(ProQuest: ... denotes non-US-ASCII text omitted.)
Daeyeoul Kim 1 and Abdelmejid Bayad 2 and Joongsoo Park 3
Academic Editor:Elena Litsyn
1, National Institute for Mathematical Sciences, Daejeon 305-811, Republic of Korea
2, Département de Mathématiques, Université d'Evry Val d'Essonne, France
3, Woosuk University, Samlae, Wanju, Jeonbuk 565-701, Republic of Korea
Received 30 May 2014; Accepted 29 July 2014; 27 August 2014
This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
1. Statement of Main Theoretical Results
Bernoulli polynomials Bn (x) and Euler polynomials En (x) are usually defined by means of the following generating functions: ueux /(eu -1)=∑k=0∞ ...Bk (x)(uk /k!) and 2ueux /(eu +1)=∑k=0∞ ...Ek (x)(uk /k!) .
Bernoulli numbers and Euler numbers are Bk =Bk (0) and Ek =2kEk (1/2) . We recall the fundamental properties as follows [1, 2]: [figure omitted; refer to PDF] For n,N∈N and i,k,l∈Z , we define the following: [figure omitted; refer to PDF] We are motivated by the Besge [3] and Ramanujan [4] identity [figure omitted; refer to PDF] and also by the recent development on the convolution sums. In this paper, we investigate the three combinatoric convolution sums with "even indices. " Consider [figure omitted; refer to PDF] where (2ka,b,c,d)=(2k)!/a!b!c!d! with a+b+c+d=2k . Now, we state our main results.
Theorem 1.
For any positive integers k...5;1 and n...5;2 , one has [figure omitted; refer to PDF]
Corollary 2.
Let k...5;4 be integer and p and q primes with p...1;q...1;-1(mod... 4) . Then one has [figure omitted; refer to PDF]
Theorem 3.
For any positive integers k...5;1 and n...5;2 , one has [figure omitted; refer to PDF]
Theorem 3 can be obtained by [5, 6]. Therefore, we omit the proof.
2. Application and Perspective
2.1. Branch and Leaves Pattern
In real-time virtual system, realistic and efficient generation and expression of plants composing a broad terrain is a continuing problem [7, 8]. The procedural modelling method using convolution sums of divisor functions (MCD) was suggested for a variety of natural trees in a virtual ecosystem [9]. The basic structure of MCD is that it defines the growth grammar including the branch propagation, a growth pattern of branches and leaves, and a process of growth deformation for various generations of tree. In Figure 1, we illustrate the MCD for the divisor trees.
Figure 1: MCD tree.
[figure omitted; refer to PDF]
For more examples see [10]. Theorems 1 and 3 give us basic background for efficient and diverse generations and expressions of trees composing virtual ecosystem or real-time animation processing. In order to apply MCD to the growth structure of a tree model, (5) is modified and expressed in [figure omitted; refer to PDF] where D represents various divisor functions, i is the current growth step (gs ), and N-1 is the final iteration number of the i th growth step. Here, Di (Bi (x,y)k) is a divisor function that determines the pattern of the number of branches and Di (Li (x,y)(N-k) is a divisor function that determines the number of leaves with l+1 different types of trees and grasses in the virtual system. Further, Bi (x,y),Li (x,y) are the i th exponential function of branches and leaves. Through this model, we verified the possibility of natural and efficient tree growth [9, 11]. We approximately fix a certain tree model for MCD satisfying the patterns of branch and leaves in virtual system or real tree wood; then using formulae (8), (9), and (10), we obtain the approximate total number for MCD trees leaves by taking two kinds of trees with approximate MCD (Theorem 3), that is, branch pattern Bi (x,y)=σ0[dagger] (resp., σ2[dagger] ) and leaves pattern Li (x,y)=σ2[dagger] (resp., σ0[dagger] ). We give the first eleven values of the approximate total number T(n) for MCD tree leaves with n-1 steps (see Table 1).
Table 1
n | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 | 11 | 12 |
| |||||||||||
T ( n ) | 2 | 10 | 24 | 50 | 96 | 148 | 224 | 342 | 452 | 606 | 832 |
2.2. Color of Leaves
Leaves are important elements that constitute plants [12]. In [13] we see the leaves model of convolution sum of divisor functions. First, we fix the random color variation step N and then we compute convolution sums by use of (6) as shown in Figure 2. We denote by (fs ,fd ) the start and destination colors; output colors in phase are determined by interpolating convolution sums. Next, based on the minimum and maximum values of the elements of convolution sums of divisor functions, normalized weighted values between 0 and 1 are calculated and then each color table is organized as follows: [figure omitted; refer to PDF] The noise map that utilizes Perlin noise is used in the creation of cloud textures for soft color changes. Here, dsize is the number of values that are not duplicated among the elements of convolution sums calculated in the selected table; cnmax... , cnmin... are the maximum and minimum noise values; and dstep indicates the section of noise values influenced by a single element of convolution sums. Once these parameters are fixed, the leaf color is determined by finding the index "idx " and the corresponding color "cdidx " in the color table comprised of divisor functions that correspond to the noise color in i th row and j th column [13]. Figure 2 represents the image of a color table set created by calculating the color table of each section. Theorem 1 gives the number of values of leaf color and Theorem 3 gives pattern of branch and leaves in the same model. In real-time ecosystem, efficient and fast time is requested. When n is large, the MCD that uses (7) is complicate to compute directly in reasonable time. Our results (8), (9), and (10) give simple formulas for efficient time for them. In the forthcoming papers, we will investigate more applications of real-time virtual ecosystem.
Figure 2: Color of leaves.
[figure omitted; refer to PDF]
2.3. Proof of Main Results
To prove Theorem 1, we establish Lemmas 4, 6, 7, and 9 and Corollary 5 and we recall Proposition 8.
Lemma 4.
Let k...5;1 . Set B~k :=∑j=0k (kj)...2jBj =2kBk (1/2) . Then one has [figure omitted; refer to PDF]
Proof.
By formula (4) we obtain [figure omitted; refer to PDF] By (15) and (1) we get the lemma.
By [14, Theorem 3] and Lemma 4 we get the corollary.
Corollary 5.
Let k...5;1 and n...5;2 . Then [figure omitted; refer to PDF]
Lemma 6.
For any integers α and k...5;1 , one has [figure omitted; refer to PDF]
Proof.
Write the series as follows: [figure omitted; refer to PDF] This completes the proof of (17). On the other hand, (18) may be rewritten as [figure omitted; refer to PDF] From (17) we obtain [figure omitted; refer to PDF] This completes the proof of the lemma.
Lemma 7.
For any integers k...5;1 and n...5;2 , one has [figure omitted; refer to PDF]
Proof.
We observe that [figure omitted; refer to PDF] From (18), we get [figure omitted; refer to PDF] We then get lemma.
We recall Proposition 8 to be modified in Lemma 9.
Proposition 8 (see [15]).
Let N...5;3 , 1...4;i...4;N-1 , and n,k∈N . One has [figure omitted; refer to PDF] where σr[musical flat] (n;i,N):=∑d|"nd...1;i (N)dr -(-1)r∑d|"nd...1;-i (N)dr .
Using Lemma 7, we modify Proposition 8 as follows.
Lemma 9.
For any n,k∈N one has [figure omitted; refer to PDF]
Proof.
First, we check that [figure omitted; refer to PDF] From Lemma 7 and Proposition 8, our claim follows.
To end the proof of Theorem 1, we observe that [figure omitted; refer to PDF] Comparing Corollary 5 and Lemma 9, we see that [figure omitted; refer to PDF] From (3) we have [figure omitted; refer to PDF] By (2) and (3) we get the theorem.
Proof of Corollary 2.
From ([16, page 150]) we can derive [figure omitted; refer to PDF] We set x=(p+1)/2 and y=(q+1)/2 in (31) and get the corollary.
Conflict of Interests
The authors declare that there is no conflict of interests regarding the publication of this paper.
[1] A. Erdelyi Higher Transcendental Functions , vol. 1, McGraw Hill, New York, NY, USA, 1953.
[2] H. M. Srivastava, A. Pinter, "Remarks on some relationships between the Bernoulli and Euler polynomials," Applied Mathematics Letters , vol. 17, no. 4, pp. 375-380, 2004.
[3] M. Besge, "Extrait d'une lettre de M. Besge à M. Liouville," Journal de Mathématiques Pures et Appliquées , vol. 7, pp. 256, 1862.
[4] S. Ramanujan, "On certain arithmetical functions," Transactions of the Cambridge Philosophical Society , vol. 22, pp. 159-184, 1916.
[5] B. Cho, D. Kim, H. Park, "Evaluation of a certain combinatorial convolution sum in higher level cases," Journal of Mathematical Analysis and Applications , vol. 406, no. 1, pp. 203-210, 2013.
[6] D. Kim, A. Bayad, "Convolution identities for twisted Eisenstein series and twisted divisor functions," Fixed Point Theory and Applications , vol. 2013, article 81, 2013.
[7] W. Palubicki, K. Horel, S. Longay, A. Runions, B. Lane, R. Mech, P. Prusinkiewicz, "Self-organizing tree models for image synthesis," ACM Transactions on Graphics , vol. 28, no. 3, article 58, 2009.
[8] P. Tan, T. Fang, J. Xiao, P. Zhao, L. Quan, "Single image tree modeling," ACM Transactions on Graphics , vol. 27, no. 5, article 108, 2008.
[9] J. Kim, D. Kim, H. Cho, "Procedural modeling of trees based on convolution sums of divisor functions for real-time virtual ecosystems," Computer Animation and Virtual Worlds , vol. 24, no. 3-4, pp. 237-246, 2013.
[10] http://open.nims.re.kr/JrDr/
[11] J. Kim, D. Kim, H. Cho, "Tree growth model design for realistic game landscape production (Korean)," Journal of Korea Game Society , vol. 13, no. 2, pp. 49-58, 2013.
[12] H. Xiao, X. Chen, "Modeling and simulation of curled dry leaves," Soft Matter , vol. 7, no. 22, pp. 10794-10802, 2011.
[13] J. Kim, D. Kim, "The procedural modeling and visualization of multiple leaves," Submitted
[14] D. Kim, Y. K. Park, "Bernoulli identities and combinatoric convolution sums with odd divisor functions," Abstract and Applied Analysis , vol. 2014, 2014.
[15] B. Cho, D. Kim, H. Park, "Certain combinatorial convolu tion sums for divisor functions and Bernoulli numbers," accepted to Bulletin of the Korean Mathematical Society
[16] W. Chu, R. R. Zhou, "Convolution of Bernoulli and Euler polynomials," Sarajevo Journal of Mathematics , vol. 6, no. 18, pp. 147-163, 2010.
You have requested "on-the-fly" machine translation of selected content from our databases. This functionality is provided solely for your convenience and is in no way intended to replace human translation. Show full disclaimer
Neither ProQuest nor its licensors make any representations or warranties with respect to the translations. The translations are automatically generated "AS IS" and "AS AVAILABLE" and are not retained in our systems. PROQUEST AND ITS LICENSORS SPECIFICALLY DISCLAIM ANY AND ALL EXPRESS OR IMPLIED WARRANTIES, INCLUDING WITHOUT LIMITATION, ANY WARRANTIES FOR AVAILABILITY, ACCURACY, TIMELINESS, COMPLETENESS, NON-INFRINGMENT, MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. Your use of the translations is subject to all use restrictions contained in your Electronic Products License Agreement and by using the translation functionality you agree to forgo any and all claims against ProQuest or its licensors for your use of the translation functionality and any output derived there from. Hide full disclaimer
Copyright © 2014 Daeyeoul Kim et al. Daeyeoul Kim et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
Abstract
We study combinatoric convolution sums of certain divisor functions involving even indices. We express them as a linear combination of divisor functions and Euler polynomials and obtain identities [subscript]D2k[/subscript] (n)=(1/4)[subscript]σ2k+1,0[/subscript] (n;2)-2·[superscript]42k[/superscript] [subscript]σ2k+1[/subscript] (n/4) -(1/2)[[superscript]∑d|n,d...1;1 (4)[/superscript] {[subscript]E2k[/subscript] (d)+[subscript]E2k[/subscript] (d-1)}+[superscript]22k[/superscript] [superscript]∑d|n,d...1;1 (2)[/superscript] [subscript]E2k[/subscript] ((d+(-1[superscript])(d-1)/2[/superscript] )/2)] , [subscript]U2k[/subscript] (p,q)=[superscript]22k-2[/superscript] [-((p+q)/2)[subscript]E2k[/subscript] ((p+q)/2+1)+((q-p)/2)[subscript]E2k[/subscript] ((q-p)/2)-[subscript]E2k[/subscript] ((p+1)/2)-[subscript]E2k[/subscript] ((q+1)/2)+[subscript]E2k+1[/subscript] ((p+q)/2 +1)-[subscript]E2k+1[/subscript] ((q-p)/2)] , and [subscript]F2k[/subscript] (n)=(1/2){[superscript]σ2k+1[dagger][/superscript] (n)-[superscript]σ2k[dagger][/superscript] (n)} . As applications of these identities, we give several concrete interpretations in terms of the procedural modelling method.
You have requested "on-the-fly" machine translation of selected content from our databases. This functionality is provided solely for your convenience and is in no way intended to replace human translation. Show full disclaimer
Neither ProQuest nor its licensors make any representations or warranties with respect to the translations. The translations are automatically generated "AS IS" and "AS AVAILABLE" and are not retained in our systems. PROQUEST AND ITS LICENSORS SPECIFICALLY DISCLAIM ANY AND ALL EXPRESS OR IMPLIED WARRANTIES, INCLUDING WITHOUT LIMITATION, ANY WARRANTIES FOR AVAILABILITY, ACCURACY, TIMELINESS, COMPLETENESS, NON-INFRINGMENT, MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. Your use of the translations is subject to all use restrictions contained in your Electronic Products License Agreement and by using the translation functionality you agree to forgo any and all claims against ProQuest or its licensors for your use of the translation functionality and any output derived there from. Hide full disclaimer





