Home Mathematics Some recurrence formulas for the Hermite polynomials and their squares
Article Open Access

Some recurrence formulas for the Hermite polynomials and their squares

  • Yuan He EMAIL logo and Fengzao Yang
Published/Copyright: May 30, 2018

Abstract

In this paper, by making use of the generating function methods and Padé approximation techniques, we establish some new recurrence formulas for the Hermite polynomials and their squares. These results presented here are the corresponding extensions of some known formulas.

MSC 2010: 11B83; 05A19

1 Introduction

In the Sturm-Liouville boundary value problem, there is a special case called Hermite’s differential equation which arises in the treatment of the harmonic oscillator in quantum mechanics. It is well known that Hermite’s differential equation is defined as

y2xy+2ny=0,(1)

where n is a real number. In particular, for non-negative integer n, the solutions of Hermite’s differential equation are usually referred to as the Hermite polynomials Hn(x), which are defined by means of the exponential generating function

exp(2xtt2)=n=0Hn(x)tnn!(|t|<).(2)

It is easily seen from (2) that the Hermite polynomials can be determined by

Hn(x)=ntnexp(2xtt2)|t=0(n0).(3)

The first several Hermite polynomials are

H0(x)=1,H1(x)=2x,H2(x)=4x22,H3(x)=8x312x.(4)

These polynomials have played important roles in various fields of mathematics, physics and engineering, such as quantum mechanics, mathematical physics, ucleon physics and quantum optics.

It is clear that the Poisson kernel for the Hermite polynomials is (see, e.g., [8])

11t2exp(2xyt(x2+y2)t21t2)=n=0Hn(x)Hn(y)2ntnn!(|t|<1).(5)

In particular, the case x = y in (5) yields the squares Hn2(x) of the Hermite polynomials given by

11t2exp(2x2t1+t)=n=0Hn2(x)2ntnn!(|t|<1).(6)

It is easily seen that (6) can be reformulated as

11t2exp(xt1+t)=n=0Hn2x/22ntnn!(|t|<1).(7)

Recently, Kim et al. [9, 10, 11, 12], Qi and Guo [17] studied the generating functions of the Hermite polynomials and their squares, and presented some explicit formulas for the Hermite polynomials and their squares. Further, Qi and Guo [17] used the properties of the Bell polynomials of the second kind stated in [16] to obtain some explicit formulas and recurrence relations for the Hermite polynomials and their squares, for example, they showed that for non-negative integer n, the Hermite polynomials and their squares can be computed by

Hn(x)=(1)nn!2nk=0n(1)k22kk!knkx2kn,(8)

and

Hn2(x)=(1)n2nn!k=0n(1)k2kk!l=0nk1+(1)k2(l1)!!l!!nl1nlkx2k,(9)

and there exist the following recurrence formulas for the Hermite polynomials and their squares, as follows,

k=0n1+(1)nk22nk2k!(nk)!!Hk(x)=(2x)nn!(n0),(10)

and

k=0n(1)k2kk![l=0nk2ll!nk1nklx2l]Hk2(x)=1+(1)n2(n1)!!n!!(n0),(11)

where, and in what follows, ak is the binomial coefficient defined for complex number a and non-negative integer k by

a0=1,ak=a(a1)(a2)(ak+1)k!(k1).(12)

Motivated and inspired by the work of Kim et al. [9], Qi and Guo [17], in this paper we establish some new recurrence formulas for the Hermite polynomials and their squares by making use of the generating function methods and Padé approximation techniques. It turns out that the formulas (8), (9) and (11) and an analogous formula to (10) described in [9] are derived as special cases.

2 Padé approximants

We here recall the definition of Padé approximation to general series and their expression in the case of the exponential function, which have been widely used in various fields of mathematics, physics and engineering; see, for example [3, 13].

Let m, n be non-negative integers and let 𝓟k be the set of all polynomials of degree ≤ k. Assume that f is a function given by a Taylor expansion

f(t)=k=0cktk(13)

in a neighborhood of the origin, a Padé form of type (m, n) is the following pair (P, Q) such that

P=k=0mpktkPm,Q=k=0nqktkPn(Q0),(14)

and

QfP=O(tm+n+1)as t0.(15)

It is clear that every Padé form of type (m, n) for f(t) always exists and satisfies the same rational function, and the uniquely determined rational function P/Q is usually called the Padé approximant of type (m, n) for f(t) (see, e.g., [1, 4]). For non-negative integers m, n, the Padé approximant of type (m, n) for the exponential function exp(t) is the unique rational function (see, e.g., [7, 14])

Rm,n(t)=Pm(t)Qn(t)(PmPm,QnPn,Qn(0)=1),(16)

which obeys the property

exp(t)Rm,n(t)=O(tm+n+1)as t0.(17)

In fact, the explicit formulas for Pm and Qn can be expressed in the following way (see, e.g., [2, 15]):

Pm(t)=k=0m(m+nk)!m!(m+n)!(mk)!tkk!,(18)
Qn(t)=k=0n(m+nk)!n!(m+n)!(nk)!(t)kk!,(19)

and

Qn(t)exp(t)Pm(t)=(1)ntm+n+1(m+n)!01xn(1x)mexp(xt)dx,(20)

where Pm(t) and Qn(t) is called the Padé numerator and denominator of type (m, n) for the exponential function exp(t), respectively.

We shall use the above properties of Padé approximants to the exponential function to establish some new recurrence formulas for the Hermite polynomials and their squares in next section.

3 The statement of results

Theorem 3.1

Let m, n be non-negative integers. Then, for non-negative integer l with 0 ≤ l ≤ 2(m + n)+1,

2i+k=li,k0mi(m+ni)!Hk(x)k!=2i+k=li,k0ni(1)i(m+ni)!(2x)kk!.(21)

Proof

Let m, n be non-negative integers. If we denote the right hand side of (20) by Sm, n(t) then we have

exp(t)=Pm(t)+Sm,n(t)Qn(t).(22)

It is easily seen from (2) that

exp(2xt)=(n=0Hn(x)tnn!)exp(t2).(23)

By applying (22) to (23), we discover

(Pm(t2)+Sm,n(t2)Qn(t2))n=0Hn(x)tnn!=exp(2xt),(24)

which can be rewritten as

Pm(t2)n=0Hn(x)tnn!+Sm,n(t2)n=0Hn(x)tnn!=Qn(t2)exp(2xt).(25)

We now apply the exponential series exp(xt)=k=0xktk/k! in the right hand side of (20). With the help of the beta function, we get

Sm,n(t)=(1)ntm+n+1(m+n)!k=0tkk!01xn+k(1x)mdx=k=0(1)nm!(n+k)!(m+n)!(m+n+k+1)!tm+n+k+1k!.(26)

For convenience, let pm, n;k, qm, n;k and sm, n;k be the coefficients of the polynomials Pm(t), Qn(t) and Sm, n(t) given by

Pm(t)=k=0mpm,n;ktk,Qn(t)=k=0nqm,n;ktk,(27)

and

Sm,n(t)=k=0sm,n;ktm+n+k+1.(28)

It follows from (18), (19) and (26) that

pm,n;k=m!(m+nk)!k!(m+n)!(mk)!,qm,n;k=(1)kn!(m+nk)!k!(m+n)!(nk)!,(29)

and

sm,n;k=(1)nm!(n+k)!k!(m+n)!(m+n+k+1)!.(30)

If we apply (27) and (28) to (25) then we have

i=0mpm,n;it2ik=0Hk(x)tkk!+i=0sm,n;it2(m+n+i+1)k=0Hk(x)tkk!=i=0nqm,n;it2ik=0(2x)ktkk!,(31)

which together with the Cauchy product yields

l=02i+k=li,k0pm,n;iHk(x)k!tl+l=02i+k=l2(m+n+1)i,k0sm,n;iHk(x)k!tl=l=02i+k=li,k0qm,n;i(2x)kk!tl.(32)

By comparing the coefficients of tl in (32), we obtain that for non-negative integer l with 0 ≤ l ≤ 2(m + n)+1,

2i+k=li,k0pm,n;iHk(x)k!=2i+k=li,k0qm,n;i(2x)kk!.(33)

Thus, applying (29) to (33) gives the desired result.

We next discuss some special cases of Theorem 3.1. By taking m = 0 in Theorem 3.1, we obtain that for non-negative integer l with 0 ≤ l ≤ 2n+1,

n!l!Hl(x)=2i+k=li,k0ni(1)i(ni)!(2x)kk!,(34)

which means

Hl(x)=l!i=0[l2](1)i(2x)l2ii!(l2i)!(l0).(35)

If we take n = 0 in Theorem 3.1, we obtain that for non-negative integer l with 0 ≤ l ≤ 2m+1,

2i+k=li,k0mi(mi)!Hk(x)k!=m!l!(2x)l,(36)

which implies

(2x)l=l!i=0[l2]Hl2i(x)i!(l2i)!(l0).(37)

Remark 3.2

It becomes obvious that(35)is an equivalent version of the formula(8), and(37)can be regarded as an analogous version of the formula(10). In fact, (35)and(37)were rediscovered by Kim et al. [9] where some interesting identities between the Hermite polynomials and the Bernoulli and Euler polynomials can be also found. We here refer to [5] for some analogous formulas for the generalized Hermite polynomials to(35)and(37).

Theorem 3.3

Let m, n be non-negative integers. Then, for non-negative integer l with l ≥ 2(m + n+1),

2i+k=li,k0mi(m+ni)!Hk(x)k!+(1)nm!n!2i+k=l2(m+n+1)i,k0n+inHk(x)(m+n+i+1)!k!=2i+k=li,k0ni(1)i(m+ni)!(2x)kk!.(38)

Proof

It is easily seen that comparing the coefficients of tl in (32) gives that for l ≥ 2(m + n+1),

2i+k=li,k0pm,n;iHk(x)k!+2i+k=l2(m+n+1)i,k0sm,n;iHk(x)k!=2i+k=li,k0qm,n;i(2x)kk!.(39)

Thus, by applying (29) and (30) to (39), we obtain the desired result. □

In particular, the case l = 2(m + n+1) in Theorem 3.3 gives that for non-negative integers m, n,

2i+k=2(m+n+1)i,k0mi(m+ni)!Hk(x)k!+(1)nm!n!(m+n+1)!=2i+k=2(m+n+1)i,k0ni(1)i(m+ni)!(2x)kk!.(40)

If we take m = 0 in (40), we get that for non-negative integer n,

n!(2n+2)!H2n+2(x)+(1)nn!(n+1)!=2i+k=2n+2i,k0ni(1)i(ni)!(2x)kk!.(41)

It is clear that (41) is the case l = 2n+2 in (35).

Theorem 3.4

Let m, n be non-negative integers. Then, for non-negative integer l with 0 ≤ lm + n,

i+j+k=li,j,k0mi(m+ni)!(2x2)iijHk2(x)2kk!=i+j+2k=li,j,k0ni(m+ni)!(2x2)iij12k(1)k.(42)

Proof

We rewrite (6) as

11t2=exp(2x2t1+t)n=0Hn2(x)2ntnn!,(43)

which together with (22) gives

{Pm(2x2t1+t)+Sm,n(2x2t1+t)}n=0Hn2(x)2ntnn!=11t2Qn(2x2t1+t).(44)

If we apply (27) and (28) to (44) we have

i=0mpm,n;i(2x2)i(t1+t)ik=0Hk2(x)2ktkk!+i=0sm,n;i(2x2)m+n+i+1(t1+t)m+n+i+1k=0Hk2(x)2ktkk!=11t2i=0nqm,n;i(2x2)i(t1+t)i.(45)

Notice that for complex number α,

(1+t)α=n=0αntn.(46)

It follows from (46) that

11t2=n=012n(1)nt2n,(47)

and for non-negative integer i,

1(1+t)i=n=0intn.(48)

Hence, by applying (47) and (48) to (45), with the help of the Cauchy products, we get

l=0i+j+k=li,j,k0pm,n;i(2x2)iijHk2(x)2kk!tl+(2x2)m+n+1×l=0i+j+k=l(m+n+1)i,j,k0sm,n;i(2x2)i(m+n+i+1)jHk2(x)2kk!tl=l=0i+j+2k=li,j,k0qm,n;i(2x2)iij12k(1)ktl.(49)

If we compare the coefficients of tl in (49), we obtain that for non-negative integer l with 0 ≤ lm + n,

i+j+k=li,j,k0pm,n;i(2x2)iijHk2(x)2kk!=i+j+2k=li,j,k0qm,n;i(2x2)iij12k(1)k.(50)

Thus, applying (29) to (50) gives the desired result. □

It follows that we show some special cases of Theorem 3.4. It is obvious that the case m = 0 in Theorem 3.4 gives that for non-negative integer l with 0 ≤ ln,

n!2ll!Hl2(x)=i+j+2k=li,j,k0ni(ni)!(2x2)iij12k(1)k,(51)

which implies that for non-negative integer l,

Hl2(x)=2ll!i+j+2k=li,j,k0(2x2)ii!ij12k(1)k.(52)

Observe that for non-negative integer k,

(1)k12k=13(2k1)2kk!=(2k1)!!(2k)!!,(53)

and for non-negative integers i, k, l with kli,

ilik=(1)liki(i+1)(lk1)(lik)!=(1)liklk1lki.(54)

It follows from (52)-(54) that for non-negative integer l,

Hl2(x)=2ll!i=0l(2x2)ii!j+2k=lij,k0ij(2k1)!!(2k)!!=2ll!i=0l(2x2)ii!k=02kliilik(k1)!!k!!=(1)l2ll!i=0l(1)i(2x2)ii!k=02klilk1lki(k1)!!k!!,(55)

which gives the formula (9). For some interesting formulas for the product of two Hermite polynomials, one is referred to [10]. If we take n = 0 in Theorem 3.4, in light of (53), we get that for non-negative integer l with 0 ≤ lm and 2 ∣ l,

i+j+k=li,j,k0mi(mi)!(2x2)iijHk2(x)2kk!=m!(l1)!!l!!,(56)

which is equivalent to

k=0lHk2(x)2kk!i=0lkilki(2x2)ii!=(l1)!!l!!.(57)

So from (54) and (57), we obtain that for non-negative integer l with 2 ∣ l,

k=0l(1)kHk2(x)2kk!i=0lklk1lki(2x2)ii!=(l1)!!l!!,(58)

which gives the formula (11).

Theorem 3.5

Let m, n be non-negative integers. Then, for non-negative integer l with lm + n+1,

i+j+k=li,j,k0mi(m+ni)!(2x2)iijHk2(x)2kk!+(1)m+1(2x2)m+n+1m!n!×i+j+k=l(m+n+1)i,j,k0n+in(2x2)i(m+n+i+1)!(m+n+i+1)jHk2(x)2kk!=i+j+2k=li,j,k0ni(m+ni)!(2x2)iij12k(1)k.(59)

Proof

By comparing the coefficients of tl in (49), we obtain that for non-negative integer l with lm + n+1,

i+j+k=li,j,k0pm,n;i(2x2)iijHk2(x)2kk!+(2x2)m+n+1×i+j+k=l(m+n+1)i,j,k0sm,n;i(2x2)i(m+n+i+1)jHk2(x)2kk!=i+j+2k=li,j,k0qm,n;i(2x2)iij12k(1)k.(60)

Thus, applying (29) and (30) to (60) gives the desired result. □

It is clear that the case l = m + n+1 in Theorem 3.5 gives that for non-negative integers m, n,

i+j+k=m+n+1i,j,k0mi(m+ni)!(2x2)iijHk2(x)2kk!=i+j+2k=m+n+1i,j,k0ni(m+ni)!(2x2)iij12k(1)k+(1)m(2x2)m+n+1m!n!(m+n+1)!.(61)

If we take m = 0 in (61) we have

n!2n+1(n+1)!Hn+12(x)=i+j+2k=n+1i,j,k0ni(ni)!(2x2)iij12k(1)k+(2x2)n+1n!(n+1)!(n0),(62)

which together with (53) and (54) yields (55). If we take n = 0 in (61) we get that for non-negative m with 2 ∤ m,

i+j+k=m+1i,j,k0mi(mi)!(2x2)iijHk2(x)2kk!=m!m!!(m+1)!!+(1)m(2x2)m+1m!(m+1)!,(63)

which is an equivalent version of (58). Accordingly, (62) and (63) gives the formula (9) and (11), respectively.



Acknowledgement

We thank the anonymous referees for their careful reading of our manuscript and very helpful comments. This work was supported by the Foundation for Fostering Talents in Kunming University of Science and Technology (Grant No. KKSY201307047) and the National Natural Science Foundation of P.R. China (Grant No. 11326050).

References

[1] Baker, G.A., Graves-Morris, P.R., Padé Approximants, 2nd Edition, in: Encyclopedia of Mathematics and its Applications, vol. 59, Cambridge Univ. Press, Cambridge, 1996.10.1017/CBO9780511530074Search in Google Scholar

[2] Baratchart, L., Saff, E.B., Wielonsky, F., Rational interpolation of the exponential function, Canadian J. Math., 1995, 47, 1121-1147.10.4153/CJM-1995-058-6Search in Google Scholar

[3] Brezinski, C., Padé-Type Approximation and General Orthogonal Polynomials, Birkhäuser, Basel, 1980.10.1007/978-3-0348-6558-6Search in Google Scholar

[4] Brezinski, C., History of Continued Fractions and Padé Approximants, Springer-Verlag, Berlin, 1991.10.1007/978-3-642-58169-4Search in Google Scholar

[5] Chaggara, H., Koepf, W., On linearization and connection coefficients for generalized Hermite polynomials, J. Comput. Appl. Math., 2011, 236, 65-73.10.1016/j.cam.2011.03.010Search in Google Scholar

[6] Fisk, S., Hermite polynomials, J. Combin. Theory, Ser. A, 2000, 91, 334-336.10.1006/jcta.2000.3099Search in Google Scholar

[7] Hermite, C., Sur lafonction exponentielle, C. R. Acad. Sci. Paris, 1873, 77, 18-24, 74-79, 226-233, 285-293.Search in Google Scholar

[8] Ismail, M.E.H., Classical and Quantum Orthogonal Polynomials in One Variable, in: Encyclopedia of Mathematics and its Applications, vol. 98, Cambridge Univ. Press, Cambridge, 2005.10.1017/CBO9781107325982Search in Google Scholar

[9] Kim, D.S., Kim, T., Rim, S.-H., Lee, S.H., Hermite polynomials and their applications associated with Bernoulli and Euler numbers, Discrete Dyn. Nat. Soc., 2012, 2012, Article ID 974632, 13 pages.10.1155/2012/974632Search in Google Scholar

[10] Kim, D.S., Kim, T., A note on the Hermite numbers and polynomials, Math. Inequal. Appl., 2013, 16, 1115-1122.10.7153/mia-16-86Search in Google Scholar

[11] Kim, T., Kim, D.S., A note on Hermite polynomials, J. Comput. Anal. Appl., 2017, 23, 771-780.Search in Google Scholar

[12] Kim, T., Kim, D.S., Jang, L.-C., Kwon, H.I., On differential equations associated with squared Hermite polynomials, J. Comput. Anal. Appl., 2017, 23, 1252-1264.Search in Google Scholar

[13] Komzsik, L., Approximation Techniques for Engineers, CRC Press, Taylor and Francis Group, Boca Raton, 2007.Search in Google Scholar

[14] Padé, H., Librairie Scientifique et Technique, A. Blanchard, Paris, 1984.Search in Google Scholar

[15] Perron, O., Die Lehre von den Kettenbriichen, 3rd Edition, Teubner 2, Stuttgart, 1957.Search in Google Scholar

[16] Qi, F., Zheng, M.-M., Explicit expressions for a family of the Bell polynomials and applications, Appl. Math. Comput., 2015, 258, 597-607.10.1016/j.amc.2015.02.027Search in Google Scholar

[17] Qi, F., Guo, B.-N., Some properties of the Hermite polynomials and their squares and generating functions, Preprints 2016, 2016110145, 14 pages; Available online at http://dx.doi.org/10.20944/preprints201611.0145.v1.10.20944/preprints201611.0145.v1Search in Google Scholar

Received: 2017-07-05
Accepted: 2018-03-22
Published Online: 2018-05-30

© 2018 He and Yang, published by De Gruyter

This work is licensed under the Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 License.

Articles in the same Issue

  1. Regular Articles
  2. Algebraic proofs for shallow water bi–Hamiltonian systems for three cocycle of the semi-direct product of Kac–Moody and Virasoro Lie algebras
  3. On a viscous two-fluid channel flow including evaporation
  4. Generation of pseudo-random numbers with the use of inverse chaotic transformation
  5. Singular Cauchy problem for the general Euler-Poisson-Darboux equation
  6. Ternary and n-ary f-distributive structures
  7. On the fine Simpson moduli spaces of 1-dimensional sheaves supported on plane quartics
  8. Evaluation of integrals with hypergeometric and logarithmic functions
  9. Bounded solutions of self-adjoint second order linear difference equations with periodic coeffients
  10. Oscillation of first order linear differential equations with several non-monotone delays
  11. Existence and regularity of mild solutions in some interpolation spaces for functional partial differential equations with nonlocal initial conditions
  12. The log-concavity of the q-derangement numbers of type B
  13. Generalized state maps and states on pseudo equality algebras
  14. Monotone subsequence via ultrapower
  15. Note on group irregularity strength of disconnected graphs
  16. On the security of the Courtois-Finiasz-Sendrier signature
  17. A further study on ordered regular equivalence relations in ordered semihypergroups
  18. On the structure vector field of a real hypersurface in complex quadric
  19. Rank relations between a {0, 1}-matrix and its complement
  20. Lie n superderivations and generalized Lie n superderivations of superalgebras
  21. Time parallelization scheme with an adaptive time step size for solving stiff initial value problems
  22. Stability problems and numerical integration on the Lie group SO(3) × R3 × R3
  23. On some fixed point results for (s, p, α)-contractive mappings in b-metric-like spaces and applications to integral equations
  24. On algebraic characterization of SSC of the Jahangir’s graph 𝓙n,m
  25. A greedy algorithm for interval greedoids
  26. On nonlinear evolution equation of second order in Banach spaces
  27. A primal-dual approach of weak vector equilibrium problems
  28. On new strong versions of Browder type theorems
  29. A Geršgorin-type eigenvalue localization set with n parameters for stochastic matrices
  30. Restriction conditions on PL(7, 2) codes (3 ≤ |𝓖i| ≤ 7)
  31. Singular integrals with variable kernel and fractional differentiation in homogeneous Morrey-Herz-type Hardy spaces with variable exponents
  32. Introduction to disoriented knot theory
  33. Restricted triangulation on circulant graphs
  34. Boundedness control sets for linear systems on Lie groups
  35. Chen’s inequalities for submanifolds in (κ, μ)-contact space form with a semi-symmetric metric connection
  36. Disjointed sum of products by a novel technique of orthogonalizing ORing
  37. A parametric linearizing approach for quadratically inequality constrained quadratic programs
  38. Generalizations of Steffensen’s inequality via the extension of Montgomery identity
  39. Vector fields satisfying the barycenter property
  40. On the freeness of hypersurface arrangements consisting of hyperplanes and spheres
  41. Biderivations of the higher rank Witt algebra without anti-symmetric condition
  42. Some remarks on spectra of nuclear operators
  43. Recursive interpolating sequences
  44. Involutory biquandles and singular knots and links
  45. Constacyclic codes over 𝔽pm[u1, u2,⋯,uk]/〈 ui2 = ui, uiuj = ujui
  46. Topological entropy for positively weak measure expansive shadowable maps
  47. Oscillation and non-oscillation of half-linear differential equations with coeffcients determined by functions having mean values
  48. On 𝓠-regular semigroups
  49. One kind power mean of the hybrid Gauss sums
  50. A reduced space branch and bound algorithm for a class of sum of ratios problems
  51. Some recurrence formulas for the Hermite polynomials and their squares
  52. A relaxed block splitting preconditioner for complex symmetric indefinite linear systems
  53. On f - prime radical in ordered semigroups
  54. Positive solutions of semipositone singular fractional differential systems with a parameter and integral boundary conditions
  55. Disjoint hypercyclicity equals disjoint supercyclicity for families of Taylor-type operators
  56. A stochastic differential game of low carbon technology sharing in collaborative innovation system of superior enterprises and inferior enterprises under uncertain environment
  57. Dynamic behavior analysis of a prey-predator model with ratio-dependent Monod-Haldane functional response
  58. The points and diameters of quantales
  59. Directed colimits of some flatness properties and purity of epimorphisms in S-posets
  60. Super (a, d)-H-antimagic labeling of subdivided graphs
  61. On the power sum problem of Lucas polynomials and its divisible property
  62. Existence of solutions for a shear thickening fluid-particle system with non-Newtonian potential
  63. On generalized P-reducible Finsler manifolds
  64. On Banach and Kuratowski Theorem, K-Lusin sets and strong sequences
  65. On the boundedness of square function generated by the Bessel differential operator in weighted Lebesque Lp,α spaces
  66. On the different kinds of separability of the space of Borel functions
  67. Curves in the Lorentz-Minkowski plane: elasticae, catenaries and grim-reapers
  68. Functional analysis method for the M/G/1 queueing model with single working vacation
  69. Existence of asymptotically periodic solutions for semilinear evolution equations with nonlocal initial conditions
  70. The existence of solutions to certain type of nonlinear difference-differential equations
  71. Domination in 4-regular Knödel graphs
  72. Stepanov-like pseudo almost periodic functions on time scales and applications to dynamic equations with delay
  73. Algebras of right ample semigroups
  74. Random attractors for stochastic retarded reaction-diffusion equations with multiplicative white noise on unbounded domains
  75. Nontrivial periodic solutions to delay difference equations via Morse theory
  76. A note on the three-way generalization of the Jordan canonical form
  77. On some varieties of ai-semirings satisfying xp+1x
  78. Abstract-valued Orlicz spaces of range-varying type
  79. On the recursive properties of one kind hybrid power mean involving two-term exponential sums and Gauss sums
  80. Arithmetic of generalized Dedekind sums and their modularity
  81. Multipreconditioned GMRES for simulating stochastic automata networks
  82. Regularization and error estimates for an inverse heat problem under the conformable derivative
  83. Transitivity of the εm-relation on (m-idempotent) hyperrings
  84. Learning Bayesian networks based on bi-velocity discrete particle swarm optimization with mutation operator
  85. Simultaneous prediction in the generalized linear model
  86. Two asymptotic expansions for gamma function developed by Windschitl’s formula
  87. State maps on semihoops
  88. 𝓜𝓝-convergence and lim-inf𝓜-convergence in partially ordered sets
  89. Stability and convergence of a local discontinuous Galerkin finite element method for the general Lax equation
  90. New topology in residuated lattices
  91. Optimality and duality in set-valued optimization utilizing limit sets
  92. An improved Schwarz Lemma at the boundary
  93. Initial layer problem of the Boussinesq system for Rayleigh-Bénard convection with infinite Prandtl number limit
  94. Toeplitz matrices whose elements are coefficients of Bazilevič functions
  95. Epi-mild normality
  96. Nonlinear elastic beam problems with the parameter near resonance
  97. Orlicz difference bodies
  98. The Picard group of Brauer-Severi varieties
  99. Galoisian and qualitative approaches to linear Polyanin-Zaitsev vector fields
  100. Weak group inverse
  101. Infinite growth of solutions of second order complex differential equation
  102. Semi-Hurewicz-Type properties in ditopological texture spaces
  103. Chaos and bifurcation in the controlled chaotic system
  104. Translatability and translatable semigroups
  105. Sharp bounds for partition dimension of generalized Möbius ladders
  106. Uniqueness theorems for L-functions in the extended Selberg class
  107. An effective algorithm for globally solving quadratic programs using parametric linearization technique
  108. Bounds of Strong EMT Strength for certain Subdivision of Star and Bistar
  109. On categorical aspects of S -quantales
  110. On the algebraicity of coefficients of half-integral weight mock modular forms
  111. Dunkl analogue of Szász-mirakjan operators of blending type
  112. Majorization, “useful” Csiszár divergence and “useful” Zipf-Mandelbrot law
  113. Global stability of a distributed delayed viral model with general incidence rate
  114. Analyzing a generalized pest-natural enemy model with nonlinear impulsive control
  115. Boundary value problems of a discrete generalized beam equation via variational methods
  116. Common fixed point theorem of six self-mappings in Menger spaces using (CLRST) property
  117. Periodic and subharmonic solutions for a 2nth-order p-Laplacian difference equation containing both advances and retardations
  118. Spectrum of free-form Sudoku graphs
  119. Regularity of fuzzy convergence spaces
  120. The well-posedness of solution to a compressible non-Newtonian fluid with self-gravitational potential
  121. On further refinements for Young inequalities
  122. Pretty good state transfer on 1-sum of star graphs
  123. On a conjecture about generalized Q-recurrence
  124. Univariate approximating schemes and their non-tensor product generalization
  125. Multi-term fractional differential equations with nonlocal boundary conditions
  126. Homoclinic and heteroclinic solutions to a hepatitis C evolution model
  127. Regularity of one-sided multilinear fractional maximal functions
  128. Galois connections between sets of paths and closure operators in simple graphs
  129. KGSA: A Gravitational Search Algorithm for Multimodal Optimization based on K-Means Niching Technique and a Novel Elitism Strategy
  130. θ-type Calderón-Zygmund Operators and Commutators in Variable Exponents Herz space
  131. An integral that counts the zeros of a function
  132. On rough sets induced by fuzzy relations approach in semigroups
  133. Computational uncertainty quantification for random non-autonomous second order linear differential equations via adapted gPC: a comparative case study with random Fröbenius method and Monte Carlo simulation
  134. The fourth order strongly noncanonical operators
  135. Topical Issue on Cyber-security Mathematics
  136. Review of Cryptographic Schemes applied to Remote Electronic Voting systems: remaining challenges and the upcoming post-quantum paradigm
  137. Linearity in decimation-based generators: an improved cryptanalysis on the shrinking generator
  138. On dynamic network security: A random decentering algorithm on graphs
Downloaded on 10.12.2025 from https://www.degruyterbrill.com/document/doi/10.1515/math-2018-0050/html
Scroll to top button