journal of computational analysis and...

154
Volume 28, Number 5 October 2020 ISSN:1521-1398 PRINT,1572-9206 ONLINE Journal of Computational Analysis and Applications EUDOXUS PRESS,LLC

Upload: others

Post on 01-Nov-2020

1 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Journal of Computational Analysis and Applicationseudoxuspress.com/images/JOCAAA-VOL-28-2020-ISSUE-5.pdfBaltimore, MD 21251, USA tel: 1-443-885-4373 Fax 1-443-885-8216 Gaston.N'Guerekata@morgan.edu

Volume 28, Number 5 October 2020ISSN:1521-1398 PRINT,1572-9206 ONLINE

Journal of Computational

Analysis and

Applications

EUDOXUS PRESS,LLC

Page 2: Journal of Computational Analysis and Applicationseudoxuspress.com/images/JOCAAA-VOL-28-2020-ISSUE-5.pdfBaltimore, MD 21251, USA tel: 1-443-885-4373 Fax 1-443-885-8216 Gaston.N'Guerekata@morgan.edu

Journal of Computational Analysis and Applications ISSNno.’s:1521-1398 PRINT,1572-9206 ONLINE SCOPE OF THE JOURNAL An international publication of Eudoxus Press, LLC (six times annually) Editor in Chief: George Anastassiou Department of Mathematical Sciences, University of Memphis, Memphis, TN 38152-3240, U.S.A [email protected]

http://www.msci.memphis.edu/~ganastss/jocaaa The main purpose of "J.Computational Analysis and Applications" is to publish high quality research articles from all subareas of Computational Mathematical Analysis and its many potential applications and connections to other areas of Mathematical Sciences. Any paper whose approach and proofs are computational,using methods from Mathematical Analysis in the broadest sense is suitable and welcome for consideration in our journal, except from Applied Numerical Analysis articles. Also plain word articles without formulas and proofs are excluded. The list of possibly connected mathematical areas with this publication includes, but is not restricted to: Applied Analysis, Applied Functional Analysis, Approximation Theory, Asymptotic Analysis, Difference Equations, Differential Equations, Partial Differential Equations, Fourier Analysis, Fractals, Fuzzy Sets, Harmonic Analysis, Inequalities, Integral Equations, Measure Theory, Moment Theory, Neural Networks, Numerical Functional Analysis, Potential Theory, Probability Theory, Real and Complex Analysis, Signal Analysis, Special Functions, Splines, Stochastic Analysis, Stochastic Processes, Summability, Tomography, Wavelets, any combination of the above, e.t.c. "J.Computational Analysis and Applications" is a peer-reviewed Journal. See the instructions for preparation and submission of articles to JoCAAA. Assistant to the Editor: Dr.Razvan Mezei,[email protected], St.Martin Univ.,Olympia,WA,USA. Journal of Computational Analysis and Applications(JoCAAA) is published by EUDOXUS PRESS,LLC,1424 Beaver Trail Drive,Cordova,TN38016,USA,[email protected]://www.eudoxuspress.com. Annual Subscription Prices:For USA and Canada,Institutional:Print $800, Electronic OPEN ACCESS. Individual:Print $400. For any other part of the world add $160 more(handling and postages) to the above prices for Print. No credit card payments.Copyright©2020 by Eudoxus Press,LLC,all rights reserved.JoCAAA is printed in USA. JoCAAA is reviewed and abstracted by AMS Mathematical Reviews,MATHSCI,and Zentralblaat MATH.It is strictly prohibited the reproduction and transmission of any part of JoCAAA and in any form and by any means without the written permission of the publisher.It is only allowed to educators to Xerox articles for educational purposes.The publisher assumes noresponsibility for the content of published papers.

766

Page 3: Journal of Computational Analysis and Applicationseudoxuspress.com/images/JOCAAA-VOL-28-2020-ISSUE-5.pdfBaltimore, MD 21251, USA tel: 1-443-885-4373 Fax 1-443-885-8216 Gaston.N'Guerekata@morgan.edu

Editorial Board

Associate Editors of Journal of Computational Analysis and Applications

Francesco Altomare Dipartimento di Matematica Universita' di Bari Via E.Orabona, 4 70125 Bari, ITALY Tel+39-080-5442690 office +39-080-3944046 home +39-080-5963612 Fax [email protected] Approximation Theory, Functional Analysis, Semigroups and Partial Differential Equations, Positive Operators. Ravi P. Agarwal Department of Mathematics Texas A&M University - Kingsville 700 University Blvd. Kingsville, TX 78363-8202 tel: 361-593-2600 [email protected] Differential Equations, Difference Equations, Inequalities George A. Anastassiou Department of Mathematical Sciences The University of Memphis Memphis, TN 38152,U.S.A Tel.901-678-3144 e-mail: [email protected] Approximation Theory, Real Analysis, Wavelets, Neural Networks, Probability, Inequalities. J. Marshall Ash Department of Mathematics De Paul University 2219 North Kenmore Ave. Chicago, IL 60614-3504 773-325-4216 e-mail: [email protected] Real and Harmonic Analysis Dumitru Baleanu Department of Mathematics and Computer Sciences, Cankaya University, Faculty of Art and Sciences, 06530 Balgat, Ankara, Turkey, [email protected]

Fractional Differential Equations Nonlinear Analysis, Fractional Dynamics Carlo Bardaro Dipartimento di Matematica e Informatica Universita di Perugia Via Vanvitelli 1 06123 Perugia, ITALY TEL+390755853822 +390755855034 FAX+390755855024 E-mail [email protected] Web site: http://www.unipg.it/~bardaro/ Functional Analysis and Approximation Theory, Signal Analysis, Measure Theory, Real Analysis.

Martin Bohner Department of Mathematics and Statistics, Missouri S&T Rolla, MO 65409-0020, USA [email protected] web.mst.edu/~bohner Difference equations, differential equations, dynamic equations on time scale, applications in economics, finance, biology. Jerry L. Bona Department of Mathematics The University of Illinois at Chicago 851 S. Morgan St. CS 249 Chicago, IL 60601 e-mail:[email protected] Partial Differential Equations, Fluid Dynamics Luis A. Caffarelli Department of Mathematics The University of Texas at Austin Austin, Texas 78712-1082 512-471-3160 e-mail: [email protected] Partial Differential Equations George Cybenko Thayer School of Engineering

767

Page 4: Journal of Computational Analysis and Applicationseudoxuspress.com/images/JOCAAA-VOL-28-2020-ISSUE-5.pdfBaltimore, MD 21251, USA tel: 1-443-885-4373 Fax 1-443-885-8216 Gaston.N'Guerekata@morgan.edu

Dartmouth College 8000 Cummings Hall, Hanover, NH 03755-8000 603-646-3843 (X 3546 Secr.) e-mail:[email protected] Approximation Theory and Neural Networks Sever S. Dragomir School of Computer Science and Mathematics, Victoria University, PO Box 14428, Melbourne City, MC 8001, AUSTRALIA Tel. +61 3 9688 4437 Fax +61 3 9688 4050 [email protected] Inequalities, Functional Analysis, Numerical Analysis, Approximations, Information Theory, Stochastics. Oktay Duman TOBB University of Economics and Technology, Department of Mathematics, TR-06530, Ankara, Turkey, [email protected] Classical Approximation Theory, Summability Theory, Statistical Convergence and its Applications Saber N. Elaydi Department Of Mathematics Trinity University 715 Stadium Dr. San Antonio, TX 78212-7200 210-736-8246 e-mail: [email protected] Ordinary Differential Equations, Difference Equations J .A. Goldstein Department of Mathematical Sciences The University of Memphis Memphis, TN 38152 901-678-3130 [email protected] Partial Differential Equations, Semigroups of Operators H. H. Gonska Department of Mathematics University of Duisburg Duisburg, D-47048 Germany

011-49-203-379-3542 e-mail: [email protected] Approximation Theory, Computer Aided Geometric Design John R. Graef Department of Mathematics University of Tennessee at Chattanooga Chattanooga, TN 37304 USA [email protected] Ordinary and functional differential equations, difference equations, impulsive systems, differential inclusions, dynamic equations on time scales, control theory and their applications Weimin Han Department of Mathematics University of Iowa Iowa City, IA 52242-1419 319-335-0770 e-mail: [email protected] Numerical analysis, Finite element method, Numerical PDE, Variational inequalities, Computational mechanics Tian-Xiao He Department of Mathematics and Computer Science P.O. Box 2900, Illinois Wesleyan University Bloomington, IL 61702-2900, USA Tel (309)556-3089 Fax (309)556-3864 [email protected] Approximations, Wavelet, Integration Theory, Numerical Analysis, Analytic Combinatorics Margareta Heilmann Faculty of Mathematics and Natural Sciences, University of Wuppertal Gaußstraße 20 D-42119 Wuppertal, Germany, [email protected] Approximation Theory (Positive Linear Operators) Xing-Biao Hu Institute of Computational Mathematics AMSS, Chinese Academy of Sciences Beijing, 100190, CHINA [email protected]

768

Page 5: Journal of Computational Analysis and Applicationseudoxuspress.com/images/JOCAAA-VOL-28-2020-ISSUE-5.pdfBaltimore, MD 21251, USA tel: 1-443-885-4373 Fax 1-443-885-8216 Gaston.N'Guerekata@morgan.edu

Computational Mathematics Jong Kyu Kim Department of Mathematics Kyungnam University Masan Kyungnam,631-701,Korea Tel 82-(55)-249-2211 Fax 82-(55)-243-8609 [email protected] Nonlinear Functional Analysis, Variational Inequalities, Nonlinear Ergodic Theory, ODE, PDE, Functional Equations. Robert Kozma Department of Mathematical Sciences The University of Memphis Memphis, TN 38152, USA [email protected] Neural Networks, Reproducing Kernel Hilbert Spaces, Neural Percolation Theory Mustafa Kulenovic Department of Mathematics University of Rhode Island Kingston, RI 02881,USA [email protected] Differential and Difference Equations Irena Lasiecka Department of Mathematical Sciences University of Memphis Memphis, TN 38152 PDE, Control Theory, Functional Analysis, [email protected]

Burkhard Lenze Fachbereich Informatik Fachhochschule Dortmund University of Applied Sciences Postfach 105018 D-44047 Dortmund, Germany e-mail: [email protected] Real Networks, Fourier Analysis, Approximation Theory Hrushikesh N. Mhaskar Department Of Mathematics California State University Los Angeles, CA 90032 626-914-7002 e-mail: [email protected] Orthogonal Polynomials, Approximation Theory, Splines, Wavelets, Neural Networks

Ram N. Mohapatra Department of Mathematics University of Central Florida Orlando, FL 32816-1364 tel.407-823-5080 [email protected] Real and Complex Analysis, Approximation Th., Fourier Analysis, Fuzzy Sets and Systems Gaston M. N'Guerekata Department of Mathematics Morgan State University Baltimore, MD 21251, USA tel: 1-443-885-4373 Fax 1-443-885-8216 Gaston.N'[email protected] [email protected] Nonlinear Evolution Equations, Abstract Harmonic Analysis, Fractional Differential Equations, Almost Periodicity & Almost Automorphy M.Zuhair Nashed Department Of Mathematics University of Central Florida PO Box 161364 Orlando, FL 32816-1364 e-mail: [email protected] Inverse and Ill-Posed problems, Numerical Functional Analysis, Integral Equations, Optimization, Signal Analysis Mubenga N. Nkashama Department OF Mathematics University of Alabama at Birmingham Birmingham, AL 35294-1170 205-934-2154 e-mail: [email protected] Ordinary Differential Equations, Partial Differential Equations Vassilis Papanicolaou Department of Mathematics National Technical University of Athens Zografou campus, 157 80 Athens, Greece tel:: +30(210) 772 1722 Fax +30(210) 772 1775 [email protected] Partial Differential Equations, Probability

769

Page 6: Journal of Computational Analysis and Applicationseudoxuspress.com/images/JOCAAA-VOL-28-2020-ISSUE-5.pdfBaltimore, MD 21251, USA tel: 1-443-885-4373 Fax 1-443-885-8216 Gaston.N'Guerekata@morgan.edu

Choonkil Park Department of Mathematics Hanyang University Seoul 133-791 S. Korea, [email protected] Functional Equations Svetlozar (Zari) Rachev, Professor of Finance, College of Business, and Director of Quantitative Finance Program, Department of Applied Mathematics & Statistics Stonybrook University 312 Harriman Hall, Stony Brook, NY 11794-3775 tel: +1-631-632-1998, [email protected] Alexander G. Ramm Mathematics Department Kansas State University Manhattan, KS 66506-2602 e-mail: [email protected] Inverse and Ill-posed Problems, Scattering Theory, Operator Theory, Theoretical Numerical Analysis, Wave Propagation, Signal Processing and Tomography Tomasz Rychlik Polish Academy of Sciences Instytut Matematyczny PAN 00-956 Warszawa, skr. poczt. 21 ul. Śniadeckich 8 Poland [email protected] Mathematical Statistics, Probabilistic Inequalities Boris Shekhtman Department of Mathematics University of South Florida Tampa, FL 33620, USA Tel 813-974-9710 [email protected] Approximation Theory, Banach spaces, Classical Analysis T. E. Simos Department of Computer Science and Technology Faculty of Sciences and Technology University of Peloponnese GR-221 00 Tripolis, Greece Postal Address: 26 Menelaou St.

Anfithea - Paleon Faliron GR-175 64 Athens, Greece [email protected] Numerical Analysis H. M. Srivastava Department of Mathematics and Statistics University of Victoria Victoria, British Columbia V8W 3R4 Canada tel.250-472-5313; office,250-477-6960 home, fax 250-721-8962 [email protected] Real and Complex Analysis, Fractional Calculus and Appl., Integral Equations and Transforms, Higher Transcendental Functions and Appl.,q-Series and q-Polynomials, Analytic Number Th. I. P. Stavroulakis Department of Mathematics University of Ioannina 451-10 Ioannina, Greece [email protected] Differential Equations Phone +3-065-109-8283 Manfred Tasche Department of Mathematics University of Rostock D-18051 Rostock, Germany [email protected] rostock.de Numerical Fourier Analysis, Fourier Analysis, Harmonic Analysis, Signal Analysis, Spectral Methods, Wavelets, Splines, Approximation Theory Roberto Triggiani Department of Mathematical Sciences University of Memphis Memphis, TN 38152 PDE, Control Theory, Functional Analysis, [email protected]

Juan J. Trujillo University of La Laguna Departamento de Analisis Matematico C/Astr.Fco.Sanchez s/n 38271. LaLaguna. Tenerife. SPAIN Tel/Fax 34-922-318209 [email protected]

770

Page 7: Journal of Computational Analysis and Applicationseudoxuspress.com/images/JOCAAA-VOL-28-2020-ISSUE-5.pdfBaltimore, MD 21251, USA tel: 1-443-885-4373 Fax 1-443-885-8216 Gaston.N'Guerekata@morgan.edu

Fractional: Differential Equations-Operators-Fourier Transforms, Special functions, Approximations, and Applications Ram Verma International Publications 1200 Dallas Drive #824 Denton, TX 76205, USA [email protected] Applied Nonlinear Analysis, Numerical Analysis, Variational Inequalities, Optimization Theory, Computational Mathematics, Operator Theory

Xiang Ming Yu Department of Mathematical Sciences Southwest Missouri State University Springfield, MO 65804-0094 417-836-5931 [email protected] Classical Approximation Theory, Wavelets Xiao-Jun Yang State Key Laboratory for Geomechanics and Deep Underground Engineering, China University of Mining and Technology, Xuzhou 221116, China Local Fractional Calculus and Applications, Fractional Calculus and Applications, General Fractional Calculus and Applications, Variable-order Calculus and Applications, Viscoelasticity and Computational methods for Mathematical [email protected]

Richard A. Zalik Department of Mathematics Auburn University Auburn University, AL 36849-5310 USA. Tel 334-844-6557 office 678-642-8703 home Fax 334-844-6555 [email protected] Approximation Theory, Chebychev Systems, Wavelet Theory

Ahmed I. Zayed Department of Mathematical Sciences DePaul University 2320 N. Kenmore Ave. Chicago, IL 60614-3250 773-325-7808 e-mail: [email protected] Shannon sampling theory, Harmonic analysis and wavelets, Special functions and orthogonal polynomials, Integral transforms Ding-Xuan Zhou Department Of Mathematics City University of Hong Kong 83 Tat Chee Avenue Kowloon, Hong Kong 852-2788 9708,Fax:852-2788 8561 e-mail: [email protected] Approximation Theory, Spline functions, Wavelets Xin-long Zhou Fachbereich Mathematik, Fachgebiet Informatik Gerhard-Mercator-Universitat Duisburg Lotharstr.65, D-47048 Duisburg, Germany e-mail:[email protected] duisburg.de Fourier Analysis, Computer-Aided Geometric Design, Computational Complexity, Multivariate Approximation Theory, Approximation and Interpolation Theory Jessada Tariboon Department of Mathematics, King Mongkut's University of Technology N. Bangkok 1518 Pracharat 1 Rd., Wongsawang, Bangsue, Bangkok, Thailand 10800 [email protected], Time scales, Differential/Difference Equations, Fractional Differential Equations

771

Page 8: Journal of Computational Analysis and Applicationseudoxuspress.com/images/JOCAAA-VOL-28-2020-ISSUE-5.pdfBaltimore, MD 21251, USA tel: 1-443-885-4373 Fax 1-443-885-8216 Gaston.N'Guerekata@morgan.edu

Instructions to Contributors

Journal of Computational Analysis and Applications An international publication of Eudoxus Press, LLC, of TN.

Editor in Chief: George Anastassiou

Department of Mathematical Sciences University of Memphis

Memphis, TN 38152-3240, U.S.A.

1. Manuscripts files in Latex and PDF and in English, should be submitted via email to the Editor-in-Chief: Prof.George A. Anastassiou Department of Mathematical Sciences The University of Memphis Memphis,TN 38152, USA. Tel. 901.678.3144 e-mail: [email protected] Authors may want to recommend an associate editor the most related to the submission to possibly handle it. Also authors may want to submit a list of six possible referees, to be used in case we cannot find related referees by ourselves. 2. Manuscripts should be typed using any of TEX,LaTEX,AMS-TEX,or AMS-LaTEX and according to EUDOXUS PRESS, LLC. LATEX STYLE FILE. (Click HERE to save a copy of the style file.)They should be carefully prepared in all respects. Submitted articles should be brightly typed (not dot-matrix), double spaced, in ten point type size and in 8(1/2)x11 inch area per page. Manuscripts should have generous margins on all sides and should not exceed 24 pages. 3. Submission is a representation that the manuscript has not been published previously in this or any other similar form and is not currently under consideration for publication elsewhere. A statement transferring from the authors(or their employers,if they hold the copyright) to Eudoxus Press, LLC, will be required before the manuscript can be accepted for publication.The Editor-in-Chief will supply the necessary forms for this transfer.Such a written transfer of copyright,which previously was assumed to be implicit in the act of submitting a manuscript,is necessary under the U.S.Copyright Law in order for the publisher to carry through the dissemination of research results and reviews as widely and effective as possible.

772

Page 9: Journal of Computational Analysis and Applicationseudoxuspress.com/images/JOCAAA-VOL-28-2020-ISSUE-5.pdfBaltimore, MD 21251, USA tel: 1-443-885-4373 Fax 1-443-885-8216 Gaston.N'Guerekata@morgan.edu

4. The paper starts with the title of the article, author's name(s) (no titles or degrees), author's affiliation(s) and e-mail addresses. The affiliation should comprise the department, institution (usually university or company), city, state (and/or nation) and mail code. The following items, 5 and 6, should be on page no. 1 of the paper. 5. An abstract is to be provided, preferably no longer than 150 words. 6. A list of 5 key words is to be provided directly below the abstract. Key words should express the precise content of the manuscript, as they are used for indexing purposes. The main body of the paper should begin on page no. 1, if possible. 7. All sections should be numbered with Arabic numerals (such as: 1. INTRODUCTION) . Subsections should be identified with section and subsection numbers (such as 6.1. Second-Value Subheading). If applicable, an independent single-number system (one for each category) should be used to label all theorems, lemmas, propositions, corollaries, definitions, remarks, examples, etc. The label (such as Lemma 7) should be typed with paragraph indentation, followed by a period and the lemma itself. 8. Mathematical notation must be typeset. Equations should be numbered consecutively with Arabic numerals in parentheses placed flush right, and should be thusly referred to in the text [such as Eqs.(2) and (5)]. The running title must be placed at the top of even numbered pages and the first author's name, et al., must be placed at the top of the odd numbed pages. 9. Illustrations (photographs, drawings, diagrams, and charts) are to be numbered in one consecutive series of Arabic numerals. The captions for illustrations should be typed double space. All illustrations, charts, tables, etc., must be embedded in the body of the manuscript in proper, final, print position. In particular, manuscript, source, and PDF file version must be at camera ready stage for publication or they cannot be considered. Tables are to be numbered (with Roman numerals) and referred to by number in the text. Center the title above the table, and type explanatory footnotes (indicated by superscript lowercase letters) below the table. 10. List references alphabetically at the end of the paper and number them consecutively. Each must be cited in the text by the appropriate Arabic numeral in square brackets on the baseline. References should include (in the following order): initials of first and middle name, last name of author(s) title of article,

773

Page 10: Journal of Computational Analysis and Applicationseudoxuspress.com/images/JOCAAA-VOL-28-2020-ISSUE-5.pdfBaltimore, MD 21251, USA tel: 1-443-885-4373 Fax 1-443-885-8216 Gaston.N'Guerekata@morgan.edu

name of publication, volume number, inclusive pages, and year of publication. Authors should follow these examples: Journal Article 1. H.H.Gonska,Degree of simultaneous approximation of bivariate functions by Gordon operators, (journal name in italics) J. Approx. Theory, 62,170-191(1990). Book 2. G.G.Lorentz, (title of book in italics) Bernstein Polynomials (2nd ed.), Chelsea,New York,1986. Contribution to a Book 3. M.K.Khan, Approximation properties of beta operators,in(title of book in italics) Progress in Approximation Theory (P.Nevai and A.Pinkus,eds.), Academic Press, New York,1991,pp.483-495. 11. All acknowledgements (including those for a grant and financial support) should occur in one paragraph that directly precedes the References section. 12. Footnotes should be avoided. When their use is absolutely necessary, footnotes should be numbered consecutively using Arabic numerals and should be typed at the bottom of the page to which they refer. Place a line above the footnote, so that it is set off from the text. Use the appropriate superscript numeral for citation in the text. 13. After each revision is made please again submit via email Latex and PDF files of the revised manuscript, including the final one. 14. Effective 1 Nov. 2009 for current journal page charges, contact the Editor in Chief. Upon acceptance of the paper an invoice will be sent to the contact author. The fee payment will be due one month from the invoice date. The article will proceed to publication only after the fee is paid. The charges are to be sent, by money order or certified check, in US dollars, payable to Eudoxus Press, LLC, to the address shown on the Eudoxus homepage. No galleys will be sent and the contact author will receive one (1) electronic copy of the journal issue in which the article appears. 15. This journal will consider for publication only papers that contain proofs for their listed results.

774

Page 11: Journal of Computational Analysis and Applicationseudoxuspress.com/images/JOCAAA-VOL-28-2020-ISSUE-5.pdfBaltimore, MD 21251, USA tel: 1-443-885-4373 Fax 1-443-885-8216 Gaston.N'Guerekata@morgan.edu

ON HARMONIC MULTIVALENT FUNCTIONS DEFINED BY A

NEW DERIVATIVE OPERATOR

ADRIANA CATAS1∗, ROXANA SENDRUTIU2

Abstract. In the present paper, we define and investigate a new class of mul-

tivalent harmonic functions in the open unit disc U = z ∈ C : |z| < 1, under

certain conditions involving a new generalized differential operator. Coefficient

inequalities, distortion bounds and a covering result are also obtained.

Keywords: differential operator, harmonic function, coefficient bounds.

2000 Mathematical Subject Classification: 30C45.

1. Introduction

A continuous complex-valued function f = u + iv defined in a simply connected

complex domain D is said to be harmonic in D if both u and v are real harmonic

in D. In any simple connected domain we can write f = h + g, where h and g are

analytic in D. A necessary and sufficient condition for f to be univalent and sense

preserving in D is that |h′(z)| > |g′(z)|, z ∈ D. (See [4] for more details.)

Denote by SH(p, n), (p, n ∈ N = 1, 2, . . .) the class of functions f = h + g that

are harmonic multivalent and sense-preserving in the unit disc U for which f(0) =

fz(0)− 1 = 0. Then for f = h + g ∈ SH(p, n) we may express the analytic functions

h and g as

(1.1) h(z) = zp +∞∑

k=p+n

akzk, g(z) =

∞∑k=p+n−1

bkzk, |bp+n−1| < 1.

Let SH(p, n,m), (p, n ∈ N,m ∈ N0∪0) denote the family of functions fm = h+gmthat are harmonic in D with the normalization

(1.2) h(z) = zp −∞∑

k=p+n

|ak|zk, gm(z) = (−1)m∞∑

k=p+n−1

|bk|zk, |bp+n−1| < 1.

2. Coefficient bounds for the new classes ALH(p,m, δ, α, λ, l) and

ALH(p,m, δ, α, λ, l)

We propose for the beginning a new generalized differential operator as follows.

Definition 2.1. Let H(U) denote the class of analytic functions in the open unit

disc U = z ∈ C : |z| < 1 and let A(p) be the subclass of the functions belonging

1

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 28, NO.5, 2020, COPYRIGHT 2020 EUDOXUS PRESS, LLC

775 CATAS-SENDRUTIU 775-780

Page 12: Journal of Computational Analysis and Applicationseudoxuspress.com/images/JOCAAA-VOL-28-2020-ISSUE-5.pdfBaltimore, MD 21251, USA tel: 1-443-885-4373 Fax 1-443-885-8216 Gaston.N'Guerekata@morgan.edu

2 A. Catas, R. Sendrutiu

to H(U) of the form h(z) = zp +∑∞k=p+n akz

k. For m ∈ N0, λ ≥ 0, δ ∈ N0, l ≥ 0 we

define the generalized differential operator Imλ,δ(p, l) on A(p)

(2.1) Imλ,δ(p, l)h(z) = (p+ l)mzp +∞∑

k=p+n

[p+ λ(k − p) + l]mC(δ, k)akzk,

(2.2) C(δ, k) =

(k + δ − 1

δ

)=

Γ(k + δ)

Γ(k)Γ(δ + 1).

Remark 2.2. When λ = 1, p = 1, l = 0, δ = 0 we get Salagean differential operator

[10]; p = 1, m = 0 gives Ruscheweyh operator [9]; p = 1, l = 0, δ = 0 implies Al-

Oboudi differential operator of order m (see [1]); λ = 1, p = 1, l = 0 operator (2.1)

reduces to Al-Shaqsi and Darus differential operator [2] and when p = 1, l = 0 we

reobtain the operator introduced by Darus and Ibrahim in [5].

Definition 2.3. Let f ∈ SH(p, n), p ∈ N. Using the operator (2.1) for f = h + g

given by (1.1) we define the differential operator of f as

(2.3) Imλ,δ(p, l)f(z) = Imλ,δ(p, l)h(z) + (−1)mImλ,δ(p, l)g(z)

(2.4) Imλ,δ(p, l)h(z) = (p+ l)mzp +

∞∑k=p+n

[p+ λ(k − p) + l]mC(δ, k)akzk

(2.5) Imλ,δ(p, l)g(z) =∞∑

k=p+n−1

[p+ λ(k − p) + l]mC(δ, k)bkzk.

Remark 2.4. When λ = 1, l = 0, δ = 0 the operator (2.3) reduces to the operator

introduced earlier in [7] by Jahangiri et al.

Definition 2.5. A function f ∈ SH(p, n) belongs to the class ALH(p,m, δ, α, λ, l) if

(2.6)1

p+ lRe

Im+1λ,δ (p, l)f(z)

Imλ,δ(p, l)f(z)

≥ α, 0 ≤ α < 1,

where Imλ,δf is defined by (2.3), for m ∈ N0. Finally, we define the subclass

(2.7) ALH(p,m, δ, α, λ, l) ≡ ALH(p,m, δ, α, λ, l) ∩ SH(p, n,m).

Remark 2.6. The class ALH(p,m, δ, α, λ, l) includes a variety of well-known subclasses

of SH(p, n). For example, letting n = 1 we get ALH(1, 1, 0, α, 1, 0) ≡ HK(α) in [6],

for n = 1, ALH(1,m − 1, 0, α, 1, 0) ≡ SH(t, u, α) in [11], ALH(p, n + p, 0, α, 1, 0) ≡SHp(n, α) in [8] and n = 1, ALH(1,m, δ, α, 1, 0) ≡MH(m, δ, α) in [3].

Theorem 2.7. Let f = h+ g be given by (1.1). If

(2.8)∞∑

k=p+n

[(p+ l)(1− α) + λ(k − p)]dp,k(m,λ, l)C(δ, k)

(p+ l)m+1(1− α)|ak|+

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 28, NO.5, 2020, COPYRIGHT 2020 EUDOXUS PRESS, LLC

776 CATAS-SENDRUTIU 775-780

Page 13: Journal of Computational Analysis and Applicationseudoxuspress.com/images/JOCAAA-VOL-28-2020-ISSUE-5.pdfBaltimore, MD 21251, USA tel: 1-443-885-4373 Fax 1-443-885-8216 Gaston.N'Guerekata@morgan.edu

On harmonic multivalent functions defined by a new derivative operator 3

+∞∑

k=p+n−1

[(p+ l)(1 + α) + λ(k − p)]dp,k(m,λ, l)C(δ, k)

(p+ l)m+1(1− α)|bk| ≤ 1,

with λn ≥ α(p+ l), where

(2.9) dp,k(m,λ, l) = [p+ λ(k − p) + l]m

then f ∈ ALH(p,m, δ, α, λ, l).

Proof. Using the fact that 1p+lRe w ≥ α if and only if |(p + l) − (p + l)α + w| ≥

|(p+ l) + (p+ l)α− w|, it is sufficient to show that

(2.10) |(p+ l)(1− α)Imλ,δ(p, l)f(z) + Im+1λ,δ (p, l)f(z)|−

−|(p+ l)(1 + α)Imλ,δ(p, l)f(z)− Im+1λ,δ (p, l)f(z)| ≥ 0.

Substituting Imλ,δ(p, l)f(z) and Im+1λ,δ (p, l)f(z) in (2.10) yields by (2.8)

|(p+ l)(1− α)Imλ,δ(p, l)f(z) + Im+1λ,δ (p, l)f(z)|−

−|(p+ l)(1 + α)Imλ,δ(p, l)f(z)− Im+1λ,δ (p, l)f(z)| >

> 2(p+ l)m+1(1− α)

1−∞∑

k=p+n

[(p+ l)(1− α) + λ(k − p)]dp,k(m,λ, l)C(δ, k)

(p+ l)m+1(1− α)|ak|−

−∞∑

k=p+n−1

[(p+ l)(1 + α) + λ(k − p)]dp,k(m,λ, l)C(δ, k)

(p+ l)m+1(1− α)|bk|

.

The last expression is nonnegative by (2.8) and therefore the proof is complete.

Remark 2.8. The harmonic function

(2.11) f(z) = zp +∞∑

k=p+n

(p+ l)m+1(1− α)

[(p+ l)(1− α) + λ(k − p)]dp,k(m,λ, l)C(δ, k)xkz

k+

+

∞∑k=p+n−1

(p+ l)m+1(1− α)

[(p+ l)(1 + α) + λ(k − p)]dp,k(m,λ, l)C(δ, k)ykzk,

where∑∞k=p+n |xk| +

∑∞k=p+n−1 |yk| = 1, 0 ≤ α < 1, m ∈ N0, λn ≥ α(p + l), λ ≥ 0

and dp,k(m,λ, l) is given in (2.9), show that the coefficient bound expressed by (2.8)

is sharp.

Theorem 2.9. Let fm = h + gm be given by (1.2). Then fm ∈ ALH(p,m, δ, α, λ, l)

if and only if

(2.12)

∞∑k=p+n

[(p+ l)(1− α) + λ(k − p)]dp,k(m,λ, l)C(δ, k)

(p+ l)m+1(1− α)|ak|+

+∞∑

k=p+n−1

[(p+ l)(1 + α) + λ(k − p)]dp,k(m,λ, l)C(δ, k)

(p+ l)m+1(1− α)|bk| ≤ 1,

where λn ≥ α(p+ l), 0 ≤ α < 1, m ∈ N0, λ ≥ 0 and dp,k(m,λ, l) is given in (2.9).

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 28, NO.5, 2020, COPYRIGHT 2020 EUDOXUS PRESS, LLC

777 CATAS-SENDRUTIU 775-780

Page 14: Journal of Computational Analysis and Applicationseudoxuspress.com/images/JOCAAA-VOL-28-2020-ISSUE-5.pdfBaltimore, MD 21251, USA tel: 1-443-885-4373 Fax 1-443-885-8216 Gaston.N'Guerekata@morgan.edu

4 A. Catas, R. Sendrutiu

Proof. Since ALH(p,m, δ, α, λ, l) ⊂ ALH(p,m, δ, α, λ, l), we only need to prove the

”only if” part of the theorem. For this part we consider that fm ∈ ALH(p,m, δ, α, λ, l).

Then

Re

Im+1λ,δ (p, l)f(z)

Imλ,δ(p, l)f(z)− α(p+ l)

=

Re

(p+ l)m+1(1− α)zp −

∞∑k=p+n

[(p+ l)(1− α) + λ(k − p)]ξ(m,λ, l; δ, k)akzk

(p+ l)mzp −∞∑

k=p+n

ξ(m,λ, l; δ, k)akzk + (−1)2m

∞∑k=p+n−1

ξ(m,λ, l; δ, k)bkzk

(−1)2m

∞∑k=p+n−1

[(p+ l)(1 + α) + λ(k − p)]ξ(m,λ, l; δ, k)bkzk

(p+ l)mzp −∞∑

k=p+n

ξ(m,λ, l; δ, k)akzk + (−1)2m

∞∑k=p+n−1

ξ(m,λ, l; δ, k)bkzk

≥ 0,

where ξ(m,λ, l; δ, k) = dp,k(m,λ, l)C(δ, k).

The above required condition must hold for all values of z in U . Upon choosing the

values of z on the positive real axis where 0 ≤ |z| = r < 1, we must have

(2.13)

(p+ l)m+1(1− α)−∞∑

k=p+n

[(p+ l)(1− α) + λ(k − p)]ξ(m,λ, l; δ, k)|ak|rk−p

(p+ l)m −∞∑

k=p+n

ξ(m,λ, l; δ, k)|ak|rk−p +∞∑

k=p+n−1

ξ(m,λ, l; δ, k)|bk|rk−p−

∞∑k=p+n−1

[(p+ l)(1 + α) + λ(k − p)]ξ(m,λ, l; δ, k)|bk|rk−p

(p+ l)m −∞∑

k=p+n

ξ(m,λ, l; δ, k)|ak|rk−p +∞∑

k=p+n−1

ξ(m,λ, l; δ, k)|bk|rk−p≥ 0.

If the condition (2.12) does not hold, then the numerator in (2.13) is negative for r

sufficiently close to 1. Hence there exists a z0 = ro in (0, 1) for which the quotient in

(2.13) is negative. This contradicts the required condition for f ∈ ALH(p,m, δ, α, λ, l)

and so the proof is complete.

3. Distortion bounds

The following theorem gives the distortion bounds for functions in

ALH(p,m, δ, α, λ, l) which yields a covering result for this class.

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 28, NO.5, 2020, COPYRIGHT 2020 EUDOXUS PRESS, LLC

778 CATAS-SENDRUTIU 775-780

Page 15: Journal of Computational Analysis and Applicationseudoxuspress.com/images/JOCAAA-VOL-28-2020-ISSUE-5.pdfBaltimore, MD 21251, USA tel: 1-443-885-4373 Fax 1-443-885-8216 Gaston.N'Guerekata@morgan.edu

On harmonic multivalent functions defined by a new derivative operator 5

Theorem 3.1. Let f ∈ ALH(p,m, δ, α, λ, l), with 0 ≤ α < 1, λn ≥ α(p+ l), m ∈ N0,

λ ≥ 0. Then for |z| = r < 1 one obtains

(3.1) |f(z)| ≤ (1+ |bp+n−1|rn−1)rp+(p+ l)m+1(1− α)

[(p+ l)(1− α) + λn]dp,n+p(m,λ, l)C(δ, n+ p)·

·

1− [(p+ l)(1 + α) + λ(n− 1)]dp,n+p−1(m,λ, l)C(δ, n+ p− 1)

(p+ l)m+1(1− α)|bp+n−1|

rn+p

and

|f(z)| ≥ (1− |bp+n−1|rn−1)rp − (p+ l)m+1(1− α)

[(p+ l)(1− α) + λn]dp,n+p(m,λ, l)C(δ, n+ p)·

·

1− [(p+ l)(1 + α) + λ(n− 1)]dp,n+p−1(m,λ, l)C(δ, n+ p− 1)

(p+ l)m+1(1− α)|bp+n−1|

rn+p.

Proof. We only prove the left-hand inequality. The proof for the right-hand inequality

is similar and will be omitted.

Let f ∈ ALH(p,m, δ, α, λ, l). Taking the absolute value of f we have

|f(z)|= |zp−∞∑

k=p+n

akzk + (−1)m

∞∑k=p+n−1

bkzk| ≥ (1− |bp+n−1|rn−1)rp−

∞∑k=p+n

(|ak|+ |bk|)rp+n

= (1− |bp+n−1|rn−1)rp − (p+ l)m+1(1− α)

[(p+ l)(1− α) + λn]dp,n+p(m,λ, l)C(δ, n+ p)·

·∞∑

k=p+n

[(p+ l)(1− α) + λn]dp,p+n(m,λ, l)C(δ, p+ n)

(p+ l)m+1(1− α)(|ak|+ |bk|)rp+n ≥

(1− |bp+n−1|rn−1)rp − (p+ l)m+1(1− α)

[(p+ l)(1− α) + λn]dp,n+p(m,λ, l)C(δ, n+ p)·

·

1− [(p+ l)(1 + α) + λ(n− 1)]dp,n+p−1(m,λ, l)C(δ, n+ p− 1)

(p+ l)m+1(1− α)|bp+n−1|

rn+p.

The bounds given in Theorem 3.1 for the functions f of the form (1.2) also hold

for the functions of the form (1.1) if the coefficient condition (2.8) is satisfied. The

upper bound given for f ∈ ALH(p,m, δ, α, λ, l) is sharp and the equality occurs for

the function

f(z) = z + |bp+n−1|zp +(p+ l)m+1(1− α)

[(p+ l)(1− α) + λn]dp,n+p(m,λ, l)C(δ, n+ p)·

·

1− [(p+ l)(1 + α) + λ(n− 1)]dp,n+p−1(m,λ, l)C(δ, n+ p− 1)

(p+ l)m+1(1− α)|bp+n−1|

rn+p,

where |bp+n−1| ≤ (p+l)m+1(1−α)[(p+l)(1+α)+λ(n−1)]dp,n+p−1(m,λ,l)C(δ,n+p−1)

The following covering result follows from the left-hand inequality in Theorem 3.1.

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 28, NO.5, 2020, COPYRIGHT 2020 EUDOXUS PRESS, LLC

779 CATAS-SENDRUTIU 775-780

Page 16: Journal of Computational Analysis and Applicationseudoxuspress.com/images/JOCAAA-VOL-28-2020-ISSUE-5.pdfBaltimore, MD 21251, USA tel: 1-443-885-4373 Fax 1-443-885-8216 Gaston.N'Guerekata@morgan.edu

6 A. Catas, R. Sendrutiu

Corollary 3.2. If the function f ∈ ALH(p,m, δ, α, λ, l), thenw: |w|<[(p+ l)(1− α) + λn]dp,n+p(m,λ, l)C(δ, n+ p)− (p+ l)m+1(1− α)

[(p+ l)(1− α) + λn]dp,n+p(m,λ, l)C(δ, n+ p)−

−[(p+ l)(1− α) + λn]dp,n+p(m,λ, l)C(δ, n+ p)− Eαp,δ(m,λ, l)

[p(1− α) + λn+ l]dp,n+p(m,λ, l)C(δ, n+ p)· |bp+n−1|

⊂f(U)

where Eαp,δ(m,λ, l) = [(p+ l)(1 + α) + λ(n− 1)]dp,n+p−1(m,λ, l)C(δ, n+ p− 1).

References

[1] F. M. Al-Oboudi, On univalent functions defined by a generalized Salagean operator, Inter. J.

of Math. and Mathematical Sci., 27(2004), 1429-1436.

[2] K. Al-Shaqsi, M. Darus, An operator defined by convolution involving polylogarithms functions,

Journal of Math. and Statistics, 4(1)(2008), 46-50.

[3] K. Al-Shaqsi, M. Darus, On Harmonic Functions Defined by Derivative Operator, Journal of

Inequalities and Applications, vol. 2008, Article ID 263413, doi: 10.1155/2008/263413.

[4] J. Clunie and T. Sheil-Small, Harmonic Univalent Functions, Ann. Acad. Sci. Fenn, Ser. A I.

Math. 9(1984), 3-25.

[5] M. Darus, R. W. Ibrahim, On new classes of univalent harmonic functions defined by generalized

differential operator, Acta Universitatis Apulensis, 18(2009), 61-69.

[6] J. M. Jahangiri, Coefficient bounds and univalence criteria for harmonic functions with negative

coefficients, Ann. Univ. Mariae Curie-Sklowdowska Sect. A, 52(1998), 57-66.

[7] J. M. Jahangiri, G. Murugusundaramoorthy and K. Vijaya Salagean type harmonic univalent

functions South. J. Pure Appl. Math., 2(2002), 77-82.

[8] Om P. Ahuja and J. M. Jahangiri, Multivalent harmonic starlike functions with missing coeffi-

cients, Math. Sci. Res. J., 7(9)(2003), 347-352.

[9] St. Ruscheweyh, New criteria for univalent functions, Proc. Amer. Math. Soc., 49(1975), 109-

115.

[10] Gr. St. Salagean, Subclasses of univalent functions, Lecture Notes in Math., Springer Verlag,

Berlin, Heidelberg and New York, 1013(1983), 362-372.

[11] Sibel Yalcin, A new class of Salagean-type harmonic univalent functions Appl. Math. Letters,

18(2005), 191-198.

1 Department of Mathematics and Computer Sciences, University of Oradea,

Str. Universitatii, No.1, 410087 Oradea, Romania∗ Corresponding author: [email protected]

2 Faculty of Environmental Protection, University of Oradea,

Str. B-dul Gen. Magheru, No.26, 410048 Oradea, Romania

E-mail address: [email protected]

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 28, NO.5, 2020, COPYRIGHT 2020 EUDOXUS PRESS, LLC

780 CATAS-SENDRUTIU 775-780

Page 17: Journal of Computational Analysis and Applicationseudoxuspress.com/images/JOCAAA-VOL-28-2020-ISSUE-5.pdfBaltimore, MD 21251, USA tel: 1-443-885-4373 Fax 1-443-885-8216 Gaston.N'Guerekata@morgan.edu

GOOD AND SPECIAL WEAKLY PICARD OPERATORS

PROPERTIES FOR A CLASS OF DISCRETE LINEAR

OPERATORS

LOREDANA-FLORENTINA IAMBOR, ADRIANA CATAS

Abstract. Based on the results of the weakly Picard operators theory, in this

paper we study the good and special convergence of the iterates of a general

class of positive linear operators of discrete type introduced by O.Agratini andI.A. Rus ([1]).

2010 AMS Mathematics Subject Classification: 47H10, 41A36.Keywords and phrases: linear positive operators, weakly Picard operators, good

and special Picard operators.

1. Introduction and Preliminaries

The study of the convergence of the sequence of successive approximations isrealized in metric spaces. That is, for (X, d) metric space and A : X → X anoperator, for any x ∈ X can be considered the sequence:

(1) (Am (x))m∈N , x ∈ X

where A0 = 1X and Am = Am−1 A for m ∈ N∗.Investigating the properties of sequence (1), L. d’Apuzzo introduced in 1976

(see [3]) the good and special convergence, giving necessary and sufficient condi-tions for this kind of convergence (see [2]). In paper [3], she considers the goodand special convergence of type M, as a particular case, in which the sequence(d (Am (x) , A∞ (x)))m∈N, (respectively,

(d(Am (x) , Am−1 (x)

))m∈N ) is strictly de-

creasing for any x. I.A. Rus introduced, in paper (see [8]), the good and specialweakly Picard operators .

In what follow, let (X, d) be a metric space and A : X → X an operator. In thispaper we will use the following notations:P (X) := Y ⊂ X|Y 6= ∅ ;FA := x ∈ X|A (x) = x - the fixed point set of A;I (A) := Y ∈ P (X)|A (Y ) ⊂ Y - the family of the nonempty invariant subsetsof A.

Definition 1. (I.A. Rus - [6], [7], [8]) Let (X, d) be a metric space.1) An operator A : X → X is weakly Picard operator (briefly WPO) if the sequenceof successive approximations (Am (x0))m∈N converges for all x0 ∈ X and the limit(which may depend on x0) is a fixed point of A.2) If the operator A : X → X is WPO and FA = x∗, then by definition theoperator A is Picard operator (briefly PO).3) If the operator A : X → X is WPO, then can be considered the operator A∞

defined by A∞ : X → X, A∞ (x) := limm→∞

Am (x).

1

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 28, NO.5, 2020, COPYRIGHT 2020 EUDOXUS PRESS, LLC

781 IAMBOR-CATAS 781-785

Page 18: Journal of Computational Analysis and Applicationseudoxuspress.com/images/JOCAAA-VOL-28-2020-ISSUE-5.pdfBaltimore, MD 21251, USA tel: 1-443-885-4373 Fax 1-443-885-8216 Gaston.N'Guerekata@morgan.edu

2 LOREDANA-FLORENTINA IAMBOR, ADRIANA CATAS

The basic result in the WPO’s theory is the following:

Theorem 1. (Characterization theorem - [6], [7], [8]) An operator A : X → X isWPO if and only if there exits a partition of X, X =

⋃λ∈Λ

Xλ, such that:

(a) Xλ ∈ I (A) , ∀λ ∈ Λ;(b) A|Xλ : Xλ → Xλ is PO, ∀λ ∈ Λ.

Definition 2. Let (X, d) be a metric space and A : X → X a WPO.

1) A : X → X is good WPO, if the series∞∑m=1

d(Am−1 (x) , Am (x)

)converges, for

all x ∈ X (see [8]). In the case that the sequence(d(Am−1 (x) , Am (x)

))m∈N∗ is

strictly decreasing for all x ∈ X, the operator A is good WPO of type M (see [3]).

2) A : X → X is special WPO, if the series∞∑m=1

d (Am (x) , A∞ (x)) converges,

for all x ∈ X(see [8]). When the sequence (d (Am (x) , A∞ (x)))m∈N∗ is strictlydecreasing for all x ∈ X, A is special WPO of type M (see [3]).

In 2015, S. Muresan and L.F. Iambor obtained the following result regarding togood and special weakly Picard operators.

Theorem 2. ([5]) Let (X, d) be a metric space and A : X → X a WPO. If A isspecial WPO then A is good WPO.

In the paper [4], A.Bica and L.F. Galea(Iambor) introduced the notions of uni-form good and special weakly Picard operators like this:

Definition 3. (A.Bica, L.F. Galea - [4]) Let (X, d) be a metric space and F ⊂A|A : X → X a family of operators on X. We say that F is a family of uniformspecial (good) WPO’s if for any A ∈ F , A is special (good) WPO and there existthe functionals ϕ : X → R+ and ψ,ψ′ : F → R+ such that ϕ is continuous and

∞∑m=1

d (Am (x) , A∞ (x)) 6 ψ (A) · ϕ (x) , ∀ x ∈ X, ∀ A ∈ F

(respectively,∞∑m=1

d(Am (x) , Am−1 (x)

)6 ψ′ (A) · ϕ (x) , ∀ x ∈ X, ∀ A ∈ F ).

In what follow, we present the general class of linear positive operators of discretetype and some properties of these operators investigated by O. Agratini and I.A.Rus in [1].

At first they construct an approximation process of discrete type acting on thespace C ([a, b]) endowed with the Chebyshev norm ‖.‖.

For each integer n > 1 they consider the following:(i) A net on [a, b] named ∆n is fixed (a = xn,0 < xn,1 < ... < xn,n = b).(ii) A system (ψn,k)k=0,n is given, where every ψn,k belongs to C ([a, b]).

They assume that it is a blending system with a certain connection with ∆n,more precisely the following conditions hold:

ψn,k > 0,(k = 0, n

),

n∑k=0

ψn,k = e0,n∑k=0

xn,kψn,k = e1

Definition 4. (O.Agratini, I.A. Rus - [1]) The operators Ln : C ([a, b])→ C ([a, b])defined by

Ln (f) (x) =n∑k=0

ψn,k (x) f (xn,k)

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 28, NO.5, 2020, COPYRIGHT 2020 EUDOXUS PRESS, LLC

782 IAMBOR-CATAS 781-785

Page 19: Journal of Computational Analysis and Applicationseudoxuspress.com/images/JOCAAA-VOL-28-2020-ISSUE-5.pdfBaltimore, MD 21251, USA tel: 1-443-885-4373 Fax 1-443-885-8216 Gaston.N'Guerekata@morgan.edu

GOOD AND SPECIAL WEAKLY PICARD OPERATORS PROPERTIES FOR A CLASS OF DISCRETE LINEAR OPERATORS3

are called the operators of discrete type.

The operators of discrete type Ln, have the following properties:1) Ln, n ∈ N are positive linear operators;2) Ln (e0) = e0 and Ln (e1) = e1.

Theorem 3. (O.Agratini, I.A. Rus - [1]) Let Ln, n ∈ N, such that ψn,0 (a) =ψn,n (b) = 1. Let us denote un := min

x∈[a,b][Φn,0 (x) + Φn,n (x)].

If the un > 0 the iterates sequence (Lmn )m>1 verifies

limm→∞

(Lmn f) (x) = f (a) + f(a)−f(b)b−a (x− a) , f ∈ C ([a, b])

uniformly on [a, b].

Theorem 4. (O.Agratini, I.A. Rus - [1]) Let Ln, n ∈ N, such that ψn,0 (a) =ψn,n (b) = 1. Then the operator Ln is weakly Picard operator for every n ∈ N and

L∞n (f) = c1 (f) e1 + c2 (f)not= f∗ (x) , f ∈ C ([a, b])

where c1 (f) = f(b)−f(a)b−a and c2 (f) = bf(a)−af(b)

b−a .

The convergence exists on the space (C [a, b] , ‖.‖∞).In the application of Characterization theorem of weakly Picard operator, it was

considerate the partition of C ([a, b]):

C ([a, b]) :=⋃

α,β∈RXα,β

where Xα,β = f ∈ C ([a, b]) : f (a) = α, f (b) = β , α, β ∈ R.

Proposition 5. (O. Agratini, I.A. Rus - [1]) The operators of discrete type satisfiedthe following contraction property relative to above partition:

(2) ‖Ln (f)− Ln (g)‖∞ 6 (1− un) ‖f − g‖∞ , ∀ f, g ∈ Xα,β , α, β ∈ R

where un = minx∈[a,b]

[Φn,0 (x)− Φn,n (x)], un > 0.

2. Main results

In this section, we will investigate some properties of the iterates of discrete typeof operators in sense of good and special convergence.

Theorem 6. The operators of discrete type Ln, n ∈ N are special WPO and goodWPO of type M on C ([a, b]).

From Theorem 3, we have that Ln, n ∈ N is weakly Picard operator.Let f ∈ C ([a, b]). Then f ∈ Xf(a),f(b) and according to (1) we infer that Ln is

contraction on Xf(a),f(b). So, the operator Ln, n ∈ N is special WPO of type M onXf(a),f(b). Finally, we get that Ln, n ∈ N is special WPO of type M on C ([a, b]).

From Theorem 2, any special WPO is good WPO. Then we have that Ln, n ∈ Nis good WPO of type M on C ([a, b]).

Theorem 7. The family of the operators of discrete type Ln : n ∈ N∗ is familyof uniform special and good WPO’s on C [a, b].

Proof. Using the inequality (1), we obtain the estimation:∣∣L1n (f) (x)− L∞n (f) (x)

∣∣ =∣∣L1n (f) (x)− L1

n (L∞n (f)) (x)∣∣ 6

6 (1− un) |f (x)− L∞n (f) (x)| = (1− un) |f (x)− c1 (f) e1 − c2 (f)| 6

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 28, NO.5, 2020, COPYRIGHT 2020 EUDOXUS PRESS, LLC

783 IAMBOR-CATAS 781-785

Page 20: Journal of Computational Analysis and Applicationseudoxuspress.com/images/JOCAAA-VOL-28-2020-ISSUE-5.pdfBaltimore, MD 21251, USA tel: 1-443-885-4373 Fax 1-443-885-8216 Gaston.N'Guerekata@morgan.edu

4 LOREDANA-FLORENTINA IAMBOR, ADRIANA CATAS

6 (1− un) · C, ∀ x ∈ [a, b],where C = diam (Im f) + 2 max |f (a)| , |f (b)|, withdiam (Im f) = max |f (x)− f (y)| : x, y ∈ [a, b].

The constant C was obtained using the following technique:

• If x = a then:|f (x)− L∞n (f) (x)| 6

∣∣∣f (x)− f(b)−f(a)b−a · a− bf(a)−af(b)

b−a

∣∣∣ =

=∣∣∣f (x)− f(a)(b−a)

b−a

∣∣∣ = |f (x)− f (a)| 6 diam (Im f)

• If x = b then:|f (x)− L∞n (f) (x)| 6

∣∣∣f (x)− f(b)−f(a)b−a · b− bf(a)−af(b)

b−a

∣∣∣ =

=∣∣∣f (x)− f(b)(b−a)

b−a

∣∣∣ = |f (x)− f (b)| 6 diam (Im f)

• If x ∈ [a, b] then:

|f (x)− L∞n (f) (x)| 6∣∣∣f (x)− f(b)−f(a)

b−a · x− bf(a)−af(b)b−a

∣∣∣ =

=∣∣∣f (x)− x−a

b−a · f (b) + b−xb−a · f (a)

∣∣∣ 66 |f (x)− f (b)|+ |f (b)| ·

∣∣∣1− x−ab−a

∣∣∣+∣∣∣ b−xb−a

∣∣∣ · |f (a)| 66 diam (Im f) + 2 max |f (a)| , |f (b)| .

By induction, for m ∈ N∗, we have:|Lmn (f) (x)− L∞n (f) (x)| =

∣∣L1n

(Lm−1n (f)

)(x)− L1

n (L∞n (f)) (x)∣∣ 6

6 (1− un)m · C, ∀ x ∈ [a, b] .

Then,∞∑m=1|Lmn (f) (x)− L∞n (f) (x)| 6

6 limm→∞

C[(1− un) + (1− un)

2+ ...+ (1− un)

m]

=

= limm→∞

[C (1− un) · 1−(1−un)m

un

]6 C · 1−un

un(2)

On the other hand, we have:∣∣L1n (f) (x)− L0

n (f) (x)∣∣ =

∣∣∣∣ n∑k=0

ψn,k (x)f (xn,k)− f (x)

∣∣∣∣ =

=

∣∣∣∣ n∑k=0

ψn,k (x) [f (xn,k)− f (x)]

∣∣∣∣ 6 C ′n∑k=0

ψn,k (x) = C ′e0, ∀ x 6 [a, b], where

C ′ = diam (Im f) = max |f (x)− f (y)| : x, y ∈ [a, b] .By induction, for m ∈ N, we have:∣∣Lmn (f) (x)− Lm−1

n (f) (x)∣∣ =

∣∣L1n

(Lm−1n (f)

)(x)− L1

n

(Lm−2n (f)

)(x)∣∣ 6

6 (1− un)m−1 · C ′e0, ∀ x ∈ [a, b]

Then,∞∑m=1

∣∣Lmn (f) (x)− Lm−1n (f) (x)

∣∣ 66 limm→∞

C ′e0

[1 + (1− un) + (1− un)

2+ ...+ (1− un)

m−1]6

6 C ′e01

1−un , ∀ f ∈ C [a, b] (3).

Now, the property of uniform and special WPO follows from the estimations (2)and (3). For instance, for the property of uniform special WPO we have:

ϕ : C [a, b]→ R+, ϕ (f) = diam (Im f) + 2 max |f (a)| , |f (b)| and

ψ : Ln : n ∈ N∗ → R+, ψ (Ln) = 1−unun

, ∀ n ∈ N∗

and for the property of uniform good WPO we have:

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 28, NO.5, 2020, COPYRIGHT 2020 EUDOXUS PRESS, LLC

784 IAMBOR-CATAS 781-785

Page 21: Journal of Computational Analysis and Applicationseudoxuspress.com/images/JOCAAA-VOL-28-2020-ISSUE-5.pdfBaltimore, MD 21251, USA tel: 1-443-885-4373 Fax 1-443-885-8216 Gaston.N'Guerekata@morgan.edu

GOOD AND SPECIAL WEAKLY PICARD OPERATORS PROPERTIES FOR A CLASS OF DISCRETE LINEAR OPERATORS5

ϕ′ : C [a, b]→ R+, ϕ′ (f) = diam (Im f) and

ψ′ : Ln : n ∈ N∗ → R+, ψ′ (Ln) = 11−un e0, ∀ n ∈ N∗.

It is easy to prove that ϕ,ϕ′ : C [a, b]→ R+, ϕ (f) = diam (Im f)+2 max |f (a)| , |f (b)|and ϕ′ (f) = diam (Imf) are seminorms on C [a, b] andϕ (f − g) 6 2 ‖f − g‖C + 2 ‖f‖C , ϕ′ (f − g) 6 2 ‖f − g‖C

since |ϕ (f)− ϕ (g)| 6 ϕ (f − g) , ∀ f, g ∈ C [a, b] and|ϕ′ (f)− ϕ′ (g)| 6 ϕ′ (f − g) , ∀ f, g ∈ C [a, b]

we infer the ϕ, ϕ′ are continuous.

References

[1] O. Agratini, I.A. Rus Iterates of a class of discrete linear operators via contraction principle,

Comment. Math. Univ. Carolinae, 44(3), 2003, 555-563.

[2] L. D’Apuzzo, On the convergence of the method of succesive approximation in metric spaces,Ann. Istit. Univ. Navale Napoli, 45/46(1976/1977)(in Italian).

[3] L. D’Apuzzo, On the notion of good and special convergence of the method of succesive

approximations, Ann. Istit. Univ. Navale Napoli, 45/46(1976/1977), 123-138, (in Italian).[4] A. Bica, L.F. Galea On Picard iterative properties of the Bernstein operators and an appli-

cation to fuzzy numbers, Comm. in Math. Analysis, 5(1), 2008, 8-19.

[5] S. Muresan, L.F. Iambor, On good and special weakly Picard operators, Analele UniversitatiiOradea, Fasc. Matematica, Tom XXII, Issue No.1, pp.5-10, 2015.

[6] I. A. Rus, Generalized Contractions and Applications, Cluj University Press, 2001, (in Roma-

nian).[7] I. A. Rus, Weakly Picard Operators and Applications, Seminar on Fixed Point Theory Cluj-

Napoca, Volume2, 41-58, 2001.[8] I. A. Rus, Picard operators and applications, Sci. Math.Japon., 58 (1), pp.191-219, 2003.

Department of Mathematics and Computer Science, University of Oradea, Str. Uni-

versitatii No.1, 410087, Oradea, Romania,

E-mail address: [email protected], [email protected]

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 28, NO.5, 2020, COPYRIGHT 2020 EUDOXUS PRESS, LLC

785 IAMBOR-CATAS 781-785

Page 22: Journal of Computational Analysis and Applicationseudoxuspress.com/images/JOCAAA-VOL-28-2020-ISSUE-5.pdfBaltimore, MD 21251, USA tel: 1-443-885-4373 Fax 1-443-885-8216 Gaston.N'Guerekata@morgan.edu

General Iyengar type Inequalities

George A. AnastassiouDepartment of Mathematical Sciences

University of MemphisMemphis, TN 38152, [email protected]

Abstract

Here we present general Iyengar type inequalities with respect to Lpnorms, with 1 p 1. The method is based on the generalized Taylorsformula.

2010 Mathematics Subject Classication: 26D10, 26D15.Key Words and Phrases: Iyengar inequality, Taylor formula.

1 Introduction

We are motivated by the following famous Iyengar inequality (1938), [2].

Theorem 1 Let f be a di¤erentiable function on [a; b] and jf 0 (x)j M . ThenZ b

a

f (x) dx 12(b a) (f (a) + f (b))

M (b a)4

2

(f (b) f (a))2

4M: (1)

2 Main Results

We present the following Iyengar type inequalities:

Theorem 2 Let n 2 N, f 2 ACn ([a; b]) (i.e. f (n1) 2 AC ([a; b]), absolutelycontinuous functions). We assume that f (n) 2 L1 ([a; b]). Theni)Z b

a

f (x) dxn1Xk=0

1

(k + 1)!

hf (k) (a) (t a)k+1 + (1)kf (k) (b) (b t)k+1

i f (n) L1([a;b])

(n+ 1)!

h(t a)n+1 + (b t)n+1

i; (2)

8 t 2 [a; b] ;

1

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 28, NO.5, 2020, COPYRIGHT 2020 EUDOXUS PRESS, LLC

786 Anastassiou 786-797

Page 23: Journal of Computational Analysis and Applicationseudoxuspress.com/images/JOCAAA-VOL-28-2020-ISSUE-5.pdfBaltimore, MD 21251, USA tel: 1-443-885-4373 Fax 1-443-885-8216 Gaston.N'Guerekata@morgan.edu

ii) at t = a+b2 , the right hand side of (2) is minimized, and we get:

Z b

a

f (x) dxn1Xk=0

1

(k + 1)!

(b a)k+1

2k+1

hf (k) (a) + (1)kf (k) (b)

i f (n) L1([a;b])

(n+ 1)!

(b a)n+1

2n; (3)

iii) if f (k) (a) = f (k) (b) = 0, for all k = 0; 1; :::; n 1, we obtainZ b

a

f (x) dx

f (n)

L1([a;b])

(n+ 1)!

(b a)n+1

2n; (4)

which is a sharp inequality,iv) more generally, for j = 0; 1; 2; :::; N 2 N, it holds

Z b

a

f (x) dxn1Xk=0

1

(k + 1)!

b aN

k+1 hjk+1f (k) (a) + (1)k (N j)k+1 f (k) (b)

i f (n) L1([a;b])

(n+ 1)!

b aN

n+1 hjn+1 + (N j)n+1

i; (5)

v) if f (k) (a) = f (k) (b) = 0, k = 1; :::; n 1; from (5) we get:Z b

a

f (x) dxb aN

[jf (a) + (N j) f (b)]

f (n) L1([a;b])

(n+ 1)!

b aN

n+1 hjn+1 + (N j)n+1

i; (6)

for j = 0; 1; 2; :::; N 2 N;vi) when N = 2 and j = 1, (6) turns to

Z b

a

f (x) dxb a2

(f (a) + f (b))

f (n) L1([a;b])

(n+ 1)!

(b a)n+1

2n; (7)

vii) when n = 1 (without any boundary conditions), we get from (7) thatZ b

a

f (x) dxb a2

(f (a) + f (b))

kf 0k1;[a;b]

(b a)2

4; (8)

a similar to Iyengar inequality (1).

2

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 28, NO.5, 2020, COPYRIGHT 2020 EUDOXUS PRESS, LLC

787 Anastassiou 786-797

Page 24: Journal of Computational Analysis and Applicationseudoxuspress.com/images/JOCAAA-VOL-28-2020-ISSUE-5.pdfBaltimore, MD 21251, USA tel: 1-443-885-4373 Fax 1-443-885-8216 Gaston.N'Guerekata@morgan.edu

Proof. Here n 2 N and f (n1) is absolutely continuous on [a; b]. We as-sumed that f (n)

1;[a;b]:= f (n)

L1([a;b])< +1:

By [1], we have the following generalized Taylors formulae:

f (x)n1Xk=0

f (k) (a)

k!(x a)k = 1

(n 1)!

Z x

a

(x t)n1 f (n) (t) dt (9)

and

f (x)n1Xk=0

f (k) (b)

k!(x b)k = 1

(n 1)!

Z x

b

(x t)n1 f (n) (t) dt; (10)

8 x 2 [a; b] :Then we getf (x)

n1Xk=0

f (k) (a)

k!(x a)k

f (n) 1;[a;b]

n!(x a)n ; (11)

8 x 2 [a; b] ;andf (x)

n1Xk=0

f (k) (b)

k!(x b)k

= 1

(n 1)!

Z x

b

(x t)n1 f (n) (t) dt =

1

(n 1)!

Z b

x

(t x)n1 f (n) (t) dt 1

(n 1)!

Z b

x

(t x)n1f (n) (t) dt

f (n) 1;[a;b]

n!(b x)n ;

that is f (x)n1Xk=0

f (k) (b)

k!(x b)k

f (n) 1;[a;b]

n!(b x)n ; (12)

8 x 2 [a; b] :We call

:=

f (n) 1;[a;b]

n!: (13)

So we have

(x a)n f (x)n1Xk=0

f (k) (a)

k!(x a)k (x a)n (14)

3

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 28, NO.5, 2020, COPYRIGHT 2020 EUDOXUS PRESS, LLC

788 Anastassiou 786-797

Page 25: Journal of Computational Analysis and Applicationseudoxuspress.com/images/JOCAAA-VOL-28-2020-ISSUE-5.pdfBaltimore, MD 21251, USA tel: 1-443-885-4373 Fax 1-443-885-8216 Gaston.N'Guerekata@morgan.edu

and

(b x)n f (x)n1Xk=0

f (k) (b)

k!(x b)k (b x)n ; (15)

8 x 2 [a; b] :Therefore it holds

n1Xk=0

f (k) (a)

k!(x a)k (x a)n f (x)

n1Xk=0

f (k) (a)

k!(x a)k + (x a)n

(16)and

n1Xk=0

f (k) (b)

k!(x b)k (b x)n f (x)

n1Xk=0

f (k) (b)

k!(x b)k + (b x)n ;

(17)8 x 2 [a; b] :Let any t 2 [a; b], then

n1Xk=0

f (k) (a)

(k + 1)!(t a)k+1

(n+ 1)(t a)n+1

Z t

a

f (x) dx

n1Xk=0

f (k) (a)

(k + 1)!(t a)k+1 +

(n+ 1)(t a)n+1 ; (18)

and

n1Xk=0

f (k) (b)

(k + 1)!(t b)k+1

(n+ 1)(b t)n+1

Z b

t

f (x) dx (19)

n1Xk=0

f (k) (b)

(k + 1)!(t b)k+1 +

(n+ 1)(b t)n+1 :

Adding (18) and (19), we obtain:(n1Xk=0

1

(k + 1)!

hf (k) (a) (t a)k+1 f (k) (b) (t b)k+1

i)

(n+ 1)

h(t a)n+1 + (b t)n+1

iZ b

a

f (x) dx (n1Xk=0

1

(k + 1)!

hf (k) (a) (t a)k+1 f (k) (b) (t b)k+1

i)+

(n+ 1)

h(t a)n+1 + (b t)n+1

i; (20)

8 t 2 [a; b] :

4

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 28, NO.5, 2020, COPYRIGHT 2020 EUDOXUS PRESS, LLC

789 Anastassiou 786-797

Page 26: Journal of Computational Analysis and Applicationseudoxuspress.com/images/JOCAAA-VOL-28-2020-ISSUE-5.pdfBaltimore, MD 21251, USA tel: 1-443-885-4373 Fax 1-443-885-8216 Gaston.N'Guerekata@morgan.edu

Consequently we derive:Z b

a

f (x) dxn1Xk=0

1

(k + 1)!

hf (k) (a) (t a)k+1 + (1)kf (k) (b) (b t)k+1

i

(n+ 1)

h(t a)n+1 + (b t)n+1

i; (21)

8 t 2 [a; b] :Let us consider

g (t) := (t a)n+1 + (b t)n+1 ; 8 t 2 [a; b] : (22)

Henceg0 (t) = (n+ 1) [(t a)n (b t)n] = 0,

giving (t a)n = (b t)n and t a = b t, that is t = a+b2 the only critical

number here.We have g (a) = g (b) = (b a)n+1, and g

a+b2

= (ba)n+1

2n , which is theminimum of g over [a; b].Consequently the right hand side of (21) is minimized when t = a+b

2 , with

valuekf(n)k1;[a;b]

(n+1)!(ba)n+1

2n . Assuming f (k) (a) = f (k) (b) = 0, for k = 0; 1; :::; n1, then we obtain that

Z b

a

f (x) dx

f (n) 1;[a;b]

(n+ 1)!

(b a)n+1

2n; (23)

which is a sharp inequality.When t = a+b

2 , then (21) becomesZ b

a

f (x) dxn1Xk=0

1

(k + 1)!

(b a)k+1

2k+1

hf (k) (a) + (1)kf (k) (b)

i f (n) 1;[a;b]

(n+ 1)!

(b a)n+1

2n: (24)

Next let N 2 N, j = 0; 1; 2; :::; N and tj = a + jbaN

, that is t0 = a, t1 =

a+ baN ; :::; tN = b:Hence it holds

tj a = jb aN

, (b tj) = (N j)

b aN

; j = 0; 1; 2; :::; N: (25)

We notice that

(tj a)n+1 + (b tj)n+1 =b aN

n+1 hjn+1 + (N j)n+1

i; (26)

5

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 28, NO.5, 2020, COPYRIGHT 2020 EUDOXUS PRESS, LLC

790 Anastassiou 786-797

Page 27: Journal of Computational Analysis and Applicationseudoxuspress.com/images/JOCAAA-VOL-28-2020-ISSUE-5.pdfBaltimore, MD 21251, USA tel: 1-443-885-4373 Fax 1-443-885-8216 Gaston.N'Guerekata@morgan.edu

j = 0; 1; 2; :::; N;and (k = 0; 1; :::; n 1)h

f (k) (a) (tj a)k+1 + (1)kf (k) (b) (b tj)k+1i="

f (k) (a) jk+1b aN

k+1+ (1)kf (k) (b) (N j)k+1

b aN

k+1#= (27)

b aN

k+1 hf (k) (a) jk+1 + (1)kf (k) (b) (N j)k+1

i;

j = 0; 1; 2; :::; N:By (21) we get

Z b

a

f (x) dxn1Xk=0

1

(k + 1)!

b aN

k+1 hf (k) (a) jk+1 + (1)kf (k) (b) (N j)k+1

i f (n) 1;[a;b]

(n+ 1)!

b aN

n+1 hjn+1 + (N j)n+1

i; (28)

j = 0; 1; 2; :::; N:If f (k) (a) = f (k) (b) = 0, k = 1; :::; n 1, then (28) becomes

Z b

a

f (x) dxb aN

[jf (a) + (N j) f (b)]

f (n) 1;[a;b]

(n+ 1)!

b aN

n+1 hjn+1 + (N j)n+1

i; (29)

for j = 0; 1; 2; :::; N:When N = 2 and j = 1, then (29) becomes

Z b

a

f (x) dxb a2

[f (a) + f (b)]

f (n) 1;[a;b]

(n+ 1)!

b a2

n+12 =

f (n) 1;[a;b]

(n+ 1)!

(b a)n+1

2n: (30)

And, if n = 1 (without any boundary conditions), we get from (30) thatZ b

a

f (x) dxb a2

(f (a) + f (b))

kf 0k1;[a;b]

(b a)2

4; (31)

which a similar inequality to Iyengar inequality (1).We give

6

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 28, NO.5, 2020, COPYRIGHT 2020 EUDOXUS PRESS, LLC

791 Anastassiou 786-797

Page 28: Journal of Computational Analysis and Applicationseudoxuspress.com/images/JOCAAA-VOL-28-2020-ISSUE-5.pdfBaltimore, MD 21251, USA tel: 1-443-885-4373 Fax 1-443-885-8216 Gaston.N'Guerekata@morgan.edu

Theorem 3 Let f 2 ACn ([a; b]), n 2 N. Theni)Z b

a

f (x) dxn1Xk=0

1

(k + 1)!

hf (k) (a) (t a)k+1 + (1)kf (k) (b) (b t)k+1

i (32) f (n)

L1([a;b])

n![(t a)n + (b t)n] ;

8 t 2 [a; b] ;ii) at t = a+b

2 , the right hand side of (32) is minimized, and we get:Z b

a

f (x) dxn1Xk=0

1

(k + 1)!

(b a)k+1

2k+1

hf (k) (a) + (1)kf (k) (b)

i f (n) L1([a;b])

n!

(b a)n

2n1; (33)

iii) if f (k) (a) = f (k) (b) = 0, for all k = 0; 1; :::; n 1, we obtainZ b

a

f (x) dx

f (n)

L1([a;b])

n!

(b a)n

2n1; (34)

which is a sharp inequality,iv) more generally, for j = 0; 1; 2; :::; N 2 N, it holds

Z b

a

f (x) dxn1Xk=0

1

(k + 1)!

b aN

k+1 hjk+1f (k) (a) + (1)k (N j)k+1 f (k) (b)

i f (n) L1([a;b])

n!

b aN

n[jn + (N j)n] ; (35)

v) if f (k) (a) = f (k) (b) = 0, k = 1; :::; n 1; from (35) we get:Z b

a

f (x) dxb aN

[jf (a) + (N j) f (b)]

f (n) L1([a;b])

n!

b aN

n[jn + (N j)n] ; (36)

for j = 0; 1; 2; :::; N 2 N;vi) when N = 2 and j = 1, (36) turns to

Z b

a

f (x) dx (b a)2

(f (a) + f (b))

7

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 28, NO.5, 2020, COPYRIGHT 2020 EUDOXUS PRESS, LLC

792 Anastassiou 786-797

Page 29: Journal of Computational Analysis and Applicationseudoxuspress.com/images/JOCAAA-VOL-28-2020-ISSUE-5.pdfBaltimore, MD 21251, USA tel: 1-443-885-4373 Fax 1-443-885-8216 Gaston.N'Guerekata@morgan.edu

f (n) L1([a;b])

n!

(b a)n

2n1; (37)

vii) when n = 1 (without any boundary conditions), we get from (37) thatZ b

a

f (x) dxb a2

(f (a) + f (b))

kf 0kL1([a;b]) (b a) : (38)

Proof. Here n 2 N and f (n1) is absolutely continuous on [a; b]. Hence f (n)exists almost everywhere and f (n) 2 L1 ([a; b]). By (9) we getf (x)

n1Xk=0

f (k) (a)

k!(x a)k

= 1

(n 1)!

Z x

a

(x t)n1 f (n) (t) dt

1

(n 1)!

Z x

a

(x t)n1f (n) (t) dt (x a)n1

(n 1)!

Z b

a

f (n) (t) dt (39)

=(x a)n1

(n 1)!

f (n) L1([a;b])

:

That is f (x)n1Xk=0

f (k) (a)

k!(x a)k

f (n)

L1([a;b])

(n 1)! (x a)n1 ; (40)

8 x 2 [a; b] :By (10) we getf (x)

n1Xk=0

f (k) (b)

k!(x b)k

= 1

(n 1)!

Z x

b

(x t)n1 f (n) (t) dt =

1

(n 1)!

Z b

x

(t x)n1 f (n) (t) dt 1

(n 1)!

Z b

x

(t x)n1f (n) (t) dt

(41)(b x)n1

(n 1)!

Z b

a

f (n) (t) dt = (b x)n1

(n 1)!

f (n) L1([a;b])

:

That is f (x)n1Xk=0

f (k) (b)

k!(x b)k

f (n)

L1([a;b])

(n 1)! (b x)n1 ; (42)

8 x 2 [a; b] :Set

:=

f (n) L1([a;b])

(n 1)! :

8

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 28, NO.5, 2020, COPYRIGHT 2020 EUDOXUS PRESS, LLC

793 Anastassiou 786-797

Page 30: Journal of Computational Analysis and Applicationseudoxuspress.com/images/JOCAAA-VOL-28-2020-ISSUE-5.pdfBaltimore, MD 21251, USA tel: 1-443-885-4373 Fax 1-443-885-8216 Gaston.N'Guerekata@morgan.edu

Hence f (x)n1Xk=0

f (k) (a)

k!(x a)k

(x a)n1 ; (43)

and f (x)n1Xk=0

f (k) (b)

k!(x b)k

(b x)n1 ; (44)

8 x 2 [a; b] :As in the proof of Theorem 2 we get:Z b

a

f (x) dxn1Xk=0

1

(k + 1)!

hf (k) (a) (t a)k+1 + (1)kf (k) (b) (b t)k+1

i

n[(t a)n + (b t)n] ; (45)

8 t 2 [a; b] :The rest of the proof is similar to the proof of Theorem 2.We continue with

Theorem 4 Let f 2 ACn ([a; b]), n 2 N; p; q > 1 : 1p +1q = 1, and f (n) 2

Lq ([a; b]). Theni)Z b

a

f (x) dxn1Xk=0

1

(k + 1)!

hf (k) (a) (t a)k+1 + (1)kf (k) (b) (b t)k+1

i (46) f (n)

Lq([a;b])

(n 1)!n+ 1

p

(p (n 1) + 1)

1p

h(t a)n+

1p + (b t)n+

1p

i;

8 t 2 [a; b] ;ii) at t = a+b

2 , the right hand side of (46) is minimized, and we get:Z b

a

f (x) dxn1Xk=0

1

(k + 1)!

(b a)k+1

2k+1

hf (k) (a) + (1)kf (k) (b)

i f (n) Lq([a;b])

(n 1)!n+ 1

p

(p (n 1) + 1)

1p

(b a)n+1p

2n1q

; (47)

iii) if f (k) (a) = f (k) (b) = 0, for all k = 0; 1; :::; n 1, we obtainZ b

a

f (x) dx

f (n)

Lq([a;b])

(n 1)!n+ 1

p

(p (n 1) + 1)

1p

(b a)n+1p

2n1q

; (48)

9

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 28, NO.5, 2020, COPYRIGHT 2020 EUDOXUS PRESS, LLC

794 Anastassiou 786-797

Page 31: Journal of Computational Analysis and Applicationseudoxuspress.com/images/JOCAAA-VOL-28-2020-ISSUE-5.pdfBaltimore, MD 21251, USA tel: 1-443-885-4373 Fax 1-443-885-8216 Gaston.N'Guerekata@morgan.edu

which is a sharp inequality,iv) more generally, for j = 0; 1; 2; :::; N 2 N, it holds

Z b

a

f (x) dxn1Xk=0

1

(k + 1)!

b aN

k+1 hjk+1f (k) (a) + (1)k (N j)k+1 f (k) (b)

i f (n) Lq([a;b])

(n 1)!n+ 1

p

(p (n 1) + 1)

1p

b aN

n+ 1p hjn+

1p + (N j)n+

1p

i; (49)

v) if f (k) (a) = f (k) (b) = 0, k = 1; :::; n 1; from (49) we get:Z b

a

f (x) dxb aN

[jf (a) + (N j) f (b)]

f (n) Lq([a;b])

(n 1)!n+ 1

p

(p (n 1) + 1)

1p

b aN

n+ 1p hjn+

1p + (N j)n+

1p

i; (50)

for j = 0; 1; 2; :::; N 2 N;vi) when N = 2 and j = 1, (50) turns to

Z b

a

f (x) dx (b a)2

(f (a) + f (b))

f (n) Lq([a;b])

(n 1)!n+ 1

p

(p (n 1) + 1)

1p

(b a)n+1p

2n1q

; (51)

vii) when n = 1 (without any boundary conditions), we get from (51) thatZ b

a

f (x) dxb a2

(f (a) + f (b))

kf 0kLq([a;b])1 + 1

p

(b a)1+1p

21p

: (52)

Proof. Here f (n) 2 Lq ([a; b]), where p; q > 1, such that 1p +

1q = 1. By (9)

we getf (x)n1Xk=0

f (k) (a)

k!(x a)k

= 1

(n 1)!

Z x

a

(x t)n1 f (n) (t) dt

1

(n 1)!

Z x

a

(x t)n1f (n) (t) dt

1

(n 1)!

Z x

a

(x t)p(n1) dt 1

pZ x

a

f (n) (t)q dt 1q

10

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 28, NO.5, 2020, COPYRIGHT 2020 EUDOXUS PRESS, LLC

795 Anastassiou 786-797

Page 32: Journal of Computational Analysis and Applicationseudoxuspress.com/images/JOCAAA-VOL-28-2020-ISSUE-5.pdfBaltimore, MD 21251, USA tel: 1-443-885-4373 Fax 1-443-885-8216 Gaston.N'Guerekata@morgan.edu

(x a)p(n1)+1

p

(n 1)! (p (n 1) + 1)1p

f (n) Lq([a;b])

: (53)

That isf (x)n1Xk=0

f (k) (a)

k!(x a)k

f (n)

Lq([a;b])

(n 1)! (p (n 1) + 1)1p

(x a)n1q ; (54)

8 x 2 [a; b] :By (10) we getf (x)

n1Xk=0

f (k) (b)

k!(x b)k

= 1

(n 1)!

Z b

x

(t x)n1 f (n) (t) dt

1

(n 1)!

Z b

x

(t x)n1f (n) (t) dt

1

(n 1)!

Z b

x

(t x)p(n1) dt! 1

p Z b

x

f (n) (t)q dt! 1q

(b x)p(n1)+1

p

(n 1)! (p (n 1) + 1)1p

f (n) Lq([a;b])

: (55)

That isf (x)n1Xk=0

f (k) (b)

k!(x b)k

f (n)

Lq([a;b])

(n 1)! (p (n 1) + 1)1p

(b x)n1q ; (56)

8 x 2 [a; b] :Set

:=

f (n) Lq([a;b])

(n 1)! (p (n 1) + 1)1p

; (57)

andm := n 1

q> 0: (58)

So, we can write f (x)n1Xk=0

f (k) (a)

k!(x a)k

(x a)m ; (59)

and f (x)n1Xk=0

f (k) (b)

k!(x b)k

(b x)m ; (60)

8 x 2 [a; b] :

11

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 28, NO.5, 2020, COPYRIGHT 2020 EUDOXUS PRESS, LLC

796 Anastassiou 786-797

Page 33: Journal of Computational Analysis and Applicationseudoxuspress.com/images/JOCAAA-VOL-28-2020-ISSUE-5.pdfBaltimore, MD 21251, USA tel: 1-443-885-4373 Fax 1-443-885-8216 Gaston.N'Guerekata@morgan.edu

As in the proof of Theorem 2 we obtain:Z b

a

f (x) dxn1Xk=0

1

(k + 1)!

hf (k) (a) (t a)k+1 + (1)kf (k) (b) (b t)k+1

i

(m+ 1)

h(t a)m+1 + (b t)m+1

i= (61) f (n)

Lq([a;b])

(n 1)! (p (n 1) + 1)1p

n+ 1

p

h(t a)n+ 1p + (b t)n+

1p

i; (62)

8 t 2 [a; b] :The rest of the proof is similar to the proof of Theorem 2.

References

[1] G.A. Anastassiou, S.S. Dragomir, On some estimates of the remainder inTaylors formula, J. Math. Anal. Appl., 263 (2001), 246-263.

[2] K.S.K. Iyengar, Note on an inequality, Math. Student, 6 (1938), 75-76.

12

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 28, NO.5, 2020, COPYRIGHT 2020 EUDOXUS PRESS, LLC

797 Anastassiou 786-797

Page 34: Journal of Computational Analysis and Applicationseudoxuspress.com/images/JOCAAA-VOL-28-2020-ISSUE-5.pdfBaltimore, MD 21251, USA tel: 1-443-885-4373 Fax 1-443-885-8216 Gaston.N'Guerekata@morgan.edu

A NOTE ON THE APPROXIMATE SOLUTIONS FOR STOCHASTICDIFFERENTIAL EQUATIONS DRIVEN BY G-BROWNIAN MOTION

F. Faizullah1, R. Ullah2, Jihen Majdoubi3, I. Tlili4, I. Khan5, Ghaus ur Rahman6

1Department of Mathematics, Swansea University, Singleton Park SA2 8PP UK2Department of Mathematics, Women University, Swabi, Pakistan.

3Department of computer science college of science and humanities at Alghat Majmaah University, P.O. Box 66 Majmaah11952, Kingdom of Saudi Arabia

4Department of Mechanical and Industrial Engineering, College of Engineering, Majmaah University, P.O. Box 66Majmaah 11952, Saudi Arabia

5Faculty of Mathematics and Statistics, Ton Duc Thang University, Ho Chi Minh City, Vietnam6Department of Mathematics & Statistics, University of Swat, Khyber Pakhtunkhwa, Pakistan

Abstract. By using the Caratheodory approximation method, the current article presents the

analysis of exact and approximate solutions for stochastic differential equations (SDEs) in the

framework of G-Brownian motion. In view of the non-linear growth and non-Lipschitz condi-

tions, the boundedness of the Caratheodory approximate solutions Y q(t), q ≥ 1 in the space

MG2 ([t0, T ];Rn) has been determined. Estimate for the difference between the exact solution Y (t)

and the Caratheodory approximate solutions Y q(t) has been derived.

Keywords: G-Brownian motion, non-linear growth and non-Lipschitz conditions, Caratheodoryapproximation procedure, bounded solutions, stochastic differential equationsMSC: 60H20, 60H10, 60H35, 62L20.

1. Introduction

Stochastic differential equations (SDEs) are employed by several and diverse scientific disciplinessuch as chemistry, statistical physics, biology and engineering. In finance and economics, theyare utilized to find out the risk measures and stochastic volatility problems. SDEs describe heavytraffic behavior of communication networks and control systems [16]. Mathematics use the conceptof SDEs to incorporate random fluctuations in the model when one investigates the evolution ofthe number of cells in an organism infected by a virus. The weather and climate can be modeledby these equations. The clarification of fluid through porous structures and water catchment canbe modeled by SDEs [17]. They are used to describe the motion of wildlife [4]. SDEs play animportant role to study the animal’s swarm, such as schooling of fish, flocking of birds or herdingof mammals, to find resource of food in noisy and obstacle environment [30]. In physics, SDEs areused to study and model the effect of random variations on distinct physical processes. A largeliterature is available on the applications of SDEs in numerous fields of engineering such as computerengineering [16, 22], mechanical engineering [26, 28, 29], random vibrations [3, 24], stability theory[25] and wave processes [27]. In general, one can not find the explicit solutions for non-linearSDEs, so we have to present and study the analysis for the solutions of these equations. Moreover,the developments of computational techniques are very important for solving several demandingproblems, for instance to find the optimal construction of a design and to determine input data fromfundamental principles. Therefore it is valuable to know computational accuracy, which leads usto convergence results and estimates for the difference between exact and approximate solutions.

1

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 28, NO.5, 2020, COPYRIGHT 2020 EUDOXUS PRESS, LLC

798 F. Faizullah et al 798-807

mu
Typewritten text
Corresponding author email (I. Khan): [email protected]
Page 35: Journal of Computational Analysis and Applicationseudoxuspress.com/images/JOCAAA-VOL-28-2020-ISSUE-5.pdfBaltimore, MD 21251, USA tel: 1-443-885-4373 Fax 1-443-885-8216 Gaston.N'Guerekata@morgan.edu

The aim of the current article is to investigate estimates for the difference between exact andapproximate solutions for SDEs driven by G-Brownian motion with Caratheodory approximationprocedure. In view of growth and Lipschitz conditions, the existence-uniqueness results for G-SDEswas studied by Peng [20, 21] and Gao [15]. Later, Bai and Lin [1] established the existence theoryfor G-SDEs with integral Lipschitz coefficients. Subject to some discontinuous coefficients, the saidtheory was generalized by Faizullah [11]. Let 0 ≤ t0 ≤ t ≤ T < ∞. Consider the following SDE inthe framework of G-Brownian motion

dY (t) =κ(t, Y (t))dt + λ(t, Y (t))d〈W,W 〉(t)+ µ(t, Y (t))dW (t),

(1.1)

with initial value Y (t0) ∈ Rn. The given coefficients g(., x), h(., x) and w(., x) belong to spaceM2

G([t0, T ];Rn), for all x ∈ Rn. SDE (1.1) in the integral form is expressed as the following

Y (t) = Y (t0) +∫ t

t0

κ(s, Y (s))ds +∫ t

t0

λ(s, Y (s))d〈W,W 〉(s)

+∫ t

t0

µ(s, Y (s))dW (s),(1.2)

on t ∈ [t0, T ]. Its solution is a process Y ∈ M2G([t0, T ];Rn) and satisfying SDE (1.2). The rest of the

current paper contains three sections. Building on the previous notions of G-expectation, section 2presents the fundamental definitions and results of G-Browinian motion, sub-expectation, Grown-wall’s inequality, Doobs martingale inequality, G-Ito’s integral and Holder’s inequality etc. Section3 reveals the Caratheodory approximate solutions procedure for SDEs driven by G-Brownian mo-tion. This section give an important result, which shows that the Caratheodory approximatesolutions are bounded. Section 4 derives estimates for the difference between approximate andexact solutions to SDEs driven by G-Brownian motion.

2. Preliminaries

We present some basic results and notions required for the subsequent sections of the currentarticle. We don’t give detailed literature on basic notions of G-expectation, so readers are suggestedto consult the more depth oriented papers [9, 13, 18, 20, 21]. Let Ω be a given basic non-emptyset. Assume H be a space of linear real functions defined on Ω so that (i) 1 ∈ H (ii) for everyn ≥ 1, Y1, Y2, ..., Yn ∈ H and ϕ ∈ Cb.Lip(Rn) it satisfies ϕ(Y1, Y2, ..., Yn) ∈ H i.e., subject toLipschitz bounded functions, H is stable. Then (Ω,H, E) is a sub-expectation space, where E is asub-expectation defined as follows.

Definition 2.1. A functional E : H → R satisfying the below four features is known as a sub-expectation. Let X,Y ∈ H, then

(1) Monotonicity: E(X) ≤ E(Y ) if X ≤ Y .(2) Constant preservation: E(M1) = M1, for all M1 ∈ R.(3) Positive homogeneity: E(N1Y ) = N1E(Y ), for all N1 ∈ R+.(4) Sub-additivity: E(X) + E(Y ) ≥ E(X + Y ).

2

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 28, NO.5, 2020, COPYRIGHT 2020 EUDOXUS PRESS, LLC

799 F. Faizullah et al 798-807

Page 36: Journal of Computational Analysis and Applicationseudoxuspress.com/images/JOCAAA-VOL-28-2020-ISSUE-5.pdfBaltimore, MD 21251, USA tel: 1-443-885-4373 Fax 1-443-885-8216 Gaston.N'Guerekata@morgan.edu

Moreover, let Ω be the space of all Rn-valued continuous paths (wt)t≥0 starting from zero. Inaddition, assume that subject to the below distance, Ω is a metric space

ρ(w1, w2) =∞∑

i=1

12i

( maxt∈[0,k]

|w1t − w2

t | ∧ 1).

Fix T ≥ 0 and set

L0ip(ΩT ) = φ(Wt1 ,Wt2 , ..., Wtm) : m ≥ 1, t1, t2, ..., tm ∈ [0, T ], φ ∈ Cb.Lip(Rm×n)),

where W is the canonical process, L0ip(Ωt) ⊆ L0

ip(ΩT ) for t ≤ T and L0ip(Ω) = ∪∞n=1L

0ip(Ωn).

The completion of L0ip(Ω) under the Banach norm E[|.|p] 1

p , p ≥ 1 is denoted by LpG(Ω), where

LpG(Ωt) ⊆ Lp

G(ΩT ) ⊆ LpG(Ω) for 0 ≤ t ≤ T < ∞. Generated by the canonical process W (t)t≥0,

the filtration is represented as Ft = σWs, 0 ≤ s ≤ t, F = Ftt≥0. Suppose πT = t0, t1, ..., tN,0 ≤ t0 ≤ t1 ≤ ... ≤ tN ≤ ∞ be a division of [0, T ]. For p ≥ 1, Mp,0

G (0, T ) denotes a set of theprocesses given by

(2.1) ηt(w) =N−1∑

i=0

ξi(w)I[ti,ti+1](t),

where ξi ∈ LpG(Ωti), i = 0, 1, ..., N − 1. Furthermore, the completion of Mp,0

G (0, T ) with the belowgiven norm is indicated by Mp

G(0, T ), p ≥ 1

‖η‖ = ∫ T

0E[|ηs|p]ds1/p.

Definition 2.2. An n-dimensional stochastic process W (t)t≥0 is called a G-Brownian motion if

(1) W (0) = 0.(2) For any t,m ≥ 0, Wt+m−Wt is G-normally distributed and independent from Wt1 ,Wt2 , ........Wtn ,

for n ∈ N and 0 ≤ t1 ≤ t2 ≤, ...,≤ tn ≤ t,

Definition 2.3. Let ηt ∈ M2,0G (0, T ) having the form (2.1). Then the G-quadratic variation process

〈W 〉tt≥0 and G-Ito’s integral I(η) are respectively defined by

〈W 〉t = W 2t − 2

∫ t

0WsdW (s),

I(η) =∫ T

0ηsdW (s) =

N−1∑

i=0

ξi(Wti+1 −Wti).

The following two lemmas can be found in the book [19]. They are known as Holder’s andGronwall’s inequalities respectively, .

Lemma 2.4. Assume m,n > 1 such that 1m + 1

n = 1 and β ∈ L2 then αβ ∈ L1 and

∫ b

aαβ ≤

(∫ b

a|α|m

) 1m

(∫ b

a|β|n

) 1n

.

3

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 28, NO.5, 2020, COPYRIGHT 2020 EUDOXUS PRESS, LLC

800 F. Faizullah et al 798-807

Page 37: Journal of Computational Analysis and Applicationseudoxuspress.com/images/JOCAAA-VOL-28-2020-ISSUE-5.pdfBaltimore, MD 21251, USA tel: 1-443-885-4373 Fax 1-443-885-8216 Gaston.N'Guerekata@morgan.edu

Lemma 2.5. Let α(t) ≥ 0 and β(t) be continuous real functions defined on [a, b]. If for all t ∈ [a, b],

β(t) ≤ K +∫ b

aα(s)β(s)ds,

where K ≥ 0, then

β(t) ≤ Ke∫ t

a α(s)ds,

for all t ∈ [a, b].

The following lemma, known as Doob’s martingale inequality, is borrowed from [15].

Lemma 2.6. Assume [c, d] be a bounded interval of R+. Consider an Rn valued G-martingaleX(t) : t ≥ 0. Then we have

E( supc≤t≤d

|Y (t)|p) ≤ (p

p− 1)pE(|Y (d)|P ),

where p > 1 and Y (t) ∈ LpG(Ω,Rd). In particular, if p = 2 then E(supc≤t≤d |Y (t)|2) ≤ 4E(|Y (d)|2).

3. Caratheodory approximate solutions

We now present the Caratheodory approximation procedure for equation (1.2). Let q ≥ 1 be anypositive integer. For t ∈ [t0 − 1, t0], we set Y q(t) = Y0 and for t ∈ [t0, T ],

Y q(t) = Y0 +∫ t

t0

κ(s, Y q(s− 1q))ds +

∫ t

t0

λ(s, Y q(s− 1q))d〈W,W 〉(s)

+∫ t

t0

µ(s, Y q(s− 1q))dW (s).

(3.1)

The approximate solutions Zq(.) can be determined step-by-step on the intervals [t0, t0 + 1q ], (t0 +

1q , t0 + 2

q ] and son on with the following procedure. For t ∈ [t0, t0 + 1q ], we have

Y q(t) = Y0 +∫ t

t0

κ(s, Y0)ds +∫ t

t0

λ(s, Y0)d〈W,W 〉(s)

+∫ t

t0

µ(s, Y0)dW (s),

and for t ∈ (t0 + 1q , t0 + 2

q ],

Y q(t) = Y q(t0 +1q) +

∫ t

t0+ 1q

κ(s, Y q(s− 1q))ds +

∫ t

t0+ 1q

λ(s, Y q(s− 1q))d〈W,W 〉(s)

+∫ t

t0+ 1q

µ(s, Y q(s− 1q))dW (s),

etc. All through this article, we assume two conditions, described as follows. Let M be a positiveconstant. For any t ∈ [t0, T ] and κ(t, 0), λ(t, 0), µ(t, 0) ∈ L2,

(3.2) |κ(t, 0)|2 + |λ(t, 0)|2 + |µ(t, 0)|2 ≤ M,4

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 28, NO.5, 2020, COPYRIGHT 2020 EUDOXUS PRESS, LLC

801 F. Faizullah et al 798-807

Page 38: Journal of Computational Analysis and Applicationseudoxuspress.com/images/JOCAAA-VOL-28-2020-ISSUE-5.pdfBaltimore, MD 21251, USA tel: 1-443-885-4373 Fax 1-443-885-8216 Gaston.N'Guerekata@morgan.edu

which is weakened linear growth condition. Let t ∈ [t0, T ]. For every u, v ∈ Rn, there exists aconcave non-decreasing function Ψ(.) : R+ → R+ with Ψ(0) = 0 and for s > 0, Ψ(s) > 0 such that

(3.3) |κ(t, u)− κ(t, v)|2 + |λ(t, u)− λ(t, v)|2 + |µ(t, u)− µ(t, v)|2 ≤ Ψ(|u− v|2),

where∫0+

dsΨ(s) = ∞ and for all s ≥ 0, C, D > 0, Ψ(s) ≤ C + Ds. Assumption (3.3) is a non-

uniform Lipschitz condition. Subject to conditions (3.2) and (3.3), we assume that problem (1.1)has a unique solution Y (t) ∈ M2

G([t0, T ];Rn) [1].

Lemma 3.1. Let assumptions (3.2) and (3.2) are satisfied. For every q ≥ 1 and any T > 0,

(3.4) supt0≤t≤T

E(|Y q(t)|2) ≤ N1,

where N1 = H1eH2(T−t0), H1 = 4E|Y0|2 + 8T (T + 2)(2M + C), H2 = 8(T + 2)D and M, C, D are

arbitrary positive constants.

Proof. In view of the inequality |∑4i=1 ci|2 ≤ 7

∑4i=1 |ci|2, from (3.1) we derive

|Y q(t)|2 ≤ 4|Y0|2 + 4|∫ t

t0

κ(s, Y q(s− 1q))ds|2 + 4|

∫ t

t0

λ(s, Y q(s− 1q))d〈W,W 〉(s)|2

+ 4|∫ t

t0

µ(s, Y q(s− 1q))dW (s)|2.

Apply G-subexpectation on both sides. Then by virtue of the Doob’s martingale, Holder’s andBDG [5] inequalities we have

E( supt0≤s≤t

|Y q(s)|2) ≤ 4E(|Y0|2) + 4T∫ t

t0

E|κ(s, Y q(s− 1q))|2ds + 4T

∫ t

t0

E|λ(s, Y q(s− 1q))|2ds

+ 16∫ t

t0

E|µ(s, Y q(s− 1q))|2ds

≤ 4E(|Y0|2) + 8T∫ t

t0

E[|κ(s, Y q(s− 1q))− κ(s, 0)|2 + |κ(s, 0)|2]ds

+ 8T

∫ t

t0

E[|λ(s, Y q(s− 1q))− λ(s, 0)|2 + |λ(s, 0)|2]ds

+ 32∫ t

t0

E[|µ(s, Y q(s− 1q))− µ(s, 0)|2 + |µ(s, 0)|2]ds.

Using (3.2) and (3.3), we derive

E( supt0≤s≤t

|Y q(s)|2) ≤ 4E(|Y0|2) + 16T 2M + 32TM + 8(T + 2)∫ t

t0

E[Ψ(|Y q(s− 1q)|2)]ds

≤ 4E(|Y0|2) + 16T 2M + 32TM + 8(T + 2)∫ t

t0

[C + DE|Y q(s− 1q)|2]ds

≤ 4E(|Y0|2) + 16T 2M + 32TM + 8T (T + 2)C + 8(T + 2)D∫ t

t0

E[ supt0≤r≤s

|Y q(r)|2]ds

5

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 28, NO.5, 2020, COPYRIGHT 2020 EUDOXUS PRESS, LLC

802 F. Faizullah et al 798-807

Page 39: Journal of Computational Analysis and Applicationseudoxuspress.com/images/JOCAAA-VOL-28-2020-ISSUE-5.pdfBaltimore, MD 21251, USA tel: 1-443-885-4373 Fax 1-443-885-8216 Gaston.N'Guerekata@morgan.edu

By virtue of the Grownwall’s inequality, we derive

E( supt0≤s≤t

|Y q(s)|2) ≤ H1eH2(t−t0),

where H1 = 4E|Y0|2 + 8T (T + 2)(2M + C) and H2 = 8(T + 2)D. Consequently, supposing t = T ,we obtain

E( supt0≤s≤T

|Y q(s)|2) ≤ H1eH2(T−t0) = N1.

The proof stands completed. ¤

In a similar way as lemma 3.1, we can prove the following result.

Lemma 3.2. Subject to the growth condition (3.2), for any T > 0,

(3.5) supt0≤t≤T

E(|Y (t)|2) ≤ N1,

where N1 is a positive constant.

4. Estimates for the difference between exact and Caratheodory approximate

solutions

We first give an important result. Then in view of weakened growth and non-uniform Lipschitzconditions, we derive an estimate for the difference between the approximate and exact solutionsto problem (1.1).

Lemma 4.1. Let 0 ≤ r < t ≤ T . Suppose that the assumptions of lemma 3.1 are satisfied. For allq ≥ 1

(4.1) E[|Zq(t)− Zq(u)|2] ≤ G1(t− u),

where G1 = 12(T + 2)(M + C + DN1), M , C, D and N1 are positive constants.

Proof. In view of the fundamental inequality |∑3i=1 ci|2 ≤ 7

∑3i=1 |ci|2, for any q ≥ 1 and 0 ≤ r <

t ≤ T , from (3.1) we derive

|Y q(t)− Y q(u)|2 ≤ 3|∫ t

uκ(s, Y q(s− 1

q))ds|2 + 3|

∫ t

uλ(s, Y q(s− 1

q))d〈W,W 〉(s)|2

+ 3|∫ t

uµ(s, Y q(s− 1

q))dW (s)|2.

6

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 28, NO.5, 2020, COPYRIGHT 2020 EUDOXUS PRESS, LLC

803 F. Faizullah et al 798-807

Page 40: Journal of Computational Analysis and Applicationseudoxuspress.com/images/JOCAAA-VOL-28-2020-ISSUE-5.pdfBaltimore, MD 21251, USA tel: 1-443-885-4373 Fax 1-443-885-8216 Gaston.N'Guerekata@morgan.edu

Apply G-subexpectation on both sides. Then by virtue of the Doob’s martingale, Holder’s andBDG [5] inequalities we have

|Y q(t)− Y q(r)|2 ≤ 3T

∫ t

uE|κ(s, Y q(s− 1

q))|2ds + 3T

∫ t

t0

E|λ(s, Y q(s− 1q))|2ds

+ 12∫ t

u|µ(s, Y q(s− 1

q))|2ds

≤ 6T

∫ t

uE[|κ(s, Y q(s− 1

q))− κ(s, 0)|2 + |κ(s, 0)|2]ds

+ 6T

∫ t

uE[|λ(s, Y q(s− 1

q))− λ(s, 0)|2 + |λ(s, 0)|2]ds

+ 24∫ t

uE[|µ(s, Y q(s− 1

q))− µ(s, 0)|2 + |µ(s, 0)|2]ds.

Using (3.2) (3.3), we derive

|Y q(t)− Y q(u)|2 ≤ 6TM(t− u) + 6TM(t− u) + 24M(t− u) + 12(T + 2)∫ t

uE[Ψ(|Y q(s− 1

q)|2)]ds

≤ 12TM(t− u) + 24M(t− u) + 12C(T + 2)(t− u) + 12D(T + 2)∫ t

uE[|Y q(s− 1

q)|2]ds

≤ 12TM(t− u) + 24M(t− u) + 12C(T + 2)(t− u)

+ 12D(T + 2)∫ t

uE[ sup

t0≤r≤s|Y q(r)|2]ds

In view of lemma 3.1, we have

|Y q(t)− Y q(u)|2 ≤ 12TM(t− u) + 24M(t− u) + 12C(T + 2)(t− u)

+ 12D(T + 2)N1(t− u)

Consequently,

|Y q(t)− Y q(u)|2 ≤ G1(t− u),

where G1 = 12(T + 2)(M + C + DN1). The proof is complete. ¤

Next lemma can be proved by using similar arguments as used in lemma 4.1.

Lemma 4.2. Let 0 ≤ r < t ≤ T . Subject to conditions (3.2) and (3.3),

E[|Z(t)− Z(u)|2] ≤ G1(t− u),

where G1 is a positive constant.

Theorem 4.3. Assume (3.2) and (3.3) holds. Then

E( supt0≤s≤T

|Y (s)− Y q(s)|2) ≤ 6T (T + 2)[C +2D

q]e12(T+2)D(T−t0),

where C and D are positive constants.7

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 28, NO.5, 2020, COPYRIGHT 2020 EUDOXUS PRESS, LLC

804 F. Faizullah et al 798-807

Page 41: Journal of Computational Analysis and Applicationseudoxuspress.com/images/JOCAAA-VOL-28-2020-ISSUE-5.pdfBaltimore, MD 21251, USA tel: 1-443-885-4373 Fax 1-443-885-8216 Gaston.N'Guerekata@morgan.edu

Proof. By using the inequality |∑3i=1 ci|2 ≤ 7

∑3i=1 |ci|2, from (1.2) and (3.1) we obtain

|Y (t)− Y q(t)|2 ≤ 3|∫ t

t0

[κ(s, Y (s))− κ(s, Y q(s− 1q))]ds|2 + 3|

∫ t

t0

[λ(s, Y (s))− λ(s, Y q(s− 1q))]d〈W,W 〉(s)|2

+ 3|∫ t

t0

[µ(s, Y (s))− µ(s, Y q(s− 1q))]dW (s)|2.

Apply G-subexpectation on both sides. Then by virtue of the Doob’s martingale, Holder’s andBDG [5] inequalities we derive

E( supt0≤s≤t

|Y (s)− Y q(s)|2) ≤ 3T

∫ t

t0

E[|κ(s, Y (s))− κ(s, Y q(s− 1q))|2]ds

+ 3T

∫ t

t0

E[|λ(s, Y (s))− λ(s, Y q(s− 1q))|2]ds

+ 12∫ t

t0

E[|µ(s, Y (s))− µ(s, Y q(s− 1q))|2]ds.

Using the non-uniform Lipschitz condition we get

E( supt0≤s≤t

|Y (s)− Y q(s)|2) ≤ 6(T + 2)∫ t

t0

E[Ψ(|Y (s)− Y q(s− 1q)|2)]ds

≤ 6T (T + 2)C + 6(T + 2)D∫ t

t0

E[|Y (s)− Y q(s− 1q)|2]ds

= 6T (T + 2)C + 6(T + 2)D∫ t

t0

E[|Y (s)− Y q(s) + Y q(s)− Y q(s− 1q)|2]ds

≤ 6T (T + 2)C + 12(T + 2)D∫ t

t0

E[|Y (s)− Y q(s)|2]ds

+ 12(T + 2)D∫ t

t0

E[|Y q(s)− Y q(s− 1q)|2]ds

Utilizing lemma 4.1, we determine

E( supt0≤s≤t

|Y (s)− Y q(s)|2) ≤ 6T (T + 2)C + 12(T + 2)D∫ t

t0

E( supt0≤r≤s

|Y (r)− Y q(r)|2)ds + 12T (T + 2)D1q

Finally, the Grownwall’s inequality gives

E( supt0≤s≤t

|Y (s)− Y q(s)|2) ≤ [6T (T + 2)C + 12T (T + 2)D1q]e12(T+2)D(t−t0).

Consequently, by letting t = T, we get

E( supt0≤s≤T

|Y (s)− Y q(s)|2) ≤ 6T (T + 2)[C +2D

q]e12(T+2)D(T−t0).

The proof stands completed. ¤8

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 28, NO.5, 2020, COPYRIGHT 2020 EUDOXUS PRESS, LLC

805 F. Faizullah et al 798-807

Page 42: Journal of Computational Analysis and Applicationseudoxuspress.com/images/JOCAAA-VOL-28-2020-ISSUE-5.pdfBaltimore, MD 21251, USA tel: 1-443-885-4373 Fax 1-443-885-8216 Gaston.N'Guerekata@morgan.edu

5. Conclusion

This paper opens several new research directions with arising the following open problems. Whatwill be the estimates for the difference between exact and Caratheodory approximate solutions toG-SFDEs under non-linear growth and non-Lipschitz conditions? How can one solve the statedproblem for G-NSFDEs? Can one gives estimates for the difference between exact and Caratheodoryapproximate solutions to backward stochastic differential equations in the framework of G-Brownianmotion? Under what conditions, can we develop the mentioned theory for stochastic pantographequations [2, 12, 31, 32]? We hope the current paper will play an essential role to establish afoundation for the concepts briefly discussed.

6. Acknowledgement

This work is supported by the Commonwealth Scholarship Commission in the United Kingdomwith project number PKRF-2017-429.

References

[1] X. Bai, Y. Lin, On the existence and uniqueness of solutions to stochastic differential equations driven by

G-Brownian motion with Integral-Lipschitz coefficients, Acta Mathematicae Applicatae Sinica, English Series,

3(30) (2014) 589-610.

[2] C. T.H. Baker and E. Buckwar, Continuous Θ-methods for the stochastic pantograph equation, Electronic

Transactions on Numerical Analysis, 11 (2000) 131-151.

[3] V.V Bolotin, Random vibrations of elastic systems, Martinus Nijhoff,The Hague (1984).

[4] D. R. Brillinger, H. K. Preisler, A. A. Ager, J. G. Kie, B. S. Stewart, Employing stochastic differential equations

to model wildlife motion, Bull. Braz. Math. Soc., 33(3), (2002) 385-408.

[5] L. Denis, M. Hu, S. Peng, Function spaces and capacity related to a sublinear expectation: Application to

G-Brownian motion paths, Potential Anal., 34 (2010) 139–161.

[6] F. Faizullah, Existence and uniqueness of solutions to SFDEs driven by G-Brownian motion with non-Lipschitz

conditions, Journal of Computational Analysis and Applications, 2(23) (2017) 344-354.

[7] F. Faizullah, On the pth moment estimates of solutions to stochastic functional differential equations in the

G-framework, SpringerPlus, 5(872) (2016) 1-11.

[8] F. Faizullah, A note on p-th moment estimates for stochastic functional differential equations in the framework

of G-Brownian motion, Iranian Journal of Science and Technology, Transaction A: Science, 3(40) (2016) 1-8.

[9] F. Faizullah, Existence results and moment estimates for NSFDEs driven by G-Brownian motion, Journal of

Computational and Theoretical Nanoscience, 7(13) (2016) 1-8.

[10] F. Faizullah, Existence of solutions for G-SFDEs with Cauchy-Maruyama Approximation Scheme, Abstract and

Applied Analysis, http://dx.doi.org/10.1155/2014/809431, (2014) 1–8.

[11] F. Faizullah, Existence of solutions for stochastic differential equations under G-Brownian motion with discon-

tinuous coefficients, Zeitschrift fr Naturforschung A., 67A (2012) 692–698.

[12] Z. Fan, M. Liu and W. Cao, Existence and uniqueness of the solutions and convergence of semi-implicit Euler

methods for stochastic pantograph equations, J. Math. Anal. Appl., 325 (2007) 11421159.

[13] M. Hu, S. Peng, Extended conditional G-expectations and related stopping times, arXiv:1309.3829v1[math.PR]

16 Sep 2013.

[14] M. Hu, S. Ji, S. Peng, Y. Song, Backward stochastic differential equations driven by G-Brownian motion ,

Stochastic Processes and their Applications, 124 (2014) 759784.

[15] F. Gao, Pathwise properties and homeomorphic flows for stochastic differential equations driven by G-Brownian

motion, Stochastic Processes and thier Applications, 2 (2009) 3356–3382.

9

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 28, NO.5, 2020, COPYRIGHT 2020 EUDOXUS PRESS, LLC

806 F. Faizullah et al 798-807

Page 43: Journal of Computational Analysis and Applicationseudoxuspress.com/images/JOCAAA-VOL-28-2020-ISSUE-5.pdfBaltimore, MD 21251, USA tel: 1-443-885-4373 Fax 1-443-885-8216 Gaston.N'Guerekata@morgan.edu

[16] J.H. Gubner, Probability and random processes for electrical and computer engineering, Cambridge University

Press, 2006.

[17] lyas Khan, F. Ali, N. A. Shah, Interaction of magnetic field with heat and mass transfer in free convection flow

of a Walters-B fluid, The European Physical Journal Plus, 131(77) (2016) 1-15.

[18] X. Li, S. Peng, Stopping times and related Ito’s calculus with G-Brownian motion, Stochastic Processes and

thier Applications, 121 (2011) 1492–1508.

[19] X. Mao, Stochastic Differential Equations and their Applications, Horwood Publishing Chichester, 1997.

[20] S. Peng, G-expectation, G-Brownian motion and related stochastic calculus of Ito’s type, The abel symposium

2005, Abel symposia 2, edit. benth et. al., Springer-vertag., (2006) 541-567.

[21] S. Peng, Multi-dimentional G-Brownian motion and related stochastic calculus under G-expectation, Stochastic

Processes and thier Applications, 12 (2008) 2223–2253.

[22] S. Primak, V. Kontorovitch, V. Lyandres, Stochastic methods and their applications to communications: Sto-

chastic differential equations approach, John Wiley & Sons Ltd, Chichester England, 2004.

[23] Y. Ren, Q. Bi, R. Sakthivel, Stochastic functional differential equations with infinite delay driven by G-Brownian

motion, Mathematical Methods in the Applied Sciences, 36(13) (2013) 1746–1759.

[24] J.B Roberts, P.D. Spanos, Random vibration and statistical linearization, Dover, New York (2003).

[25] B. Skalmierski, A. Tylikowski, Stability of dynamical systems, Polish Scientific Editors, Warsaw (1973).

[26] B. Skalmierski, A. Tylikowski, Stochastic processes in dynamics, Polish Scientific editors, Warsaw (1982).

[27] K. Sobezyk, Stochastic waive propagation, Polish Scientific editors, Warsaw (1984).

[28] K. Sobezyk, Stochastic differential equations with applications to Physics and Engineering, Kluwer Academic,

Dordrecht (1991).

[29] K. Sobezyk, Jr. B.F. Spencer, Random Fatigue: Frome data to theory Academic Press, Boston (1992).

[30] T. V. Ton, N. T. H. Linh, A.Yagi, A stochastic differential equations model for foraging swarms,

arXiv:1509.00063v1 [math.PR] 28 Aug 2015.

[31] Y. Xiao, M. Song and M. Liu, Convergence and stability of semi-implicit Euler method with variable stepsize for

a linear stochastic pantograph differential equation, International Journal of Numerical Analysis and Modeling,

2(8) (2011) 214225.

[32] Y. Xiao, H.Y. Zhang, A note on convergence of semi-implicit Euler methods for stochastic pantograph equations,

Computers and Mathematics with Applications, 59 (2010) 1419-1424.

10

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 28, NO.5, 2020, COPYRIGHT 2020 EUDOXUS PRESS, LLC

807 F. Faizullah et al 798-807

Page 44: Journal of Computational Analysis and Applicationseudoxuspress.com/images/JOCAAA-VOL-28-2020-ISSUE-5.pdfBaltimore, MD 21251, USA tel: 1-443-885-4373 Fax 1-443-885-8216 Gaston.N'Guerekata@morgan.edu

Behavior of a system of higher-order difference equations

M. A. El-Moneam∗ A. Q. Khan† E. S. Aly‡ M. A. Aiyashi§

Abstract

We study the local stability about equilibria, periodicity nature of positive solutions and existence of

unbounded solutions of higher-order system of rational difference equations. The results presented here

are considerably extended and improve some existing results in the literature. Finally theoretical results

are verified numerically.

Keywords: difference equations; local stability; periodicity; unbounded solutions

AMS subject classifications: 39A10, 40A05

1 Introduction

In [1], Bajo and Liz have investigated the global behavior of the difference equation: xn+1 = xn−1

a+bxn−1xn,

where a, b, x0, x−1 ∈ R2+. Aloqeili [2] has investigated the stability and semi-cycle analysis of the difference

equation: xn+1 = xn−1

a−xn−1xn, n = 0, 1, · · · , where a, x0, x−1 ∈ R2

+. For systemic study of difference equations

and systems of difference equations, we refer the reader [3–7] and references cited therein. Motivated by

the above studies, our aim in this paper is to investigate the local stability about equilibria, periodicity

nature of the positive solutions and existence of unbounded solutions of the following higher-order system

of difference equations:

xn+1 =α1xn−k

β1 − γ1

k∏i=0

yn−i

, yn+1 =α2yn−k

β2 − γ2

k∏i=0

xn−i

, n = 0, 1, · · · , (1)

where αi, βi, γi for i = 1, 2 and x−j , y−j for j = 0, 1, · · · , k are belong to R2+. The rest of the paper is

organized as follows: Existence of equilibria and local stability are studied in Section 2. Section 3 deals with

the study of periodicity nature and existence of unbounded solutions of system (1). In Section 4, numerical

simulations are presented to verify theocratical discussion. A brief conclusion is given in last Section.

∗Department of Mathematics, Faculty of Science, Jazan University, Jazan, Kingdom of Saudi Arabia, e-mail: maliahmedi-

[email protected]†Department of Mathematics, University of Azad Jammu and Kashmir, Muzaffarabad 13100, Pakistan, e-mail: ab-

[email protected]‡Department of Mathematics, Faculty of Science, Jazan University, Jazan, Kingdom of Saudi Arabia, e-mail: elkha-

[email protected]§Department of Mathematics, Faculty of Science, Jazan University, Jazan, Kingdom of Saudi Arabia, e-mail:

[email protected]

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 28, NO.5, 2020, COPYRIGHT 2020 EUDOXUS PRESS, LLC

808 M. A. El-Moneam et al 808-813

Page 45: Journal of Computational Analysis and Applicationseudoxuspress.com/images/JOCAAA-VOL-28-2020-ISSUE-5.pdfBaltimore, MD 21251, USA tel: 1-443-885-4373 Fax 1-443-885-8216 Gaston.N'Guerekata@morgan.edu

2 Existence of equilibria and local stability

In this section, we will study the existence of equilibria and local stability of system (1). The results about

the existence of equilibria are summarized into following Lemma:

Lemma 1. System (1) has two equilibria in the interior of R2+. More precisely

(i) ∀ parametric values, system (1) has a unique boundary equilibrium point O(0, 0);

(ii) If α1 < β1 and α2 < β2, then A

((β2−α2

γ2

) 1k+1

,(β1−α1

γ1

) 1k+1

)is the unique positive equilibrium point

of system (1).

Hereafter we will study the local stability of system (1) about boundary equilibrium (0, 0) and the unique

positive equilibrium point A

((β2−α2

γ2

) 1k+1

,(β1−α1

γ1

) 1k+1

)of system (1).

Lemma 2. For local dynamics about O(0, 0) and A

((β2−α2

γ2

) 1k+1

,(β1−α1

γ1

) 1k+1

), the following statements

hold:

(i) For equilibrium O(0, 0), the following holds:

(i.1) O(0, 0) is locally asymptotically stable if α1 < β1 and α2 < β2;

(i.2) O(0, 0) is a unstable if α1 > β1 or α2 < β2.

(ii) A

((β2−α2

γ2

) 1k+1

,(β1−α1

γ1

) 1k+1

)is unstable.

Proof. (i.1) The linearized system of (1) about (0, 0) becomes: Xn+1 = J(0,0)Xn where

Xn =

xn

xn−1

...

xn−k

yn

yn−1

...

yn−k

, J(0,0) =

0 0 . . . 0 α1β1

0 0 . . . 0 0

1 0 . . . 0 0 0 0 . . . 0 0...

.... . .

......

.... . .

......

...

0 0 . . . 1 0 0 0 . . . 0 0

0 0 . . . 0 0 0 0 . . . 0 α2β2

0 0 . . . 0 0 1 0 . . . 0 0...

.... . .

......

.... . .

......

...

0 0 . . . 0 0 0 0 . . . 1 0

. The characteristic equation of

J(0, 0) about (0, 0) is

λ2k+2 −(α1

β1+α2

β2

)λk+1 +

α1α2

β1β2= 0. (2)

If α1 < β1 and α2 < β2 then all roots of (2) lie inside unit disk. So O(0, 0) of system (1) is locally

asymptotically stable.

(i.2) It is easy to show that if α1 > β1 or α2 > β2 then O(0, 0) is unstable.

(ii). The linearized system of (1) about A

((β2−α2

γ2

) 1k+1

,(β1−α1

γ1

) 1k+1

)becomes: Xn+1 = JAXn where

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 28, NO.5, 2020, COPYRIGHT 2020 EUDOXUS PRESS, LLC

809 M. A. El-Moneam et al 808-813

Page 46: Journal of Computational Analysis and Applicationseudoxuspress.com/images/JOCAAA-VOL-28-2020-ISSUE-5.pdfBaltimore, MD 21251, USA tel: 1-443-885-4373 Fax 1-443-885-8216 Gaston.N'Guerekata@morgan.edu

JA = E(2k+2)×(2k+2) =

0 0 . . . 0 1 γ1xyk

α1

γ1xyk

α1. . . γ1xyk

α1

γ1xyk

α1

1 0 . . . 0 0 0 0 . . . 0 0...

.... . .

......

.... . .

......

...

0 0 . . . 1 0 0 0 . . . 0 0γ2yxk

α2

γ2yxk

α2. . . γ2yxk

α2

γ2yxk

α20 0 . . . 0 1

0 0 . . . 0 0 1 0 . . . 0 0...

.... . .

......

.... . .

......

...

0 0 . . . 0 0 0 0 . . . 1 0

.

Let λ1, λ2, . . . , λ2k+2 denote the 2k + 2 eigenvalues of matrix E. Let D = diag(d1, d2, . . . , d2k+2) be

a diagonal matrix, where d1 = dk+2 = 1, di = dk+1+i = 1− iε, i = 2, 3, · · · , k + 1 for 0 < ε < 1. Clearly,

D is invertible. In computing DED−1, we obtain that

DED−1 =

0 0 . . . 0 d1d−1k+1

d2d−11 0 . . . 0 0

...... . . .

......

0 0 . . . dk+1d−1k 0

γ2yxkdk+2d

−11

α2

γ2yxkdk+2d

−12

α2. . .

γ2yxkdk+2d

−1k

α2

γ2yxkdk+2d

−1k+1

α2

0 0 . . . 0 0...

.... . .

......

0 0 . . . 0 0

γ1xykd1d

−1k+2

α1

γ1xykd1d

−1k+3

α1. . .

γ1xykd1d

−12k+1

α1

γ1xykd1d

−12k+2

α1

0 0 . . . 0 0...

. . ....

......

0 0 . . . 0 0

0 0 . . . 0 dk+2d−12k+2

dk+3d−1k+2 0 . . . 0 0

.... . .

......

...

0 0 . . . d2k+2d−12k+1 0

. (3)

From d1 > d2 > · · · > dk+1 > 0 and dk+2 > dk+3 > · · · > d2k+2 > 0 it implies that d2d−11 < 1, d3d

−12 <

1, · · · , dk+1d−1k < 1 and dk+3d

−1k+2 < 1, dk+4d

−1k+3 < 1, · · · , d2k+2d

−12k+1 < 1. Furthermore,

d1d−1k+1 +

γ1xykd1d

−1k+2

α1+γ1xy

kd1d−1k+3

α1+ · · ·+

γ1xykd1d

−12k+1

α1+γ1xy

kd1d−12k+2

α1=

1

1− (k + 1)ε+γ1xy

k

α1

(1 +

1

1− 2ε+ · · ·+ 1

1− kε+

1

1− (k + 1)ε

)> 1.

Also

γ2yxkdk+2d

−11

α2+γ2yx

kdk+2d−12

α2+ · · ·+

γ2yxkdk+2d

−1k

α2+γ2yx

kdk+2d−1k+1

α2+ dk+2d

−12k+2 =

γ2yxk

α2

(1 +

1

1− 2ε+ · · ·+ 1

1− kε+

1

1− (k + 1)ε

)+

1

1− (k + 1)ε> 1.

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 28, NO.5, 2020, COPYRIGHT 2020 EUDOXUS PRESS, LLC

810 M. A. El-Moneam et al 808-813

Page 47: Journal of Computational Analysis and Applicationseudoxuspress.com/images/JOCAAA-VOL-28-2020-ISSUE-5.pdfBaltimore, MD 21251, USA tel: 1-443-885-4373 Fax 1-443-885-8216 Gaston.N'Guerekata@morgan.edu

It is well-known fact that E has the same eigenvalues as DED−1. Hence, we obtain

max1≤m≤2k+2

|λm| ≤ ‖DED−1‖∞ = maxd2d−11 , · · · , dk+1d

−1k , dk+3d

−1k+2, · · · , d2k+2d

−12k+1,

1

1− (k + 1)ε

+γ1xy

k

α1

(1 +

1

1− 2ε+ · · ·+ 1

1− kε+

1

1− (k + 1)ε

),

1

1− (k + 1)ε

+γ2yx

k

α2

(1 +

1

1− 2ε+ · · ·+ 1

1− kε+

1

1− (k + 1)ε

) > 1.

This implies that A

((β2−α2

γ2

) 1k+1

,(β1−α1

γ1

) 1k+1

)of system (1) is unstable.

3 Periodicity nature and existence of unbounded solutions

In this section, we will study the periodicity nature and existence of unbounded solutions of system (1). Let

us denote a1 = γ1y−ky1−k · · · y0, a2 = γ2x−kx1−k · · ·x0 to study the periodicity nature of positive solution

of system (1).

Theorem 1. If a1 = β1 − α1 and a2 = β2 − α2, then system (1) has prime period-(k+1) solutions.

Proof. From system (1) and a1 = β1 − α1, a2 = β2 − α2, we have

x1 =α1x−k

β1 − γ1

k∏i=0

y−i

=α1x−kβ1 − a1

= x−k, y1 =α2y−k

β2 − γ2

k∏i=0

x−i

=α2y−kβ2 − a2

= y−k.

x2 =α1x1−k

β1 − γ1

k∏i=0

y1−i

=α1x1−k

β1 − γ1y1y0y−1 · · · y1−k=

α1x1−kβ1 − γ1y0y−1 · · · y1−ky−k

=α1x1−kβ1 − a1

= x1−k,

y2 =α2y1−k

β2 − γ2

k∏i=0

x1−i

=α2y1−k

β2 − γ2x1x0x−1 · · ·x1−k=

α2y1−kβ2 − γ2x0x−1 · · ·x1−kx−k

=α2y1−kβ2 − a2

= y1−k.

By induction, one has

xk+2 =α1x1

β1 − γ1

k∏i=0

yk+1−i

=α1x1

β1 − γ1yk+1ykyk−1 · · · y1=

α1x1

β1 − γ1y0y−1 · · · y1−ky−k=

α1x1

β1 − a1= x1,

yk+2 =α2y1

β2 − γ2

k∏i=0

xk+1−i

=α2y1

β2 − γ2xk+1xkxk−1 · · ·x1=

α2y1

β2 − γ2x0x−1 · · ·x1−kx−k=

α2y1

β2 − a2= y1.

Theorem 2. Assume that β1 < α1, β2 < α2. Then, every positive solution (xn, yn) of system (1) tends

to ∞ as n→∞.

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 28, NO.5, 2020, COPYRIGHT 2020 EUDOXUS PRESS, LLC

811 M. A. El-Moneam et al 808-813

Page 48: Journal of Computational Analysis and Applicationseudoxuspress.com/images/JOCAAA-VOL-28-2020-ISSUE-5.pdfBaltimore, MD 21251, USA tel: 1-443-885-4373 Fax 1-443-885-8216 Gaston.N'Guerekata@morgan.edu

(a) (b) (c)

Figure 1: Plots for system (5)

Proof. From system (1), it follows that

xn+1 =α1xn−k

β1 − γ1

k∏i=0

yn−i

≥ α1xn−kβ1

> xn−k, yn+1 =α2yn−k

β2 − γ2

k∏i=0

xn−i

≥ α2yn−kβ2

> yn−k.(4)

From first equation of (4), we have x(k+1)n+1 > x(k+1)n−k, and x(k+1)n+(k+2) > x(k+1)n+1. Hence, the

subsequences x(k+1)n+1, · · · , x(k+1)n+(k+1) are increasing, i.e., the sequence xn is increasing. So, xn →∞ as n → ∞. Similarly, from second equation of (4) one gets: y(k+1)n+1 > y(k+1)n−k and y(k+1)n+(k+2) >

y(k+1)n+1. Hence, the subsequences y(k+1)n+1, · · · , y(k+1)n+(k+1) are increasing, i.e., the sequence ynis increasing. So, yn →∞ as n→∞.

4 Numerical simulations

In this section we will present numerical simulations to verify theoretical results.

Example 1. If α1 = 50, β1 = 63, γ1 = 4, α2 = 90, β2 = 122, γ2 = 2 then system (1) with x−5 = 3.9, x−4 =

1.5, x−3 = 12.4, x−2 = 11.9, x−1 = 1.6, x0 = 2.9, y−5 = 2.6, y−4 = 3.8, y−3 = 5.8, y−2 = 3.5, y−1 = 3.1, y0 =

0.9 can be written as:

xn+1 =50xn−5

63− 4ynyn−1yn−2yn−3yn−4yn−5, yn+1 =

90yn−5

122− 2xnxn−1xn−2xn−3xn−4xn−5. (5)

Moreover, in Fig. 1 the plot of xn is shown in Fig. 1a, the plot of yn is shown in Fig. 1b and global attractor

of system (5) is shown in Fig. 1c.

Example 2. If α1 = 15.5, β1 = 17, γ1 = 27, α2 = 11.2, β2 = 12, γ2 = 23, then system (1) with x−8 =

1.9, x−7 = 1.7, x−6 = 2.5, x−5 = 0.9, x−4 = 1.5, x−3 = 10.4, x−2 = 6.9, x−1 = 0.6, x0 = 2.9, y−8 = 2.8, y−7 =

1.6, y−6 = 1.8, y−5 = 2.6, y−4 = 2.8, y−3 = 2.8, y−2 = 3.5, y−1 = 2.1, y0 = 1.6 can be written as

xn+1 =15.5xn−8

17− 27ynyn−1yn−2yn−3yn−4yn−5yn−6yn−7yn−8,

yn+1 =11.2yn−8

12− 23xnxn−1xn−2xn−3xn−4xn−5xn−6xn−7xn−8.

(6)

Moreover, in Fig. 2 the plot of xn is shown in Fig. 2a, the plot of yn is shown in Fig. 2b and global

attractor of system (6) is shown in Fig. 2c.

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 28, NO.5, 2020, COPYRIGHT 2020 EUDOXUS PRESS, LLC

812 M. A. El-Moneam et al 808-813

Page 49: Journal of Computational Analysis and Applicationseudoxuspress.com/images/JOCAAA-VOL-28-2020-ISSUE-5.pdfBaltimore, MD 21251, USA tel: 1-443-885-4373 Fax 1-443-885-8216 Gaston.N'Guerekata@morgan.edu

(a) (b) (c)

Figure 2: Plots for system (6)

5 Conclusion and future work

This work is related to the qualitative behavior of a system of higher-order rational difference equations.

We have proved that under some restrictions to parameters, system (1) has a boundary equilibrium O(0, 0)

and the unique positive equilibrium point A

((β2−α2

γ2

) 1k+1

,(β1−α1

γ1

) 1k+1

)in the closed first quadrant R2

+.

We have analyzed the local stability about equilibria, periodicity nature of positive solutions and exis-

tence of unbounded solutions of system (1). Finally, theoretical results are verified numerically. Besides

the local properties, the global stability of under consideration system (1), which is our further aim to study.

Acknowledgements

A. Q. Khan research is supported by the Higher Education Commission(HEC) of Pakistan.

References

[1] I. Bajo, E. Liz, Global behaviour of a second-order nonlinear difference equation, Journal of Difference

Equations and Applications, 17(10)(2011):1471-1486.

[2] M. Aloqeili, Dynamics of a rational difference equation, Applied Mathematics and Computation,

176(2)(2006):768-774.

[3] E. A. Grove, G. Ladas, Periodicities in nonlinear difference equations, Chapman and Hall/CRC Press,

Boca Raton, (2004).

[4] H. Sedaghat, Nonlinear difference equations:theory with applications to social science models, Kluwer

Academic Publishers, Dordrecht, (2003).

[5] V. L. Kocic, G. Ladas, Global behavior of nonlinear difference equations of higher-order with appli-

cations, Kluwer Academic Publishers, Dordrecht, (1993).

[6] E. Camouzis, G. Ladas, Dynamics of third-order rational difference equations:with open problems and

conjectures, Chapman and Hall/HRC, Boca Raton, (2007).

[7] V. L. Kocic, G. Ladas, Global attractivity in a second order nonlinear difference equations, Journal

of Mathematical Analysis and Applications, 180(1993):144-150.

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 28, NO.5, 2020, COPYRIGHT 2020 EUDOXUS PRESS, LLC

813 M. A. El-Moneam et al 808-813

Page 50: Journal of Computational Analysis and Applicationseudoxuspress.com/images/JOCAAA-VOL-28-2020-ISSUE-5.pdfBaltimore, MD 21251, USA tel: 1-443-885-4373 Fax 1-443-885-8216 Gaston.N'Guerekata@morgan.edu

ON APPROXIMATING THE GENERALIZED

EULER-MASCHERONI CONSTANT∗

TI-REN HUANG1, BO-WEN HAN2, XIAO-YAN MA2, AND YU-MING CHU3,∗∗

Abstract. In the article, we provide several sharp bounds for the the general-

ized Euler-Mascheroni constant, which are the generalizations of the previouslyresults on the Euler-Mascheroni constant.

1. Introduction

It is well known that the sequence

(1.1) γn = 1 +1

2+

1

3+ · · ·+ 1

n− log n

is convergent towards the Euler-Mascheroni constant

(1.2) γ = 0.57721566490115328 · · · .The Euler-Mascheroni constant has been involved in a variety of mathematical

formulas and results [1-6], many special functions are closely related to the Euler-Mascheroni constant [7-63]. Recently, the bounds for γn − γ have attracted theattention of many researchers.

Alzer [64] proved that the double inequality

1

2n+ 1≤ γn − γ ≤

1

2n

holds for n ≥ 1.In [65], Toth proved that the two-sided inequality

(1.3)1

2n+ 25

< γn − γ ≤1

2n+ 13

takes place for n ≥ 1.Chen [66] proved that α = (2γ − 1)/(1 − γ) and β = 1/3 are the best possible

constants such that the double inequality

(1.4)1

2n+ α≤ γn − γ <

1

2n+ β

holds for n ≥ 1.

2010 Mathematics Subject Classification. Primary: 11Y60; Secondary: 40A05, 33B15.Key words and phrases. Euler-Mascheroni constant, gamma function, psi function, asymptotic

expansion.∗The research was supported by the Natural Science Foundation of China (Grants Nos.

61673169, 11301127, 11701176, 11626101, 11401531, 11601485), the Science and Technology Re-

search Program of Zhejiang Educational Committee (Grant no. Y201635325), the Natural ScienceFoundation of Zhejiang Province (Grant No. LQ17A010010) and the Science Foundation of Zhe-

jiang Sci-Tech University (Grant No. 14062093-Y).∗∗Corresponding author: Yu-Ming Chu, Email: [email protected].

1

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 28, NO.5, 2020, COPYRIGHT 2020 EUDOXUS PRESS, LLC

814 TI-REN HUANG et al 814-823

Page 51: Journal of Computational Analysis and Applicationseudoxuspress.com/images/JOCAAA-VOL-28-2020-ISSUE-5.pdfBaltimore, MD 21251, USA tel: 1-443-885-4373 Fax 1-443-885-8216 Gaston.N'Guerekata@morgan.edu

2 TI-REN HUANG1, BO-WEN HAN2, XIAO-YAN MA2, AND YU-MING CHU3,∗∗

In [67], Qiu and Vuorinen proved that the double inequality

(1.5)1

2n− λ

n2< γn − γ ≤

1

2n− µ

n2

holds for n ≥ 1 if and only if λ ≥ 1/12 and µ ≤ γ − 1/2.Let a > 0. Then the generalized Euler-Mascheroni constant γ(a) is defined by

(1.6) γ(a) = limn→∞

(1

a+

1

a+ 1+ · · ·+ 1

a+ n− 1− log

a+ n− 1

a

),

which was introduced by Knopp [68]. We clearly see that γ(1) = γ. Recently,the generalized Euler-Mascheroni constant γ(a) has been the subject of intensiveresearch [69-71].

In [70], Sıntamarian introduced the sequences

(1.7) xn =1

a+

1

a+ 1+ · · ·+ 1

a+ n− 1− log

a+ n

a,

(1.8) yn =1

a+

1

a+ 1+ · · ·+ 1

a+ n− 1− log

a+ n− 1

a,

and proved that the double inequalities

(1.9)1

2(n+ a)≤ γ(a)− xn ≤

1

2(n+ a− 1),

(1.10)1

2(n+ a)≤ yn − γ(a) ≤ 1

2(n+ a− 1)

hold for n ≥ 1.In [71], Berinde and Mortici established Theorems 1.1 and 1.2 as follows.

Theorem 1.1. The double inequalities

(1.11)1

2(n+ a)− 14

< γ(a)− xn <1

2(n+ a)− 13

,

(1.12)1

2(n+ a)− 43

< yn − γ(a) <1

2(n+ a)− 53

hold for a > 0 and n ≥ 2.

Theorem 1.2. (a) The inequality

(1.13)1

2(n+ a)− 13 + 1

18n

≤ γ(a)− xn

holds for a ≥ 13/30 and any integer n ≥ 1.(b) The inequality

(1.14)1

2(n+ a)− 53 + 1

18n

≤ yn − γ(a)

holds for a ≥ 17/30 and n ≥ 1.

The main purpose of this article is to generalize inequalities (1.4) and (1.5) tothe generalized Euler-Mascheroni constant γ(a). Our main results are the followingTheorems 1.3 and 1.4.

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 28, NO.5, 2020, COPYRIGHT 2020 EUDOXUS PRESS, LLC

815 TI-REN HUANG et al 814-823

Page 52: Journal of Computational Analysis and Applicationseudoxuspress.com/images/JOCAAA-VOL-28-2020-ISSUE-5.pdfBaltimore, MD 21251, USA tel: 1-443-885-4373 Fax 1-443-885-8216 Gaston.N'Guerekata@morgan.edu

3

Theorem 1.3. Let a > 0, n ≥ 1. Then one has(1) the double inequality

(1.15)1

2(n+ a)− α1≤ γ(a)− xn <

1

2(n+ a)− β1holds with the best possible constants

(1.16) α1 = 2(1 + a)− 1

ψ(1 + a)− log(1 + a), β1 =

1

3;

(2) the two-sided inequality

(1.17)1

2(n+ a)− α2≤ yn − γ(a) <

1

2(n+ a)− β2is valid with the best possible constants

(1.18) α2 = 2(1− d), β2 =5

3,

where

d = maxf2(a), f2(1 + a), f2(2 + a), f2(x) =1

2(ψ(x+ 1)− log(x))− x.

Theorem 1.4. Let a > 0, n ≥ 1. Then the double inequalities

(1.19)1

2(n+ a)+

α3

(n+ a)2≤ γ(a)− xn <

1

2(n+ a)+

β3(n+ a)2

,

(1.20)1

2(n+ a− 1)+

α4

(n+ a− 1)2< yn − γ(a) ≤ 1

2(n+ a− 1)+

β4(n+ a− 1)2

hold with the best possible constants

(1.21) α3 = (1 + a)2[log(1 + a)− ψ(1 + a)]− 1 + a

2, β3 =

1

12,

(1.22) α4 = − 1

12, β4 = a2[ψ(a)− log(a)] +

a

2.

2. Lemmas

In order to prove our main results, we need the following formulas and lemmas.For x > 0, the classical gamma function Γ(x) and psi function ψ(x) [72-84] are

defined as

Γ(x) =

∫ ∞0

tx−1e−tdt, ψ(x) =Γ′(x)

Γ(x),

respectively.The psi function ψ(x) has the following recurrence and asymptotic formulas [85]

(2.1) ψ(n+ x) =1

(n− 1) + x+

1

(n− 2) + x+ · · ·+ 1

2 + x+

1

1 + x+

1

x+ ψ(x),

(2.2) ψ(x) ∼ log(x)− 1

2x− 1

12x2+

1

120x4− 1

252x6+ · · · (x→∞)

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 28, NO.5, 2020, COPYRIGHT 2020 EUDOXUS PRESS, LLC

816 TI-REN HUANG et al 814-823

Page 53: Journal of Computational Analysis and Applicationseudoxuspress.com/images/JOCAAA-VOL-28-2020-ISSUE-5.pdfBaltimore, MD 21251, USA tel: 1-443-885-4373 Fax 1-443-885-8216 Gaston.N'Guerekata@morgan.edu

4 TI-REN HUANG1, BO-WEN HAN2, XIAO-YAN MA2, AND YU-MING CHU3,∗∗

According to (2.1) and the definitions of xn and yn given in (1.7) and (1.8), weclearly see that xn and yn can be rewritten as

(2.3) xn = ψ(n+ a)− ψ(a)− logn+ a

a,

(2.4) yn = ψ(n+ a)− ψ(a)− logn+ a− 1

a.

It follows from (1.6) and (2.2) that

(2.5) γ(a) = limn→∞

yn

= limn→∞

(ψ(n+ a)− log(n+ a− 1) + log(a)− ψ(a)) = log(a)− ψ(a).

Therefore,

(2.6) γ(a)− xn = log(n+ a)− ψ(n+ a),

(2.7) yn − γ(a) = ψ(n+ a)− log(n+ a− 1).

Lemma 2.1. The function

(2.8) f1(x) =1

log(x)− ψ(x)− 2x

is strictly decreasing from (1,∞) onto (−1/3, 1/γ − 2).The function

(2.9) f2(x) =1

ψ(x+ 1)− log(x)− 2x

is strictly decreasing from [2,∞) onto (1/3, f2(2)].

Proof. Differentiating f1(x) gives

(log(x)− ψ(x))2f ′1(x) = ψ′(x)− 1

x− 2(log(x)− ψ(x))2.

It follows from the inequalities

ψ′(x)− 1

x<

1

2x2+

1

6x3− 1

30x5+

1

42x7,

log(x)− ψ(x) >1

2x+

1

12x2− 1

120x4

given in [86] that

(2.10) (log(x)− ψ(x))2f ′1(x) <

1

50400x8F1(x),

where

(2.11) F1(x) = −207−3840(x−1)−6580(x−1)2−3640(x−1)3−700(x−1)4 < 0

for x ∈ (1,∞).Therefore, the monotonicity of f1(x) follows easily from (2.10) and (2.11).Clearly, f1(1) = 1/γ − 2. The limiting value limx→∞ f1(x) = −1/3 follows from

the asymptotic formula (2.2).Differentiating f2(x) leads to

2 (ψ(x+ 1)− log(x))2f ′2(x) =

1

x+

1

x2− ψ′(x)− 2(ψ(x) +

1

x− log(x))2.

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 28, NO.5, 2020, COPYRIGHT 2020 EUDOXUS PRESS, LLC

817 TI-REN HUANG et al 814-823

Page 54: Journal of Computational Analysis and Applicationseudoxuspress.com/images/JOCAAA-VOL-28-2020-ISSUE-5.pdfBaltimore, MD 21251, USA tel: 1-443-885-4373 Fax 1-443-885-8216 Gaston.N'Guerekata@morgan.edu

5

It follows from the inequalities

1

x+

1

x2− ψ′(x) <

1

2x2− 1

6x3+

1

30x5,

ψ(x) +1

x− log(x) >

1

2x− 1

12x2+

1

120x4− 1

252x6

for x > 0 given in [86] that

2 (ψ(x+ 1)− ln(x))2f ′2(x) < − F2(x)

3175200x12,

whereF2(x) = 3217636 + 17887632(x− 2) + 39443124(x− 2)2

+47009928(x− 2)3 + 33797841(x− 2)4 + 15180480(x− 2)5

+4189500(x− 2)6 + 652680(x− 2)7 + 44100(x− 2)8 > 0

for x ≥ 2.Therefore, f2(x) is a strictly decreasing function on [2,∞). The limit limx→∞ f2(x) =

1/6 follows from the asymptotic formula (2.2).

Remark 1. Qi et. al. [87] proved that the function f2(x) defined by (2.9) is strictlydecreasing on (12/5,∞).

The following Lemma 2.2 can be found in [88, 89].

Lemma 2.2. The function

(2.12) f3(x) = x2(ψ(x)− log(x)) +x

2

is strictly decreasing from (0,∞) onto (−1/12, 0) and completely monotonic on(0,∞).

3. Proof of Theorems 1.3 and 1.4

Proof of Theorem 1.3. From (2.6) we clearly see that inequality (1.15) can berewritten as

−β < 1

log(n+ a)− ψ(n+ a)− 2(n+ a) < −α.

It follows from Lemma 2.1 that the sequence

f1(n+ a) =1

log(n+ a)− ψ(n+ a)− 2(n+ a)

is strictly decreasing, which leads to the conclusion that

−1

3= lim

n→∞f1(n) < f1(n) ≤ f1(1) =

1

log(1 + a)− ψ(1 + a)− 2(1 + a).

Therefore,

α1 = 2(1 + a)− 1

ψ(1 + a)− log(1 + a), β1 =

1

3

are the best possible constants such that inequality (1.15) holds.From (2.7) we clearly see that inequality (1.17) is equivalent to

1− β

2<

1

2(ψ(n+ a)− log(n+ a− 1))− (n+ a− 1) ≤ 1− α

2.

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 28, NO.5, 2020, COPYRIGHT 2020 EUDOXUS PRESS, LLC

818 TI-REN HUANG et al 814-823

Page 55: Journal of Computational Analysis and Applicationseudoxuspress.com/images/JOCAAA-VOL-28-2020-ISSUE-5.pdfBaltimore, MD 21251, USA tel: 1-443-885-4373 Fax 1-443-885-8216 Gaston.N'Guerekata@morgan.edu

6 TI-REN HUANG1, BO-WEN HAN2, XIAO-YAN MA2, AND YU-MING CHU3,∗∗

It follows from Lemma 2.1 that the sequence

f2(n+ a− 1) =1

2(ψ(n+ a)− log(n+ a− 1))− (n+ a− 1)

is strictly decreasing for n ≥ 2, which leads to the conclusion that

1

6= lim

n→∞f2(n) < f2(n) ≤ max

f2(a), f2(1 + a), f2(2 + a)

= d.

Therefore,

(3.1) α2 = 2(1− d), β2 =5

3

are the best possible constants such that inequality (1.17) holds.

Proof of Theorem 1.4. From (2.6) and (2.7) we know that inequalities (1.19)and (1.20) can be rewritten as

α3 ≤ (n+ a)2 (log(n+ a)− ψ(n+ a))− (n+ a)

2< β3,

α4 < (n+ a− 1)2 (ψ(n+ a− 1)− log(n+ a− 1)) +(n+ a− 1)

2≤ β4,

respectively.It follows from Lemma 2.2 that the sequence

f3(n+ a− 1) = (n+ a− 1)2 (ψ(n+ a− 1)− log(n+ a− 1)) +(n+ a− 1)

2

is strictly decreasing for n ∈ N.Note that

limn→∞

f3(n) = − 1

12.

Therefore,

α3 = (1 + a)2[log(1 + a)− ψ(1 + a)]− 1 + a

2, β3 =

1

12,

α4 = − 1

12, β4 = (a)2[ψ(a)− log(a)] +

a

2

are the best possible constants such that inequalities (1.19) and (1.20) hold.

Remark 2. (1) Let a = 1. Then Theorem 1.3(2) leads to inequality (1.4) with thebest possible constants α = (2γ − 1)/(1− γ) and β = 1/3.

(2) Let a = 1. Then inequality (1.20) becomes inequality (1.5) with the bestpossible constants α = 1/12 and β = γ − 1/2.

(3) From Theorem 1.3 we know that both the upper bounds 1/[2(n+a)−1/3] forγ(a)−xn and 1/[2(n+ a)− 5/3] for yn− γ(a) given in (1.11) and (1.12) are sharpfor any a > 0.

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 28, NO.5, 2020, COPYRIGHT 2020 EUDOXUS PRESS, LLC

819 TI-REN HUANG et al 814-823

Page 56: Journal of Computational Analysis and Applicationseudoxuspress.com/images/JOCAAA-VOL-28-2020-ISSUE-5.pdfBaltimore, MD 21251, USA tel: 1-443-885-4373 Fax 1-443-885-8216 Gaston.N'Guerekata@morgan.edu

7

References

[1] P. A. Panzone, Formulas for the Euler-Mascheroni constant, Rev. Un. Mat. Argentina, 2009,50(1), 161–164.

[2] J. Choi and H. M. Srivastava, Integral representations for the Euler-Mascheroni constant γ,

Integral Transforms Spec. Funct., 2010, 21(9-10), 675–690.[3] T. Buric and N. Elezovic, Approximants of the Euler-Mascheroni constant and harmonic

numbers, Appl. Math. Comput., 2013, 222, 604–611.

[4] P. A. Panzone, An approximation formula for Euler-Mascheroni constant, Rev. Un. Mat.Argentina, 2016, 57(1), 9–22.

[5] T.-R. Huang, B.-W. Han, X.-Y. Ma and Y.-M. Chu, Optimal bounds for the generalizedEuler-Mascheroni constant, J. Inequal. Appl., 2018, 2018, Article 118, 9 pages.

[6] T.-R. Huang, S.-Y. Tan, X.-Y. Ma and Y.-M. Chu, Monotonicity properties and bounds for

the complete p-elliptic integrals, J. Inequal. Appl., 2018, 2018, Article 239, 11 pages.[7] J. C. Sampedro, On a new constant related to Euler’s constant, Ramanujan J., 2018, 46(1),

77–89.

[8] N. Kurokawa and Y. Taguchi, A p-analogue of Euler’s constant and congruence zeta functions,Proc. Japan Acad Ser. A Math. Sci., 2018, 94(2), 13–16.

[9] O. Furdni, Multiple fractional part integrals and Euler’s constant, Miskolc Math. Notes, 2016,

17(1), 255–266.[10] A. W. Addison, A series representation for Euler’s constant, Amer. Math. Monthly, 1967, 74,

823–824.

[11] W.-D. Jiang, M.-K. Wang, Y.-M. Chu, Y.-P. Jiang and F. Qi, Convexity of the generalizedsine function and the generalized hyperbolic sine function, J. Approx. Theory, 2013, 174,

1–9.[12] M.-K. Wang, Y.-M. Chu, S.-L. Qiu and Y.-P. Jiang, Convexity of the complete elliptic in-

tegrals of the first kind with respect to Holder means, J. Math. Anal. Appl., 2012, 388(2),

1141–1146.[13] Y.-M. Chu, M.-K. Wang, Y.-P. Jiang and S.-L. Qiu, Monotonicity, convexity, and inequalities

invoving the Agard distortion function, Abstr. Appl. Anal., 2011, 2011, Article ID 671765,

8 pages.[14] X.-M. Zhang and Y.-M. Chu, Convexity of the integral arithmetic mean of a convex function,

Rocky Mountain J. Math., 2010, 40(3), 1061–1068.

[15] Y.-M. Chu and T.-H. Zhao, Concavity of the error functions with respect to Holder means,Math. Inequal. Appl., 2016, 19(2), 589–595.

[16] Y.-M. Chu, M.-K. Wang, Y.-P. Jiang and S.-L. Qiu, Concavity of the complete elliptic inte-

grals of the second kind with respect to Holder means, J. Math. Anal. Appl., 2012, 395(2),637–642.

[17] Y.-M. Chu and X.-M. Zhang, Multiplicative concavity of the integral of multiplicatively

concave functions, J. Inequal. Appl., 2010, 2010, Article ID 845930, 8 pages.[18] X.-M. Zhang, Y.-M. Chu and X.-H. Zhang, The Hermite-Hadamard type inequality of GA-

convex functions and its applications, J. Inequal. Appl., 2010, 2010, Article ID 507560, 11pages.

[19] Y.-M. Chu, G.-D. Wang and X.-H. Zhang, Schur convexity and Hadamard’s inequality, Math.Inequal. Appl., 2010, 13(4), 725–731.

[20] Zh.-H. Yang, W.-M. Qian, Y.-M. Chu and W. Zhang, On approximating the error function,

Math. Inequal. Appl., 2018, 21(2), 469–479.

[21] Zh.-H. Yang, W. Zhang and Y.-M. Chu, Sharp Gautschi inequality for parameter 0 < p < 1with applications, Math. Inequal. Appl., 2017, 20(4), 1107–1120.

[22] Zh.-H. Yang, Y.-M. Chu and W. Zhang, Accurate approximations for the complete ellipticof the second kind, J. Math. Anal. Appl., 2016, 438(2), 875–888.

[23] Y.-M. Chu, M.-K. Wang, S.-L. Qiu and Y.-P. Jiang, Bounds for complete elliptic integrals of

the second kind with applications, Comput. Math. Appl., 2012, 63(7), 1177–1184.

[24] M.-K. Wang, S.-L. Qiu, Y.-M. Chu and Y.-P. Jiang, Generalized Hersch-Pfluger distortionfunction and complete elliptic integrals, J. Math. Anal. Appl., 2012, 385(1), 221–229.

[25] M.-K. Wang, Y.-M. Li and Y.-M. Chu, Inequalities and infinite product formula for Ramanu-jan generalized modular equation function, Ramanujan J., 2018, 46(1), 189–200.

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 28, NO.5, 2020, COPYRIGHT 2020 EUDOXUS PRESS, LLC

820 TI-REN HUANG et al 814-823

Page 57: Journal of Computational Analysis and Applicationseudoxuspress.com/images/JOCAAA-VOL-28-2020-ISSUE-5.pdfBaltimore, MD 21251, USA tel: 1-443-885-4373 Fax 1-443-885-8216 Gaston.N'Guerekata@morgan.edu

8 TI-REN HUANG1, BO-WEN HAN2, XIAO-YAN MA2, AND YU-MING CHU3,∗∗

[26] M.-K. Wang, Y.-M. Chu and Y.-Q. Song, Asymptotical formulas for Gaussian and generalized

hypergeometric functions, Appl. Math. Comput., 2016, 276, 44–60.

[27] M.-K. Wang, Y.-M. Chu and Y.-P. Jiang, Ramanujan’s cubic transformaation inequalities forzero-balanced hypergeometric functions, Rocky Mountain J. Math., 2016, 46(2), 679–691.

[28] Y.-M. Chu, M.-K. Wang and Y.-F. Qiu, On Alzer and Qiu’s conjecture for complete elliptic

integral and inverse hyperbolic tangent function, Abstr. Appl. Anal., 2011, 2011, Article ID697547, 7 pages.

[29] M.-K. Wang and Y.-M. Chu, Asymptotical bounds for complete elliptic integrals of the second

kind, J. Math. Anal. Appl., 2013, 402(1), 119–126.[30] Y.-M. Chu, Y.-F. Qiu and M.-K. Wang, Holder mean inequalities for the complete elliptic

integrals, Integral Transforms Spec. Funct., 2012, 23(7), 521–527.

[31] Y.-M. Chu, M.-K. Wang and S.-L. Qiu, Optimal combinations bounds of root-square andarithmetic means for Toader mean, Proc. Indian Acad. Sci. Math. Sci., 2012, 122(1), 41–51.

[32] Zh.-H. Yang, W.-M. Qian, Y.-M. Chu and W. Zhang, On approximating the arithmetic-geometric mean and complete elliptic integral of the first kind, J. Math. Anal. Appl., 2018,

462(2), 1714–1726.

[33] W.-M. Qian and Y.-M. Chu, Sharp bounds for a special quasi-arithmetic mean in terms ofarithmetic and geometric means with two parameters, J. Inequal. Appl., 2017, 2017, Article

274, 10 pages.

[34] Y.-M. Chu and M.-K. Wang, Optimal Lehmer mean bounds for the Toader mean, ResultsMath., 2012, 61(3-4), 223–229.

[35] M.-K. Wang, Y.-M. Chu, Y.-F. Qiu and S.-L. Qiu, An optimal power mean inequality for the

complete elliptic integrals, Appl. Math. Lett., 2011, 24(6), 887–890.[36] Zh.-H. Yang, W.-M. Qian and Y.-M. Chu, Monotonicity properties and bounds involving the

complete elliptic integrals of the first kind, Math. Inequal. Appl., 2018, 21(4), 1185–1199.

[37] T.-H. Zhao, M.-K. Wang, W. Zhang and Y.-M. Chu, Quadratic transformation inequalitiesfor Gaussian hypergeometric function, J. Inequal. Appl., 2018, 2018, Article 251, 15 pages.

[38] M.-K. Wang, S.-L. Qiu and Y.-M. Chu, Infinite series formula for Hubner upper boundfunction with applications to Hersch-Pfluger distortion function, Math. Inequal. Appl., 2018,

21(3), 629–648.

[39] M.-K. Wang and Y.-M. Chu, Landen inequalities for a class of hypergeometric functions withapplications, Math. Inequal. Appl., 2018, 21(2), 521–537.

[40] Zh.-H. Yang and Y.-M. Chu, A monotonicity property involving the generalized elliptic inte-

gral of the first kind, Math. Inequal. Appl., 2017, 20(3), 729–735.[41] Zh.-H. Yang, W.-M. Qian, Y.-M. Chu and W. Zhang, Monotonicity rule for the quotient of

two function and its applications, J. Inequal. Appl., 2017, 2017, Article 106, 13 pages.

[42] H.-Z. Xu, Y.-M. Chu and W.-M. Qian, Sharp bounds for the Sandor-Yang means in terms ofarithmetic and contra-harmonic means, J. Inequal. Appl., 2018, 2018, Article 127, 13 pages.

[43] W.-M. Gong, Y.-Q. Song, M.-K. Wang and Y.-M. Chu, A sharp double inequality between

Seiffert, arithmetic, and geometric means, Abstr. Appl. Anal., 2012, 2012, Article ID 684834,7 pages.

[44] Y.-M. Chu and M.-K. Wang, Inequalities between arithmetic-geometric, Gini, and Toadermeans, Abstr. Appl. Anal., 2012, 2012, Article ID 830585, 11 pages.

[45] Y.-M. Chu, Y.-F. Qiu, M.-K. Wang and G.-D. Wang, The optimal convex combination boundsof arithmetic and harmonic means for the Seiffert’s mean, J. Inequal. Appl., 2010, 2010,Article ID 436457, 7 pages.

[46] W.-F. Xia, Y.-M. Chu and G.-D. Wang, The optimal upper and lower power mean bounds

for a convex combiantion of the arithmetic and logarithmic means, Abstr. Appl. Anal., 2010,2010, Article ID 604804, 9 pages.

[47] Y.-M. Chu, M.-K. Wang and Z.-K. Wang, Best possible inequalities among harmonic, geo-metric, logarithmic and Seiffert means, Math. Inequal. Appl., 2012, 15(2), 415–422.

[48] Y.-M. Chu, S.-S. Wang and C. Zong, Optimal lower power mean bound for the convex

combination of harmonic and logarithmic means, Abstr. Appl. Anal., 2011, 2011, Article ID

520648, 9 pages.[49] Y.-F. Qiu, M.-K. Wang, Y.-M. Chu and G.-D. Wang, Two sharp inequalities for Lehmer

mean, identric mean and logarithmic mean, J. Math. Inequal., 2011, 5(3), 301–306.[50] Y.-M. Chu and W.-F. Xia, Two double inequalities between power mean and logarithmic

mean, Comput. Math. Appl., 2010, 60(1), 83–89.

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 28, NO.5, 2020, COPYRIGHT 2020 EUDOXUS PRESS, LLC

821 TI-REN HUANG et al 814-823

Page 58: Journal of Computational Analysis and Applicationseudoxuspress.com/images/JOCAAA-VOL-28-2020-ISSUE-5.pdfBaltimore, MD 21251, USA tel: 1-443-885-4373 Fax 1-443-885-8216 Gaston.N'Guerekata@morgan.edu

9

[51] Y.-M. Chu and B.-Y. Long, Best possible inequalities between generalized logarithmic mean

and classical means, Abstr. Appl. Anal., 2010, 2010, Article ID 303286, 13 pages.

[52] W.-M. Qian and Y.-M. Chu, Best possible bounds for Yang mean using generalized logarith-mic mean, Math. Probl. Eng., 2016, 2016, Article ID 8901258, 7 pages.

[53] Y.-M. Li, B.-Y. Long and Y.-M. Chu, Sharp bounds for the Neuman-Sandor mean in terms

of generalized logarithmic mean, J. Math. Inequal., 2012, 6(4), 567–577.[54] Y.-M. Chu, M.-K. Wang and G.-D. Wang, The optimal generalized logarithmic mean bounds

for Seiffert’s mean, Acta Math. Sci., 2012, 32B(4), 1619–1626.

[55] Y.-M. Chu, Y.-M. Li, W.-F. Xia and X.-H. Zhang, Best possible inequalities for the harmonicmean of error function, J. Inequal. Appl., 2014, 2014, Article 525, 9 pages.

[56] Y.-M. Chu, M.-K. Wang and Z.-K. Wang, A best-possible double inequality between Seiffert

and harmonic means, J. Inequal. Appl., 2011, 2011, Article 94, 7 pages.[57] Y.-M. Chu, M.-K. Wang and Z.-K. Wang, A sharp double inequality between harmonic and

identric means, Abstr. Appl. Anal., 2011, 2011, Article ID 657935, 7 pages.[58] Y.-M. Chu, Y.-F. Qiu and M.-K. Wang, Sharp power mean bounds for the combination of

Seiffert and geoemtric means, Abstr. Appl. Anal., 2010, 2010, Article ID 108920, 12 pages.

[59] B.-Y. Long and Y.-M. Chu, Optimal power mean bounds for the weighted geometric meanof classical means, J. Inequal. Appl., 2010, 2010, Article ID 905697, 6 pages.

[60] M.-K. Wang, Z.-K. Wang and Y.-M. Chu, An double inequality between geometric and

identric means, Appl. Math. Lett., 2012, 25(3), 471–475.[61] Y.-M. Chu, B.-Y. Long and B.-Y. Liu, Bounds of the Neuman-Sandor mean using power and

identric means, Abstr. Appl. Anal., 2013, 2013, Article ID 832591, 6 pages.

[62] M.-K. Wang, Y.-M. Chu and Y.-F. Qiu, Some comparison inequalities for generalized Muir-head and identric means, J. Inequal. Appl., 2010, 2010, Article ID 295620, 10 pages.

[63] W.-M. Qian, X.-H. Zhang and Y.-M. Chu, Sharp bounds for the Toader-Qi mean in terms of

harmonic and geometric means, J. Math. Inequal., 2017, 11(1), 121–127.[64] H. Alzer, Inequalities for the gamma and polygamma functions, Abh. Math. Sem. Univ.

Hamburg, 1998, 68, 363–372.[65] L. Toth, Problem E3432, Amer. Math. Monthly, 1991, 98(3), 264–264.

[66] C.-P. Chen, Inequalities for the Euler-Mascheroni constant, Appl. Math. Lett., 2010, 23(2),

161–164.[67] S.-L. Qiu and M. Vuorinen, Some properties of the gamma and psi functions, with applica-

tions, Math. Comput., 2005, 74(250), 723–742.

[68] K. Knopp, Theory and Applications of Infinite Series, Dover Publications, New York, 1990.[69] C. Mortici, Improved convergence towards generalized Euler-Mascheroni constant, Appl.

Math. Comput., 2010, 215(9), 3443-3448.

[70] A. Sıntamarian, A generalization of Euler’s constant, Numer. Algorithms, 2007, 46(2), 141–151.

[71] V. Berinde and C. Mortici, New sharp estimates of the generalized Euler-Mascheroni constant,

Math. Inequal. Appl., 2013, 16(1), 279–288.[72] Zh.-H. Yang, W.-M. Qian, Y.-M. Chu and W. Zhang, On rational bounds for the gamma

function, J. Inequal. Appl., 2017, 2017, Article 210, 17 pages.[73] T.-H. Zhao and Y.-M. Chu, A class of logarithmically completely monotonic functions asso-

ciated with gamma function, J. Inequal. Appl., 2010, 2010, Article ID 392431, 11 pages.

[74] T.-H. Zhao, Y.-M. Chu and H. Wang, Logarithmically complete monotonicity propertiesrelating to the gamma function, Abstr. Appl. Anal., 2011, 2011, Article ID 896483, 13

pages.[75] M. Adil Khan, A. Iqbal, M. Suleman and Y.-M. Chu, Hermite-Hadamard typ inequalities for

fractional integrals via Green’s function, J. Inequal. Appl., 2018, 2018, Article 161, 15 pages.

[76] M. Adil Khan, Y.-M. Chu, A. Kashuri, R. Liko and G. Ali, Conformable fractional integrals

version of Hermite-Hadamard inequalities and their applications, J. Funct. Spaces, 2018,2018, Article ID 6928130, 9 pages.

[77] M. Adil Khan, Y. Khurshid, T.-S. Du and Y.-M. Chu, Generalization of Hermite-Hadamardtype inequalities via conformable fractional integrals, J. Funct. Spaces, 2018, 2018, ArticleID 5357463, 12 pages.

[78] A. Iqbal, M. Adil Khan, S. Ullah, Y.-M. Chu and A. Kashuri, Hermite-Hadamard type

inequalities pertaining conformable fractional integrals and their applications, AIP Advances,2018, 8, Article ID 075101, 18 pages, DOI: 10.1063/1.5031954.

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 28, NO.5, 2020, COPYRIGHT 2020 EUDOXUS PRESS, LLC

822 TI-REN HUANG et al 814-823

Page 59: Journal of Computational Analysis and Applicationseudoxuspress.com/images/JOCAAA-VOL-28-2020-ISSUE-5.pdfBaltimore, MD 21251, USA tel: 1-443-885-4373 Fax 1-443-885-8216 Gaston.N'Guerekata@morgan.edu

10 TI-REN HUANG1, BO-WEN HAN2, XIAO-YAN MA2, AND YU-MING CHU3,∗∗

[79] M. Adil Khan, Z. M. Al-sahwi and Y.-M. Chu, New estimations for Shannon and Zipf-

Mandelbrot entropies, Entropy, 2018, 20, Article 608, 10 pages, DOI: 10.3390/e2008608.

[80] M. Adil Khan, Y.-M. Chu, A. Kashuri and R. Liko, Hermite-Hadamard type fractional in-tegral inequalities for MT(r;g,m,ϕ)-preinvex functions, J. Comput. Anal. Appl., 2019, 26(8),

1487–1503.

[81] M. Adil Khan, Y.-M. Chu, T. U. Khan and J. Khan, Some new inequalities of Hermite-Hadamard type for s-convex functions with applications, Open Math., 2017, 15, 1414–1430.

[82] Y.-M. Chu, M. Adil khan, T. Ali and S. S. Dragomir, Inequalities for α-fractional differentiable

functions, J. Inequal. Appl, 2017, 2017, Article 93, 12 pages.[83] Y.-Q. Song, M. Adil Khan, S. Zaheer Ullah and Y.-M. Chu, Integral inequalities involving

strongly convex functions, J. Funct. Spaces, 2018, 2018, Article ID 6595921, 8 pages.

[84] M. Adil Khan, S. Begum, Y. Khurshid and Y.-M. Chu, Ostrowski type inequalities involvingconformable fractional integrals, J. Inequal. Appl., 2018, 2018, Article 70, 14 pages.

[85] M. Abramowitz and I. A. Stegun, Handbook of Mathematical Functions with Formulas,Graphs, and Mathematical Tables, U. S. Government Printing Office, Washington, 1964.

[86] C.-P. Chen and F. Qi, The best lower and upper bounds of harmonic sequence, RGMIA Res.

Rep. Coll., 2003, 6(2), Article 14, 5 pages.[87] F. Qi, R.-Q. Cui, C.-P. Chen and B.-N. Guo, Some completely monotonic functions involving

polygamma functions and an applications, J. Math. Anal. Appl., 2005, 310(1), 303–308.

[88] S.-L. Qiu and M. Vuorinen, Some properties of the gamma and psi functions, with applica-tions, Math. Comput., 2005, 74(250), 723–742.

[89] C.-P. Chen, F. Qi and H. M. Srivastava, Some properties of functions related to the gamma

and psi functions, Integral Transforms Spec. Funct., 2010, 21(1-2), 153–166.

Ti-Ren Huang, College of Science, Hunan City University, Yiyang 413000, ChinaE-mail address: [email protected]

Bo-Wen Han, Department of Mathematics, Zhejiang Sci-Tech University, Hangzhou310018, China

E-mail address: [email protected]

Xiao-Yan Ma, Department of Mathematics, Zhejiang Sci-Tech University, Hangzhou

310018, China

E-mail address: [email protected]

Yu-Ming Chu (Corresponding author), Department of Mathematics, Huzhou Univer-

sity, Huzhou 313000, ChinaE-mail address: [email protected]

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 28, NO.5, 2020, COPYRIGHT 2020 EUDOXUS PRESS, LLC

823 TI-REN HUANG et al 814-823

Page 60: Journal of Computational Analysis and Applicationseudoxuspress.com/images/JOCAAA-VOL-28-2020-ISSUE-5.pdfBaltimore, MD 21251, USA tel: 1-443-885-4373 Fax 1-443-885-8216 Gaston.N'Guerekata@morgan.edu

General study on Volterra integral equations of the second kind

in space with weight function

M. E. Nasr 1,2 and M. F. Jabbar1

1Department of Mathematics, Faculty of Science, Benha University, Benha, Egypt2Department of Mathematics, Collage of Science and Arts -Al Qurayyat, Jouf University,

Kingdom of Saudi Arabia

[email protected], and [email protected]

Abstract

This paper is devoted to present a new and simple algorithm to prove that the function ϕn(x)

is a good approximation to the solution ϕ(x) for Volterra integral equations (VIEs) of the second

kind in the space L2p(x)[0, 2π] with weight function p(x). This approximation is discussed in details

with help of the Vallee-Poussin’s and Fejer’s, operators. Special attention is given to study the

convergence analysis and estimation of an upper bound for the error of the approximated solution.

Key-Words: Volterra integral equations; Vallee-Poussin’s and Fejer’s operators; Convergence analysis;

1. Introduction

In this paper, we present the approximate solution for Volterra integral equations (VIEs) of the

second kind in the space L2p(x)[0, 2π] with weight function p(x) ≥ 1 where p(x) is a summable function

on [0, 2π]

ϕ(x) = f(x) + λ

∫ x

0k(x, y)ϕ(y)dy, 0 ≤ x, y ≤ 2π, (1)

where the functions f(x), k(x, y) belong to L2p(x)[0, 2π] and are 2π-periodic functions, 1

λ is a regular

value of the kernel k(x, y) and the kernel k(x, y) satisfies the following conditions

1. ∫ x0 p(y)|k(x, y)|2dy

12 = χ(x) ∈ L2

p(x)[0, 2π];

2. |λ|‖k(x, y)‖L2p< 1,

where

‖k(x, y)‖L2p

= ‖k(x, y)‖L2p(x)

[0,2π] =

[∫ 2π

0

∫ x

0p(x)p(y)|k(x, y)|2dydx

] 12

.

The simplicity of finding a solution for Fredholm integral equations (FIEs) of the second kind with

degenerate kernel naturally leads one to think of replacing the given equation (1) by FIE with degenerate

kernel, see [1, 2, 8, 9]. The solution of the new equation is taken as an approximate solution of the

original equation. The study employs Dzyadyk’s method which is based on the linear polynomial

operator ([3]-[5]).

Eq.(1) can be written in the new form

ϕ(x) = f(x) + λ

∫ x

0k(x, y)ϕ(y)dy, (2)

1

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 28, NO.5, 2020, COPYRIGHT 2020 EUDOXUS PRESS, LLC

824 NASR-JABBAR 824-835

Page 61: Journal of Computational Analysis and Applicationseudoxuspress.com/images/JOCAAA-VOL-28-2020-ISSUE-5.pdfBaltimore, MD 21251, USA tel: 1-443-885-4373 Fax 1-443-885-8216 Gaston.N'Guerekata@morgan.edu

where

k(x, y) = e(x, y)k(x, y), e(x, y) =

1, for y ≤ x,0, for y > x.

(3)

From (3), it is found that the kernel k(x, y) in (2) satisfies the following conditions (A∗)

1. ∫ 2π0 p(y)|k(x, y)|2dy

12 = ρ(x) ∈ L2

p(x)[0, 2π];

2. |λ|‖k(x, y)‖L2p< 1,

where

‖k(x, y)‖L2p[0,2π]

=

[∫ 2π

0

∫ 2π

0p(x)p(y)|k(x, y)|2dydx

] 12

.

Now, instead of Eqs.(1) and (2), let us solve the following equations

ϕn(x) = Un(f ;x) + λ

∫ 2π

0Un[k(., y);x]ϕn(y)dy, 0 ≤ x, y ≤ 2π, (4)

The notation Un[k(., y);x] will mean that the operator Un acts on k(x, y) as a function of x and at the

same time, the variable y plays the role of the parameter.

Now, since the functions Un(f ;x) and Un[k(., y);x] are both trigonometric polynomials of order n

with respect to x, the solution ϕn(x) of the Eq.(4) will also be trigonometric polynomial of order n in

x. It is well known that the problem of determination of the solution of Fredholm integral equation of

the second kind with degenerate kernel is reduced to the solution of corresponding system of algebraic

equations [11]. In this study, it will be proved that the function ϕn(x) is a good approximation to

the solution ϕ(x) of Eq.(1) on the space L2p(x)[0, 2π]. This approximation is discussed in details for

Vallee-Poussin’s and Fejer’s operators.

2. Preliminaries

Starting from the known linear polynomial operators Un(g;x) which are good approximation to the

function g(x) in the space L2p(x), and have the form:

Un(g;x) =1

π

∫ 2π

0g(t)Un(x− t)dt =

1

π

∫ 2π

0g(x− t)Un(t)dt, (5)

where

Un(x) =1

2+

n∑k=1

λ(n)k cos(kx), (6)

λ(n)k are constants which define the method of approximation.

Theorem 1. [6]

For k(x, y) belongs to L2p[0, 2π], such that |λ|‖k(x, y)‖L2

p< 1, and f(x) belongs to L2

p(x), then the

integral equation

ϕ(x) = f(x) + λ

∫ 2π

0k(x, y)ϕ(y)dy,

has an unique solution ϕ(x) in L2p(x)[0, 2π].

2

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 28, NO.5, 2020, COPYRIGHT 2020 EUDOXUS PRESS, LLC

825 NASR-JABBAR 824-835

Page 62: Journal of Computational Analysis and Applicationseudoxuspress.com/images/JOCAAA-VOL-28-2020-ISSUE-5.pdfBaltimore, MD 21251, USA tel: 1-443-885-4373 Fax 1-443-885-8216 Gaston.N'Guerekata@morgan.edu

Now, with the help of the following theorem we will find the condition by which the equation (4)

has an unique solution.

Theorem 2. [6]

If A and B are two bounded linear operators in Banach space E, while A has an inverse and

‖B‖E‖A−1‖E < 1, then the operator (A+B) has also an inverse and

‖(A+B)−1‖E ≤ ‖A−1‖E(1− ‖B‖E‖A−1‖E)−1.

To find this condition, we write both of Eqs.(2) and (4) in the operator form

(I − λK)ϕ = f, (I − λUn(K))ϕn = fn,

where

Kϕ =

∫ π

−πk(x, y)ϕ(y)dy, Un(K)ϕn =

∫ π

−πUn[k(., y);x]ϕn(y)dy.

It is obvious that I − λK = A, λ(K − Un(K)) = B, are two bounded linear operators in the space

L2p(x).

It is well-known that the operator I − λK has an inverse for each λ such that 1λ is a regular value of K

[6]. So Eq.(2) has an unique solution and we can write

ϕ = (I + λR)f = f + λRf,

where (I − λK)−1 = (I + λR) and R is the resolvent of the operator K. From theorem 2 if |λ|‖(I −λK)−1‖E‖K − Un(K)‖E < 1, then (I − λUn(K)) has also an inverse, thereby Eq.(4) has an unique

solution and can be written in the form

ϕn = (I + λRn)fn = fn + λRnfn,

where (I − λUn(K))−1 = I + λRn and Rn is the resolvent of the operator Un(K).

Now, we return to the functional representation of resolvents R(x, y;λ);Rn(x, y;λ) and equations

(2) and (4). Knowing the resolvent R(x, y;λ), we at once obtain the solution of the original equation

(2) with an arbitrary right hand side f(x) in the following form

ϕ(x) = f(x) + λ

∫ 2π

0R(x, y;λ)f(y)dy.

Also, the solution of Eq.(4) can be represented through the resolvent as follows

ϕn(x) = fn(x) + λ

∫ 2π

0Rn(x, y;λ)fn(y)dy.

3

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 28, NO.5, 2020, COPYRIGHT 2020 EUDOXUS PRESS, LLC

826 NASR-JABBAR 824-835

Page 63: Journal of Computational Analysis and Applicationseudoxuspress.com/images/JOCAAA-VOL-28-2020-ISSUE-5.pdfBaltimore, MD 21251, USA tel: 1-443-885-4373 Fax 1-443-885-8216 Gaston.N'Guerekata@morgan.edu

Theorem 3.

For any kernel k(x, y) ∈ L2p[0, 2π], if the linear polynomial operator Un of order n is defined in L2

p(x)

and if the function f(x) ∈ L2p(x), then

Un

[∫ b

ak(., y)f(y)dy;x

]=

∫ b

aUn[k(., y);x]f(y)dy.

The proof of this theorem is very similar to the proof of a theorem in [4].

3. Auxiliary definitions and theorems

Definition 1.

The averaged-modulus of continuity of the kernel k(x, y) ∈ L2p[0, 2π] is defined as follows

wL2p(k; t) = wL2

p(t) =

1

2πsup|s|≤t

[∫ 2π

0

∫ x−s

0p(x)p(y)[k(x− s, y)− k(x, y)]2dxdy

] 12

. (7)

Lemma 1.

The function wL2p(t) has the following properties:

1. wL2p(t)→ 0 for t→ 0;

2. wL2p(t) is positive and monotonic increasing;

3. wL2p(t1+2) ≤ wL2

p(t1) + wL2

p(t2);

4. wL2p(t) is continuous;

5. for any positive real number η, the following inequality holds wL2p(ηt) ≤ (1 + η)wL2

p(t).

Also, by the averaged-modulus of continuity with respect to x and y of a function k(x, y) = e(x, y)k(x, y)

defined in [0, 2π], we mean the following function ΩL2p(t)

ΩL2p(k; t) = ΩL2

p(t) =

1

2πsup|s|≤t

[∫ 2π

0

∫ 2π

0p(x)p(y)[k(x, y)[e(x− s, y)− e(x, y)]]2dxdy

] 12

. (8)

It is evident that the function ΩL2p(t) satisfies the above properties of the modulus of continuity (1-5).

Definition 2.

The value of the following norm

δn(k) = δ(k;Un) = ‖Un(k(., y);x)− k(x, y)‖L2p

=

[∫ 2π

0

∫ 2π

0p(x)p(y)[Un(k(., y);x)− k(x, y)]2dxdy

] 12

,

(9)

will play an important role in estimating the error arising from replacement of Eq.(1) by Eq.(4).

The following theorem provides an estimate of δ(k, Un).

4

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 28, NO.5, 2020, COPYRIGHT 2020 EUDOXUS PRESS, LLC

827 NASR-JABBAR 824-835

Page 64: Journal of Computational Analysis and Applicationseudoxuspress.com/images/JOCAAA-VOL-28-2020-ISSUE-5.pdfBaltimore, MD 21251, USA tel: 1-443-885-4373 Fax 1-443-885-8216 Gaston.N'Guerekata@morgan.edu

Theorem 4.

For any kernel k(x, y) ∈ L2p[0, 2π], and for any linear polynomial operator Un(g;x), we always have

the following inequality

δn(k) ≤ 2

[wL2

p(1

n) + ΩL2

p(1

n)

] ∫ π

−π[n|t|+ 1]|Un(t)|dt. (10)

Proof. Using Minkowski inequality and equalities (5) and (7), we obtain

δn(k) = ‖Un(k(., y);x)− k(x, y)‖L2p

=

=1

π

∥∥∥∥∫ π

−π[k(x− t, y)− k(x, y)]Un(t)dt

∥∥∥∥L2p

=1

π

[∫ π

−π

∫ π

−πp(x)p(y)

[∫ π

−πUn(t)(k(x− t, y)− k(x, y))

]2dydx

] 12

≤ 1

π

∫ π

−π|Un(t)|

[∫ 2π

0

∫ 2π

0p(x)p(y)[k(x− t, y)− k(x, y)]2dydx

] 12

dt

≤ 1

π

∫ π

−π|Un(t)|

[∫ 2π

0

∫ 2π

0p(x)p(y)[e(x− t, y)k(x− t, y)− e(x, y)k(x, y)]2dydx

] 12

dt

≤ 1

π

∫ π

−π|Un(t)|

[∫ 2π

0

∫ 2π

0p(x)p(y)k(x, y)[e(x− t, y)− e(x, y)]2dydx

] 12

+

[[∫ 2π

0

∫ 2π

0p(x)p(y)e(x− t, y)[k(x− t, y)− k(x, y)]2dydx

] 12

dt

]

≤ 1

π

∫ π

−π|Un(t)|

[∫ 2π

0

∫ 2π

0p(x)p(y)k(x, y)[e(x− t, y)− e(x, y)]2dydx

] 12

+

[[∫ 2π

0

∫ 2π

0p(x)p(y)e(x− t, y)[k(x− t, y)− k(x, y)]2dydx

] 12

dt

]

≤ 2

∫ π

−π|Un|[wL2

p(t) + ΩL2

p(t)]dt ≤

≤ 2

[wL2

p(1

n) + ΩL2

p(1

n)

] ∫ π

−π[n|t|+ 1]|Un(t)|dt.

Definition 3.

We define the error of approximation of k(x, y) as follows

E∗n,m(k)L2p

= ‖k(x, y)− T ∗n,m(x, y)‖L2p

= infTn,m(x,y)

[∫ π

−π

∫ π

−πp(x)p(y)[k(x, y)− Tn,m(x, y)]2dxdy

] 12

,

E∗n,∞(k)L2p

= ‖k(x, y)− T ∗n,∞(x, y)‖L2p

= infTn,∞(x,y)

[∫ π

−π

∫ π

−πp(x)p(y)[k(x, y)− Tn,∞(x, y)]2dxdy

] 12

,

5

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 28, NO.5, 2020, COPYRIGHT 2020 EUDOXUS PRESS, LLC

828 NASR-JABBAR 824-835

Page 65: Journal of Computational Analysis and Applicationseudoxuspress.com/images/JOCAAA-VOL-28-2020-ISSUE-5.pdfBaltimore, MD 21251, USA tel: 1-443-885-4373 Fax 1-443-885-8216 Gaston.N'Guerekata@morgan.edu

E∗∞,m(k)L2p

= ‖k(x, y)− T ∗∞,m(x, y)‖L2p

= infT∞,m(x,y)

[∫ π

−π

∫ π

−πp(x)p(y)[k(x, y)− T∞,m(x, y)]2dxdy

] 12

,

where T ∗n,m(x, y) denotes the trigonometric polynomial in x of order n and in y of order m of best

approximation of k(x, y) in the metric L2p[0, 2π], T ∗n,∞(x, y) denotes the trigonometric polynomial in x

of order n of best approximation of k(x, y) in the metric L2p[0, 2π], T ∗∞,m(x, y) denotes the trigonometric

polynomial in y of order m of best approximation of k(x, y) in the metric L2p[0, 2π]. The estimates of

how rapidly the quantities E∗n,m(k)L2p, E∗n,∞(k)L2

pand E∗∞,m(k)L2

ptend to zero as n → ∞,m → ∞ are

given in [10], where

E∗n,m(k)L2p→ 0, n,m→∞,

E∗n,m(k)L2p≥ E∗n,∞(k)L2

p, E∗n,m(k)L2

p≥ E∗∞,m(k)L2

p

then

E∗n,∞(k)L2p→ 0, as n→∞, (11)

E∗∞,m(k)L2p→ 0, as m→∞. (12)

Now, we will mention the bounds of the norm (9) for various linear polynomial operators Un as the

following cases:

Case 1: Vallee-Poussin’s method [5]:

Un = Vn, we have1

π

∫ π

−π|Vn(t)|dt ≤ 1

3+

2√

3

π, (13)

from Eq.(10) and definition 3, we get

E∗n,∞(k)L2p≤ 12π

[wL2

p(1

n) + ΩL2

p(1

n)

]. (14)

By using the inequality (13) and considering that the method of Vallee-Poussin’s Vn leaves trigono-

metric polynomial of order n invariant, then

δn(k;Vn) = ‖k(x, y)− Vn(k(., y);x)‖L2p

= ‖k(x, y)− T ∗n,∞(x, y)− Vn[k(., y)− T ∗n,∞(., y);x]‖L2p

≤ E∗n,∞(k)L2p

+1

π

∫ π

−π|Vn(t)|

[ ∫ π

−π

∫ π

−πp(x)p(y)[k(x− t, y)− T ∗n,∞(x− t, y)]2dydx

] 12dt

≤[1 +

1

π

∫ π

−π|Vn(t)|dt

]E∗n,∞(k)L2

p' 2.436E∗n,∞(k)L2

p,

(15)

and from (14) we get

δn(k;Vn) ≤ 29.232π[wL2p(1

n) + ΩL2

p(1

n)]. (16)

6

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 28, NO.5, 2020, COPYRIGHT 2020 EUDOXUS PRESS, LLC

829 NASR-JABBAR 824-835

Page 66: Journal of Computational Analysis and Applicationseudoxuspress.com/images/JOCAAA-VOL-28-2020-ISSUE-5.pdfBaltimore, MD 21251, USA tel: 1-443-885-4373 Fax 1-443-885-8216 Gaston.N'Guerekata@morgan.edu

Case 2: Fejer’s method [5]:

Un = Fn, we have1

π

∫ π

−π|Fn(t)|dt = 1, (17)∫ π

−π(1 + n|t|)|Fn(t)|dt < 6(1 + lnn), ∀n ≥ 3. (18)

We let n′ =√n2 , ai(y), bi(y), a∗i (y) and b∗i (y) denote the corresponding coefficients of Fourier series in

the variable x of the functions k(x, y) and Vn′ [k(., y);x]. Then,

‖Vn′(k(., y);x)− Fn[Vn′(k(., y);x)]‖L2p

=

∥∥∥∥∥2n′∑i=1

i

n[a∗i (y)cos ix+ b∗i (y)sin ix]

∥∥∥∥∥L2p

∥∥∥∥∥∥∥[

2n′∑i=1

(i

n

)2] 1

2[

2n′∑i=1

[a∗i (y)cos ix+ b∗i (y)sin ix]2

] 12

∥∥∥∥∥∥∥L2p

[2n′∑i=1

(i

n

)2] 1

2

∥∥∥∥∥∥∥[

2n′∑i=1

[a∗2i (y) + b∗2i (y)]

] 12

∥∥∥∥∥∥∥L2p

≤ 1√πn

[2n′∑i=1

i2

] 12

‖k(x, y)‖L2p≤ 1√

π n(2n′)

32 ‖k(x, y)‖L2

p

≤ 1√π n

14

‖k(x, y)‖L2p.

Thereby

δ(k;Fn) = ‖k(x, y)− Fn(k(., y);x)‖L2p

= ‖k(x, y)− Vn′(k(., y);x) + Vn′(k(., y);x)− Fn(Vn′(k(., y);x)) + Fn(Vn′ − k);x)‖L2p

≤ ‖k(x, y)− Vn′(k(., y);x)‖L2p

+ ‖Fn(Vn′ − k);x)‖L2p

+ ‖Vn′(k(., y);x)− Fn(Vn′(k(., y);x))‖L2p

≤(

1 +1

π

∫ π

−π|Fn(t)|dt

)(2.5)E∗n′,∞(k)L2

p+

1√π n

14

‖k(x, y)‖L2p,

(19)

from Eqs.(17) and (19), we get

δ(k;Fn) ≤ 5E∗n′,∞(k)L2p

+1

√π n

14

‖k(x, y)‖L2p. (20)

Also, from Eqs.(18) and (10), we have

δ(k;Fn) ≤ 12(1 + lnn)[wL2p(1

n) + ΩL2

p(1

n)]. (21)

Now from (16), (20) and (21) it is clear that δn(k) → 0 as n → ∞ for Vallee-Poussin’s and Fejer’s

methods for every periodic function k(x, y) ∈ L2p[0, 2π], wL2

p( 1n) = o(1/lnn) and ΩL2

p( 1n) = o(1/lnn).

7

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 28, NO.5, 2020, COPYRIGHT 2020 EUDOXUS PRESS, LLC

830 NASR-JABBAR 824-835

Page 67: Journal of Computational Analysis and Applicationseudoxuspress.com/images/JOCAAA-VOL-28-2020-ISSUE-5.pdfBaltimore, MD 21251, USA tel: 1-443-885-4373 Fax 1-443-885-8216 Gaston.N'Guerekata@morgan.edu

Definition 4.

The following quantities will play an important role in estimating the error of our approximation

ξ(k;Un;ϕ) = ξn =

∥∥∥∥∫ 2π

0k(x, y)[ϕ(y)− Un(ϕ; y)]dy

∥∥∥∥L2p

, (22)

γm = γm(Un;ϕ) =m∑i=1

|1− λ(n)i |Ei−1(ϕ)L2p, (23)

where

En(ϕ)L2p

= infTn‖ϕ(x)− Tn(x)‖L2

p,

Tn(x) is a trigonometric polynomial of order n in x, m ≤ n.

Theorem 5.

For any kernel k(x, y) ∈ L2p[0, 2π] and for linear polynomial operator Un(g;x) the following inequality

holds

ξn(k) = ξn(k;Un;ϕ) =

∥∥∥∥∫ 2π

0k(x, y)[ϕ(y)− Un(ϕ; y)]dy

∥∥∥∥L2p

≤ E∗∞,m(k)L2p‖ϕ(y)− Un(ϕ; y)‖L2

p+

√2

πγm(Un;ϕ)

[∫ 2π

0p(x)dx

] 12 [‖k(x, y)‖L2

p+ E∗∞,m(k)L2

p

],

(24)

for any positive integer m ≤ n.

Proof. For any function ϕ(x) ∈ L2p with Fourier coefficients ci and di in view of Bunyakovskii inequality

and p(x) ≥ 1, we obtain

|cicos ix+ disin ix| = infTi−1(t)

1

π

∣∣∣∣∫ π

−π[ϕ(t)− Ti−1(t)]cos(i(x− t))dt

∣∣∣∣≤ 1

πinf

Ti−1(t)

[∫ π

−πp(t)[ϕ(t)− Ti−1(t)dt]2

] 12

.

[∫ π

−π

[cos(i(x− t))]2

p(t)dt

] 12

≤√

2

πinf

Ti−1(t)

[∫ π

−πp(t)|ϕ(t)− Ti−1(t)|2dt

] 12

≤√

2

πE∗i−1(ϕ)L2

p,

therefore

‖cicos ix+ disin ix‖L2p≤√

2

πE∗i−1(ϕ)L2

p

(∫ π

−πp(x)dx

) 12

.

Letting

T∞,m(x, y) =m∑i=0

ai(x)cos iy + bi(x)sin iy,

8

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 28, NO.5, 2020, COPYRIGHT 2020 EUDOXUS PRESS, LLC

831 NASR-JABBAR 824-835

Page 68: Journal of Computational Analysis and Applicationseudoxuspress.com/images/JOCAAA-VOL-28-2020-ISSUE-5.pdfBaltimore, MD 21251, USA tel: 1-443-885-4373 Fax 1-443-885-8216 Gaston.N'Guerekata@morgan.edu

E∗∞,m(k)L2p

= infai,bi

∥∥∥∥∥k(x, y)−m∑i=0

ai(x)cos iy + bi(x)sin iy

∥∥∥∥∥L2p

,

and taking into consideration (23) and using Bunyakovskii inequality, we obtain

ξn = ξn(k;Un;ϕ) =

∥∥∥∥∫ 2π

0k(x, y)[ϕ(y)− Un(ϕ; y)]dy

∥∥∥∥L2p

=

[∫ 2π

0p(x)

[∫ 2π

0k(x, y)[ϕ(y)− Un(ϕ; y)]dy

]2dx

] 12

≤[ ∫ 2π

0p(x) inf

T∞,m(x,y)

[ ∫ 2π

0|k(x, y)− T∞,m(x, y)||ϕ(y)− Un(ϕ; y)|dy

+

∣∣∣∣∫ 2π

0(k(x, y) + T∞,m(x, y)− k(x, y))(ϕ(y)− Un(ϕ; y))dy

∣∣∣∣ ]2dx] 12

[∫ 2π

0p(x) inf

T∞,m(x,y)

[∫ 2π

0|k(x, y)− T∞,m(x, y)||ϕ(y)− Un(ϕ; y)|dy

]2dx

] 12

+[ ∫ 2π

0p(x) inf

T∞,m(x,y)

[ ∫ 2π

0(k(x, y) + T∞,m(x, y)− k(x, y)).(

m∑i=1

(1− λ(n)i )(cicos iy + disin iy)

)dy]2dx] 1

2

≤ E∗∞,m(k)L2p‖ϕ(y)− Un(ϕ; y)‖L2

p

+

√2

πγm(Un;ϕ)

[∫ 2π

0p(x)dx

] 12 [‖k(x, y)‖L2

p+ E∗∞,m(k)L2

p

].

4. The approximate solution and its error bounds

The following theorem shows that for sufficiently good linear methods Un(g;x), the difference be-

tween the polynomials ϕn(x) and the original solution ϕ(x) is sufficiently small.

Theorem 6.

If the kernel k(x, y) in Eq.(2) satisfies the assumptions (A∗), all functions appearing in (2) are

2π−periodic in x and y, then any linear polynomial operator Un(g;x), if |λ|Rδ(k;Un) < 1 and if Eq.(1)

is replaced by Eq.(4), the following inequality holds

‖ϕ(x)− ϕn(x)‖L2p≤ (1 + αn(k))‖ϕ(x)− Un(ϕ;x)‖L2

p, (25)

in which

αn(k) = |λ|R

[δ(k;Un) +

ξ(k;Un;ϕ)

‖ϕ(x)− Un(ϕ;x)‖L2p

]/[1− |λ|Rδ(k;Un)], (26)

where δ(k;Un) and ξ(k;Un;ϕ) are defined in (9) and (22), respectively, and R = 1 + |λ|‖R(x, y)‖L2p,

where R(x, y) denotes the resolvent of the kernel k(x, y).

9

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 28, NO.5, 2020, COPYRIGHT 2020 EUDOXUS PRESS, LLC

832 NASR-JABBAR 824-835

Page 69: Journal of Computational Analysis and Applicationseudoxuspress.com/images/JOCAAA-VOL-28-2020-ISSUE-5.pdfBaltimore, MD 21251, USA tel: 1-443-885-4373 Fax 1-443-885-8216 Gaston.N'Guerekata@morgan.edu

Proof. Using theorem 3, and Eq.(2), we represent the solution ϕn(x) of Eq.(4) in the form

ϕn(x) = Un(f ;x) + λUn

[∫ 2π

0k(., y)ϕn(y)dy;x

]= Un(f ;x) + λUn

[∫ 2π

0k(., y)[ϕn(y)− ϕ(y)]dy +

∫ 2π

0k(., y)ϕn(y)dy;x

]= λ

∫ 2π

0Un[k(., y);x][ϕn(y)− ϕ(y)]dy + Un

[f(.) + λ

∫ 2π

0k(., y)ϕ(y)dy;x

]= λ

∫ 2π

0Un[k(., y);x][ϕn(y)− ϕ(y)]dy + Un(ϕ;x),

(27)

it follows that

ϕn(x)− Un(ϕ;x) = λ

∫ 2π

0k(x, y)[ϕn(y)− Un(ϕ; y)]dy + gn(x), (28)

where

gn(x) =λ

∫ 2π

0[Un(k(., y);x)− k(x, y)][ϕn(y)− ϕ(y)]dy + λ

∫ π

−πk(x, y)[Un(ϕ; y)− ϕ(y)]dy.

Thus, by Eqs.(9), (10) and (22) we get the estimate

‖gn(x)‖L2p≤ |λ|

∥∥∥∥∫ 2π

0[Un(k(., y);x)− k(x, y)][ϕn(y)− ϕ(y)]dy

∥∥∥∥L2p

+ |λ|∥∥∥∥∫ 2π

0k(x, y)[Un(ϕ; y)− ϕ(y)]dy

∥∥∥∥L2p

≤ |λ|δ(k;Un)[‖ϕn(x)− Un(ϕ;x)‖L2

p+ ‖Un(ϕ;x)− ϕ(x)‖L2

p

]+ |λ|ξ(k;Un;ϕ).

(29)

In view of |λ|‖k(x, y)‖L2p< 1, Eq.(28) has an unique solution given by

ϕn(x)− Un(ϕ;x) = gn(x) + λ

∫ 2π

0R(x, y)gn(y)dy.

Therefore

‖ϕn(x)−Un(ϕ;x)‖L2p≤ ‖gn(x)‖L2

p

[1 + |λ|‖R(x, y)‖L2

p|]

= R‖gn(x)‖L2p

≤ R|λ|[δ(k;Un)[‖ϕ(x)− Un(ϕ;x)‖L2

p+ ‖ϕn(x)− Un(ϕ;x)‖L2

p] + ξ(k;Un;ϕ)

].

Taking into consideration |λ|Rδ(k;Un) < 1, we obtain

‖ϕn(x)− Un(ϕ;x)‖L2p≤|λ|R[δ(k;Un)‖Un(ϕ;x)− ϕ(x)‖L2

p+ ξ(k;Un;ϕ)]

1− |λ|Rδ(k;Un)

Therefore

‖ϕ(x)− ϕn(x)‖L2p≤ ‖ϕ(x)− Un(ϕ;x)‖L2

p+ ‖ϕn(x)− Un(ϕ;x)‖L2

p

≤ ‖ϕ(x)− Un(ϕ;x)‖L2p

+|λ|R[δ(k;Un)‖Un(ϕ;x)− ϕ(x)‖L2

p+ ξ(k;Un;ϕ)]

1− |λ|Rδ(k;Un)

≤ (1 + αn(k))‖ϕ(x)− Un(ϕ;x)‖L2p,

(30)

where αn is given by (26). Thus, the inequality (25) is proved.

10

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 28, NO.5, 2020, COPYRIGHT 2020 EUDOXUS PRESS, LLC

833 NASR-JABBAR 824-835

Page 70: Journal of Computational Analysis and Applicationseudoxuspress.com/images/JOCAAA-VOL-28-2020-ISSUE-5.pdfBaltimore, MD 21251, USA tel: 1-443-885-4373 Fax 1-443-885-8216 Gaston.N'Guerekata@morgan.edu

5. The results

It is well-known that in [7], one cannot achieve an error less than the corresponding to the best

approximation. The error estimate in (25) with rate of convergence αn(k), means that, the rate of

convergence of ϕn(x) to ϕ(x) is comparable with the rate of convergence of the best approximate,

which means that the error estimate (25) is optimal. Applying theorem 6, and also the corresponding

results from section 3, we obtain the following results:

In the case of the application of Vallee-Poussin’s method:

From [10] and (25) we obtain

‖ϕ(x)− ϕn(x)‖L2p≤ (1 + αn(k))(

4

3+

2√

3

π)E∗n(ϕ)L2

p≤ (1 + αn(k))(2.5)E∗n(ϕ)L2

p,

where by (15) we have

αn(k) ≤|λ|R2.5E∗n,∞(k)L2

p+ E∗∞,m(k)L2

p

1− λR(2.5)E∗n,∞(k)L2p

,

then αn(k)→ 0 as n→∞ for all ϕ(x) ∈ L2p(x), k(x, y) ∈ L2

p(x)[0, 2π].

In the case of the application of Fejer’s method:

The quantity αn(k) in the relation (25) will not tend to zero for any solution ϕ(x), but will tend to zero

only under the condition that ”the solution ϕ(x) belongs to some subclasses of integrable functions”.

Restricting ourselves to the Holder classes W (r)Hβ(L2p) where r is a non-negative integer and 0 < β ≤ 1,

we obtain the following case:

In order that αn(k) → 0 as n → ∞ considering (20), (21) and [10], it is sufficient that the following

conditioned be satisfied

ϕ(x) ∈W (0)Hβ(L2p), i.e. r = 0, 0 < β ≤ 1, w(

1

n)L2

p= o(1/lnn), Ω(

1

n)L2

p= o(1/lnn).

6. Conclusion and remarks

In this article, we presented the approximate solutions of the Volterra integral equations of the

second kind in the space L2p(x)[0, 2π] with weight function p(x) with the help of the Vallee-Poussin’s and

Fejer’s operators. In the same time, we proved that the function ϕn(x) is a good approximation to the

exact solution ϕ(x) for the Volterra integral equations. From the obtained approximate solutions using

ADM, we can conclude that the proposed approach is easy to implement and computationally very

attractive. A good agreement between the theoretical study with the obtained approximate solutions

have been obtained.

11

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 28, NO.5, 2020, COPYRIGHT 2020 EUDOXUS PRESS, LLC

834 NASR-JABBAR 824-835

Page 71: Journal of Computational Analysis and Applicationseudoxuspress.com/images/JOCAAA-VOL-28-2020-ISSUE-5.pdfBaltimore, MD 21251, USA tel: 1-443-885-4373 Fax 1-443-885-8216 Gaston.N'Guerekata@morgan.edu

References

[1] M. A. Abdou, M. E. Nasr and M. A. Abdel-Aty, Study of the Normality and Continuity for the

Mixed Integral Equations with Phase-Lag Term, Inter. J. of Math. Analysis, 11 (2017), 787–799.

https://doi.org/10.12988/ijma.2017.7798

[2] M. A. Abdou, M. E. Nasr and M. A. Abdel-Aty, A study of normality and continuity for mixed

integral equations, J. of Fixed Point Theory Appl., 20(1) (2018). https://doi.org/10.1007/s11784-

018-0490-0

[3] V. K. Dzyadyk, V. T. Gavrilyuk and O. I. Stepanets, On the best approximations of Holder class

functions by Rogozinski polynomials, Dokl. Akad. Nauk Ukr. SSR. Ser. A, 3, 1969.

[4] V. K. Dzyadyk, On the approximations of linear methods to the approximations by polynomials

of functions which are solution of Fredholm integral equation of the second kind I and II, Urain.

Matem. Zh. 22, 1970.

[5] V. K. Dzyadyk, Approximation Methods for Solutions of Differential and Integral Equations, The

Netherlands, VSP, 1995.

[6] A. N. Kolmogorov and S. V. Fomin, Elements of the Theory of Functions and Functional Analysis,

Dover Pubns, 1999.

[7] P. P. Korovkin, Linear Operators and Approximation Theory, Hindustan (India), 1960 (Translated

from the Russian).

[8] M. E. Nasr and M. F. Jabbar, An Approximate Solution for Volterra Integral Equations of the

Second Kind in Space with Weight Function, Inter. J. of Math. Analysis, 11 (2017), 849–861.

[9] M. E. Nasr and M. A. Abdel-Aty, Analytical discussion for the mixed integral equations, J. of

Fixed Point Theory Appl., 20(3) (2018). https://doi.org/10.1007/s11784-018-0589-3

[10] A. F. Timan, Theory of Approximations of Functions of a Real Variable, Dover, New York, 1994.

[11] F. G. Tricomi, Integral Equations, Dover, New York, 1985.

12

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 28, NO.5, 2020, COPYRIGHT 2020 EUDOXUS PRESS, LLC

835 NASR-JABBAR 824-835

Page 72: Journal of Computational Analysis and Applicationseudoxuspress.com/images/JOCAAA-VOL-28-2020-ISSUE-5.pdfBaltimore, MD 21251, USA tel: 1-443-885-4373 Fax 1-443-885-8216 Gaston.N'Guerekata@morgan.edu

A Modified SSDP Method for Nonlinear Semidefinie Programming∗

Jianling Li† Chunting Lu Hui Zhang

College of Mathematics and Information Science, Guangxi University,

Nanning, Guangxi, 530004, China

Abstract In this paper, we investigate nonlinear semidefinite programming and propose a

modified sequential semidefinite programming (SSDP for short) algorithm without a penalty

function or a filter. At each iteration, the search direction is yielded by solving a linear semidef-

inite programming subproblem and a quadratic semidefinite programming subproblem. The

nonmonotone line search ensures that the objective function or constraint violation function is

sufficiently reduced. Under some appropriate conditions, the global convergence of the proposed

algorithm is shown. Some preliminary numerical results are reported.

Key words nonlinear semidefinite programming; sequential semidefinite programming; non-

monotone line search; global convergence

1 Introduction

Consider the following nonlinear semidefinite programming (NLSDP):

min f(x)

s.t. G(x) 0,(1.1)

where f : Rn → R is assumed to be a smooth and real value function, G : Rn → Sm is a smooth

and matrix value function. Sm represents the set of all real symmetric matrices. The symbol A Bmeans that A−B is a negative semidefinite matrix.

Nonlinear semidefinite programming has many real-world applications, such as engineering de-

sign, optimal structure design, optimal robust control and robust feedback control design (see

[1]-[4]). In recent years, the investigation of NLSDP has attracted much attention. The main solu-

tion methods for NLSDP are augmented Lagrange method [5]-[10], interior point method [11]-[15],

SSDP method [16]-[21]. In this paper, our focus is on SSDP method. Correa and Ramirez in

[16] proposed an SSDP algorithm. At each iteration, the search direction is generated by solving a

traditional quadratic semidefinite programming (QSDP for short) subproblem. A subdifferentiable

penalty function is used as a merit function to design line search. Under some conditions, the

algorithm is globally convergent. However, it is not easy for the choice of an appropriate penalty

parameter. Gomez in [17] proposed a filter-type SSDP algorithm for nonlinear semidefinite pro-

gramming problem. For each iteration point, by solving a trust-region type QSDP subproblem

∗Project supported by the National Natural Science Foundation (No. 11561005), the National Science Foundation

of Guangxi (No. 2016GXNSFAA380248† Corresponding author. E-mail: [email protected]

1

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 28, NO.5, 2020, COPYRIGHT 2020 EUDOXUS PRESS, LLC

836 Jianling Li et al 836-847

Page 73: Journal of Computational Analysis and Applicationseudoxuspress.com/images/JOCAAA-VOL-28-2020-ISSUE-5.pdfBaltimore, MD 21251, USA tel: 1-443-885-4373 Fax 1-443-885-8216 Gaston.N'Guerekata@morgan.edu

to get search direction. When objective function value or the constraint violation function is im-

proved, the trial point is accepted by filter. Chen in [21] proposed a trust region SSDP method

without a penalty function or a filter. The search direction is obtained by solving trust region QS-

DP subproblem. Whether the trial point is accepted or not depends on the decline of the objective

function or constraint violation function.

In all above SSDP algorithms, the traditional QSDP subproblem, which generated the search

direction, may be incompatible. Motivated by the idea of modified SQP methods for nonlinear

programming, in this paper, we proposed a modified SSDP algorithm for NLSDP (1.1). At each

iteration, the search direction is yielded by solving a linear semidefinite programming (LSDP for

short) subproblem and a modified QSDP subproblem. Nonmonotone line search technique is used

to determine step size.

The paper is organized as follows. In the next section, the algorithm is described in detail.

The global convergence is shown in Section 3. Some preliminary numerical results are reported in

Section 4 and some concluding remarks are given in the final section.

2 Description of Algorithm

In this section, we first restate some concepts and notations about nonlinear semidefinite pro-

gramming, and then describe the proposed algorithm.

Let G(x) : Rn → Sm be a matrix value function, we use the notation

DG(x) =

(∂G(x)

∂x1, · · · , ∂G(x)

∂xn

)T

(2.1)

for its differential operator evaluated at x. For any d = (d1, · · · , n) ∈ Rn, DG(x)d is defined by

DG(x)d =

n∑i=1

di∂G(x)

∂xi. (2.2)

The adjoint operator DG(x)∗ of the linear operator DG(x) satisfies

DG(x)∗Y =

(<∂G(x)

∂x1, Y >,<

∂G(x)

∂x2, Y >, · · · , < ∂G(x)

∂xn, Y >

)T

, ∀ Y ∈ Sm. (2.3)

where < A,B > means the inner product of the matrix A and B.

Definition 2.1 [16] Let x ∈ Rn be a feasible point of NLSDP (1.1), if there exists Y ∈Sm satisfying the following KKT conditions

∇xL(x, Y ) = ∇f(x) +DG(x)∗Y = 0, (2.4)

Y 0, < G(x), Y >= 0, (2.5)

where L : Rn × Sm → R is the Lagrangian function of NLSDP (1.1), that is,

L(x, λ, Y ) = f(x)+ < Y,G(x) >,

then x is called a KKT point of NLSDP (1.1), the matrix Y is called a Lagrangian multiplier

associated with x.

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 28, NO.5, 2020, COPYRIGHT 2020 EUDOXUS PRESS, LLC

837 Jianling Li et al 836-847

Page 74: Journal of Computational Analysis and Applicationseudoxuspress.com/images/JOCAAA-VOL-28-2020-ISSUE-5.pdfBaltimore, MD 21251, USA tel: 1-443-885-4373 Fax 1-443-885-8216 Gaston.N'Guerekata@morgan.edu

Let xk ∈ Rn be the current iterate point. In order to generate search directions, we borrow the

ideas in [22] and construct the following linear semidefinite programming (LSDP (xk) for short):

min z

s.t. G(xk) +DG(xk)d zIm,z ≥ 0,

(2.6)

where Im is the m order identity. Obviously, the feasible set of LSDP(xk)(2.6) is not empty, so

there exists an optimal solution of (2.6). Let (dkT, zk)

T be an optimal solution of (2.6), then we

construct a quadratic semidefinite programming (QSDP (xk, Hk) for short) as follows:

mind∈Rn

∇f(xk)Td+ 12d

THkd

s.t. G(xk) +DG(xk)d zkIm.(2.7)

If Hk is a symmetric positive definite matrix, then the solution of QSDP(xk, Hk) (2.7) is unique.

To measure the degree of feasibility at the iterate point, we define the degree of constraint

violation as follows:

h(x) = (λ1(G(x)))+, (2.8)

where λ1(·) is the largest eigenvalue of a matrix, (α)+ = max0, α. Obviously, h(x) = 0 is equiva-

lent with that x is a feasible point of NLSDP (1.1).

Let dk be the solution of QSDP(xk, Hk) (2.7). Similar to the idea of filter method, we hope that

the search direction dk can improve the feasibility of the iterate point or the value of the objective

function. In other words, if dk satisfies

∇f(xk)Tdk ≤ −1

2(dk)THkd

k, (2.9)

and t satisfies

f(xk + tdk) ≤ max0≤j≤m(k)

f(xk−j) − tα(dk)THkdk, (2.10)

h(xk + tdk) ≤ β max0≤j≤m(k)

h(xk−j), (2.11)

where α ∈ (0, 12), m(0) = 0, m(k) = minm(k − 1) + 1, M, M is a positive integer, then the

corresponding trial step xk + tdk is accepted.

If dk does not satisfy (2.9), that is,

∇f(xk)Tdk > −1

2(dk)THkdk, (2.12)

then let t = 1. If the following inequality

h(xk + dk) ≤ β max0≤j≤m(k)

h(xk−j) (2.13)

hold, then the corresponding trial step xk + dk is accepted.

Based on the above strategy, we now present the new algorithm in detail.

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 28, NO.5, 2020, COPYRIGHT 2020 EUDOXUS PRESS, LLC

838 Jianling Li et al 836-847

Page 75: Journal of Computational Analysis and Applicationseudoxuspress.com/images/JOCAAA-VOL-28-2020-ISSUE-5.pdfBaltimore, MD 21251, USA tel: 1-443-885-4373 Fax 1-443-885-8216 Gaston.N'Guerekata@morgan.edu

Algorithm A

S0. Given x0 ∈ Rn, H0 = Im, α ∈ (0, 12), σ ∈ (0, 1), β ∈ (12 , 1), m(0) = 0, apositiveinteger M . Let

k := 0.

S1. Solve LSDP(xk) (2.6) to get a solution (dkT, zk)

T. If dk = 0 and zk 6= 0, stop.

S2. Solve QSDP (xk, Hk) (2.7) to get the solution dk. If dk = 0, stop.

S3. If dk satisfies (2.9), then let tk be the first number in the sequence of 1, σ, σ2, · · · satisfying

the following inequality

f(xk + tdk) ≤ max0≤j≤m(k)

f(xk−j) − tα(dk)THkdk, (2.14)

and go to S4; otherwise, let tk = 1 and go to S4.

S4. Let xk+1 = xk + tkdk. If the following inequality

h(xk+1) ≤ β max0≤j≤m(k)

h(xk−j), (2.15)

holds, then set m(k + 1) = minm(k) + 1, M. Update Hk such that Hk+1 is a positive definite

matrix. Let k = k + 1 and go to S1; otherwise, go into the restoration phase to obtain a new

point xk+1. Let k = k + 1 and go to S1.

Remark. In the restoration phase, our aim is to decrease the value of h(x). The restoration

algorithm is similar to the one given by Long et al. [23].

3 Global Convergence

In this section, we first show that Algorithm A is well-defined, and then show the global con-

vergence. To this end, the following assumptions are necessary.

A 1 The iterate xk remains in a closed, bounded subset X .

A 2 The objective function f(x) and the constraint function G(x) are twice continuously

differentiable in Rn.

A 3 There exist two constants 0 < a ≤ b such that a‖d‖2 ≤ dTHkd ≤ b‖d‖2 for any d ∈ Rn.

In what follows, we analyze the feasibility of Algorithm A. To this end, it is necessary to extend

the definition of infeasible stationary point for nonlinear programming [24] to nonlinear semidefinite

programming.

Definition 3.1 Let x ∈ Rn be an infeasible point of NLSDP (1.1), if

mind∈Rn

maxλ1(G(x) +DG(x)d), 0 = maxλ1(G(x)), 0 = h(x), (3.1)

then x is called an infeasible sationary of NLSDP (1.1).

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 28, NO.5, 2020, COPYRIGHT 2020 EUDOXUS PRESS, LLC

839 Jianling Li et al 836-847

Page 76: Journal of Computational Analysis and Applicationseudoxuspress.com/images/JOCAAA-VOL-28-2020-ISSUE-5.pdfBaltimore, MD 21251, USA tel: 1-443-885-4373 Fax 1-443-885-8216 Gaston.N'Guerekata@morgan.edu

Lemma 3.1 Supposed that the assumptions A1-A3 hold, if Algorithm A terminates at xk,

then xk is either an infeasible stationary point or a KKT point of NLSDP (1.1).

Proof. The proof is divided into two cases.

Case A. If Algorithm A terminates in S1, then dk = 0 and zk 6= 0. We know from

LSDP (xk) (2.6) that zk = h(xk), so h(xk) 6= 0, which implies xk is an infeasible point of

NLSDP (1.1).

In the following, we prove that xk is an infeasible stationary point of NLSDP (1.1), namely,

xk satisfies:

mind∈Rn

maxλ1(G(xk) +DG(xk)d), 0 = maxλ1(G(xk)), 0 = h(xk).

By contradiction, suppose that the conclusion is not true. So there exists dk,0 ∈ Rn such that

z := maxλ1(G(xk) +DG(xk)dk,0), 0 < h(xk). (3.2)

Clearly, (dk,0T, z)T is a feasible solution of LSDP (xk) (2.6). Note that zk is a solution of LSDP (xk) (2.6),

so we obtain

zk ≤ z < h(xk), (3.3)

this contradicts zk = h(xk). Therefore, xk is an infeasible stationary point of NLSDP (1.1).

Case B. If Algorithm A terminates in S2, then the solution dk of QSD(xk, Hk) (2.7) is zero,

i.e., dk = 0. Further, dk = 0 satisfies KKT condition of QSDP (xk, Hk) (2.7), that is to say, there

exists Yk ∈ Sm, such that

∇f(xk) +DG(xk)∗Yk = 0, (3.4)

G(xk) zkIm, (3.5)

Yk 0, < G(xk)− zkIm, Yk >= 0. (3.6)

In what follows, we prove that zk = 0. By contradiction, supposed that zk 6= 0, obvious-

ly, (0T, zk)T is a solution of LSDP (xk) (2.6) from (3.5). Therefore, xk is an infeasible point of

NLSDP (1.1). Since Algorithm A does not stop in S1, zk < h(xk).

On the other hand, it follows from (3.5) that

λ1(G(xk)) ≤ zk.

In view of zk > 0, we obtain h(xk) = maxλ1(G(xk)), 0 ≤ zk. This contradict zk < h(xk).

Therefore, zk = 0.

Substituting zk = 0 into (3.5), and conbining with (3.4) and (3.6), we know that xk is a KKT

point of NLSDP (1.1).

Lemma 3.2 If dk satisfies the inequality (2.9), then the line search (2.14) is performed.

Proof. It is sufficient to show that there exsits t ∈ (0, 1) such that (2.14) hold.

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 28, NO.5, 2020, COPYRIGHT 2020 EUDOXUS PRESS, LLC

840 Jianling Li et al 836-847

Page 77: Journal of Computational Analysis and Applicationseudoxuspress.com/images/JOCAAA-VOL-28-2020-ISSUE-5.pdfBaltimore, MD 21251, USA tel: 1-443-885-4373 Fax 1-443-885-8216 Gaston.N'Guerekata@morgan.edu

In view of ∇f(xk)Tdk ≤ −12(dk)THkd

k, so in combination with the positive definiteness of Hk,

we know that there exists dk 6= 0 such that ∇f(xk)Tdk < 0. For convinence, denote

f(xl(k)) = max0≤j≤m(k)

f(xk−j). (3.7)

By contradiction, if the conclusion is not true, then for all t ∈ (0, 1), we have

f(xk + tdk)− f(xl(k)) > −tα(dk)THkdk ≥ 2tα∇f(xk)Tdk. (3.8)

From (3.7), it is obvious that f(xl(k)) ≥ f(xk), so combining with (3.8), we have

f(xk + tdk)− f(xk) ≥ f(xk + tdk)− f(xl(k)) > 2tα∇f(xk)Tdk, (3.9)

equivalently,[f(xk+tdk)−f(xk)]

t > 2α∇f(xk)Tdk. (3.10)

Let t→ 0+, taking the limit for the both sides, it follows that

∇f(xk)Tdk ≥ 2α∇f(xk)Tdk.

This implies α ∈ [12 ,∝) due to ∇f(xk)Tdk < 0,. This contradicts α ∈ (0, 12). Hence, the desired

result holds.

Lemma 3.3 Supposed that the assumptions A1-A3 hold, then there exists t > 0 such that

tk ≥ t for k sufficiently large,.

Proof. According to Algorithm A, without loss of generality, suppose that the search direction

dk satisfies (2.10), that is,

∇f(xk)Tdk ≤ −1

2(dk)THkd

k.

By Taylor expansion, (3.7) and the assumptions A1-A3, we have

f(xk + tkdk)− f(xl(k)) + tkα(dk)THkd

k

= f(xk) + tk∇f(xk)Tdk + 12 t

2k(d

k)T∇2f(yk)dk − f(xl(k)) + tkα(dk)THkdk

≤ f(xk) + tk∇f(xk)Tdk + 12 t

2k(d

k)T∇2f(yk)dk − f(xk) + tkα(dk)THkdk

= tk∇f(xk)Tdk + 12 t

2k(d

k)T∇2f(yk)dk + tkα(dk)THkdk

≤ −12 tk(d

k)THkdk + 1

2 t2k(d

k)T∇2f(yk)dk + tkα(dk)THkdk

≤ −atk(12 − α)‖dk‖2 + 12 t

2kM‖dk‖2,

(3.11)

where yk is between xk and xk + tkdk, M is a positive integer such that ‖∇2f(x)‖ ≤M .

Let t = a(1−2α)M > 0, so (2.10) holds for tk ≥ t and α ∈ (0, 12).

Lemma 3.4 Supposed that the assumptions A1-A3 hold, xk is an infinite sequence generated

by Algorithm A, then limk→∞

h(xk) = 0.

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 28, NO.5, 2020, COPYRIGHT 2020 EUDOXUS PRESS, LLC

841 Jianling Li et al 836-847

Page 78: Journal of Computational Analysis and Applicationseudoxuspress.com/images/JOCAAA-VOL-28-2020-ISSUE-5.pdfBaltimore, MD 21251, USA tel: 1-443-885-4373 Fax 1-443-885-8216 Gaston.N'Guerekata@morgan.edu

Proof. Since m(k + 1) ≤ m(k) + 1, we have

h(xl(k+1)) = max0≤j≤m(k+1)

h(xk+1−j) ≤ max0≤j≤m(k)+1

h(xk+1−j) = maxh(xk+1), h(xl(k)) = h(xl(k)),

this implies that the sequence h(xl(k)) is not increasing for k. Combining with h(xl(k)) ≥ 0, we

conclude that h(xl(k)) is convergent.

By Algorithm A, we have

h(xk+1) ≤ β max0≤j≤m(k)

h(xk−j) = βh(xl(k)). (3.12)

Replace k by l(k)− 1. we obtain

h(xl(k)) ≤ βh(xl(l(k)−1)), (3.13)

which together with β ∈ (12 , 1) gives limk→∞

h(xl(k)) = 0. Further, by (3.12), we can conclude

that limk→∞

h(xk) = 0.

Theorem 3.1 Supposed that the assumptions A1-A3 hold, xk is an infinite sequence gener-

ated by Algorithm A, dk is the solution of QSDP (xk, Hk) (2.7). If the multiplier corresponding

to dk is uniform bounded, then there exists K ⊆ 1, 2, · · · such that limk∈K

dk = 0.

Proof. By the assumption A1, we know that xk is bounded, so there exists an infinite index

set K ⊆ 1, 2, · · ·, such that xkK is convergent. Let limk∈K

xk = x∗.

We consider the following two cases:

Case 1. The index set K0 = k ∈ K | ∇f(xk)Tdk ≤ −12(dk)THkd

k is infinite.

By (2.14), we obtain

f(xk+1) = f(xk + tkdk) ≤ f(xl(k))− tkα(dk)THkd

k ≤ f(xl(k)), ∀ k ∈ K0. (3.14)

Since m(k + 1) ≤ m(k) + 1, we obtain

f(xl(k+1)) ≤ max0≤j≤m(k)+1

f(xk+1−j) = maxf(xk+1), f(xl(k)) = f(xl(k)). (3.15)

This implies that the sequence f(xl(k)) is not increasing. Combining with the boundedness

of f(xl(k)), it follows that f(xl(k))K0 is convergent.

For l(k)− 1, k ∈ K0, we obtain

f(xl(k)) ≤ f(xl(l(k)−1))− tl(k)−1α(dl(k)−1)THl(k)−1dl(k)−1. (3.16)

Since f(xl(k)) is convergent, we have

limK0

tl(k)−1α(dl(k)−1)THl(k)−1dl(k)−1 = 0,

By Lemma 3.3, we know that there exists t > 0 such that tl(k)−1 ≥ t > 0, so by the assumption

A3, we obtainlimK0

dl(k)−1 = 0. (3.17)

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 28, NO.5, 2020, COPYRIGHT 2020 EUDOXUS PRESS, LLC

842 Jianling Li et al 836-847

Page 79: Journal of Computational Analysis and Applicationseudoxuspress.com/images/JOCAAA-VOL-28-2020-ISSUE-5.pdfBaltimore, MD 21251, USA tel: 1-443-885-4373 Fax 1-443-885-8216 Gaston.N'Guerekata@morgan.edu

The uniform continuity of f(x) implies that

limK0

f(xl(k)−1) = limK0

f(xl(k)). (3.18)

Let l(k) = l(k +M + 2), it is not difficult to prove by induction that for any given j ≥ 1 ,

limK0

‖dl(k)−j‖ = 0, (3.19)

limK0

f(xl(k)−j) = limK0

f(xl(k)). (3.20)

For any k ∈ K0, we obtain xk+1 = xl(k)−l(k)−k−1∑j=1

tl(k)−jdl(k)−j . Note that l(k)− k− 1 ≤M +

1 and (3.19), we get limK0

‖xk+1 − xl(k)‖ = 0. So it follows from the convergence of f(xl(k)) and

the uniform continuity of f(x) that

limK0

f(xk+1) = limK0

f(xl(k)).

So let k (∈ K0)→∞, taking the limit in (3.14), we have

limK0

tkα(dk)THkdk = 0. (3.21)

Similar to the proof of (3.17), we obtain limK0

dk = 0. Hence, let K = K0 and the conclusion

follows.

Case 2. The index set K0 = k ∈ K | ∇f(xk)Tdk ≤ −12(dk)THkd

k is finite, which implies

that K1 = k ∈ K | ∇f(xk)Tdk > −12(dk)THkd

k is infinite.

By contradiction, supposed that the conclusion is not true, then limK1

dk 6= 0. So there exist

K2 ⊆ K1 and a constant ε > 0, such that ‖dk‖ > ε for k ∈ K2.

Since dk is the solution of QSDP (xk, Hk) (2.7), by KKT condition of QSD(xk, Hk) (2.7) , it

follows that there exists a positive semidefinite matrix Yk such that

∇f(xk) +Hkdk +DG(xk)∗Yk = 0, (3.22)

Tr((G(xk) +DG(xk)dk − zkIm)Yk) = 0, (3.23)

According to the assumption of Theorem 3.1, there exists M > 0 such that ‖Yk‖F ≤ M.

By Lemma 3.4, we know limk→∞

h(xk) = 0, hence there exists k0 > 0, such that

h(xk) ≤ 1

2Mmaε2, for k (∈ K2) > k0, (3.24)

combining with ‖dk‖ > ε and the assumption A3, we obtain

h(xk) ≤ 1

2Mm(dk)THkd

k. (3.25)

It follows from (2.2) that

Tr(DG(xk)dkYk) = Tr((n∑i=1

dki∂G(xk)

∂xi)Yk) =

n∑i=1

Tr(∂G(xk)

∂xiYk)d

ki =

n∑i=1

<∂G(xk)

∂xi, Yk > dki .

(3.26)

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 28, NO.5, 2020, COPYRIGHT 2020 EUDOXUS PRESS, LLC

843 Jianling Li et al 836-847

Page 80: Journal of Computational Analysis and Applicationseudoxuspress.com/images/JOCAAA-VOL-28-2020-ISSUE-5.pdfBaltimore, MD 21251, USA tel: 1-443-885-4373 Fax 1-443-885-8216 Gaston.N'Guerekata@morgan.edu

It follows from (3.23) that

Tr((DG(xk)dk)Yk) = Tr((G(xk)− zkIm)Yk), (3.27)

so (3.26) and (3.27) give rise to

n∑i=1

<∂G(xk)

∂xi, Yk > dki = Tr((G(xk)− zkIm)Yk). (3.28)

By (3.22) and (3.28), we have

∇f(xk)Tdk = −(dk)THkdk − (DG(xk)∗Yk)

Tdk

= −(dk)THkdk −

n∑i=1

<∂G(xk)

∂xi, Yk > dki

= −(dk)THkdk + Tr((G(xk)− zkIm)Yk). (3.29)

By Neumann Inequality, we obtain

Tr((G(xk)− zkIm)Yk) ≤m∑i=1

λi(G(xk)− zkIm)λi(Yk)

≤m∑i=1

λi(G(xk)− zkIm)‖Yk‖F

≤m∑i=1

λi(G(xk)− zkIm)M

≤m∑i=1

λi(G(xk))M, (3.30)

the last inequality above is due to zk ≥ 0. According to the definition (2.8) of h(xk) and (3.30),

we obtain

Tr((G(xk)− zkIm)Yk) ≤ Mmh(xk) ≤ 1

2(dk)THkd

k. (3.31)

Substituting (3.31) into (3.29), it follows that

∇f(xk)Tdk ≤ −1

2(dk)THkd

k,

which contradicts the definition of K1. Hence, the conclusion is true.

Theorem 3.2 Supposed that xk is an infinite sequence generated by Algorithm A, and

the assumptions in Theorem 3.1 hold, then any accumulation point of xk is a KKT point of

NLSDP (1.1).

Proof. Supposed that x∗ is an accumulation point of xk, then there exists K ⊆ 1, 2, · · · ,

such that limk∈K

xk = x∗. In view of the assumption A3, without loss of generality, we suppose

that limk∈K

Hk = H∗.

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 28, NO.5, 2020, COPYRIGHT 2020 EUDOXUS PRESS, LLC

844 Jianling Li et al 836-847

Page 81: Journal of Computational Analysis and Applicationseudoxuspress.com/images/JOCAAA-VOL-28-2020-ISSUE-5.pdfBaltimore, MD 21251, USA tel: 1-443-885-4373 Fax 1-443-885-8216 Gaston.N'Guerekata@morgan.edu

By Lemma 3.4, we have limk∈K

h(xk) = h(x∗) = 0, which means that x∗ is a feasible point of

NLSDP (1.1).

By Theorem 3.1, there exists K ⊆ 1, 2, · · · such that limK

dk = d∗ = 0. By the proof of

Theorem 3.1, we know that K ⊆ K.

According to KKT conditions of QSDP (2.7), we obtain

∇f(xk) +Hkdk +DG(xk)∗Yk = 0,

Yk 0, Tr((G(xk) +DG(xk)dk − zkIm)Yk) = 0.

Let k(∈ K)→∞, taking the limit, we obtain

∇f(x∗) +DG(x∗)∗Y∗ = 0,

Y∗ 0, < G(x∗), Y∗ >= 0.

This implies that x∗ is a KKT point of NLSDP (1.1).

4 Numerical experiments

In this section, preliminary numerical experiments of Algorithm A is implemented. Algorithm

A was coded by Matlab (2014a) and run on the computer with Windows 7 (64 bite), Intel(R)

Core(TM) i7-4790 CPU @ 3.60GHz 3.60GHz, RAM: 4.00GB.

In the numerical experiments, the parameters are chosen as follows: α = 0.25, β = 0.85, σ =

0.5, M = 3. And the termination criteria of Algorithm A is: ‖ dk ‖≤ 10−4.

The test problem is chosen from [11].

Problem 1. Nearest Correlation Matrix (NCM) Problem:

min f(X) = 12‖X − C‖

2F

s.t X εI,Xii = 1, i = 1, 2, ...,m,

(4.1)

where C ∈ Sm is a given matrix, X ∈ Sm, ε is a scalar.

In the implementation, ε = 10−3, C is generated randomly, which diagonal elements are 1. We

test ten times for every fixed dimensionality.

We compare Algorithm A with the ones in [11] (denoted by Algo. YYH) and [14] ( denoted

by Algo. YYY ).

The numerical results are listed in Table 1. The meaning of the notations in Table 1 are

described as follows:

n : the dimensionality of independent variable;

m : the dimensionality ofG(x);

A− Iter : the average number of evaluation of iterations.

Table 1. Numerical results of NCM

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 28, NO.5, 2020, COPYRIGHT 2020 EUDOXUS PRESS, LLC

845 Jianling Li et al 836-847

Page 82: Journal of Computational Analysis and Applicationseudoxuspress.com/images/JOCAAA-VOL-28-2020-ISSUE-5.pdfBaltimore, MD 21251, USA tel: 1-443-885-4373 Fax 1-443-885-8216 Gaston.N'Guerekata@morgan.edu

n m x0 Algorithm A-Iter

Algorithm A 15

10 5 (0.5, ..., 0.5)T Algo. YYY 8

Algo. YYH 9

Algorithm A 15

45 10 (0.5, ..., 0.5)T Algo. YYY 8

Algo. YYH 10

Algorithm A 17

105 15 (0.5, ..., 0.5)T Algo. YYY 10

Algo. YYH 11

Algorithm A 17

190 20 (0.5, ..., 0.5)T Algo. YYY 11

Algo. YYH 12

5 Concluding remarks

In this paper, we have presented a new SSDP algorithm for nonlinear semidefinite programming.

Two subproblems, which are constructed skillfully, are solved to generate the search directions.

The nonmonotone line search ensures that the objective function or constraint violation function is

sufficiently reduced. The global convergence of the proposed algorithm is shown under some mild

conditions. The preliminary numerical results show that the proposed algorithm is effective.

References

[1] Konno, H., Kawadai, N. and Wu, D.: Estimation of failure probability using semi-definite logitmodel.

Computational Management Science, 1: 59-73 (2003)

[2] Apkarian, P., Noll, D and Tuan, D.: Fixed-order HI control design via partially argmented Lagrangian

method. International Journal of Control, 11: 1137-1148 (2003)

[3] Kanno, Y. and Takewaki, I.: Sequential semidefinite program for maximum robustness design of struc-

tures under load uncertainty. Journal of Optimization Theroy and Applications, 130: 265-287 (2006)

[4] Freund, R. W., Jarre, F. and Vogelbusch, C. H.: Nonlinear semidefinite programming: sensitivity,

convergence and an application in passive reduce-order modeling. Mathematical Programming, 109:

581-611 (2007)

[5] Sun, J., Zhang, L. W. and Wu, Y.: Properties of the augmented Lagrangian in nonlinear semidefinite

optimization. Journal of Optimization Theory and Applications, 129: 437-456 (2006)

[6] Noll, D.: Local convergence of an augmented Lagrangian method for matrix inequality constrained

programming. Optimization Methods and Software, 22: 777õ802 (2007)

[7] Sun, D. F., Sun, J. and Zhang, L. W.: The rate of convergence of the augmented Lagrangian method

for nonlinear semidefinite programming. Mathwmatical Programming, 114: 349-391 (2008)

[8] Luo, H. Z., Wu, H. X. and Chen, G. T.: On the convergence of augmented Lagrangian methods for

nonlinear semidefinite programming. Journal of Global Optimization, 54: 599-618 (2012)

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 28, NO.5, 2020, COPYRIGHT 2020 EUDOXUS PRESS, LLC

846 Jianling Li et al 836-847

Page 83: Journal of Computational Analysis and Applicationseudoxuspress.com/images/JOCAAA-VOL-28-2020-ISSUE-5.pdfBaltimore, MD 21251, USA tel: 1-443-885-4373 Fax 1-443-885-8216 Gaston.N'Guerekata@morgan.edu

[9] Wu, H. X., Luo, H. Z. and Ding, X. D.: Global convergence of modified augmented Lagrangian methods

for nonlinear semidefinite programming[J]. Computational Optimization and Applications, 56: 531-558

(2013)

[10] Wu, H. X., Luo, H. Z. and Yang, J. F.: Nonlinear separation approach for the augmented Lagrangianin

nonlinear semidenite programming. Journal of Global Optimization, 59(4): 695-727 (2014)

[11] Yamashita, H., Yabe, H. and Harada, K.: A primalõdual interior point method for nonlinear semidef-

inite programming. Mathematical Programming, 135: 89-121 (2012)

[12] Yamashita, H. and Yabe, H.: Local and superlinear convergence of a primal-dual interior point method

for nonlinear semidefinite programming. Mathematical Programming, 132: 1-30 ( 2012)

[13] Aroztegui, M., Herskovits, J. and Roche, J. R.: A feasible direction interior point algorithm for nonlinear

semidefinite programming. Structral and Multidisciplinary Optimization, 50(6): 1019-1035 (2014)

[14] Yamakawa, Y., Yamashita, N. and Yabe, H.: A differentiable merit function for the shifted perturbed

Karush-Kuhn-Tucker conditions of the nonlinear semidefinite programming. Pacific Journal of Opti-

mization, 11: 557-579 ( (2015))

[15] Li, J. L., Yang, Z. P. and Jian, J. B.: A globally convergent QP-free algorithm for nonlinear semidefinite

programming. Journal of Inequalities and Applications, 145: 1-21 (2017),

[16] Correa, R. and Ramirez, H.: A global algorithm for nonlinear semidefinite programming. SIAM Journal

on Optimization, 15: 303-318 (2004)

[17] Gomez, W. and Ramirez, H.: A filter algorithm for nonlinear semidefinite programming. Computation

and Applied Mathematics, 29: 297-32 (2010)

[18] Zhu, Z. B. and Zhu, H. L.: A filter method for nonlinear semidefinite programming with global conver-

gence. Acta Mathematica Sinica (English Series), 30: 1810-1826 (2014)

[19] Li, C. J. and Sun, W. Y.: On filter-successive linearization methods for nonlinear semidefinite program-

ming. Science in China (Series A), Mathematics, 52: 2341-2361 (2009)

[20] Zhao, Q.: Global convergence of new method for semidefinite programming. South East Asian Journal

of Mathematics and Mathematical Sciences, 3: 189-198 (2013)

[21] Chen, Z. W. and Miao, S. C.: A penalty-free method with trust region for nonlinear semidefinite

programming. Asia-Pacific Journal of Operational Reasearch, 32(1): 1-24 (2015)

[22] Zhang, J. L. and Zhang, X. S.: A robust SQP method for optimization with inequality constraints.

Journal of Computational Mathematics, 21(2): 247-256 (2003)

[23] Long, J., Ma, C. F. and Nie, P. Y.: A new filter method for solving nonlinear complementarity problems.

Application Mathematics and Computation, 185: 705-718 (2007)

[24] Liu, X. W. and Yuan, Y. X.: A robust algorithm for optimization with general equality and inequality

constraints. SIAM Journal on Optimization, 22(2): 517-534 (2000)

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 28, NO.5, 2020, COPYRIGHT 2020 EUDOXUS PRESS, LLC

847 Jianling Li et al 836-847

Page 84: Journal of Computational Analysis and Applicationseudoxuspress.com/images/JOCAAA-VOL-28-2020-ISSUE-5.pdfBaltimore, MD 21251, USA tel: 1-443-885-4373 Fax 1-443-885-8216 Gaston.N'Guerekata@morgan.edu

Approximation by Sublinear and Max-productOperators using Convexity

George A. AnastassiouDepartment of Mathematical Sciences

University of MemphisMemphis, TN 38152, [email protected]

Abstract

Here we consider quantitatively using convexity the approximation of afunction by general positive sublinear operators with applications to Max-product operators. These are of Bernstein type, of Favard-Szász-Mirakjantype, of Baskakov type, of Meyer-Köning and Zeller type, of samplingtype, of Lagrange interpolation type and of Hermite-Fejér interpolationtype. Our results are both: under the presence of smoothness and withoutany smoothness assumption on the function to be approximated whichfullls a convexity property.

2010 AMSMathematics Subject Classication: 41A17, 41A25, 41A36.Keywords and Phrases: positive sublinear operators, Max-product oper-

ators, modulus of continuity, convexity.

1 Background

We make

Remark 1 Let f 2 C ([a; b]), x0 2 (a; b), 0 < h min (x0 a; b x0), andjf (t) f (x0)j is convex in t 2 [a; b].By Lemma 8.1.1, p. 243 of [1] we have that

jf (t) f (x0)j !1 (f; h)

hjt x0j ; 8 t 2 [a; b] ; (1)

where!1 (f; h) := sup

x;y2[a;b]jxyjh

jf (x) f (y)j ; (2)

the rst modulus of continuity of f .

1

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 28, NO.5, 2020, COPYRIGHT 2020 EUDOXUS PRESS, LLC

848 Anastassiou 848-860

Page 85: Journal of Computational Analysis and Applicationseudoxuspress.com/images/JOCAAA-VOL-28-2020-ISSUE-5.pdfBaltimore, MD 21251, USA tel: 1-443-885-4373 Fax 1-443-885-8216 Gaston.N'Guerekata@morgan.edu

We also make

Remark 2 Let f 2 Cn ([a; b]), n 2 N, x0 2 (a; b), 0 < h min (x0 a; b x0),and

f (n) (t) f (n) (x0) is convex in t 2 [a; b]. We have thatf (t) =

nXk=0

f (k) (x0)

k!(t x0)k + It; (3)

where

It =

Z t

x0

Z t1

x0

:::

Z tn1

x0

f (n) (tn) f (n) (x0)

dtn

:::

dt1: (4)

Assuming f (k) (x0) = 0, k = 1; :::; n, we get

f (t) f (x0) = It: (5)

By Lemma 8.1.1, p. 243 of [1] we havef (n) (t) f (n) (x0) !1f (n); h

h

jt x0j ; 8 t 2 [a; b] : (6)

Furthermore it holds

jItj !1f (n); h

h

jt x0jn+1

(n+ 1)!; 8 t 2 [a; b] : (7)

Hence we derive that

jf (t) f (x0)j(5)!1f (n); h

h

jt x0jn+1

(n+ 1)!; 8 t 2 [a; b] : (8)

We have proved the following results:

Theorem 3 Let f 2 C ([a; b]), x 2 (a; b), 0 < h min (x a; b x), andjf () f (x)j is convex over [a; b]. Then

jf () f (x)j !1 (f; h)

hj xj ; over [a; b] : (9)

Theorem 4 Let f 2 Cn ([a; b]), n 2 N, x 2 (a; b), 0 < h min (x a; b x),and

f (n) () f (n) (x) is convex over [a; b]. Assume that f (k) (x) = 0, k =1; :::; n: Then

jf () f (x)j !1f (n); h

h

j xjn+1

(n+ 1)!; over [a; b] : (10)

We give

2

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 28, NO.5, 2020, COPYRIGHT 2020 EUDOXUS PRESS, LLC

849 Anastassiou 848-860

Page 86: Journal of Computational Analysis and Applicationseudoxuspress.com/images/JOCAAA-VOL-28-2020-ISSUE-5.pdfBaltimore, MD 21251, USA tel: 1-443-885-4373 Fax 1-443-885-8216 Gaston.N'Guerekata@morgan.edu

Denition 5 Call C+ ([a; b]) := ff : [a; b]! R+ and continuousg : Let LN fromC+ ([a; b]) into C+ ([a; b]) be a sequence of operators satisfying the followingproperties (see also [6], p. 17):(i) (positive homogeneous)

LN (f) = LN (f) ; 8 0; 8 f 2 C+ ([a; b]) ; (11)

(ii) (Monotonicity)if f; g 2 C+ ([a; b]) satisfy f g; then

LN (f) LN (g) , 8 N 2 N; (12)

(iii) (Subadditivity)

LN (f + g) LN (f) + LN (g) ; 8 f; g 2 C+ ([a; b]) : (13)

We call LN positive sublinear operators.

We make

Remark 6 As in [6], p. 17, we get that for f; g 2 C+ ([a; b])

jLN (f) (x) LN (g) (x)j LN (jf gj) (x) ; 8 x 2 [a; b] : (14)

From now on we assume that LN (1) = 1, 8 N 2 N. Hence it holds

jLN (f) (x) f (x)j LN (jf () f (x)j) (x) ; 8 x 2 [a; b] ; 8 N 2 N, (15)

see also [6], p. 17.

We obtain the following results:

Theorem 7 Let f 2 C+ ([a; b]), x 2 (a; b), 0 < h min (x a; b x), andjf () f (x)j is a convex function over [a; b]. Let fLNgN2N positive sublinearoperators from C+ ([a; b]) into itself, such that LN (1) = 1, 8 N 2 N. Then

jLN (f) (x) f (x)j !1 (f; h)

hLN (j xj) (x) ; 8 N 2 N: (16)

Proof. By (9) and (15).

Theorem 8 Let f 2 Cn ([a; b] ;R+), n 2 N, x 2 (a; b), 0 < h min (x a; b x),and

f (n) () f (n) (x) is convex over [a; b]. Assume that f (k) (x) = 0, k =1; :::; n: Let fLNgN2N positive sublinear operators from C+ ([a; b]) into itself,such that LN (1) = 1, 8 N 2 N. Then

jLN (f) (x) f (x)j !1f (n); h

h (n+ 1)!

LN

j xjn+1

(x) ; 8 N 2 N: (17)

3

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 28, NO.5, 2020, COPYRIGHT 2020 EUDOXUS PRESS, LLC

850 Anastassiou 848-860

Page 87: Journal of Computational Analysis and Applicationseudoxuspress.com/images/JOCAAA-VOL-28-2020-ISSUE-5.pdfBaltimore, MD 21251, USA tel: 1-443-885-4373 Fax 1-443-885-8216 Gaston.N'Guerekata@morgan.edu

Proof. By (10) and (15).We continue with

Theorem 9 Let f 2 C+ ([a; b]), x 2 (a; b), 0 < LN (j xj) (x) min (x a; b x),8 N 2 N, and jf () f (x)j is a convex function over [a; b]. Here LN are pos-itive sublinear operators from C+ ([a; b]) into itself, such that LN (1) = 1, 8N 2 N. Then

jLN (f) (x) f (x)j !1 (f; LN (j xj) (x)) ; 8 N 2 N: (18)

If LN (j xj) (x)! 0, then LN (f) (x)! f (x), as N ! +1:

Proof. By (16).

Theorem 10 Let f 2 Cn ([a; b] ;R+), n 2 N, x 2 (a; b), 0 < LNj xjn+1

(x)

min (x a; b x), 8 N 2 N, andf (n) () f (n) (x) is convex over [a; b].

Assume that f (k) (x) = 0, k = 1; :::; n: Here fLNgN2N are positive sublinearoperators from C+ ([a; b]) into itself, such that LN (1) = 1, 8 N 2 N. Then

jLN (f) (x) f (x)j !1

f (n); LN

j xjn+1

(x)

(n+ 1)!; 8 N 2 N: (19)

If LNj xjn+1

(x)! 0, then LN (f) (x)! f (x), as N ! +1:

Proof. By (17).Next we combine both Theorems 7, 8:

Theorem 11 Let f 2 Cn ([a; b] ;R+), n 2 Z+, x 2 (a; b), 0 < h min (x a; b x),and

f (n) () f (n) (x) is convex over [a; b]. Assume that f (k) (x) = 0, k =1; :::; n: Let fLNgN2N positive sublinear operators from C+ ([a; b]) into itself,such that LN (1) = 1, 8 N 2 N. Then

jLN (f) (x) f (x)j !1f (n); h

h (n+ 1)!

LN

j xjn+1

(x) ; 8 N 2 N; n 2 Z+:

(20)The initial conditions f (k) (x) = 0, k = 1; :::; n; are void when n = 0:

In this article we study under convexity quantitatively the approximationproperties of Max-product operators to the unit. These are special cases of pos-itive sublinear operators. We present also results regarding the convergence tothe unit of general positive sublinear operators under convexity. Special empha-sis is given to our study about approximation under the presence of smoothness.Our work is inspired from [6].Under our convexity conditions the derived convergence inequalities are el-

egant and compact with very small constants.

4

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 28, NO.5, 2020, COPYRIGHT 2020 EUDOXUS PRESS, LLC

851 Anastassiou 848-860

Page 88: Journal of Computational Analysis and Applicationseudoxuspress.com/images/JOCAAA-VOL-28-2020-ISSUE-5.pdfBaltimore, MD 21251, USA tel: 1-443-885-4373 Fax 1-443-885-8216 Gaston.N'Guerekata@morgan.edu

2 Main Results

Here we apply Theorem 11 to Max-product operators.We make

Remark 12 We start with the Max-product Bernstein operators ([6], p. 10)

B(M)N (f) (x) =

WNk=0 pN;k (x) f

kN

WNk=0 pN;k (x)

; 8 N 2 N, (21)

pN;k (x) =

N

k

xk (1 x)N1, x 2 [0; 1] ;

Wstands for maximum, and f 2

C+ ([0; 1]) = ff : [0; 1]! R+ is continuousg ; where R+ := [0;1):Clearly B(M)

N is a positive sublinear operators from C+ ([0; 1]) into itself with

B(M)N (1) = 1:

By [6], p. 31, we have

B(M)N (j xj) (x) 6p

N + 1, 8 x 2 [0; 1] , 8 N 2 N. (22)

And by [2] we get:

B(M)N (j xjm) (x) 6p

N + 1, 8 x 2 [0; 1] , m;N 2 N. (23)

Denote by

Cn+ ([0; 1]) = ff : [0; 1]! R+, n-times continuously di¤erentiableg ; n 2 Z+:

We present

Theorem 13 Let f 2 Cn+ ([0; 1]), n 2 Z+, x 2 (0; 1) and N 2 N : 0 <1p

N+1 min (x; 1 x), and

f (n) () f (n) (x) is convex over [0; 1]. Assumethat f (k) (x) = 0, k = 1; :::; n: Then

B(M)N (f) (x) f (x)

6!1

f (n); 1p

N+1

(n+ 1)!

; 8 N 2 N : N N: (24)

It holds limN!+1

B(M)N (f) (x) = f (x) :

Proof. By (20) we getB(M)N (f) (x) f (x)

!1f (n); h

h (n+ 1)!

B(M)N

j xjn+1

(x)

(23)

!1f (n); h

h (n+ 1)!

6pN + 1

=

5

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 28, NO.5, 2020, COPYRIGHT 2020 EUDOXUS PRESS, LLC

852 Anastassiou 848-860

Page 89: Journal of Computational Analysis and Applicationseudoxuspress.com/images/JOCAAA-VOL-28-2020-ISSUE-5.pdfBaltimore, MD 21251, USA tel: 1-443-885-4373 Fax 1-443-885-8216 Gaston.N'Guerekata@morgan.edu

(setting h := 1pN+1

)

6!1

f (n); 1p

N+1

(n+ 1)!

; (25)

proving the claim.We make

Remark 14 Here we focus on the truncated Favard-Szász-Mirakjan operators

T(M)N (f) (x) =

WNk=0 sN;k (x) f

kN

WNk=0 sN;k (x)

; x 2 [0; 1] ; N 2 N, f 2 C+ ([0; 1]) ; (26)

sN;k (x) =(Nx)k

k! , see also [6], p. 11.By [6], p. 178-179 we have

T(M)N (j xj) (x) 3p

N; 8 x 2 [0; 1] ; 8 N 2 N: (27)

And by [2] we get

T(M)N (j xjm) (x) 3p

N; 8 x 2 [0; 1] ; 8 m;N 2 N: (28)

The operators T (M)N are positive sublinear from C+ ([0; 1]) into itself with T

(M)N (1)

= 1, 8 N 2 N.

We give

Theorem 15 Let f 2 Cn+ ([0; 1]), n 2 Z+, x 2 (0; 1) and N 2 N : 0 <1pN min (x; 1 x), and

f (n) () f (n) (x) is convex over [0; 1]. Assumethat f (k) (x) = 0, k = 1; :::; n: Then

T (M)N (f) (x) f (x)

3!1

f (n); 1p

N

(n+ 1)!

; 8 N 2 N : N N: (29)

It holds limN!+1

T(M)N (f) (x) = f (x) :

Proof. By (20) we getT (M)N (f) (x) f (x)

!1f (n); h

h (n+ 1)!

T(M)N

j xjn+1

(x)

(28)

!1f (n); h

h (n+ 1)!

3pN=

6

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 28, NO.5, 2020, COPYRIGHT 2020 EUDOXUS PRESS, LLC

853 Anastassiou 848-860

Page 90: Journal of Computational Analysis and Applicationseudoxuspress.com/images/JOCAAA-VOL-28-2020-ISSUE-5.pdfBaltimore, MD 21251, USA tel: 1-443-885-4373 Fax 1-443-885-8216 Gaston.N'Guerekata@morgan.edu

(setting h := 1pN)

3!1

f (n); 1p

N

(n+ 1)!

; (30)

proving the claim.We make

Remark 16 Next we study the truncated Max-product Baskakov operators (see[6], p. 11)

U(M)N (f) (x) =

WNk=0 bN;k (x) f

kN

WNk=0 bN;k (x)

; x 2 [0; 1] ; f 2 C+ ([0; 1]) ; N 2 N,

(31)where

bN;k (x) =

N + k 1

k

xk

(1 + x)N+k

:

From [6], pp. 217-218, we get (x 2 [0; 1])U(M)N (j xj)

(x) 12p

N + 1, N 2, N 2 N: (32)

And as in [2], we obtain (m 2 N)U(M)N (j xjm)

(x) 12p

N + 1, N 2, N 2 N; 8 x 2 [0; 1] : (33)

Also it holds U (M)N (1) (x) = 1, and U (M)

N are positive sublinear operators fromC+ ([0; 1]) into itself, 8 N 2 N.

We give

Theorem 17 Let f 2 Cn+ ([0; 1]), n 2 Z+, x 2 (0; 1) and N 2 N f1g : 0 <1p

N+1 min (x; 1 x), and

f (n) () f (n) (x) is convex over [0; 1]. Assumethat f (k) (x) = 0, k = 1; :::; n: Then

U (M)N (f) (x) f (x)

12!1

f (n); 1p

N+1

(n+ 1)!

; 8 N 2 N : N N: (34)

It holds limN!+1

U(M)N (f) (x) = f (x) :

Proof. By (20) we getU (M)N (f) (x) f (x)

!1f (n); h

h (n+ 1)!

U(M)N

j xjn+1

(x)

(33)

7

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 28, NO.5, 2020, COPYRIGHT 2020 EUDOXUS PRESS, LLC

854 Anastassiou 848-860

Page 91: Journal of Computational Analysis and Applicationseudoxuspress.com/images/JOCAAA-VOL-28-2020-ISSUE-5.pdfBaltimore, MD 21251, USA tel: 1-443-885-4373 Fax 1-443-885-8216 Gaston.N'Guerekata@morgan.edu

!1f (n); h

h (n+ 1)!

12pN + 1

=

(setting h := 1pN+1

)

12!1

f (n); 1p

N+1

(n+ 1)!

; (35)

proving the claim.We make

Remark 18 Here we study Max-product Meyer-Köning and Zeller operators(see [6], p. 11) dened by

Z(M)N (f) (x) =

W1k=0 sN;k (x) f

k

N+k

W1k=0 sN;k (x)

; 8 N 2 N, f 2 C+ ([0; 1]) ; (36)

sN;k (x) =

N + k

k

xk, x 2 [0; 1].

By [6], p. 253, we get that

Z(M)N (j xj) (x)

81 +

p5

3

px (1 x)pN

, 8 x 2 [0; 1] , N 4: (37)

And by [2], we derive that

Z(M)N (j xjm) (x)

81 +

p5

3

px (1 x)pN

, (38)

8 x 2 [0; 1], N 4; 8 m 2 N.

The ceiling8(1+

p5)

3

= 9, and using a basic calculus technique (see [4]) we

get that g (x) := (1 x)px has an absolute maximum over (0; 1] : g

13

= 2

3p3.

That is (1 x)px 2

3p3, 8 x 2 [0; 1] :

Consequently it holds

Z(M)N (j xjm) (x) 6p

3pN; (39)

8 x 2 [0; 1], 8 N 2 N : N 4; 8 m 2 N.Also it holds Z(M)

N (1) = 1, and Z(M)N are positive sublinear operators from

C+ ([0; 1]) into itself, 8 N 2 N.

We give

8

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 28, NO.5, 2020, COPYRIGHT 2020 EUDOXUS PRESS, LLC

855 Anastassiou 848-860

Page 92: Journal of Computational Analysis and Applicationseudoxuspress.com/images/JOCAAA-VOL-28-2020-ISSUE-5.pdfBaltimore, MD 21251, USA tel: 1-443-885-4373 Fax 1-443-885-8216 Gaston.N'Guerekata@morgan.edu

Theorem 19 Let f 2 Cn+ ([0; 1]), n 2 Z+, x 2 (0; 1) and N 2 N : N 4

with 0 < 1pN min (x; 1 x), and

f (n) () f (n) (x) is convex over [0; 1].Assume that f (k) (x) = 0, k = 1; :::; n: ThenZ(M)

N (f) (x) f (x) 6p

3 (n+ 1)!

!1

f (n);

1pN

; 8 N 2 N : N N:

(40)It holds lim

N!+1Z(M)N (f) (x) = f (x) :

Proof. By (20) we getZ(M)N (f) (x) f (x)

!1f (n); h

h (n+ 1)!

Z(M)N

j xjn+1

(x)

(39)

!1f (n); h

h (n+ 1)!

6p3pN=

(setting h := 1pN)

6p3 (n+ 1)!

!1

f (n);

1pN

; (41)

proving the claim.We make

Remark 20 Here we mention the Max-product truncated sampling operators(see [6], p. 13) dened by

W(M)N (f) (x) :=

WNk=0

sin(Nxk)Nxk f

kN

WNk=0

sin(Nxk)Nxk

; x 2 [0; ] ; (42)

f : [0; ]! R+, continuous,and

K(M)N (f) (x) :=

WNk=0

sin2(Nxk)(Nxk)2 f

kN

WNk=0

sin2(Nxk)(Nxk)2

; x 2 [0; ] ; (43)

f : [0; ]! R+, continuous.By convention we take sin(0)

0 = 1; which implies for every x = kN , k 2

f0; 1; :::; Ng that we have sin(Nxk)Nxk = 1:

We dene the Max-product truncated combined sampling operators (see also[5])

M(M)N (f) (x) :=

WNk=0 N;k (x) f

kN

WNk=0 N;k (x)

; x 2 [0; ] ; (44)

9

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 28, NO.5, 2020, COPYRIGHT 2020 EUDOXUS PRESS, LLC

856 Anastassiou 848-860

Page 93: Journal of Computational Analysis and Applicationseudoxuspress.com/images/JOCAAA-VOL-28-2020-ISSUE-5.pdfBaltimore, MD 21251, USA tel: 1-443-885-4373 Fax 1-443-885-8216 Gaston.N'Guerekata@morgan.edu

f 2 C+ ([0; ]) ; where

M(M)N (f) (x) :=

8<:W(M)N (f) (x) , if N;k (x) :=

sin(Nxk)Nxk ;

K(M)N (f) (x) , if N;k (x) :=

sin(Nxk)Nxk

2:

(45)

By [6], p. 346 and p. 352 we getM

(M)N (j xj)

(x)

2N, (46)

and by [3] (m 2 N) we haveM

(M)N (j xjm)

(x) m

2N, 8 x 2 [0; ] , 8 N 2 N: (47)

Also it holds M (M)N (1) = 1, and M (M)

N are positive sublinear operators fromC+ ([0; ]) into itself, 8 N 2 N.

We give

Theorem 21 Let f 2 Cn ([0; ] ;R+), n 2 Z+, x 2 (0; ) and N 2 N : 0 <1N min (x; x), and

f (n) () f (n) (x) is convex over [0; ]. Assume thatf (k) (x) = 0, k = 1; :::; n: ThenM (M)

N (f) (x) f (x) n+1

2 (n+ 1)!

!1

f (n);

1

N

; (48)

8 N 2 N : N N; n 2 Z+:It holds lim

N!+1M

(M)N (f) (x) = f (x) :

Proof. By (20) we have:M (M)N (f) (x) f (x)

!1f (n); h

h (n+ 1)!

M(M)N

j xjn+1

(x)

(47)

!1f (n); h

h (n+ 1)!

n+1

2N=

(setting h := 1N )

n+1

2 (n+ 1)!

!1

f (n);

1

N

; (49)

proving the claim.We make

10

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 28, NO.5, 2020, COPYRIGHT 2020 EUDOXUS PRESS, LLC

857 Anastassiou 848-860

Page 94: Journal of Computational Analysis and Applicationseudoxuspress.com/images/JOCAAA-VOL-28-2020-ISSUE-5.pdfBaltimore, MD 21251, USA tel: 1-443-885-4373 Fax 1-443-885-8216 Gaston.N'Guerekata@morgan.edu

Remark 22 The Chebyshev knots of rst kind xN;k := cos(2(Nk)+1)2(N+1)

2

(1; 1), k 2 f0; 1; :::; Ng; 1 < xN;0 < xN;1 < ::: < xN;N < 1, are the rootsof the rst kind Chebyshev polynomial TN+1 (x) := cos ((N + 1) arccosx), x 2[1; 1] :Dene (x 2 [1; 1])

hN;k (x) := (1 x xN;k)

TN+1 (x)

(N + 1) (x xN;k)

2; (50)

the fundamental interpolation polynomials.The Max-product interpolation Hermite-Fejér operators on Chebyshev knots

of the rst kind (see p. 12 of [6]) are dened by

H(M)2N+1 (f) (x) =

WNk=0 hN;k (x) f (xN;k)WN

k=0 hN;k (x); 8 N 2 N, (51)

for f 2 C+ ([1; 1]), 8 x 2 [1; 1] :By [6], p. 287, we have

H(M)2N+1 (j xj) (x)

2

N + 1; 8 x 2 [1; 1] , 8 N 2 N: (52)

And by [3], we get that

H(M)2N+1 (j xj

m) (x) 2m

N + 1; 8 x 2 [1; 1] , 8 m;N 2 N: (53)

Notice H(M)2N+1 (1) = 1, and H(M)

2N+1 maps C+ ([1; 1]) into itself, and it isa positive sublinear operator. Furthermore it holds

WNk=0 hN;k (x) > 0, 8 x 2

[1; 1]. We also have hN;k (xN;k) = 1, and hN;k (xN;j) = 0, if k 6= j, andH(M)2N+1 (f) (xN;j) = f (xN;j), for all j 2 f0; 1; :::; Ng, see [6], p. 282.

We give

Theorem 23 Let f 2 Cn ([1; 1] ;R+), n 2 Z+, x 2 (1; 1) and let N 2 N :0 < 1

N+1 min (x+ 1; 1 x), andf (n) () f (n) (x) is convex over [1; 1].

Assume that f (k) (x) = 0, k = 1; :::; n: ThenH(M)2N+1 (f) (x) f (x)

2n+1

(n+ 1)!

!1

f (n);

1

N + 1

; (54)

8 N N, N 2 N; n 2 Z+:It holds lim

N!+1H(M)2N+1 (f) (x) = f (x) :

Proof. By (20) we getH(M)2N+1 (f) (x) f (x)

!1f (n); h

h (n+ 1)!

H(M)2N+1

j xjn+1

(x)

(53)

11

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 28, NO.5, 2020, COPYRIGHT 2020 EUDOXUS PRESS, LLC

858 Anastassiou 848-860

Page 95: Journal of Computational Analysis and Applicationseudoxuspress.com/images/JOCAAA-VOL-28-2020-ISSUE-5.pdfBaltimore, MD 21251, USA tel: 1-443-885-4373 Fax 1-443-885-8216 Gaston.N'Guerekata@morgan.edu

!1f (n); h

h (n+ 1)!

2n+1

N + 1

=

(setting h := 1N+1 )

2n+1

(n+ 1)!

!1

f (n);

1

N + 1

; (55)

proving the claim.We make

Remark 24 Let f 2 C+ ([1; 1]). Let the Chebyshev knots of second kind

xN;k = cos

NkN1

2 [1; 1], k = 1; :::; N; N 2 Nf1g, which are the roots

of !N (x) = sin (N 1) t sin t, x = cos t 2 [1; 1]. Notice that xN;1 = 1 andxN;N = 1:

Dene

lN;k (x) :=(1)k1 !N (x)

(1 + k;1 + k;N ) (N 1) (x xN;k); (56)

N 2, k = 1; :::; N , and !N (x) =QNk=1 (x xN;k) and i;j denotes the Kro-

nechers symbol, that is i;j = 1, if i = j, and i;j = 0, if i 6= j.The Max-product Lagrange interpolation operators on Chebyshev knots of

second kind, plus the endpoints 1, are dened by ([6], p. 12)

L(M)N (f) (x) =

WNk=1 lN;k (x) f (xN;k)WN

k=1 lN;k (x); x 2 [1; 1] : (57)

By [6], pp. 297-298 and [3], we get that

L(M)N (j xjm) (x) 2m+12

3 (N 1) ; (58)

8 x 2 (1; 1) and 8 m 2 N; 8 N 2 N, N 4:We see that L(M)

N (f) (x) 0 is well dened and continuous for any x 2[1; 1]. Following [6], p. 289, because

PNk=1 lN;k (x) = 1, 8 x 2 [1; 1], for

any x there exists k 2 f1; :::; Ng : lN;k (x) > 0, henceWNk=1 lN;k (x) > 0. We

have that lN;k (xN;k) = 1, and lN;k (xN;j) = 0, if k 6= j. Furthermore it holdsL(M)N (f) (xN;j) = f (xN;j), all j 2 f1; :::; Ng ; and L(M)

N (1) = 1.

By [6], pp. 289-290, L(M)N are positive sublinear operators.

Finally we present

Theorem 25 Let f 2 Cn ([1; 1] ;R+), n 2 Z+, x 2 (1; 1) and let N 2 N :N 4, with 0 < 1

N1 min (x+ 1; 1 x), andf (n) () f (n) (x) is convex

over [1; 1]. Assume that f (k) (x) = 0, k = 1; :::; n: ThenL(M)N (f) (x) f (x)

2n+22

3 (n+ 1)!

!1

f (n);

1

N 1

; (59)

12

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 28, NO.5, 2020, COPYRIGHT 2020 EUDOXUS PRESS, LLC

859 Anastassiou 848-860

Page 96: Journal of Computational Analysis and Applicationseudoxuspress.com/images/JOCAAA-VOL-28-2020-ISSUE-5.pdfBaltimore, MD 21251, USA tel: 1-443-885-4373 Fax 1-443-885-8216 Gaston.N'Guerekata@morgan.edu

8 N 2 N : N N 4; n 2 Z+:It holds lim

N!+1L(M)N (f) (x) = f (x) :

Proof. Using (20) we get:L(M)N (f) (x) f (x)

!1f (n); h

h (n+ 1)!

L(M)N

j xjn+1

(x)

(58)

!1f (n); h

h (n+ 1)!

2n+22

3 (N 1)

=

(setting h := 1N1 )

2n+22

3 (n+ 1)!

!1

f (n);

1

N 1

; (60)

proving the claim.

References

[1] G. Anastassiou, Moments in probability and approximation theory, PitmanResearch Notes in Mathematics Series, Longman Group UK, New York, NY,1993.

[2] G. Anastassiou, Approximation by Sublinear Operators, Acta MathematicaUniversitatis Comenianae, 87(2018)(2), 237-250.

[3] G. Anastassiou, Approximation by Max-Product Operators, Fasc. Math.60(2018), 5-28.

[4] G. Anastassiou, Approximation of Fuzzy numbers by Max-product operators,Transylvanian Journal of Mathematics and Mechanics, 9(2017)(2),117-123.

[5] G. Anastassiou, Approximations by Multivariate Sublinear and Max-productOperators under Convexity, Demonstratio Mathematica, 51(2018), 85-105.

[6] B. Bede, L. Coroianu, S. Gal, Approximation by Max-Product type Operators,Springer, Heidelberg, New York, 2016.

13

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 28, NO.5, 2020, COPYRIGHT 2020 EUDOXUS PRESS, LLC

860 Anastassiou 848-860

Page 97: Journal of Computational Analysis and Applicationseudoxuspress.com/images/JOCAAA-VOL-28-2020-ISSUE-5.pdfBaltimore, MD 21251, USA tel: 1-443-885-4373 Fax 1-443-885-8216 Gaston.N'Guerekata@morgan.edu

Symmetric identities for Carlitz’s generalized twistedq-Bernoulli numbers and polynomials associated with p-adic

invariant integral on Zp

Cheon Seoung Ryoo

Department of Mathematics, Hannam University, Daejeon 34430, Korea

Abstract : In this paper, we study the symmetry for the Carlitz’s generalized twisted q-Bernoulli

polynomials βn,χ,q,ζ(x). We obtain some interesting identities of the power sums and the Carlitz’s

generalized twisted q-Bernoulli polynomials βn,χ,q,ζ(x) using the symmetric properties for the p-adic

invariant integral on Zp.

Key words : Symmetric properties, power sums, Bernoulli numbers and polynomials, Carlitz’s

generalized twisted q-Bernoulli numbers and polynomials, p-adic invariant integral on Zp.

2000 Mathematics Subject Classification : 11B68, 11S40, 11S80.

1. Introduction

Bernoulli polynomials, q-Bernoulli polynomials, the second kind Bernoulli polynomials, Euler

polynomials, tangent polynomials, and Bell polynomials were studied by many authors( see [1,

3, 4, 5, 6, 7, 8, 9, 10]). Recently, Y. He obtained several identities of symmetry for Carlitz’s q-

Bernoulli numbers and polynomials in complex field(see [1]). D. Kim et al.[3] studied some identities

of symmetry for generalized Carlitz’s q-Bernoulli numbers and polynomials by using the p-adic

integrals on Zp in p-adic field. The purpose of this paper is to obtain some interesting identities

of the power sums and Carlitz’s generalized twisted q-Bernoulli polynomials βn,χ,q,ζ(x) using the

symmetric properties for the p-adic invariant integral on Zp.Let p be a fixed prime number. Throughout this paper we use the notation:

[x]q =1− qx

1− q, [x]−q =

1− (−q)x

1 + q(cf. [1-4]) .

Hence, limq→1[x] = x for any x with |x|p ≤ 1 in the present p-adic case. Let

g ∈ UD(Zp) = g|g : Zp → Cp is uniformly differentiable function.

For g ∈ UD(Zp) the p-adic invariant integral on Zp is defined by Kim as follows:

I1(g) =

∫Zp

g(x)dµ1(x) = limN→∞

1

pN

pN−1∑x=0

g(x), (cf. [2, 3, 4]) . (1.1)

Let a fixed positive integer d with (p, d) = 1, set

X = Xd = lim←−N

(Z/dpNZ), X1 = Zp,

X∗ =∪

0<a<dp(a,p)=1

a+ dpZp,

a+ dpNZp = x ∈ X | x ≡ a (mod dpN ),

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 28, NO.5, 2020, COPYRIGHT 2020 EUDOXUS PRESS, LLC

861 Ryoo 861-864

Page 98: Journal of Computational Analysis and Applicationseudoxuspress.com/images/JOCAAA-VOL-28-2020-ISSUE-5.pdfBaltimore, MD 21251, USA tel: 1-443-885-4373 Fax 1-443-885-8216 Gaston.N'Guerekata@morgan.edu

where a ∈ Z satisfies the condition 0 ≤ a < dpN . It is easy to see that∫X

g(x)dµq(x) =

∫Zp

g(x)dµq(x). (1.2)

Let Tp = ∪N≥1CpN = limN→∞ CpN , where CpN = ζ|ζpN = 1 is the cyclic group of order pN . For

ζ ∈ Tp, we denote by ϕζ : Zp → Cp the locally constant function x 7−→ ζx(cf. [6, 10]).

2. Symmetric identities for Carlitz’s generalized twisted q-Bernoulli numbers and

polynomials

Mathematicians investigated interesting properties of symmetry for special polynomials using

p-adic invariant integral on Zp(see [1, 3, 4, 5]). If we take χ0 = 1, then [5] is the special case of

this paper. Let χ be Dirichlet’s character with conductor d ∈ N with (d, p) = 1. For q ∈ Cp with

|q − 1|p < p−1

p−1 , the twisted q-Bernoulli polynomials βn,q,ζ(x) are defined by

βn,q,ζ(x) =

∫Zp

ϕζ(y)qy[x+ y]nq dµ1(y).

We introduce the Carlitz’s generalized twisted q-Bernoulli polynomials βn,χ,q,ζ(x) attached to χ.

The Carlitz’s generalized twisted q-Bernoulli polynomials βn,χ,q,ζ(x) attached to χ are defined by

βn,χ,q,ζ(x) =

∫X

χ(y)ϕζ(y)qy[x+ y]nq dµ1(y).

When x = 0, βn,χ,q,ζ = βn,χ,q,ζ(0) is called the n-th Carlitz’s generalized twisted q-Bernoulli numbers

βn,χ,q,ζ . We note that∞∑n=0

βn,χ,q,ζtn

n!=

∫X

χ(y)ζyqye[x+y]qtdµ1(x).

Let w1 and w2 be natural numbers. Then, by (1.1) and (1.2), we obtain

1

w1

∫X

χ(y)ζw1yqw1ye[w1w2x+w2j+w1y]qtdµ1(y)

= limN→∞

1

w1

1

dw2pN

dw2pN−1∑

y=0

χ(y)ζw1yqw1ye[w1w2x+w2j+w1y]qtqw1y

= limN→∞

1

dw1w2pN

dw2−1∑i=0

χ(i)qw1iζw1i

pN−1∑y=0

ζdw1w2yqdw1w2ye[w1w2x+w2j+w1i+dw1w2y]qt.

(2.1)

From (2.1), we can derive the following equation (2.2):

1

w1

dw1−1∑j=0

χ(j)ζw2jqw2j

∫X

χ(y)ζw1yqw1ye[w1w2x+w2j+w1y]qtdµ1(y)

= limN→∞

1

dw1w2pN

dw1−1∑j=0

dw2−1∑i=0

pN−1∑y=0

χ(i)χ(j)ζw2jζw1iqw2jqw1i

× e[w1w2x+w2j+w1i+dw1w2y)]qtζdw1w2yqdw1w2y.

(2.2)

By the same method as (2.2), we obtain

1

w2

dw2−1∑j=0

χ(j)ζw1jqw1j

∫X

χ(y)ζw2yqw2ye[w1w2x+w1j+w2y]qtdµ1(y)

= limN→∞

1

dw1w2pN

dw2−1∑j=0

dw1−1∑i=0

pN−1∑y=0

χ(i)χ(j)ζw1iζw2iqw1jqw2i

× e[w1w2x+w1j+w2i+dw1w2y]qtζdw1w2yqdw1w2y.

(2.3)

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 28, NO.5, 2020, COPYRIGHT 2020 EUDOXUS PRESS, LLC

862 Ryoo 861-864

Page 99: Journal of Computational Analysis and Applicationseudoxuspress.com/images/JOCAAA-VOL-28-2020-ISSUE-5.pdfBaltimore, MD 21251, USA tel: 1-443-885-4373 Fax 1-443-885-8216 Gaston.N'Guerekata@morgan.edu

Therefore, by (2.2) and (2.3), we have the following theorem.

Theorem 1. For w1, w2 ∈ N , we have

1

w1

dw1−1∑j=0

χ(j)ζw2jqw2j

∫X

χ(y)ζw1yqw1ye[w1w2x+w2j+w1y]qtdµ1(y)

=1

w2

dw2−1∑j=0

χ(j)ζw1jqw1j

∫X

χ(y)ζw2yqw2ye[w1w2x+w1j+w2y]qtdµ1(y).

(2.4)

By substituting Taylor series of ext into (2.4) and after calculations, we obtain the following corollary.

Corollary 2. For w1, w2 ∈ N, n ≥ 0, we have

[w1]nqw1

dw1−1∑j=0

χ(j)ζw2jqw2j

∫X

χ(y)ζw1yqw1y

[w2x+

w2

w1j + y

]nqw1

dµ1(y)

=[w2]nqw2

dw2−1∑j=0

χ(j)ζw1jqw1j

∫X

χ(y)ζw2yqw2y

[w1x+

w1

w2j + y

]nqw2

dµ1(y).

By Corollary 2, we have the following theorem.

Theorem 3. For w1, w2 ∈ N, n ≥ 0, we have

[w1]nqw1

dw1−1∑j=0

χ(j)ζw2jqw2jβn,χ,qw1 ,ζw1

(w2x+

w2

w1j

)

=[w2]nqw2

dw2−1∑j=0

χ(j)ζw1jqw1jβn,χ,qw2 ,ζw2

(w1x+

w1

w2j

).

By (2.5), we can derive the following equation:∫X

χ(y)ζw1yqw1y

[w2x+

w2

w1j + y

]nqw1

dµ1(y)

=n∑i=0

(n

i

)([w2]q[w1]q

)i[j]iqw2 q

w2(n−i)j∫X

χ(y)ζw1yqw1y [w2x+ y]n−iqw1 dµ1(y)

=n∑i=0

(n

i

)([w2]q[w1]q

)i[j]iqw2 q

w2(n−i)jβn−i,χ,qw1 ,ζw1 (w2x) .

(2.5)

Again, by (2.5), and Theorem 3, we have

[w1]nqw1

dw1−1∑j=0

χ(j)ζw2jqw2j

∫X

χ(y)ζw1yqw1y

[w2x+

w2

w1j + y

]nqw1

dµ1(y)

=

dw1−1∑j=0

χ(j)ζw2jqw2jn∑i=0

(n

i

)[w2]iq[w1]n−iq

w1[j]iqw2 q

w2(n−i)jβn−i,χ,qw1 ,ζw1 (w2x)

=

n∑i=0

(n

i

)[w2]iq[w1]n−iq

w1βn−i,χ,qw1 ,ζw1 (w2x)

dw1−1∑j=0

ζw2jqw2(n−i+1)j [j]iqw2

=n∑i=0

(n

i

)[w2]iq[w1]n−iq

w1βn−i,χ,qw1 ,ζw1 (w2x)Sn,i(dw1, ζ

w2 , qw2 |χ),

(2.6)

where

Sn,i(w1, ζ, q|χ) =

w1−1∑j=0

χ(j)ζjq(n−i+h)j [j]iq.

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 28, NO.5, 2020, COPYRIGHT 2020 EUDOXUS PRESS, LLC

863 Ryoo 861-864

Page 100: Journal of Computational Analysis and Applicationseudoxuspress.com/images/JOCAAA-VOL-28-2020-ISSUE-5.pdfBaltimore, MD 21251, USA tel: 1-443-885-4373 Fax 1-443-885-8216 Gaston.N'Guerekata@morgan.edu

By the same method as (2.6), we get

[w2]nqw2

dw2−1∑j=0

χ(j)ζw1jqw1j

∫X

χ(y)ζw2yqw2y

[w1x+

w1

w2j + y

]nqw2

dµ1(y)

=n∑i=0

(n

i

)[w1]iq[w2]n−iq

w2βn−i,χ,qw2 ,ζw2 (w1x)Sn,i(dw2, ζ

w1 , qw1 |χ).

(2.7)

Therefore, by (2.6) and (2.7), we have the following theorem.

Theorem 4. For w1, w2 ∈ N, n ≥ 0, we haven∑i=0

(n

i

)[w2]iq[w1]n−iq

w1βn−i,χ,qw1 ,ζw1 (w2x)Sn,i(dw1, ζ

w2 , qw2 |χ)

=

n∑i=0

(n

i

)[w1]iq[w2]n−iq

w2βn−i,χ,qw2 ,ζw2 (w1x)Sn,i(dw2, ζ

w1 , qw1 |χ).

Remark 5. Let w1, w2 ∈ N, n ≥ 0, and χ be the trivial character. Then we haven∑i=0

(n

i

)[w2]iq[w1]n−iq

w1βn−i,qw1 ,ζw1 (w2x)Sn,i(w1|ζw2 , qw2)

=n∑i=0

(n

i

)[w1]iq[w2]n−iq

w2βn−i,qw2 ,ζw2 (w1x)Sn,i(w2|ζw1qw1).

REFERENCES

1. Yuan He, Symmetric identities for Carlitz’s q-Bernoulli numbers and polynomials, Advances

in Difference Equations, 246 (2013), 10 pages.

2. T. Kim, q-Volkenborn integration, Russ. J. Math. Phys., 9 (2002), 288-299.

3. D. Kim, T. Kim, Dmitry V. Dolgy, J.-J. Seo, A note on identities of symmetry for generalized

Carlitz’s q-Bernoulli polynomials, Int. Journal of Math. Analysis, 8 (2014), 907-914.

4. B. A. Kupershmidt, Reflection symmetries of q-Bernoulli polynomials, J. Nonlinear Math.

Phys., 12 (2005), 412-422.

5. C. S. Ryoo, Symmetric identities for Carlitz’s twisted q-Bernoulli numbers and polynomials

associated with p-adic invariant integral on Zp, Global Journal of Pure and Applied Mathe-

matics, 11 (2015), pp. 2413-2417.

6. C. S. Ryoo, On the symmetric properties for the generalized twisted q-tangent numbers and

polynomials, Advanced Studies in Theoretical Physics, 9 (2015), pp. 63-69.

7. C. S. Ryoo, (2011). On the alternating sums of powers of consecutive odd integers, Journal of

Computational Analysis and Applications, 13 (2011), pp. 1019-1024.

8. C. S. Ryoo, Calculating zeros of q-extension of the second kind Bernoulli polynomials, Journal

of Computational Analysis and Applications, 15 (2013), pp. 248-254.

9. C. S. Ryoo, Differential equations associated with generalized Bell polynomials and their zeros,

Open Mathematics, 14(2016), pp. 807-815.

10. Y. Simsek, Theorem on twisted L-function and twisted Bernoulli numbers, Advan. Stud.

Contemp. Math. 12 (2006), pp. 237-246.

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 28, NO.5, 2020, COPYRIGHT 2020 EUDOXUS PRESS, LLC

864 Ryoo 861-864

Page 101: Journal of Computational Analysis and Applicationseudoxuspress.com/images/JOCAAA-VOL-28-2020-ISSUE-5.pdfBaltimore, MD 21251, USA tel: 1-443-885-4373 Fax 1-443-885-8216 Gaston.N'Guerekata@morgan.edu

An efficient optimal algorithm for high frequency inwavelet based image reconstruction

Jingjing Liu∗, Guoxi Ni†

LCP, Institute of Applied Physics and Computational Mathematics,Beijing,China

Abstract

Wavelet algorithms for high-resolution image reconstruction has been shown effec-tively, it relies on the decomposition of low/high frequency, and hard/soft thresholdingarguments are often used to denoise for high frequency. In this paper, instead of usingthis kind of thresholding arguments,, we apply the gradient based shrinkage thresh-olding optimization for high-frequency, in this way, we can keep the useful informationin the original signal as much as possible, coupling the shrinkage thresholding op-timization with the wavelet algorithm, we get an efficient reconstruction algorithm.Numerical results show we obtain a higher resolution,better peak signal-to-noise ratiosand lower relative errors.

Key words: Wavelet; high-resolution; image reconstruction; shrinkage thresholding;high frequency.

1 Introduction

Increasing the resolution is important and necessary for many applications, lots of studieshave been done on the high-resolution image reconstruction [13, 14, 18, 20, 21, 22, 23, 24, 27].

Among the methods in image processing, wavelet method is a well developed technology[6, 9, 10, 12, 26]. In this method, global patterns are represented by densely distributed co-efficients obtained from low-pass filtering, while local features are represented by coefficientsobtained from high-pass filtering. This makes it easy for us to distinct between smooth andsharp image components. In this way wavelet frames can effectively separate smooth imagecomponents and non smooth ones, and the wavelet-based procedure is essentially to approx-imate iteratively the densely distributed coefficients folded by the given low-pass filter. Toovercome the incompatibility of symmetry and exact reconstruction, bi-orthogonal waveletsystem is thus proposed in image processing, see [1, 8, 25].

∗E-mail: [email protected]†E-mail: [email protected]

1

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 28, NO.5, 2020, COPYRIGHT 2020 EUDOXUS PRESS, LLC

865 LIU-NI 865-878

Page 102: Journal of Computational Analysis and Applicationseudoxuspress.com/images/JOCAAA-VOL-28-2020-ISSUE-5.pdfBaltimore, MD 21251, USA tel: 1-443-885-4373 Fax 1-443-885-8216 Gaston.N'Guerekata@morgan.edu

The relatively complex hard/soft thresholding methods [11] are often used to denoise forhigh frequency information, but some useful information will lose in the processing becauseof its cut off action. Preserving useful high frequency part while removing noise is themain goal in image denoising, some techniques developed in the past years has shown theiradvantage than the hard- and soft-thresholding in the wavelet field, for example, the waveletpacket method,it is based on the further decomposition of wavelet coefficients by packets,and this leads to an essentially translation invariant wavelet packet system.

To get an efficient algorithm while keep useful information in high frequency as much aspossible, we consider the optimization strategy instead of hard/soft thresholding method forthe high frequency components, this strategy is based on the classic variation technology,and has been previously used in image reconstruction, because of its computational complex,a fast iterative shrinkage-thresholding algorithms are proposed in [2, 4], this kind of method, which can be viewed as an extension of the classical gradient algorithm, is attractive dueto its simplicity, it is adequate for solving large-scale problems even with dense matrix datain image reconstruction,to improve the convergence rate, a more fast iterative shrinkage-thresholding algorithm with a significantly better global convergence rate is introduced in[3, 28], this algorithm improves the convergence rate from O(1/k) to O(1/k2), it relies oncomputing the next iteration based on the values not only in the previous one, but also intwo previously computed steps.

In this paper, we are intent to improve the wavelet algorithm in image reconstruction.We begin with the bi-orthogonal wavelet systems, and obtain the decomposition formula,which represent a perfect reconstruction equation for the symbols of the low-pass and thehigh-pass filters,theoretical analysis shows that the noise is contains in high-frequency part,and the hard/soft thresholding argument will inevitably delete some useful information,instead of using this kind of thresholding argument for high-frequency components of theoriginal image, we take advantage of shrinkage thresholding algorithm for the optimizationof high-frequency, it has been proved that it has notable effect in image denoising, to getthe algorithm more efficient, we apply some accelerating iteration argument in shrinkagethresholding algorithm.

The outline of the paper is as follows. the algorithms are derived in section 2. Numer-ical examples are given in section 3 to illustrate the effectiveness of the algorithms. Someconcluding remarks are given in section 4.

2 Reconstruction algorithm

In this section, we construct a shrinkage thresholding optimization coupling with the waveletbased algorithm for high resolution image reconstruction.

2

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 28, NO.5, 2020, COPYRIGHT 2020 EUDOXUS PRESS, LLC

866 LIU-NI 865-878

Page 103: Journal of Computational Analysis and Applicationseudoxuspress.com/images/JOCAAA-VOL-28-2020-ISSUE-5.pdfBaltimore, MD 21251, USA tel: 1-443-885-4373 Fax 1-443-885-8216 Gaston.N'Guerekata@morgan.edu

2.1 Iterative scheme

Refer to [5], we obtain that using the periodic boundary condition and ordering the dis-cretized values of f and g in a row-by-row fashion, we obtain M1M2×M1M2 linear systemof the form:

Lf = g (1)

where f is original image, g low-resolution image, L = Lx⊗Ly is the blurring matrix whichis made up from each sensor, and Lx, Ly have circulant structure as follow:

Lx =1

L· circulant(a),

where

a = [1, · · · , 1, 12, 0, · · · , 0, 1

2, 1, · · · , 1]t,

where circulant(a) represents circulant matrix, and the first L/2 entries in a are equal to 1,the last L/2− 1 entries are equal to 1. The matrix Ly can be define similarly, these matrixare circulant matrices, then we get that the matrix L is a block-circulant-circulant-block(BCCB)matrix [17].

By the biorthogonal wavelet theory [7, 19], the symbols of the refinement masks andwavelet masks satisfy the following equation

ada+∑

ν∈Z2K\(0,0)

bdν bdν = 1 (2)

where K is sensor size.The equation (2) is not only for the reconstruction of function but also for image recon-

struction, the matrix representation of the perfect reconstruction from biorthogonal systemcan be written as

LdL+∑

ν∈Z2K\(0,0)

MdνMν = I, (3)

here denote by L,Ld,Mdν ,Mν the matrices generated by the symbols of the refinement and

wavelet masks a, ad, bν , bdν , respectively.Since g = Lf is just the observed high-resolution image, and the other Mνf, ν = (0, 0),

represent the high-frequency components of f , from equation (3) we obtain an iterativealgorithm

fn+1 = Ldg + (∑

ν∈Z2K\(0,0)

MdνMν)fn (4)

In the usual denoising procedure, the high frequency components are often penalized bya factor, this smoothes the original signals,so a nonlinear denoising scheme can be built intoequation (4), and thus obtain an iterative algorithm

fn+1 = Ldg +∑

ν∈Z22\(0,0)

MdνT (Mνfn). (5)

3

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 28, NO.5, 2020, COPYRIGHT 2020 EUDOXUS PRESS, LLC

867 LIU-NI 865-878

Page 104: Journal of Computational Analysis and Applicationseudoxuspress.com/images/JOCAAA-VOL-28-2020-ISSUE-5.pdfBaltimore, MD 21251, USA tel: 1-443-885-4373 Fax 1-443-885-8216 Gaston.N'Guerekata@morgan.edu

where T is a denoising operator, a hard/soft thresholding wavelet denoising algorithm ispresented in [7], in which a further decomposition by the translation invariant wavelet packetsis used, this can remedy the smoothing effect on the original signals in some sense, someuseful information in high frequency is still lost, this motivates us to consider an efficientoptimal method to keep information as much as possible.

2.2 Shrinkage thresholding optimization for high frequency

Let b =Mνfn,we consider the following formulation:

x∗ = minxF (x), F (x) = ||Ax− b||2, (6)

where A = LdL,and L is the blurring matrix in the last section, the norm || · || is the innerproduct, and x is the vector we are looking for, this is the classical least square problem.The optimization problem (6) can be cast as a second order cone programming problem andthus could be solved via interior point methods.

Usually this problem is not only in large scale but also involves dense matrix data, whichoften precludes the use and potential advantage of sophisticated interior point methods.This motivated a simpler gradient-based algorithms for solving it, the gradient algorithmgenerates a sequence xk via

xk = xk−1 − tk∇F (xk−1),

where tk > 0 is a suitable stepsize. It can be viewed as an approximal regularization of thelinearized function F at xk−1, and can be written equivalently as

xk = minxF (xk−1) + (x− xk−1,∇F (xk−1)) +

1

2tk||x− xk−1||2.

After ignoring constant terms, this can be rewritten as

xk = minx 1

2tk||x− (xk−1 − tk∇F (xk−1))||2,

the computation of xk reduces to solving a one-dimensional minimization problem for eachof its components, which produces

xk = Tλtk(xk−1 − tk∇F (xk−1)),

considering the expression of F (x) in (6), we get:

xk = Tλtk(xk−1 − 2tkAT (Axk−1 − b)), (7)

where Tα : R2 → R2 is the thresholding operator defined by

Tα(xi) = (|xi| − α)+sgn(xi). (8)

4

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 28, NO.5, 2020, COPYRIGHT 2020 EUDOXUS PRESS, LLC

868 LIU-NI 865-878

Page 105: Journal of Computational Analysis and Applicationseudoxuspress.com/images/JOCAAA-VOL-28-2020-ISSUE-5.pdfBaltimore, MD 21251, USA tel: 1-443-885-4373 Fax 1-443-885-8216 Gaston.N'Guerekata@morgan.edu

This algorithm (7) is a kind of iterative shrinkage thresholding algorithm similar as thatin [15].

It has been proved that for large-scale problems this first order methods are only practicaloption, and the sequence xk converges quite slowly to its solution, that is

F (xk)− F (x∗) = O(1/k),

namely, it shares a sublinear global rate of convergence.To improve the efficiency of the iterative shrinkage thresholding algorithm (ISTA) with

better global rate of convergence, Beck etc.[3] consider an improved fast iteration, that isthe xk in (7) is not dependent on the previous point xk−1, but rather on the point yk whichis a linear combination of the previous two point xk−1, xk−2, with this modification, theyget a fast ISTA, and the convergence rate is

F (xk)− F (x∗) = O(1/k2).

In this way, we get x∗ from b according to the above iterative shrinkage thresholdingalgorithm.

2.3 Summary of Algorithms

For convenience,we call our shrinkage thresholding algorithm in wavelet based reconstruc-tion algorithm as STWL,to compare with the hard/soft thresholding wavelet reconstructedalgorithm (abbr. TWL) in [7]. Now we embed the Shrinkage thresholding optimizationalgorithm into the iteration scheme (5), denote the previous two iterations as fn−1, fn−2,then our algorithm for the model equation (5) can be summarized as following:

(1) Choose an initial approximation f0 (e.g., f0 = Ldg);(2) Iterate until convergence:Outer circulation:

fn+1 = Ldg +∑

ν∈Z22\(0,0)

Mdν T (Mνfn). (9)

Begin inner loop:To get optimal high frequency part T (Mνfn). Let bν =Mνfn, y1,ν =Mνfn, h0,ν = 1, t1 =

1, then a fast iteration for (7) is

hk,ν = Tλtk(yk,ν − 2tkAT (Ayk,ν − bν)),

tk+1 =1 +

√1 + 4t2k2

,

yk+1,ν = hk,ν + (tk − 1

tk+1

)(hk,ν − hk−1,ν),

5

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 28, NO.5, 2020, COPYRIGHT 2020 EUDOXUS PRESS, LLC

869 LIU-NI 865-878

Page 106: Journal of Computational Analysis and Applicationseudoxuspress.com/images/JOCAAA-VOL-28-2020-ISSUE-5.pdfBaltimore, MD 21251, USA tel: 1-443-885-4373 Fax 1-443-885-8216 Gaston.N'Guerekata@morgan.edu

where Tλtk is defined as in (8), λ is estimated by the method given in [11] which uses themedian of the absolute value of the entries in the vector Mνfn.

End inner loop.Return the optimized results y∗n,ν for high frequency T (Mνfn), that is

fn+1 = Ldg +∑

ν∈Z22\(0,0)

Mdν y

∗n,ν .

End outer circulation.Remark: When the operator T in (9) is realized by soft/hard thresholding operator

T ,then this reduces to the soft/hard thresholding wavelet reconstruction algorithm as thatin [7].

3 Experimental results

In this part, we present the efficiency and accuracy of our shrinkage thresholding waveletbased reconstruction algorithm(abbr. STWL),and compare with the hard/soft thresholdingwavelet reconstructed method (abbr. TWL). As usual,we evaluate the methods using thepeak signal-to-noise ratio (PSNR),relative error (RE) and cpu time cost they are defined by

RE =∥f − fc∥2∥f∥2

,

and

PSNR = 10 log10∥f∥22

∥f − fc∥22for 1D signals, while as

PSNR = 10 log102552NM

∥f − fc∥22for 2D images, respectively, with the size of the signals (images) is N × M . Where f isoriginal image, and fc is restored image.

In our tests, N = 1 for 1D signals while N =M for 2D images. Here we take 2× 2 and4× 4 sensor arrays in 2D.

3.1 1D denoisy signal recovery

We take the original signal data from theWaveLab toolbox at http://statweb. stanford.edu/ wave-lab/ developed by Donoho’s research group. Fig. 1(a) shows the original signal f . Fig. 1(b)depicts the contaminated signal with white noise at signal-to-noise ratio (SNR = 25), herewe use matlab function awgn to add noise to the original signal. The results of denoising bythe above two algorithms with periodic conditions are shown in Fig. 1(c) and (d), respec-tively. From the data results of experiments in table 1, it shows that our algorithm STWLhas a better performance, and has a better time efficiency than TWL.

6

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 28, NO.5, 2020, COPYRIGHT 2020 EUDOXUS PRESS, LLC

870 LIU-NI 865-878

Page 107: Journal of Computational Analysis and Applicationseudoxuspress.com/images/JOCAAA-VOL-28-2020-ISSUE-5.pdfBaltimore, MD 21251, USA tel: 1-443-885-4373 Fax 1-443-885-8216 Gaston.N'Guerekata@morgan.edu

0 50 100 150 200 250−30

−20

−10

0

10

20

30

40

50

0 50 100 150 200 250−30

−20

−10

0

10

20

30

40

50

(a) (b)

0 50 100 150 200 250−30

−20

−10

0

10

20

30

40

50

0 50 100 150 200 250−30

−20

−10

0

10

20

30

40

50

(c) (d)

Fig. 1: (a) Original signal; (b) Contaminated by white noise at SNR = 25; (c) Reconstructedsignal from the algorithm TWL; (d) Reconstructed signal from our algorithm STWL .

Table 1: Corresponding PSNR, RE and timecost values using algorithm TWL in [7] and ouralgorithm STWL.

AlgorithmsSNR = 25 SNR = 30

PSNR RE timecost PSNR RE timecostTWL 47.1560 0.0946 0.7956 48.0624 0.0904 0.9984STWL 53.3382 0.0695 0.6396 57.5931 0.0562 0.7332

3.2 High-resolution image reconstruction

In this section, we use the classical ”boat”, the ”Lena” and the ”cameraman” images withsize of 256 × 256 as the original images for our tests, and consider 2 × 2 sensor arrays and4 × 4 sensor arrays respectively, and the Gaussian white noise is added to these originalimages.

7

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 28, NO.5, 2020, COPYRIGHT 2020 EUDOXUS PRESS, LLC

871 LIU-NI 865-878

Page 108: Journal of Computational Analysis and Applicationseudoxuspress.com/images/JOCAAA-VOL-28-2020-ISSUE-5.pdfBaltimore, MD 21251, USA tel: 1-443-885-4373 Fax 1-443-885-8216 Gaston.N'Guerekata@morgan.edu

In the algorithm TWL, the thresholding value λ is chosen to be σn,ν√

2 log (M1M2),where the variance σn,ν is estimated by the median of the absolute value of the entries in thevector Mνfn named high frequency term. In our algorithm STWL, we have decomposed theimage data into low and high frequency parts, and denoise the high frequency information byshrinkage thresholding method, the Lipschitz constant is computable in the examples sincethe eigenvalues of the matrix ATA can be easily calculated using the two-dimensional cosinetransform [17]. For simplicity, we will only consider the matrices for the periodic case.

3.2.1 2× 2 sensor array

For 2× 2 sensor arrays, the corresponding refinement mask m is the piecewise linear spine,

m(−1) = 1

4,m(0) =

1

2,m(1) =

1

4,

and m(α) = 0 for all other α. The nonzero terms of the dual mask of m used in this paperare

md(−2) = −1

8,md(−1) = 1

4,md(0) =

3

4,md(1) =

1

4,md(2) = −1

8.

The dual pair of the wavelet masks are rα := (−1)αmd(1− α) and rd(α) := (−1)αm(1− α),see [12] for details.

The tensor product dual pair of the refinement symbols are given by a(ω) = m(ω1)m(ω2),ad(ω) = md(ω1)m

d(ω2), and the corresponding wavelet symbols are b(0,1)(ω) = m(ω1)r(ω2),

bd(0,1)(ω) = md(ω1)rd(ω2), b(1,0)(ω) = r(ω1)m(ω2), b

d(1,0)(ω) = rd(ω1)m

d(ω2), b(1,1)(ω) =

r(ω1)r(ω2), bd(1,1)(ω) = rd(ω1)r

d(ω2), where ω = (ω1, ω2).Although we give here only the details of the refinable functions and their corresponding

wavelets with dilation 2I, the whole theory can be carried over to the general isotropic integerdilation matrices.

The wavelet matrices are formed by the tensor product,and we consider

Z22 = (0, 0), (0, 1), (1, 0), (1, 1).

In particular, we have

L = L2 ⊗ L2, M(0,1) = L2 ⊗M2, M(1,0) =M2 ⊗ L2, M(1,1) =M2 ⊗M2,

Ld = Ld2 ⊗ Ld

2, Md(0,1) = Ld

2 ⊗Md2 , M

d(1,0) =Md

2 ⊗ Ld2, Md

(1,1) =Md2 ⊗Md

2 .

where

L2 = circulant(1

2,1

4, 0, · · · , 0, 1

4), Ld

2 = circulant(3

4,1

4,−1

8, 0, · · · , 0,−1

8,1

4)

M2 = circulant(1

4,−3

4,1

4,1

8, 0, · · · , 0, 1

8), Md

2 = circulant(1

4, 0, · · · , 0, 1

4,−1

2).

8

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 28, NO.5, 2020, COPYRIGHT 2020 EUDOXUS PRESS, LLC

872 LIU-NI 865-878

Page 109: Journal of Computational Analysis and Applicationseudoxuspress.com/images/JOCAAA-VOL-28-2020-ISSUE-5.pdfBaltimore, MD 21251, USA tel: 1-443-885-4373 Fax 1-443-885-8216 Gaston.N'Guerekata@morgan.edu

Fig.2 demonstrate the reconstructed high-resolution image for the ”boat” , the ”Lena”and the ”cameraman” images respectively, in these figures, (a1)-(c1) are the original images,(a2)-(c2) are with noise PSNR = 40dB, (a3)-(c3) are the denoisy images with the algorithmTWL, and (a4)-(c4) are obtained by our algorithm STWL. Table 2 gives the PSNR, RE, andthe cputime of the reconstructed images for different levels of Gaussian noise, our algorithmshows less RE, less cputime and better PSNR, we can conclude that our algorithm STWLis better than the original algorithm TWL in [7].

(a1) (a2) (a3) (a4)

(b1) (b2) (b3) (b4)

(c1) (c2) (c3) (c4)

Fig. 2: (a1)-(c1) the original images; (a2)-(c2) the noisy images; (a3)-(c3) the reconstructedimage by algorithm TWL; (a4)-(c4) the reconstructed images by our algorithm STWL.

9

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 28, NO.5, 2020, COPYRIGHT 2020 EUDOXUS PRESS, LLC

873 LIU-NI 865-878

Page 110: Journal of Computational Analysis and Applicationseudoxuspress.com/images/JOCAAA-VOL-28-2020-ISSUE-5.pdfBaltimore, MD 21251, USA tel: 1-443-885-4373 Fax 1-443-885-8216 Gaston.N'Guerekata@morgan.edu

Table 2: Comparison of PSNR, RE and cputime values using algorithm TWL and STWLfor 2× 2 sensor arrays with different kinds noise level.

Image EvaluationTWL STWL

SNR = 35 SNR = 40 SNR = 35 SNR = 40

boatPSNR 81.9938 82.2142 82.4965 82.4724RE 0.0166 0.0164 0.0162 0.0162

timecost 10.3585 9.9529 5.9280 5.8344

LenaPSNR 84.0785 84.1040 84.6254 85.0012RE 0.0149 0.0149 0.0145 0.0143

timecost 11.3881 11.7157 5.9436 5.5380

cameramanPSNR 85.8451 86.1629 86.1727 86.8056RE 0.0137 0.0135 0.0135 0.0130

timecost 11.2165 9.7033 5.9124 5.6472

3.2.2 4× 4 sensor array

In this case, we give the refinable and wavelet masks with dilation 4I that used to generatethe matrices for 4× 4 sensor arrays.

For 4× 4 sensor arrays, the corresponding mask is

m(α) =1

8,1

4,1

4,1

4,1

8, α = −2, · · · , 2,

with m(α) = 0 for all other α. The nonzero terms of a dual refinement mask of m is

md(α) = − 1

16,1

8,5

16,1

4,5

16,1

8,− 1

16, α = −3, · · · , 3.

The nonzero terms of the corresponding wavelet masks are

r1(α) = −1

8,−1

4, 0,

1

4,1

8, α = −2, · · · , 2,

r2(α) = −1

16,−1

8,5

16,−1

4,5

16,−1

8,− 1

16, α = −2, · · · , 4,

r3(α) =1

16,1

8,− 7

16, 0,

7

16,−1

8,− 1

16, α = −2, · · · , 4.

The dual wavelet masks are

rd1(α) = (−1)1−αr3(1− α), rd2(α) = (−1)1−αm(1− α), rd3(α) = (−1)1−αr1(1− α)

10

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 28, NO.5, 2020, COPYRIGHT 2020 EUDOXUS PRESS, LLC

874 LIU-NI 865-878

Page 111: Journal of Computational Analysis and Applicationseudoxuspress.com/images/JOCAAA-VOL-28-2020-ISSUE-5.pdfBaltimore, MD 21251, USA tel: 1-443-885-4373 Fax 1-443-885-8216 Gaston.N'Guerekata@morgan.edu

The observed high-resolution image g is generated by applying the bivariate lowpass filteron the true image f ,again, we consider periodic boundary condition. The matrices

L,Ld,Mν ,Mdν , ν ∈ Z2

4 \ (0, 0)

can be generated by the corresponding filters.Fig.3 shows the reconstructed high-resolution image for the ”boat” , the ”Lena” and

the ”cameraman” images, (a1)-(c1) are blurred with noise PSNR = 40dB, (a2)-(c2) areobtained from the algorithm TWL, and (a1)-(c1) are obtained from our algorithm STWL.From Table 3, we can also find that our algorithm shows less RE, less cputime and betterPSNR, since the problem is more difficult than the 2× 2 sensor case, we need more cputimeconsuming, we can see that the performance of our algorithm STWL is much better thanthe original algorithm TWL.

Table 3: Comparison of PSNR, RE and cputime values using algorithm TWL and STWLfor 4× 4 sensor arrays with different kinds noise level.

Image EvaluationTWL STWL

SNR = 30 SNR = 40 SNR = 30 SNR = 40

boatPSNR 67.3135 67.4297 68.3053 68.5968RE 0.0345 0.0343 0.0329 0.0324

timecost 19.5157 20.4673 15.9277 15.8809

LenaPSNR 69.9279 69.9769 71.3131 71.4538RE 0.0303 0.0302 0.0283 0.0281

timecost 20.9041 20.0773 16.1773 15.9745

cameramanPSNR 72.9596 73.2392 73.6651 73.9353RE 0.0260 0.0257 0.0251 0.0248

timecost 19.8589 20.9041 14.8981 15.6313

4 Conclusions

In this paper, we constructed a shrinkage thresholding algorithm in wavelet based imagereconstruction, instead of using the hard/soft thresholding algorithm we apply the iterativeshrinkage thresholding algorithm for the optimization for high frequency. Our new algorithmworks effectively both in one-dimensional and two-dimensional situations, numerical testsshow that this algorithm gives higher resolution, larger signal-to noise ratios,lower relativeerrors and less cputime.

11

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 28, NO.5, 2020, COPYRIGHT 2020 EUDOXUS PRESS, LLC

875 LIU-NI 865-878

Page 112: Journal of Computational Analysis and Applicationseudoxuspress.com/images/JOCAAA-VOL-28-2020-ISSUE-5.pdfBaltimore, MD 21251, USA tel: 1-443-885-4373 Fax 1-443-885-8216 Gaston.N'Guerekata@morgan.edu

(a1) (a2) (a3)

(b1) (b2) (b3)

(c1) (c2) (c3)

Fig. 3: (a1)-(c1) is the noisy images,(a2)-(c2) is reconstructed from the algorithm TWL;(a3)-(c3) is reconstructed from our algorithm STWL.

Acknowledgments

This work is supported by China Natural Science Fund (No.91130020) and Defense IndustrialTechnology Development Program (No.B1520133015).

References

[1] Chenglong Bao, Bin Dong, Likun Hou, Zuowei Shen,Image restoration by minimizing zeronorm of wavelet frame coefficients, Inverse Problems, 32(11), (2016),115004.

12

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 28, NO.5, 2020, COPYRIGHT 2020 EUDOXUS PRESS, LLC

876 LIU-NI 865-878

Page 113: Journal of Computational Analysis and Applicationseudoxuspress.com/images/JOCAAA-VOL-28-2020-ISSUE-5.pdfBaltimore, MD 21251, USA tel: 1-443-885-4373 Fax 1-443-885-8216 Gaston.N'Guerekata@morgan.edu

[2] A. Beck, M. Teboulle, Fast gradient-based algorithms for constrained total variation imagedenoising and deblurring problems, IEEE Trans. Image Process. 18, 2419-2434(2009).

[3] A. Beck, M. Teboulle, A fast iterative shrinkage-thresholding algorithm for linear inverseproblems, SIAM Journal on Imaging Sciences. 2(1), 183-202(2009).

[4] J. Bioucas-Dias, M. Figueiredo, A new TWIST: Two-step iterative shrinkage/thresholdingalgorithms for image restoration, IEEE Trans. Image Process.,16, 2992-3004(2007).

[5] N. Bose, K. Boo, High-resolution image reconstruction with multisensors, Int. J. Imag. Syst.Technol. 9, 294-304(1998).

[6] A. Chambolle, R. A. DeVore, N. Y. Lee, and B. J. Lucier, Nonlinear wavelet image processing:Variational problems, compression, and noise removal through wavelet shrinkage, IEEE Trans.Image Proces., 7, 319-335 (1998).

[7] R.H. Chan, T. Chan, L. Shen, Z. Shen, Wavelet algorithms for high-resolution image recon-struction, SIAM J. Sci. Comput. 24(4), 1408-1432(2003).

[8] R.H. Chan, T. Chan, L. Shen, Z. Shen, Wavelet deblurring algorithms for spatially varyingblur from high-resolution image reconstruction, Linear Algebra Appl. 366, 139-155(2003).

[9] R. H. Chan, S. D. Riemenschneider, L. Shen, Z. Shen, Tight frame: an efficient way forhigh-resolution image reconstruction, Applied and Computational Harmonic Analysis. 17, 91-115(2004).

[10] T. Chan and J. Shen, Variational image inpainting, Commun. Pure Appl. Math, vol. 58,579-619 (2005).

[11] D. Donoho, De-noising by soft-thresholding, IEEE Trans, Inform. Theory, 41, 613-627(1995).

[12] I. Daubechies, Ten lectures on wavelets, CBMS-NSF Regional Conf. Ser. in Appl. Math., 61.SIAM, Philadelphia, 1992.

[13] M. Elad, A. Feuer, Restoration of a single superresolution image from several blurred, noisyand undersampled measured images, IEEE Trans. Image Process. 6, 1646-1658(1997).

[14] M. Elad, A. Feuer, Superresolution restoration of an image sequence: adaptive filtering ap-proach, IEEE Trans. Image Process. 8(3), 387-395(1999).

[15] M. A. T. Figueiredo and R. D. Nowak, An EM algorithm for wavelet-based image restoration,IEEE Trans. Image Process., 12, 906-916(2003).

[16] T. M. Stadtmiller, J. C. Gillete, R. C. Hardie, Aliasing reduction in staring infrared imagesutilizing subpixel techniques, Aerospace and Electronics Conference, 2(11), 874-880(1995).

[17] P. C. Hansen, J. G. Nagy and D. P. O’Leary, Deblurring Images: Matrices, Spectra andFiltering, SIAM, Philadelphia, 2006.

13

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 28, NO.5, 2020, COPYRIGHT 2020 EUDOXUS PRESS, LLC

877 LIU-NI 865-878

Page 114: Journal of Computational Analysis and Applicationseudoxuspress.com/images/JOCAAA-VOL-28-2020-ISSUE-5.pdfBaltimore, MD 21251, USA tel: 1-443-885-4373 Fax 1-443-885-8216 Gaston.N'Guerekata@morgan.edu

[18] T. Huang, R. Tsay, Multiple frame image restoration and registration, in: T. S. Huanf(Ed.),Advances in Computer Vision and Image Processing, vol. 1, 317-339(1984).

[19] H. Ji, S. Riemenschneider, and Z. Shen, Multivariate compactly supported fundamental refin-able functions, dual and biorthogonal wavelets, Stud. Appl. Math.,102, 862-874(1999).

[20] M. Ng, R. Chan, T. Chan, A. Yip, Cosine transform preconditioners for high resolution imagereconstruction, Linear Algebra Appl. 316, 89-104(2000).

[21] M. Ng, R. Chan, W. Tang, A fast algorithm for deeblurring models with Neumann boundaryconditions, SIAM J.Sci. Comput. 21, 851-866(2000).

[22] M. K. Ng, N, Bose, Analysis of displacement errors in high-resolution image reconstructionwith multisensors, IEEE Trans. Circuits Systems I Fund. Theory Appl. 49(6), 806-813(2002).

[23] A. Patti, M. Sezan, A. Tekalp, Superresolution video reconstruction with arbitrary samplinglattices and nonzero aperture time, IEEE Trans. Image Process. 6, 1064-1076(1997).

[24] R. Schultz, R. Stevenson, Extraction of high-resolution frames from video sequences, IEEETrans. Image Process. 5, 996-1011(1996).

[25] Z. Shen, Extension of matrices with Laurent polynomial entries, in proceedings of the 15thIMACS World Congress 1997 on Scientific Computation, Modelling and Applied Mathematics,A. Syclow, ed., 57-61(1997).

[26] L. Shen, Q. Sun, Bi-orthogonal wavelet system for high-resolution image reconstruction, IEEETrans. Signal Process. 52(7),1997-2011(2003).

[27] P. Vandewalle, J. Kovacevic, and M. Vetterli, Reproducible research in signal processing What,why, and how, IEEE Signal Process., 26, 37-47(2009).

[28] M. Zulfiquar, A. Bhotto, M. O. Ahmad, M. N. S. Swamy, An improved fast iterative shrinkagethresholding algorithm for image deblurring, SIAM Journal on Imaging Sciences. 8(3),1640-1657(2015).

14

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 28, NO.5, 2020, COPYRIGHT 2020 EUDOXUS PRESS, LLC

878 LIU-NI 865-878

Page 115: Journal of Computational Analysis and Applicationseudoxuspress.com/images/JOCAAA-VOL-28-2020-ISSUE-5.pdfBaltimore, MD 21251, USA tel: 1-443-885-4373 Fax 1-443-885-8216 Gaston.N'Guerekata@morgan.edu

Negative Domain Local fractional Inequalities

George A. AnastassiouDepartment of Mathematical Sciences

University of MemphisMemphis, TN 38152, U.S.A.

[email protected]

Abstract

This research is about inequalities in a local fractional environmentover a negative domain. The author presents the following types of an-alytic local fractional inequalities: Opial, Hilbert-Pachpatte, comparisonof means, Poincare and Sobolev. The results are with respect to uni-form and Lp norms, involving left and right Riemann-Liouville fractionalderivatives.

2010 Mathematics Subject Classification: 26A33, 26D10, 26D15.Keywords and phrases: Local fractional derivative, Riemann-Liouville

fractional derivative, Opial inequality, Hilbert Pachpatte, Poincare inequality,fractional inequalities.

1 Introduction

Many sources motivate us to write this work. The first one comes next. It isthe famous Opial inequality ([13]):∫ a

0

|y′ (x) y (x)| dx ≤ a

2

∫ a

0

|y′ (x)|2 dx, (1)

where y (x) is absolutely continuous function and y (0) = 0. The above inequal-ity is proved sharp.

The well known Ostrowski ([14]) inequality also motivates this work and hasas follows:∣∣∣∣∣ 1

b− a

∫ b

a

f (y) dy − f (x)

∣∣∣∣∣ ≤(

1

4+

(x− a+b

2

)2(b− a)

2

)(b− a) ‖f ′‖∞ , (2)

where f ∈ C1 ([a, b]), x ∈ [a, b], and it is a sharp inequality.Next Dρ

∗af indicates the left Caputo fractional derivative of order ρ > 0,anchored at a ∈ R, see [10], p. 50.

1

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 28, NO.5, 2020, COPYRIGHT 2020 EUDOXUS PRESS, LLC

879 Anastassiou 879-891

Page 116: Journal of Computational Analysis and Applicationseudoxuspress.com/images/JOCAAA-VOL-28-2020-ISSUE-5.pdfBaltimore, MD 21251, USA tel: 1-443-885-4373 Fax 1-443-885-8216 Gaston.N'Guerekata@morgan.edu

The author in [7], pp. 82-83, proved the following left Caputo fractionalLandau inequality: Let 0 < ν ≤ 1, f ∈ AC2 ([0, b]) (i.e. f ′ ∈ AC ([0, b]),absolutely continuous functions), ∀ b > 0. Suppose ‖f‖∞,R+

< +∞, Dν+1∗0 f ∈

L∞ (R+), and ∥∥Dν+1∗a f

∥∥∞,[a,+∞)

≤∥∥Dν+1∗0 f

∥∥∞,R+

, ∀ a ≥ 0. (3)

Then

‖f ′‖∞,R+≤ (ν + 1)

(2

ν

) νν+1

(Γ (ν + 2))− 1ν+1

(‖f‖∞,R+

) νν+1(∥∥Dν+1

∗0 f∥∥∞,R+

) 1ν+1

,

(4)that is ‖f ′‖∞,R+

is finite.The last inequality is another inspiration.The author’s monographs [2], [3], [4], [5], [6], [8], motivate and support

largely this work too. See also [1].Under the point of view of local fractional differentiation the author examines

the broad area of analytic inequalities and produces a variety of well-knowninequalities in a local fractional setting over a negative domain to all possibledirections.

2 Background

We mention

Definition 1 ([11]) Let x, x′ ∈ [a, b], f ∈ C ([a, b]). The Riemann-Liouville(R-L) fractional derivative of a function f of order q (0 < q < 1) is defined as

Dqxf (x′) =

Dqx+f (x′) , x′ > x,

Dqx−f (x′) , x′ < x

=

1

Γ (1− q)

ddx′

∫ x′

x(x′ − t)−q f (t) dt, x′ > x,

− ddx′

∫ xx′ (t− x′)−q f (t) dt, x′ < x,

(5)

the left and right R-L fractional derivatives, respectively.

We need

Definition 2 ([11], [12]) The local fractional derivative of order q (0 < q < 1)of a function f ∈ C ([a, b]) is defined as

Dqf (x) = limx′→x

Dqx (f (x′)− f (x)) . (6)

More generally we define

2

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 28, NO.5, 2020, COPYRIGHT 2020 EUDOXUS PRESS, LLC

880 Anastassiou 879-891

Page 117: Journal of Computational Analysis and Applicationseudoxuspress.com/images/JOCAAA-VOL-28-2020-ISSUE-5.pdfBaltimore, MD 21251, USA tel: 1-443-885-4373 Fax 1-443-885-8216 Gaston.N'Guerekata@morgan.edu

Definition 3 ([9]) Let N ∈ Z+, 0 < q < 1, the local fractional derivative oforder (N + q) of a function f ∈ CN ([a, b]) is defined by

DN+qf (x) = limx′→x

Dqx

(f (x′)−

N∑n=0

f (n) (x)

n!(x′ − x)

n

). (7)

If N = 0, then Definition 3 collapses to Definition 2.We need

Definition 4 (related to Definition 3) Let f ∈ CN ([a, b]), N ∈ Z+. Set

F (x, x′ − x; q,N) := Dqx

(f (x′)−

N∑n=0

f (n) (x)

n!(x′ − x)

n

). (8)

Let x′ − x := t, then x′ = x+ t, and

F (x, t; q,N) = Dqx

(f (x+ t)−

N∑n=0

f (n) (x)

n!tn

). (9)

We make

Remark 5 Here x′, x ∈ [a, b], and a ≤ x+ t ≤ b, equivalently a−x ≤ t ≤ b−x.From a ≤ x ≤ b, we get a− x ≤ 0 ≤ b− x. We assume here that F (x, ·; q,N) ∈C1 ([a− x, b− x]). Clearly, then it holds

DN+qf (x) = F (x, 0; q,N) , (10)

and DN+qf (x) exists in R.

We would need:

Theorem 6 ([9]) Let f ∈ CN ([a, b]), N ∈ Z+. Here x, x′ ∈ [a, b], andF (x, ·; q,N) ∈ C1 ([a− x, b− x]). Then

f (x′) =N∑n=0

f (n) (x)

n!(x′ − x)

n+DN+qf (x)

Γ (q + 1)|x′ − x|q + (11)

1

Γ (q + 1)

∫ x′−x

0

dF (x, t; q,N)

dt|(x′ − x)− t|q dt.

Corollary 7 (to Theorem 6, N = 0) Let f ∈ C ([a, b]), x, x′ ∈ [a, b], andF (x, ·; q, 0) ∈ C1 ([a− x, b− x]). Then

f (x′) = f (x) +Dqf (x)

Γ (q + 1)|x′ − x|q + (12)

1

Γ (q + 1)

∫ x′−x

0

dF (x, t; q, 0)

dt|(x′ − x)− t|q dt.

3

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 28, NO.5, 2020, COPYRIGHT 2020 EUDOXUS PRESS, LLC

881 Anastassiou 879-891

Page 118: Journal of Computational Analysis and Applicationseudoxuspress.com/images/JOCAAA-VOL-28-2020-ISSUE-5.pdfBaltimore, MD 21251, USA tel: 1-443-885-4373 Fax 1-443-885-8216 Gaston.N'Guerekata@morgan.edu

We make

Remark 8 Let f ∈ CN ([a, b]), N ∈ Z+. Here x, x′ ∈ [a, b] : x′ < x, andF (x, ·; q,N) ∈ C1 ([a− x, b− x]), 0 < q < 1. By Theorem 6 we get

f (x′) =N∑n=0

f (n) (x)

n!(x′ − x)

n+DN+qf (x)

Γ (q + 1)(x− x′)q −

1

Γ (q + 1)

∫ 0

x′−x

dF (x, t; q,N)

dt(t− x′ + x)

qdt. (13)

Clearly then we get:Let f ∈ CN ([a, 0]), a < 0, N ∈ Z+, F (0, ·; q,N) ∈ C1 ([a, 0]), 0 < q < 1.

Then, for any x ∈ [a, 0], we derive

f (x) =N∑n=0

f (n) (0)

n!xn +

DN+qf (0)

Γ (q + 1)(−x)

q −

1

Γ (q + 1)

∫ 0

x

dF (0, t; q,N)

dt(t− x)

qdt. (14)

In this article we will use a lot (14).

Remark 9 Let f ∈ CN ([a, 0]), N ∈ Z+, a < 0, x ∈ [a, 0]; F (0, ·; q,N) ∈C1 ([a, 0]), 0 < q < 1. Then, by (14), we have

f (x) =N∑n=0

f (n) (0)

n!xn +

DN+qf (0)

Γ (q + 1)(−x)

q(15)

− 1

Γ (q + 1)

∫ 0

x

dF (0, t; q,N)

dt(t− x)

qdt.

Assume that f (n) (0) = 0, n = 0, 1, ..., N, and DN+qf (0) = 0 (= F (0, 0; q,N) =Dq

0f (0)).Then

−f (x) =1

Γ (q + 1)

∫ 0

x

dF (0, t; q,N)

dt(t− x)

qdt, (16)

∀ x ∈ [a, 0] .Here it is

F (0, t; q,N) = Dq0 (f (t)) ∈ C1 ([a, 0]) ,

where Dq0 is the right Riemann-Liouville fractional derivative.

Let a ≤ x ≤ w ≤ 0, then

−f (w) =1

Γ (q + 1)

∫ 0

w

dF (0, t; q,N)

dt(t− w)

qdt. (17)

4

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 28, NO.5, 2020, COPYRIGHT 2020 EUDOXUS PRESS, LLC

882 Anastassiou 879-891

Page 119: Journal of Computational Analysis and Applicationseudoxuspress.com/images/JOCAAA-VOL-28-2020-ISSUE-5.pdfBaltimore, MD 21251, USA tel: 1-443-885-4373 Fax 1-443-885-8216 Gaston.N'Guerekata@morgan.edu

Consider p1, q1 > 1 : 1p1

+ 1q1

= 1. Then

|f (w)| = 1

Γ (q + 1)

∫ 0

w

∣∣∣∣dF (0, t; q,N)

dt

∣∣∣∣ (t− w)qdt ≤

1

Γ (q + 1)

(∫ 0

w

∣∣∣∣dF (0, t; q,N)

dt

∣∣∣∣q1 dt)1q1(∫ 0

w

(t− w)qp1 dt

) 1p1

=

1

Γ (q + 1)

(−w)qp1+1p1

(qp1 + 1)1p1

(∫ 0

w

∣∣∣∣dF (0, t; q,N)

dt

∣∣∣∣q1 dt)1q1

=

1

Γ (q + 1)

(−w)qp1+1p1

(qp1 + 1)1p1

(z (w))1q1 , (18)

where

z (w) :=

∫ 0

w

∣∣∣∣dF (0, t; q,N)

dt

∣∣∣∣q1 dt, (19)

all a ≤ x ≤ w ≤ 0, and z (0) = 0.From

−z (w) =

∫ w

0

∣∣∣∣dF (0, t; q,N)

dt

∣∣∣∣q1 dt,we get

−z′ (w) = (−z (w))′

=

∣∣∣∣dF (0, w; q,N)

dw

∣∣∣∣q1 , (20)

and ∣∣∣∣dF (0, w; q,N)

dw

∣∣∣∣ = (−z′ (w))1q1 . (21)

Therefore we obtain

|f (w)|∣∣∣∣dF (0, w; q,N)

dw

∣∣∣∣ ≤ (22)

1

Γ (q + 1) (qp1 + 1)1p1

(−w)qp1+1p1 (z (w))

1q1 (−z′ (w))

1q1 .

Hence it holds ∫ 0

x

|f (w)|∣∣∣∣dF (0, w; q,N)

dw

∣∣∣∣ dw ≤ (23)

1

Γ (q + 1) (qp1 + 1)1p1

∫ 0

x

(−w)qp1+1p1 (z (w) (−z′ (w)))

1q1 dw ≤

1

Γ (q + 1) (qp1 + 1)1p1

(∫ 0

x

(−w)qp1+1

dw

) 1p1(∫ 0

x

z (w) (−z′ (w)) dw

) 1q1

=

1

Γ (q + 1) (qp1 + 1)1p1

((−x)

qp1+2

qp1 + 2

) 1p1(−z

2 (w)

2|0x) 1q1

= (24)

5

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 28, NO.5, 2020, COPYRIGHT 2020 EUDOXUS PRESS, LLC

883 Anastassiou 879-891

Page 120: Journal of Computational Analysis and Applicationseudoxuspress.com/images/JOCAAA-VOL-28-2020-ISSUE-5.pdfBaltimore, MD 21251, USA tel: 1-443-885-4373 Fax 1-443-885-8216 Gaston.N'Guerekata@morgan.edu

1

Γ (q + 1) (qp1 + 1)1p1 (qp1 + 2)

1p1

(−x)qp1+2p1

(z (x))2q1

21q1

.

We have proved that ∫ 0

x

|f (w)|∣∣∣∣dF (0, w; q,N)

dw

∣∣∣∣ dw ≤(−x)

q+ 2p1

21q1 Γ (q + 1) [(qp1 + 1) (qp1 + 2)]

1p1

(∫ 0

x

∣∣∣∣dF (0, w; q,N)

dw

∣∣∣∣q1 dw)2q1

. (25)

We have established the following negative domain Lp-Opial type local rightfractional inequality:

Theorem 10 Let p1, q1 > 1 : 1p1

+ 1q1

= 1; f ∈ CN ([a, 0]), N ∈ Z+, a < 0,

x ∈ [a, 0]; F (0, ·; q,N) ∈ C1 ([a, 0]), 0 < q < 1. Assume that f (n) (0) = 0,n = 0, 1, ..., N, and DN+qf (0) = 0 (= F (0, 0; q,N) = Dq

0f (0)). [Here it isF (0, t; q,N) = Dq

0 (f (t)) ∈ C1 ([a, 0]), where Dq0 is the right Riemann-Liouville

fractional derivative]. Then∫ 0

x

|f (t)|∣∣∣∣dF (0, t; q,N)

dt

∣∣∣∣ dt ≤(−x)

q+ 2p1

21q1 Γ (q + 1) [(qp1 + 1) (qp1 + 2)]

1p1

(∫ 0

x

∣∣∣∣dF (0, t; q,N)

dt

∣∣∣∣q1 dt)2q1

, (26)

⇔it holds ∫ 0

x

|f (t)|∣∣∣∣dDq

0 (f (t))

dt

∣∣∣∣ dt ≤(−x)

q+ 2p1

21q1 Γ (q + 1) [(qp1 + 1) (qp1 + 2)]

1p1

(∫ 0

x

∣∣∣∣dDq0 (f (t))

dt

∣∣∣∣q1 dt)2q1

, (27)

∀ x ∈ [a, 0] .

The case p1 = q1 = 2 follows:

Corollary 11 All as in Theorem 10, with p1 = q1 = 2. Then∫ 0

x

|f (t)|∣∣∣∣dF (0, t; q,N)

dt

∣∣∣∣ dt ≤ (28)

(−x)q+1

2Γ (q + 1)√

(q + 1) (2q + 1)

(∫ 0

x

∣∣∣∣dF (0, t; q,N)

dt

∣∣∣∣2 dt),

6

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 28, NO.5, 2020, COPYRIGHT 2020 EUDOXUS PRESS, LLC

884 Anastassiou 879-891

Page 121: Journal of Computational Analysis and Applicationseudoxuspress.com/images/JOCAAA-VOL-28-2020-ISSUE-5.pdfBaltimore, MD 21251, USA tel: 1-443-885-4373 Fax 1-443-885-8216 Gaston.N'Guerekata@morgan.edu

it holds ∫ 0

x

|f (t)|∣∣∣∣dDq

0 (f (t))

dt

∣∣∣∣ dt ≤ (29)

(−x)q+1

2Γ (q + 1)√

(q + 1) (2q + 1)

(∫ 0

x

(dDq

0 (f (t))

dt

)2

dt

),

∀ x ∈ [a, 0] .

We make

Remark 12 Let f1, f2 according to the assumptions of Theorem 10. Then

−f1 (x1) =1

Γ (q + 1)

∫ 0

x1

dF1 (0, t1; q,N)

dt1(t1 − x1)

qdt1, (30)

∀ x1 ∈ [a1, 0] , a1 < 0;

−f2 (x2) =1

Γ (q + 1)

∫ 0

x2

dF2 (0, t2; q,N)

dt2(t2 − x2)

qdt2, (31)

∀ x2 ∈ [a2, 0] , a2 < 0.Here it is

Fi (0, ti; q,N) = Dq0 (fi (ti)) ∈ C1 ([ai, 0]) , i = 1, 2;

where Dq0 is the right Riemann-Liouville fractional derivative.

Consider p1, q1 > 1 : 1p1

+ 1q1

= 1.Hence

|fi (xi)| ≤1

Γ (q + 1)

∫ 0

xi

∣∣∣∣dFi (0, ti; q,N)

dti

∣∣∣∣ (ti − xi)q dti, (32)

i = 1, 2; ∀ xi ∈ [ai, 0] .We get by Holder’s inequality:

|f1 (x1)| ≤

1

Γ (q + 1)

(∫ 0

x1

(t1 − x1)qp1 dt1

) 1p1(∫ 0

x1

∣∣∣∣dF1 (0, t1; q,N)

dt1

∣∣∣∣q1 dt1)1q1

≤ (33)

1

Γ (q + 1)

(−x1)qp1+1p1

(qp1 + 1)1p1

∥∥∥∥dF1 (0, t1; q,N)

dt1

∥∥∥∥q1,[a1,0]

,

∀ x1 ∈ [a1, 0] .Similarly, we obtain

|f2 (x2)| ≤ 1

Γ (q + 1)

(−x2)qq1+1q1

(qq1 + 1)1q1

∥∥∥∥dF2 (0, t2; q,N)

dt2

∥∥∥∥p1,[a2,0]

, (34)

7

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 28, NO.5, 2020, COPYRIGHT 2020 EUDOXUS PRESS, LLC

885 Anastassiou 879-891

Page 122: Journal of Computational Analysis and Applicationseudoxuspress.com/images/JOCAAA-VOL-28-2020-ISSUE-5.pdfBaltimore, MD 21251, USA tel: 1-443-885-4373 Fax 1-443-885-8216 Gaston.N'Guerekata@morgan.edu

∀ x2 ∈ [a2, 0] .Therefore we have

|f1 (x1)| |f2 (x2)| ≤ 1

(Γ (q + 1))2

(qp1 + 1)1p1 (qq1 + 1)

1q1

(35)

(−x1)qp1+1p1 (−x2)

qq1+1q1

∥∥∥∥dF1 (0, t1; q,N)

dt1

∥∥∥∥q1,[a1,0]

∥∥∥∥dF2 (0, t2; q,N)

dt2

∥∥∥∥p1,[a2,0]

(using Young’s inequality for a, b ≥ 0, a1p1 b

1q1 ≤ a

p1+ b

q1)

1

(Γ (q + 1))2

(qp1 + 1)1p1 (qq1 + 1)

1q1

[(−x)

qp1+1

p1+

(−x2)qq1+1

q1

]∥∥∥∥dF1 (0, t1; q,N)

dt1

∥∥∥∥q1,[a1,0]

∥∥∥∥dF2 (0, t2; q,N)

dt2

∥∥∥∥p1,[a2,0]

, (36)

∀ xi ∈ [ai, 0] , i = 1, 2.So far we have established

|f1 (x1)| |f2 (x2)|[(−x)qp1+1

p1+ (−x2)

qq1+1

q1

] ≤ 1

(Γ (q + 1))2

(qp1 + 1)1p1 (qq1 + 1)

1q1

(37)

∥∥∥∥dF1 (0, t1; q,N)

dt1

∥∥∥∥q1,[a1,0]

∥∥∥∥dF2 (0, t2; q,N)

dt2

∥∥∥∥p1,[a2,0]

,

∀ xi ∈ [ai, 0] , i = 1, 2.The denominator of left hand side of (37) can be zero only when x1 = 0 and

x2 = 0. By integrating (37) over [a1, 0]× [a2, 0] we get∫ 0

a1

∫ 0

a2

|f1 (x1)| |f2 (x2)| dx1dx2[(−x)qp1+1

p1+ (−x2)

qq1+1

q1

] ≤ a1a2

(Γ (q + 1))2

(qp1 + 1)1p1 (qq1 + 1)

1q1

(38)

∥∥∥∥dF1 (0, t1; q,N)

dt1

∥∥∥∥q1,[a1,0]

∥∥∥∥dF2 (0, t2; q,N)

dt2

∥∥∥∥p1,[a2,0]

.

We have proved the following negative domains local right fractional Hilbert-Pachpatte inequality:

Theorem 13 Let p1, q1 > 1 : 1p1

+ 1q1

= 1; i = 1, 2 for fi ∈ CN ([ai, 0]), N ∈ Z+,

ai < 0; Fi (0, ·; q,N) ∈ C1 ([ai, 0]), 0 < q < 1. Assume that f(n)i (0) = 0, n =

0, 1, ..., N, and DN+qfi (0) = 0 , i = 1, 2 (i.e. Fi (0, 0; q,N) = Dq0fi (0) = 0).

[Here it is Fi (0, ti; q,N) = Dq0 (fi (ti)) ∈ C1 ([ai, 0]), where Dq

0 is the rightRiemann-Liouville fractional derivative]. Then∫ 0

a1

∫ 0

a2

|f1 (x1)| |f2 (x2)| dx1dx2[(−x)qp1+1

p1+ (−x2)

qq1+1

q1

] ≤ a1a2

(Γ (q + 1))2

(qp1 + 1)1p1 (qq1 + 1)

1q1

(39)

8

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 28, NO.5, 2020, COPYRIGHT 2020 EUDOXUS PRESS, LLC

886 Anastassiou 879-891

Page 123: Journal of Computational Analysis and Applicationseudoxuspress.com/images/JOCAAA-VOL-28-2020-ISSUE-5.pdfBaltimore, MD 21251, USA tel: 1-443-885-4373 Fax 1-443-885-8216 Gaston.N'Guerekata@morgan.edu

∥∥∥∥dF1 (0, t1; q,N)

dt1

∥∥∥∥q1,[a1,0]

∥∥∥∥dF2 (0, t2; q,N)

dt2

∥∥∥∥p1,[a2,0]

,

⇔it holds∫ 0

a1

∫ 0

a2

|f1 (x1)| |f2 (x2)| dx1dx2[(−x)qp1+1

p1+ (−x2)

qq1+1

q1

] ≤ a1a2

(Γ (q + 1))2

(qp1 + 1)1p1 (qq1 + 1)

1q1

(40)

∥∥∥∥dDq0 (f1 (t1))

dt1

∥∥∥∥q1,[a1,0]

∥∥∥∥dDq0 (f2 (t2))

dt2

∥∥∥∥p1,[a2,0]

.

We make

Remark 14 Let f ∈ CN ([a, 0]), a < 0, N ∈ Z+, F (0, ·; q,N) ∈ C1 ([a, 0]),0 < q < 1. Then for any x ∈ [a, 0], we have

f (x) =N∑n=0

f (n) (0)

n!xn +

DN+qf (0)

Γ (q + 1)(−x)

q(41)

− 1

Γ (q + 1)

∫ 0

x

dF (0, t; q,N)

dt(t− x)

qdt.

Assume that f (n) (0) = 0, n = 0, 1, ..., N. Here DN+qf (0) = F (0, 0; q,N) =Dq

0f (0), where Dq0 is the right Riemann-Liouville fractional derivative.

So far we have

f (x) =DN+qf (0)

Γ (q + 1)(−x)

q+R (x) , (42)

where

R (x) := − 1

Γ (q + 1)

∫ 0

x

dF (0, t; q,N)

dt(t− x)

qdt. (43)

We also assume that Dq0f ∈ C1 ([a, 0]).

We can rewrite

R (x) = − 1

Γ (q + 1)

∫ 0

x

(d

dtDq

0f (t)

)(t− x)

qdt. (44)

We notice that

|R (x)| ≤ 1

Γ (q + 1)

∫ 0

x

∣∣∣∣ ddtDq0f (t)

∣∣∣∣ (t− x)qdt ≤

1

Γ (q + 1)

∥∥∥∥ ddtDq0f (t)

∥∥∥∥∞,[a,0]

(−x)q+1

q + 1.

9

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 28, NO.5, 2020, COPYRIGHT 2020 EUDOXUS PRESS, LLC

887 Anastassiou 879-891

Page 124: Journal of Computational Analysis and Applicationseudoxuspress.com/images/JOCAAA-VOL-28-2020-ISSUE-5.pdfBaltimore, MD 21251, USA tel: 1-443-885-4373 Fax 1-443-885-8216 Gaston.N'Guerekata@morgan.edu

That is

|R (x)| ≤ (−x)q+1

Γ (q + 2)

∥∥∥∥ ddtDq0f (t)

∥∥∥∥∞,[a,0]

, (45)

∀ x ∈ [a, 0] .Hence, it holds∫ 0

a

f (x) dx =DN+qf (0)

Γ (q + 1)

∫ 0

a

(−x)qdx+

∫ 0

a

R (x) dx = (46)

DN+qf (0)

Γ (q + 1)

(−a)q+1

q + 1+

∫ 0

a

R (x) dx =DN+qf (0)

Γ (q + 2)(−a)

q+1+

∫ 0

a

R (x) dx.

Therefore, we get∫ 0

a

f (x) dx− DN+qf (0)

Γ (q + 2)(−a)

q+1=

∫ 0

a

R (x) dx. (47)

Consequently, we derive∣∣∣∣∫ 0

a

f (x) dx− (Dq0f) (0)

Γ (q + 2)(−a)

q+1

∣∣∣∣ ≤ ∫ 0

a

|R (x)| dx ≤ (48)

∥∥ ddtD

q0f (t)

∥∥∞,[a,0]

Γ (q + 2)

∫ 0

a

(−x)q+1

dx =

∥∥ ddtD

q0f (t)

∥∥∞,[a,0]

Γ (q + 2)

(−a)q+2

q + 2

=

∥∥ ddtD

q0f (t)

∥∥∞,[a,0] (−a)

q+2

Γ (q + 3). (49)

We have proved the following negative domain local right fractional compar-ison of means results:

Theorem 15 Let f ∈ CN ([a, 0]), a < 0, N ∈ Z+, Dq0f ∈ C1 ([a, 0]), 0 < q < 1.

Assume f (n) (0) = 0, n = 0, 1, ..., N. Then∣∣∣∣∫ 0

a

f (x) dx− (Dq0f) (0)

Γ (q + 2)(−a)

q+1

∣∣∣∣ ≤∥∥ ddtD

q0f (t)

∥∥∞,[a,0] (−a)

q+2

Γ (q + 3), (50)

⇔ ∣∣∣∣ 1

(−a)

∫ 0

a

f (x) dx− (Dq0f) (0)

Γ (q + 2)(−a)

q

∣∣∣∣ ≤∥∥ ddtD

q0f (t)

∥∥∞,[a,0] (−a)

q+1

Γ (q + 3). (51)

We make

Remark 16 All as in Theorem 10. Then

−f (x) =1

Γ (q + 1)

∫ 0

x

dF (0, t; q,N)

dt(t− x)

qdt, (52)

10

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 28, NO.5, 2020, COPYRIGHT 2020 EUDOXUS PRESS, LLC

888 Anastassiou 879-891

Page 125: Journal of Computational Analysis and Applicationseudoxuspress.com/images/JOCAAA-VOL-28-2020-ISSUE-5.pdfBaltimore, MD 21251, USA tel: 1-443-885-4373 Fax 1-443-885-8216 Gaston.N'Guerekata@morgan.edu

∀ x ∈ [a, 0] .Let p1, q1 > 1 : 1

p1+ 1

q1= 1. Thus

|f (x)| ≤ 1

Γ (q + 1)

∫ 0

x

∣∣∣∣dF (0, t; q,N)

dt

∣∣∣∣ (t− x)qdt ≤

1

Γ (q + 1)

(∫ 0

x

∣∣∣∣dF (0, t; q,N)

dt

∣∣∣∣q1 dt)1q1(∫ 0

x

(t− x)qp1 dt

) 1p1

1

Γ (q + 1)

∥∥∥∥dF (0, t; q,N)

dt

∥∥∥∥q1,[a,0]

(−x)qp1+1p1

(qp1 + 1)1p1

. (53)

That is

|f (x)| ≤ (−x)qp1+1p1

Γ (q + 1) (qp1 + 1)1p1

∥∥∥∥dF (0, t; q,N)

dt

∥∥∥∥q1,[a,0]

, (54)

∀ x ∈ [a, 0] .Therefore

|f (x)|q1 ≤ (−x)q1(q+1)−1

(Γ (q + 1))q1 (qp1 + 1)

q1p1

∥∥∥∥dF (0, t; q,N)

dt

∥∥∥∥q1q1,[a,0]

. (55)

Consequently, it holds ∫ 0

a

|f (x)|q1 dx ≤

(−a)q1(q+1)[

Γ (q + 1) (qp1 + 1)1p1

]q1q1 (q + 1)

∥∥∥∥dF (0, t; q,N)

dt

∥∥∥∥q1q1,[a,0]

. (56)

That is

‖f‖q1,[a,0] ≤(−a)

(q+1)

Γ (q + 1) (qp1 + 1)1p1 (q1 (q + 1))

1q1

∥∥∥∥dF (0, t; q,N)

dt

∥∥∥∥q1,[a,0]

. (57)

We have proved the following negative domain local right fractional Poincareinequality:

Theorem 17 All as in Theorem 10. Then

‖f‖q1,[a,0] ≤(−a)

(q+1)

Γ (q + 1) (qp1 + 1)1p1 (q1 (q + 1))

1q1

∥∥∥(Dq0 (f))

′∥∥∥q1,[a,0]

. (58)

We make

11

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 28, NO.5, 2020, COPYRIGHT 2020 EUDOXUS PRESS, LLC

889 Anastassiou 879-891

Page 126: Journal of Computational Analysis and Applicationseudoxuspress.com/images/JOCAAA-VOL-28-2020-ISSUE-5.pdfBaltimore, MD 21251, USA tel: 1-443-885-4373 Fax 1-443-885-8216 Gaston.N'Guerekata@morgan.edu

Remark 18 All as in Theorem 10, plus r > 0. By (54) we have

|f (x)| ≤ (−x)qp1+1p1

Γ (q + 1) (qp1 + 1)1p1

∥∥∥∥dF (0, t; q,N)

dt

∥∥∥∥q1,[a,0]

, (59)

∀ x ∈ [a, 0] .Hence it holds

|f (x)|r ≤ (−x)r(q+ 1

p1

)[Γ (q + 1) (qp1 + 1)

1p1

]r ∥∥∥(Dq0 (f))

′∥∥∥rq1,[a,0]

. (60)

Consequently, we get

∫ 0

a

|f (x)|r dx ≤ (−a)r(q+ 1

p1

)+1[

Γ (q + 1) (qp1 + 1)1p1

]r [r(q + 1

p1

)+ 1] ∥∥∥(Dq

0 (f))′∥∥∥rq1,[a,0]

.

(61)

We have proved the following negative domain local ritgh fractional Sobolevtype inequality:

Theorem 19 All as in Theorem 10, plus r > 0. Then

‖f‖r,[a,0] ≤(−a)

q+ 1p1

+ 1r

Γ (q + 1) (qp1 + 1)1p1

[r(q + 1

p1

)+ 1] 1r

∥∥∥(Dq0 (f))

′∥∥∥q1,[a,0]

. (62)

References

[1] F.B. Adda, J. Cresson, Fractional differentiation equations and theSchrodinger equation, Applied Math. & Computation, 161 (2005), 323-345.

[2] G.A. Anastassiou, Quantitative Approximations, CRC press, Boca Raton,London, New York, 2001.

[3] G.A. Anastassiou, Fractional differentiation inequalities, Springer, Heidel-berg, New York, 2009.

[4] G.A. Anastassiou, Probabilistic Inequalities, World Scientific, Singapore,New York, 2010.

[5] G.A. Anastassiou, Advanced Inequalities, World Scientific, Singapore, NewYork, 2010.

[6] G.A. Anastassiou, Intelligent Mathematics: Computational Analysis,Springer, Heidelberg, New York, 2011.

12

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 28, NO.5, 2020, COPYRIGHT 2020 EUDOXUS PRESS, LLC

890 Anastassiou 879-891

Page 127: Journal of Computational Analysis and Applicationseudoxuspress.com/images/JOCAAA-VOL-28-2020-ISSUE-5.pdfBaltimore, MD 21251, USA tel: 1-443-885-4373 Fax 1-443-885-8216 Gaston.N'Guerekata@morgan.edu

[7] G.A. Anastassiou, Advances on Fractional Inequalities, Springer, Heidel-berg, New York, 2011.

[8] G.A. Anastassiou, Intelligent Comparisons: Analytic Inequalities, Springer,Heidelberg, New York, 2016.

[9] G.A. Anastassiou, Local Fractional Taylor Formula, J. of ComputationalAnalysis and Applications, accepted, 2018.

[10] K. Diethelm, The Analysis of Fractional Differential Equations, Springer,Heidelberg, New York, 2010.

[11] K.M. Kolwankar, Local fractional calculus: a Review, arXiv: 1307:0739v1[nlin.CD] 2 Jul. 2013.

[12] K.M. Kolwankar and A.D. Gangal, Local fractional calculus: a calculus forfractal space-time, Fractals: theory and applications in engineering, 171-181, London, New York, Springer, 1999.

[13] Z. Opial, Sur une inegalite, Ann. Polon. Math. 8 (1960), 29-32.

[14] A. Ostrowski, Uber die Absolutabweichung einer differentiebaren Funktionvon ihrem Integralmittelwert, Comment. Math. Helv., 10 (1938), 226-227.

13

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 28, NO.5, 2020, COPYRIGHT 2020 EUDOXUS PRESS, LLC

891 Anastassiou 879-891

Page 128: Journal of Computational Analysis and Applicationseudoxuspress.com/images/JOCAAA-VOL-28-2020-ISSUE-5.pdfBaltimore, MD 21251, USA tel: 1-443-885-4373 Fax 1-443-885-8216 Gaston.N'Guerekata@morgan.edu

Approximate controllability for semilinear

integro-differential control equations in Hilbert

spaces

Yong Han Kang1, Jin-Mun Jeong2,∗ and Ah-ran Park3

1Institute of Liberal Education, Catholic University of Daegu

Gyeongsan, 712-702, South Korea

E-mail:[email protected]

2,3Department of Applied Mathematics, Pukyong National University

Busan 48513, South Korea

E-mail: ∗[email protected](Corresponding author), [email protected]

Abstract

This paper deals with the approximate controllability for a class of semilinearintegro-differential functional control equations, which is provided under general suf-ficient conditions on the system operator, controller and nonlinear terms. Our usedtool is applying results similar to Fredholm alternative for nonlinear operators underrestrictive assumptions. Finally, a simple example to which our main result can beapplied is given.

Keywords: approximate controllability, semilinear control equations, integro-differentialcontrol equations, controller, Fredholm alternative.

AMS Classification: Primary 93B05, 35F25

1 Introduction

In this paper, we deal with the approximate controllability for semilinear integro-differentialfunctional control equations in the form

ddtx(t) = Ax(t) +

∫ t0 k(t− s)g(s, x(s), u(s))ds+Bu(t), 0 < t ≤ T,

x(0) = x0(1.1)

Email: [email protected](A. park), *[email protected](J. jeong), [email protected](E. Y. Ju)This work was supported by a Research Grant of Pukyong National University(2021 Year).

1

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 28, NO.5, 2020, COPYRIGHT 2020 EUDOXUS PRESS, LLC

892 Yong Han Kang et al 892-902

Page 129: Journal of Computational Analysis and Applicationseudoxuspress.com/images/JOCAAA-VOL-28-2020-ISSUE-5.pdfBaltimore, MD 21251, USA tel: 1-443-885-4373 Fax 1-443-885-8216 Gaston.N'Guerekata@morgan.edu

in a Hilbert space H, where k belongs to L2(0, T )(T > 0) and g is a nonlinear mapping asdetailed in Section 2. The principal operator A generates an analytic semigroup (S(t))t≥0and B is a bounded linear operator from another Hilbert space U to H.

The controllability problem is a question of whether is possible to steer a dynamicsystem from an initial state to an arbitrary final state using the set of admissible controls.Naito [13] was the first to deal with the range condition argument of controller in orderto obtain the approximate controllability of a semilinear control system. In [3, 9, 17, 18],they have studied continuously about controllability of semilinear systems dominated bylinear parts(in case g ≡ 0) by assuming that S(t) is compact operator for each t > 0 asmatters connected with [13]. Another approach used to obtain sufficient conditions forapproximate solvability of nonlinear equations is a fixed point theorem combined withtechnique of operator transformations by configuring the resolvent as seen in [2]

The controllability for various nonlinear equations has been studied by many authors,for example, see [5, 6, 12] for local controllability of neutral functional differential systemswith unbounded delay, [10, 14] for neutral evolution integrodifferential systems with statedependent delay.

Sukavanam and Tomar [15] studied the approximate controllability for the generalretarded initial value problem by assuming that the Lipschitz constant of the nonlinearterm is less then 1, and Wang [17] for general retarded semilinear equations assuming thegrowth condition of the nonlinear term and the compactness of the semigroup.

In this paper, authors want to use a different method than the previous one. Our usedtool is the theorems similar to the Fredholm alternative for nonlinear operators underrestrictive assumption, which is on the solution of nonlinear operator equations λT (x) −F (x) = y in dependence on the real number λ, where T and F are nonlinear operatorsdefined a Banach space X with values in a Banach space Y . In order to obtain theapproximate controllability for a class of semilinear integro-differential functional controlequations, it is necessary to suppose that T acts as the identity operator while F relatedto the nonlinear term of (1.1) is completely continuous

In Section 2, we introduce regularity properties for (1.1). Since we apply the Fredholmtheory in the proof of the main theorem, we assume some compactness of the embeddingbetween intermediate spaces. Then by virtue of Aubin [1], we can show that the solutionmapping of a control space to the terminal state space is completely continuous. Basedon Section 2, it is shown the sufficient conditions on the controller and nonlinear termsfor approximate controllability for (1.1) by using the Fredholm theory. Finally, a simpleexample to which our main result can be applied is given.

2 Semilinear functional equations

Let V and H be complex Hilbert spaces forming a Gelfand triple

V → H ≡ H∗ → V ∗

2

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 28, NO.5, 2020, COPYRIGHT 2020 EUDOXUS PRESS, LLC

893 Yong Han Kang et al 892-902

Page 130: Journal of Computational Analysis and Applicationseudoxuspress.com/images/JOCAAA-VOL-28-2020-ISSUE-5.pdfBaltimore, MD 21251, USA tel: 1-443-885-4373 Fax 1-443-885-8216 Gaston.N'Guerekata@morgan.edu

by identifying the antidual of H with H. Therefore, for the brevity, we may regard that||u||∗ ≤ |u| ≤ ||u|| for all u ∈ V , where the notations | · |, || · || and || · ||∗ denote the normsof H, V and V ∗, respectively as usual. Let a(u, v) be a bounded sesquilinear form definedin V × V satisfying Garding’s inequality

Re a(u, u) ≥ c0||u||2 − c1|u|2, c0 > 0, c1 ≥ 0.

Let A be the operator associated with this sesquilinear form:

(Au, v) = −a(u, v), u, v ∈ V.

Then A is a bounded linear operator from V to V ∗. The realization of A in H which isthe restriction of A to

D(A) = u ∈ V : Au ∈ His also denoted by A. For the sake of simplicity we assume that c1 = 0 and hence theclosed half plane λ : Reλ ≥ 0 is contained in the resolvent set of A. It is known that Agenerates an analytic semigroup S(t) in both H and V ∗. As seen in Lemma 3.6.2 of [16],there exists a constant M > 0 such that

|S(t)x| ≤M |x| and ||S(t)x||∗ ≤M ||x||∗, (2.1)

The following initial value problem for the abstract linear parabolic equationdx(t)dt = Ax(t) + k(t), 0 < t ≤ T,x(0) = x0.

(2.2)

By virtue of Theorem 3.3 of [4](or Theorem 3.1 of [9]), we have the following result onthe corresponding linear equation (2.2).

Proposition 2.1. Suppose that the assumptions for the principal operator A stated aboveare satisfied. Then the following properties hold:1) For x0 ∈ V and k ∈ L2(0, T ;H), T > 0, there exists a unique solution x of (2.2)belonging to

L2(0, T ;D(A)) ∩W 1,2(0, T ;H) ⊂ C([0, T ];V )

and satisfying

||x||L2(0,T ;D(A))∩W 1,2(0,T ;H) ≤ C1(||x0||+ ||k||L2(0,T ;H)), (2.3)

where C1 is a constant depending on T .2) Let x0 ∈ H and k ∈ L2(0, T ;V ∗), T > 0. Then, there exists a unique solution x of(2.2) belonging to

L2(0, T ;V ) ∩W 1,2(0, T ;V ∗) ⊂ C([0, T ];H)

and satisfying||x||L2(0,T ;V )∩W 1,2(0,T ;V ∗) ≤ C1(|x0|+ ||k||L2(0,T ;V ∗)), (2.4)

where C1 is a constant depending on T .

3

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 28, NO.5, 2020, COPYRIGHT 2020 EUDOXUS PRESS, LLC

894 Yong Han Kang et al 892-902

Page 131: Journal of Computational Analysis and Applicationseudoxuspress.com/images/JOCAAA-VOL-28-2020-ISSUE-5.pdfBaltimore, MD 21251, USA tel: 1-443-885-4373 Fax 1-443-885-8216 Gaston.N'Guerekata@morgan.edu

By virtue of Proposition 2.1, we have the following lemma.

Lemma 2.1. Suppose that k ∈ L2(0, T ;H) and x(t) =∫ t0 S(t − s)k(s)ds for 0 ≤ t ≤ T .

Then there exists a constant C2 such that

||x||L2(0,T ;H) ≤ C2T ||k||L2(0,T ;H), (2.5)

and||x||L2(0,T ;V ) ≤ C2

√T ||k||L2(0,T ;H). (2.6)

Consider the following initial value problem for the abstract semilinear parabolic equa-tion

ddtx(t) = Ax(t) +

∫ t0 k(t− s)g(s, x(s), u(s))ds+Bu(t),

x(0) = x0.(2.7)

Let U be a Hilbert space and the controller operator B be a bounded linear operatorfrom U to H.

Let g : R+ × V × U → H be a nonlinear mapping satisfying the following:

Assumption (F).

(i) For any x ∈ V , u ∈ U the mapping g(·, x, u) is strongly measurable;

(ii) There exist positive constants L0, L1, L2 such that

(a) u 7→ g(t, x, u) is an odd mapping (g(·, x,−u) = −g(·, x, u));

(b) for all t ∈ R+, x, x ∈ V , and u, u ∈ U ,

|g(t, x, u)− g(t, x, u)| ≤ L1||x− x||+ L2||u− u||U ,|g(t, 0, 0)| ≤ L0.

For x ∈ L2(0, T ;V ), we set

f(t, x, u) =

∫ t

0k(t− s)g(s, x(s), u(s))ds

where k belongs to L2(0, T ).

Lemma 2.2. Let Assumption (F) be satisfied. Assume that x ∈ L2(0, T ;V ) for any T > 0.Then f(·, x, u) ∈ L2(0, T ;H) and

||f(·, x, u))||L2(0,T ;H) ≤ L0||k||L2(0,T )T/√

2

+ ||k||L2(0,T )

√T (L1||x||L2(0,T ;V ) + L2||u||L2(0,T ;U)). (2.8)

Moreover if x, x ∈ L2(0, T ;V ), then

||f(·, x, u)− f(·, x, u)||L2(0,T ;H)

≤ ||k||L2(0,T )

√T (L1||x− x||L2(0,T ;V ) + L2||u− u||L2(0,T ;U)). (2.9)

4

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 28, NO.5, 2020, COPYRIGHT 2020 EUDOXUS PRESS, LLC

895 Yong Han Kang et al 892-902

Page 132: Journal of Computational Analysis and Applicationseudoxuspress.com/images/JOCAAA-VOL-28-2020-ISSUE-5.pdfBaltimore, MD 21251, USA tel: 1-443-885-4373 Fax 1-443-885-8216 Gaston.N'Guerekata@morgan.edu

The proof is easily from Assumption (F), and using the Holder inequality.

By virtue of Theorem 2.1 of [8], we have the following result on (2.7).

Proposition 2.2. Let Assumption (F) be satisfied. Then there exists a unique solution xof (2.7) such that

x ∈ L2(0, T ;V ) ∩W 1,2(0, T ;V ∗) ⊂ C([0, T ];H)

for any x0 ∈ H. Moreover, there exists a constant C3 such that

||x||L2(0,T ;V )∩W 1,2(0,T ;V ∗) ≤ C3(|x0|+ ||u||L2(0,T ;U)). (2.10)

Corollary 2.1. Assume that the embedding D(A) ⊂ V is completely continuous. LetAssumption (F) be satisfied, and xu be the solution of equation (2.7) associated with u ∈L2(0, T ;U). Then the mapping u 7→ xu is completely continuous from L2(0, T ;U) toL2(0, T ;V ).

Proof. If u is bounded in L2(0, T ;U), then so is xu in L2(0, T ;D(A)) ∩W 1,2(0, T ;H) by(2.8). Since D(A) is compactly embedded in V by assumption, the embedding

L2(0, T ;D(A)) ∩W 1,2(0, T ;H) ⊂ L2(0, T ;V )

is completely continuous in view of Theorem 2 of [1], the mapping u 7→ xu is completelycontinuous from L2(0, T ;U) to L2(0, T ;V ).

3 Approximate controllability

Throughout this section, we assume that D(A) is compactly embedded in V . Let x(T ; f, u)be a state value of the system (2.7) at time T corresponding to the nonlinear term f andthe control u. We define the reachable sets for the system (2.7) as follows:

RT (f) = x(T ; f, u) : u ∈ L2(0, T ;U),RT (0) = x(T ; 0, u) : u ∈ L2(0, T ;U).

Definition 3.1. The system (2.7) is said to be approximately controllable in the timeinterval [0, T ] if for every desired final state x1 ∈ H and ε > 0 there exists a control functionu ∈ L2(0, T ;U) such that the solution x(T ; f, u) of (2.7) satisfies |x(T ; f, u)−x1| < ε, thatis, if RT (f) = H where RT (f) is the closure of RT (f) in H, then the system (2.9) is calledapproximately controllable at time T .

Let us introduce the theory of the degree for completely continuous perturbations ofthe identity operator, which is the infinite dimensional version of Borsuk’s theorem. Let0 ∈ D be a bounded open set in a Banach space X, D its closure and ∂D its boundary.The number d[I − T ;D, 0] is the degree of the mapping I − T with respect to the set Dand the point 0 (see Fucik et al. [7] or Lloid [11]).

5

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 28, NO.5, 2020, COPYRIGHT 2020 EUDOXUS PRESS, LLC

896 Yong Han Kang et al 892-902

Page 133: Journal of Computational Analysis and Applicationseudoxuspress.com/images/JOCAAA-VOL-28-2020-ISSUE-5.pdfBaltimore, MD 21251, USA tel: 1-443-885-4373 Fax 1-443-885-8216 Gaston.N'Guerekata@morgan.edu

Theorem 3.1. (Borsuk’s theorem) Let D be a bounded open symmetric set in a Banachspace X, 0 ∈ D. Suppose that T : D → X be odd completely continuous operator satisfyingT (x) 6= x for x ∈ ∂D. Then d[I −T ;D, 0] is odd integer. That is, there exists at least onepoint x0 ∈ D such that (I − T )(x0) = 0.

Definition 3.2. Let T be a mapping defined by on a Banach space X with value in a realBanach space Y . The mapping T is said to be a (K,L, α)-homeomorphism of X onto Yif

(i) T is a homeomorphism of X onto Y ;

(ii) there exist real numbers K > 0, L > 0, and α > 0 such that

L||x||αX ≤ ||T (x)||Y ≤ K||x||αX , ∀x ∈ X.

Lemma 3.1. Let T be an odd (K,L, α)-homeomorphism of X onto Y and F : X → Y acontinuous operator satisfying

lim sup||x||X→∞

||F (x)||Y||x||αX

= N ∈ R+.

Then if |λ| /∈ [NK ,NL ] ∪ 0 then

lim||x||X→∞

||λT (x)− F (x)||Y =∞.

Proof. Suppose that there exist a constant M > 0 and a sequence xn ⊂ X such that

||λT (xn)− F (xn)||Y ≤M (3.1)

as xn →∞. From (3.1) it follows that

λT (xn)

||xn||αX− F (xn)

||xn||αX→ 0.

Hence, we have

lim supn→∞

|λ|||T (xn)||Y||xn||αX

= N,

and so, |λ|K ≥ N ≥ |λ|L. It is a contradiction with |λ| /∈ [NK ,NL ].

Proposition 3.1. Let T be an odd (K,L, α)-homeomorphism of X onto Y and F : X → Yan odd completely continuous operator. Suppose that for λ 6= 0,

lim||x||X→∞

||λT (x)− F (x)||Y =∞. (3.2)

Then λT − F maps X onto Y .

6

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 28, NO.5, 2020, COPYRIGHT 2020 EUDOXUS PRESS, LLC

897 Yong Han Kang et al 892-902

Page 134: Journal of Computational Analysis and Applicationseudoxuspress.com/images/JOCAAA-VOL-28-2020-ISSUE-5.pdfBaltimore, MD 21251, USA tel: 1-443-885-4373 Fax 1-443-885-8216 Gaston.N'Guerekata@morgan.edu

Proof. We follow the proof Theorem 1.1 in Chapter II of Fucik et al. [7]. Suppose thatthere exists y ∈ Y such that λT (x) = y. Then from (3.2) it follows that FT−1 : Y → Yis an odd completely continuous operator and

lim||y||Y→∞

||y − FT−1(yλ

)||Y =∞.

Let y0 ∈ Y . There exists r > 0 such that

||y − FT−1(yλ

)||Y > ||y0||Y ≥ 0

for each y ∈ Y satisfying ||y||Y = r. Let Yr = y ∈ Y : ||y||Y < r be a open ball. Thenby view of Theorem 3.1, we have d[y−FT−1( yλ);Yr, 0] is an odd number. For each y ∈ Ysatisfying ||y||Y = r and t ∈ [0, 1], there is

||y − FT−1(yλ

)− ty0||Y ≥ ||y − FT−1(y

λ)||Y − ||y0||Y > 0

and hence, by the homotopic property of degree, we have

d[y − FT−1(yλ

);Yr, y0] = d[y − FT−1(yλ

);Yr, 0] 6= 0.

Hence, by the existence theory of the Leray-Schauder degree, there exists a y1 ∈ Yr suchthat

y1 − FT−1(y1λ

) = y0.

We can choose x0 ∈ X satisfying λT (x0) = y1, and so, λT (x0) − F (x0) = y0. Thus, itimplies that λT − F is a mapping of X onto Y .

Combining Lemma 3.1. and Proposition 3,1, we have the following results.

Corollary 3.1. Let T be an odd (K,L, α)-homeomorphism of X onto Y and F : X → Yan odd completely continuous operator satisfying

lim sup||x||X→∞

||F (x)||Y||x||αX

= N ∈ R+.

Then if |λ| /∈ [NK ,NL ]∪0 then λT −F maps X onto Y . Therefore, if N = 0, then for all

λ 6= 0 the operator λT − F maps X onto Y .

First we consider the approximate controllability of the system (2.7) in case where thecontroller B is the identity operator on H under Assumption (F) on the nonlinear operatorf in Section 2. Hence, noting that H = U , we consider the linear system given by

ddty(t) = Ay(t) + u(t),

y(0) = x0,(3.3)

7

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 28, NO.5, 2020, COPYRIGHT 2020 EUDOXUS PRESS, LLC

898 Yong Han Kang et al 892-902

Page 135: Journal of Computational Analysis and Applicationseudoxuspress.com/images/JOCAAA-VOL-28-2020-ISSUE-5.pdfBaltimore, MD 21251, USA tel: 1-443-885-4373 Fax 1-443-885-8216 Gaston.N'Guerekata@morgan.edu

and the following semilinear control systemddtx(t) = Ax(t) + f(t, x(t), v(t)) + v(t),

x(0) = x0.(3.4)

Theorem 3.2. Assume that

lim sup||u||→∞

||f(·, xu, u)||L2(0,T ;H)

||u||L2(0,T ;H)< 1. (3.5)

Under the Assumption (F) we have

RT (0) ⊂ RT (f).

Therefore, if the linear system (3.3) with f = 0 is approximately controllable, then so isthe semilinear system (3.4).

Proof. Let x(t) be solution of (3.4) corresponding to a control u. First, we show that thereexist a v ∈ L2(0, T ;H) such that

v(t) = u(t)− f(t, x(t), v(t)), 0 < t ≤ T,v(0) = u(0).

Let us define an operator F : L2(0, T ;H)→ L2(0, T ;H) as

Fv = −f(·, xv, v).

Then by Corollary 2.1, F is a compact mapping from L2(0, T ;H) to itself, and we have

lim||v||→∞

||λI(v)− F (v)||L2(0,T ;H) =∞,

where the identity operator I on L2(0, T ;H) is an odd (1, 1, 1)-homeomorphism. Thus,from (3.5) and Corollary 3.1, if λ ≥ 1 then λI − F maps L2(0, T ;H) onto itself. Hence,we have showed that there exists a v ∈ L2(0, T ;H) such that v(t) = u(t)− f(t, y(t), v(t)).Let y and x be solutions of (3.3) and (3.4) corresponding to controls u and v, respectively.Then, equation (3.4) is rewritten as

d

dtx(t) = Ax(t) + f(t, x(t), v(t)) + v(t), 0 < t ≤ T

= Ax(t) + f(t, x(t), v(t)) + u(t)− f(t, y(t), v(t))

= Ax(t) + u(t)

8

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 28, NO.5, 2020, COPYRIGHT 2020 EUDOXUS PRESS, LLC

899 Yong Han Kang et al 892-902

Page 136: Journal of Computational Analysis and Applicationseudoxuspress.com/images/JOCAAA-VOL-28-2020-ISSUE-5.pdfBaltimore, MD 21251, USA tel: 1-443-885-4373 Fax 1-443-885-8216 Gaston.N'Guerekata@morgan.edu

with x(0) = x0, which means

x(t) =S(t)x0 +

∫ t

0S(t− s)f(s, x(s), v(s)) + v(s)ds

=S(t)x0 +

∫ t

0S(t− s)u(s)ds = y(t),

where y be solution of (3.3) corresponding to a control u. Therefore, we have proved thatRT (0) ⊂ RT (f).

Corollary 3.2. Let us assume that

||k||L2(0,T )

√T(L1C3 + L2

)< 1,

where C3 is the constant in Proposition 2.2. Under the Assumption (F), we have

RT (0) ⊂ RT (f)

in case where B ≡ I.

Proof. By Lemma 2.2 and Proposition 2.2, we have

||Fu||L2(0,T ;H) = ||f(·, xu, u)||L2(0,T ;H)

≤ L0||k||L2(0,T )T/√

2 + ||k||L2(0,T )

√T (L1||x||L2(0,T ;V ) + L2||u||L2(0,T ;U))

≤ L0||k||L2(0,T )T/√

2 + ||k||L2(0,T )

√TL1C3

(|x0|+ ||u||L2(0,T ;U)

)+ L2||u||L2(0,T ;U)

.

Hence, we have

lim sup||u||→∞

||F (u)||L2(0,T ;H)

||u||L2(0,T ;U)≤ ||k||L2(0,T )

√T(L1C3 + L2

).

Thus, from Theorem 3.2, it follows that if λ ≥ 1 then λI−F maps L2(0, T ;H) onto itself,and so, by the same argument as in the proof of theorem it holds that RT (0) ⊂ RT (f).

From now on, we consider the initial value problem for the semilinear parabolic equa-tion (2.7). Let U be some Hilbert space and the controller operator B be a bounded linearoperator from U to H.

Assumption (B) There exists a constant β > 0 such that R(f) ⊂ R(B) and

||Bu|| ≥ β||u||, ∀u ∈ L2(0, T ;U).

Consider the linear system given byddty(t) = Ay(t) +Bu(t),

y(0) = x0.(3.6)

9

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 28, NO.5, 2020, COPYRIGHT 2020 EUDOXUS PRESS, LLC

900 Yong Han Kang et al 892-902

Page 137: Journal of Computational Analysis and Applicationseudoxuspress.com/images/JOCAAA-VOL-28-2020-ISSUE-5.pdfBaltimore, MD 21251, USA tel: 1-443-885-4373 Fax 1-443-885-8216 Gaston.N'Guerekata@morgan.edu

Theorem 3.3. Under the Assumptions (3.5), (B) and (F), we have

RT (0) ⊂ RT (f).

Therefore, if the linear system (3.6) with f = 0 is approximately controllable, then so isthe semilinear system (2.7).

Proof. Let y be a solution of the linear system (3.6) with f = 0 corresponding to a controlu, and let x be a solutions of the semilinear system (3.4) corresponding to a control v. Setv(t) = u(t)−B−1f(t, x(t), v(t)). Then, system (2.9) is rewritten as

d

dtx(t) = Ax(t) + f(t, x(t), v(t)) +Bv(t), 0 < t ≤ T

= Ax(t) + f(t, x(t), v(t)) +Bu(t)− f(t, x(t), v(t))

with x(0) = x0. Hence, we have

x(t) =S(t)x0 +

∫ t

0S(t− s)f(s, x(s), v(s)) + v(s))ds

=S(t)x0 +

∫ t

0S(t− s)u(s))ds = y(t).

Thus, we obtain that RT (0) ⊂ RT (f).

References

[1] Aubin, J. P., Un theoreme de compacite, C. R. AQcad. Sci.,, 256 (1963), 5042–5044.

[2] K. Balachandran and J. P. Dauer, Controllability of nonlinear systems in Banachspaces; a survey, J. optim. Theory Appl., 115 (2002), 7–28.

[3] J. P. Dauer and N. I. Mahmudov, Approximate controllability of semilinear functionalequations in Hilbert spaces, J. Math. Anal., 273 (2002), 310–327.

[4] G. Di Blasio, K. Kunisch and E. Sinestrari, L2−regularity for parabolic partial inte-grodifferential equations with delay in the highest-order derivatives, J. Math. Anal.Appl., 102 (1984), 38–57.

[5] X. Fu,Controllability of neutral functional differential systems in abstract space, Appl.Math. Comput., 141 (2003), 281–296.

[6] X. Fu, J. Lu and Y. You, Approximate controllability of a semilinear neutral evolutionsystems with delay, Inter. J. Control, 87 (2014), 665-681.

10

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 28, NO.5, 2020, COPYRIGHT 2020 EUDOXUS PRESS, LLC

901 Yong Han Kang et al 892-902

Page 138: Journal of Computational Analysis and Applicationseudoxuspress.com/images/JOCAAA-VOL-28-2020-ISSUE-5.pdfBaltimore, MD 21251, USA tel: 1-443-885-4373 Fax 1-443-885-8216 Gaston.N'Guerekata@morgan.edu

[7] Fucik, S., Necas, J., Soucek, J., & Soucek, V.(1973), lecture Notes in Mathematics346, Springer-verlag, Belin-Heidelberg-NewYork.

[8] J. M. Jeong and H. Kim, Controllability for semilinear functional integrodifferentialequations, Bull. Korean Math. Soc. 46(3) (2009), 463–475.

[9] J. M. Jeong, Y. C. Kwun and J. Y. Park, Approximate controllability for semilinearretarded functional differential equations, J. Dynamics and Control Systems, 5 (1999),no. 3, 329–346.

[10] Y. C. Kwun, S. H. Park, D. K. Park and S. J. Park, Controllability of semilinearneutral functional differential evolution equations with nonlocal conditions, J. KoreaSoc. Math. Educ. Ser. B Pure Appl. Math., 15 (2008), 245-??57.

[11] N. G. Lloid, Degree Theory, Cambridge Univ. Press. 1978.

[12] F. Z. Mokkedem and X. Fu, Approximate controllability of a semi-linear neutral evo-lution systems with infinite delay Internat. J. Robust Nonlinear Control, 27, (2017),1122-1146.

[13] K. Naito, Controllability of semilinear control systems dominated by the linear part,SIAM J. Control Optim., 25 (1987), 715–722.

[14] B. Radhakrishnan and K. Balachandran, Controllability of neutral evolution integrod-ifferential systems with state dependent delay, J. Optim. Theory Appl., 153 (2012),85-97.

[15] N. Sukavanam and N. K. Tomar, Approximate controllability of semilinear delay con-trol system, Nonlinear Func. Anal.Appl., 12 (2007), 53–59.

[16] H. Tanabe, Equations of Evolution, Pitman-London, 1979.

[17] L. Wang, Approximate controllability for integrodifferential equations and multipledelays, J. Optim. Theory Appl., 143 (2009), 185–206.

[18] H. X. Zhou, Approximate controllability for a class of semilinear abstract equations,SIAM J. Control Optim., 21 (1983), 551–565.

11

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 28, NO.5, 2020, COPYRIGHT 2020 EUDOXUS PRESS, LLC

902 Yong Han Kang et al 892-902

Page 139: Journal of Computational Analysis and Applicationseudoxuspress.com/images/JOCAAA-VOL-28-2020-ISSUE-5.pdfBaltimore, MD 21251, USA tel: 1-443-885-4373 Fax 1-443-885-8216 Gaston.N'Guerekata@morgan.edu

Convergence theorems and approximatingendpoints for multivalued Suzuki mappings in

hyperbolic spacesPreeyalak Chuadchawna1, Ali Farajzadeh2 and Anchalee Kaewcharoen3∗

2Department of Mathematics, Razi University, Kermanshah, 67149, IranE-mail: [email protected]

1,3 Department of Mathematics, Faculty of Science, Naresuan UniversityPhitsanulok 65000, Thailand

3 Center of Excellence in Nonlinear Analysis and Optimization, Faculty of ScienceNaresuan University Phitsanulok 65000, Thailand

E-mails: [email protected]; [email protected]

November 13, 2018

AbstractThe objective of this paper is to determine a modified SP-iteration pro-

cess for multi-valued mappings and to establish the convergence theorems forsequences generated by modified SP-iteration processes involving multi-valuedSuzuki mappings converging to endpoints in uniformly convex hyperbolic spaces.The numerical example for supporting our main result is also presented.

Keywords: modified SP-iteration; ∆-convergence theorem; strong conver-gence theorem; endpoint; hyperbolic space.

MSC: Primary 47H10; Seconday 54H25.

1 IntroductionThe distance from u in a metric space (X, d) to a nonempty subset E of X isdefined by

dist(u,E) := infd(u, v) : v ∈ E.It is denoted by K(E) the family of nonempty compact subsets of E. TheHausdorff distance on K(E) is defined by

H(U, V ) := maxsupu∈U

dist(u, V ), supv∈V

dist(v, U) for all U, V ∈ K(E).

∗Corresponding author.

1

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 28, NO.5, 2020, COPYRIGHT 2020 EUDOXUS PRESS, LLC

903 Chuadchawna et al 903-916

Page 140: Journal of Computational Analysis and Applicationseudoxuspress.com/images/JOCAAA-VOL-28-2020-ISSUE-5.pdfBaltimore, MD 21251, USA tel: 1-443-885-4373 Fax 1-443-885-8216 Gaston.N'Guerekata@morgan.edu

For an element x in E, if x ∈ T (x), then x is said to be a fixed point of T .Moreover, if x = T (x), then x is said to be an endpoint of T . It denote byFix(T ) the set of all fixed points of T and by End(T ) the set of all endpointsof T . We can see that for every a multi-valued mapping T , End(T ) ⊂ Fix(T )and whenever t is a single-valued mapping, End(T ) = Fix(T ).

The notion of endpoints for multi-valued mappings is significant notion whichput between the notion of fixed points for single-valued mappings and the notionof fixed points for multi-valued mappings.

Aubin and Siegel [3] were first studied the existence of endpoints for specialkind of contractive mappings on complete metric spaces. The endpoint resultsfor several types of contractive mappings have been quickly developed and manyof papers have showed (see, e.g.,[9],[18],[20],[21]).

On the other hand, Panyanak [15] presented the existence of endpoints formulti-valued nonexpansive mappings in uniformly convex Banach spaces. Next,Kudtha and Panyanak [13] proved the existence of endpoints for Suzuki map-pings in uniformly convex hyperbolic spaces.

Recently, Panyanak [16] established the convergence theorems to an end-point for modified Ishikawa iteration of multi-vaued nonexpansive mappings inuniformly convex Banach spaces.

Motivated and inspired by above mention, we prove the convergence resultsto an endpoint for modified SP-iteration of multi-valued Suzuki mappings inuniformly convex hyperbolic spaces. The numerical example for supporting ourmain result is also presented.

2 PreliminariesFor this paper, we work in the setting of a hyperbolic space which is defined byKohlenbach [12].

Definition 2.1 A hyperbolic space [12] is a metric space (X, d) togetherwith a mapping W : X2 × [0, 1]→ X satisfying the following statements:

(W1) d(u,W (x, y, α)) ≤ (1− α)d(u, x) + αd(u, y);(W2) d(W (x, y, α),W (x, y, β)) = |α− β|d(x, y);(W3) W (x, y, α) = W (y, x, (1− α));(W4) d(W (x, z, α),W (y, w, α)) ≤ (1− α)d(x, y) + αd(z, w),

for all x, y, u, z, w ∈ X and α, β ∈ [0, 1].If x, y ∈ X and α ∈ [0, 1], then we use the notion (1−α)x⊕αy for W (x, y, α).

A hyperbolic space (X, d,W ) is said to be uniformly convex [14] if for any r > 0and ε ∈ (0, 2] there exists a δ ∈ (0, 1] such that for all u, x, y ∈ X, we have

d(W (x, y,1

2), u) ≤ (1− δ)r,

provided d(x, u) ≤ r, d(y, u) ≤ r and d(x, y) ≥ εr.A mapping η : (0,∞) × (0, 2] → (0, 1] which provides such δ = η(r, ε) for

given r > 0 and ε ∈ (0, 2] is well known as a modulus of uniformly convexity of

2

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 28, NO.5, 2020, COPYRIGHT 2020 EUDOXUS PRESS, LLC

904 Chuadchawna et al 903-916

Page 141: Journal of Computational Analysis and Applicationseudoxuspress.com/images/JOCAAA-VOL-28-2020-ISSUE-5.pdfBaltimore, MD 21251, USA tel: 1-443-885-4373 Fax 1-443-885-8216 Gaston.N'Guerekata@morgan.edu

X. We call η monotone if it decreases with r (for a fixed ε), i.e., for any givenε > 0 and for any r2 ≥ r1 > 0, we have η(r2, ε) ≤ η(r1, ε).

A nonempty subset E of a hyperbolic space X is convex if W (x, y, α) ∈ Efor any x, y ∈ E and α ∈ [0, 1].

Obviously, uniformly convex Banach spaces are uniformly convex hyperbolicspaces, CAT(0) spaces are also uniformly convex hyperbolic spaces, [14].

Definition 2.2 [7] A multi-valued mapping T : E → CB(E) is called to be aSuzuki mapping if

1

2dist(x, T (x)) ≤ d(x, y) implies H(T (x), T (y)) ≤ d(x, y) (1)

for all x, y ∈ X.

Definition 2.3 [1] A multi-valued mapping T : E → CB(E) is said to satisfycondition (Eµ) provided that

dist(x, T (y)) ≤ µdist(x, T (x)) + d(x, y), for all x, y ∈ E.

We say that T satisfies condition (E) whenever T satisfies condition (Eµ) forsome µ ≥ 1.

Lemma 2.4 [6] If E is a nonempty closed convex subset of X and T : E →CB(E) is a multi-valued Suzuki mapping, then T satisfies the condition (E3).

We need the following definition of convergence in hyperbolic spaces [5] whichis called ∆-convergence.

Let xn be a bounded sequence in a hyperbolic space X. Define a functionr(·, xn) : X → [0,∞) by

r(x, xn) = lim supn→∞

d(x, xn), for all x ∈ X.

The asymptotic radius of a bounded sequence xn with respect to a nonemptysubset K of X is defined and denoted by

rK(xn) = infr(x, xn) : x ∈ K.

The asymptotic center of a bounded sequence xn with respect to a nonemptysubset K of X is defined and denoted by

ACK(xn) = x ∈ X : r(x, xn) ≤ r(y, xn), for all y ∈ K.

Recall that a sequence xn in X is said to ∆-converge to x ∈ X if x is theunique asymptotic center of un for every subsequence un of xn. In thiscase, we write ∆-limn→∞ xn = x and call x the ∆-lim of xn.

The sequence xn is called to be regular relative to E if r(E, xn) =r(E, xnj) for every subsequence xnj of xn. It is known that every boundedsequence in a Banach space has a regular subsequence (see [8]). The proof ismetric in nature and carries over to the present setting without change.

3

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 28, NO.5, 2020, COPYRIGHT 2020 EUDOXUS PRESS, LLC

905 Chuadchawna et al 903-916

Page 142: Journal of Computational Analysis and Applicationseudoxuspress.com/images/JOCAAA-VOL-28-2020-ISSUE-5.pdfBaltimore, MD 21251, USA tel: 1-443-885-4373 Fax 1-443-885-8216 Gaston.N'Guerekata@morgan.edu

Lemma 2.5 [4] Let (X, d,W ) be a complete uniformly convex hyperbolic spacewith a monotone modulus of uniform convexity η and E is a closed convex subsetof X if xn is a bounded sequence in E, then the asymptotic center of xn isin E.

Lemma 2.6 [10] Let (X, d,W ) be a complete uniformly convex hyperbolic spacewith a monotone modulus of uniform convexity η. Let x ∈ X and αn be asequence in [a, b] for some a, b ∈ (0, 1). If xn and yn are sequences in X suchthat lim supn→∞ d(xn, x) ≤ c, lim supn→∞ d(yn, x) ≤ c, limn→∞ d(W (xn, yn, αn), x) =c for some c ≥ 0, then

limn→∞

d(xn, yn) = 0.

Lemma 2.7 [11] Every bounded sequence in a complete CAT(0)(and hencehyperbolic) space has a ∆-convergent subsequence.

Lemma 2.8 [7] If xn is a bounded sequence in complete uniformly convexhyperbolic space (X, d,W ) with A(xn) = p, un is a subsequence of xnwith A(un) = u and the sequence d(xn, u) converges, then p = u.

Definition 2.9 [8] Let E be a nonempty subset of a metric space (X, d) andx ∈ X. The radius of E relative to x is defined by

rx(E) := supd(x, y) : y ∈ E.

The diameter of E is defined by

diam(E) := supd(x, y) : x, y ∈ E.

Definition 2.10 [2] Let T : E → CB(E) be a multi-valued mapping. Asequence xn in E is called an approximate fixed point sequence (resp. anapproximate endpoint sequence) for T if limn→∞ dist(xn, T (xn)) = 0 (resp.limn→∞ rxn

(T (xn)) = 0). A mapping T is said to have the approximate fixedpoint property (resp. the approximate endpoint property) if it has an approxi-mate fixed point sequence (resp. an approximate endpoint sequence) in E.

Lemma 2.11 [15] Let E be a nonempty subset of X, xn be a sequence in Eand T : E → K(E) be a multi-valued mapping. Then rxn

(T (xn)) → 0 if andonly if dist(xn, T (xn))→ 0 and diam(T (xn))→ 0.

Lemma 2.12 [13] Let E be a nonempty bounded closed convex subset of a com-plete uniformly convex hyperbolic space X with monotone modulus of uniformconvexity and T : E → K(E) be a multi-valued Suzuki mapping. Then T hasan endpoint if and only if T has the approximate endpoint property.

Next, we also need the following definitions that will be used in the nextsection.

A sequence xn in E is said to be Fejér monotone with respect to E if

d(xn+1, q) ≤ d(xn, q) for all q ∈ E and n ∈ N.

4

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 28, NO.5, 2020, COPYRIGHT 2020 EUDOXUS PRESS, LLC

906 Chuadchawna et al 903-916

Page 143: Journal of Computational Analysis and Applicationseudoxuspress.com/images/JOCAAA-VOL-28-2020-ISSUE-5.pdfBaltimore, MD 21251, USA tel: 1-443-885-4373 Fax 1-443-885-8216 Gaston.N'Guerekata@morgan.edu

Definition 2.13 [13] Let E be a nonempty subset of a hyperbolic space X.A mapping T : E → K(E) is said to satisfy condition (J) if there exists anondecreasing function h : [0,∞) → [0,∞) with h(0) = 0, h(r) > 0 for r ∈(0,∞) such that

rx(T (x)) ≥ h(dist(x,End(T ))) for all x ∈ E.

The mapping T is called semicompact if for any sequence xn in E such that

limn→∞

rxn(T (xn)) = 0,

there exists a subsequence xnj of xn and q ∈ E such that limn→∞ xnj

= q.

3 Main resultsFor this part, we start by introducing the notion of the modified SP-iterationprocess for multi-valued mappings. Notice that it is an improvement of theone so called the SP-iteration process given in Phuengrattana and Suantai [17].They [17] also showed that SP-iteration process is a generalized version and thesequence generated by the SP-iteration process converges faster than Ishikawafor the class of nondecreasing and continuous functions.

Let X be a hyperbolic space and E be a nonempty convex subset of X,αn, βn, γn be sequences in [0, 1] and T : E → K(E) be a multi-valuedmapping. The sequence generated by the modified SP-iteration is defined byz1 ∈ E,

yn = W (un, zn, γn)

wn = W (vn, yn, βn)

zn+1 = W (xn, wn, αn),

(2)

where un ∈ T (zn) such that d(zn, un) = rzn(T (zn)), vn ∈ T (yn) such thatd(vn, yn) = ryn(T (yn)) and xn ∈ T (wn) such that d(xn, wn) = rwn

(T (wn)).We need the following important Lemmas that will be used in the sequel.

Lemma 3.1 Let E be a nonempty bounded closed convex subset of a completeuniformly convex hyperbolic space X with monotone modulus of uniform convex-ity and T : E → K(E) be a multi-valued Suzuki mapping. If zn is a sequencein E, then the following holds:

zn∆−→ z, dist(zn, T (zn))→ 0 and diam(T (zn))→ 0 imply z ∈ End(T ).

Proof. From Lemma 2.5, we obtain that z ∈ E. For each n ∈ N, we can choosewn ∈ T (zn) such that d(zn, wn) = dist(zn, T (zn)). By passing throught a subse-quence, we may assume that zn is regular relative to E. Let A(E, zn) = zand r = r(E, zn). By similar way in the proof of Lemma 2.12, we obtain thatz ∈ End(T ).

5

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 28, NO.5, 2020, COPYRIGHT 2020 EUDOXUS PRESS, LLC

907 Chuadchawna et al 903-916

Page 144: Journal of Computational Analysis and Applicationseudoxuspress.com/images/JOCAAA-VOL-28-2020-ISSUE-5.pdfBaltimore, MD 21251, USA tel: 1-443-885-4373 Fax 1-443-885-8216 Gaston.N'Guerekata@morgan.edu

Lemma 3.2 Let E be a nonempty closed convex subset of a complete uniformlyconvex hyperbolic space X with monotone modulus of uniform convexity andT : E → K(E) be a multi-valued Suzuki mapping with End(T ) = ∅. Letzn be a sequence generated by the modified SP-iteration process (2). Thenlimn→∞ d(zn, q) exists for each q ∈ End(T ).

Proof. Let T be a multi-valued Suzuki mapping and q ∈ End(T ). Therefore,

1

2dist(q, T (q)) = 0 ≤ d(q, yn), (3)

1

2dist(q, T (q)) = 0 ≤ d(q, wn), (4)

and1

2dist(q, T (q)) = 0 ≤ d(q, zn), (5)

for all n ∈ N. This implies that

H(T (q), T (yn)) ≤ d(q, yn), (6)

H(T (q), T (wn)) ≤ d(q, wn), (7)

andH(T (q), T (zn)) ≤ d(q, zn). (8)

Using (2) and (8), we obtain that

d(yn, q) = d(W (un, zn, γn), q)

≤ (1− γn)d(un, q) + γnd(zn, q)

= (1− γn)dist(un, T (q)) + γnd(zn, q)

≤ (1− γn)H(T (zn), T (q)) + γnd(zn, q)

≤ (1− γn)d(zn, q) + γnd(zn, q)

≤ d(zn, q). (9)

Next, using (2), (6) and (9)

d(wn, q) = d(W (vn, yn, βn), q)

≤ (1− βn)d(vn, q) + βnd(yn, q)

= (1− βn)dist(vn, T (q)) + βnd(yn, q)

≤ (1− βn)H(T (yn), T (q)) + βnd(yn, q)

≤ (1− βn)d(yn, q) + βnd(yn, q)

≤ d(yn, q) ≤ d(zn, q). (10)

6

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 28, NO.5, 2020, COPYRIGHT 2020 EUDOXUS PRESS, LLC

908 Chuadchawna et al 903-916

Page 145: Journal of Computational Analysis and Applicationseudoxuspress.com/images/JOCAAA-VOL-28-2020-ISSUE-5.pdfBaltimore, MD 21251, USA tel: 1-443-885-4373 Fax 1-443-885-8216 Gaston.N'Guerekata@morgan.edu

Again, using (2), (7) and (10)

d(zn+1, q) = d(W (xn, wn, αn), q)

≤ (1− αn)d(xn, q) + αnd(wn, q)

= (1− αn)dist(xn, T (q)) + αnd(wn, q)

≤ (1− αn)H(T (wn), T (q)) + αnd(wn, q)

≤ (1− αn)d(wn, q) + αnd(wn, q)

≤ d(wn, q)

≤ d(zn, q). (11)

This shows that sequence d(zn, q) is decreasing and bounded below. Thuslimn→∞ d(zn, q) exists for each q ∈ End(T ).

Next, we prove ∆-convergence theorem for a multi-valued mapping in hy-perbolic spaces.

Theorem 3.3 Let E be a nonempty closed convex subset of a complete uni-formly convex hyperbolic space X with monotone modulus of uniform convexityand T : E → K(E) be a multi-valued Suzuki mapping with End(T ) = ∅. Letzn be a sequence generated by the modified SP-iteration process (2). Thenzn ∆-converges to an endpoint of T .

Proof. First we will prove that rzn(T (zn))→ 0. Let q ∈ End(T ). Since T is amulti-valued Suzuki mapping and

1

2dist(q, T (q)) = 0 ≤ d(q, zn)

for all n ∈ N, thenH(T (q), T (zn)) ≤ d(q, zn).

From Lemma 3.2, we know that for each q ∈ End(T ), limn→∞ d(zn, q) exists.Let limn→∞ d(zn, q) = t ≥ 0. If t = 0, then

d(zn, un) ≤ d(zn, q) + d(q, un)

= d(zn, q) + dist(T (q), un)

≤ d(zn, q) +H(T (q), T (zn))

≤ d(zn, q) + d(zn, q).

Taking n→∞ on above inequality, we have

limn→∞

rzn(T (zn)) = limn→∞

d(zn, un) = 0.

7

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 28, NO.5, 2020, COPYRIGHT 2020 EUDOXUS PRESS, LLC

909 Chuadchawna et al 903-916

Page 146: Journal of Computational Analysis and Applicationseudoxuspress.com/images/JOCAAA-VOL-28-2020-ISSUE-5.pdfBaltimore, MD 21251, USA tel: 1-443-885-4373 Fax 1-443-885-8216 Gaston.N'Guerekata@morgan.edu

If t > 0, then

d(yn, q) = d(W (un, zn, γn), q)

≤ (1− γn)d(un, q) + γnd(zn, q)

= (1− γn)dist(un, T (q)) + γnd(zn, q)

≤ (1− γn)H(T (zn), T (q)) + γnd(zn, q)

≤ (1− γn)d(zn, q) + γnd(zn, q)

≤ d(zn, q).

Letting limsup as n→∞ on the both sides of above inequality, we have

lim supn→∞

d(yn, q) ≤ lim supn→∞

d(zn, q) ≤ t. (12)

From (11), we have d(zn+1, q) ≤ d(wn, q).Then we obtain that

t ≤ lim infn→∞

d(zn+1, q) ≤ lim infn→∞

d(wn, q). (13)

From the proof in (10), we have d(wn, q) ≤ d(yn, q).Taking liminf as n→∞ on above inequality and using (13),

t ≤ lim infn→∞

d(yn, q). (14)

Combine (12) and (14), we obtain that

limn→∞

d(W (un, zn, γn), q) = limn→∞

d(yn, q) = t. (15)

Since

d(un, q) = dist(un, T (q))

≤ H(T (zn), T (q)) ≤ d(zn, q),

this implies thatlim supn→∞

d(un, q) ≤ t. (16)

By (15), (16), limn→∞ d(zn, q) = t together with Lemma 2.6, we have

limn→∞

d(un, zn) = 0. (17)

From the condition of the modified SP-iteration, so

limn→∞

rzn(T (zn)) = limn→∞

d(un, zn) = 0. (18)

Hence by the both cases we can conclude that rzn(T (zn))→ 0. It follows fromLemma 2.11, we have dist(zn, T (zn))→ 0 and diam(T (zn))→ 0.

8

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 28, NO.5, 2020, COPYRIGHT 2020 EUDOXUS PRESS, LLC

910 Chuadchawna et al 903-916

Page 147: Journal of Computational Analysis and Applicationseudoxuspress.com/images/JOCAAA-VOL-28-2020-ISSUE-5.pdfBaltimore, MD 21251, USA tel: 1-443-885-4373 Fax 1-443-885-8216 Gaston.N'Guerekata@morgan.edu

To show that zn ∆-converges to an endpoint of T . Now we prove thatWω(zn) := ∪sn⊂znAC(E, sn) ⊂ End(T ) and Wω(zn) consists of exactlyone point. Let s ∈ Wω(zn). Therefore there exists a subsequence sn ofzn such that AC(E, sn) = s. From Lemma 2.5 and Lemma 2.7, thereexists a subsequence tn of sn such that ∆-limn→∞ tn = t ∈ E. Sincedist(tn, T (tn)) → 0 and diam(T (tn)) → 0 and it follows from Lemma 3.1, wehave t ∈ End(T ) and limn→∞ d(zn, t) exists by Lemma 3.2. Thus by Lemma 2.8we have s = t ∈ End(T ). This shows that Wω(zn) ⊂ End(T ). Next, we provethat Wω(zn) consists of exactly one point. Let sn be a subsequence of znsuch that AC(E, sn) = s and AC(E, zn) = z. Since s ∈ Wω(zn) ⊂End(T ) and from Lemma 3.2, we know that d(zn, s) exists. By Lemma 2.8,z = s. Therefore the proof is completed.

Next, we present the following key lemma for proving the strong convergencetheorem.

Lemma 3.4 Let E be a nonempty closed subset of a complete hyperbolic spaceX and wn be a Fejér monotone sequence with respect to E. Then wnconverges strongly to an element of E if and only if limn→∞ dist(wn, E) = 0.

Proof. Assume that wn converges strongly to q ∈ E. Thus limn→∞ d(wn, q) =0. Because 0 ≤ dist(wn, E) ≤ d(wn, q), therefore limn→∞ dist(wn, E) = 0.Conversely, suppose that limn→∞ dist(wn, E) = 0. Since wn is a Fejér mono-tone sequence with respect to E, we have

d(wn+1, q) ≤ d(wn, q) for all q ∈ E.

Thus infq∈Ed(wn+1, q) ≤ infq∈Ed(wn, q), which means thatdist(wn+1, E) ≤ dist(wn, E). Therefore limn→∞ dist(wn, E) exists. By hypoth-esis, we obtain that limn→∞ dist(wn, E) = 0. Next, we show that wn is aCauchy sequence in E. Let r > 0. Since limn→∞ dist(wn, E) = 0, there existsn0 ∈ N such that

dist(wn, E) <r

2for all n ≥ n0.

Inparticular, infd(wn0, q) : q ∈ E < r

2 .Therefore there exists q0 ∈ E such that d(wn0 , q0) < r

2 . For any n,m ≥ n0, wehave

d(wn+m, wn) ≤ d(wn+m, q0) + d(q0, wn)

≤ d(wn0, q0) + d(q0, wn0

)

≤ r

2+r

2= r.

This means that a sequence wn is a Cauchy sequence in E. Since E is aclosed subset of a complete hyperbolic space X, we have E is also complete.Then wn must be convergent to a point in E.

9

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 28, NO.5, 2020, COPYRIGHT 2020 EUDOXUS PRESS, LLC

911 Chuadchawna et al 903-916

Page 148: Journal of Computational Analysis and Applicationseudoxuspress.com/images/JOCAAA-VOL-28-2020-ISSUE-5.pdfBaltimore, MD 21251, USA tel: 1-443-885-4373 Fax 1-443-885-8216 Gaston.N'Guerekata@morgan.edu

Theorem 3.5 Let E be a nonempty closed convex subset of a complete uni-formly convex hyperbolic space X with monotone modulus of uniform convexityand T : E → K(E) be a multi-valued Suzuki mapping with End(T ) = ∅. Letzn be a sequence generated by the modified SP-iteration process (2). If Tsatisfies condition (J), then zn converges strongly to an endpoint of T .

Proof. First, we will show that End(T ) is closed. Let zn ⊆ End(T ) suchthat zn → z ∈ E. We will prove that z ∈ End(T ). Since T is a multi-valuedSuzuki mapping, therefore T satisfies condition (E3). Then

dist(zn, T z) ≤ 3dist(zn, T (zn)) + d(zn, z)→ 0 as n→∞.

This implies that z ∈ T (z). Next, we show that z = T (z). Take any pointw ∈ T (z). Since T is a multi-valued Suzuki mapping,

1

2dist(zn, T (zn)) = 0 ≤ d(zn, z) implies that H(T (zn), T (z)) ≤ d(zn, z).

Since zn ∈ End(T ), we have

d(w, z) ≤ d(w, zn) + d(zn, z)

= dist(w, T (zn)) + d(zn, z)

≤ H(T (z), T (zn)) + d(zn, z)

≤ d(zn, z) + d(zn, z)→ 0 as n→∞.

Hence w = z. Because w ∈ T (z) is arbitrary, then T (z) = z, so z ∈End(T ). Thus End(T ) is closed. Next, as in the proof of Theorem 3.3, wehave rzn(T (zn))→ 0 and it follows from T satisfies condition (J),

h(dist(zn, End(T ))) ≤ rzn(T (zn))→ 0.

This implies that limn→∞ h(dist(zn, End(T ))) = 0. Since h : [0,∞)→ [0,∞) isnondecreasing with h(0) = 0, h(r) > 0 for r ∈ (0,∞), we obtain thatlimn→∞ dist(zn, End(T )) = 0. As in the proof of Lemma 3.2 implies that znis Fejér monotone with respect to End(T ). By applying Lemma 3.4, we obtainthe desired result.

Theorem 3.6 Let E be a nonempty closed convex subset of a complete uni-formly convex hyperbolic space X with monotone modulus of uniform convexityand T : E → K(E) be a multi-valued Suzuki mapping with End(T ) = ∅. Letzn be a sequence generated by the modified SP-iteration process (2). If T issemicompact, then zn converges strongly to an endpoint of T .

Proof. As in the proof of Theorem 3.3, rzn(T (zn))→ 0 and T is semicompact,we may assume a subsequence znk

→ z for some z ∈ E. Again, as in the proofof Theorem 3.3, we obtain that rznk

(T (znk))→ 0. By Lemma 2.11, we also get

10

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 28, NO.5, 2020, COPYRIGHT 2020 EUDOXUS PRESS, LLC

912 Chuadchawna et al 903-916

Page 149: Journal of Computational Analysis and Applicationseudoxuspress.com/images/JOCAAA-VOL-28-2020-ISSUE-5.pdfBaltimore, MD 21251, USA tel: 1-443-885-4373 Fax 1-443-885-8216 Gaston.N'Guerekata@morgan.edu

dist(znk, T (znk

)) → 0 as k → ∞. Since T is a multi-valued Suzuki mapping,therefore T satisfies condition(E3). Because of

dist(z, T (z)) ≤ d(z, znk) + dist(znk

, T (z))

≤ d(z, znk) + 3dist(znk

, T (znk)) + d(znk

, z)→ 0 as k →∞,

we obtain that z ∈ T (z). Next, we show that z = T (z).Notice that 1

2dist(z, T (z)) = 0 ≤ d(znk, z) for all k ∈ N. Since T is a multi-

valued Suzuki mapping, we have

H(T (znk, T (z))) ≤ d(znk

, z).

We now let u ∈ T (z) and choose wnk∈ T (znk

) so that d(u,wnk) = dist(u, T (znk

)).For all k ∈ N, we obtain that

d(z, u) ≤ d(z, znk) + d(znk

, wnk) + d(wnk

, u)

≤ d(z, znk) + rznk

(T (znk)) + dist(u, T (znk

))

≤ d(z, znk) + rznk

(T (znk)) +H(T (z), T (znk

))

≤ d(z, znk) + rznk

(T (znk)) + d(z, znk

).

Taking limit as k → ∞, we get that z = u for all u ∈ T (z) and so z = T (z).Hence z ∈ End(T ). By Lemma 3.2, limn→∞ d(zn, q) exists for each q ∈ End(T ),it follows that zn → z as n→∞. This completes the proof.

4 Numerical exampleIn this section, we give an example shows that there exists a mapping which is amulti-valued Suzuki mapping but is not a nonexpansive mapping. Furthermore,we illustrate that a sequence generated by the modified SP-iteration process (2)converges to an endpoint of the multi-valued Suzuki mapping.

Example 4.1 LetX = R with metric defined by d(x, y) = |x−y| and E = [0, 3].Define W : X2 × [0, 1] → X by W (x, y, α) := αx + (1 − α)y for all x, y ∈ Xand α ∈ [0, 1]. Then (X, d,W ) is a complete uniformly hyperbolic space with amonotone modulus of uniform convexity and E is a nonempty compact convexsubset of X. Let T : E → K(E) defined by

Tz =

0, z = 3;1, z = 3.

By [19] showed that the mapping T is a Suzuki mapping. But T is not anonexpansive mapping if we take x = 2.9 and y = 3. Moreover, End(T ) =

0. For initial point z0 = 0.1 and αn = βn = γn =1√

3n+ 7. Therefore

αn, βn, γn ⊆ [0, 1]. Set stop parameter to |zn − 0| ≤ 10−12, where 0 isan endpoint of T . By using MATLAB, we compute the sequence generated bythe modified SP-iteration process (2) converging to 0 as in Table 1 and Figure 1.

11

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 28, NO.5, 2020, COPYRIGHT 2020 EUDOXUS PRESS, LLC

913 Chuadchawna et al 903-916

Page 150: Journal of Computational Analysis and Applicationseudoxuspress.com/images/JOCAAA-VOL-28-2020-ISSUE-5.pdfBaltimore, MD 21251, USA tel: 1-443-885-4373 Fax 1-443-885-8216 Gaston.N'Guerekata@morgan.edu

iterate the modified SP-iteration processz0 0.1z1 0.024068308483z2 0.006367770608z3 0.001780515413z4 0.000516698713: :

z20 0.000000000008z21 0.000000000003z22 0.000000000000

Table 1: Sequences generated by SP-iteration process

Figure 1 Convergence of iterative sequences generated by SP-iterationprocess

AcknowledgementThe first and the third authors would like to express their deep thanks to Nare-suan University for supporting this research.

12

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 28, NO.5, 2020, COPYRIGHT 2020 EUDOXUS PRESS, LLC

914 Chuadchawna et al 903-916

Page 151: Journal of Computational Analysis and Applicationseudoxuspress.com/images/JOCAAA-VOL-28-2020-ISSUE-5.pdfBaltimore, MD 21251, USA tel: 1-443-885-4373 Fax 1-443-885-8216 Gaston.N'Guerekata@morgan.edu

References[1] A. Abkar, M.Eslamian, Common fixed point results in CAT(0) spaces,

Nonlinear Anal., 74, 1835-1840(2011).[2] A. Amini-Harandi, Endpoints of set-valued contractions in metric spaces,

Nonlinear Anal., 72, 132-134(2010).[3] J.P. Aubin, J. Siegel, Fixed points and stationary points of dissipative

multi-valued maps, Proc. Amer. Math. Soc., 78, 391-398(1980).[4] S. Dhompongsa, W. Kirk, B. Panyanak, Nonexpansive set-valued map-

pings in metric and Banach spaces, Nonlinear Convex Anal., 8,35-45(2007).

[5] S. Dhompongsa, B. Panyanak, On ∆-convergence theorem in CAT(0)spaces, Comput. Math. Appl., 56(10), 2572-2579(2008).

[6] R. Espinola, P. Lorenzo, A. Nicolae, Fixed points selections and com-mon fixed points for nonexpansive-type mappings, Math. Anal. Appl.,382,503-515(2011).

[7] J. García-Falset, E. Llorens-Fuster, T. Suzuki, Fixed point theory fora class of generalized nonexpansive mappings, Math. Anal. Appl., 375,185-195(2011).

[8] K. Goebel, W.A. Kirk, Topics in metric fixed point theory, CambridgeUniv.Press, Cambridge (1990).

[9] M.S. Kahn, K.R. Rao, Y.J. Cho, Common stationary points for set-valued mappings, Internat. Math. Math. Sci., 16, 733-736(1993).

[10] A.R. Khan, H. Fukhar-ud-din, M.A.A. Kuan, An implicit algorithm fortwo finite families of nonexpansive maps in hyperbolic spaces, FixedPoint Theory Appl., 2012, 54(2012).

[11] W.A. Kirk, B. Panyanak, A concept of convergence in geodesic spaces,Nonlinear anal., 68, 3689-3696(2008).

[12] U. Kohlenbach, Some logical metatheorems with applications in func-tional analysis, Trans. Am. Math. Soc., 357, 89-128(2005).

[13] A. Kudtha, B. Panyanak, Common endpoints for Suzuki map-pings in uniformly convex hyperbolic spaces, Thai.J. Math, 159-168,A.M.M.(2017).

[14] L. Leustean, A quadratic rate of asymptotic regularity for CAT(0)spaces, Math. Anal. Appl., 235, 386-399(2007).

[15] B. Panyanak, Endpoints of multivalued nonexpansive mappings ingeodesic spaces, Fixed Point Theory Appl., 2015, 147(2015).

[16] B. Panyanak, Approximating endpoints of multi-valued nonexpansivemappings in Banach spaces, Fixed Point Theory Appl.(2018).

[17] W. Phuengrattana, S. Suantai, On the rate of convergence of Mann,Ishikawa, Noor and SP-iterations for continuous functions on an arbi-trary interval, Comput. Appl. Math., 235,3006-3014(2011).

13

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 28, NO.5, 2020, COPYRIGHT 2020 EUDOXUS PRESS, LLC

915 Chuadchawna et al 903-916

Page 152: Journal of Computational Analysis and Applicationseudoxuspress.com/images/JOCAAA-VOL-28-2020-ISSUE-5.pdfBaltimore, MD 21251, USA tel: 1-443-885-4373 Fax 1-443-885-8216 Gaston.N'Guerekata@morgan.edu

[18] S.L. Singh, S.N. Mishra, Coincidence points, hybrid fixed and station-ary points of orbitally weakly dissipative maps, Math. Japan., 39,451-459(1994).

[19] T. Suzuki, Fixed point theorems and convergence theorems for somegeneralized nonexpansive mappings, Math. Anal. Appl., 340, 1088-1095(2008).

[20] Y. Yamamoto, A path following algorithm for stationary point problems,Oper. Res. Soc. Japan, 30,181-199(1987).

[21] Y. Yamamoto, Fixed point algorithms for stationary point problems,Mathematical Programming(Tokyo, 1988), Math. Appl. (Japanese Ser.),SCIPRESS, Tokyo 6, 283-307(1989).

14

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 28, NO.5, 2020, COPYRIGHT 2020 EUDOXUS PRESS, LLC

916 Chuadchawna et al 903-916

Page 153: Journal of Computational Analysis and Applicationseudoxuspress.com/images/JOCAAA-VOL-28-2020-ISSUE-5.pdfBaltimore, MD 21251, USA tel: 1-443-885-4373 Fax 1-443-885-8216 Gaston.N'Guerekata@morgan.edu

TABLE OF CONTENTS, JOURNAL OF COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 28, NO. 5, 2020

On Harmonic Multivalent Functions Defined by a New Derivative Operator, Adriana Cătaș and Roxana Șendruțiu,……………………………………………………………………………775

Good and Special Weakly Picard Operators Properties for a Class of Discrete Linear Operators, Loredana-Florentina Iambor and Adriana Cătaș,…………………………………………….781

General Iyengar type Inequalities, George A. Anastassiou,………………………………….786

A Note on the Approximate Solutions for Stochastic Differential Equations Driven by G-Brownian Motion, F. Faizullah, R. Ullah, Jihen Majdoubi, I. Tlili, I. Khan, and Ghaus Ur Rahman,……………………………………………………………………………………….798

Behavior of a System of Higher-Order Difference Equations, M. A. El-Moneam, A. Q. Khan, E. S. Aly, and M. A. Aiyashi,…………………………………………………………………….808

On Approximating the Generalized Euler-Mascheroni Constant, Ti-Ren Huang, Bo-Wen Han, Xiao-Yan Ma, and Yu-Ming Chu,…………………………………………………………….814

General Study on Volterra Integral Equations of the Second Kind in Space with Weight Function, M. E. Nasr and M. F. Jabbar,………………………………………………………824

A Modified SSDP Method for Nonlinear Semidefinite Programming, Jianling Li, Chunting Lu, and Hui Zhang,………………………………………………………………………………..836

Approximation by Sublinear and Max-product Operators using Convexity, George A. Anastassiou,……………………………………………………………………………………848

Symmetric Identities for Carlitz's Generalized Twisted q-Bernoulli Numbers and Polynomials Associated with p-Adic Invariant Integral on ℤ𝑝𝑝, Cheon Seoung Ryoo,……………………..861

An Efficient Optimal Algorithm for High Frequency in Wavelet Based Image Reconstruction, Jingjing Liu and Guoxi Ni,……………………………………………………………….…..865

Negative Domain Local fractional Inequalities, George A. Anastassiou,……………………879

Approximate Controllability for Semilinear Integro-Differential Control Equations in Hilbert Spaces, Yong Han Kang, Jin-Mun Jeong, and Ah-ran Park,…………………………………892

Page 154: Journal of Computational Analysis and Applicationseudoxuspress.com/images/JOCAAA-VOL-28-2020-ISSUE-5.pdfBaltimore, MD 21251, USA tel: 1-443-885-4373 Fax 1-443-885-8216 Gaston.N'Guerekata@morgan.edu

TABLE OF CONTENTS, JOURNAL OF COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 28, NO. 5, 2020

(continued)

Convergence Theorems and Approximating Endpoints for Multivalued Suzuki Mappings in Hyperbolic Spaces, Preeyalak Chuadchawna, Ali Farajzadeh, and Anchalee Kaewcharoen,903