journal of computational analysis and...

118
Volume 27, Number 7 December 2019 ISSN:1521-1398 PRINT,1572-9206 ONLINE Journal of Computational Analysis and Applications EUDOXUS PRESS,LLC

Upload: others

Post on 13-Mar-2020

2 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Journal of Computational Analysis and Applicationseudoxuspress.com/images/JOCAAA-VOL-27-2019-ISSUE-7.pdfJournal of Computational Analysis and Applications . ISSNno.’s:1521-1398 PRINT,1572-9206

Volume 27, Number 7 December 2019 ISSN:1521-1398 PRINT,1572-9206 ONLINE

Journal of Computational Analysis and Applications EUDOXUS PRESS,LLC

Page 2: Journal of Computational Analysis and Applicationseudoxuspress.com/images/JOCAAA-VOL-27-2019-ISSUE-7.pdfJournal of Computational Analysis and Applications . ISSNno.’s:1521-1398 PRINT,1572-9206

Journal of Computational Analysis and Applications ISSNno.’s:1521-1398 PRINT,1572-9206 ONLINE SCOPE OF THE JOURNAL An international publication of Eudoxus Press, LLC (fifteen times annually) Editor in Chief: George Anastassiou Department of Mathematical Sciences, University of Memphis, Memphis, TN 38152-3240, U.S.A [email protected] http://www.msci.memphis.edu/~ganastss/jocaaa The main purpose of "J.Computational Analysis and Applications" is to publish high quality research articles from all subareas of Computational Mathematical Analysis and its many potential applications and connections to other areas of Mathematical Sciences. Any paper whose approach and proofs are computational,using methods from Mathematical Analysis in the broadest sense is suitable and welcome for consideration in our journal, except from Applied Numerical Analysis articles. Also plain word articles without formulas and proofs are excluded. The list of possibly connected mathematical areas with this publication includes, but is not restricted to: Applied Analysis, Applied Functional Analysis, Approximation Theory, Asymptotic Analysis, Difference Equations, Differential Equations, Partial Differential Equations, Fourier Analysis, Fractals, Fuzzy Sets, Harmonic Analysis, Inequalities, Integral Equations, Measure Theory, Moment Theory, Neural Networks, Numerical Functional Analysis, Potential Theory, Probability Theory, Real and Complex Analysis, Signal Analysis, Special Functions, Splines, Stochastic Analysis, Stochastic Processes, Summability, Tomography, Wavelets, any combination of the above, e.t.c. "J.Computational Analysis and Applications" is a peer-reviewed Journal. See the instructions for preparation and submission of articles to JoCAAA. Assistant to the Editor: Dr.Razvan Mezei,[email protected], Madison,WI,USA. Journal of Computational Analysis and Applications(JoCAAA) is published by EUDOXUS PRESS,LLC,1424 Beaver Trail Drive,Cordova,TN38016,USA,[email protected] http://www.eudoxuspress.com. Annual Subscription Prices:For USA and Canada,Institutional:Print $800, Electronic OPEN ACCESS. Individual:Print $400. For any other part of the world add $160 more(handling and postages) to the above prices for Print. No credit card payments. Copyright©2019 by Eudoxus Press,LLC,all rights reserved.JoCAAA is printed in USA. JoCAAA is reviewed and abstracted by AMS Mathematical Reviews,MATHSCI,and Zentralblaat MATH. It is strictly prohibited the reproduction and transmission of any part of JoCAAA and in any form and by any means without the written permission of the publisher.It is only allowed to educators to Xerox articles for educational purposes.The publisher assumes no responsibility for the content of published papers.

1074

Page 3: Journal of Computational Analysis and Applicationseudoxuspress.com/images/JOCAAA-VOL-27-2019-ISSUE-7.pdfJournal of Computational Analysis and Applications . ISSNno.’s:1521-1398 PRINT,1572-9206

Editorial Board

Associate Editors of Journal of Computational Analysis and Applications

Francesco Altomare Dipartimento di Matematica Universita' di Bari Via E.Orabona, 4 70125 Bari, ITALY Tel+39-080-5442690 office +39-080-3944046 home +39-080-5963612 Fax [email protected] Approximation Theory, Functional Analysis, Semigroups and Partial Differential Equations, Positive Operators. Ravi P. Agarwal Department of Mathematics Texas A&M University - Kingsville 700 University Blvd. Kingsville, TX 78363-8202 tel: 361-593-2600 [email protected] Differential Equations, Difference Equations, Inequalities George A. Anastassiou Department of Mathematical Sciences The University of Memphis Memphis, TN 38152,U.S.A Tel.901-678-3144 e-mail: [email protected] Approximation Theory, Real Analysis, Wavelets, Neural Networks, Probability, Inequalities. J. Marshall Ash Department of Mathematics De Paul University 2219 North Kenmore Ave. Chicago, IL 60614-3504 773-325-4216 e-mail: [email protected] Real and Harmonic Analysis Dumitru Baleanu Department of Mathematics and Computer Sciences, Cankaya University, Faculty of Art and Sciences, 06530 Balgat, Ankara, Turkey, [email protected]

Fractional Differential Equations Nonlinear Analysis, Fractional Dynamics Carlo Bardaro Dipartimento di Matematica e Informatica Universita di Perugia Via Vanvitelli 1 06123 Perugia, ITALY TEL+390755853822 +390755855034 FAX+390755855024 E-mail [email protected] Web site: http://www.unipg.it/~bardaro/ Functional Analysis and Approximation Theory, Signal Analysis, Measure Theory, Real Analysis.

Martin Bohner Department of Mathematics and Statistics, Missouri S&T Rolla, MO 65409-0020, USA [email protected] web.mst.edu/~bohner Difference equations, differential equations, dynamic equations on time scale, applications in economics, finance, biology. Jerry L. Bona Department of Mathematics The University of Illinois at Chicago 851 S. Morgan St. CS 249 Chicago, IL 60601 e-mail:[email protected] Partial Differential Equations, Fluid Dynamics Luis A. Caffarelli Department of Mathematics The University of Texas at Austin Austin, Texas 78712-1082 512-471-3160 e-mail: [email protected] Partial Differential Equations George Cybenko Thayer School of Engineering

1075

Page 4: Journal of Computational Analysis and Applicationseudoxuspress.com/images/JOCAAA-VOL-27-2019-ISSUE-7.pdfJournal of Computational Analysis and Applications . ISSNno.’s:1521-1398 PRINT,1572-9206

Dartmouth College 8000 Cummings Hall, Hanover, NH 03755-8000 603-646-3843 (X 3546 Secr.) e-mail:[email protected] Approximation Theory and Neural Networks Sever S. Dragomir School of Computer Science and Mathematics, Victoria University, PO Box 14428, Melbourne City, MC 8001, AUSTRALIA Tel. +61 3 9688 4437 Fax +61 3 9688 4050 [email protected] Inequalities, Functional Analysis, Numerical Analysis, Approximations, Information Theory, Stochastics. Oktay Duman TOBB University of Economics and Technology, Department of Mathematics, TR-06530, Ankara, Turkey, [email protected] Classical Approximation Theory, Summability Theory, Statistical Convergence and its Applications Saber N. Elaydi Department Of Mathematics Trinity University 715 Stadium Dr. San Antonio, TX 78212-7200 210-736-8246 e-mail: [email protected] Ordinary Differential Equations, Difference Equations J .A. Goldstein Department of Mathematical Sciences The University of Memphis Memphis, TN 38152 901-678-3130 [email protected] Partial Differential Equations, Semigroups of Operators H. H. Gonska Department of Mathematics University of Duisburg Duisburg, D-47048 Germany

011-49-203-379-3542 e-mail: [email protected] Approximation Theory, Computer Aided Geometric Design John R. Graef Department of Mathematics University of Tennessee at Chattanooga Chattanooga, TN 37304 USA [email protected] Ordinary and functional differential equations, difference equations, impulsive systems, differential inclusions, dynamic equations on time scales, control theory and their applications Weimin Han Department of Mathematics University of Iowa Iowa City, IA 52242-1419 319-335-0770 e-mail: [email protected] Numerical analysis, Finite element method, Numerical PDE, Variational inequalities, Computational mechanics Tian-Xiao He Department of Mathematics and Computer Science P.O. Box 2900, Illinois Wesleyan University Bloomington, IL 61702-2900, USA Tel (309)556-3089 Fax (309)556-3864 [email protected] Approximations, Wavelet, Integration Theory, Numerical Analysis, Analytic Combinatorics Margareta Heilmann Faculty of Mathematics and Natural Sciences, University of Wuppertal Gaußstraße 20 D-42119 Wuppertal, Germany, [email protected] Approximation Theory (Positive Linear Operators) Xing-Biao Hu Institute of Computational Mathematics AMSS, Chinese Academy of Sciences Beijing, 100190, CHINA [email protected]

1076

Page 5: Journal of Computational Analysis and Applicationseudoxuspress.com/images/JOCAAA-VOL-27-2019-ISSUE-7.pdfJournal of Computational Analysis and Applications . ISSNno.’s:1521-1398 PRINT,1572-9206

Computational Mathematics Jong Kyu Kim Department of Mathematics Kyungnam University Masan Kyungnam,631-701,Korea Tel 82-(55)-249-2211 Fax 82-(55)-243-8609 [email protected] Nonlinear Functional Analysis, Variational Inequalities, Nonlinear Ergodic Theory, ODE, PDE, Functional Equations. Robert Kozma Department of Mathematical Sciences The University of Memphis Memphis, TN 38152, USA [email protected] Neural Networks, Reproducing Kernel Hilbert Spaces, Neural Percolation Theory Mustafa Kulenovic Department of Mathematics University of Rhode Island Kingston, RI 02881,USA [email protected] Differential and Difference Equations Irena Lasiecka Department of Mathematical Sciences University of Memphis Memphis, TN 38152 PDE, Control Theory, Functional Analysis, [email protected]

Burkhard Lenze Fachbereich Informatik Fachhochschule Dortmund University of Applied Sciences Postfach 105018 D-44047 Dortmund, Germany e-mail: [email protected] Real Networks, Fourier Analysis, Approximation Theory Hrushikesh N. Mhaskar Department Of Mathematics California State University Los Angeles, CA 90032 626-914-7002 e-mail: [email protected] Orthogonal Polynomials, Approximation Theory, Splines, Wavelets, Neural Networks

Ram N. Mohapatra Department of Mathematics University of Central Florida Orlando, FL 32816-1364 tel.407-823-5080 [email protected] Real and Complex Analysis, Approximation Th., Fourier Analysis, Fuzzy Sets and Systems Gaston M. N'Guerekata Department of Mathematics Morgan State University Baltimore, MD 21251, USA tel: 1-443-885-4373 Fax 1-443-885-8216 Gaston.N'[email protected] [email protected] Nonlinear Evolution Equations, Abstract Harmonic Analysis, Fractional Differential Equations, Almost Periodicity & Almost Automorphy M.Zuhair Nashed Department Of Mathematics University of Central Florida PO Box 161364 Orlando, FL 32816-1364 e-mail: [email protected] Inverse and Ill-Posed problems, Numerical Functional Analysis, Integral Equations, Optimization, Signal Analysis Mubenga N. Nkashama Department OF Mathematics University of Alabama at Birmingham Birmingham, AL 35294-1170 205-934-2154 e-mail: [email protected] Ordinary Differential Equations, Partial Differential Equations Vassilis Papanicolaou Department of Mathematics National Technical University of Athens Zografou campus, 157 80 Athens, Greece tel:: +30(210) 772 1722 Fax +30(210) 772 1775 [email protected] Partial Differential Equations, Probability

1077

Page 6: Journal of Computational Analysis and Applicationseudoxuspress.com/images/JOCAAA-VOL-27-2019-ISSUE-7.pdfJournal of Computational Analysis and Applications . ISSNno.’s:1521-1398 PRINT,1572-9206

Choonkil Park Department of Mathematics Hanyang University Seoul 133-791 S. Korea, [email protected] Functional Equations Svetlozar (Zari) Rachev, Professor of Finance, College of Business, and Director of Quantitative Finance Program, Department of Applied Mathematics & Statistics Stonybrook University 312 Harriman Hall, Stony Brook, NY 11794-3775 tel: +1-631-632-1998, [email protected] Alexander G. Ramm Mathematics Department Kansas State University Manhattan, KS 66506-2602 e-mail: [email protected] Inverse and Ill-posed Problems, Scattering Theory, Operator Theory, Theoretical Numerical Analysis, Wave Propagation, Signal Processing and Tomography Tomasz Rychlik Polish Academy of Sciences Instytut Matematyczny PAN 00-956 Warszawa, skr. poczt. 21 ul. Śniadeckich 8 Poland [email protected] Mathematical Statistics, Probabilistic Inequalities Boris Shekhtman Department of Mathematics University of South Florida Tampa, FL 33620, USA Tel 813-974-9710 [email protected] Approximation Theory, Banach spaces, Classical Analysis T. E. Simos Department of Computer Science and Technology Faculty of Sciences and Technology University of Peloponnese GR-221 00 Tripolis, Greece Postal Address: 26 Menelaou St.

Anfithea - Paleon Faliron GR-175 64 Athens, Greece [email protected] Numerical Analysis H. M. Srivastava Department of Mathematics and Statistics University of Victoria Victoria, British Columbia V8W 3R4 Canada tel.250-472-5313; office,250-477-6960 home, fax 250-721-8962 [email protected] Real and Complex Analysis, Fractional Calculus and Appl., Integral Equations and Transforms, Higher Transcendental Functions and Appl.,q-Series and q-Polynomials, Analytic Number Th. I. P. Stavroulakis Department of Mathematics University of Ioannina 451-10 Ioannina, Greece [email protected] Differential Equations Phone +3-065-109-8283 Manfred Tasche Department of Mathematics University of Rostock D-18051 Rostock, Germany [email protected] rostock.de Numerical Fourier Analysis, Fourier Analysis, Harmonic Analysis, Signal Analysis, Spectral Methods, Wavelets, Splines, Approximation Theory Roberto Triggiani Department of Mathematical Sciences University of Memphis Memphis, TN 38152 PDE, Control Theory, Functional Analysis, [email protected]

Juan J. Trujillo University of La Laguna Departamento de Analisis Matematico C/Astr.Fco.Sanchez s/n 38271. LaLaguna. Tenerife. SPAIN Tel/Fax 34-922-318209 [email protected]

1078

Page 7: Journal of Computational Analysis and Applicationseudoxuspress.com/images/JOCAAA-VOL-27-2019-ISSUE-7.pdfJournal of Computational Analysis and Applications . ISSNno.’s:1521-1398 PRINT,1572-9206

Fractional: Differential Equations-Operators-Fourier Transforms, Special functions, Approximations, and Applications Ram Verma International Publications 1200 Dallas Drive #824 Denton, TX 76205, USA [email protected] Applied Nonlinear Analysis, Numerical Analysis, Variational Inequalities, Optimization Theory, Computational Mathematics, Operator Theory

Xiang Ming Yu Department of Mathematical Sciences Southwest Missouri State University Springfield, MO 65804-0094 417-836-5931 [email protected] Classical Approximation Theory, Wavelets Xiao-Jun Yang State Key Laboratory for Geomechanics and Deep Underground Engineering, China University of Mining and Technology, Xuzhou 221116, China Local Fractional Calculus and Applications, Fractional Calculus and Applications, General Fractional Calculus and Applications, Variable-order Calculus and Applications, Viscoelasticity and Computational methods for Mathematical [email protected]

Richard A. Zalik Department of Mathematics Auburn University Auburn University, AL 36849-5310 USA. Tel 334-844-6557 office 678-642-8703 home Fax 334-844-6555 [email protected] Approximation Theory, Chebychev Systems, Wavelet Theory

Ahmed I. Zayed Department of Mathematical Sciences DePaul University 2320 N. Kenmore Ave. Chicago, IL 60614-3250 773-325-7808 e-mail: [email protected] Shannon sampling theory, Harmonic analysis and wavelets, Special functions and orthogonal polynomials, Integral transforms Ding-Xuan Zhou Department Of Mathematics City University of Hong Kong 83 Tat Chee Avenue Kowloon, Hong Kong 852-2788 9708,Fax:852-2788 8561 e-mail: [email protected] Approximation Theory, Spline functions, Wavelets Xin-long Zhou Fachbereich Mathematik, Fachgebiet Informatik Gerhard-Mercator-Universitat Duisburg Lotharstr.65, D-47048 Duisburg, Germany e-mail:[email protected] duisburg.de Fourier Analysis, Computer-Aided Geometric Design, Computational Complexity, Multivariate Approximation Theory, Approximation and Interpolation Theory Jessada Tariboon Department of Mathematics, King Mongkut's University of Technology N. Bangkok 1518 Pracharat 1 Rd., Wongsawang, Bangsue, Bangkok, Thailand 10800 [email protected], Time scales, Differential/Difference Equations, Fractional Differential Equations

1079

Page 8: Journal of Computational Analysis and Applicationseudoxuspress.com/images/JOCAAA-VOL-27-2019-ISSUE-7.pdfJournal of Computational Analysis and Applications . ISSNno.’s:1521-1398 PRINT,1572-9206

Instructions to Contributors

Journal of Computational Analysis and Applications An international publication of Eudoxus Press, LLC, of TN.

Editor in Chief: George Anastassiou

Department of Mathematical Sciences University of Memphis

Memphis, TN 38152-3240, U.S.A.

1. Manuscripts files in Latex and PDF and in English, should be submitted via email to the Editor-in-Chief: Prof.George A. Anastassiou Department of Mathematical Sciences The University of Memphis Memphis,TN 38152, USA. Tel. 901.678.3144 e-mail: [email protected] Authors may want to recommend an associate editor the most related to the submission to possibly handle it. Also authors may want to submit a list of six possible referees, to be used in case we cannot find related referees by ourselves. 2. Manuscripts should be typed using any of TEX,LaTEX,AMS-TEX,or AMS-LaTEX and according to EUDOXUS PRESS, LLC. LATEX STYLE FILE. (Click HERE to save a copy of the style file.)They should be carefully prepared in all respects. Submitted articles should be brightly typed (not dot-matrix), double spaced, in ten point type size and in 8(1/2)x11 inch area per page. Manuscripts should have generous margins on all sides and should not exceed 24 pages. 3. Submission is a representation that the manuscript has not been published previously in this or any other similar form and is not currently under consideration for publication elsewhere. A statement transferring from the authors(or their employers,if they hold the copyright) to Eudoxus Press, LLC, will be required before the manuscript can be accepted for publication.The Editor-in-Chief will supply the necessary forms for this transfer.Such a written transfer of copyright,which previously was assumed to be implicit in the act of submitting a manuscript,is necessary under the U.S.Copyright Law in order for the publisher to carry through the dissemination of research results and reviews as widely and effective as possible.

1080

Page 9: Journal of Computational Analysis and Applicationseudoxuspress.com/images/JOCAAA-VOL-27-2019-ISSUE-7.pdfJournal of Computational Analysis and Applications . ISSNno.’s:1521-1398 PRINT,1572-9206

4. The paper starts with the title of the article, author's name(s) (no titles or degrees), author's affiliation(s) and e-mail addresses. The affiliation should comprise the department, institution (usually university or company), city, state (and/or nation) and mail code. The following items, 5 and 6, should be on page no. 1 of the paper. 5. An abstract is to be provided, preferably no longer than 150 words. 6. A list of 5 key words is to be provided directly below the abstract. Key words should express the precise content of the manuscript, as they are used for indexing purposes. The main body of the paper should begin on page no. 1, if possible. 7. All sections should be numbered with Arabic numerals (such as: 1. INTRODUCTION) . Subsections should be identified with section and subsection numbers (such as 6.1. Second-Value Subheading). If applicable, an independent single-number system (one for each category) should be used to label all theorems, lemmas, propositions, corollaries, definitions, remarks, examples, etc. The label (such as Lemma 7) should be typed with paragraph indentation, followed by a period and the lemma itself. 8. Mathematical notation must be typeset. Equations should be numbered consecutively with Arabic numerals in parentheses placed flush right, and should be thusly referred to in the text [such as Eqs.(2) and (5)]. The running title must be placed at the top of even numbered pages and the first author's name, et al., must be placed at the top of the odd numbed pages. 9. Illustrations (photographs, drawings, diagrams, and charts) are to be numbered in one consecutive series of Arabic numerals. The captions for illustrations should be typed double space. All illustrations, charts, tables, etc., must be embedded in the body of the manuscript in proper, final, print position. In particular, manuscript, source, and PDF file version must be at camera ready stage for publication or they cannot be considered. Tables are to be numbered (with Roman numerals) and referred to by number in the text. Center the title above the table, and type explanatory footnotes (indicated by superscript lowercase letters) below the table. 10. List references alphabetically at the end of the paper and number them consecutively. Each must be cited in the text by the appropriate Arabic numeral in square brackets on the baseline. References should include (in the following order): initials of first and middle name, last name of author(s) title of article,

1081

Page 10: Journal of Computational Analysis and Applicationseudoxuspress.com/images/JOCAAA-VOL-27-2019-ISSUE-7.pdfJournal of Computational Analysis and Applications . ISSNno.’s:1521-1398 PRINT,1572-9206

name of publication, volume number, inclusive pages, and year of publication. Authors should follow these examples: Journal Article 1. H.H.Gonska,Degree of simultaneous approximation of bivariate functions by Gordon operators, (journal name in italics) J. Approx. Theory, 62,170-191(1990). Book 2. G.G.Lorentz, (title of book in italics) Bernstein Polynomials (2nd ed.), Chelsea,New York,1986. Contribution to a Book 3. M.K.Khan, Approximation properties of beta operators,in(title of book in italics) Progress in Approximation Theory (P.Nevai and A.Pinkus,eds.), Academic Press, New York,1991,pp.483-495. 11. All acknowledgements (including those for a grant and financial support) should occur in one paragraph that directly precedes the References section. 12. Footnotes should be avoided. When their use is absolutely necessary, footnotes should be numbered consecutively using Arabic numerals and should be typed at the bottom of the page to which they refer. Place a line above the footnote, so that it is set off from the text. Use the appropriate superscript numeral for citation in the text. 13. After each revision is made please again submit via email Latex and PDF files of the revised manuscript, including the final one. 14. Effective 1 Nov. 2009 for current journal page charges, contact the Editor in Chief. Upon acceptance of the paper an invoice will be sent to the contact author. The fee payment will be due one month from the invoice date. The article will proceed to publication only after the fee is paid. The charges are to be sent, by money order or certified check, in US dollars, payable to Eudoxus Press, LLC, to the address shown on the Eudoxus homepage. No galleys will be sent and the contact author will receive one (1) electronic copy of the journal issue in which the article appears. 15. This journal will consider for publication only papers that contain proofs for their listed results.

1082

Page 11: Journal of Computational Analysis and Applicationseudoxuspress.com/images/JOCAAA-VOL-27-2019-ISSUE-7.pdfJournal of Computational Analysis and Applications . ISSNno.’s:1521-1398 PRINT,1572-9206

Common fixed point theorems in Gb-metric space

Youqing Shen, Chuanxi Zhu∗, Zhaoqi Wu

Department of Mathematics, Nanchang University, Nanchang, 330031, P. R. China

[email protected] (Y. Q. Shen), [email protected] (C. X. Zhu)

Abstract In this paper, we introduce a new type of common fixed point for three mappings in

Gb-complete Gb-metric space. On the other hand, we prove that the theory is also established in

G-metric space and several corollaries and examples are listed.

Keywords: Gb-metric space; common fixed point; G-metric space

1 Preliminaries

Mustafa and Sims [1] generalized the concept of metric space and Mustafa [2,3,7] obtained some fixed point

theorems in his papers. After that, many authors established fixed point and common fixed point theorems for

different contractive-type condition in G-metric space. In 1998, Czerwik [10] introduced the notion of b-metric

space, and then Aghajani [12] based on the notion gave the concept of Gb-metric space and some authors

obtained the existence and uniqueness fixed point in Gb-metric space [7,11].

Fixed point theory has a large number of applications in many branches of nonlinear analysis and has been

extended in many different directions. Let A,B and C are self mappings of a nonempty set X, if there exists a

p ∈ X, such that Ap = Bp = Cp = p, then we call p is a common fixed point of A,B and C. For a mapping T

on nonempty set X to itself, we have Tx = x, and x is unique then we call x is a Picard operator.

In this paper, we mainly obtain a unique common fixed point for three mappings in Gb-metric space. First,

we recall some basic properties of Gb-metric space.

Let R = (−∞,∞), R+ = [0,∞) and N be the set of all natural numbers. Denote N+ the set of all positive

integers.

Definition 1.1 ([12]) Let X be a nonempty set and s ≥ 1 be a given real number, and let the function

G : X ×X ×X → [0,∞) satisfy the following properties:

(Gb1) G(x, y, z) = 0 if x = y = z whenever x, y, z ∈ X ;

(Gb2) 0 ≤ G(x, x, y) for all x, y ∈ X with x = y;

(Gb3) G(x, x, y) ≤ G(x, y, z) for all x, y, z ∈ X with y = z;

(Gb4) G(x, y, z) = G(px, y, z), where p is a permutation of x, y, z;

(Gb5) G(x, y, z) ≤ s(G(x, a, a) +G(a, y, z)) for all x, y, z ∈ X.

†∗Correspondence author. Chuanxi Zhu. Email address: [email protected]. Tel:+8613970815298.

1

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 27, NO.7, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

1083 SHEN ET AL 1083-1090

Page 12: Journal of Computational Analysis and Applicationseudoxuspress.com/images/JOCAAA-VOL-27-2019-ISSUE-7.pdfJournal of Computational Analysis and Applications . ISSNno.’s:1521-1398 PRINT,1572-9206

Then G is called a Gb-metric on X, and (X,G) is called a Gb-metric space.

Definition 1.2 ([12]) A Gb-metric space G is said to be symmetric if G(x, x, y) = G(y, x, x) for all x, y ∈ X.

Proposition 1.3 ([12]) Let X be a Gb-metric space, then for each x, y, z, a ∈ X it follows that:

(1) if G(x, y, z) = 0 then x = y = z;

(2) G(x, y, z) ≤ sG(G(x, y, y) +G(x, x, z));

(3) G(x, y, y) ≤ 2s(G(y, x, x));

(4) G(x, y, z) ≤ s(G(x, a, a) +G(a, y, z)).

Definition 1.4 ([12]) Let X be a Gb-metric space. A sequence xn in X is said to be:

(1)Gb-Cauchy if for each ε > 0, there exists a positive integer n0 such that for allm,n, l ≥ n0, G(xn, xm, xl) <

ε;

(2) Gb-convergent to a point x ∈ X if for each ε > 0, there exists a positive integer n0 such that for all

m,n,≥ n0, G(xn, xm, x) < ε;

Definition 1.5 ([12]) A Gb-metric space X is called complete if every Gb-Cauchy sequence is Gb-convergent

in X.

lemma 1.6 ([11]) Let (X, ,G) be a Gb-metric space with s > 1.

(1) Suppose that xn, yn and zn are Gb-convergent to x, y and z, respectively. Then we have

1

s3G(x, y, z) ≤ lim inf

n→∞G(xn, yn, zn) ≤ lim sup

n→∞G(xn, yn, zn) ≤ s3G(x, y, z).

(2) If zn = c is constant, then

1

s2G(x, y, c) ≤ lim inf

n→∞G(xn, yn, c) ≤ lim sup

n→∞G(xn, yn, c) ≤ s2G(x, y, c).

(3) If yn = b and zn = c are constant, then

1

sG(x, b, c) ≤ lim inf

n→∞G(xn, b, c) ≤ lim sup

n→∞G(xn, b, c) ≤ sG(x, b, c).

2 Common fixed point theorems in Gb-metric space

Theorem 2.1 Let (X,G) be a Gb-complete Gb-metric space and A,B and C are mappings from X to itself.

Suppose that A,B and C satisfy the following condition:

G(Ax,By,Cz) ≤ G(x,Ax,Ax) +G(x,By,By) +G(z, Cz, Cz)

G(x,Ax,By) +G(y,By,Cz) +G(z, Cz,Ax) + 1)G(x, y, z) (2.1)

for all x, y, z ∈ X. Then either one of A,B and C has a fixed point, or, A,B and C have a unique common

fixed point.

Proof. Define the sequence xn as x3n+1 = Ax3n, x3n+2 = Bx3n+1, x3n+3 = Bx3n+2 for all n = 0, 1, 2, · · · .

2

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 27, NO.7, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

1084 SHEN ET AL 1083-1090

Page 13: Journal of Computational Analysis and Applicationseudoxuspress.com/images/JOCAAA-VOL-27-2019-ISSUE-7.pdfJournal of Computational Analysis and Applications . ISSNno.’s:1521-1398 PRINT,1572-9206

If x3n = x3n+1, then x3n is a fixed point of A.

If x3n+1 = x3n+2, then x3n+1 is a fixed point of B.

If x3n+2 = x3n+3, then x3n+2 is a fixed point of C.

If the above conclusions are not true, then we assume that xn = xn+1 for all n. Let dn = G(xn, xn+1, xn+2),

then for (2.1) we have

G(Ax3n, Bx3n+1, Cx3n+2)

≤ G(x3n, Ax3n, Ax3n) +G(x3n+1, Bx3n+1, Bx3n+1) +G(x3n+2, Cx3n+2, Cx3n+2)

G(x3n, Ax3n, Bx3n+1) +G(x3n+1, Bx3n+1, Cx3n+2) +G(x3n+2, Cx3n+2, Ax3n) + 1)G(x3n, x3n+1, x3n+2)

=G(x3n, x3n+1, x3n+1) +G(x3n+1, x3n+2, x3n+2) +G(x3n+2, x3n+3, , x3n+3)

G(x3n, x3n+1, x3n+2) +G(x3n+1, x3n+2, x3n+3) +G(x3n+2, x3n+3, x3n+1) + 1)G(x3n, x3n+1, x3n+2)

≤ G(x3n, x3n+1, x3n+2) +G(x3n+1, x3n+2, x3n+3) +G(x3n+1, x3n+2, , x3n+3)

G(x3n, x3n+1, x3n+2) +G(x3n+1, x3n+2, x3n+3) +G(x3n+2, x3n+3, x3n+1) + 1)G(x3n, x3n+1, x3n+2)

so we have

d3n+1 ≤ d3n + 2d3n+1

d3n + 2d3n+1 + 1d3n

Let

α3n =d3n + 2d3n+1

d3n + 2d3n+1 + 1

so we have

d3n+1 ≤ α3nd3n

by introduction, we have

d3n+1 ≤ α3nα3n−1 · · ·α1d1

It is obvious that for any natural number n ∈ N, we have 0 < αn < 1,and so

dn ≤ dn−1

then we have

dn ≤ dn−1 ⇒ dn + dn+1 ≤ dn−1 + dn

⇒ 1 +1

dn−1 + 2dn≤ 1 +

1

dn + 2dn+1

⇒ 1

αn−1≤ 1

αn

Hence, we can get

αn−1 ≥ αn

so we can obtain

α3nα3n−1 · · ·α1 ≤ α13n

3

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 27, NO.7, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

1085 SHEN ET AL 1083-1090

Page 14: Journal of Computational Analysis and Applicationseudoxuspress.com/images/JOCAAA-VOL-27-2019-ISSUE-7.pdfJournal of Computational Analysis and Applications . ISSNno.’s:1521-1398 PRINT,1572-9206

taking the limit as n→ ∞, so we have

limn→∞

d3n+1 ≤ limn→∞

α3nα3n−1 · · ·α1d1 ≤ limn→∞

α13nd1 = 0

so

limn→∞

G(xn, xn+1, xn+2) = 0.

Next,we will show that xn is a Gb-Cauchy sequence. on the other hand, according to (Gb3) we have

limn→∞

G(xn, xn+1, xn+1) ≤ limn→∞

G(xn, xn+1, xn+2) = 0 (2.2)

for any n,m ∈ N, m > n, using (Gb5), so we have

G(xn, xm, xm) ≤ sG(xn, xn+1, xn+1) + sG(xn+1, xm, xm)

≤ sG(xn, xn+1, xn+1) + s2G(xn+1, xn+2, xn+2) + s2G(xn+2, xm, xm)

≤ sG(xn, xn+1, xn+1) + s2G(xn+1, xn+2, xn+2) + · · ·+ sm−nG(xm−1, xm−1, xm)

≤ sG(xn, xn+1, xn+2) + s2G(xn+1, xn+2, xn+3) + · · ·+ sm−nG(xm−1, xm, xm+1)

= d1(sα1n + s2α1

n+1 + · · ·+ sm−nα1m−1)

= d1sα1

n(1− (sα)m−n−1)

1− sα1n

taking the limit as n→ ∞, then we have

limn→∞

G(xn, xm, xm) ≤ limn→∞

d1sα1

n(1− (sα)m−n−1)

1− sα1n

= 0

so xn is a Gb-Cauchy sequence.

Since X is complete, so there exists a p ∈ X, such that xn is a Gb-Cauchy sequence and Gb-converges to

p such that

limn→∞

x3n+1 = limn→∞

Ax3n = limn→∞

x3n+2 = limn→∞

Bx3n+1

= limn→∞

x3n+3 = limn→∞

Cx3n+2 = p.

Now we prove that p is a common fixed point of A,B and C.

Using Lemma 1.6 and (2.1), taking the upper limit as n→ ∞, we get

G(Ap, p, p)

≤ s2 limn→∞

supG(Ap,Bx3n+1, Cx3n+2)

≤ s2 limn→∞

supG(p,Ap,Ap) +G(x3n+1, Bx3n+1, Bx3n+1) +G(x3n+2, Cx3n+2, Cx3n+2)

G(p,Ap,Bx3n+1) +G(x3n+1, Bx3n+1, Cx3n+2) +G(x3n+2, Cx3n+2, Ap) + 1G(p, x3n+1, x3n+1)

≤ s4 limn→∞

supG(p,Ap,Ap) +G(x3n+1, Bx3n+1, Bx3n+1) +G(x3n+2, Cx3n+2, Cx3n+2)

G(p,Ap,Bx3n+1) +G(x3n+1, Bx3n+1, Cx3n+2) +G(x3n+2, Cx3n+2, Ap) + 1G(p, p, p)

= 0

then we get G(Ap, p, p) = 0. Hence by (1) of Proposition 1.1, we can get Ap = p. Similarly, letting x = x3n,

y = p, z = x3n+2 and x = x3n, y = x3n+1, z = p we can get Bp = p and Cp = p respectively, so we have

Ap = Bp = Cp = p.

4

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 27, NO.7, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

1086 SHEN ET AL 1083-1090

Page 15: Journal of Computational Analysis and Applicationseudoxuspress.com/images/JOCAAA-VOL-27-2019-ISSUE-7.pdfJournal of Computational Analysis and Applications . ISSNno.’s:1521-1398 PRINT,1572-9206

Now, we show that the common fixed point of A,B and C is unique. Assume on contrary that q is another

fixed point, i.e. Aq = Bq = Cq = q such that p = q. Then, by our assumption, we apply (2.1) to obtain

G(p, p, q) = G(Ap,Bp,Cq)

≤ G(p,Ap,Ap) +G(p,Bp,Bp) +G(q, Cq, Cq)

G(p,Ap,Bp) +G(p,Bp,Cq) +G(q, Cq,Ap) + 1G(p, p, q)

=G(p, p, p) +G(p, p, p) +G(q, q, q)

G(p, p, p) +G(p, p, q) +G(q, q, p) + 1G(p, p, q)

= 0

so by the Proposition 1.1, we have G(p, p, q) = 0, then p = q.

Corollary 2.2 Let (X,G) be a Gb-complete Gb-metric space and T be a mapping from X to itself. Suppose

that T satisfy the following condition:

G(Tx, Ty, Tz) ≤ G(x, Tx, Tx) +G(x, Tx, Tx) +G(x, Tx, Tx)

G(x, Tx, Ty) +G(y, Ty, Tz) +G(z, Tz, Tx) + 1)G(x, y, z)

for all x, y, z ∈ X. Then T has a unique fixed point.

Proof. Taking A = B = C = T , the result follow from Theorem 2.1.

Theorem 2.3 Let (X,G) be a Gb-complete Gb-metric space and A,B and C are mappings from X to itself.

Suppose that A,B and C satisfy the following condition:

G(Ax,By,Cz) ≤ αminG(y,By,By), G(z, Cz, Cz)

G(z, Cz,Ax) + 1G(x,Ax,Ax) + βG(x, y, z) (2.3)

for all x, y, z ∈ X, where α+ β ≤ 1.

Then either one of A,B and C has a fixed point, or, A,B and C have a unique common fixed point.

Proof. Let dn = G(xn, xn+1, xn+2), then for (2.3) we have

G(Ax3n, Bx3n+1, Cx3n+2) ≤ αminG(x3n+1, Bx3n+1, Bx3n+1), G(x3n+2, Cx3n+2, Cx3n+2)

G(x3n+2, Cx3n+2, Ax3n) + 1)

G(x3n, Ax3n, Ax3n) + βG(x3n, x3n+1, x3n+2)

= αminG(x3n+1, x3n+2, x3n+2), G(x3n+2, x3n+3, x3n+3)

G(x3n+2, x3n+3, x3n+1) + 1)

G(x3n, x3n+1, x3n+1) + βG(x3n, x3n+1, x3n+2)

≤ αd3n+1

d3n+1 + 1d3n + βd3n

= (αd3n+1

d3n+1 + 1+ β)d3n

Since α d3n+1

d3n+1+1 + β ≤ 1, the following proof is similar to Theorem 2.1.

Corollary 2.4 Let (X,G) be a Gb-complete Gb-metric space and T be mapping from X to itself. Suppose

that T satisfy the following condition:

G(Tx, Ty, Tz) ≤ α(minG(y, Ty, Ty), G(z, Tz, Tz)

G(z, Tz, Tx) + 1)G(x, Tx, Tx) + βG(x, y, z)

for all x, y, z ∈ X, where α+ β ≤ 1.

5

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 27, NO.7, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

1087 SHEN ET AL 1083-1090

Page 16: Journal of Computational Analysis and Applicationseudoxuspress.com/images/JOCAAA-VOL-27-2019-ISSUE-7.pdfJournal of Computational Analysis and Applications . ISSNno.’s:1521-1398 PRINT,1572-9206

Then T has a unique fixed point.

Proof. Taking A = B = C = T , the result follow from Theorem 2.4.

Theorem 2.5 Let (X,G) be a G-complete G-metric space and A,B and C are mappings from X to itself.

Suppose that A,B and C satisfy the following condition:

G(Ax,By,Cz) ≤ G(x,Ax,Ax) +G(y,By,By) +G(z, Cz, Cz)

G(x,Ax,By) +G(y,By,Cz) +G(z, Cz,Ax) + 1)G(x, y, z)

for all x, y, z ∈ X. Then either one of A,B and C has a fixed point, or, A,B and C have a unique common

fixed point.

Proof. The proof is similar to Theorem 2.1. There is a little difference between them.

First, when we prove that xn is a Gb-Cauchy sequence, we have

G(xn, xm, xm) ≤ G(xn, xn+1, xn+1) +G(xn+1, xm, xm)

≤ G(xn, xn+1, xn+1) +G(xn+1, xn+2, xn+2) +G(xn+2, xm, xm)

≤ G(xn, xn+1, xn+1) +G(xn+1, xn+2, xn+2) + · · ·+G(xm−1, xm−1, xm)

≤m−n∑i=0

G(xn+i, xn+i+1, xn+i+1)

so we can get

G(xn, xm, xm) ≤m−n∑i=0

G(xn+i, xn+i+1, xn+i+1)

≤m−n∑i=0

G(xn+i, xn+i+1, xn+i+2)

=

m−n∑i=0

dn+i

taking the limit as n→ ∞, then we have

limn→∞

G(xn, xm, xm) ≤ limn→∞

m−n∑i=0

α1n+id1 = 0

so xn is a G-Cauchy sequence.

Secondly, since that G-metric space is continuous so when we prove that p is a common fixed point in

G-metric space we have

G(Ap, p, p) ≤ G(p,Ap,Ap) +G(p,Bp,Bp) +G(p, Cp,Cp)

G(p,Ap,Bp) +G(p,Bp,Cp) +G(p, Cp,Ap) + 1G(p, p, p) = 0

Corollary 2.6 Let (X,G) be a G-complete G-metric space and T be a mapping from X to itself. Suppose

that T satisfy the following condition:

G(Tx, Ty, Tz) ≤ G(x, Tx, Tx) +G(x, Tx, Tx) +G(x, Tx, Tx)

G(x, Tx,By) +G(y, Ty, Tz) +G(z, Tz, Tx) + 1)G(x, y, z)

for all x, y, z ∈ X. Then T has a unique fixed point.

Proof. Taking A = B = C = T , the result follow from Theorem 2.6.

6

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 27, NO.7, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

1088 SHEN ET AL 1083-1090

Page 17: Journal of Computational Analysis and Applicationseudoxuspress.com/images/JOCAAA-VOL-27-2019-ISSUE-7.pdfJournal of Computational Analysis and Applications . ISSNno.’s:1521-1398 PRINT,1572-9206

3 An example

Example 3.1 Let G(x, y, z) = (max|x − y|, |y − x|, |z − x|)2 for all x, y, z ∈ X then G is a Gb-metric on

X where s = 2. Define self-mappings A,B and C on x by

A(x) = 1, B(x) = 1, C(x) =7 + x

8

Then we have

G(Ax,By,Cz) = (max|1− 1|, |1− 7 + z

8|, |1− 7 + z

8|)2

= (1

8− z

8)2

and we also have

G(x,Ax,Ax) = (1− x)2, G(y,By,By) = (1− y)2

G(z, Cz, Cz) = (7− 7z

8)2, G(x,Ax,By) = (1− x)2

G(y,By,Cz) = max(1− y)2, (1− z

8)2, (

7 + z

8− y)2

G(z, Cz,Ax) = (1− z)2

G(x, y, z) = max|x− y|2, |y − z|2, |z − x|2

Case1: when z ≤ x, z ≤ y α ≥ 164 , β = 0 and y ≤ 1+7z

8 , we have the (2.3) established. Then x = y = z = 1

is a common fixed point.

Case2: when y ≥ 1+7z8 α = 1, β = 0 and z ≥ −6 + 7x, we have the (2.3) established. Then x = y = z = 1 is

a common fixed point.

Acknowledgements

This work is supported by the Natural Science Foundation of China (11771198, 11361042, 11071108, 11461045,

11701259), the Natural Science Foundation of Jiangxi Province of China (20132BAB201001,20142BAB211016)

and the Scientific Program of the Provincial Education Department of Jiangxi (GJJ150008) and the Innovation

Program of the Graduate student of Nanchang University(colonel-level project).

References

[1] Z. Mustafa, B. Sims, A new approach to generalized metric space. J. Nonlinear Convex Anal. 7, 289-297,

(2006).

[2] Z. Mustafa, B. Sims, Fixed point theorems for contractive mappings in complete G-metric space, Fixed

Point Theory Appl. 2009, 977175, (2013).

[3] H. Obiedat, Z. Mustafa, Fixed point result on a nonsymmetric G-metric space, Jordan J. Math. Stat. 3,

65-79, (2010).

7

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 27, NO.7, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

1089 SHEN ET AL 1083-1090

Page 18: Journal of Computational Analysis and Applicationseudoxuspress.com/images/JOCAAA-VOL-27-2019-ISSUE-7.pdfJournal of Computational Analysis and Applications . ISSNno.’s:1521-1398 PRINT,1572-9206

[4] A. Azam, N.Mehmood, Fixed point theorems for multivalued mappings in G-cone metric space, J. Inequal.

Appl. 2013, 354, (2013).

[5] Y. U. Caba, Fixed point theorems in G-metric space, J. Math. Anal. Appl. 455, 528-537, (2017).

[6] P. N. Dutta, B. S. Choudhury, K. Das, Some fixed point results in Menger spaces, Surv. Math. Appl. 4,

41-52, (2009).

[7] Z. Mustafa, J. R. Roshan, Coupled coincidence point result for (ψ,φ)-weakly contractive mappings in

partially ordered Gb-metric spaces. Fixed Point Theory Appl. 2013 , 206, (2013).

[8] J. R. Roshan, V. Sedghi, Common fixed point of almost generalized (ψ,φ)s-contractive mappings in ordered

b-metric space. Fixed Point Theory Appl. 2013, 159, (2013).

[9] V.Parvaneh, J. R. Radenovic, Existence of tripled coincidence points in ordered b-metric spaces and an

application to a system of integral equations, Fixed Point Theory Appl. 2013, 130, (2013).

[10] S. Czerwik, Nonlinear set-valued contraction mappings in b-metric space, Atti Sem Mat Fis Univ Modena.

46, 236-276, (1998).

[11] R. R. Jamal, S. Nabioliah, Common fixed point theorems for three maps in discontinuous Gb-metric spaces,

Act Math Sci. 34, 1643-1654, (2014).

[12] A. Aghajani, M. Abbas, J. R. Roshan, C common fixed point of generalized weak contractive mappings in

partially ordered Gb-metric space. Filomat. 28, 1087-1101, (2014).

[13] I. A. Baskhtin, The contraction mapping principle in quasimetric spaces, Func Anal Unianowsk Gos Ped

Inst. 30, 26-37, (1989).

[14] C. X. Zhu, Several nonlinear operator problems in Menger PN space, Nonlinear Anal. 65 1281-1284 (2006).

[15] C. X. Zhu, Research on some problems for nonlinear operator, Nonlinear Anal. 71, 4568-4571, (2009).

8

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 27, NO.7, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

1090 SHEN ET AL 1083-1090

Page 19: Journal of Computational Analysis and Applicationseudoxuspress.com/images/JOCAAA-VOL-27-2019-ISSUE-7.pdfJournal of Computational Analysis and Applications . ISSNno.’s:1521-1398 PRINT,1572-9206

A modified collocation method for weakly singularFredholm integral equations of second kind∗

Guang Zenga, b†, Chaomin Chena,‡, Li Leia, b§, Xi Xub,¶

aFundamental Science on Radioactive Geology and

Exploration Technology Laboratory, East China University of Technology,

Nanchang, Jiangxi, 330013, P.R. China

b School of Scinence, East China University of Technology,

Nanchang, Jiangxi, 330013, P.R. China

Abstract

In this paper, a collocation method with high precision by using the poly-nomial basis functions is proposed to solve the Fredholm integral equation ofsecond kind with weakly singular kernel. We introduce the polynomial basisfunctions and use it to reduce the given equation to a system of linear alge-braic equation. Thus, we can simplify the solving of the equation. The erroranalysis are given. Numerical examples are given to illustrate the efficiencyof our method.

Keyword : Weakly Singular · Fredholm Integral Equation · Polynomialbasis function Method

AMS subject classification : 65D10 · 65D32

1 Introduction

This paper is concerned with collocation method for weakly singular Fredholm in-tegral equations of the second kind as follows

∗The work is supported by National Natural Science Foundation of China(11661005,11301070).†Corresponding author: [email protected] (G. Zeng)‡[email protected] (C. Chen)§[email protected] (L. Lei)¶[email protected] (X. Xu)

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 27, NO.7, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

1091 Guang Zeng ET AL 1091-1102

Page 20: Journal of Computational Analysis and Applicationseudoxuspress.com/images/JOCAAA-VOL-27-2019-ISSUE-7.pdfJournal of Computational Analysis and Applications . ISSNno.’s:1521-1398 PRINT,1572-9206

G. Zeng et al.: Numerical solution of singular integral equation

φ(x) + λ

∫ b

a

κ(x, t)φ(t)dt = f(x), 0 ≤ x ≤ 1, (1.1)

where κ(x, t) = H(x,t)|x−t|α , 0 < α < 1, H(x, t), f(x) are continue and bounded functions

and φ(x) is the function to be determined.Numerical methods for weakly singular Fredholm integral equations of the sec-

ond kind have been developed by many scholars in recent years because of theirimportant applications in science and engineering. These methods can be classi-fied into two types. One type is through making approximations to the analyticalsolutions directly. For instance, Tricomi used successive approximations methodto solve the integral equations in his book [1]. Variational iteration method andAdomian decomposition method were introduced in [2] and [3] respectively. Also,The homotopy analysis method was proposed by Liao [4] and has applied it in [5]et. Another type is through shifting the equations into a form which easier to solvethan the original equations. For example, Taylor expansion collocation methods arepresented to solve integral equations in [6-8]. In [9], the orthogonal triangular basisfunctions were used by Babolian et al. to solve some integral equations systems.And Legendre wavelets method was proposed by Jafari et al. in [10] to find thenumerical solutions of linear integral equations systems. Moreover, in [12] architec-ture artificial neural networks was suggested to approximate the solutions of linearintegral equations systems. Furthermore, Jafarian et al. [13] using the Bernsteinpolynomials to obtain the numerical solutions of linear Fredholm and Volterra inte-gral equations systems of the second kind. And application of Bernstein polynomialhave been made by scholar for solving both differential equations and integral equa-tions, see [11]. And piecewise polynomial collocation method were applied to solvethe Volterra integro-differential equations with weakly singular kernel in [14] respec-tively. And the stability of piecewise polynomial collocation methods for solvingweakly singular integral equations of the second kind has been discussed by Kangroet al. in [15]. Besides, Baratella et al. [16] had proposed an approach with productintegration to solve the weakly singular Volterra integral equations. Kolk et al. AndPallaw et al. [17] used the quadratic spline collocation to solve the smoothed weaklysingular Fredholm integral equations. However, these methods introduced above donot provide a good accuracy in the solution near the singular points.

In this paper, we are going to use polynomial basis functions collocation methodto approximate the solution of singular Fredholm integral equations of the secondkind. The proposed approach converted the given equation with unique solution intoa system of linear algebraic equations in general case. To do this, first the polynomialbasis functions of certain degree n of unknown functions are substituted in the givenintegral equations. So that the solution of the unknown function of given equationshave converted into the solutions of the coefficients of the unknown polynomial basisfunctions, such that we can solve the integral equations in a convenient way.

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 27, NO.7, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

1092 Guang Zeng ET AL 1091-1102

Page 21: Journal of Computational Analysis and Applicationseudoxuspress.com/images/JOCAAA-VOL-27-2019-ISSUE-7.pdfJournal of Computational Analysis and Applications . ISSNno.’s:1521-1398 PRINT,1572-9206

G. Zeng et al.: Numerical solution of singular integral equation

The layout of this paper is as follows: In section 2 we presented the procedureof the polynomial basis functions collocation method to obtain the approximatesolution of the weakly singular Fredholm integral equation. In section 3, we haddemonstrated that the proposed method is convergent to all the weakly singularFredholm integral equations of second kind. In section 4, we give numerical exampleto test the effectiveness and efficiency of the method. Finally, Numerical examplesare given to illustrate the efficiency of our method.

2 The Polynomial Basis Function Method

We are going to use the polynomial basis functions to solve the eq.(1.1). The formof the functions are as follows:

U =m−1∑k=0

xk,

where the polynomial basis functions 1, x, x2, · · · , xm−1 are linear independent.Since eq.(1.1) is a weakly singular integral equation, the singularity of the e-

quation must be removed such that the procedure of solving the problem can bemove on. But since the proposed method of this paper is belong to the colloca-tion method, which can smooth the singular points of the discretion, so that wecan use the method directly. Then we provided the procedure of using polynomialbasis functions to solve the kind of the integral equations proposed in this paperconcretely as follows:

Step 1. Choosing the basis functions u = [1, x, x2, ..., xk], (k = 0, 1, 2, ...,m− 1)the unknown function φ(x) is substituted by the following polynomials

φ(x) ≈ φm(x) =m−1∑k=0

akxk, (2.1)

Step 2. Substituting (2.1) into (1.1) we have

m−1∑k=0

akxk + λ

m−1∑k=0

akxk

∫ b

a

κ(x, t)tkdt = f(x), (2.2)

Step 3. Discrete the interval [a,b] into n sections uniformly, we obtained thesystems of the coefficient ak as follows

m−1∑k=0

akxkj + λ

m−1∑k=0

akxkj

∫ b

a

κ(x, t)tkdt = f(xj), (2.3)

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 27, NO.7, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

1093 Guang Zeng ET AL 1091-1102

Page 22: Journal of Computational Analysis and Applicationseudoxuspress.com/images/JOCAAA-VOL-27-2019-ISSUE-7.pdfJournal of Computational Analysis and Applications . ISSNno.’s:1521-1398 PRINT,1572-9206

G. Zeng et al.: Numerical solution of singular integral equation

where j = 1, 2, ..., n, xj = a + j(b − a)/n. We transformed the equations into theform of linear matrix as follows

(U +KU)A = f, (2.4)

where

U =

1 x1 · · · xm−11...

.... . .

...1 xn · · · xm−1n

, A =

a0...

am−1

, f =

f1...fn

, (2.5)

and K =∫ baκ(x, t)dt which is the integral operator.

Step 4. Solve the system we obtained the solutions of the coefficients of ak asfollows

a0, a1, ..., am−1.

Substituting them into eq.(2.1) we obtained the approximate solution φm(x).

3 Convergence and Error Analysis

In this section, we are going to prove that the approximate method we proposed inthis paper is convergent to the analytic solution of eq.(1.1).

Firstly, we rewrite the form of the weakly singular kernel as follows

K(x, t) =H(x, t)

|x− t|α.

Let 0 < α ≤ 12, and H(x, t) is continuously bounded. Then the eigenvalue

integral equation with weakly singular kernel is as follows

λφ(x) =

∫ b

a

K(x, t)φ(t)dt, 0 ≤ x ≤ 1, (3.1)

where K(x, t) is the weakly singular kernel, λ is the eigenvalue of the K(x, t), φ(x)is the eigenfunction of λ.

Lemma 3.1 [14]. If x1, x2 ∈ Cm,v(0, T ],m ∈ N, v < 1, then x1x2 ∈ Cm,v(0, T ],and

‖x1x2‖m,v ≤ c‖x1‖m,v‖x2‖m,vwith a constant c which is independent of x1 and x2.

Proof. See [14].Lemma 3.2 [18] Suppose that the function φm(x) obtained by the polynomi-

al basis function is the approximation of eq.(1) and eq.(1) is with bounded first

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 27, NO.7, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

1094 Guang Zeng ET AL 1091-1102

Page 23: Journal of Computational Analysis and Applicationseudoxuspress.com/images/JOCAAA-VOL-27-2019-ISSUE-7.pdfJournal of Computational Analysis and Applications . ISSNno.’s:1521-1398 PRINT,1572-9206

G. Zeng et al.: Numerical solution of singular integral equation

derivative, then eq.(1) can be expanded as an infinite sum of the polynomial basis

functions, that is, φ(x) =m−1∑k=0

ckxk, and the coefficients ck are bounded as

ck <K

(m+ 1)23k2

where K is a constant.Proof. See [18].Let the linear operator K : L1

[0,1] → L1[0,1]

(Kφ)(x) =

∫ 1

0

K(x, t)φ(t)dt, 0 ≤ x ≤ 1

then (3.1) can be written asKφ = λφ, (3.2)

using K operating two sides of (3.2) we yield

K2φ = λ2φ

where

K2φ(x) =

∫ 1

0

K2(x, t)φ(t)dt

and K2(x, t) is the iterative kernel of K(x, t)

K2(x, t) =

∫ 1

0

K1(x, r)K1(r, t)dr

K1(x, r) = K(x, r).

Theorem 3.3. Let φm(x) be the polynomial basis function of degree m − 1and whose coefficients has been obtained by solving linear system (2.4), the givenpolynomial basis function is converge to the analytical solution of the weak singularFredholm integral equations of the second kind (1.1), when m→∞.

Proof. Sinceφ(x) = lim

m→∞φm(x),

substitute φm(x) into eq.(1.1), we have

φm(x) + λ

∫ b

a

K(x, t)φm(t)dt = f(x), 0 ≤ x ≤ 1. (3.3)

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 27, NO.7, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

1095 Guang Zeng ET AL 1091-1102

Page 24: Journal of Computational Analysis and Applicationseudoxuspress.com/images/JOCAAA-VOL-27-2019-ISSUE-7.pdfJournal of Computational Analysis and Applications . ISSNno.’s:1521-1398 PRINT,1572-9206

G. Zeng et al.: Numerical solution of singular integral equation

We defined the error function ‖em‖ by subtracting (2.1) and (2.5) as follows

‖em‖ = ‖φm(x)− φ(x)‖+ |λ|‖∫ 1

0

‖K(x, t)‖ · ‖φm(t)− φ(t)‖dt‖,

According to lemma 3.1 and 3.2, since the subinterval of integral equation is compactand the coefficients obtained by the polynomial basis functions are bounded and thekernel K(x, t) can be continuous and bounded through iteration, therefore, whether

‖em‖ → 0

depends on‖φm(x)− φ(x)‖ → 0,

sinceφ(x) = lim

m→∞φm(x),

that is,‖em‖ → 0

when m→∞.Thus, the proof is completed. 2

Remark 3.4. When we use this method we can find that it is similar to thepiecewise linear spline function interpolation method which is convergent and nu-merical stable. The speed of the convergency is accelerated with the increasing ofthe degree m of the polynomial basis function.

4 Numerical Experiments

Example 1: Consider the following Fredholm integral equations of the second kindwith weakly singular kernel

φ(x)− 1

10

∫ 1

0

K(x, t)φ(t)dt = f(x), 0 ≤ x ≤ 1, (4.1)

where K(x, t) = |x− t|− 13 ,

f(x) = x2(1− x)2 − 27

30800[x

83 (54x2 − 126x+ 77) + (1− x)

83 (54x2 + 18x+ 5)].

the exact solution of eq.(4.1) is φ(x) = x2(1− x)2.Using the method we proposed in section 2 and the successive approximation

method and using MATLAB writing the program codes we obtained the figures andtables so that we can make a comparison for the accuracy of the two methods.

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 27, NO.7, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

1096 Guang Zeng ET AL 1091-1102

Page 25: Journal of Computational Analysis and Applicationseudoxuspress.com/images/JOCAAA-VOL-27-2019-ISSUE-7.pdfJournal of Computational Analysis and Applications . ISSNno.’s:1521-1398 PRINT,1572-9206

G. Zeng et al.: Numerical solution of singular integral equation

Figure 1: The nodes are 11, iterations are 6, The result of Successive approximation method and theanalytical solutions.

Figure 2: The nodes are 11, k=4, The result of Polynomial basis function method and the analyticalsolutions.

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 27, NO.7, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

1097 Guang Zeng ET AL 1091-1102

Page 26: Journal of Computational Analysis and Applicationseudoxuspress.com/images/JOCAAA-VOL-27-2019-ISSUE-7.pdfJournal of Computational Analysis and Applications . ISSNno.’s:1521-1398 PRINT,1572-9206

G. Zeng et al.: Numerical solution of singular integral equation

Firstly, we obtained the figures of the results of the Polynomial basis functionmethod and the successive approximation method

From the figures we can find that both of the curves of successive approximationmethod and the polynomial basis functions method are simulated very well, butthere is a defection of the numerical solution of successive approximation methodthat the singular point in the function can not be removed. But the polynomialbasis functions method almost accordant with the analytical solutions. Namely,the accuracy of polynomial basis functions method is better than the successiveapproximation methods.

Table 1: The comparison of the solutions of the two kinds of methods.Exact Successive Polynomial Basis

Node Solution Approximation Function Method0 0 -2.8235e-04 -1.136e-016

0.1 8.1000e-003 7.7634e-03 8.1000e-0030.2 2.5600e-002 2.5228e-02 2.5600e-0020.3 4.4100e-002 4.3685e-02 4.4100e-0020.4 5.7600e-002 5.7144e-02 5.7600e-0020.5 6.2500e-002 NaN 6.2500e-0020.6 5.7600e-002 5.7144e-02 5.7600e-0020.7 4.4100e-002 4.3685e-02 4.4100e-0020.8 2.5600e-002 2.5228e-02 2.5600e-0020.9 8.1000e-003 7.7634e-03 8.1000e-0031 0 -2.8235e-04 0

The Table 1 shows the results of the solutions of the example 1 using successiveapproximation method with the iterations k=8 and the polynomial basis functionmethod with the orders m=5 of the polynomial basis function, respectively. Fromthe table we can find that the results of the polynomial basis function method ismore approximate to the exact solutions than the successive approximation method.

From the Table 2 we can easily find that with the increasing of the iterationsof k, there is little increasing of the error accuracy of the successive approximationmethod. And it is obvious that there is a singular point of the discrete interval.

The Table 3 shows the errors accuracy results of the polynomial basis functionmethod when the orders of the polynomials are n=3,4,5,6, respectively. We canfind that the results is much superior than the successive approximation method.The best error effectiveness of successive approximation is O(10−4), but we obtainedthe high accuracy of the polynomial basis function method when the orders of thepolynomial basis functions is n = 5 and the effective errors have reached O(10−16),which is much better than the successive approximation methods.

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 27, NO.7, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

1098 Guang Zeng ET AL 1091-1102

Page 27: Journal of Computational Analysis and Applicationseudoxuspress.com/images/JOCAAA-VOL-27-2019-ISSUE-7.pdfJournal of Computational Analysis and Applications . ISSNno.’s:1521-1398 PRINT,1572-9206

G. Zeng et al.: Numerical solution of singular integral equation

Table 2: The error comparison of Successive Approximation methods.Node Exact solution k=2 k=4 k=6 k=8

0 0 9.2298e-03 6.6592e-05 2.7807e-04 2.8225e-040.1 8.1000e-03 1.0586e-02 7.7066e-05 3.3105e-04 3.3646e-040.2 2.5600e-02 1.1068e-02 1.1413e-04 3.6606e-04 3.7179e-040.3 4.4100e-02 1.1342e-02 1.5033e-04 4.0921e-04 4.1510e-040.4 5.7600e-02 1.1480e-02 1.8759e-04 4.4996e-04 4.5593e-040.5 6.2500e-02 NaN NaN NaN NaN0.6 5.7600e-02 1.1480e-02 1.8759e-04 4.4996e-04 4.5593e-040.7 4.4100e-02 1.1342e-02 1.5033e-04 4.0921e-04 4.1510e-040.8 2.5600e-02 1.1068e-02 1.1413e-04 3.6606e-04 3.7179e-040.9 8.1000e-03 1.0586e-02 7.7066e-05 3.3105e-04 3.3646e-041 0 9.2298e-03 6.6592e-05 2.7807e-04 2.8225e-04

Table 3: The error comparison of Polynomial basis function methods.Node Exact solution n=3 n=4 n=5 n=6

0 0 6.7365e-03 6.7365e-03 2.0322e-16 3.6580e-160.1 8.1000e-03 7.5301e-03 7.5301e-03 8.3267e-17 2.9490e-160.2 2.5600e-02 7.4263e-03 7.4263e-03 4.1633e-17 2.1164e-160.3 4.4100e-02 1.3522e-03 1.3522e-03 6.2450e-17 1.8041e-160.4 5.7600e-02 4.6922e-03 4.6922e-03 4.8572e-17 1.3184e-160.5 6.2500e-02 7.1071e-03 7.1071e-03 1.3878e-17 9.7145e-170.6 5.7600e-02 4.6922e-03 4.6922e-03 2.7756e-17 8.3267e-170.7 4.4100e-02 1.3522e-03 1.3522e-03 3.4694e-17 1.3878e-170.8 2.5600e-02 7.4263e-03 7.4263e-03 1.4572e-16 1.5613e-160.9 8.1000e-03 7.5301e-03 7.5301e-03 2.2204e-16 2.7756e-161 0 6.7365e-03 6.7365e-03 0 1.5260e-16

Example 2: Consider the following Fredholm integral equations of the secondkind with weakly singular kernel

φ(x)− 1

10

∫ 1

0

K(x, t)φ(t)dt = f(x), 0 ≤ x ≤ 1, (4.2)

where K(x, t) = |x− t|− 12 ,

f(x) = x2(1− x)2 − 27

30800[x

83 (54x2 − 126x+ 77) + (1− x)

83 (54x2 + 18x+ 5)].

We have not the exact solutions of the example 2, but we compared the accura-cy of the two methods through the error accuracy when the iterations increased of

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 27, NO.7, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

1099 Guang Zeng ET AL 1091-1102

Page 28: Journal of Computational Analysis and Applicationseudoxuspress.com/images/JOCAAA-VOL-27-2019-ISSUE-7.pdfJournal of Computational Analysis and Applications . ISSNno.’s:1521-1398 PRINT,1572-9206

G. Zeng et al.: Numerical solution of singular integral equation

Table 4: The error comparison of succcessive approximation methods.Node n=2 n=4 n=6 errors of (c3-c2) errors of (c4-c3)0.0139 5.5529e-04 7.8461e-04 7.9539e-04 2.2932e-04 1.0780e-050.0556 3.3207e-03 3.5784e-03 3.5903e-03 2.5772e-04 1.1917e-050.1250 1.2872e-02 1.3386e-02 1.3399e-02 5.1414e-04 1.2785e-050.2222 3.2102e-02 3.2388e-02 3.2402e-02 2.8611e-04 1.3450e-050.3472 5.4893e-02 5.5188e-02 5.5202e-02 2.9552e-04 1.3437e-050.5000 NaN NaN NaN NaN NaN0.6528 5.4893e-02 5.5188e-02 5.5202e-02 2.9552e-04 1.3437e-050.7778 3.2102e-02 3.2388e-02 3.2402e-02 2.8611e-04 1.3450e-050.8750 1.2872e-02 1.3386e-02 1.3399e-02 5.1414e-04 1.2785e-050.9444 3.3207e-03 3.5784e-03 3.5903e-03 2.5772e-04 1.1917e-050.9861 5.5529e-04 7.8461e-04 7.9539e-04 2.2932e-04 1.0780e-05

the successive approximation method and when the orders of the polynomial basisfunction increased, respectively. The column 2 to column 4 of Table 4 shows thesolutions of the method when the iterations k=2,4,6, respectively, and it shows theerror accuracy of the solutions of column 3 minus column 2 and column 4 minuscolumn 3 and we get column 5 and column 6, respectively. From the Table 4 we caneasily find that, with the increasing of the iterations of the successive approximationmethod, the error accuracy increased accordingly.

Table 5: The error comparison of polynomial basis function methods.Node n=4 n=5 n=6 errors of (c3-c2) errors of (c4-c3)0.0139 -1.2677e-04 6.3355e-03 6.3355e-03 6.4623e-03 1.8388e-160.0556 1.1224e-02 9.5719e-03 9.5719e-03 -1.6520e-03 3.1225e-170.1250 2.7883e-02 2.0391e-02 2.0391e-02 -7.4917e-03 -1.3878e-170.2222 4.6462e-02 4.0972e-02 4.0972e-02 -5.4890e-03 9.7145e-170.3472 6.2217e-02 6.5462e-02 6.5462e-02 3.2455e-03 1.8041e-160.5000 6.9050e-02 7.8091e-02 7.8091e-02 9.0411e-03 6.9389e-170.6528 6.2217e-02 6.5462e-02 6.5462e-02 3.2455e-03 -1.8041e-160.7778 4.6462e-02 4.0972e-02 4.0972e-02 -5.4890e-03 -1.0408e-160.8750 2.7883e-02 2.0391e-02 2.0391e-02 -7.4917e-03 2.0470e-160.9444 1.1224e-02 9.5719e-03 9.5719e-03 -1.6520e-03 4.5103e-170.9861 -1.2677e-04 6.3355e-03 6.3355e-03 6.4623e-03 -8.5001e-17

Table 5 shows the results of the solutions of the method we proposed in thispaper. It shows the results of the solutions of the proposed method from the column2 to column 4, and the error accuracy results obtained by column 3 minus column

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 27, NO.7, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

1100 Guang Zeng ET AL 1091-1102

Page 29: Journal of Computational Analysis and Applicationseudoxuspress.com/images/JOCAAA-VOL-27-2019-ISSUE-7.pdfJournal of Computational Analysis and Applications . ISSNno.’s:1521-1398 PRINT,1572-9206

G. Zeng et al.: Numerical solution of singular integral equation

2 and column 4 minus column 3 and we get column 5 and column 6, respectively.From the data of the table 5 we can easily find that the polynomial basis functionmethod is much superior than the successive approximation method. The best erroreffectiveness of successive approximation we finally obtained is O(10−5), but weobtained the high accuracy of the polynomial basis function method when we letn = 5 and the effective errors have reached O(10−16), which is much nearly to theexact solutions.

5 Acknowledgements

This research was supported in part by the National Natural Science Foundationof China(11661005,11301070,11661004), the Natural Science Foundation of JiangxiProvince of China, the Science Foundation of Education Committee of Jiangxi forYoung Scholar.

References

[1] Tricomi F.G., Integral Equations. Dover, New York, 1982.

[2] Lan X., Variational iteration method for solving integral equations. Comput.Math. Appl. 54:1071-1078, 2007.

[3] Babolian E., Sadeghi Goghary S., Abbasbandy S., Numerical solution of linearFredholm fuzzy integral equations of the second kind by Adomian method. Appl.Math. Comput. 161:733-744, 2005.

[4] Liao S.J., Beyond Perturbation: Introduction to the Homotopy Analysis Method.Chapman & Hall/CRC Press, Boca Raton, 2003.

[5] Abbanbandy S., Numerical solution of integral equations: homotopy pertur-bation method and Adomin’s decomposition methond. Appl. Math. Comput.161:733-744, 2006.

[6] Kanwal R.P., Liu K.C.: A Taylor expansion approach for soiving integral equa-tions. Int. J. Math. Educ. Sci. Technol. 2:411-414, 1989.

[7] Maleknejad K., Aghazadh N., Numerical solution of Volterra integral equation-s of the second kind with convolution kernel by using Taylor-series expansionmethod. Appl. Math. Comput. 161:915-922, 2005.

[8] Nas S,, Yalcynbas S., Sezer M., A Taylor polynomial approach for soving higher-order linear Fredholm integro-differential equations. Int. J. Math. Educt. Sci.Technol. 31:213-225, 2000.

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 27, NO.7, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

1101 Guang Zeng ET AL 1091-1102

Page 30: Journal of Computational Analysis and Applicationseudoxuspress.com/images/JOCAAA-VOL-27-2019-ISSUE-7.pdfJournal of Computational Analysis and Applications . ISSNno.’s:1521-1398 PRINT,1572-9206

G. Zeng et al.: Numerical solution of singular integral equation

[9] Babolian E., Masouri Z., Hatamzadeh-Varmazyar S., A direct method for nu-merically solving integral equations system using orthogonal triangular functions.lint. J. lind. Math. 2: 1365-145, 2009.

[10] Jafari H., Hosseinzadeh H., Mohamadzadeh S., Numerical solution system oflinear integral equations by using Legendre wavelets. lnt. J. Open probl. Comput.Sci. Math. 5:63-71, 2010.

[11] Farouki R.T., Goodman T.N.T., On the optimal stability of the Bernstein basis.Math. Comput. 65(216):1553-1566, 1996.

[12] Navot I., A further extension of the Euler-Maclaurin summation formula. J.Math. Phy., 41:155-163, 1962.

[13] Hochstadt H., Integral Equations. Wiley, New York, 1973.

[14] Brunner H., Pedas A., Vaainikko G., Piecewise polynomical collocation meth-ods for linear Volterra integro-differential equations with weakly singular kernels.SIAM J Numer Anal, 39(3):957-982, 2001.

[15] Kangro I., Kangro R., On the stability of piecewise polynomial collocationmethods for solving weakly singular integral equations of the second kind. MathModel Anal, 13(1): 29-36, 2008.

[16] Baratella P., Orsi A. P., A new approach to the numerical solution of weaklysingular Volterra integral equations. J Comput Appl Math, 163:401-418, 2004.

[17] Pallaw R., pedas A., Quadratic spline collocation for the smoothed weaklysingular Fredholm integral equations. Numer Funct Anal Optim, 30(9-10):1048-1064, 2009.

[18] M.A. Yan, L. Wang, H. Wang and X. Zhang, The reseach of eigenvalue numer-ical solution methods for weakly singular integral equation in L1 space, Mathe-matics in Practice and Theory, 43(2):199-207, 2013.

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 27, NO.7, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

1102 Guang Zeng ET AL 1091-1102

Page 31: Journal of Computational Analysis and Applicationseudoxuspress.com/images/JOCAAA-VOL-27-2019-ISSUE-7.pdfJournal of Computational Analysis and Applications . ISSNno.’s:1521-1398 PRINT,1572-9206

SHARP COEFFICIENT ESTIMATES FOR NON-BAZILEVIC FUNCTIONS

JI HYANG PARK, VIRENDRA KUMAR, AND NAK EUN CHO

Abstract. The class B(α) of non-Bazilevic functions was introduced by Obradovic. Later,estimates on the second coefficient and Fekete–Szego functional for normalized analytic func-tions in the class B(α) were investigated by Tuneski and Darus. In the present work,sharp estimate on third to eighth coefficients for normalized analytic functions f(z) =z + a2z

2 + a3z3 + · · · ∈ B(α) are investigated. Further sharp estimate on the functional

|a2a3 − a4| is also obtained.

1. Introduction

The class of analytic functions defined in the unit disk D := z ∈ C : |z| < 1 and havingthe Taylor series expansion of the form

f(z) = z + a2z2 + a3z

3 + · · · (1.1)

is denoted by A. The subclass of A consisting of univalent functions is denoted by S.De Branges, in 1984, proved that if f ∈ S, then |an| ≤ n. This result was put be-fore by Bieberbach in 1916 and is popularly known as the Bieberbach conjecture. Amongthe many subclasses of S, the class of starlike and convex functions are the most inves-tigated. The class of starlike and convex functions are defined, respectively, by S∗ :=f ∈ S : Re(zf ′(z)/f(z)) > 0 and K := f ∈ S : Re(1 + zf ′′(z)/f ′(z)) > 0. Thomas [15],in 1967, introduced a general form of the class of starlike functions. Thomas [15], for astarlike functions g, defined the class Bα := f ∈ S : Re(zf ′(z)f(z)α−1/g(z)α) > 0. Thisclass is popularly known as the class of Bazilevic functions of type α. In 1973, Singh [12]investigated a special case of Bα. For α ≥ 0 and setting g(z) = z, he considered a subclassof Bα defined by

B1(α) :=

f ∈ A : Re

(f ′(z)

(f(z)

z

)α−1)> 0

.

In his paper, he obtained the sharp radius estimates for certain integral operator to be amember of the class B1(α) and he also obtained the sharp upper bound on the first fourinitial coefficients. He also investigated the sharp bound on the Fekete-Szego functional forfunctions in this class. It should be noted that the class B1(1) is a subclass of close-to-convex

2010 Mathematics Subject Classification. 30C45, 30C50.Key words and phrases. Univalent function, Coefficient bound, Hankel determinant.

1

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 27, NO.7, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

1103 JI HYANG PARK ET AL 1103-1113

Page 32: Journal of Computational Analysis and Applicationseudoxuspress.com/images/JOCAAA-VOL-27-2019-ISSUE-7.pdfJournal of Computational Analysis and Applications . ISSNno.’s:1521-1398 PRINT,1572-9206

2 J. H. PARK, V. KUMAR, AND N. E. CHO

functions and hence univalent in D. Moreover, B1(0) = S∗. In 2015, Thomas [13] proved thesharp bound |a2a4 − a23| ≤ 4/(2 + α)2 for functions in the class B1(α) for α ∈ [0, 1]. In 2017,Marjono et al. [6] investigated the sharp upper bound on fifth and sixth coefficients. Theyalso conjectured that if f ∈ B1(α), then

|an| ≤2

n− 1 + α(n = 2, 3, 4, · · · )

holds for all α ≥ 1. This conjecture for the fifth coefficient, for certain range of α, was recentlysettled by Cho and Kumar [1]. For many results related to the Bazilevic functions we referthe reader to the papers [11,14,15,17] and the references cited therein. A class B(α, β) withstronger conditions was considered by Ponnusamy [8]. For α > 0 and 0 < β < 1, he defined

B(α, β) :=

f ∈ A :

∣∣∣∣∣f ′(z)

(f(z)

z

)α−1− 1

∣∣∣∣∣ < β

.

For the negative value of α ∈ (−1, 0), the class B(α, β) can be rewritten as

B(α, β) :=

f ∈ A :

∣∣∣∣∣f ′(z)

(z

f(z)

)α+1

− 1

∣∣∣∣∣ < β

.

This class was introduced and investigated by Obradovic, in 1998. He obtained the conditionson the parameter β that embeds this class into the class of starlike functions. Later in 2002,Tuneski and Darus [16], for 0 < α < 1, considered the class

B(α) :=

f ∈ A : Re

(f ′(z)

(z

f(z)

)α+1)> 0

.

This class, as mentioned by Obradovic in the conference “Computational Methods and Func-tion Theory 2001” is called to be class of functions of non-Bazilevic type, see [16]. Tuneskiand Darus investigated the sharp bounds on |a2| and the Fekete-Szego functional |a3 − µa22|.Some typographical errors in the result [16, Theorem 1, p. 64] were reported by Kumarand Kumar [5]. For a more general result and the correct version of their result one canrefer to [5]. Starlikeness of multivalent non-Bazilevic functions were investigated by Guo etal. [2]. Estimate on the second Hankel determinant for the class of functions f ∈ A satisfyingRe (f ′(z) (z/f(z))α) > 0 for α ∈ (0, 1/3] was obtained by Krishna and Reddy [4].

Motivated by the above works, in this paper, sharp bound on the third to eighth coefficientsof functions in the class B(α) are investigated. Moreover, sharp bound on the functional|a2a3 − a4| for functions in the class B(α) is also obtained.

Let P be the class of analytic functions having the Taylor series of the form p(z) =1 + p1z + p2z

2 + p3z3 + · · · and mapping the unit disk D onto the right-half of the complex

plane i.e. satisfying the condition Re p(z) > 0 (z ∈ D). Let B be the class of Schwarzfunctions consisting of analytic functions of the form w(z) = c1z + c2z

2 + c3z3 + · · · (z ∈ D)

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 27, NO.7, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

1104 JI HYANG PARK ET AL 1103-1113

Page 33: Journal of Computational Analysis and Applicationseudoxuspress.com/images/JOCAAA-VOL-27-2019-ISSUE-7.pdfJournal of Computational Analysis and Applications . ISSNno.’s:1521-1398 PRINT,1572-9206

SHARP COEFFICIENT ESTIMATES FOR NON-BAZILEVIC FUNCTIONS 3

and satisfying the condition |w(z)| < 1 for z ∈ D. The following correspondence between theclasses B and P holds:

p ∈ P if and only if w(z) =p(z)− 1

p(z) + 1∈ B. (1.2)

Comparing coefficients in (1.2), we have

c1 =p12, c2 =

2p2 − p214

, c3 =4p3 − 4p1p2 + p31

8, c4 =

8p4 − 8p1p3 − 4p22 + 6p21p2 − p4116

. (1.3)

Lemma 1.1. [3](see also [10]) If p ∈ P, then, for any complex number ν,

|p2 − νp21| ≤ 2 max1; |2ν − 1|and the equality holds for the functions given by

p(z) =1 + z2

1− z2and p(z) =

1 + z

1− z.

Consider the functional Ψ(µ, ν) = |c3+µc1c2+νc31| for w ∈ B and µ, ν ∈ R. Let us assumethat the symbols Ωk’s are defined as follows:

Ω1 :=

(µ, ν) ∈ R2 : |µ| ≤ 1/2, |ν| ≤ 1,

Ω2 :=

(µ, ν) ∈ R2 :

1

2≤ |µ| ≤ 2,

4

27(|µ|+ 1)3 − (|µ|+ 1) ≤ ν ≤ 1

,

Ω3 :=

(µ, ν) ∈ R2 : |µ| ≤ 1

2, ν ≤ −1

,Ω4 :=

(µ, ν) ∈ R2 : |µ| ≥ 1/2, ν ≤ −2

3(|µ|+ 1)

,

Ω5 :=

(µ, ν) ∈ R2 : |µ| ≤ 2, ν ≥ 1,Ω6 :=

(µ, ν) ∈ R2 : 2 ≤ |µ| ≤ 4, ν ≥ 1

12(µ2 + 8)

,

Ω7 :=

(µ, ν) ∈ R2 : |µ| ≥ 4, ν ≥ 2

3(|µ| − 1)

,

Ω8 :=

(µ, ν) ∈ R2 :

1

2≤ |µ| ≤ 2, −2

3(|µ|+ 1) ≤ ν ≤ 4

27(|µ|+ 1)3 − (|µ|+ 1)

,

Ω9 :=

(µ, ν) ∈ R2 : |µ| ≥ 2, −2

3(|µ|+ 1) ≤ ν ≤ 2|µ|(|µ|+ 1)

µ2 + 2|µ|+ 4

,

Ω10 :=

(µ, ν) ∈ R2 : 2 ≤ |µ| ≤ 4,

2|µ|(|µ|+ 1)

µ2 + 2|µ|+ 4≤ ν ≤ 1

12(µ2 + 8)

,

Ω11 :=

(µ, ν) ∈ R2 : |µ| ≥ 4,

2|µ|(|µ|+ 1)

µ2 + 2|µ|+ 4≤ ν ≤ 2|µ|(|µ| − 1)

µ2 − 2|µ|+ 4

,

Ω12 :=

(µ, ν) ∈ R2 : |µ| ≥ 4,

2|µ|(|µ| − 1)

µ2 − 2|µ|+ 4≤ ν ≤ 2

3(|µ| − 1)

.

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 27, NO.7, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

1105 JI HYANG PARK ET AL 1103-1113

Page 34: Journal of Computational Analysis and Applicationseudoxuspress.com/images/JOCAAA-VOL-27-2019-ISSUE-7.pdfJournal of Computational Analysis and Applications . ISSNno.’s:1521-1398 PRINT,1572-9206

4 J. H. PARK, V. KUMAR, AND N. E. CHO

The following result is due to Prokhorov and Szynal [9] which we need in our investigation.

Lemma 1.2. [9, Lemma 2, p. 128] If w ∈ B, then for any real numbers µ and ν, we have

|Ψ(µ, ν)| ≤

1, (µ, ν) ∈ Ω1 ∪ Ω2 ∪ (2, 1);

|ν|, (µ, ν) ∈7⋃

k=3

Ωk;

23(|µ|+ 1)

(|µ|+1

3(|µ|+ν+1)

)1/2, (µ, ν) ∈ Ω8 ∪ Ω9;

13ν(µ2−4µ2−4ν

)(µ2−43(ν−1)

)1/2, (µ, ν) ∈ Ω10 ∪ Ω11 \ (2, 1);

23(|µ| − 1)

(|µ|−1

3(|µ|−ν−1)

)1/2, (µ, ν) ∈ Ω12.

The extremal functions, up to rotations, are of the form

w1(z) = z3, w2(z) = z, w3(z) =z(t1 − z)

1− t1z, w4(z) =

z(t2 + z)

1 + t2z

and w5(z) = c1z + c2z2 + c3z

3 + · · · , where the parameters t1, t2 and the coefficients ci aregiven by

t1 =

(|µ|+ 1

3(|µ|+ ν + 1)

)1/2

, t2 =

(|µ| − 1

3(|µ| − ν − 1)

)1/2

, c1 =

(2ν(µ2 + 2)− 3µ2

3(ν − 1)(µ2 − 4ν)

)1/2

,

c2 = (1− c21)eiθ0 , c3 = −c1c2eiθ0 , θ0 = ± arccos

2

(ν(µ2 + 8)− 2(µ2 + 2)

2ν(µ2 + 2)− 3µ2

)1/2].

2. Coefficient Estimates

The following theorem gives the sharp estimates on |a3|, |a4| and on the functional |a2a3−a4| for functions in the class B(α).

Theorem 2.1. Let α0 ≈ 2.36, α1 ≈ 2.68 and α2 ≈ 2.71 are the smallest positive roots of theequations 3α4− 11α3 +α2 + 11α+ 20 = 0, α6− 11α5 + 56α4− 138α3 + 151α2− 7α− 148 = 0and α3 − 5α2 + 11α − 13 = 0, respectively. Let f ∈ B(α) has the from (1.1). Then, thefollowing sharp inequalities hold:

|a3| ≤

2

α−2 , if α ∈ (0, 3] \ 1, 2;2(α−3)

(α−2)(α−1)2 , if α > 3,(2.1)

|a4| ≤

2(α4−5α3+11α2−19α+36)

3(α−1)(α−2)(α−3) , if α ∈ (0, α0] \ 1, 2 or α2 ≤ α < 3;4(|a|−1)3/2

3(α−3)(|a|−b−1)1/2 , if α0 ≤ α ≤ α1;2(α−1)2(a2−4)3/2

(α−3)(a2−4b)(3(b−1))1/2 , if α1 ≤ α ≤ α2;2

α−3 , if 3 < α,

(2.2)

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 27, NO.7, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

1106 JI HYANG PARK ET AL 1103-1113

Page 35: Journal of Computational Analysis and Applicationseudoxuspress.com/images/JOCAAA-VOL-27-2019-ISSUE-7.pdfJournal of Computational Analysis and Applications . ISSNno.’s:1521-1398 PRINT,1572-9206

SHARP COEFFICIENT ESTIMATES FOR NON-BAZILEVIC FUNCTIONS 5

where a and b are given by

a := − 2(α− 5)

(α− 1)(α− 2)and b :=

α4 − 5α3 + 11α2 − 19α + 36

3(α− 1)3(α− 2).

Proof. Since f ∈ B(α), it follows that there exists p(z) = 1 +p1z+p2z2 +p3z

3 + · · · ∈ P suchthat

f ′(z)

(z

f(z)

)α+1

= p(z). (2.3)

Comparing coefficients of like-power terms in (2.3), we get

a2 = − p1α− 1

and a3 =(α− 2)(α + 1)p21 − 2(α− 1)2p2

2(α− 2)(α− 1)2. (2.4)

Now consider

a3 =(α− 2)(α + 1)p21 − 2(α− 1)2p2

2(α− 2)(α− 1)2

= − 1

α− 2

[p2 −

(α− 2)(α + 1)

2(α− 1)2p21

]. (2.5)

An application of Lemma 1.1 on (2.5), gives

|a3| ≤2

α− 2max

1;|α− 3|

(α− 1)2

which equivalently can be written as

|a3| ≤

2

α−2 , α ∈ (0, 3] \ 1, 2;2(α−3)

(α−2)(α−1)2 , α > 3.

This is the required bound on third coefficient as stated in the theorem. In the first case of(2.1), equality occurs for the function f0 ∈ B(α) defined by

f ′0(z)

(z

f0(z)

)α+1

=1 + z2

1− z2, (2.6)

whereas in the second case of (2.2), equality holds for the function f0 ∈ B(α) defined by

f0′(z)

(z

f0(z)

)α+1

=1 + z

1− z. (2.7)

Next we shall find the estimate on |a4|. From (2.3), we have

a4 =−(α− 3)(α− 2)(α + 1)(2α + 1)p31 + 6(α− 1)2(α− 3)(α + 1)p1p2 − 6(α− 2)(α− 1)3p3

6(α− 1)3(α− 2)(α− 3).

(2.8)

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 27, NO.7, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

1107 JI HYANG PARK ET AL 1103-1113

Page 36: Journal of Computational Analysis and Applicationseudoxuspress.com/images/JOCAAA-VOL-27-2019-ISSUE-7.pdfJournal of Computational Analysis and Applications . ISSNno.’s:1521-1398 PRINT,1572-9206

6 J. H. PARK, V. KUMAR, AND N. E. CHO

In view of the interconnections in (1.2) and (1.3), Eqn. (2.8) can be rewritten as:

a4 = −2 [(α4 − 5α3 + 11α2 − 19α + 36) c31 − 6(α− 5)(α− 1)2c1c2 + 3(α− 2)(α− 1)3c3]

3(α− 1)3(α− 2)(α− 3)(2.9)

or equivalently

a4 = − 2

α− 3

[c3 + ac1c2 + bc31

],

where the parameters a and b are given by

a := − 2(α− 5)

(α− 1)(α− 2)and b :=

α4 − 5α3 + 11α2 − 19α + 36

3(α− 1)3(α− 2). (2.10)

Assume that Ωi’s are defined as in Lemma 1.2 with the settings µ = a and ν = b. We nowproceed further in the proof with the following steps:

(1) Assume that α ≥ (√

73− 1)/2 ≈ 3.772. In this case, we see that −1/2 ≤ a ≤ 1/2 holds.Moreover, b ≤ 1 holds if and only if α4 − 5α3 + 8α2 − α − 15 ≥ 0, which holds for allα ≥ 3. Thus for all α ≥ (

√73− 1)/2, we conclude that (a, b) ∈ Ω1.

(2) Next assume that 3 < α ≤ (√

73− 1)/2. Then, we see that the condition −1/2 ≤ a ≤ 2holds for all such α and (4/27)(a + 1)3 − (a + 1) ≤ b ≤ 1 all α > 3. Therefore, for3 < α ≤ (

√73− 1)/2, we must have (a, b) ∈ Ω2.

(3) Let

α2 :=1

3

(3

√53 + 9

√41− 8

3√

53 + 9√

41+ 5

)≈ 2.71

and

α0 :=11

12+

1

12

√4 (22/3)

3

√8989 + 9

√14717 + 4

3

√35956− 36

√14717 + 113− 1

2

√C + D ≈ 2.36

with

C :=113

18− 1

9(22/3)

3

√8989 + 9

√14717− 1

9

3

√35956− 36

√14717,

and

D :=407

18

√4 (22/3)

3√

8989 + 9√

14717 + 43√

35956− 36√

14717 + 113

are the smallest positive roots of the equations α3 − 5α2 + 11α − 13 = 0 and 3α4 −11α3 + α2 + 11α + 20 = 0, respectively. Now assume that 0 < α < 1 or 2 < α ≤ α0.Then a ≥ 4 and b ≥ 2(a − 1)/3 hold and hence (a, b) ∈ Ω7. Moreover, a ≤ −1/2 andb ≤ −2(−a + 1)/3 holds whenever 1 < α < 2. Therefore, (a, b) ∈ Ω4 whence 1 < α < 2.Also it can be easily seen that 2 ≤ a ≤ 4 and b ≥ (a2 + 8)/12 hold for α2 ≤ α < 3.

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 27, NO.7, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

1108 JI HYANG PARK ET AL 1103-1113

Page 37: Journal of Computational Analysis and Applicationseudoxuspress.com/images/JOCAAA-VOL-27-2019-ISSUE-7.pdfJournal of Computational Analysis and Applications . ISSNno.’s:1521-1398 PRINT,1572-9206

SHARP COEFFICIENT ESTIMATES FOR NON-BAZILEVIC FUNCTIONS 7

(4) Let 2.69 ≈ (5 +√

33)/4 ≤ α ≤ α0. Then a and b satisfy 2 ≤ a ≤ 4 and

2a(a+ 1)

a2 + 2a+ 4≤ b ≤ a2 + 8

12.

Therefore, for this range of α, we see that (a, b) ∈ Ω10. Let α1 ≈ 2.68 is the smallestpositive root of α6 − 11α5 + 56α4 − 138α3 + 151α2 − 7α − 148 = 0. Further, whenα1 ≤ α ≤ (

√33 + 5)/4, the parameters a and b satisfy a ≥ 4 and

2a(a+ 1)

a2 + 2a+ 4≤ b ≤ 2a(a− 1)

a2 − 2a+ 4.

Hence, in view of Lemma 1.2, we have (a, b) ∈ Ω11.(5) Assume that α0 ≤ α ≤ α1. In this case, it is a simple matter to check that a ≥ 4 and

2a(a− 1)

a2 − 2a+ 4≤ b ≤ 2(a− 1)

3.

Therefore, Lemma 1.2 gives (a, b) ∈ Ω12.

In the light of the above discussions, an application of Lemma 1.2 gives the desired esti-mates on |a4|. In the first case of (2.2), the equality holds for the function f0 defined in (2.6),

whereas in the forth case of (2.2), the equality holds for the function function f0 defined in(2.7). In the case third of (2.2), the extremal function f1 is given by

f ′1(z)

(z

f1(z)

)α+1

=1 + w(z)

1− w(z)(2.11)

with choice of the Schwarz function (up to rotation) w(z) = c1z + c2z2 + c3z

3 + · · · ∈ B,where the coefficients ci are given by

c1 =

(2b(a2 + 2)− 3a2

3(b− 1)(a2 − 4b)

)1/2

, c2 = (1− c21)eiθ0 , c3 = −c1c2eiθ0 ,

with

θ0 = ± arccos

[a

2

(b(a2 + 8)− 2(a2 + 2)

2b(a2 + 2)− 3a2

)1/2],

where a and b are given by (2.10). Finally, in the second case of (2.2), the equality holds for

the function f1 defined by

f ′1(z)

(z

f1(z)

)α+1

=1 + w(z)

1− w(z)(2.12)

with the Schwarz function given by w(z) = z(κ+ z)/(1 + κz), where

κ :=

(|a| − 1

3 (|a| − b− 1)

)1/2

.

This completes the proof.

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 27, NO.7, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

1109 JI HYANG PARK ET AL 1103-1113

Page 38: Journal of Computational Analysis and Applicationseudoxuspress.com/images/JOCAAA-VOL-27-2019-ISSUE-7.pdfJournal of Computational Analysis and Applications . ISSNno.’s:1521-1398 PRINT,1572-9206

8 J. H. PARK, V. KUMAR, AND N. E. CHO

The following theorem provides sharp bound on the fifth, sixth, seventh and eighth coeffi-cients for functions in the class B(α).

Theorem 2.2. Let us denote

Ψ := 2α6 − 28α5 + 137α4 − 331α3 + 437α2 − 433α + 360,

Ψ := −6α9+96α8−674α7+2836α6−8942α5+22504α4−40886α3+45124α2−30132α+21600,

χ := 23α12 − 756α11 + 10218α10 − 77686α9 + 376014α8 − 1243398α7 + 2969824α6

− 5401638α5 + 7729083α4 − 8432486α3 + 6389238α2 − 3333636α + 1360800,

and

χ := −(45α15− 1530α14 + 23641α13− 221500α12 + 1438032α11− 7061480α10 + 27696314α9

− 88000680α8 + 222370901α7 − 435300650α6 + 653299149α5 − 763502860α4

+ 703545502α3 − 473136900α2 + 206026416α− 76204800).

If f ∈ B(α) has the from (1.1), then for 0 < α < 1, the following sharp inequalities hold:

|a5| ≤2Ψ

3(α− 4)(α− 3)(α− 2)2(α− 1)4,

|a6| ≤Ψ

15(α− 5)(α− 4)(α− 3)(α− 2)2(α− 1)5,

|a7| ≤2χ

45(α− 6)(α− 5)(α− 4)(α− 3)2(α− 2)3(α− 1)6

and

|a8| ≤2χ

315(α− 7)(α− 6)(α− 5)(α− 4)(α− 3)2(α− 2)3(α− 1)7.

Proof. From (2.3), on comparing the coefficients, we have

a5 =τ1p4 + τ2p

21p2 + τ3p

22 + τ4p1p3 + τ5p

41

24(α− 4)(α− 3)(α− 2)2(α− 1)4, (2.13)

where τi’s are given by

τ1 := −24(α− 3)(α− 2)2(α− 1)4, τ2 := −12(α− 4)(α− 3)(α− 2)(α− 1)2(α + 1)(2α + 1),

τ3 := 12(α− 3)(α− 4)(α− 1)4(α + 1), τ4 := 24(α− 4)(α− 2)2(α− 1)3(α + 1),

τ5 := (α− 4)(α− 3)(α− 2)2(α + 1)(2α + 1)(3α + 1).

Similarly, the sixth coefficient is given by

a6 = − τ1p5 + τ2p22p1 + τ3p2p3 + τ4p

31p2 + τ5p

21p3 + τ6p1p4 + τ7p

51

120(α− 5)(α− 4)(α− 3)(α− 2)2(α− 1)5, (2.14)

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 27, NO.7, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

1110 JI HYANG PARK ET AL 1103-1113

Page 39: Journal of Computational Analysis and Applicationseudoxuspress.com/images/JOCAAA-VOL-27-2019-ISSUE-7.pdfJournal of Computational Analysis and Applications . ISSNno.’s:1521-1398 PRINT,1572-9206

SHARP COEFFICIENT ESTIMATES FOR NON-BAZILEVIC FUNCTIONS 9

where τi’s are defined by

τ1 := 120(α− 4)(α− 3)(α− 2)2(α− 1)5, τ2 := 60(α− 5)(α− 4)(α− 3)(α− 1)4(α+ 1)(2α+ 1),

τ3 := −120(α− 5)(α− 4)(α− 2)(α− 1)5(α + 1),

τ4 := −20(α− 5)(α− 4)(α− 3)(α− 2)(α− 1)2(α + 1)(2α + 1)(3α + 1),

τ5 := 60(α− 5)(α− 4)(α− 2)2(α− 1)3(α + 1)(2α + 1),

τ6 := −120(α− 5)(α− 3)(α− 2)2(α− 1)4(α + 1),

τ7 := (α− 5)(α− 4)(α− 3)(α− 2)2(α + 1)(2α + 1)(3α + 1)(4α + 1).

To find the estimate on |a5|, we observe from (2.13) that the coefficients τi (i = 1, 2, 3,4, 5, 6, 7) of p4, p

21p2, p

22, p1p3 and p41 are positive. Hence applying triangle inequality in (2.13)

and using the fact that |pj| ≤ 2, we get the required estimate on |a5|. A similar argumentcan be used to obtained the estimates on |a6|, |a7| and |a8|. In all the cases, equality hold

for the function f0 given by (2.7). This completes the proof.

The following theorem gives the sharp bound on the functional |a2a3−a4| for the functionsin the class B(α).

Theorem 2.3. Let f ∈ B(α) has the form (1.1). Then, the following sharp result holds:

|a2a3 − a4| ≤

2(α3−4α2+α+18)

3(α−1)2(α−2)(α−3) , if α ∈ (0, 2) \ 1;2(α3−4α2+α+18)

3(α−1)2(α−2)(3−α) , if 2 < α < 3;2

α−3 , if α > 3.

(2.15)

Proof. Proceeding as in the proof of previous theorem and using (2.4) and (2.9), we can write

a2a3 − a4 =2 [(α3 − 4α2 + α + 18) c31 + 12(α− 1)c1c2 + 3(α− 2)(α− 1)2c3]

3(α− 3)(α− 2)(α− 1)2. (2.16)

By setting

s :=4

(α− 1)(α− 2)and t :=

α3 − 4α2 + α + 18

3(α− 2)(α− 1)2

the expression in (2.16) can be written as

a2a3 − a4 =2

α− 3

[c3 + sc1c2 + tc31

].

Assume that the symbols Ωi’s are as defined in Lemma 1.2 with the settings µ = s andν = t. Now the proof is accomplished in the following steps:

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 27, NO.7, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

1111 JI HYANG PARK ET AL 1103-1113

Page 40: Journal of Computational Analysis and Applicationseudoxuspress.com/images/JOCAAA-VOL-27-2019-ISSUE-7.pdfJournal of Computational Analysis and Applications . ISSNno.’s:1521-1398 PRINT,1572-9206

10 J. H. PARK, V. KUMAR, AND N. E. CHO

(1) Let (3 +√

33)/2 ≤ α. Then it can be easily verified that

−1

2≤ s ≤ 1

2and − 1 ≤ t ≤ 1.

Therefore, for the range (3 +√

33)/2 ≤ α, we have (s, t) ∈ Ω1. Further, when 3 < α ≤(3 +

√33)/2, wee see that (s, t) ∈ Ω2.

(2) Let 0 < α < 1 or 1 < α < 2. Then in a similar way we have (s, t) ∈ Ω4. Further if(3 +

√5)/2 ≤ α < 3, then (s, t) ∈ Ω6 and when 2 < α ≤ (3 +

√5)/2, then (s, t) ∈ Ω7.

In the light of the above discussions, an application of Lemma 1.2, establish the requiredestimate on |a2a3 − a4|. In the first two cases of (2.15), the equality hold for the function

f0 ∈ B(α) defined by (2.7). In the third case of (2.15), the equality holds for the function f2defined by

f ′2(z)

(z

f2(z)

)α+1

=1 + z3

1− z3. (2.17)

This completes the proof.

Remark 2.4. It would be interesting to find out the sharp bound on |ai| (i = 5, 6, 7, 8) for the

functions f ∈ B(α) in the case when α > 1.

Acknowledgement

The second author was supported by the Basic Science Research Program through theNational Research Foundation of Korea (NRF) funded by the Ministry of Education, Scienceand Technology (No. 2016R1D1A1A09916450).

References

[1] N. E. Cho and V. Kumar, On a coefficient conjecture for Bazilevic functions, preprint.[2] L. Guo, Y. Ling and G. Bao, On the starlikeness for the class of multivalent non-Bazilevic functions,

South Asian Journal of Mathematics 3 (2013), no. 1, 67–70.[3] F. R. Keogh and E. P. Merkes, A coefficient inequality for certain classes of analytic functions, Proc.

Amer. Math. Soc. 20 (1969), 8–12.[4] D. V. Krishna and T. R. Reddy, An upper bound to the second Hankel functional for non-Bazilevic

functions, Far East J. Math. Sci. 67 (2012), no. 2, 187–199.[5] S. S. Kumar and V. Kumar, Fekete-Szego problem for a class of analytic functions defined by convolution,

Tamkang J. Math. 44 (2013), no. 2, 187–195.[6] Marjono, J. Sokol and D. K. Thomas, The fifth and sixth coefficients for Bazilevic functions B1(α),

Mediterr. J. Math. 14 (2017), no. 4, Art. ID. 158, 11 pp.[7] M. Obradovic, A class of univalent functions, Hokkaido Math. J. 27 (1998), no. 2, 329–335.[8] S. Ponnusamy, Convolution properties of some classes of meromorphic univalent functions, Proc. Indian

Acad. Sci. Math. Sci. 103 (1993), no. 1, 73–89.[9] D. V. Prokhorov and J. Szynal, Inverse coefficients for (α, β)-convex functions, Ann. Univ. Mariae

Curie-Sk lodowska Sect. A 35 (1981), 125–143.

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 27, NO.7, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

1112 JI HYANG PARK ET AL 1103-1113

Page 41: Journal of Computational Analysis and Applicationseudoxuspress.com/images/JOCAAA-VOL-27-2019-ISSUE-7.pdfJournal of Computational Analysis and Applications . ISSNno.’s:1521-1398 PRINT,1572-9206

SHARP COEFFICIENT ESTIMATES FOR NON-BAZILEVIC FUNCTIONS 11

[10] V. Ravichandran, Y. Polatoglu, M. Bolcal and A. Sen, Certain subclasses of starlike and convex functionsof complex order, Hacet. J. Math. Stat. 34 (2005), 9–15.

[11] T. Sheil-Small, On Bazilevic functions, Quart. J. Math. Oxford Ser. 23 (1972), no. 2, 135–142.[12] R. Singh, On Bazilevic functions, Proc. Amer. Math. Soc. 38 (1973), 261–271.[13] D. K. Thomas, On the coefficients of Bazilevic functions with logarithmic growth, Indian J. Math. 57

(2015), no. 3, 403–418.[14] D. K. Thomas, On a subclass of Bazilevic functions, Internat. J. Math. Math. Sci. 8 (1985), no. 4,

779–783.[15] D. K. Thomas, On starlike and close-to-convex univalent functions, J. London Math. Soc. 42 (1967),

427–435.[16] N. Tuneski and M. Darus, Fekete-Szego functional for non-Bazilevic functions, Acta Math. Acad. Paed-

agog. Nyhazi. (N.S.) 18 (2002), no. 2, 63–65.[17] J. Zamorski, On Bazilevic schlicht functions, Ann. Polon. Math. 12 (1962), 83–90.

(J. H. Park) Department of Applied Mathematics, Pukyong National University, Busan48513, South Korea

E-mail address: [email protected]

(V. Kumar) Department of Applied Mathematics, Pukyong National University, Busan48513, South Korea

E-mail address: [email protected]

(N. E. Cho) Corresponding Author, Department of Applied Mathematics, Pukyong Na-tional University, Busan 48513, South Korea

E-mail address: [email protected]

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 27, NO.7, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

1113 JI HYANG PARK ET AL 1103-1113

Page 42: Journal of Computational Analysis and Applicationseudoxuspress.com/images/JOCAAA-VOL-27-2019-ISSUE-7.pdfJournal of Computational Analysis and Applications . ISSNno.’s:1521-1398 PRINT,1572-9206

A new extragradient method for the split feasibility

and fixed point problems ∗

Ming Zhao1†and Yunfei Du2

1School of Science, China University of Geosciences(Beijing), Beijing 100083, China

2LMIB-School of Mathematics and Systems Science, Beihang University, Beijing 100191, China

Abstract: In this paper, we propose a new extragradient method with regular-ization for finding a common element of the solution set Γ of the split feasibilityproblem and the set Fix(S) of fixed points of a nonexpansive mapping S in infinite-dimensional Hilbert spaces, combining the regularization method and the techniqueof averaged operator, we prove the sequences generated by the proposed algorithmconverge weakly to an element of Fix(S)

∩Γ under mild conditions.

Keywords: split feasibility problem , extragradient, regularization.

1. IntroductionThroughout this paper, let H be a Hilbert space, ⟨·, ·⟩ denotes the inner product, and

∥ · ∥ denotes for the corresponding norm. The split feasibility problem (SFP) which was firstintroduced by Censor and Elfving [1] in 1994 for modeling inverse problems arising from phaseretrievals and in medical image reconstruction. Let C and Q be closed convex sets in theinfinite-dimensional real Hilbert spaces H1 and H2, respectively. The SFP is to find a vector x∗

satisfyingx∗ ∈ C such that Ax∗ ∈ Q, (1.1)

where A ∈ B(H1,H2) which denotes the family of all bounded linear operators from H1 to H2.Some related work in the infinite-dimensional setting can be found in [2, 3, 4, 5, 9, 10, 12] andthe references therein.

Many methods have been developed to solve the SFP, The basic algorithm have CQ algorithmproposed by Byrne [2], the relaxed CQ algorithm proposed by Yang [9], the half-space relaxationprojection method proposed by Qu and Xiu [11], the variable Krasnosel skii-Mann algorithmproposed by Xu [12]. The projections of a point onto C and Q are difficult to compute whenC and Q fail to have closed-form expressions, though theoretically we can prove the (weak)convergence of the algorithm.

Very recently, Xu [6] gave a continuation of the study on the CQ algorithm and its conver-gence. He applied Mann’s algorithm to the SFP and proposed an averaged CQ algorithm whichwas proved to be weakly convergent to a solution of the SFP. On the other hand, Korpelevich

∗This work was supported by the Fundamental Research Funds for the Central Universities.†Corresponding Author. Email address: [email protected](M.Zhao)

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 27, NO.7, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

1114 Ming Zhao ET AL 1114-1123

Page 43: Journal of Computational Analysis and Applicationseudoxuspress.com/images/JOCAAA-VOL-27-2019-ISSUE-7.pdfJournal of Computational Analysis and Applications . ISSNno.’s:1521-1398 PRINT,1572-9206

[7] introduced the so-called extragradient method for finding a solution of a saddle point prob-lem. He proved that the sequences generated by the proposed iterative algorithm converge to asolution of a saddle.

Motivated by the idea of an extragradient method, Nadezhina and Takahashi [8] introducedan iterative algorithm for finding a common element of the set of fixed points of a nonexpansivemapping and the solution set of a variational inequality problem [13] for a monotone, Lipschitzcontinuous mapping in a real Hilbert space. They obtained a weak convergence theorem for twosequence generated by the proposed algorithm.

In our paper, we introduce and analyze a new extragradient iterative algorithm to find acommon element of the solution set Γ of the split feasibility problem and the set Fix(S) of fixedpoints of a nonexpansive mapping S in infinite-dimensional Hilbert spaces, furthermore, weprove its convergence. The results of this paper represent the improvement of the correspondingresults in [6] and [14].

2. PreliminariesThroughout this paper, we use xn → x and xn x to denote strong and weak convergence

to x of the sequence xn, respectively. Let K be a nonempty closed convex subset of H. Recallthat the projection (nearest point or metric) from H onto K, denoted by PK , is defined in sucha way that, for each x ∈ H, PKx is the unique point in K with the property

∥ x− PKx ∥= infy∈K

∥ x− y ∥=: d(x,K),

i.e.PK(x) = argmin∥ x− y ∥| y ∈ K.

Some important properties of projections are gathered in the following Lemma.Lemma 2.1 For given x ∈ H and z ∈ K, the following properties hold:(1) x ∈ K ⇔ PK(x) = x;(2) ⟨x− PK(x), z − PK(x)⟩ ≤ 0, ∀x ∈ H and ∀z ∈ K;(3) ⟨x− y, PK(x)− PK(y)⟩ ≥ ∥PK(x)− PK(y)∥2, ∀x, y ∈ H;(4) ∥PK(x)− z∥2 ≤ ∥x− z∥2 − ∥PK(x)− x∥2, ∀x ∈ H and ∀z ∈ K;(5) ∥PK(x)− PK(y)∥ ≤ ∥x− y∥, ∀x, y ∈ H.Proof. See Facchinei and Pang [15].Definition 2.1 Let T be a mapping from K ⊆ H into H, then(a) T is called monotone on K if

⟨T (x)− T (y), x− y⟩ ≥ 0, ∀ x, y ∈ K.

(b) T is called strongly monotone on K if there is a µ > 0, such that

⟨T (x)− T (y), x− y⟩ ≥ µ∥x− y∥2, ∀ x, y ∈ K.

(c) F is called co-coercive (or ν-inverse strongly monotone) on K if there is a ν > 0, such that

⟨T (x)− T (y), x− y⟩ ≥ ν∥T (x)− T (y)∥2, ∀ x, y ∈ K.

(d) F is called pseudo-monotone on K if

⟨T (y), x− y⟩ ≥ 0 ⇒ ⟨T (x), x− y⟩ ≥ 0, ∀ x, y ∈ K.

(e) T is called Lipschitz continuous on K if there exists a constant L > 0 such that

∥T (x)− T (y)∥ ≤ L∥x− y∥, ∀ x, y ∈ K.

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 27, NO.7, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

1115 Ming Zhao ET AL 1114-1123

Page 44: Journal of Computational Analysis and Applicationseudoxuspress.com/images/JOCAAA-VOL-27-2019-ISSUE-7.pdfJournal of Computational Analysis and Applications . ISSNno.’s:1521-1398 PRINT,1572-9206

Definition 2.2 A mapping T : H → H is said to be:(a) nonexpansive if

∥ Tx− Ty ∥≤∥ x− y ∥, ∀x, y ∈ H;

(b) firmly nonexpansive if 2T − I is nonexpansive, or equivalently,

⟨x− y, Tx− Ty⟩ ≥∥ Tx− Ty ∥, ∀x, y ∈ H,

or alternatively, T is firmly nonexpansive if and only if T can be expressed as

T =1

2(I + S)

where S : H → H is nonexpansive.Remark 2.1 From Lemma 2.1 and Definition 2.1-2.2, we can infer that if S is nonexpansive,then I-S is monotone; A monotone mapping is pseudo-monotone mapping; An inverse stronglymonotone mapping is monotone and Lipschitz continuous; A Lipschitz continuous and stronglymonotone mapping is an inverse strongly monotone mapping; The projection operator is 1-ismand nonexpansive.Lemma 2.2 A mapping T is 1-ism if and only if the mapping I-T is 1-ism, where I is theidentity operator.Proof. See [16, Lemma 2.3].Remark 2.2 If T is an inverse strongly monotone mapping, then T is a nonexpansive mapping.

Definition 2.3 A mapping T : H → H is said to be an averaged mapping if it can be writtenas the average of the identity I and a nonexpansive mapping S, that is,

T = (1− α)I + αS (2.1)

where α ∈ (0, 1) and S : H → H is nonexpansive. More precisely, when (2.1) holds, we say thatT is α-averaged. Thus firmly nonexpansive mappings (for example, projections) are 1

2 -averagedmappings.Proposition 2.1 ([16]). Let T : H → H be a given mapping:(1) T is nonexpansive if and only if the complement I-T is 1

2 -ism.(2) If T is µ-ism, then for γ > 0, γT is ν

γ -ism.

(3) T is averaged if and only if the complement I-T is ν-ism for some ν > 12 . Indeed, for

α ∈ (0, 1), T is α-averaged if and only if I-T is 12α -ism.

Proposition 2.2 ([16, 17]). Let S, T, V : H → H be given operators.(1) If T = (1− α)S + αV for some α ∈ (0, 1) and if S is averaged and V is nonexpansive, thenT is averaged.(2) T is firmly nonexpansive if and only if the complement I-T is firmly nonexpansive.(3) If T = (1 − α)S + αV for some α ∈ (0, 1) and if S is firmly nonexpansive and V isnonexpansive, then T is averaged.(4) The composite of finitely many averaged mappings is averaged. That is, if each of themappings TiNi=1 is averaged, then so is the composite T1 · · · TN . In particular, if T1 is α1-averaged and T2 is α2-averaged, where α1, α2 ∈ (0, 1), then the composite T1 T2 is α-averaged,where α = α1 + α2 − α1α2.(5) If the mapping TiNi are averaged and have a common fixed point, then

N∩i=1

Fix(Ti) = Fix(T1 · · · TN ).

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 27, NO.7, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

1116 Ming Zhao ET AL 1114-1123

Page 45: Journal of Computational Analysis and Applicationseudoxuspress.com/images/JOCAAA-VOL-27-2019-ISSUE-7.pdfJournal of Computational Analysis and Applications . ISSNno.’s:1521-1398 PRINT,1572-9206

The notation Fix(T ) denotes the set of all fixed points of the mapping T , that is Fix(T ) = x ∈H : Tx = x.

The so-called demiclosedness principle plays an important role in our argument.Definition 2.4 Let T : H → H be an operator. We say that I-T is demiclosed (at zero), if forany sequence xn in H, there holds the following implication:

xn x and (I-T )xn → 0 ⇒ (I-T )x = 0.

Lemma 2.3 ([18]). Let H be a Hilbert space. Then for all x, y ∈ H and λ ∈ [0, 1],

∥ λx+ (1− λ)y ∥2= λ ∥ x ∥2 +(1− λ) ∥ y ∥2 −λ(1− λ) ∥ x− y ∥2 .

Lemma 2.4 ([19]). Let an∞n=1, bn∞n=1 and δn∞n=1 be sequences of nonnegative real numberssatisfying the inequality

an+1 ≤ (1 + δn)an + bn, ∀n ≥ 1.

If∑∞

n=1 δn <∞ and∑∞

n=1 bn <∞, then limn→∞ an exists.Corollary 2.1 ([20]). Let an∞n=1 and bn∞n=1 be two sequences of nonnegative real numberssatisfying the inequality

an+1 ≤ an + bn, ∀n ≥ 1.

If∑∞

n=1 bn <∞, then limn→∞ an exists.Recall that a Banach space X is said to satisfy the Opial condition [22] if for any sequence

xn in X the condition that xn converges weakly to x ∈ X implies that the inequality

lim infn→∞

∥ xn − x ∥< lim infn→∞

∥ xn − y ∥

holds for every y ∈ X with y = x.It is well-known that every Hilbert space satisfies the Opial condition.

3. Main resultsThroughout this paper, we assume that the SFP is consistent, that is, the solution set Γ of

the SFP is nonempty.It is easy to see that SFP is equivalent to the following minimization problem

minx∈C

f(x) :=1

2∥Ax− PQAx∥2, (3.1)

where f : H1 → R is a continuous differentiable function, however it is ill-posed. Therefore, Xu[6] considered the following Tikhonov regularized problem:

minx∈C

fα(x) :=1

2∥Ax− PQAx∥2 +

1

2α∥x∥2, (3.2)

where α > 0 is the regularization parameter.We observe that the gradient

∇fα(x) = ∇f(x) + αI = A∗(I − PQ)A+ αI (3.3)

is (α+ ∥A∥2)-Lipschitz continuous and α-strongly monotone.Proposition 3.1 ([21]) Given x∗ ∈ H1, the following statements are equivalent:(1) x∗ solves the SFP;(2) x∗ solves the fixed point equation

PC(I − λ∇f) = PC [I − λA∗(I − PQ)A]x∗ = x∗ (3.4).

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 27, NO.7, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

1117 Ming Zhao ET AL 1114-1123

Page 46: Journal of Computational Analysis and Applicationseudoxuspress.com/images/JOCAAA-VOL-27-2019-ISSUE-7.pdfJournal of Computational Analysis and Applications . ISSNno.’s:1521-1398 PRINT,1572-9206

(3) x∗ solves the variational inequality problem (VIP) of finding x∗ ∈ C such that

⟨∇f(x∗), x− x∗⟩ ≥ 0, ∀x ∈ C, (3.5)

where ∇f = A∗(I − PQ)A and A∗ is the adjoint of A.Remark 3.1. It is clear from Proposition 3.1 that

Γ = Fix(PC(I − λ∇f)) = V I(C,∇f)

for any λ > 0, where Fix(PC(I −λ∇f)) and V I(C,∇f) denote the set of fixed points of PC(I −λ∇f) and the solution set of VIP(3.5).

Next, we will present our method for solving the SFP and prove its convergence.Theorem 3.1 Let S : C → C be a nonexpansive mapping such that Fix(S) ∩ Γ = ∅ in Hilbertspace. Let xn, yn and zn be the sequences in C generated by the following extragradientalgorithm:

x0 ∈ C chosen arbitrarily,zn = (1− γn)xn + γnPC(I − λn∇fαn)xn,yn = (1− βn)zn + βnSPC(I − λnfαn)zn,xn+1 = (1− µn)yn + µnSPC(I − λn∇fαn)yn, ∀n > 0,

(3.6)

where the sequences of parameters αn, βn, γn and µn satisfy the following conditions:(a)

∑∞n=1 αn <∞;

(b) λn ⊂(0, 1

∥A∥2)and 0 < lim infn→∞ λn ≤ lim supn→∞ λn <

1∥A∥2 ;

(c) γn ⊂ (0, 1), and 0 < lim infn→∞ γn ≤ lim supn→∞ γn < 1;(d) βn ⊂ (0, 1), and 0 < lim infn→∞ βn ≤ lim supn→∞ βn < 1;(e) µn ⊂ (0, 1), and 0 < lim infn→∞ µn ≤ lim supn→∞ µn < 1.Then, the sequences xn, yn and zn are all converge weakly to an element x ∈ Fix(S)

∩Γ.

Proof. It [21] has been proved PC(I − λ∇fα) is ζ-averaged for each λ ∈(0, 2

α+∥A∥2), where

ζ =2+λ(α+∥A∥2)

4 , so PC(I−λ∇fα) is nonexpansive. Furthermore, for λn ⊂(0, 1

∥A∥2), we have

0 < lim infn→∞

λn ≤ lim supn→∞

λn <1

∥A∥2= lim

0→∞

1

αn + ∥A∥2.

Without loss of generality, we may assume that

0 < lim infn→∞

λn ≤ lim supn→∞

λn <1

αn + ∥A∥2, ∀n ≥ 0.

Consequently, PC(I − λn∇fαn) is ζn-averaged for each integer n ≥ 0, where

ζn =2 + λn(αn + ∥A∥2)

4∈ (0, 1).

This implies that PC(I − λn∇fαn) is nonexpansive for all n ≥ 0.Next, we show the sequences xn, yn, zn generated in Theorem 3.1 are bounded.

Indeed, take a fixed p ∈ Fix(S)∩Γ arbitrarily. Then, we get Sp = p and PC(I − λ∇f)p = p for

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 27, NO.7, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

1118 Ming Zhao ET AL 1114-1123

Page 47: Journal of Computational Analysis and Applicationseudoxuspress.com/images/JOCAAA-VOL-27-2019-ISSUE-7.pdfJournal of Computational Analysis and Applications . ISSNno.’s:1521-1398 PRINT,1572-9206

λ ∈(0, 1

∥A∥2). From (3.6), it follows that

∥zn − p∥ = ∥(1− γn)(xn − p) + γn[PC(I − λn∇fαn)xn − p]∥≤ (1− γn)∥xn − p∥+ γn∥PC(I − λn∇fαn)xn − p∥= (1− γn)∥xn − p∥+ γn∥PC(I − λn∇fαn)xn − PC(I − λn∇f)p∥= (1− γn)∥xn − p∥+ γn∥PC(I − λn∇fαn)xn − PC(I − λn∇fαn)p

+PC(I − λn∇fαn)p− PC(I − λn∇f)p∥≤ (1− γn)∥xn − p∥+ γn(∥PC(I − λn∇fαn)xn − PC(I − λn∇fαn)p∥

+∥PC(I − λn∇fαn)p− PC(I − λn∇f)p∥)≤ (1− γn)∥xn − p∥+ γn(∥xn − p∥+ ∥(I − λn∇fαn)p− (I − λn∇f)p∥)= ∥xn − p∥+ λnαnγn∥p∥,

(3.7)

∥yn − p∥ = ∥(1− βn)(zn − p) + βn[SPC(I − λn∇fαn)zn − p]∥≤ (1− βn)∥zn − p∥+ βn∥PC(I − λn∇fαn)zn − p∥= (1− βn)∥zn − p∥+ βn∥PC(I − λn∇fαn)zn − PC(I − λn∇f)p∥= (1− βn)∥zn − p∥+ βn∥PC(I − λn∇fαn)zn − PC(I − λn∇fαn)p

+PC(I − λn∇fαn)p− PC(I − λn∇f)p∥≤ (1− βn)∥zn − p∥+ βn(∥PC(I − λn∇fαn)zn − PC(I − λn∇fαn)p∥

+∥PC(I − λn∇fαn)p− PC(I − λn∇f)p∥)≤ (1− βn)∥zn − p∥+ βn(∥zn − p∥+ ∥(I − λn∇fαn)p− (I − λn∇f)p∥)= ∥zn − p∥+ λnαnβn∥p∥,

(3.8)

and

∥xn+1 − p∥ = ∥(1− µn)(yn − p) + µn[SPC(I − λn∇fαn)yn − p]∥≤ (1− µn)∥yn − p∥+ µn∥PC(I − λn∇fαn)yn − p∥= (1− µn)∥yn − p∥+ µn∥PC(I − λn∇fαn)yn − PC(I − λn∇f)p∥= (1− µn)∥yn − p∥+ µn∥PC(I − λn∇fαn)xn − PC(I − λn∇fαn)p+PC(I − λn∇fαn)p− PC(I − λn∇f)p∥

≤ (1− µn)∥yn − p∥+ µn(∥PC(I − λn∇fαn)zn − PC(I − λn∇fαn)p∥+∥PC(I − λn∇fαn)p− PC(I − λn∇f)p∥)

≤ (1− µn)∥yn − p∥+ µn(∥yn − p∥+ ∥(I − λn∇fαn)p− (I − λn∇f)p∥)= ∥yn − p∥+ λnαnµn∥p∥≤ ∥xn − p∥+ λnαn(γn + βn + µn)∥p∥,

(3.9)

where the last inequality follows from (3.7) and (3.8).Since Σ∞

n=1αn < ∞, and λn, γn, βn, µn are bounded, then from Corollary 2.1, weconclude that

limn→∞

∥xn − p∥ exists for each p ∈ Fix(S)∩

Γ. (3.10)

Hence xn is bounded and so are yn and zn.In the following, we will show

limn→∞

∥xn − yn∥ = limn→∞

∥yn − zn∥ = limn→∞

∥xn − un∥ = limn→∞

∥yn − Swn∥ = limn→∞

∥zn − Svn∥ = 0,

where un = PC(I − λn∇fαn)xn, vn = PC(I − λn∇fαn)zn, wn = PC(I − λn∇fαn)yn.Note that

∥un − p∥ = ∥PC(I − λn∇fαn)xn − p∥= ∥PC(I − λn∇fαn)xn − PC(I − λn∇fαn)p

+PC(I − λn∇fαn)p+ PC(I − λn∇f)p∥≤ ∥PC(I − λn∇fαn)xn − PC(I − λn∇fαn)p∥

+∥PC(I − λn∇fαn)p+ PC(I − λn∇f)p∥≤ ∥xn − p∥+ λnαn∥p∥.

(3.11)

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 27, NO.7, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

1119 Ming Zhao ET AL 1114-1123

Page 48: Journal of Computational Analysis and Applicationseudoxuspress.com/images/JOCAAA-VOL-27-2019-ISSUE-7.pdfJournal of Computational Analysis and Applications . ISSNno.’s:1521-1398 PRINT,1572-9206

Similarly, we can obtain that

∥vn − p∥ ≤ ∥zn − p∥+ λnαn∥p∥ (3.12)

and∥wn − p∥ ≤ ∥yn − p∥+ λnαn∥p∥. (3.13)

Indeed, observe that

∥zn − p∥2 = ∥(1− γn)(xn − p) + γn(un − p)∥2= (1− γn)∥xn − p∥2 + γn∥un − p)∥2 − γn(1− γn)∥xn − un∥2≤ (1− γn)∥xn − p∥2 + γn(∥xn − p∥+ λnαn∥p∥)2 − γn(1− γn)∥xn − un∥2= (1− γn)∥xn − p∥2 + γn(∥xn − p∥2 + 2λnαn∥p∥∥xn − p∥+ λ2nα

2n∥p∥2)

−γn(1− γn)∥xn − un∥2= ∥xn − p∥2 + αnγn(2λn∥p∥∥xn − p∥+ αnλ

2n∥p∥2)− γn(1− γn)∥xn − un∥2

≤ ∥xn − p∥2 + αnM1 − γn(1− γn)∥xn − un∥2,(3.14)

where M1 = supn≥0γn(2λn∥p∥∥xn−p∥+αnλ2n∥p∥2) <∞ and the first inequality follows from

(3.11).Also, observe that

∥yn − p∥2 = ∥(1− βn)(zn − p) + βn(Svn − p)∥2= (1− βn)∥zn − p∥2 + βn∥Svn − p)∥2 − βn(1− βn)∥zn − Svn∥2≤ (1− βn)∥zn − p∥2 + βn∥vn − p)∥2 − βn(1− βn)∥zn − Svn∥2≤ (1− βn)∥zn − p∥2 + βn(∥zn − p∥+ λnαn∥p∥)2 − βn(1− βn)∥zn − Svn∥2= (1− βn)∥zn − p∥2 + βn(∥zn − p∥2 + 2λnαn∥p∥∥zn − p∥+ λ2nα

2n∥p∥2)

−βn(1− βn)∥zn − Svn∥2= ∥zn − p∥2 + αnβn(2λn∥p∥∥zn − p∥+ αnλ

2n∥p∥2)− βn(1− βn)∥zn − Svn∥2

≤ ∥zn − p∥2 + αnM2 − βn(1− βn)∥zn − Svn∥2,(3.15)

where M2 = supn≥0

βn(2λn∥p∥∥zn − p∥+ αnλ

2n∥p∥2)

< ∞ and the second inequality follows

from (3.12).And

∥xn+1 − p∥2 = ∥(1− µn)(yn − p) + µn(Swn − p)∥2= (1− µn)∥yn − p∥2 + µn∥Swn − p)∥2 − µn(1− µn)∥yn − Swn∥2≤ (1− µn)∥yn − p∥2 + µn∥wn − p)∥2 − µn(1− µn)∥yn − Swn∥2≤ (1− µn)∥yn − p∥2 + µn(∥yn − p∥+ λnαn∥p∥)2 − µn(1− µn)∥yn − Swn∥2= (1− µn)∥yn − p∥2 + µn(∥yn − p∥2 + 2λnαn∥p∥∥yn − p∥+ λ2nα

2n∥p∥2)

−µn(1− µn)∥yn − Swn∥2= ∥yn − p∥2 + αnµn(2λn∥p∥∥yn − p∥+ αnλ

2n∥p∥2)− µn(1− µn)∥yn − Swn∥2

≤ ∥yn − p∥2 + αnM3 − µn(1− µn)∥yn − Swn∥2,(3.16)

where M3 = supn≥0µn(2λn∥p∥∥yn − p∥ + αnλ2n∥p∥2) < ∞ and the second inequality follows

from (3.13).Substitute (3.14) and (3.15) into (3.16), we have

∥xn+1 − p∥2 ≤ ∥xn − p∥2 + αn(M1 +M2 +M3)− γn(1− γn)∥xn − un∥2−βn(1− βn)∥zn − Svn∥2 − µn(1− µn)∥yn − Swn∥2.

(3.17)

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 27, NO.7, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

1120 Ming Zhao ET AL 1114-1123

Page 49: Journal of Computational Analysis and Applicationseudoxuspress.com/images/JOCAAA-VOL-27-2019-ISSUE-7.pdfJournal of Computational Analysis and Applications . ISSNno.’s:1521-1398 PRINT,1572-9206

Hence, it follows that

γn(1− γn)∥xn − un∥2 + βn(1− βn)∥zn − Svn∥2 + µn(1− µn)∥yn − Swn∥2≤ ∥xn − p∥2 − ∥xn+1 − p∥2 + αn(M1 +M2 +M3).

(3.18)

Since Σ∞n=1αn < ∞, 0 < lim infn→∞ γn ≤ lim supn→∞ γn < 1, 0 < lim infn→∞ βn ≤

lim supn→∞ βn < 1, and 0 < lim infn→∞ µn ≤ lim supn→∞ µn < 1, we deuce from the exis-tence of limn→∞ ∥xn − p∥ that

limn→∞

∥xn − un∥ = limn→∞

∥yn − Swn∥ = limn→∞

∥zn − Svn∥ = 0. (3.19)

Then, utilizing (3.6) we get

limn→∞

∥zn − xn∥ = limn→∞

γn∥un − xn∥ = 0, (3.20)

limn→∞

∥yn − zn∥ = limn→∞

βn∥Svn − zn∥ = 0, (3.21)

andlimn→∞

∥xn − yn∥ = limn→∞

µn∥Swn − yn∥ = 0. (3.22)

This implies that

limn→∞

∥xn − yn∥ = limn→∞

∥yn − zn∥ = limn→∞

∥xn − un∥ = limn→∞

∥yn − Swn∥ = limn→∞

∥zn − Svn∥ = 0.

Furthermore, note that

∥Svn − vn∥ ≤ ∥Svn − zn∥+ ∥zn − xn∥+ ∥xn − un∥+ ∥un − vn∥= ∥Svn − zn∥+ ∥zn − xn∥+ ∥xn − un∥

+∥PC(I − λn∇fαn)xn − PC(I − λn∇fαn)zn∥≤ ∥Svn − zn∥+ ∥zn − xn∥+ ∥xn − un∥+ ∥xn − zn∥.

From (3.20-3.22), we can get that

limn→∞

∥un − vn∥ = limn→∞

∥Svn − vn∥ = 0. (3.23)

Similarly, we can prove

limn→∞

∥un − wn∥ = limn→∞

∥Swn − wn∥ = 0. (3.24)

As xn is bounded, there is a subsequence xni of xn that converges weakly to some x.Next, we will show x ∈ Fix(S)

∩Γ. We first show x ∈ Γ, let T = PC(I − λn∇f), then

∥xn − Txn∥ ≤ ∥xn − un∥+ ∥un − Txn∥= ∥xn − un∥+ ∥PC(I − λn∇fαn)xn − PC(I − λn∇f)xn∥≤ ∥xn − un∥+ ∥(I − λn∇fαn)xn − (I − λn∇f)xn∥= ∥xn − un∥+ λnαn∥xn∥.

(3.25)

From limn→∞ ∥xn − un∥ = 0, limn→∞ ∥αn∥ = 0 and λn, xn are bounded, we can get thatlimn→∞ ∥xn − Txn∥ = 0.

Taking into account xni x and Definition 2.4, we obtain x ∈ Fix(T ). Thus, utilizingRemark 3.1, we have x ∈ Γ. On the other hand, since

limn→∞

∥xn − un∥ = limn→∞

∥un − vn∥ = limn→∞

∥Svn − vn∥ = 0,

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 27, NO.7, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

1121 Ming Zhao ET AL 1114-1123

Page 50: Journal of Computational Analysis and Applicationseudoxuspress.com/images/JOCAAA-VOL-27-2019-ISSUE-7.pdfJournal of Computational Analysis and Applications . ISSNno.’s:1521-1398 PRINT,1572-9206

there is subsequence vnj of vn that converges weakly to x and limn→∞ ∥Svnj − vnj∥ = 0. Thenfrom Definition 2.4, we have x ∈ Fix(S). Therefore, we get x ∈ Fix(S)

∩Γ.

Let xnj be another subsequence of xn such that xnj x. Then, x ∈ Fix(S)∩Γ. Next,

we prove x = x. Assume that x = x. From the Opial condition [22], we have

limn→∞ ∥xn − x∥ = lim infi→∞ ∥xni − x∥ < lim infi→∞ ∥xni − x∥= limn→∞ ∥xn − x∥ = lim infj→∞ ∥xnj − x∥< lim infj→∞ ∥xnj − x∥ = limn→∞ ∥xn − x∥,

which is a contradiction. Thus, we have x = x. This implies xn x ∈Fix(S)∩Γ. Furthermore,

from limn→∞ ∥xn − yn∥ = limn→∞ ∥zn − xn∥ = 0, we can get yn x and zn x. This showsthat the sequences xn, yn and zn are all converge weakly to an element x ∈ Fix(S)

∩Γ.

Theorem 3.2 Let S : C → C be a nonexpansive mapping such that Fix(S) ∩ Γ = ∅ in Hilbertspace. Let xn, yn and zn be the sequences in C generated by the following extragradientalgorithm:

x0 ∈ C chosen arbitrarily,zn = (1− γn)xn + γnPC(I − λn∇f)xn,yn = (1− βn)zn + βnSPC(I − λn∇f)zn,xn+1 = (1− µn)yn + µnSPC(I − λn∇f)yn, ∀n > 0,

(3.26)

where the sequences of parameters βn, γn and µn satisfy the following condition:

(a) λn ⊂(0, 1

∥A∥2)and 0 < lim infn→∞ λn ≤ lim supn→∞ λn <

1∥A∥2 ;

(b) γn ⊂ (0, 1), and 0 < lim infn→∞ γn ≤ lim supn→∞ γn < 1;(c) βn ⊂ (0, 1), and 0 < lim infn→∞ βn ≤ lim supn→∞ βn < 1;(d) µn ⊂ (0, 1), and 0 < lim infn→∞ µn ≤ lim supn→∞ µn < 1.Then, the sequences xn, yn and zn are all converge weakly to an element x ∈ Fix(S)

∩Γ.

Proof. Let αn=0 in Theorem 3.1, then we can obtain the desired result.Remark 3.2. Our iteration method improves the corresponding results of [6], [8] and [14].

References

[1] Y. Censor, T. Elfving, A multiprojection algorithm using Bregman projections in a productspace, Numer. Algorithms 8(1994)221-239.

[2] C. Byrne, Iterative oblique projection onto convex subsets and the split feasibility problem,Inverse Problems 18(2002)441-453.

[3] B. Qu, N. Xiu, A note on the CQ algorithm for the split feasibility problem, InverseProblems 21(2005)1655-1665.

[4] Y. Censor, T. Elfving, N. Kopf, T. Bortfeld, The multiple-sets split feasibility problem andits applications for inverse problems, Inverse Problem 21(2005)2071-2084.

[5] C. Byrne, A unified treatment of some iterative algorithms in signal processing and imagereconstruction, Inverse Problem 20(2004)103-120.

[6] H.K. Xu, Iterative methods for the split feasibility problem in infinite-dimensional Hilbertspaces, Inverse Problems 26(2010)1-17.

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 27, NO.7, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

1122 Ming Zhao ET AL 1114-1123

Page 51: Journal of Computational Analysis and Applicationseudoxuspress.com/images/JOCAAA-VOL-27-2019-ISSUE-7.pdfJournal of Computational Analysis and Applications . ISSNno.’s:1521-1398 PRINT,1572-9206

[7] G.M. Korpelevich, An extragradient method for finding saddle points and for other problem,Ekonomika Mat. Metody 12(1976)747-756.

[8] N. Nadezhkina, W. Takahasi, Weak convergence theorem by an extragradient method fornonexpansive mapping and monotone mapping,J. Optim. Theory Appl. 128(2006)191-201.

[9] Q. Yang, The relaxed CQ algorithm solving the split feasibility problem, Inverse Problems20(2004)1261-1266.

[10] J. Zhao, Q. Yang, severral solution merhods for the split feasibility problem, Inverse Prob-lems 21(2005)1791-1799.

[11] B. Qu, N. Xiu, A new half space-relaxation projection method for the split feasibilityproblem, Linear Algebr. Appl. 428(2008)1218-1229.

[12] H. Xu, A variable Krasnosel-skii-Mann algorithm and the multiple-set split feasibility prob-lem, Inverse Problems 22(2006) 2021-2034

[13] Kinderlehrar, G. Stampacchia, An introduction to variational Inequalities and their appli-cations, Academic Press, New York, 1980.

[14] L.C. Ceng, Q.H. Ansarib, J.C. Yao, Relaxed extragradient method for finding minnimum-norm solution of the split feasibility problem, Nonlinear Analysis: Theory, Methods andApplications. 75(4)(2012), 2116-2125.

[15] F. Facchinei, J.S. Pang, Finite-Dimensional Variational Inequalities and ComplementarityProblems, vols I and II (Berlin: Springer), 2003.

[16] C. Byrne, A unified treatment of some iterative algorithms in signal processing and imagereconstruction, Inverse Problem. 20(2004)103-120.

[17] P.L. Combettes, Solving monotone inclusions via compositions of nonexpansive averagedoperators, Optimization 53(5-6)(2004)475-504.

[18] K. Geobel, W.A. Kirk, Topics in Metric Fixed Point Theory, Cambridge Studies in Ad-vanced Mathematics, vol.28, Cambridge University Press, 1990.

[19] M.O. Osilike, S.C. Aniagbosor, B.G. Akuchu, Fixed points of asymptotically demicontrac-tive mappings in arbitrary Banach space, Panamer. Math. J. 12(2002)77-88.

[20] K.K. Tan, H.K. Xu, Approximating fixed points of nonexpansive mappings by the Ishikawaiteration process, J. Math. Anal. Appl. 178(1993)301-308.

[21] L.C. Ceng, Q.H. Ansaribc, J.C. Yao, An extragradient method for solviing split feasibilityand fixed point problem, Computers and Mathematics with Applications. 64(4)(2012)633-642.

[22] Z. Opial, Weak convergence of the sequence of successive approximations for nonexpansivemappings, Bull. Amer. Math. Soc. 73(1967)591-597.

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 27, NO.7, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

1123 Ming Zhao ET AL 1114-1123

Page 52: Journal of Computational Analysis and Applicationseudoxuspress.com/images/JOCAAA-VOL-27-2019-ISSUE-7.pdfJournal of Computational Analysis and Applications . ISSNno.’s:1521-1398 PRINT,1572-9206

Behavior of Meromorphic Solutions of Composite

Functional-Difference Equations ∗†

Man-Li Liua and Ling-Yun Gaob†a School of Mathematics, Shandong University

Jinan, Shandong, 250100,P.R.China

e-mail: [email protected] Department of Mathematics,Jinan University

Guangzhou,Guangdong, 510632,P.R.China

e-mail:[email protected]

Abstract In view of Nevanlinna value distribution theory, we will in-vestigate the behavior of meromorphic solutions of four types of com-posite functional-difference equations, and a type of system of compositefunctional-difference equations, some results are obtained. Moreover, wealso give some examples to show that the conditions of our theorems areaccurate.Key words: meromorphic solutions; composite functional-difference e-quations; behavior; growth orderMR(2010) Subject Classification: 30D35,39B32

1.Introduction

Recently, with the establishment of the difference analogues of Nevanlinna value dis-tribution theory, researchers obtained many interesting theorems about the existence andgrowth of solutions of difference equations, functional equations and so on([3-6]). Tostate the results, a number of basic definition and standard notations should be intro-duced. We shall assume that the reader is familiar with the standard notations and re-sults of Nevanlinna value distribution theory such as m(r, f(z)), n(r, f(z)), N(r, f(z)) andT (r, f(z))([15,18,22]) denote the proximity function, the non-integrated counting function,the counting function and the characteristic function of f(z), respectively. For the inte-grated counting function for distinct poles of f(z) we use the notations N(r, f(z)), andN1(r, f) = N(r, f)−N(r, f).

In this article, a meromorphic function means meromorphic in the whole complexplane. Given a meromorphic function f(z), recall that a meromorphic function h(z) issaid to be a small function of f(z), if T (r, h(z)) = S(r, f),where S(r, f) is used to denote

∗This work was partially supported by NSFC of China(No.11271227,11271161), PCSIRT(No.IRT1264),and the Fundamental Research Funds of Shandong University (No.2017JC019).†Corresponding author:Gao Lingyun

1

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 27, NO.7, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

1124 Man-Li Liu ET AL 1124-1141

Page 53: Journal of Computational Analysis and Applicationseudoxuspress.com/images/JOCAAA-VOL-27-2019-ISSUE-7.pdfJournal of Computational Analysis and Applications . ISSNno.’s:1521-1398 PRINT,1572-9206

any quantity that satisfies S(r, f) = o(T (r, f)) as r →∞, possibly outside of a set of r offinite logarithmic measure.

Let c be a fixed, non-zero complex number, ∆cf(z) = f(z + c)− f(z), and ∆nc f(z) =

∆c(∆n−1c f(z)) = ∆n−1

c f(z + c)−∆n−1c f(z) for each integer n ≥ 2.Equations written with

the above difference operators ∆nc f(z) are difference equations. Let E be a subset on the

positive real axis. We define the logarithmic measure of E to be

log(E) =

∫E∩(1,+∞)

dr

r.

A set E ∈ (1,+∞) is said to have finite logarithmic measure if log(E) <∞.Difference equations have been studied in many aspects see e.g.,[1],[5-6],[17]. Some

expositions consider (system of) difference equations in real domains, or discrete domain.So far, the previous researches are only on complex differential equations (systems) ordifference equations (systems)[5,6], but not on composite functional-difference equations(systems). Therefore, it is very important and meaningful to study the cases of compositefunctional-difference equations (systems). That will be an innovative contribution of thispaper.

The remainder of the paper is organised as follows. In section 2, we will study theexistence of meromorphic solutions or the form on some type of composite functional-difference equations, and obtain three theorems, some examples are give to show that ourresults hold. In section 3, we will discuss the growth order of meromorphic solutions onsome types of composite functional-difference equations or system of composite functional-difference equations, which extend the result of Theorem B.

2. Existence of meromorphic solutions of difference equationsand form of difference equations

In 2003, H.Silvennoinen[21] was devoted to considering many types of composite functionalequations, he got some good results, for example, the following theorem A is one of hisresults.

Theorem A([21]) The composite functional equation

f(p(z)) =a0(z) + a1(z)f(z)

b0(z) + b1(z)f(z)

where the coefficients ai, bj are of growth S(r, f) such that a0(z)b1(z)−a1(z)b0(z) 6= 0 andp(z) is a polynomial of deg p(z) = k ≥ 2, does not have meromorphic solutions.

A question is,whether or not the assertion of Theorem A remains valid, if we replacethe equation

f(p(z)) =a0(z) + a1(z)f(z)

b0(z) + b1(z)f(z)

with the following form

∑(i)

a(i)(z)(f(z))i0(∆cf(z))i1 · · · (∆nc f(z))in =

a0(z) + a1(z)f(p(z))

b0(z) + b1(z)f(p(z)).

2

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 27, NO.7, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

1125 Man-Li Liu ET AL 1124-1141

Page 54: Journal of Computational Analysis and Applicationseudoxuspress.com/images/JOCAAA-VOL-27-2019-ISSUE-7.pdfJournal of Computational Analysis and Applications . ISSNno.’s:1521-1398 PRINT,1572-9206

In this section, the authors will pay attention to considering the properties of mero-morphic solutions on three types of composite functional difference equations in complexdomain, and extend the results obtained by H.Silvennoinen [21] to types of compositefunctional-difference equations (1)-(3) of the following forms, which are different from thecomplex differential equations or systems of complex difference equations.

At this point we pause briefly to introduce the notation used in this paper. Let I be afinite set of multi-indexes i = (i0, ..., in),J be a finite set of multi-indexes j = (j0, ..., jn).Difference polynomials Ω1(z, f),Ω2(z, f) of a meromorphic function f(z) are defined as

Ω1(z, f) =∑

(i)∈Ia(i)(f(z))i0(∆cf(z))i1 · · · (∆n

c f(z))in ,

Ω2(z, f) =∑

(j)∈Jb(j)(f(z))j0(∆cf(z))j1 · · · (∆n

c f(z))jn ,

where each a(i)(z), b(j)(z) is a small meromorphic function with respect to f .We denote that

u1 = maxn∑l=0

(l + 1)il, u2 = maxn∑l=0

(l + 1)jl.

First, we will investigate the existence of meromorphic solutions of a type of compositefunctional-difference equations of the form

∑(i)

a(i)(z)(f(z))i0(∆cf(z))i1 · · · (∆nc f(z))in =

a0(z) + a1(z)f(p(z))

b0(z) + b1(z)f(p(z)), (1)

where the coefficients ai(z),bj(z)(i, j = 0, 1) and a(i)(z) are of growth S(r, f) such

that a0(z)b1(z)− a1(z)b0(z) 6≡ 0, p(z) = ckzk + · · ·+ c0,deg p(z) ≥ 2.

For the composite functional-difference equations (1), the main theorem can be statedas follows.

Theorem 2.1 Let u1 < k. The composite function-difference equation (1) does nothave meromorphic solutions.

Remark 1 The example 1 shows that Theorem 2.1 does not hold if at least ai(z), bj(z)and a(i)(z) are not of growth S(r, f),there may exist a rational solution.

Example 1 Let p(z) = z2, c = 1.Then function f(z) = 1z−1 is a solution of the

following equation1− z2f(p(z))

(1 + (z − 1)f(p(z))=z(z − 1)

2 + zf∆cf.

Second, we will study the properties of p(z) of composite functional-difference equa-tions of the following

l∑i=0

ai(z)f(p(z))i =Ω1(z, f)

Ω2(z, f), (2)

where p(z) is an entire function,ai(z), a(i)(z), b(j)(z) are small functions.We obtain the following resultTheorem 2.2 Let f be a non-constant meromorphic solution of the composite

functional-difference equations (2).Then p(z) is a polynomial.

3

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 27, NO.7, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

1126 Man-Li Liu ET AL 1124-1141

Page 55: Journal of Computational Analysis and Applicationseudoxuspress.com/images/JOCAAA-VOL-27-2019-ISSUE-7.pdfJournal of Computational Analysis and Applications . ISSNno.’s:1521-1398 PRINT,1572-9206

Third, we shall consider the growth and characteristic estimate of meromorphic solu-tions of the following composite functional-difference equation

∑(i)∈I

a(i)(z)fi0(∆cf)i1 · · · (∆n

c f)in =m∑i=0

ai(z)(f(p(z)))i, (3)

where ai(z) are meromorphic functions, a(i) 6≡ 0, am(z) 6= 0, p(z) is a polynomial ofdegree k ≥ 2.

We get the main result below.Theorem 2.3 Let f(z) be a finite order transcendental meromorphic solution of

(3),a(i)(z) be polynomials,

T (r, ai) < KT (rs, f), i = 0, 1, 2, · · · ,m,

where K and s are positive constants, r is large enough. If s < k, then for given ε > 0,

T (r, f) = O((log r)α+ε),

where

α =log((m+ 1)K + u1

ms)

log ks

, if 1 ≤ s < k,

and

α =log u1+m(m+1)Ks

m

log k, if s < 1 < k,

where u1 = maxn∑l=0

(l + 1)il.

Remark 2 The example 2 shows that the condition s < k in Theorem 2.3 is bestpossible.

Example 2 Let p(z) = ckzk + · · ·+ c0,deg p(z) ≥ 2,

ai(z) = Cime2z

(1 + ep(z))m, i = 0, 1, 2, ...,m.

Thenm∑i=0

ai(z)f(p(z))i =e2z

(1 + ep(z))m

m∑i=0

Cimf(p(z))i,

f = ez is a transcendental meromorphic solution of the composite functional-differenceequation of the form

1+z(ec−1)2

(ec−1)3(∆cf)(∆2

cf)2 − f(∆cf)2 − z(∆cf)2(∆2cf) + (ec − 1)3f2(∆cf)

−f(∆2cf)2 + f2 =

m∑i=0

ai(z)(f(p(z)))i.

In this case, f(z) satisfirs

T (r, f(z)) =r

π+O(1).

However, by k ≥ 2,we have

T (r, ai(z)) = (1 + o(1))m|ck|rk

π,

4

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 27, NO.7, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

1127 Man-Li Liu ET AL 1124-1141

Page 56: Journal of Computational Analysis and Applicationseudoxuspress.com/images/JOCAAA-VOL-27-2019-ISSUE-7.pdfJournal of Computational Analysis and Applications . ISSNno.’s:1521-1398 PRINT,1572-9206

it shows that Theorem 2.3 does not hold if s = k.

To prove Theorem 2.1-2.3, we need some lemmas as follows.Lemma 2.1([13]) Let f be a transcendental meromorphic function and p(z) =

akzk + ak−1z

k−1 + . . . + a1(z) + a0, ak 6= 0, k ≥ 1,be a polynomial of degree k.Given0 < δ < |ak|,let λ = |ak|+ δ, µ = |ak| − δ.Then, given ε > 0,for any a ∈ C ∪ ∞ and forr large enough,we have

kn(µrk,1

f − a) ≤ n(r,

1

f(p)− a) ≤ kn(λrk,

1

f − a),

N(µrk,1

f − a) +O(log r) ≤ N(r,

1

f(p)− a) ≤ N(λrk,

1

f − a) +O(log r),

(1− ε)T (µrk, f) ≤ T (r, f(p)) ≤ (1 + ε)T (λrk, f).

Lemma 2.2([12]) Let ψ:[r0,+∞)→ (0,+∞) be positive and bounded in every finiteinterval. Suppose that

ψ(µrm) ≤ Aψ(r) +B, (r ≥ r0),

where µ > 0,m > 1, A > 1 and B are real constants.Then

ψ(r) = O((log r)α),

where

α =logA

logm.

Lemma 2.3([18]) Let R(z, f) =

p∑i=0

ai(z)fi

q∑j=0

bj(z)fjbe an irreducible rational function in

f(z) with the meromorphic coefficients ai(z) and bj(z).If f(z) is a meromorphic func-tion,then

T (r,R(z, f)) = maxp, qT (r, f) +O∑

T (r, ai) +∑

T (r, bj).

Lemma 2.4([3]) Let f be a non-constant meromorphic function and let g be atranscendental entire function.Then there exists an increasing sequence,rn →∞,such that

T (r, f(g(z))) ≥ T ((M(r

4, g))

130 , f)

holds for r = rn.Lemma 2.5([18]) Let g:(0,+∞)→ R, h:(0,+∞)→ R be monotone increasing func-

tions such that g(r) ≤ h(r) outside of an exceptional set E of finite linear measure.Then,forany α > 1,there exists r0 such that g(r) ≤ h(αr) for all r > r0.

Lemma 2.6([17]) Let T : [0,+∞) → [0,+∞) be a non-decreasing continuousfunction,let δ ∈ (0, 1),and let s ∈ (0,∞).If T is of finite order,i.e.,

limr→∞

log T (r)

log r<∞,

5

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 27, NO.7, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

1128 Man-Li Liu ET AL 1124-1141

Page 57: Journal of Computational Analysis and Applicationseudoxuspress.com/images/JOCAAA-VOL-27-2019-ISSUE-7.pdfJournal of Computational Analysis and Applications . ISSNno.’s:1521-1398 PRINT,1572-9206

then

T (r + s) = T (r) + o(T (r)

rδ),

where r runs to infinity outside of a set of finite logarithmic measure.Lemma 2.7 Let f be a meromorphic function of finite order,

Ω1(z, f) =∑

(i)∈Ia(i)(z)f

i0(∆cf)i1 · · · (∆nc f)in ,

Ω2(z, f) =∑

(j)∈Ib(j)(z)f

j0(∆cf)j1 · · · (∆nc f)jn .

ThenT (r,Ω1(z, f)) ≤ u1T (r, f) + S1(r, f) +

∑(i)∈I

T (r, a(i)),

and

T (r,Ω1(z, f)

Ω2(z, f)) ≤ (u1 + u2)T (r, f) + S1(r, f) +

∑(i)∈I

T (r, a(i)) +∑

(j)∈JT (r, b(j)),

where u1 = maxn∑l=0

(l+ 1)il, u2 = maxn∑l=0

(l+ 1)jl, the exceptional set E associated to

S(r, f) is of finite logarithmic measure∫Edrr < +∞.

Proof It follows from

∆nc f(z) = ∆c(∆

n−1c f(z)) = ∆n−1

c f(z + c)−∆n−1c f(z)

that

∆mc f(z) =

m∑i=0

Cim(−1)m−if(z + ci).

Similar to the proof of Lemma 4.2 in [16](pp. 181-182), we have

m(r,Ω(z, f)) = λm(r, f) + S(r, f),

where λ =n∑l=0

il.

In order to estimate the poles of Ω(z, f), we consider the term of

Ω(i)(z, f) = a(i)(z)fi0(∆cf)i1 · · · (∆n

c f)in .

Noting that

n(r, f(z + c)) ≤ n(r + C, f) + S(r, f) = n(r, f) + S(r, f), C = |lc|,

it is easy to get that

n(r,Ω(i)(z, f)) ≤n∑l=0

il(l + 1)n(r, f(z + lc)) + n(r, a(i)(z)).

6

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 27, NO.7, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

1129 Man-Li Liu ET AL 1124-1141

Page 58: Journal of Computational Analysis and Applicationseudoxuspress.com/images/JOCAAA-VOL-27-2019-ISSUE-7.pdfJournal of Computational Analysis and Applications . ISSNno.’s:1521-1398 PRINT,1572-9206

Hence, we get

n(r,Ω(z, f)) ≤ max(n∑l=0

il(l + 1))n(r, f(z)) + S(r, f) +∑(i)

n(r, a(i)(z)).

By the above equality, we get

T (r,Ω1(z, f)) ≤ uT (r, f) + S(r, f) +∑(i)

T (r, a(i)(z)),

where u1 = maxn∑l=0

(l+1)il,r runs to infinity outside of a set of finite logarithmic measure.

Further,we have

T (r,Ω2(z, f)) ≤ u2T (r, f) + S(r, f) +∑

(j)∈JT (r, b(j)),

where u2 = maxn∑l=0

(l + 1)jl.

Hence,we obtain

T (r, Ω1(z,f)Ω2(z,f)) ≤ T (r,Ω1(z, f)) + T (r, 1

Ω2(z,f))

≤ (u1 + u2)T (r, f) + S(r, f) +∑

(i)∈IT (r, a(i)) +

∑(j)∈I

T (r, b(j)).

Lemma 2.8([21]) Let P (z, f) =p∑i=0

ai(z)fi be polynomial in f(z) with the mero-

morphic coefficients ai(z).If f(z) is a meromorphic function,then

T (r, P (z, f)) ≤ pT (r, f) +p∑i=0

T (r, ai) +O(1),

T (r, P (z, f)) ≥ p(T (r, f)−p∑i=0

T (r, ai)) +O(1).

Lemma 2.9([21]) Let f be a meromorphic function.Then T (r, f) is an increasing

function of log r and convex function of log r,T (r,f)log r is an incresing function of r.

Proof of Theorem 2.1 First, we suppose that there is a transcendental meromor-phic solution f(z) of composite functional-difference equation (1) .

For a sufficiently small ε > 0, by Lemma 2.1, Lemma 2.3 and Lemma 2.7, we get

(1− ε)T (µrk, f) ≤ T (r, f(p(z))) ≤ (u1 + ε)T (r, f),

where u1 = maxn∑l=0

(l + 1)il, µ = |ck|(1 − ε), outside a possible exceptional set of finite

logarithmic measure.Hence, for α > 1 and for r large enough

(1− ε)T (µrk, f) ≤ (u1 + ε)T (αr, f).

7

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 27, NO.7, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

1130 Man-Li Liu ET AL 1124-1141

Page 59: Journal of Computational Analysis and Applicationseudoxuspress.com/images/JOCAAA-VOL-27-2019-ISSUE-7.pdfJournal of Computational Analysis and Applications . ISSNno.’s:1521-1398 PRINT,1572-9206

Set t = αr. Then

T (µ

αktk, f) ≤ u1 + ε

(1− ε)T (t, f).

By Lemma 2.2 we obtainT (t, f) = O((log t)α1),

where

α1 =log u1+ε

(1−ε)log k

< 1,

there is a contradiction.Second, we suppose that f(z) is a rational solution of (1). Then the coefficients

a(i)(z), a0(z), a1(z), b0(z), b1(z) must be constants.Set

f(z) =P (z)

Q(z)=αpz

p + αp−1zp−1 + · · ·+ α0

βqzq + βq−1zq−1 + · · ·+ β0,

where αp 6= 0, βq 6= 0,degw(z) = maxp, q = l.

If p 6= q, we immediately have deg(a0(z)+a1(z)f(p(z))b0(z)+b1(z)f(p(z)) ) = kl.

If p = q, we have

a0(z)+a1(z)f(p(z))b0(z)+b1(z)f(p(z)) = a0+a1f(p(z))

b0+b1f(p(z)) =a0+a1

αp(p(z))p+αp−1(p(z))

p−1+···+α0βq(p(z))q+βq−1(p(z))

q−1+···+β0

b0+b1αp(p(z))p+αp−1(p(z))

p−1+···+α0βq(p(z))q+βq−1(p(z))

q−1+···+β0

=(a0βq+a1αp)(p(z))p+(a0βq−1+a1αp−1)(p(z))p−1+···+(a0β0+a1α0)(b0βq+b1αp)(p(z))p+(b0βq−1+b1αp−1)(p(z))p−1+···+(b0β0+b1α0)

.

It follows from the equation above that a0βq + a1αp = 0 and b0βq + b1αp = 0 can not

hold at the same time. Otherwise a0(z)+a1(z)w(p(z))b0(z)+b1(z)w(p(z)) = c, c is a constant.

Hence, we get

kl = deg(a0(z)+a1(z)f(p(z))b0(z)+b1(z)f(p(z)) )

= deg(∑

(i) a(i)(z)(f(z))i0(∆cf(z))i1 · · · (∆nc f(z))in)

≤ maxi0 + 2i1 + · · ·+ (n+ 1)inl = u1l.

So, u1 ≥ k, there is also a contradiction. Thus, f(z) is not a rational solution of (1).Combined with the first and second steps above, the assertion follows.

Proof of Theorem 2.2 Suppose that p(z) is transcendental entire function, we have

lim infr→∞

logM(r, p(z))

log r=∞.

Hence, for any given K > 30 and for r large enough

M(r, p) > rK .

There exists an increasing sequence rn →∞, as in Lemma 2.4, for any n such that

M(rn4, p) > (

rn4

)K .

8

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 27, NO.7, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

1131 Man-Li Liu ET AL 1124-1141

Page 60: Journal of Computational Analysis and Applicationseudoxuspress.com/images/JOCAAA-VOL-27-2019-ISSUE-7.pdfJournal of Computational Analysis and Applications . ISSNno.’s:1521-1398 PRINT,1572-9206

Applying Lemma 2.3 and Lemma 2.7 to equation (2), we have

lT (r, f(p(z))) ≤ (u1 + u2)T (r, f) + S(r, f),

outside a possible exceptional set of finite linear measure. According to Lemma 2.5, for∀α > 1, r ≥ rα, we obtain

T (r, f(p(z))) ≤ (u1 + u2)(1 + o(1))

lT (αr, f). (4)

It follows from Lemma 2.4 that

T (rn, f(p(z))) ≥ T ((rn4

)K30 , f). (5)

Note that T (r,f)log r is an increasing function of r. As

(rn4

)K30 > αrn,

for sufficiently large n, we have

T ((rn4

)K30 , f) >

K/30(log rn − log 4)

log rn + logαT (αrn, f) >

K

40T (αrn, f), (6)

as n→∞. By (4),(5) and (6), we get

(u1 + u2)(1 + o(1))

lT (αrn, f) ≥ T ((

rn4

)K30 , f) >

K

40T (αrn, f), (7)

as n→∞.Because K can be arbitrarily large, this is a contradiction in (7). This shows that p(z)

is a polynomial.

Proof of Theorem 2.3 By the equation (3), Lemma 2.7 and Lemma 2.8, we have

mT (r, f(p(z)))−mm∑i=0

T (r, ai(z)) ≤ (u1 + ε)T (r, f),

i.e.,

mT (r, f(p(z))) ≤ (u1 + ε)T (r, f) +mm∑i=0

T (r, ai(z)). (8)

Combining (8) and

T (r, ai(z)) < KT (rs, f), i = 0, 1, 2, · · · ,m,

we obtain

T (r, f(p(z))) ≤ u1 + ε

mT (r, f) + (m+ 1)KT (rs, f), (9)

where K is a positive constant.

9

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 27, NO.7, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

1132 Man-Li Liu ET AL 1124-1141

Page 61: Journal of Computational Analysis and Applicationseudoxuspress.com/images/JOCAAA-VOL-27-2019-ISSUE-7.pdfJournal of Computational Analysis and Applications . ISSNno.’s:1521-1398 PRINT,1572-9206

Case (1): If s ≥ 1, by Lemma 2.9, we have T (r,f)log r is increasing functions of r, we can

obtain for any positive constant C and any t ≥ 1

T (Crt, f)

T (r, f)≥ logC + t log r

log r> (1− ε)t.

Hence, for r sufficiently large,

T (r, f) <1

(1− ε)tT (Crt, f).

Let s = t, C = 1. Then

T (r, f) <1

(1− ε)sT (rs, f). (10)

It follows from (9)and (10) that

T (r, f(p)) ≤ (m+ 1)KT (rs, f) + u1+ε(1−ε)msT (rs, f)

≤ ((m+ 1)K + u1ms + ε1)T (rs, f).

By Lemma 2.1

(1− ε)T (µrk, f) ≤ ((m+ 1)K +u1

ms+ ε1)T (rs, f).

From the above inequality we further get

(1− ε)T (µrks , f) ≤ ((m+ 1)K +

u1

ms+ ε2)T (r, f). (11)

Since k > s, then by (11) and Lemma 2.2, we obtain

T (r, f(z)) = O((log r)α1+ε),

where

α1 =log((m+ 1)K + u1

ms)

log ks

.

Case (2):If s < 1, by Lemma 2.9, since T (r,f)log r is increasing function of r, we obtain

T (r, f)

log r≥ T (rs, f)

log rs,

i.e.T (r, f)

T (rs, f)≥ 1

s. (12)

From (9) and (12) we get

T (r, f(p(z))) ≤ (u1 +m(m+ 1)Ks+ ε3

m)T (r, f).

According to Lemma 2.1, we obtain

T (µrk, f) ≤ (u1 +m(m+ 1)Ks+ ε4

m)T (r, f).

We obtain from Lemma 2.2

T (r, f(z)) = O((log r)α2+ε),

where

α2 =log u1+m(m+1)Ks

m

log k.

Combining case (1) and case (2), we get the proof of Theorem 2.3.

10

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 27, NO.7, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

1133 Man-Li Liu ET AL 1124-1141

Page 62: Journal of Computational Analysis and Applicationseudoxuspress.com/images/JOCAAA-VOL-27-2019-ISSUE-7.pdfJournal of Computational Analysis and Applications . ISSNno.’s:1521-1398 PRINT,1572-9206

3. Growth of meromorphic solutions

Since the 1970’s, R.Goldstein[10-13], W.Bergweiler[2-4], J.Heittokangas[16] et al had in-vestigated the existence and growth of meromorphic solutions on composite functionalequations in the whole complex plane and a number of important results were obtained.Particularly, J.Rieppo [20] discussed the growth on meromorphic solutions of many typesof functional equations, he also obtained some interesting results, for example, the follow-ing theorem B is one of his some results.

For the following functional equations

Q(z, f(az + b)) = R(z, f(z)), (∗)

where Q(z, f), R(z, f) are rational functions in f with small meromorphic coefficientsrelative to f such that 0 < q = degQf ≤ d = degRf and a, b ∈ C, a 6= 0 and |a| 6= 1.

He obtainedTheorem B([20]) Suppose that f is a transcendental meromorphic solution of the

equation (∗). Then

µ(f) = ρ(f) =log d− log q

log |a|.

It is known that when treating the meromorphic solutions of difference equations,the basic task is to estimate their growth order, while in the case of complex compositefunctional difference equations, considering the growth order of them is also an interestingtask. Hence, this section is devoted to investigating the growth order of meromorphicsolutions on two types of composite functional-difference equations (3), (13) and systemsof difference equations (14) in complex domain.

As regards the growth order of meromorphic solutions of complex composite functional-difference equations (3), we obtain Theorem 3.1.

Theorem 3.1 Let ai(z), a(i)(z) be of growth order of S(r, f), u1 ≥ km. Thenthe lower order and the order of meromorphic solution f of the equation (3) satisfy

ρ(f) = µ(f) = 0.

In the following, we will also investigate the growth of meromorphic solutions about atype of composite functional-difference equations of the form

l∑i=0

dif(a1iz + b1i)i

t∑j=0

ejf(a2jz + b2j)j=

Ω1(z, f)

Ω2(z, f), (13)

where a1i, a2i, b1j, b2j, di, ej are constants ,a(i)(z), b(j)(z) are small func-tions and a(i)(z) 6≡ 0, b(j)(z) 6≡ 0.

For complex composite functional-difference equations (13), we obtain the followingmain result.

Theorem 3.2 Suppose that f is a transcendental meromorphic solution of compositefunctional-difference equations (13), a1i, a2j , b1i, b2j ∈ C, |a1i| > 1, |a2j | > 1, and thecoefficients a(i)(z) are of growth S(r, f).

11

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 27, NO.7, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

1134 Man-Li Liu ET AL 1124-1141

Page 63: Journal of Computational Analysis and Applicationseudoxuspress.com/images/JOCAAA-VOL-27-2019-ISSUE-7.pdfJournal of Computational Analysis and Applications . ISSNno.’s:1521-1398 PRINT,1572-9206

(i). If l > t, then

ρ(f) ≤log u1+u2

l

log |a1l|;

(ii). If l < t, then

ρ(f) ≤log u1+u2

t

log |a2t|;

(iii). If l = t, then

ρ(f) ≤log u1+u2

l

log |a|,

where |a| = max|a1l|, |a2t|.Remark 3 The example 3 shows that the upper bound in Theorem 3.2 can be reached.Example 3 f(z) = ez is a meromorphic solution of the following equation

(ec − 1)2f(6z + c)

ecf(5z + c)=

f∆2cf

∆cf + f.

We see that u1 = 4, u2 = 2, ρ(f) = 1 =log

u1+u2maxl,t

log |a12| =log 6

1log 6 = log 6

log 6 .By using the Nevanlinna value distribution theory of meromorphic functions, difference

equation theory, a large number of papers also have considered the properties of mero-morphic solutions of some types of system of functional equations, and obtained someresults([7-9]). Now, we consider the problem of the growth order on a class of system ofcomposite functional equations as follows

l∑i=0

dif1(c1iz + d1i)i =

m1∑µ=0

a1µ(z)f2(z)µ

n1∑ν=0

a2ν(z)f2(z)ν,

t∑j=0

ejf2(c2jz + d2j)j =

m2∑s=0

b1s(z)f1(z)s

n2∑k=0

b2k(z)f1(z)k,

(14)

where c1i, c2j, d1i, d2j, di, ej are constants,a1µ(z), a2ν(z), b1s(z), b2k(z) aresmall functions,|c1l| > 1, |c2t| > 1.

The growth order of meromorphic solutions (f1, f2) of (14) is defined by

ρ(f1, f2) = maxρ(f1), ρ(f2),

ρ(fk) = lim supr→∞

log+ T (r, fk)

log r, k = 1, 2.

The lower order of meromorphic function fi, i = 1, 2 are defined by

µ(fk) = lim infr→∞

log+ T (r, fk)

log r, k = 1, 2.

As regards the complex composite functional-difference equation (14), we obtain The-orem 3.3 and Theorem 3.4 as follows.

12

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 27, NO.7, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

1135 Man-Li Liu ET AL 1124-1141

Page 64: Journal of Computational Analysis and Applicationseudoxuspress.com/images/JOCAAA-VOL-27-2019-ISSUE-7.pdfJournal of Computational Analysis and Applications . ISSNno.’s:1521-1398 PRINT,1572-9206

Theorem 3.3 Suppose that f is a transcendental meromorphic solution of the system(14), cij , dij ∈ C, |c1l| > 1, |c2t| > 1, and the coefficients aij(z) and bij(z) are of growthS(r, fi).Then

ρ(f1, f2) ≤log maxm1,n1maxm2,n2

lt

log |c1l||c2t|.

Example 4 Let b ∈ C be a constant such that b 6= mπ2 ,where m ∈ Z. We see

that (f1(z), f2(z)) = (tan z,− tan z) is a meromorphic solution of the following system ofcomposite functional equations of the form f1(2z + b) =

−2f2(z)−C(1−f22 )

1−f22−2Cf2,

f2(2z + b) =2f1(z)−C(1−f21 )

1−f21 +2Cf1,

where C = − tan b 6= 0,∞.In this case, |a1l||a2t| = 4,maxm1, n1maxm2, n2 = 4, lt = 1, thus,

ρ(f1, f2) = 1 =log maxm1,n1maxm2,n2

lt

log |a1l||a2t|=

log 4

log 4.

It shows that the upper bound in Theorem 3.3 can be reached.Theorem 3.4 Let (f1, f2) be a transcendental meromorphic solution of the system

(14), and µ(f1), µ(f2) be the lower order of f1, f2, respectively. Then

µ(f1) + µ(f2) ≥log maxm1,n1maxm2,n2

lt

log |c1l||c2t|,

where a1µ(z), a2ν(z), b1s(z), b2k(z) are small functions are small functions.

In order to prove Theorems 3.1-3.4, we need the following Lemmas.Lemma 3.1([14]) Let Φ : (1,∞) → (0,∞) be a monotone increasing function,and

let f be a nonconstant meromorphic function.If for some real constant α ∈ (0, 1),thereexist real constants K1 > 0 and K2 ≥ 1 such that

T (r, f) ≤ K1Φ(αr) +K2T (αr, f) + S(αr, f),

then

ρ(f) ≤ logK2

− logα+ lim sup

r→∞

log Φ(r)

log r.

Lemma 3.2([3]) Suppose that a meromorphic function f has finite lower order λ.Thenfor every constant c > 1 and a given ε there exists a sequence rn = rn(c, ε)→∞ such that

T (crn, f) ≤ cλ+εT (rn, f).

Proof of Theorem 3.1 For a sufficiently small ε > 0, by Lemma 2.1 and Lemma 2.3,we get

m(1− ε)T (µrk, f) ≤ mT (r, f(p(z))) ≤ (u1 + ε)T (r, f),

13

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 27, NO.7, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

1136 Man-Li Liu ET AL 1124-1141

Page 65: Journal of Computational Analysis and Applicationseudoxuspress.com/images/JOCAAA-VOL-27-2019-ISSUE-7.pdfJournal of Computational Analysis and Applications . ISSNno.’s:1521-1398 PRINT,1572-9206

where µ = |ck|(1 − ε), u1 = maxn∑l=0

(l + 1)il, outside a possible exceptional set of finite

logarithmic measure of r.Hence, for α > 1 and for r large enough

m(1− ε)T (µrk, f) ≤ (u1 + ε)T (αr, f).

Set t = αr. Then

T (µ

αktk, f) ≤ u1 + ε

m(1− ε)T (t, f).

By Lemma 2.2 we obtainT (t, w) = O((log t)α1),

where

α1 =log u1

m

log k+ ε1.

From the above equation, we can obtain that

ρ(f) = lim supr→∞

log+ T (r, f)

log r= 0,

µ(f) = lim infr→∞

log+ T (r, f)

log r= 0.

Thus, we have completed the proof of Theorem 3.1.

Proof of Theorem 3.2 Applying Lemma 2.3 and Lemma 2.7 to equation (13),we get

maxl, tT (r, f(askz + bsk)) = T (r,

l∑i=0

dif(a1iz + b1i)i

t∑j=0

ejf(a2jz + b2j)j) ≤ (u1 + u2)T (r, f) + S(r, f),

where s = 1 or 2, k = maxl, t.Applying Lemma 2.1 to equation (13), we get

(1− ε) maxl, tT (µr, f) ≤ (u1 + u2)T (r, f) + S(r, f),

that is

T (µr, f) ≤ u1 + u2

(1− ε) maxl, tT (r, f) + S(r, f),

where µ = |a| − δ > 1, |a| = max|a1k|, |a2k|, δ > 0. Denoting α = 1µ , we have 0 < α < 1,

and we deduce that

T (r, f) ≤ u1 + u2

(1− ε) maxl, tT (αr, f) + S(αr, f).

By Lemma 3.1, we obtain

ρ(f) ≤log u1+u2

(1−ε) maxl,t− logα

.

14

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 27, NO.7, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

1137 Man-Li Liu ET AL 1124-1141

Page 66: Journal of Computational Analysis and Applicationseudoxuspress.com/images/JOCAAA-VOL-27-2019-ISSUE-7.pdfJournal of Computational Analysis and Applications . ISSNno.’s:1521-1398 PRINT,1572-9206

Let ε→ 0 and δ → 0. Then

ρ(f) ≤log u1+u2

maxl,tlog |a|

.

Proof of Theorem 3.3 Applying Lemma 2.3 to system (14), we get

lT (r, f1(c1lz + d1l)) = maxm1, n1T (r, f2) + S(r, f2). (15)

tT (r, f2(c2tz + d2t)) = maxm2, n2T (r, f1) + S(r, f1). (16)

Applying Lemma 2.1 to equations (15) and (16), we get

(1− ε)lT (µ1r, f1) ≤ maxm1, n1T (r, f2) + S(r, f2),

(1− ε)tT (µ2r, f2) ≤ maxm2, n2T (r, f1) + S(r, f1),

that is

T (µ1r, f1) ≤ maxm1, n1(1− ε)l

T (r, f2) + S(r, f2),

T (µ2r, f2) ≤ maxm2, n2(1− ε)t

T (r, f1) + S(r, f1),

where µ1 = |c1l| − δ1 > 1, δ1 > 0,µ2 = |c2t| − δ2 > 1, δ2 > 0.Denoting α1 = 1

µ1, α2 = 1

µ2, we have 0 < α1 < 1, 0 < α2 < 1, and we deduce that

T (r, f1) ≤ maxm1, n1(1− ε)l

T (α1r, f2) + S(α1r, f2), (17)

T (r, f2) ≤ maxm2, n2(1− ε)t

T (α2r, f1) + S(α2r, f1), (18)

outside a possible exceptional set of finite logarithmic measure of r.Combining (17) and (18), it yields

T (r, f1) ≤ (1 + o(1)) maxm1, n1maxm2, n2(1− ε)2lt

T (α1α2r, f1) + S(α1α2r, f1),

outside a possible exceptional set of finite logarithmic measure of r.By Lemma 3.1, we obtain

ρ(f1) ≤log maxm1,n1maxm2,n2

(1−ε)2lt− logα1α2

.

By a similar reasoning as to above, we also can get

ρ(f2) ≤log maxm1,n1maxm2,n2

(1−ε)2lt− logα1α2

.

Let ε→ 0 and δi → 0, i = 1, 2. Then Theorem 3.3 is proved.

15

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 27, NO.7, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

1138 Man-Li Liu ET AL 1124-1141

Page 67: Journal of Computational Analysis and Applicationseudoxuspress.com/images/JOCAAA-VOL-27-2019-ISSUE-7.pdfJournal of Computational Analysis and Applications . ISSNno.’s:1521-1398 PRINT,1572-9206

Proof of Theorem 3.4 We assume conversely that f1, f2 are transcendental mero-morphic functions.

By Lemma 2.3 and T (r, f(z + c)) ≤ (1 + o(1))T (r + |c|, f) + M([17]), where M is aconstant, we have

maxm1, n1T (r, f2) ≤ lT (r, f1(c1l(z + d1lc1l

))) + S(r, f2)

≤ (1 + o(1))lT (|c1l|r + |d1lc1l |, f1) + S(r, f2),

maxm2, n2T (r, f1) ≤ tT (r, f2(c2t(z + d2tc2t

))) + S(r, f1)

≤ (1 + o(1))tT (|c2t|r + |d2tc2t |, f2) + S(r, f1).

(19)

There are two constants c1 = |c1l|+ ε1, c2 = |c2t|+ ε2, εi > 0, i = 1, 2, such that

T (|c1l|r + |d1l

c1l|, f1) ≤ T (c1r, f1), T (|c2t|r + |d2t

c2t|, f2) ≤ T (c2r, f2). (20)

When r is large enough, we can obtain from (19) and (20)maxm1, n1T (r, f2) ≤ (1 + o(1))lT (c1r, f1) + S(r, f2),maxm2, n2T (r, f1) ≤ (1 + o(1))tT (c2r, f2) + S(r, f1),

outside a possible exceptional set of finite linear measure of r.According to Lemma 2.5, for given σ1 > 1, σ2 > 1,

maxm1, n1T (r, f2) ≤ (1 + o(1))lT (σ1c1r, f1) + S(r, f2),maxm2, n2T (r, f1) ≤ (1 + o(1))tT (σ2c2r, f2) + S(r, f1).

(21)

Let µ(f1), µ(f2) be the finite lower order in f1, f2,respectively. By Lemma 3.2, for anygiven εi > 0, i = 1, 2, there exists a sequence rn →∞ such that for rn > r0

T (c1rn, f1) ≤ cµ(f1)+ε11 T (rn, f1), T (c2rn, f2) ≤ cµ(f2)+ε2

2 T (rn, f2).

By (21)maxm1, n1T (rn, f2) ≤ (1 + o(1))l(σ1c1)µ(f1)+ε1T (rn, f1) + S(rn, f2),

maxm2, n2T (rn, f1) ≤ (1 + o(1))t(σ2c2)µ(f2)+ε2T (rn, f2) + S(rn, f1).(22)

From (22), we get maxm1, n1 ≤ (1 + o(1))l(σ1c1)µ(f1)+ε1 T (rn,f1)T (rn,f2) + S(rn,f2)

T (rn,f2) ,

maxm2, n2 ≤ (1 + o(1))t(σ2c2)µ(f2)+ε2 T (rn,f2)T (rn,f1) + S(rn,f1)

T (rn,f1) .(23)

Taking lower limit as n→∞, and limn→∞

inf S(rn,fi)T (rn,fi)

= 0, i = 1, 2. Then (23) becomes

maxm1, n1maxm2, n2 ≤ lt(σ1c1)µ(f1)+ε3(σ2c2)µ(f2)+ε3 ,

where ε3 = maxε, ε1, ε2, ε3 → 0, σ1 → 1, σ2 → 1. Hence

µ(f1) + µ(f2) ≥log maxm1,n1maxm2,n2

lt

log |c1l||c2t|.

Thus, we have completed the proof of Theorem 3.4.

16

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 27, NO.7, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

1139 Man-Li Liu ET AL 1124-1141

Page 68: Journal of Computational Analysis and Applicationseudoxuspress.com/images/JOCAAA-VOL-27-2019-ISSUE-7.pdfJournal of Computational Analysis and Applications . ISSNno.’s:1521-1398 PRINT,1572-9206

Reference

[1] Ablowitz,M.J. Halburd R,Herbst B,On the extension of the Painleve property todifference equations.Nonlinearity, 2000, 13:889-905

[2] Bergweiler,W. Untersuchungen des Wachstums Zusammengesetzter meromorpherFunktionen, Dissertation, Aachen, 1986.

[3] Bergweiler,W. Ishizaki,K., Yanagihara,N. Growth of meromorphic solutions of somefunctional equations I, Aequations Math., 2002, 63(1-2):140-151

[4] Bergweiler,W. Ishizaki,K., Yanagihara,N. Meromorphic solutions of some functionalequations, Methods Appl.Anal., 1998, 5(3):248-258

[5] Chen Zongxuan,Growth and zeros of meromorphic solution of some linear differenceequations.Journal of Mathematical Analysis and Applications,2011,373:235–241.

[6] Chen Z.X.,K.H.Shon,On zeros and fixed points of differences of meromorphic func-tions, J. Math. Anal. Appl. 2008,344:373-383.

[7] Gao Lingyun. On meromorphic solutions of a type of system of composite functionalequations, Acta Mathematica Scientia, 2012, 32B(2):800-806

[8] Gao Lingyun. On solutions of a type of system of complex differential-differenceequations, Chinese Journal of Contemporary Mathematics, 2017, 381: 23-30

[9] Gao Lingyun. On admissible solutions of two types of systems of differential equationsin the complex plane. Acta Mathematica Sinica,2000,43(1):149-156

[10] Goldstein,R. On certain compositions of functions of a complex variable, AequationsMath, 1970, 4:103-126

[11] Goldstein,R. On meromorphic solutions of a functional equations, Aequations Math,1972, 8:82-94

[12] Goldstein,R. On meromorphic solutions of certain functional equations, AequationsMath, 1978, 18:112-157

[13] Goldstein,R. Some results on factorisation of meromorphic functions, J.LondonMath.Soc., 1971, 4(2):357-364

[14] Gundersen,R.Heittokangas,J.,Laine,I.,Rieppo,J.,D.Yang,Meromorphic solutions ofgeneralized Schroder equations,Aequationes Math.,2002,63(1-2):110-135

[15] He Yuzan, Xiao Xiuzhi. Algebroid function and ordinary differential equations. Bei-jing:Science Press, 1988

[16] Heittokangas,J. Laine,I., Rieppo,J., D.Yang. Meromorphic solutions of some linearfunctional equations, Aequations Math., 2000, 60:148-166

[17] Korhonen,R.A new Clunie type theorem for difference polynomials,J. DifferenceEqu.Appl.,2011,17(3):387-400

17

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 27, NO.7, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

1140 Man-Li Liu ET AL 1124-1141

Page 69: Journal of Computational Analysis and Applicationseudoxuspress.com/images/JOCAAA-VOL-27-2019-ISSUE-7.pdfJournal of Computational Analysis and Applications . ISSNno.’s:1521-1398 PRINT,1572-9206

[18] Laine,I. Nevanlinna theory and complex differential equations. Berlin:Walter deGruyter, 1993

[19] Mokhonko A. Z and Mokhonko V. D. Estimates for the Nevanlinna characteristics ofsome classes of meromorphic functions and their aplications to differential equations,Siberian Math. J., 1974,15, 921-934.

[20] Rieppo J. On a class of complex functional equations, Ann.Acad.Sci.Fenn.,2007,32:151-170

[21] Silvennoinen H. Meromorphic solutions of some composite functional equations. AnnAcad Sci Fenn, Helsinki: Mathematica Dissertations, 2003, 133

[22] Yi Hongxun, Yang C C. Theory of the uniqueness of meromorphic functions(in Chi-nese). Beijing:Science Press, 1995

18

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 27, NO.7, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

1141 Man-Li Liu ET AL 1124-1141

Page 70: Journal of Computational Analysis and Applicationseudoxuspress.com/images/JOCAAA-VOL-27-2019-ISSUE-7.pdfJournal of Computational Analysis and Applications . ISSNno.’s:1521-1398 PRINT,1572-9206

Locally and globally small Riemann sums and

Henstock-Stieltjes integral for n-dimensional

fuzzy-number-valued functions

Muawya Elsheikh Hamida,b∗a School of Mathematical Science, Yangzhou University, Yangzhou 225002, China

b Faculty of Engineering, University of Khartoum, Khartoum, Sudan

Abstract: In this paper, we study locally and globally small Riemann sums with respect to α for n-dimensional fuzzy-number-valued functions. And we prove that a fuzzy-number-valued functions in n-dimensional is Henstock-Stieltjes(HS) integrable on [a, b] if and only if it has (LSRS) with respect to α on [a, b]. Also we shall prove that a fuzzy-number-valued functions in n-dimensional is Henstock-Stieltjes (HS) integrable on [a, b] if and only if it has (GSRS)with respect to α on [a, b].Keywords: Fuzzy-number-valued functions in En; Henstock-Stieltjes integral (HS); locally small Riemann sums (LSRS);globally small Riemann sums (GSRS).

1 Introduction

Since the concept of fuzzy sets was firstly introduced by Zadeh in 1965 [13], it has been studied extensively frommany different aspects of the theory and applications, such as fuzzy topology, fuzzy analysis, fuzzy decision making andfuzzy logic, information science and so on.

The locally and globally small Riemann sums have been introduced by many authors from different points of viewsincluding [3, 4, 5, 7, 8, 10, 11]. In 1986, Schurle characterized the Lebesgue integral in (LSRS) (locally small Riemannsums) property [10]. The (LSRS) property has been used to characterized the Perron (P ) integral on [a, b] [11]. Byconsidering the equivalency between the (P ) integral and the Henstock-Kurzweil (HK) integral, the (LSRS) propertyhas been used to characterized the (HK) integral on [a, b] [8]. In 2015, Indrati [7] introduced a countably Lipschitzcondition of a function which is simpler than the ACG∗, and proved that the (HK) integrable function or it,s primitivecould be characterized in countably Lipschitz condition. Also, by considering the characterization of the (HK) integralin the (GSRS) property, it showed that the relationship between (GSRS) property and countably Lipschitz condition ofan (HK) integrable function on [a, b]. In 2018, Hamid et al. [5] introduced locally and globally small Riemann sums forfuzzy-number-valued functions and established two main theorems: (i) A fuzzy-number-valued functions f(x) is (HS)integrable on [a, b] iff f(x) has (LSRS). (ii) A fuzzy-number-valued functions f(x) is (HS) integrable on [a, b] iff f(x)has (GSRS).

In this paper, the concept of locally small Riemann sums for n-dimensional fuzzy-number-valued functions withrespect to α is introduced and discussed. Furthermore, we provide a characterizations of globally small Riemann sumsin n-dimensional fuzzy-number-valued functions with respect to α.

The rest of this paper is organized as follows. To make our analysis possible, in Section 2 we shall review the relevantconcepts and properties of fuzzy-number-valued functions in En and the definition of Henstock-Stieltjes (HS) integral forfuzzy-number-valued functions in En. In Section 3, we introduce the support function characterizations of locally smallRiemann sums and (HS) integral for fuzzy-number-valued functions in En. In section 4, we shall discuss the supportfunction characterizations of globally small Riemann sums and (HS) integral for fuzzy-number-valued functions in En.The last section provides the Conclusions.

2 Preliminaries

In this paper the close interval [a, b] denotes a compact interval on R. The set of intervals-point

([a1, b1], ξ1),([a2, b2], ξ2), · · · , ([ak, bk], ξk)

is called a division of [a, b] that is ξ1, ξ2, · · · , ξk ∈ [a, b], intervals [a1, b1], [a2, b2], · · · , [ak, bk]

are non-intersect andk⋃i=1

[ai, bi] = [a, b].Marking the division of [a, b] as P =

([a1, b1], ξ1), ([a2, b2], ξ2), · · · , ([ak, bk], ξk),

shortening as P =

[u, v]; ξ

[9].

∗Corresponding author. Tel.: +8613218977118. E-mail address: [email protected], [email protected] (M.E.Hamid).

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 27, NO.7, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

1142 HAMID 1142-1149

Page 71: Journal of Computational Analysis and Applicationseudoxuspress.com/images/JOCAAA-VOL-27-2019-ISSUE-7.pdfJournal of Computational Analysis and Applications . ISSNno.’s:1521-1398 PRINT,1572-9206

M.E. Hamid: Locally and globally small Riemann sums and Henstock-Stieltjes integral for n-dimensional...

Definition 2.1 [6, 8] Let δ : [a, b] → R+ be a positive real-valued function. P = [xi−1, xi]; ξi is said to be a δ-finedivision, if the following conditions are satisfied:

(1) a = x0 < x1 < x2 < ... < xn = b;(2) ξi ∈ [xi−1, xi] ⊂ (ξi − δ(ξi), ξi + δ(ξi))(i = 1, 2, · · · , n).For brevity, we write P = [u, v]; ξ, where [u, v] denotes a typical interval in P and ξ is the associated point of [u, v].

Definition 2.2 [12] En is said to be a fuzzy number space if En = u : Rn → [0, 1] : u satisfies (1)-(4) below:(1) u is normal, i.e., there exists a x0 ∈ Rn such that u(x0) = 1;(2) u is a convex fuzzy set, i.e., u(rx+ (1− r)y) > min(u(x), u(y)), x, y ∈ Rn, r ∈ [0, 1];(3) u is upper semi-continuous;(4) [u]0 = x ∈ Rn : u(x) > 0 is compact, for 0 < r ≤ 1, denote [u]r = x : x ∈ Rn and u(x) > r, [u]0 =

⋃r∈(0,1][u]r.

From (1)-(4), it follows that for any u ∈ En and r ∈ [0, 1] the r−level set [u]r is a compact convex set. For anyu, v ∈ En

D(u, v) = supr∈[0,1]

d([u]r, [v]r), (1)

where d is Hausdorff metric. It is well known that (En, d) is an metric space [12]. The norm of fuzzy number u ∈ En isdefined by

‖u‖ = D(u, 0) = supα∈[u]0

|α|, (2)

where the ‖ · ‖ is norm on En, 0 is fuzzy number on En and 0 = χ0.

Definition 2.3 [12] For A ∈ Pk(Rn), x ∈ Sn−1, define the support function of A as σ(x,A) = supy∈A〈y, x〉, where Sn−1 is

the unit sphere of Rn, i.e., Sn−1 = x ∈ Rn : ‖x‖ = 1, 〈·, ·〉 is the inner product in Rn.

Definition 2.4 [2] Let α : [a, b]→ R be an increasing function. A fuzzy-number-valued function f : [a, b]→ En is saidto be fuzzy Henstock-Stieltjes (FHS) integrable with respect to α on [a, b], if there exists A ∈ En, for every ε > 0, thereis a function δ(ξ) > 0, such that for any δ-fine division P = [u, v], ξ of [a, b], we have

D(∑

(P )

f(ξ)[α(v)− α(u)], A)< ε. (3)

We write (FHS)b∫a

f(x)dα = A.

Lemma 2.1 [12] If u, v ∈ En, k ∈ R, for any r ∈ [0, 1], we have

[u+ v]r = [u]r + [v]r, [ku]r = k[u]r. (4)

Lemma 2.2 [12] Suppose u ∈ En, then(1) u∗(r, x+ y) ≤ u∗(r, x) + u∗(r, y),(2) if u, v ∈ En, r ∈ [0, 1], then

d([u]r, [v]r) = supx∈Sn−1

|u∗(r, x)− v∗(r, x)|, (5)

(3) (u+ v)∗(r, x) = u∗(r, x) + v∗(r, x),(4) (ku)∗(r, x) = ku∗(r, x), k ≥ 0.

Lemma 2.3 [1, 12] Given u, v ∈ En the distance D : En × En → [0,+∞) between u and v is defined by the equationD(u, v) = sup

r∈[0,1]d([u]r, [v]r), then

(1) (En, D) is a complete metric space,(2) D(u+ w, v + w) = D(u, v),(3) D(u+ v, w + e) 6 D(u,w) +D(v, e),(4) D(ku, kv) = |k|D(u, v), k ∈ R,(5) D(u+ v, 0) 6 D(u, 0) +D(v, 0),(6) D(u+ v, w) 6 D(u,w) +D(v, 0).

Where u, v, w, e, 0 ∈ En, 0 = X(0).

Lemma 2.4 [2] Let α : [a, b]→ R be an increasing function. A fuzzy-number-valued function F : [a, b]→ En is (FHS)integrable with respect to α on [a, b] if and only if F ∗(t)(r, x) is (RHS) integrable with respect to α on [a, b] uniformlyfor any r ∈ [0, 1] and x ∈ Sn−1, we have(

(FHS)

b∫a

F (t)dα

)∗(r, x) = (RHS)

b∫a

F ∗(t)(r, x)dα. (6)

Uniformly for any r ∈ [0, 1].

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 27, NO.7, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

1143 HAMID 1142-1149

Page 72: Journal of Computational Analysis and Applicationseudoxuspress.com/images/JOCAAA-VOL-27-2019-ISSUE-7.pdfJournal of Computational Analysis and Applications . ISSNno.’s:1521-1398 PRINT,1572-9206

M.E. Hamid: Locally and globally small Riemann sums and Henstock-Stieltjes integral for n-dimensional...

3 Support function characterizations of locally small Riemann sumsand (HS) integral for fuzzy-number-valued functions in En

In this section, we shall define locally small Riemann sums or in short (LSRS) with respect to α on [a, b] by usingsupport function f∗(ξ)(r, x) and show that it is the necessary and sufficient condition for f to be (HS) integrable withrespect to α on [a, b].

Definition 3.1 Let α : [a, b] → R be an increasing function. A fuzzy-number-valued function f : [a, b] → En is said tobe have locally small Riemann sums or (LSRS) with respect to α on [a, b] if for every ε > 0 there is a δ(ξ) > 0 such thatfor every t ∈ [a, b], we have ∥∥∥∥∑ f(ξ)[α(v)− α(u)]

∥∥∥∥En

< ε, (7)

whenever P = [u, v]; ξ is a δ-fine division of an interval C ⊂ (t − δ(t), t + δ(t)), t ∈ C and Σ sums over P . (WhereC = [y, z]).

The following Theorem 3.1 shows that f has (LSRS) with respect to α on [a, b] is equal to the type of it,s supportfunctions.

Theorem 3.1 Let α : [a, b] → R be an increasing function and let f : [a, b] → En be a fuzzy-number-valued function,the support-function-wise f∗(ξ)(r, x) of f has locally small Riemann sums or (LSRS) with respect to α on [a, b] if andonly if for every ε > 0, there is a δ(ξ) > 0 such that for every t ∈ [a, b], we have∣∣∣∣∑ f∗(ξ)(r, x)[α(v)− α(u)]

∣∣∣∣ < ε, (8)

uniformly for any r ∈ [0, 1] and x ∈ Sn−1, whenever P = [u, v]; ξ is a δ-fine division of an interval C ⊂ (t−δ(t), t+δ(t)),t ∈ C and Σ sums over P.

Proof Let 0 ∈ En denote the (FHS) integral of f with respect to α on [a, b]. Given ε > 0 there is a δ(ξ) > 0 such thatfor any δ-fine division P = [u, v]; ξ of [a, b], we have

D

(∑f(ξ)[α(v)− α(u)], 0

)< ε. (9)

That is

supr∈[0,1]

d

([∑f(ξ)[α(v)− α(u)]

]r, ˜[0]

r)< ε. (10)

By Lemma 2.2 we have

supr∈[0,1]

supx∈Sn−1

∣∣∣∣(∑ f(ξ)[α(v)− α(u)])∗

(r, x)− σ(x, 0)

∣∣∣∣ < ε. (11)

Furthermore, by σ(x,A) = supy∈A〈y, x〉, we have

supr∈[0,1]

supx∈Sn−1

∣∣∣∣∑ f∗(ξ)(r, x)[α(v)− α(u)]− σ(x, 0)

∣∣∣∣ < ε. (12)

Hence, for any r ∈ [0, 1], x ∈ Sn−1 and for any δ-fine division P we have∣∣∣∣∑ f∗(ξ)(r, x)[α(v)− α(u)]

∣∣∣∣ < ε. (13)

Where σ(x, 0) = 0.This completes the proof.

Lemma 3.1 (Henstock Lemma). Let α : [a, b]→ R be an increasing function and let f : [a, b]→ En be a fuzzy-number-valued function and (HS) integrable to A with respect to α on [a, b]. Then, the support-function-wise f∗(ξ)(r, x) of fon [a, b] is (HS) integrable to A∗(r, x) with respect to α on [a, b] uniformly for any r ∈ [0, 1], x ∈ Sn−1 and A ∈ En ,i.e., for every ε > 0 there is a positive function δ(ξ) > 0, for δ-fine division P = [u, v]; ξ of [a, b] and for any x ∈ Sn−1,we have ∣∣∣∣∑ f∗(ξ)(r, x)[α(v)− α(u)]−A∗(r, x)

∣∣∣∣ < ε. (14)

Furthermore, for any sum of parts∑1

from∑

we have∣∣∣∣∑1

f∗(ξ)(r, x)[α(v)− α(u)]−A∗(r, x)

∣∣∣∣ < ε. (15)

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 27, NO.7, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

1144 HAMID 1142-1149

Page 73: Journal of Computational Analysis and Applicationseudoxuspress.com/images/JOCAAA-VOL-27-2019-ISSUE-7.pdfJournal of Computational Analysis and Applications . ISSNno.’s:1521-1398 PRINT,1572-9206

M.E. Hamid: Locally and globally small Riemann sums and Henstock-Stieltjes integral for n-dimensional...

Proof Let A ∈ En denote the (FHS) integral of f with respect to α on [a, b]. Given ε > 0 there is a δ(ξ) > 0 such thatfor any δ-fine division P = [u, v]; ξ of [a, b], we have

D

(∑f(ξ)[α(v)− α(u)], A

)< ε. (16)

That is

supr∈[0,1]

d

([∑f(ξ)[α(v)− α(u)]

]r, ˜[A]

r)< ε. (17)

By Lemma 2.2 we have

supr∈[0,1]

supx∈Sn−1

∣∣∣∣(∑ f(ξ)[α(v)− α(u)])∗

(r, x)−A∗(r, x)

∣∣∣∣ < ε. (18)

Furthermore, by A∗(r, x) = supy∈[A]r

〈y, x〉, we have

supr∈[0,1]

supx∈Sn−1

∣∣∣∣∑ f∗(ξ)(r, x)[α(v)− α(u)]−A∗(r, x)

∣∣∣∣ < ε. (19)

Hence, for any r ∈ [0, 1], x ∈ Sn−1 and for any δ-fine division P we have∣∣∣∣∑ f∗(ξ)(r, x)[α(v)− α(u)]−A∗(r, x)

∣∣∣∣ < ε. (20)

For proof ∣∣∣∣∑1

f∗(ξ)(r, x)[α(v)− α(u)]−A∗(r, x)

∣∣∣∣ < ε, (21)

the proof is similar to the Theorem 3.7 in [8].This completes the proof.

Theorem 3.2 Let α : [a, b]→ R be an increasing function and let f : [a, b]→ En be a fuzzy-number-valued function. Iff is (HS) integrable to F ([a, b]) with respect to α on [a, b], then f has LSRS with respect to α on [a, b].

Proof Since f is (HS) integrable to F ([a, b]) with respect to α on [a, b], by Theorem 3.1 the support-function-wisef∗(ξ)(r, x) of f on [a, b] is (HS) integrable to F ∗([a, b])(r, x) with respect to α on [a, b] uniformly for any r ∈ [0, 1], x ∈Sn−1, i.e., for every ε > 0 there is a positive function δ(ξ) > 0, for δ-fine division P = [u, v]; ξ of [a, b] and for anyx ∈ Sn−1, we have ∣∣∣∣∑ f∗(ξ)(r, x)[α(v)− α(u)]− F ∗([a, b])(r, x)

∣∣∣∣ < ε

2. (22)

For each t ∈ [a, b], there is a closed interval C = [y, z] ⊂ (t− δ(t), t+ δ(t)) such that∣∣∣∣F ∗([y, z])(r, x)

∣∣∣∣ < ε

2. (23)

According to Henstock Lemma, for each t ∈ [a, b] and δ-fine division P = [u, v]; ξ of C ⊂ (t− δ(t), t+ δ(t)), we have∣∣∣∣∑ f∗(ξ)(r, x)[α(v)− α(u)]

∣∣∣∣ ≤ ∣∣∣∣∑ f∗(ξ)(r, x)[α(v)− α(u)]− F ∗([a, b])(r, x)

∣∣∣∣+

∣∣∣∣F ∗([y, z])(r, x)

∣∣∣∣< ε.

Applies Theorem 3.1 again f has LSRS with respect to α on [a, b].This completes the proof.

Lemma 3.2 Let α : [a, b] → R be an increasing function and let f : [a, b] → En be a fuzzy-number-valued function. Iff is (FHS) integrable with the F as primitive then for each number ε > 0 there is a positive function δ(ξ) > 0, suchthat for any [u, v] ⊂ [a, b] with

(α(v)− α(u)

)< δ(ξ), we have∥∥∥∥F ([u, v])

∥∥∥∥En

=

∥∥∥∥(FHS)

∫[u,v]

fdα

∥∥∥∥En

< ε. (24)

Proof The continuity follows from Lemma 3.1 and the following inequality:∥∥∥∥F ([u, v])

∥∥∥∥En

= D

(F (u), F (v)

)≤ D

(F ([u, v]), f(ξ)[α(v)− α(u)]

)+

∥∥∥∥f(ξ)[α(v)− α(u)]

∥∥∥∥En

< ε.

We only need set δ(ξ) < ε

2(‖f(ξ)‖En+1).

This completes the proof.

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 27, NO.7, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

1145 HAMID 1142-1149

Page 74: Journal of Computational Analysis and Applicationseudoxuspress.com/images/JOCAAA-VOL-27-2019-ISSUE-7.pdfJournal of Computational Analysis and Applications . ISSNno.’s:1521-1398 PRINT,1572-9206

M.E. Hamid: Locally and globally small Riemann sums and Henstock-Stieltjes integral for n-dimensional...

Theorem 3.3 Let α : [a, b] → R be an increasing function and let a fuzzy-number-valued function f : [a, b] → En hasLSRS with respect to α on [a, b], then f is (FHS) integrable with respect to α on [a, b].

Proof Given any ε > 0 and P = ([a, b], ξ) = ([a1, b1], ξ1), ([a2, b2], ξ2), · · · , ([an, bn], ξn) is a δ-fine partition of [a, b].For each i(i = 1, 2, · · · , n) there is a positive function δi with Pi = ([ui, vi], ξi) is a δi-fine partition of [ai, bi]. Since fhas LSRS with respect to α on [ai, bi], then we have∥∥∥∥∑

Pi

f(ξ)[α(v)− α(u)]

∥∥∥∥En

2n. (25)

Taken η = maxδ(ξ), ξ ∈ [a, b], according to the Lemma 3.2 we have∥∥∥∥F ([ai, bi])

∥∥∥∥En

=

∥∥∥∥(FHS)

∫[ai,bi]

fdα

∥∥∥∥En

2n. (26)

Therefore, for any δi-fine partition Pi = ([ui, vi], ξi) of [ai, bi], we have(∑Pi

f(ξ)[α(v)− α(u)], F ([ai, bi])

)≤

∥∥∥∥∑Pi

f(ξ)[α(v)− α(u)]

∥∥∥∥En

+

∥∥∥∥F ([ai, bi])

∥∥∥∥En

2n+

ε

2n=ε

n,

for each i.

Subsequently taken δ∗(ξ) = minδ(ξ), δi(ξ), then P =n⋃i=1

Pi denote δ∗-fine partition of [a, b].

Therefore we have(∑P

f(ξ)[α(v)− α(u)], F ([a, b])

)=

n∑i=1

D

(∑Pi

f(ξ)[α(v)− α(u)], F ([ai, bi])

)< n · ε

n= ε.

Then f is (FHS) integral with respect to α on [a, b].This completes the proof.

4 Support function characterizations of globally small Riemann sum-s and (HS) integral for fuzzy-number-valued functions in En

In this section, we shall define globally small Riemann sums or in short (GSRS) integral with respect to α on [a, b] byusing support function f∗(ξ)(r, x) and show that it is the necessary and sufficient condition for f to be (HS) integrableon [a, b].

Definition 4.1 Let α : [a, b] → R be an increasing function. A fuzzy-number-valued function f : [a, b] → En is said tobe have globally small Riemann sums or (GSRS) with respect to α on [a, b] if for every ε > 0 there exists a positiveinteger N such that for every n > N there is a δn(ξ) > 0 and for every δn-fine division P = [u, v]; ξ of [a, b], we have∥∥∥∥ ∑

‖f(ξ)‖En>n

f(ξ)[α(v)− α(u)]

∥∥∥∥En

< ε, (27)

where the∑

is taken over P and for which∥∥f(ξ)

∥∥En >n.

The following Theorem 4.1 shows that f has (GSRS) with respect to α on [a, b] is equal to the type of it,s supportfunctions.

Theorem 4.1 Let α : [a, b] → R be an increasing function and let f : [a, b] → En be a fuzzy-number-valued function,the support-function-wise f∗(ξ)(r, x) of f has globally small Riemann sums or (GSRS) with respect to α on [a, b] if andonly if for every ε > 0, there exists a positive integer N such that for every n > N there is a δn(ξ) > 0 and for everyδn-fine division P = [u, v]; ξ of [a, b], we have∣∣∣∣ ∑

|f∗(ξ)(r,x)|>n

f∗(ξ)(r, x)[α(v)− α(u)]

∣∣∣∣ < ε, (28)

uniformly for any r ∈ [0, 1] and x ∈ Sn−1, where the∑

is taken over P and for which∣∣f∗(ξ)(r, x)

∣∣ > n.

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 27, NO.7, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

1146 HAMID 1142-1149

Page 75: Journal of Computational Analysis and Applicationseudoxuspress.com/images/JOCAAA-VOL-27-2019-ISSUE-7.pdfJournal of Computational Analysis and Applications . ISSNno.’s:1521-1398 PRINT,1572-9206

M.E. Hamid: Locally and globally small Riemann sums and Henstock-Stieltjes integral for n-dimensional...

Proof First, we can prove the following statements are equivalent:(1)

∥∥f(ξ)∥∥En > n.

(2)∣∣f∗(ξ)(r, x)

∣∣ > n.In fact ∥∥f(ξ)

∥∥En > n = sup

r∈[0,1]d([f(ξ)]r, [0]r

)= sup

r∈[0,1]sup

x∈Sn−1

∣∣f∗(ξ)(r, x)∣∣.

Second, let 0 ∈ En denote the (FHS) integral of f with respect to α on [a, b]. Given ε > 0 there exists a positiveinteger N such that for every n > N there is a δn(ξ) > 0 and for every δn-fine division P = [u, v]; ξ of [a, b], we have

D

( ∑‖f(ξ)‖En>n

f(ξ)[α(v)− α(u)], 0

)< ε. (29)

That is

supr∈[0,1]

d

([ ∑‖fr(ξ)‖En>n

f(ξ)[α(v)− α(u)]]r,[0]r)

< ε. (30)

By Lemma 2.2 we have

supr∈[0,1]

supx∈Sn−1

∣∣∣∣( ∑|f∗(ξ)(r,x)|>n

f(ξ)[α(v)− α(u)])∗

(r, x)− σ(x, 0)

∣∣∣∣ < ε. (31)

Furthermore, by σ(x,A) = supy∈A〈y, x〉, we have

supr∈[0,1]

supx∈Sn−1

∣∣∣∣ ∑|f∗(ξ)(r,x)|>n

f∗(ξ)(r, x)[α(v)− α(u)]− σ(x, 0)

∣∣∣∣ < ε. (32)

Hence, for any r ∈ [0, 1], x ∈ Sn−1 and for any δ-fine division P we have∣∣∣∣ ∑|f∗(ξ)(r,x)|>n

f∗(ξ)(r, x)[α(v)− α(u)]

∣∣∣∣ < ε. (33)

Where σ(x, 0) = 0.This completes the proof.

Theorem 4.2 Let α : [a, b]→ R be an increasing function and let f : [a, b]→ En be a fuzzy-number-valued function. Iff has GSRS with respect to α on [a, b] then f is (HS) integrable with respect to α on [a, b].

Proof Because f has GSRS with respect to α on [a, b], then by Theorem 4.1 for every ε > 0, there exists a positiveinteger N such that for every n > N there is a δn(ξ) > 0 and for every δn-fine division P = [u, v]; ξ of [a, b], we have∣∣∣∣ ∑

|f∗(ξ)(r,x)|>n

f∗(ξ)(r, x)[α(v)− α(u)]

∣∣∣∣ < ε. (34)

uniformly for any r ∈ [0, 1] and x ∈ Sn−1, where the∑

is taken over P and for which∣∣f∗(ξ)(r, x)

∣∣ > n.For each two δ-fine divisions P1 = [u1, v1]; ξ1, P2 = [u2, v2]; ξ2 of [a, b], we have∣∣∣∣∑ f∗(ξ1)(r, x)[α(v1)− α(u1)]−

∑f∗(ξ2)(r, x)[α(v2)− α(u2)]

∣∣∣∣≤

∣∣∣∣∑ f∗(ξ1)(r, x)[α(v1)− α(u1)]

∣∣∣∣+

∣∣∣∣∑ f∗(ξ2)(r, x)[α(v2)− α(u2)]

∣∣∣∣≤

∣∣∣∣ ∑|f∗(ξ1)(r,x)|>n

f∗(ξ1)(r, x)[α(v1)− α(u1)]

∣∣∣∣+

∣∣∣∣ ∑|f∗(ξ1)(r,x)|≤n

f∗(ξ1)(r, x)[α(v1)− α(u1)]

∣∣∣∣+

∣∣∣∣ ∑|f∗(ξ2)(r,x)|>n

f∗(ξ2)(r, x)[α(v2)− α(u2)]

∣∣∣∣+

∣∣∣∣ ∑|f∗(ξ2)(r,x)|≤n

f∗(ξ2)(r, x)[α(v2)− α(u2)]

∣∣∣∣< 4ε.

According to the properties of Cauchy, f is (HS) integrable on [a, b].This completes the proof.

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 27, NO.7, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

1147 HAMID 1142-1149

Page 76: Journal of Computational Analysis and Applicationseudoxuspress.com/images/JOCAAA-VOL-27-2019-ISSUE-7.pdfJournal of Computational Analysis and Applications . ISSNno.’s:1521-1398 PRINT,1572-9206

M.E. Hamid: Locally and globally small Riemann sums and Henstock-Stieltjes integral for n-dimensional...

Theorem 4.3 Let α : [a, b] → R be an increasing. Given a fuzzy-number-valued function f : [a, b] → En, for eachr ∈ [0, 1] and x ∈ Sn−1 defined the support function f∗n(ξ)(r, x) of fn by the formula:

f∗n(ξ)(r, x) =

f∗(ξ)(r, x), ξ ∈ [a, b] if |f∗(ξ)(r, x)| ≤ n,0, others.

A fuzzy-number-valued function f is (HS) integrable with respect to α on [a, b] if and only if f has GSRS withrespect to α on [a, b] and Fn([a, b]) → F ([a, b]) as n → ∞. (Where F ([a, b]) and Fn([a, b]) the integral of f and fn withrespect to α on [a, b] respectively).

Proof First we shall prove the necessity. Because a fuzzy-number-valued function f is (HS) integrable with respectto α on [a, b] uniformly for any r ∈ [0, 1] and x ∈ Sn−1, i.e., for every ε > 0 there is a positive function δ∗, for δ∗-finedivision P = [u, v]; ξ of [a, b], we have∣∣∣∣∑ f∗(ξ)(r, x)[α(v)− α(u)]− F ∗([a, b])(r, x)

∣∣∣∣ < ε

3. (35)

For each n ∈ N, there is a positive function δn, for δn-fine division P = [u, v]; ξ of [a, b], we have∣∣∣∣∑ f∗n(ξ)(r, x)[α(v)− α(u)]− F ∗n([a, b])(r, x)

∣∣∣∣ < ε

3, (36)

for each r ∈ [0, 1] and x ∈ Sn−1.Because F ∗n([a, b])(r, x) converge to F ∗([a, b])(r, x) of [a, b] then there is a positive number N so if n ≥ N we have∣∣∣∣F ∗n([a, b])(r, x)− F ∗([a, b])(r, x)

∣∣∣∣ < ε

3. (37)

For n ≥ N, defined a positive function δ on [a, b] by the formula:

δ(ξ) = minδ∗(ξ), δn(ξ). (38)

Therefor, for each δ-fine division P = [u, v]; ξ of [a, b], we have∣∣∣∣ ∑|f∗(ξ)(r,x)|>n

f∗(ξ)(r, x)[α(v)− α(u)]

∣∣∣∣=

∣∣∣∣∑ f∗(ξ)(r, x)[α(v)− α(u)]−∑

f∗n(ξ)(r, x)[α(v)− α(u)]

∣∣∣∣≤

∣∣∣∣∑ f∗(ξ)(r, x)[α(v)− α(u)]− F ∗([a, b])(r, x)

∣∣∣∣+

∣∣∣∣F ∗n([a, b])(r, x)− F ∗([a, b])(r, x)

∣∣∣∣+

∣∣∣∣F ∗([a, b])(r, x)−∑

f∗n(ξ)(r, x)[α(v)− α(u)]

∣∣∣∣<

ε

3+ε

3+ε

3= ε.

Then f has GSRS with respect to α on [a, b].Second we shall prove the sufficiency. Because f has GSRS with respect to α on [a, b], then by Theorem 4.1 for every

ε > 0, there exists a positive integer N such that for every n > N there is a δn(ξ) > 0 and for every δn-fine divisionP = [u, v]; ξ of [a, b], we have ∣∣∣∣ ∑

|f∗(ξ)(r,x)|>n

f∗(ξ)(r, x)[α(v)− α(u)]

∣∣∣∣ < ε, (39)

uniformly for any r ∈ [0, 1] and x ∈ Sn−1, where the∑

is taken over P and for which∣∣f∗(ξ)(r, x)

∣∣ > n.

Note that fn, is Henstock-Stieltjes integrable with respect to α on [a, b] for all n. Choose N so that whenever n,m > Nwe have ∣∣∣∣F ∗n([a, b])(r, x)− F ∗m([a, b])(r, x)

∣∣∣∣ < ε. (40)

Then for n,m > N and a suitably chosen δ-fine division P = [u, v]; ξ, we have∣∣∣∣F ∗n([a, b])(r, x)− F ∗m([a, b])(r, x)

∣∣∣∣≤

∣∣∣∣F ∗n([a, b])(r, x)−∑

|f∗(ξ)(r,x)|≤n

f∗(ξ)(r, x)[α(v)− α(u)]

∣∣∣∣+

∣∣∣∣ ∑|f∗(ξ)(r,x)|>n

f∗(ξ)(r, x)[α(v)− α(u)]

∣∣∣∣+

∣∣∣∣ ∑|f∗(ξ)(r,x)|≤m

f∗(ξ)(r, x)[α(v)− α(u)]− F ∗m([a, b])(r, x)

∣∣∣∣+

∣∣∣∣ ∑|f∗(ξ)(r,x)|>m

f∗(ξ)(r, x)[α(v)− α(u)]

∣∣∣∣< 4ε.

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 27, NO.7, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

1148 HAMID 1142-1149

Page 77: Journal of Computational Analysis and Applicationseudoxuspress.com/images/JOCAAA-VOL-27-2019-ISSUE-7.pdfJournal of Computational Analysis and Applications . ISSNno.’s:1521-1398 PRINT,1572-9206

M.E. Hamid: Locally and globally small Riemann sums and Henstock-Stieltjes integral for n-dimensional...

That is, F ∗n([a, b])(r, x) converge to F ∗([a, b])(r, x), as n→∞. Again, for suitably chosen N and δ(ξ) and for everyδ-fine division P = [u, v]; ξ, we have∣∣∣∣∑ f∗(ξ)(r, x)[α(v)− α(u)]− F ∗([a, b])(r, x)

∣∣∣∣≤

∣∣∣∣∑ f∗(ξ)(r, x)[α(v)− α(u)]− F ∗N ([a, b])(r, x)

∣∣∣∣+

∣∣∣∣F ∗N ([a, b])(r, x)− F ∗([a, b])(r, x)

∣∣∣∣≤

∣∣∣∣ ∑|f∗(ξ)(r,x)|≤N

f∗(ξ)(r, x)[α(v)− α(u)]− F ∗N ([a, b])(r, x)

∣∣∣∣+

∣∣∣∣ ∑|f∗(ξ)(r,x)|>N

f∗(ξ)(r, x)[α(v)− α(u)]

∣∣∣∣+

∣∣∣∣F ∗N ([a, b])(r, x)− F ∗([a, b])(r, x)

∣∣∣∣< 3ε.

That is, f is (HS) integrable on [a, b].This completes the proof.

5 conclusions

In this paper, the notions of locally and globally small Riemann sums modifications with respect to fuzzy-number-valued functions in En are introduced and studied. The basic properties and characterizations are presented. Inparticular, it is proved that a fuzzy-number-valued functions in En is (HS) integrable on [a, b] iff it has (LSRS), andalso it is proved that a fuzzy-number-valued functions in En is (HS) integrable on [a, b] iff it has (GSRS).

References

[1] S.X. Hai and Z.T. Gong, On Henstock integral of fuzzy-number-valued functions in Rn, International Journal ofPure and Applied Mathematics, 7(1)(2003), 111-121.

[2] M.E. Hamid and Z.T Gong, The Henstock-Stieltjes Integral for n-dimensional Fuzzy-Number-Valued Functions,International Journal of Mathematics And its Applications, 5(1-B)(2017), 171-185.

[3] M.E. Hamid, L.S. Xu and Z.T. Gong, Locally and globally small Riemann sums and Henstock integral of fuzzy-number-valued functions, Journal of Computational Analysis and Applications, 25(1)(2018), 11-18.

[4] M.E. Hamid, L.S. Xu, Locally and globally small Riemann sums and Henstock integral of fuzzy- number-valuedfunctions in En, Journal of Computational Analysis and Applications, in Press.

[5] M.E. Hamid, L.S. Xu and Z.T. Gong, Locally and globally small Riemann sums and Henstock-Stieltjes integral offuzzy- number-valued functions, Journal of Computational Analysis and Applications, 25(6)(2018), 1107-1115.

[6] R. Henstock, Theory of Integration, Butterworth, London, 1963.

[7] C.R. Indrati, Some Characteristics of the Henstock-Kurzweil in Countably Lipschitz Condition, The 7th SEAMS-UGM Conference 2015.

[8] P.Y. Lee, Lanzhou Lectures on Henstock Integration, World Scientific, Singapore, 1989.

[9] P.Y. Lee and R. Vyborny, The Integral: An Easy Approach after Kurzweil and Henstock, Cambridge UniversityPress, 2000.

[10] A.W. Schurle, A new property equivalent to Lebesgue integrability, Proceedings of the American MathematicalSociety, 96(1)(1986), 103-106.

[11] A.W. Schurle, A function is Perron integrable if it has locally small Riemann sums, Journal of the AustralianMathematical Society (Series A), 41(2)(1986), 224-232.

[12] C.X. Wu, M. Ma and J.X. Fang, Structure Theory of Fuzzy Analysis, Guizhou Scientific Publication (1994), InChinese.

[13] L.A. Zadeh, Fuzzy sets, Information Control, 8(1965), 338-353.

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 27, NO.7, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

1149 HAMID 1142-1149

Page 78: Journal of Computational Analysis and Applicationseudoxuspress.com/images/JOCAAA-VOL-27-2019-ISSUE-7.pdfJournal of Computational Analysis and Applications . ISSNno.’s:1521-1398 PRINT,1572-9206

Solving Systems of Nonhomogeneous Coupled

Linear Matrix Differential Equations in Terms of

Mittag-Leffler Matrix Functions

Rungpailin Kongyaksee, Pattrawut Chansangiam∗

Department of Mathematics, Faculty of Science,King Mongkut’s Institute of Technology Ladkrabang,

Bangkok 10520, Thailand.

Abstract

In this paper, we investigate systems of nonhomogeneous coupled lin-ear matrix differential equations. Applying Kronecker products, the vec-tor operator, and matrix convolution product, we obtain explicit formulaof the general solution to this system in terms of matrix series concerningexponentials and Mittag-Leffler functions.

Keywords: linear matrix differential equation, Kronecker product, vector op-erator, matrix convolution product, Mittag-Leffler function.Mathematics Subject Classifications 2010: 15A16, 15A69, 33E12, 34A30,44A35.

1 Introduction

Theory of linear matrix differential equations can be applied in a broad range ofscientific fields, e.g. statistics [2, 6, 8], game theory [4], ecometrics and Leondiefmodel [6, 8, 11], control and system theory [3, 7]. The simplest first-orderhomogeneous linear matrix differential equation with time-invariant coefficientis given by

X ′(t) = AX(t). (1.1)

Here, A is a given square matrix and X(t) is an unknown matrix-valued functionto be solved. The system (1.1) has been widely studied, and the solution relies onthe computation of etA; see more information in [12, 13]. The nonhomogeneouscase appears in the form

X ′(t) = AX(t) + U(t), (1.2)

∗Corresponding author. Email: [email protected]

1

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 27, NO.7, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

1150 Kongyaksee ET AL 1150-1160

Page 79: Journal of Computational Analysis and Applicationseudoxuspress.com/images/JOCAAA-VOL-27-2019-ISSUE-7.pdfJournal of Computational Analysis and Applications . ISSNno.’s:1521-1398 PRINT,1572-9206

here U(t) is a given matrix-valued function. In fact, the equation (1.2) has ageneral solution given by a one-parameter matrix-valued function

X(t) = e(t−t0)AX(t0) + etA ∗ U(t), (1.3)

where ∗ denotes the matrix convolution product. See related works on nonho-mogeneous case in [10, 15] and references therein.

Coupled matrix differential equations have numerous applications in pureand applied mathematics. For example, to obtain the solution of an optimalcontrol problem with performance index we need to solve the system [7]

X ′(t) = AX(t) +BY (t),

Y ′(t) = CX(t)−ATY (t).

A general system of nonhomogeneous coupled linear matrix differential equa-tions with time-invariant coefficient takes the form

X ′(t) = AX(t)B + CY (t)D + U(t),

Y ′(t) = EX(t)F +GY (t)H + V (t).(1.4)

In [5], a homogeneous case of (1.4) when E = C, F = D, G = A, H =B was investigated under the assumption that AC = CA and BD = DB.In this case, the solution is given in terms of Kronecker products, the vectoroperator, and matrix series concerning exponentials and hyperbolic functions.A nonhomogeneous case of (1.4) was discussed in [1].

In this work, we investigate the system (1.4) under the assumption thatAC = CG, GE = EA, DB = HD, FH = BF . We apply Kronecker productsand the vector operator to reduce our complex system to the simplest form.Thus, an explicit formula of the general solution to this system is obtainedin terms of Mittag-Leffler matrix functions. In particular, we obtain generalsolution of several special cases of the main system. When initial conditions areimposed to these problems, its solution is uniquely determined. Our results alsoinclude the previous works [1, 5].

This paper is structured as follows. In Section 2, we supply useful facts forsolving linear matrix differential equations, including matrix functions definedby power series, Kronecker product, vector operator, and matrix convolutionproduct. The main part of the paper, Section 3, deals with solving the system(1.4) and its interesting special cases. In Sections 4, we treat an initial valueproblem related to (1.4) and illustrate it with a numerical example.

2 Preliminaries

In this section, we provide adequate tools for solving system of linear matrixdifferential equations. We shall denote the set of all m-by-n complex matricesby Mm,n, and we set Mn =Mn,n.

2

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 27, NO.7, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

1151 Kongyaksee ET AL 1150-1160

Page 80: Journal of Computational Analysis and Applicationseudoxuspress.com/images/JOCAAA-VOL-27-2019-ISSUE-7.pdfJournal of Computational Analysis and Applications . ISSNno.’s:1521-1398 PRINT,1572-9206

2.1 Functions of a matrix defined by power series

Consider A ∈ Mn and a holomorphic function f defined on a region in thecomplex plane containing the origin and the spectrum of A. Let R > 0 be suchthat f admits the Taylor series expansion

f(z) =∞∑k=0

akzk for |z| < R,

where a0 = f(0) and ak = f (k)(0)/k! for any k ∈ N. If the spectral radius of Ais less than R, then the matrix power series

∑∞k=0 akA

k converges, denoted byf(A). Hence if f is an entire function then f(A) is a well-defined matrix for anyA ∈Mn. In particular, the following matrix series converge for any A ∈Mn:

sinh(A) =∞∑k=0

1

(2k + 1)!A2k+1, cosh(A) =

∞∑k=0

1

(2k)!A2k.

Recall that the two-parameter Mittag-Leffler functions (e.g. [14]) is defined by

Eα,β(z) =∞∑k=0

zk

Γ(αk + β)(2.1)

where Γ is the Gamma function. The power series (2.1) converges for all complexnumbers z.

The Mittag-Leffler function of a matrix A ∈Mn with parameters α > 0 andβ > 0 is defined by

Eα,β(A) =∞∑k=0

1

Γ(αk + β)Ak = In +

1

Γ(α+ β)A+

1

Γ(2α+ β)A2 + · · · .

The class of matrix Mittag-Leffler functions include the following functions:

E1,1(A) =∞∑k=0

1

k!Ak = eA, E2,1(A

2) =∞∑k=0

1

(2k)!A2k = cosh(A).

An expansion shows that(E2,2(A

2))A =

∑∞k=0

1

(2k + 1)!A2k+1 = sinh(A).

Lemma 2.1 (see e.g. [9]). If (A,B) is a pair of commuting complex matrices,then eA+B = eAeB.

The next lemma is useful for deriving explicit formulas of solutions for systemof linear matrix differential equations in Section 3.

Lemma 2.2. For any A ∈Mn(C) andB ∈Mn(C), we have

e

0 AB 0

=

[E2,1(AB)

(E2,2(AB)

)A(

E2,2(BA))B E2,1(BA)

].

3

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 27, NO.7, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

1152 Kongyaksee ET AL 1150-1160

Page 81: Journal of Computational Analysis and Applicationseudoxuspress.com/images/JOCAAA-VOL-27-2019-ISSUE-7.pdfJournal of Computational Analysis and Applications . ISSNno.’s:1521-1398 PRINT,1572-9206

Proof. A computation using matrix analysis reveals that

e

0 AB 0

=

∞∑k=0

1

k!

[0 AB 0

]k=

∞∑k=0

1

(2k)!

[(AB)k 0

0 (BA)k

]+

∞∑k=0

1

(2k + 1)!

[0 (AB)kA

(BA)kB 0

]

=

∞∑k=0

1

(2k)!(AB)k 0

0∞∑k=0

1

(2k)!(BA)k

+

0

∞∑k=0

1

(2k + 1)!(AB)kA

∞∑k=0

1

(2k + 1)!(BA)kB 0

=

∞∑k=0

1

Γ(2k + 1)(AB)k

∞∑k=0

1

Γ(2k + 2)(AB)kA

∞∑k=0

1

Γ(2k + 2)(BA)kB

∞∑k=0

1

Γ(2k + 1)(BA)k

=

[E2,1(AB)

(E2,2(AB)

)A(

E2,2(BA))B E2,1(BA)

].

2.2 Kronecker product and vector operator

Given two matrices A = [aij ] ∈ Mm,n and B = [bij ] ∈ Mp,q the Kroneckerproduct of A and B is defined by

A⊗B = [aijB]ij ∈Mmp,nq.

The the vector operator Vec :Mm,n → Cmn is defined for each A = [aij ] by

VecA = [a11 . . . am1 . . . a12 . . . am2 . . . a1m . . . amn]T .

It is clear that Vec is a linear isomorphism. Algebraic properties of the Kroneckerproduct and the vector operator used in this paper are as follows:

Lemma 2.3 (see e.g. [9]). The map (A,B) 7→ A⊗B is bilinear. The followingproperties hold for matrices of appropriate sizes:

1. Im ⊗ In = Imn,

2. (A⊗B)(C ⊗D) = AC ⊗BD,

3. Vec(AXB) = (BT ⊗A)VecX.

4

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 27, NO.7, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

1153 Kongyaksee ET AL 1150-1160

Page 82: Journal of Computational Analysis and Applicationseudoxuspress.com/images/JOCAAA-VOL-27-2019-ISSUE-7.pdfJournal of Computational Analysis and Applications . ISSNno.’s:1521-1398 PRINT,1572-9206

The Kronecker product is compatible with holomorphic functions in thefollowing sense.

Lemma 2.4 (see e.g.[9]). Let f be a holomorphic function defined on a regionincluding the origin and the spectrum of A ∈ Mn. Then f(I ⊗ A) = I ⊗ f(A)and f(A ⊗ I) = f(A) ⊗ I. In particular, the following relations hold for anyA ∈Mn :

Eα,β(A⊗ I) = Eα,β(A)⊗ I and Eα,β(I ⊗A) = I ⊗ Eα,β(A),sinh(A⊗ I) = sinh(A)⊗ I and sinh(I ⊗A) = I ⊗ sinh(A),cosh(A⊗ I) = cosh(A)⊗ I and cosh(I ⊗A) = I ⊗ cosh(A).

2.3 Matrix convolution product

Let Ω = [0,∞) or Ω = [0, b] for some b > 0. The convolution is a binaryoperation assigned to each pair of integrable function f and g defined by

(f ∗ g)(t) =∫ t

0

f(τ)g(t− τ)dτ, t ∈ Ω.

The convolution is bilinear and commutative. Given two integrable matrix-valued functions A : Ω → Mm,n(R), A(t) = [aij(t)] and B : Ω → Mn,p(R),B(t) = [bij(t)], we define the matrix convolution product of A and B by

(A ∗B)(t) =

[n∑

k=1

aik(t) ∗ bkj(t)

]∈Mm,p(R), t ∈ Ω.

We may write A(t) ∗ B(t) for (A ∗ B)(t). The matrix convolution product isbilinear, but not commutative in general.

3 General solutions of systems of nonhomoge-neous coupled linear matrix differential equa-tions

From now on, let A,B,C,D,E, F,G,H, J,K ∈ Mn(C) be given constant ma-trices and let U, V : Ω →Mn(C) be given matrix-valued functions. We wish tosolve certain systems of linear matrix differential equations in unknown matrix-valued functions X,Y : Ω →Mn(C).

Theorem 3.1. Assume that DB = HD, AC = CG, FH = BF , GE = EA.Then the general solution of the system of nonhomogeneous coupled linear matrixdifferential equations:

X ′(t) = AX(t)B + CY (t)D + U(t),

Y ′(t) = EX(t)F +GY (t)H + V (t)(3.1)

5

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 27, NO.7, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

1154 Kongyaksee ET AL 1150-1160

Page 83: Journal of Computational Analysis and Applicationseudoxuspress.com/images/JOCAAA-VOL-27-2019-ISSUE-7.pdfJournal of Computational Analysis and Applications . ISSNno.’s:1521-1398 PRINT,1572-9206

is given by

VecX(t) = e(t−t0)(BT⊗A)

(E2,1((t− t0)

2M))VecX(t0)

+(t− t0

)(E2,2((t− t0)

2M))(DT ⊗ C

)VecY (t0)

+(E2,1((t− t0)

2M))∗VecU(t)

+(t− t0

)(E2,2((t− t0)

2M))(DT ⊗ C

)∗VecV (t)

,

VecY (t) = e(t−t0)(HT⊗G)

(t− t0)

(E2,2((t− t0)

2N)(FT ⊗ E

)VecX(t0)

+(E2,1((t− t0)

2N))VecY (t0)

+(t− t0

)(E2,2((t− t0)

2N))(FT ⊗ E

)∗VecU(t)

+(E2,1((t− t0)

2N))∗VecV (t)

,

(3.2)where M = (FD)T ⊗ CE and N = (DF )T ⊗ EC.

Proof. Using Lemma 2.3, we can transform the system (3.1) into the vectorform:[

VecX ′(t)VecY ′(t)

]=

[BT ⊗A DT ⊗ CFT ⊗ E HT ⊗G

] [VecX(t)VecY (t)

]+

[VecU(t)VecV (t)

].

Let us denote P=

[BT ⊗A 0

0 HT ⊗G

]and Q=

[0 DT ⊗ C

FT ⊗ E 0

].

From (1.3), this system has the following solution:[VecX(t)VecY (t)

]= e(t−t0)S

[VecX(t0)VecY (t0)

]+ e(t−t0)S ∗

[VecU(t)VecV (t)

],

where S=P + Q. Now, we will compute eS . Since DB = HD, AC = CG,FH = BF and GE = EA, by Lemma 2.3 we have PQ = QP . From whichit follows from Lemma 2.1 that eS = eP+Q = eP eQ. By expanding the powerseries of matrix exponential, we have

eP =

[eB

T⊗A 0

0 eHT⊗G

].

By Lemma 2.2, we have

eQ =

[E2,1(M)

(E2,2(M)

)(DT ⊗ C

)(E2,2(N)

)(FT ⊗ E

)E2,1(N)

].

Thus

eS =

[eB

T⊗A 0

0 eHT⊗G

][E2,1(M)

(E2,2(M)

)(DT ⊗ C

)(E2,2(N)

)(FT ⊗ E

)E2,1(N)

]

=

[eB

T⊗AE2,1(M) eBT⊗A

(E2,2(M)

)(DT ⊗ C

)eH

T⊗G(E2,2(N)

)(FT ⊗ E

)eH

T⊗GE2,1(N)

].

6

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 27, NO.7, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

1155 Kongyaksee ET AL 1150-1160

Page 84: Journal of Computational Analysis and Applicationseudoxuspress.com/images/JOCAAA-VOL-27-2019-ISSUE-7.pdfJournal of Computational Analysis and Applications . ISSNno.’s:1521-1398 PRINT,1572-9206

Denoting

R1 = e(t−t0)(BT⊗A)E2,1((t− t0)

2M),

R2 = e(t−t0)(BT⊗A)

(t− t0

)(E2,2((t− t0)

2M))(DT ⊗ C

),

R3 = e(t−t0)(HT⊗G)

(t− t0

)(E2,2((t− t0)

2N))(FT ⊗ E

),

R4 = e(t−t0)(HT⊗G)E2,1((t− t0)

2N),

we obtain

e(t−t0)S

[VecX(t0)VecY (t0)

]=

[R1 R2

R3 R4

] [VecX(t0)VecY (t0)

]=

[R1 VecX(t0) +R2 VecY (t0)R3 VecX(t0) +R4 VecY (t0)

].

We also have

e(t−t0)S∗[VecU(t)VecV (t)

]=

[R1 R2

R3 R4

]∗[VecU(t)VecV (t)

]=

[R1 ∗VecU(t) +R2 ∗VecV (t)R3 ∗VecU(t) +R4 ∗VecV (t)

].

Therefore, the general solution of (3.1) is given by (3.2).

Corollary 3.2. Assume that DB = HD, AC = CG, FH = BF , GE = EA.Then the general solution of the system

X ′(t) = AX(t)B + CY (t)D,

Y ′(t) = EX(t)F +GY (t)H

is given by

VecX(t) = e(t−t0)(BT⊗A)

(E2,1((t− t0)

2M))VecX(t0)

+(t− t0

)(E2,2((t− t0)

2M))(DT ⊗ C

)VecY (t0),

VecY (t) = e(t−t0)(HT⊗G)

(t− t0

)(E2,2((t− t0)

2N))(FT ⊗ E

)VecX(t0)

+(E2,1((t− t0)

2N))VecY (t0)

(3.3)

where M = (FD)T ⊗ CE and N = (DF )T ⊗ EC.

Proof. Put U(t) = V (t) = 0 in (3.2) and then use Lemma 2.3.

The next result was firstly established in [1].

Corollary 3.3. The general solution of the system

X ′(t) = AX(t)B + CY (t)D + U(t),

Y ′(t) = CX(t)D +AY (t)B + V (t)(3.4)

under the assumption that AC = CA and BD = DB, is given by

VecX(t) =e(t−t0)(BT⊗A)

coshLVecX(t0) + sinhLVecY (t0)

+ coshL ∗VecU(t) + sinhL ∗VecV (t),

VecY (t) =e(t−t0)(BT⊗A)

sinhLVecX(t0) + coshLVecY (t0)

+ sinhL ∗VecU(t) + coshL ∗VecV (t),

(3.5)

7

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 27, NO.7, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

1156 Kongyaksee ET AL 1150-1160

Page 85: Journal of Computational Analysis and Applicationseudoxuspress.com/images/JOCAAA-VOL-27-2019-ISSUE-7.pdfJournal of Computational Analysis and Applications . ISSNno.’s:1521-1398 PRINT,1572-9206

where L = (t− t0)(DT ⊗ C).

Proof. Put E = C, F = D, G = A and H = B in (3.2), and use Lemma 2.3.

The corresponding homogeneous system of (3.4) is given by

X ′(t) = AX(t)B + CY (t)D,

Y ′(t) = CX(t)D +AY (t)B.(3.6)

If AC = CA and BD = DB, then the general solution of (3.6) is reduced to

VecX(t) = e(t−t0)(BT⊗A)

coshLVecX(t0) + sinhLVecY (t0)

,

VecY (t) = e(t−t0)(BT⊗A)

sinhLVecX(t0) + coshLVecY (t0)

.

This result was firstly obtained in [5].

Corollary 3.4. The general solution of the system

X ′(t) = AX(t)B + CY (t) + U(t),

Y ′(t) = EX(t) +GY (t)B + V (t)

under the condition AC = CG,GE = EA, is given by

VecX(t) = e(t−t0)(BT⊗A) Vec

(E2,1(K1)

)X(t0) +

(t− t0

)(E2,2(K1)

)CY (t0)

+ e(t−t0)(B

T⊗A)(In ⊗ E2,1(K1)

)∗VecU(t)

+(In ⊗

(t− t0

)(E2,2(K1)

)C)∗VecV (t)

,

VecY (t) = e(t−t0)(BT⊗G) Vec

(t− t0

)(E2,2(K2)

)EX(t0) +

(E2,1(K2)

)Y (t0)

+ e(t−t0)(B

T⊗G)(In ⊗

(t− t0

)(E2,2(K2)

)E)∗VecU(t)

+(In ⊗ E2,1(K2)

)∗VecV (t)

,

where K1 = (t− t0)2CE and K2 = (t− t0)

2EC.

Proof. Put H = B, D = F = In in (3.2) and then use Lemmas 2.3 and 2.4.

Corollary 3.5. The general solution of the system

X ′(t) = AX(t)B + Y (t) + U(t),

Y ′(t) = X(t) +AY (t)B + V (t)

is given by

VecX(t) = e(t−t0)(BT⊗A)

cosh(t− t0)VecX(t0) + sinh(t− t0)VecY (t0)

+ cosh(t− t0)(In2 ∗VecU(t)

)+ sinh(t− t0)

(In2 ∗VecV (t)

),

VecY (t) = e(t−t0)(BT⊗A)

sinh(t− t0)VecX(t0) + cosh(t− t0)VecY (t0)

+ sinh(t− t0)(In2 ∗VecU(t)

)+ cosh(t− t0)

(In2 ∗VecV (t)

).

8

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 27, NO.7, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

1157 Kongyaksee ET AL 1150-1160

Page 86: Journal of Computational Analysis and Applicationseudoxuspress.com/images/JOCAAA-VOL-27-2019-ISSUE-7.pdfJournal of Computational Analysis and Applications . ISSNno.’s:1521-1398 PRINT,1572-9206

Proof. Put C = D = In in (3.5) and then use Lemma 2.3.

Corollary 3.6. The general solution of the system

X ′(t) = AX(t)B + U(t),

Y ′(t) = EX(t)F +GY (t)H + V (t)

under the condition FH = BF and GE = EA, is given by

VecX(t) = e(t−t0)(BT⊗A)

VecX(t0) + I ∗VecU(t)

,

VecY (t) = e(t−t0)(HT⊗G) Vec

(t− t0)EX(t0)F + Y (t0)

+ e(t−t0)(H

T⊗G)(t− t0)(F

T ⊗ E) ∗VecU(t) + I ∗VecV (t).

Proof. Put C = D = 0 in (3.2) and then use Lemma 2.3.

Corollary 3.7. The general solution of equation X ′(t) = AX(t)B + U(t) is

given by VecX(t) = e(t−t0)(BT⊗A)

VecX(t0) + I ∗VecU(t)

.

Proof. Put E = F = 0 in Corollary 3.6.

4 Unique solution of initial value problem anda numerical example

Consider the following initial value problem associated with the system (3.1):

X ′(t) = AX(t)B + CY (t)D + U(t),

Y ′(t) = EX(t)F +GY (t)H + V (t)

subject to initial conditions X(0) = J and Y (0) = K. Suppose DB = HD,AC = CG, FH = BF , GE = EA. In this case, the solution of this problem isunique and given by

VecX(t) = et(BT⊗A)

(E2,1(t

2M))Vec J + t

(E2,2(t

2M))(DT ⊗ C

)VecK

+(E2,1(t

2M))∗VecU(t) + t

(E2,2(t

2M))(DT ⊗ C

)∗VecV (t)

,

VecY (t) = et(HT⊗G)

t(E2,2(t

2N)(FT ⊗ E

)VecJ +

(E2,1(t

2N))VecK

+ t(E2,2(t

2N))(FT ⊗ E

)∗VecU(t) +

(E2,1(t

2N))∗VecV (t)

,

where M = (FD)T ⊗ CE and N = (DF )T ⊗ EC.Let us see a numerical example.

Example 4.1. The initial value problem

X ′(t) = AX(t)B + Y (t) + U(t),

Y ′(t) = X(t) +AY (t)B + V (t)

X(0) = J and Y (0) = K

9

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 27, NO.7, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

1158 Kongyaksee ET AL 1150-1160

Page 87: Journal of Computational Analysis and Applicationseudoxuspress.com/images/JOCAAA-VOL-27-2019-ISSUE-7.pdfJournal of Computational Analysis and Applications . ISSNno.’s:1521-1398 PRINT,1572-9206

with A =

[1 23 4

], B =

[0 −11 1

], J =

[2 −11 0

],K =

[3 11 −1

],

U(t) =

[−e2t 11 sin t

], V (t) =

[1 e2t

cos t sin 2t

]has a unique solution given by

VecX(t) = etW Vec

[w1(t) cosh t+ w2(t) sinh t w3(t) cosh t+ w4(t) sinh tw5(t) cosh t+ w6(t) sinh t w7(t) cosh t+ w8(t) sinh t

],

VecY (t) = etW Vec

[w2(t) cosh t+ w1(t) sinh t w4(t) cosh t+ w3(t) sinh tw6(t) cosh t+ w5(t) sinh t w8(t) cosh t+ w7(t) sinh t

].

Here, W =

0 0 1 20 0 3 4

−1 −2 1 2−3 −4 3 4

,w1(t) = 1

2 (5 − e2t), w2(t) = 3 + t, w3(t) = −1 + t, w4(t) = 12 (1 + e2t),

w5(t) = 1 + t, w6(t) = 1 + sin t, w7(t) = 1− cos t, w8(t) = −12 (1 + cos 2t).

Acknowledgements

The authors would like to thank King Mongkut’s Institute of Technology Lad-krabang Research Fund for financial supports.

References

[1] Z. Al-Zhour, Efficient solutions of coupled matrix and matrix differentialequations, Intell. Cont. Autom., 3(2), 176-184 (2012).

[2] G. N. Boshnakov, The asymptotic covariance matrix of the multivariateserial correlations, Stoch. Proc. Appl., 65, 251-258 (1996).

[3] T. Chen, B. A. Francis, Optimal Sampled-Data Control Systems, Springer,London, 1995.

[4] J. B. Cruz, C. I. Chen Jr., Series Nash solution of two-person nonzero sumlinear differential games, J. Optimal. Theory, 7(4), 240-257 (1971).

[5] A. Kilicman, Z. Al-Zhour, The general common exact solutions of coupledlinear matrix and matrix differential equations, J. Anal. Comput., 1(1),15-30 (2005).

[6] J. R. Magnus, H. Neudecker, Matrix Differential Calculus with Applica-tions in Statistics and Econometrics, John Wiley & Sons, 1975.

[7] S. G. Mouroutsos, P. D. Sparis, Taylor series approach to system iden-tification, analysis and optimal control, J. Frankin Inst., 319(3), 359-371(1985).

10

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 27, NO.7, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

1159 Kongyaksee ET AL 1150-1160

Page 88: Journal of Computational Analysis and Applicationseudoxuspress.com/images/JOCAAA-VOL-27-2019-ISSUE-7.pdfJournal of Computational Analysis and Applications . ISSNno.’s:1521-1398 PRINT,1572-9206

[8] C. R. Rao, M. B. Rao, Matrix Algebra and Its Applications to Statisticsand Econometrics, World Scientific, Singapore, 1998.

[9] W. H. Steeb, Y. Hardy, Matrix Calculus and Kronecker Product: A Prac-tical Approach to Linear and Multilinear Algebra, World Scientific, Singa-pore, 2011.

[10] Z. Al-Zhour, The general (vector) solutions of such linear (coupled) ma-trix fractional differential equations by using Kronecker structures, Appl.Math. Comput., 232, 498-510 (2014).

[11] S. L. Campbell, Singular systems of differential equations II., Pitman, SanFrancisco, 1982.

[12] R. Ben Taher, M. Rachidi, Linear recurrence relations in the algebra ofmatrices and applications, Linear Algebra Appl., 330, 15-24 (2001).

[13] H-W. Cheng, SS-T. Yau, More explicit formulas for the matrix exponen-tial, Linear Algebra Appl., 262, 131-163 (1997).

[14] B. Ross, Fractional Calculus and Its Applications, Springer-Verlag, Berlin,1975.

[15] Z. Al-Zhour, New techniques for solving some matrix and matrix differ-ential equations, Ain Shams Engineering Journal, 6, 347-354 (2015).

11

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 27, NO.7, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

1160 Kongyaksee ET AL 1150-1160

Page 89: Journal of Computational Analysis and Applicationseudoxuspress.com/images/JOCAAA-VOL-27-2019-ISSUE-7.pdfJournal of Computational Analysis and Applications . ISSNno.’s:1521-1398 PRINT,1572-9206

Expressions of the solutions of some systems of di®erenceequations

M. M. El-Dessoky12 E. M. Elsayed12, E. M. Elabbasy2 and Asim Asiri11King Abdulaziz University, Faculty of Science,Mathematics Department,

P. O. Box 80203, Jeddah 21589, Saudi Arabia.2Department of Mathematics, Faculty of Science,Mansoura University, Mansoura 35516, Egypt.

E-mail: [email protected]; [email protected];[email protected]; [email protected]

ABSTRACT

In this paper, we deal with the form of the solutions and the periodicity character of the following systems ofnonlinear di¤erence equations of order two

+1 =¡1

§ § ¡1 +1 =

¡1§ § ¡1

where the initial conditions ¡1 0 ¡1 and 0 are nonzero real numbers.

Keywords: recursive sequences, di¤erence equations, periodic solution, solution of di¤erence equation, sys-tem of di¤erence equations.

Mathematics Subject Classi…cation: 39A10.

———————————————————

1. INTRODUCTION

Through this paper, we will obtain the form of the solutions of some nonlinear di¤erence equations systems oforder two of the following form

+1 =¡1

§§¡1 +1 =

¡1§§¡1

where the initial conditions ¡1 0 ¡1 and 0 are nonzero real numbers. We will then investigate the periodicitycharacter of the solutions of the systems under study. Finally we will present some numerical examples and some…gures will be given to explain the behavior of the obtained solutions.

The study of di¤erence equations is a very rich research …eld, and di¤erence equations have been appliedin several mathematical models in biology, population dynamics, genetics, economics, medicine, and so forth.Solving di¤erence equations and studying the asymptotic behavior of their solutions has attracted the attentionof many authors, see for example [1-39].

El-Dessoky et al. [6] studied the periodic nature and the form of the solutions of nonlinear di¤erence equationssystems of order four

+1 =¡3

¡2(§1§¡3) +1 =

¡3¡2(§1§¡3)

Grove et al. [7] obtained the existence and behavior of solutions of the rational system

+1 =+

+1 =

+

Mansour et al. [8] investigated the periodic nature and get the form of the solutions of the following systemsof rational di¤erence equations

+1 =¡1

§¡1¡ +1 =

¡1§¡1¡

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 27, NO.7, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

1161 El-Dessoky ET AL 1161-1172

Page 90: Journal of Computational Analysis and Applicationseudoxuspress.com/images/JOCAAA-VOL-27-2019-ISSUE-7.pdfJournal of Computational Analysis and Applications . ISSNno.’s:1521-1398 PRINT,1572-9206

El-Dessoky [9] studied the solutions of the rational equation systems

+1 =¡1¡2

(§1§¡1¡2) +1 =

¡1¡2(§1§¡1¡2)

Touafek et al. [10] investigated the periodic nature and gave the form of the solutions of the following systemsof rational second order di¤erence equations

+1 =

¡1(§1§) +1 =

¡1(§1§)

Yang et al. [11] studied global behavior of the system of the two nonlinear di¤erence equations

+1 =1+

+1 =1+

Din et al. [6] studied the behavior of the solutions of the following system of di¤erence equations

+1 =¡3

+¡1¡2¡3 +1 =

1¡31+1¡1¡2¡3

De…nition 1. (Periodicity)

A sequence fg1=¡ is said to be periodic with period if + = for all ¸ ¡

De…nition 2. (Fibonacci Sequence)

The sequence fg1=1 = f1 2 3 5 8 13 21 g i.e. +1 = + ¡1 ¸ 0 ¡1 = 0 0 = 1 is

called Fibonacci Sequence.

2. THE FIRST SYSTEM: +1 =¡1¡¡1

+1 =¡1¡¡1

In this section, we investigate the solutions of the two di¤erence equations system

+1 =¡1¡¡1

+1 =¡1¡¡1

(1)

where 2 N0 and the initial conditions ¡1 0 ¡1 and 0 are arbitrary nonzero real numbers

Theorem 2.1. Assume that f g are solutions of system (1). Then for = 0 1 2 we see that allsolutions of system (1) are given by the following formulae

2¡1 = ¡1

¡1Y

=0

(2¡20¡2¡1¡1)(2¡10¡2¡1)(2¡10¡2¡1)(20¡2+1¡1)

2 = 0

¡1Y

=0

(20¡2+1¡1)(2¡10¡2¡1)(2+10¡2+2¡1)(20¡2+1¡1)

and

2¡1 = ¡1

¡1Y

=0

(2¡10¡2¡1)(2¡20¡2¡1¡1)(20¡2+1¡1)(2¡10¡2¡1)

2 = 0

¡1Y

=0

(2¡10¡2¡1)(20¡2+1¡1)(20¡2+1¡1)(2+10¡2+2¡1)

where fg1=¡2 = f1 0 1 1 2 3 5 8 13 g

Proof: For = 0 the result holds. Now suppose that 0 and that our assumption holds for ¡ 1. that is,

2¡3 = ¡1

¡2Y

=0

(2¡20¡2¡1¡1)(2¡10¡2¡1)(2¡10¡2¡1)(20¡2+1¡1)

2¡2 = 0

¡2Y

=0

(20¡2+1¡1)(2¡10¡2¡1)(2+10¡2+2¡1)(20¡2+1¡1)

2¡3 = ¡1

¡2Y

=0

(2¡10¡2¡1)(2¡20¡2¡1¡1)(20¡2+1¡1)(2¡10¡2¡1)

2¡2 = 0

¡2Y

=0

(2¡10¡2¡1)(20¡2+1¡1)(20¡2+1¡1)(2+10¡2+2¡1)

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 27, NO.7, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

1162 El-Dessoky ET AL 1161-1172

Page 91: Journal of Computational Analysis and Applicationseudoxuspress.com/images/JOCAAA-VOL-27-2019-ISSUE-7.pdfJournal of Computational Analysis and Applications . ISSNno.’s:1521-1398 PRINT,1572-9206

Now we …nd from system (1) that

2¡1 = 2¡22¡32¡2¡2¡3

=

0¡2

=0

(20¡2+1¡1)(2¡10¡2¡1)

(2+10¡2+2¡1)(20¡2+1¡1)

¡1¡2

=0

(2¡10¡2¡1)(2¡20¡2¡1¡1)

(20¡2+1¡1)(2¡10¡2¡1)

0¡2

=0

(2¡10¡2¡1)(20¡2+1¡1)

(20¡2+1¡1)(2+10¡2+2¡1)

¡

¡1¡2

=0

(2¡10¡2¡1)(2¡20¡2¡1¡1)

(20¡2+1¡1)(2¡10¡2¡1)

=0¡1

¡2

=0

(20¡2+1¡1)(2¡10¡2¡1)

(2+10¡2+2¡1)(20¡2+1¡1)

0¡2

=0

(2¡10¡2¡1)(20¡2+1¡1)

(2+10¡2+2¡1)(2¡20¡2¡1¡1)

¡¡1

=0¡1

¡2

=0

(20¡2+1¡1)(2¡10¡2¡1)

(2+10¡2+2¡1)(20¡2+1¡1)

0

(¡10¡0¡1)(2¡40¡2¡3¡1)

(2¡30¡2¡2¡1)(¡20¡¡1¡1)

¡¡1

=0

¡2

=0

(20¡2+1¡1)(2¡10¡2¡1)

(2+10¡2+2¡1)(20¡2+1¡1)

¡(2¡40¡2¡3¡1)

(2¡30¡2¡2¡1)¡1

³2¡30¡2¡2¡12¡30¡2¡2¡1

´

=0

¡2

=0

(20¡2+1¡1)(2¡10¡2¡1)

(2+10¡2+2¡1)(20¡2+1¡1)(2¡30¡2¡2¡1)

¡2¡40+2¡3¡1¡2¡30+2¡2¡1

= 0

¡2Y

=0

(20¡2+1¡1)(2¡10¡2¡1)(2+10¡2+2¡1)(20¡2+1¡1)

(2¡30¡2¡2¡1)(¡2¡20+2¡1¡1)

= ¡1

¡1Y

=0

(2¡20¡2¡1¡1)(2¡10¡2¡1)(2¡10¡2¡1)(20¡2+1¡1)

2¡1 = 2¡22¡32¡2¡2¡3

=

0¡2

=0

(2¡10¡2¡1)(20¡2+1¡1)

(20¡2+1¡1)(2+10¡2+2¡1)

¡1¡2

=0

(2¡20¡2¡1¡1)(2¡10¡2¡1)

(2¡10¡2¡1)(20¡2+1¡1)

0¡2

=0

(20¡2+1¡1)(2¡10¡2¡1)

(2+10¡2+2¡1)(20¡2+1¡1)

¡

¡1¡2

=0

(2¡20¡2¡1¡1)(2¡10¡2¡1)

(2¡10¡2¡1)(20¡2+1¡1)

=

¡10¡2Q

=0

(2¡10¡2¡1)(20¡2+1¡1)(20¡2+1¡1)(2+10¡2+2¡1)

0¡2Q

=0

(2¡10¡2¡1)(20¡2+1¡1)(2+10¡2+2¡1)(2¡20¡2¡1¡1)

¡ ¡1

=

¡10¡2Q

=0

(2¡10¡2¡1)(20¡2+1¡1)(20¡2+1¡1)(2+10¡2+2¡1)

0(¡10¡0¡1)(2¡40¡2¡3¡1)(2¡30¡2¡2¡1)(¡20¡¡1¡1)

¡ ¡1

=

0¡2Q

=0

(2¡10¡2¡1)(20¡2+1¡1)(20¡2+1¡1)(2+10¡2+2¡1)

¡ (2¡40¡2¡3¡1)(2¡30¡2¡2¡1)

¡ 1

µ2¡30 ¡ 2¡2¡12¡30 ¡ 2¡2¡1

=0

¡2

=0

(2¡10¡2¡1)(20¡2+1¡1)

(20¡2+1¡1)(2+10¡2+2¡1)(2¡30¡2¡2¡1)

¡2¡40+2¡3¡1¡2¡30+2¡2¡1

= 0

¡2Y

=0

(2¡10¡2¡1)(20¡2+1¡1)(20¡2+1¡1)(2+10¡2+2¡1)

(2¡30¡2¡2¡1)(¡2¡20+2¡1¡1)

= ¡1

¡1Y

=0

(2¡10¡2¡1)(2¡20¡2¡1¡1)(20¡2+1¡1)(2¡10¡2¡1)

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 27, NO.7, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

1163 El-Dessoky ET AL 1161-1172

Page 92: Journal of Computational Analysis and Applicationseudoxuspress.com/images/JOCAAA-VOL-27-2019-ISSUE-7.pdfJournal of Computational Analysis and Applications . ISSNno.’s:1521-1398 PRINT,1572-9206

Also, we infer from system (1) that

2 = 2¡12¡22¡1¡2¡2

=

¡1¡1

=0

(2¡20¡2¡1¡1)(2¡10¡2¡1)

(2¡10¡2¡1)(20¡2+1¡1)

0¡2

=0

(2¡10¡2¡1)(20¡2+1¡1)

(20¡2+1¡1)(2+10¡2+2¡1)

¡1¡1

=0

(2¡10¡2¡1)(2¡20¡2¡1¡1)

(20¡2+1¡1)(2¡10¡2¡1)

¡

0¡2

=0

(2¡10¡2¡1)(20¡2+1¡1)

(20¡2+1¡1)(2+10¡2+2¡1)

=¡1

¡1

=0

(2¡20¡2¡1¡1)(2¡10¡2¡1)

(2¡10¡2¡1)(20¡2+1¡1)

¡¡1

=0

(2¡10¡2¡1)

(20¡2+1¡1)

¡2

=0

(20¡2+1¡1)

(2¡10¡2¡1)

¡1

=¡1

¡1

=0

(2¡20¡2¡1¡1)(2¡10¡2¡1)

(2¡10¡2¡1)(20¡2+1¡1)

¡(2¡30¡2¡2¡1)

(2¡20¡2¡1¡1)¡1

³(2¡20¡2¡1¡1)(2¡20¡2¡1¡1)

´

=

¡1¡1Q

=0

(2¡20¡2¡1¡1)(2¡10¡2¡1)(2¡10¡2¡1)(20¡2+1¡1)

(2¡20 ¡ 2¡1¡1)

¡2¡30 + 2¡2¡1 ¡ 2¡20 + 2¡1¡1

= ¡1

¡1Y

=0

(2¡20¡2¡1¡1)(2¡10¡2¡1)(2¡10¡2¡1)(20¡2+1¡1)

(2¡20¡2¡1¡1)(¡2¡10+2¡1)

= 0

¡1Y

=0

(20¡2+1¡1)(2¡10¡2¡1)(2+10¡2+2¡1)(20¡2+1¡1)

and so,

2 = 2¡12¡22¡1¡2¡2

=

¡1¡1

=0

(2¡10¡2¡1)(2¡20¡2¡1¡1)

(20¡2+1¡1)(2¡10¡2¡1)

0¡2

=0

(20¡2+1¡1)(2¡10¡2¡1)

(2+10¡2+2¡1)(20¡2+1¡1)

¡1¡1

=0

(2¡20¡2¡1¡1)(2¡10¡2¡1)

(2¡10¡2¡1)(20¡2+1¡1)

¡

0¡2

=0

(20¡2+1¡1)(2¡10¡2¡1)

(2+10¡2+2¡1)(20¡2+1¡1)

=

¡1¡1

=0

(2¡10¡2¡1)(2¡20¡2¡1¡1)

(20¡2+1¡1)(2¡10¡2¡1)

¡¡1

=0

(2¡10¡2¡1)

(20¡2+1¡1)

¡2

=0

(20¡2+1¡1)

(2¡10¡2¡1)

¡1

=

µ

¡1¡1Q

=0

(2¡10¡2¡1)(2¡20¡2¡1¡1)(20¡2+1¡1)(2¡10¡2¡1)

¡ (2¡30¡2¡2¡1)(2¡20¡2¡1¡1)

¡ 1

³(2¡20¡2¡1¡1)(2¡20¡2¡1¡1)

´

=

¡1¡1

=0

(2¡10¡2¡1)(2¡20¡2¡1¡1)

(20¡2+1¡1)(2¡10¡2¡1)

(2¡20¡2¡1¡1)

¡2¡30+2¡2¡1¡2¡20+2¡1¡1

= ¡1

¡1Y

=0

(2¡10¡2¡1)(2¡20¡2¡1¡1)(20¡2+1¡1)(2¡10¡2¡1)

(2¡20¡2¡1¡1)(¡2¡10+2¡1)

= ¡1

¡1Y

=0

(2¡20¡2¡1¡1)2¡10¡2¡1)

(2¡20¡2¡1¡1)(¡2¡10+2¡1)

= 0

¡1Y

=0

(2¡10¡2¡1)(20¡2+1¡1)(20¡2+1¡1)(2+10¡2+2¡1)

The proof is complete.

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 27, NO.7, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

1164 El-Dessoky ET AL 1161-1172

Page 93: Journal of Computational Analysis and Applicationseudoxuspress.com/images/JOCAAA-VOL-27-2019-ISSUE-7.pdfJournal of Computational Analysis and Applications . ISSNno.’s:1521-1398 PRINT,1572-9206

Example 1. For con…rming the results of this section, we consider numerical example for the di¤erence system(1) with the initial conditions ¡1 = 03 0 = 04 ¡1 = 015 and 0 = ¡01. (See Fig. 1).

0 2 4 6 8 10 12 14 16 18 20-0.4

-0.3

-0.2

-0.1

0

0.1

0.2

0.3

0.4

n

z(n),

t(n)

plot of z(n+1)=t(n-1)z(n)/(t(n)-t(n-1)),t(n+1)=z(n-1)t(n)/(z(n)-z(n-1))

z(n)

t(n)

Figure 1. Plot the behavior of the solution of the system (1).

3. THE SECOND SYSTEM: +1 =¡1¡¡1

+1 =¡1

¡¡¡1

We obtain, in this section, the form of the solutions of the di¤erence equations system

+1 =¡1 ¡ ¡1

+1 =¡1

¡ ¡ ¡1 (2)

where 2 N0 and the initial conditions ¡1 0 ¡1 0 are arbitrary non zero real numbers with ¡1 6= ¡0

Theorem 3.1. Let f g+1=¡1 be solutions of system (2).Then fg

+1=¡1 and fg

+1=¡1 are given by the

formulae for = 0 1 2

4 = ¡¡10¡10(0+¡1)(2¡20+2¡1)(2¡10+2+1¡1)(2¡10¡2¡2¡1)(20¡2¡1¡1)

4+1 = ¡10¡10(0+¡1)(2¡20+2¡1)(2¡10+2+1¡1)(20¡2¡1¡1)(2+10¡2¡1)

4+2 = ¡¡10¡10(0+¡1)(2¡10+2+1¡1)(20+2+2¡1)(20¡2¡1¡1)(2+10¡2¡1)

4+3 = ¡10¡10(0+¡1)(2¡10+2+1¡1)(20+2+2¡1)(2+10¡2¡1)(2+20¡2+1¡1)

and

4 = (2¡20+2¡1)(20¡2¡1¡1)(0+¡1)

4+1 =¡(2¡10+2+1¡1)(20¡2¡1¡1)

(0+¡1)

4+2 = (2¡10+2+1¡1)(2+10¡2¡1)(0+¡1)

4+3 =¡(20+2+2¡1)(2+10¡2¡1)

(0+¡1)

Proof: For = 0 the result holds. Now suppose that 0 and that our assumption holds for ¡ 1. that is,

4¡4 = ¡¡10¡10(0+¡1)(2¡40+2¡2¡1)(2¡30+2¡1¡1)(2¡30¡2¡4¡1)(2¡20¡2¡3¡1)

4¡3 = ¡10¡10(0+¡1)(2¡40+2¡2¡1)(2¡30+2¡1¡1)(2¡20¡2¡3¡1)(2¡10¡2¡2¡1)

4¡2 = ¡¡10¡10(0+¡1)(2¡30+2¡1¡1)(2¡20+2¡1)(2¡20¡2¡3¡1)(2¡10¡2¡2¡1)

4¡1 = ¡10¡10(0+¡1)(2¡30+2¡1¡1)(2¡20+2¡1)(2¡10¡2¡2¡1)(20¡2¡1¡1)

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 27, NO.7, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

1165 El-Dessoky ET AL 1161-1172

Page 94: Journal of Computational Analysis and Applicationseudoxuspress.com/images/JOCAAA-VOL-27-2019-ISSUE-7.pdfJournal of Computational Analysis and Applications . ISSNno.’s:1521-1398 PRINT,1572-9206

4¡4 = (2¡40+2¡2¡1)(2¡20¡2¡3¡1)(0+¡1)

4¡3 =¡(2¡30+2¡1¡1)(2¡20¡2¡3¡1)

(0+¡1)

4¡2 = (2¡30+2¡1¡1)(2¡10¡2¡2¡1)(0+¡1)

4¡1 =¡(2¡20+2¡1)(2¡10¡2¡2¡1)

(0+¡1)

Now, we obtain from system (2) that

4+1 = 44¡14¡4¡1

=

³¡¡10¡10(0+¡1)

(2¡20+2¡1)(2¡10+2+1¡1)(2¡10¡2¡2¡1)(20¡2¡1¡1)

´

³¡(2¡20+2¡1)(2¡10¡2¡2¡1)

(0+¡1)

´

(2¡20+2¡1)(20¡2¡1¡1)

(0+¡1)

¡¡(2¡20+2¡1)(2¡10¡2¡2¡1)

(0+¡1)

=

¡10¡10(0+¡1)

(2¡20+2¡1)(2¡10+2+1¡1)(20¡2¡1¡1)

(2¡10¡2¡2¡1)+(20¡2¡1¡1)

= ¡10¡10(0+¡1)(2¡20+2¡1)(2¡10+2+1¡1)(20¡2¡1¡1)(2+110¡2¡1)

4+1 = 44¡1¡4¡4¡1

=

³(2¡20+2¡1)(20¡2¡1¡1)

(0+¡1)

´

³¡10¡10(0+¡1)

(2¡30+2¡1¡1)(2¡20+2¡1)(2¡10¡2¡2¡1)(20¡2¡1¡1)

´

¡³

¡¡10¡10(0+¡1)(2¡20+2¡1)(2¡10+2+1¡1)(2¡10¡2¡2¡1)(20¡2¡1¡1)

´¡

³¡10¡10(0+¡1)

(2¡30+2¡1¡1)(2¡20+2¡1)(2¡10¡2¡2¡1)(20¡2¡1¡1)

´

=

(2¡20+2¡1)(20¡2¡1¡1)

(0+¡1)

¡1+(2¡30+2¡1¡1)

(2¡10+2+1¡1)

= ¡

(2¡20+2¡1)(20¡2¡1¡1)

(0+¡1)

1¡(2¡30+2¡1¡1)

(2¡10+2+1¡1)

= ¡

(2¡20+2¡1)(20¡2¡1¡1)

(0+¡1)

1¡(2¡30+2¡1¡1)

(2¡10+2+1¡1)

= ¡

(2¡20+2¡1)(20¡2¡1¡1)

(0+¡1)

(2¡20+2¡1)

(2¡10+2+1¡1)

= ¡(2¡10+2+1¡1)(20¡2¡1¡1)(0+¡1)

Also, we can prove the other relations. This completes the proof.

Example 2. We assume that the initial conditions for the di¤erence system (2) are ¡1 = 038 0 = ¡17 ¡1 =085 and 0 = 126. (See Fig. 2).

0 2 4 6 8 10 12 14 16-80

-60

-40

-20

0

20

40

60

80

100

120

n

z(n

),t(

n)

plot of z(n+1)=t(n-1)z(n)/(t(n)-t(n-1)),t(n+1)=z(n-1)t(n)/(-z(n)-z(n-1))

z(n)

t(n)

Figure 2. Sketch the behavior of the solution of the system (2).

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 27, NO.7, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

1166 El-Dessoky ET AL 1161-1172

Page 95: Journal of Computational Analysis and Applicationseudoxuspress.com/images/JOCAAA-VOL-27-2019-ISSUE-7.pdfJournal of Computational Analysis and Applications . ISSNno.’s:1521-1398 PRINT,1572-9206

4. PERIODICITY OF THE SYSTEMS

In this section, we study the periodicity nature of the solutions of the following systems of the di¤erence equations

+1 =¡1¡¡1

+1 =¡1+¡1

(3)

+1 =¡1+¡1

+1 =¡1¡¡1

(4)

+1 =¡1

¡¡¡1 +1 =

¡1¡¡¡1

(5)

Where = 0 1 2 and the initial conditions ¡1 0 ¡1 and 0 are arbitrary nonzero real numbers.

Theorem 4.1. Suppose that f g are solutions of di¤erence equation system (3) with 0 6= ¡¡1 0 6= ¡1Then all solutions of system (3) are periodic with period six and for = 0 1 2

6¡1 = ¡1 6 = 0 6+1 =0¡10¡¡1

6+2 =¡1(0+¡1)(¡1¡0)

6+3 =0(0+¡1)(0¡¡1)

6+4 =¡10

(¡1¡0)

and

6¡1 = ¡1 6 = 0 6+1 =¡100+¡1

6+2 =¡1(0¡¡1)(0+¡1)

6+3 =0(¡1¡0)(0+¡1)

6+4 =0¡1

(0+¡1)

Proof: For = 0 the result holds. Now suppose that 0 and that our assumption holds for ¡ 1. that is,

6¡7 = ¡1 6¡6 = 0 6¡5 =0¡10¡¡1

6¡4 =¡1(0+¡1)(¡1¡0)

6¡3 =0(0+¡1)(0¡¡1)

6¡2 =¡10

(¡1¡0)

and

6¡7 = ¡1 6¡6 = 0 6¡5 =¡100+¡1

6¡4 =¡1(0¡¡1)(0+¡1)

6¡3 =0(¡1¡0)(0+¡1)

6¡2 =0¡1

(0+¡1)

Now, we obtain from system (3) that

6¡1 = 6¡26¡36¡2¡6¡3

=

¡10

(¡1¡0)

0(¡1¡0)(0+¡1)

0¡1

(0+¡1)

¡

0(¡1¡0)(0+¡1)

= ¡1000¡1¡0(¡1¡0)

= ¡10000

= ¡1

6¡1 = 6¡26¡36¡2+6¡3

=

0¡1

(0+¡1)

0(0+¡1)(0¡¡1)

¡10

(¡1¡0)

+

0(0+¡1)(0¡¡1)

= 0¡10¡¡10+0(0+¡1)

= 0¡1000

= ¡1

6 = 6¡16¡26¡1¡6¡2

=¡1

0¡1(0+¡1)

¡1¡0¡1

(0+¡1)

= ¡10¡1¡1(0+¡1)¡0¡1

= 0

6 = 6¡16¡26¡1+6¡2

=¡1

¡10(¡1¡0)

¡1+¡10

(¡1¡0)

= ¡1¡10¡1(¡1¡0)+¡10

= 0

We can prove the other relations similarly. The proof is completed.

Theorem 4.2. If f g are solutions of system (4) with 0 6= ¡1 0 6= ¡¡1 Then all solutions of system(4) are periodic with period six and given by the formulae

6¡1 = ¡1 6 = 0 6+1 =0¡10+¡1

6+2 =¡1(0¡¡1)(0+¡1)

6+3 =0(¡1¡0)(0+¡1)

6+4 =¡100+¡1

6¡1 = ¡1 6 = 0 6+1 =¡100¡¡1

6+2 =¡1(0+¡1)(¡1¡0)

6+3 =0(0+¡1)(0¡¡1)

6+4 =0¡1¡1¡0

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 27, NO.7, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

1167 El-Dessoky ET AL 1161-1172

Page 96: Journal of Computational Analysis and Applicationseudoxuspress.com/images/JOCAAA-VOL-27-2019-ISSUE-7.pdfJournal of Computational Analysis and Applications . ISSNno.’s:1521-1398 PRINT,1572-9206

Theorem 4.3. Assume that f g are solutions of di¤erence equation system (5) with 0 6= ¡¡1 0 6= ¡¡1Then all solutions of system (5) are periodic with period six and for = 0 1 2

6¡1 = ¡1 6 = 0 6+1 = ¡0¡10+¡1

6+2 =¡1(0+¡1)(0+¡1)

6+3 =0(0+¡1)(0+¡1)

6+4 = ¡¡100+¡1

6¡1 = ¡1 6 = 0 6+1 = ¡¡100+¡1

6+2 =¡1(0+¡1)(0+¡1)

6+3 =0(¡1+0)(0+¡1)

6+4 = ¡0¡10+¡1

Example 3. See Figure (3) where we take system (3) with the initial conditions ¡1 = 018 0 = 017 ¡1 = 05and 0 = 086.

0 5 10 15 20 25-0.5

0

0.5

1

n

z(n

),t(

n)

plot of z(n+1)=t(n-1)z(n)/(t(n)-t(n-1)),t(n+1)=z(n-1)t(n)/(z(n)+z(n-1))

z(n)

t(n)

Figure 3. Draw the behavior of the solution of the system (3).

5. OTHER SYSTEMS

In this section, we obtain the form of the solutions of the follwing systems of the di¤erence equations.

Theorem 5.1. If f g are solutions of system

+1 =¡1

¡+¡1 +1 =

¡1¡¡¡1

(6)

where 2 N0 and the initial conditions ¡1 0 ¡1 and 0 are arbitrary non zero real numbers, then for = 0 1 2

2¡1 = ¡1

¡1Y

=0

(2¡20+2¡1¡1)(2¡10¡2¡1)(2¡10+2¡1)(20¡2+1¡1)

2 = 0

¡1Y

=0

(20+2+1¡1)(2¡10¡2¡1)(2+10+2+2¡1)(20¡2+1¡1)

2¡1 = ¡1

¡1Y

=0

(2¡10+2¡1)(2¡1¡1¡2¡20)(20+2+1¡1)(2¡1¡2¡10)

2 = 0

¡1Y

=0

(2¡10+2¡1)(20¡2+1¡1)(20+2+1¡1)(2+10¡2+2¡1)

such that¡1Q

=0 = 1.

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 27, NO.7, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

1168 El-Dessoky ET AL 1161-1172

Page 97: Journal of Computational Analysis and Applicationseudoxuspress.com/images/JOCAAA-VOL-27-2019-ISSUE-7.pdfJournal of Computational Analysis and Applications . ISSNno.’s:1521-1398 PRINT,1572-9206

Theorem 5.2. The solutions of system

+1 =¡1

¡¡¡1 +1 =

¡1¡+¡1

(7)

are given by the relations

2¡1 = ¡1

¡1Y

=0

(2¡1¡1¡2¡20)(2¡10+2¡1)(2¡1¡2¡10)(20+2+1¡1)

2 = 0

¡1Y

=0

(20¡2+1¡1)(2¡10+2¡1)(2+10¡2+2¡1)(20+2+1¡1)

2¡1 = ¡1

¡1Y

=0

(2¡10¡2¡1)(2¡20+2¡1¡1)(20¡2+1¡1)(2¡10+2¡1)

2 = 0

¡1Y

=0

(2¡10¡2¡1)(20+2+1¡1)(20¡2+1¡1)(2+10+2+2¡1)

where 2 N0 and the initial conditions ¡1 0 ¡1 and 0 are arbitrary non zero real numbers and¡1Q

=0 = 1.

Theorem 5.3. Suppose that f g+1=¡1 are solutions of system

+1 =¡1

¡¡¡1 +1 =

¡1+¡1

(8)

where 2 N0 and the initial conditions ¡1 0 ¡1 and 0 are arbitrary non zero real numbers with ¡1 6= ¡0.Then fg

+1=¡1 and fg

+1=¡1 are given by the formula for = 0 1 2

4 = ¡10¡10(0+¡1)(2¡20+2¡1)(2¡10+2+1¡1)(2¡1¡1+2¡20)(2¡1+2¡10)

4+1 = ¡¡10¡10(0+¡1)(2¡20+2¡1)(2¡10+2+1¡1)(2¡1+2¡10)(2+1¡1+20)

4+2 = ¡10¡10(0+¡1)(2¡10+2+1¡1)(20+2+2¡1)(2¡1+2¡10)(2+1¡1+20)

4+3 = ¡¡10¡10(0+¡1)(2¡10+2+1¡1)(20+2+2¡1)(2+1¡1+20)(2+2¡1+2+10)

and

4 = (2¡20+2¡1)(20+2¡1¡1)(0+¡1)

4+1 =(2¡10+2+1¡1)(20+2¡1¡1)

(0+¡1)

4+2 = (2¡10+2+1¡1)(2+10+2¡1)(0+¡1)

4+3 =(20+2+2)(2+10+2¡1)

(0+¡1)

Theorem 5.4. Let f g+1=¡1 be solutions of system

+1 =¡1

¡+¡1 +1 =

¡1¡¡1

(9)

Then fg+1=¡1 and fg

+1=¡1 are given by the following expressions for = 0 1 2

4 = ¡10¡10(0¡¡1)(2¡20¡2¡1)(2¡10¡2+1¡1)(2¡10¡2¡2¡1)(20¡2¡1¡1)

4+1 = ¡10¡10(0¡¡1)(2¡20¡2¡1)(2¡10¡2+1¡1)(20¡2¡1¡1)(2+10¡2¡1)

4+2 = ¡¡10¡10(0¡¡1)(2¡10¡2+1¡1)(20¡2+2¡1)(20¡2¡1¡1)(2+10¡2¡1)

4+3 = ¡¡10¡10(0¡¡1)(2¡10¡2+1¡1)(20¡2+2¡1)(2+10¡2¡1)(2+20¡2+1¡1)

and

4 = (2¡20¡2¡1)(20¡2¡1¡1)(0¡¡1)

4+1 =¡(2¡10¡2+1¡1)(20¡2¡1¡1)

(0¡¡1)

4+2 = (2¡10¡2+1¡1)(2+10¡2¡1)(0¡¡1)

4+3 =¡(20¡2+2)(2+10¡2¡1)

(0¡¡1)

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 27, NO.7, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

1169 El-Dessoky ET AL 1161-1172

Page 98: Journal of Computational Analysis and Applicationseudoxuspress.com/images/JOCAAA-VOL-27-2019-ISSUE-7.pdfJournal of Computational Analysis and Applications . ISSNno.’s:1521-1398 PRINT,1572-9206

where 2 N0 and the initial conditions ¡1 0 ¡1 and 0 are arbitrary non zero real numbers with ¡1 6= 0.

Theorem 5.5. Let f g+1=¡1 be solutions of system

+1 =¡1

¡¡¡1 +1 =

¡1¡¡1

(10)

where 2 N0 and the initial conditions ¡1 0 ¡1 and 0 are arbitrary non zero real numbers with ¡1 6= ¡0.Then fg

+1=¡1 and fg

+1=¡1 are given by the following relations for = 0 1 2

4 = (20¡2¡1¡1)(2¡20+2¡1)0+¡1

4+1 =(20¡2¡1¡1)(2¡10+2+1¡1)

0+¡1

4+2 = (2+10¡2¡1)(2¡10+2+1¡1)0+¡1

4+3 =(2+10¡2¡1)(20+2+2¡1)

0+¡1

and

4 = ¡0¡10¡1(0+¡1)(2¡10¡2¡2¡1)(20¡2¡1¡1)(2¡20+2¡1)(2¡10+2+1¡1)

4+1 = 0¡10¡1(0+¡1)(20¡2¡1¡1)(2+10¡2¡1)(2¡20+2¡1)(2¡10+2+1¡1)

4+2 = ¡0¡10¡1(0+¡1)(20¡2¡1¡1)(2+10¡2¡1)(2¡10+2+1¡1)(20+2+2¡1)

4+3 = 0¡10¡1(0+¡1)(2+10¡2¡1)(2+20¡2+1¡1)(2¡10+2+1¡1)(20+2+2¡1)

Theorem 5.6. Suppose that f g+1=¡1 be solutions of system

+1 =¡1¡¡1

+1 =¡1

¡+¡1 (11)

Then fg+1=¡1 and fg

+1=¡1 are given by the following relations for = 0 1 2

4 = (20¡2¡1¡1)(2¡20¡2¡1)0¡¡1

4+1 =¡(20¡2¡1¡1)(2¡10¡2+1¡1)

0¡¡1

4+2 = (2+10¡2¡1)(2¡10¡2+1¡1)0¡¡1

4+3 =¡(2+10¡2¡1)(20¡2+2¡1)

0¡¡1

and

4 = ¡0¡10¡1(0¡¡1)(2¡10¡2¡2¡1)(20¡2¡1¡1)(2¡20¡2¡1)(2¡10¡2+1¡1)

4+1 = 0¡10¡1(0¡¡1)(20¡2¡1¡1)(2+10¡2¡1)(2¡20¡2¡1)(2¡10¡2+1¡1)

4+2 = ¡0¡10¡1(0¡¡1)(20¡2¡1¡1)(2+10¡2¡1)(2¡10¡2+1¡1)(20¡2+2¡1)

4+3 = 0¡10¡1(0¡¡1)(2+10¡2¡1)(2+20¡2+1¡1)(2¡10¡2+1¡1)(20¡2+2¡1)

where 2 N0 and the initial conditions ¡1 0 ¡1 and 0 are arbitrary non zero real numbers with ¡1 6= 0.

Theorem 5.7. Let f g+1=¡1 be solutions of system

+1 =¡1+¡1

+1 =¡1

¡¡¡1 (12)

Then fg+1=¡1 and fg

+1=¡1 are given by the following relations for = 0 1 2

4 = (20+2¡1¡1)(2¡20+2¡1)0+¡1

4+1 =(20+2¡1¡1)(2¡10+2+1¡1)

0+¡1

4+2 = (2+10+2¡1)(2¡10+2+1¡1)0+¡1

4+3 =(2+10+2¡1)(20+2+2¡1)

0+¡1

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 27, NO.7, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

1170 El-Dessoky ET AL 1161-1172

Page 99: Journal of Computational Analysis and Applicationseudoxuspress.com/images/JOCAAA-VOL-27-2019-ISSUE-7.pdfJournal of Computational Analysis and Applications . ISSNno.’s:1521-1398 PRINT,1572-9206

and

4 = ¡0¡10¡1(0+¡1)(2¡10+2¡2¡1)(20+2¡1¡1)(2¡20+2¡1)(2¡10+2+1¡1)

4+1 = 0¡10¡1(0+¡1)(20+2¡1¡1)(2+10+2¡1)(2¡20+2¡1)(2¡10+2+1¡1)

4+2 = ¡0¡10¡1(0+¡1)(20+2¡1¡1)(2+10+2¡1)(2¡10+2+1¡1)(20+2+2¡1)

4+3 = 0¡10¡1(0+¡1)(2+10+2¡1)(2+20+2+1¡1)(2¡10+2+1¡1)(20+2+2¡1)

where 2 N0 and the initial conditions ¡1 0 ¡1 and 0 are arbitrary non zero real numbers with ¡1 6= ¡0.

AcknowledgementsThis article was funded by the Deanship of Scienti…c Research (DSR), King Abdulaziz University, Jeddah.

The authors, therefore, acknowledge with thanks DSR technical and …nancial support.

REFERENCES

1. P. Cull, M. Flahive, and R. Robson, Di¤erence Equations: From Rabbits to Chaos, Undergraduate Textsin Mathematics, Springer, New York, NY, USA, 2005.

2. R. J. H. Beverton and S. J. Holt, On the Dynamics of Exploited Fish Populations, Fishery InvestigationsSeries II, Volume 19, Blackburn Press, Caldwell, NJ, USA, 2004.

3. M. R. S. Kulenovic and G. Ladas, Dynamics of Second Order Rational Di¤erence Equations with OpenProblems and Conjectures, Chapman & Hall / CRC Press, 2001.

4. V. L. Kocic and G. Ladas, Global Behavior of Nonlinear Di¤erence Equations of Higher Order with Appli-cations, Kluwer Academic Publishers, Dordrecht, 1993.

5. S. Elaydi, An Introduction to Di¤erence Equations, Undergraduate Texts in Mathematics, Springer, NewYork, NY, USA, 3 edition, (2005).

6. M. M. El-Dessoky, E. M. Elsayed and M. Alghamdi, Solutions and periodicity for some systems of fourthorder rational di¤erence equations, J. Comput. Anal. Appl., Vol. 18(1), (2015), 179-194.

7. E. A. Grove, G. Ladas, L. C. McGrath, and C.T. Teixeira, Existence and behavior of solutions of a rationalsystem, Commun. Appl. Nonlinear Anal., 8 (2001), 1-25.

8. M. Mansour, M. M. El-Dessoky and E. M. Elsayed, On the solution of rational systems of di¤erence equa-tions, J. Comput. Anal. Appl., 15 (5) (2013), 967-976.

9. M. M. El-Dessoky, The form of solutions and periodicity for some systems of third order rational di¤erenceequations, Math. Methods Appl. Sci., 39, (2016), 1076-1092.

10. N. Touafek and E. M. Elsayed, On the periodicity of some systems of nonlinear di¤erence equations, Bull.Math. Soc. Sci. Math. Roumanie, Tome 55 (103), No. 2, (2012), 217–224.

11. L. Yang and J. Yang, Dynamics of a system of two nonlinear di¤erence equations, Int. J. Contemp. Math.Sciences, 6 (5) (2011), 209 - 214

12. Q. Din, M. N. Qureshi and A. Qadeer Khan, Dynamics of a fourth-order system of rational di¤erenceequations, Adv. Di¤erence Equ., 2012, (2012): 215 doi: 10.1186/1687-1847-2012-215.

13. Q. Din, Asymptotic behavior of an anti-competitive system of second-order di¤erence equations, J. EgyptianMath. Soc., 24, (2016), 37-43.

14. M. M. El-Dessoky, E. M. Elsayed, On a solution of system of three fractional di¤erence equations, J. Comput.Anal. Appl., 19, (2015), 760-769.

15. N. Battaloglu, C. Cinar and I. Yalç¬nkaya, The dynamics of the di¤erence equation, ARS Combinatoria, 97(2010), 281-288.

16. M. Aloqeili, Dynamics of a rational di¤erence equation, Appl. Math. Comp., 176(2), (2006), 768-774.

17. C. Cinar, I. Yalçinkaya and R. Karatas, On the positive solutions of the di¤erence equation system +1 = +1 = ¡1¡1 J. Inst. Math. Comp. Sci., 18 (2005), 135-136.

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 27, NO.7, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

1171 El-Dessoky ET AL 1161-1172

Page 100: Journal of Computational Analysis and Applicationseudoxuspress.com/images/JOCAAA-VOL-27-2019-ISSUE-7.pdfJournal of Computational Analysis and Applications . ISSNno.’s:1521-1398 PRINT,1572-9206

18. S. E. Das and M. Bayram, On a system of rational di¤erence equations, World Applied Sciences Journal,10(11) (2010), 1306–1312.

19. Q. Din, Dynamics of a discrete Lotka-Volterra model, Adv. Di¤erence Equ., 2013, (2013): 95.

20. E. O. Alzahrani, M. M. El-Dessoky, E. M. Elsayed and Y. Kuang, Solutions and Properties of Some Degen-erate Systems of Di¤erence Equations, J. Comput. Anal. Appl., Vol. 18(2), (2015), 321-333.

21. A. Q. Khan, M. N. Qureshi, Global dynamics of some systems of rational di¤erence equations, J. EgyptianMath. Soc., 24, (2016), 30-36.

22. E. M. Elabbasy, H. El-Metwally and E. M. Elsayed, Global behavior of the solutions of di¤erence equation,Adv. Di¤er. Equ., 2011, 2011:28.

23. M. M. El-Dessoky, M. Mansour, E. M. Elsayed, Solutions of some rational systems of di¤erence equations,Utilitas Mathematica, 92, (2013), 329-336.

24. M. M. El-Dessoky, On the solutions and periodicity of some nonlinear systems of di¤erence equations, J.Nonlinear Sci. Appl., 9(5), (2016), 2190-2207.

25. E. M. Elsayed, A. M. Ahmed, Dynamics of a three-dimensional systems of rational di¤erence equations,Math. Methods Appl. Sci., 39, (2016), 1026-1038.

26. N. Touafek and E. M. Elsayed, On a second order rational systems of di¤erence equations, Hokkaido Math.J., 44, (2015), 29–45.

27. Y. Yazlik, D. T. Tollu, N. Taskara, On the Behaviour of Solutions for Some Systems of Di¤erence Equations,J. Comput. Anal. Appl., 18 (1), (2015), 166-178.

28. Qianhong Zhang, Jingzhong Liu, and Zhenguo Luo, Dynamical Behavior of a System of Third-Order Ra-tional Di¤erence Equation, Discrete Dyn. Nat. Soc., 2015, (2015), Article ID 530453, 6 pages.

29. M. M. El-Dessoky, On a solvable for some systems of rational di¤erence equations, J. Nonlinear Sci. Appl.,Vol. 9(6), (2016), 3744-3759.

30. Wenqiang Ji, Decun Zhang and Liying Wang, Dynamics and behaviors of a third-order system of di¤erenceequation, Mathematical Sciences, 2013, (2013),:34.

31. Q. Zhang and W. Zhang, On a system of two high-order nonlinear di¤erence equations, Adv. Math. Phys.,2014, (2014), Article ID 729273, 8 pages.

32. Mehmet Gümüs and Yüksel Soykan, Global Character of a Six-Dimensional Nonlinear System of Di¤erenceEquations, Discrete Dyn. Nat. Soc., 2016, (2016), Article ID 6842521, 7 pages.

33. M. M. El-Dessoky, Solution of a rational systems of di¤erence equations of order three, Mathematics,4(3),(2016), 1-12.

34. A. Gelisken, On A System of Rational Di¤erence Equations, J. Comput. Anal. Appl., Vol. 23(4), (2017),593-606.

35. N. Haddad, N. Touafek, Julius Fergy T. Rabago, Solution form of a higher-order system of di¤erenceequations and dynamical behavior of its special case, Math. Methods Appl. Sci.,40(10), (2017), 3599-3607.

36. Chang-you Wang, Xiao-jing Fang, Rui Li, On the dynamics of a certain four-order fractional di¤erenceequations , J. Comput. Anal. Appl., Vol. 22(5), (2017), 968-976.

37. M. M. El-Dessoky, E. M. Elsayed and E. O. Alzahrani, The form of solutions and periodic nature for somerational di¤erence equations systems, J. Nonlinear Sci. Appl., Vol., 9(10), (2016), 5629–5647.

38. M. M. El-Dessoky, Abdul Khaliq and Asim Asiri, On some rational systems of di¤erence equations, J.Nonlinear Sci. Appl., Vol. 11(1), (2018), 49-72.

39. Asim Asiri, M. M. El-Dessoky and E. M. Elsayed, Solution of a third order fractional system of di¤erenceequations , J. Comput. Anal. Appl., Vol., 24(3), (2018), 444-453.

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 27, NO.7, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

1172 El-Dessoky ET AL 1161-1172

Page 101: Journal of Computational Analysis and Applicationseudoxuspress.com/images/JOCAAA-VOL-27-2019-ISSUE-7.pdfJournal of Computational Analysis and Applications . ISSNno.’s:1521-1398 PRINT,1572-9206

Hardy type inequalities for Choquet integrals

George A. AnastassiouDepartment of Mathematical Sciences

University of MemphisMemphis, TN 38152, [email protected]

Abstract

Here we present Hardy type integral inequalities for Choquet inte-grals. These are very general inequalities involving convex and increasingfunctions. Initially we collect a rich machinery of results about Choquetintegrals needed next, and we prove also results of their own merit suchas, Choquet-Hölders inequalities for more than two functions and a mul-tivariate Choquet-Fubinis theorem. The main proving tool here is theproperty of comonotonicity of functions. We nish with independent es-timates on left and right Riemann-Liouville-Choquet fractional integrals.

2010 AMSMathematics Subject Classication: 26A33, 26D10 26D15,26E50, 28E10.Keywords and Phrases: Choquet integral, Hardy inequality, comonotonic-

ity, fractional integral, convexity.

1 Introduction

To motivate the work in this article we mention the Riemann-Liouville fractionalintegrals, see [9]. Let [a; b], (1 < a < b <1) be a nite interval on the realaxis R. The left and right Riemann-Liouville fractional integrals Ia+f and Ibf(respectively) of order > 0 are dened by

Ia+f

(x) =

1

()

Z x

a

f (t) (x t)1 dt, (x > a) ;

Ibf

(x) =

1

()

Z b

x

f (t) (t x)1 dt; (x < b) ;

where is the Gamma function.We mention a basic property of the operators Ia+f and I

bf of order > 0,

see also [11]: It holds that the fractional integral operators Ia+f and Ibf are

1

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 27, NO.7, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

1173 ANASTASSIOU 1173-1188

Page 102: Journal of Computational Analysis and Applicationseudoxuspress.com/images/JOCAAA-VOL-27-2019-ISSUE-7.pdfJournal of Computational Analysis and Applications . ISSNno.’s:1521-1398 PRINT,1572-9206

bounded in Lp (a; b), 1 p 1, that is Ia+f p K kfkp , Ibf p K kfkp ;where

K =(b a)

():

The rst inequality that is the result involving the left-sided fractional integral,was proved by H.G. Hardy in one of his rst papers, see [7]. He did not writedown the constant, but the calculation of the constant was hidden inside hisproof.General Hardy inequalities of the above type were derived also in [8] and

[1]. We continue this kind of research for Choquet integrals based on thecomonotonicity property of functions and convexity. We derive a wide rangeof Choquet integral inequalities of Hardy type.

2 Background

In this section we give some denitions and basic properties of Choquet integralessential for this work.

Denition 1 ([15]) Let X be a non-empty set, F be a -algebra of subsets ofX and : F ! [0;1] be a nonnegative real-valued set function, is said to bea fuzzy measure i¤:(1) (?) = 0;(2) for any A;B 2 F , A B implies (A) (B) (monotonicity),(3) for fAng F , A1 A2 ::: An :::, implies lim

n!1 (An) =

([1n=1An) (continuity from below)(4) for fAng F , A1 A2 ::: An :::, (A1) < 1; implies

limn!1

(An) = (\1n=1An) (continuity from above).

If is a fuzzy measure from F to [0; 1] with (X) = 1, is called a regularfuzzy measure. If is a fuzzy measure, (X;F ; ) is called a fuzzy measure spaceand (X;F) is a fuzzy measurable space. Clearly is not necessarily an additivemeasure. Let F be the set of all real-valued nonnegative measurable functionsdened on X.

Denition 2 ([10]) Let (X;F ; ) be a fuzzy measure space, is said to besubmodular (supermodular) if

(A \B) + (A [B) () (A) + (B) ; 8 A;B F : (1)

Denition 3 ([4]) Let f; g 2 F , f and g are said to be comonotonic i¤ f (x) <f (x0) implies g (x) g (x0), 8 x; x0 2 X:

2

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 27, NO.7, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

1174 ANASTASSIOU 1173-1188

Page 103: Journal of Computational Analysis and Applicationseudoxuspress.com/images/JOCAAA-VOL-27-2019-ISSUE-7.pdfJournal of Computational Analysis and Applications . ISSNno.’s:1521-1398 PRINT,1572-9206

Denition 4 ([5], [16]) Let (X;F ; ) be a fuzzy measure space, f 2 F andA 2 F . The Choquet integral of f with respect to on A is dened by

(C)

ZA

fd =

Z 1

0

(A \ fxjf (x) g) d: (2)

If (C)RXfd < 1, we call f (C)-integrable, L1 () is the set of all (C)-

integrable function.Clearly (C)

RXfd <1, implies (C)

RAfd <1:

Theorem 5 ([14]) Let (X;F ; ) be a fuzzy measurable space, ff1; f2; fg F ,A;B 2 F and c 0 constant. Then,(1) if (A) = 0, then (C)

RAfd = 0;

(2) (C)RAcd = c (A) ;

(3) if f1 f2, then

(C)

ZA

f1d (C)ZA

f2d; (3)

(4) if A B, then (C)RAfd (C)

RBfd;

(5) (C)RA(f + c) d = (C)

RAfd+ c (A) ;

(6) (C)RAcfd = c

(C)

RAfd

:

Theorem 6 ([5]) Let (X;F ; ) be a fuzzy measure space and f; g 2 F . Then(1) if f; g are comonotonic, then for any A 2 F ,

(C)

ZA

(f + g) d = (C)

ZA

fd+ (C)

ZA

gd; (4)

(2) if is submodular, then for any A 2 F ,

(C)

ZA

(f + g) d (C)ZA

fd+ (C)

ZA

gd: (5)

The Jensens inequality for Choquet integrals follows:

Theorem 7 ([13]) Let (X;F ; ) be a fuzzy measure space and f 2 L1 (). If is a regular fuzzy measure and : [0;1)! [0;1) is a convex function, then

(C)

ZX

fd

(C)

ZX

(f) d: (6)

Corollary 8 ([13]) Let (X;F ; ) be a fuzzy measure space and f 2 L1 (). If is a regular fuzzy measure, then

(C)

ZX

fd

p (C)

ZX

fpd; (7)

for any 1 < p <1:

3

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 27, NO.7, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

1175 ANASTASSIOU 1173-1188

Page 104: Journal of Computational Analysis and Applicationseudoxuspress.com/images/JOCAAA-VOL-27-2019-ISSUE-7.pdfJournal of Computational Analysis and Applications . ISSNno.’s:1521-1398 PRINT,1572-9206

Theorem 9 ([13]) (Hölders inequality) Let (X;F ; ) be a fuzzy measure spaceand f; g 2 F . If is a submodular fuzzy measure and 1 < p; q < 1 with1p +

1q = 1, then

(C)

ZX

fgd (C)

ZX

fpd

1p(C)

ZX

gqd

1q

: (8)

Theorem 10 ([13]) (Minkowski inequality) Let (X;F ; ) be a fuzzy measurespace and f; g 2 F . If is a submodular fuzzy measure and 1 p <1, then

(C)

ZX

(f + g)pd

1p

(C)

ZX

fpd

1p

+

(C)

ZX

gpd

1p

: (9)

We give

Theorem 11 (Hölders inequality for three functions) Let (X;F ; ) be a fuzzymeasure space and f1; f2; f3 2 F . If is a submodular fuzzy measure and1 < p1 p2 p3 <1 with 1

p1+ 1

p2+ 1

p3= 1, then

(C)

ZX

f1f2f3d (C)

ZX

fp11 d

1p1(C)

ZX

fp22 d

1p2(C)

ZX

fp33 d

1p3

:

(10)

Proof. Let p = p3p31 > 1 and q = p3. Notice that

1p +

1q = 1:

We apply (8) as follows

(C)

ZX

f1f2f3d (C)

ZX

(f1f2)pd

1p(C)

ZX

fp33 d

1p3

: (11)

We see that

p

p1+p

p2= p

1

p1+1

p2

= p

1 1

p3

= p

p3 1p3

= 1: (12)

Clearly it holds p1p ;

p2p > 1.

Therefore we get

(C)

ZX

fp1 fp2 d

(8)(C)

ZX

fpp1p

1 d

pp1(C)

ZX

fpp2p

2 d

pp2

= (13)

(C)

ZX

fp11 d

pp1(C)

ZX

fp22 d

pp2

:

That is(C)

ZX

(f1f2)pd

1p

(C)

ZX

fp11 d

1p1(C)

ZX

fp22 d

1p2

: (14)

Combining (11) and (14), we produce (10).In general we have

4

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 27, NO.7, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

1176 ANASTASSIOU 1173-1188

Page 105: Journal of Computational Analysis and Applicationseudoxuspress.com/images/JOCAAA-VOL-27-2019-ISSUE-7.pdfJournal of Computational Analysis and Applications . ISSNno.’s:1521-1398 PRINT,1572-9206

Theorem 12 (Hölders inequality for n functions) Let (X;F ; ) be a fuzzy mea-sure space and fi 2 F , i = 1; :::; n 2 N. If is a submodular fuzzy measure and1 < p1 p2 ::: pn <1 with

nPi=1

1pi= 1, then

(C)

ZX

nYi=1

fid nYi=1

(C)

ZX

fpii d

1pi

: (15)

Proof. By induction.

Remark 13 Let A be a -algebra, and let fAkgk2N A be a family of pairwisedisjoint sets. Here P is a probability measure on (X;A) with only the niteadditivity property valid: i.e.,

P ([nk=1Ak) =nXk=1

P (Ak) , 8 n 2 N.

We observe that

P ([1k=1Ak) = limn!1

P ([nk=1Ak) = limn!1

nXk=1

P (Ak) =

1Xk=1

P (Ak) : (16)

That is, the countable additivity property holds, hence P is a usual probabilitymeasure.

Notice that a -algebra on X is also an algebra of subsets of X.

Denition 14 ([3], [6]) For every space and algebra A of subsets of a set-function : A ! R is called a (normalized) capacity if it satises the following:(i)

(?) = 0; () = 1; (17)

(ii) 8 A;B 2 A : A B ) (A) (B) :From (i) and (ii) we get that the range of is contained in [0; 1] :

In general the Choquet integral is dened as follows:

Denition 15 ([3], [12]) Let (;A) be an algebra and f : ! R is a boundedA-measurable function and is any (normalized) capacity on we dene theChoquet integral of f with respect to to be the number

(C)

Z

f (!) d (!) =

Z 1

0

(f! 2 : f (!) g) d+ (18)

Z 0

1[ (! 2 : f (!) g) 1] d;

5

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 27, NO.7, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

1177 ANASTASSIOU 1173-1188

Page 106: Journal of Computational Analysis and Applicationseudoxuspress.com/images/JOCAAA-VOL-27-2019-ISSUE-7.pdfJournal of Computational Analysis and Applications . ISSNno.’s:1521-1398 PRINT,1572-9206

where the integrals are taken in the sense of Riemann.A (normalized) capacity is called probability ([6]) i¤

8 A;B 2 A : (A [B) + (A \B) = (A) + (B) : (19)

Notice that since the integrands are monotone, the Choquet integral always ex-ists, and if is a probability it collapses to a usual Lebesgue integral.

Denition 16 ([6]) Let f; g : ! R be two bounded A-measurable functions.We say that f and g are comonotonic, if for every !; !0 2 ,

(f (!) f (!0)) (g (!) g (!0)) 0: (20)

A class of functions F is said to be comonotonic if for every f; g 2 F, f andg are comonotonic.

Proposition 17 ([6]) If and are (normalized) capacities on the algebra(;A) ; and f; g : ! R are bounded A-measurable functions then:(i)

(C)

Z

1Ad = (A) , 8 A 2 A; (21)

where 1A is the characteristic function on A,(ii) (positive homogeneity)

(C)

Z

pfd = p

(C)

Z

fd

, for every p 0; (22)

(iii) (monotonicity) f g implies

(C)

Z

fd (C)Z

gd; (23)

(iv)

(C)

Z

(f + p) d = (C)

Z

fd + p, 8 p 2 R, (24)

(v) (comonotonic additivity) If f; g are comonotonic then

(C)

Z

(f + g) d = (C)

Z

fd + (C)

Z

gd. (25)

We need the very important

Lemma 18 ([6]) Let (;A) be an algebra. Suppose that F is a comonotonicclass of bounded and A-measurable functions from into R and is a (normal-ized) capacity on (;A). Then there exists a probability measure P on (;A)such that for every f 2 F Z

fd =

Z

fdP: (26)

HereRfdP is a standard integral of Lebesgue type.

6

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 27, NO.7, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

1178 ANASTASSIOU 1173-1188

Page 107: Journal of Computational Analysis and Applicationseudoxuspress.com/images/JOCAAA-VOL-27-2019-ISSUE-7.pdfJournal of Computational Analysis and Applications . ISSNno.’s:1521-1398 PRINT,1572-9206

Based on Remark 13, Lemma 18 is still valid in case that (;A) is a -algebra.

Denition 19 ([6]) Let X;Y be two sets and Z = X Y . Let f : Z ! R. Wesay that f has comonotonic x-sections if for every x; x0 2 X, f (x; ) : Y ! R,and f (x0; ) : Y ! R are comonotonic functions. Comonotonicity of y-sectionsis similarly dened. We call f slice-comonotonic if it has both comonotonicx-sections and y-sections.

Remark 20 Notice that Denitions 14-16 and Proposition 17, are still validwhen (;A) is a -algebra.

Next we mention Fubinis theorem for Choquet integrals.

Theorem 21 ([2]) Let (1;1), (2;2) be -algebras. Let ui, i = 1; 2 besubmodular (or supermodular) regular fuzzy measures on i, respectively. Let = 1 2 be endowed with the product -algebra = 1 2. Let f :1 2 ! R be a slice-comonotonic bounded -measurable mapping, then:1) f (; !2) is 1-measurable and !2 2 2 ! (C)

R1f (s; !2) du1 (s) is

bounded and 2-measurable,f (!1; ) is 2-measurable and !1 2 1 ! (C)

R2f (!1; t) du2 (t) is bounded

and 1-measurable,2) the iterated integrals (C)

R2

R1fdu1du2, (C)

R1

R2fdu2du1 exist and

are equal:

(C)

Z2

(C)

Z1

f (!1; !2) du1

du2 = (C)

Z1

(C)

Z2

f (!1; !2) du2

du1:

(27)

We give

Denition 22 Let f :nQi=1

i ! R, n 2 N. If the i-sections

f (x1; :::; xi1; ; xi+1; :::; xn) and fx01; :::; x

0i1; ; x0i+1; :::; x0n

are comonotonic

functions, for all i = 1; :::; n; where the vectors (x1; :::; xi1; xi+1; :::; xn) ;x01; :::; x

0i1; x

0i+1; :::; x

0n

2n1Qj=1j 6=i

j are di¤erent, for all i = 1; 2; :::; n; we call f

slice-n-comonotonic function.We denote by a permutation of the set f1; 2; :::; ng into itself, n 2 N. There

are n! permutations.

In [2] is mentioned that Theorem 21 can be generalized for n spaces. Nextwe state in brief Fubinis theorem for n Choquet iterated integrals.

7

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 27, NO.7, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

1179 ANASTASSIOU 1173-1188

Page 108: Journal of Computational Analysis and Applicationseudoxuspress.com/images/JOCAAA-VOL-27-2019-ISSUE-7.pdfJournal of Computational Analysis and Applications . ISSNno.’s:1521-1398 PRINT,1572-9206

Theorem 23 Let (i;i) be -algebras, i = 1; 2; :::; n 2 N. Let ui, i = 1; 2; :::; nbe submodular (or supermodular) regular fuzzy measures on i, respectively. Let

=nQi=1

i be endowed with the product -algebra = ni=1i. Let f :nQi=1

i !

R be a slice-comonotonic bounded -measurable mapping, then

(C)

Zn

Zn1

:::

Z1

fdu1du2:::dun =

(C)

Z(n)

Z(n1)

:::

Z(1)

fdu(1)du(2):::du(n); (28)

for any permutation on the set f1; :::; ng. All the iterated Choquet integrals in(28) exist and are equal.

Proof. By induction, (23) and using Theorem 21.

Remark 24 If is a countably additive bounded measure, then the Choquetintegral (C)

RAfd reduces to the usual Lebesgue type integral (see, e.g. [5], p.

62, or [17], p. 226), above it is A :

3 Main Results

This section is motivated by [8].Let the fuzzy measure spaces (1;1; 1) and (2;2; 2), where 1; 2 are

regular fuzzy measures, furthermore 1; 2 are assumed to be submodular.Let k : 1 2 ! R+ which is a bounded measurable function and k (x; y)

is slicecomonotonic and belongs to a comonotonic class F 1 as a function ofy:

Consider the function

K (x) = (C)

Z2

k (x; y) d2 (y) , x 2 1; (29)

and assume that K (x) > 0:Notice that K is bounded.Denote by W (k) the class of functions g : 1 ! R+, such that

g (x) = (C)

Z2

k (x; y) f (y) d2 (y) ; (30)

where f : 2 ! R+ is a bounded measurable function, such that k (x; y) f (y) isslicecomonotonic and belongs to a comonotonic class F 2 as a function of y:Notice that g is also bounded.We give

8

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 27, NO.7, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

1180 ANASTASSIOU 1173-1188

Page 109: Journal of Computational Analysis and Applicationseudoxuspress.com/images/JOCAAA-VOL-27-2019-ISSUE-7.pdfJournal of Computational Analysis and Applications . ISSNno.’s:1521-1398 PRINT,1572-9206

Theorem 25 Let u be a nonnegative measurable function on 1. Assume thatu(x)K(x) is bounded on 1. Dene on 2 by

(y) = (C)

Z1

u (x)

K (x)k (x; y) d1 (x) ; (31)

which is bounded. Let : R+ ! R+ be a convex and increasing function,such that k (x; y) (f (y)) is x-section comonotonic with comonotonic class F 3 .Assume here that (F 1 [ F 2 [ F 3 ) F , where F is one comonotonic class offunctions on 2. Assume further that u (x) (K (x))

1k (x; y) (f (y)) is slice-

comonotonic. Then

(C)

Z1

u (x)

g (x)

K (x)

d1 (x) (C)

Z2

(y) (f (y)) d2 (y) ; (32)

holds for all g 2W (k), with f as in (30).

Proof. We observe that

(C)

Z1

u (x)

g (x)

K (x)

d1 (x) =

(C)

Z1

u (x)

1

K (x)(C)

Z2

k (x; y) f (y) d2 (y)

d1 (x) = (33)

(next we use Lemma 18, where P is a probability measure on 2)

(C)

Z1

u (x)

1

K (x)(C)

Z2

k (x; y) f (y) dP (y)

d1 (x)

(we can also write K (x) =R2k (x; y) dP (y) ; hence by classic Jensens inequal-

ity)

(C)

Z1

u (x) (K (x))1(C)

Z2

k (x; y) (f (y)) dP (y)

d1 (x) = (34)

(again by Lemma 18)

(C)

Z1

u (x) (K (x))1(C)

Z2

k (x; y) (f (y)) d2 (y)

d1 (x) =

(C)

Z1

(C)

Z2

u (x) (K (x))1k (x; y) (f (y)) d2 (y)

d1 (x) =

(since the functions (f (y)) and u (x) (K (x))1 k (x; y) (f (y)) are boundedand the second one is slice-comonotonic, we can apply Fubinis Theorem 21)

(C)

Z2

(C)

Z1

u (x) (K (x))1k (x; y) (f (y)) d1 (x)

d2 (y) =

9

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 27, NO.7, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

1181 ANASTASSIOU 1173-1188

Page 110: Journal of Computational Analysis and Applicationseudoxuspress.com/images/JOCAAA-VOL-27-2019-ISSUE-7.pdfJournal of Computational Analysis and Applications . ISSNno.’s:1521-1398 PRINT,1572-9206

(C)

Z2

(f (y))

(C)

Z1

u (x) (K (x))1k (x; y) d1 (x)

d2 (y)

(31)= (35)

(C)

Z2

(f (y)) (y) d2 (y) ;

proving the claim.We also give

Corollary 26 All as in Theorem 25, with = identity mapping. Then

(C)

Z1

u (x)

K (x)g (x) d1 (x) (C)

Z2

(y) f (y) d2 (y) ; (36)

holds for all g 2W (k), with f as in (30).

Corollary 27 All as in Theorem 25, with (x) = xp, 8 x 2 R+, p > 1. Then

(C)

Z1

u (x)

Kp (x)gp (x) d1 (x) (C)

Z2

(y) fp (y) d2 (y) ; (37)

holds for all g 2W (k), with f as in (30).

Corollary 28 All as in Theorem 25, with (x) = ex, 8 x 2 R+. Then

(C)

Z1

u (x) eg(x)K(x) d1 (x) (C)

Z2

(y) ef(y)d2 (y) ; (38)

holds for all g 2W (k), with f as in (30).

Corollary 29 All as in Theorem 25, with = identity mapping and u (x) =K (x). Then

(C)

Z1

g (x) d1 (x) (C)Z2

(y) f (y) d2 (y) ; (39)

holds for all g 2W (k), with f as in (30). Here (y) = (C)R1k (x; y) d1 (x) is bounded:

Corollary 30 All as in Theorem 25, with (x) = xp, 8 x 2 R+, p > 1, andu (x) = Kp (x). Then

(C)

Z1

gp (x) d1 (x) (C)Z2

(y) fp (y) d2 (y) ; (40)

holds for all g 2W (k), with f as in (30). Here

(y) = (C)

Z1

Kp1 (x) k (x; y) d1 (x) is bounded: (41)

10

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 27, NO.7, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

1182 ANASTASSIOU 1173-1188

Page 111: Journal of Computational Analysis and Applicationseudoxuspress.com/images/JOCAAA-VOL-27-2019-ISSUE-7.pdfJournal of Computational Analysis and Applications . ISSNno.’s:1521-1398 PRINT,1572-9206

Remark 31 (on Corollary 30) Let us assume that k (x; y) M , M > 0, 8(x; y) 2 1 2, then K (x) M . And from (41), (y) Mp.Consequently, from (40), it holds

(C)

Z1

gp (x) d1 (x) Mp

(C)

Z2

fp (y) d2 (y)

; (42)

and even better written(C)

Z1

gp (x) d1 (x)

1p

M(C)

Z2

fp (y) d2 (y)

1p

: (43)

Next we rewrite the result of (43) in detail.

Theorem 32 Assume that k (x; y) M , M > 0, 8 (x; y) 2 1 2, and letp > 1. Dene

(y) = (C)

Z1

Kp1 (x) k (x; y) d1 (x) , (44)

which is bounded. Here k (x; y) (f (y))p is x-section comonotonic with comonotonicclass F 3 . Assume that (F

1 [ F 2 [ F 3 ) F , where F one comonotonic class

on 2. Assume further that (K (x))p1 k (x; y) (f (y))p is slice-comonotonic.Then

(C)

Z1

gp (x) d1 (x)

1p

M(C)

Z2

fp (y) d2 (y)

1p

; (45)

holds for all g 2W (k), with f as in (30).

Remark 33 Assume that k (x; y) M , M > 0, 8 (x; y) 2 1 2. Hencedirectly by (30) we get

g (x) M(C)

Z2

f (y) d2 (y)

, 8 x 2 1:

Therefore Z1

g (x) d1 (x) M(C)

Z2

f (y) d2 (y)

; (46)

holds for all g 2W (k), with f as in (30).

Theorem 34 Dene on 2 by (y) = (C)R1k (x; y) d1 (x) ; which is bounded.

Let p > 1. Here k (x; y) (f (y))p is slicecomonotonic and belongs to a comonotonicclass F 3 as a function of y. Assume that (F

1 [ F 2 [ F 3 ) F , where F one

comonotonic class on 2. Then

(C)

Z1

(K (x))1p

gp (x) d1 (x) (C)Z2

(y) fp (y) d2 (y) ; (47)

holds for all g 2W (k), with f as in (30).

11

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 27, NO.7, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

1183 ANASTASSIOU 1173-1188

Page 112: Journal of Computational Analysis and Applicationseudoxuspress.com/images/JOCAAA-VOL-27-2019-ISSUE-7.pdfJournal of Computational Analysis and Applications . ISSNno.’s:1521-1398 PRINT,1572-9206

Proof. By Theorem 25, take f (x) = xp, x 0, p > 1, and u (x) = K (x) :

Corollary 35 All as in Theorem 34. Then(C)

Z1

gp (x) d1 (x)

1p

M(C)

Z2

fp (y) d2 (y)

1p

: (48)

holds for all g 2 W (k), with f as in (30). Here k (x; y) M , M > 0, 8(x; y) 2 1 2:

Proof. Since p > 1, 1 p < 0. Hence the left hand side of (47) is greaterequal toM1p

(C)

R1gp (x) d1 (x)

, by K (x) M and (K (x))1p M1p.

And the right hand side of (47) is less equal to M(C)

R2fp (y) d2 (y)

, by

(y) M . Therefore

M1p(C)

Z1

gp (x) d1 (x)

M

(C)

Z2

fp (y) d2 (y)

; (49)

proving the claim.

4 Appendix

Here B stands for the Borel -algebra on [a; b] :Let the fuzzy measure spaces ([a; b] ;B; 1) and ([a; b] ;B; 2), where [a; b] R

and 1; 2 are bounded fuzzy measures with 2 submodular. Let p; q > 1 suchthat 1

p +1q = 1. Let f : [a; b]! R+ which is bounded and B-measurable.

We dene the left and right Riemann-Liouville-Choquet fractional integralsof order > 1 (respectively):

Ia+f(x) =

1

()(C)

Z x

a

(x t)1 f (t) d2 (t) ; (50)

and Ibf

(x) =

1

()(C)

Z b

x

(t x)1 f (t) d2 (t) ; (51)

8 x 2 [a; b], where is the gamma function.We assume that

Ia+f

and

Ibf

are B-measurable functions. Clearly

Ia+f; Ibf are nonnegative and bounded over [a; b] :

Remark 36 By Theorem 9 we obtain

Ia+f

(x) 1

()

(C)

Z x

a

(x t)p(1) d2 (t) 1

p(C)

Z x

a

fq (t) d2 (t)

1q

(52)

12

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 27, NO.7, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

1184 ANASTASSIOU 1173-1188

Page 113: Journal of Computational Analysis and Applicationseudoxuspress.com/images/JOCAAA-VOL-27-2019-ISSUE-7.pdfJournal of Computational Analysis and Applications . ISSNno.’s:1521-1398 PRINT,1572-9206

1

()

(b a)p(1) 2 ([a; b])

1p

(C)

Z b

a

fq (t) d2 (t)

! 1q

:

Hence it holds

Ia+f

(x)p 1

( ())p (b a)p(1) 2 ([a; b])

(C)

Z b

a

fq (t) d2 (t)

! pq

;

(53)8 x 2 [a; b] :Therefore

(C)

Z b

a

Ia+f

(x)pd1 (x)

1 ([a; b])

( ())p (b a)p(1) 2 ([a; b])

(C)

Z b

a

fq (t) d2 (t)

! pq

: (54)

We have proved that (C)

Z b

a

Ia+f

(x)pd1 (x)

! 1p

(1 ([a; b])2 ([a; b]))1p (b a)(1)

()

(C)

Z b

a

fq (t) d2 (t)

! 1q

: (55)

Similarly, we have

Ibf

(x)

(8) 1

()

(C)

Z b

x

(t x)p(1) d2 (t)! 1

p (C)

Z b

x

fq (t) d2 (t)

! 1q

(56)

1

()

(b a)p(1) 2 ([a; b])

1p

(C)

Z b

a

fq (t) d2 (t)

! 1q

:

As before we obtain (C)

Z b

a

Ibf

(x)pd1 (x)

! 1p

(1 ([a; b])2 ([a; b]))1p (b a)(1)

()

(C)

Z b

a

fq (t) d2 (t)

! 1q

: (57)

We have proved

13

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 27, NO.7, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

1185 ANASTASSIOU 1173-1188

Page 114: Journal of Computational Analysis and Applicationseudoxuspress.com/images/JOCAAA-VOL-27-2019-ISSUE-7.pdfJournal of Computational Analysis and Applications . ISSNno.’s:1521-1398 PRINT,1572-9206

Theorem 37 Here > 1 and the rest are as in this section. It holds

max

8<: (C)

Z b

a

Ia+f

(x)pd1 (x)

! 1p

;

(C)

Z b

a

Ibf

(x)pd1 (x)

! 1p

9=; (1 ([a; b])2 ([a; b]))

1p (b a)(1)

()

(C)

Z b

a

fq (t) d2 (t)

! 1q

: (58)

Remark 38 From (52) we get

Ia+f

(x) 1

()

(x a)p(1) 2 ([a; x])

1p

(C)

Z b

a

fq (t) d2 (t)

! 1q

;

(59)and from (56) we derive (by exchanging the roles of p and q)

Ibf

(x) 1

()

(b x)q(1) 2 ([x; b])

1q

(C)

Z b

a

fp (t) d2 (t)

! 1p

: (60)

Therefore by multiplying (59), (60) we get

Ia+f

(x)Ibf

(x) 1

( ())2

(x a)p(1) 2 ([a; x])

1p (61)

(b x)q(1) 2 ([x; b])

1q

(C)

Z b

a

fq (t) d2 (t)

! 1q (C)

Z b

a

fp (t) d2 (t)

! 1p

(using Youngs inequality for a; b 0, a1p b

1q a

p +bq )

1

( ())2

(x a)p(1) 2 ([a; x])

p+(b x)q(1) 2 ([x; b])

q

!

(C)

Z b

a

fq (t) d2 (t)

! 1q (C)

Z b

a

fp (t) d2 (t)

! 1p

: (62)

We have that Ia+f

(x)Ibf

(x)h

(xa)p(1)2([a;x])p + (bx)q(1)2([x;b])

q

i 1

( ())2

(C)

Z b

a

fq (t) d2 (t)

! 1q (C)

Z b

a

fp (t) d2 (t)

! 1p

: (63)

Notice that the denominator of left hand side of (63) is never zero.

14

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 27, NO.7, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

1186 ANASTASSIOU 1173-1188

Page 115: Journal of Computational Analysis and Applicationseudoxuspress.com/images/JOCAAA-VOL-27-2019-ISSUE-7.pdfJournal of Computational Analysis and Applications . ISSNno.’s:1521-1398 PRINT,1572-9206

Integrating (63) with respect to x we obtain:

Theorem 39 Here > 1 and the rest are as in this section. It holds

(C)

Z b

a

Ia+f

(x)Ibf

(x) d1 (x)h

(xa)p(1)2([a;x])p + (bx)q(1)2([x;b])

q

i 1 ([a; b])

( ())2

(C)

Z b

a

fp (t) d2 (t)

! 1p (C)

Z b

a

fq (t) d2 (t)

! 1q

: (64)

Inequality (64) is a Hilbert-Pachpatte type inequality for Choquet fractional in-tegrals.

References

[1] G. Anastassiou, Intelligent Comparisons: Analytic Inequalities, Springer,Heidelberg, New York, 2016.

[2] A. Chateauneuf, J.P. Lefort, Some Fubini theorems on product sigma-algebras for non-additive measures, Internat. J. Approx. Reason, 48 (2008),no. 3, 686-696.

[3] G. Choquet, Theory of capacities, Ann. Inst. Fourier, 5 (1953), 131-295.

[4] L.M. de Campos, M.J. Bolanos, Characterization and comparison of Sugenoand Choquet integrals, Fuzzy Sets Syst., 52 (1992), 61-67.

[5] D. Denneberg, Nonadditive Measure and Integral, Kluwer Academic, Dor-drecht, 1994.

[6] P. Ghirardato, On independence for non-additive measures, with a Fubinitheorem, J. Economic Theory, 73 (1997), 261-291.

[7] H.G. Hardy, Notes on some points in the integral calculus, Messenger ofMathematics, vol. 47, no. 10, 1918, 145-150.

[8] S. Iqbal, K. Krulic, J. Pecaric, On an inequality of G. Hardy, J. of Inequal-ities and Applications, Vol. 2010, Article ID 264347, 23 pages.

[9] A.A. Kilbas, H.M. Srivastava, J.J. Trujillo, Theory and Applications ofFractional Di¤erential Equations, vol. 204 of North-Holland MathematicsStudies, Elsevier, New York, NY, USA, 2006.

[10] E. Pap, Null-Additive Set Functions, Kluwer Academic, Dordrecht, 1995.

15

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 27, NO.7, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

1187 ANASTASSIOU 1173-1188

Page 116: Journal of Computational Analysis and Applicationseudoxuspress.com/images/JOCAAA-VOL-27-2019-ISSUE-7.pdfJournal of Computational Analysis and Applications . ISSNno.’s:1521-1398 PRINT,1572-9206

[11] S.G. Samko, A.A. Kilbas, O.I. Marichev, Fractional Integral and Deriv-atives: Theory and Applications, Gordon and Breach Science Publishers,Yverdon, Switzerland, 1993.

[12] D. Schmeidler, Subjective probability and expected utility without additivity,Econometrica, 57 (1989), 571-587.

[13] Rui-Sheng Wang, Some inequalities and convergence theorems for Choquetintegrals, J. Appl. Math. Comput. 35 (2011), 305-321.

[14] Z. Wang, Convergence theorems for sequences of Choquet integrals, Int. J.Gen. Syst. 26 (1997), 133-143.

[15] Z. Wang, G. Klir, Fuzzy Measure Theory, Plenum, New York, 1992.

[16] Z. Wang, G.J. Klir, W. Wang, Monotone set functions dened by Choquetintegrals, Fuzzy Sets Syst. 81 (1996), 241-250.

[17] Z. Wang, G.J. Klir, Generalized Measure Theory, Springer, New York, 2009.

16

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 27, NO.7, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

1188 ANASTASSIOU 1173-1188

Page 117: Journal of Computational Analysis and Applicationseudoxuspress.com/images/JOCAAA-VOL-27-2019-ISSUE-7.pdfJournal of Computational Analysis and Applications . ISSNno.’s:1521-1398 PRINT,1572-9206

1189

Page 118: Journal of Computational Analysis and Applicationseudoxuspress.com/images/JOCAAA-VOL-27-2019-ISSUE-7.pdfJournal of Computational Analysis and Applications . ISSNno.’s:1521-1398 PRINT,1572-9206

TABLE OF CONTENTS, JOURNAL OF COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 27, NO. 7, 2019

Common fixed point theorems in 𝐺𝐺𝑏𝑏-metric space, Youqing Shen, Chuanxi Zhu, and Zhaoqi Wu,……………………………………………………………………………………1083

A modified collocation method for weakly singular Fredholm integral equations of second kind, Guang Zeng, Chaomin Chen, Li Lei, and Xi Xu,…………………………………….1091

Sharp coefficient estimates for non-Bazilevič functions, Ji Hyang Park, Virendra Kumar, and Nak Eun Cho,……………………………………………………………………………1103

A new extragradient method for the split feasibility and fixed point problems, Ming Zhao and Yunfei Du,…………………………………………………………………………………1114

Behavior of Meromorphic Solutions of Composite Functional-Difference Equations, Man-Li Liu and Ling-Yun Gao,…………………………………………………………………………1124

Locally and globally small Riemann sums and Henstock-Stieltjes integral for n-dimensional fuzzy-number-valued functions, Muawya Elsheikh Hamid,……………………………….1142

Solving Systems of Nonhomogeneous Coupled Linear Matrix Differential Equations in Terms of Mittag-Leffler Matrix Functions, Rungpailin Kongyaksee and Pattrawut Chansangiam,…1150

Expressions of the solutions of some systems of difference equations, M. M. El-Dessoky, E. M. Elsayed, E. M. Elabbasy, and Asim Asiri,………………………………………………….1161

Hardy type inequalities for Choquet integrals, George A. Anastassiou,……………………1173