Home Mathematics The log-concavity of the q-derangement numbers of type B
Article Open Access

The log-concavity of the q-derangement numbers of type B

  • Eric H. Liu EMAIL logo and Wenjing Du
Published/Copyright: February 23, 2018

Abstract

Recently, Chen and Xia proved that for n ≥ 6, the q-derangement numbers Dn(q) are log-concave except for the last term when n is even. In this paper, employing a recurrence relation for DnB(q) discovered by Chow, we show that for n ≥ 4, the q-derangement numbers of type BDnB(q) are also log-concave.

MSC 2010: 05A15; 05A19; 05A20

1 Introduction

Let 𝓓n denote the set of derangements on {1, 2, …, n} and let D(π) := {i|1 ≤ in – 1, π(i) > π(i + 1)} denote the descent set of a permutation π. Define the major index of π by

maj(π):=iD(π)i.(1)

The q-derangement number Dn(q) is defined by

Dn(q):=πDnqmaj(π).(2)

Gessel [1] (see also [2]) discovered the following formula

Dn(q):=[n]!k=0n(1)kqk21[k]!,(3)

where [n] = 1 + q + q2 + … + qn – 1 and [n]! = [1][2] … [n]. Combinatorial proofs of (3) have been found by Wachs [3] and Chen and Xu [4]. Chen and Rota [5] showed that the q-derangement numbers are unimodal, and conjectured that the maximum coefficient appears in the middle. Zhang [6] confirmed this conjecture by showing that the q-derangement numbers satisfy the spiral property. Recently, Chen and Xia [7] introduced the notion of ratio monotonicity for polynomials with nonnegative coefficients, and they proved that, for n ≥ 6, the q-derangement numbers Dn(q) are strictly ratio monotone except for the last term when n is even. The ratio monotonicity implies the spiral property and log-concavity.

Let Bn denote the hyperoctahedral group of rank n, consisting of the signed permutations of {1, 2, …, n}. Let DnB denote the set of derangements on Bn, which is defined as

DnB:={π|πBn,π(i)ifor alli{1,2,,n}}.(4)

Let N(π) := #{i|1 ≤ in, π(i) < 0} be the number of negative letters of π and let maj(π) be defined as before. In [8], Chow considered the q-derangement number of type BDnB(q) which is defined as

DnB(q):=πDnBqfmaj(π),(5)

where fmaj(π) := 2 maj(π) + N(π). Chow [8] (see also [9]) established the following formula

DnB(q):=[2][4][2n]k=0n(1)kq2k2[2][4][2k],(6)

where [n] is defined as before. Furthermore, Chow [8] discovered that for all integers n ≥ 1,

Dn+1B(q)=(1+q++q2n+1)DnB(q)+(1)n+1qn2+n.(7)

Chen and Wang [10] proved the normality of the limiting distribution of the coefficients of the usual q-derangement numbers of type B.

Recall that a positive sequence a0, a1, …, an or the polynomial a0 + a1x + … + anxn is called log-concave if the ratios

a0a1,a1a2,,an1an(8)

form an increasing sequence. Clearly, if a positive sequence is log-concavity, then it is unimodality. In this paper, we prove that for n ≥ 4, the q-derangement numbers of type BDnB(q) are log-concave.

Suppose that n is given. It is easy to prove that the degree of DnB(q) is n2 and the coefficient of qn2 is 1. Set

DnB(q)=Bn(1)q+Bn(2)q2++Bn(n2)qn2.(9)

The log-concavity of DnB(q) can be stated as the following theorem.

Theorem 1.1

For all integersn ≥ 4, theq-derangement numbers of typeBDnB(q)are log-concave, namely,

Bn(1)Bn(2)<Bn(2)Bn(3)<<Bn(n22)B<(n21)<Bn(n21)Bn(n2).(10)

For example, by (6), we have

D4B(q)=q+4q2+8q3+13q4+18q5+22q6+26q7+28q8+28q9+25q10+21q11+17q12+11q13+7q14+3q15+q16.

It is easy to check that

14<48<813<1318<1822<2226<2628<2828<2825<2521<2117<1711<117<73<31.

2 Some lemmas

To prove Theorem 1.1, we first present some lemmas. By (7), it is easy to check that

Lemma 2.1

For n ≥ 4,

Bn+1(k)=i=1kBn(i),1k2n+2,i=k2n1kBn(i),2n+2<kn2,i=n2n1n2Bn(i)+(1)n+1,k=n2+n,i=k2n1n2Bn(i),n2k(n+1)2andkn2+n.(11)

Based on recurrence relation (11), it is easy to verify the following lemma.

Lemma 2.2

Letn4 be an integer. ThenBn(i) are positive integers for 1in2and

Bn(n2)=1,Bn(n21)=n1,(12)
Bn(n22)=n2n+22,Bn(n23)=n3+5n186.(13)

To prove Theorem 1.1, we require the following lemma.

Lemma 2.3

For positive integersa1, a2, …, ak+1, ak+2 (k ≥ 1) satisfying

aiai+1<ai+1ai+2,1ik,(14)
i=1kaii=1k+1ai<i=1k+1aii=1k+2ai,(15)
i=1kaii=1k+1ai<i=1k+1aii=2k+2ai,(16)
i=1kaii=2k+1ai<i=2k+1aii=3k+2ai,(17)
i=1kaii=2k+1ai<i=2k+1aii=3k+1ai,(18)
i=1kaii=2kai<i=2kaii=3kai.(19)

Proof

We only prove (15). The rest can be proved similarly and the details are omitted. Based on (14),

aiak+2<ai+1ak+1(1ik),

and

ak+2(a1+a2++ak)<ak+1(a2+a3++ak+1).

Therefore,

(a1+a2++ak)(a1+a2++ak+ak+1+ak+1)=(a1+a2++ak)2+ak+1(a1+a2++ak)+ak+2(a1+a2++ak)<(a1+a2++ak)2+ak+1(a1+a2++ak)+ak+1(a2+a3++ak+1)<(a1+a2++ak)2+ak+1(a1+a2++ak)+ak+1(a2+a3++ak+1)+a1ak+1=(a1+a2++ak+ak+1)2,

which yields (15). This completes the proof of this lemma.

3 Proof of Theorem 1.1

We prove Theorem 1.1 by induction on n. It is easy to check that Theorem 1.1 holds for 4 ≤ n ≤ 12. Thus, we always assume that n ≥ 13 in the following proof. Suppose that Theorem 1.1 holds for n = m, namely,

Bm(i)Bm(i+1)<Bm(i+1)Bm(i+2),1im22.(20)

We proceed to show that Theorem 1.1 holds for n = m + 1, that is,

Bm+1(k)Bm+1(k+1)<Bm+1(k+1)Bm+1(k+2),1k(m+1)22.(21)

Employing (11), (15) and (20), we see that (21) holds for 1 ≤ k ≤ 2m. It follows from (11), (16) and (20) that (21) is true for the case k = 2m + 1. In view of (11), (17) and (20), we find that (21) holds for 2m + 2 ≤ km2 – 2. From (11), (18) and (20), we deduce that (21) is true for the case k = m2 – 1. By (11), (19) and (20), we can prove that (21) holds for m2km2 + m – 3 and m2 + m + 1 ≤ k ≤ (m + 1)2 – 2.

Now, special attentions should be paid to three cases k = m2 + m – 2, k = m2 + m – 1 and k = m2 + m.

By (12) and (13), it is easy to check that for m ≥ 4,

Bm(m22)+Bm(m21)+Bm(m2)m3Bm(m21)+Bm(m2)+1Bm(m23)Bm(m22)=m413m2+72m1326(m3)(m2m+2)>0.(22)

In view of (20) and (22),

Bm(m2m3)Bm(m2m2)<Bm(m23)Bm(m22)<Bm(m22)+Bm(m21)+Bm(m2)m3Bm(m21)+Bm(m2)+1.(23)

From (11), it is easy to prove that for m ≥ 4,

Bm(m2m2)>Bm(m2m1)>>Bm(m21)>Bm(m2).(24)

Thanks to (23) and (24),

Bm(m2m3)(Bm(m21)+Bm(m2)+(1)m+1)+(1)m+1i=0m+2Bm(m2i)<Bm(m2m3)(Bm(m21)+Bm(m2)+1)+(m+3)Bm(m2m2)<Bm(m2m2)(Bm(m22)+Bm(m21)+Bm(m2)).(25)

By (20),

Bm(m2m3)i=2m+1Bm(m2i)<Bm(m2m2)i=3m+2Bm(m2i).(26)

Combining (25) and (26) yields

i=m2m3m2Bm(i)i=m2m2m2Bm(i)<i=m2m2m2Bm(i)i=m2m1m2Bm(i)+(1)m+1,(27)

which can be rewritten as

Bm+1(m2+m2)Bm+1(m2+m1)<Bm+1(m2+m1)Bm+1(m2+m).(28)

Therefore, (21) holds for the case k = m2 + m – 2.

Based on (12) and (13), we deduce that for m ≥ 13,

Bm(m22)+Bm(m21)+Bm(m2)2(m+2)Bm(m21)+Bm(m2)Bm(m23)Bm(m22)=m412m313m2+36m366m(m2m+2)>0.(29)

By (20) and (29),

Bm(m2m2)Bm(m2m1)<Bm(m23)Bm(m22)<Bm(m22)+Bm(m21)+Bm(m2)2(m+2)Bm(m21)+Bm(m2).(30)

It follows from (24) and (30) that

Bm(m2m2)(Bm(m21)+Bm(m2))<Bm(m2m1)(Bm(m22)+Bm(m21)+Bm(m2)2(m+2))<Bm(m2m1)(Bm(m22)+Bm(m21)+Bm(m2))2i=0m+1Bm(m2i)Bm(m2m1)(Bm(m22)+Bm(m21)+Bm(m2))+2×(1)m+1i=0m+1Bm(m2i).(31)

In view of (20),

Bm(m2m2)i=2mBm(m2i)<Bm(m2m1)i=3m+1Bm(m2i).(32)

It follows from (31) and (32) that

i=m2m2m2Bm(i)i=m2m1m2Bm(i)+(1)m+1<i=m2m1m2Bm(i)+(1)m+1i=m2mm2Bm(i).(33)

By (11), we can rewrite (33) as follows

Bm+1(m2+m1)Bm+1(m2+m)<Bm+1(m2+m)Bm+1(m2+m+1),(34)

which implies that (21) holds for the case k = m2 + m – 1.

In view of (12) and (13), we see that for m ≥ 4,

Bm(m22)+Bm(m21)+Bm(m2)mBm(m21)+Bm(m2)Bm(m23)Bm(m22)=(m+1)(m37m2+12m+12)6m(m2m+2)>0.(35)

By (20) and (35), we find that for m ≥ 4,

Bm(m2m1)Bm(m2m)<Bm(m23)Bm(m22)<Bm(m22)+Bm(m21)+Bm(m2)mBm(m21)+Bm(m2).(36)

It follows from (24) and (36) that

Bm(m2m1)(Bm(m21)+Bm(m2))+(1)m+1i=0m1Bm(m2i)<Bm(m2m1)(Bm(m21)+Bm(m2))+mBm(m2m)Bm(m2m)(Bm(m22)+Bm(m21)+Bm(m2)).(37)

By (20),

Bm(m2m1)i=2m1Bm(m2i)<Bm(m2m)i=3mBm(m2i).(38)

In view of (37) and (38), we can prove that

i=m2m1m2Bm(i)+(1)m+1i=m2mm2Bm(i)<i=m2mm2Bm(i)i=m2m+1m2Bm(i).(39)

By (11), we can rewrite (39) as follows

Bm+1(m2+m)Bm+1(m2+m+1)<Bm+1(m2+m+1)Bm+1(m2+m+2),(40)

which implies that (21) holds for the case k = m2 + m. This completes the proof.

Acknowledgement

The authors would like to thank the anonymous referee for valuable corrections and comments. This work was supported by the National Science Foundation of China (11701362).

References

[1] Gessel, I.M., Counting permutations by descents, greater index, and cycle structure, 1981, unpublished manuscriptSearch in Google Scholar

[2] Gessel, I.M., Reutenauer, C., Counting permutations with given cycle structure and descent set, J. Combin. Theory Ser. A, 1993, 64, 189–21510.1016/0097-3165(93)90095-PSearch in Google Scholar

[3] Wachs, M.L., On q-derangement numbers, Proc. Amer. Math. Soc., 1989, 106, 273–278.10.2307/2047402Search in Google Scholar

[4] Chen, W.Y.C., Xu, D.H., Labeled partitions and the q-derangement numbers, SIAM J. Discrete Math. 2008, 22, 1099–110410.1137/06066326XSearch in Google Scholar

[5] Chen, W.Y.C., Rota, G.-C., q-Analogs of the inclusion-exclusion principle and permutations with restricted position, Discrete Math., 1992, 104, 7–2210.1016/0012-365X(92)90622-MSearch in Google Scholar

[6] Zhang, X.D., Note on the spiral property of the q-derangement numbers, Discrete Math., 1996, 159, 295–29810.1016/0012-365X(95)00090-JSearch in Google Scholar

[7] Chen, W.Y.C., Xia, E.X.W., The ratio monotonicity of the q-derangement numbers, Discrete Math., 2011, 311, 393–39710.1016/j.disc.2010.11.012Search in Google Scholar

[8] Chow, C.-O., On derangement polynomials of type B, Sém. Lothar. Combin., 2006, 55, Article B55b10.1016/j.jcta.2008.11.006Search in Google Scholar

[9] Chow, C.-O., Gessel, I.M., On the descent numbers and major indices for the hypero group, Adv. in Appl. Math., 2007, 38, 275–30110.1016/j.aam.2006.07.003Search in Google Scholar

[10] Chen, W.Y.C., Wang, D.G.L., The limiting distribution of the q-derangement numbers, European J. Combin., 2010, 31, 2006–201310.1016/j.ejc.2010.05.009Search in Google Scholar

Received: 2017-09-22
Accepted: 2018-01-11
Published Online: 2018-02-23

© 2018 Liu and Du, published by De Gruyter

This work is licensed under the Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 License.

Articles in the same Issue

  1. Regular Articles
  2. Algebraic proofs for shallow water bi–Hamiltonian systems for three cocycle of the semi-direct product of Kac–Moody and Virasoro Lie algebras
  3. On a viscous two-fluid channel flow including evaporation
  4. Generation of pseudo-random numbers with the use of inverse chaotic transformation
  5. Singular Cauchy problem for the general Euler-Poisson-Darboux equation
  6. Ternary and n-ary f-distributive structures
  7. On the fine Simpson moduli spaces of 1-dimensional sheaves supported on plane quartics
  8. Evaluation of integrals with hypergeometric and logarithmic functions
  9. Bounded solutions of self-adjoint second order linear difference equations with periodic coeffients
  10. Oscillation of first order linear differential equations with several non-monotone delays
  11. Existence and regularity of mild solutions in some interpolation spaces for functional partial differential equations with nonlocal initial conditions
  12. The log-concavity of the q-derangement numbers of type B
  13. Generalized state maps and states on pseudo equality algebras
  14. Monotone subsequence via ultrapower
  15. Note on group irregularity strength of disconnected graphs
  16. On the security of the Courtois-Finiasz-Sendrier signature
  17. A further study on ordered regular equivalence relations in ordered semihypergroups
  18. On the structure vector field of a real hypersurface in complex quadric
  19. Rank relations between a {0, 1}-matrix and its complement
  20. Lie n superderivations and generalized Lie n superderivations of superalgebras
  21. Time parallelization scheme with an adaptive time step size for solving stiff initial value problems
  22. Stability problems and numerical integration on the Lie group SO(3) × R3 × R3
  23. On some fixed point results for (s, p, α)-contractive mappings in b-metric-like spaces and applications to integral equations
  24. On algebraic characterization of SSC of the Jahangir’s graph 𝓙n,m
  25. A greedy algorithm for interval greedoids
  26. On nonlinear evolution equation of second order in Banach spaces
  27. A primal-dual approach of weak vector equilibrium problems
  28. On new strong versions of Browder type theorems
  29. A Geršgorin-type eigenvalue localization set with n parameters for stochastic matrices
  30. Restriction conditions on PL(7, 2) codes (3 ≤ |𝓖i| ≤ 7)
  31. Singular integrals with variable kernel and fractional differentiation in homogeneous Morrey-Herz-type Hardy spaces with variable exponents
  32. Introduction to disoriented knot theory
  33. Restricted triangulation on circulant graphs
  34. Boundedness control sets for linear systems on Lie groups
  35. Chen’s inequalities for submanifolds in (κ, μ)-contact space form with a semi-symmetric metric connection
  36. Disjointed sum of products by a novel technique of orthogonalizing ORing
  37. A parametric linearizing approach for quadratically inequality constrained quadratic programs
  38. Generalizations of Steffensen’s inequality via the extension of Montgomery identity
  39. Vector fields satisfying the barycenter property
  40. On the freeness of hypersurface arrangements consisting of hyperplanes and spheres
  41. Biderivations of the higher rank Witt algebra without anti-symmetric condition
  42. Some remarks on spectra of nuclear operators
  43. Recursive interpolating sequences
  44. Involutory biquandles and singular knots and links
  45. Constacyclic codes over 𝔽pm[u1, u2,⋯,uk]/〈 ui2 = ui, uiuj = ujui
  46. Topological entropy for positively weak measure expansive shadowable maps
  47. Oscillation and non-oscillation of half-linear differential equations with coeffcients determined by functions having mean values
  48. On 𝓠-regular semigroups
  49. One kind power mean of the hybrid Gauss sums
  50. A reduced space branch and bound algorithm for a class of sum of ratios problems
  51. Some recurrence formulas for the Hermite polynomials and their squares
  52. A relaxed block splitting preconditioner for complex symmetric indefinite linear systems
  53. On f - prime radical in ordered semigroups
  54. Positive solutions of semipositone singular fractional differential systems with a parameter and integral boundary conditions
  55. Disjoint hypercyclicity equals disjoint supercyclicity for families of Taylor-type operators
  56. A stochastic differential game of low carbon technology sharing in collaborative innovation system of superior enterprises and inferior enterprises under uncertain environment
  57. Dynamic behavior analysis of a prey-predator model with ratio-dependent Monod-Haldane functional response
  58. The points and diameters of quantales
  59. Directed colimits of some flatness properties and purity of epimorphisms in S-posets
  60. Super (a, d)-H-antimagic labeling of subdivided graphs
  61. On the power sum problem of Lucas polynomials and its divisible property
  62. Existence of solutions for a shear thickening fluid-particle system with non-Newtonian potential
  63. On generalized P-reducible Finsler manifolds
  64. On Banach and Kuratowski Theorem, K-Lusin sets and strong sequences
  65. On the boundedness of square function generated by the Bessel differential operator in weighted Lebesque Lp,α spaces
  66. On the different kinds of separability of the space of Borel functions
  67. Curves in the Lorentz-Minkowski plane: elasticae, catenaries and grim-reapers
  68. Functional analysis method for the M/G/1 queueing model with single working vacation
  69. Existence of asymptotically periodic solutions for semilinear evolution equations with nonlocal initial conditions
  70. The existence of solutions to certain type of nonlinear difference-differential equations
  71. Domination in 4-regular Knödel graphs
  72. Stepanov-like pseudo almost periodic functions on time scales and applications to dynamic equations with delay
  73. Algebras of right ample semigroups
  74. Random attractors for stochastic retarded reaction-diffusion equations with multiplicative white noise on unbounded domains
  75. Nontrivial periodic solutions to delay difference equations via Morse theory
  76. A note on the three-way generalization of the Jordan canonical form
  77. On some varieties of ai-semirings satisfying xp+1x
  78. Abstract-valued Orlicz spaces of range-varying type
  79. On the recursive properties of one kind hybrid power mean involving two-term exponential sums and Gauss sums
  80. Arithmetic of generalized Dedekind sums and their modularity
  81. Multipreconditioned GMRES for simulating stochastic automata networks
  82. Regularization and error estimates for an inverse heat problem under the conformable derivative
  83. Transitivity of the εm-relation on (m-idempotent) hyperrings
  84. Learning Bayesian networks based on bi-velocity discrete particle swarm optimization with mutation operator
  85. Simultaneous prediction in the generalized linear model
  86. Two asymptotic expansions for gamma function developed by Windschitl’s formula
  87. State maps on semihoops
  88. 𝓜𝓝-convergence and lim-inf𝓜-convergence in partially ordered sets
  89. Stability and convergence of a local discontinuous Galerkin finite element method for the general Lax equation
  90. New topology in residuated lattices
  91. Optimality and duality in set-valued optimization utilizing limit sets
  92. An improved Schwarz Lemma at the boundary
  93. Initial layer problem of the Boussinesq system for Rayleigh-Bénard convection with infinite Prandtl number limit
  94. Toeplitz matrices whose elements are coefficients of Bazilevič functions
  95. Epi-mild normality
  96. Nonlinear elastic beam problems with the parameter near resonance
  97. Orlicz difference bodies
  98. The Picard group of Brauer-Severi varieties
  99. Galoisian and qualitative approaches to linear Polyanin-Zaitsev vector fields
  100. Weak group inverse
  101. Infinite growth of solutions of second order complex differential equation
  102. Semi-Hurewicz-Type properties in ditopological texture spaces
  103. Chaos and bifurcation in the controlled chaotic system
  104. Translatability and translatable semigroups
  105. Sharp bounds for partition dimension of generalized Möbius ladders
  106. Uniqueness theorems for L-functions in the extended Selberg class
  107. An effective algorithm for globally solving quadratic programs using parametric linearization technique
  108. Bounds of Strong EMT Strength for certain Subdivision of Star and Bistar
  109. On categorical aspects of S -quantales
  110. On the algebraicity of coefficients of half-integral weight mock modular forms
  111. Dunkl analogue of Szász-mirakjan operators of blending type
  112. Majorization, “useful” Csiszár divergence and “useful” Zipf-Mandelbrot law
  113. Global stability of a distributed delayed viral model with general incidence rate
  114. Analyzing a generalized pest-natural enemy model with nonlinear impulsive control
  115. Boundary value problems of a discrete generalized beam equation via variational methods
  116. Common fixed point theorem of six self-mappings in Menger spaces using (CLRST) property
  117. Periodic and subharmonic solutions for a 2nth-order p-Laplacian difference equation containing both advances and retardations
  118. Spectrum of free-form Sudoku graphs
  119. Regularity of fuzzy convergence spaces
  120. The well-posedness of solution to a compressible non-Newtonian fluid with self-gravitational potential
  121. On further refinements for Young inequalities
  122. Pretty good state transfer on 1-sum of star graphs
  123. On a conjecture about generalized Q-recurrence
  124. Univariate approximating schemes and their non-tensor product generalization
  125. Multi-term fractional differential equations with nonlocal boundary conditions
  126. Homoclinic and heteroclinic solutions to a hepatitis C evolution model
  127. Regularity of one-sided multilinear fractional maximal functions
  128. Galois connections between sets of paths and closure operators in simple graphs
  129. KGSA: A Gravitational Search Algorithm for Multimodal Optimization based on K-Means Niching Technique and a Novel Elitism Strategy
  130. θ-type Calderón-Zygmund Operators and Commutators in Variable Exponents Herz space
  131. An integral that counts the zeros of a function
  132. On rough sets induced by fuzzy relations approach in semigroups
  133. Computational uncertainty quantification for random non-autonomous second order linear differential equations via adapted gPC: a comparative case study with random Fröbenius method and Monte Carlo simulation
  134. The fourth order strongly noncanonical operators
  135. Topical Issue on Cyber-security Mathematics
  136. Review of Cryptographic Schemes applied to Remote Electronic Voting systems: remaining challenges and the upcoming post-quantum paradigm
  137. Linearity in decimation-based generators: an improved cryptanalysis on the shrinking generator
  138. On dynamic network security: A random decentering algorithm on graphs
Downloaded on 10.12.2025 from https://www.degruyterbrill.com/document/doi/10.1515/math-2018-0009/html
Scroll to top button