINT,1572-9206 ONLINE

then we get

lims→∞

sk−1τs =h

k − 1.

It is clear from lemma (1.1) that, the sequence τss∈N will converge more quickly when thevalue of k is large in the relation (1). This Lemma has been applied successfully to produceseveral approximations and inequalities in several papers such as [6], [7], [11], [15], [16], [22], [24],[28]. In this paper, Lemma (1.1) will be an effectively tool in producing best approximations ofthe Bateman’s G−function defined by [9]

G(x) = ψ

(x+ 1

2

)− ψ

(x2

), x 6= 0,−1,−2, ... (2)

where ψ(x) is the digamma or Psi function which is defined by

ψ(x) =d

dxln Γ(x)

and Γ(x) is the classical Euler gamma given for x > 0 by

Γ(x) =

∫ ∞0

e−wwx−1dw.

The hypergeometric representation of the function G(x) is given by

G(x) =1

x2F1 (1, 1; 1 + x; 1/2) (3)

and it satisfies the following relations [9]:

G(x+ 1) +G(x) =2

x(4)

and

G(x) = 2

∫ ∞0

e−xw

1 + e−wdw, x > 0. (5)

Qiu and Vuorinen [30] established the inequality

x+ (6− 4 ln 4)

x2< G(x) <

x+ 1/2

x2, x > 1/2 (6)

and Mortici [23] presented the general inequality

0 < ψ(x+ j)− ψ(x) ≤ ψ(j) + γ − j + j−1, x ≥ 1; j ∈ (0, 1) (7)

where γ is Euler−Mascheroni constant (also called Euler’s constant) defined by

γ = limm→∞

(− lnm+

m∑w=1

1

w

).

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 27, NO.1, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

119 Ahmed Hegazi ET AL 118-135

Page 120: Journal of Computational Analysis and Applicationseudoxuspress.com/images/JOCAAA-VOL-27-2019-ISSUE-1.pdf · Volume 27, Number 1 July 15, 2019 . ISSN:1521-1398 PRINT,1572-9206 ONLINE

Mahmoud and Agarwal [17] deduced the following asymptotic formula for x→∞

G(x)− 1

x∼

∞∑w=1

(22w − 1)B2w

wx−2w, (8)

where Bw′s are the Bernoulli numbers [1] defined by the generating series

∞∑w=0

Bwvw

w!=

v

ev − 1.

They also presented the following double inequality

1

x+

1

2x2 + 32

< G(x) <x+ 1/2

x2, x > 0 (9)

which improves the lower bound of the inequality (6) for x >(

9−12 ln 216 ln 2−11

)1/2. In [18] Mahmoud

and Almuashi proved the following inequality

2r∑w=1

(22w − 1)

w

B2w

x2w< G(x)− x−1 <

2r−1∑w=1

(22w − 1)

w

B2w

x2w, r ∈ N (10)

where (22w−1)w

B2w are the best possible constants. In [19], Mahmoud, Talat and Moustafa pre-sented the following approximations of the Bateman’s G−function

G(x) ≈ ln

(1 +

1

x+ c

)+

2

x(x+ 1), c ∈ [1, 2], x > 0 (11)

and they deduced the following double inequality

ln

(1 +

1

x+ α2

)+

2

x(x+ 1)< G(x) < ln

(1 +

1

x+ α1

)+

2

x(x+ 1), x > 0 (12)

where the constants α1 = 1 and α2 = 4e2−4 are the best possible constants.

Recently, Mahmoud, Talat, Moustafa and Agarwal [20] improved the double inequality (9)by

1

x+

1

2x2 + a< G(x) <

1

x+

1

2x2 + b, x > 0 (13)

where a = 1 and b = 0 are the best possible constants.

A function T defined on an interval I is said to be completely monotonic if it possessesderivatives T (s)(x) for all s = 0, 1, 2, ... such that

(−1)sT (s)(x) ≥ 0 x ∈ I; s = 0, 1, 2, ... . (14)

Such functions occur in several areas such as numerical analysis, elasticity and probability theory,for more details see [2], [5], [12]-[14], [26], [27], [29]. According to Bernstein theorem [31],

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 27, NO.1, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

120 Ahmed Hegazi ET AL 118-135

Page 121: Journal of Computational Analysis and Applicationseudoxuspress.com/images/JOCAAA-VOL-27-2019-ISSUE-1.pdf · Volume 27, Number 1 July 15, 2019 . ISSN:1521-1398 PRINT,1572-9206 ONLINE

the necessary and sufficient condition for the function T (x) to be completely monotonic for0 < x <∞ is that

T (x) =

∫ ∞0

e−xtdλ(t), (15)

where λ(t) is non-decreasing and the integral converges for 0 < x <∞.

In this paper, we presented two best approximation formulas of the Bateman’s G−functionand some completely monotonic functions involving it. Some new inequalities of G(x) and itsderivative will be deduced, which improve some pervious results.

2 Auxiliary Results

We can easily prove the following simple modification of Lemma (1.1):

Lemma 2.1. If τss∈N is convergent to zero and there exist h ∈ R, m ∈ N and k > 1 such that

lims→∞ sk(τs − τs+m) = h, then we get lims→∞ s

k−1τs = h/mk−1 .

Proof. Using the relation

lims→∞

sk(τs − τs+m) = lims→∞

skm−1∑i=0

(τs+i − τs+i+1) = lims→∞

m−1∑i=0

(s

s+ i)k(s+ i)k(τs+i − τs+i+1)

=m−1∑i=0

lims→∞

(s

s+ i)k(s+ i)k(τs+i − τs+i+1) =

m−1∑i=0

lims→∞

(s+ i)k(τs+i − τs+i+1)

=m−1∑i=0

limv→∞

vk(τv − τv+1) = m limv→∞

vk(τv − τv+1),

then limv→∞

vk(τv − τv+1) = hm

. Applying Lemma (1.1) to get lims→∞ sk−1τs = h/m

k−1 .

Lemma 2.2.

1. For x > x0 ≈ 4.02361, we have N(x) = ln(

(x+1)(3−√6+3x)

(x+2)(−√6+3x)

)−

(1+√

23

)x(x+1)

< 0.

2. For x > xλ ≈ 2.02059, we have M(x) = ln

((x+ 4

e2−4)(3+

√6+3x)

(x+1+ 4e2−4

)(√6+3x)

)−

(1−√

23

)x(x+1)

> 0.

3. For x > 0, we have H(x) = ln(

(√6+3x)2(13+12x+3x2)

(3+√6+3x)2(4+6x+3x2)

)+ 2

(1−√

23

)x(x+1)

> 0.

Proof.

1. For x >√

23, N ′(x) = 9x3−(9+14

√6)x2−(6+11

√6)x−2

√6

x2(x+1)2(x+2)(3x−√6)(3x+3−

√6)

, n1(x)n2(x)

, where the polynomial n2(x)

is positive for x >√

23

and n1(x) is a polynomial of degree 3 has only one positive real

root x1 ≈ 5.49455 and n1(x) > (<) 0 for x > (<) x1. Then N ′(x) > 0 for x > x1 with

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 27, NO.1, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

121 Ahmed Hegazi ET AL 118-135

Page 122: Journal of Computational Analysis and Applicationseudoxuspress.com/images/JOCAAA-VOL-27-2019-ISSUE-1.pdf · Volume 27, Number 1 July 15, 2019 . ISSN:1521-1398 PRINT,1572-9206 ONLINE

limx→∞N(x) = 0 and hence N(x) < 0 for x > x1. Also, N(x) is decreasing on(√

23, x1

)with N(4.023) ≈ 0.0000005 > 0 and N(4.024) ≈ −0.0000003 < 0. Then N(x) has only

one real root x0 ≈ 4.02361 ∈(√

23, x1

)and N(x) < 0 for x0 < x < x1. Hence, N(x) < 0

for x > x0.

2. For x > 0, M ′(x) = m(x)

x2(1+x)2(√6+3x)(3+

√6+3x)(4+(e2−4)x)(e2+(e2−4)x) , where

m(x) = 4√

6e2 +(−16√

6 + (−12 + 20√

6)e2 +√

6e4)x+

(576− 216e2 + 18e4

)x5

+(

144− 16√

6− (72 + 20√

6)e2 + (3 + 9√

6)e4)x2

+(

384 + 224√

6− (144 + 160√

6)e2 + (12 + 20√

6)e4)x3

+(

432 + 384√

6− (252 + 144√

6)e2 + (27 + 12√

6)e4)x4

and

m′(x) = 5(576− 216e2 + 18e4

)x4 +

(−16√

6 + (−12 + 20√

6)e2 +√

6e4)

+ 4(

432 + 384√

6 + (−252− 144√

6)e2 + (27 + 12√

6)e4)x3

+ 3(

384 + 224√

6 + (−144− 160√

6)e2 + (12 + 20√

6)e4)x2

+ 2(

144− 16√

6 + (−72− 20√

6)e2 + (3 + 9√

6)e4)x.

The polynomial m′(x) of fourth degree has only one positive real root xα ≈ 2.57862 alsom′(x) < 0 for x > xα and m′(x) > 0 for 0 < x < xα. Hence m(x) is increasing on (0, xα)and is decreasing on (xα,∞) with m(0) > 0, m(3.453) ≈ 22.157 > 0 and m(3.455) ≈−6.01919 < 0. Then m(x) has only one positive real root xβ ≈ 3.45457 with m(x) < 0for x > xβ and m(x) > 0 for 0 < x < xβ. Now M(x) is decreasing on (xβ,∞) andlimx→∞

M(x) = 0, then M(x) > 0 for x > xβ. Also, M(x) is increasing on (0, xβ) with

M(2.0205) ≈ −0.0000006 < 0 and M(2.0206) ≈ 0.0000001 > 0, then M(x) has only onepositive real root xλ ≈ 2.02059. Hence, M(x) > 0 for x > xλ.

3.

H ′(x) =−4h(x)

x2(1 + x)2(√

6 + 3x)(3 +√

6 + 3x)(4 + 6x+ 3x2)(13 + 12x+ 3x2),

where

h(x) = 26√

6 + (−78 + 193√

6)x+ (−300 + 477√

6)x2 + (−324 + 498√

6)x3

+(−126 + 234√

6)x4 + 36√

6x5 > 0, x > 0.

Hence H ′(x) < 0 for all x > 0 with limx→∞

H(x) = 0 , then H(x) > 0 for x > 0 .

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 27, NO.1, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

122 Ahmed Hegazi ET AL 118-135

Page 123: Journal of Computational Analysis and Applicationseudoxuspress.com/images/JOCAAA-VOL-27-2019-ISSUE-1.pdf · Volume 27, Number 1 July 15, 2019 . ISSN:1521-1398 PRINT,1572-9206 ONLINE

The following result is considered as a method presented by Elbert and Laforgia in [8] (seealso, [4], [25] and [32]):

Corollary 2.3. Let K be a real-valued function defined on x > a, a ∈ R with limx→∞K(x) = 0.Then K(x) > 0, if K(x) > K(x + 1) for all x > a and K(x) < 0, if K(x) < K(x + 1) for allx > a.

This result has the following simple modification [20]:

Corollary 2.4. Let K be a real-valued function defined on x > a, a ∈ R with limx→∞K(x) = 0.Then for m ∈ N, K(x) > 0, if K(x) > K(x+m) for all x > a and K(x) < 0, if K(x) < K(x+m)for all x > a.

3 First formula of the best approximations and some its

related inequalities

With the help of Mortici’s technique in Lemma(1.1), we provide the first best approximationformula of the Bateman’s G−function.

Lemma 3.1. The best approximation

G(n) ≈ ln(1 +1

n+ a) +

b

n(n+ c)(16)

holds for

a =θ1 + θ2 − 5

9, b = a+ 1 and c =

θ21 + θ22 + 2θ1 + 2θ2 − 21

54, (17)

where θ1, θ2 =3√

91± 63√

2 and the sequence G(n)− ln(1 + 1n+a

)− bn(n+c)

converges to zero with

speed estimated by n−5.

Proof. Define the error sequence by υn = G(n) − ln(1 + 1

n+a

)− b

n(n+c). Using the functional

equation (4), we get

υn − υn+2 =∞∑r=3

(−1)r−1

nrb[cr−1 + 2r−1 − (2 + c)r−1]/c+ [(a+ 3)r − (a+ 2)r − (a+ 1)r

+ ar]/r − 2

=4(a− b+ 1)

n3− 2(7 + 3a(a+ 3)− 3b(c+ 2))

n4

+4(a(16 + a(9 + 2a))− 2(−5 + b(4 + c(3 + c))))

n5

− 326/3 + 10a(3 + a)(7 + a(3 + a))− 10b(2 + c)(4 + c(2 + c))

n6+O(n−7).

According to Lemma (2.1), the three parameters a, b and c which produce the fastest convergenceof the sequence υn satisfy the system

a− b+ 1 = 0

3a2 + 9a− 3b(c+ 2) + 7 = 0

a3 +9

2a2 + 8a+ 5− b(c2 + 3c+ 4) = 0.

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 27, NO.1, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

123 Ahmed Hegazi ET AL 118-135

Page 124: Journal of Computational Analysis and Applicationseudoxuspress.com/images/JOCAAA-VOL-27-2019-ISSUE-1.pdf · Volume 27, Number 1 July 15, 2019 . ISSN:1521-1398 PRINT,1572-9206 ONLINE

Now, the values of a, b and c determined in (17) form solution of this system and the sequenceυn converges to zero with speed estimated by n−5.

Now we will prove the complete monotonicity of some functions involving the function G(x)depending on the approximation formula (16).

Lemma 3.2.

1. For the values of a and c in (17), the function L1(x) = ln(1 + 1

x+a

)+ a+1

x(x+c)− G(x) is

completely monotonic on (0,∞).

2. The function L2(x) = ln

(1 + 1

x−√

23

)+

(1−√

23)

x(x+1)−G(x) is completely monotonic on

(√23,∞)

.

3. The function L3(x) = G(x)− ln

(1 + 1

x+√

23

)− (1+

√23)

x(x+1)is completely monotonic on (0,∞).

Proof. 1. Using the formula [1]

1

xk=

1

(k − 1)!

∫ ∞0

tk−1e−xtdt, k ∈ N (18)

and the integral representation (5) of G′(x), we get

L′1(x) =

∫ ∞0

e−(x+a+1)t

1 + etν1(t)dt,

where

ν1(t) =∞∑k=0

[(2− (a+1)

c)(a+ 2)k + (a+1)

c[(a+ 1− c)k + (a+ 2− c)k − (a+ 1)k]− 2k+1

(k+1)

]k!

tk+1

= −0.0316t5 − 0.0381t6 − 0.243t7 +∞∑k=7

(a+ 2)k [C1(k)]− (a+1)c

(a+ 1)k − 2k+1

(k+1)

k!tk+1

with

C1(k) =

(2− a+ 1

c

)+a+ 1

c

[(a+ 1− ca+ 2

)k+

(a+ 2− ca+ 2

)k].

The sequences (a+1−ca+2

)k and (a+2−ca+2

)k are decreasing for k ≥ 7, hence

C1(k) <

(2− a+ 1

c

)+a+ 1

c

[(a+ 1− ca+ 2

)7

+

(a+ 2− ca+ 2

)7]≈ −0.05248 < 0

and consequently ν1(t) < 0. Then −L′1(x) is completely monotonic. The function L1(x)is decreasing on (0,∞) and lim

x→∞L1(x) = 0, then L1(x) > 0 and hence L1(x) is completely

monotonic on (0,∞).

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 27, NO.1, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

124 Ahmed Hegazi ET AL 118-135

Page 125: Journal of Computational Analysis and Applicationseudoxuspress.com/images/JOCAAA-VOL-27-2019-ISSUE-1.pdf · Volume 27, Number 1 July 15, 2019 . ISSN:1521-1398 PRINT,1572-9206 ONLINE

2.

L′2(x) =

∫ ∞0

e−(x+1)t

1 + etν2(t)dt,

where

ν2(t) =∞∑k=3

2k+1

[(1√6

)k+1

−(

1√6

+ 1)k+1

+ (k + 1)(

1√6

+ 12

)](k + 1)!

tk+1.

Now, consider the following sequence for k = 3, 4, 5, ...

C2(k) =

(1√6

)k+1

−(

1√6

+ 1

)k+1

+ (k + 1)

(1√6

+1

2

)= −

k∑r=0

(k+1r

)( 1√6

)r+ (k + 1)

(1√6

+1

2

)

< −2∑r=0

(k+1r

)( 1√6

)r+ (k + 1)

(1√6

+1

2

)< − 1

12(k − 2)(k − 3) < 0.

Hence ν2(t) < 0 and −L′2(x) is completely monotonic. The function L2(x) is decreasing on(√23,∞)

with limx→∞

L2(x) = 0 and then L2(x) > 0. Hence L2(x) is completely monotonic

on(√

23,∞)

.

3.

L′3(x) =

∫ ∞0

e−(x+√

23+1

)t

1 + etν3(t)dt,

where

ν3(t) =∞∑k=3

2k+1

[(−12

+ 1√6

)(1 + 1√

6

)k+ 1

(k+1)−(

12

+ 1√6

)(1√6

)k]k!

tk+1.

The sequence

C3(k) =

(−1

2+

1√6

)(1 +

1√6

)k+

1

k + 1=

(−1

2+

1√6

) k∑r=0

(kr

)( 1√6

)r+

1

k + 1

<

(−1

2+

1√6

) 2∑r=0

(kr

)( 1√6

)r+

1

k + 1

<(k − 3)((

√6− 3)k2 + (3− 3

√6)k − (12 + 4

√6))

72(k + 1)< 0, k = 3, 4, 5, ... .

Then ν3(t) < 0 and hence −L′3(x) is completely monotonic . The function L3(x) is de-creasing for all x > 0 with lim

x→∞L3(x) = 0. and hence L3(x) > 0 for all x > 0. Then L3(x)

is completely monotonic on (0,∞).

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 27, NO.1, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

125 Ahmed Hegazi ET AL 118-135

Page 126: Journal of Computational Analysis and Applicationseudoxuspress.com/images/JOCAAA-VOL-27-2019-ISSUE-1.pdf · Volume 27, Number 1 July 15, 2019 . ISSN:1521-1398 PRINT,1572-9206 ONLINE

From the complete monotonicity of the functions L1(x), L2(x) and L3(x), we deduce thefollowing result:

Lemma 3.3. 1.

ln

1 +1

x+√

23

+

(1 +

√23

)x(x+ 1)

< G(x) < ln

1− 1

x−√

23

+

(1−

√23

)x(x+ 1)

, (19)

where the upper bound holds for x >√

23

and the lower bound holds for x > 0.

2.

G(x) < ln

(1 +

1

x+ a

)+

1 + a

x(x+ c), x > 0 (20)

where the values of a and c are in (17)

Remark 1. From Lemma (2.2), we can conclude that the inequality (19) improves the lower boundof the inequality (12) for x > xλ ' 2.02059 and improves its upper bound for x > x0 ' 4.02361.

Lemma 3.4. The following inequality holds

ln

1 +1

x+√

23

+

(1 +

√23

)x(x+ 1)

+1

6√

6x4< G(x) < ln

1 +1

x−√

23

+

(1−

√23

)x(x+ 1)

− 1

6√

6x4,

where the upper bound holds for x >√

23

and the lower bound holds for x ≥ 2.

Proof. Consider the function

T (x) = ln

1 +1

x−√

23

+

(1−

√23

)x(x+ 1)

− 1

6√

6x4−G(x), x >

√2

3

and use the functional equation (4) to obtain

T ′(x+ 2)− T ′(x) =2l(x)

81x5(1 + x)2(2 + x)5(3 + x)2∑3

i=0

(x+ i−

√23

) ,where

l(x) =(

25920− 10080√

6)

+(

197856− 75408√

6)x

+(

677952− 257008√

6)x2 +

(1367472− 520800

√6)x3

+(

1777284− 666478√

6)x4 +

(1535268− 502094

√6)x5

+(

879720− 127639√

6)x6 +

(321960 + 145938

√6)x7

+(

66960 + 180403√

6)x8 +

(4596 + 95742

√6)x9

+(−864 + 28431

√6)x10 +

(−144 + 4590

√6)x11 + 315

√6x12 > 0, x > 0.

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 27, NO.1, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

126 Ahmed Hegazi ET AL 118-135

Page 127: Journal of Computational Analysis and Applicationseudoxuspress.com/images/JOCAAA-VOL-27-2019-ISSUE-1.pdf · Volume 27, Number 1 July 15, 2019 . ISSN:1521-1398 PRINT,1572-9206 ONLINE

Then T ′(x + 2) − T ′(x) > 0 for x >√

23

and also limx→∞

T ′(x) = 0. Using Corollary (2.4), we get

that T ′(x) < 0 for all x >√

23. Hence T (x) is decreasing on

(√23,∞)

with limx→∞

T (x) = 0 , thus

T (x) > 0 for all x ∈(√

23,∞)

. Now consider the function

Q(x) = G(x)− ln(1 +1

x+√

23

)−(1 +

√23)

x(x+ 1)− 1

6√

6x4, x > 0.

Then

Q′(x+ 2)−Q′(x) =2u(x− 2)

81x5(1 + x)2(2 + x)5(3 + x)2∑3

i=0

(x+ i+

√23

) ,where

u(x) =(−207466560 + 113432160

√6)

+(−585268704 + 582357840

√6)x

+(−729011328 + 1250421968

√6)x2 +

(−523396080 + 1539421184

√6)x3

+(−235893516 + 1231511026

√6)x4 +

(−67175076 + 680979590

√6)x5

+(−10943256 + 268473813

√6)x6 +

(−465384 + 76331554

√6)x7

+(

195912 + 15574939√

6)x8 +

(44364 + 2228562

√6)x9

+(

4032 + 212571√

6)x10 +

(144 + 12150

√6)x11 + 315

√6x12 > 0, x ≥ 0.

Thus Q′(x+ 2)−Q′(x) > 0 for x ≥ 2 and also limx→∞

Q′(x) = 0. Using Corollary (2.4), we obtain

that Q′(x) < 0 for all x ≥ 2. and then Q(x) is decreasing on [2,∞) with limx→∞

Q(x) = 0. Then

Q(x) > 0 for all x ≥ 2.

4 Second formula of the best approximations and some

of its related inequalities

In this section, we will present the best constants of the approximation of formula

G(n) ≈ 1

2ln

[1 +

P1(n)

P2(n)

]+

2

n(n+ 1), n ∈ N

where P1(n) and P2(n) are two polynomials of degrees one and two (resp.). Also, some inequalitiesof the function G(x) will provided, which improve some results of the previous section.

Lemma 4.1. The best approximation of the formula

G(n) ≈ 1

2ln

[1 +

αn+ β

n2 + ρx+ σ

]+

2

n(n+ 1), n ∈ N (21)

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 27, NO.1, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

127 Ahmed Hegazi ET AL 118-135

Page 128: Journal of Computational Analysis and Applicationseudoxuspress.com/images/JOCAAA-VOL-27-2019-ISSUE-1.pdf · Volume 27, Number 1 July 15, 2019 . ISSN:1521-1398 PRINT,1572-9206 ONLINE

holds for α = 2, β = 3, ρ = 2 and σ = 4/3 and the sequence G(n)− 12

ln[1 + αn+β

n2+ρx+σ

]− 2

n(n+1)

converges to zero with speed estimated by n−5.

Proof. Consider the error sequence χn = G(n)− 12

ln[1 + αn+β

n2+ρx+σ

]− 2

n(n+1), then we have

χn − χn+2 =1

n2(2− α) +

1

n3(−2(5 + β) + α(2 + α + 2ρ))

+1

n4(38− α3 − 3α2(1 + ρ) + 3β(2 + ρ) + α(−4 + 3β − 3ρ(2 + ρ) + 3σ))

+1

n5(α4 + 4α3(1 + ρ) + 2(−65 + β2 − 2β(4 + ρ(3 + ρ)− σ))

+ α2 (8− 4β + 6ρ(2 + ρ)− 4σ) + 4α(2− β(3 + 2ρ) + ρ(4 + ρ(3 + ρ)− 2σ)− 3σ))

+1

n6(422− α5 − 5α4(1 + ρ) + 5β(2 + ρ)(4− β + ρ(2 + ρ)− 2σ)

+ 5/3α3(−8 + 3β − 6ρ(2 + ρ) + 3σ) + 5α2(β(4 + 3ρ)− 2(1 + ρ)(2 + ρ(2 + ρ))

+ (4 + 3ρ)σ)− α(16 + 5β2 − 5β(8 + ρ(8 + 3ρ)− 2σ)− 40σ + 5(ρ(2 + ρ)(4

+ ρ(2 + ρ))− ρ(8 + 3ρ)σ + σ2))) +O(n−7).

According to Lemma (2.1), the fastest convergence of the sequence χn satisfies if α = 2, β = 3,ρ = 2 and σ = 4/3 with speed estimated by n−5.

Lemma 4.2. For x > −1, the function

R(x) = (e2G(x+2) − 1)(x2 + 2x+4

3)− 2x (22)

is strictly decreasing and convex. As consequence, we have

1

2ln

[1 +

2x+ 3

x2 + 2x+ 43

]< G(x+ 2) <

1

2ln

[1 +

2x+ e4−1612

x2 + 2x+ 43

], x > 0 (23)

where the constants 3 and e4−1612

are the best possible.

Proof.1

2R′(x) = −x− 2 + [(x2 + 2x+

4

3)G′(x+ 2) + (x+ 1)]e2G(x+2),

1

2R′′(x) = −1 + 2[(x2 + 2x+

4

3)G′(x+ 2) + (x+ 1)]G′(x+ 2)e2G(x+2)

+[2(x+ 1)G′(x+ 2) + (x2 + 2x+4

3)G′′(x+ 2) + 1]e2G(x+2)

and

1

2e2G(x+2)R′′′(x) = 4(x2 + 2x+

4

3)(G′(x+ 2))3 + 12(x+ 1)(G′(x+ 2))2

+ 6(x2 + 2x+4

3)G′(x+ 2)G′′(x+ 2)

+ 6(x+ 1)G′′(x+ 2) + 6G′(x+ 2) + (x2 + 2x+4

3)G′′′(x+ 2) , U(x).

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 27, NO.1, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

128 Ahmed Hegazi ET AL 118-135

Page 129: Journal of Computational Analysis and Applicationseudoxuspress.com/images/JOCAAA-VOL-27-2019-ISSUE-1.pdf · Volume 27, Number 1 July 15, 2019 . ISSN:1521-1398 PRINT,1572-9206 ONLINE

Now,

U(x+ 2)− U(x) = 16(x+ 2)(G′(x+ 2))3 + 4(x+ 2)G′′′(x+ 2) + 24(x+ 2)G′(x+ 2)G′′(x+ 2)

+8(4 + x)(62 + 66x+ 24x2 + 3x3)

(x+ 2)2(x+ 3)2(G′(x+ 2))2

+8(1448 + 2564x+ 2008x2 + 915x3 + 258x4 + 42x5 + 3x6)

(x+ 2)4(x+ 3)4G′(x+ 2)

+4(4 + x)(62 + 66x+ 24x2 + 3x3)

(x+ 2)2(x+ 3)2G′′(x+ 2)

+1

3(2 + x)6(3 + x)64(−33056− 88128x− 92112x2 − 46976x3 − 10548x4

+ 360x5 + 705x6 + 138x7 + 9x8).

Also, let V (x) = U(x+2)−U(x)4(x+2)

, then

V (x+ 2)− V (x) =−4

(2 + x)3(3 + x)2(4 + x)3(5 + x)2[34576 + 91136x+ 105392x2 + 68520x3

+27152x4 + 6698x5 + 1005x6 + 84x7 + 3x8](G′(x+ 2))2

− 4

(2 + x)5(3 + x)4(4 + x)5(5 + x)4[376528768 + 1642942016x+ 3297590048x2

+ 4031614688x3 + 3354474592x4 + 2010658592x5 + 896184192x6

+ 302070808x7 + 77457190x8 + 15051780x9

+ 2183975x10 + 229624x11 + 16548x12 + 732x13 + 15x14]G′(x+ 2)

− 2

(2 + x)3(3 + x)2(4 + x)3(5 + x)2(34576 + 91136x+ 105392x2

+ 68520x3 + 27152x4 + 6698x5 + 1005x6 + 84x7 + 3x8)G′′(x+ 2)

+2

3(2 + x)7(3 + x)6(4 + x)7(5 + x)6[(331346962432 + 5157549202432x

+ 24078469545984x2 + 60544326323200x3 + 99175110059776x4

+ 116067402353280x5 + 102360341211232x6 + 70356164081536x7

+ 38541166023024x8 + 17080773307136x9 + 6184124004420x10

+ 1839407553792x11 + 450403876283x12 + 90669453918x13 + 14930598072x14

+ 1992453932x15 + 212255598x16 + 17635104x17 + 1101756x18 + 48708x19

+ 1359x20 + 18x21)]

Using the completely monotonicity of the functions X1(x) = 1x− G(x) +

2m−1∑k=1

(22k−1)B2k

kx2kand

X2(x) = G(x)− 1x− 1

2x2+1for x > 0 (see [20]), we get the following inequalities: G′(x) > −x+1

x3,

(G′(x))2 >[4x4+4x3+4x2+1x2(2x2+1)2

]2and G′′(x) > 2(8x6+12x5+12x4−2x3+6x2+1)

x3(2x2+1)3for x > 0. Hence,

V (x+ 2)− V (x) < F (x), x > 0

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 27, NO.1, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

129 Ahmed Hegazi ET AL 118-135

Page 130: Journal of Computational Analysis and Applicationseudoxuspress.com/images/JOCAAA-VOL-27-2019-ISSUE-1.pdf · Volume 27, Number 1 July 15, 2019 . ISSN:1521-1398 PRINT,1572-9206 ONLINE

where

F (x) =−2A(x+ 1)

3(2 + x)8(3 + x)6(4 + x)7(5 + x)6(9 + 8x+ 2x2)4

with

A(x) = 74586749184 + 1263034988928x+ 9398610597600x2 + 42943724513952x3

+ 138441396784472x4 + 339577282357568x5 + 663837528239296x6

+ 1065966556249164x7 + 1434284269631783x8 + 1638094930661455x9

+ 1600662870950288x10 + 1344078197917456x11 + 971670315225407x12

+ 604754235543331x13 + 323563802759956x14 + 148404632743888x15

+ 58109372496201x16 + 19315095938361x17 + 5408999070416x18

+ 1263403407224x19 + 242838160053x20 + 37707313393x21 + 4608156812x22

+ 426325500x23 + 28044100x24 + 1167972x25 + 23136x26.

Using A(x) > 0 for all x > 0, then we obtain F (x) < 0 for all x > −1 and hence V (x+2)−V (x) <0 for all x > −1. Using the asymptotic expansion (8) and its derivatives, we have

G′(x) =−1

x2− 1

x3+

1

x5− 3

x7+

17

x9+O(x−11) (24)

G′′(x) =2

x3+

3

x4− 5

x6+

21

x8− 153

x10+O(x−12), (25)

and

G′′′(x) =−6

x4− 12

x5+

30

x7− 168

x9+

1530

x11+O(x−13). (26)

Then

limx→∞

V (x) = limx→∞

(64x25

(2 + x)27(3 + x)6+O(x−9)

)= 0

and hence V (x) > 0 for all x > −1. Now, U(x+ 2)− U(x) > 0 with

limx→∞

U(x) = limx→∞

(−64x21

3(x+ 2)27+O(x−7)

)= 0

and so U(x) < 0 for all x > −1. Thus, R′′′(x) < 0 and

limx→∞

R′′(x) = limx→∞

(128

15x5− 448

9x6+

2368

21x7+O(x−8)

)= 0.

Then R′′(x) > 0 for all x > −1 and so the function R(x) is convex for x ∈ (−1,∞). Also,

limx→∞

R′(x) = limx→∞

(−32

15x4+

448

45x5− 1184

63x6− 688

63x7+

11104

81x8+O(x−9)

)= 0

and thus R′(x) < 0 for all x > −1. Hence we conclude that R(x) is decreasing on (−1,∞) withR(0) = e4−16

12and

limx→∞

R(x) = limx→∞

(3 +

32

45x3− 112

45x4+

1184

315x5+O(x−6)

)= 3.

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 27, NO.1, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

130 Ahmed Hegazi ET AL 118-135

Page 131: Journal of Computational Analysis and Applicationseudoxuspress.com/images/JOCAAA-VOL-27-2019-ISSUE-1.pdf · Volume 27, Number 1 July 15, 2019 . ISSN:1521-1398 PRINT,1572-9206 ONLINE

Then

3 < (e2G(x+2) − 1)(x2 + 2x+4

3)− 2x <

e4 − 16

12,

where the constants 3 and e4−1612

are the best possible.

Lemma 4.3. For every x ≥ 0, we have

1

2ln[

4x+ a

(x2 + 6x+ 283

)e−4

(x+2)(x+3) − (x2 + 2x+ 43)] ≤ G(x+ 2)

<1

2ln[

4x+ b

(x2 + 6x+ 283

)e−4

(x+2)(x+3) − (x2 + 2x+ 43)] (27)

where a = 7e103 −e412

and b = 12 are the best possible constants.

Proof. For x ≥ 0, consider f(x) = R(x + 2) − R(x), where R(x) defined in (22). Then f ′(x) =R′(x + 2) − R′(x) and R(x) is convex function for x ∈ (−1,∞). Hence f(x) is increasing with

f(0) = 7e103 −e412

− 12 and limx→∞

f(x) = 0, where limx→∞

R(x) = 3. Then 7e103 −e412

− 12 ≤ f(x) < 0 or

7e103 − e4

12≤ e2G(x+2)[(x2 + 6x+

28

3)e−

4(x+2)(x+3) − (x2 + 2x+

4

3)]− 4x < 12,

where 7e103 −e412

and 12 are the best possible constants.

Lemma 4.4. For every x > 0, then we have

(x+ α)e−2G(x+2) − (x+ 1)

(x2 + 2x+ 43)

< G′(x+ 2) <(x+ β)e−2G(x+2) − (x+ 1)

(x2 + 2x+ 43)

, (28)

where α = (2π2−15)e4144

and β = 2 are the best possible constants.

Proof. The function R(x) defined in (22) is convex for x ∈ (−1,∞) and hence R′(x) is increasing.

Then R′(0) < R′(x) < limx→∞

R′(x) with R′(0) = (2π2−15)e472

− 4 and limx→∞

R′(x) = 0. Hence

(2π2 − 15)e4

144< −x+ [(x2 + 2x+

4

3)G′(x+ 2) + (x+ 1)]e2G(x+2) < 2,

where (2π2−15)e4144

and 2 are the best possible constants.

Lemma 4.5. The following inequality holds

1

2ln

[1 +

2x+ 3

x2 + 2x+ 43

]+

2

x(x+ 1)< G(x) <

1

2ln

[1 +

2x+ 3

x2 + 2x+ 48e4−16

]+

2

x(x+ 1), (29)

where the upper bound holds for x > xδ ≈ 0.575833 and the lower bound holds for x > 0.

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 27, NO.1, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

131 Ahmed Hegazi ET AL 118-135

Page 132: Journal of Computational Analysis and Applicationseudoxuspress.com/images/JOCAAA-VOL-27-2019-ISSUE-1.pdf · Volume 27, Number 1 July 15, 2019 . ISSN:1521-1398 PRINT,1572-9206 ONLINE

Proof. Consider the function F (x) = G(x+ 2)− 12

ln[1 + 2x+3

x2+2x+ 43

], then

F ′(x+ 2)− F ′(x) = G′(x+ 4)−G′(x+ 2)

− 54(5 + 2x)(56 + 140x+ 103x2 + 30x3 + 3x4)

(4 + 6x+ 3x2)(13 + 12x+ 3x2)(28 + 18x+ 3x2)(49 + 24x+ 3x2).

Using the functional equation (4) and its derivative, we get

F ′(x+ 2)− F ′(x) =

32(5 + 2x)(1057 + 1680x+ 1011x2 + 270x3 + 27x4)

(2 + x)2(3 + x)2(4 + 6x+ 3x2)(13 + 12x+ 3x2)(28 + 18x+ 3x2)(49 + 24x+ 3x2).

Thus F ′(x + 2) − F ′(x) > 0, for x > 0 and also limx→∞

F ′(x) = 0. Using Corollary (2.4), we get

that F ′(x) < 0 for all x > 0. Then F (x) is decreasing function on (0,∞) with limx→∞

F (x) = 0,

thus F (x) > 0 for x > 0. Now, let

S(x) = G(x+ 2)− 1

2ln

[1 +

2x+ 3

x2 + 2x+ 48e4−16

]and then

S ′(x+ 2)− S ′(x) =−8(5 + 2x)W (x)

(e4 − 16)4(2 + x)2(3 + x)2(x2 + 2x+ 48e4−16)(x2 + 4x+ 3e4

e4−16)D(x),

where

D(x) =

((x+ 2)2 + 2(x+ 2) +

48

e4 − 16

)((x+ 2)2 + 4(x+ 2) +

3e4

e4 − 16

)> 0, x > 0

and

W (x) =(21233664− 6856704e4 + 720576e8 − 28944e12 + 324e16

)+(100270080− 26173440e4 + 2361600e8 − 84240e12 + 900e16

)x

+(152764416− 35570688e4 + 2920320e8 − 96948e12 + 1005e16

)x2

+(106332160− 23142400e4 + 1795200e8 − 57040e12 + 580e16

)x3

+(37257216− 7818240e4 + 587520e8 − 18204e12 + 183e16

)x4

+(6389760− 1320960e4 + 97920e8 − 3000e12 + 30e16

)x5

+(425984− 88064e4 + 6528e8 − 200e12 + 2e16

)x6.

Then

W ′(x) =(100270080− 26173440e4 + 2361600e8 − 84240e12 + 900e16

)+2(152764416− 35570688e4 + 2920320e8 − 96948e12 + 1005e16

)x

+3(106332160− 23142400e4 + 1795200e8 − 57040e12 + 580e16

)x2

+4(37257216− 7818240e4 + 587520e8 − 18204e12 + 183e16

)x3

+5(6389760− 1320960e4 + 97920e8 − 3000e12 + 30e16

)x4

+6(425984− 88064e4 + 6528e8 − 200e12 + 2e16

)x5

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 27, NO.1, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

132 Ahmed Hegazi ET AL 118-135

Page 133: Journal of Computational Analysis and Applicationseudoxuspress.com/images/JOCAAA-VOL-27-2019-ISSUE-1.pdf · Volume 27, Number 1 July 15, 2019 . ISSN:1521-1398 PRINT,1572-9206 ONLINE

and

W ′′(x) = 2(152764416− 35570688e4 + 2920320e8 − 96948e12 + 1005e16

)+6(106332160− 23142400e4 + 1795200e8 − 57040e12 + 580e16

)x

+12(37257216− 7818240e4 + 587520e8 − 18204e12 + 183e16

)x2

+20(6389760− 1320960e4 + 97920e8 − 3000e12 + 30e16

)x3

+30(425984− 88064e4 + 6528e8 − 200e12 + 2e16

)x4 > 0, x > 0.

Thus W ′(x) is increasing on (0,∞) which implies that W ′(x) > W ′(0.1) > 0. Then W (x) isincreasing on (0.1,∞) with W (0.57583) ≈ −475.425 < 0 and W (0.57584) ≈ 1147.33 > 0. HenceW (x) has only one positive root on (0.57583,∞) say xδ ≈ 0.575833 and then W (x) > 0 forx > 0.575833. Now, S ′(x + 2) − S ′(x) < 0 for x > 0.575833 and also lim

x→∞S ′(x) = 0. Using

Corollary (2.4), then S ′(x) > 0 for all x > 0.575833 or S(x) is increasing on (0.575833,∞) withlimx→∞

S(x) = 0. Thus S(x) < 0 for all x > 0.575833.

Remark 2. Using the inequalities

1 + (2x+ 3)/(x2 + 2x+ 48/(e4 − 16)) < (1 + 1/(x+ 1))2, x > 0

and1 + (2x+ 3)/(x2 + 2x+ 4/3) > (1 + 1/(x+ 4/(e2 − 4)))2, x > xµ

where xµ = −112+68e2−7e4−√52480−30208e2+6672e4−664e6+25e8

6(32−12e2+e4) ' 0.465586, we can conclude that the

inequality (29) improves the lower bound of the inequality (12) for x > xµ and improves itsupper bound for x > 0.

Remark 3. The inequality (29) improves the lower bound of the inequality (19) for x > 0.

References

[1] M. Abramowitz and I. A. Stegun (Eds.), Handbook of Mathematical Functions with For-mulas, Graphs and Mathematical Tables, Dover, New York, 1965.

[2] H. Alzer and C. Berg, Some classes of completely monotonic functions, Annales Acad. Sci.Fenn. Math. 27(2), 445-460, 2002.

[3] G. E. Andrews, R. Askey and R. Roy, Special Functions, Cambridge Univ. Press, 1999.

[4] N. Batir, Sharp bounds for the psi function and harmonic numbers, Math. Inequal.Appl,Vol. 14, No. 4, 917-925, 2011.

[5] T. Buric, N. Elezovic, Some completely monotonic functions related to the psi function,Math. Inequal. Appl., 14(3), 679-691, 2011.

[6] C.-P. Chen and H. M. Srivastava, New representations for the Lugo and Euler-Mascheroniconstants, II, Appl. Math. Lett. 25, no. 3, 333-338, 2012.

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 27, NO.1, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

133 Ahmed Hegazi ET AL 118-135

Page 134: Journal of Computational Analysis and Applicationseudoxuspress.com/images/JOCAAA-VOL-27-2019-ISSUE-1.pdf · Volume 27, Number 1 July 15, 2019 . ISSN:1521-1398 PRINT,1572-9206 ONLINE

[7] C.-P. Chen and C. Mortici, Sharpness of Muqattash-Yahdi problem, Comput. Appl. Math.,Vol. 31, No.1 , 85-93, 2012.

[8] A. Elbert and A. Laforgia, On some properties of the gamma function, Proc. Am. Math.Soc. 128(9), 2667-2673, 2000.

[9] A. Erdelyi et al., Higher Transcendental Functions Vol. I-III, California Institute of Tech-nology - Bateman Manuscript Project, 1953-1955 McGraw-Hill Inc., reprinted by KriegerInc. 1981.

[10] W. Feller, An Introduction to probability theory and its applications, Vol. 2, 3rd ed. NewYork, Wiley, 1971.

[11] O. Furdui, A class of fractional part integrals and zeta function values, Integral TransformsSpec. Funct. 24, no. 6, 485-490, 2013.

[12] A. Z. Grinshpan and M. E. H. Ismail, Completely monotonic functions involving the gammaand q−gamma functions, Proc. Amer. Math. Soc., 134, 1153-1160, 2006.

[13] H. Van Haeringen, Completely monotonic and related functions, J. Math. Anal. Appl., 204,389-408, 1996.

[14] M. E. H. Ismail, L. Lorch, and M. E. Muldon, Completely monotonic functions associatedwith the gamma function and its q−analogues, J. Math. Anal. Appl. 116, 1-9, 1986.

[15] A. Laforgia and P. Natalini, On the asymptotic expansion of a ratio of gamma functions, J.Math. Anal. Appl. 389 , no. 2, 833837, 2012.

[16] M. Mahmoud, M. A. Alghamdi and R. P. Agarwal, New upper bounds of n!, J. Inequal.Appl. 2012;2012 doi: 10.1186/1029-242X-2012-27.

[17] M. Mahmoud and R. P. Agarwal, Bounds for Bateman’s G-function and its applications,Georgian Mathematical Journal, Vol. 23, Issue 4, 579-586, 2016.

[18] M. Mahmoud and H. Almuashi, On some inequalities of the Bateman’s G−function, J.Comput. Anal. Appl., Vol. 22, No.4, , 672-683, 2017.

[19] M. Mahmoud, A. Talat and H. Moustafa, Some approximations of the Bateman’sG−function, J. Comput. Anal. Appl., Vol. 23, No. 6, 1165-1178, 2017.

[20] M. Mahmoud, A. Talat, H. Moustafa and R. P. Agarwal, Completely monotonic functionsinvolving Bateman’s G−function, Submitted for publication.

[21] C. Mortici, New approximations of the gamma function in terms of the digamma function,Appl. Math. Lett., Vol. 23, Issue 1, 97-100, 2010.

[22] C. Mortici, The proof of Muqattash-Yahdi conjecture, Math. Comput. Mod., Vol. 51, Issue9, 1154-1159, 2010.

[23] C. Mortici, A sharp inequality involving the psi function, Acta Universitatis Apulensis, Vol.22, 41-45, 2010.

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 27, NO.1, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

134 Ahmed Hegazi ET AL 118-135

Page 135: Journal of Computational Analysis and Applicationseudoxuspress.com/images/JOCAAA-VOL-27-2019-ISSUE-1.pdf · Volume 27, Number 1 July 15, 2019 . ISSN:1521-1398 PRINT,1572-9206 ONLINE

[24] C. Mortici, A new Stirling series as continued fraction, Numer. Algorithms 56, no. 1, 1726,2011.

[25] F. Qi, The best bounds in Kershaw’s inequality and two completely monotonic functions,RGMIA Res. Rep. Coll. 9 (2006), no. 4, Art. 2.

[26] F. Qi, S. Guo, B.-N. Guo, Complete monotonicity of some functions involving polygammafunctions, J. Comput. Appl. Math., 233(9), 2149-2160, 2010.

[27] F. Qi and S.-H. Wang, Complete monotonicity, completely monotonic degree, integral rep-resentations, and an inequality related to the exponential, trigamma, and modified Besselfunctions, Glob. J. Math. Anal. 2, no. 3, 91-97, 2014.

[28] F. Qi and C. Mortici, Some best approximation formulas and inequalities for the Wallisratio, Applied Mathematics and Computation, Vol. 253 (15), 363-368, 2015.

[29] F. Qi and W.-H. Lic, Integral representations and properties of some functions involving thelogarithmic function, Filomat 30:7, 1659-1674, 2016.

[30] S.-L. Qiu and M. Vuorinen, Some properties of the gamma and psi functions with applica-tions, Math. Comp., Vol.74, No. 250, 723-742, 2004.

[31] D. V. Widder, The Laplace Transform, Princeton University Press, Princeton, 1946.

[32] T.-H. Zhao, Z.-H. Yang and Y.-M. Chu, Monotonicity properties of a function involving thePsi function with applications, Journal of Inequalities and Applications (2015) 2015:193.

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 27, NO.1, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

135 Ahmed Hegazi ET AL 118-135

Page 136: Journal of Computational Analysis and Applicationseudoxuspress.com/images/JOCAAA-VOL-27-2019-ISSUE-1.pdf · Volume 27, Number 1 July 15, 2019 . ISSN:1521-1398 PRINT,1572-9206 ONLINE

A new q-extension of Euler polynomial of the second kindand some related polynomials

R. P. Agarwal 1, J. Y. Kang2*, C. S. Ryoo3

Abstract : We define q-Euler polynomials of the second kind using q-analogue within exponential

function. We have some basic properties of this polynomials such as addition, alternative finite sum,

and symmetry property. We also investigate some relations of q-Euler, q-Bernoulli, and q-tangent

polynomials using q-Euler polynomials of the second kind including two parameters.

Key words : q-Euler polynomials of the second kind, q-Euler polynomials, q-Bernoulli polynomials,

q-tangent polynomials

2000 Mathematics Subject Classification : 11B68, 11B75, 12D10

1. Introduction

The main aim of this paper is to extend Euler numbers and polynomials of the second kind,

and study some of their properties. Our paper is organised as follows: in Section 2, we define q-Euler

numbers and polynomials of the second kind. From this definition we investigate some interesting

properties of these numbers and polynomials using q-analogue of exponential function. In Section

3, we consider q-Euler polynomials of the second kind in two parameters and make some relations

between q-Euler polynomials of the second kind and q-Euler , q-Bernoulli, q-tangent polynomials.

Furthermore, we derive a symmetric relation, multiple q-derivative, and multiple q-integral.

For any n ∈ C, the q-number is defined by

[n]q =1− qn

1− q=∑

0≤i≤n

qi = 1 + q + q2 + · · ·+ qn−1.

An intensive and somewhat surprising interest in q-numbers appeared in many areas of mathematics

and applications including q-difference equations, special functions, q-combinatorics, q-integrable

systems, variational q-calculus, q-series, and so on. In this paper, we introduce some basic definitions

and theorems(see [1-18]).

Definition 1.1.[1,3-5,10-13] The Gaussian binomial coefficients are defined by(m

r

)q

=

[m

r

]q

=

0 if r > m

(1−qm)(1−qm−1)···(1−qm−r+1)(1−q)(1−q2)···(1−qr) if r ≤ m

,

where m and r are non-negative integers. For r = 0 the value is 1 since the numerator and the

denominator are both empty products. Like the classical binomial coefficients, the Gaussian binomial

coefficients are center-symmetric. There are analogues of the binomial formula, and this definition

has a number of properties.

1 Department of Mathematics, Texas A & M University, Kingsville, USA2 Department of Information and Statistics, Anyang University, Anyang, KOREA3 Department of Mathematics, Hanman University, Daejeon, KOREA

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 27, NO.1, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

136 AGARWAL ET AL 136-148

Page 137: Journal of Computational Analysis and Applicationseudoxuspress.com/images/JOCAAA-VOL-27-2019-ISSUE-1.pdf · Volume 27, Number 1 July 15, 2019 . ISSN:1521-1398 PRINT,1572-9206 ONLINE

Theorem 1.2.[5] Let n, k be non-negative integers. Then we get

(i)n−1∏k=0

(1 + qkt) =n∑

k=0

q(k2)

[n

k

]q

tk,

(ii)n−1∏k=0

1

(1− qkt)=∞∑k=0

[n+ k − 1

k

]q

tk.

Definition 1.3.[1,4,12-13] Let z be any complex numbers with |z| < 1. Two forms of q-

exponential functions are defined by

eq(z) =∞∑

n=0

zn

[n]q!, eq−1(z) =

∞∑n=0

zn

[n]q−1 !=∞∑

n=0

q(n2) zn

[n]q!.

Definition 1.4.[4,10-11,13] The q-derivative operator of any function f is defined by

Dqf(x) =f(x)− f(qx)

(1− q)x, x 6= 0,

and Dqf(0) = f ′(0). We can prove that f is differentiable at 0, and it is clear that Dqxn = [n]qx

n−1.

Definition 1.5.[4,10-11,13] We define the q-integral as∫ b

0

f(x)dqx = (1− q)b∞∑j=0

qjf(qjb).

If this function, f(x), is differentiable on the point x, the q-derivative in Definition 1.4 goes to the

ordinary derivative in the classical analysis when q → 1.

In 1961, L.Calitz introduced several properties of the Bernoulli and Euler polynomials of the

second kind(see [6]). Euler numbers of the second kind was expanded, and C. S. Ryoo have studied

these numbers and polynomials of the second kind in [17]. He also developed several properties of

these numbers and polynomials.

Definition 1.6.[7-8, 6, 17] The classical Euler numbers, En, and the classical Euler polynomi-

als, En(x), of the second kind are defined by means of the generating functions

∞∑n=0

Entn

n!=

2

et + e−t,

∞∑n=0

En(x)tn

n!=

2

et + e−tetx.

Theorem 1.7.[17] For any positive integer n, we have

(i) For any positive integer m(=odd),

En(x) = mnm−1∑i=0

(−1)iEn

(2i+ x+ 1−m

m

)for n ≥ 0,

(ii) El(x+ y) =l∑

n=0

(l

n

)En(x)yl−n,

(iii) En(x) = (−1)nEn(−x).

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 27, NO.1, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

137 AGARWAL ET AL 136-148

Page 138: Journal of Computational Analysis and Applicationseudoxuspress.com/images/JOCAAA-VOL-27-2019-ISSUE-1.pdf · Volume 27, Number 1 July 15, 2019 . ISSN:1521-1398 PRINT,1572-9206 ONLINE

2. Some basic properties of the q-Euler polynomials of the second kind

In this section, we define the q-Euler numbers and polynomials of the second kind, and investi-

gate basic properties of these numbers and polynomials. Furthermore, we find the alternative finite

sum which is related to the q-Euler numbers and polynomials of second kind.

Definition 2.1. Let n be any non-negative integer. For |q| < 1, x ∈ C, we define q-Euler

numbers and polynomials of the second kind as

∞∑n=0

En,qtn

[n]q!=

2

eq(t) + eq(−t),

∞∑n=0

En,q(x)tn

[n]q!=

2

eq(t) + eq(−t)eq(tx).

Substituting x = 0 in the q-Euler polynomials of the second kind, they can be simplified as follows:

∞∑n=0

En,q(0)tn

[n]q!=∞∑

n=0

En,qtn

[n]q!=

2

eq(t) + eq(−t)=

1

coshq(t),

where En,q is q-Euler numbers of the second kind. If q → 1, then we can find the classical Euler

polynomials of the second kind in En,q(x)(see [6,17]).

Theorem 2.2. Let |q| < 1, x be any complex numbers. Then, we have

En,q(x) =n∑

k=0

[n

k

]q

Ek,qxn−k.

Proof. From the generating function of the q-Euler polynomials of second kind, En,q(x), we can find

∞∑n=0

En,q(x)tn

[n]q!=

2

eq(t) + eq(−t)eq(tx) =

∞∑n=0

En,qtn

[n]q!

∞∑n=0

xntn

[n]q!

=∞∑

n=0

n∑k=0

[n

k

]q

Ek,q(x)xn−k

tn

[n]q!,

which gives the required result.

Theorem 2.3. For |q| < 1, the following holds:

DqEn,q(x) = [n]qEn−1,q(x).

Proof. Considering q-derivative of xn−k in Theorem 2.2, we get

DqEn,q(x) =n−1∑k=0

[n

k

]q

[n− k]qEk,qxn−k−1.

Transforming a binomial operation of q and using Theorem 2.2 again, we obtain

DqEn+1,q(x) = [n+ 1]q

n∑k=0

[n

k

]q

Ek,qxn−k = [n+ 1]qEn,q(x).

The required relation now follows at once.

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 27, NO.1, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

138 AGARWAL ET AL 136-148

Page 139: Journal of Computational Analysis and Applicationseudoxuspress.com/images/JOCAAA-VOL-27-2019-ISSUE-1.pdf · Volume 27, Number 1 July 15, 2019 . ISSN:1521-1398 PRINT,1572-9206 ONLINE

Theorem 2.4. Let n be any non-negative integer. Then, the following holds:∫ x

0

En,q(x)dqx =En+1,q(x)− En+1,q

[n+ 1]q,

where En,q(0) = En,q is q-Euler numbers of the second kind.

Proof. Using q-integral in Theorem 2.2, we have∫ x

0

En,q(x)dqx =

∫ x

0

n∑k=0

[n

k

]q

Ek,qxn−kdqx =n∑

k=0

[n

k

]q

Ek,q1

[n− k + 1]qxn−k+1

∣∣∣x0

=1

[n+ 1]q

n+1∑k=0

[n+ 1

k

]q

Ek,qxn−k+1∣∣∣x0

=1

[n+ 1]q

(En+1,q (x)− En+1,q

),

and we obtain the required relation at once.

Corollary 2.5. In Theorem 2.4, we get∫ b

a

En,q(x)dqx =En+1,q (b)− En+1,q (a)

[n+ 1]q.

Now we find some properties of q-exponential function to obtain the next theorem. From Definition

1.3 and Theorem 1.2, we find that

(i) [n]q−1 ! = q−(n2)[n]q!,

(ii) eq(t)eq−1(t) =∞∑

n=0

tn

[n]q!

∞∑n=0

tn

[n]q−1 !=∞∑

n=0

n∑k=0

[n

k

]q

q(k2)

tn

[n]q!

=∞∑

n=0

(n−1∏k=0

(1 + qk)

)tn

[n]q!,

(iii) eq(t)eq−1(−t) =∞∑

n=0

tn

[n]q!

∞∑n=0

(−t)n

[n]q−1 !=∞∑

n=0

n∑k=0

[n

k

]q

(−1)kq(k2)

tn

[n]q!

=∞∑

n=0

(n−1∏k=0

(1− qk)

)tn

[n]q!,

(iv) eq(−t)eq−1(t) =∞∑

n=0

(−t)n

[n]q!

∞∑n=0

tn

[n]q−1 !=∞∑

n=0

(−1)nn∑

k=0

[n

k

]q

q(k2)(−1)k

tn

[n]q!

=∞∑

n=0

((−1)n

n−1∏k=0

(1− qk)

)tn

[n]q!,

(v) eq(−t)eq−1(−t) =∞∑

n=0

(−t)n

[n]q!

∞∑n=0

(−t)n

[n]q−1 !=∞∑

n=0

(−1)nn∑

k=0

[n

k

]q

q(k2)

tn

[n]q!

=∞∑

n=0

((−1)n

n−1∏k=0

(1 + qk)

)tn

[n]q!.

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 27, NO.1, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

139 AGARWAL ET AL 136-148

Page 140: Journal of Computational Analysis and Applicationseudoxuspress.com/images/JOCAAA-VOL-27-2019-ISSUE-1.pdf · Volume 27, Number 1 July 15, 2019 . ISSN:1521-1398 PRINT,1572-9206 ONLINE

Theorem 2.6. For |q| < 1, we find

(i)n∑

l=0

[n

l

]q

n−l∑k=0

[n− lk

]q

(−1)k +n−l∑k=0

[n− lk

]q

(−1)n−l

El,q = 2(−1)n,

(ii)n∑

l=0

[n

l

]q

n−l∑k=0

[n− lk

]q

(−1)k +n−l∑k=0

[n− lk

]q

(−1)n−l

El,q(x)

= 2n∑

l=0

[n

l

]q

(−1)n−lxl.

Proof. (i) Loading eq(t)eq(−t) + eq(−t)eq(−t) 6= 0 for the generating function of q-Euler numbers of

the second kind, one obtains

∞∑n=0

En,qtn

[n]q!(eq(t)eq(−t) + eq(−t)eq(−t)) = 2eq(−t),

and we can transform such as

∞∑n=0

En,qtn

[n]q!(eq(t)eq(−t) + eq(−t)eq(−t))

=∞∑

n=0

En,qtn

[n]q!

∞∑n=0

n∑k=0

[n

k

]q

(−1)k +n∑

k=0

[n

k

]q

(−1)n

tn

[n]q!

=∞∑

n=0

n∑

l=0

[n

l

]q

n−l∑k=0

[n− lk

]q

(−1)k +n−l∑k=0

[n− lk

]q

(−1)n−l

El,q tn

[n]q!

= 2

∞∑n=0

(−1)ntn

[n]q!.

The required relation now follows at once.

(ii) We omit a proof of the q-Euler polynomials of the second kind due to its similarity to (i).

Corollary 2.7. For q → 1, in Theorem 2.6, one holds

(i)n∑

l=0

(n

l

)(n−l∑k=0

(n− lk

)(−1)k +

n−l∑k=0

(n− lk

)(−1)n−l

)El = 2(−1)n,

(ii)n∑

l=0

(n

l

)(n−l∑k=0

(n− lk

)(−1)k +

n−l∑k=0

(n− lk

)(−1)n−l

)El(x) = 2

n∑l=0

(n

k

)(−1)n−lxl,

where En(x) is the classical Euler polynomials of the second kind and En is the classical Euler

numbers of the second kind(see [16]).

Theorem 2.8. Let |q| < 1. Then we have

(i)n∑

l=0

[n

l

]q

(n−l−1∏k=0

(1 + qk) + (−1)n−ln−l−1∏k=0

(1− qk)

)El,q = 2q(

n2),

(ii)n∑

l=0

[n

l

]q

(n−l−1∏k=0

(1 + qk) + (−1)n−ln−l−1∏k=0

(1− qk)

)El,q(x) = 2

n∑l=0

[n

l

]q

q(n−l2 )xl.

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 27, NO.1, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

140 AGARWAL ET AL 136-148

Page 141: Journal of Computational Analysis and Applicationseudoxuspress.com/images/JOCAAA-VOL-27-2019-ISSUE-1.pdf · Volume 27, Number 1 July 15, 2019 . ISSN:1521-1398 PRINT,1572-9206 ONLINE

Proof. (i) For eq(t)eq−1(t) + eq(−t)eq−1(t) 6= 0, we have

∞∑n=0

En,qtn

[n]q!(eq(t)eq−1(t) + eq(−t)eq−1(t)) = 2eq−1(t).

To obtain the result, we can calculate the above equation as

∞∑n=0

En,qtn

[n]q!(eq(t)eq−1(t) + eq(−t)eq−1(t))

=∞∑

n=0

En,qtn

[n]q!

∞∑n=0

(n−1∏k=0

(1 + qk) + (−1)nn−1∏k=0

(1− qk)

)tn

[n]q!

=∞∑

n=0

n∑l=0

[n

l

]q

(n−l−1∏k=0

(1 + qk) + (−1)n−ln−l−1∏k=0

(1− qk)

)El,q

tn

[n]q!

= 2∞∑

n=0

q(n2) tn

[n]q!.

The required relation now follows on comparing the coefficients of tn on both sides.

(ii) Using the same method as (i) we can find the required result, so we omit the proof.

Corollary 2.9. In Theorem 2.8, we can see

(i) q(n2) =

1

2

n∑l=0

[n

l

]q

(n−l−1∏k=0

(1 + qk) + (−1)n−ln−l−1∏k=0

(1− qk)

)El,q,

(ii)

n∑l=0

[n

l

]q

q(n−l2 )xl =

1

2

n∑l=0

[n

l

]q

(n−l−1∏k=0

(1 + qk) + (−1)n−ln−l−1∏k=0

(1− qk)

)El,q(x).

Theorem 2.10. For |q| < 1, k ∈ N, one holds

(i)n∑

l=0

[n

l

]q

(n−l−1∏k=0

(1− qk) + (−1)n−ln−l−1∏k=0

(1 + qk)

)El,q = 2(−1)nq(

n2),

(ii)n∑

l=0

[n

l

]q

(n−l−1∏k=0

(1− qk) + (−1)n−ln−l−1∏k=0

(1 + qk)

)El,q(x) = 2

n∑l=0

[n

l

]q

(−1)n−lq(n−l2 )xl.

Proof. (i) Let eq(t)eq−1(−t)+eq(−t)eq−1(−t) 6= 0. From the generating function of q-Euler numbers

of the second kind, we can find

∞∑n=0

En,qtn

[n]q!(eq(t)eq−1(−t) + eq(−t)eq−1(−t)) = 2eq−1(−t),

or, equivalently,

∞∑n=0

En,qtn

[n]q!(eq(t)eq−1(−t) + eq(−t)eq−1(−t))

=∞∑

n=0

En,qtn

[n]q!

∞∑n=0

(n−1∏k=0

(1− qk) + (−1)nn−1∏k=0

(1 + qk)

)tn

[n]q!

=∞∑

n=0

n∑

l=0

[n

l

]q

(n−l−1∏k=0

(1− qk) + (−1)n−ln−l−1∏k=0

(1 + qk)

)El,q

tn

[n]q!= 2

∞∑n=0

(−1)nq(n2) tn

[n]q!.

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 27, NO.1, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

141 AGARWAL ET AL 136-148

Page 142: Journal of Computational Analysis and Applicationseudoxuspress.com/images/JOCAAA-VOL-27-2019-ISSUE-1.pdf · Volume 27, Number 1 July 15, 2019 . ISSN:1521-1398 PRINT,1572-9206 ONLINE

Comparing the coefficients of tn

[n]q !, the proof is complete.

(ii) We omit the proof of the q-Euler polynomials because we can derive it in the same method as

(i).

Corollary 2.11. In Theorem 2.10, we get

(i) (−1)nq(n2) =

1

2

n∑l=0

[n

l

]q

(n−l−1∏k=0

(1− qk) + (−1)n−ln−l−1∏k=0

(1 + qk)

)El,q,

(ii)n∑

l=0

[n

l

]q

(−1)n−lq(n−l2 )xl =

1

2

n∑l=0

[n

l

]q

(n−l−1∏k=0

(1− qk) + (−1)n−ln−l−1∏k=0

(1 + qk)

)El,q(x).

Theorem 2.12. For x ∈ C, we hold

(i)n∑

k=0

[n

k

]q

(1 + (−1)k)En−k,q =

2 if n = 0

0 if n 6= 0,

(ii)

n∑k=0

[n

k

]q

(1 + (−1)k)En−k,q(x) = 2xn.

Proof. (i) From Definition 2.1, we can represent q-Euler numbers, En,q, as

∞∑n=0

En,qtn

[n]q!

∞∑n=0

(1 + (−1)n)tn

[n]q!= 2.

Now using the Cauchy’s product, we find the relation,

∞∑n=0

n∑k=0

[n

k

]q

(1 + (−1)k)En−k,q

tn

[n]q!= 2,

and the proof is done.

(ii) We omit a proof of (ii) since we can obtain (ii) using Cauchy’s product and the method of

coefficient comparison for Definition 2.1 using the same method (i).

Theorem 2.13. Let x ∈ C and |q| < 1. Then, the following holds:

(i)

n∑k=0

[n

k

]q

(1 + (−1)k)En−k,q = 2

[n2 ]∑

k=0

[n

n− 2k

]q

En−2k,q,

(ii)n∑

k=0

[n

k

]q

(1 + (−1)k)En−k,q(x) = 2

[n2 ]∑

k=0

[n

n− 2k

]q

En−2k,q(x),

where [x] is the greatest integer not exceeding x.

Proof. (i) In Theorem 2.12. (i), the left-side is changed as:

∞∑n=0

En,qtn

[n]q!

∞∑n=0

(1 + (−1)n)tn

[n]q!= 2

∞∑n=0

En,qtn

[n]q!

∞∑n=0

t2n

[2n]q!

= 2∞∑

n=0

n∑k=0

[2n− kk

]q

Ek,q

t2n−k

[2n− k]q!= 2

∞∑n=0

[n2 ]∑

k=0

[n

n− 2k

]q

En−2k,q

tn

[n]q!.

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 27, NO.1, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

142 AGARWAL ET AL 136-148

Page 143: Journal of Computational Analysis and Applicationseudoxuspress.com/images/JOCAAA-VOL-27-2019-ISSUE-1.pdf · Volume 27, Number 1 July 15, 2019 . ISSN:1521-1398 PRINT,1572-9206 ONLINE

The required relation now follows on comparing the coefficients of tn on both sides.

(ii) Now following the same procedure as (i), we find (ii).

Corollary 2.14. From the Theorem 2.12 and Theorem 2.13, the following relations hold:

(i)

[n2 ]∑

k=0

[n

n− 2k

]q

En−2k,q =

1 if n = 0

0 if n 6= 0,

(ii)

[n2 ]∑

k=0

[n

n− 2k

]q

En−2k,q(x) = xn,

where [x] is the greatest integer not exceeding x.

Theorem 2.15. For x ∈ C, the following relation holds

En,q(x) = (−1)nEn,q(−x).

Proof. Replacing t, x with −t,−x, respectively, we get

∞∑n=0

En,q(−x)(−t)n

[n]q!=

2

eq(−t) + eq(t)eq(tx) =

∞∑n=0

En,q(x)tn

[n]q!,

which on comparing the coefficients immediately gives the required relation.

Corollary 2.16. Putting x = 1 in Theorem 2.15, we see

En,q(1) = (−1)nEn,q(−1).

3. Some special properties of the q-Euler polynomials of the second kind

In this section, we define the q-Euler polynomials of the second kind in two parameters. From

these polynomials, we can find some relations between these polynomials and other polynomials.

We can also observe a symmetric property of the q-Euler polynomials of the second kind.

Definition 3.1. Let x, y ∈ C. We then define the q-Euler polynomials of the second kind in

two parameters as:∞∑

n=0

En,q(x, y)tn

[n]q!=

2

eq(t) + eq(−t)eq(tx)eq(ty).

For y = 0, we can see that En,q(x, 0) = En,q(x).

Theorem 3.2. Let x be any complex numbers. Then we hold

(i) En,q(x, y) =

n∑k=0

[n

k

]q

Ek,q(x)yn−k,

(ii) En,q(x, y) =

n∑l=0

[n

l

]q

En−ll∑

k=0

[l

k

]q

xl−kyk.

Proof. From Definition 3.1, we find

∞∑n=0

En,q(x, y)tn

[n]q!=

2

eq(t) + eq(−t)eq(tx)eq(ty)

=∞∑

n=0

En,q(x)tn

[n]q!

∞∑n=0

yntn

[n]q!=∞∑

n=0

n∑k=0

[n

k

]q

Ek,q(x)yn−k

tn

[n]q!.

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 27, NO.1, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

143 AGARWAL ET AL 136-148

Page 144: Journal of Computational Analysis and Applicationseudoxuspress.com/images/JOCAAA-VOL-27-2019-ISSUE-1.pdf · Volume 27, Number 1 July 15, 2019 . ISSN:1521-1398 PRINT,1572-9206 ONLINE

The required relation now follows immediately.

Theorem 3.3. For x ∈ C, we hold

En,q(x, 1) + En,q(x,−1) = 2xn.

Proof. Setting y = 1 and −1, we can get

∞∑n=0

(En,q(x, 1) + En,q(x,−1)

) tn

[n]q!=

2

eq(t) + eq(−t)eq(tx)eq(t) +

2

eq(t) + eq(−t)eq(tx)eq(−t)

=2

eq(t) + eq(−t)eq(tx) (eq(t) + eq(−t)) = 2eq(tx) = 2

∞∑n=0

xntn

[n]q!,

and the proof is complete on comparing the coefficient of both sides.

Corollary 3.4. From Theorem 3.3, we see

xn =1

2

(En,q(x, 1) + En,q(x,−1)

).

To investigate some relations of other polynomials, we define q-Euler, q-Bernoulli, and q-tangent

polynomials. These polynomials have a lot of properties, applications, and identities.

Definition 3.5. We define q-tangent polynomials, T (x); q-Euler polynomials, E(x); and q-

Bernoulli polynomials, B(x) as

∞∑n=0

En,q(x)tn

[n]q!=

[2]qeq(t) + 1

eq(tx), |t| < π,

∞∑n=0

Tn,q(x)tn

[n]q!=

[2]qeq(2t) + 1

eq(tx), |t| < π

2,

∞∑n=0

Bn,q(x)tn

[n]q!=

t

eq(t)− 1eq(tx), |t| < 2π, (see [7, 14-15]).

Theorem 3.6. For x, y ∈ C, the following relation holds:

En,q(x, y) =1

[2]q

n∑l=0

[n

l

]q

En−l,q(x)

ml+

n−l∑k=0

[n− lk

]q

Ek,q(x)

mn−k

El,q(my),

where En,q(x) is q-Euler polynomials.

Proof. Transforming the q-Euler polynomials of the second kind containing two parameters, we have

2

eq(t) + eq(−t)eq(tx)eq(ty) =

([2]q

eq( tm ) + 1

eq(ty)

)(eq( t

m ) + 1

[2]q

)(2

eq(t) + eq(−t)eq(tx)

).

For the relation between q-Euler polynomials of the second kind containing two parameters and

q-Euler polynomials, we get

∞∑n=0

En,q(x, y)tn

[n]q!=

1

[2]q

∞∑n=0

n∑l=0

[n

l

]q

El,q(my)n−l∑k=0

[n− lk

]q

Ek,q(x)

mn−k

tn

[n]q!

+1

[2]q

∞∑n=0

n∑l=0

[n

l

]q

El,q(my)En−l,q(x)

ml

tn

[n]q!,

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 27, NO.1, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

144 AGARWAL ET AL 136-148

Page 145: Journal of Computational Analysis and Applicationseudoxuspress.com/images/JOCAAA-VOL-27-2019-ISSUE-1.pdf · Volume 27, Number 1 July 15, 2019 . ISSN:1521-1398 PRINT,1572-9206 ONLINE

which, on comparing the coefficients, immediately gives the required relation.

Corollary 3.7. For q → 1 in Theorem 3.6, we have

En(x, y) =1

2

n∑l=0

(n

l

)(En−l(x)

ml+

n−l∑k=0

(n− lk

)Ek(x)

mn−k

)El(my),

where En(x) is the classical Euler polynomials of the second kind, and En(x) is the classical Euler

polynomials(see [17]).

Theorem 3.8. Let x, y ∈ C and |q| < 1. Then we get

En,q(x, y) =1

[2]q

n∑l=0

[n

l

]q

2lEn−l,q(x)

ml+

n−l∑k=0

[n− lk

]q

2n−kEk,q(x)

mn−k

Tl,q(m

2y),

where Tn,q(x) is q-tangent polynomials.

Proof. To obtain the relation between q-Euler polynomials of the second kind and q-tangent poly-

nomials, we can make

∞∑n=0

En,q(x, y)tn

[n]q!=

([2]q

eq( 2tm ) + 1

eq(ty)

)(eq( 2t

m ) + 1

[2]q

)(2

eq(t) + eq(−t)eq(tx)

).

From the above equation, we hold

∞∑n=0

En,q(x, y)tn

[n]q!=

1

[2]q

∞∑n=0

n∑l=0

[n

l

]q

Tl,q(m

2y)

n−l∑k=0

[n− lk

]q

2n−kEk,q(x)

mn−k

tn

[n]q!

+1

[2]q

∞∑n=0

n∑l=0

[n

l

]q

En−l,q(x)2lTl,q(m

2 y)

ml

tn

[n]q!,

which, on comparing the coefficients, the required relation at once.

Corollary 3.9. For q → 1 in Theorem 3.8, we see

En(x, y) =1

2

n∑l=0

(n

l

)(2lEn−l(x)

ml+

n−l∑k=0

(n− lk

)2n−kEk(x)

mn−k

)Tl(

m

2y),

where En(x) is the classical Euler polynomials of the second kind, and Tl(x) is the classical tangent

polynomials(see [6, 13-14, 17]).

Theorem 3.10. Let |q| < 1 and x, y be any complex numbers. Then we hold

[n]qEn−1,q(x, y) =n∑

l=0

[n

l

]q

n−l∑k=0

[n− lk

]q

Ek,q(x)

mn−k −[n− l]qEn−l,q(x)

ml

Bl,q(my).

Proof. Multiplying the generating function of q-Euler polynomials of the second kind in two param-

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 27, NO.1, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

145 AGARWAL ET AL 136-148

Page 146: Journal of Computational Analysis and Applicationseudoxuspress.com/images/JOCAAA-VOL-27-2019-ISSUE-1.pdf · Volume 27, Number 1 July 15, 2019 . ISSN:1521-1398 PRINT,1572-9206 ONLINE

eters by a suitable function, we have

∞∑n=0

En,q(x, y)tn

[n]q!=

(t

eq( tm )− 1

eq(ty)

)(eq( t

m )− 1

t

)(2

eq(t) + eq(−t)eq(tx)

)

=

( ∞∑n=0

Bn,q(my)tn

mn[n]q!

)( ∞∑n=0

tn−1

mn[n]q!− 1

t

)( ∞∑n=0

En,q(x)tn

[n]q!

)

=∞∑

n=0

1

[n]q

n∑l=0

[n

l

]q

Bl,q(my)n−l∑k=0

[n− lk

]q

Ek,q(x)

mn−k

tn−1

[n− 1]q!

−∞∑

n=0

1

[n]q

n∑l=0

[n

l

]q

[n− l]qEn−l,q(x)

mlBl,q(my)

tn−1

[n− 1]q!.

Comparing the coefficients of both sides leads to

∞∑n=0

[n]qEn−1,q(x, y)tn

[n]q!=

∞∑n=0

n∑

l=0

[n

l

]q

n−l∑k=0

[n− lk

]q

Ek,q(x)

mn−k −[n− l]qEn−l,q(x)

ml

Bl,q(my)

tn

[n]q!,

which gives the required result.

Corollary 3.11. For q → 1, in Theorem 3.10, we see

[n]qEn−1(x, y) =

n∑l=0

(n

l

)(n−l∑k=0

(n− lk

)Ek(x)

mn−k −(n− l)En−l(x)

ml

)Bl(my),

where En(x) is the classical Euler polynomials of the second kind, and Bn(x) is the classical Bernoulli

polynomials(see [6-9, 12, 15, 17]).

Theorem 3.12. For q, x and y ∈ C, the q-Euler polynomials of the second kind have

n∑k=0

[n

k

]q

(b

a

)n−2k

En−k,q(abx)Ek,q

(b

ay

)=

n∑k=0

[n

k

]q

(ab

)n−2kEn−k,q

(b

ax

)Ek,q

(aby).

Proof. Consider that

A =4eq(tx)eq(ty)(

eq( ba t) + eq(− b

a t)) (eq(a

b t) + eq(−ab t)) .

The form A can turn to

A =2eq(tx)(

eq( ba t) + eq(− b

a t)) 2eq(ty)(eq(a

b t) + eq(−ab t))

=∞∑

n=0

En,q(abx) ( b

a t)n

[n]q!

∞∑n=0

En,q(b

ay

) (ab t)n

[n]q!

=

∞∑n=0

n∑k=0

[n

k

]q

(b

a

)n−2k

En−k,q(abx)Ek,q

(b

ay

) tn

[n]q!,

(3.1)

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 27, NO.1, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

146 AGARWAL ET AL 136-148

Page 147: Journal of Computational Analysis and Applicationseudoxuspress.com/images/JOCAAA-VOL-27-2019-ISSUE-1.pdf · Volume 27, Number 1 July 15, 2019 . ISSN:1521-1398 PRINT,1572-9206 ONLINE

or, equivalently,

A =2eq(tx)(

eq(ab t) + eq(−a

b t)) 2eq(ty)(eq( b

a t) + eq(− ba t))

=∞∑

n=0

En,q(b

ax

) (ab t)n

[n]q!

∞∑n=0

En,q(aby) ( b

a t)n

[n]q!

=∞∑

n=0

n∑k=0

[n

k

]q

(ab

)n−2kEn−k,q

(b

ax

)Ek,q

(aby) tn

[n]q!,

(3.2)

and the theorem is proved in (3.1) and (3.2).

Corollary 3.13. If q → 1 in Theorem 3.12, then we see

n∑k=0

(n

k

)(b

a

)n−2k

En−k

(abx)Ek

(b

ay

)=

n∑k=0

(n

k

)(ab

)n−2kEn−k

(b

ax

)Ek

(aby),

where En(x) is the classical Euler polynomials of the second kind(see [6, 17]).

Theorem 3.14. For k ∈ N, we get

D(k)q En,q(x) =

[n

k

]q

[k]q!En−k,q(x).

Proof. To make this result we have to remember Theorem 2.2,

En,q(x) =n∑

k=0

[n

k

]q

Ek,qxn−k,

and Theorem 2.3,

D(1)q En,q(x) = [n]qEn−1,q(x).

Repeating q-derivative for Theorem 2.3, we can see

D(2)q En,q(x) = [n]q[n− 1]qEn−2,q(x)

D(3)q En,q(x) = [n]q[n− 1]q[n− 2]qEn−3,q(x)

D(4)q En,q(x) = [n]q[n− 1]q[n− 2]q[n− 3]qEn−4,q(x)

· · · .

For k ∈ N, we find q-derivative of k-times such as

D(k)q En,q(x) = [n]q[n− 1]q[n− 2]q[n− 3]q · · · [n− k + 1]qEn−k,q(x)

=

[n

k

]q

[k]q!En−k,q(x),

and it is proved.

Acknowledgement: This work was supported by the National Research Foundation of

Korea(NRF) grant funded by the Korea government(MEST) (No. 2017070483).

REFERENCES

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 27, NO.1, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

147 AGARWAL ET AL 136-148

Page 148: Journal of Computational Analysis and Applicationseudoxuspress.com/images/JOCAAA-VOL-27-2019-ISSUE-1.pdf · Volume 27, Number 1 July 15, 2019 . ISSN:1521-1398 PRINT,1572-9206 ONLINE

1. G. E. Andrews, R. Askey, R. Roy, Special functions, Cambridge Press, Cambridge, UK 1999.

2. R. Ayoub, Euler and zeta function, Amer. Math. Monthly, 81(1974), 1067-1086.

3. M. Arik, E. Demircan, T. Turgut, L. Ekinci, M. Mungan, Fibonacci oscillators, Z. Phys.

C:particles and Fields, 55 (1992), 89-95.

4. G. Bangerezako, An introduction to q-difference equations, preprint, Bujumbura 2008.

5. L. Comtet, Advanced Combinatorics, Reidel, Dordrecht, The Netherlands, 1974.

6. L. Carlitz, , A note on Bernoulli and Euler polynomials of the second kind, Scripta Math., 25

(1961) 323-330.

7. N. I. Mahmudov, A Akkele, A. neren, On a class of two dimensional (w, q)-Bernoulli and

(w, q)-Euler polynomials: Properties and location of zeros, Journal of Computational Analysis

and Applications, 16 (1)(2014) 282-292.

8. Q. M. Luo, H. M. Srivastava, q-Extensions of some relationships between the Bernoulli and

Euler polynomials, Taiwan. J. Math, 15 (2011) 241-257.

9. H. Ozden, Y. Simsek, A new extension of q-Euler numbers and polynomials related to their

interpolation functions., Appl. Math. Lett., 21 (2008) 934-939.

10. R. Jagannathan, K. S. Rao, Two-parameter quantum algebras, twin-basic numbers, and asso-

ciated generalized hypergeometric series, arXiv:math/0602613[math.NT].

11. H. F. Jackson, q-Difference equations, Am. J. Math, 32 (1910), 305-314.

12. N. I. Mahmudov, A new class of generalized Bernoulli polynomials and Euler polynomials,

arXive:1201.6633v1[math. CA], 31 Jan 2012.

13. C.S. Ryoo, A numerical investigation on the zeros of the tangent polynomials, J. Appl. Math.

& Informatics, 32 (2014), 315-322.

14. C.S. Ryoo, Differential equations associated with tangent numbers, J. Appl. Math. & Infor-

matics, 34 (2016), 487-494.

15. C.S. Ryoo, A Note on the Zeros of the q-Bernoulli Polynomials, J. Appl. Math. & Informatics,

28 (2010), 805-811.

16. C.S. Ryoo, Reflection Symmetries of the q-Genocchi Polynomials, J. Appl. Math. & Informat-

ics, 28 (1010), 1277-1284.

17. C. S. Ryoo, Calculating zeros of the second kind Euler polynomials, J. Comput. Anal. Appl.,

12 (2010), 828-833.

18. C. S. Ryoo, T. Kim, R. P. Agarwal, A numerical investigation of the roots of q-polynomials,

Inter. J. Comput. Math., 83 (2006), 223-234.

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 27, NO.1, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

148 AGARWAL ET AL 136-148

Page 149: Journal of Computational Analysis and Applicationseudoxuspress.com/images/JOCAAA-VOL-27-2019-ISSUE-1.pdf · Volume 27, Number 1 July 15, 2019 . ISSN:1521-1398 PRINT,1572-9206 ONLINE

Regularized moving least squares approximation with

Laplace-Beltrami operator on the sphere ∗

Chunmei Ding Yongli Zhang Feilong Cao

Department of Applied Mathematics, College of Sciences, China Jiliang University,Hangzhou 310018, Zhejiang Province, P R China.

E-mail: [email protected]

Abstract

This paper proposes a pointwise approximation scheme on the unit sphere S2, which aimsto handle spherical scattered data with high level noise by using a regularized moving leastsquares (RMLS) approximation with Laplace-Beltrami operator. The pointwise errors of ap-proximation by the RMLS are estimated, and some numerical examples are designed to ex-amine the obtained theoretical results. Also, the given numerical examples illustrate that thedifferent choices for the order of Laplace-Beltrami operator and regularized parameter canprovide different pointwise approximation results.

MSC(2000): 65D32, 65H10, 41A17Keywords Sphere; Moving least squares; Pointwise approximation; Laplace-Beltrami op-

erator

1 Introduction

In recent years, scattered data approximation on the unit sphere S2 has been widely applied toastrophysics, meteorology, geodesy, geophysics, and other areas (see [9, 11, 36]). In the approxima-tion, spherical polynomials and spherical radial basis functions are usually taken as approximationtools. We refer the reader to [12, 13, 14, 16, 17, 25, 24, 26, 36, 30, 31, 32].

Moving least squares (MLS) scheme for scattered data approximation in Euclidean space Rnwas proposed in [34] and [36] several years ago, which is actually a scheme to approximate targetfunctions by using polynomials. Its simplest form coincides with Shepards interpolation method[29]. And, in terms of Backus-Gilbert method and constructive way of computing MLS approx-imation, it is also called as Backus-Gilbert optimal [4, 5, 6, 8]. Afterwards MLS was extendedby McLain [21, 22], Franke [10], and Lancaster [15]. Meanwhile, MLS approximation has beenfrequently applied to potential energy surfaces [20], surface reconstruction [15], and partial dif-ferential equations [7]. In addition, several errors of approximation of MLS were estimated bydifferent ways in [2, 3, 18, 34, 36].

In the MLS method, the highlight is process of MLS approximation involving the local polyno-mial reproduction property and the key ingredient in depriving error estimates. Based on the idea,Wendland [35] studied MLS approximation on the sphere to estimate the function value f(x) bysolving a local weighted least squares problem for every point x on the sphere which seems to bebetter than the method of spherical radial basis functions (SBFs) interpolation, because it does notrequire solving a large linear system. Li [19] developed a theoretical analysis of the generalizationperformances of regularized least square regression algorithm with spherical polynomial kernels.An et al. [1] considered regularized least squares scheme by using spherical designs, which canbe used to handle the data set with high level noise when the regularized operator is chosen asspherical Laplace-Beltrami operator.

Based on the denoising effect of the Laplace-Beltrami operator and the superiority of MLSapproximation, this paper proposes an approximation scheme of regularized moving least squares

∗Supported by the National Natural Science Foundation of China (No. 61672477)

1

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 27, NO.1, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

149 Chunmei Ding ET AL 149-161

Page 150: Journal of Computational Analysis and Applicationseudoxuspress.com/images/JOCAAA-VOL-27-2019-ISSUE-1.pdf · Volume 27, Number 1 July 15, 2019 . ISSN:1521-1398 PRINT,1572-9206 ONLINE

C. Ding et al.: Regularized moving least squares approximation on the sphere

(RMLS) with the Laplace-Beltrami operator. A pointwise approximation issue on the unit sphereS2, which aims to handle data set with high level noise, is considered, and the errors of approxi-mation by the proposed RMLS are estimated. The numerical experiments are designed to furthershow the effectiveness of the proposed new method.

This paper is organized as follows. In Section 2, the necessary backgrounds about sphericalharmonics, sphere function spaces, and Laplace-Beltrami operator are reviewed. The MLS approx-imation on the sphere is stated in Section 3. In Section 4, we propose the RMLS approximationscheme. Section 5 devotes to give the error estimation for RMLS approximation. Numerical ex-periments are given in Section 6 to demonstrate the effectiveness of RMLS approximation schemefor data with high level noise.

2 Preliminaries

2.1 Spherical harmonics, sphere function spaces, and sphere point sets

In this section, we introduce some notations about spherical harmonics, sphere function spaces,and sphere point sets, which can be found in [23] and [33].

Let S2 be the unit sphere embedded in the Euclidean space R3, i.e.,

S2 :=x := (x1, x2, x3) ∈ R3 : ‖x‖22 := x21 + x22 + x23 = 1

.

For integer l ≥ 0, the restriction to S2 of a homogeneous harmonic polynomial with degree lis called a spherical harmonic with degree l. The class of all spherical harmonics with degree l isdenoted by Hl, and it is well-known that spherical harmonics of different degree are orthogonalwith respect to the inner product 〈f, g〉L2

:=∫S2 f(x)g(x)dω(x),where dω denotes surface measure

on S2. Hence, if we choose an orthogonal basis Yl,k : k = 1, . . . , 2l + 1 for each Hl, then the setYl,k : l = 0, 1, . . . , k = 1, . . . , 2l + 1 is an orthogonal basis for L2(S2). The class of all spherical

harmonics with total degree l ≤ L is denoted by PL. Of course, PL =⊕L

l=0Hl, and the dimensionof Hl is 2l+ 1 and that of PL is (L+ 1)2. The well-known addition formula is given by (see [23])

2l+1∑k=1

Yl,k(x)Yl,k(y) =2l + 1

4πPl(x · y), (2.1)

where Pl is the Legendre polynomial with degree l and dimension 3, which is normalized such thatPl(1) = 1.

For every p ∈ PL, we have

p(x) =L∑l=0

2l+1∑k=1

αl,kYl,k(x), (2.2)

where αl,k =∫S2 p(y)Yl,k(y)dω(y).

We denote by C(S2) the space of continuous functions on S2 endowed with the uniform (supre-mum) norm ‖f‖C(S2) := supx∈S2 |f(x)|.The geodesic distance between two points on the unitsphere S2 is defined by d(x, y) := arccos(〈x, y〉)(x, y ∈ S2),where 〈x, y〉 denotes the Euclidean innerproduct.

Let x1, x2, . . . , xN ∈ S2, which are pairwise distinct. Then X := x1, x2, . . . , xN is called as acenters set. The mesh norm of X is denoted by

hX,S2 := supx∈S2

minxi∈X

d(x, xi),

and the separation radius is defined to be

qX,S2 :=1

2mini6=j

d(xi, xj)

that is half of the smallest geodesic distance between any two distinct points in X. It is easy tosee that hX,S2 ≥ qX,S2 , where equality can hold only for a uniform distribution of points on thecircle S1.

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 27, NO.1, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

150 Chunmei Ding ET AL 149-161

Page 151: Journal of Computational Analysis and Applicationseudoxuspress.com/images/JOCAAA-VOL-27-2019-ISSUE-1.pdf · Volume 27, Number 1 July 15, 2019 . ISSN:1521-1398 PRINT,1572-9206 ONLINE

C. Ding et al.: Regularized moving least squares approximation on the sphere

For a given point set X, if there exists a constant c1 > 1, such that

qX,S2 ≤ hX,S2 ≤ c1qX,S2 , (2.3)

then X is called quasi-uniform.In addition, the set X is said to be PL-unisolvent (see [32]), if

p ∈ PL, p(xi) = 0 for i = 1, 2, . . . , N ⇒ p = 0.

2.2 Laplace-Beltrami operator

In this subsection, we introduce Laplace-Beltrami operator on S2 (see [23, 33]). The Laplace-Beltrami operator is defined by

∆f :=3∑i=1

∂2g(x)

∂x2i

∣∣∣∣∣‖x‖2=1

, g(x) := f

(x

‖x‖2

).

In fact, the Laplace-Beltrami operator is the angular part of the Laplace operator in three dimen-sions

∂2

∂x21+

∂2

∂x22+

∂2

∂x23.

Giving point x := (x1, x2, x3) on S2, then the related spherical polar coordinate system is (θ, ϕ),0 ≤ θ ≤ π, 0 ≤ ϕ < 2π, in terms of polar coordinate transformation

x1 = sin θ cosϕ, x2 = sin θ sinϕ, x3 = cos θ,

the Laplace-Beltrami operator acting as a differential operator can be written by

∆ :=1

sin θ

∂θ(sin θ

∂θ) +

1

sin2 θ

∂2

∂ϕ2.

The literature has pointed an intrinsic characterization of spherical harmonics, which is everyelement of Hl is an eigenfunction corresponding to the eigenvalue −l(l+1) of the Laplace-Beltramioperator ∆, namely that

∆Yl,k(x) = −l(l + 1)Yl,k(x).

In fact, ∆ is a semi-positive operator, and for any s > 0 we can define (−∆)s as

(−∆)sYl,k = (l(l + 1))sYl,k(x) = βlYl,k(x).

So, for p(x) ∈ PL, (−∆)sp(x) can be represented by

(−∆)sp(x) =L∑l=0

βl

2l+1∑k=1

Yl,k(x)〈Yl,k, p〉 =L∑l=0

βl

∫S2

2l + 1

4πPl(x, y)p(y)dω(y),

where βµ = (µ(µ+ 1))s, µ = 0, 1, . . . , L, and Pl is the Legendre polynomial with degree l.

3 Moving least squares

Moving least squares (MLS) approximation has been frequently applied to potential energy sur-faces [20], surface reconstruction [15], and partial differential equations [7]. In order to proposeregularized moving least squares (RMLS) in the next section, we should first review some detailsabout MLS approximation on the sphere [35].

The issue of MLS approximation on the sphere has been given some detailed discussions byWendland in [34, 35, 36]. Suppose an unknown continuous function f ∈ C(S2) and x ∈ S2,we can construct an approximation of f(x) from values f(xi)Ni=1 of f on a given point set

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 27, NO.1, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

151 Chunmei Ding ET AL 149-161

Page 152: Journal of Computational Analysis and Applicationseudoxuspress.com/images/JOCAAA-VOL-27-2019-ISSUE-1.pdf · Volume 27, Number 1 July 15, 2019 . ISSN:1521-1398 PRINT,1572-9206 ONLINE

C. Ding et al.: Regularized moving least squares approximation on the sphere

X = x1, . . . , xN ⊆ S2. Then the approximate value p∗(x) of f(x) can be obtained by the solutionof following minimization problem

min

N∑i=1

(f(xi)− p(xi))2w(x, xi) : p ∈ P

, (3.4)

where P ⊆ C(S2) is a finite dimensional subspace, usually spanned by spherical harmonics, andw : S2× S2 → [0,∞) is a continuous function. Since we consider a local process, we choose w(x, y)as a radial and compactly supported function, even if it is not really necessary. So Wendland[34, 35, 36] chose continuous function φ : [0,∞)→ [0,∞) with• φ(r) > 0, 0 ≤ r < 1,• φ(r) = 0, r ≥ 1,

and define

θδ(x, y) :=1

φ(d(x,y)δ

) , x, y ∈ S2, (3.5)

where δ > 0 is a scale. Then above weight function w(x, xi) has the following form

w(x, xi) =1

θδ(x, xi)= φ

(d(x, y)

δ

).

For X = x1, x2, . . . , xN, we further define the index set I(x) as

I(x) := I(x, δ,X) = i ∈ 1, 2, . . . , N : d(x, xi) < δ, (3.6)

which contains the subscripts of points within the spherical cap of radius δ centered at x. And wechoose P = PL. Then the MLS approximation (3.4) takes the form (see [18, 34, 35, 36])

sf,X(x) =∑i∈I(x)

a∗i (x)f(xi),

where the coefficients a∗i (x) are determined by minimizing

1

2

∑i∈I(x)

a2i (x)θδ(x, xi) (3.7)

under the constraints ∑i∈I(x)

ai(x)p(xi) = p(x), p ∈ PL. (3.8)

If X satisfies certain conditions, then we have the following theorem [35].

Theorem 3.1 Assume that Z = xi ∈ X : i ∈ I(x, δ,X) is PL-unisolvent. Then the minimiza-tion problem (3.7) with constraint (3.8) has an unique solution a∗i (x):

a∗i (x) = φ

(d(x, xi)

δ

) L∑µ=0

2µ+1∑ν=1

λµ,νYµ,ν(xi),

where i ∈ I(x), xi ∈ Z, and the Lagrange multipliers λl,k have unique solution by solving thefollowing system of equations:

L∑µ=0

2µ+1∑ν=1

λµ,ν∑i∈I(x)

φ

(d(x, xi)

δ

)Yµ,ν(xi)Yl,k(xi) = Yl,k(x)

with 0 ≤ l ≤ L, 1 ≤ k ≤ 2µ+ 1.

Since Z = xi1 , xi2 , . . . , xiM = xi, i ∈ I(x) ⊆ X involves the choice of scale δ, so it is also aninteresting research direction. From [36] we know that if x lies in a region with a high data density,then the δ should be chosen small. However, we should choose a bigger δ, since our method islocal. Therefore, we often choose

δ = δX = C1hX , (3.9)

where C1 is a constant.

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 27, NO.1, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

152 Chunmei Ding ET AL 149-161

Page 153: Journal of Computational Analysis and Applicationseudoxuspress.com/images/JOCAAA-VOL-27-2019-ISSUE-1.pdf · Volume 27, Number 1 July 15, 2019 . ISSN:1521-1398 PRINT,1572-9206 ONLINE

C. Ding et al.: Regularized moving least squares approximation on the sphere

4 Regularized moving least squares with Laplace-Beltramioperator

In this section, we propose a category of local polynomial approximation on the unit sphere S2 interms of an improvement of MLS, and give the model of the RMLS.

For an unknown continuous function f ∈ C(S2), X = x1, x2, · · · , xN ⊆ S2, and x ∈ S2, wecan get an approximate value p(x) of f(x) from values f(xi)Ni=1 by the solution p of followingminimization problem

min

N∑i=1

((f(xi)− p(xi))2 + λ ((−∆)sp(xi))

2)φ

(d(x, xi)

δ

): p ∈ PL

, (4.10)

where (−∆)s and φ is defined as above, λ > 0 is a regularization parameter.Similar to [18, 34, 35, 36], we want to use polynomial local reconstruction to estimate approx-

imation order. So, the new approximation form can be constructed and it is the same as thesolution of (4.10). We construct the new approximation form:

sf,X(x) =∑i∈I(x)

a∗i (x)f(xi), (4.11)

where the coefficients are determined by minimizing

1

2

∑i∈I(x)

a2i (x)θδ(x, xi) (4.12)

under the constraints ∑i∈I(x)

ai(x)p(xi) = q(x), p ∈ PL, (4.13)

where

q(x) =L∑µ=0

2µ+1∑ν=1

(1 + λβ2µ)−1pµ,νYµ,ν(x),

pµ,ν is the Fourier coefficient of p, and βµ = (µ(µ+ 1))s. The following (2) of Theorem 4.1 showsthat the constructed approximation form (4.11) and constrained optimization problems (4.12)-(4.13) are valid.

In the following, we focus on how to solve the new constrained optimization problem, whereZ = xi1 , xi2 , . . . , xiM = xi, i ∈ I(x) ⊆ X. We need the following notations:

f = (f(x1), f(x2), . . . , f(xM ))T ;

a = (a∗1(x), a∗2(x), . . . , a∗M (x))T ;

α = (α0,1, . . . , αL,2L+1)T ;

ϕ = (Y0,1(x), . . . , YL,2L+1(x))T ;

W = diag

φ

(d(x, x1)

δ

), φ

(d(x, x2)

δ

), . . . , φ

(d(x, xM )

δ

);

B = diagβ0, β1, β1, β1, . . . , βµ, . . . , βµ︸ ︷︷ ︸2µ+1

, . . . , β2L+1, . . . , β2L+1;

Y =

Y0,1(x1) Y1,1(x1) Y1,2(x1) · · · YL,2L+1(x1)Y0,1(x2) Y1,1(x2) Y1,2(x2) · · · YL,2L+1(x2)

......

.... . .

...Y0,1(xM ) Y1,1(xM ) Y1,2(xM ) · · · YL,2L+1(xM )

.

The following Theorem 4.1 will give the concrete form of the solution of RMLS approximation,and proves that the solution of (4.10) is equivalent to the solution of the minimization problem(4.12) with constraint (4.13). Namely, the constructions (4.11)-(4.13) are valid.

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 27, NO.1, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

153 Chunmei Ding ET AL 149-161

Page 154: Journal of Computational Analysis and Applicationseudoxuspress.com/images/JOCAAA-VOL-27-2019-ISSUE-1.pdf · Volume 27, Number 1 July 15, 2019 . ISSN:1521-1398 PRINT,1572-9206 ONLINE

C. Ding et al.: Regularized moving least squares approximation on the sphere

Theorem 4.1 The following statements hold.(1). For a given point set X = x1, . . . , xN ⊂ S2, if Z = xi ∈ X : i ∈ I(x, δ,X) is PL-

unisolvent, then the minimization problem (4.12) with constraint (4.13) has unique solution a∗i (x):

a∗i (x) = φ

(d(x, xi)

δ

) L∑µ=0

2µ+1∑ν=1

zµ,νYµ,ν(xi), i ∈ I(x), (4.14)

where zl,k can be obtained by solving the following system of equations:

L∑µ=0

2µ+1∑ν=1

zµ,ν∑i∈I(x)

φ

(d(x, xi)

δ

)Yµ,ν(xi)Yl,k(xi) = (1 + λβ2

l )−1Yl,k(x) (4.15)

with 0 ≤ l ≤ L, 1 ≤ k ≤ 2l + 1, λ > 0;(2). The solution of (4.10) is equivalent to the solution of the minimization problem (4.12) with

constraint (4.13).

Proof. We first prove (1). Similar to [34], [35] and [36], we introduce Lagrange multipliesz = (z0,1, . . . , zL,2L+1) to solve the optimal problem (4.12) with constraint (4.13). Let

J =1

2

∑i∈I(x)

a2i (x)θδ(x, xi)−L∑µ=0

2µ+1∑ν=1

zµ,ν

∑i∈I(x)

ai(x)Yµ,ν(xi)− (1 + λβ2µ)−1Yµ,ν(x)

,

where zµ,ν = zµ,ν pµ,ν . We solve partial derivatives about ai(x) and zl,k for J , respectively,

∂J

∂ai(x)= ai(x)θδ(x, xi)−

L∑µ=0

2µ+1∑ν=1

zµ,νYµ,ν(xi) = 0, i ∈ I(x),

∂J

∂zl,k= −

∑i∈I(x)

ai(x)Yl,k(xi) + (1 + λβ2l )−1Yl,k(x) = 0, 0 ≤ l ≤ L, 1 ≤ k ≤ 2l + 1,

then, solving the above equations, we can get (4.14) and (4.15).In order to prove equivalent conditions, the solution (4.14) of the optimal problem (4.12) under

constraint (4.13) can be written as matrix form

a = WY (Y TWY + λBTY TWYB)−1ϕ.

Next, we prove the uniqueness of the solution. In fact, we only need to prove that Y TWY +λBTY TWYB is a positive definite matrix. For any vector

r = (r0,1, . . . , rL,2L+1)T ∈ R(L+1)2 ,

and for i ∈ I(x), w(x, xi) > 0,

rT (Y TWY + λBTY TWYB)r = (Y r)TW (Y r) + rTλBTY TWYBr

=∑i∈I(x)

φ

(d(x, xi)

δ

)( L∑l=0

2l+1∑k=1

Yl,k

)2

+∑i∈I(x)

φ

(d(x, xi)

δ

)( L∑l=0

2l+1∑k=1

rl,kβlYl,k

)2

≥ 0.

Since the entries of diagonal line of matrix B are not all 0, and Z is PL-unisolvent, we see that

∑i∈I(x)

φ

(d(x, xi)

δ

)( L∑l=0

2l+1∑k=1

Yl,k

)2

+∑i∈I(x)

φ

(d(x, xi)

δ

)( L∑l=0

2l+1∑k=1

rl,kβlYl,k

)2

= 0,

implies r = 0. So Y TWY + λBTY TWYB is a positive definite matrix.

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 27, NO.1, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

154 Chunmei Ding ET AL 149-161

Page 155: Journal of Computational Analysis and Applicationseudoxuspress.com/images/JOCAAA-VOL-27-2019-ISSUE-1.pdf · Volume 27, Number 1 July 15, 2019 . ISSN:1521-1398 PRINT,1572-9206 ONLINE

C. Ding et al.: Regularized moving least squares approximation on the sphere

We now prove property (2). Let Y0,1, . . . , YL,2L+1 be a set of the spherical harmonics in PL.Then the minimizer of (4.10) can be written as

p∗(x) =L∑µ=0

2µ+1∑ν=1

αµ,νYµ,ν(x).

ThusαT = fTWY (Y TWY + λBTY TWYB)−1,

hence

p∗(x) =L∑µ=0

2µ+1∑ν=1

αµ,νYµ,ν(x) = αTϕ

= fTWY (Y TWY + λBTY TWYB)−1ϕ = fTa

= sf,X(x).

The proof of Theorem 4.1 is complete. The following Theorem 4.2 devotes that p(x) of the solution of the minimization problem (4.12)

with constraint (4.13) uniformly converges to “s-smoothed” solution fs:

fs(x) :=∞∑l=0

1

1 + λ(l(l + 1))2s

2l+1∑k=1

fl,kYl,k(x) =∞∑l=0

1

1 + λ(l(l + 1))2s1

∫S2Pl(x · y)f(y)dω(y),

where the last equation uses the addition theorem (2.1).

Theorem 4.2 Assume that the order of Laplace-Beltrami operator s > 1/2, p(x) is the solutionof the minimization problem (4.12) with constraints (4.13), and L is the order of p(x), then wehave limL→∞ ‖p− fs‖C(S2) = 0.

This theorem has been proved in [1].

5 Error estimates

In this section, we will give an error estimate for RMLS approximation, which ensures the factthat RMLS approximation scheme is reasonable (see Theorem 6 below). But before starting theerror analysis, we need to collect a few auxiliary results. The following Lemma 4 indicates thelocal polynomial reproduction on the sphere, which is quoted from [35]. We also refer the readerto [18] and [34] for a general form of the local polynomial reproduction property, and it plays animportant role in the error estimates for RMLS approximation.

Lemma 5.1 There exist constants h0, C2, C3 > 0 such that for every point set X = x1, x2, . . . , xN ⊆S2 with hX,S2 ≤ h0 and every x ∈ S2, there exist aX1 (x), aX2 (x), . . . , aXN (x) satisfying that

(1)∑Ni=1 a

Xi (x)p(xi) = q(x), for any p ∈ PL;

(2) aXi (x) = 0, if d(x, xi) > C2hX,S2 ;

(3)∑Ni=1 |aXi (x)| ≤ C3,

where

q(x) =L∑µ=0

2µ+1∑ν=1

(1 + λβ2µ)−1pµ,νYµ,ν(x).

The following Lemma 5.2 is quoted from [35], which shows that |I(x)| is uniformly boundedin terms of packing argument from [27], and it plays an important role in the error estimates forRMLS and MLS approximation.

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 27, NO.1, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

155 Chunmei Ding ET AL 149-161

Page 156: Journal of Computational Analysis and Applicationseudoxuspress.com/images/JOCAAA-VOL-27-2019-ISSUE-1.pdf · Volume 27, Number 1 July 15, 2019 . ISSN:1521-1398 PRINT,1572-9206 ONLINE

C. Ding et al.: Regularized moving least squares approximation on the sphere

Lemma 5.2 Assume that X = x1, x2, . . . , xN ⊂ S2 is quasi-uniform with hX,S2 ≤ h0, I(x) :=i ∈ 1, 2, . . . , N : d(x, xi) < δ, and δ = C1hX,S2 . Then

|I(x)| ≤ qX + δ

qX≤ (1 + c1C1),

where the c1 and C1 are constants which associate with (2.3) and (3.9), respectively.

From Lemma 5.1 and Lemma 5.2, we use the similar techniques of [35], and obtain the followingTheorem 5.1, which is an error estimate for RMLS approximation.

Theorem 5.1 Let C1, C3, δ be given in (3.9), Lemma 5.1, and Lemma 5.2. Suppose that X =x1, x2, . . . , xN ⊆ S2 is quasi-uniform, and sX,f is the RMLS approximation of f ∈ C(S2) byminimization (4.12) under the constraint (4.13). Then there exist constants h0 and C which areindependent of f and X, such that for every X with hX,S2 ≤ h0 and every x ∈ S2, the error betweenf and sX,f can be bounded by

|f(x)− sX,f (x)| ≤ CcfCl+11 hl+1

X,S2 .

Proof. Let q ∈ PL and B(x, δ) = y ∈ S2; d(x, y) ≤ δ. We adopt the standard arguments toestimate the error of RMLS approximation:

|f(x)− sX,f (x)| = |f(x)− q(x) + q(x)− sX,f (x)| ≤ |f(x)− q(x)|+ |q(x)− sX,f (x)|

≤ ‖f(x)− q(x)‖∞,B(x,δ) +∑i∈I(x)

|a∗i (x)|‖f(x)− p(x)‖∞,B(x,δ)

where the relationship between p(x) and q(x) is q(x) =∑Lµ=0

∑2µ+1ν=1 (1 + λβ2

µ)−1pµ,νYµ,ν(x), pµ,νis the Fourier coefficient of p, and βµ = (µ(µ+ 1))s. So we can write

max‖f(x)− q(x)‖∞,B(x,δ), ‖f(x)− p(x)‖∞,B(x,δ)

:= ‖f(x)−G(x)‖∞,B(x,δ),

then|f(x)− sX,f (x)| ≤ (1 +

∑i∈I(x)

|a∗i (x)|)‖f(x)−G(x)‖∞,B(x,δ).

For∑i∈I(x) |a∗i (x)|, using Cauchy inequality we have

∑i∈I(x)

|a∗i (x)| ≤

∑i∈I(x)

|a∗i (x)|2θδ(x, xi)

1/2 ∑i∈I(x)

φ(d(x, xi)

δ)

1/2

. (5.16)

Now we prove that the first term of the right of (5.16) is bounded. According to hX,S2 ≤ h0,

we can get ai(x) that reproduces spherical harmonics and vanishes if d(x, xi) >δ2 . We set I(x) =

i : d(x, xi) ≤ δ2, then, by the minimization condition it is not difficult for us to obtain that∑

i∈I(x)

|a∗i (x)|2θδ(x, xi) ≤∑i∈I(x)

|ai(x)|2θδ(x, xi) ≤1

mini∈I(x) φ(d(x,xi)

δ )

∑i∈I(x)

|ai(x)|2

(N∑i=1

|ai(x)|

)2

1

miny∈Z φ(d(x,y)δ )≤ C2

3

1

miny∈Z φ(d(x,y)δ ),

and ∑i∈I(x)

φ(d(x, xi)

δ) ≤ |I(x)|‖φ‖∞.

From Lemma 5.2, we see that |I(x)| is uniformly bounded, which implies that (5.16) is bounded.

Therefore, there exists a constant C, such that(

1 +∑i∈I(x) |a∗i (x)|

)< C.

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 27, NO.1, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

156 Chunmei Ding ET AL 149-161

Page 157: Journal of Computational Analysis and Applicationseudoxuspress.com/images/JOCAAA-VOL-27-2019-ISSUE-1.pdf · Volume 27, Number 1 July 15, 2019 . ISSN:1521-1398 PRINT,1572-9206 ONLINE

C. Ding et al.: Regularized moving least squares approximation on the sphere

Next, we prove that ‖f(x)−G(x)‖∞,Z is bounded. According to [35], without loss of generality,we suppose that x = (0, 0, 1)T . Then

B(x, δ) = y ∈ S2 : d(x, y) < δ = y ∈ S2 : y3 > cos δ.

We define the bijective map T : U → B(x, δ) by y → (y,√

1− ‖y‖22)T , where U = y ∈ R2 : ‖y‖22 <1− cos2 δ. Obviously, the inverse of T is T−1(y) = y = (y1, y2)T . Then, the Taylor expansion ofg around x = 0 is

g(y) =∑|α|≤l

g(α)(0)

α!yα +

∑|α|=l+1

g(α)(ξ)

α!yα.

So

f(y) = g T−1(y) =∑|α|≤l

cαyα +

∑|α|=l+1

g(α)(ξ)

α!yα,

andG(y) =

∑|α|≤l

cαyα.

Hence

|f(y)−G(y)| ≤ cf‖y‖l+12 = cf (1− y23)(l+1)/2 ≤ cf (1− cos2 δ)(l+1)/2 = cf (sin δ)l+1

≤ cfδl+1 = cfC1h

l+1X,S2 .

Therefore,|f(x)− sX,f (x)| ≤ C‖f −G‖∞,B(x,δ) ≤ CcfCl+1

1 hl+1X,S2 .

The proof of Theorem 5.1 is complete.

6 Numerical experiments

In order to further validate our theoretical results derived in the previous sections, this sectionpresents some numerical experiments handling data set with high level noise. In our experiments,we choose two test functions, where the Franke function f(x, y, z) is chosen as the first test functionwhich has been frequently used in the other literature (for example, [28, 35]),

f1(x, y, z) =3

4exp

(− (9x− 2)2

4− (9y − 2)2

4− (9z − 2)2

4

)+

3

4exp

(− (9x+ 1)2

49− (9y + 1)2

10− (9z + 1)2

10

)+

1

2exp

(− (9x− 7)2

4− (9y − 3)2

4− (9z − 5)2

4

)−1

5exp

(−(9x− 4)2 − (9y − 7)2 − (9z − 5)2

), (x, y, z) ∈ S2.

This function is shown in the Figure 2 (a), and it is C∞(S2). The second test function is sphericalcap function which is a sum of the Franke function f1 and an other function fcap (see [38]), whichis defined by f2 := f1 + fcap,where

fcap :=

ρ cos

(π arccos(〈xc, x〉)

2r

), x ∈ C(xc, r);

0, otherwise,

and ρ is a positive number. We set xc = (− 12 ,−

12 ,√

12 ), ρ = 2, and r = 1

2 in the experiment. This

function is shown in the Figure 3 (a).

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 27, NO.1, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

157 Chunmei Ding ET AL 149-161

Page 158: Journal of Computational Analysis and Applicationseudoxuspress.com/images/JOCAAA-VOL-27-2019-ISSUE-1.pdf · Volume 27, Number 1 July 15, 2019 . ISSN:1521-1398 PRINT,1572-9206 ONLINE

C. Ding et al.: Regularized moving least squares approximation on the sphere

In the RMLS approximation, the weight function plays an important role. We choose a famousradial basis function φ(r) as weight function in our numerical experiments, that is

φ(r) = (1− r)4+(4r + 1),

which is called Wendland function (see [37]). The uniform error of the approximation is estimatedby

‖f − p‖C(S2) ≈ maxxi∈X

|f(xi)− p(xi)|.

In our numerical experiments, we choose X to be a set of 1024 points generated from the equalarea algorithm [30], which is shown in Figure 1.

−1

−0.5

0

0.5

1

−1

−0.5

0

0.5

1−1

−0.5

0

0.5

1

Figure 1: A set of 1024 points generated from the equal area algorithm

Next, we consider two groups of numerical experiments reconstructing the test function f1 andf2 in terms of RMLS and MLS, where the data set X has been contaminated by high levels of noise.In the experiment 1 and 2, X = x1, x2, . . . , xN, and N = 1024, meanwhile, 30% noise have beenused in X, where the noise is a sample of a normal random variable with mean 0 and standarddeviation σ = 0.1. In order to achieve uniform standard of comparison, we take polynomial degreeL = 2 and scale δ = 0.25.

Experiment 1. We want to reconstruct the Frank function f1 from contaminated data andcompare approximation results of RMLS (λ = 0.2) and MLS (λ = 0), meanwhile, s is set as 2.

Figure 2 illustrates that RMLS exists more obvious advantages than MLS when we reconstructtest function f1 from data set with high level noise. The Figure 2 (a) shows original function f1,the Figure 2 (b) reports f1 with high level noise, and the Figure 2 (c) reveals approximation resultof RMLS for reconstructing f1, and the uniform error of RMLS approximation is 0.0868. At last,the Figure 2 (d) shows approximation result of MLS for reconstructing f1, and the uniform errorof MLS approximation is 0.1363.

As we known, the test function f1 called Franke function is C∞(S2), however, test function f2is continuous on the unit sphere S2 but not differentiable on the boundary of spherical cap C(xc, r).In order to show the effect of RMLS approximation for reconstructing function, we reconstruct f2from data set with high level noise in the following experiments.

Experiment 2. Test function f2 is reconstructed from data set with high level noise, and itsdesigning approach is similar with Experiment 1. First of all, we fix the order of Laplace-Beltrami

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 27, NO.1, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

158 Chunmei Ding ET AL 149-161

Page 159: Journal of Computational Analysis and Applicationseudoxuspress.com/images/JOCAAA-VOL-27-2019-ISSUE-1.pdf · Volume 27, Number 1 July 15, 2019 . ISSN:1521-1398 PRINT,1572-9206 ONLINE

C. Ding et al.: Regularized moving least squares approximation on the sphere

Figure 2: A result of test function f1 in experiment 1

Figure 3: A result of test function f2 in experiment 2

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 27, NO.1, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

159 Chunmei Ding ET AL 149-161

Page 160: Journal of Computational Analysis and Applicationseudoxuspress.com/images/JOCAAA-VOL-27-2019-ISSUE-1.pdf · Volume 27, Number 1 July 15, 2019 . ISSN:1521-1398 PRINT,1572-9206 ONLINE

C. Ding et al.: Regularized moving least squares approximation on the sphere

Table 1: The uniform error of MLS and RMLS for f1 and f2 when λ and s were changed

uniform error for f1 uniform error for f2λs = 2 s = 4 s = 2 s = 4

0 0.1363 0.1363 0.1303 0.13030.2 0.0868 0.0805 0.0991 0.09580.4 0.0909 0.0881 0.0990 0.08180.6 0.0936 0.0839 0.0851 0.07550.8 0.0936 0.0832 0.0836 0.08011.0 0.0900 0.0933 0.0905 0.08291.2 0.0983 0.0929 0.0932 0.09321.4 0.0847 0.0902 0.0934 0.07581.6 0.0834 0.0845 0.0899 0.07911.8 0.1033 0.0854 0.0982 0.08632.0 0.0900 0.0844 0.0833 0.0830

operator s = 4. Secondly, in order to compare RMLS with MLS, we let λ = 0 (MLS) and λ = 1.4(RMLS). At last, we show the superiority in terms of uniform error.

Figure 3 illustrates that RMLS exists more obvious advantages than MLS when we reconstructtest function f2 from data set with high level noise. The Figure 3 (a) shows original function f2,the Figure 3 (b) reports f2 with high level noise, and the Figure 3 (c) reveals approximation resultof RMLS for reconstructing f2, and the uniform error of RMLS approximation 0.0758. Finally,the Figure 3 (d) shows approximation result of MLS for reconstructing f2, and the uniform errorof MLS approximation 0.1330.

Table 1 gives the values of uniform error for Experiment 1 and 2, when we choose differentregularized parameter λ and order of Lplace-Beltrami operator s for (4.10). The results indicatethat the choosing method of λ and s are uncertain, and the optimal combination of λ and s is λ =0.2, s = 4 for approximation f1. However, the optimal combination of λ and s is λ = 1.4, s = 4 forapproximation f2 . The different choices for the order of Lplace-Beltrami operator and regularlizedparameter can provide different pointwise approximation results.

From what has been discussed above, the RMLS is better than the MLS for recoving a functionfrom data set with high level noise. However, the choice of λ and s is critical. How to automaticallychoose the proper λ and s is a challenging problem.

References[1] An C, Chen X, Sloan I H, Womersley R S. Regularized least squares approximations on the sphere using

spherical designs. SIAM J. Num. Anal., 2012, 50(3): 1513-1534.

[2] Armentano M G. Error estimates in Sobolev spaces for moving least square approximations. SIAM J. Num.Anal., 2001, 39(1): 38-51.

[3] Armentano M G, Duran R G. Error estimates for moving least square approximations. Appl. Num. Math.,2001, 37(3): 397-416.

[4] Backus G, Gilbert F. Uniqueness in the inversion of inaccurate gross earth data. Phil. Trans. Roy. Soc. London,Ser. A, Math. & Phys. Sci., 1970: 123-192.

[5] Backus G, Gilbert F. Numerical applications of a formalism for geophysical inverse problems. Geophy. J. Int.,1967, 13(1-3): 247-276.

[6] Backus G, Gilbert F. The resolving power of gross earth data. Geophy. J. Roy. Astr. Soc., 2007, 16(2): 169-205.

[7] Belytschko T, Krongauz Y, Organ D, Fleming M, Krysl P. Meshless methods: an overview and recent devel-opments. Comp. Meth. Appl. Mech. Eng., 1996, 139(1): 3-47.

[8] Bos L P, Salkauskas K. Moving least-squares are Backus-Gilbert optimal. J. Approx. Theory, 1989, 59(3):267-275.

[9] Fasshauer G E, Schumaker L L. Scattered data fitting on the sphere. Math. Meth. Curv. Surf. II, 1998: 117-166.

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 27, NO.1, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

160 Chunmei Ding ET AL 149-161

Page 161: Journal of Computational Analysis and Applicationseudoxuspress.com/images/JOCAAA-VOL-27-2019-ISSUE-1.pdf · Volume 27, Number 1 July 15, 2019 . ISSN:1521-1398 PRINT,1572-9206 ONLINE

C. Ding et al.: Regularized moving least squares approximation on the sphere

[10] Franke R, Nielson G. Smooth interpolation of large sets of scattered data. Int. J. Num. Meth. Eng., 1980,15(11): 1691-1704.

[11] Freeden W, Gervens T, Schreiner M. Constructive approximation on the sphere: with applications to geomath-ematics. Oxford: Clarendon Press, 1998.

[12] Golitschek M, Light W A. Interpolation by polynomials and radial basis functions on spheres. Constr. Approx.,2001, 17(1): 1-18.

[13] Hubbert S, Morton T M. Lp-error estimates for radial basis function interpolation on the sphere. J. Approx.Theory, 2004, 129(1): 58-77.

[14] Jetter K, Stockler J, Ward J. Error estimates for scattered data interpolation on spheres. Math. Comp., 1999,68(226): 733-747.

[15] Lancaster P, Salkauskas K. Surfaces generated by moving least squares methods. Math. Comp., 1981, 37(155):141-158.

[16] Le Gia Q T, Narcowich F J, Ward J D, Wendland, H. Continuous and discrete least-squares approximation byradial basis functions on spheres. J. Approx. Theory, 2006, 143(1): 124-133.

[17] Levesley J, Sun X. Approximation in rough native spaces by shifts of smooth kernels on spheres. J. Approx.Theory, 2005, 133(2): 269-283.

[18] Levin D. The approximation power of moving least-squares. Math. Comp., 1998, 67(224): 1517-1531.

[19] Li L Q. Regularized least square regression with spherical polynomial kernels. Int. J. Wav. Multires. Inf. Proc.,2009, 7(06): 781-801.

[20] Maisuradze G G, Thompson D L, Wagner A F, Minkoff, M. Interpolating moving least-squares methods forfitting potential energy surfaces: Detailed analysis of one-dimensional applications. The J. Chem. Phys., 2003,119(19): 10002-10014.

[21] McLain D H. Drawing contours from arbitrary data points. The Comp. J., 1974, 17(4): 318-324.

[22] McLain D H. Two dimensional interpolation from random data. The Comp. J., 1976, 19(2): 178-181.

[23] Muller C. Spherical harmonics. Springer, 1966.

[24] Narcowich F J, Ward J D. Scattered data interpolation on spheres: error estimates and locally supported basisfunctions. SIAM J. Math. Anal., 2002, 33(6): 1393-1410.

[25] Narcowich F J, Sun X, Ward J D, Wendland H. Direct and inverse Sobolev error estimates for scattered datainterpolation via spherical basis functions. Found. Comp. Math., 2007, 7(3): 369-390.

[26] Narcowich F J, Sun X, Ward J D. Approximation power of RBFs and their associated SBFs: a connection.Adv. Comp. Math., 2007, 27(1): 107-124.

[27] Narcowich F J, Sivakumar N, Ward J D. Stability results for scattered-data interpolation on Euclidean spheres.Adv. Comp. Math., 1998, 8(3): 137-163.

[28] Renka R J. Multivariate interpolation of large sets of scattered data. ACM Trans. Math. Softw., 1988, 14(2):139-148.

[29] Shepard D. A two-dimensional interpolation function for irregularly-spaced data. In: Proc. the 1968 23rd ACMNat. Conf. ACM, 1968: 517-524.

[30] Sloan I H. Polynomial interpolation and hyperinterpolation over general regions. J. Approx. Theory, 1995,83(2): 238-254.

[31] Sloan I H, Womersley R S. Constructive polynomial approximation on the sphere. J. Approx. Theory, 2000,103(1): 91-118.

[32] Sloan I H, Sommariva A. Approximation on the sphere using radial basis functions plus polynomials. Adv.Comp. Math., 2008, 29(2): 147-177.

[33] Wang K Y, Li L Q. Harmonic Analysis and Approximation on the Unit Sphere. Sci. Press, Beijing, 2000.

[34] Wendland H. Local polynomial reproduction and moving least squares approximation. IMA J. Num. Anal.,2001, 21(1): 285-300.

[35] Wendland H. Moving least squares approximation on the sphere. Mathematical Methods for Curves and Sur-faces, Vanderbilt Univ. Press, Nashville, TN, 2001: 517-526.

[36] Wendland H. Scattered data approximation. Cambridge: Cambr. Univ. Press, 2005.

[37] Wendland H. Piecewise polynomial, positive definite and compactly supported radial functions of minimaldegree. Adv. Comp. Math., 1995, 4(1): 389-396.

[38] Williamson D L, Drake J B, Hack J J, Jakob R, Swarztrauber P N. A standard test set for numerical approx-imations to the shallow water equations in spherical geometry. J. Comp. Phys., 1992, 102(1): 211-224.

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 27, NO.1, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

161 Chunmei Ding ET AL 149-161

Page 162: Journal of Computational Analysis and Applicationseudoxuspress.com/images/JOCAAA-VOL-27-2019-ISSUE-1.pdf · Volume 27, Number 1 July 15, 2019 . ISSN:1521-1398 PRINT,1572-9206 ONLINE

Chaos Control and Function Projective Synchronization ofNoval Chaotic Dynamical System

M. M. El-Dessoky1,2, E. O. Alzahrani1 and N.A. Almohammadi3

1Mathematics Department, Faculty of Science, King Abdulaziz University,P. O. Box 80203, Jeddah 21589, Saudi Arabia.

2Department of Mathematics, Faculty of Science, Mansoura University,Mansoura 35516, Egypt.

3Mathematics Department, Faculty of science - AL Salmania Campus,King Abdulaziz University, Jeddah, Saudi Arabia.

E-mail: [email protected]; [email protected];[email protected]

ABSTRACT

In this paper, a Noval chaotic dynamical system is proposed and the basic properties of the system are investi-gated. Linear feedback control technique is used to suppress chaos. The controlled system is stable under someconditions on the parameters of the system determined by Lyapunov direct method. In addition, a functionprojective synchronization of two identical Noval system is presented. Lyapunov method of stability is used toprove the asymptotic stability of solutions for the error dynamical system. Numerical simulations results areincluded to show the e¤ectiveness of the proposed schemes.

1. INTRODUCTION

Chaos has been developed and thoroughly studied over the past two decades. A chaotic system is a nonlineardeterministic system that displays complex and unpredictable behavior. The sensitive dependence on the initialconditions and on the system’s parameter variation is a prominent characteristic of chaotic behavior. Researche¤orts have investigated chaos control and chaos synchronization problems in many physical chaotic systems.

Controlling chaos has become a challenging topic in nonlinear dynamics. Feedback control methods are usedto control chaos by stabilizing a desired unstable periodic solution which is embedded in a chaotic attractor[1-12].

Generalized synchronization is another interesting chaos synchronization technique. Li considered a new typeof projective synchronization method, called a modi…ed projective synchronization (MPS). Chen et al. introducedanother new projective synchronization which is called a function projective synchronization (FPS), where theresponse of the synchronized dynamical states synchronizes up to scaling function factor [11-29].

The object of this paper is to study the function project synchronization (FPS) of two identical Noval chaoticsystem with known parameters.

The paper is organized as follows. In Section 2, presented the model of Noval chaotic system. In Section 3, thedissipation, symmetry, equilibrium points and lyapunov exponents. In Section 4, the feedback control methodis applied to Noval system and numerical simulations are presented to show the e¤ectiveness of the proposedmethod. In Section 5, the proposed scheme is applied to function projective synchronize two identical Novalchaotic systems. Also numerical simulations are presented in order to validate the proposed synchronizationapproach. Finally, in Section 6 the conclusion of the paper is given.

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 27, NO.1, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

162 El-Dessoky ET AL 162-172

Page 163: Journal of Computational Analysis and Applicationseudoxuspress.com/images/JOCAAA-VOL-27-2019-ISSUE-1.pdf · Volume 27, Number 1 July 15, 2019 . ISSN:1521-1398 PRINT,1572-9206 ONLINE

2. THE MODEL OF NOVAL CHAOTIC SYSTEMThe Noval chaotic system [30] is described by the following system of di¤erential equations:

.x = ( ¡ a +

1

b)x + xy + z

.y = ¡by ¡ x2 (1).z = ¡x ¡ cz

Where the parameters a, b, c are positive real constants.A new chaotic attractor for the parameters a = 2, b = 0.1, c = 1 is shown in Fig. 1.

Figure 1: Noval Chaotic System at a = 2, b = 0.1, c = 1.

3. DYNAMICAL BEHAVIOR OF THE NOVAL CHAOTIC SYSTEM3.1. The dissipationThe divergence of Noval system is given by;

rV =∂ _x

∂x+

∂ _y

∂y+

∂ _z

∂z= ¡a +

1

b+ y ¡ b ¡ c.

When y < a + b + c ¡ 1b , then Noval system is dissipative.

3.2. SymmetryThe relation of (x, y, z) ! (¡ x, y,¡z) is transformed, the system remains unchanged. The system trajectory inthe x,z plane symmetry of y axis.

3.3. Equilibrium points and stabilityBy putting the right side of equation of system (1) equal to zero, that is;

( ¡ a +1

b)x + xy + z = 0

¡by ¡ x2 = 0

¡x ¡ cz = 0

This system has three equilibrium points:P1 = (0, 0, 0), P2,3 = ( § p

1 ¡ ab ¡ b/c, a ¡ 1/b + 1/c, ¨ 1c

p1 ¡ ab ¡ b/c)

The eigenvalues at each equilibrium point can be obtained as shown in Table 1. And all the equilibriumpoints are unstable, since at least one eigenvalue has positive real part for each equilibrium point.

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 27, NO.1, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

163 El-Dessoky ET AL 162-172

Page 164: Journal of Computational Analysis and Applicationseudoxuspress.com/images/JOCAAA-VOL-27-2019-ISSUE-1.pdf · Volume 27, Number 1 July 15, 2019 . ISSN:1521-1398 PRINT,1572-9206 ONLINE

Table 1. Eigenvalues and stability of equilibrium points

Equilibrium points Eigenvalues Stable/UnstableP1 λ1 = ¡0.1 , λ2 = ¡0.887 , λ3 = 7.887 UnstableP2 λ1 = ¡0.7446 , λ2 = 0.32 + 1.33i , λ3 = 0.32 ¡ 1.33i UnstableP3 λ1 = ¡0.7446 , λ2 = 0.32 + 1.33i , λ3 = 0.32 ¡ 1.33i Unstable

3.4. Lyapunov exponents and its dimensionBy using singular value decomposition method and we may get three Lyapunov exponents of system,λ1 =0.13, λ2 = 0, λ3 = ¡0.52. and the Lyapunov dimension of the new chaotic system is as follows:

DL = j +1

jλj+1jjX

i=1

λi = 2 +λ1 + λ2

jλ3j = 2 +0.13 + 0

j ¡ 0.52j = 2.254

Thus, the Lyapunov dimension is the fractal dimension, shows that the system is a chaotic system

4. CONTROLLING NOVAL SYSTEM

In order to control the Noval system to the unstable …xed point (xi, yi, zi), we introduce the feedback controlto guide the chaotic trajectory (x(t), y(t), z(t)) to the unstable …xed point (xi, yi, zi).let system (1) be controlled by the following form:

.x = ( ¡ a +

1

b)x + xy + z ¡ ki1(x ¡ xi)

.y = ¡by ¡ x2 ¡ ki2(y ¡ yi) (2).z = ¡x ¡ cz ¡ ki3(z ¡ zi)

where i = 1, 2, 3.

4.1. FirstFor i = 1, the controlled system (2) has one equilibrium point (x1, y1, z1) = (0, 0, 0). Let system (2) becontrolled by a linear feedback control of the form:

.x = ( ¡ a +

1

b)x + xy + z ¡ k11(x ¡ x1)

.y = ¡by ¡ x2 ¡ k12(y ¡ y1) (3).z = ¡x ¡ cz ¡ k13(z ¡ z1)

The controlled system (3) has one equilibrium point (x1, y1, z1). We linearize (3) about this equilibrium point.Then the linearized system is given by:8>><

>>:_X = ( ¡ a +

1

b¡ k11 + y1)X + x1Y + Z

_Y = ¡(b + k12)Y ¡ 2x1X

_Z = ¡X ¡ (c + k13)Z

(4)

where (x1, y1, z1) = (0, 0, 0), that is;8>><>>:

_X = ( ¡ a +1

b¡ k11)X + Z

_Y = ¡(b + k12)Y

_Z = ¡X ¡ (c + k13)Z

(5)

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 27, NO.1, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

164 El-Dessoky ET AL 162-172

Page 165: Journal of Computational Analysis and Applicationseudoxuspress.com/images/JOCAAA-VOL-27-2019-ISSUE-1.pdf · Volume 27, Number 1 July 15, 2019 . ISSN:1521-1398 PRINT,1572-9206 ONLINE

To prove the asymptotic stability we use the direct method of Lyapunov. De…ne the Lyapunov function forsystem (5) by:

V (X, Y, Z) =1

2(X2 + Y 2 + Z2) (6)

The function V satis…ed:

i V (0, 0, 0) = 0

ii V (X, Y, Z) > 0 for X, Y and Z in the neighbourhood of the origin.

So, V (X, Y, Z) is positive de…nite. Also, we have:

dV

dt= ¡f(a ¡ 1

b+ k11)X

2 + (b + k12)Y2 + (c + k13)Z

2g (7)

therefore, the derivative dVdt · 0 if,

k11 ¸ 1

b¡ a, k12 ¸ ¡b, k13 ¸ ¡c (8)

i.e. dV /dt is negative de…nite under condition (8). We deduce the following lemma,

Lemma 4.1. The equilibrium solution (x1, y1, z1) of the controlled system (3) is asymptotically stable such thatthe feedback control gain K satisfy: k11 ¸ 1

b ¡ a and k12 = k13 = 0.

4.2. Secondwe introduce the conventional feedback control to guide the chaotic trajectory (x(t), y(t), z(t)) to the secondunstable equilibrium point (x2, y2, z2) = (

p1 ¡ ab ¡ b/c, a ¡ 1

b + 1c , ¡ 1

c

p1 ¡ ab ¡ b/c)

8>><>>:

_x = ( ¡ a +1

b)x + xy + z ¡ k21(x ¡ x2)

_y = ¡by ¡ x2 ¡ k22(y ¡ y2)

_z = ¡x ¡ cz ¡ k23(z ¡ z2)

(9)

The controlled system (9) has one equilibrium point (x2, y2, z2). We linearize (9) about this equilibrium point.Then the linearized system is given by:

8>><>>:

_X = ( ¡ a +1

b¡ k21 + y2)X + x2Y + Z

_Y = ¡(b + k22)Y ¡ 2x2X

_Z = ¡X ¡ (c + k23)Z

(10)

where (x2, y2, z2) = (p

1 ¡ ab ¡ b/c, a ¡ 1b

+ 1c, ¡1

c

p1 ¡ ab ¡ b/c), that is;

8>><>>:

_X = (1

c¡ k21)X + (

p1 ¡ ab ¡ b/c)Y + Z

_Y = ¡(b + k22)Y ¡ 2(p

1 ¡ ab ¡ b/c)X

_Z = ¡X ¡ (c + k23)Z

(11)

To prove the asymptotic stability we use the direct method of Lyapunov. De…ne the Lyapunov function forsystem(10) by:

V (X, Y, Z) =1

2(X2 + Y 2 + Z2) (12)

The function V satis…ed:

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 27, NO.1, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

165 El-Dessoky ET AL 162-172

Page 166: Journal of Computational Analysis and Applicationseudoxuspress.com/images/JOCAAA-VOL-27-2019-ISSUE-1.pdf · Volume 27, Number 1 July 15, 2019 . ISSN:1521-1398 PRINT,1572-9206 ONLINE

i V (0, 0, 0) = 0

ii V (X,Y,Z) > 0 for X, Y and Z in the neighbourhood of the origin.

So, V (X,Y,Z) is positive de…nite. Also, we have:

dV

dt= ¡f2(k21 ¡ 1

c)X2 + (b + k22)Y

2 + 2(c + k23)Z2g (13)

therefore, the derivative dVdt

· 0 if,

k21 ¸ 1

c, k22 ¸ ¡b, k23 ¸ ¡c (14)

i.e. dVdt is negative de…nite under condition (14). We deduce the following lemma,

Lemma 4.2. The equilibrium solution (x2, y2, z2) of the controlled system (9) is asymptotically stable such thatthe feedback control gain K has the simple choice k21 ¸ 1

c and k22 = k23 = 0.

4.3. Thirdwe introduce the conventional feedback control to guide the chaotic trajectory (x(t),y(t),z(t)) to the third unstableequilibrium point(x3, y3, z3) = ( ¡ p

1 ¡ ab ¡ b/c, a ¡ 1b + 1

c , 1c

p1 ¡ ab ¡ b/c)

8>><>>:

_x = ( ¡ a +1

b)x + xy + z ¡ k31(x ¡ x3)

_y = ¡by ¡ x2 ¡ k32(y ¡ y3)

_z = ¡x ¡ cz ¡ k33(z ¡ z3)

(15)

The controlled system (14) has one equilibrium point (x3, y3, z3). We linearize (14) about this equilibrium point.Then the linearized system is given by:

8>><>>:

_X = ( ¡ a +1

b¡ k31 + y3)X + x3Y + Z

_Y = ¡(b + k32)Y ¡ 2x3X

_Z = ¡X ¡ (c + k33)Z

(16)

where (x3, y3, z3) = ( ¡ p1 ¡ ab ¡ b/c, a ¡ 1

b+ 1

c, 1

c

p1 ¡ ab ¡ b/c), that is;

8>><>>:

_X = (1

c¡ k31)X ¡ (

p1 ¡ ab ¡ b/c)Y + Z

_Y = ¡(b + k32)Y + 2(p

1 ¡ ab ¡ b/c)X

_Z = ¡X ¡ (c + k33)Z

(17)

To prove the asymptotic stability we use the direct method of Lyapunov. De…ne the Lyapunov function forsystem(16) by:

V (X, Y, Z) =1

2(X2 + Y 2 + Z2) (18)

The function V satis…ed:

i V (0, 0, 0) = 0

ii V (X,Y,Z) > 0 for X, Y and Z in the neighbourhood of the origin.

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 27, NO.1, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

166 El-Dessoky ET AL 162-172

Page 167: Journal of Computational Analysis and Applicationseudoxuspress.com/images/JOCAAA-VOL-27-2019-ISSUE-1.pdf · Volume 27, Number 1 July 15, 2019 . ISSN:1521-1398 PRINT,1572-9206 ONLINE

So, V (X,Y,Z) is positive de…nite. Also, we have:

dV

dt= ¡f2(k31 ¡ 1

c)X2 + (b + k32)Y

2 + 2(c + k33)Z2g (19)

therefore, the derivative dVdt · 0 if,

k31 ¸ 1

c, k32 ¸ ¡b, k33 ¸ ¡c (20)

i.e. dVdt is negative de…nite under condition (20). We deduce the following lemma,

Lemma 4.3. The equilibrium solution (x3, y3, z3) of the controlled system (15) is asymptotically stable suchthat the feedback control gain K has the simple choice k31 ¸ 1

c and k32 = k33 = 0.

5. THE SCHEME OF GENERALIZED FUNCTION PROJECTIVESYNCHRONIZATION OF CHAOTIC SYSTEMS

The chaotic (master and slave) systems can be given in the following form:

_X = F (X) (21)_Y = G(Y ) + U(X,Y, t) (22)

Where X = (x1, x2, . . . , xn)T , Y = (y1, y2, . . . , yn)T 2 Rn are state vectors of the system (20) and (21),respectively; F,G : Rn ! Rn are two continuous vector functions and U : (Rn,Rn,Rn) ! Rn is a controllerwhich will be designed later.

Definition 5.1. For the master system (20) and the slave system (21), there is said to be generalized functionprojective synchronization (GFPS) if there exists a vector function U(X, Y, t)such that; limt!+1 kY ¡ ¤(X)Xk =0 where ¤(X) = diagfh1(X), h2(X), . . . , hn(X)g where hi(X) are continuous functions, k.k represents a vectornorm induced by the matrix norm.

Remark 1. We de…ne e = Y ¡¤(X)X which is called the error vector between systems (20) and (21) for GFPS,where e = (e1, e2, . . . , en)T ,andei = Yi ¡ hi(X)Xi, (i = 1, 2, . . . , n)

Remark 2.

If ¤ = σI, σ 2 R, the GFPS problem will be reduced to projective synchronization, where I is an n £ nidentity matrix. In particular if σ= 1and ¡ 1 the problem is further simpli…ed to complete synchronization andantiphase synchronization, respectively. And if ¤ = diagfa1, a2, . . . , ang,the modi…ed projective synchronizationwill appear.

We will study the FPS of novel system with known parameters and determine controller function for the FPSof the derive and response systems. Our aim is to design a controller and make the response system trace thedrive system and become ultimately. The Noval system as a drive system is given as below;8><

>:_x1 = ( ¡ a + 1

b )x1 + x1y1 + z1

_y1 = ¡by1 ¡ x21

_z1 = ¡x1 ¡ cz1

(23)

the Noval system as the response system is also given by;8><>:

_x2 = ( ¡ a + 1b)x2 + x2y2 + z2 + u1

_y2 = ¡by2 ¡ x22 + u2

_z2 = ¡x2 ¡ cz2 + u3

(24)

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 27, NO.1, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

167 El-Dessoky ET AL 162-172

Page 168: Journal of Computational Analysis and Applicationseudoxuspress.com/images/JOCAAA-VOL-27-2019-ISSUE-1.pdf · Volume 27, Number 1 July 15, 2019 . ISSN:1521-1398 PRINT,1572-9206 ONLINE

According to the FPS scheme presented in the previous section, without loss of generality,we choose thescaling function matrix¤(X) = diagfd11x1 + d12, d21y1 + d22, d31z1 + d32g where dij(i = 1, 2, 3; j = 1, 2) are constant numbers. Theerror vector can be de…ned as 8><

>:ex = x2 ¡ (d11x1 + d12)x1

ey = y2 ¡ (d21y1 + d22)y1

ez = z2 ¡ (d31z1 + d32)z1

(25)

The error dynamical system between (23) and (24) is;8>>><>>>:

_ex = ( ¡ a + 1b)ex + x2y2 + z2 ¡ d11( ¡ a + 1

b)x2

1 ¡ 2d11x1z1

¡2d11x21y1 ¡ d12x1y1 ¡ d12z1 + u1

_ey = ¡bey ¡ x22 + d21by

21 + 2d21y1x

21 + d22x

21 + u2

_ez = ¡cez ¡ x2 + d31cz21 + 2d31z1x1 + d32x1 + u3

(26)

we can get the controller8><>:

u1 = ¡2b ex ¡ x2y2 ¡ z2 + d11( ¡ a + 1

b )x21 + 2d11x1z1 + 2d11x2

1y1 + d12x1y1 + d12z1

u2 = x22 ¡ d21by2

1 ¡ 2d21y1x21 ¡ d22x2

1

u3 = x2 ¡ d31cz21 ¡ 2d31z1x1 ¡ d32x1

(27)

then the error dynamical system is described by8><>:

_ex = ¡(a + 1b )ex

_ey = ¡bey

_ez = ¡cez

(28)

for this choice, the closed loop system (28) has three negative eigenvalues ¡(a + 1b ),¡b, ¡c which implies that

the error state ex, ey and ez converge to zero as time t tends to in…nity.Hence the FPS between the identical Noval chaotic system is achieved.

5.1. Numerical ResultsIn this section, some numerical simulation results are presented to verify the previous analytical results wherea = 2, b = 0.1, c = 1. Figure 2: shows the convergence of the trajectory of the controlled system to the unstableequilibrium point (x1, y1, z1) = (0, 0, 0) of the uncontrolled system (1). Figure 3: shows the convergence ofthe trajectory of the controlled system to the unstable equilibrium point (x2, y2, z2) = (

p1 ¡ ab ¡ b/c, a¡ 1

b +1c , ¡ 1

c

p1 ¡ ab ¡ b/c) of the uncontrolled system (1). Figure 4: shows the convergence of the trajectory of thec

ontrolled system to the unstable equilibrium point (x3, y3, z3) = (¡p1 ¡ ab ¡ b/c, a¡ 1

b+ 1

c, 1

c

p1 ¡ ab ¡ b/c)

of the uncontrolled system (1).

Figure 2: The time responses for the states of the controlled Noval system to a …xed point (x1, y1, z1).

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 27, NO.1, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

168 El-Dessoky ET AL 162-172

Page 169: Journal of Computational Analysis and Applicationseudoxuspress.com/images/JOCAAA-VOL-27-2019-ISSUE-1.pdf · Volume 27, Number 1 July 15, 2019 . ISSN:1521-1398 PRINT,1572-9206 ONLINE

Figure 3: The time responses for the states of the controlled Noval system to a …xed point (x2, y2, z2).

Figure 4: The time responses for the states of the controlled Noval system to a …xed point (x3, y3, z3).

The initial values of the drive system and response system are taken as:

(x1(0), y1(0), z1(0))T

= (1, ¡6, 0.1)T, (x2(0), y2(0), z2(0))

T= (10, 12,¡3)

T.

We choose the scaling function factors as:

h1 = x1 + 2, h2 = ¡2y1 ¡ 2 and h3 = z1 ¡ 2.

Figure 5: show the FPS between two identical Noval systems. When the scaling factors are simpli…ed ashi = 1 (i = 1, 2, 3), the complete synchronization between two identical Noval systems are shown in Figure6. Furthermore, when the scaling factors are simpli…ed as hi = ¡1 (i = 1, 2, 3), the anti synchronizationbetween two identical Noval systems are shown in Figure 7. Finally, when the scaling factors are simpli…edas h1 = 1.5, h2 = 2 and h3 = 2.5, the modi…ed projective synchronization (MPS) between two identical Noval

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 27, NO.1, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

169 El-Dessoky ET AL 162-172

Page 170: Journal of Computational Analysis and Applicationseudoxuspress.com/images/JOCAAA-VOL-27-2019-ISSUE-1.pdf · Volume 27, Number 1 July 15, 2019 . ISSN:1521-1398 PRINT,1572-9206 ONLINE

systems are shown in Figure 8.

Figure 5: The behaviour of the trajectories ex, ey and ez of the error system tends to zero for FPS.

Figure 6: The behaviour of the trajectories ex, ey and ez of the error system tends to zero for complete synchronization

Figure 7: The behaviour of the trajectories ex, ey and ez of the error system tends to zero for anti synchronization

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 27, NO.1, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

170 El-Dessoky ET AL 162-172

Page 171: Journal of Computational Analysis and Applicationseudoxuspress.com/images/JOCAAA-VOL-27-2019-ISSUE-1.pdf · Volume 27, Number 1 July 15, 2019 . ISSN:1521-1398 PRINT,1572-9206 ONLINE

Figure 8: The behaviour of the trajectories ex, ey and ez of the error system tends to zero for MPS.

6. CONCLUSION

The paper has studied the noval chaotic dynamical system, including some basic dynamical properties, Lyapunovexponents, Lyapunov dimension. A feedback control has been proposed to the noval chaotic dynamical system.The controlling conditions are derived from the Lyapunov direct method. The function projective synchronizationhas been used to synchronize two identical chaotic systems with known parameters. By the Lyapunov stabilitytheory, the su¢cient condition of the function projective synchronization has been obtained. Finally, numericalsimulations are provided to verify the e¤ectiveness of the results obtained.

Acknowledgments

This article was funded by the Deanship of Scienti…c Research (DSR), King Abdulaziz University, Jeddah. Theauthors, therefore, acknowledge with thanks DSR technical and …nancial support.

References[1] E.Ott, C. Grebogi, J A. Yorke, Controlling Chaos, Phys Rev Lett (64), (1999), 1179-1184.

[2] G. Chen, Chaos on Some Controllability Conditions for Chaotic Dynamics Control, Chaos Solitons Fractals,8(9), (1997), 1461-1470.

[3] C. Hwang , J. Hsheh , and R. Lin, A Linear Continuous Feedback Control of Chua’s Circuit, Chaos SolitonsFractals 8(9), 1997, 1507-1515.

[4] G. Chen and X. Dong, On feedback control of chaotic dynamic systems, Int. J. Bifurcation and Chaos 2,(1995), 407-411.

[5] K. Pyragas, Continuous control of chaos by self-controlling feedback, Physics letters A 170, pp. 421-428,(1992).

[6] A. Hegazi, H. N. Agiza, and M. M. El-Dessoky. Controlling chaotic behaviour for spin generator and Rosslerdynamical systems with feedback control, Chaos Solitons Fractals, 12, (2001), 631-658.

[7] Sara Dadras, and Hamid Momeni, Control of a fractional-order economical system via sliding mode, PhysicaA (389), (2010), 2434-2442.

[8] H. N. Agiza, On The Analysis of Stability, Bifurcation, Chaos and Chaos Control of Kopel map, ChaosSolitons Fractals 10(11), (1999), 1909-1916.

[9] C. Hwang, J. Hsheh and R. Lin, A linear continuous feedback control of Chua’s circuit, Chaos SolitonsFractals, 8(9), (1997), 1507-1515.

[10] Seyed Mehdi Abedi Pahnehkolaei, Alireza Al…, J. A. Tenreiro Machado, Chaos suppression in fractionalsystems using adaptive fractional state feedback control, Chaos Solitons Fractals, 103, (2017), 488-503.

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 27, NO.1, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

171 El-Dessoky ET AL 162-172

Page 172: Journal of Computational Analysis and Applicationseudoxuspress.com/images/JOCAAA-VOL-27-2019-ISSUE-1.pdf · Volume 27, Number 1 July 15, 2019 . ISSN:1521-1398 PRINT,1572-9206 ONLINE

[11] V. Bala Shunmuga Jothi, S. Selvaraj, V. Chinnathambi, S. Rajasekar, Bifurcations and chaos in two-coupledperiodically driven four-well Du¢ng-van der Pol oscillators, Chinese J. Phys., 55(5), (2017), 1849-1856.

[12] Anuraj Singh, Sunita Gakkhar, Controlling chaos in a food chain model, Math. Comput. Simulation, 115,(2015), 24-36.

[13] L. M. Pecora, T. L. Carroll, Synchronization in chaotic systems, Phys. Rev. Lett.64 (8), (1990), 821-824.

[14] T. L. Carroll, L. M. Perora, Synchronizing a chaotic systems, IEEE Trans, Circuits Systems 38, (1991),

453-456.

[15] G. Chen, Control and Synchronization of Chaos, a Bibliography, Dept. of Elect. Eng., Univ. Houston, TX,(1997).

[16] Yongguang Yua, and Han-Xiong Li. Adaptive generalized function projective synchronization of uncertainchaotic systems, Nonlinear Analysis: Real World Applications, Vol.11, (2010), 2456-2464.

[17] E. M. Elabbasy,and M. M. El-Dessoky, Adaptive Coupled Synchronization of Coupled Chaotic DynamicalSystems, Applied Sciences Research , (2), (2007), 88-102.

[18] Na Cai, Yuanwei Jing, and Siying Zhang, Modi. . . ed projective synchronization of chaotic systems withdisturbances via active sliding mode control, Commun Nonlinear Sci Numer Simulat., (15), (2010), 1613-1620.

[19] Guo-Hui Li, Generalized Projective Synchronization between Lorenz System and Chen’s System, Chaos,Solitonsand Fractals (32), 2007, 1454-1458.

[20] Guo-Hui Li. Modi. . . ed Projective Synchronization of Chaotic System, Chaos Solitons Fractals (32), (2007),1786-1790.

[21] Johannes Petereit, Arkady Pikovsky, Chaos synchronization by nonlinear coupling, Commun. Nonlinear Sci.Numer. Simul., 44, (2017), 344-351.

[22] K. Vishal, Saurabh K. Agrawal, On the dynamics, existence of chaos, control and synchronization of a novelcomplex chaotic system, Chinese J. Phys., 55(2), (2017), 519-532.

[23] M. M. El-Dessoky, M. T. Yassen and E. Salah, Adaptive Modi. . . ed Function Projective Synchronizationbetween two dixoerent Hyperchaotic Dynamical Systems, Math. Probl. Eng. , Vol., 2012, (2012), Article ID810626, 16 pages, doi:10.1155/2012/810626.

[24] N. F. Rulkov, M. M. Sushchik, L. S. Tsimring, and Henry D. I. Abarbanel, Generalized Synchronization ofChaos in Directionally Coupled Chaotic Systems, Phys. Rev. E, (51),1995, 980- 994.

[25] Yong Chen, X. Li. Function Projective Synchronization between Two Identical Chaotic Systems, Int. J.Mod. Phys. C(18), 2007, 883-888.

[26] M. M. El-Dessoky, and M. T. Yassen, Adaptive feedback control for chaos control and synchronizationfor new chaotic dynamical system, Math. Probl. Eng. , Vol. 2012, (2012), Article ID 347210, 12 pages,doi:10.1155/2012/347210.

[27] Guo-Hui Li, Generalized Synchronization of Chaos Based on Suitable Separation, Chaos Solitons Fractals,(39), (2009), 2056-2062.

[28] M. M. El-Dessoky, E. O. Alzahrany, and N. A. Almohammadi. Function Projective Synchronization for FourScroll Attractor by Nonlinear Control, Appl. Math. Sci., Vol.11(26), (2017), 1247-1259.

[29] Er-Wei Bai and Karl E. Lonngren, Sequential synchronization of two Lorenz system using active control,Chaos Solitons Fractals, 11(1), (2000), 1041-1044.

[30] Shao FuWang, and Da-zhuan Xu, The dynamic analysis of a chaotic system, Adv. Mech. Eng. , Vol. 9(3),2017, 1-6.

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 27, NO.1, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

172 El-Dessoky ET AL 162-172

Page 173: Journal of Computational Analysis and Applicationseudoxuspress.com/images/JOCAAA-VOL-27-2019-ISSUE-1.pdf · Volume 27, Number 1 July 15, 2019 . ISSN:1521-1398 PRINT,1572-9206 ONLINE

UMBRAL CALCULUS APPROACH TO r-STIRLING NUMBERS

OF THE SECOND KIND AND r-BELL POLYNOMIALS

TAEKYUN KIM1, DAE SAN KIM2, HYUCK-IN KWON3, AND JONGKYUM KWON4,∗

Abstract. In this paper, we would like to use umbral calculus in order to

derive some properties, recurrence relations and identities related to r-Stirling

numbers of second kind and r-Bell polynomials. In particular, we will expressthe r-Bell polynomials as linear combinations of many well-known families of

special polynomials.

1. Introduction

The Stirling numbers S2(n, k) of the second kind counts the number of partitionsof the set [n] = 1, 2, · · · , n into k nonempty disjoint subsets.

The S2(n, k), (n, k ≥ 0) are given by the recurrence relation

S2(n, k) = kS2(n− 1, k) + S2(n− 1, k − 1), (n, k ≥ 1), (1.1)

with the initial conditions

S2(n, 0) = δ0n, S2(0, k) = δ0k. (1.2)

They are also given by

xn =n∑k=0

S2(n, k)(x)k, (1.3)

with (x)0 = 1, (x)k = x(x− 1) · · · (x− k + 1), for k ≥ 1, and by

1

k!(et − 1)k =

∞∑n=k

S2(n, k)tn

n!. (1.4)

More explicitly, they are given by

S2(n, k) =1

k!

k∑j=0

(k

j

)(−1)k−jjn

=1

k!4k0n, (n ≥ k),

(1.5)

where 4k0n = 4kxn|x=0, and 4f(x) = f(x + 1) − f(x) is the forward differenceoperator. For these well known facts, one may refer to [3,4].

2010 Mathematics Subject Classification. 05A19, 05A40, 11B73, 11B83.Key words and phrases. r-Stirling numbers of the second kind, r-Bell polynomials, umbral

calculus.∗ corresponding author.

1

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 27, NO.1, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

173 T. KIM ET AL 173-188

Page 174: Journal of Computational Analysis and Applicationseudoxuspress.com/images/JOCAAA-VOL-27-2019-ISSUE-1.pdf · Volume 27, Number 1 July 15, 2019 . ISSN:1521-1398 PRINT,1572-9206 ONLINE

2 Umbral calculus approach to r-Stirling numbers of the second kind and r-Bell polynomials

Let r be any positive integer. These ’classical’ Stirling numbers S2(n, k) of thesecond kind were generalized to the r-Stirling numbers S2,r(n, k) of the secondkind (see, [1,2,7]). The S2,r(n, k) enumerates the number of partitions of the set[n] = 1, 2, · · · , n into k nonempty disjoint subsets in such a way that 1, 2, · · ·, rare in distinct subsets.

They are given by the recurrence relation

S2,r(n, k) = kS2,r(n− 1, k) + S2,r(n− 1, k − 1), (n > r), (1.6)

with the initial conditions

S2,r(n, k) = 0, (n < r);S2,r(n, k) = δkr, (n = r). (1.7)

The S2,r(n, k) are also given by

(x+ r)n =n∑k=0

S2,r(n+ r, k + r)(x)k, (1.8)

and by

1

k!ert(et − 1)k =

∞∑n=k

S2,r(n+ r, k + r)tn

n!. (1.9)

Analogously to the classical case, they are explicitly given by

S2,r(n+ r, k + r) =1

k!

k∑j=0

(k

j

)(−1)k−j(r + j)n

=1

k!4krn, (n ≥ k),

(1.10)

where 4krn = 4kxn|x=r.For more details about r-Stirling numbers of the second kind, one may refer to

[1,2,7].The Bell polynomials Beln(x) (also called exponential or Touchard polynomials)

are defined by

ex(et−1) =∞∑n=0

Beln(x)tn

n!, (see [3, 4, 8, 9]). (1.11)

Then it is immediate to see that

Beln(x) =n∑k=0

S2(n, k)xk. (1.12)

For x = 1, Beln = Beln(1) =∑nk=0 S2(n, k) are called Bell numbers so that

eet−1 =

∞∑n=0

Belntn

n!. (1.13)

Further, the Bell polynomial is given by Dobinski’s formula

Beln(x) = e−x∞∑k=0

kn

k!xk. (1.14)

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 27, NO.1, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

174 T. KIM ET AL 173-188

Page 175: Journal of Computational Analysis and Applicationseudoxuspress.com/images/JOCAAA-VOL-27-2019-ISSUE-1.pdf · Volume 27, Number 1 July 15, 2019 . ISSN:1521-1398 PRINT,1572-9206 ONLINE

T. Kim, D. S. Kim, H.-I. Kwon, J. Kwon 3

On the other hand, the r-Bell polynomials Beln,r(x) are defined by

ertex(et−1) =∞∑n=0

Beln,r(x)tn

n!, (see [5]). (1.15)

Then it is easy to see that

Beln,r(x) =n∑k=0

S2,r(n+ r, k + r)xk. (1.16)

Moreover, they satisfy the generalized Dobinski’s formula

Beln,r(x) = e−x∞∑k=0

(k + r)n

k!xk. (1.17)

When x = 1, Beln,r = Beln,r(1) =∑nk=0 S2,r(n + r, k + r) are called r-Bell

numbers so that

eet−1+rt =

∞∑n=0

Beln,rtn

n!. (1.18)

We note here, in passing, that r-Bell numbers were called in another name,namely extended Bell numbers,(see [6]).

In this paper, we would like to use umbral calculus in order to derive some prop-erties, recurrence relations and identities related to r-Stirling numbers of the secondkind and r-Bell polynomials. In particular, we will express the r-Bell polynomialsas linear combinations of many well-known families of special polynomials.

2. Review on umbral calculus

Here we will go over some of the basic facts about umbral calculus. For acomplete treatment, the reader may refer to [4].Let F be the algebra of all formal power series in the single variable t with thecoefficients in the field C of complex numbers:

F =

f(t) =

∞∑k=0

aktk

k!

∣∣∣∣ ak ∈ C

. (2.1)

Let P = C[x] denote the ring of polynomials in x with the coefficients in C, andlet P∗ be the vector space of all linear functionals on P. For L ∈ P∗, p(x) ∈ P,< L | p(x) > denotes the action of the linear functional L on p(x). For f(t) =∑∞k=0 ak

tk

k! ∈ F , the linear functional < f(t) | · > on P is defined by

< f(t) |xn >= an, (n ≥ 0). (2.2)

For L ∈ P∗, let fL(t) =∑∞k=0

⟨L|xk

⟩tk

k! ∈ F . Then we evidently have⟨fL(t)|xn

⟩=⟨

L|xn⟩

, and the map L→ fL(t) is a vector space isomorphism from P∗ to F . Thus

F may be viewed as the vector space of all linear functionals on P as well as thealgebra of formal power series in t. So an element f(t) ∈ F will be thought of asboth a formal power series and a linear functional on P. F is called the umbralalgebra, the study of which is the umbral calculus.

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 27, NO.1, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

175 T. KIM ET AL 173-188

Page 176: Journal of Computational Analysis and Applicationseudoxuspress.com/images/JOCAAA-VOL-27-2019-ISSUE-1.pdf · Volume 27, Number 1 July 15, 2019 . ISSN:1521-1398 PRINT,1572-9206 ONLINE

4 Umbral calculus approach to r-Stirling numbers of the second kind and r-Bell polynomials

The order o(f(t)) of 0 6= f(t) ∈ F is the smallest integer k such that the coeffi-cients of tk does not vanish. In particular, for 0 6= f(t) ∈ F , it is called an invertibleseries if o(f(t)) = 0 and a delta series if o(f(t)) = 1.

Let f(t), g(t) ∈ F , with o(g(t)) = 0, o(f(t)) = 1. Then there exists a unique

sequence of polynomials Sn(x) (degSn(x) = n) such that⟨g(t)f(t)k|Sn(x)

⟩=

n!δn,k, for n, k ≥ 0. Such a sequence is called the Sheffer sequence for the Shefferpair (g(t), f(t)), which is concisely denoted by Sn(x) ∼ (g(t), f(t)).

It is known that Sn(x) ∼ (g(t), f(t)) if and only if

1

g(f(t))exf(t) =

∞∑n=0

Sn(x)tn

n!, (2.3)

where f(t) is the compositional inverse of f(t) satisfying f(f(t)) = f(f(t)) = t.Let pn(x) ∼ (1, f(t)), qn(x) ∼ (1, l(t)). Then the transfer formula says that

qn(x) = x

(f(t)

l(t)

)nx−1pn(x), (n ≥ 1). (2.4)

Let Sn(x) ∼ (g(t)), f(t)). Then we have the Sheffer identity:

Sn(x+ y) =

n∑k=0

(n

k

)Sk(x)pn−k(y), (2.5)

where pn(x) = g(t)Sn(x) ∼ (1, f(t)).The derivative of Sn(x) is given by

d

dxSn(x) =

n−1∑k=0

(n

k

)⟨f(t)|xn−k

⟩Sk(x), (n ≥ 1). (2.6)

Also, we have the recurrence formula:

Sn+1(x) =

(x− g′(t)

g(t)

)1

f ′(t)Sn(x). (2.7)

Assume that Sn(x) ∼ (g(t), f(t)), rn(x) ∼ (h(t), l(t)). Then

Sn(x) =n∑k=0

Cn,krk(x), (2.8)

where

Cn,k =1

k!

⟨h(f(t))

g(f(t))l(f(t))k|xn

⟩. (2.9)

Finally, we also need the following: for any h(t) ∈ F , p(x) ∈ P,⟨h(t)|xp(x)

⟩=⟨∂th(t)|p(x)

⟩. (2.10)

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 27, NO.1, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

176 T. KIM ET AL 173-188

Page 177: Journal of Computational Analysis and Applicationseudoxuspress.com/images/JOCAAA-VOL-27-2019-ISSUE-1.pdf · Volume 27, Number 1 July 15, 2019 . ISSN:1521-1398 PRINT,1572-9206 ONLINE

T. Kim, D. S. Kim, H.-I. Kwon, J. Kwon 5

3. Main Results

As we can see from (1.15) and (2.3), we see that

Beln,r(x) ∼(

1

(1 + t)r, log((1 + t)

)= (g(t), f(t)) . (3.1)

Let n ≥ 1. Then, using (2.10), we have

Beln,r(y) =⟨ ∞∑m=0

Belm,r(y)tm

m!|xn⟩

=⟨ertey(et−1)|xn

⟩=⟨∂t(e

rtey(et−1))|xn−1⟩

=⟨rertey(et−1) + ertey(et−1)yet|xn−1

⟩= r⟨ertey(et−1)|xn−1

⟩+ y⟨e(r+1)tey(et−1)|xn−1

⟩= rBeln−1,r(y) + yBeln−1,r+1(y).

(3.2)

Thus we obtain the following recurrence relation for r-Bell polynomials.

Theorem 3.1. For all integers n ≥ 1, we have the recurrence relation.

Beln,r(x) = rBeln−1,r(x) + xBeln−1,r+1(x), (n ≥ 1).

From (2.6), we have

d

dxBeln,r(x) =

n−1∑k=0

(n

k

)⟨et − 1|xn−k

⟩Belk,r(x)

=n−1∑k=0

(n

k

)(1− δn,k)Belk,r(x)

=n−1∑k=0

(n

k

)Belk,r(x), (n ≥ 1).

(3.3)

Using (2.7), we obtain

Beln+1,r(x) = (x+ r1

1 + t)(1 + t)Beln,r(x)

= x(1 + t)Beln,r(x) + rBeln,r(x)

= xBeln,r(x) + xd

dxBeln,r(x) + rBeln,r(x),

(3.4)

from which it follows that

d

dxBeln,r(x)

=Beln+1,r(x)

x− rBeln,r(x)

x−Beln,r(x).

(3.5)

This agrees with the result in [2].

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 27, NO.1, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

177 T. KIM ET AL 173-188

Page 178: Journal of Computational Analysis and Applicationseudoxuspress.com/images/JOCAAA-VOL-27-2019-ISSUE-1.pdf · Volume 27, Number 1 July 15, 2019 . ISSN:1521-1398 PRINT,1572-9206 ONLINE

6 Umbral calculus approach to r-Stirling numbers of the second kind and r-Bell polynomials

Noting that pn(x) = g(t)Beln,r(x) ∼ (1, log(1 + t)), we have pn(x) = Beln(x).Hence from (2.5), we get the following Sheffer identity

Beln,r(x+ y) =n∑k=0

(n

k

)Belk,r(x)Beln−k(y). (3.6)

Beln,r(y) =⟨ertey(et−1)|xn

⟩=⟨ert|ey(et−1)xn

⟩=⟨ert|

∞∑m=0

Belm(y)tm

m!xn⟩

=n∑

m=0

(n

m

)Belm(y)

⟨ert|xn−m

⟩=

n∑m=0

(n

m

)Belm(y)rn−m.

(3.7)

Hence we get

Beln,r(x) =n∑

m=0

(n

m

)rn−mBelm(x). (3.8)

Here we apply the transfer formula in (2.4) to xn ∼ (1, t), 1(1+t)rBeln,r(x) ∼

(1, log((1 + t)).For n ≥ 1, we have

1

(1 + t)rBeln,r(x) = x

(t

log(1 + t)

)nx−1xn

= x∞∑k=0

b(n)k

tk

k!xn−1

=n−1∑k=0

(n− 1

k

)b(n)k xn−k.

(3.9)

Here b(n)k are the Bernoulli numbers of the second kind of order n defined by

(t

log(1 + t)

)n=∞∑k=0

b(n)k

tk

k!. (3.10)

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 27, NO.1, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

178 T. KIM ET AL 173-188

Page 179: Journal of Computational Analysis and Applicationseudoxuspress.com/images/JOCAAA-VOL-27-2019-ISSUE-1.pdf · Volume 27, Number 1 July 15, 2019 . ISSN:1521-1398 PRINT,1572-9206 ONLINE

T. Kim, D. S. Kim, H.-I. Kwon, J. Kwon 7

Here, as is well known, b(n)k = B

(k−n+1)k (1), with B

(n)k (x) denoting the Bernoulli

polynomials of order n. Thus we obtain

Beln,r(x) =n−1∑k=0

(n− 1

k

)b(n)k (1 + t)rxn−k

=n−1∑k=0

(n− 1

k

)b(n)k

r∑l=0

(r

l

)tlxn−k

=n−1∑k=0

r∑l=0

(n− 1

k

)(r

l

)(n− k)lb

(n)k xn−k−l.

(3.11)

As 1(1+t)rBeln,r(x) = Beln(x) =

∑nj=0 S2(n, j)xj , we can proceed as follows.

Beln,r(x) = (1 + t)rBeln(x)

=∞∑k=0

(r

k

)tkBeln(x)

=n∑k=0

(r

k

)tk

n∑j=0

S2(n, j)xj

=n∑k=0

(r

k

) n∑j=k

S2(n, j)(j)kxj−k

=n∑k=0

(r

k

) n−k∑l=0

S2(n, k + l)(k + l)kxl

=

n∑l=0

(n−l∑k=0

(r

k

)(k + l)kS2(n, k + l)

)xl.

(3.12)

Also, from Beln,r(x) = (1 + t)rBeln(x),

(1 + t)sBeln,r(x) = Beln,r+s(x), (s ≥ 0). (3.13)

In particular, for s = 1, we have

Beln,r+1(x) = Beln,r(x) +d

dxBeln,r(x). (3.14)

Hence in addition to (3.3) and (3.4) we obtain another expression for the deriv-ative of Beln,r(x), namely

d

dxBeln,r(x) = Beln,r+1(x)−Beln,r(x). (3.15)

Combining this with (3.3), we get

Beln,r+1(x) =n∑k=0

(n

k

)Belk,r(x). (3.16)

We are now going to summarize the results obtained so far as the following threetheorems. Theorem 2 follows from (3.3), (3.5) and (3.15), Theorem 3 from (3.6),(3.8) and (3.16), and Theorem 4 from (3.11) and (3.12).

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 27, NO.1, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

179 T. KIM ET AL 173-188

Page 180: Journal of Computational Analysis and Applicationseudoxuspress.com/images/JOCAAA-VOL-27-2019-ISSUE-1.pdf · Volume 27, Number 1 July 15, 2019 . ISSN:1521-1398 PRINT,1572-9206 ONLINE

8 Umbral calculus approach to r-Stirling numbers of the second kind and r-Bell polynomials

Theorem 3.2. For all integers n ≥ 1, the derivative of r-Bell polynomials can begiven as follows:

d

dxBeln,r(x) =

n−1∑k=0

(n

k

)Belk,r(x)

=Beln+1,r(x)

x− rBeln,r(x)

x−Beln,r(x)

= Beln,r+1(x)−Beln,r(x).

Theorem 3.3. For all integers n ≥ 0, the following identities hold true.

Beln,r(x+ y) =n∑k=0

(n

k

)Belk,r(x)Beln−k(y),

Beln,r(x) =n∑

m=0

(n

m

)rn−mBelm(x),

Beln,r+1(x) =n∑k=0

(n

k

)Belk,r(x).

Theorem 3.4. For all integers n ≥ 0, we have the following expressions of r-Bellpolynomials.

Beln,r(x) =n−1∑k=0

r∑l=0

(n− 1

k

)(r

l

)(n− k)lb

(n)k xn−k−l

=n∑l=0

(n−l∑k=0

(r

k

)(k + l)kS2(n, k + l)

)xl,

where b(n)k are the Bernoulli numbers of the second kind of order n given by (3.10).

From now on, we will apply the formula (2.9) in order to express Beln,r(x) aslinear combinations of well-known families of special polynomials. For this, let usremind you of the fact in (3.1), namely

Beln,r(x) ∼(

1

(1 + t)r, log(1 + t)

). (3.17)

Noting that the Bernoulli polynomial Bn(x) is Sheffer for(et−1t , t

), we write

Beln,r(x) =∑nk=0 Cn,kBk(x).Then

Cn,k =⟨eet−1 − 1

et − 1| 1k!ert(et − 1)kxn

⟩=⟨eet−1 − 1

et − 1|∞∑l=k

S2,r(l + r, k + r)tl

l!xn⟩

=n∑l=k

(n

l

)S2,r(l + r, k + r)

⟨eet−1 − 1

et − 1|xn−l

⟩.

(3.18)

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 27, NO.1, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

180 T. KIM ET AL 173-188

Page 181: Journal of Computational Analysis and Applicationseudoxuspress.com/images/JOCAAA-VOL-27-2019-ISSUE-1.pdf · Volume 27, Number 1 July 15, 2019 . ISSN:1521-1398 PRINT,1572-9206 ONLINE

T. Kim, D. S. Kim, H.-I. Kwon, J. Kwon 9

Here we observe that⟨eet−1 − 1

et − 1|xn−l

⟩=⟨eet−1 − 1

t| t

et − 1xn−l

⟩=⟨eet−1 − 1

t|∞∑m=0

Bmtm

m!xn−l

=n−l∑m=0

(n− lm

)Bm

⟨eet−1 − 1

t|xn−l−m

⟩=

n−l∑m=0

1

n− l −m+ 1

(n− lm

)Bm

⟨eet−1 − 1|xn−l−m+1

⟩=

n−l∑m=0

1

n− l −m+ 1

(n− lm

)BmBeln−l−m+1.

(3.19)

Thus we see that

Cn,k =1

n+ 1

n∑l=k

n−l∑m=0

(n+ 1

l

)(n− l + 1

m

)S2,r(l + r, k + r)

×BmBeln−l−m+1.

(3.20)

Finally, we obtain

Beln,r(x) =1

n+ 1

n∑k=0

( n∑l=k

n−l∑m=0

(n+ 1

l

)(n− l + 1

m

)S2,r(l + r, k + r)

×BmBeln−l−m+1

)Bk(x).

(3.21)

Let Beln,r(x) =∑nk=0 Cn,kEk(x). Here En(x) are the Euler polynomials with

En(x) ∼ ( et+12 , t). Then

Cn,k =1

2

⟨eet−1 + 1| 1

k!ert(et − 1)kxn

⟩=

1

2

n∑l=k

(n

l

)S2,r(l + r, k + r)

⟨eet−1 + 1|xn−l

⟩=

1

2

n∑l=k

(n

l

)S2,r(l + r, k + r)(Beln−l + δn,l).

(3.22)

Hence we get

Beln,r(x) =1

2

n∑k=0

(n∑l=k

(n

l

)S2,r(l + r, k + r)(Beln−l + δn, l)

)Ek(x). (3.23)

We summarize the expressions of Beln,r(x) in (3.21) and (3.23) as a theorem.

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 27, NO.1, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

181 T. KIM ET AL 173-188

Page 182: Journal of Computational Analysis and Applicationseudoxuspress.com/images/JOCAAA-VOL-27-2019-ISSUE-1.pdf · Volume 27, Number 1 July 15, 2019 . ISSN:1521-1398 PRINT,1572-9206 ONLINE

10 Umbral calculus approach to r-Stirling numbers of the second kind and r-Bell polynomials

Theorem 3.5. For all integers n ≥ 0, we have the following expressions.

Beln,r(x) =1

n+ 1

n∑k=0

( n∑l=k

n−l∑m=0

(n+ 1

l

)(n− l + 1

m

)S2,r(l + r, k + r)

×BmBeln−l−m+1

)Bk(x)

=1

2

n∑k=0

(n∑l=k

(n

l

)S2,r(l + r, k + r)(Beln−l + δn, l)

)Ek(x).

Write Beln,r(x) =∑nk=0 Cn,k(x)k, where (x)n are the falling factorials with

(x)n ∼ (1, et − 1). Then

Cn,k =⟨ert| 1

k!(ee

t−1 − 1)kxn⟩

=⟨ert|

∞∑l=k

S2(l, k)1

l!(et − 1)lxn

⟩=

n∑l=k

S2(l, k)⟨ert|

∞∑m=l

S2(m, l)tm

m!xn⟩

=

n∑l=k

S2(l, k)

n∑m=l

(n

m

)S2(m, l)

⟨ert|xn−m

⟩=

n∑l=k

n∑m=l

(n

m

)S2(l, k)S2(m, l)rn−m.

(3.24)

Thus we have

Beln,r(x) =n∑k=0

(n∑l=k

n∑m=l

(n

m

)S2(l, k)S2(m, l)rn−m

)(x)k. (3.25)

As in (3.24), we let Beln,r(x) =∑nk=0 Cn,k(x)k. But here we compute the

coefficients Cn,k in a way different from (3.24). Then

Cn,k =1

k!

⟨ert|(ee

t−1 − 1)kxn⟩

=1

k!

⟨ert|

k∑l=0

(k

l

)(−1)k−lel(e

t−1)xn⟩

=1

k!

k∑l=0

(k

l

)(−1)k−l

⟨ert|

∞∑m=0

Belm(l)tm

m!xn⟩

=1

k!

k∑l=0

(k

l

)(−1)k−l

n∑m=0

(n

m

)Belm(l)rn−m

=1

k!

k∑l=0

n∑m=0

(−1)k−l(k

l

)(n

m

)rn−mBelm(l).

(3.26)

Hence we obtain

Beln,r(x) =n∑k=0

(k∑l=0

n∑m=0

(−1)k−l

k!

(k

l

)(n

m

)rn−mBelm(l)

)(x)k. (3.27)

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 27, NO.1, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

182 T. KIM ET AL 173-188

Page 183: Journal of Computational Analysis and Applicationseudoxuspress.com/images/JOCAAA-VOL-27-2019-ISSUE-1.pdf · Volume 27, Number 1 July 15, 2019 . ISSN:1521-1398 PRINT,1572-9206 ONLINE

T. Kim, D. S. Kim, H.-I. Kwon, J. Kwon 11

Combining (3.25) and (3.27), we get the following theorem.

Theorem 3.6. For all integers n ≥ 0, we have the following expressions.

Beln,r(x) =n∑k=0

(n∑l=k

n∑m=l

(n

m

)S2(l, k)S2(m, l)rn−m

)(x)k

=n∑k=0

(k∑l=0

n∑m=0

(−1)k−l

k!

(k

l

)(n

m

)rn−mBelm(l)

)(x)k.

We recall here that the Abel polynomial An(x; a)(a 6= 0) is the associated se-quence for teat, namely An(x; a) ∼ (1, teat). Let Beln,r(x) =

∑nk=0 Cn,kAk(x; a).

Then

Cn,k =⟨erteak(et−1)| 1

k!(et − 1)kxn

⟩=⟨erteak(et−1)|

∞∑l=k

S2(l, k)tl

l!xn⟩

=n∑l=k

(n

l

)S2(l, k)

⟨ert|eak(et−1)xn−l

⟩=

n∑l=k

(n

l

)S2(l, k)

⟨ert|

∞∑m=0

Belm(ak)tm

m!xn−l

⟩=

n∑l=k

(n

l

)S2(l, k)

n−l∑m=0

(n− lm

)Belm(ak)rn−l−m

=n∑l=k

n−l∑m=0

(n

l

)(n− lm

)S2(l, k)rn−l−mBelm(ak).

(3.28)

Thus we have the following result.

Theorem 3.7. For all integers n ≥ 0, we have the following expression.

Beln,r(x) =

n∑k=0

(n∑l=k

n−l∑m=0

(n

l

)(n− lm

)S2(l, k)rn−l−mBelm(ak)

)Ak(x; a),

where An(x; a) are the Abel polynomials.

The ordered Bell polynomials Obn(x) are the Appell polynomial with Obn(x) ∼(2− et, t). Write Beln,r(x) =

∑nk=0 Cn,kObk(x). Then

Cn,k =⟨

2− eet−1| 1

k!ert(et − 1)kxn

⟩=

n∑l=k

(n

l

)S2,r(l + r, k + r)

⟨2− ee

t−1|xn−l⟩

=

n∑l=k

(n

l

)S2,r(l + r, k + r)

(2δn,l −Beln−l

).

(3.29)

Hence we obtain the following theorem.

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 27, NO.1, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

183 T. KIM ET AL 173-188

Page 184: Journal of Computational Analysis and Applicationseudoxuspress.com/images/JOCAAA-VOL-27-2019-ISSUE-1.pdf · Volume 27, Number 1 July 15, 2019 . ISSN:1521-1398 PRINT,1572-9206 ONLINE

12 Umbral calculus approach to r-Stirling numbers of the second kind and r-Bell polynomials

Theorem 3.8. For all integers n ≥ 0, we have the following expression.

Beln,r(x) =n∑k=0

(n∑l=k

(n

l

)S2,r(l + r, k + r)

(2δn,l −Beln−l

))Obk(x),

where Obn(x) are the ordered Bell polynomials.

In (3.29), we saw that the ordered Bell polynomials Obm(x) are given by gener-ating function

1

2− etext =

∞∑m=0

Obm(x)tm

m!. (3.30)

More generally, the ordered Bell polynomials Ob(α)m (x) of order α are defined by(

1

2− et

)αext =

∞∑m=0

Ob(α)m (x)

tm

m!. (3.31)

For x = 0, Ob(α)m = Ob

(α)m (0) are called the ordered Bell numbers of order α and

given by (1

2− et

)α=∞∑m=0

Ob(α)m

tm

m!. (3.32)

Let Beln,r(x) =∑nk=0 Cn,kL

(α)k (x). Here L

(α)n (x) are the Laguerre polynomials

of order α with L(α)n (x) ∼

((1− t)−α−1, t

t−1

). Then

Cn,k =1

k!

⟨(2− et

)−α−1ert(et − 1

et − 2

)k ∣∣∣xn⟩= (−1)k

⟨(2− et

)−(k+α+1)∣∣∣ 1

k!ert(et − 1

)kxn⟩

= (−1)kn∑l=k

(n

l

)S2,r(l + r, k + r)

⟨(2− et

)−(k+α+1)∣∣∣xn−l⟩

= (−1)kn∑l=k

(n

l

)S2,r(l + r, k + r)Ob

(k+α+1)n−l .

(3.33)

Then we have the following theorem.

Theorem 3.9. For all integers n ≥ 0, we have the following expression.

Beln,r(x) =n∑k=0

(n∑l=k

(−1)k(n

l

)S2,r(l + r, k + r)

×Ob(k+α+1)n−l

)L

(α)k (x),

where Ob(α)n (x) and L

(α)n (x) are the higher-order ordered Bell polynomials and the

Laguerre polynomials of order α, respectively.

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 27, NO.1, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

184 T. KIM ET AL 173-188

Page 185: Journal of Computational Analysis and Applicationseudoxuspress.com/images/JOCAAA-VOL-27-2019-ISSUE-1.pdf · Volume 27, Number 1 July 15, 2019 . ISSN:1521-1398 PRINT,1572-9206 ONLINE

T. Kim, D. S. Kim, H.-I. Kwon, J. Kwon 13

Let Beln,r(x) =∑nk=0 Cn,kDk(x), where Dn(x) are the Daehee polynomials with

Dn(x) ∼(et−1t , et − 1

). Then

Cn,k =1

k!

⟨ t

et − 1ert

eet−1 − 1

t

(eet−1 − 1

)k∣∣∣xn⟩=

1

k!

1

n+ 1

⟨ t

et − 1ert(ee

t−1 − 1)(eet−1 − 1

)k∣∣∣xn+1⟩

=k + 1

n+ 1

⟨ t

et − 1ert∣∣∣ 1

(k + 1)!

(eet−1 − 1

)k+1xn+1

⟩=k + 1

n+ 1

⟨ t

et − 1ert∣∣∣ ∞∑l=k+1

S2(l, k + 1)1

l!

(et − 1

)lxn+1

=k + 1

n+ 1

n+1∑l=k+1

S2(l, k + 1)⟨ t

et − 1ert∣∣∣ ∞∑m=l

S2(m, l)tm

m!xn+1

=k + 1

n+ 1

n+1∑l=k+1

S2(l, k + 1)n+1∑m=l

(n+ 1

m

)S2(m, l)

⟨ t

et − 1ert∣∣∣xn+1−m

=n+1∑l=k+1

n+1∑m=l

k + 1

n+ 1

(n+ 1

m

)S2(l, k + 1)S2(m, l)Bn+1−m(r).

(3.34)

Thus we have the following theorem.

Theorem 3.10. For all integers n ≥ 0, we have the following expression.

Beln,r(x) =n∑k=0

(n+1∑l=k+1

n+1∑m=l

k + 1

n+ 1

(n+ 1

m

)S2(l, k + 1)S2(m, l)Bn+1−m(r)

)Dk(x),

where Dn(x) are the Daehee polynomials.

Write Beln,r(x) =∑nk=0 Cn,kH

(ν)k (x). Here H

(ν)n (x) are the Hermite polynomi-

als with H(ν)n (x) ∼ (e

νt2

2 , t). Then

Cn,k =⟨eν(et−1)2

2

∣∣∣ 1

k!ert(et − 1

)kxn⟩

=n∑l=k

(n

l

)S2,r(l + r, k + r)

⟨eν(et−1)2

2

∣∣∣xn−l⟩=

n∑l=k

(n

l

)S2,r(l + r, k + r)

⟨ ∞∑m=0

νm

m!

(et − 1)2m

2m

∣∣∣xn−l⟩

=n∑l=k

(n

l

)S2,r(l + r, k + r)

[n−l2 ]∑

m=0

(2m)!νm

m!2m

⟨ 1

(2m)!(et − 1)2m

∣∣∣xn−l⟩

=n∑l=k

(n

l

)S2,r(l + r, k + r)

[n−l2 ]∑

m=0

(2m)!

m!(ν

2)m⟨ ∞∑i=2m

S2(i, 2m)ti

i!

∣∣∣xn−l⟩

=n∑l=k

[n−l2 ]∑

m=0

(n

l

)(2m)!

m!(ν

2)mS2,r(l + r, k + r)S2(n− l, 2m).

(3.35)

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 27, NO.1, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

185 T. KIM ET AL 173-188

Page 186: Journal of Computational Analysis and Applicationseudoxuspress.com/images/JOCAAA-VOL-27-2019-ISSUE-1.pdf · Volume 27, Number 1 July 15, 2019 . ISSN:1521-1398 PRINT,1572-9206 ONLINE

14 Umbral calculus approach to r-Stirling numbers of the second kind and r-Bell polynomials

Hence we obtain the following result.

Theorem 3.11. For all integers n ≥ 0, we have the following expression.

Beln,r(x) =n∑k=0

(n∑l=0

[n−l2 ]∑

m=0

(n

l

)(2m)!

m!(ν

2)mS2,r(l + r, k + r)

× S2(n− l, 2m)

)H

(ν)k (x),

where H(ν)n (x) are the Hermite polynomials.

Let Beln,r(x) =∑nk=0 Cn,kpk(x). Here pn(x) = xnyn−1( 1

x ) ∼ (1, t− 12 t

2), where

yn(x) =∑nk=0

(n+k)!(n−k)!k!

(x2

)kare called Bessel polynomials and satisfy the differential

equation

x2y′′ + (2x+ 2)y′ + n(n+ 1)y = 0. (3.36)

Cn,k =

(−1

2

)k ⟨(et − 3

)k∣∣∣ 1

k!ert(et − 1

)kxn⟩

=

(−1

2

)k n∑l=k

(n

l

)S2,r(l + r, k + r)

⟨(et − 3

)k∣∣∣xn−l⟩=

(−1

2

)k n∑l=k

(n

l

)S2,r(l + r, k + r)

⟨ k∑m=0

(k

m

)(−3)k−memt

∣∣∣xn−l⟩=

(−1

2

)k n∑l=k

(n

l

)S2,r(l + r, k + r)

k∑m=0

(k

m

)(−3)k−mmn−l

=

(3

2

)k n∑l=k

k∑m=0

(n

l

)(k

m

)(−1

3)mmn−lS2,r(l + r, k + r).

(3.37)

Hence we have the following result.

Theorem 3.12. For all integers n ≥ 0, we have the following expression.

Beln,r(x) =n∑k=0

(n∑l=k

k∑m=0

(n

l

)(k

m

)(3

2

)k(−1

3)mmn−l

× S2,r(l + r, k + r)

)pk(x),

where pn(x) = xnyn−1( 1x ), with yn(x) the Bessel polynomials.

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 27, NO.1, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

186 T. KIM ET AL 173-188

Page 187: Journal of Computational Analysis and Applicationseudoxuspress.com/images/JOCAAA-VOL-27-2019-ISSUE-1.pdf · Volume 27, Number 1 July 15, 2019 . ISSN:1521-1398 PRINT,1572-9206 ONLINE

T. Kim, D. S. Kim, H.-I. Kwon, J. Kwon 15

Let Beln,r(x) =∑nk=0 Cn,kbk(x), where bn(x) are the Bernoulli polynomials of

the second kind with bn(x) ∼(

tet−1 , e

t − 1)

.

Cn,k =⟨ et − 1

eet−1 − 1ert∣∣∣ 1

k!(ee

t−1 − 1)kxn⟩

=⟨ et − 1

eet−1 − 1ert∣∣∣ ∞∑l=k

S2(l, k)1

l!(et − 1)lxn

⟩=

n∑l=k

S2(l, k)⟨ et − 1

eet−1 − 1ert∣∣∣ ∞∑m=l

S2(m, l)tm

m!xn⟩

=n∑l=k

S2(l, k)n∑

m=l

(n

m

)S2(m, l)

⟨ert∣∣∣ et − 1

eet−1 − 1xn−m

⟩=

n∑l=k

S2(l, k)n∑

m=l

(n

m

)S2(m, l)

⟨ert∣∣∣ ∞∑i=0

Bi1

i!(et − 1)ixn−m

⟩=

n∑l=k

n∑m=l

(n

m

)S2(l, k)S2(m, l)

n−m∑i=0

Bi

⟨ert∣∣∣ ∞∑j=i

S2(j, i)tj

j!xn−m

=n∑l=k

n∑m=l

(n

m

)S2(l, k)S2(m, l)

n−m∑i=0

Bi

n−m∑j=i

(n−mj

)S2(j, i)rn−m−j

=n∑l=k

n∑m=l

n−m∑i=0

n−m∑j=i

(n

m

)(n−mj

)S2(l, k)S2(m, l)S2(j, i)rn−m−jBi.

(3.38)

Thus we get the final result of this paper.

Theorem 3.13. For all integers n ≥ 0, we have the following expression.

Beln,r(x) =n∑k=0

(n∑l=k

n∑m=l

n−m∑i=0

n−m∑j=i

(n

m

)(n−mj

)

× S2(l, k)S2(m, l)S2(j, i)rn−m−jBi

)bk(x),

where bn(x) are the Bernoulli polynomials of the second kind.

References

1. A.Z. Broder, The r-Stirling numbers, Discrete Math., 49 (1984), 241-259.2. I. Mezo, On the maximum of r-Stirmilg numbers, Adv. Appl. Math., 41 (2008), 293-306.

3. J. Quaintance, H. W. Gould, Combinatorial identities for Stirling numbers. The unpublished

notes of H. W. Gould. With a foreword by George E. Andrews. World Scientific PublishingCo. Pte. Ltd., Singapore, 2016. xv+260 pp. ISBN: 978-981-4725-26-2

4. S. Roman,The umbral calculus, Pure and Applied Mathematics, Vol.111, Academic Press, Inc.

[Harcourt Brace Jovanovich, Publishers], New York, 1984.5. M. Mihoubi, H. Belbachir, Linear recurrences for r-Bell polynomials, J. Integer Seq., 17 (2014),

Article 14.10.6.6. T. Kim, D. S. Kim, Extended Stirling polynomials of the second kind and Bell polynomials,

Preprint.7. D. S. Kim, T. Kim, Identities involving r-Stirling numbers, J. Comput. Anal. Appl., 17 (2014),

no. 4, 674-680.

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 27, NO.1, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

187 T. KIM ET AL 173-188

Page 188: Journal of Computational Analysis and Applicationseudoxuspress.com/images/JOCAAA-VOL-27-2019-ISSUE-1.pdf · Volume 27, Number 1 July 15, 2019 . ISSN:1521-1398 PRINT,1572-9206 ONLINE

16 Umbral calculus approach to r-Stirling numbers of the second kind and r-Bell polynomials

8. D. S. Kim, T. Kim, Some identities of Bell polynomials, Sci. China Math., 58 (2015), no. 10,2095-2104.

9. T. Kim, D. S. Kim, On λ-Bell polynomials associated with umbral calculus, Russ. J. Math.

Phys., 24 (2017), no. 1, 69-78.

1 Department of Mathematics, College of Science, Tianjin Polytechnic University,Tianjin 300160, China, Department of Mathematics, Kwangwoon University, Seoul, 139-

701, Republic of KoreaE-mail address: [email protected]

2 Department of Mathematics, Sogang University, Seoul, 121-742, Republic of Korea

E-mail address: [email protected]

3 Department of Mathematics, Kwangwoon University, Seoul, 139-701, Republic of

KoreaE-mail address: [email protected]

4,∗ Department of Mathematics Education and RINS, Gyeongsang National Univer-sity, Jinju, Gyeongsangnamdo, 52828, Republic of Korea

E-mail address: [email protected]

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 27, NO.1, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

188 T. KIM ET AL 173-188

Page 189: Journal of Computational Analysis and Applicationseudoxuspress.com/images/JOCAAA-VOL-27-2019-ISSUE-1.pdf · Volume 27, Number 1 July 15, 2019 . ISSN:1521-1398 PRINT,1572-9206 ONLINE

TABLE OF CONTENTS, JOURNAL OF COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 27, NO. 1, 2019

On common fixed point theorems of weakly compatible mappings in fuzzy metric spaces, Afshan Batool, Tayyab Kamran, Dong Yun Shin, and Choonkil Park,……………………11

Analysis of latent CHIKV dynamics model with time delays, Ahmed. M. Elaiw, Taofeek O. Alade, and Saud M. Alsulami,………………………………………………………………19

Dynamical behavior of MERS-CoV model with discrete delays, H. Batarfi, A. Elaiw, and A. Alshareef,…………………………………………………………………………………….37

Convexity and hyperconvexity in fuzzy metric space, Ebru Yiğit and Hakan Efe,…………50

On generalizations of a reverse Hardy-Hilbert's type inequality, Zhengping Zhang and Gaowen Xi,……………………………………………………………………………………………59

Dunkl generalization of q-Szász-Mirakjan-Kantrovich type operators and approximation, Abdullah Alotaibi and M. Mursaleen,……………………………………………………….66

Pointwise error estimates for spherical hybrid interpolation, Chunmei Ding, Ming Li, and Feilong Cao,…………………………………………………………………………………77

Investigating dynamics of the rational difference equation 𝑥𝑥𝑛𝑛+1 = 𝑥𝑥𝑛𝑛−1𝐴𝐴+𝐵𝐵𝑥𝑥𝑛𝑛𝑥𝑥𝑛𝑛−1

, Malek Ghazel,

Taher S. Hassan, and Ahmed M. Mosallem,…………………………………………………85

𝐿𝐿𝑝𝑝 approximation errors for hybrid interpolation on the unit sphere, Chunmei Ding, Ming Li, and Feilong Cao,…………………………………………………………………………………104

Some best approximation formulas and inequalities for the Bateman's G-function, Ahmed Hegazi, Mansour Mahmoud, Ahmed Talat, and Hesham Moustafa,…………………………118

A new q-extension of Euler polynomial of the second kind and some related polynomials, R. P. Agarwal, J. Y. Kang, and C. S. Ryoo,……………………………………………………….136

Regularized moving least squares approximation with Laplace-Beltrami operator on the sphere, Chunmei Ding, Yongli Zhang, and Feilong Cao,…………………………………………… 149

Chaos Control and Function Projective Synchronization of Noval Chaotic Dynamical System, M. M. El-Dessoky, E. O. Alzahrani, and N.A. Almohammadi,……………………………..162

Page 190: Journal of Computational Analysis and Applicationseudoxuspress.com/images/JOCAAA-VOL-27-2019-ISSUE-1.pdf · Volume 27, Number 1 July 15, 2019 . ISSN:1521-1398 PRINT,1572-9206 ONLINE

TABLE OF CONTENTS, JOURNAL OF COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 27, NO. 1, 2019

(continued)

Umbral calculus approach to r-Stirling numbers of the second kind and r-Bell polynomials, Taekyun Kim, Dae San Kim, Hyuck-In Kwon, and Jongkyum Kwon,………………………173