Professional Documents
Culture Documents
Summation of Series
Discrete Mathematics and Its Applications
Series editors:
Miklos Bona, Donald L. Kreher, Douglas B. West
Analytic Combinatorics
A Multidimensional Approach
Marni Mishna
https://www.routledge.com/Discrete-Mathematics-and-Its-Applications/book-series/
CHDISMTHAPP
Methods for the
Summation of Series
Tian-Xiao He
MATLAB® is a trademark of The MathWorks, Inc. and is used with permission. The MathWorks
does not warrant the accuracy of the text or exercises in this book. This book’s use or discussion of
MATLAB® software or related products does not constitute endorsement or sponsorship by The
MathWorks of a particular pedagogical approach or a particular use of the MATLAB® software.
Reasonable efforts have been made to publish reliable data and information, but the author and
publisher cannot assume responsibility for the validity of all materials or the consequences of their use.
The authors and publishers have attempted to trace the copyright holders of all material reproduced
in this publication and apologize to copyright holders if permission to publish in this form has not
been obtained. If any copyright material has not been acknowledged, please write and let us know so
we may rectify it in any future reprint.
Except as permitted under U.S. Copyright Law, no part of this book may be reprinted, reproduced,
transmitted, or utilized in any form by any electronic, mechanical, or other means, now known or
hereafter invented, including photocopying, microfilming, and recording, or in any information
storage or retrieval system, without written permission from the publishers.
For permission to photocopy or use material electronically from this work, access www.copyright.com
or contact the Copyright Clearance Center, Inc. (CCC), 222 Rosewood Drive, Danvers, MA 01923,
978-750-8400. For works that are not available on CCC, please contact mpkbookspermissions@tandf.
co.uk
Trademark notice: Product or corporate names may be trademarks or registered trademarks and are
used only for identification and explanation without intent to infringe.
DOI: 10.1201/9781003051305
Publisher’s note: This book has been prepared from camera-ready copy provided by the authors
Contents
Foreword xi
Testimonial xiii
Preface xv
Biography xix
Symbols xxi
2 Symbolic Methods 67
2.1 Symbolic Approach to Summation Formulas of Power Series 68
2.1.1 Wellknown symbolic expressions . . . . . . . . . . . . 69
2.1.2 Summation formulas related to the operator
(1 − xE)−1 . . . . . . . . . . . . . . . . . . . . . . . . 74
2.1.3 Consequences and examples . . . . . . . . . . . . . . . 77
2.1.4 Remainders of summation formulas . . . . . . . . . . . 82
2.1.5 Q-analog of symbolic operators . . . . . . . . . . . . . 86
2.2 Series Transformation . . . . . . . . . . . . . . . . . . . . . . 96
2.2.1 An extension of Eulerian fractions . . . . . . . . . . . 98
2.2.2 Series-transformation formulas . . . . . . . . . . . . . 99
2.2.3 Illustrative examples . . . . . . . . . . . . . . . . . . . 105
2.3 Summation of Operators . . . . . . . . . . . . . . . . . . . . 112
v
vi Contents
Bibliography 417
Index 433
To Yulan
To Calvin and Viola
Foreword
You are about to encounter a very special book. Summing series has been of
interest for centuries, and, in an age of powerful computers, the interest has
greatly intensified. Keopf’s Hypergeometric Summations, The Concrete Tetra-
hedron by Kauers and Paule, and A=B by Petkovsek, Wilf, and Zeilberger
are all impressive works devoted to this topic.
So why do we need, Methods for the Summation of Series, ostensibly de-
voted to the same subject? Let us begin by noting the background that the
author Tian-Xiao He (Earl and Marian A. Beling Professor of Natural Sci-
ences and Professor of Mathematics, Illinois Wesleyan University) brings to
this effort. He has done important work in numerical analysis, wavelet analy-
sis, approximation theory, and splines. These interests have led him naturally
into enumerative combinatorics and the emerging field of Riordan Arrays. This
diversity of interests is on full display in this book. It would be fair to say that
this volume combines the charm of an ancient book like I. J. Schwatt’s, An
Introduction to the Operations with Series (1924), with a keen awareness of
the many aspects of the most recent methods developed for the summation of
series. The advantage of this mixture is that insight and context are provided
for many applications.
The five chapters of this book provide a clear view of the depth of vision.
The first chapter is devoted to classical methods, which, while they date back
to the 19th century and before, are nonetheless effective and always timely.
Symbolic methods occupy the next two chapters. This, too, is a venerable
subject dating back to invariant theory; its modern combinatorial manifesta-
tions were pioneered by Gian-Carlo Rota. This is a compelling way to place
the classic theory of finite differences in a modern and substantially more
powerful setting.
Chapter 4 moves to the world of special functions. Of particular interest
is the extensive use of Riordan Arrays, a topic in which Professor He is one of
the world leaders. This is, indeed, one of the highlights of this book. The final
chapter continues to build on Riordan Arrays and concludes with an account
of some of the algorithms that have been so successful in doing summations
via computer algebra.
xi
xii Foreword
In the past three months, I really enjoyed reading through the book. It is a
very good monograph and text and offering an overview of several valuable
techniques, and readers will find it to be a very fine reference book as well as
one from which to study. I certainly give it my highest recommendation. The
author presented very impressive publications and research activities.
Henry Wadsworth Gould
Professor Emeritus of Mathematics
West Virginia University, Morgantown
Fellow of the American Association for the Advancement of Science
Honorary Fellow of the Institute of Combinatorics and its Applications
July 11, 2021
xiii
Preface
This book presents methods for the summation of infinite and finite series and
the related identities and inversion relations. The summation includes the col-
umn sums and row sums of lower triangular matrices. The convergence of the
summation of infinite series is considered. We focus on symbolic methods and
the Riordan array approach for the summation. Much of the materials in this
book have never appeared before in textbook form. This book can be used as
a suitable textbook for advanced courses for higher-level undergraduate and
lower level graduate students. It is also an introductory self-study book for
researchers interested in this field, while some materials of the book can be
used as a portal for further research. In addition, this book contains hundreds
of summation formulas and identities, which can be used as a handbook for
people working in computer science, applied mathematics, and computational
mathematics, particularly, combinatorics, computational discrete mathemat-
ics, and computational number theory. The exercises at the end of each chapter
help deepen understanding.
Since the methods discussed in this book are related to the classical sum-
mation methods, we present the main classical methods in Chapter 1 with the
example oriented way. This chapter provides useful supplementary materials
for the people who study advanced Calculus, and training materials for the
people who study applied and computational mathematics.
The infinitesimal calculus or differential and integral calculus is a field to
treat functions of continuous independent variables. The methods to find sum-
mation of series by using infinitesimal calculus shall be surveyed Chapter 1.
We will introduce one by one the following five simple and common methods:
(1) Substitution method; (2) Telescoping method; (3) Method of the sum-
mation of trigonometric series; (4) Differentiation and integration method for
uniformly convergent series; and (5) Abel’s summation.
As is well known, the closed form representation of series has been studied
extensively. It is also known that the symbolic calculus with operators ∆ (dif-
ference), E (shift or displacement), and D (derivative) plays an important role
in the Calculus of Finite Differences, which is often employed by statisticians
and numerical analysts. The object of Chapter 2 is to make use of the classical
operators ∆, E, and D to develop closed forms for the summation of power se-
ries that appear to have a certain wide scope of applications. Throughout this
chapter the theory of formal power series and of differential operators will be
utilized, while the convergence of the infinite series is discussed. In this chap-
ter, we focus on the summation and identities arising from the interrelations
xv
xvi Preface
analogs, Sheffer-type polynomial sequences and the Sheffer group. Some iden-
tities and inversion relations are constructed by using dual sequences with the
Riordan array representation named pseudo-Riordan involutions. Finally, an
extension of W-Z algorithm and Zeilberger’s creative telescoping algorithm
is represented and used to construct and prove the identities for Bernoulli
polynomials and numbers.
I am grateful to Professor Leetsch C. Hsu (Xu Lizhi) for guiding me into
the field of enumeration combinatorics. This book is dedicated to the mem-
ory of him. The author would like to thank Professor George Andrews for
his foreword and Professor Henry Gould for his testimonial and both of them
for their comments and encouragements. I would like to thank all the col-
laborators who have published joint papers with me in the fields of symbolic
methods and/or Riordan arrays over the past decades, especially Leetsch C.
Hsu, Louis W. Shapiro, Renzo Sprugnoli, Henry W. Gould, and Peter J.-S.
Shiue for the pleasant cooperation with them and everything I have learned
from them. I would like to thank the Editors of the Discrete Mathematics and
Its Applications Series, CRC Press/Taylor & Francis Group, LLC, and KGL,
specially Miklos Bona, Robert Ross, Vaishali Singh, and Manisha Singh for
their help and patience in the process. The author is thankful for the support
given by the Earl and Marian A. Beling Professor’s Fund.
Tian-Xiao He
Illinois Wesleyan University
Bloomington, IL
Biography
xix
Symbols
Symbol Description
xxi
1
Classical Methods from Infinitesimal
Calculus
CONTENTS
1.1 Use of Infinitesimal Calculus . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2
1.1.1 Convergence of series . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2
1.1.2 Limits of sequences and series . . . . . . . . . . . . . . . . . . . . . . . . . . . 8
1.2 Abel’s Summation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20
1.2.1 Abel’s theorem and Tauber theorem . . . . . . . . . . . . . . . . . . . . 20
1.2.2 Abel’s summation method . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 27
1.3 Series Method . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 35
1.3.1 Use of the calculus of finite difference . . . . . . . . . . . . . . . . . . . 36
1.3.2 Application of Euler-Maclaurin formula and the
Bernoulli polynomials . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 48
Since the methods discussed in this book are related to the classical summation
methods, we start this book from main classical methods for summation of
series described in an example-oriented way.
The infinitesimal calculus or differential and integral calculus is a field to
treat functions of continuous independent variables, i.e., the variables may take
every possible value in a given interval. The methods to find the summation
of series by using infinitesimal calculus shall be surveyed in this chapter in the
example-oriented way. P
The summation of a series n≥1 an is defined by
X n
X
an = lim sn ≡ lim ak ,
n→∞ n→∞
n≥1 k=1
Pn
where sn = k=1 ak is the partial sum of the series. On the summation of
infinite series, there are following five simple and common methods.
P
(1) Substitution method. To get the sum ofP n≥0 un , we may substitute
un = anP k n that brings the sum f (k) = n≥0 un if a known function
f (x) = n≥0 an xn can be determined.
P
(2) Telescoping method. In a given series n≥0 un , if we have Pun = vn −
vn+1 (n = 0, 1, . . .) and limn→∞ vn = v∞ < ∞, then n≥0 un =
DOI: 10.1201/9781003051305-1 1
2 Methods for the Summation of Series
v0 − v∞ . In particular, if
1
un = ,
an an+1 · · · an+m
where ak = c + kd (k = 1, 2, . . .), c, d ∈ R, d 6= 0, then
1 1
vn = .
md an an+1 · · · an+m−1
(3) Trigonometric series summation. In order to evaluate the sums of
X X
an cos(nx) and an sin(nx),
n≥0 n≥0
we consider them as the real part and the imaginary part of power
series X
an z n ,
n≥0
−ix
where z = e , which can be summarized. In many cases, summa-
tion X1 1
z n = log (|z| < 1)
n 1−z
n≥0
we immediately have
X (−1)n−1 X X (−1)n−1
n−1 1 1
= (−1) − =2 − 1 = 2 ln 2 − 1.
n(n + 1) n n+1 n
n≥1 n≥1 n≥1
Classical Methods from Infinitesimal Calculus 3
A few examples for the second method dealing with the so-called telescop-
ing series are shown below.
Example 1.1.2 Since
1 1 1 1
= − ,
n(n + 1)(n + 2) 2 n(n + 1) (n + 1)(n + 2)
we obtain X 1 1
= .
n(n + 1)(n + 2) 4
n≥1
For m ∈ N, we have
1 1 1 1
= − .
n(n + m) m n n+m
Thus,
X 1 1 1 1
= 1 + + ...+ .
n(n + m) m 2 m
n≥1
Similarly,
X Xℓ
2n + 1 1 1
= lim − = 1.
n2 (n + 1)2 ℓ→∞
n=1
n2 (n + 1)2
n≥1
Telescoping method can also be used for the following triangular function
series.
X 1 π
tan−1 = .
n2 + n + 1 4
n≥1
In fact,
X ℓ
X
−1 1
tan 2
= lim [tan−1 (n + 1) − tan−1 n]
n +n+1 ℓ→∞
n=1
n≥1
−1 −1 π
= lim [tan (ℓ + 1) − tan 1] = .
ℓ→∞ 4
Similarly,
X 2n + 1 π
−1
tan = .
n (n + 1)2
2 4
n≥1
Example 1.1.3
X 1 X1 1
2
= −
n2 (n + 1)2 n n+1
n≥1 n≥1
X 1 2 1
= − +
n2 n(n + 1) (n + 1)2
n≥1
π2
= − 3,
3
P P
where we use n≥1 1/n2 = π 2 /6, and the telescoping series n≥1 1/n (n +
1) = 1.
Similarly,
X n
(n + 1)(n + 2)(n + 3)
n≥1
X 1 X 1
= −
(n + 2)(n + 3) (n + 1)(n + 2)(n + 3)
n≥1 n≥1
1 1 1
= − = .
3 12 4
Example 1.1.4 Using the method of differentiation term by term to the fol-
lowing series in their uniform convergence intervals, |x| < 1, we obtain
′′ ′
X X X
n2 xn−1 = xn+1 − xn
n≥1 n≥1 n≥1
′′ ′
1 1 1+x
= −1−x − −1 = .
1−x 1−x (1 − x)3
Similarly,
X x(3 − x)
n(n + 2)xn = (|x| < 1) and
(1 − x)3
n≥1
X 2n + 1 2
x2n = (1 + 2x2 )ex ,
n!
n≥1
1 X ((n − 1)!)2
(2x)2n = (sin−1 x)2
2 (2n)!
n≥1
for all |x| < 1. Denote y ≡ y(x) = (sin−1 x)2 . it is easy to find y satisfies
differential equation (1 − x2 )y ′′ − xy ′ − 2 = 0 and one of its power series
solution is
1 X ((n − 1)!)2
y= (2x)2n .
2 (2n)!
n≥1
Readers can check the correction by evaluating the first few terms of Taylor’s
expansion of (sin−1 (x))2 and compare with the series shown above. Another
power series solution of the differential equation can be obtained using coeffi-
cient comparison method.
Making use of the complex function properties, one may obtain more
summation formulas. Denote by w = u + iv a complex number. Then
log w = log |w| + i(arg w + kπ), where arg w = tan−1 (v/u) is an argument
of w, and k is an arbitrary integer. Let Re(w) be the real part of w. Then
Re(log w) = log |w|. Denote z = eix . We have
X cos nx X zn
= Re = −Re(log(1 − z))
n n
n≥1 n≥1
Thus, X cos nx x
= − log 2 sin (1.2)
n 2
n≥1
Using formula sin na sin nx = 12 [cos n(a − x) − cos n(a + x)] and summation
(1.2) yields
X sin na sin nx 1 sin 12 (x + a)
= log .
n≥1
n 2 sin 12 (x − a)
Similarly, formula
1
sin2 na sin nx = (sin n(2a − x) − sin n(2a + x) + 2 sin nx)
4
and the first summation in Example 1.1.5 yields
X sin2 na sin nx π
= (1.3)
n 4
n≥1
for all 0 < x < 2a < π. By taking limit a → π/2 on the both sides of (1.3),
we obtain
X sin(2n − 1)x π
= sgnx, (|x| ≤ π). (1.4)
2n − 1 4
n≥1
where the last step is from (1.4). The antiderivative of the above equation
generates Z
π π
F (x) = − sgnxdx = C − |x|,
4 4
where the constant C is determined by
X 1 π2
C = F (0) = = ,
(2n − 1)2 8
n≥1
Hence, to prove the convergence of series of (1.6), we only need to show the
infinite product tends to zero as n → ∞.
Since x > 0, we have
X x X 1
= ,
ak + x bk + 1
k≥2 k≥2
P
where bk = ak /x (k = 2, 3, . . .). The divergence of k≥1 1/ak implies the
P
divergence of k≥1 1/bk . If lim bk < ∞, then limk→∞ 1/(bk + 1) 6= 0, which
P k→∞
implies that k≥2 1/(bk + 1) diverges to infinite. If lim bk = ∞, then 1/(bk +
P k→∞
1) ∼ 1/bk as k → ∞. Hence, k≥1 1/(bk + 1) = ∞. We have shown in any
case,
n+1
a1 Y x
Rn = 1− →0
x ak + x
k=2
Example 1.1.6
1! 2! 3!
+ + ···
x + 1 (x + 1)(x + 2) (x + 1)(x + 2)(x + 3)
1
= , (x > 1)
x−1
x x2 x4
+ + + ···
1 − x2 1 − x4 1 − x8
(
x/(1 − x), if |x| < 1
=
1/(1 − x), if |x| > 1.
Proof. (i) Write sn = ℓ + un . Thus for and ǫ > 0, there exists N ≡ N (ǫ) such
that n ≥ N implies |un | < ǫ/3. Thus, for n ≥ N , we have
N n N
1X 1 X 1X N
tn = sk + (ℓ + vk ) = sk + ℓ − ℓ + rn ,
n n n n
k=1 k=N +1 k=1
where
n
1 X n−N ǫ ǫ
|rn | ≡ uk ≤ · ≤ .
n n 3 3
k=N +1
Therefore,
1 1 1
|tn − ℓ| < ǫ+ ǫ+ ǫ=ǫ
3 3 3
when n ≥ n0 , i.e., tn → ℓ as n → ∞.
Classical Methods from Infinitesimal Calculus 9
Since
1
τn = [−(s1 + s2 + · · · sn−1 ) + nsn ]
n
n−1
= − tn−1 + sn → −ℓ + ℓ = 0
n
when n → ∞.
(ii) We have shown that
1
tn + τn = (sn + nsn ),
n
or equivalently,
n
(tn + τn ).
sn =
n+1
Hence, from (i), τn → 0 and lim sn = lim tn = ℓ.
n→∞ n→∞
Proof. For any ǫ > 0 (ǫ < 1), there exists N such that An = A + Rn and
Bn = B + Sn with |Rn |, |Sn | < ǫ whenever n ≥ N . Hence, for all p, q ≥ N , we
have
Ap Bq = AB + ASq + BRp + Rp Sq ,
|Ap Bq − AB| < ǫ(|A| + |B| + 1).
Let n ≥ 2N . Then
n
1X
Ak Bn−k+1
n
k=1
N
X −1 n−N +1 n
1 1 X 1 X
= Ak Bn−k+1 + Ak Bn−k+1 + Ak Bn−k+1 .
n n n
k=1 k=N k=n−N +2
Since Am , Bn are bounded, the first and the third sums on the right-hand
side of above equation tend to zero as n → ∞. In addition,
n−N +1
1 X 2(N − 1)
Ak Bn−k+1 = AB − AB + H,
n n
k=N
where |H| < ǫ(|A| + |B| + 1). Therefore, there exists n0 such that n ≥ n0 (ǫ)
implies
n
1X
Ak Bn−k+1 − AB < ǫ[1 + 1 + (|A| + |B| + 1) + 1],
n
k=1
satisfies
ǫ
|tn − s| < (N + 1)(2M )
4(N + 1)M
n
ǫ X
+ pnk < ǫ
2
k=N +1
′
whenever n > N . This implies tn → s as n → ∞ and completes the proof for
the sufficiency.
Classical Methods from Infinitesimal Calculus 11
s0 pn + s1 pn−1 + s2 pn−2 + · · · + sn p0
lim = s. (1.12)
n→∞ p0 + p1 + · · · + pn
P∞ Pn
Let pn > 0, k=1 pk = ∞, and let k=1 pk = Pn with pn /Pn → 0 as
n → ∞. Then
p1 P1−1 + p2 P2−1 + · · · + pn Pn−1
lim = 1. (1.13)
n→∞ log Pn
In fact, from (1.11) the left-hand limit of (1.13) can be written as
which yields
Pn Pn
k=1 kpk qk k=1 kpk qk Pn Qn ab
= → ,
n2 pn qn Pn Qn n2 pn qn a+b
as n → ∞.
Corollary 1.1.13 Suppose two positive sequences (pn ) and (qn ) satisfy
pn qn
lim = 0, lim = 0.
n→∞ p0 + p1 + · · · + pn n→∞ q0 + q1 + · · · + qn
P
And denote rn = nk=0 pk qn−k (n = 0, 1, . . .). Then
rn
lim = 0. (1.15)
n→∞ r0 + r1 + · · · + rn
Proof. Denote
n
X n
X n
X
Pn = pk , Qn = qk , Rn = rk .
k=0 k=0 k=0
Then
rn p0 qn + p1 qn−1 + · · · + pn q0
=
Rn p0 Qn + p1 Qn−1 + · · · + pn Q0
q0 q1 qn
= pn0 + pn1 + · · · + pnn ,
Q0 Q1 Qn
where
pn−j Qj pn−j
pnj = ≤ →0
p0 Qn + p1 Qn−1 + · · · pn Q0 p0 + p1 + · · · + pn−j
Example 1.1.14 Suppose that sequences (pn ) and (qn ) are defined as Corol-
lary 1.1.13. Let (sn ) be any sequence. Then the existence of limits
s0 pn + s1 pn−1 + · · · + sn p0
lim = p̄
n→∞ p0 + p1 + · · · pn
and
s0 qn + s1 qn−1 + · · · + sn q0
lim = q̄
n→∞ q0 + q1 + · · · qn
implies p̄ = q̄. Indeed, let (rn ) be the sequence defined in Corollary 1.1.13, and
let
s0 rn + s1 rn−1 + · · · + sn r0
τn := .
r0 + r1 + · · · rn
14 Methods for the Summation of Series
Denote
s0 pn + s1 pn−1 + · · · + sn p0 s0 qn + s1 qn−1 + · · · + sn q0
p̄n := , and q̄n := .
p0 + p1 + · · · pn q0 + q1 + · · · qn
From Corollary 1.1.13 we have
pn Q0 q̄0 + pn−1 Q1 q̄1 + · · · + p0 Qn q̄n
τn =
p0 Qn + p1 Qn−1 + · · · pn Q0
qn P0 p̄0 + qn−1 P1 p̄1 + · · · + q0 Pn p̄n
= .
q0 Pn + q1 Pn−1 + · · · qn P0
Thus, the same argument in the proof of Corollary 1.1.13 yields lim τn =
n→∞
lim p̄n = lim q̄n . Consequently, p̄ = q̄. It is interesting to see that this
n→∞ n→∞
conclusion holds even lim sn does not exist.
n→∞
implies
(a1 + a2 + · · · + an )n−σ → 0
as n → ∞.
Proof. Denote
tn = (a1 + a2 + · · · + an )n−σ ,
sn = a1 1−σ + a2 2−σ + · · · + an n−σ .
Then
Hence, from Theorem 1.1.9, we obtain the right-hand side of the above equa-
tion tends to zero as n → ∞, which implies tn → 0 (n → ∞).
is called the transformation matrix with respect to K. In this case, the conse-
quence of Theorem 1.1.9 is changed to be that lim tn = Ks when lim sn = s.
n→∞ n→∞
Furthermore, if a lower triangular matrix [pnk ]n≥k≥0 has entries satisfying
n
X
pnk = Pn → 1
k=0
as n → ∞ and pnk ≥ 0, then this lower triangular matrix can be used to con-
struct a sequence transformation. Theorem 1.1.9 still holds for those transfor-
mation matrices. We leave the proof of those claims as Exercise 1.8.
Definition 1.1.17 A sequence (sn ) is termed a null sequence if for any given
ǫ > 0, there exists an integer N ≡ N (ǫ) such that n > N implies |sn | < ǫ.
From Theorem 1.1.9 and Remark 1.1.16, we immediately have
Theorem 1.1.18 Let (sn ) be a null sequence, and let (tn ) the transformed
sequence of (sn ) using a transformation matrix with respect to constant K > 0.
Then (tn ) is also a null sequence if for every fixed m
lim pnm = 0.
n→∞
Proof. For any given ǫ > 0, there exists N ≡ N (ǫ) such that for every n > N ,
|sn | < ǫ/(2K). Then for that n,
N
X ǫ
|tn | < pnk sk + .
2
k=0
N
X ǫ
pnk sk < .
2
k=0
Therefore, we have shown that |tn | < ǫ for these n′ s, which completes the
proof of the theorem.
f (n) (α)
a0 + a1 + · · · + an = sn , = bn ,
n!
b0 + b1 (1 − α) + b2 (1 − α) + · · · + bn (1 − α)n = tn .
2
b0 + b1 y + b2 y 2 + · · · + bn y n + · · ·
= a0 + a1 (α + y) + · · · + an (α + y)n + · · · .
Consequently,
X X (1 − α)n+1 X
(1 − α)n−k y k bj y j = aj (α + y)j
1 − (α + y)
k≥0 j≥1 j≥0
X
= (1 − α)n+1 sj (α + y)j .
j≥0
n
Comparing the coefficients of y on the leftmost and rightmost sides of the
above equation yields
X n + k
n+1
tn = (1 − α) αk sn+k .
k
k≥0
Noting that the sum of the coefficients of the series is 1, from Theorem 1.1.19,
we obtain
lim tn = lim sn = f (1).
n→∞ n→∞
Classical Methods from Infinitesimal Calculus 17
Similarly,
n
X n π
lim = ,
n→∞ n2 + k 2 4
k=1
Xn
1 kπ 2
lim sin = ,
n→∞ n n π
k=1
Xn
1 kπ 4
lim sec2 = ,
n→∞ n 4n π
k=0
Xn
kα 1
lim = (α > −1).
n→∞ nα+1 α+1
k=1
Since !
n
1√n 1X k
n! = exp log ,
n n n
k=1
Thus,
n h n i Z 1 2
1X 2n 1
lim −2 = −2 dx. (1.18)
n→∞ n k k 0+ x x
k=1
18 Methods for the Summation of Series
The third limit belongs to Dirichlet and the proof is left as Exercise 1.5.
We now discuss the limit of series. First, we establish the following propo-
sition.
Proposition 1.1.22 Let f (x) beR a positive decreasing function defined on
∞
[0, ∞), and let improper integral 0 f (x)dx exist. Then
X Z ∞
lim+ h f (kh) = f (x)dx. (1.19)
h→0 0
k≥1
Thus, as n → ∞ we obtain
Z ∞ X Z ∞
f (x)dx ≤ h f (kh) ≤ f (x)dx.
h k≥1 0
lim φn (t) = 0.
t→1−
The proof of Theorem 1.2.1 is similar as those of Theorems 1.1.9 and 1.1.19
and is left for an exercise (cf. Exercise 1.11).
Corollary 1.2.2 Let (aPn ) and (bn ) be two sequences with bn > 0 and
k
lim an /bn = s, where k≥0 bk t converges for every |t| < 1 and diverges
n→∞ P
when t = 1. Then, (i) k≥0 ak tk converges as well for every |t| < 1, and (ii)
P
k≥0 a k tk
lim P k
= s. (1.24)
t→1− k≥0 bk t
Classical Methods from Infinitesimal Calculus 21
b j tj
φj (t) <
b 0 + b 1 t + b 2 t2 + · · · + b n tn
there holds lim φj (t) < ǫ; i.e., φj (t) → 0 as t → 1− . Limit (1.24) is thus
t→1−
proved as a corollary of Theorem 1.2.1.
a0 + a1 + · · · an
= lim = s.
n→∞ 1
P tn
P
Example 1.2.7 Let g(t) = n≥0 an n! and assume n≥0 an = s. Then
R ∞ −t
0 e g(t)dt = s. Indeed, denote s n = a 0 + a 1 + · · · + a n and s−1 = 0 so
that
Z t X sk − sk−1 Z t
−x
e g(x)dx = e−x xk dx
0 k! 0
k≥0
X Z t xk xk+1
X tk+1 −t
= sk − e−x dx = sk e ,
0 k! (k + 1)! (k + 1)!
k≥0 k≥0
which implies the desired result from the view of Corollary 1.2.6.
We now give the inverse theorem of Abel’s theorem, which is also called
the little o Tauber theorem.
P n
Theorem 1.2.8 (Little O Tauber theorem) Denote f (x) = n≥0 an x ,
P
where an = o n1 . Then limx→1− f (x) = s implies n≥0 an = s.
Classical Methods from Infinitesimal Calculus 23
h i
1
Proof. Denote N := 1−x (x < 1). Then N → ∞ as x → 1− . Hence to show
the theorem is true, we only need to prove
∞
X N
X
lim− an xn − an = 0,
x→1
n=0 n=0
i.e., !
N
X ∞
X
n n
lim an (x − 1) + an x = 0.
x→1−
n=0 n=N +1
P
We denote
P the first and the second summations in the above equation by 1
and 2 , respectively. Thus, we have estimates
X N
X
≤ an (1 − x)(1 + x + x2 + · · · + xn−1 )
1 n=0
N
X PN
nan
≤ (1 − x) nan ≤ hn=0 i → 0
1
n=0 1−x
−
has x i → 1 . Here the last step is from Proposition 1.1.8, P
where N =
1
1−x , Aν = νa ν , B ν = 1, A = 0. In addition, for summation 2 , we have
X ∞
X ∞
X xn
= an xn = (nan )
2
n
n=N +1 n=N +1
∞
X
ǫ ǫ
< xn ≤ < ǫ,
N +1 (N + 1)(1 − x)
n=N +1
where ǫ > 0 is arbitrarily fixed and |nan | < ǫ (n > N ), which completes the
proof.
Proof. Let g(x) be a continuous function defined on [0, 1], and let ǫ > 0 be
arbitrarily given. From the Weierstrass polynomial approximation theorem,
there exist polynomial lower approximation p(x) and upper approximation
P (x) such that p(x) ≥ g(x) ≥ P (x) and
Z 1 Z 1
(g(x) − p(x))dx < ǫ, (P (x) − g(x))dx < ǫ.
0 0
In fact, even g(x) is discontinuous at finite points and the left-hand limits and
right-hand limits at those points exist (but different), the above conclusion still
holds. Without loose of generality, we may assume that g(x) is only discon-
tinuous at point c with g(c− ) < g(c+ ). We now define φ(x) = g(x) + 21 ǫ when
x < c − δ and x > c for a sufficient small δ, and φ(x) = M ax{ℓ(x), g(x) + 14 ǫ}
when c − δ ≤ x ≤ c for the same δ, where ℓ(x) is a linear function with values
at end points as
1 1
ℓ(c − δ) = g(c − δ) + ǫ, ℓ(c) = g(c+ ) + ǫ.
2 2
Therefore, φ(x) is continuous and φ(x) > g(x). We can use Weierstrass theo-
rem to obtain the function P (x) that approximates function φ(x) sufficiently,
which also gives an upper approximation to g(x). Similarly, we can construct
lower approximation p(x) to g(x).
To prove the lemma, we first show
X Z 1
lim− (1 − x) an xn P (xn ) = P (t)dt.
x→1 0
n≥0
It is sufficient to prove the above equation for P (x) = xk . Indeed, the left-hand
side of the above equation can be written as
X 1 − x X
(1 − x) an xn+kn = (1 − xk+1 ) an (xk+1 )n
1 − xk+1
n≥0 n≥0
Z 1
1
→ = xk dx
k+1 0
Therefore, ǫ → 0 yields
X Z 1
limx→1− (1 − x) an xn g(xn ) ≤ g(t)dt.
n≥0 0
Then Z Z
1 1
dt
g(t)dt = = 1.
0 1/e t
−1/N
Let x = e with a positive integer N . Then
X X N
X
an xn g(xn ) = an xn g(xn ) = an = sN .
n≥0 e−1 ≤xn ≤1 n=0
1
f (x′ ) = f (x) + δ(1 − x)f ′ (x) + δ 2 (1 − x)2 f ′′ (ξ),
2
26 Methods for the Summation of Series
f (x′ ) − f (x) 1
(1 − x)f ′ (x) = + δ(1 − x)2 f ′′ (ξ)
δ 2
f (x′ ) − f (x)
= + O(δ).
δ
The rightmost term can be as small as we wish provided δ is small enough.
Let x′ and x be close enough to 1. Then, we have (1 − x)f ′ (x) = o(1).
Theorem 1.2.11 (Big O Tauber theorem)
P P Let an = O n1 , f (x) =
n −
n≥0 an x → s as x → 1 . Then series n≥0 an converges to s.
1
when x → 1− . Since an = O n ,
X X
f ′′ (x) = n(n − 1)an xn−2 = O (n − 1)xn−2
n≥2 n≥2
1
= O .
(1 − x)2
Thus,
n
X
wn := kak = o(n), w0 := 0.
k=1
Classical Methods from Infinitesimal Calculus 27
Furthermore,
X wn − wn−1 X
xn xn+1
f (x) − a0 = xn = wn −
n n n+1
n≥1 n≥1
X n n+1 n
x −x x
= wn +
n+1 n(n + 1)
n≥1
X wn X wn
= (1 − x) xn + xn
n+1 n(n + 1)
n≥1 n≥1
X wn
= o(1) + xn ,
n(n + 1)
n≥1
where we use wn = o(n) in the last step. Noting the condition f (x) → 0 as
x → 1− , we have X wn
= −a0 .
n(n + 1)
n≥1
Pk
In particular, if m = 1, sk = j=1 aj (k = 1, 2, . . . , n) and s0 = 0, then
formula (1.29) is reduced as
n
X n−1
X
ak b k = sn b n + sk (bk − bk−1 ). (1.30)
k=1 k=1
Separating the left-hand sum of equation (1.29) and combining all terms
with sk yields the right-hand expression of (1.29). We leave the details as an
exercise (cf. Exercise 1.14).
P
Corollary 1.2.13 Suppose sn = nn=1 ak → s as n → ∞. Then
n
X n−1
X
ak bk = sb1 + (sn − s)bn − (sn − s)(bk+1 − bk ). (1.31)
k=1 k=1
b1 m ≤ a1 b1 + a2 b2 + · · · + an bn ≤ b1 M.
We shall see that Abel’s theorem 1.2.3, represented in the last section, can
be proved using Abel’s lemma 1.2.14. For the sake of convenience, we re-write
and re-prove Theorem 1.2.3 as follows.
Classical Methods from Infinitesimal Calculus 29
P X
Theorem 1.2.15 (Abel’s theorem) If n≥0 an = s, then lim an xn = s.
x→1−
n≥0
P n
Proof. It is easy to see that n≥0 an x uniformly converges on [0, 1] and,
thus, it defines a function, denoted by f (x). Indeed, for any given ǫ > 0, there
Pn+p
exists N such that n > N implies k=n ak < ǫ. Therefore, from Abel’s
Pn+p k
lemma k=n ak x < xn ǫ ≤ ǫ for all x ∈ [0, 1]. From the continuity theorem
of the function series we have lim f (x) = f (1) = s.
x→1−
Then !
n
X n−1
X
ak b k ≤ A |bk+1 − bk | + |bn | .
k=1 k=1
Theorem
P 1.2.17 Assume decreasing sequence (φ(n)) approaches to 0 as n →
∞, and n≥1 an φ(n) converges. Then
Proof. For any given ǫ > 0, there exists a natural number N such that n > N
implies
ǫ ǫ
− < aN φ(N ) + aN +1 φ(N + 1) + · · · + an φ(n) < .
2 2
In addition, we have
∞
Theorem 1.2.18 Let {φ(n)} P n=1 be a positive increasing sequence that di-
verges to infinity, and let n≥1 an be any convergent series. Then
n
X
ak φ(k) = o(φ(n)) (1.33)
k=1
as n → ∞.
Proof. This theorem can be proved using Corollary 1.2.13, which is left as
an excise (cf. Exercise 1.17). We now give an alternative and much short
−1
proof using Theorem 1.2.17. SinceP sequence (φ(n) −1)n≥1Pis decreasing and
approaching to 0 as n → ∞, and n≥1 (an φ(n))φ(n) = n≥1 an converges,
we have !
Xn
lim ak φ(k) φ(n)−1 = 0,
n→∞
k=1
Pn
or equivalently, k=1 ak φ(k) = o(φ(n)).
where
1 1 1
wn = + + ···+ (n ≥ 2).
1 · (n − 1) 2 · (n − 2) (n − 1) · 1
Obviously,
1 1 1 1
nwn = 1+ + + + ···+ +1
n−1 2 n−2 n−1
1 1
= 2 1 + + ··· + = 2 ln n + 2γ + o(1)
2 n−1
as n → ∞, where γ is the Euler constant. Hence, wn → 0 as n → ∞. Since
(n + 1)wn+1 − nwn = 2/n, and
2
n(wn − wn+1 ) = wn+1 − [(n + 1)wn+1 − nwn ] = wn+1 −
> 0,
n
P
we know wn is decreasing and tends to 0 as n → ∞. Hence,
P n≥0 cn =
n
n≥0 (−1) wn converges, and (1.35) is obtained.
We now give two useful P tests, Abel’s test and Dirichlet test,Pfor the con-
vergence
P of the series n≥1 an bn using the properties of series n≥1 an and
n≥1 b n .
32 Methods for the Summation of Series
P
Theorem 1.2.22
P (Abel’s test) Suppose real or complex series n≥1P an con-
verges and (b
n≥1 n − b n+1 ) converges absolutely. Then series n≥1 an bn
converges.
Proof.
P The theorem can be proved by usingP general Abel’s lemma 1.2.16. Since
n
n≥1 n(b − b n+1 ) converges, limit lim n→∞ k=1 (bk − bk+1 ) = b1 − limn→∞ bn
exists. Hence, there exists a constant A for which
m+p
X p−1
X
a n b n ≤ Hm |bm+j − bm+j+1 | + |bm+p | ≤ Hm A, (1.36)
n=m+1 j=1
P
where Hm = max(|am+1 , · · · , |am+1 + · · · + am+p |). Since n≥1 an converges,
for any given ǫ > 0 there exists large enough m for which Hm < ǫ. Therefore,
m+p
X
an bn < Aǫ,
n=m+1
Pn
which implies (sn =
P k=1 ak bk ) is a Cauchy sequence and the convergence of
n≥1 an bn follows.
Proof. From the first inequality (1.36) shown in the proof of Theorem 1.2.22,
one can see the
nPconclusion of the theorem holds o because Hm = O(1) and the
p−1
observation |b
j=1 m+j − b m+j+1 | + |b m+p | → 0 as m → ∞.
Corollary
P 1.2.25 If (bn ) is a decreasing
P sequence approaching 0 as n → ∞,
and nk=1 ak is bounded, then series n≥1 an bn converges.
P 1 n
Example 1.2.26 Denote t := cos θ + i sin θ = eiθ . Then series n≥1 n t
converges for all θ 6= 0. In fact, noting
m+p
X tm+1 (1 − tp ) 2
tn = ≤ , (t 6= 1),
n=m+1
1−t |1 − t|
P
and bn = 1/n implies the convergence of n≥1 |bn − bn+1 |, we immediately
obtain the result.
Classical Methods from Infinitesimal Calculus 33
we have
X (−1)n+1 X (−1)n+1
= lim xn = lim log(1 + x) = log 2
n x→1− n x→1−
n≥1 n≥1
and
X (−1)n X (−1)n π
= lim− x2n+1 = lim− tan−1 x = ,
2n + 1 x→1 2n + 1 x→1 4
n≥0 n≥0
respectively. Thus,
1 1 1
1− + − + · · · = log 2, (1.37)
2 3 4
1 1 1 π
1 − + − + ··· = . (1.38)
3 5 7 4
Similarly, from
X
n+1 n
(−1) xn+1
(n + 1)(n + 2)
n≥1
2
= 1+ log(1 + x) − 2
x
for all 0 < x < 1, we obtain
1 2 3 4
− + − + · · · = 3 log 2 − 2.
2·3 3·4 4·5 5·6
The following example needs a simple calculus computation.
Example 1.2.28 We will show that
1 1 1 1 2 1 1 π
1− + − + · · · = log 2 + √ tan−1 √ = log 2 + √ . (1.39)
4 7 10 3 3 3 3 3 3
Denote
1 1 1
f (x) = x − x4 + x7 − x10 + · · · (|x| < 1),
4 7 10
34 Methods for the Summation of Series
Denote
1 X xn+a xn+b
f (x) := − , (|x| < 1).
b−a n+a n+b
n≥1
Thus,
a
′ 1 X n+a−1 n+b−1 1 x xb
f (x) = (x −x )= − .
b−a b−a 1−x 1−x
n≥1
Because f (0) = 0,
Z x
1 ta − tb
f (x) = dt, (0 ≤ x < 1).
0 b−a 1−t
Since
ta − tb (1 − tb ) − (1 − ta )
= →b−a
1−t 1−t
as t → 1− , we obtain the left-hand continuity of f (x) at point x = 1. Therefore,
applying Abel’s theorem yields
X 1
= f (1− ),
(n + a)(n + b)
n≥1
Proof. The proof is similar as the proof of Abel’s theorem. Since vn (x) → 1
as x → 1− , we may define vn (1) = 1 (n = 0, 1, 2, . . .). Hence, there exists a
positive constant A and δ > 0 for which v0 (x) < A for all 1 − δ ≤ x ≤ 1. For
an arbitrary ǫ > 0, there exists N = Nǫ > 0 such that m ≥ n > N implies
m
X
ak < ǫ, (m ≥ n > N ).
k=n
Therefore,
m
X m
X
ak vk (x) ≤ v0 (x) max ak < ǫA, (1 − δ ≤ x ≤ 1).
m≥n
k=n k=n
P
Hence, n≥0 an vn (x) isPuniformly convergent on [1 − δ, 1], which implies the
left-hand continuity of n≥0 an vn (x) at point x = 1.
P P
Corollary 1.2.31 Let series n≥1 nan converge. Denote f (x) = n≥1 an xn
(|x| < 1). Then
X f (1) − f (x)
nan = lim− .
x→1 1−x
n≥1
P P 1
Proof. Noting n≥1 Pan = n≥1 (nan ) n and using Corollary
P 1.2.25, we obtain
the convergence of n≥1 an from the convergence of n≥1 nan . Since vn (x) =
(1 − xn )/(n(1 − x)) generates a decreasingP sequence with limx→1− vn (x) = 1
(n = 1, 2, . . .), from the convergence of n≥1 (nan )vn (x) and Theorem 1.2.30
we obtain the desired result.
h = xi+1 − xi , (i = 0, 1, . . . , n − 1),
Xn
n
∆nh f (x) = (−1)n−j f (x + jh). (1.43)
j=0
j
Classical Methods from Infinitesimal Calculus 37
f (x)
∆h f (x)
f (x + h) ∆2h f (x)
∆h f (x + h) ∆3h f (x)
f (x + 2h) ∆2h f (x + h) ∆4h f (x) (1.44)
∆h f (x + 2h) ∆3h f (x + h)
f (x + 3h) ∆2h f (x + 2h)
∆h f (x + 3h)
f (x + 4h)
Hence, all operator polynomials in the real or complex field with respect to
polynomial addition and regular scale multiplication form an Abelian ring. If
Q(∆h ) is another operator polynomial, then
P (∆h )(Q(∆h )f (x)) = (P (∆h )Q(∆h ))f (x) = Q(∆h )(P (∆h )f (x)).
38 Methods for the Summation of Series
f (x + h) − f (x) ∆h f (x)
Df (x) = lim = lim .
h→0 h h→0 h
Moreover, it is shown that the n-th derivative of f (x) is
∆nh f (x)
Dn f (x) = lim .
h→0 hn
In Boole’s Calculus of Finite Differences, an important operator, called dis-
placement or shift, was introduced. This consists for a given f (x) in increasing
the variable x by h. Denoting this shift operator by Eh , we have
Eh f (x) = f (x + h).
Moreover,
δh f (x) = f (x + h/2) − f (x − h/2), etc. will be introduced later when they are
used.
From the definition of the operations ∆h , Dh , and Eh , it is easy to see
that their symbols are connected, for instance, by the following relations
and
h2 2
Eh f (x) = f (x + h) = f (x) + hDh f (x) + D f (x) + · · · = ehDh f (x).
2! h
Others of (1.45) can be proved similarly.
Using (1.45), we have
n
X n
Ehn n
= (1 + ∆h ) = ∆kh .
k
k=0
generating
n n n
∆nh f (x) = f (x + nh) − f (x + (n − 1)h) + · · · + (−1) f (x).
1 n
For any real number x, we define E x f (0) = f (x). Thus from Newton’s
formula
x x
f (x) = f (0) + ∆f (0) + ∆2 f (0) + · · · , (1.46)
1 2
we obtain the series expression of the operator E x ,
x x
Ex = 1 + ∆+ ∆2 + · · · ,
1 2
if the series in (1.46) converges. If certain conditions are satisfied, the infinite
series expansion of operators are permitted.
40 Methods for the Summation of Series
Proof. The expansion (1.47) can be proved directly using symbolic method.
where
1 0 ··· 0 f (0)
11 12 ··· 1n
1 11 ··· 1n f (1)
.. .. .. .. 21 22 ··· 2n
Rn (x) = . . ··· . . / .. .. .. . (1.49)
1 n . . ··· .
1 n ··· n f (n)
n1 n2 ··· nn
1 x2 ··· xn f (x)
From the inverse relations (1.47) and (1.50), we can establish a pair of
more general inverse formulas.
Theorem 1.3.4 Let (g(k))k≥0 be the real-valued sequence of function g(x)
and sequence (f (n))n≥0 is defined by
n
X n
f (n) = (−1)k g(k), n = 0, 1, 2, . . . . (1.51)
k
k=0
Then
n
X n
g(n) = (−1)k f (k), n = 0, 1, 2, . . . , (1.52)
k
k=0
Noting
n
X
n k
k
(−1) = (−1)n δn,ℓ ,
k ℓ
k=ℓ
42 Methods for the Summation of Series
where Kronecker delta δn,ℓ = 0 when ℓ 6= n and δn,n = 1, one may know the
right-hand side of (1.53) yields g(n).
We will see in Section 4.3, the lower triangular matrix ((−1)k nk ) is a
Riordan array involution. Thus, the inverse relationship between (1.51) and
(1.52) is a consequence of the Riordan involutions.
for n = 0, 1, 2, . . ..
Proof. Obviously, the left equation of (1.54) can be written as
!
X m + n
m+n
k
f (n) = E g(0) = (1 + E)m+n g(0) (1.55)
k
k=0
X ∆h k
Eh = ,
Eh
k≥0
We may obtain a modified formula of (1.57) with general h with starting form
x+1
∆h
Ehx+1 = 1/ 1 − .
Eh
which give
X n+k−1
k
f (x − nh) = (−1) ∆kh f (x).
k
k≥0
Proof. The proof is similar as the way in deriving (1.58). Since f (x) is a
polynomial of degree k, ∆n f (x) = 0 (n = k + 1, k + 2, . . .). Hence, from (1.57)
n+1 n+2
(1 − E −1 ∆)n+1 {1 + E −1 ∆ + (E −1 ∆)2 + · · ·
1 2
n+k 1
+ (E −1 ∆)k }f (x) = (1 − E −1 ∆)n+1 f (x)
k (1 − E −1 ∆)n+1
= f (x)
Proof. (1.60) can be proved using Lemma 1.3.1. Here, we give a direct proof
using symbol relation
n
X
E n+1 − E
= Ek.
E−1
k=1
Hence,
n
X E
[(E − 1 + 1)n − 1]
Ek =
E−1
k=1
n n
E X n X n
= (E − 1)k = ∆k−1 E.
E−1 k k
k=1 k=1
Applying the leftmost side and the rightmost sides of the above operator
equation to f (0) yields (1.60).
we obtain Identity
2 n n n
t + t + · · · + t = nt + t(t − 1) + t(t − 1)2 + · · · + t(t − 1)n−1 .
2 3
Classical Methods from Infinitesimal Calculus 45
In fact, by setting f (k) = k 4 and using (1.44) to find ∆f (1) = 15, ∆2 f (1) =
50, ∆3 f (1) = 60, and ∆4 f (1) = 24, (1.61) follows from (1.60).
where the left-hand series is assumed to be convergent for all |x| < 1.
x y
|y| = < 1, = |x| < 1.
1−x 1+y
Since
X
−n n+k−1 k
k
(1 + y) = (−1) y
k
k≥0
n n+1 2 n+2 3
= 1− y+ y − y + ··· ,
1 2 3
we have
X X n
n y
S: = f (n)x = f (n)
1+y
n≥1 n≥1
X X n + k − 1
= f (n)y n+k .
k
n≥1 k≥0
Because |y| < 1 and |y/(1 + y)| < 1, the above double series is convergent
absolutely, and it can be rearranged as
j
XX
j−n j−1
S = (−1) f (n)y j
j−n
j≥1 n=1
46 Methods for the Summation of Series
j−1 !
X X j−1
= (−1)j−1−n f (n + 1) y j
n=0
j−1−n
j≥1
X
= ∆j−1 f (1)y j = f (1)y + ∆f (1)y 2 + ∆2 f (1)y 3 + ∆3 f (1)y 4 + · · · .
j≥1
Here, we have used the expansion of ∆n shown in (1.43) into the step before
the last one. After substituting y = x/(1 − x) into the rightmost series, we
obtain (1.62).
Hence, applying Abel’s continuity theorem 1.2.3 or 1.2.15 to both sides of the
above equation yields
X X n
1
(−1)n f (n) = (−1)n ∆n−1 f (1) .
2
n≥1 n≥1
To prove (1.64), we only need to show that the second series tends to zero
when n → ∞. Indeed, after substituting the expansion of ∆n shown in (1.43)
into the series, we obtain
(−1)n+1 X
(−1)j ∆n+1 f (j + 1)
2n+1
j≥0
1 X
n+1
n+1 X
= (−1)j−k f (j + 1 + k)
2n+1 k
k=0 j≥0
1 X
n+1
n+1 X
= (−1)j f (j + 1),
2n+1 k
k=0 j≥k
P j
P
where j≥k (−1) f (j + 1) is the remainder of convergent series j≥0
(−1)j f (j + 1), which approaches to zero as k → ∞. Thus, from Lemma 1.3.11,
the rightmost term of the above equation tends to zero when n → ∞.
k!
∆k f (1) = (−1)k 2k , (k = 1, 2, . . .).
(2k + 1)!!
∆h ∆2n
h
δh = , δh2n = ,
1/2
Eh Ehn
are called the Sheffer-type numbers. Clearly, Pn = pn (0), i.e., Pn is the value
of Sheffer-type polynomial at point x = 0.
Classical Methods from Infinitesimal Calculus 49
For g(t) = t, if f (t) = t/(et − 1) and f (t) = 2/(et + 1), then corresponding
Appell (Sheffer) type polynomials are denoted by Bn (x) and En (x) and called
the Bernoulli polynomials and Euler polynomials, respectively; namely,
t X Bn (x)
ext = tn (1.67)
et −1 n!
n≥0
2 X En (x)
ext = tn . (1.68)
et +1 n!
n≥0
Comparing the above expansion of text /(et − 1) with (1.67), we obtain (1.70).
To prove (1.71) and (1.72), we rewrite (1.69) as
e t − 1 X Bk k X tn X Bk
1 = t = tk
t k! (n + 1)! k!
k≥0 n≥0 k≥0
XX n
XX
Bk Bk
= tn+k = tn .
k!(n + 1)! k!(n − k + 1)!
n≥0 k≥0 n≥0 k=0
t 1 X bn 2n
= 1 − t + (−1)n+1 t ,
et − 1 2 (2n)!
n≥1
2et X En
= tn .
e2t + 1 n!
n≥0
Then n n−k
X n Ek 1
En (x) = x − .
k 2k 2
k=0
X
n−1
n 1 + (−1)n−k
E0 = 1, En = − Ek , (n = 1, 2, . . .)
k 2
k=0
E2k−1 = 0, (k = 1, 2, . . .),
Classical Methods from Infinitesimal Calculus 51
or equivalently,
X
k−1
2k
E0 = 1, E2k = − E2j , E2k−1 = 0, (k = 1, 2, . . .).
j=0
2j
Proof. From Bernoulli summation formula (1.60) and the fact that jth differ-
ence of a kth (k < j) degree polynomial is zero, we immediately know that
P (n) := 1k + 2k + · · · + nk is a k + 1st degree polynomial in terms of n. Hence,
we can write
P (n) = C0 nk+1 + C1 nk + · · · + Ck n + Ck+1 .
Comparing the coefficients of the identity P (n+1)−P (n) = (n+1)k , we obtain
the first equation of (1.73). Using the Bernoulli numbers B0 = 1 and B1 =
−1/2, we obtain the second equation of (1.73) from its first equation. Noting
B2n+1 = 0, we get the third equation of (1.73) from its second equation.
Xn
n
Bn′ (x) = Bk (n − k)xn−k−1
k
k=0
X n − 1
n−1
= n Bk xn−k−1 = nBn−1 (x).
k
k=0
Similarly,
Z 1 Xn Z 1
n
Bn (x)dx = Bn xn−k dx
0 k 0
k=0
Xn
n Bn
= = 0,
k n−k+1
k=0
Pn−1 Bk
where the last step is due to Bn = − k=0 nk n−k+1 shown in (1.71).
Conversely, starting from B0 (x) = 1 and taking integral successively to
evaluate Bn (x) (n = 1, 2, . . .), where the integral constants are determined by
R1
0
Bn (x)dx = 0, we obtain the sequence of Bernoulli polynomials.
Proof. Formulas (1.75) and (1.76) can be proved from Theorem 1.3.18, which
is left as Exercise 1.39. To prove (1.77), we write the Taylor’s expansion of
Bn (x + 1) and use (1.75) and (1.76) to obtain
n
X (k)
Bn (1)
Bn (x + 1) = xk
k!
k=0
n
X (k) n
X (k) (k)
Bn (0) Bn (1) − Bn (0)
= xk + xk
k! k!
k=0 k=0
= Bn (x) + nxn−1 .
By taking the integral in terms of t from 0 to 1 and noting that φ(n) (t) =
φ(n) (0), we obtain
Equation (1.81) is called the Darboux formula. Now we will consider several
of its special cases.
54 Methods for the Summation of Series
Let φ(t) = (t − 1)n in equation (1.81). Then φ(n) (0) = n!, φ(n−v) (1) = 0,
and φ(n−v) (0) = (−1)v n!/v!, for 1 ≤ v ≤ n. This is of course the Taylor
formula with a Cauchy integral form remainder.
In equation (1.81), changing n to 2n, setting φ(t) = tn (t − 1)n , and taking
n → ∞ yields
∞
X (−1)v−1 (z − a)v
f (z) − f (a) = [f (v) (z) + (−1)v−1 f (v) (a)].
v=1
2v · v!
n Z 1
(−1)
+ φ(t)F (n) (t)dt (1.82)
n! 0
where remainder Rn is
Z b
(−1)n
Rn = φ(t)F (n) (t)dt. (1.84)
n! a
Also, if n = 2m and φ(t) = (t − a)m (t − b)m , then equation (1.83) will give
the following Petr formula when the Leibniz higher order differentiation rule
is applied.
m
Z b
(b − a)v h (v−1)
Xm
v
F (t)dt = F (a)
a v=1
2m v!
v
i
v−1 (v−1)
+ (−1) F (b) + Rm , (1.87)
where remainder Rm is given by equation (1.84). Using the mean value theo-
rem of integration, we can write it as
2
(−1)m m!
Rm = F (2m) (ξ)(b − a)2m+1 , a ≤ ξ ≤ b.
2m+1 (2m)!
56 Methods for the Summation of Series
where Z b
1
Rm+k = − (b − t)m (a − t)k f (m+k+1 (t)dt. (1.89)
k!m! a
All of the above formulas are useful in approximating definite integrals.
At the end of this section, we will give one more example of the Darboux
formula. In equation (1.83), we set a = −1, b = 1, and φ(t) = Tn (t) + 1/2n−1 ,
where Tn (t) = 21−n cos(n cos−1 t) is the Chebyshev polynomial of degree n.
Then,
1 1 + (−1)n
φ(1) = n−2 φ(−1) = .
2 2n−1
Since Tn (t) satisfies differential equation (1 − t2 )Tn′′ (t) − tTn′ (t) + n2 Tn (t) = 0,
by taking derivatives consecutively, we obtain
where −1 ≤ ξ ≤ 1.
It is obvious that the BTQF derived from equation (1.83) by deleting the
remainder Rn possesses algebraic precision degree n − 1. Here, the degree of
Classical Methods from Infinitesimal Calculus 57
Exercises
1.1 Use the method shown in Examples 1.1.1–1.1.3 to prove formula
X 1 π2 39
= − .
n2 (n 2
+ 1) (n + 2)2 4 16
n≥1
(d) Denote the left-hand series by F (x) and study F ′′ (x) and make use of
(1.4).
1.4 Prove two summation formulas given in Example 1.1.6.
1.5 Use the technique shown in Example (1.17) to prove
1 X h n i h n
n i Z 1 1 − xα
lim − −α = dx,
n→∞ n k k 0 1−x
k=1
Hint: Let the upper limit in the inequality ≤ −2k for some positive k.
Denote un = Pn−1 , sn = u1 + · · · + un . Hence, from the assumption, there
exists n0 such that when n > n0 , we have
i.e.,
−1
an < un e−kQn = un e−ksn ≤ un .
P P P
Hence, (i) n≥1 un < ∞ implies n≥1 an < ∞, and (ii) when n≥1 un =
R∞ P
+∞, from 1 f (x)dx < ∞ we have n≥1 f (sn )un < ∞. Taking f (x) = e−kx
P P
yields n≥1 un e−ksn < ∞, which implies n≥1 an < ∞.
1.8 Prove the claim given inPRemark 1.1.16.
n
Hint: Note that tn = Pn s + k=0 pnk (sk − s).
1.9 Let lim an = a > 0. Prove
n→∞
√ √ √
a1 a2 a3 + a2 a3 a4 + · · · + an an+1 an+2
lim
n→∞ a1 a2 + a2 a4 + · · · an an+2
1
= √ .
a
Hint: Using Corollary 1.1.11, the left-hand limit of the above equation is
√
an an+1 an+2 1
lim = √ .
n→∞ an an+2 a
Show
m
X
an fn ≤ Af1 .
n=1
1.16 Prove general Abel’s lemma, Lemma 1.2.16.
1.17 (a) Use Theorem 1.2.18 to prove Theorem 1.2.17.
(b) Use Corollary 1.2.13 to prove Theorem 1.2.18
(c) Show that Theorem 1.2.17 and Theorem 1.2.18 implies each other.
Hint: (a) Using the transformations an φ(n) 7→ an and φ(n) 7→ φ(n)−1 in
Theorem 1.2.18, we immediately obtain
n
X n
X
ak = (ak φ(k))φ(k)−1 = o φ(n)−1
k=1 k=1
as n → ∞, which
P implies (1.32).
(b) Let s = n≥0 an , and let 1 < m < n. Then
n
X
ak φ(k)
k=1
n−1
X
= sφ(1) + (sn − s)φ(n) − (sk − s)(φ(k + 1) − φ(k))
k=1
m−1
X
= O(1) + o(φ(n)) − (sk − s)(φ(k + 1) − φ(k))
k=1
n−1
X
− (sk − s)(φ(k + 1) − φ(k)).
k=m
N
! N
!−1
X X
−1
lim an zn+1 − zn−1 = 0.
N →∞
n=1 n=1
Hint: Apply Exercise 1.16 and a similar argument of the proof of Theorem
1.2.17. P P P
1.19 Suppose that P n≥0 an xn , n≥0 bn xn , and n≥0 cn xn are absolutely
convergent, and dn = i+j+k=n ai bj ck . Prove
X X X X
an xn bn xn cn xn = dn xn .
n≥0 n≥0 n≥0 n≥0
P P
1.20 Assume that at least one of series n≥0 an and n≥0 bn is absolutely
Pn P
convergent, and cn = k=0 ak bn−k . Show n≥0 cn converges and
X X X
an bn = cn .
n≥0 n≥0 n≥0
P
Hint: Assume that n≥0 bn converges absolutely. Hence, from the given
conditions,
n
X n
X n
X
sn = ak → s, s′n = b k → s′ , |bk | < ∞.
k=0 k=0 k=0
P
Denote n := |b0 | + |b1 | + · · · + |bn |, and σn := c0 + c1 + · · · + cn . Then,
σn = (a0 + a1 + · · · + an )(b0 + b1 + · · · + bn )
−b1 an − b2 (an + an−1 ) − b3 (an + an−1 + an−2 ) − · · ·
−bn (an + an−1 + · · · + a1 )
= sn s′n − b1 (sn − sn−1 ) − b2 (sn − sn−2 ) − · · · − bn (sn − s0 ).
Therefore,
|σn − ss′ | ≤ |sn s′n − ss′ | + |b1 ||sn − sn−1 |
+|b2 ||sn − sn−2 | + · · · + |bn ||sn − s0 |
m
X
= |sn s′n − ss′ | + |bk ||sn − sn−k |
k=1
n
X
+ |bj ||sn − sn−j |, (m < n).
j=m+1
62 Methods for the Summation of Series
Since
n
X
|sn − sn−k | → 0 (n − k → ∞), |bj | → 0 (n > m → ∞),
j=m+1
for any given ǫ > 0 there exist n, m with large enough n − m such that
m
X
|σn − ss′ | < |sn s′n − ss′ | + ǫ |bk | + ǫA,
k=1
converge. P P
Hint: Discuss the convergence of series n≥1 bn un and n≥1 bn vn , where
n
X 2 n
X 2
1 1
uk = sin n + θ, vk = cos n + θ.
2 2
k=1 k=1
1.26 Use the technique shown in Examples 1.2.27 and 1.2.28 to establish
X n 1 π 1
(−1)( 2 ) = − log 2.
n 4 2
n≥1
1.27 Prove
X xn 1 X n
n−1 x (−x)
lim− (−1)n−1 = log 2 = lim (−1) .
x→1 n(1 + xn ) 2 x→1− 1 − x2n
n≥1 n≥1
Hint: Write
X
n−1 xn 1 X (−1)n−1 2xn
(−1) = ,
n(1 + xn ) 2 n 1 + xn
n≥1 n≥1
Classical Methods from Infinitesimal Calculus 63
denote an = (−1)n−1 /n and vn (x) = 2xn /(1 + xn ) and apply Theorem 1.2.30.
1.28 Prove the expansion (1.43) of ∆nh f (x) is true.
1.29 Let f (x) be a polynomial of degree k. Prove ∆s f (x) = 0 for all
s ≥ k + 1.
1.30 Let φ(x) = a0 + a1 x + a2 x(x − 1) + a3 x(x − 1)(x − 2) + · · · , where x
are non-negative integers. Prove
n n n n n
φ(0) − φ(1) + φ(2) − · · · + (−1) φ(n)
0 1 2 n
= (−1)n an n!.
Hint: It can also be proved using Exercise 1.30 with φ(x) = xn and hence,
an = 1. P
1.32 Define ∆−1 f (x) = x−1k=0 f (k), ∆
−n
= ∆−1 ∆−(n−1) . Prove
x x x
∆n = ∆∆n−1 =
m m m−n
X X n+1
θ nθ x
(−1)n cos(nθ)xn+1 = − 2n cosn cos ,
2 2 x−1
n≥0 n≥0
X X n+1
θ nθ x
2n cosn cos xn+1 =− (−1)n cos(nθ) .
2 2 x−1
n≥0 n≥0
Therefore,
X (−1)k X 1 f (1)
rn = k+1
∆k f (1) ≤ f (1) = n+1 .
2 2k+1 2
k≥n+1 k≥n+1
Since −∆f (n) > 0, the series on the rightmost side is an alternating series.
Because ∆2 f (n) > 0, the absolute value of the general term of the series tends
to zero monotonically. Hence, from condition (ii)
1 f (1) n
|Rn | > f (n + 1) ≥ a .
2 2
Therefore,
rn 1
≤ ,
Rn (2a)n
which implies limn→∞ |rn /Rn | = 0.
Classical Methods from Infinitesimal Calculus 65
Hint: Use
cos x eix + e−ix 2ix
x cot x = x = ix ix −ix
= ix + 2ix
sin x e −e e −1
and tan x = cot x − 2 cot(2x).
1.39 Prove Theorem 1.3.16.
Hint: Using transformation t 7→ 2t and substituting x = 1/2 into (1.68),
the definition of En (x), we obtain
2et X 2n En (1/2)
= tn ,
e2t +1 n!
n≥0
e2t + 1 X Ek k
1 = t
2et k!
k≥0
1 t X Ek
= (e + e−t ) tk
2 k!
k≥0
X X 1 + (−1)n
= Ek tn+k
2 · n!k!
n≥0 k≥0
XX n
1 + (−1)n−k
= Ek tn ,
2 · (n − k)!k!
n≥0 k=0
Pn 1+(−1)n−k
yields E0 = 1 and k=0 2·(n−k)!k! Ek = 0, which implies
n−1
X 1 + (−1)n−k
En = −n! Ek .
2 · (n − k)!k!
k=0
CONTENTS
2.1 Symbolic Approach to Summation Formulas of Power Series . . . 68
2.1.1 Wellknown symbolic expressions . . . . . . . . . . . . . . . . . . . . . . . . 69
2.1.2 Summation formulas related to the operator (1 − xE)−1 74
2.1.3 Consequences and examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 77
2.1.4 Remainders of summation formulas . . . . . . . . . . . . . . . . . . . . . 82
2.1.5 Q-analog of symbolic operators . . . . . . . . . . . . . . . . . . . . . . . . . 86
2.2 Series Transformation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 96
2.2.1 An extension of Eulerian fractions . . . . . . . . . . . . . . . . . . . . . . 98
2.2.2 Series-transformation formulas . . . . . . . . . . . . . . . . . . . . . . . . . . 99
2.2.3 Illustrative examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 105
2.3 Summation of Operators . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 112
2.3.1 Summation formulas involving operators . . . . . . . . . . . . . . . 112
2.3.2 Some special convolved polynomial sums . . . . . . . . . . . . . . . 120
2.3.3 Convolution of polynomials and two types of
summations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 123
2.3.4 Multifold Convolutions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 125
2.3.5 Some operator summation formulas from multifold
convolutions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 130
As is well known, the closed form representation of series has been studied ex-
tensively. See, for examples, Comtet [44], Jordan [141], Egorechev [58], Roman-
Rota [187], Sofo [200], Wilf [216], Graham-Knuth-Partashnik [79], Petkovšek-
Wilf-Zeilberger [177], He, Hsu, and Shiue [104], and He, Hsu, Shiue, and Tor-
ney [99], He, Hsu, and Shiue [104, 106], He, Hsu, and Ma [97], and He, Hsu,
and Yin [107]. The object of this chapter is to make use of the classical op-
erators ∆ (difference), E (shift), and D (derivative) to develop a method for
the summation of power series that appears to have a certain wide scope of
applications.
It is known that the symbolic operations ∆ (difference), E (displacement)
and D (derivative) play an important role in the Calculus of Finite Differences
as well as in many topics of computational methods. For various classical
results, we may see Jordan [141], Milne-Thomson [164], etc. Certainly, the
theoretical basis of the symbolic methods could be found within the theory
of formal power series, inasmuch as all the symbolic expressions treated are
DOI: 10.1201/9781003051305-2 67
68 Methods for the Summation of Series
D
which implies ∆f (n) = (e − 1)f (n). Thus, we have Symbolically
E = 1 + ∆ = eD , ∆ = E − 1 = eD − 1, and D = log(1 + ∆) = log E.
In this chapter, we focus on summations and identities arising from the in-
terrelations of a number of operators in common use in combinatorics, number
theory, and discrete mathematics.
This shows that the symbolic operator (1 − xE)−1 with parameter x can be
applied to f (t) (at t = 0) to yield a power series or a generating function for
{f (k)}.
We shall show in §2.1.2 that (1 − xE)−1 can be expanded into series in
various ways to deriveP numerous symbolic operational formulas as well as sum-
mation formulas for k≥0 f (k)xk . Note that the closed form representation
of series has been studied extensively. For example, Sofo [200] who presents
a unified treatment of summation of series using function theoretic method.
Some consequences of the summation formulas as well as the examples will be
shown, which are useful for computational purpose and for accelerating the
series convergence. In §2.1.3, we shall give the remainders of the summation
formulas.
Ak (x)
αk (x) = , (x 6= 1),
(1 − x)k+1
where Ak (x) is the kth degree Eulerian polynomial having the expression
k
X
Ak (x) = A(k, j)xj , A0 (x) ≡ 1,
j=1
Moreover, in this section, we shall make use of several simple and well-
known propositions which may be stated as lemmas as follows.
70 Methods for the Summation of Series
n+1
For f ∈ C[0,∞) we have Newton’s interpolation formula
n
X
x x
f (x) = E x f (0) = ∆k f (0) + f (n+1) (ξ),
k n+1
k=0
∆n+k f (x) = 0
The right-hand side of the above equation is clearly the interpolation of f (x)
at x = 0, 1, . . . , n. To use it for an approximation to an n + 1 differentiable
function f (x), we may add the remainder of interpolation:
(x − 0)(x − 1) · · · (x − n) n+1
Rn+1 = D f (ξ),
(n + 1)!
2m
For f ∈ C(−∞,∞) we have the first Gauss interpolation formula
X
m−1
x+k−1
x+k
f (x) = ∆2k f (−k) + ∆2k+1 f (−k)
2k 2k + 1
k=0
x + m − 1 (2m)
+ f (ξ),
2m
and the second Gauss interpolation formula
X
m−1
x+k
x+k
2k 2k+1
f (x) = ∆ f (−k) + ∆ f (−k − 1)
2k 2k + 1
k=0
x + m (2m)
+ f (ξ),
2m
where x ∈ (−∞, ∞) and ξ ∈ (−m, m − 1).
72 Methods for the Summation of Series
Repeating the operation on the last series, from the term ∆4 up, we obtain
2 ∞
x x ∆ x + 1 ∆3 x + 1 ∆4 X x + 2 ∆k+1
Ex = 1 + ∆+ + + + .
1 2 E 3 E 4 E2 k + 1 E2
k=4
Then the above operation is repeated from ∆6 up, and so on. Finally, we have
Gauss’s first symbolic expression for E x . By applying E x to f ∈ C(−∞,∞)
2m
at 0, we may obtain the first Gauss interpolation formula. The second Gauss
symbolic expression and the second Gauss interpolation formula can be proved
similarly. The only difference is multiplying the terms of Newton’s symbolic
expression for E x from ∆ up by (∆ + 1)/E = 1.
2m
For f ∈ C(−∞,∞) we have Everett’s interpolation formula
X
m−1
x + k 2k
x + k − 1 2k
f (x) = δ f (1) − δ f (0)
2k + 1 2k + 1
k=0
x + m − 1 (2m)
+ f (ξ),
2m
Proof. From the first and the second Gauss symbolic expressions, we have
∞
" ! " ! !##
x + k − 1 ∆2k−1 E + 1 ∆2k
x
X x+k x+m−1
E =1+ + + .
2k − 1 Ek 2 2E k 2k 2k
k=1
Symbolic Methods 73
by using
∆2k 2k M ∆2k−1
= δ and = µδ 2k−1 ,
Ek Ek
where µδ = E − 1 − δ 2 /2. Thus
X∞
x 2k−2 2k−2 1 2k x 2k x + k − 1
E =1+ Eδ −δ − δ + δ
2 2k 2k − 1
k=1
If we write in the first two terms in the square brackets of the preceding sum
k + 1 instead of k, then k varies in these terms from 0 to ∞. Consequently,
they can be written as
X∞
x+k
[Eδ 2k − δ 2k ].
2k + 1
k=0
The third and the fourth terms in the square brackets give
X∞ ∞
x + k − 1 x − k 2k X x + k − 1 2k
δ = δ .
2k − 1 2k 2k
k=0 k=1
x
Therefore the above formula about E becomes
X∞ ∞
X
x+k x+k−1 x+k
Ex = Eδ 2k + − δ 2k ,
2k + 1 2k 2k + 1
k=0 k=0
P∞
Theorem 2.1.10 (Mean Value Theorem) Let n=0 an xn with an ≥ 0 be a
convergent series for x ∈ (0, 1). Suppose that φ(t) is a bounded continuous
function of t on (−∞, ∞), and (tn ) is a sequence of real numbers. Then there
is a number ξ ∈ (−∞, ∞) such that
∞
X ∞
X
an φ(tn )xn = φ(ξ) an xn .
n=0 n=0
74 Methods for the Summation of Series
Proof. Here we present a proof in the sense of symbolic calculus, viz., every
series expansion is considered as a formal series.
Clearly, (2.1) may be derived as follows.
Once (2.3) is derived by the aid of Lemma 2.1.5 and Lemma 2.1.9, it can also
be verified by symbolic computations. In fact we have
∞
X k 2 k
x x ∆
RHS of (2.3) = 1 + 2 2
(E − x)
(1 − x) (1 − x) E
k=0
x E−x x(E − x)
= 1+ 2 x ∆ 2 = 1 + 2
(1 − x) 1 − (1−x)2 E (1 − x)2 − x ∆E
Ex(E − x) Ex
= 1+ =1+
(1 − x)2 E − x(E − 1)2 1 − xE
= (1 − xE)−1 = LHS of (2.3).
Remark 2.1.12 Note that all the operators displayed on the right-hand sides
of (2.1)–(2.4) involve ∆ or D so that they will yield finite expressions when
they are applied to any polynomial f (t) at t = 0. In particular, we see that for
the pth degree polynomial f (t), (2.1) gives a generating function (GF ) in the
form
X∞ X p
k xk
f (k)x = ∆k f (0). (2.5)
(1 − x)k+1
k=0 k=0
As in the case of (2.5) and (2.6), we have a corollary from (2.9) and (2.10).
∞ [p/2] k+1
X X x
f (k)xk = δ 2k f (1) − xδ 2k f (0) , (2.11)
(1 − x)2
k=1 k=0
∞ [p/2] k+1
X X x
f (k)xk = x−1 δ 2k f (0) − δ 2k f (−1) . (2.12)
(1 − x)2
k=1 k=0
Certainly, (2.11) and (2.12) may also be used as rules for obtaining GF ′ s
of {f (k)}.
Symbolic Methods 77
as given in Hsu and Shiue [133] are just particular cases of (2.5) in which
f (t) = (t + λ|θ)p and f (t) = Dp (t, α) are known as the generalized falling
factorial and the Dickson polynomial, respectively, or more precisely
(t + λ|θ)p = Πp−1
j=0 (t + λ − jθ), (p ≥ 1), (t + λ|θ)0 = 1, and
[p/2]
X p
p−j
Dp (t, α) = (−α)j tp−2j , D0 (t, α) = 2.
j=0
p − j j
Note that (2.15) is the well-known Euler series transformation formula shown
in Corollary 1.3.12. As what we havePseen, this formula can be used to convert a
slowly convergent alternating series ∞ k
k=0 (−1) f (k) with f (k) ↓ 0 (as k → ∞)
into a rapidly convergent series. A few examples are given in Example 1.3.13.
For instance, the series
1 1 1 1
ln 2 = 1 − + − + − ··· (2.18)
2 3 4 5
1
can be converted using (2.15) with f (k) = k+1 (k = 0, 1, 2, . . .) into a quickly
convergent series of the form
1 1 1 1
ln 2 = + + + − ··· (2.19)
2 22 · 2 23 · 3 24 · 4
78 Methods for the Summation of Series
Remark 2.1.16 Obviously, the convergence of the series shown in (2.19) with
a rate of O(1/2n ) is much faster than the convergence of the series in (2.18),
which has the rate of O(1/n). For instance, to arrive the accuracy of the five
digits of ln 2 = 0.69315, we only need to sum the first 15 terms of the series in
(2.19), while the partial sum of the first 40,000 terms of the series in (2.18)
is 0.69313. (2.16) and (2.17) appear to be novel,Pand they could also be used
∞ k
to convert slowly convergent alternating series k=1 (−1) f (k) into quickly
convergent ones if a definition for f (k) = 0 (k = 0, −1, −2, . . .) is introduced.
A general discussion on the comparison of the convergence rate of the given
alternating series and its Euler transformation can be found in Exercise 1.37
and its hint. And a later work will give the comparison on the rate of the con-
vergence of series (2.15)–(2.17) for the positive decreasing functions. Exercise
1.36 shows that for some alternating series, their Euler transformations may
have slower convergent rates.
We now give some examples of the summations shown in Proposition
2.1.14. Our first example is for function f (x) = 1/(x + 1)2 . Similar to ex-
pression (2.20) we obtain
Xk
k k
∆ f (0) = (−1)k−j (j + 1)−2 .
j=0
j
Substituting the above expression into (2.2) and noting the well-known iden-
tity
X k k
k 1 X1
(−1)j−1 = ,
j=1
j j ℓ
ℓ=1
(see [139]), we then use the process similar to that in (2.21) to obtain
X∞ ∞
X k
k 1 X k (−1)j
(−1) f (k) =
2k+1 j=0 j (j + 1)2
k=0 k=0
Symbolic Methods 79
∞
X Xk ∞
X k
1 k + 1 (−1)j 1 X k (−1)j−1
= =
(k + 1)2k+1 j=0 j + 1 j + 1 k2k j=1 j j
k=0 k=1
∞
X k
X ∞ X
X ∞ X 1∞
1 1 1
= = = + σ,
k2k ℓ j=0 ℓ=1
ℓ(j + ℓ)2 j+ℓ ℓ2 2ℓ
k=1 ℓ=1 ℓ=1
π2
where summation 360(c) in Jolley [139] gives the first sum as 12 − 12 ln2 2, and
∞ X
X ∞
1
σ=
j=1 ℓ=1
ℓ(j + ℓ)2j+ℓ
Hence,
∞
X (−1)k π2
2
= . (2.22)
(k + 1) 12
k=0
The sum of the first 13 terms of the last series gives, 1.6449, the first 5 dig-
its of π 2 /6, while the sum of the first 5,000 terms of the series in (2.22) is
only 1.6447. This example shows that formula (2.15) is indeed to convert an
alternating series into a faster convergent series .
Xk
k
∆k f (0) = (g(t))j (−1)k−j = (g(t) − 1)k (2.23)
j=0
j
80 Methods for the Summation of Series
and for i = 0, 1
xg(t)(g(t) − x) xg(t)
= = . (2.26)
g(t)(1 + x2 ) − x((g(t))2 + 1) 1 − xg(t)
√
As examples, we take g(t) = eit , with i = −1, and g(t) = t. Thus, from
(2.25) we have, respectively
∞
X ∞
X xk 1
eitk xk = k+1
(eit − 1)k = (2.27)
(1 − x) 1 − xeit
k=0 k=0
and ∞ ∞
X X xk 1
(tx)k = k+1
(g(t) − 1)k = . (2.28)
(1 − x) 1 − xt
k=0 k=0
and
∞
X k+1
x tx
(t − 1)2k t1−k − xt−k = , (2.30)
(1 − x)2 1 − tx
k=0
respectively.
We now illustrate (2.8) with h(x) = (g(t))x with g : R 7→ R and g(t) > 0.
Hence, Dk h(0) = (ln g(t))k and from (2.8) and Definition 2.1.3,
∞
X ∞
X αk (x)
1
(g(t))k xk = = (ln g(t))k
1 − xg(t) k!
k=0 k=0
X∞
Ak (x)
= (ln g(t))k . (2.31)
k!(1 − x)k+1
k=0
Replacing ln g(t) by t and t(1 − x), respectively, then Equation (2.31) yields
GF ′ s (cf. Section 6.5 in [44] and [210])
∞
X tk 1
αk (x) = (2.32)
k! 1 − xet
k=0
and
∞
X tk 1−x
Ak (x) = , (2.33)
k=0
k! 1 − xet(1−x)
respectively. Some other GF ′ s such as (5i) − (5k) shown in Section 6.5 in [44]
can be derived from Equation (2.21). In addition, from Equation (2.22), we
can establish the recurrence relation for αk (x) by multiplying both sides of
the equation by (1 − xet ). The details can be found in [210].
Finally, we consider a special case of (2.31) by letting g(t) = eit with t ∈ R,
and x = −1 in (2.31), we obtain
∞
X X∞
1 1 t Ak (−1)
eikt (−1)k = = 1 − i tan = (it)k .
1 + eit 2 2 k!2k+1
k=0 k=0
N
X −1 ∞
X
f (k)xk = φ(n)xn
k=M n=0
∞
(m−1 ) ∞
X X n X n n
k n (m)
= ∆ φ(0) x + φ (ξn ) x
n=0
k n=0
m
k=0
m−1 ∞
! ∞
X X n X n n
k n (m)
= ∆ φ(0) x + φ (ξ) x
n=0
k n=0
m
k=0
m−1
X xk xm
= ∆k φ(0) k+1
+ φ(m) (ξ)
(1 − x) (1 − x)m+1
k=0
= RHS of (2.36)
Remark 2.1.20 Theorem 2.1.19 with expressions (2.39) and (2.40) is of sim-
ilar nature as that of Theorems 1 and 2 in Wang and Hsu [210]. However,
Theorem 2.1.19 appears to be a little more restrictive
Psince we have assumed
∞
here the condition 0 < x < 1 and the convergence of k=0 f (k)xk for |x| < 1.
In what follows we shall give formulas using the central difference operators
δ 2k = ∆2k /E k which appear to be more available for numerical computations.
84 Methods for the Summation of Series
2m
Theorem 2.1.21 Let f (t) ∈ C(−∞,∞) with bounded derivative f (2m) (t) in
P∞
(−∞, ∞) and let k=0 f (k)xk be convergent for |x| < 1. Then for x ∈ (0, 1),
we have
N
X −1 m−1
X k+1
x
f (k)xk = δ 2k φ(1) − xδ 2k φ(0) + ρm , (2.41)
(1 − x)2
k=M k=0
X
m−1
n + k 2k
n + k − 1 2k
φ(n) = δ φ(1) − δ φ(0)
2k + 1 2k + 1
k=0
n + m − 1 (2m)
+ φ (ξn ),
2m
X∞ !
n + m − 1 xm+1
ρm = φ(2m) (ξ) xn = φ(2m) (ξ) ,
n=0
2m (1 − x)2m+1
Remark 2.1.23 The uniform boundedness conditions for f (m) (t) in [0, ∞)
as well as for f (2m) (t) in (−∞, ∞) imply that xN f (m) (N + ξ) → 0 and
xN f (2m) (N + ξ) → 0 as N → ∞ and 0 < x < 1. Thus, if in addition,
xN f (k) (N ) = o(N ) (N → ∞, 0 ≤ k ≤ m − 1), then (2.39) and (2.40) yield
∞
X m−1
X αk (x) αm (x)
f (k)xk = xM f (k) (M ) + xM f (m) (M + ξ) . (2.45)
k! m!
k+M k=0
Similar consequences from Theorems 2.1.21 and 2.1.22 may also be deduced by
providing additional conditions such as xN δ 2k f (N ) → 0 (N → ∞, 0 < x < 1).
The q-operators above are linear and satisfy some familiar identities, for
example, Eq = 1 + ∆q . The binomial identity
n
X
n
∆nq = (−1) n−k
Eqk (2.47)
k
k=0
In other words, this formal power series gives the operator Eq−1 . Stated dif-
ferently,
X∞
−1 −1
(1 + ∆q ) = (Eq ) = Eq = −1 (−1)n ∆nq , (2.48)
n=0
which is exactly the result we should expect. We may establish the following
identities in similar fashion:
∞
X
(1 − ∆q )−1 = ∆nq , (2.49)
n=0
∞
X (−1)n+1 n
log(1 + ∆q ) = ∆q = Lq , (2.50)
n=1
n
X∞
Lq 1 n
e = Lq = Eq . (2.51)
n=0
n!
Proposition
P 2.1.24 Let F (t) have the formal power series expansion F (t) =
fk tk , with coefficients possibly dependent on q. We may obtain operational
k≥0
formulas according to the following rules:
1. The substitution t 7→ Eq leads to the symbolic formula
∞
X
F (Eq ) = fk Eqk . (2.53)
k=0
where Ak (x) is the kth Eulerian polynomial. Additionally, (2.32) gives the
formula (cf. also [210], P. 24)
∞
X tk
(1 − xet )−1 = αk (x) . (2.57)
k!
k=0
Theorem 2.1.25 Let Eq , ∆q , and Lq be the operators defined before, and let
αk (x) denote the Eulerian fraction. Then we have the q-analog of (2.2) shown
in (2.58). If x =
6 0 and x =
6 1, we have the following q-analog of (2.1), (2.3),
and (2.4):
∞
X xk
(1 − xEq )−1 = ∆k , (2.59)
(1 − x)k+1 q
k=0
∞ k+1 !
X x ∆2k ∆2k
−1 q q
(1 − xEq )−1 = x − k+1 , (2.60)
(1 − x)2 Eqk Eq
k=0
∞ k+1 !
X x ∆2k
q ∆2k
q
(1 − xEq )−1 = 1+ − x k . (2.61)
k=0
(1 − x)2 Eqk−1 Eq
and a modified q-form of Gauss’s first symbolic expression (cf §127 of [141]):
∞
" 2k 2k+1 #
X x + k ∆ q x + k ∆q
Eqx = +
2k Eqk 2k + 1 Eqk+1
k=0
X∞
x + k 2k x+k 2k
= δq + ∆q δq Eq−1 . (2.63)
2k 2k + 1
k=0
q-operator expressions (2.60) and (2.61) can be proved using Lemma 2.1.26,
the first Gauss symbolic expression (2.63), and the following q-form of the
Everett’s symbolic expression (cf [141], §129), respectively.
∞
" #
X x + k ∆2k q x + k − 1 ∆2k q
x
Eq = −
2k + 1 Eqk−1 2k + 1 Eqk
k=0
Symbolic Methods 91
∞
X
x+k 2k x + k − 1 2k
= Eq δq − δq . (2.65)
2k + 1 2k + 1
k=0
Proposition
P 2.1.27 For a given analytic function f (t), define Fq (x) =
f (q k )xk . If x 6= 0 and x 6= 1,
k≥0
∞
X αk (x) k
Fq (x) = Lq f (1), (2.66)
k!
k=0
92 Methods for the Summation of Series
∞
X xk
Fq (x) = ∆k f (1), (2.67)
(1 − x)k+1 q
k=0
X∞ k+1
x
Fq (x) = (x−1 δq2k f (1) − δq2k f (q −1 )), (2.68)
(1 − x)2
k=0
X∞ k+1
x
Fq (x) = 1+ (δq2k f (q) − xδq2k f (1)). (2.69)
(1 − x)2
k=0
X X (−1)k X k
1
k k 1
(−1) = k+1
(−1)k−j
k+1 2 j=0
j j+1
k≥0 k≥0
∞
X Xk
1 j k+1
= (−1)
(k + 1)2k+1 j=0 j+1
k=0
∞
X X 1 ∞
1
= = ,
(k + 1)2k+1 k2k
k=0 k=1
Letting t 7→ Lq gives
X
fk Lkq = F (Lq , Eq , Eqα ).
k≥0
Eq + Eq−1
Lq = Lq 1 + ∆−1
q − (Eq + 1)
−1
,
Eq − Eq−1
we obtain another operational formula
X 4k
−1 + B2k L2k−1
q + (Eq + 1)−1 = ∆−1
q ,
(2k)!
k≥0
where the values of potential Bell polynomials at (1/2, 1/2, . . .) are defined by
∞
X
x (x) 1 1 (x)ℓ
2 Pk , ,··· , = ℓk . (2.80)
2 2 ℓ!
ℓ=0
Proof.
The proof of (2.76) is straightforward:
x
∆q
(1 + Eq )x = (2 + ∆q )x = 2x 1 +
2
X (x)k
= 2x ∆k .
k!2k q
k≥0
Symbolic Methods 95
Using (2.80), we may write the part in the parenthesis of the rightmost term
(x)
as 2x Pk (1/2, 1/2, . . .) to finish the proof.
P
For a given analytic function f (t), define Fq (x) = f (q k )(x)k /k!, from
k≥0
(2.76)–(2.79) we obtain series transformation formulas by simply applying
(2.76)–(2.79) to f .
∞
X (x)k
Fq (x) = 2x ∆k f (1), (2.81)
2k k! q
k=0
∞
X x
Fq (x) = [ 2 F1 (k − x, 2k + 1; k + 1; −1)
k
k=0
x−k −1 2k
+ F
2 1 (k + 1 − x, 2k + 2; k + 2; −1) Eq ∆q δq f (1),
k+1
(2.82)
96 Methods for the Summation of Series
∞
X
x
Fq (x) = 1+ [ 2 F1 (k + 1 − x, 2k + 2; k + 2; −1) Eq
k+1
k=0
x−k−1 2k
− 2 F1 (k + 2 − x, 2k + 2; k + 3; −1) δq f (1), (2.83)
k+2
∞
X k
(x) 1 1 Lq
Fq (x) = 2x Pk , ,··· , f (1). (2.84)
2 2 k!
k=0
The operator Φ(xE) = Φ(x + x∆) = Φ(xeD ) can be expressed as some power
series involving operators ∆k or Dk ’s. Then it may be possible to compute
the right-hand side of (2.86) by means of operator-series in ∆k or Dk ’s. This
idea could be readily applied to various elementary functions Φ(t). Indeed, if
we take Φ(t) to be any of the following functions
where
mp
X
p!(−mt)p Qp r (m, x, y, t) = nr tn Pn (m, x, y, p, mxt − ytm ) (1 ≤ p ≤ r).
n=0
Am (x)
αm (x) = (x =
6 −1), (2.89)
(1 − x)m+1
In order to express some new formulas for certain general types of power
series, we need to introduce an extension of Euler fraction associated with an
infinitely differentiable function g(x) defined as
m
X
m
Am (x, g(x)) := g (j) (x)xj , (2.91)
j=0
j
where g (j) (x) is the j-th derivative of g(x). Obviously, αm (x) defined by (2.89)
can be represented as
Am (x)α
Am (x, α) ≡ Am (x, (1 + x)α ) =
(1 + x)m−α
n o
Xm j! m xj
α j
= (x =
6 −1), (2.92)
j=0
j (1 + x)j−α
Symbolic Methods 99
Ãm (x)α
Ãm (x, α) ≡ Am x, (1 − x)−α−1 =
(1 − x)α+m+1
n o
Xm j! m xj
α+j j
= α+j+1
(x 6= 1). (2.93)
j=0
j (1 − x)
These may be called, respectively, the 1st kind and 2nd kind of generalized Eu-
lerian fractions. Correspondingly Am (x, α) and Ãm (x, α) are called the mth
degree generalized Eulerian polynomials, having explicit expressions as fol-
lows:
Xm
α m
Am (x, α) = j! xj (1 + x)m−j , (2.94)
j=0
j j
Xm
α+j m
Ãm (x, α) = j! xj (1 − x)m−j . (2.95)
j=0
j j
∞
X ∞
X
1 (k) xk
g(xE)f (t)|t=0 = g (0) (xE)k f (t) t=0
= f (k)g (k) (0) .
k! k!
k=0 k=0
100 Methods for the Summation of Series
Remark 2.2.3 The series transformation formulas (2.96) and (2.97) could
have numerous applications by setting different infinitely differentiable func-
tions for g(x). For examples, we have
∞
X ∞
X xk
f (k)xk = ∆k f (0) (g(x) = (1 − x)−1 ), (2.98)
(1 − x)k+1
k=0 k=0
∞
X ∞
X αk (x) k
h(k)xk = D h(0) (g(x) = (1 − x)−1 ), (2.99)
k!
k=0 k=0
∞
X ∞
X
α k α xk
f (k)x = ∆k f (0)
k k (1 + x)k−α
k=0 k=0
(g(x) = (1 + x)α ), (2.100)
Symbolic Methods 101
X∞ ∞
X
α+k k α+k xk
f (k)x = ∆k f (0)
k k (1 − x)α+k+1
k=0 k=0
(g(x) = (1 − x)−α−1 ),
∞
X ∞
X
f (k)xk xk k
= ex ∆ f (0) (g(x) = ex ), (2.101)
k! k!
k=0 k=0
X∞ X1 ∞ k
f (k)xk x
= −f (0) ln(1 − x) + ∆k f (0)
k k 1−x
k=1 k=1
(g(x) = − ln(1 − x)), (2.102)
X∞ X∞
α Ak (x, α) k
h(k)xk = D h(0) (g(x) = (1 + x)α ), (2.103)
k k!
k=0 k=0
X∞ X ∞
α+k Ãk (x, α) k
h(k)xk = D h(0)
k k!
k=0 k=0
(g(x) = (1 − x)−α−1 ), (2.104)
∞
X ∞
X
k k k+m xk+m
f (k)x = ∆k f (m)
m m (1 − x)k+m+1
k=m k=0
(g(x) = (1 − x)−m−1 ), (2.105)
∞
X X∞
k Ãk (x, m)xm k
h(k)xk = D h(m)
m k!
k=m k=0
(g(x) = (1 − x)−m−1 ), (2.106)
∞
X ∞
X
(−1)k f (2k + 1)x2k+1 k 2k 2k
(−1) x ∆ f (0)
= sin x
(2k + 1)! (2k)!
k=0 k=0
∞
X (−1)k x2k+1 ∆2k+1 f (0)
+ cos x (g(x) = sin x), (2.107)
(2k + 1)!
k=0
∞
X ∞
X
(−1)k f (2k)x2k (−1)k x2k ∆2k f (0)
= cos x
(2k)! (2k)!
k=0 k=0
∞
X (−1)k+1 x2k+1 ∆2k+1 f (0)
+ sin x (g(x) = cos x), (2.108)
(2k + 1)!
k=0
∞
X ∞ ∞
f (2k)x2k ex X xk ∆k f (0) e−x X (−x)k ∆k f (0)
= + , (2.109)
(2k)! 2 k! 2 k!
k=0 k=0 k=0
X∞ ∞ ∞
f (2k + 1)x2k+1 ex X xk ∆k f (0) e−x X (−x)k ∆k f (0)
= − ,
(2k + 1)! 2 k! 2 k!
k=0 k=0 k=0
(2.110)
102 Methods for the Summation of Series
where (2.109) and (2.110) are obtained by replacing g(x) by ex and e−x and
adding and subtracting the resulting formulas, respectively.
Note that (2.98) and (2.99) are well-known and have been utilized to con-
struct summation formulas with estimable remainders. See, e.g., He, Hsu,
Shiue, and Torney [99]. The particular cases of (2.100) with α = m (m ∈ N)
and of (2.101) with f (x) denoting a rth degree polynomial of x have been
expounded in Problems (1109) and (1110) of Jolley’s book [139]. The rest of
the above list appears to be not easily found in literatures, and the formulas
(2.103)–(2.106) are believed to be first introduced in [106].
Apparently, (2.98) is implied by (2.100) (with α = −1, x 7→ −x) and
(2.101) (with α = 0). Also, (2.99) is a particular case of (2.103) (with α = −1,
x 7→ −x) and a particular case of (2.104) (with α = 0). Moreover, it is easily
observed that (2.105) and (2.106) can be derived from (2.101) and (2.104),
respectively, by substituting α = m, applying operator E m , and multiplying
xm on the both sides of the former two formulas, respectively.
The transformation formulas given in the list is useful for accelerating
convergence of power series because ∆k f (0) and Dk f (0) decreases to zero
rapidly as k → ∞.
Remark 2.2.4 From (2.88) we can derive Gegenbauer type series transfor-
mation formulas. For examples, we consider
∞
X (λ)
Φ(t) = (1 − 2zt + t2 )−λ = Ck (z)tk ,
k=0
(λ)
the GF of Ck (z) ≡ Pk (2, z, 1, λ), where Pk (2, z, 1, λ) was shown in (2.88),
(1) (1/2)
and Ck (z) = Uk (z) and Ck (z) = ψk (z) are respectively the 2nd kind
Chebyshev and Legengre polynomials. Using the same argument to derive
(2.101) we obtain the following Gegenbauer type series transformation for-
mula
∞
X (λ)
Φ(xE)f (0) = Ck (z)xk f (k)
k=0
X∞ X ∞
λ+i−1 λ+j−1
= (z + δ)i (z − δ)j xi+j f (i + j)
i=0 j=0
i j
X∞ X ∞
λ+i−1 λ+j−1
= (1 − 2zx + x2 )−λ
i=0 j=0
i j
(z + δ)i (z − δ)j xi+j
× ∆i+j f (0). (2.111)
(1 − z + δ)x)i (1 − (z − δ)x)j
These are known as Euler’s series transformation formula and its analog,
which may sometimes be used to convert slowly convergent series into rapidly
convergent ones.
Example 2.2.7 From (2.100) and noting (2.89) and (2.90), we obtain the
sum of the Euler’s arithmetic-geometric series
∞ p p
X X xk ∆k tp t=0 X k! kp xk
p k
k x = = = αp (x),
(1 − x)k+1 (1 − x)k+1
k=0 k=0 k=0
where αp (x) is known as Eulerian fraction (see Wang and Hsu [210]).
Example 2.2.8 In (2.100) taking α = n, f (t) = jt , a jth degree polynomial
so that f (k) = kj , we get
X n j
n k k X n xν ν t
x = ∆
k j ν=0
ν (1 + x)ν−n j t=0
k=0
j
X n X n
j
xν t xν
= = δjν
ν=0
ν (1 + x)ν−n j − ν t=0 ν=0 ν (1 + x)ν−n
n j
= x (1 + x)n−j ,
j
where we use ∆k rt t=0 = r−k t
t=0
0
= r−k = δrk , the Kronecker symbol. This
is (3.118) of the Gould’s book [73].
Consequently,
X∞
α+k k 1 α + r α+1
= 2 .
k r 2k r
k=r
Similarly, for f (t) = rt , (r ∈ N0 ), from (2.101) and (2.102) and (2.109)
and (2.110) we obtain, respectively,
∞ k
X k x xr
= ex ,
r k! r!
k=0
X∞ r
k xk 1 x
= − log(1 − x) + (r ≥ 1),
r k r 1−x
k=1
X∞ 2k
2k x ex xr e−x (−x)r
= + ,
r (2k)! 2 r! 2 r!
k=0
X∞ 2k+1
2k + 1 x ex xr e−x (−x)r
= − .
r (2k + 1)! 2 r! 2 r!
k=0
∞
X ∞ k
k p k X k+j xk+j X
k−i k
k x = (−1) (i + j)p .
j j (1 − x)k+j+1 i=0 i
k=0 k=0
X∞ X∞
1 k 1
∆ W (1)xk = e−x W (k + 1)xk
k! k!
k=0 k=0
!
d ex −1
∞
X
−x d 1 k+1
= e W (k + 1)x = e−x e −1
dx (k + 1)! dx
k=0
∞
X
x 1
= ee −1
= W (k)xk .
k!
k=0
This leads to
∞
X r n o
X
kr r
e−1 = = W (r).
k! k
k=0 k=0
This is the well-known formula of Dobinski for the Bell number W (r), the
number of all possible partition of a set with r distinct elements.
108 Methods for the Summation of Series
ex X n r o k e−x X n r o
X∞ r r
(2k)r x2k
= x + (−x)k ,
(2k)! 2 k 2 k
k=0 k=0 k=0
e X n r o k e−x X n r o
X∞ r 2k+1 r x r
(2k + 1) x
= x − (−x)k .
(2k + 1)! 2 k 2 k
k=0 k=0 k=0
Since S(0, 0) = 1 and S(0, k) = 0 for all k ≥ 1, the particular case r = 0 gives
the well-known expression
n
X n
Bn (x) = Bn−k xk .
k
k=0
Of course the
right-hand side of (2.125) can be regarded as a generating func-
tion of { nk Bn−k k r }nk=0 .
In addition, taking f (t) = Bn (t) in (2.103) and (2.104), respectively, we
easily obtain
∞
X X n
α n
Bn (k)xk = Ak (x, α)Bn−k , (2.126)
k k
k=0 k=0
X∞ Xn
α+k k n
Bn (k)x = Ãk (x, α)Bn−k . (2.127)
k k
k=0 k=0
Recalling that Ãk (x, 0) = αk (x) (the ordinary Eulerian fraction), we can find
that the last identity implies (with α = 0)
∞
X n
X n
Bn (k)xk = αk (x)Bn−k . (2.128)
k
k=0 k=0
Surely similar identities of some interest may be found for other classical
special polynomials.
Example 2.2.17 Let λ and θ be any real numbers. The generalized falling
factorial (t + λ|θ)p is usually defined by
(t + λ|θ)p = Πp−1
j=0 (t + λ − jθ) for p≥1 and (t + λ|θ)0 = 1.
110 Methods for the Summation of Series
X∞ Xp
α k α k!S(p, k, λ|θ)xk
(k + λ|θ)p x = , (2.129)
k k (1 + x)k−α
k=0 k=0
X∞ p
X
α+k α + k k!S(p, k, λ|θ)xk
(k + λ|θ)p xk = . (2.130)
k k (1 − x)α+k+1
k=0 k=0
Thus we obtain
( )
3
k
GF =
m
m X
X m
k+m k+m m k+m xk+m+j
.(2.133)
j=0
k j k k + j (1 − x)k+m+j+1
k=0
n n o
k
A similar process can be applied to find GF m for n = 4, 5 · · · . How-
P∞ k ℓ k
ever, we have not yet known the closed form of k=0 m x for general ℓ.
Example 2.2.19 Suppose that φ(t) is an integral polynomial, namely, all its
coefficients (including the constant term) are integers. It is easily seen that
∆k φ(0)/k! (k = 0, 1, 2, · · · ) are integers as well. In fact, each term
m am t
m
k m
(m ≥ 0) of φ(t) has a difference at zero: ∆ am t t=0 = am k! k with
0
0 = 1 and m k = 0 (k > m). So ∆k φ(0)/k! is a linear combination of
Stirling numbers of P the second kind with integer coefficients. Thus formula
∞
(2.119) implies that k=0 φ(k)xk /k! is equal to ex multiplying by an integral
polynomial. In particular, for x = 1, this implies that
φ(0) φ(1) φ(2) φ(k)
+ + + ···+ + ···
0! 1! 2! k!
is an integral multiple of e.
where Re(z) and Im(z) denote, respectively, the real part and imaginary part
of the complex number z. Obviously (2.134) and (2.135) could be specialized
in various ways.
was first investigated by Glaisher [67] and [68] in 1911-1912, and he found
a summation formula by using Bernoulli numbers. Some further investiga-
tions and extensions were given, during the years 1977-1978, by Neumann-
Schonbach [169], Carlitz [30] and Gould [74], respectively, in which Eulerian
numbers as well as Stirling numbers of the second kind had been utilized.
Various numerical examples were also represented by Gould[74].
by ∂f and ∂fi , respectively. We are concerned with the problem for the com-
putation of convolved polynomial sums of the type
X
S(m, [f1 ] · · · [fn ]) : = f1 (x1 ) · · · fn (xn ) (2.137)
(m;n;0)
where m is any given positive integer, and the sum on the RHS of (2.137) is
taken over all the n-compositions of m with non-negative integer components,
namely, over the set (m; n; 0) of all integer solutions of x1 + · · · + xn = m with
each xi ≥ 0 (i = 1, · · · , n), i.e.,
n
X
(m; n; 0) = {(x1 , x2 , . . . , xn ) : xi = m, xi ≥ 0}.
i=1
n
If f1 = f2 = · · · = fn , we denote the corresponding S(m, [f1 ] · · · [fn ]) by Sm (f )
and call it the n-fold convolution, namely,
X
n
Sm (f ) := f1 (x1 ) · · · fn (xn ). (2.138)
(m;n;0)
∂f
X
∗
Λ (E, f ) := ∆k f (−k − 1)E k . (2.140)
k=0
we have
∂f
X X ∂f Xk
k
∆k f (0)∆k = (−∆)k f (0) (−E)j
j
k=0 k=0 j=0
X∂f ∂f
X
k
= (−∆)k f (0) (−E)j ,
j=0
j
k=j
where the inner terms of the rightmost summation can be simplified as follows
because f is a polynomial of k-th degree:
∞
X ∞
X
k k+j
(−∆)k f (0) = (−∆j ) (−∆)k f (0)
j j
k=j k=0
j
(−∆)
= f (0) = (−∆)j E −j−1 f (0).
(1 + ∆)j+1
Hence by substitution we get
∂f
X ∂f
X
∆k f (0)∆k = (−∆)j E −j−1 f (0)(−E)j ,
k=0 j=0
Proof. It suffices to verify (2.141) since (2.142) ⇔ (2.141). Let us recall that
there is a well-known identity in Combinatorics, namely
X x1
xn m+n−1
··· = (2.143)
v1 vn m − (v1 + · · · + vn )
(m;n;0)
Symbolic Methods 115
x x
x
∆v = for 0 ≤ v ≤ m and ∆v =0 for v > m.
m m−v m
Thus the RHS of (2.143) may be expressed in the form
x
m+n−1
= ∆v1 · · · ∆vn . (2.144)
m − (v1 + · · · + vn ) m x=m+n−1
Consequently, employing Newton’s formula for f (x) and making use of (2.143)-
(2.144), one may compute the LHS of (2.141) as follows
X Yn X∂fi !
xi
S(m, [f1 ] · · · [fn ]) = ∆vi fi (0)
i=1 v =0
vi
(m;n;0) i
∂fi
X ∂fn
X n
X Y
xi
= ··· ∆vi fi (0) · · · ∆vn fn (0)
vi =0 vn =0
vi
(m;n;0) i=1
∂fi
X ∂fn
X x
= ··· (∆v1 fi (0)∆v1 ) · · · (∆vn fn (0)∆vn )
vi =0 vn =0
m x=m+n−1
!
n
Y ∂fi
X x
= ∆vi fi (0)∆v1
i=1 vi =0
m x=m+n−1
!
n
Y x
= Λ(∆, fi )
i=1
m x=m+n−1
Corollary 2.3.4 For the case f1 (x) = · · · = fn (x) = f (x) there are summa-
tion formulas for S(m, [f ]n ) :
X x
f (x1 ) · · · f (xn ) = (Λ(∆, f ))n , (2.145)
m x=m+n−1
(m;n;0)
X x
f (x1 ) · · · f (xn ) = (Λ∗ (E, f ))n . (2.146)
m x=m+n−1
(m;n;0)
Λ(∆, x2 ) = ∆ + 2∆2 ,
Λ(∆, x3 ) = ∆ + 6∆2 + 6∆3 ,
Λ(∆, x4 ) = ∆ + 14∆2 + 36∆3 + 24∆4 .
Consequently, we obtain
Λ(∆, x2 )Λ(∆, x3 )Λ(∆, x4 ) = ∆3 (1 + 2∆)2 (1 + 6∆E)(1 + 12∆E)
= ∆3 (1 + 4∆E)(1 + 6∆E)(1 + 12∆E)
= ∆3 (1 + 22∆E + 144(∆E)2 + 288(∆E)3 ).
X
m+6 1
x11 · x22 · x33 · x44 = 288 (1 + O( )), m → ∞.
13 m2
(m;n;1)
(2.155)
Certainly, these formulas are especially useful when m is much bigger than
n. Note that (2.153) and (2.154) have appeared previously [168, 150] and
that (2.155) could be replaced by a formula of similar nature via the operator
Λ(∆, x4 ) = ∆n (∆ + E)n (1 + 12∆E)n . However it appears to be impossible to
get a simpler formula consisting of (n + 1) terms for the sum of (2.155).
118 Methods for the Summation of Series
Remark 2.3.8 Having correctly defined S(m, [f1 ] · · · [fn ]) as that of (2.137),
one may verify that the following formulas given by Lemmas 3 and 4 of [150]
(viz. (4)’ and (6) of [150])
X m+n−1
β0p0 β1p1 · · · βkpk
n
S(m, [f ] ) = n!
1 · p1 + · · · + k · pk + n − 1 p0 !p1 ! · · · pk !
(m;n;0)
(2.156)
1 X
S(m, [f1 ] · · · [fn ]) = (−1)n−k S(m, [fv1 + · · · + fvk ]n )
n!
(v1 ···vk )∈(1···n)
(2.157)
are logically equivalent to (2.145) and (2.141), respectively, wherein f (x) has
the degree ∂f = k, βi may be rewritten as ∆i f (0)(i = 0, 1, . . . , k), and the
summation on the RHS of (3.1) is taken over all the (k + 1)-compositions
of n, viz. p0 + · · · + pk = n with each pi ≥ 0; and the RHS summation of
(3.2) is over all the different combinations (sub-sets) v1 , · · · , vk out of the set
{1, . . . , n} (k = 1, . . . , n).
Also, for every given set {v1 , . . . , vk } ⊂ {1, . . . , n}, it is obvious that the sum-
mand within the summation of (2.157) may be expressed in the following forms
where the last summation is taken over all the subsets of {p1 , . . . , pt } of
{v1 , . . . , vk } (t = 1, . . . , k, ) and all the compositions (n; 1; q). Certainly the
Symbolic Methods 119
general term (summand) of the last summation is contained in all such terms
of the RHS summation of ( 2.157 ) that {p1 , . . . , pt } ⊂
{v1 , . . . , vk } ⊂
n−t
{1, . . . , n}. The number of occurrences is obviously k−t . Thus the total
number of occurrences in the RHS summation of ( 2.157 ) is given by
n
X
n−t 0. t < n,
(−1)n−k = (1 − 1)n−t =
k−t 1, t = n.
k=t
This means that the general term vanishes except that t = n so that k =
n, {p1 , . . . , pt } = {v1 , . . . , vk } = {1, . . . , n},, and q1 = · · · = qn = 1. Conse-
quently, we get
x
RHS of (2.157) = Λ(∆, f1 ) . . . Λ(∆, fn )
m x=m+n−1.
Hence, as a conclusion we may say that Lemmas 3 and 4 of [120] are implicitly
involving (2.141), and the deduction of (2.141) from (2.157) plus (2.156) may
be regarded as a different proof for(2.141).
Remark 2.3.9 Observe that for n ≥ 3 the summation on the LHS of (2.147)
may be rewritten as
X p pn−1
S(m, [xp1 ] . . . [xpn ]) = x11 · · · xn−1 (m − x1 − · · · − xn−1 )pn
where the RHS summation extends over all the non-negative integers
x1 , . . . , xn−1 such that x1 + · · · + xn−1 ≤ m. Apparently, such a sum may
be viewed as a discrete analog of the Dirichlet multiple integral
Z Z
αn−1
· · · tα
1 · · · tn−1 (1 − t1 − · · · − tn−1 )
1 αn
dt1 · · · dtn−1
S
Γ(α1 + 1) · · · Γ(αn + 1)
= ,
Γ(α1 + · · · + αn + n)
S : t1 ≥ 0, . . . , tn−1 ≥ 0, t1 + · · · + tn−1 ≤ 1,
where Bk (x) is the k−th degree Bernoulli polynomial defined by the expansion
X ∞
text tk
t
= Bk (x) , |t| < 2π, (2.158)
e −1 k!
k=0
Xk !n
k − 1 x
S(m, [Bk ]n ) = Bk + k (v − 1)! ∆v . (2.160)
v=1
v − 1 m x=m+n−1
Certainly, this is a useful formula when m is much bigger than k and n. Also,
an application of (2.145) with n = 2 yields the formula
X Xp !
p−1
Bp (x1 )Bq (x2 ) = Bp + p (v − 1)! ∆v
v=1
v − 1
(m;n;0)
!
q
X q−1 x
µ
Bq + q (µ − 1)! ∆ (2.161)
µ=1
µ−1 m x=m+1
Example 2.3.11 It is known that the Bernoulli polynomial of the second kind
of degree may be written as (see §89 of [141]).
Z 1
x+t
Ψk (x) = dt. (2.162)
0 k
and
! !
X p
X q
X x
p−v q−µ
Ψp (x1 )Ψq (x2 ) = bv ∆ bµ ∆ , (2.165)
v=0 µ=0
m x=m+1
(m;n;0)
respectively.
Xk k−v
1 x
ξk (x) = − . (2.166)
v=0
2 v
This implies that ∆v ξk (0) = ( 12 )k−v . Consequently, (2.141) and (2.145) with
n = 2 yield the following special formulas
k v !n
X 1 x
n k−v
S(m, [ξk ] ) = − ∆ (2.167)
v=0
2 m x=m+n−1
and
p v ! !
X X 1
q
X 1 x
ξp (x1 )ξq (x2 ) = − ∆p−v (− )µ ∆q−µ ,
v=0
2 µ=0
2 m x=m+1
(m;n;0)
(2.168)
respectively.
122 Methods for the Summation of Series
Actually this follows from the expansion of ((1 + t)/(1 − t))x1 +···+xn in terms
of tm , and may be called the convolution “in degrees”.
On the other hand, the summation (with fixed k ≥ 1)
X
S(m, [(M L)k ]n ) = (M L)k (x1 ) · · · (M L)k (xn ) (2.171)
(m;n;0)
should be properly called the convolution “in arguments”. Let us now evaluate
(2.171) and the following sum
X
S(m, [(M L)p ][(M L)q ]) = (M L)p (x1 ) · (M L)q (x2 ) (2.172)
(m;n;0)
X x X v+j−1
k
X
k−1
x
= 2v [tk−v ] tj = 2v .
v j v=1
v−1 v
v≥0 j≥0
k−1
Consequently, we have ∆v (M L)k (0) = 2v v−1 and we get
!n
k
X k−1 x
v v
RHS of (2.171) = 2 ∆ (2.173)
v=1
v−1 m x=m+n−1
and
! !
p
X p−1
q
X q−1 x
v v µ
RHS of (2.172) = 2 ∆ 2µ ∆
v=1
v−1 µ=1
µ−1 m x=m+1.
(2.174)
Symbolic Methods 123
form a simple special Riordan matrix (cf. Definition 3.2.3 and Section
4.3) whose elements may be called modified Stirling-type numbers, since
(k!/j!)s(k, j, φ1 ) just give the two kinds of ordinary Stirling numbers by taking
φ1 (t) = log(1 + t) and φ1 (t) = et − 1, viz.
k! k! k
s(k, j, log(1 + t)) = S1 (k, j), s(k, j, et − 1) = S2 (k, j) = .
j! j! j
We may now state the following theorem.
Theorem 2.3.14 There holds a summation formula for the convolution in
arguments of the form
! Yn Xki x
x x
S m, ··· = s(ki , j, φ1 )∆j
k1 φ kn φ i=1 j=0
m x=m+n−1
(2.180)
where s(k, j, φ1 ) are given by (2.179).
In particular we have
!n
k
X x
n v
S(m), [Tk ] ) = δ(k, v)∆ . (2.185)
v=0
m x=m+n−1
Certainly, (2.184) and ( 2.185) could be used to get the exact numerical
results whenever k1 , . . . , kn , k, and m are given concretely.
X X
p1 pn m+n−1
xp11 · · · xpnn = v1 ! · · · vn ! ···
1≤vi ≤pi
v1 vn m − v1 − · · · − vn
(m;n;1)
1≤i≤n
126 Methods for the Summation of Series
We now define fold convolutions from (2.137) for the same functions fi (x).
Definition 2.3.17 Let f (x) be a real-valued or complex-valued function de-
fined on N0 with f (0) = 1. Then the k-fold convolution and the n/k-partition
sum associated with f (x) are respectively defined by the following summations:
X
Snk (f ) = f (x1 )f (x2 ) · · · f (xk ), (2.186)
(n;k;0)
X f k1 (1)f k2 (2) · · · f kn (n)
Tnk (f ) = , (2.187)
k1 !k2 ! · · · kn !
σ(n,k)
where the sums on the right-hand sides of (2.186) and (2.187) range over the
sets (n; k; 0) and σ(n, k), respectively.
Note that (n; k; 0) and σ(n, k) have no meaning for k = 0. For conve-
nience, we define Sn0 (f ) = Tn0 (f ) = 0, and thereby have sequences (Snk (f ))n,k≥0
and (Tnk (f ))n,k≥0 . Also it is obvious that Sn1 (f ) = f (n), S1k (f ) = kf (1) and
Tn1 (f ) = f (n) for n ≥ 1 and T1k (f ) = 0 for k > 1. Moreover, it is easy to see
that the RHS of (2.187) with replacement f (n) → tn (n ∈ N) is in agreement
with the incomplete Bell polynomial in ti (1 ≤ i ≤ n), up to a constant factor
n! (cf. Comtet [44]). P k
In what follows we assume that G = k≥0 g(k)t ∈ C[[t]], the ring of
formal power series in the complex field. As usual, G(k) (t) = Dk G(t) denotes
the kth formal derivative of G(t).
Symbolic Methods 127
where (n, m, 0)k denotes the subset of (n, m, 0), being composed of all com-
positions (x1 , x2 , . . . , xm ) of n with just k components xi ≥ 1. In other words,
there are m − k components xi = 0 in (x1 , x2 , · · · , xm ). Recall that f (0) = 1
m
and such factors will take m − k ordered places in m−k = m k different
ways. Meanwhile, the number of all possible permutations of the factors in
the product f k1 (1)f k2 (2) · · · f kn (n) over the set σ(n, k) is enumerated by
k!/(k1 !k2 ! · · · kn !). Thus the sum (2.191) boils down to
X
m k!
f k1 (1)f k2 (2) · · · f kn (n) = (m)k Tnk (f ).
k k1 !k2 ! . . . kn !
σ(n,k)
The last equality follows from the fact that Tnk (f ) = 0 for k > n. This com-
pletes the proof of (2.190).
Put G(t) = 1/(1 − t) for |t| < 1 and et for t ∈ R in (2.190) in succession.
Then we may get the following result.
Corollary 2.3.19 For n ∈ N, the sequence (Snk (f ))k≥0 has the ordinary and
exponential generating functions, respectively, as follows:
∞
X n
X k
k! t
Snk (f )tk = Tnk (f ), (2.192)
1−t 1−t
k=0 k=1
X∞ X n
tk
Snk (f ) = et Tnk (f )tk . (2.193)
k!
k=0 k=1
by substituting f (t) = Snt (f ) and g(t) = G(t) and simplifying the resulting
identity, we may also obtain (2.190).
Proof. Comparing the LHS of (2.190) with G(t) and using Cauchy’s root test
for the convergence of infinite series, we only need to show that for n ∈ N,
x1 + x2 + · · · + xk = n (2.194)
contains at most n factors f (xi ) with xi ≥ 1. Owing to the facts that f (0) = 1
and |f (x)| < ρ for x 6= 0, it follows directly that |f (x1 )f (x2 ) · · · f (xk )| ≤ ρn .
Symbolic Methods 129
Meanwhile, the total number of such terms is n+k−1 n , a fact coming from
the number of solutions in non-negative integers for the Diophantine equation
(2.194). Thus we have
k n+k−1
Sn (f ) ≤ ρn ,
n
leading to
1/k
1/k n+k−1
lim Snk (f ) ≤ lim ρn = 1.
k→∞ k→∞ n
Hence the theorem is proved.
Corollary 2.3.22 Identity (2.192) is analytic for |t| < 1 and so is (2.193)
for |t| < +∞.
Example 2.3.25 Setting G(t) = (1 + t)α for α ∈ R and |t| < 1 and substi-
tuting it into (2.190) yields (see Exercise 2.10)
X∞ n
X
α k tk
Sn (f )tk = (α)k T k (f ). (2.197)
k (1 + t)k−α n
k=0 k=1
Obviously, both (2.197) and (2.198) are valid for |t| < 1. It is also clear that
(2.192) can be deduced from (2.197) via the substitutions α → −1 and t → −t.
Actually condition (2.203) also ensures the validity of formula (2.201) inas-
much as it is just equivalent to the condition (see Example 2.3.23)
1/k
1 k 1
lim ∆ φ(0) < .
k→∞ 4k 4
Moreover, Corollary 2.3.22 states that (2.202) is an exact formula under the
condition
1/k
lim Dk φ(0) < +∞. (2.204)
k→∞
1/k
It may happen that limk→∞ ∆k φ(0) = 1. As such, the convergence con-
ditions for (2.199), (2.200), and (2.201) should be investigated separately.
As one might expect, all formulas from (2.199) to (2.202) can be employed
to produce various special formulas and identities, because that f (x) and φ(t)
are free to choose. In what follows we will detail how to find concrete identities
by considering some interesting examples.
Example 2.3.26 Substitute φ(t) by φ1 (t) = t+β m and φ2 (t) = 1/(t + β) in
turn, m ∈ N+ and β > 0. Then we have
−1
k t+β k (−1)k t + β + k
∆ φ1 (t) = , ∆ φ2 (t) = .
m−k t+β k
−1
From now on, we write briefly t+β+kk for 1/ t+β+k
k . Under these two
choices, it is easy to deduce the following six formulas, respectively from
(2.199), (2.200), and (2.201):
m
X Xn
α β α+β−k
Snk (f ) = (α)k Tnk (f ), (2.205)
k m−k m−k
k=0 k=1
Xm Xn
k α+k β k k β−α−k−1 k
(−1) S (f ) = (−1) (α + k)k Tn (f ),
k m−k n m−k
k=0 k=1
(2.206)
m
X n
X (−1)k (2k)! β − k − 1/2
(−1)k 2k β
k
Snk (f ) = Tnk (f ),
4 k m−k 4k k! m−k
k=0 k=1
(2.207)
132 Methods for the Summation of Series
∞
X −1 n
X −1
k α β+k k (−1)k (α)k α + β
(−1) Sn (f ) = β Tnk (f ),
k k α+β−k k
k=0 k=1
(2.208)
∞
X −1 n
X (α + k)k −1
α+k β+k β−α−1
Snk (f ) = β Tnk (f ),
k k β−α−k−1 k
k=0 k=1
(2.209)
∞
X −1 n
X
1 2k β + k (2k)! β − 1/2 k
k
Snk (f ) = β k
Tn (f ).
4 k k 4 k!(β − k − 1/2) k
k=0 k=1
(2.210)
We remark that all infinite series involved in (2.208), (2.209), and (2.210)
are assumed to be convergent under suitable conditions for α, β and Snk (f ).
Example 2.3.27 The most simple case of Snk (f ) is when n = 1 with f (1) = 1.
In such a case, it is easy to check that
S1k (f ) = k, T11 (f ) = 1, T1k (f ) = 0 for k > 1.
Consequently, each identity from (2.205) to (2.210) yields correspondingly a
special identity for n = 1. The results are stated as follows:
Xm
α β α+β−1
k =α (V andermonde), (2.211)
k m−k m−1
k=0
Xm
k α β β−α−2
(−1) k = −(α + 1) , (2.212)
k m−k m−1
k=0
Xm
(−1)k k 2k β 1 β − 3/2
= − , (2.213)
4k k m−k 2 m−1
k=0
X∞ −1
α β+k αβ
(−1)k k =− , (2.214)
k k (β + α)(α + β − 1)
k=0
X∞ −1
α+k β+k (1 + α)β
k = , (2.215)
k k (β − α − 1)(β − α − 2)
k=0
X∞ −1
k 2k β+k β
k
= . (2.216)
4 k k 2(β − 1/2)(β − 3/2)
k=0
for α > 0, β ≥ 1. It is of interest to note that the special case of (2.217) when
α > 0 is integer is recorded as a “theorem” in Wilf [216, p.134,Theorem], being
employed as an example of the well-known W-Z algorithm (or WZ method).
Thus we believe that (2.214), (2.215), and (2.216) may also be verified by
means of the W-Z algorithm (cf. Subsubsection 5.3.2.2).
Example 2.3.28 By the multivariate Vandermonde convolution formula it is
easily found that for α ∈ R and r ∈ N, there hold
X α α
α
kα
··· = ,
x1 x2 xk n
[n,k,0]
X x1 x2
xk
n+k−1
··· = .
r r r kr + k − 1
[n,k,0]
Now, replace f (x) with αx and r+xr in turn. For both cases, we therefore
obtain
α kα α X α k1 α k2 · · · α kn
k k 1 2 n
Sn = , Tn = ,
x n x k1 !k2 ! · · · kn !
σ(n,k)
(2.218)
r+x k(r + 1) + n − 1
Snk = , (2.219)
r n
r+x X r+1 k1 r+2 k2 · · · r+n kn
k r r r
Tn = . (2.220)
r k1 !k2 ! · · · kn !
σ(n,k)
A bit analysis shows that this series is absolutely convergent under the suf-
ficient condition α, δ > 0, β ≥ α + n + 2. Due to space limitations, other
identities are left to the interested reader to work out.
Symbolic Methods 135
Exercises
2.1 Prove Lemma 2.1.5.
2.2 Derive the second Gauss symbolic expression and the second Gauss
interpolation formula.
2.3 Prove series transformation formulas (2.98)–(2.110).
2.4 Prove summation formulas (2.116)–(2.124).
2.5 Prove the expansion of Bernoulli polynomial Bk (x) shown in (2.159)
2.6 Prove the convolution sum (2.170).
n 1/k
2.7 Show limk→∞ n+k−1 n ρ = 1.
2.8 Accomplish Example 2.3.23 by using the hint:
(k) (2k)! 2k
G (t) = (1 − 4t)−k−1/2 , g(k) = .
k! k
k+1 k+1
1 a b k! a b
G(k) (t) = √ Dk − =√ − .
5 1 − at 1 − bt 5 1 − at 1 − bt
α
2.10 Accomplish Example 2.3.25 by noticing for G(t) = (1+t)α g(k) = k
and G(k) (t) = (α)k (1 + t)α−k .
2.11 Prove formulas (2.205)–(2.210).
2.12 Prove formulas (2.211)–(2.216).
2.13 Prove formulas (2.218)–(2.223).
3
Source Formulas for Symbolic Methods
CONTENTS
3.1 An Application of Mullin-Rota’s Theory of Binomial
Enumeration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 138
3.1.1 A substitution rule and its scope of applications . . . . . . . 138
3.1.2 Various symbolic operational formulas . . . . . . . . . . . . . . . . . . 141
3.1.3 Some theorems on Convergence . . . . . . . . . . . . . . . . . . . . . . . . . 143
3.1.4 Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 150
3.2 On a Pair of Operator Series Expansions Implying a Variety of
Summation Formulas . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 156
3.2.1 A pair of (∞4 ) degree formulas . . . . . . . . . . . . . . . . . . . . . . . . . 157
3.2.2 Specializations and examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . 160
3.2.3 A further investigation of a source formula . . . . . . . . . . . . . 168
3.2.4 Various consequences of the source formula . . . . . . . . . . . . . 171
3.2.5 Lifting process and formula chains . . . . . . . . . . . . . . . . . . . . . . 177
3.3 (Σ∆D) General Source Formula and Its Applications . . . . . . . . . . 178
3.3.1 (Σ∆D) GSF . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 178
3.3.2 GSF implies SF(2) and SF(3) . . . . . . . . . . . . . . . . . . . . . . . . . . . 182
3.3.3 Embedding techniques and remarks . . . . . . . . . . . . . . . . . . . . . 183
P
so that eD f (t) = k≥0 Dk f (t)/k! = f (t + 1) = Ef (t), (cf. Jordan [141] and
Section 2.1).
An operator T which commutes with the shift operator E is called a shift-
invariant operator (cf. for example, [168]), i.e.,
T E α = E α T,
These could be derived using the Newton interpolation series and Taylor series,
respectively. (cf. [141] § 56 and § 67).
140 Methods for the Summation of Series
Note that certain particular identities could be deduced from (3.2) and
(3.3) with particular choices of f (t) (cf. for example, [141], loc.cit).
The above description is an example of the following general substitution
rule shown in Mullin and Rota [168] (cf. also in Loeb and Rota [150]).
Theorem 3.1.1 [168] Let Q be a delta operator and let F be the ring of
formal power series in the variable t, over
P the same field, then there exists
an isomorphism from F onto the ring of shift-invariant operators, which
carries X ak X ak
f (t) = tk into f (Q) = Qk .
k! k!
k≥0 k≥0
From Theorem 3.1.1 we have the following general substitution rule for
the formal power series expansion of the functions regarding et or log(1 + t).
Substitution Rule (w. r. t. operators D andP ∆): Given a generating
function or a formal power series expansion F (t) = k≥0 fk tk , where F (t) is
expressed either in the form G(t, et ) or in the form G(t, log(1 + t)), a certain
operational formula may be obtained as follows.
(i) For the case F (t) = G(t, et ), the substitution t → D leads to the
symbolic formula
X
F (D) = G(D, 1 + ∆) = fn D k . (3.4)
k≥0
(ii) For the case F (t) = G(t, log(1 + t)), t → ∆ leads to the formula
X
F (∆) = G(∆, D) = fk ∆k . (3.5)
k≥0
Of course, (3.4) and (3.5) can be deduced from (3.1). In what follows
we display 12 generating functions for the sequences (Wk ) (Bell numbers),
(n) (−n)
(Bk ) and (Bk ) (generalized Bernoulli numbers of the orders n and −n),
(Ek (t)) (Euler polynomials), {ek = Ek (0)), (αk (t)) (Eulerian fractions) and
(Gk ) (Genocchi numbers), (φk (t)) (Bernoulli polynomials of the first kind),
(ψ(t)) (Bernoulli polynomials of the second kind), (bk ) (Bernoulli numbers of
the second kind), respectively.
Source Formulas for Symbolic Methods 141
P 1
(G1 ) exp(et − 1) = k≥0 k! Wk tk (Comtet [44], p. 210),
n P
t 1 (n)
(G2 ) et −1 = k≥0 k! Bk tk (David-Barton [50], p. 287),
t n P
e −1 1 (−n)
(G3 ) t = k≥0 k! Bk tk (cf. [50], p. 287),
xt P (1)
(G4 ) etet −1 = k
k≥0 φk (x)t , where φk (0) = Bk /k!, (Jordan [141], p.
250),
xt P
(G5 ) e2e
t +1 = k≥0 Ek (x)t
k
(Jordan [141], p. 309),
P
(G6 ) et2+1 = k≥0 ek tk , where ek = Ek (0), (cf. [141], p. 309),
1
P 1 k
(G7 ) 1−xe t = k≥0 k! αk (x)t (Wang and Hsu [210], p.24),
P
(G8 ) et2t +1 =
1
k≥0 k! Gk t
k
(Comtet [44], p. 49),
t(1+t) x P
(G9 ) log(1+t) = k≥0 ψk (x)tk (Jordan [141], p. 279),
t
P
(G10 ) log(1+t) = k≥0 bk tk , where bk = ψk (0), (cf. [141], p. 279),
1
P k
(G11 ) 1−∆−∆ 2 = k≥0 Fk ∆ , where F0 = F1 = 1 and Fk = Fk−1 + Fk−2
for k = 2, 3, . . .,
1
P φ(0) k
(G12 ) (1−t)e t = k≥0 k! t .
D(eD )x DE x
LHS(G4 ): eD −1 = ∆ ,
D x
2(e ) 2E x x
P k ∆ k
LHS(G5 ): eD +1 = 2+∆ = E k≥0 (−1) 2 ,
2 2 P k ∆
k
LHS(G6 ): eD +1 = 2+∆ = k≥0 (−1) 2 ,
142 Methods for the Summation of Series
1 1 P k k
LHS(G7 ): 1−xeD = 1−xE = k≥0 x E ,
P
k ∆ k
LHS(G8 ): eD2D 2D
+1 = 2+∆ = D k≥0 (−1) 2 ,
∆(1+∆)x ∆E x
LHS(G9 ): log(1+∆) = D ,
∆ ∆
LHS(G10 ): log(1+∆) = D ,
1 1 1 P
LHS(G11 ): 1−∆−∆2 = 1−∆(∆+1) = 1−∆E = k≥0 ∆k E k ,
1
P
LHS(G12 ): (1−D)E = E −1 k≥0 Dk .
Thus, pairing each LHS(Gi ) with RHS(Gi ) (i = 1, 2, . . . , 12), we can
obtain formally 12 operational formulas for f (t) ∈ C ∞ evaluated at t = a or
at t = y, namely
P 1 k
P Wk k
(O1 ) k≥0 k! ∆ f (a) = k≥0 k! D f (a),
P Bk
(n)
(O2 ) Dn f (a) = k≥0 k! ∆n Dk f (a),
P B
(−n)
(O3 ) ∆n f (a) = k≥0 kk! Dn+k f (a),
P
(O4 ) Df (x + y) = k≥0 φk (x)Dk [f (y + 1) − f (y)],
P k
1 k P
(O5 ) k≥0 − 2 ∆ f (x) = k≥0 Ek (x)Dk f (0),
P k
1 k
P
(O6 ) k≥0 − 2 ∆ f (a) = k≥0 ek Dk f (a),
P k
P αk (x) k
(O7 ) k≥0 f (a + k)x = k≥0 k! D f (a),
P k
1 k
P
(O8 ) k≥0 − 2 ∆ f (a) = k≥0 Gk!k Dk−1 f (a),
P
(O9 ) ∆f (x + y) = k≥0 ψk (x)∆k Df (y),
P
(O10 ) ∆f (a) = k≥0 bk ∆k Df (a),
P k
P k
(O11 ) k≥0 ∆ f (k) = k≥0 Fk ∆ f (0),
P k
P φ(0) k
(O12 ) k≥0 D f (a − 1) = k≥0 k! D f (a).
We surmise that at least half of the above formulas may be new, or at least
not easily found in the literature.
Certainly, all the series expansions shown above involve convergence prob-
lems for given functions, some of which will be considered in the next sub-
section. Note that (O4 ) and (O9 ) are well known, and their equivalent forms
with applications have been fully expounded in Jordan [141]. Identity (O7 )
appears to be an unfamiliar formula whose finite form with certain estimable
remainders has been used as a summation formula for power series (cf. [210]).
As may be predicted, a considerable variety of particular identities con-
taining some famous number sequences (or polynomial sequences) could be
obtained from the formulas (O1 )–(O12 ) with special choices of the functions
f (t) ∈ C ∞ . This will be partially justified with selective examples in the last
subsection.
Source Formulas for Symbolic Methods 143
Remark 3.1.2 For other delta operators such as the backward difference, the
central difference, Laguerre, Bernoulli, and Abel operators, we can construct
many other symbolic sum formulas similarly, which are left for the interested
readers.
Remark 3.1.3 We may construct symbolic sum formulas from some identi-
ties such as
1 1 1
= x .
1 − x(1 + t) 1 − x 1 − 1−x t
The series expansion of the above identity can be written formally as
X X xk
xk (1 + t)k = tk .
(1 − x)k+1
k≥0 k≥0
If [f, g] ≡ 0, i.e., two sequences of functions {fk (t)} and {gk (t)} satisfy the
formal equation/equality
X X
fx (x)gk (y) = fk (y)gk (x), (3.7)
k≥0 k≥0
we say that {fk (t)} and {gk (t)} have a symmetrical product summation prop-
erty, or briefly a SPS-property.
144 Methods for the Summation of Series
Thus, for fixed n ≥ 1, the pair of sequences hfk (t)/k!, fn−k (t)/(n − k)!i has
the SPS-property. Moreover, we have the following result.
Theorem 3.1.5 The three pairs φk (t), ∆Dk f (t) , Ek (t), Dk f (t) and
ψk (t), ∆k Df (t) all have the SPS-property for f ∈ C ∞ .
As the LHS’s remain the same when x and y are interchanged, we see that
the theorem is true.
In what follows we will establish convergence conditions for the series ex-
pansions of (O4 ), (O5 ), (O6 ), (O8 ), (O9 ), and (O11 ). Convergence problems
for other series expansions will be left to the interested reader for consid-
eration (cf. Exercise 3.2). A general technique yielded from the convergence
theorems on sum formulas (O4 )–(O6 ), (O8 ), (O9 ), and (O11 ) will be described
in Remark 3.1.14 at the end of the section.
Theorem 3.1.6 For given f ∈ C ∞ and x, y ∈ R, the absolute convergence of
¯
the series expansion (3.8) is ensured by the condition
1/k
lim ∆Dk f (y) < 1. (3.11)
k→∞
Source Formulas for Symbolic Methods 145
Proof. The root test confirms that the LHS of (3.8) will be absolutely con-
vergent provided that
1/k
lim φk (x)∆Dk f (y) < 1. (3.12)
k→∞
(1)
where αj = Bj /j! = Bj /j!, and Bj are ordinary Bernoulli numbers. Note
that α0 = 1, α1 = −1/2, α2m+1 = 0 (m ∈ N) and (cf. [141], p. 245)
1
|α2m | ≤ , (m = 0, 1, 2, . . .).
12(2π)2m−2
It follows that
X k
|x|k |x|k−1 1 |xk−j |
|φk (x)| ≤ + +
k! 2(k − 1)! j=2 12(2π)j−2 (k − j)!
k
X ∞
X
|x|j |x|r
< ≤ = e|x| , (k ≥ 2).
j=0
j! r=0
r!
Proof. Given condition (3.14). Using the root test again, we have to show that
1/k
lim ψk (x)∆k Df (y) < 1. (3.15)
k→∞
We need the following lemmas for discussing the convergence of the series
in (3.10), (O6 ) and (O8 ).
1/k
Lemma 3.1.8 Let f ∈ C ∞ . Then limk→∞ Dk f (y) < a implies
1/k
lim ∆k f (y) < ea − 1.
k→∞
Proof. Assume limn→∞ |Dn f (y)|1/n < a. Denote limn→∞ |Dn f (y)|1/n = θ.
Then there exists a number γ such that θ < γ < a. Thus for large enough n
1/n
we have |Dn f (y)| <γ or |Dn f (y)| < γ n .
n
From (3.3), noting m ≥ 0 and |Dn f (y)| < γ n yields
X k! n X k! n
k n
∆ f (y) = D f (y) ≤ |Dn f (y)|
n! k n! k
n≥k n≥k
X k! n
≤ γ n = (eγ − 1)k < (ea − 1)k .
n! k
n≥k
Here the rightmost equality is from Jordan [141] (cf. P. 176). This proves the
lemma.
1/k
Lemma 3.1.9 Let f ∈ C ∞ . If limk→∞ Dk f (y) < a for some y, then for
any fixed t we have
1/k
lim Dk f (t) < a.
k→∞
Source Formulas for Symbolic Methods 147
1/k
Proof. Denote limk→∞ Dk f (y) = θ. Then there exists a number γ such
that θ < γ < a. Thus, for large enough k Dk f (y) < γ k . Denote x = t − y.
Hence, for large k
which implies
1/k
Dk f (t) ≤ γe|x|γ/k (x = t − y).
For given t we choose large k such that
|x|γ |t − y|γ
k> = .
log a − log γ log a − log γ
Thus,
1/k a
Dk f (t) ≤ γe|x|γ/k < γ = a.
γ
This completes the proof of the lemma.
Proof. From condition (3.18), by using Lemmas 3.1.9 and 3.1.8, we have
1/k
limk→∞ Dk f (x + y) < 1 and
1/k
∆k f (y + x) < e − 1 < 2,
To prove (3.19), we note that Euler polynomial Ek (x) can be written in the
form
Xk
xk−j
Ek (x) = ej , (e0 = 1), (3.20)
j=0
(k − j)!
148 Methods for the Summation of Series
Consequently, we get
1/k
1/k
lim |Ek (x)| ≤ lim e|x| = 1.
k→∞ k→∞
implies the absolute convergence of the series. In the proof of Theorem 3.1.10,
this condition is derived from condition (3.18). Hence, the reader may pro-
pose the question: Are conditions (3.18) and (3.22) equivalently? Namely, does
(3.22) also imply (3.18)? The following example shows that the answer is neg-
ative.
Consider f (t) = 2.8t . Let both x and y to be zero. Then,
1/k 1/k 1/k
∆k f (x + y) = ∆k f (0) = (2.8 − 1)k < 2.
However,
1/k 1/k 1/k
Dk f (y) = Dk f (0) = (log(2.8))k > 1.
Similar to Theorem 3.1.10, we obtain the following convergence results for
(O6 ) and (O8 ).
Theorem 3.1.12 The absolute convergence of the series expansions involved
in (O6 ) and (O8 ) is ensured by the condition
1/k
lim Dk f (a) < 1.
k→∞
Hence, the series on the LHS of (O6 ) and (O8 ) are absolutely convergent.
Note that ek = Ek (0) satisfies |ek | < e0 = 1 and Gk+1 /(k + 1)! = ek , we
immediately obtain the convergence of the series on the RHS of (O6 ) and
(O8 ) from the given condition.
Source Formulas for Symbolic Methods 149
√ √
Binet expression Fk = (αk+1 − β k+1 )/ 5 with α = (1 + 5)/2
where Fk has √
and β = (1 − 5)/2 so that α + β = 1 and α|β| = 1.
Theorem 3.1.13 The following condition
√
k 1/k 5−1
lim ∆ f (0) < |β| = (3.24)
k→∞ 2
ensures the absolute convergence of the series on both sides of (3.23).
Choose a number γ such that θ < γ < |β|. Then for large enough k we have
1/k
∆k f (0) < γ, i.e., ∆k f (0) < γ k . Consequently,
1/k 1/k 1/k
∆k f (k) = ∆k E k f (0) = ∆k (1 + ∆)k f (0)
1/k 1/k
Xk Xk
k k
= ∆k+j f (0) ≤ ∆k+j f (0)
j=0
j j=0
j
1/k
X k
k 1/k
< γ k+j = γ k (1 + γ)k = γ(1 + γ) < |β|α = 1.
j=0
j
It follows that
1/k
lim ∆k f (k) ≤ γ(1 + γ) < 1.
k→∞
This shows that the series on the RHS of (3.23) is also absolutely convergent.
150 Methods for the Summation of Series
Remark 3.1.14 We may sort sum formulas P (O1k)–(O12 ) into P two classes.
The first class includes only either the sum γk D f or the sum ηk E k f in
the formulas
P such as (O2 )–(O
P4 ), (O 9 ), and (O10 ). The second class includes
the sums γk Dk f and/or ηk E k f on both sides, such as (O1 ), (O5 )–(O8 ),
(O11 ), and (O12 ). Similar to Theorems 3.1.6, 3.1.7 and 3.1.13, we may estab-
1/k 1/k
lish the convergence condition, limk→∞ Dk f < 1 (or limk→∞ E k f <
1), for the first-class series expansions if we can determine |γk | ≤ 1 (or |ηk | ≤
1/k
1). We may also establish the convergence condition, limk→∞ Dk f < 1,
for the second class series expansions, which is similar to Theorems 3.1.10
and 3.1.12. More precisely, if there exist |γk | ≤ 1 and |ηk | ≤ (1/2)k , by using
Lemmas 3.1.8 and 3.1.9, we get the convergence of the series expansions.
3.1.4 Examples
Surely, the list of operational formulas (O1 )–(O11 ) may provide a fruitful
source of particular identities relating to some famous number sequences and
polynomials involved in those formulas. In this subsection, we will present a
number of particular identities or formulas as examples, in which f (x)’s are
taken to be simple elementary functions.
First, let us mention several elementary functions with simpler differences
and derivatives.
(i) For f (x) = xm (m ≥ 1) we have (with k ≤ m)
m
∆k f (0) = ∆k xm x=0 = k! ,
k
k m
D x x=0 = (m)k xm−k x=0 = δm,k m!,
where m k is the Stirling number of the second kind (cf. [141], P. 168), and
δm,k is the Kroneckersymbol with δm,k = 1 for m = k and zero for m = 6 k.
x
(ii) For f (x) = m and m ≥ k ≥ 0 we have
k x 0
∆ f (0) = = = δm,k ,
m − k x=0 m−k
(x)m k! m
Dk f (0) = Dk = (−1)m−k .
m! x=0 m! k
(iii) For f (x) = ax (a > 1), we have
(−1)k k! (−1)k k!
∆k f (x) = , Dk f (x) = ,
(x + k + 1)k+1 (1 + x)k+1
Source Formulas for Symbolic Methods 151
(−1)k
∆k f (0) = , Dk f (0) = (−1)k k!.
k+1
(v) For f (x) = eix and g(x) = e−ix (i2 = −1), we have
∆k e±ix = e±ix (e±i − 1)k , Dk e±ix = (±i)k e±ix ,
k ±ix k ±ix
∆ e x=0
= (e±i − 1)k , D e x=0
= (±i)k .
(vi) For f (x) = cos x = 21 eix + e−ix we have
(ei − 1)k + (e−i − 1)k (1 + (−1)k e−ik )(ei − 1)k
∆k cos x x=0 = = ,
2 2
k ik + (−i)k 1 + (−1)k
D cos x x=0 = = ik = i k δk ,
2 2
where δk is the parity function, viz., δk = 0 if k is an odd integer, and δk = 1
if k is an even integer.
As an immediate generalization of (O1 ), there exists
P k P
(O1 )∗ k≥0 xk! ∆k f (a) = k≥0 τk (x)Dk f (a),
where τk (x) are known as Touchard polynomials generated by the expansion
(cf. Hsu and Shiue [134], p. 186)
∞
X
t
ex(e −1)
= τk (x)tk .
k=0
∗
Clearly, (O1 ) is obtained via the substitution t → D, namely
X xk ∆k X
ex∆ f (a) = f (a) = τk (x)Dk f (a).
k!
k≥0 k≥0
Example 3.1.15 Taking f (t) = t (m ≥ 1), we see that the LHS of (O1 )∗
m
with a = 0 yields
X xk m
X
m
∆k tm t=0 = xk .
k! k
k≥0 k=0
∗
The RHS of (O1 ) gives
X
τk (x) Dk tm t=0 = m!τm (x).
k≥0
Usually the LHS of (3.25) is called “exponential polynomial” for Stirling num-
bers. Thus (3.25) shows that the exponential polynomial is precisely given by
Touchard polynomial. It can be checked that the Touchard polynomial sequence
is a binomial type polynomial sequence and has the SPS-property.
152 Methods for the Summation of Series
Example 3.1.16 In view of the generating function of {τk (x)} we see that
Bell numbers Wk are given by Wk = k!τk (1). Thus (3.25) with implies the
well-known relation
Xm
m
= Wm . (3.26)
k
k=0
Substituting (3.25) with x = 1 into the above identity yields identity (cf. [141],
P. 183)
Xm X k
m−k m k
(−1) = 1.
j=0
k j
k=0
Example 3.1.18 Taking f (t) = xm (t), the mth degree Bernoulli polynomial
of the 2nd kind, and recalling that (cf. [141], §89-§97)
Z 1 Xm
t+x t
xm (t) = dx = bj ,
0 m j=0
m−j
R1 x
where bj = xj (0) = 0 j dx, we have
where bj are known as Bernoulli numbers of the 2nd kind, defined by (G10 ).
Note that there is a known formula for namely (cf. [141])
∞
X
n n + k Dn+k
∆ = n! .
n (n + k)!
k=0
Source Formulas for Symbolic Methods 153
Comparing this equation with (O3 ), we get the well-known relation between
Bernoulli numbers and Stirling numbers, viz.
−1
(−n) n+k n+k
Bk = .
k n
This implies that (O3 ) is another form for the expression of ∆n . Formula (O2 )
appears to be not so familiar. However, the case n = 1 is well-known, and it
leads to the classical Euler-Maclaurin summation formula.
x
Remark 3.1.19 xm (t) can be written as xm (t) = J m symbolically, where
R t+1
J is the Bernoulli operator: J : p(t) 7→ t p(x)dx.
X
m−n
m
(n)
m−k
Bk n! = Dn tm |t=0 = 0. (3.28)
k n
k=0
X
m−1
m
Bk = (1 + B)m − Bm = 0, (3.29)
k
k=0
That is
∞
X (n)
B (log 2)k
k
= (log 2)n . (3.30)
k! k!
k=0
The reader may find various examples in Jordan [141] for the equivalent
of (O4 ) and (O9 ). Here we supplement some other examples.
154 Methods for the Summation of Series
X m−1
X
k m−1
m−1
ψk (x)m ∆ y y=0
= ψk (x)m · k! = (x + 1)m − xm .
k
k≥0 k=0
t
Example 3.1.24 Let f (t) = m (m ≥ 1). Then (cf. [141], P.64)
y x+y
D∆k f (y) = Dy , ∆f (x + y) = .
m−k m−1
X X 1 k
k
Ek (x)D f (y) = − ∆k f (x + y).
2
k≥0 k≥0
y
k!
m
Taking f (y) = m (m ≥ 1), we find Dk f (y) y=0
= (−1)m−k m! k and
m
X Xm k
m−k k! m 1 x
(−1) Ek (x) = − . (3.34)
m! k 2 m−k
k=0 k=0
and
m
X m km!
k!ek (−1) = m, (3.36)
k 2
k=0
where ek = Ek (0), defined by (G6 ), (3.36) may also be derived from (O6 ) by
setting a = 0. Most likely, identities (3.32)–(3.36) may be new or not easily
found in classical literature.
Example 3.1.26 As mentioned before (cf. the last part of Subsection 3.1.2),
a comparison of (G8 ) with (G6 ) leads to the relation Gk+1 = (k + 1)!ek . Thus
the equality (3.36) may also be written in terms of Genocchi numbers, viz.
m+1
X
k−1 Gk m m!
(−1) = m. (3.37)
k k−1 2
k=1
This is the classical formula of Euler for the arithmetic-geometric series (cf.
Lemma 2.1.7 and Example 2.2.7).
αk (x) h a (k) i
b−1
X ∞
X
f (k)xk = x f (a) − xb f (k) (b) . (3.39)
k!
k=a k=0
The partial sum of the RHS of (3.39) with a remainder can be used as a
summation formula for the LHS. This problem has been treated much in detail
by Wang and Hsu [210].
Example 3.1.29 Recall that (3.38) may be rewritten in the form (cf. Comtet
[44], p. 243-5)
∞
X Am (x)
k m xk = αm (x) = , (|x| < 1), (3.40)
(1 − x)m+1
k=0
where Am (x) is the mth degree Eulerian polynomial given by the expression
A0 (x) = 1 and
m
X
Am (x) = A(m, k)xk , (m ≥ 1),
k=1
156 Methods for the Summation of Series
This summation formula can be used to compute the series of the form as
shown on the LHS of (O13 ). For instance, taking f (t) = 1/(1 + t), we find
−1
m+1 m+1 (m + 1)! (−1)m+1 m + k + 2
∆ f (k) = (−1) = .
(m + k + 2)m+2 m+2 m+2
Consequently, using formula (O13 ) we obtain
∞ X m
1 X m m+k+2
k / = A(m, k)/(k + 1). (3.41)
m+2 m+2
k=0 k=1
Definition 3.2.1 For any given fps A(t) and g(t) such that A(0) = 1, g(0) =
0 and g ′ (0) = Dg(0) =
6 0, the polynomials pk (z)(k ∈ N), defined by the
generating function (GF)
X
A(t)ezg(t) = pk (z)tk (3.42)
k≥0
with (dkj ) = (A(t), g(t)) being the Riordan array. Moreover, if it is assumed
that
1/k
θ = lim |pk (D)f (0)| > 0, (3.48)
k→∞
then the expansions (3.45) and (3.46) are absolutely convergent at t = 0, un-
der the following conditions, respectively
Proof. First, notice that the generating function for the Sheffer-type polyno-
mial sequence {pk (z)} given by (3.42) with replacement t 7−→ x is an fps in x
as well as in z:
X (g(x))k z k X
A(x) = pk (z)xk . (3.51)
k!
k≥0 k≥0
Observe that the left-hand side (LHS) of (3.52) apart from A(x) is just a
formal Taylor series expansion of f (g(x)) in powers of g(x). Consequently,
(3.52) can be rewritten in the form
X
A(x)f (g(x)) = (pk (D)f (0))xk . (3.53)
k≥0
Moreover, it is clear that the condition θ|x| < 1 for the absolute conver-
gence of the expansion (3.53) just follows from Cauchy’s root-test. Certainly,
the similar argument also applies to the conditions (3.49) and (3.50).
It remains to verify the equality (3.47). Clearly, the condition Dg(0) =
g ′ (0) =
6 0 implies that the formal power series expansion in t of the following
formal series X
z j (g(t))j /j!
j>k
involves powers of t greater than k. Thus one may deduce from (3.42) that
k
X k
X k
X
pk (z) = [tk ]A(t) z j (g(t))j /j! = [tk ](A(t)(g(t))j /j!)z j = (dkj /j!)z j ,
j=0 j=0 j=0
where dkj = [tk ]A(t)(g(t))j with 0 ≤ j ≤ k ∈ N just form the Riordan array
(dkj ) = (A(t), g(t)). This completes the proof of the theorem.
It may be worth noticing that the formula (3.53) involved in the proof is
deducible from either of (3.45) and (3.46) as a particular consequence. More
precisely we have the following:
Corollary 3.2.5 Either of the choices φ(t) = ext in (3.45) and φ(t) = (1+x)t
in (3.46) yields the (∞2 ) degree formula (3.53) that is convergent absolutely
under the condition |x| < 1/θ with θ being defined by (3.48).
Obviously, one may find by easy computations
Hence (3.53) is implied by either of (3.45) and (3.46), with Cauchy-type con-
vergence condition θ|x| < 1.
As suggested by two basic theorems of He, Hsu, and Yin’s paper [107], we
could give another corollary of Theorem 2.1. Let
Corollary 3.2.6 Let A(t), g(t), and f (t) be given as in Theorem 2.1. Then
we have two statements.
(ii) For the case A(t)f (g(t)) = G(t, log(1 + αt), (1 + αt)β ) with α =
6 0 and
β ∈ R, there holds a formal expansion for any φ(t) ∈ C ∞ :
X
1 β
G ∆, D, E φ(t) = (pk (D)f (0))∆k φ(t)/αk . (3.55)
α
k≥0
P
f (g(D))φ(t) = k≥0 (pk (D)f (0))Dk φ(t),
P (3.56)
f (g(∆))φ(t) = k≥0 (pk (D)f (0))∆k φ(t).
P
A(D)f (D)φ(t) = k≥0 (pk (D)f (0))Dk φ(t),
P (3.57)
k
A(∆)f (∆)φ(t) = k≥0 (pk (D)f (0))∆ φ(t).
and P
A(D)exp(zg(D))φ(t) = k≥0 pk (z)Dk φ(t),
P (3.58)
k
A(∆)exp(zg(∆))φ(t) = k≥0 (pk (z)∆ φ(t).
Source Formulas for Symbolic Methods 161
with dkj = [tk ](g(t))j ; the operator pk (D) in (3.57) takes the form
k
X
1
pk (D) ≡ pk (D, A(t), t) = dkj Dj , k ∈ N, (3.60)
j=0
j!
with dkj = [tk ](A(t), tj ) = [tk−j ]A(t), (0 ≤ j ≤ k); and pk (z) involved in (3.58)
is a Sheffer-type polynomial, viz
k
X
1
pk (z) = pk (z, A(t), g(t)) = dkj zk, k ∈ N, (3.61)
j=0
j!
with dkj being given by the Riordan array (dkj ) = ([tk ]A(t)(g(t))j )0≤j≤k.
Certainly one may get further specializations from the above expansions.
For instance, as special cases of (3.58) with g(t) = t, there are two (∞2 )
degree formulas of the forms
P
A(D)exp(zD)φ(t) = k≥0 pk (z)Dk φ(t),
P (3.62)
A(∆)exp(z∆)φ(t) = k≥0 (pk (z)∆k φ(t).
where
where the numbers dkj being given by dkj = [tk−j ]A(t) (0 ≤ j ≤ k).
By means of practice, one may find that various special formulas and
identities could be deduced as consequences from (3.45)–(3.46) and some of the
specializations mentioned above. In what follows we will give several selected
examples.
The first three examples are related to the Touchard polynomials τk (z),
(λ)
the Toscano polynomials (T os)k (z) with λ = 6 0, and the generalized Laguerre
(p−1)
polynomials Lk (z) with p > 0 (k ∈ N.) These polynomials are known as
special Sheffer-type polynomials (cf. Boas and Buck [21]). In accordance with
the denotion (3.43), we may denote them as follows:
Example 3.2.7 For the case A(t) = 1 and g(t) = et − 1 we have A(D) = 1
(identity operator) and g(D) = eD − 1 = E − 1 = ∆ so that in accordance with
(3.45) or the first equation of (3.56), we may get an (∞2 ) degree formula of
the form (for φ(t) ∈ C ∞ ) :
X
f (∆)φ(t) = (τk (D)f (0))φ(k) (t). (3.64)
k≥0
Example 3.2.8 For the case A(t) = eλt and g(t) = 1 − et we have
X∞
1 λt t tm (λ)
e (e − 1)j = S (m, j) (3.68)
j! m=j
m! 2
Note that the simplest case of (3.66) with f (t) ≡ 1 just gives the Taylor ex-
(λ)
pansion of φ(λ + t) in powers of λ, since S2 (m, 0) = λm .
Example 3.2.9 Given A(t) = (1 − t)−p , (p > 0) and g(t) = t/(t − 1). We
have A(−∆) = (1 + ∆)−p = E −p , g(−∆) = (−∆)/(−∆ − 1) = ∆/E and
A(−∆)f (g(−∆)) = E −p f (∆/E). Consequently, an application of (3.46) gives
an (∞2 ) degree formula of the form
X (p−1)
∆
f φ(t − p) = (Lk (D)f (0))(−1)k ∆k φ(t), (3.70)
E
k≥0
Xk
(p−1) (−1)j k + p − 1
Lk (D) = Dj . (3.71)
j=0
j! k − j
Actually the numbers (−1)j n+p−1
k−j = dkj involved in (3.71) from the special
p
Riordan array (dkj ) = ((1 − t) , t/(t − 1)).
As is easily seen, the simplest case of (3.70) with f (t) ≡ 1 and t = 0 gives
the Newton interpolation series for φ(−p).
Surely it is possible to get some special formulas or identities from (3.64),
(3.66), and (3.70) via suitable choices of f (t) and φ(t). Here we shall mention
an application of (3.64) to the derivation of some formulas in Enumerative
Combinatorics.
Note that (3.65) leads us to consider the Bell number ω(k) as defined by
k
X k
ω(0) = 1, ω(k) = (k ≥ 1), (3.72)
j=1
j
164 Methods for the Summation of Series
This gives the well-known exponential generating function for the sequence of
Bell numbers.
t
(2) Taking φ(t) = m! m = (t)m with (t)0 = 1, we have
t 0
∆k φ(0) = m! = m! = m!δmk ,
m − k t=0 m−k
and
m
X hmi
m j
Dk φ(0) = Dk (−1)m−j t = (−1)m−k · k!.
j=0
j k
t=0
The interested readers may give a combinatorial interpretation for (3.75) (Ex-
ercise 3.10).
(3) Letting φ(t) = Bn (t) (Bernoulli polynomial of degree n) with B0 (t) = 1
and denoting Bn = Bn (0) (n-th Bernoulli number) with B0 = 1, we have (cf.
[157])
n
Dk Bn (t) = (n)k Bn−k (t), Dk Bn (0) = k! Bn−k ,
k
n−1
∆k Bn (0) = (∆k Bn (t))t=0 = ∆k−1 (ntn−1 )t=0 = (k − 1)!n , (k ≥ 1).
k−1
Consequently, by using (3.73) we obtain
Xn X n
n n−1 n
= Bn−k ω(k). (3.76)
k k−1 k
k=1 k=1
Source Formulas for Symbolic Methods 165
Also, it may be found that (3.77) yields an extension of (3.74) with φ(t) = ext :
X xk
exp(ex + λx − 1) = ωλ (k) . (3.79)
k!
k≥0
For proof, it suffices to show that the RHS of (3.80) and the LHS of
(3.80) are given respectively by the LHS and the RHS of (3.45) for the given
A(t), g(t), and f (t). Indeed, we have
r
! r
X X ∆k ψ(0)
D k k
A(D)f (g(D))φ(t)|t=0 = e D ∆ ψ(0)/k! φ(t) = φ(k) (1).
k!
k=0 t=0 k=0
Notice that
because ∆k ψ(0) = 0 for all k > r so that ∆k ψ(0) has meaning for all k ≥ 0.
Consequently, we see that the RHS of (3.45) can be evaluated as follows
X
(pk (D)f (0))φ(k) (0)
k≥0
X 1 X 1 X k
k
= (1 + D)k f (0) φ(k) (0) = Dj f (0) φ(k) (0)
k! k! j=0 j
k≥0 k≥0
X 1 X k X ψ(k) · φ(k) (0)
k
= ∆j ψ(0) φ(k) (0) = .
k! j=0 j k!
k≥0 k≥0
Note that (3.80) has a different proof that appeared in [107], and that its
particular case with ψ(t) = tr implies several interesting special identities.
For instance, by means of the following special choices (1) φ(t) = et , (2)
φ(t) = 1 + t + · · · + tm (m ≥ 1) and (3) φ(t) = (1 − tx)−1 with |tx| < 1,
one may get, respectively, (1) the well-known formula of Dobinski for the Bell
number ω(r), (2) the useful formula of Stirling for the arithmetic progression
of higher order, and (3) the formula of Euler for the arithmetic-geometric
series (cf. Lemma 2.1.7 and Example 2.2.7).
∞
X
k r xk .
k=0
Example 3.2.11 Taking ψ(t) = t+r
r , it follows from (3.80) that
∞
k + r φ(k) (0) X r φ(k) (1)
X r
= . (3.82)
r k! k k!
k=0 k=0
Recall that
kπ kπ
Dk cos t = cos t+ and Dk sin t = sin t + ,
2 2
so that the special choices φ(t) = cos t and φ(t) = sin t in (3.82) lead to a pair
of combinatorial series sums:
X
1 r
X∞ r
(−1)k 2k + r 1
= cos 1 + kπ , (3.83)
(2k)! r k! k 2
k=0 k=0
Source Formulas for Symbolic Methods 167
1 r
∞
X r
X
(−1)k 2k + r + 1 1
= sin 1 + kπ (3.84)
(2k + 1)! r k! k 2
k=0 k=0
Example 3.2.12 Recall that the generalized m-th order Bernoulli polynomi-
als and Euler polynomials are defined by (cf. [157])
m X ∞
t (m) tk
ezt t
= Bk (z) (|t| < 2π), (3.85)
e −1 k!
k=0
m X ∞
zt 2 (m) tk
e = Ek (z) (|t| < π), (3.86)
et + 1 k!
k=0
(m) (m)
where z ∈ C, m ∈ N, m ≥ 1. Evidently both Bk (z)/k! and Ek (z)/k!
are Sheffer-type polynomials associated with the (GF) pairs {A(t) = (t/(et −
1))m , g(t) = t} and {A(t) = (2/(et + 1))m , g(t) = t}, respectively (cf. [59,
157]). Also, both the LHS of (3.85) and (3.86) may be written as
first equation of (3.58) and referring to Corollary 2.2, we find that (3.85) and
(3.86) with t 7−→ D lead to the following expansions (for given φ(t) ∈ C ∞ )
(D/(E − 1))m E z φ(t) = ∆−m φ(m) (z + t)
X∞
1 (m)
= B (z)φ(k) (t), (3.87)
k! k
k=0
These two expansions are absolutely convergent under the following conditions,
respectively
sup | ∆m φ(k) (0)|1/k < 2π, sup |∇m φ(k)(0)|1/k < π. (3.91)
k k
168 Methods for the Summation of Series
Obviously (3.91) follows from Cauchy’s root-test and the conditions contained
in (3.85) and (3.86), respectively.
Note that both (3.85) and (3.86) reduce to the Taylor expansion for m = 0.
In the case for m = 1, they provide the classical expansions of an analytic
function φ′ (z) in terms of the ordinary Bernoulli and Euler polynomials, re-
spectively.
Proof. It requires to show that (3.46) of Theorem 3.2.4 yields (3.92) with the
given A(t), g(t), and f (t). Clearly, the LHS of (3.46) (evaluated at t = 0) gives
X α
A(∆)f (g(∆))φ(0) = (1 + ∆)α ∆k ψ(0) · (g(∆))k φ(t)|t=0
k
k≥0
X α k
∆
= Eα ∆k ψ(0) φ(t)|t=0
k E
k≥0
X α
= ∆k ψ(0) · ∆k φ(α − k) = RHSof (3.92).
k
k≥0
Xk Xk
1 α−j α α−j
pk (D)f (0) = Dj f (0) = ∆j ψ(0)
j=0
j! k − j j=0
j k − j
k
α X α
k
= ∆j ψ(0) = ψ(k).
k j=0
j k
X X α
(pk (D)f (0))∆k φ(0) = ψ(k)∆k φ(0) = LHSof (3.92).
k
k≥0 k≥0
Theorem 3.2.14 Let ψ(t) and φ(t) be defined as in Theorem 3.2.13. Denote
θ1 (1 + θ2 ) < 1. (3.95)
which have been employed in the preceding proof, one may see that the LHS
of (3.92) can be computed formally as follows:
∞
X k
X
α k
LHS of (3.92) = ∆k φ(0) ∆j ψ(0)
k j=0
j
k=0
∞
X ∞
X α k
= ∆j ψ(0) ∆k φ(0)
j=0
j k
k=j
X∞ ∞
X
α α−j
= ∆j ψ(0) ∆k φ(0)
j=0
j k − j
k=j
170 Methods for the Summation of Series
X∞
α
= ∆j ψ(0)(1 + ∆)α−j ∆j φ(0)
j=0
j
X∞
α
= ∆j ψ(0)∆j φ (α − j) = RHS of (3.92).
j=0
j
θ1 (1 + θ2 ) < 1 with θ 1 = θ1 + δ1 , θ 2 = θ2 + δ2 .
The condition (3.94) implies that there exist integers m > 0 and n > 0, such
that
It remains to show that the absolute convergence of Sm,n implies that of Sm,0
and so of S0,0 . Notice that
X α X k
n−1
Sm,0 = Sm,n + ∆k φ(0) ∆j ψ(0). (3.97)
k j=0
j
k≥m
Source Formulas for Symbolic Methods 171
Clearly, the right-most summation on the RHS of (3.97) has an order estimate
(in Landau’s denotation) O(nk n−1 ) (k → ∞). Consequently, it is seen that
the absolute convergence of the series (on the RHS of (3.97))
X α
∆k φ(0) · O(nk n−1 )
k
k≥m
Moreover, the absolute convergence of S0,0 follows from that of Sm,0 . Hence
the theorem is proved.
∞
X ∞
X
(−1)k ψ(k) = (−1)j ∆j ψ(0)/2j+1 .
k=0 j=0
n
X
x y x+y
= .
k n−k n
k=0
∞
X r
X
r k j!xj r
k x = (|x| < 1).
j=0
(1 − x)j+1 j
k=0
m
X r
X
r m+1
kr = j! .
j=0
j j+1
k=0
n
X
s+k k s+j n+s+1
= .
k j j n−j
k=j
n
X n k + a a
(−1)k = (n + a 6= 0) .
k k n+a
k=0
n
X
n m x+n−k x x
= .
k n−k n+m m n
k=0
n
X n m p + n + m − k p+n p+m
= .
k k n+m n m
k=0
174 Methods for the Summation of Series
n
X r
X
α+k α+j α+n+1 r
kr = j! .
k j=0
j n−j j
k=0
m
X m 2m + 1 −1/2
(−2)k = 1/ .
k 2m + 1 − k m
k=0
∞
X 1 1
Hk xk = log (|x| < 1).
1−x 1−x
k=1
min{a,b}
X x+y+k y x x+a x+b
= .
k a−k b−k b a
k=0
15 Montmort’s series transform formula with |x| < 1, |x/(1 − x)| < 1
(cf. Theorem 1.3.10)
∞
X ∞
X j+1
k j x
ψ(k)x = ∆ ψ(1) .
j=0
1−x
k=1
∞
X
k+m k −m−1 1
(Hk+m − Hm )x = (1 − x) log .
m 1−x
k=1
m
X Xr
α α m−α r
(−1)k k r = (−1)j j! .
k j=0
j m − j j
k=0
k a−t−k
(ii) ∆k a−t n = (−1) n−k (k ≤ n); ∆ k a−t
n 0 = (−1)k a−k
n−k ;
1 (−1)k k!
(iii) ∆k t+a = (t+a)(t+a+1)···(t+a+k) ;
k
.
∆k t+a 1
= (−1)
a
k+a
k (a =
6 0);
0
(iv) ∆k cos(at + b) = (2 · sin a2 )k cos(at + b + k2 (a + π));
(v) ∆k sin(at + b) = (2 · sin a2 )k sin(at + b + k2 (a + π));
1 (−1)k−1 (k−1)! (−1)k−1
(vi) ∆k Ht = ∆k−1 t+1 = (t+k)k , (∆k Ht )0 = k ;
(vii) ∆k Ft = Ft−k (k ∈ N, t ≥ k).
Source Formulas for Symbolic Methods 177
where δ denotes either D or ∆. Also, we will make use of (3.53) with x 7−→ t
X
A(t)f (g(t)) = (pk (D)f (0))tk . (3.99)
k≥0
In what follows we will show that both (3.98) and (3.99) could be used as basic
formulas to produce chains of formulas having freedom degrees in increasing
orders. The basic idea is to construct a kind of iteration process starting from
a given initial formula with a form of either (3.98) or (3.99).
Let {Am (t)}∞ ∞ ∞
1 , {gm (t)}1 and {fm (t)}1 be an arbitrary fps or functions
∞ ′
of the class C such that Am (0) = 1, gm (0) = 0, gm (0) = Dgm (0) 6= 0, (m =
1, 2, · · · ). Accordingly, for each m ≥ 1 we may construct a Riordan array
(dkj ) = (Am (t), gm (t)) with dkj being defined by
Now, suppose that for each m ≥ 1, the RHS of (3.100) defines a function
fm+1 (t) iteratively, viz
X (m)
(pk (D)fm (0))tk = fm+1 (t). (3.102)
k≥0
expansions and summations. The basic tools we employed are the symbolic op-
erator calculus, the theory of formal power series (fps) and that of differential
operators. What we have obtained and utilized are certain series transforma-
tion formulas involving the ordinary difference operators ∆k (with increment
1 for ∆) and differential operators Dk (with D = d/dt), wherein k ∈ N and
∆0 = D0 = 1, the identity operator. Some fruitful results may be recalled
briefly as follows.
Let ψ(t) and φ(t) be real-valued functions defined on R, and let x ∈ R.
Then there holds a series expansion formula of the form
X x X x
ψ(k)∆k φ(0) = ∆k ψ(0)∆k φ(x − k), (3.1)
k k
k≥0 k≥0
Equation (3.5) can be proved by using the substitution of the known divided
difference formula
Xk
k
∆k f (0) = (−1)k−j f (j)
j=0
j
into the leftmost side of (3.5) and switching the order of the summation to
yield
X XX k
k n k−j n k
∆ f (0) = (−1) f (j)
k j=0
k j
k≥0 k≥0
180 Methods for the Summation of Series
X X n X n−j X !
k−j n k k n k+j
= (−1) f (j) = (−1) f (j)
k j k+j j
j≥0 k=j j≥0 k=0
X n−jX !
k n−j n
= (−1) f (j) = f (n).
k j
j≥0 k=0
In the above sense, the series expansion formula (3.1) is an analog of series
expansion formula (3.2). More details can be seen in Remark 3.3.5.
Apparently, when taking ψ(t) = 1, formulas (3.1)–(3.3) will be reduced to
Newton’s interpolation series and Maclaurin’s expansion of φ(x), respectively.
Series expansions (3.1)–(3.3) are the basic results given in Sections 2.2 and 3.2,
and there have been already given plenty of examples showing that a variety of
special formulas and identities accordingly. Hence, (3.1), (3.2), and (3.3) may
be called, respectively, the 1st, 2nd and 3rd source formula, or denoted briefly
as SF(1), SF(2), and SF(3). Certainly, each of these formulas is associated
with a given triplet {x, ψ, φ}, and all possible special formulas are deduced
via suitable special choices of the triplets.
As was mentioned in Section 3.2, the pair of operator series expansions
given by the following Theorem 3.3.1 could be rewritten as a single formula
involving a delta operator δ. Also, it has been proved that the SF(1) is de-
ducible from the single formula with δ = ∆ (cf. loc. cit) so that the so-called
single formula (3.98) may be adopted as a general source formula (GSF). In
this subsection we shall give a utilizable specialization of the GFS and will
show that both SF(2) and SF(3) are included in the specialization as conse-
quences. Thus as a conclusion, one may think that the GSF is really a common
source for all the SF(i)’s (i = 1, 2, 3).
As in Section 3.2, A(t), g(t), f (t), φ(t), etc. always denote the fps or the
functions in C ∞ defined in R or C (real or complex number field). All operators
are assumed to be acting on the fps or functions of t, unless otherwise stated.
As usual, the shift operator E is defined by E α f (t) = f (t + α). An operator
Q is said to be shift-invariant if QE α = E α Q for every α. Recall that a shift-
invariant operator Q is called a delta operator whenever Qt 6= 0 (a non-zero
constant). Obviously, ∆, D, ∆, D, ∆E α , and DE α are the most useful delta
operators.
Let us now reformulate the basic result of Section 3.2 in a more general
form as follows.
Theorem 3.3.1 Let A(t), g(t), and f (t) be fps over R or C such that A(0) =
1, g(0) = 0 and g ′ (0) = Dg(0) 6= 0. Let φ(t) ∈ C ∞ , and let δ be a delta
operator. Then there holds formally an operator series expansion formula of
the form X
A(δ)f (g(δ))φ(t) = (pk (D)f (0))δ k φ(t). (3.6)
k≥0
Source Formulas for Symbolic Methods 181
Example 3.3.3 Recall that the Bernoulli polynomials Bk (x) and Charlier
(α)
polynomials Ck (x) (k ∈ N), are Sheffer-type polynomials so that Bk (D) and
(α)
Ck (D) give Sheffer-type differential operators. Note that they are generated
by {A(t) = t/(et − 1), g(t) = t} and {A(t) = e−αt , g(t) = log(1 + t)}, respec-
tively. Accordingly, the GSF (3.6) yields the following two series expansions
X 1
δ/(eδ − 1)f (δ)φ(t) = Bk (D)f (0) · δ k φ(t), (3.12)
k!
k≥0
X (α)
−αδ
e f (log(1 + δ))φ(t) = Ck (D)f (0) · δ k φ(t). (3.13)
k≥0
where the operator 1/∆ involved in the LHS of (3.12) has been removed to
the RHS, and a similar process has been applied to the equation (3.13) to get
(3.15).
X 1 Xk
k j j
f (t) = ψ k (0) x t , (3.17)
k! j=0
j
k≥0
Proof. First, it may be seen that the LHS of (3.6) evaluated at t = 0 just
provides the RHS of (3.2) and BHS of (3.3) with f(t) being defined by (3.16)
Source Formulas for Symbolic Methods 183
and (3.17), respectively. Moreover, it is clear that for (3.16) we have formal
derivatives
f (j) (0) = Dj f (o) = xj ∆j ψ(0), j ∈ N.
Also, for (3.17)we have
X 1 X 1
k j
f (j) (0) = ψ (k) (0)j! x = xj ψ (k) (0)(∆j tk )t=0
k! j k!
k≥0 k≥0
X 1
=xj ∆j ψ (k) (0)tk = xj (∆j ψ(t))t=0 = xj ∆j ψ(0).
k!
k≥0
t=0
This shows that for both (3.16) and (3.17) we have the same expression
Xk
k k−j j j
(x + D)k f (0) = x x ∆ ψ(0) = xk ψ(k).
j=0
j
Hence both (3.16) and (3.17) are implied by (3.6) with the evaluation of t = 0.
Remark 3.3.5 What is worth mentioning is the fact that SF(2) and SF(3)
have been found before so that the choices of f (t) for S(2) and S(3) appear to
be a relatively easier matter. Also, it is known that SF(1) is a special case of
(3.1) (viz. GSF) with A(t) = (1 + t)x , g(t) = t/(t + 1) and
X x
f (t) = ∆k ψ(0)tk . (3.18)
k
k≥0
Here (3.18) is a discrete analog of (3.1). This is quite natural since SF(1) is
actually a discrete analog of SF(2).
Example 3.3.6 What is worth mentioning is that there are 3 classical formu-
las due to Euler, all deducible from the SF(1) with special choices of the triplet
{x, ψ, φ}. The first two formulas are known as the transformation formula
184 Methods for the Summation of Series
for the alternating series and the summation formula for the arithmetical-
geometric series. The third formula is usually called Euler’s finite difference
theorem, which may be expressed by the following equality
n
X
k n n n 0, 0 ≤ m ≤ n − 1,
(−1) f (k) = (−1) ∆ f (0) =
k (−1)n n!an , m = n,
k=0
(3.19)
where f (t) is a polynomial of degree m, namely
m
X
f (t) = a j tj , m ∈ N. (3.20)
j=0
As may be observed, (3.19) follows from (3.1) (SF(1)) via embedding with the
special triple {x = n, ψ(t) = f (t), φ(t) = n−t
n } since φ(t) gives
n−t−k
∆n φ(t) = (−1)k , ∆k φ(0) = (−1)k ,
n−k
and
k k 0 k (−1)n , k = n,
∆ φ(n − k) = (−1) = (−1) δn,k =
n−k 0, k < n.
Thus in order to prove that (3.19) implies (3.22), it suffices to show that
(3.23) can be expressed algebraically as a polynomial in k of degree (n − 1),
for 0 ≤ k ≤ n. First, it is easily seen that the RHS of (3.23) can be expanded
into a polynomial in kx of degree (k − 1) + (n − k) = n − 1 with the last term
Source Formulas for Symbolic Methods 185
(−a)k bn−k being cancelled within the expression and f (0) = 0. Moreover, f (k)
can be expressed algebraically in the following form (with 1 ≤ k ≤ n)
X
k−1
f (k) =a(kx + b)n−k (kx + b)k−1−j (−a − b)j + (−a)k bn−k
j
0≤j≤(n−1)
X
k−1
=a (kx + b)n−j−1 (−a − b)j + (−a)k bn−k
j
0≤j≤(n−1)
=polynomial in k of degree(n − j − 1) + j = n − 1,
wherein the term (−a)k bn−k is already cancelled. Hence (3.19) implies (3.22).
As known, two classical proofs of Abel’s identity have been given by Lucas
and Francon (cf. §3.1, p. 128–129, [44]).
This may be embedded in the particular formula SF(2) with x = 1, viz. (3.2)
with x = 1 X 1 X 1
ψ(k)φ(k) (0) = ∆k ψ(0)φ(k) (1). (3.27)
k! k!
k≥0 k≥0
Indeed, taking ψ(t) = (−t) /(t + y) and φ(t) = (1 − t)n , we find that
m
the LHS of (3.27) just gives the LHS of (3.26). Also, we have φ(k) (1) =
186 Methods for the Summation of Series
Dk (1 − t)n t=1 = 0 (0 ≤ k ≤ n), φ(n) (1) = (−1)n n!, and we find the RHS of
(3.27)= (−1)n ∆n ψ(0). Now we have (noticing that (m − 1) < n)
m
t − (−y)m (−y)m
∆nt ψ(0) =∆n ψ(t)0 = (−1)m ∆nt + ∆nt
t − (−y) t − (−y) 0
m m
0
y y n+y
=∆nt = (−1)n .
t+y 0 y n
Example 3.3.9 The following formula due to Zave [224] (with m ∈ N and
|x| < 1)
∞
X
k+m 1
(Hk+m − Hm )xk = (1 − x)−m−1 log (3.28)
m 1−x
k=1
can be obtained from the SF(1) (viz. (3.1)) with the chosen triplet
Example 3.3.10 Recall that the well-known C-numbers first introduced and
utilized by Charalambides and Koutras, may be defined by the following [33]
1 k
C(n, k; a, b) = ∆ (at + b)n , (3.29)
k! t=0
X ak + b tk 1 X
m
f (k) (0)
= C(m, j; a, b)f (j) (t)tj , (3.30)
m k! m! j=0
k≥0
X ak + b
t 1 X
m
∆k g(0) = C(m, j; a, b)∆j g(t − j)(t)j , (3.31)
m k m! j=0
k≥0
Remark 3.3.11 It is easily seen that (3.30) is an exact formula for |t| < ρ,
provided that f (t) has a Maclaurin series expansion for |t| < ρ. Moreover,
the absolute convergence of the series in (3.31) is ensured by the conditions
|t| < ∞ and
lim |∆k g(0)|1/k < 1. (3.32)
k→∞
Also, note that a variety of special formulas and identities deducible from
either (3.30) and (3.31) can be found in [33] or elsewhere.
Definition 3.3.13 All the mathematical formulas which are deducible from
the GSF are said to form a formula class, so-called Sigma-Delta-D (Σ∆D)
class.
As known from our former sections quoted in the preceding sections, more
than 50 special formulas and identities are the members belonging to the
(Σ∆D) class. What is worth noticing is the fact that the (Σ∆D) class includes
as special members those well-known classical formulas due to, respectively,
Newton, Taylor, Euler, Stirling, Vandermonde, Montmort, Riordan, Carlitz,
Li Shanlai, Knuth, Grosswald, Rosenbaum, Stanley, Gould, Melzak, Zave,
et al.
188 Methods for the Summation of Series
Remark 3.3.14 Sometimes, certain members of the (Σ∆D) class may have
limits when some parameters tend to ∞. For instance, taking the special triplet
of the SF(1)
( t )
n 1
x = α, ψ(t) = t , φ(t) = 1 + , α > 1,
α
which belongs to the (Σ∆D) class. Obviously, (3.33) yields the following limit
when α → ∞: ∞ n
X kn X n
=e = eω(n). (3.34)
k! j=0
j
k=0
This is the well-known Dobinski formula for Bell numbers ω(n). Thus, if the
(Σ∆D) class is extended to include all those limits of members as members,
then the Dobinski formula is a member of the class. Similarly, observe that
1 m
lim a−m C(m, k; a, b) = ∆k (tm )t=0 =
α→∞ k! k
and it is seen that the limit form of (3.30) (with a → ∞) yields Grunnert’s
formula
m ∞
X Xm
d tk m (j)
t f (t) = k m f (k) (0) = f (t)tj . (3.35)
dt k! j=0 j
k=0
Remark 3.3.15 The wording ‘deduced formally’ used in the Definition 3.3.12
may be given a little more explanation. Clearly, in the previous sections, the
so-called formal derivation used for getting special formulas from source for-
mulas, generally consists of using (i) operations with fps, (ii) symbolic oper-
ations with ∆, D, and E, (iii) ordinary algebraic computations, (iv) ordinary
computational methods in mathematical analysis (including uses of Taylor’s
series expansion and Newton’s interpolation series), (v) operations with infi-
nite series, and exchange of the orders of repeated series summations with-
out considering convergence problems, and (vi) mathematical tables including
short tables of difference formulas and derivative formulas.
Remark 3.3.17 As seen in Section 3.2, we have defined a formula chain via
iterations of the GSF. More precisely, a chain of formulas with freedom-degrees
(∞3m+1 ) (m = 1, 2, 3, . . .) could be generated successively by the iteration
formulas X (m)
(pk (D)fm (0))δ k φm (t) = fm+1 (t), m ≥ 1,
k≥0
Here the first one is just the Σ∆D class treated in this section, and it may be
the most available class of formulas in the Discrete Analysis and Combina-
torics.
190 Methods for the Summation of Series
Exercises
3.1 Prove operational formulas (3.2) and (3.3).
3.2 Find the convergence conditions for the series expansions in (O1 )–(O3 ),
(O7 ), (O10 ), and (O12 ).
3.3 For f (x) = xm (m ≥ 1), show the following difference and derivative
are true.
m
∆k f (0) = ∆k xm x=0 = k! ,
k
k m
D x x=0 = (m)k xm−k x=0 = δm,k m!,
where m k is the Stirling number of the second kind (cf. [141], P. 168), and
δm,k is the Kronecker symbol
with δm,k = 1 for m = k and zero for m =6 k.
x
3.4 For f (x) = m and m ≥ k ≥ 0, , show the following difference and
derivative are true.
x 0
∆k f (0) = = = δm,k ,
m − k x=0 m−k
(x)m k! m
Dk f (0) = Dk = (−1)m−k .
m! x=0 m! k
3.5 For f (x) = ax (a > 1), show the following difference and derivative
are true.
(−1)k k! (−1)k k!
∆k f (x) = , Dk f (x) = ,
(x + k + 1)k+1 (1 + x)k+1
(−1)k
∆k f (0) = , Dk f (0) = (−1)k k!.
k+1
3.7 For f (x) = eix and g(x) = e−ix (i2 = −1), show the following differ-
ence and derivative are true.
CONTENTS
4.1 Use of Stirling Numbers, Generalized Stirling Numbers, and
Eulerian Numbers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 194
4.1.1 Basic convergence theorem . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 194
4.1.2 Summation formulas involving Stirling numbers,
Bernoulli numbers, and Fibonacci numbers . . . . . . . . . . . . . 200
4.1.3 Summation formulas involving generalized Eulerian
functions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 205
4.2 Summation of Series Involving Other Famous Number
Sequences . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 209
4.2.1 Convergence theorem and examples . . . . . . . . . . . . . . . . . . . . . 210
4.2.2 More summation formulas involving Fibonacci numbers
and generalized Stirling numbers . . . . . . . . . . . . . . . . . . . . . . . . 216
4.2.3 Summation formulas of (ΣS) class . . . . . . . . . . . . . . . . . . . . . . 225
4.3 Summation Formulas Related to Riordan Arrays . . . . . . . . . . . . . . . 235
4.3.1 Riordan arrays, the Riordan group, and their sequence
characterizations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 236
4.3.2 Identities generated by using extended Riordan arrays
and Faà di Bruno’s formula . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 247
4.3.3 Various row sums of Riordan arrays . . . . . . . . . . . . . . . . . . . . 263
4.3.4 Identities generated by using improper or non-regular
Riordan arrays . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 272
4.3.5 Identities related to recursive sequences of order 2 and
Girard-Waring identities . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 279
4.3.6 Summation formulas related to Fuss-Catalan numbers . 285
4.3.7 One-pth Riordan arrays and Andrews’ identities . . . . . . . 295
has once been the subject of some papers of the Fibonacci Quarterly fore
and after 1990s of the last century. As a matter of fact, either (4.1) or (4.2)
essentially gives an explicit solution to the problem by just taking f (t) = tp
and g(t) = 1 + t + t2 + · · · + tn or g(t) = (1 − tn+1 )/(1 − t), t 6= 1. The details
may be referred to Hsu and Shiue [133] (cf. Exercise 4.1).
(5) A summation formula of practical value, established by Wang and Hsu
[210], for sectional power series using Eulerian fractions αk (t) = Ak (t, (1 −
196 Methods for the Summation of Series
t)−1 ) is also a particular consequence of (4.2) with g(t) = (1 − t)−1 , |t| < 1.
Indeed, the principal results of [210] are built on
αk (t) h a (k) i
b−1
X ∞
X
f (k)tk = t f (a) − tb f (k) (b) , (4.8)
k!
k=a k=0
which, in turn, falls under the purview of (4.2), where a, b ∈ N with a < b − 1
(cf. Exercise 4.2).
The rest of this subsection is wholly devoted to the analysis of convergency
of (4.1) and (4.2). For those who are mainly interested in the computational
applications of (4.1) and (4.2), it may be better first to look through following
subsections §4.1.2–4.1.3.
Throughout the rest of this subsection, we will consider functions g : C →
C and f : C → C so that we may write g(z) and f (z) instead of g(t) and f (t),
respectively.
Theorem 4.1.1 Let g(z) be an analytic function with convergence
p radius r >
0, and let (f (k)) be a number sequence in C such that limk→∞ k |f (k)| = θ >
0. Then, the expansion formula (4.1) with t being replaced by z is absolutely
convergent for |z| < r/(2 + θ).
Corollary 4.1.2 Let g(z) be anpentire function and (f (k)) be a number se-
quence in C such that limk→∞ k |f (k)| < ∞. Then, the formula (4.1) with
t → z is absolutely convergent for every z ∈ C.
For |z| < r/(2 + θ), we may choose ρ > θ such that
r r
|z| < < . (4.9)
2+ρ 2+θ
For such ρ, there can be found a number K > 0 such that |f (k)|1/k < ρ, i.e.
|f (k)| < ρk whenever k > K. Consequently, there exists a sufficiently large M
such that |f (k)| < M ρk for all k ∈ N0 .
Let us use the familiar formulas involving finite differences
m
X k
X
m k
f (m) = ∆k f (0), ∆k f (0) = (−1)k−j f (j).
k j=0
j
k=0
With the help of these two formulas, we now expand the LHS of (4.1) into
the form with t → z:
X∞ m
g (m) (0) m X m
LHS of (4.1) = z ∆k f (0). (4.10)
m=0
m! k
k=0
Xm X k
m k
< M ρj
k j=0 j
k=0
Xm
m
=M (1 + ρ)k = M (2 + ρ)m .
k
k=0
This states that the right-hand side (RHS) of (4.10) is bounded absolutely by
X∞
g (m)
M (2 + ρ)m |z|m < ∞. (4.11)
m=0
m!
Since g(z) is analytic within {z : |z| < r} and by (4.9), (2 + ρ)|z| < r, the
absolute convergence of the LHS of (4.1) is ensured by (4.11).
Moreover, (4.11) also implies that the RHS of (4.10) can be simplified via
the change of summation orders, namely
∞
X ∞ ∞
∆k f (0) X g (m) (0) m X k zk
RHS of (4.10) = z = ∆ f (0)g (k) (z) .
k! (m − k)! k!
k=0 m=k k=0
In particular, since r = ∞ for the entire function g(z), we get the corollary
of the theorem.
P∞
P∞As usual, for any analytic function f (z) = k=0 bk z k , we may take fˆ(z) =
k
k=0 |bk |z as a simple majorant series (function) of f (z), which has the same
convergence radius as that of f (z).
For functions that can be represented by a power series, the term “majo-
rant” is often given a more special meaning. In such cases the term denotes
the sum of a power series with positive coefficients that are not less than
the absolute values of the corresponding coefficients of the given series. If
h(x) is a majorant (in this special sense) of the function g(x), then we write
h(x) >> g(x). For example, x/(1 − x) >> ln(1 + x) since
x2 x3 xn
ln(1 + x) = x − + − · · · + (−1)n−1 + ···
2 3 n
x
= x + x2 + x3 + · · · + xn + · · · .
1−x
It is obvious that the function f (x) = x is the majorant for x > −1 of
the function g(x) = ln(1 + x) since x ≥ ln(1 + x) for all values x > −1.
However, in this (special) sense f (x) = x is no longer the majorant of ln(1+x).
The majorants of power series are widely used in the theory of differential
equations.
Theorem 4.1.3 Let g(z) be an analytic function with convergence radius r >
0, and let f (z) be an entire function with its simple majorant function fˆ(z)
satisfying the condition
q
lim |fˆ(k)| = θ > 0.
k
k→∞
Then, the series transformation formula (4.2) with t → z and f (k) being
replaced by fˆ(k) is absolutely convergent for |z| < min {r, r/θ}.
Corollary 4.1.4 Let both g(z) and f (z) be entire functions and let θ be given
as in Theorem 4.1.3. Then, formula (4.2) is absolutely convergent for every
z ∈ C whenever 0 < θ < ∞.
Xm Xk
k m j k k
m = ∆ 0 = (m)j ,
j=0
j j=0
j
where the jth falling factorial (m)j = m!/(m − j)! for m ≥ j ≥ 0 and 0
otherwise.
Methods of Using Special Function Sequences 199
Since fˆ(z) is also an entire function, it is clear that the following expansions
are absolutely convergent:
∞
g (m) (0) ˆ g (m) (0) X (k) mk
f (m) = |f (0)|
m! m! k!
k=0
X∞ k
|f (k) (0)| X (m)j k (m)
= g (0),
k! j=0
m! j
k=0
for m ∈ N0 .
On the other hand, for |z| < min {r, r/θ}, we have by Cauchy-Hadamard’s
formula for r:
k 1/k
z r
lim fˆ(k)g (k) (0) ≤ θ · r−1 · |z| < θ · r−1 · = 1.
k→∞ k! θ
Thus by Cauchy’s root test, we see that the simple majorant series of the LHS
of (4.2) (with t → z) with f (k) being replaced by fˆ(k) must be absolutely
convergent. This guarantees that all the double series occurring below are
absolutely convergent, and that the exchange of orders of double summations
is permissible. Namely, we have
X∞ X∞ X∞ Xk
g (m) (0) ˆ |f (k)
(0)| (m) j k
f (m)z m = g (m) (0) z m
m=0
m! m=0 k=0
k! j=0
m! j
X∞ ∞ k
|f (k) (0)| X X (m)j k (m) m
= g (0) z
k! m=0 j=0
m! j
k=0
X∞ k ∞
|f (k) (0)| X k j X g (m) (0) m−j
= z z
k! j=0
j m=j
(m − j)!
k=0
∞
X k
|f (k) (0)| X k
= g (j) (z)z j
k! j=0
j
k=0
X∞ (k)
|f (0)|
= Ak (z, g(z)).
k!
k=0
This shows that (4.2) holds for fˆ(z) instead of f (z). As may be observed,
the above procedure can be performed similarly when g(z) is replaced by
its simple majorant series ĝ(z) (accordingly g (m) (z) by ĝ (m) (z)). Thus, we
can conclude that the absolute convergence of (4.2) is always ensured by the
condition |z| < min{r, r/θ), and the theorem is proved.
200 Methods for the Summation of Series
From our argument, Corollary 4.1.4 follows as a result for the special case
r = ∞.
Let us now make use of Theorems 4.1.1 and 4.1.3 to furnish some con-
vergence conditions for the following expansions. More applications to the
convergence of the other source expansions will be seen in the next subsec-
tion.
Example 4.1.5 Let f (z) be a polynomial in z of degree ∂f (t) = p. Then,
(4.1) and (4.2) yield the following closed sum formulas:
∞
X X p
zk zk
f (k)g (k) (0) = ∆k f (0)g (k) (z) (4.12)
k! k!
k=0 k=0
X∞ Xp
zk 1 (k)
f (k)g (k) (0) = f (0)Ak (z, g(z)), (4.13)
k! k!
k=0 k=0
p
Under the known condition, limk→∞ k |f (k)| = 1. So, it follows that both
series on the LHS of (4.12) and (4.13) are absolutely convergent for |z| < r
wherever g(z) is analytic for |z| < r. Of course, the validity of (4.13) for
|z| < r also follows from Theorem 4.1.3. Moreover, it may be worth noticing
that the conditions ∆k f (0) = 0 (k > p) could make the proof of Theorem
4.1.1 much simplified so that the conclusion involving convergence condition
|z| < r/(2 + θ) may be extended to the form |z| < r/θ, partly consistent with
the conclusion of Theorem 4.1.3.
As will be seen, convergence condition mentioned in Example 4.1.5 could
apply to all the infinite series appearing in the next two subsections.
Theorem 4.1.6 Let g(z) be an analytic function with convergence radius r >
0. Then, for z : |z| < r, we have
∞
X p
X
α + k (k) z k α zk
g (0) = g (k) (z) , (4.20)
p k! p−k k!
k=0 k=0
X∞ X p
zk
(βk + γ|α)p g (k) (0) = S(p, k)g (k) (z)(βz)k . (4.21)
k!
k=0 k=0
Evidently, under the same assumption as above, from formula (4.1) with
t → z and g(z) = (1 + z)α , we have
∞
X ∞
X
α k α zk
f (k)z = ∆k f (0) . (4.22)
k k (1 + z)k−α
k=0 k=0
This not only gives a generating function for the sequence ( αk f (k)) but also
admits a symbolization process (cf. Section 3.1). To be more precise for the
latter, let z be replaced by the difference operator ∆ so that
zk ∆k
→ = ∆k E α−k ,
(1 + z)k−α (1 + ∆)k−α
and we see that the last equality turns out to be an operational formula
applicable to any formal power series φ.
It is well-known that
1
Fk = √ ak+1 − bk+1
5
√ √
with a = (1 + 5)/2, b = (1 − 5)/2, and that
( k+1 k+1 )
k 1 k! a b
D = √ − .
1 − t − t2 5 1 − at 1 − bt
Next, making use of (4.18) and (4.19) and choosing g(t) to be the easily
computed functions such as
√
(i) (1 + t)s , (ii) (1 − t)s−1 (s ∈ R),(iii) 1/ 1 − 4t, (iv) (t)n (n ∈ N),
1
(v) log(1 − t), (vi) at (a > 0, a 6= 1),(vii) Bn (t), (viii) ,
1 − t − t2
successively, we can obtain a list of formulas and identities, which we state
without going into details as the following and leave their proofs as Exercise
4.3:
X∞ p
α+k s k X α s tk
t = (|t| < 1), (4.31)
p k p−k k (1 + t)k−s
k=0 k=0
X∞ p
α+k s+k k X α s+k tk
t = (|t| < 1),
p k p−k k (1 − t)s+k+1
k=0 k=0
(4.32)
X∞ Xp k
α+k 2k k α 2k t
t = (|t| < 1/4), (4.33)
p k p−k k (1 − 4t)k+1/2
k=0 k=0
X∞ X p
α+k n α n−1 n−1
(−1)k = (−1)k+1 − (p ∈ N),
p k p−k k k−1
k=0 k=0
(4.34)
∞
X k p
X k
α + k (t log a) α (t log a)
= at (t ∈ R), (4.35)
p k! p−k k!
k=0 k=0
204 Methods for the Summation of Series
X∞ Xp
α + k tk α 1 α tk
= log + (|t| < 1), (4.36)
p k p 1−t p − k k(1 − t)k
k=0 k=1
Xn Xp
α+k n α n
Bn−k tk = Bn−k tk , (4.37)
p k p−k k
k=0 k=0
Xn
k n k n p
Bn−k t = Bn−p (t) t , (4.38)
p k p
k=0
X∞ p ( k+1 k+1 )
α+k k 1 X α a b
Fk t = √ − tk ,
p 5 p−k 1 − at 1 − bt
k=0 k=0
(4.39)
∞ ( )
X k p+1 p+1
1 a b
Fk tk = √ − tp , (4.40)
p 5 1 − at 1 − bt
k=0
√
Both (4.39) and (4.40) are valid for |t| < ( 5 − 1)/2.
X∞ p
s k X (s)k (βt)k
(βk + γ|α)p t = S(p, k) (|t| < 1), (4.41)
k (1 + t)k−s
k=0 k=0
X∞ p
s+k k X (s + k)k (βt)k
(βk + γ|α)p t = S(p, k) (|t| < 1), (4.42)
k (1 + t)k+s+1
k=0 k=0
X∞ p
2k k X (2k)k (βt)k
(βk + γ|α)p t = S(p, k) (|t| < 1/4), (4.43)
k=0
k
k=0
(1 − 4t)k+1/2
X∞ X p
n n−1 n−1
(−1)k (βk + γ|α)p = (−1)k+1 S(p, k) − k!β k ,
k k k−1
k=0 k=1
(4.44)
∞
X k p
X
(t log a)
(βk + γ|α)p = at S(p, k)(βt log a)k (t ∈ R), (4.45)
k!
k=0 k=0
X∞ X p
tk
(βk + γ|α)p = et S(p, k)(βt)k (t ∈ R) (4.46)
k!
k=0 k=0
X∞ X p
tk 1 (k − 1)!(βt)k
(βk + γ|α)p = (γ|α)p log + S(p, k) (|t| < 1)
k! 1−t (1 − t)k
k=0 k=1
(4.47)
∞
X Xp
n k
(βk + γ|α)p Bn−k t = S(p, k)Bn−k (t)(βt)k , (4.48)
k
k=0 k=0
Xn Xp
p n k p
k Bn−k t = Bn−k (t) (n)k tk , (4.49)
k k
k=0 k=0
Methods of Using Special Function Sequences 205
∞ p
( k+1 k+1 )
X X k!S(p, k) aβ bβ
(βk + γ|α)p Fk tk = √ − tk ,
5β 1 − at 1 − bt
k=0 k=0
(4.50)
∞ p ( k+1 k+1 )
X X p k! a b
k p Fk tk = √ − tk , (4.51)
k 5 1 − at 1 − bt
k=0 k=0
√
Both (4.50) and (4.51) are valid for |t| < ( 5 − 1)/2.
n
X
n k n−1 n−1
(−1)k = (−1)p+1 − (1 ≤ p ≤ n), (4.52)
k p p p−1
k=p
Xn X p
n n−1 n−1 p
(−1)k k p = (−1)k+1 k! − (p ≥ 1),
k k k−1 k
k=1 k=1
(4.53)
n
X Xp
p n p n−k
k = (n)k 2 (p ≥ 0). (4.54)
k k
k=0 k=0
Surely, most of the formulas displayed in the above list are not given before.
However, the last three identities (4.52)–(4.54) appear to be not so strange
and are included as particular cases of (4.34), (4.44), and (4.41), respectively.
It may be also of interest to notice that Euler’s formula (4.4) and Dobin-
ski’s equality (4.6) are special consequences implied by (4.42) (with s = 0,
(α, β, γ) = (0, 1, 0)) and (4.46) (with t = 1, (α, β, γ) = (0, 1, 0)), respectively.
Apart from these, it is especially noteworthy that (4.52) can be inverted via
the Stirling inversion (4.16) to get the following elegant and peculiar identity
involving three kinds of elementary counting numbers (cf. (4.15)) simultane-
ously:
Xn
n k−1 k−1 n
+ = , (1 ≤ p ≤ n). (4.55)
k p p−1 p
k=p
In view of Theorem 4.1.7, we see that the series expansions involved in (4.56)-
(4.58) are all convergent absolutely for |z| < min{1, 1/θ}.
We now go to the real field. Let g(t) be a given formal power series. As
previously, a direct application of (4.2) to f (t) = (t)p (p ∈ N) yields an identity
of the form
Xp
p
Ak (t, g(t)) = tp g (p) (t). (4.59)
k
k=1
This can be verified directly as follows:
∞
! ∞
X t k X tk
tp g (p) (t) =tp Dp g (k) (0) = (k)p g (k) (0)
k! k!
k=0 k=p
∞
X Xp
1 k p
= [D (t)p ]t=0 Ak (t, g(t)) = Ak (t, g(t)),
k! k
k=0 k=1
where Ak (t, g(t)) is given by (4.3). In fact, on taking the Stirling inversion
(4.16) into account, we readily see that (4.59) is equivalent to (4.3).
In particular, for the classical Eulerian fraction Ak (t, (1 − t)−1 ), it is easily
found that p
X p tp p!
Ak (t, (1 − t)−1 ) = . (4.60)
k (1 − t)p+1
k=1
Alternatively, by taking f (t) = Bp (t) (p ∈ N) in (4.2), we obtain immediately
X∞ X p
tk p
Bp (k)g (k) (0) = Bp−k Ak (t, g(t)). (4.61)
k! k
k=0 k=0
Then, for any given polynomial f (t) with degree ∂f (t) = p, we find that (4.23)
yields
∞
X X p
k α β+k k (−1)k β α α+β
(−1) f (k) = ∆ f (0) ,
k k α+β−k k k
k=0 k=0
(4.63)
where α + β 6= k for integers k with 0 ≤ k ≤ p. As for its convergence, we
have the following:
Proposition 4.1.8 For α, β > 0, the infinite series involved in (4.63) is ab-
solutely convergent for [β] ≥ p + 1, where [β] denotes the integer part of b.
Actually, for α, β > 0, we have the estimates
α [α] + 1 β+k k + [β]
≤ = O(1/k), ≥ = O(k [β] ), (k → ∞).
k k k [β]
This estimate justifies that the infinite series of (4.63) converges absolutely
for [β] ≥ p + 1.
As direct applications, (4.63) contains some infinite-type (analytic) com-
binatorial identities with f (t) = tp , t+λ
p , etc. as follows:
∞
X X p
k pα β+k (−1)k βk! p α α+β
(−1) k = , (4.64)
k k α+β−k k k k
k=0 k=0
X∞ X p
λ+k α β+k (−1)k β λ α α+β
(−1)k = ,
p k k α+β−k p−k k k
k=0 k=0
(4.65)
∞
X X p
β+k βk! p β−1
kp / = , (β ≥ p + 2), (4.66)
k β−k−1 k k
k=0 k=0
X∞
α β+k β
(−1)k = , (α > 0, β ≥ 1), (4.67)
k k α+β
k=0
208 Methods for the Summation of Series
∞
X −1
β+k β
= , (β ≥ 2). (4.68)
k β−1
k=0
In particular, it holds
n
X
x y x+y+n−k x+n y+n
= , (x, y ∈ R). (4.72)
k k n−k n n
k=0
It is worth mentioning that (4.71) is recorded by Koepf [146] (p. 41, Exer.
3.4) as Stanley’s identity, which obviously contains (4.72) as the special case
a = b = n. Identity (4.72) has been attributed as a well-known identity to the
old Chinese mathematician Li Shanlai who lived in Qing dynasty of China.
It was re-proved by a number of mathematicians including P. Turan, L. K.
Hua, et al. in various tricky ways.
Observe that both sides of each of the identities (4.69)–(4.72) consist of
algebraic polynomials with the same degrees in the real arguments x and y.
Thus, it suffices to verify them for the cases where the arguments are restricted
to be positive integers. In other words, we need only to consider the cases
x, y ∈ N.
Along this line, in order to deduce (4.69) from (4.23), we may take
t+β t
f (t) = , φm (t) = ,
n m
min{m,n}
X x x−k y−m
k m−k n−k
k=0
x
y
and the LHS of (4.23) yields m n , respectively. Thus (4.69) is established.
For the derivation of (4.70) from (4.23), it suffices to choose
t+m x+t
f (t) = , φ(t) = , (x ∈ N).
n x−m
in (4.23), after the similar computation, shows that the both sides of (4.23)
just generate identity (4.73), which is equivalent to (4.71).
Clearly, all summation formulas represented in this section just show that
(4.1) and (4.2) with their specializations really form the sources of many
particular formulas and identities, and as sources they should still be possible
to be utilized for getting more types of special formulas and identities than
those already displayed. Moreover, it may be worth predicting that certain
proper q-analog of (4.1) and (4.2) could be constructed so that various novel
q-identities might be derived therefrom. Meanwhile the author hope that WZ-
style proofs for the aforementioned combinatorial identities will be found soon.
Anyway, readers may suppose that much remains to be done after this present
section.
seen that formulas (3.2) and (3.3) form formulas (4.1) and (4.2), for which
the general convergence theorems are given by assuming g(z) to be an ana-
lytic function and f (z) to be functions satisfying certain conditions. Generally
speaking, the freedom of choices of g and f in (3.2) and (3.3) (i.e., (4.1) and
(4.2)) should imply the versatility of uses of the transformation formulas for
establishing various series summation formulas including some analytic com-
binatorial identities. Similarly, what we are considering in this section are the
following two ∆-operational transformation formulas for Newton-type series
from formula (3.1).
X α X α
f (k)∆k g(0) = ∆k f (0)∆k g(α − k), (4.74)
k k
k≥0 k≥0
X α + k X α + k
f (k)(−∆)k g(0) = ∆k f (0)(−∆)k g(−α − k − 1).
k k
k≥0 k≥0
(4.75)
In this section, we will use the formulas (4.74) and (4.75) to study two formu-
laic classes consisting of various combinatorial algebraic identities and series
summation formulas. The basic ideas include utilizing properly the ∆-operator
and Fibonacci numbers and Stirling numbers for some series transformations.
A variety of classic formulas and remarkable identities are shown to be the
members of the classes.
As may be observed, (4.74) and (4.75) could be deduced from each other by
letting α → −(α+1). Thus (4.74) is the simpler basic formula to be concerned.
In fact, the proof of the formal identity (4.74) is given in Theorem 3.2.13 and
certain of its nice applications have been briefly represented in Section 3.3.
Moreover, a further scrutiny of (4.74) reveals itself that it could even be
served as a source for drawing a variety of classic formulas and novel results.
Accordingly, (4.74) may be used as a source formula for defining a certain
class of formulas and identities. All of these together with other related things
will be expounded in this sections.
Then all the series involved in (4.74) and (4.75) are absolutely convergent so
that they give exact finite results.
Methods of Using Special Function Sequences 211
Obviously, for the special case f (t) being a polynomial, the right-hand
sides (RHS) of (4.74) and (4.75) just give finite series so that the condition
(4.77) certainly holds and may be omitted. Similarly both (4.76) and (4.77)
can be omitted in case g(t) is a polynomial. In what follows we will give a
proof for the general case.
Proof. It suffices to establish (4.74) with conditions (4.76) and (4.77). For the
sake of completeness and as a first step in the proof, a formal process may be
reproduced here to justify the formal equality (4.74) quite straightforwardly
as follows:
X α X α X α
k k k
f (k)x = x E f (0) = (xE)k f (0) = (1 + xE)α f (0)
k k k
k≥0 k≥0 k≥0
α
x
=(1 + x + x∆)α f (0) = (1 + x)α 1 + ∆ f (0)
1+x
X α
= xk (1 + x)α−k ∆k f (0).
k
k≥0
Having considered the above series as a formal power series in x, one may
utilize the well-known substitution rule x → ∆ to get the formal operational
equality of the form (cf. Section 2.2)
X α X α
k
f (k)∆ g(0) = ∆k f (0)∆k (1 + ∆)α−k g(0)
k k
k≥0 k≥0
X α
= ∆k f (0)∆k E α−k g(0)
k
k≥0
X α
= ∆k f (0)∆k g(α − k).
k
k≥0
The second step is to show that both sides of the above resultant equation are
absolutely convergent series. Note that
1/k
α
lim = 1, α ∈ R.
k→∞ k
Combining this with the conditions (4.76) and (4.77), we see that Cauchy’s
root-test is applicable to the series on the both sides of (4.74). Hence the
theorem is proved.
Here we will give a number of examples showing how to get various remark-
able formulas or identities from (4.74) via special choices of α, f (t), and g(t).
Some examples are given in Subsection 3.2.4 and/or Subsection 4.1.1 by using
different symbolic operational source formulas. The table for the calculation
of ∆k given at the beginning of Subsection 3.3.3 is helpful in the following
examples.
(1) The classical Newton interpolation formula is given by (4.74) with
f (t) = 1. Also, the binomial theorem for the expansion of (1 + x)α is given
by (4.74) with f (t) = 1 and g(t) = (1 + x)t so that ∆k g(0) = xk . Conver-
gence conditions are given by (4.76), viz. sup |∆k g(0)|1/k < 1 and |x| < 1,
respectively.
(2) Euler’s transform for alternating series is given by (4.74) with α = −1
and g(t) = 2t (so that ∆k g(0) = 1 and ∆k g(−k − 1) = 1/2k+1 ), namely,
X X (−1)k
(−1)k f (k) = ∆k f (0),
2k+1
k≥0 k≥0
n
X
x y t+y x+y
= = .
k n−k n t=x n
k=0
(4) Euler’s formula for arithmetic-geometric series (cf. Lemma 2.1.7 and
Example 2.2.7) is given by (4.74) with α = −1, f (t) = tr (r ∈ N0 ), and
g(t) = (1 − x)t (so that ∆k g(t) = (−x)k (1 − x)t ), namely
X r
X
r k j!xj r
k x = , |x| < 1,
j=0
(1 − x)j+1 j
k≥0
where rj are Stirling numbers of the second kind.
(5) Stirling’s summation formula for the higher order arithmetic
progres-
sion is given by (4.74) with α = −1, f (t) = tr , and g(t) = m−t (so that
k k m−t−k
m
∆ g(t) = (−1) m−k ), namely
m
X Xr
r r m+1
k = j! .
j=0
j j+1
k=0
It is easily seen that the left-hand side (LHS) of the identity may be
embedded
in the LHS of (4.74) by letting α → n and taking f (t) = x+n−t and g(t) =
m+t
n+m
n so that
k k x+n−t−k k m+t
∆ f (t) = (−1) , ∆ g(t) = .
m+n−k n−k
Correspondingly, the RHS of (4.74) gives
X
k n x+n−k m+n−k
(−1)
k m+n−k n−k
k≥0
X
x n x+n−k x x
= (−1)k = .
m k n−k m n
k≥0
(9) The well-known identity of Li Shanlai (cf. Section 4.1) is the following
X nmp + n + m − k p + np + m
= .
k k n+m n m
k≥0
Recall that (4.74) may also be written as (4.75) with the simple replace-
ment α → −(α + 1), and conversely.
(10) For the pair of Rosenbaum’s identities (cf. [58], p. 83)
m
X
k k+n−1 n
(−1) = 0, n ≥ m ≥ 1,
k m−k
k=0
Xm
k m k+n−1
(−1) = 0, n > m ≥ 1,
k m−1
k=0
it is easily observed that the LHS’s of the above two identities could be em-
bedded in the LHS of (4.75) by taking
t+n
α → (n − 1), f (t) = 1, g(t) = ,
m
and
t+n−1 m−t
α → −(m + 1), f (t) = , g(t) = ,
m−1 m
(11) As an extension of Stirling’s formula in the above (5) there holds the
identity
Xn r
α+k r X α+j α+n+1 r
k = j! .
k j=0
j n−j j
k=0
where the last sum follows easily from the fact that
Xm m k
2m − k k X 2m − k X k
2 =
m m j=0
j
k=0 k=0
m
X 2m − k X k m X X 2m − kk
m m
= =
m j=0
j j=0
m j
k=0 k=0
Xm X 2m + 1
m+1
2m + 1
= = = 22m , (4.78)
j=0
m + j + 1 j=1
m + j
Thus the special choice {α = x, f (t) = tm , g(t) = cos(αt + β)} in (4.74) leads
to a particular summation formula as follows:
∞
X x m α k k
k 2 sin cos β + (α + π)
k 2 2
k=0
m α k
Xm
x k
= k! 2 sin cos αx + β + (π − α)
k k 2 2
k=0
∞
X x α k k
k m 2 sin sin β + (α + π)
k 2 2
k=0
m α k
m
X x k
= k! 2 sin sin αx + β + (π − α)
k k 2 2
k=0
where the infinite series is absolutely convergent for 0 < α < π so that
|2 sin α| < 1.
As we have seen, all what given above has shown that formula (4.74) could
be really useful as a source for obtaining a considerable variety of formulas
and identities, including classic ones and new ones. This fact may justify that
one could useful (4.74) as a “source formula” to define a significant class of
formulas and identities. Actually this will be one of the two formulaic classes
to be considered in the next subsection.
we have
k α+s−t−k
k k k s
∆ g(t) = (−1) , ∆ g(α − k) = (−1) .
m−k m−k
Xm
α α+1−k α α
Fr−k = Fm+r + Fm+r−1 ,
k m−k m m−1
k=0
Xm
α α−k α
Fr−k = Fm+r ,
k m−k m
k=0
Xm
α α−k k α
(−1) Fk = − Fm ,
k m−k m
k=0
Xm Xm
m k m
(−1) Fm+k = 0, Fr−k = Fr+m .
k k
k=0 k=0
Certainly these identities also imply various special identities, e.g., the third
identity has the following consequences
Xn
n
Fn−k (Fn+k + F2k−2n ) = 0,
k
k=0
Xn
n
Fk (F2k − F2n−k ) = 0,
k
k=0
Xn
n
(−1)k Fk (Fk + (−1)n F2k−n ) = 0.
k
k=0
These formulas also have various special consequences, e.g. the second formula
implies the following identity with s = r:
Xn X n
n 2 n
Fr+k = Fr−k Fr+2n−k .
k k
k=0 k=0
This is known as one of the oldest theorems about Fibonacci numbers, and
may be more precisely called Cassini-Kepler identity (cf. §6.6 of [79]).
The above examples suggest two combinatorial formulaic classes which
may be briefly called Sigma-Delta class (Σ∆ class) and Sigma-summation
class (ΣS class). We introduce (Σ∆) class in this subsection and (ΣS) class
in the next subsection. Some relations between these two classes will also be
discussed later. Let us give the following definitions.
Definition 4.2.3 The formula (4.74) is called a valid source formula when-
ever the involved sequence (f (k)) (k ∈ N0 ) and the entire function g(t) (t ∈ R)
satisfy the conditions (4.76) and (4.77) of Theorem 4.2.1.
Definition 4.2.4 Any special choice of the component set {α, f (k) or f (t),
g(t)} is called a “valid choice” if it could be embedded in the valid source
formula (4.74) to get an exact formula or a valid identity.
Evidently, all the formulas and identities given in this subsection are mostly
noticeable special examples of the (Σ∆) class. We think that still much remains
to be found or constructed successively.
The second formulaic class we wish to introduce is a set consisting of pairs
of equivalent formulas involving generalized binomial coefficients and general-
ized Stirling numbers (GSN) defined. We will adopt some familiar notations
as follows:
where α, β, and γ may be real or complex numbers. But in our present dis-
cussion we only need the GSN’s with two parameters, namely, S(n, k; α, β) =
6 β, the numbers pt
S(n, k; α, β, 0), where (α, β) ∈ R2 . Thus, for α = and
t
α
p (p ∈ N0 ) are related by the equations
β
p
X
t j! t
= S(p, j; α, β) , (4.81)
p α j=0 p! j β
p
X
t j! t
= S(p, j; β, α) . (4.82)
p β j=0 p! j α
k
! k
1 X k k−i i i 1 X k k−i i
j
= j ∆ γ βt = j γ β ∆j ti t=0
β j! i=0
i β j! i=0 i
t=0
k k
1 X k k−i i i X k i k−i i−j
= j γ d j! = γ β .
β j! i=0 i j i=0
i j
Moreover, substituting (4.81) into (4.82) or conversely, one may get the
orthogonality relations
X X
S(p, j; α, β)S(j, i; β, α) = S(p, j; β, α)S(j, i; α, β) = δpi .
i≤j≤p i≤j≤p
Making use of these relations, one may find that the “Extended Summation
Rule” as formulated in Hsu [127] can be restated in a refined form as follows.
Theorem 4.2.6 Let α and β be distinct real numbers, and let F (n, k) be
a bivariate function defined for integers n, k ≥ 0. If there can be found a
summation formula or a combinatorial algebraic identity such as
Xn
k
F (n, k) = φ(n, p, α), p ≥ 0, (4.85)
p α
k=0
Conversely, (4.86) also implies (4.85). In brief, (4.85) and (4.86) are equiva-
lent.
Xp Xj
j! i!
= S(p, j; α, β) S(j, i; β, α)φ(n, i, α)
j=0
p! i=0
j!
p
X Xp
j! i!
= φ(n, i, α) S(p, j; α, β) S(j, i; β, α)
i=0 j=i
p! j!
Xp
i!
= φ(n, i, α)δpi = φ(n, p, α) = RHS of (4.85).
i=0
p!
Completely similarly, for the case of infinite series there holds the following
theorem.
222 Methods for the Summation of Series
The proof follows from the similar lines as that of Theorem 4.2.6, and is
left for Exercise 4.6.
Note that the ordinary Stirling numbers and Lah’s numbers (in absolute
value) are special cases of GSN’s, namely,
n
S(n, k; 1, 0) = S1 (n, k) = ,
k
n
S(n, k; 0, 1) = S2 (n, k) = ,
k
n! n − 1
S(n, k; −1, 1) = .
k! k − 1
Thus it is easily seen that Theorems 4.2.6 and 4.2.7 imply two corollaries as
follows (by taking (α, β) = (1, 0) and (α, β) = (1, −1), respectively).
Corollary 4.2.8 The following three summation formulas are equivalent to
each other:
Xn
k
F (n, k) = φ(n, j), j ≥ 0, (4.90)
j
k=0
Xn Xp
p p
F (n, k)k = j!φ(n, j) , (4.91)
j=0
j
k=0
Xn X p
k+p−1 p−1
F (n, k) = φ(n, j) . (4.92)
p j−1
k=0 j=0
Corollary 4.2.9 Suppose that (4.87) holds. Then the following three summa-
tion formulas are equivalent to each other:
Xn
k
F (n, k) = Φ(j), j ≥ 0, (4.93)
j
k=0
Xn Xp
p p
F (n, k)k = j!Φ(j) , (4.94)
j=0
j
k=0
Methods of Using Special Function Sequences 223
X n X p
k+p−1 p−1
F (n, k) = Φ(j) . (4.95)
p j=0
j−1
k=0
Actually there are many known identities of type (4.90) in which F (n, k) may
consist of a binomial coefficient or a product of binomial coefficients. See, e.g.,
Egorychev [58], Gould [73], and Riordan [183]. Consequently, we may find
various special summation formulas via (4.91). We now list a dozen formulas,
as follows:
Xn p
n k n−k X j n p
kp u v = j!u , u + v = 1, u > 0, (4.98)
k j=0
j j
k=0
[n/2]
X p
X
p n n−2j−1 n n−j p
k = j!2 , (4.99)
2k j=0
n−j j j
k=0
[n/2]
X X p
n+1 n−j p
kp = 2n−2j j! , (4.100)
2k + 1 j=0
j j
k=0
Xn X p
n−k n+1 p
kp = j! , (4.101)
s j=0
s+j+1 j
k=0
Xn X p
p s+k n+1−j n+1 n+s+1 p
k = j! , (4.102)
s j=0
s+1+j j s j
k=0
Xn X p
k p n+k n 2j 2n + 1 n + j p
(−4) k = (−1) 2 j! , (4.103)
2k j=0
2j + 1 2j j
k=0
Xn X p
n n+k n n+j p
(−4)k k p = (−1)n 22j j! , (4.104)
n+k 2k j=0
n + j 2j j
k=0
[n/2]
X X p
k n−2k p n−k j n+1 p
(−1) 2 k = (−1) j! , (4.105)
k j=0
2j + 1 j
k=0
224 Methods for the Summation of Series
Xn X p
p α β α α+β−j p
k = j! , α, β ∈ R, (4.106)
k n−k j=0
j n−j j
k=0
Xn X p 2
k p n 2n − k j n p
(−1) k = (−1) j! , (4.107)
k n j=0
j j
k=0
[n/2]
X
X p
2k n n 2n − 2j p
2n−2k k p = j! , (4.108)
k 2kj=0
j n j
k=0
Xn Xp
p n+1 1 p
k Hk = j! Hn+1 − , (4.109)
j=1
j+1 j+1 j
k=1
and
[n/2]
X
k n−2k k n−k j n+1
(−1) 2 = (−1) (4.111)
j k 2j + 1
k=j
due to Knuth and Ascher, respectively (cf. (3.155) and (3.179) of [73]). More-
over, (4.109) may be inferred from the known relation (cf, e.g., pp. 98-99 in
Ch. 3 of [2]):
Xn
k n+1 1
Hk = Hn+1 − . (4.112)
j j+1 j+1
k=j
Evidently, both (4.101) and (4.102) imply (4.97) with s = 0, and (4.106)
yields the Vandermonde convolution identity when p = 0. Moreover, it is
easily found that (4.109) leads to an asymptotic relation, for n → ∞ of the
following,
Xn
p np+1 1
k Hk ∼ log n + γ − , (4.113)
p+1 p+1
k=1
Evidently, all the formulas given by the examples (4), (5), (6), and (11)
of Subsection 4.2.1 belong to both (Σ∆) and (ΣS) so that the intersection
set (Σ∆) ∪ (ΣS) is non-empty. Moreover, it is easily observed that the pair of
Moriarty identities
[n/2] [n/2]
X k n X k n
n−2j−1 n n−j n−2j n − j
=2 , =2
j 2k n−j j j 2k + 1 j
k=0 k=0
(4.114)
cannot be embedded in (4.74) so that they are not the members of the (Σ∆)
class. However, they belong to the (ΣS) class. This means that (ΣS) is not a
subset of (Σ∆).
As typical members of (ΣS) we will mention here several pairs of equivalent
formulas that are implied by the equivalence relations (4.90) ⇐⇒ (4.91) and
(4.93) ⇐⇒ (4.94). In certain pairs given below the notations ω(p), Hk , and
Fk denote, respectively, the Bell numbers, harmonic numbers and Fibonacci
numbers, namely
Xp
p 1 1
ω(p) = , Hk = 1 + + ··· + , k ≥ 1,
j=1
j 2 k
√ √ √
and Fk = (ak+1 − bk+1 )/ 5 with a = (1 + 5)/2 and b = (1 − 5)/2.
( Pn
k
k=0 = n+1 (Zhu Shijie identity),
Pn j
p
j+1
Pp
n+1 p (4.115)
k=0 k = j=0 j! j+1 j (Stirling’s formula),
226 Methods for the Summation of Series
( P P∞ (k)
n 1 k
= j!1 k=0 k!j = j!e ,
Pnk=0 k! j
1 p
Pp p (4.116)
k=0 k! k = e j=0 j = eω(p) (Dobinski’s formula),
( Pn
k k j
x
j x = (1−x) j+1 , |x| < 1,
Pk=0
n p k
Pp xj
p (4.117)
k=0 k x = j=0 j! (1−x)j+1 j (Euler’s formula),
( Pn
s+k k s+j n+s+1
Pk=0 s j =P j n−j
(Knuth’s identity),
n s+k p p s+j n+s+1 p (4.118)
k=0 s k = j=0 j! j n−j j ,
Pn
k n+1 1
k=0 j Hk = j+1 Hn+1 − j+1 ,
Pn P (4.119)
p p n+1 1 p
k=0 k H k = j=0 j! j+1 H n+1 − j+1 j ,
Pn j+1 j+1
k k+1 1 ax bx
k=0 j Fk x = √5 1−ax − 1−bx ,
j+1
Pn p k+1 1
Pp ax
j+1
bx p
k=0 k Fk x = √5 j=0 j! 1−ax − 1−bx j ,
for |x| < 0.618.
(4.120)
As may be observed, the pairs (4.115), (4.116), and (4.117) just reveal the
fact that certain somewhat harder summation formulas are actually equiv-
alent to some rather simple equalities. Generally, the real situation is that
once Stirling numbers have been introduced into play, everything regarding
summation problems becomes apparently simplified and more easily treated.
We now make use of Knuth’s identity (4.110) and the GSN of the form
S(n, k; θ, 1, λ + j) to get some summation formulas. The first result is the
following.
Theorem 4.2.11 For any given integers j ≥ 0 and p ≥ 0, we have a sum-
mation formula as follows:
n
X p
k n + 1 X (n + 1 − j)r+1
(k + λ|θ)p = S(p, r; θ, 1, λ + j), (4.121)
j j r=0
r+j+1
k=j
Proof. Let us start with the relation (4.80) which is actually an algebraic
identity involving variables α, β, γ and t. Making substitutions α → θ, β → 1,
γ → λ + j, and t → k + λ, we find that (4.80) may be rewritten in the form
p
X
k−j
(k + λ|θ)p = r!S(p, r; θ, 1, λ + j) . (4.122)
r=0
r
Methods of Using Special Function Sequences 227
Xn Xp Xn
k k−j k
(k + λ|θ)p = r!S(p, r; θ, 1, λ + j)
j r=0
r j
k=j k=j
p
n+1 X r+1 n+1−j
= r! S(p, r; θ, 1, λ + j)
j r=0
r+j+1 r+1
p
n + 1 X (n + 1 − j)r+1
= S(p, r; θ, 1, λ + j). (4.124)
j r=0
r+j+1
Note also that (4.125) is implied by (4.83) and that (4.126) just follows
from the well-known expression for higher differences. It is clear that (4.126)
is a formula of rank 1 since it consists of only a single summation involving
elementary terms. Consequently, formula (4.121) is of rank 2.
Remark 4.2.12 In fact, that formula (4.121) is like a dual to formula (35)
of [132], which states
n
X Xp
n n
(k + λ|θ)p = r!2n−r S(p, r; θ, 1, λ), (4.127)
k r=0
r
k=0
where S(p, r; θ, 1, λ)s are given by (4.126) with j = 0. So, (4.127) is also a
formula of rank 2. We can derive formula (4.127) using our method developed
228 Methods for the Summation of Series
here, which is less complicated than that used in [132]. Indeed, from formula
(4.122) and the identity
n k n n−r
= , (4.128)
k r r k−r
we have
Xn Xp Xn
n n k
(k + λ|θ)p = r!S(p, r; θ, 1, λ)
k r=0
k r
k=0 k=0
Xp n
n X n−r
= r!S(p, r; θ, 1, λ)
r=0
r k−r
k=r
Xp X n − r
n−r
n
= r! S(p, r; θ, 1, λ)
r=0
r k
k=0
Xp
n
= r!2n−r S(p, r; θ, 1, λ). (4.129)
r=0
r
Note that (4.130) and (4.132) are different from the main results of Gould
and Wetweerapong [78], nevertheless they are comparable with each other.
Methods of Using Special Function Sequences 229
By using residue method, Huang [136] provided an identity for (4.132) with
p = 2. Jones [140] also used a telescoping series to derive a different formula
of (4.132), namely,
n
X Xn
k p p n+1 p p n−1 i
k =j + (i − (i − 1) ) − .
j j+1 i=j+1
j+1 j+1
k=j
(4.134)
If θ = 1 in Corollary 4.2.13, then we have the following:
Corollary 4.2.14 We have a pair of formulas of rank 1 as follows:
n
X p
k k n+1 X j +1 n−j j
= , (4.135)
j p j + 1 r=0 r + j + 1 r p−r
k=j
Xn 2 p
k n+1 X p+1 n−p p
= . (4.136)
p p + 1 r=0 r + p + 1 r r
k=j
Here, using (4.131) and the higher difference formula, that we easily find
r
p! X r i+j
S(p, r; 1, 1, j) = (−1)r−j
r! i=0 i p
p! t+j p! j
= ∆r = (4.138)
r! p t=0 r! p − r
Identity (4.143) (i.e., (4.115)) is known as the most old formula found in
the 14th century by ancient Chinese mathematician Zhu Shijie. Indeed, (4.143)
appeared in the second mathematics book of Zhu which was published in 1303
AD. Certainly, (4.143) is a formula of rank 0.
There is a closed formula for other types of combinatorial sums involving
generalized factorials. For example, we have the following known results (cf.
[132]):
n 2
X p
X
n 2n − r
(k + λ|θ)p = (n)r S(p, r; θ, 1, λ), (4.144)
k r=0
n
k=0
[n/2] p
X n X n n−r
(k + λ|θ)p = r!2n−2r−1 S(p, r; θ, 1, λ), (4.145)
2k r=0
n−r r
k=0
which appeared in Li’s writings in 1860s and was given several proofs 50
years ago by a number of authors including Paul Turan, Loo-Keng Hua, et al.
The related references are too numerous to be given. Here it may be worth
mentioning that this identity is a particular consequence of (4.144). Recall
that
s m s s−n
= . (4.150)
m n n m−n
m+n
From (4.138),we have j!S(2n, j; 1, 1, m + n) = (2n)! 2n−j . Thus, we see that
from formula (4.144) with λ = m + n, θ = 1, and p = 2n there holds
n 2
1 X n
LHS of (4.149) = (k + m + n|1)2n
2n! k
k=0
n
1 X 2n − j n
= j! S(2n, j; 1, 1, m + n)
2n! j=0 n j
Xn
n 2n − j m+n
=
j=0
j n 2n − j
232 Methods for the Summation of Series
Xn
n m+n m
= (by (4.150))
j=0
j n n−j
m+n m+n
= = RHS of (4.149). (4.151)
n n
It is clear that formula (4.121) is useful for practical computations when-
ever n is much bigger than p, denoted by n >> p2 . Observe that for large n,
the asymptotic behavior of the combinatorial sums in (4.121) is mainly deter-
mined by those principal terms (i.e., the terms with r = p) within the closed
formula. Also note that S(p, p; ·, ·, ·) = 1. Thus, we easily obtain a simple
asymptotic relation for n → ∞ as follows:
Xn p
k (n + 1)j X (n + 1 − j)r+1
(k + λ|θ)p = S(p, r; θ, 1, λ + j)
j j! r=0
r+j+1
k=j
nj np+1 np+j+1
∼ = . (4.152)
j! p + j + 1 j!(p + j + 1)
Certainly, the asymptotic estimate given by (4.152) can be refined by taking
into account those terms with r = p − 1, r = p − 2, and so forth, within the
closed formula. And accordingly, values of S(p, p − 1; ·, ·, ·), S(p, p − 2; ·, ·, ·),
and so forth are required to be evaluated.
In what follows we will show how to make use of the GSN of the form
S(n, k, 1/m, 1) (m ∈ N) to get some formulas with closed forms for the fol-
lowing sums
n
X [n/2]
X n + 1 mk X∞ Xn
s+k mk 1 mk mk
, , , Hk .
s p 2k + 1 p k! p p
k=0 k=0 k=0 k=0
k mk
p
Note that p 1/m = p /m . Thus, by using Theorems 4.2.6 and 4.2.7 with
(α, β) = (1, 1/m), we may easily obtain four sum formulas as follows
Xn X p
s+k mk j! s + j n+s+1 1
= mp S p, j; , 1 ,
s p j=0
p! j n−j m
k=0
(4.153)
[n/2] p
X n+1 mk X j! n − j 1
= mp 2n−2j S p, j; , 1 , (4.154)
2k + 1 p j=0
p! j m
k=0
∞ p
1 X 1 mk e X 1
= S p, j; , 1 , (4.155)
mp k! p p! j=0 m
k=0
Xn Xp
mk j! n + 1 1 1
Hk = m p Hn+1 − S p, j; , 1 .
p j=0
p! j + 1 j+1 m
k=0
(4.156)
Methods of Using Special Function Sequences 233
Suppose that there have been given known summation formulas such as (4.90)
and (4.93). One may ask whether there could be constructed certain explicit
sum formulas for the sums of the forms
Xn X∞
mk + q mk + q
F (n, k) and F (k) .
p p
k=0 k=0
mk+q
Certainly, the existence of solution is out of question since p is a poly-
′
nomial in k of degree p and can be expressed as a linear combination of kj s.
However, the real problem is to find constructive expressions. Recall that for
the 3-parameter GSN’s we have the basic relations
Xp
t j! t+r
= S(p, j; α, β, −r) , (4.157)
p α j=0 p! j β
Xp
t+r j! t
= S(p, j; β, α, r) . (4.158)
p β j=0
p! j α
These two summation formulas are really equivalent to the simpler formulas
(4.90) and (4.93), respectively, and this can be verified by using the orthogo-
nality relations between S(p, j; α, β, −r) and S(j, i; β, α, r) with (α, β, −r) =
(1, 1/m, −q/m) (cf. Proof of Theorem 4.2.6).
Certainly, (4.159) and (4.160) may be used to generalize (4.153)–(4.156)
to the forms in which p and S(p, j, 1/m, 1) are replaced by mk+p p and S(p, j;
1/m, 1, q/m), respectively. Of particular interest may be the extension for
Dobinski’s identity, namely
n p
1 X 1 mk + q 1 X 1 q
= S p, j; , 1, ,
emp k! p p! j=0 m m
k=0
where
1 q p
lim S p, j; , 1, = S(p, j; 0, 1, 0) = .
m→∞ m m j
As regards the practical computation of GSN S(n, k) ≡ S(n, k; α, β, r), the
following recurrence relation may be utilized [132]:
Thus, the pascal matrix is the Riordan array (1/(1 − t), t/(1 − t)). The
operation of the Riordan group is the regular matrix multiplication, and the
identity matrix is
1 0 0 0
0 1 0 0
0 0 1 0 ···
(1, t) = .
0 0 0 1
..
··· .
In this section, we will see that Riordan arrays provide a wealth of tools
to construct summation formulas and identities.
translates to
2
h0 g (t) + h1 g (t) f (t) + h2 g (t) f (t) + · · · = g (t) · h (f (t)) = d (t) .
Particularly, if (g, f ) = (1/(1 − t), t/(1 − t)), then the FTRA (4.169) is the
following well-known Euler transformation:
X n 1
t
n
hk = [t ] h . (4.170)
k 1−t 1−t
k≥0
Thus, the Riordan group is the set of all pairs (g, f ) together with the multi-
plication operation shown in (4.171). If we denote the compositional inverse
of f as f¯, then
−1 1 ¯
(g, f ) = f .
g ◦ f¯
t
As an example we return to the Pascal matrix where f = 1−t . The inverse
t
1
is f = 1+t , g f = 1− t = 1 + t and the inverse matrix starts
( 1+t )
1 0 0 0 0
−1 1 0 0 0
1 t
, = 1 −2 1 0 0
.
1+t 1+t −1 3 −3 1 0
1 −4 6 −4 1
Here is a list of six important subgroups of the Riordan group (cf. [196]).
• the Appell subgroup {(g(t), t)}.
• the Lagrange (associated) subgroup {(1, f (t))}.
• the k-Bell subgroup {(g(t), t(g(t))k )}, where k is a fixed positive integer.
• the hitting-time subgroup {(tf ′ (t)/f (t), f (t))}.
• the derivative subgroup {(f ′ (t), f (t))}.
• the checkerboard subgroup {(g(t), f (t))}, where g is an even function and f
is an odd function.
The 1-Bell subgroup is referred to as the Bell subgroup for short, and the
Appell subgroup can be considered as the 0-Bell subgroup if we allow k = 0
to be included in the definition of the k-Bell subgroup. The proof of that the
above six subsets are subgroups of the Riordan group is left as Exercise 4.6.
Some of the main results on the Riordan group and its application to
combinatorial sums and identities can be found in [6], [14]-[17], [36]-[37], [38]–
[42], [54]–[55], [65], [76], [84]–[95], [97], [105], [113], [108]-[110], [138], [151]-
[153], [158]-[161], [170]-[171], [178], [174]-[175], [183]-[184], [193]-[195], [198]-
[199], [201]–[202], [220]-[223], [209], and [227].
where the sum is actually finite since dn,k = 0 for all k > n. Hence, for
D = (g(t), f (t))
t
f (t) = tA(f (t)) or A(t) = ¯ , (4.173)
f (t)
where f¯(t) is the compositional inverse of f (t). Moreover, we have the La-
grange inversion formula
k n−k
[tn ](f (t))k = [t ](A(t))n , (4.174)
n
or equivalently,
¯ −n
k n−k f (t)
[tn ](f (t))k = [t ] . (4.175)
n t
Particularly, for k = 1,
1 −1 1 1
[tn ]f (t) = [t ] ¯ n = [t−1 ]A(t)n . (4.176)
n f (t) n
Proof. Suppose that D is the Riordan array (g(t), f (t)). We consider the Ri-
ordan array (g(t)f (t)/t, f (t)) and define the Riordan array (A(t), Ã(t)) by the
relation:
−1 f (t)
(A(t), Ã(t)) = (g(t), f (t)) g(t) , f (t)
t
or
f (t)
(g(t), f (t))(A(t), Ã(t)) = g(t) , f (t) .
t
By performing the Riordan array product, we find
f (t)
g(t)A(f (t)) = g(t) and Ã(f (t)) = f (t). (4.177)
t
g(t)f (t)
[tn ] f (t)k = [tn+1 ]g(t)f (t)k+1 = dn+1,k+1 .
t
By equating these two quantities, we have the identity (4.172). We remark
that the first relation in (4.177) is equivalent to tA(h(t)) = f (t).
240 Methods for the Summation of Series
For the converse, let us observe that (4.172) uniquely defines the array
D when the elements of column 0, (d0,0 , d1,0 , d2,0 , . . .), are given. Let g(t) be
the generating function of the column 0, A(t) the generating function of the
sequence A. We now define f (t) as the solution of the functional equation
f (t) = tA(f (t)). It can be seen that f is uniquely determined because of
the hypothesis a0 6= 0. We can therefore consider the Riordan array D̂ =
(g(t), f (t)), which satisfies relation (4.172) for every n, k ∈ N0 by the proved
first part of the theorem. Hence, D̂ must be the same as D.
The equivalence between formulas (4.174) and (4.175) is obvious because
of A(t) = t/f¯(t). The formula (4.175) results from (4.173) and the following
process. Denote by dˆn,k the (n, k) entry of the product of the matrix with the
(n, k) entry shown on the right-hand side of (4.175) and the Riordan array
with the (n, k) entry as [tn ]f¯(t)k . Then,
X ℓ ¯ −n
f (t)
dˆn,k = [t n−ℓ
] [tℓ ]f¯(t)k
n t
k≤ℓ≤n
X 1 ¯ −n
f (t)
= [t n−ℓ
] [tℓ ](tD(f¯(t)k )
n t
k≤ℓ≤n
X k ¯ −n
f (t)
= [t n−ℓ
] [tℓ ]tf¯(t)k−1 f¯′ (t)
n t
k≤ℓ≤n
k
= [tn ] tn+1 f¯(t)−n+k−1 f¯′ (t)
n
k
= [t0 ] tf¯(t)−n+k−1 f¯′ (t) .
n
P
Consequently, for k = n and f¯(t) = j≥1 f¯j tj , we have
P ¯ j−1
¯′ j≥1 j fj t
ˆ 0 f (t) 0
dn,n = [t ]t ¯ = [t ]t P = 1.
f (t) t j≥1 f¯j tj−1
P
For k < n and f¯(t) = j≥1 f¯j tj , we have
¯ −n+k
k f (t)
dˆn,k = [t0 ] tD =0
n −n + k
because in the derivative of the Laurent series following sign D term t−1 cannot
occur. Hence, (dˆn,k )n,k≥0 = (1, t), the identity Riordan array, which implies
that the matrix with the (n, k) entry shown on the right-hand side of (4.175)
is the inverse of (1, f¯). Since the unique inverse of (1, f¯) is (1, f ), we obtain
(4.175). Consequently, (4.176) follows for k = 1.
Methods of Using Special Function Sequences 241
Stanley [203] gives three proofs of the Lagrange inversion formula (4.174)
(or (4.175)): direct algebraic argument by using Laurent series, ordinary gen-
erating function argument, and exponential generating function argument,
while Theorem 4.3.1 gives a proof by using Riordan array argument.
We now use Riordan array approach to unify the Lagrange inversion for-
mulas shown in Theorem A of [44] (cf. (4.175) below), Theorem 5.1 of [216]
(cf. (4.179) below), and Formula K6′ of [160], respectively.
Corollary 4.3.2 Let f (t)F 1 , and let F (t) ∈ F 0 . Denote the generating func-
tions of the A-sequences of Riordan arrays (1, f (t)) and (1, f (t))−1 = (1, f¯(t))
by A(t) and A∗ (t), respectively. Then the Lagrange inversion formula (4.175)
has the following equivalent forms.
−n
k k f (t)
[tn ](f¯(t))k = [tn−k ](A∗ (t))n = [tn−k ] , (4.178)
n n t
1
[tn ]F (f (t)) = [tn−1 ]F ′ (t)A(t)n , (4.179)
n
[tn ]F (f (t)) = [tn ]F (t)A(t)n−1 (A(t) − tA′ (t)), (4.180)
Proof. Replacing into (4.174) and (4.175) f (t) and A(t) by f¯(t) and A∗ (t),
respectively, and noting A∗ (t) = t/f , we can get (4.178). Conversely, from
(4.178), we can get (4.175). P
For F (t) ∈ F 0 with F (t) = k≥0 Fk tk , from (4.174) we have
X k X
[tn ]F (f (t)) = Fk [tn ]f (t)k =
Fk [tn−k ]A(t)n
n
k≥0 k≥0
1 n−k X n 1 n−1 X k−1
= [t ] kFk A(t) = [t ] kt Fk A(t)n
n n
k≥0 k≥0
1
= [tn−1 ]F ′ (t)A(t)n .
n
Thus, we obtain (4.179) from (4.174). Obviously, for F (t) = tk we find (4.174)
again from (4.179).
Secondly, we show that (4.179) implies (4.180). From (4.179) and noting
[tn−1 ]f ′ (t) = n[tn ]f (t), we have
1
[tn ]F (t)A(t)n = [tn−1 ](F (t)A(t)n )′
n
1
= [tn−1 ]F ′ (t)A(t)n + [tn−1 ]F (t)A(t)n−1 A′ (t)
n
=[tn ]F (f (t)) + [tn−1 ]F (t)A(t)n−1 A′ (t)
242 Methods for the Summation of Series
which implies
i.e., (4.180).
Finally, we show that (4.180) implies (4.174) and (4.175). Taking derivative
on the both sides of f (t) = tA(f (t)), we get
where we have substituted t = f /A(f ). By using (4.180) and the last expres-
sion for f ′ (t), we have
A(f )
[tn ]tf (t)k−1 f ′ (t) =[tn ] fk
A(f ) − f A′ (f )
tk A(t)
=[tn ] A(t)n−1 (A(t) − tA′ (t))
A(t) − tA′ (t)
=[tn ]tk A(t)n = [t2n−k ](tA(t))n .
We are now ready to establish (4.174) and (4.175) from (4.180) as follows.
n
k n−k t k k
[t ] ¯ = [tn−k ]A(t)n = [t2n−k ](tA(t))n
n f (t) n n
k 1
= [tn ]tf (t)k−1 f ′ (t) = [tn−1 ](f (t))k = [tn ]f (t)k ,
n n
which completes the proof of the corollary.
Since f (t) = tA(f (t)) implies f ′ (t) = A(f (t))/(1 − tA′ (f (t))), we may sub-
stitute the expression of f ′ (t) into the rightmost side of the last equations to
obtain (cf. Merlini, Sprugnoli, and Verri [160])
then a unique sequence Z = (zk )k∈N0 exists such that every element in column
0 can be expressed as a linear combination of all the elements in the preceding
row, i.e.:
∞
X
dn+1,0 = z0 dn,0 + z1 dn,1 + z2 dn,2 + · · · = zj dn,j . (4.183)
j=0
g0 g(f¯(t)) − g0
g(t) = or Z(t) = ¯ , (4.184)
1 − tZ(f (t)) f (t)d(f¯(t))
Hence,
g(t) = g0 + tg(t)Z(f (t)),
which implies the first equation of (4.184). Substituting t = f¯(t) into the first
equation, we obtain
g0
g(f¯(t)) = ,
1 − f¯(t)Z(t)
which gives the second equation of (4.184).
g(f¯(t)) − g0
Z(t) = ¯
f (t)d(f¯(t))
1 1 − t − t2
= − 1
1 − t − t2 t t→t−t2
2
= (1 + t)|t→t−t2 = 1 + t − t .
Proof. The definitions of the subgroups are shown Subsection 4.3.1 (or see
Exercise 4.6). The proof of the theorem follows the definitions of the subgroups
and is left for an exercise (cf. Exercise 4.8).
satisfies
g3 (t) = g1 (t)g2 (f1 (t)) and f3 (t) = f2 (f1 (t)).
Theorem 4.3.9 (cf. Theorems 3.3 and 3.4 [113]) Let D1 , D2 , and D3 =
D1 D2 be the Riordan arrays shown above, and let Ai (t) and Zi (t) be the gen-
erating functions of the A-sequence and Z-sequence of Di . Then
t
A3 (t) = A2 (t)A1 ,
A2 (t)
t t t
Z3 (t) − 1 − Z2 (t) Z1 + A1 z2 (t).
A2 (t) A2 (t) A2 (t)
The proof of Theorem 4.3.9 is left as Exercise 4.9.
Theorem 4.3.10 (cf. Theorems 4.1 and 4.2 [113]) Let D = (g, f ) be a Rior-
dan array. Then the A-sequence of the inverse Riordan array D−1 is
1
A∗ (t) = (4.185)
A(f (t))
and the Z-sequence of the inverse Riordan array D−1 is
−tZ(f (t))
Z ∗ (t) = . (4.186)
f (t)(1 − tZ(f (t)))
The proof is left as an exercise (cf. Exercise 4.10).
Methods of Using Special Function Sequences 247
Definition 4.3.11 Let (g, f ) = (dn,k )n,k≥0 be a Riordan array. Its related
half Riordan array (vn,k )n,k≥0 , called the vertical half Riordan array (VHRA),
is defined by
vn,k = d2n−k,n . (4.187)
Another related half Riordan array (hn,k )n,k≥0 , called the horizontal half Ri-
ordan array (HHRA), is defined by
series, and let φ(t) and u(t) = f (t)/t satisfy φ = tu(φ). Then, we have the
following Lagrange inversion formula that comes from (4.180) by replacing its
f and A by φ and u, respectively.
Theorem 4.3.12 Given a Riordan array (dn,k )n,k≥0 = (g, f ), for any inte-
gers p ≥ 1 and r ≥ 0, (dbn,k = dpn+r−k,(p−1)n+r )n,k≥0 defines a new Riordan
array, called the one-pth vertical Riordan array of (g, f ) with respect to r,
which can be written as
′
tφ (t)g(φ)f (φ)r tp
, φ , where φ(t) = , (4.190)
φr+1 f (t)p−1
Taking derivative on the both sides of φ = tu(φ) and noting the definition of
u(t), we obtain
p−1 p−2
′ f (φ) f (φ) f ′ (φ)φ′ (t)φ − φ′ (t)f (φ)
φ (t) = + t(p − 1) ,
φ φ φ2
which yields
p−1 , p−2 !
′ f (φ) f (φ) f ′ (φ)φ − f (φ)
φ (t) = 1 − t(p − 1) .
φ φ φ2
We now use (4.191), t = φp /f (φ)p−1 and the LIF shown in (4.189) to calculate
dbn,k for n, k ≥ 0
′ r
tφ (t)g(φ)f (φ)
dbn,k = [tn ]
k
(φ)
φr+1
φp φk (f (φ))p+r g(φ)
= [tn ] p−1
(f (φ)) φ (f (φ) − (p − 1)(φf ′ (φ) − f (φ)))
p+r
(f (φ))r+1 g(φ)
= [tn ] r−k
φ (f (φ) − (p − 1)(φf ′ (φ) − f (φ)))
(f (t))r+1 g(t)
= [tn ] r−k u(t)n−1 (u(t) − tu′ (t)),
t (f (t) − (p − 1)(tf ′ (t) − f (t)))
p−1
where u(t) = f (t) t and
p−2
f (t) tf ′ (t) − f (t)
u′ (t) = (p − 1) .
t t2
Substituting the expressions of u(t) and u′ (t) into the rightmost expression of
dbn,k , we have
Theorem 4.3.13 Given a Riordan array (dn,k )n,k≥0 = (g, f ), for any inte-
gers p ≥ 1 and r ≥ 0, (d˜n,k = dpn+r,(p−1)n+r+k )n,k≥0 defines a new Riordan
array, called the one-pth horizontal Riordan array of (g, f ) with respect to r,
which can be written as
′
tφ (t)g(φ)f (φ)r tp
, f (φ) , where φ(t) = , (4.192)
φr+1 f (t)p−1
Proof. We now use (4.191) and t = φp /f (φ)p−1 and the LIF shown in (4.189)
to calculate d˜n,k for n, k ≥ 0.
′ r
tφ (t)g(φ)f (φ)
d˜n,k =[tn ] (f (φ))k
φr+1
φp (f (φ))p+r+k g(φ)
=[tn ] p−1
(f (φ)) φ (f (φ) − (p − 1)(φf ′ (φ) − f (φ)))
p+r
(f (φ))r+k+1 g(φ)
=[tn ]
φr (f (φ)
− (p − 1)(φf ′ (φ) − f (φ)))
(f (t))r+k+1 g(t)
=[tn ] r u(t)n−1 (u(t) − tu′ (t)),
t (f (t) − (p − 1)(tf ′ (t) − f (t)))
p−1
f (t)
where u(t) = t . From the proof of Theorem 4.3.13
p−2
f (t) tf ′ (t) − f (t)
u′ (t) = (p − 1) .
t t2
Substituting the expressions of u(t) and u′ (t) into the rightmost expression of
d˜n,k , we have
(f (t))(p−1)n+r+k
=[tn ]g(t) = [tpn+r ]g(t)(f (t))(p−1)n+r+k
t(p−1)n+r
=dpn+r,(p−1)n+r+k .
¯ −n
k n−kf (t) k
[tn ](f (t))k = [t ] = [tn−k ](A(t))n , (4.193)
n t n
−n−k
n 2 k 2k n−k f¯(t) 2k n−k
[t ](tf (t) ) = [t ] = [t ](A(t))n+k , (4.194)
n+k t n+k
where A(t) = t/f¯(t) is the generating function of the A-sequence of (1, f ), and
(4.193) is (4.178) shown in Corollary 4.3.2.
t2
φ(t) = = f (t)
t2 /f¯(t)
252 Methods for the Summation of Series
to obtain
n
t2 n n k n
[t2n−k ] = [t ]φ = [tn ]f k ,
f¯ k k
which implies (4.178) and (4.193).
Similarly, from equations (4.188) and (4.192) with g = 1, p = 2, and r = 0,
we have
tφ′ (t)
[t2n ]f n+k = [tn ] f (φ(t))k ,
φ
where φ = t2 /f . Substituting f → t2 /f¯ into the above equation and noting
φ(t) = f (t), we have
n+k k
t2 tf ′ (t) f 2
[t2n ] ¯ = [tn ] = [tn+k−1 ]f ′ f 2k−1
f (t) f (t) t
1 n+k−1 d 2k n + k n+k 2k
= [t ] f = [t ]f ,
2k dt 2k
which implies (4.194).
k H k+1 D
d = dL d = dL
n+1,k+1 , (4.195)
n n,k n,k
n + 1 n,k
Proof. From the proof of Theorem 4.3.14 (or the proof of Corollary 4.3.2), we
obtain the first formula of (4.195). The second formula can be proved similarly
as follows.
1 n + 1 n+1
dD n ′ k
n,k = [t ]f (t)f (t) = [tn ](f (t)k+1 )′ = [t ]f (t)k+1 ,
k+1 k+1
which implies the desired result.
We may use Theorems 4.3.12 and 4.3.13 and Faà di Bruno’s formula to
establish a class of summation formulas.
Faà di Bruno’s formula is an identity generating the chain rule to higher
derivatives. Though it is named after Francesco Faà di Bruno (1855, 1857),
he was not the first to state or prove the formula. In 1800, more than 50 years
Methods of Using Special Function Sequences 253
before Faà di Bruno, the French mathematician Louis François Antoine Ar-
bogast had stated the formula in a calculus textbook [12], which is considered
to be the first published reference on the subject.
Perhaps the most well-known form of Faà di Bruno’s formula says that (cf.
Section 3.4 of [44])
X Yn mj
dn n! k (j)
n
f (g(t)) = k k k
· f (g(t)) · g (t) ,
dt m1 ! 1! 1 k2 ! 2! 2 · · · kn ! n! n j=1
σ(n)
where the sum is over the set σ(n) of all partitions of n, that is, over the
set of all non-negative integral solutions (k1 , k2 , . . . , kn ) of the equations k1 +
2k2 + · · · + nkn = n and k1 + k2 + · · · + kn = k, k = 1, 2, . . . , n. Each solution
(k1 , k2 , . . . , kn ) of the equations is called a partition of n with k parts and
is denoted by σ(n, k). Hence, the set σ(n) is the union of all subsets σ(n, k),
k = 1, 2, . . . , n.
Sometimes, to give it a memorable pattern, it is written in a way in which
the coefficients that have the combinatorial interpretation discussed below are
less explicit:
X Yn (j) kj
dn n! k g (t)
f (g(t)) = · f (g(t)) · . (4.196)
dtn k1 ! k2 ! · · · kn ! j=1
j!
σ(n)
Combining the terms with the same value of k1 +k2 +· · ·+kn = k and noticing
that kj has to be zero for j > n − k + 1 leads to a somewhat simpler formula
expressed in terms of incomplete exponential Bell polynomials:
dn
n
X
(k) ′ ′′ (n−k+1)
f (g(t)) = f (g(t)) · B n,k g (t), g (t), . . . , g (t) . (4.197)
dtn
k=1
Here, the incomplete exponential Bell polynomials Bn,k (t1 , t2 , . . . , tn−k+1 ) are
defined by (cf. Section 3.3 [44])
The sum
n
X
Bn (t1 , . . . , tn ) = Bn,k (t1 , t2 , . . . , tn−k+1 )
k=1
X k1 k2
n! t1 t2
Bn,k (t1 , t2 , . . . , tn−k+1 ) = ··· (4.199)
k1 !k2 ! · · · 1! 2!
σ(n,k)
and σ(n, k) as shown before is the set of the solution of the partition equations
for a given k (1 ≤ k ≤ n). P
For the exponential formal power series f (t) = j≥0 fj tj /j! and g(t) =
P j
j≥1 gP
j t /j!, the Faà di Bruno’s formula (4.197) for the composition f (g(t)) =
h(t) = j≥0 hj tj /j! at t = 0 can be written as
X Yn (j) kj
dn n! (k) g (0)
f (g(0)) = · f (g(0)) ·
dtn k1 ! k2 ! · · · kn ! j=1
j!
σ(n)
n
X
= f (k) (g(0)) · Bn,k g ′ (0), g ′′ (0), . . . , g (n−k+1) (0) ,
k=1
or equivalently,
n n
X
t
hn = f (g(t)) = fk Bn,k (g1 , g2 , . . . , gn−k+1 ), h0 = f 0 , (4.200)
n!
k=1
n
d n (k)
where we use the facts dt n f (g(0)) = hn = n![t ]f (g(t)), f (g(0)) = f (k) (0) =
fk = k![tk ]f (t), and g (j) (0) = gj = j![t j
P]g(t) for j = 1, 2, . . . , n − k + 1.
Particularly, for f (t) = t /k! and g(t) = j≥1 gj tj /j! we have
k
X n
1
[tn ] (g(t))k = fj Bn,j = Bn,k ,
k! j=1
which implies Bn,k = [tn /n!](g(t))k /k!. Hence, Bn,k = Bn,k (t1 , t2 , . . .) can be
defined by (cf. Section 3.3 of [44]):
∞
X
1 tn
(g(t))k = Bn,k , (4.201)
k! n!
n=k
which implies that the matrix Bn,k is the exponential Riordan array (1, f (t)).
In [44], a matrix with the form of (1, f (t)) is called a iteration matrix.
The following important property of iteration matrices (cf. Theorem A on
p. 145 of Comtet [44], Roman [186], and Roman and Rota [187] )
and the Faà di Bruno formula derived from the above property of the iteration
matrix is an application of the FTRA.
Likewise, the partial ordinary Bell polynomial, in contrast to the usual
incomplete exponential Bell polynomial defined before, is given by
X k! jn−k+1
B̂n,k (t1 , t2 , . . . , tn−k+1 ) = tj1 tj2 · · · tn−k+1 , (4.202)
j1 !j2 ! · · · jn−k+1 ! 1 2
where the sum runs over all sequences j1 , j2 , . . . , jn−k+1 of non-negative inte-
gers such that
Clearly, the ordinary Bell polynomials can be expressed in the terms of in-
complete exponential Bell polynomials:
k!
B̂n,k (t1 , t2 , . . . , tn−k+1 ) = Bn,k (1! · t1 , 2! · t2 , . . . , (n − k + 1)! · tn−k+1 ).
n!
In general, Bell polynomial refers to the incomplete exponential Bell polyno-
mial, unless otherwise explicitly stated. P
For the ordinary formal power series fˆ(t) = ˆ j
j≥0 fj t and ĝ(t) =
P j ˆ
j≥1 ĝj t , the Faà di Bruno’s formula (4.197) for the composition f (ĝ(t)) =
P
ĥ(t) = j≥0 ĥj tj at t = 0 can be written as
X Y n (j) kj
dn ˆ n! ˆ(k) (ĝ(0)) · ĝ (0)
f (ĝ(0)) = · f
dtn k1 ! k2 ! · · · kn ! j=1
j!
σ(n)
n
n! X ˆ(k) ĝ ′ (0) ĝ ′′ (0) ĝ (n−k+1) (0)
= f (g(0)) · B̂n,k , ,...,
k! 1! 2! (n − k + 1)!
k=1
Xn
n!
= k!fˆk B̂n,k (ĝ1 , ĝ2 , . . . , ĝn−k+1 ) ,
k!
k=1
where we use fˆ(k) (g(0)) = fˆ(k) (0) = k!fˆk and ĝ (j) (0) = j!ĝj for j =
1, 2, . . . , n − k + 1. Noting (dn /dtn )fˆ(ĝ(0)) = (dn /dtn )ĥ(0) = n!ĥn , we may
rewrite the last expression as
n
X
ĥn = fˆk B̂n,k (ĝ1 , ĝ2 , . . . , ĝn−k+1 ) . (4.203)
k=1
Since ĥn = hn /n!, fˆk = fk /k!, and ĝj = gj /j! for j = 1, 2, . . . , n − k + 1, one
may see the equivalence
P∞ between (4.200) and (4.203).
Let h(t) = n=0 αn tn be a formal power series in R with the case h(0) =
α0 = a 6= 0. Assume that f (t) has a ordinary formal power series expansion
256 Methods for the Summation of Series
Applying Faà di Bruno’s formula (cf. FDB-1) to (f ◦ h)(t) and noting that the
kth derivative of f (t) at t = 0, f (k) (0), is k![tk ]f (t), we have
X 1 kj
[tn ](f ◦ h) = f (k) (h(0))Πnj=1 [tj ]h , (4.205)
kj !
σ(n)
where the summation ranges over the set σ(n) of all partitions of n as we
present in (4.196).
Let βn = [tn ](f ◦ h)(t) and h(0) = α0 = a. Then there exists a pair of
reciprocal relations
X αk11 · · · αknn
βn = f (k) (a) , (4.206)
k1 ! · · · kn !
σ(n)
X β k1 · · · βnkn
αn = f¯(k) (f (a)) 1 , (4.207)
k1 ! · · · kn !
σ(n)
where f¯ denotes the compositional inverse of f . In fact, from (4.204) the given
conditions ensure that there holds the pair of formal series expansions
X X
f a + αn tn = f (a) + β n tn , (4.208)
n≥1 n≥1
X X
f¯ f (a) + β n tn = a + αn tn . (4.209)
n≥1 n≥1
where
X αk1 · · · αknn αj p j
βj = (α)k 1 = (p)j 1 = α ,
k1 ! · · · kn ! j! j 1
σ(j)
Pp
which presents the obvious expression (a0 + a1 t)p = ap0 + j=1 pj ap−j j j
0 a1 t .
2
Similarly, if h = a0 + a1 t + a2 t , a0 6= 0, then
p Xp
a1 a2
(a0 + a1 t + a2 t2 )p = ap0 1 + t + t2 = ap0 1 + β j tj ,
a0 a0 j=1
258 Methods for the Summation of Series
where
X j1 j2 j
X j j−j1
1 a1 a2 p j a1 1 a2
βj = (p)j = .
ji !j2 ! a0 a0 ji =0
j j1 a0 a0
σ(j)
P
Theorem 4.3.16 Let A(t) = n≥0 an tn (a0 6= 0) be the generating function
of the A-sequence of the given Riordan array (dn,k )n,k≥0 = (g, f ), and let
(d˜n,k = dpn+r,(p−1)n+r+k )n,k≥0 be the one-pth Riordan array of (g, f ) with
respect to r. Then from (4.204) there exists the following summation formula:
n−k
X
dp(n+1)+r,(p−1)(n+1)+r+k+1 = βj dpn+r,(p−1)n+r+k+j , (4.216)
j=0
respectively.
The proof is left as Exercise 4.11.
Using (4.216) in Theorem 4.3.16, one may obtain many identities.
Example 4.3.17 For Pascal matrix (1/(1−t), t/(1−t)), from Example 4.3.6,
its A-sequence generating function is A(t) = 1 + t. Applying (4.216), we have
min{p,n−k}
X
p(n + 1) + r p pn + r
= .
(p − 1)(n + 1) + r + k + 1 j=0
j (p − 1)n + r + k + j
(4.218)
If p = 1 and
r = 0, the above identity reduces to the well-known identity
n+1 n n
k+1 = k + k+1 .
Methods of Using Special Function Sequences 259
Since
X −p X p + i − 1
(A(t))p = (1 − t)−p = (−t)i = ti ,
i i
i≥0 i≥0
Similarly, for the Riordan array (C(t), tC(t)), its (n, k) entry is
dn,k =[tn ]tk (C(t))k+1
X k + 1 2j + k + 1
n−k
=[t ] tj
2j + k + 1 j
j≥0
k+1 2n − k + 1
= .
2n − k + 1 n−k
Hence, from (4.216) we may derive the identity
(p − 1)(n + 1) + r + k + 2 (p + 1)(n + 1) + r − k
(p + 1)(n + 1) + r − k n−k
X (p − 1)n + r + k + j + 1 p + j − 1(p + 1)n + r − k − j + 1
n−k
= .
j=0
(p + 1)n + r − k − j + 1 j n−k−j
Faà di Bruno’s relations (4.206) and (4.207) and their special cases such as
(4.212) and (4.213) are also applicable rules to construct
numerous identities.
For instance, for the Catalan numbers, cn = 2n /(n+1), and their generating
√ n
function, C(t) = (1 − 1 − 4t)/(2t), we have the identity
X 1
1 2n 1 (−4)n−k
Cn = = − . (4.220)
n+1 n n+1 2 k (2k − n)!(n − k)!
[n/2]≤k≤n
In fact, let f (t) = t−1/2 and φ(t) = 1 − 4t. Then (f ◦ φ)(t) can be expanded as
1 X 2n
(f ◦ φ)(t) = √ = tn . (4.221)
1 − 4t n
n≥0
2n
Thus, substituting βn = n , α1 = 1, and α2 = −4 into the Faá di Bruno’s
relation (4.212) and noting k1 = 2k − n and k2 = n − k, we obtain (4.220).
Catalan numbers provide solutions to many counting problems. The same
is true for Motzkin numbers. For each non-negative integer n, the Motzkin
number mn is defined to be the counting number of all possible ways of
connecting
P∞any subset of n points on a circle by nonintersecting chords. Let
M (t) = n=0 mn tn be the generating function of the Motzkin numbers. It is
known (cf. [18]) that M (t) satisfies t2 (M (t))2 + (t − 1)M (t) + 1 = 0. In fact,
M (t) is of the form
√
1 − t − 1 − 2t − 3t2
M (t) = . (4.222)
2t2
√ P∞
Write 1 − 2t − 3t2 = 1 + n=1 en tn and take α1 = −2 and α2 = −3. From
(4.212) and noting
dk 1/2 (2k − 2)!
x = (−1)k−1
dxk x=1 22k−1 (k− 1)!
Methods of Using Special Function Sequences 261
So,
[(n+2)/2]
1 X 2n − 2k + 2 n+1 k
mn = n+2 3 (4.224)
2 (n + 1) n k
k=0
for n ≥ 0. It is known (cf. [18]) that
[n/2]
X
1 n 2k
mn = .
k + 1 2k k
k=0
Jointing the last equation and equation 4.224 gives a new identity
[(n+2)/2]
1 X 2n − 2k + 2 n+1 k X 1 n 2k
[n/2]
3 = .
2n+2 (n + 1) n k k + 1 2k k
k=0 k=0
∞ n [(m+1)/2]
X X (−1)n−m X 2m − 2k m k
R(t) = 1 + tn 3 .
n=2 m=2
2m+1 m m−1 k
k=0
Therefore r0 = 1, r1 = 0, and
n [(m+1)/2]
X (−1)n−m X 2m − 2k m k
rn = 3
m=2
2m+1 m m−1 k
k=0
262 Methods for the Summation of Series
n [(m+1)/2]
X (−1)n−m X
2m − 2k m k
3
m=2
2m+1 m m−1 k
k=0
n
1 X m n+1 2n − 2m
= (−1) .
n + 1 m=0 m n−m
for all n ≥ 2. This formula was considered in [53] using a different approach.
Methods of Using Special Function Sequences 263
More precisely, if h = 1/(1 − t), then (4.226) presents the generating func-
tion, called the sum function, of the row sum sequence of the Riordan array
(g(t), f (t)). We denote the sum function by R+ (t). Hence,
1 g(t)
R+ (t) := (g(t), f (t)) = . (4.227)
1−t 1 − f (t)
More briefly this can be written as
g
R+ = (4.228)
1−f
Similarly, the generating function, denoted by R− , of the alternating sum se-
quence of the Riordan array (g(t), f (t)) is called the alternating sum function,
namely, defined as
1 g(t) g
R− (t) := (g(t), f (t)) = . i.e. R− = . (4.229)
1+t 1 + f (t) 1+f
It is easy to see that we have, reminiscent of Pythagorean triples,
2R+ R− R+ − R−
g= , f= . (4.230)
R+ + R− R+ + R−
Thus we can use the sum function R+ and the alternating sum function R−
to characterize Riordan arrays.
Here is a list of several subgroups of R together with their R+ and R−
functions
264 Methods for the Summation of Series
• For the Appell subgroup (which is a normal subgroup of the Riordan group),
A = {(g(t), t) : g ∈ F0 } , we have
1+t − 1−t +
R+ = R , R− = R and g = R+ − tR+ = R− + tR− .
1−t 1+t
(4.231)
• For the Associate subgroup (or Lagrange subgroup), L = {(1, f (t)) : f ∈ F1 },
we have
R− R+ R+ − 1 1 − R−
R+ = , R −
= and f (t) = = .
2R− − 1 2R+ − 1 R+ R−
(4.232)
• For the Bell subgroup, B = {(g(t), tg(t)) : g ∈ F0 } , we have
R− R+ R+ R−
R+ = and R− = and g= = .
1 − 2tR− 1 + 2tR+ 1 + tR+ 1 − tR−
(4.233)
• For the checkerboard subgroup, C = {(g(t), f (t)) : g ∈ F0 is even,
f ∈ F1 is odd} , we have
• For the stochastic subgroup, S = {(g(t), f (t))}, which row sums are one, we
have
g 1−f
R+ = 1/ (1 − t) , R− = or . (4.235)
2 − (1 − t)g (1 − t)(1 + f )
f′ f′
R+ = = −Dt ln |1 − f (t)| and R− = = Dt ln |1 + f (t)|.
1−f 1+f
(4.237)
This implies that R + R −
2 = e R (t)dt + e R (t)dt .
Proposition 4.3.18 Let R+ (t) and R− (t) be the sum and alternating sum
functions of a Riordan array (d(t), h(t)). If (d(t), h(t)) is an element of the
subgroups of Appell, associate, Bell, checkboard, stochastic, hitting-time, and
derivative, then the characterizations of R+ (t) and R− (t) of (d(t), h(t)) are
shown in (4.231), (4.232), (4.233), (4.234), (4.235), (4.236), and (4.237), re-
spectively.
As a heuristic principle two pieces of information will determine an element
in the Riordan group. As examples we have: d (t) and h (t) , R+ and R− , A (t)
and Z (t). Next are some examples where given a subgroup and R+ gives a
unique element. For all these examples
√
1 − 1 − 4t
R+ =C (t) = C = 1 + tC 2 =
2t
X 1 2n
= tn = 1 + t + 2t2 + 5t3 + 14t4 + · · · ,
n+1 n
n≥0
2n
where [tn ]C(t) = n /(n+1) are the Catalan numbers. Formula (4.219) shows
∞
X
k k 2n + k n
C(t) = t .
n=0
2n + k n
From (4.226),
1 Cℓ
C ℓ , tC r = .
1−t 1 − tC r
Particularly, if ℓ = 0 and r = 1, noting 1 − tC = 1/C we may use (4.225) to
obtain
Xn
1
dn,k |(0,1) = [tn ] = [tn ]C(t),
1 − tC(t)
k=0
where dn,k |(0,1) stands for the (n, k) entry of the Riordan array (1, tC). Thus,
n
X
k 2n − k 1 2n
= .
2n − k n − k n+1 n
k=0
1 Cℓ
[tn ] C ℓ , tC 2 = [tn ]
1−t 1 − tC 2
j
n Cℓ 1X n ℓ C
=[t ] = [t ]C
2−C 2 2
j≥0
X 1
j+ℓ 2n + j + ℓ
= .
2j+1 2n + j + ℓ n
j≥0
Methods of Using Special Function Sequences 267
which implies
n
X X
2k + ℓ 2n + ℓ 1 j+ℓ 2n + j + ℓ
= .
2n + ℓ n − k 2j+1 2n + j + ℓ n
k=0 j≥0
t g(t)f (t)
RE ≡ RE (t) = (g(t), f (t)) = . (4.238)
(1 − t)2 (1 − f (t))2
(R+ )2 RE
g= and f = . (4.240)
R+ + RE R+ + RE
Thus we can use its sum function R+ and the expected value sum function
RE to characterize a Riordan array.
We also have the following inverse relationship between (R+ , R− ) and
(R , RE ).
+
(R+ )2 (R+ )2 − R+ R−
R− = + E
RE = . (4.241)
R + 2R 2R−
268 Methods for the Summation of Series
and
X n
t
(1, tC) = k[tn ](tC(t))k
(1 − tC)2
k=0
Xn X n
n−k k 2n + k k2 2n − k
= k[t ] = ,
2n + k n 2n − k n − k
k=0 k=0
We will give two different views to the Bernoulli polynomials and Euler
polynomial sequences with the help of the row sums and alternating sums
of Riordan arrays. First, the concepts of sum function and alternating sum
function of a Riordan array can be extended to any array (g(t), f (t)) =
[tn ]g(t)f (t)k n,k≥0 , where it is not necessary to have g(t) ∈ F 0 and f (t) ∈ F 1 .
We still define sum function and alternating sum function of (g(t), f (t)) as
g(t) g(t)
R+ ≡ R+ (t) := and R− ≡ R− (t) := . (4.242)
1 − f (t) 1 + f (t)
This extension allow us to reconsider some well-known polynomial sequences
and number sequences in a different way. Here, we show some examples related
to the Bernoulli polynomial and the Euler polynomial sequences.
It is well-known that Bernoulli polynomials Bn (x) and Euler polynomials
En (x), n ∈ N0 , are defined by the power series
∞
X ∞
X
text tn 2ext tn
t
= Bn (x) and t
= En (x) . (4.243)
e − 1 n=0 n! e + 1 n=0 n!
Methods of Using Special Function Sequences 269
as the sum function and the alternating sum function of the array (−text , et ),
respectively. Therefore, Bn (x) is nth row sum of the array, while −nEn−1 (x)/2
is the nth alternating row sum of the array.
The definition of the sum functions shown in (4.242) provides
R+ (t; x) − R− (t; x)
et =
R+ (t; x) + R− (t; x)
or equivalently,
R+ (t; x) − R− (t; x) = et R+ (t; x) + R− (t; x) .
X∞
text ext tn
t
= 1+t−e t = Bn (x) and (4.246)
e −1 1− t n=0
n!
X∞
2ext ext tn
= t = En (x) . (4.247)
et + 1 1 − 1−e2 n=0
n!
P tn
Hence, ∞ n=0 Bn (x) n! is the generating function of the row sums (i.e., the
sum function) of the exponential Riordan array (ext , (1 + t − et )/t). The cor-
responding generating function of the alternating sums (i.e., the alternating
sum function) is
X∞
ext tn
t = B̃ n (x) , (4.248)
1 + 1+t−e
t n=0
n!
270 Methods for the Summation of Series
where (B̃n )n≥0 is called conjugate Bernoulli polynomial sequence, and its first
few terms can be represented as
B̃0 (x) = 1,
1
B̃1 (x) = x + ,
2
5
B̃2 (x) = x2 + x + ,
6
3 5
B̃3 (x) = x3 + x2 + x + 2,
2 2
191
B̃4 (x) = x4 + 2x3 + 5x2 + 8x + ,
30
5 25 191 67
B̃5 (x) = x5 + x4 + x3 + 20x2 + x + , etc.
2 3 6 3
P∞ tn
Similarly, n=0 En (x) n! is the generating function of the sums of the ex-
ponential Riordan array (ext , (1 − et )/2). The corresponding generating func-
tion of the alternating sums is
X∞
ext tn
1−et
= Ẽn (x) , (4.249)
1− 2 n=0
n!
where (Ẽn )n≥0 is called the conjugate Euler polynomial sequence, and its first
few terms are
Ẽ0 (x) = 1,
1
Ẽ1 (x) = x + ,
2
Ẽ2 (x) = x2 + x + 1,
3 11
Ẽ3 (x) = x3 + x2 + 3x + ,
2 4
Ẽ4 (x) = x4 + 2x3 + 6x2 + 11x + 10,
5 55 91
Ẽ5 (x) = x5 + x4 + 10x3 + x2 + 50x + , etc.
2 2 2
Some properties of the conjugate Bernoulli and conjugate Euler polynomial
sequences similar as those of Bernoulli and Euler polynomial sequences can
be found easily such as
B̃n′ (x) = nB̃n−1 (x) and Ẽn′ (x) = nẼn−1 (x).
In addition, from the definitions of sum functions R+ and R− , we may find
the relationship between Bernoulli polynomial sequence and (B̃n (x))n≥0 and
the relationship between Euler polynomial sequence and (Ẽn )n≥0 . From the
first equation of (4.230), there holds
X t n X t n
ext Bn (x) + B̃n (x)
n! n!
n≥0 n≥0
Methods of Using Special Function Sequences 271
X (xt)k X t n X t n
= Bn (x) + B̃n (x)
k! n! n!
k≥0 n≥0 n≥0
XX n+k
t
= 2 Bn (x)B̃k (x) ,
n!k!
n≥0 k≥0
which implies
n
! n
!
X
X n k tn X X n k tn
x Bn−k (x) + x B̃n−k (x)
k n! k n!
n≥0 k=0 n≥0 k=0
n
!
X X n tn
= 2 Bn−k (x)B̃k (x) .
k n!
n≥0 k=0
Comparing the coefficients on the two sides of the above equation, we have
the identities
n n
X n k X n
x Bn−k (x) + B̃n−k (x) = 2 Bn−k (x)B̃k (x) (4.250)
k k
k=0 k=0
for all n ≥ 0.
Similarly, applying the first equation of (4.230) to Euler polynomial se-
quence and (Ẽn (x))n≥0 , we have
n n
X n k X n
x En−k (x) + Ẽn−k (x) = 2 En−k (x)Ẽk (x) (4.251)
k k
k=0 k=0
for all n ≥ 0.
From the second equation of (4.230), there holds
X t n X t n X t n X t n
(1+t−et ) Bn (x) + B̃n (x) = t Bn (x) − B̃n (x) ,
n! n! n! n!
n≥0 n≥0 n≥0 n≥0
or equivalently,
X tn X tn
Bn (x) + B̃n (x) + n Bn−1 (x) + B̃n−1 (x)
n! n!
n≥0 n≥1
n
!
X X n tn
− Bn−k (x) + B̃n−k (x)
k n!
n≥0 k=0
X t n
= n Bn−1 (x) − B̃n−1 (x) .
n!
n≥0
272 Methods for the Summation of Series
for all n ≥ 1.
Similarly, we may applying the second equation of (4.230) to the Euler
polynomial sequence and (Ẽn (x))n≥0 to obtain the identity
n
X
n
2Ẽn (x) = 2En (x) + En−k (x) + Ẽn−k (x) (4.253)
k
k=1
for all n ≥ 1. More results on the conjugate Bernoulli polynomials and conju-
gate Euler polynomials can be found in [92].
The diagonal sums can be extended to the slope k row sums of a Riordan
array (g(t), f (t)) = (dn,k )n,k≥0 defined by
[n/(k+1)]
X
Snk := dn−k j,j (4.255)
j=0
for n ≥ 0, i.e.,
Snk = dn,0 + dn−k,1 + dn−2k,2 + · · · .
The slop k row sums of (g, f ) are the row sums of the non-regular Riordan
array (g, tk f ). Particularly, if k = 1, the slope 1 row sums of (g, f ) are its
Methods of Using Special Function Sequences 273
diagonal sums and the row sums of the non-regular Riordan array (g, tf ). For
an example, the slope 1 sums of the Pascal array
1 0 0 0 0 0
1 1 0 0 0 0
1 2 1 0 0 0
1 3 3 1 0 0 ···
1 4 6 4 1 0
1 5 10 10 5 1
···
are
1
1
1+1 = 2
1+2 = 3
1+3+1 = 5
1+4+3 = 8
1 + 5 + 6 + 1 = 13, · · · ,
which give the Fibonacci number sequence. In general, for the diagonal sums
of (1/(1 − t), t/(1 − t)) or the row sums of (1/(1 − t), t2 /(1 − t)) we have
X∞
n−k 1 1 1
= [tn ] = [tn ] = Fn .
k 1 − t 1 − t2 /(1 − t) 1 − t − t2
k=0
and
dn−k j,j = 0
when j > n/(k + 1), we immediately obtain
X X X j
Rk+ (t) = Snk tn = [tn ] g tk f tn
n≥0 n≥0 j≥0
X j g
= g tk f = .
1 − tk f
j≥0
If (g, f ) is a Bell-type Riordan array and its slope k sum function Rk+ is given,
then f = tg and from (4.256) there holds
g
= Rk+ ,
1 − tk (tg)
which has the unique solution g as
Rk+
g= .
1 + tk+1 Rk+
We complete the proof.
From the above various row sums, one may see the summation rule (4.225)
makes an important role in the construction of identities
P related to Riordan
arrays. The key in using this rule to find the sum k≥0 dn,k hk is to recognize
the generating function of the sequence (hk )k≥0 and the generating functions
g and f satisfying dn,k = [tn ]gf k . Theorem 2.1 of [201] gives a basic theorem
on this topic, which can be represented as follows.
n+ak
Theorem 4.3.21 Let m+bk be the (n, k) entry with a parameter m of an
n+ak
infinity array denoted by ( m+bk )n,k≥0 . If b > a and b − a is an integer,
n+ak
then D = ( m+bk )n,k≥0 is a Riordan array. If b < 0 is an integer, then
Db = ( n+ak )n,k≥0 is a Riordan array. Furthermore,
m+bk
tm tb−a b= t−b
D= , and D (1 + t)n , .
(1 − t)m+1 (1 − t)b (1 + t)−a
(4.258)
Methods of Using Special Function Sequences 275
Proof. From the well-known properties of binomial coefficients, for b > a and
b − a is an integer we have
n + ak n + ak
=
m + bk n − m + ak − bk
−n − ak + n − m + ak − bk − 1
= (−1)n−m+ak−bk
n − m + ak − bk
−m − bk − 1
= (−1)n−m+ak−bk
(n − m) + (a − b)k
b−a k
n−m+ak−bk 1 n tm t
=[t ] m+1+bk
= [t ] m+1
.
(1 − t) (1 − t) (1 − t)b
Since k
n+k tm t
= [tn ]
m + 2k (1 − t)m+1 (1 − t)2
and √
k k 1− 1 + 4t (−1)k 2k
[t ]C(−t) = [t ] = ,
−2t k+1 k
we use FTRA to have
X n + k 2k (−1)k tm
t
= [tn ] C −
m + 2k k k+1 (1 − t)m+1 (1 − t)2
k≥0
q
t
1 1 + 4 (1−t) 2 − 1
= [tn−m ] m+1 t
(1 − t) 2 (1−t)2
1 n−1
= [tn−m ] = .
(1 − t)m m−1
276 Methods for the Summation of Series
n
Similarly, from k = [tn ](1/(1 − t))(t/(1 − t))k and the Stirling number
of the second kind
k tm
= [tk ] ,
m (1 − t)(1 − 2t) · · · (1 − mt)
we have
X n k 1 (t/(1 − t))m
=[tn ]
k m 1 − t (1 − t/(1 − t))(1 − 2t/(1 − t)) · · · (1 − mt/(1 − t))
k≥0
n+1 tm+1 n+1
=[t ] = .
(1 − t)(1 − 2t) · · · (1 − (m + 1)t) m+1
P n
In the sum k≥0 n+k k k(−1)
k−1
we have that the generating function
n
k
of the sequence ( k k(−1)k−1 )k≥0 is h(t) = nt(1−t)n−1 , which is a polynomial.
Hence, the FTRA remains valid for the improper Riordan array ((1+t)n , 1+t),
where
n+k n+k
[tn ](1 + t)n (1 + t)k = = .
n k
Hence, we have
X
k−1 n n+k
(−1) k =[tn ](1 + t)n h(1 + t)
k k
k≥0
except for k = 0, when the LHS of the last equation is 1 and the RHS is
undefined. Hence, by FTRA
X ∞
X 2
n n−k n − k − 1 hk t
hk = h0 + n = h0 + n[tn ]H .
n−k k k−1 k 1−t
k≥0 k=1
(4.259)
Methods of Using Special Function Sequences 277
or equivalently,
√ √
X n n − k (x + x2 − 4)n + (x − x2 − 4)n
xn−2k (−1)k = ,
n−k k 2n
k≥0
√ √
where a = (x + P x2 − 4)/2 and b = (x − P x2 − 4)/2.
∞ 2k ∞ 2k+1
P∞Let d(t) = 2k+1
k=0 d2k t , h1 (t) = k=0 h1,2k+1 t , and h2 (t) =
k=0 h 2,2k+1 t . Then the double Riordan matrix in terms of d(t), h1 (t),
and h2 (t), denoted by (d; h1 , h2 ), is defined by the generating function of its
columns as (cf. [49, 93])
(d, dh1 , dh1 h2 , dh21 h2 , dh21 h22 ,...).
There two cases of the first fundamental theorem of double Riordan arrays
(FTDRA) (cf. [49]):
(d; h1 , h2 )A(t) = B(t), (4.261)
P 2k
P 2k+1
where for A(t) = k≥0 a2k t and A(t) = k≥0 a2k+1 t , we have B(t) =
√ p √
dA( h1 h2 ) and B(t) = d h1 /h2 A( h1 h2 ), respectively. Based on the fun-
damental theorem of double Riordan arrays, we may define a multiplication
of two double Riordan arrays as
p p p p p
(d; h1 , h2 )(g; f1 , f2 ) = (dg( h1 h2 ); h1 /h2 f1 ( h1 h2 ), h2 /h1 f2 ( h1 h2 )),
P∞ P∞ (4.262)
2k 2k+1
where
P∞ g(t) = k=0 g 2k t , f 1 (t) = k=0 f 1,2k+1 t , and f 2 (t) =
2k+1
k=0 f2,2k+1 t . The collection of all double Riordan arrays associated
with the multiplication defined above forms a group, which is called double
Riordan group and is denoted by DR, where the identity of the group is
(1; t, t).
Let n (or m) be a variable, and let m (resp. n), a, and b be parameters.
Then the following result may provides many pairs of sums.
278 Methods for the Summation of Series
Proof. We first give d2n,2k of (4.263). From the definition of double Riordan
array, we have
k
t2m t2b−2a+2d−2c+2
d2n,2k = [t2n ]
(1 − t2 )m+1 (1 − t2 )b+d
1
= [t2n−2m+2(a−b+c−d−1)k ]
(1 − t2 )m+1+(b+d)k
X −m − 1 − (b + d)k
2n−2m+2(a−b+c−d−1)k
= [t ] (−t2 )j
j
j≥0
−m − 1 − (b + d)k
= (−1)n−m+(a−b+c−d−1)k
n − m + (a − b + c − d − 1)k
n + (a + c − 1)k n + (a + c − 1)k
= = .
n − m + (a − b + c − d − 1)k m + (b + d)k
We now derive d2n+1,2k+1 of (4.263) using a similar argument. From the def-
inition of double Riordan array,
k
t2m t2b−2a+1 t2b−2a+2d−2c+2
d2n+1,2k+1 = [t2n+1 ]
(1 − t2 )m+1 (1 − t2 )b (1 − t2 )b+d
1
= [t2n−2m+2a−2b+2(a−b+c−d−1)k ] 2 m+1−b+(b+d)k
(1 − t )
X −m − 1 − b − (b + d)k
= [t2n−2m+2a−2b+2(a−b+c−d−1)k ] (−t2 )j
j
j≥0
−m − 1 − b − (b + d)k
= (−1)n−m+a−b+(a−b+c−d−1)k
n − m + a − b + (a − b + c − d − 1)k
n + a + (a + c − 1)k n + a(k + 1) + (c − 1)k
= = ,
n − m + a − b + (a − b + c − d − 1)k m + b(k + 1) + dk
we have
√ √
X (−1)k 2k 1 + 4t2 − 1 X (−1)k 2k 1 + 4t2 − 1
t2k = and t 2k+1
= .
k+1 k 2t2 k+1 k 2t
k≥0 k≥0
(4.265)
Hence,
√
t2m t t 1 + 4t2 − 1
, ,
(1 − t2 )m+1 1 − t2 1 − t2 2t2
p
t2m 1 + 4y 2 − 1
= 2 m+1
(1 − t ) 2y 2
y=t/(1−t2 )
2
1+t
t2m 1−t2 − 1 t2m
= 2t2
= .
(1 − t2 )m+1 (1−t2 )2
(1 − t2 )m
i.e.,
X (−1)k 2k n + k n − 1
= ,
k+1 k m + 2k m−1
k≥0
n/2
X
kn − k k n−2k
= (−1) a b , (4.268)
k
k=0
where the last step is from the transform (n − k)/2 → k and the assumption
of n ≡ k (mod 2).
The generating function of the row sums of (1/(1 + at2 ), bt/(1 + at2 )) can
be represented as
1
1 bt 1 1+at2 1
, = bt
= 2 . (4.269)
1 + at2 1 + at2 1 − t 1 − 1+at2 at − bt + 1
From the last expression of the sum function and the row sums given in (4.268),
we obtain the identity
n/2
X
n − k k n−2k
k 1 1 1
(−1) a b = − n+1 , (4.272)
k a(t1 − t2 ) tn+1
2 t1
k=0
Thus, the row sums of (1/(1+t2), 2xt/(1+t2 )) are the Chebyshev polynomials
of the second kind, (Un (x)) = (1, 2x, 4x2 − 1, 8x3 − 4x, . . .). Let x ≥ 1 or
x ≤ −1. Then the roots of t2 − 2xt + 1 are
p p
t1 = x + x2 − 1 and t2 = x − x2 − 1.
282 Methods for the Summation of Series
Thus, t−1 −1
1 = t2 , t2 = t1 , and
√ √
(x + x2 − 1)n+1 − (x − x2 − 1)n+1
Un (x) = √ .
2 x2 − 1
Similarly, if we set b = −2x, a = −1 and 2, then the corresponding row sum
sequences are the Pell polynomial sequence, (Pn+1 (x))n≥0 , and the Fermat
polynomial sequence of the first kind, (Fn+1 (x))n≥0 , respectively:
√ √
(x + x2 + 1)n+1 − (x − x2 + 1)n+1
Pn+1 (x) = √ ,
2 x2 + 1
√ √
(x + x2 − 2)n+1 − (x − x2 − 2)n+1
Fn+1 (x) = √ .
2 x2 − 2
The above polynomials can be sorted into the class of the generalized
Gegenbauer-Humbert polynomials (cf. for example, [72, 76], and [106]). Their
expressions can be constructed by using the Binet formula (cf. [111]).
Identity (4.272) can be extended to the case of the ring of polynomials
Z [x, y, z] or higher dimensional cases by using a similar argument.
Let polynomial at3 + ct2 − bt + 1 has three distinct roots t1 , t2 , and t3 .
Then
1
at3 + ct2 − bt + 1
1 1 1
= +
a (t − t1 )(t1 − t2 )(t1 − t3 ) (t − t2 )(t2 − t1 )(t2 − t3 )
1
+ . (4.273)
(t − t3 )(t3 − t1 )(t3 − t2 )
Considering Riordan array (1/(1 + ct2 + at3 ), bt/(1 + ct2 + at3 )), if c 6= 0,
its entries may be written as
bk t k
dn,k = [tn ]
(1 + ct2+ at3 )k+1
!
n
X j +k
= [t ] (−1)j (ct2 + at3 )j bk tk
j≥0
j
j
! !
n
XX j+k j
= [t ] (−1)j aℓ bk cj−ℓ t2j+k+ℓ
j ℓ
j≥0 ℓ=0
! !
n−k−ℓ
X n + k − ℓ n−k−ℓ n−k−3ℓ
2 (−1) 2 aℓ bk c 2 ,
n−k−ℓ
ℓ
ℓ≥0, 2
= ℓ≡n−k (mod 2)
when n ≡ k + ℓ (mod 2),
0, otherwise.
Methods of Using Special Function Sequences 283
Therefore, the row sums of the Riordan array (1/(1 + ct2 + at3 ), bt/(1 + ct2 +
at3 )) are
n
X
dn,k
k=0
X X n−k−ℓ
n+k−ℓ n−k−ℓ n−k−3ℓ
= n−k−ℓ
2 (−1) 2 aℓ bk c 2 .
2 ℓ
0≤k≤n ℓ≥0,
ℓ≡n−k (mod 2)
(4.274)
b k tk
dn,k = [tn ]
(1 + at3 )k+1
X j + k
n
= [t ] (−1)j aj bk t3j+k
j
j≥0
( n+2k n−k
3 bk ,
n−k (−a) when n ≡ k (mod 3),
3
= 3
0, otherwise.
Therefore, the row sums of the Riordan array (1/(1 + at3 ), bt/(1 + at3 )) are
X X n+2k
n−k
3
dn,k = n−k
(−a) 3 bk
0≤k≤n, 0≤k≤n, 3
k≡n (mod 3) k≡n (mod 3)
X
n − 2k
= (−a)k bn−3k . (4.275)
k
0≤k≤n/3
Using the FTRA, the generating function of the row sums of (1/(1 +
at3 ), bt/(1 + at3 )) can be written as
1
1 bt 1 3 1
, = 1+atbt = 3 .
1 + at3 1 + at3 1−t 1 − 1+at3 at − bt + 1
From the rightmost expression of the generating function of the row sums of
(1/(1 + at3 ), bt/(1 + at3 )) and the formula (4.275), we obtain the identity
X n − 2k
(−a)k bn−3k
k
0≤k≤n/3
!
1 −1 −1 −1
= + +
a (t1 − t2 )(t1 − t3 )tn+1
1 (t2 − t1 )(t2 − t3 )tn+1
2 (t3 − t1 )(t3 − t2 )tn+1
3
(4.276)
3
for all at − bt + 1 = a(t − t1 )(t − t2 )(t − t3 ) with t1 + t2 + t3 = 0. Denote
1 1 1
t1 = , t2 = , and t3 =
x y z
with xyz 6= 0 and xy + yz + zx = 0. Then
1 1 1
at3 − bt + 1 = a(t − t1 )(t − t2 )(t − t3 ) = −xyz t − t− t− ,
x y z
xn+3
1 xn+3
2
= +
(x1 − x2 )(x1 − x3 )(x1 − x4 ) (x2 − x1 )(x2 − x3 )(x2 − x4 )
xn+3
3 xn+3
4
+ + ,
(x3 − x1 )(x3 − x2 )(x3 − x4 ) (x4 − x1 )(x4 − x2 )(x4 − x3 )
(4.278)
Remark 4.3.25 From the above condition for the identity (4.277), z =
−(xy)/(x + y), we may know that the identity holds when x, y, z 6= 0 and
Methods of Using Special Function Sequences 285
r
for all r ∈ R. A closed form of Fm for r ∈ N is given by (4.182) in Example
4.3.3. For r = 1, Fm (t) has the expression
X X
(mk)! tk 1 mk k
Fm (t) = = t . (4.281)
(m − 1)k + 1)! k! (m − 1)k + 1 k
k≥0 k≥0
F0 (t) = 1 + t,
X 1
F1 (t) = tk = ,
1−t
k≥0
X 1 2k
F2 (t) = tk = C(t).
k+1 k
k≥0
The key case (4.280) leads the following formula for Fm (t), which has been
established in Example 4.3.3:
m
Fm (t) = 1 + tFm (t). (4.282)
Equation (4.282) can also be used to define the function Fm (t). Actually, for-
mula (4.282) can be proved directly by using the definition (4.280) as follows.
X
m m mn + m n+1
1 + tFm (t) = 1 + t
mn + m n
n≥0
X m mn
= 1+ tn
mn n − 1
n≥1
X
1 mn + 1 n
= t = Fm (t).
mn + 1 n
n≥0
Methods of Using Special Function Sequences 287
Proof. Let f (t) = −tF (t)r , and let f¯ be its compositional inverse. Using the
Lagrange inversion formula(4.175), from (4.280) we have
n+1
1 t
[tn+1 ]f¯(t) = [tn ]
n+1 f (t)
1 n+1
= [tn ] −F (t)−r
n+1
n+1 −r mn − r(n + 1)
= (−1)
mn − r(n + 1) n
−r −n(r − m) − r
= (−1)n+1
−n(r − m) − r n
−r n(r − m + 1) + r − 1
=
n(r − m) + r n
(n(r − m + 1) + r − 1)!
= (−r) .
n!(n(r − m) + r)!
288 Methods for the Summation of Series
and
r
tF (t)r (F (−tF (t)r )) = t
if and only if r = 2m − 1, we have
and
F l , −tF r F l , −tF r = I
if and only if r = 2m − 1. This completes the proof of the theorem.
From Theorems 4.3.1 and 4.3.4, we immediately know that the generating
functions of the A-sequence and the Z-sequence of (F ℓ , −tF 2m−1 ) are (cf.
Exercise 4.13)
A = −F 1−2m (t) (4.283)
and
1 − F (t)ℓ
Z= . (4.284)
−tF 2m−1 (t)
Methods of Using Special Function Sequences 289
and dn,k counts the number of partial m-Dyck paths from the origin to (mn −
mk + sk + ℓ − 1, sk + ℓ − 1).
Particularly, if s = m, then the (n, k) entry of (F ℓ , tF m ) is
mk + ℓ mn + ℓ
dn,k = . (4.286)
mn + ℓ n − k
Lucas numbers and the powers of 5. The common theme is that we use ar-
rays in the Fuss-Catalan family, input sequences given by second order linear
recursions and end up with geometric sequences or other second order se-
quences. In other words, we may consider the sequence transformations by
using Fuss-Catalan matrices or other Riordan arrays. First we establish the
following result.
r
Theorem 4.3.29 Let Fm (t) be defined by (4.282), and let f1 (t) = tFm (t) and
r ¯ ¯
f2 (t) = −tFm (t), r ∈ Z. Denote by f1 (t) and f2 (t), the compositional inverse
of f1 and f2 , respectively. Then
Proof. Similar to the initial steps of the proof of Theorem 4.3.27, we use the
Lagrange inversion formula(4.178) and expression (4.280) to obtain
n+1
1 t
[tn+1
]f¯1 (t) = n
[t ]
n+1 f1 (t)
1 n+1
= [tn ] Fm (t)−r
n+1
−r mn − r(n + 1)
=
mn − r(n + 1) n
−r (m − r)n − r
= = [tn ]Fm−r (t)−r ,
(m − r)n − r n
which implies (4.287). Noting f2 (t) = −tFm (t)r = −f1 (t), we have
which implies f¯2 (t) = f¯1 (−t). Hence, we get (4.288). Since
we have
Fm (t)r = Fm−r (tFm (t)r )r ,
which is equivalent to (4.289). Hence,
2 3
Now we can take any target sequence
such as
1, k, k , k , · · · with its gen-
1 1 t 1
erating function 1−kt , compute (1+t) l , (1+t)m 1−kt , and have the generating
function for the sequence to input.
Example 4.3.30 Here are a few examples. If m = 2 then
1
C 2 , tC 2 M (t) = ,
1 − 5t
Methods of Using Special Function Sequences 291
i.e.,
1
1
1 0 0 0 0
2 1 0 0 0 3 5
5 4 1 0 0 ··· 8 25
=
.
14 14 6 1 0 21 125
42 48 27 8 1 55
625
··· .. ..
. .
We suspect that the mystery sequence and generating function, M (t), repre-
sents the even Fibonacci numbers, viz.
X∞
1
M (t) = = F2n+2 tn (4.293)
1 − 3t + t2 n=0
while ∞
1−t X
= F2n+1 tn (4.294)
1 − 3t + t2 n=0
represents the odd Fibonacci numbers.
Since (4.292) shows that
!
2 2 −1 1 t
(C , tC ) = 2, 2 ,
(1 + t) (1 + t)
which derives the following from (C 2 , tC 2 )M (t) = 1/(1 − 5t)
!
1 t 1 1 1 1
M (t) = 2, 2 = 2 · = .
(1 + t) (1 + t) 1 − 5t (1 + t) 1 − 5 t
2
1 − 3t + t2
(1+t)
By using (4.285), (C , tC )M (t) = 1/(1 − 5t) and (1/(1 + t)2 , t/(1 + t)2 )/(1 −
2 2
Similarly
1
C , tC 2 M (t) = ,
1 − 4t
i.e.,
1
1
1 0 0 0 0
1 1 0 0 0 3 4
2 3 1 0 0 ··· 5 16
=
.
5 9 5 1 0 7 64
14 28 20 7 1
9
256
··· .. ..
. .
292 Methods for the Summation of Series
which is the generating function for the odd numbers. Hence, we obtain the
following pair of inversion identities.
n
X
(2k + 1)2 2n + 1
= 4n , (4.297)
2n + 1 n=k
k=0
Xn
n+k
(−1)n−k 4k = 2n + 1. (4.298)
n−k
k=0
and
1+t 1
(C, tC 2 ) = , (4.301)
1 − 3t + t2 1 − 5t
respectively.
The coefficient set (ak ) of the denominator polynomial (1 + t)m − (2m+ 1)t
shown in Theorem 4.3.31 satisfies the relation
m
X
(−1)k ak = 2m.
k=1
(1, 4, 11, 29, 76, 199, 521, 1364, 3571, 9349, . . .),
which is the bisection of the Lucas sequence L2n+1 , A002878 (cf. [197]).
For m = 3, we have the sequence
or
n
X n
X
2k + 1 2n + 1 k+1 2n + 2
L2k+1 = 5n = F2k+2 . (4.304)
2n + 1 n + k + 1 n+1 n+k+2
k=0 k=0
where (Ln ) and (Fn ) are the Lucas and Fibonacci numbers, respectively. Fur-
thermore, we have
√
1−t 1 − 4t
(C, tC 2 ) = and
1 − 3t + t2 1 − 5t
1 1
(C, tC 2 ) = ,
1 − 3t + t2 (1 − 5t)C
or equivalently,
n
X Xn
2k + 1 2n + 1
dn,k F2k+1 = F2k+1 = un and
2n + 1 n + k + 1
k=0 k=0
Xn Xn n
X
2k + 1 2n + 1
dn,k F2k+2 = F2k+2 = 5n − 5n−k Ck−1 ,
2n + 1 n + k + 1
k=0 k=0 k=1
294 Methods for the Summation of Series
1 t
where (un ) = (1, 3, 13, 61, 295, ...), the row sum sequence of √1−4t , 1−4t ,
which is the integer sequence A046748. Similarly,
1−t 2−C
(C 2 , tC 2 ) 2
= and
1 − 3t + t 1 − 5t
1+t C
(C 2 , tC 2 ) = .
1 − 3t + t2 1 − 5t
We now discuss transformations via Fuss-Catalan matrices to produce
identities connecting some well-known sequences. We omit the similar proofs
for the sake of brevity. We note that the generating functions shown above
such as
1 1+t 1−t 1
, , , and
1 − 3t + t2 1 − 3t + t2 1 − 3t + t2 1 − 5t
are generating functions of recursive sequences. More precisely, the first three
of the above generating functions yield recursive sequences of order 2 generated
by the recursive relation
an = 3an−1 − an−2 (4.305)
for n ≥ 2 with the initial pairs (a0 , a1 ) = (1, 3), (1, 4), and (1, 2), respectively.
The last function generates a recursive sequence of order 1, an = 5an−1 with
the initial a0 = 1. Therefore, Corollary 4.3.32 can be viewed as a transforma-
tion of recursive sequences. Two questions arise naturally: (1) Can we find a
recursive sequence such that (C, tC 2 ) transfers it to the generating function
1/(1 − kt)? (2) Given two recursive sequences (an ) and (bn ) of order 2, can we
always find a Riordan array to transfer one from another one? The answers
for both questions are “yes”. In addition, we will see that the results can be
extended to higher order cases.
Theorem 4.3.33 Let (an )n≥0 be a recursive sequence of order 2 defined by
X 1+t
a n tn = .
1 − (k − 2) t + t2
n≥0
Then an+1 = (k − 3)an − 3an−1 + an−2 with the initial triple (a0 , a1 , a2 ) =
1, k − 2, k 2 − 5k + 3 . Thus, we have
1+t 1
T 2 , tT 3 2 3
=
1 − (k − 3) t + 3t + t 1 − kt
Methods of Using Special Function Sequences 295
1+t 1
(F m−1 , tF m ) = . (4.308)
(1 + t)m − kt 1 − kt
and
∞
X n
Fn = (−1)k , (4.310)
x 21 (n − 1 − 5k)y
k=−∞
X∞
2n + 1 2n + 1
F2n+2 = − , (4.311)
j=−∞
n − 5j n − 5j − 2
X∞
2n 2n
F2n+1 = − , (4.312)
j=−∞
n − 5j n − 5j − 2
296 Methods for the Summation of Series
and
X∞
2n + 1 2n + 1
F2n+1 = − , (4.313)
j=−∞
n − 5j n − 5j − 1
X∞
2n + 2 2n + 2
F2n+2 = − , (4.314)
j=−∞
n − 5j n − 5j − 1
Identity (4.315) corresponds to adding in each row the elements marked with
a plus sign and subtracting the ones marked with a minus. By symmetry, we
can represent this sum using the following Riordan array (d˜n,k = n+k
2n
)n,k≥0
with marked plus and minus entries, where d˜n,k are found by using Theorem
4.3.13 when p = 2 and r = 0.
1 0 0 0 0
2 1 0 0 0
6 4 −1 0 0
20 15 −6 −1 0
70 56 −28 −8 1
where
∞
X
h(t) = h k tk = t − t2 − t3 + t4 + t6 − t7 − t8 + t9 + · · ·
k=0
Methods of Using Special Function Sequences 297
t − t2 − t3 + t4 t(1 − t)(1 − t2 )
= 5
=
1−t (1 − t)(1 + t + t2 + t3 + t4 )
t−1 − t
= −2 .
t + t−1 + 1 + t + t2
P n √
It is obvious that g(t) = j≥0 2n n t = 1/ 1 − 4t, i.e., the generating func-
tion for the central binomial coefficients, which is usually denoted by B(t).
From Theorem 4.3.13 and noting φ = t2 /(t/(1 − t)) = t(1 − t) = tC(t), we
have √
φ tC(t) 2 1 − 2t − 1 − 4t
f (t) = = = tC(t) = .
1−φ 1 − tC(t) 2t
√ √
Hence, (d˜n,k )n,k≥0 = (1/ 1 − 4t, (1 − 2t − 1 − 4t)/(2t)). By using FTRA to
the Riordan array, we get
f −1 + f
Sn = [tn ]d(t)h(f (t)) = [tn ]d .
(f −2 + f 2 ) + (f −1 + f ) + 1
Since
√ √ √
−1 1 − 2t + 1 − 4t 1 − 2t − 1 − 4t 1 − 4t
f −f = − = ,
2t√ 2t√ t
1 − 2t + 1 − 4t 1 − 2t − 1 − 4t 1 − 2t
f −1 + f = + = , and
2t 2t t
2
1 − 4t + 2t
f −2 + f 2 = (f −1 + f )2 − 2 = ,
t2
we may write Sn as
√
1−4t
n 1 t
Sn = [t ] √ 2
t
= [tn ] = F2n ,
1 − 4t 1−4t+2t
t2 + 1−2t
t +1 1 − 3t + t2
where the last step holds because of (4.293) in Example 4.3.30. From the last
expression, (4.315) and (4.314) follow.
Identities (4.311)–(4.313) can be obtained in a similar way, which are left
as Exercise 4.14.
In Subsection 4.3.1, we have presented some identities constructed by using
Theorem 4.3.13. We now give more identities by using this Riordan approach.
Some of these identities are well known, while others are new. We need one
more property of Riordan arrays, which generalizes a well-known property of
Pascal’s triangle.
Theorem 4.3.36 Let (dn,k )n,k≥0 = (g, f ) be a Riordan array. Then for any
integers k ≥ s ≥ 1 we have
n
X
dn,k = dn−j,k−s [tj ](f (t))s . (4.316)
j=s
Pn
Particularly, for s = 1, dn,k = j=1 fj dn−j,k−1 , where fj = [tj ]f (t).
298 Methods for the Summation of Series
Proof. The (n, k) entry of the Riordan array (g, f ) can be written as
Example 4.3.37 If (g, f ) = (1/(1 − t), t/(1 − t)), then fj = [tj ](t/(1 − t)) = 1
for all j ≥ 1. We have the well-known identity
Xn
n−j n
= . (4.317)
j=1
k−1 k
More generally, for the Pascal triangle (g, f ) = (1/(1 − t), t/(1 − t)), we have
ts Xs + i − 1
j−1
[tj ](f (t))s = [tj ] = [t j−s
](1−t)−s
= [t j−s
] t i
= .
(1 − t)s i s−1
i≥0
we have
(1 + w)r+1 (C(t))r+1 (C(t))r
g̃ = = =√ = B(t)(C(t))r ,
1−w w=t(1+w)2 2 − C(t) 1 − 4t
where B(t) is the generating function for the central binomial coefficients.
Thus, (d˜n,k )n,k≥0 = (d2n+r,n+r+k )n,k≥0 is the Riordan array
(g̃, f˜) = B(t)C r , t(C(t))2 .
Example 4.3.39 For fixed integers p ≥ 2 and r ≥ 0, starting with the Pascal
triangle and using Theorems 4.3.13 and 4.3.38, we obtain the Riordan array
(g̃, f˜) with its (n, k) entry as
pn + r pn + r
d˜n,k = =
(p − 1)n + r + k n−k
Xn
s pj p(n − j) + r pn + r
= . (4.322)
j=s
j j−s n−j−k+s n−k
pn+r
and, finally, adding to the both sides n−k+1 , we have
n
X
1 pj + 1 p(n − j) + r pn + r + 1
= .
j=0
pj + 1 j n−j−k+1 n−k+1
Exercises
4.1. Use the expansion formula (4.1) or (4.2) to present the summation
(4.7).
Hint: See Hsu and Shiue [133].
4.2. Prove the summation formula (4.8).
Hint: See Wang and Hsu [210].
4.3. Prove the summation formulas (4.31)–(4.55).
4.4. Prove Corollaries 4.2.15–4.2.17
4.5. Prove the implication (4.85) ⇒ (4.86) in Theorem 4.2.6.
4.6. Show that the following six subsets of the Riordan group are subgroups
of the Riordan group.
• the Appell subgroup {(g(t), t)}.
• the Lagrange (associated) subgroup {(1, f (t))}.
• the k-Bell subgroup {(g(t), t(g(t))k )}, where k is a fixed positive integer.
1−t E t (1 − t)2
R+ = R , RE = R+ and g = R+ (1 − t) = RE . (4.323)
t 1−t t
R+ RE
t(R+ )2 − RE = 0 and g = +
= (4.325)
1 + tR t(R + R+ )
E
4.13. Prove the generating functions of the A-sequence and the Z-sequence
of (F ℓ , −tF 2m−1 ) are (4.283) and (4.284), respectively.
4.14. Prove the formulas (4.311)–(4.313). √
Hint: ˜
√ One may use the same Riordan array (dn,k )n,k≥0 = (1/ 1 − 4t, (1 −
2t − 1 − 4t)/(2t)) in the proof of (4.314) to prove (4.313) while use the
Riordan array
√
1 1 1 − 2t − 1 − 4t
(d˜n,k )n,k≥0 = √ −1 ,
2t 1 − 4t 2t
to prove the formulas (4.311) and (4.312). Both Riordan arrays are from The-
orem 4.3.13.
5
Extension Methods
CONTENTS
5.1 Identities and Inverse Relations Related to Generalized Riordan
Arrays and Sheffer Polynomial Sequences . . . . . . . . . . . . . . . . . . . . . . . 306
5.1.1 Generalized Riordan arrays and the recurrence relations
of their entries . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 308
5.1.2 The Sheffer group and the Riordan group . . . . . . . . . . . . . . 318
5.1.3 Higher dimensional extension of the Riordan group . . . . 329
5.1.4 Dual sequences and pseudo-Riordan involutions . . . . . . . . 342
5.2 On an Extension of Riordan Array and Its Application in the
Construction of Convolution-type and Abel-type Identities . . . . 354
5.2.1 Generalized Riordan arrays with respect to basic
sequences of polynomials . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 354
5.2.2 A general class of convolution-type identities . . . . . . . . . . . 364
5.2.3 A general class of Abel identities . . . . . . . . . . . . . . . . . . . . . . . . 374
5.3 Various Methods for constructing Identities Related to
Bernoulli and Euler Polynomials . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 384
5.3.1 Applications of dual sequences to Bernoulli and Euler
polynomials . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 387
5.3.2 Extended Zeilberger’s algorithm for constructing
identities related to Bernoulli and Euler polynomials . . . 399
5.3.2.1 Gosper’s algorithm . . . . . . . . . . . . . . . . . . . . . . . . . . . 399
5.3.2.2 W-Z algorithm . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 402
5.3.2.3 Zeilberger’s creative telescoping algorithm . . . 403
5.3.2.4 Extended Zeilberger’s algorithm . . . . . . . . . . . . . 405
In this chapter, we shall present the methods extended from the previous
chapters for constructing various identities and inversion relations. The iden-
tities constructed in this chapter include the identities of high dimensions,
convolution-type, Abel-type, and those related Bernoulli polynomials and
numbers, Euler polynomials and numbers, etc. The methods represented in
this chapter are related to generalized Riordan arrays and groups with dif-
ferent bases and their analogs, Sheffer polynomial sequences and the Sheffer
group. Some identities and inversion relations are constructed by using dual
sequences with Riordan array representation, pseudo-Riordan involutions. Fi-
nally, an extensions of W-Z algorithm and Zeilberger’s creative telescoping
algorithm is represented and used to construct and prove the identities for
Bernoulli polynomials and numbers.
∗
where rn,k and rn,k are called the kernels of series transformation, and (fk )
and (gk ) are any two sequences of real or complex numbers connected by
∗
the inverse relations. If rn,k = rn,k , the transformation is said to be a self-
inverse relation. For a fundamental discussion, the reader is referred to the
Riordan’s books [182, 183]. In 1958, Riordan [182] had been proposed the
general problem of inverting combinatorial sums shown in (5.1).
Extension Methods 307
The following known as Gould-Hsu inverse relation (cf. [77]) has sparked
numerous follow-up research work and was used to generalize many special
combinatorial inversion formulas.
Theorem 5.1.1 Let (aj ) and (bj ) be two sequences of numbers such that
for all non-negative integers x and n with ψ(x, 0) = 1. Then we have the
following inversion formulas
Xn
n
f (n) = (−1)k ψ(k, n)g(k) and (5.3)
k
k=0
Xn
k n
g(n) = (−1) (ak+1 + kbk+1 )ψ(n, k + 1)−1 f (k), (5.4)
k
k=0
that is,
tn (f (t))k
dn,k = g(t) . (5.9)
cn ck
The generalized Riordan array is still denoted by (dn,k ) or (g(t), f (t)) without
causing confusion.
As what mentioned in [171] (see also in [21]), “The concept of representing
columns of infinite matrices by formal power series is not new and goes back
to Schur’s paper on Faber polynomials in 1945 (cf. [192])”. For a given se-
quence (bn )n≥0 , a formal power series in auxiliary variable t of the form with
a sequence (cn =6 0) (n ∈ N0 ) with c0 = 1 represented as
1 t t2 X tn
b(t) = b0 + b1 + b2 + · · · = bn
c0 c1 c2 cn
n≥0
Extension Methods 309
Similarly to the classical case [201, Theorem 1.2], we can prove the converse
of Theorem 5.1.3: For an infinite triangle
Pn D = (dn,k )0≤k≤n<∞ such that for
n
every sequence
P∞ (h k )k∈N 0 , we have k=0 n,k hk = [t /cn ]g(t)h(f (t)), where
d
k
h(t) = k=0 hk t /ck , and g(t), f (t) are two formal power series not depending
on h(t). Then the triangle defined by the Riordan array (g(t), f (t)) coincides
with (dn,k )n,k∈N0 .
With Theorem 5.1.3, we can further compute the product of two Rior-
dan arrays (g(t), f (t))(h(t), l(t)). In fact, the column generating function of
310 Methods for the Summation of Series
(h(t), l(t)) is h(t)(l(t))k /ck . Thus, by matrix multiplication, the column gen-
erating function of the product (g(t), f (t))(d(t), h(t)) is
(h(f (t)))k
g(t)d(f (t)) ,
ck
which means that the product is also a Riordan array, i.e.,
The group introduced in Theorem 5.1.4 is called the Riordan group with
respect to (cn )n∈N0 . It should be noticed that, for a sequence (cn )n∈N0 defined
above, the identity (1, t) of the Riordan group R is the usual infinite identity
matrix I. Actually, by Eq. (5.9), the (n, k) entry of (1, t) is
n k
t t cn
dn,k = = [tn−k ]1 = δn,k ,
cn ck ck
where δn,k is the Kronecker delta defined by δn,n = 1 and δn,k = 0 for n 6= k.
Theorem 5.1.5 The quantity dn,k is the (n, k) entry of the generalized Ri-
ordan array (g(t), f (t)) with respect to (cn )n∈N0 if and only if ck dn,k /cn is the
(n, k) entry of the classical Riordan array (g(t), f (t)).
which is equivalent to the fact that ck dn,k /cn = [tn ]g(t)(f (t))k . This completes
the proof.
where the sum is actually finite and the sequence A = (ak )k∈N0 is fixed. It is
called the A-sequence of the generalized
P∞ Riordan array and it only depends on
f (t). Particularly, let A(t) = k=0 ak tk , then
t
f (t) = tA(f (t)) and A(t) = ¯ . (5.13)
f (t)
Proof. We have shown that for the classical Riordan array (g(t), f (t)) =
(d∗n,k )n,k∈N0 , there exists a unique sequence A = (ak )k∈N0 satisfying the state-
ments of the theorem. Then
∞
X
d∗n+1,k+1 = aj d∗n,k+j
j=0
and f (t) = tA(f (t)). By Theorem 5.1.5, d∗n,k = ck dn,k /cn , so we have
∞
X ck+j
ck+1
dn+1,k+1 = aj dn,k+j ,
cn+1 j=0
cn
X n
cn ˜ cn n−l+1 kck−1
dn,k − dn−1,k = fn−l+1 dl−1,k−1 , n, k ≥ 1,
ncn−1 cl−1 cn−l+1 n ck
l=k
(5.14)
where d˜n,k is the (n, k) entry of the Riordan array (g ′ (t), f (t)), g ′ (t) is the
derivative of g(t), and fk are the coefficients of the delta series f (t) =
P ∞ k
k=1 fk t /ck , where a delta series is a series in F 1 .
For the iteration matrix with respect to (cn ), we have g ′ (t) = 0. This fact
indicates that d˜n−1,k = 0. Thus, (5.14) reduces to
n
X cn n−l+1 kck−1
dn,k = fn−l+1 dl−1,k−1 , (5.16)
cl−1 cn−l+1 n ck
l=k
which is coincident with the generating function of dn,k /cn . Therefore, the
recurrence relation (5.18) is established.
X∞
n+1 k+j
dn+1,k+1 = j!aj dn,k+j , (5.23)
j=0
k+1 j
Xn
n−1
dn,k = fn−l+1 dl−1,k−1 + d˜n−1,k , (5.24)
l−1
l=k
Xn
n
kdn,k = fn−l+1 dl−1,k−1 , (5.25)
l−1
l=k
X n
l+1 ¯
(n + 1)dn,k = fl+1−k dn+1,l+1 . (5.26)
k
l=k
Then
X
dn+1,0 = i!ci dn,i , (5.28)
i≥0
1 X
dn+1,k = r0 dn,k−1 + i!(ci−k + kri−k+1 )dn,i , (5.29)
k!
i≥k
for all k ≥ 0.
Conversely, starting from the sequence defined by (5.27), the infinite array
(dn,k )n≥k≥0 defined by (5.30) is an exponential Riordan array.
Proof.
P Let (g(t), f (t)) be an
P exponential Riordan array, and let g(t) =
n n
n≥0 gn t /n! and f (t) = n≥1 fn t /n!. Then, we may write the LHS of
(5.28) as n+1
t
dn+1,0 = g(t) = gn+1
(n + 1)!
and simplify the RHS of (5.28) as
X X n n X n
t f (t)i t t
i!ci dn,i = i!ci g(t) = g(t) ci f (t)i = g(t)c(f (t))
n! i! n! n!
i≥0 i≥0 i≥0
n n nX
t g ′ (t) t ′ t ntn−1
= g(t) = g (t) = gn = gn+1 ,
n! g(t) n! n! n!
n≥1
where d˜n,k is the (n, k) entry of the exponential Riordan array (g ′ (t), f (t)) and
g ′ (t) is the derivative of g(t). Since ℓ ≤ k, the second term of the rightmost
side of the last equation can be written as
n+1
X
1
n![tℓ−1 ]g(t)f (t)k−1 [tn−ℓ+1 ]f ′ (t)
(k − 1)!
ℓ=k
X
n+1
n
ℓ−1
t f (t)k−1
tn−ℓ+1
d X tj
= g(t) fj
ℓ−1 (ℓ − 1)! (k − 1)! (n − ℓ + 1)! dt j!
ℓ=k j≥1
X
n+1
n
= fn−ℓ+2 dℓ−1,k−1 .
ℓ−1
ℓ=k
X
n+1
n
d˜n,k + fn−ℓ+2 dℓ−1,k−1 .
ℓ−1
ℓ=k
Using (5.24) and replacing its n by n + 1, the last expression yields dn+1,k and
(5.29) is proved.
1 t
Example 5.1.14 Consider the classical Riordan array ( 1−t , 1−t ), where its
(n, k) entry is
k
1 t n
[tn ] = ,
1−t 1−t k
1 t
then ( 1−t , 1−t ) is the well-known Pascal matrix. The corresponding row gen-
1 t
erating functions are (x + 1)n , which form the Sheffer sequence for ( 1+t , 1+t ).
Since f¯(t) = t/(1 + t), then A(t) = t/f¯(t) = 1 + t, and (5.19) gives the
relation
n+1 n n
= + .
k+1 k k+1
Next, because g ′ (t) = 1/(1 − t)2 , we have
n
d˜n−1,k = [tn−1 ]g ′ (t)(f (t))k = [tn−1−k ](1 − t)−k−2 = .
k+1
Extension Methods 317
Finally, since the coefficient of tj in f¯(t) is f¯j = (−1)j−1 , then by Eq. (5.22),
the following recurrence relation holds:
Xn
n n+1
= (−1)l−k . (5.31)
k l+1
l=k
X tj ∞
t t
A(t) = ¯ = t = Bj ,
f (t) e − 1 j=0 j!
where Bj are the Bernoulli numbers (cf. for example, P. 48, [44]). Then Eq.
(5.23) reduces to
X ∞
n+1 jn+1 k+j n
= (−1) Bj .
k+1 j=0
k+1 j k+j
The inverse of the array (1, log(1 + t)) is (1, et − 1), which is called the
Stirling matrix of the second kind, and its (n, k) entry is
n
t t k n
(e − 1) /k! = ,
n! k
which
P is the
Stirling number of the second kind. The row generating functions
are nk=0 nk xk , which are called the exponential polynomials and denoted by
φn (x). The sequence (φn (x))n∈N0 is associated to log(1 + t) (cf. Section 4.1.3,
[186]).
The generating function of the A-sequence of the array (1, et − 1) is
X ∞
t t tj
A(t) = ¯ = = bj (0) ,
f (t) log(1 + t) j=0 j!
where bj (0) are the Bernoulli numbers of the second kind [186, p. 114], and
they are also called the Cauchy numbers of the first kind (cf. P. 294, [44] and
[159]). Thus, we have
X ∞
n+1 n+1 k+j n
= bj (0) .
k+1 j=0
k+1 j k+j
Now, f¯(t) = log(1+t), so f¯j = (−1)j−1 (j −1)!, and (5.26) gives the recurrence
relation X
n
n l+1 n+1
(n + 1) = (−1)l−k (l − k)! .
k k ℓ+1
l=k
Definition 5.1.16 Let g(t) and f (t) be any given formal power series over
the real number field R or complex number field C with g ∈ F 0 and f ∈ F 1 .
Then the polynomials pn (x) (n = 0, 1, 2, · · · ) defined by the generating function
(GF ) X
g(t)exf (t) = pn (x)tn (5.32)
n≥0
1 X tn
g(t)(f (t))k = σ(n, k) . (5.33)
k! n!
n≥k
Then σ(n, k) is called the generalized Stirling number with respect to g(t) and
f (t).
The special case of g(t) = 1 was studied in [126], and a more generalized
case was studied in [87, 88].
As having been commonly employed in the Calculus of Finite Differences
as well as in Combinatorial Analysis, the operators E, ∆, D are defined in
Chapter 2. For the sake of readers’ convenience, we recall them briefly below:
d
Ef (t) = f (t + 1), ∆f (t) = f (t + 1) − f (t), Df (t) = f (t).
dt
Powers of these operators are defined in the usual way. In particular, for any
real numbers x, one may define E x f (t) = f (t + x). Also, the number 1 may be
used as an identity operator, viz. 1f (t) ≡ f (t). It is easy to verify that these
operators satisfy the formal relations (cf. [141])
E = 1 + ∆ = eD , ∆ = E − 1 = eD − 1, D = log(1 + ∆).
320 Methods for the Summation of Series
where we use dn,k = σ(n, k) = 0 for all k > n. Therefore, with a constant mul-
tiple, 1/(k!), of the kth column, the rows of the Riordan array represent the co-
efficients of the Sheffer-type polynomial sequences. As an example, the rows of
the Riordan array (1/(1 − t), t/(t − 1)) = [(−1)k nk ]0≤k≤n givethe coefficients
Pn
of the Laguerre polynomial
Pn sequences (pn (x)P= k=0 (−1)k nk xk /k!)0≤n .
Let (pn (x) = k=0 pn,k xk ) and (qn (x) = nk=0 qn,k xk ) be two Sheffer-type
polynomial sequences. Then we define an operation, #, of (pn (x)) and (qn (x)),
called the (polynomial) sequence multiplication (or the “umbral composition”
see [18,19]), as
n
X
(pn (x))#(qn (x)) := (rn (x) = rn,k xk ), (5.35)
k=0
where n
X
rn,k = ℓ!pnℓ qℓk , n ≥ ℓ ≥ k. (5.36)
ℓ=k
It is clear that the defined operation is not commutative. Sheffer group under
the “umbral composition” was defined with the n!-umbral calculus in Roman
[186]. We now give a formulation with the matrix form of the 1-umbral calculus
(cf. Sprugnoli [201]).
Theorem 5.1.18 The set of all Sheffer-type polynomial sequences defined by
Definition 5.1.16 with the operation # defined by (5.36) forms a group called
the Sheffer group and denoted by {(pn (x)), #}. The identity of the group is
xn (−1)
n! . The inverse of (pn (x)) in the group, denoted by (pn (x)) , is the
Sheffer-type polynomial sequence generated by 1/g(f(t))exp(xf (t)), where f¯
¯ ¯
is the compositional inverse of f .
It is clear that (pn (x))#(xn /n!) = (xn /n!)#(pn (x)) = (pn (x)). Hence, the set
of all Sheffer-type polynomial sequences forms a group.
It is clear that (1, t), the identity Riordan array, maps to the identity Sheffer-
type polynomial sequence (pn (x) ≡ xn /(n!))n≥0 . From the definitions 5.1.16
we immediately know that
k
pn (x) = [tn ]g(t)exf (t) if and only if dn,k = [tn ]g(t) (f (t)) . (5.39)
Hence, the mapping θ is one-to-one and onto. From the mapping defined by
(5.37), we understand that the operation # defined in the Sheffer group is
equivalent to the matrix multiplication of two Riordan arrays in the Riordan
group. In [170], the connection between usual matrix multiplication and Rior-
dan array multiplication is given. Hence, a connection between usual matrix
multiplication and the Sheffer-type sequence multiplication can be established
similarly. Using symbolic calculus with operators D and E, we find via (5.38)
or Definition 5.1.16
X
g(t)h(f (t)) = g(t)E f (t) h(0) = g(t)ef (t)D h(0) = tk pk (D)h(0). (5.40)
k≥0
This is the desired expression given in [103] to expand the composite function
g(t)h(f (t)). Hence, we have pn (D)h(0) = [tn ]g(t)h(f (t)), which, from (5.39)
and the multiplication in the Riordan group, is equivalent to
n
X
dn,k hk = [tn ]g(t)h(f (t)), (5.41)
k=0
where (h0 , h1 , . . .) has the generating function h(t). The last expression was
used to find the Riordan subgroup by Shapiro (cf. Section 4.3 or [195]). Equa-
tion (5.41) can also be considered as a linear transform to h(t) or (h0 , h1 , . . .)
represented by Riordan array (g(t), f (t)). Thus, (5.38) is the linear transform
of ext . With the aid of (5.41), we may transfer a property of the Riordan group
to the Sheffer group.
322 Methods for the Summation of Series
1 t
Example 5.1.19 We now consider 1−t , t−1 , an involution in the Riordan
group (cf. [28]), that possesses the matrix form
1
1 −1
1 −2 1
(dn,k )n≥k≥0 = 1 −3 3 −1 . (5.42)
1 −4 6 −4 1
..
... ... .
which is the Laguerre polynomial of order zero. Conversely, for the given poly-
nomials (5.43), we obtain the matrix (5.42), which entries satisfy
It follows that f (t) = t/(t − 1). From the first column of matrix (5.42) we also
obtain g(t) = 1/(1 − t).
If the sequences (pn (x)) and (qn (x)) are mapped from the Riordan arrays
(dn,k ) and (cn,k ), respectively, then from the defined operation of the poly-
nomial sequence multiplication in (5.36), the coefficients of the polynomials
pn (x) and qn (x) are respectively pn,k = dn,k /(k!) and qn,k = cn,k /(k!), and
hence, we have
(k!rn,k )n≥k≥0 = (dn,k )(cn,k ),
where rn,k are obtained in (5.36). Consequently, the Sheffer-type polynomial
sequence (rn (x)) is mapped from the Riordan array
Theorem 5.1.20 The Sheffer group and the Riordan group are isomorphic.
Pn Pn
Proof. Let (pn (x) = k=0 pn,k xk ) and (qn (x) = k=0 qn,k xk ) be two Sheffer-
type polynomial sequences mapped by θ from (g(t), f (t)) and (d(t), h(t)), re-
spectively, i.e., θ(g(t), f (t)) = (pn (x)) and θ(d(t), h(t)) = (qn (x)) we have
(pn (x))#(qn (x)) = θ ((g(t), f (t))) #θ ((d(t), h(t))
= θ ((g(t), f (t))(d(t), h(t)) . (5.44)
Since mapping θ : (dn,k ) 7→ (pn (x)) or equivalently, θ : (g(t), f (t)) 7→ (pn (x))
is one-to-one and onto and satisfies (5.44), we obtain the theorem.
It is clear that the identity Sheffer polynomial sequence, (xn /n!), is the
mapping from the Riordan array (1, t). Hence, the inverse of a Sheffer-
type polynomial sequence
(pn (x)), denoted by (pn (x))−1 , is defined as
θ 1/(g(f¯(t))), f¯(t) , where (pn (x)) = θ (g(t), f (t)) and f¯(t) is the compo-
sitional inverse of f (t).
t
Example 5.1.21 We now consider an exponential Riordan array ( et −1 , t).
−1 t
t 1 t e −1
Since θ et −1 , t = n! Bn (x) and et −1 , t = t , t , we have
−1
1 et − 1
Bn (x) = ,t
n! t
n
!
1 X n xn−k
= .
n! k k+1
k=0
(p−1) (p−1)
Similarly, (Ln (x))−1 = (Ln (x)) because of
−1
1 t 1 t
, = , .
(1 − t)p t − 1 (1 − t)p t − 1
Example 5.1.22 We now consider the sequence multiplication of the (p−1)st
1 t
order Laguerre polynomial sequences generated by involution ( (1−t) p , t−1 ) in
1 et − 1 τn (x) Touchard
At the end of this subsection, we give the above list of some Sheffer poly-
nomials for the interested readers. In the table, we can see many array com-
ponents are exponential Riordan array components.
We now consider the definition of the Riordan pairs.
Definition 5.1.27 Let g(t) and f(t) be given as in Definition 5.1.16. Then
we have a Riordan pair {dn,k , d¯n,k } defined by
P∞
g(t)(f (t))k = n=kP dn,k tn ,
∞ (5.47)
g(f (t)) (f (t)) = n=k d¯n,k tn ,
¯ −1 ¯ k
and
X X
σ(m, n)σ̄(n, k) = σ̄(m, n)σ(n, k) = δm,k
k≤n≤m k≤n≤m
with δm,k denoting the Kronecker delta, and it follows that there hold the
inverse relations
X n X n
fn gk gn fk
= dn,k ⇐⇒ = d¯n,k . (5.49)
n! k! n! k!
k=0 k=0
and n n
X X
fn = σ(n, k)gk ⇐⇒ gn = σ̄(n, k)fk . (5.50)
k=0 k=0
For an element (pn (x)) in the Sheffer group {(pn (x)), #}, it is easy to write
its inverse (p̄n (x)) = (pn (x))−1 as
n
X n
xk 1 X
p̄n (x) = d¯n,k = σ̄(n, k)xk ,
k! n!
k=0 k=0
where σ(n, k) (associated with g(t) and f(t)) may be written in the form
n
X n
σ(n, k) = αn−r Brk (a1 , a2 , · · · ), (5.52)
r
r=k
Proof. Note that (5.52) follows from (5.34). Moreover, recall a known expres-
sion for potential polynomials (cf. e.g., Comtet [44, § 3.5, Theorem B, etc.]).
We have
X tr∞
1
(f (t))k = Brk (a1 , a2 , · · · ).
k! r!
r≥k
Substituting this into (5.48) and comparing the resulting expression with the
RHS of (5.48), we see that (5.52) is true.
and
n
X
σ(n, k)k!p̄k (x) = xn . (5.57)
k=0
These may be used as the recurrence relations for pn (x) and p∗n (x), respec-
tively.
Equations (5.56) and (5.57) are equivalently
Pn n
d¯ p (x) = xn! ,
Pnk=0 n,k k x n (5.58)
k=0 dn,k p̄k (x) = n! .
Certainly, this will reduce to the Faà di Bruno formula when g(t) = 1.
Example 5.1.36 As a simple instance,
take {σ(n, k), σ̄(n, k)} to be the or-
dinary Stirling numbers {(−1)n−k nk , nk } of the 1st and 2nd kinds. Then
(5.55) yields the Bell number W (n) at x = 1, namely,
n
X n
W (n) = n!p̄n (1) = .
k
k=0
t̂ = (t1 , · · · , tr ), x̂ = (x1 , · · · , xr ),
t̂ + x̂ = (t1 + x1 , · · · , tr + xr ),
330 Methods for the Summation of Series
b = (D1 , · · · , Dr ),
0̂ = (0, · · · , 0), D
d = (g1 (t1 ), · · · , gr (tr )),
g(t)
r
X r
X
b=
x̂ · D d=
xi Di , x̂ · g(t) xi gi (ti ),
i=1 i=1
Ei f (· · · , ti , · · · ) = f (· · · , ti + 1, . . . ),
Eixi f (· · · , ti , · · · ) = f (· · · , ti + xi , · · · ).
are called Sheffer-type polynomials with p0̂ (x̂) = 1. Accordingly, pn̂ (D̂) with
D̂ ≡ (D1 , D2 · · · , Dr ) is called Sheffer-type differential operator of degree n̂
associated with g(t̂) and fd (t). In particular, p0̂ (D̂) = I is the identity operator.
Extension Methods 331
For the formal power series h(t̂), the coefficient of tλ = (tλ1 1 , tλ2 2 , · · · , tλr r ) is
usually denoted by [tλ ]h(t̂). Accordingly, (5.60) is equivalent to the expression
d
pλ (x̂) = [tλ ]g(t̂)ex̂·f (t) . Also, we shall frequently use the notation
Definition 5.1.38 Let g(t̂) and fd (t) be any formal power series defined on
Cr , with g(0̂) = 1, fi (0) = 0 and fi′ (0) 6= 0 (i = 1, 2, · · · , r). Then we have a
multivariate weighted Stirling-type pair {σ(n̂, k̂), σ ∗ (n̂, k̂)} as defined by
1 X tn̂
g(t̂)Πri=1 (fi (ti ))ki = σ(n̂, k̂) (5.62)
k̂! n̂!
n̂≥k̂
1 −1 ki X ∗ tn̂
g(f[
¯(t)) Πri=1 f¯i (ti ) = σ (n̂, k̂) , (5.63)
k̂! n̂!
n̂≥k̂
where fd̄(t) = (f¯1 (t1 ), f¯2 (t2 ), · · · , f¯r (tr )), f¯i is the compositional inverse of fi
(i = 1, 2, · · · , r) with f¯i (0) = 0, [ti ]f¯i (ti ) 6= 0, and σ(0̂, 0̂) = σ ∗ (0̂, 0̂) = 1. We
call σ(n̂, k̂) the dual of σ ∗ (n̂, k̂) and vice versa. We will also call
k̂
dn̂,k̂ := σ(n̂, k̂)
n̂
k̂ ∗
d∗n̂,k̂ := σ (n̂, k̂)
n̂
the multivariate Riordan arrays and denote them by g(t̂), fd
(t) and
d̄ fd̄
1/g(f(t)), (t) , respectively.
xλ
pλ (x̂) = .
λ!
Thus, the multivariate weighted Stirling-type pair {σ(n̂, k̂), σ ∗ (n̂, k̂)} defined
as (5.62) and (5.63) is (σ(n̂, k̂), σ ∗ (n̂, k̂)), where
k̂
dn̂,k̂ = d∗n̂,k̂ = δ .
n̂ n̂,k̂
332 Methods for the Summation of Series
with δm̂,k̂ denoting the Kronecker delta, i.e., δm̂,k̂ = 1 if m̂ = k̂ and 0 other-
wise, and it follows that there hold the inverse relations
X X
fn̂ = σ(n̂, k̂)gk̂ ⇐⇒ gn̂ = σ ∗ (n̂, k̂)fk̂ . (5.65)
n̂≤k̂≤0̂ n̂≤k̂≤0̂
−1
Proof. Transforming ti by f¯i (ti ) in (5.62) and multiplying A fd̄
(t) (k̂!) on
the both sides of the resulting equation yields
X k̂! [ −1 ni
tk̂ = σ(n̂, k̂) g(f¯(t)) Πri=1 f¯i (ti ) . (5.66)
n̂!
n̂≥k̂
X k̂! X
= tm̂ σ ∗ (m̂, n̂)σ(n̂, k̂).
m̂!
m̂≥k̂ m̂≥n̂≥k̂
Equating the coefficients of the terms tm̂ on the leftmost side and the rightmost
side of the above equation leads (5.64) and (5.65). This completes the proof.
Remark 5.1.41 [σ(m̂, n̂)] and [σ ∗ (n̂, k̂)] are a pair of inverse r-dimensional
matrices, which may be useful in the higher dimensional matrix theory.
From (5.64), we can see that the 2r dimensional infinite matrices σ(n̂, k̂)
and σ ∗ (n̂,
h k̂)iare invertible for each other, i.e., their product is the identity
matrix δn̂,k̂ .
n̂≥k̂≥0̂
By introducing group multiplication
g(t̂), fd d = g(t̂)d(fd
(t) ∗ d(t̂), h(t) \
(t)), h(f (t)) , (5.67)
\
where h(f (t)) = (h1 (g1 (t1 )), · · ·, hr (gr (tr ))),
from
Theorem 5.1.40,
we imme-
d d̄ d̄
diately see that the inverse of g(t̂), f (t) is 1/g(f (t)), f (t) because their
multiplication result is the identity I = (1, t̂). Hence, similar to [196], we
obtain the following corollary.
Extension Methods 333
Corollary 5.1.42 Let g(t̂) and fd (t) be any formal power series defined on
Cr , with g(0̂) = 1, gi (0) = 0 and gi′ (0) 6= 0 (i = 1, 2, · · · , r). Then with
d
respect to the multiplication defined by (5.67), { g(t̂), f (t) } forms a group
with the identity I = (1, t̂) and for any element g(t̂), fd (t) in the group, its
inverse is 1/g(fd̄ (t)), fd̄
(t) , where fd̄
(t) = (f¯ (t ), f¯ (t ), · · · , f¯ (t )), f¯ is
1 1 2 2 r r i
g(t̂), fd d
(t) d(t̂), h(t) d
u(t̂), v(t)
= g(t̂)d fd (t) u h(f\ \
(t)) , v(h(f (t)))
= g(t̂), fd(t) d u(t̂), v(t)
d(t̂), h(t) d
and
1 1
g(t̂), fd
(t) , fd̄
(t) = g(t̂) , f¯\
(f (t))
g fd̄
(t) g f¯\
(f (t))
= (1, t̂) = I.
This completes the proof of the corollary.
where X
rn̂,λ = ℓ̂!pn̂,ℓ̂ qℓ̂,λ .
n̂≥ℓ̂≥λ
Theorem 5.1.43 The set {(pn̂ ), #} with the operation # is a group, called
the higher dimensional Sheffer group that is isomorphic to the higher dimen-
sional Riordan group defined in Corollary 5.1.42.
where
τ̂λ (x̂) = Πrj=1 τλj (xj )
and τu (t) is the Touchard polynomial of degree u. Hence, we may call τ̂λ (x̂)
the higher dimensional Touchard polynomial of order λ.
(m)
where Eλ (x̂) (λ ≥ 0̂) is the mth order r-variable Euler’s polynomial defined
in [148]. Pr Pr
m
Similarly,
substituting g(t̂) = ( i=1 ti ) /(exp i=1 ti − 1)m and
P
exp x̂ · fd
(t) = exp ( r xi ti ) into (5.60) yields
i=1
X B (m) (x̂)
g(t̂)exp x̂ · fd
(t) = λ
tλ ,
λ!
λ≥0̂
(m)
where Bλ (x̂) (λ ≥ 0̂) is called in [148] the mth order r-variable Bernoulli
(m) (m)
polynomial. Some basic properties of Eλ (x̂) and Bλ (x̂) were studied in
[148].
Since
Pr m
2m ( i=1 ti )
Pr m , t̂ P m , t̂
(exp i=1 ti + 1) (exp ri=1 ti + 1)
Pr m
( i=1 2ti )
= Pr m , t̂ ,
(exp i=1 2ti + 1)
we have
(m) (m) (m)
Eλ (x̂) # Bλ (x̂) = Bλ (2x̂) .
Extension Methods 335
P
Example 5.1.46 For the case g(t̂) = 1 and fd
(t) = m̂≥(1,··· ,1) am tm /(m̂)!,
d
where am = a(1) m1 · · · a(r) mr , it follows that ex̂·f (t) can be written in the form
X tℓ m ℓ
exp(x̂ · fd
(t)) = Πrℓ=1 exp {xℓ a(ℓ) mℓ }
mℓ !
mℓ ≥1
X tℓ kℓ Xkℓ
= Πrℓ=1 1 + { xℓ jℓ Bkℓ jℓ (a(ℓ) 1 , a(ℓ) 2 , · · · )} (5.69)
kℓ ! j =1
kℓ ≥1 ℓ
so that
λℓ
d 1 X
pλ (x̂) = [tλ ]ex̂·f (t) = Πrℓ=1 xℓ jℓ Bλℓ jℓ (a(ℓ) 1 , a(ℓ) 2 , · · · ),
λℓ ! j =1
ℓ
(ℓ) (ℓ)
where Bλℓ jℓ (a 1, a 2, · · · ) is the Bell polynomial. Consequently, we have
λℓ
1 X
[tλ ]h(fd
(t)) = Πrℓ=1 Bλ j (a(ℓ) 1 , a(ℓ) 2 , · · · )Dℓ jℓ h(0̂).
λℓ ! j =1 ℓ ℓ
ℓ
h(f (t)) using either Faà di Bruno’s formula or Bell polynomials. In addition,
for r = 1, such a problem also gives a general extension of the row sums of
Riordan arrays. In the following, we will show that a power series expansion of
g(t̂)h(fd
(t)) could quite readily be obtained via the use of Sheffer-type differ-
ential operators. Also it will be shown that some generalized weighted Stirling
numbers would be naturally entering into the coefficients of the general ex-
pansion formula developed. We shall frequently use the notation (5.61),
h i
b (0̂) = pλ (D)f
pλ (D)f b (t̂) ,
t̂=0̂
Theorem 5.1.48 (First Expansion Theorem) Let g(t̂), fd (t), and components
d each be a formal power series over Cr , which satisfy g(0̂) = 1, fi (0) = 0,
of h(t)
and fi′ (0) 6= 0 (i = 1, · · · , r). Then there holds an expansion formula of the
form X
g(t̂)h(fd (t)) = b (0̂),
tλ pλ (D)f (5.71)
λ≥0̂
Proof. Clearly, the conditions imposed on fd (t) ensure that the method of
formal power series applies to the composite formal power series g(t̂)h(fd (t)).
Thus, using symbolic calculus with operators D b and E, we find via (5.59)
d d b X
g(t̂)h(fd
(t)) = g(t̂)E f (t) h(0̂) = g(t̂)ef (t)·D h(0̂) = b 0̂).
tλ pλ (D)h(
λ≥0̂
Thus, from (5.74) and (5.75) we may infer that the differential operators
pk (D)’s satisfy the relations (5.72) with αj and βj being defined by (5.73).
P
Remark 5.1.50 If h(x) = ∞ n
n=0 hn x be a formal power series and dn,k =
n k
[t ]g(t)(f (t)) , then
X XX
g(t)h(f (t)) = hk g(t)(f (t))k = hk dn,k
k≥0 n≥0 k≥0
yields the generating function of the column of (g, f )h. Thus, g(t)h(f (t)) is an
infinite linear combination of column sums gf k of the Riordan array (g, f ),
i.e., the FTRA.
Example 5.1.52 If g(ẑ), fd (z), and h(ẑ) are entire functions with g(0̂) = 1,
fi (0) = 0, fi′ (0) 6= 0 for i = 1, 2, · · · , r, then the equation (5.71) holds for the
entire function g(ẑ)h(fd (z)).
Here it may be worth mentioning that the processes (5.76) and (5.77) suggest
a kind of compositional power-series-techniques that could be used to devise a
certain procedure for the modification of a sequence represented by the coeffi-
cient sequence of f0 (t).
Example 5.1.54 For the case of r = 1, let Bn (x), C bn(α) (x), and Tn(p) (x) be
Bernoulli, Charlier, and Touchard polynomials, respectively. Then, for any
given formal power series h(t) over C we have three weighted expansion for-
mulas as follows.
X∞ n
t t
h(t) = Bn (D)h(0),
et − 1 n=0
n!
∞
X
e−αt h(log(1 + t)) = b(α) (D)h(0)
tn C (α =
6 0),
n
n=0
∞
X
(1 − t)p h(et − 1) = tn Tn(p) (D)h(0) (p > 0),
n=0
where Bn (D), Cbn(α) (D), and Tn(p) (D) may be called Bernoulli, Charlier, and
Touchard differential operators, respectively. The above formulae are just three
instances drawn from the table of special Sheffer-type polynomials as shown in
Subsection 5.1.2.
Proof. Using the multivariate Taylor’s formula and (5.62) we have formally
X 1 X X t n̂
g(t̂)h(fd
(t)) =g(t̂) Πri=1 fiki (ti )Db k̂ h(0̂) = σ(n̂, k̂) D b k̂ h(0̂)
k̂! n̂!
k̂≥0̂ k̂≥0̂ n̂≥k̂
X X n̂
= σ(n̂, k̂)Db k̂ h(0̂) t .
n̂!
n̂≥0̂ n̂≥k̂≥0̂
where
X k̂!
αk̂ = b n̂ h(0̂)
σ ∗ (n̂, k̂)D (5.80)
n̂!
n̂≥k̂
or
b 0̂)
αk̂ = Λk̂ (D)h( (5.81)
with
X k̂!
b =
Λk̂ (D) b n̂ .
σ ∗ (n̂, k̂)D (5.82)
n̂!
n̂≥k̂
where αk̂ can be written as the forms of (5.80) or (5.81)–(5.82), which com-
pletes the proof of the theorem.
Remark 5.1.57 The univariate setting of Theorem 5.1.56 can help us to find
an expansion of a univariate analytic function f in terms of a sequence of
Sheffer-type polynomials (pn (x))n∈N0 . From the expression of αk in Theorem
5.1.56, it is easy to derive Boas-Buck formulas (7.3) and (7.4) (cf. [21]) of the
coefficients of the series expansion of an entire function in terms of polynomial
pk (z). Indeed, for the fixed k, using the expression of αk in the univariate
setting and (5.63) and Cauchy’s residue theorem yields
X∞ X∞
k! ∗
αk = σ (n, k)h(n) (0) = [tn ] (g(f¯(t)))−1 (f¯(t))k h(n) (0)
n!
n=k n=k
I X ∞ I ¯ k X ∞
!
1 (f¯(t))k
(n) 1 (f (t)) h(n) (0)
= h (0)dt = dt
2πi Γ
n=k
g(f¯(t))tn+1 2πi Γ g(f¯(t))
n=k
tn+1
340 Methods for the Summation of Series
I ∞
! I
1 (f¯(t))k X n!hn 1 (f¯(ζ))k
= dt = H(ζ)dζ,
2πi Γ g(f¯(t)) tn+1
n=k
2πi Γ g(f¯(ζ))
Example 5.1.59 We now use Algorithm 3.1 to find the expansion of an entire
function in terms of Bernoulli polynomials.
Since the generating function of the Bernoulli polynomials is g(t)exp(xf (t))
with g(t) = t/(et − 1) and f (t) = t, we have the compositional inverse of f (t)
as f¯(t) = t and
g(f¯(t))−1 = (et − 1)/t.
Hence, from Definition 5.1.38 we can present
∞
1 ¯ −1 ¯ k 1 1 X tn+k−1
g(f (t)) (f (t)) = (et − 1)tk−1 =
k! k! k! n=1 n!
∞
X X ∞
1 n 1 n + 1 tn
= t = .
k!(n − k + 1)! n+1 k n!
n=k n=k
Extension Methods 341
Hence, σ ∗ (n̂, k̂) = n+1
k /(n + 1) and
X∞ X∞
k! ∗ (n) k! n + 1 (n)
αk = σ (n̂, k̂)h (0) = h (0).
n! (n + 1)! k
n=k n=k
P∞
Noting h(t) = n=0 h(n) (0)tn /n! formally, for k = 0, we can write α0 as
X∞ Z 1
1
α0 = h(n) (0) = h(t)dt
n=0
(n + 1)! 0
which are exactly the expressions of the expansion coefficients obtain on Page
29 of [26], which were derived by using contour integrals.
Example 5.1.60 Let pn (x) be the Laguerre polynomial with its generating
function pair (g(t), f (t)) = ((1 − t)−p , t/(t − 1)), p > 0, then f¯(t) = t/(t − 1)
and g(f¯(t))−1 = (1 − t)−p . Thus, using a similar argument of Example 5.1.59,
we obtain
∗ k n! n + p − 1
σ (n, k) = (−1) .
k! n−k
Hence, the coefficients of the corresponding expansion can be written as
X∞
(p) k! ∗
αk = σ (n, k)h(n) (0)
n!
n=k
∞
X
n + p − 1 (n)
= (−1)k h (0)
n−k
n=k
(k = 0, 1, · · · )
Example 5.1.61 If expansion basis polynomials are Angelescu polynomial
An (x) (n ∈ N0 ), then their generating function pair is (A(t), g(t)) = (1/(1 +
t), t/(t − 1)) and the dual σ ∗ (n, k) can be found as follows:
n−1 n
σ ∗ (n, k) = (−1)k+1 n! 2 − .
k k
Substituting the above expression of σ ∗ (n, k) into the corresponding formula
in Theorem 11 yields the coefficients αk as
X∞
n−1 n
αk = (−1)k+1 k! 2 − h(n) (0)
k k
n=k
(k = 0, 1, · · · ).
342 Methods for the Summation of Series
where the sequences (fn )n≥0 and (gn )n≥0 are called the inverse sequences with
respect to the inverse matrices (dn,k )0≤k≤n and (d¯n,k )0≤k≤n . If dn,k = d¯n,k ,
then we say (dn,k )0≤k≤n is self-inverse, and (fn )n≥0 and (gn )n≥0 are said to
be a pair of dual sequences (or they are dual to each other) with respect to
the self-inverse matrix (dn,k )0≤k≤n . In other words, {fn } and {gn } satisfy
n
X n
X
fn = dn,k gk if and only if gn = dn,k fk . (5.84)
k=0 k=0
If there exists a sequence (fn )n≥0 that is dual to itself with respect to a self-
inverse matrix (dn,k )0≤k≤n , i.e.,
n
X
fn = dn,k fk , (5.85)
k=0
then (fn )n≥0 is called a self-dual sequence with respect to the matrix
(dn,k )0≤k≤n .
Let dn,k = nk (−1)k . Then (dn,k )0≤k≤n is a self-inverse matrix because
n X
X k
n k
(−1)k+j = δn,j ,
j=0
k j
k=0
where δn,j is the Kronecker delta. Let (an )n≥0 be a sequence of complex
numbers. Then (a∗n )n≥0 defined by
n
X n
a∗n = (−1)k ak (5.86)
k
k=0
n
is the dual sequence of (an )n≥0 with respect to ( k (−1)k ) (cf. for example,
Graham, Knuth, and Patashnik [79]). Hence,
n
X n
an = (−1)k a∗k . (5.87)
k
k=0
Extension Methods 343
Note that (an )n≥0 and (a∗n )n≥0 are a pair of inverse sequences with (a∗ )∗n = an .
If a∗n = an , then (an )n≥0 is a self-dual sequence with respect to ((−1)k nk )
(cf. Sun [205]). For instance, the following number sequences are self-dual
sequences with respect to the dual relationship (5.86) for (dn,k )n,k≥0 =
((−1)k nk ) (cf. for example, [205]):
!
1 1
, n+2m−1
, ((−1)n Bn ), (Ln ), (nFn−1 ),
2n m
where (Bn ), (Ln ), and (Fn ) are the Bernoulli number sequence, Lucas number
sequence, and Fibonacci number sequence, respectively.
Bernoulli polynomials Bn (x) and Euler polynomials En (x) for n = 0, 1, . . .
are defined by (cf. (4.24) and (4.243))
text X tn 2ext X tn
= B n (x) and = E n (x) , (5.88)
et − 1 n! et + 1 n!
n≥0 n≥0
where Bn∗ are the dual Bernoulli numbers (Bn )n≥0 , i.e.,
n
X n
Bn∗ = (−1)k Bk , n ≥ 0. (5.93)
k
k=0
Hence, there are three questions raised: (1) What is the self-inverse matrix
with respect to which the Bernoulli number sequence (Bn ) is self-dual? (2)
What is the relationship between the self-inverse matrix found in (1) and the
self-inverse matrix, ( nk (−1)k ), for ((−1)n Bn )n≥0 ? And (3) does there exist
a unified approach to construct self-inverse matrices and self-duals? We will
answer those questions by using the Riordan array theory.
In this subsection, we shall present a unified approach to construct a class
of self-inverse matrices and their applications to the construction of dual num-
ber sequences and dual polynomial sequences. Then we shall discuss the alge-
braic structure of dual number sequences with respect to the established dual
relationships. Some identities of self-dual number sequences will be found ac-
cordingly. Finally, advanced applications of the dual relationships in the con-
struction of identities for dual number sequences will be given.
We recall that a Riordan array (g(t), f (t)) and its inverse
−1 1 ¯
(g(t), f (t)) = , f (t)
g(f¯(t))
is a pair of inverse matrices. If (g(t), f (t))−1 = (g(t), f (t)), i.e., (g(t), f (t)) is
an involution, or equivalently, it has an order of 2, then (g(t), f (t)) is a self-
inverse matrix. Here, if g is an element of a group, then the smallest positive
integer n such that g n equals to the identity e of the group, if it exists, is called
the order of g. If no such integer exists, then g is said to have infinite order.
It is well-known (see Shapiro [194]) that if we restrict all entries of a Riordan
array to be integers, then any element of finite order in the Riordan group
must have order 1 or 2, and each element of order 2 generates a subgroup
of order 2. Sprugnoli and the author find the sequence characterization of
Riordan arrays of order 2 in [113].
The Riordan arrays related to combinatorics often have non-negative inte-
ger entries, and hence they can not have order 2. Therefore, we consider the
possibility for an element R ∈ R possessing a pseudo-order 2. Here, we say
R has a pseudo-order 2 if RM has order 2 with M = (1, −t). Those R are
called pseudo-Riordan involutions or briefly pseudo-involutions (see Cameron
and Nkwanta [28] and [194]). We now present some sufficient and necessary
conditions to identify pseudo-involutions.
Theorem 5.1.62 Let (g(t), f (t)) be a pseudo-involution, and let A(t) and
Z(t) be the generating functions of the A-sequence and Z-sequence of
(g(t), f (t)), where A(t) and Z(t) are called the A-function and Z-function,
respectively. Then the following statements are equivalent to the statement
that the Riordan array (g(t), f (t)) is a pseudo-involution:
Extension Methods 345
Hence, we obtain (iii) from (ii). Similarly, (i) follows from (iii).
To find the A-function and Z-function of a pseudo-involution (g(t), f (t)),
we recall (see Theorem 3.3 of [113]) the A-sequence of
On the other hand, from Theorem 4.3 of [113] we know the A-function of the
involution (g(t), f (t))(1, −t) = (g(t), −f (t)) is
t
A3 (t) = . (5.95)
−f (t)
346 Methods for the Summation of Series
is Z3 (t) = Z(−t) because the Z-functions of (g(t), f (t)) and (1, −t) are Z(t)
and 0, respectively. Since (d3 (t), h3 (t)) is an involution, from Theorem 4.3 of
[113] we also have
1 − g(t)
Z3 (t) = .
−f (t)
Comparing the last two equations, we immediately know
g(−t) − 1
Z(t) = .
f (−t)
From the definitions of A-sequence and Z-sequence, a Riordan array
(g(t), f (t)) that possesses the above A-function and Z-function is a pseudo-
involution.
Corollary 5.1.63 Let nonzero g(t) ∈ F 0 and f (t) ∈ F 1 . Then the infinite
lower triangle matrix (g(t), f (t)) is a pseudo-involution if and only if
f (−t)
f¯(t) = −f (−t) and g(t) = ,
f (−t) − tg(−t) + t
where the denominator is assumed not to be zero.
which implies that (g(t), f (t)) has an A-function (cf. for example, [113]) sat-
isfying (iv) of Theorem 5.1.62.
Note that g(t) = f (−t)/(f (−t) − tg(−t) + t) if and only if
g(−t) − 1 g(t) − 1
= ,
f (−t) tg(t)
Extension Methods 347
we can conclude that ((−1)n Bn )n≥0 and (Bn )n≥0 are self-dual sequences with
respect to D1 and D3 , respectively. Similarly, from (5.91) and (−1)n En (−x) =
−En (x) + 2xn (cf. for example [10, 165]), we get
Xn
n 1 1
(−1)k+1 Ek − k
k 2 2
k=0
Xn n−k X n
n n 1 1 1 k n 1
= −(−1) − − Ek + (−1)
k 2 2 2 k 2k
k=0 k=0
1 1
= −(−1)n En − + n
2 2
1 1 1 1 1
= En − 2 n + n = En − n.
2 2 2 2 2
Similarly, we have
n
X
n+1 k n 1 1
(−1) (−1) Ek − k
k 2 2
k=0
Extension Methods 349
Xn Xn
n−k n 1 n k n 1
= − (−1) Ek + (−1) (−1)
k 2 k 2k
k=0 k=0
1 n 1 n 1 1
= −En − + (−1) n = (−1) En − n ,
2 2 2 2
completing the proof of the theorem.
We now consider the duals of Bernoulli and Euler numbers and the cor-
responding duals of Bernoulli and Euler polynomials with respect to different
dual relationships as shown in Theorem 5.1.66.
Theorem 5.1.67 Let Bn∗ be the duals of Bernoulli numbers Bn with respect
to R1 defined by (5.93), and let Bn∗ (x) be the corresponding dual Bernoulli
polynomials defined by (5.92). Then, there hold
Bn∗ (x) = (−1)n Bn (−x − 1) (5.98)
and
Bn∗ = (−1)n Bn + n (5.99)
for all n ≥ 0.
Proof. From (5.90) and (5.92), we have
Xn Xn Xk
∗ n n−k ∗ n n−k k
Bn (x) = (x) Bk = (x) (−1)j Bj
k k j=0
j
k=0 k=0
Xn X n
n n−j
= (−1)j Bj (x)n−k
j=0
j k − j
k=j
n
X n
= (−1)j Bj (x + 1)n−j = (−1)n Bn (−x − 1).
j=0
j
Hence,
Bn∗ = Bn∗ (0) = (−1)n Bn (−1)
= Bn (1) + n = (−1)n Bn (0) + n,
which implies (5.99).
Corollary 5.1.68 Let (Bn∗ (x))n∈N0 be the sequence of the duals of Bernoulli
polynomial sequence. Then its generating function is
X tn X tn
Bn∗ (x) = (−1)Bn (−x − 1)
n! n!
n≥0 n≥0
(x+1)t
−te e(x+1)t
= −t
= −t . (5.100)
e −1 1 + 1−t−e
t
350 Methods for the Summation of Series
Theorem 5.1.69 With respect to the dual relationship D3 , the duals of num-
∗
bers (−1)n Bn , denoted by ((−1)n Bn ) , can be written as
Xn
∗ n
((−1)n Bn ) = (−1)n (−1)k Bk = Bn + (−1)n n, (5.101)
k
k=0
Corollary 5.1.71 P Let (an )n≥0 be a given sequence with ordinary generating
function a(x) = n≥0 an xn . Then
(i) (an )n≥0 is a self-dual sequence with respect to D1 if and only if (2an+1 −
an )n≥0 is a self-dual sequence with respect to D2 .
(ii) (an )n≥0 is a self-dual sequence with respect to D3 if and only if
(2an+1 + an )n≥0 is a self-dual sequence with respect to D4 .
352 Methods for the Summation of Series
Proof. We leave the proof of (i) as Exercise 5.6 and give a proof of (ii) as
follows: Let
bn = 2an+1 + an
P
with its ordinary generating function b(x) = n≥0 bn xn . Thus,
2(a(x) − a0 ) x+2 2
b(x) = + a(x) = a(x) − a0 ,
x x x
which implies
x x+2 x 2
b − =− a − + (1 + x)a0
1+x x 1+x x
x+2 1 x 2
= −(1 + x) a − − a0 .
x 1+x 1+x x
Therefore,
x
a − = (1 + x)a(x)
1+x
if and only if
x x+2 2
b − = −(1 + x) a(x) − a0 = −(1 + x)b(x).
1+x x x
Proof. The proof of (i) and (ii) are left as Exercise 5.7. Here, we only prove
(iii) and (iv).
X xk X xj
a∗ (−x)e−x = (−1)k ak (−1)j
k! j!
k≥0 j≥0
XX k+j X n
X ! n
x n x
= (−1)k+j ak = (−1)n ak .
k!j! k n!
k≥0 j≥0 n≥0 k=0
Extension Methods 353
Hence, if
n
X
n
(−1)n ak = an and − an ,
k
k=0
then
a∗ (−x)e−x = a(x) and − a(x),
respectively, which can be written briefly as
a∗ (−x)e−x/2 = ±a(x)ex/2 .
If the case of the positive sign on the right-hand side holds, i.e., (an ) is a self-
dual sequence with respect to D3 , then a∗ (x)ex/2 is an even function; while the
negative sign holds, or equivalently, (an ) is a self-dual sequence with respect
to D4 , then the function a∗ (x)ex/2 is odd. It is easy to see the sufficiencies of
(iii) and (iv) are also true. This concludes the proof of the theorem.
Sun [205] uses Theorem 5.1.72 to derive numerous identities including (i)
in the following theorem. Wang [211] uses umbral calculus to extend (i) to
(ii). We now survey their results and extend them to (iii) and (iv) for other
self-dual sequences.
Theorem 5.1.73 For any function f , we have
Pn n
Pk
(i) k=0 k f (k) − (−1)n−k j=0 kj f (j) an−k = 0 for n ∈ N0 if
(an )n≥0 is a self-dual sequence with respect to D
1.
Pn n
n−k
Pk k
(ii) k=0 k f (k) + (−1) j=0 j f (j) an−k = 0 for n ∈ N0 if
(an )n≥0 is a self-dual sequence with respect to D 2.
Pn n
Pk n−j k
(iii) k=0 k f (k) − j=0 (−1) j f (j) an−k = 0 for n ∈ N0 if
(an )n≥0 is a self-dual sequence with respect to D3 .
Pn n
Pk
(iv) k=0 k f (k) + j=0 (−1)n−j kj f (j) an−k = 0 for n ∈ N0 if
(an )n≥0 is a self-dual sequence with respect to D4 .
Proof. The proofs of (i) and (ii) can be found from [205] and [211], respectively.
The proofs of (iii) and (iv) are similar as the proofs of (i) and (ii) by using
either Theorem 5.1.72 or umbral calculus. We leave them as Exercise 5.8.
From Theorem 5.1.66, we know that ((−1)n Bn )n≥0 and (Bn )n≥0 are
self-dual
sequences
with respect to D1and D3 , respectively. In addition,
En 12 − 21n and (−1)n En 21 − 21n are self-dual sequences with respect
to D2 and D4 , respectively. Therefore, we may use Theorem 5.1.73 to obtain
the following identities.
354 Methods for the Summation of Series
The first identity of (5.107) is given in [205], and the others are shown in [114],
which proofs are left as Exercise 5.9.
Definition 5.2.1 Let g(t), U (t), and f (t) be any formal power series over
the real number field R or complex number field C with g(0) = 1, U (0) = 1,
f (0) = 0, and f ′ (0) =
6 0. Then the polynomials un (x) (n = 0, 1, 2, · · · ) defined
by the generating function
X
g(t)U (xf (t)) = un (x)tn (5.108)
n≥0
The author [85] shows that for every U (t) there exists a one-to-one cor-
respondence between (g(t), f (t)) and (un (x))n≥0 , and the P
collection PU of all
polynomial sequences (un (x))n≥0 with respect to V (t) = n≥0 an tn , defined
by (5.108), forms a group (PU , #̃) under the operation #̃, defined by
n
X n
X
{pn (x)}#̃{qn (x)} = {rn (x) = rn,k xk : rn,k = pn,ℓ qℓ,k /aℓ , n ≥ k},
k=0 ℓ=k
which is isomorphic to the Riordan group. Hence, for different power series
U (t) and V (t), groups (PU , #̃) and (PV , #̃), defined by (5.108) associated with
U (t) and V (t), respectively, are isomorphic.
Let c = (c0 , c1 , c2 , . . .) be a sequence satisfying c0 = 1 and ck > 0 for all
P k
k = 1, 2, . . .. We call the element A ∈ F with the form A(x) = k≥0 xck a
generalized power series associated with (cn )n≥0 or, simply, a (c)-GPS, where
F is the GPS set associated with (cn )n≥0 . In [76], a (c)-Riordan array gen-
erated by g(t) ∈ F 0 and f (t) ∈ F 1 with respect to A(x) and (cn )n≥0 is an
infinite complex matrix (dn,k )0≤k≤n , whose bivariate generating function has
the form X tn
dn,k xk = g(t)g(xf (t)). (5.109)
cn
n,k≥0
which is called the Dirichlet Riordan series. The improper Riordan arrays
derived from the bivariate generating function g(t) ln(1/(1 − xf (t)) is worth
being investigated.
In the above definitions, the (n, k) entry of (c)-Riordan array (dn,k ) is
tn f (t)k tj
dn,k = g(t) = [pn (t)]g(t)pk (f (t)), pj (t) = , (5.113)
cn ck cj
in terms of {pn (t)} and real or complex coefficients {an }n≥0 , in the sense that
f (t) = 0 implies all coefficients an = 0, n = 0, 1, . . ..
Note that a normal sequences may not be a basic sequence. The simple
example is given by
Clearly, {qn (t)} is a normal sequence, but it is not a basic sequence since
f (t) = 1 has two representations:
∞
X
f (t) = q0 (t) and f (t) = q0 (t) + qn (t).
n=1
Also, it is known that {tn } and {(t)n } are the simplest basic sequences of
polynomials, where (t)n are the falling factorial polynomials:
Similarly, we have basic sequences {tn /cn } and {(t)n /cn }, where cn 6= 0.
Particularly, if cn = 1, n!, and n, the corresponding basic sequences are called
the classical, Sheffer-type, and Dirichlet-type basic sequences. For example,
the {pn (t) = tn /cn } defined by (5.110)–(5.112) with x = 1 are classical,
Sheffer-type, and Dirichlet-type basic sequences, respectively.
We shall show that a basic sequence is an infinite linearly independent
normal sequence based on the following definition of the infinite linearly in-
dependent sequence.
Definition 5.2.4 Let (fn (t))n≥0 be a function sequence defined on a region Ω
in R or C with its every finite subsequence being linearly independent on Ω, or
equivalently, for every finite subset N ⊆ N0 , (fn (t))n∈N is linearly independent
P Ω. We say (fn (t))n≥0 is infinite linearly independent on Ω, if every series
on
γ f (t) vanishing on Ω has zero partial sum sequence, or equivalently,
Pn≥0 n n Pn
n≥0 n fn (t) = 0 implies its partial sum sequence (sn (t) =
γ k=0 γk fk (t))n≥0
is a zero sequence at every point t ∈ Ω.
Roughly speaking, an infinite function sequence is said to be linearly inde-
pendent if its zero linear combination implies its every partial sum is identi-
cally zero. Or equivalently, an infinite function sequence is linearly dependent
if there exists a vanishing linear combination of the sequence that has a non-
vanishing partial sum. Thus, the sequence {1, t, t2 − t, t3 − t2 , . . .} is linearly
358 Methods for the Summation of Series
dependent, while both sequences {1, t/c1 , t2 /c2 , t3 /c3 , . . .}, cn = 1, n! and n,
respectively, are linearly independent. If cn = 1, then the corresponding ba-
sic sequence is called the standard basic sequence, which is also a standard
normal polynomial sequence.
Proposition 5.2.5 A normal polynomial sequence defined in Definition 5.2.2
is a basic sequence if and only if it is linearly independent.
Proof. Let (pn (t))n≥0 be a normal polynomial sequence. Then any for-
Pn powerj series can be written as a linear combination of (pn (t) =
mal
j=1 αn,j
Pt )n≥0 , nwhere αn,n 6= 0. More precisely, in a formal power series
f (t) = n≥0 fn t , we may take a transformation of the standard normal
polynomial sequence (tn )n≥0 to an arbitrary normal polynomial sequence
P
(pn (t))n≥0 . First, we have t = p1 (t)/α1,1 . Assume that ti = ij=1 βi,j pj (t)
for all 1 ≤ i ≤ k − 1. Then,
k−1
1 1 X
tk = pk (t) − αk,i ti
αk,k αk,k i=1
k−1
X i
X
1 1
= pk (t) − αk,i βi,j pj (t)
αk,k αk,k i=1 j=1
k−1 k−1
1 1 X X
= pk (t) − αk,i βi,j pj (t).
αk,k αk,k j=1 i=j
Hence we have proved that the transform tn 7→ {pk (t)}1≤k≤n holds by using
the mathematical induction. Therefore, anyP formal power series can be written
as a linear expression in terms of {pn (t) = nj=1 αn,j tj }. We should note that
the expression may not be unique.
If (pn (t))n≥0 is not a basic sequence, i.e., there exists a formal power
series f (t) defined on Ω ⊂ R (or C) has two different linear sums in terms of
(pn (t))n≥0 , say
X X
f (t) = an pn (t) f (t) = bn pn (t),
n≥0 n≥0
and assume
P bn0 , then the vanishing
n0 is the first subindex such that an0 6=P
n0
series n≥0 (an − bn )pn (t) has a partial sum sn0 = k=0 (ak − bk )pk (t) not
being identically zero on Ω because an0 6= bn0 . Thus, (pn (t))n≥0 is not linearly
independent from the definition.
Conversely, if (pn (t))n≥0 defined on Ω ⊂ R is not an infinite linearly inde-
pendent sequence, P then there exists a vanishing series in terms of (pn (t))n≥0 ,
denoted by n≥0 an pn (t) = 0, such that it has a partial sum sn0 =
Pn0
k=0 a k p k (t) not being zero at some point t0 ∈ Ω. Hence, there exists at least
one non-zero coefficient an0 in the partial sum sn0 . If a formal power series
Extension Methods 359
P
f (t) is a linear sum in terms of (pn (t))n≥0 shown as f (t) = n≥0 bn pn (t), then
P
n≥0 (an + bn )pn (t) is also a linear expression of f (t) in terms of (pn (t))n≥0 .
Therefore, we have
X X
f (t) = bn pn (t) = (an + bn )pn (t),
n≥0 n≥0
which implies that f (t) has two different linear expressions in terms of
(pn (t))n≥0 because of bn0 =
6 an0 + bn0 .
or equivalently, the above coefficient set {an } is the unique solution set of the
system of the linear equations
X
a0 = f 0 , ai αi,n = fn , n ≥ 1, (5.115)
i≥n
which is called the characterization system for f (t) associated with (pn (t))n≥0 .
In the proof of Proposition 5.2.5, we have shown that every formal power series
can be written as a linear sum as shown in (5.114). Thus, system (5.115)
is always solvable provided that (pn (t))n≥0 is a normal polynomial sequence.
The following example shows the solution may not be unique: For (pn (t) =
tn − tn−1 )n≥1 and p0 (t) = 1, system (5.115) becomes
a0 = f 0 , an − an+1 = fn , n ≥ 1,
Thus, based on this relation we may write, upon using of the extracting-
coefficient operator [pn (t)], by
Although we use the same notation for the generalized Riordan arrays
(dn,k ) and the classical Riordan arrays (d¯n,k ), the entries are usually different,
where dn,k is defined by (5.116), while d¯n,k = [tn ]g(t)(f (t))k . Let (pn (t))n≥0
Pk j
be a basic sequence, where p0 (t) = 1 and pk (t) = j=1 αk,j t (αk,j 6= 0,
k ≥ 1). From (5.116) we obtain a relationship between dn,k and d¯n,k :
n
X Xk n X
X k
1 ℓ αk,j ¯
dn,k = [t ]g(t) αk,j (f (t))j = dℓ,j . (5.117)
αn,ℓ j=1
α
j=1 n,ℓ
ℓ=1 ℓ=1
It is worthy of note that both the left-hand side of (5.120) and pλ (h(t)) are
formal power series, and d(t)g(h(t))|t=0 = d(0)g(0) = 1, f (h(t))|t=0 = f (0) =
′ d
′ ′
0 and f (h(t)) |t=0 = dt f (h(t))|t=0 = f (0)h (0) = 1. Thus, in view of
(5.120) we may compute
∞
X
[pn (t)]d(t)g(h(t))pk (f (h(t))) = [pn (t)]d(t) cλ,k pλ (h(t))
λ=0
362 Methods for the Summation of Series
∞ ∞ ∞
(∞ )
X X X X
= [pn (t)] cλ,k dm,λ pm (t) = [pn (t)] pm (t) dm,λ cλ,k
λ=0 m=0 m=0 λ=0
∞
X
= dn,λ cλ,k = ξn,k .
λ=0
Indeed
1 ¯(t) = g(t) ¯(t)) = (1, t).
(g(t), f (t)) , f , f (f
g(f¯(t)) g(f (f¯(t)))
Here (1, t) denotes the unit matrix (δn,k ) = diag(1, 1, 1, · · · ), since for the case
g(t) = 1, f (t) = t, we have
Moreover, the associative law for the matrix multiplication rule as given by
(5.119) can also be confirmed without any difficulty. Thus for given basic
sequence (pn (t))n≥0 of polynomials, all matrices (g(t), f (t)) formed by formal
power series g(t) and f (t) satisfying those conditions mentioned previously
just yields a group with the multiplication as shown in (5.119), in which the
inverse and the unit are given by (5.121) and (1, t), respectively.
All these can be summarized by
Proposition 5.2.11 All the matrices (dn,k ) = (g(t), f (t)) associated with a
given basic sequence (pn (t))n≥0 and with dn,k being defined by (5.116) form
a generalized Riordan group, denoted by R, associated with (pn (t))n≥0 with
respect to the multiplication as given by (5.119), and with the inverse ele-
ment (dn,k )−1 and the unit element being given by (5.121) and (1, t) = (δn,k ),
respectively.
Particular two subgroups of R are important and have been considered in
the this section:
• the set A of Appell arrays, that is the (c)-Riordan arrays R = (g(t), f (t)) for
which f (t) = t; it is an invariant subgroup and is isomorphic to the group
F 0 with the usual product as the group operation;
Extension Methods 363
• the set L of Lagrange arrays, that is the (c)-Riordan arrays R = (g(t), f (t))
for which g(t) = 1; it is also called the associated subgroup; it is isomorphic
with the group F 1 with composition as the group operation;
Next are three useful cases of Riordan groups associated with three type
of basic sequences of polynomials given before.
(i) If the basic sequence (pn (t))n≥0 is taken to be {tn /cn }, where c0 = 1
and cn =6 0 for all n ≥ 1, then we get the (c)- Riordan matrices and
generalized Riordan group (cf. [85]).
(ii) If the basic sequence (pn (t))n≥0 is taken to be {(t)n /cn }, where
c0 = 1 andcn= 6 0 for all n ≥ 1, which includes the special case
t
{(t)n /n! = }, then we get a new type of Riordan group, which
n
will be discussed later.
t
(iii) Note that both tn /n! and are the simplest Sheffer-type poly-
n
nomials. Certainly, every special kind of Sheffer-type polynomial
sequence (pn (t))n≥0 can be used as a basic sequence, thereby pro-
ducing a kind of Riordan groups related to Sheffer-type polynomial
sequences.
Similarly, (d(t), h(t))Q , (g(t), f (t))Q , and (d(t)g(h(t)), f (h(t)))Q denote the
corresponding elements of GQ associated with Q = (qn )n≥0 , where
(d(t), h(t))Q = (d′n,k )Q with d′n,k = [qn (t)]d(t)qk (h(t)), etc. Then GP and GQ
are isomorphic under the one-to-one correspondence relations (d(t), h(t))P ↔
(d(t), h(t))Q , (g(t), f (t))P ↔ (g(t), f (t))Q , which imply
and
1 ¯(t) 1 ¯(t)
(g(t), f (t))−1
P = , f ↔ (g(t), f (t))−1
= , f .
g(f¯(t)) P
Q
g(f¯(t)) Q
364 Methods for the Summation of Series
Note the unit element (1, t) is common to both GP and GQ . Consequently, all
the generalized Riordan groups are isomorphic to the ordinary Riordan group
with {tn /n!}. However, concrete structures and analytic and combinatorial im-
plications between different groups are different. More details and applications
demonstrating the differences are worthy of further study.
or equivalently,
F (t) = α(t)G(φ(t)) ⇔ G(t) = β(t)F (ψ(t)),
Extension Methods 365
where F (t) and G(t) are the generating functions of the sequences (fn ) and
(gn ), respectively. The inverting combinatorial sums by means of Riordan ar-
rays was introduced and discussed in [105] by He, Hsu, and Shiue. This prob-
lem was also studied by Merlini, Sprugnoli, and Verri in [162]. It is easy to
see
(dn,k )−1 = (g(t), f (t))−1 = (g̃(t), f¯(t)) = (en,k ), (5.125)
where
1
g̃(t) = . (5.126)
g(f¯(t))
As an example, for the Pascal triangle (g(t), f (t)) = (1/(1 − t), t/(1 − t)) =
( nk ) from (5.126) there holds
1 t n
(g̃(t), f¯(t)) = , = (−1)n−k ,
1+t 1+t k
which yields the well known binomial inversion (cf. Subsection 5.1.4)
n
X n
X
n n−k n
fn = gk ⇔ gn = (−1) fk .
k k
k=0 k=0
Another example can be found in Catalan matrix (C(t), tC(t)) = (dcn,k ), where
√
1− 1 − 4t
C(t) =
2t
and the entries of the Catalan matrix are (cf., for example, [42, 86, 151, 193])
c n k k+1 k + 1 2n − k
dn,k = [t ]t C(t) = , 0 ≤ k ≤ n.
n+1 n
It is easy to find
Thus, based on this relation we may write, upon using of the extracting-
coefficient operator [pn (t)], by
and denote (cn,k ) = (β(t), ψ(t)), where n, k ∈ J. Thus there holds matrix
multiplication
where
d
αk = Λk (D)f (0), D = , (5.128)
dt
X k!
Λk (D) = σ ∗ (n, k)Dn , (5.129)
n!
n≥k
n
t 1 (h∗ (t))k
σ ∗ (n, k) = , (5.130)
n! k! g(h∗ (t))
and
In fact, all the functions appearing in (5.132) are entire functions so that
differential operators can apply. However, a practical application of formula
(5.132) would seem quite complicated.
The key to construct convolution formulas using (5.132) is to find the
basic sequences with respect to corresponding operators Λn similar to those
defined by Lemma 5.2.16. More precisely, we call Λ = (Λn )n≥0 a sequence
of the function-to-sequence operators if there exist Λn : f 7→ an (n ≥ 0)
mapping every real entire function f (t) to a real number sequence (an )n≥0
with the property that the particular case f (t) = 0 leads to the zero-sequence
(an = 0)n≥0 . Given a simple normal polynomial sequence (pn (t))n≥0 , suppose
that there is a function-to-sequence operator sequence (Λn )n≥0 that makes
every real entire function f (t) expressible formally or analytically in the form
X
f (t) = an pn (t),
n≥0
where the sequence (an )n≥0 is determined from f (t) via Λn . Then from Propo-
sition 5.2.7 (pn (t))n≥0 is a basic sequence, called a basic sequence for entire
functions with respect to the operator sequence Λ = (Λn )n≥0 .
Here are some examples of basic sequences with respect to some function-
to-sequence operators.
Example 5.2.18 Generally, every Sheffer-type polynomial sequence
(pn (t))n≥0 is a basic sequence with respect to Λ(D) = (Λn (D))n≥0 defined
by (5.129). Let the Sheffer-type sequence (pn (t))n≥0 be given by (g(z), f (z))
as X
g(z)exp(tf (z)) = pn (t)z n .
n≥0
Let g(z) and f (z) have convergence radii ρ1 andPρ2 , respectively, and let
ρ = min{ρ1 , ρ2 }. Then the absolute convergence of n≥0 pn (t)z n with |z| < ρ
P 1/n
implies the convergence of n≥0 an pn (t) with limn→∞ |an | < ρ. Accord-
ingly, for the basic sequence (pn (t))n≥0 with respect to the operator Λ(D) we
see that the expression
X
h(t) = (Λn (D)h(0))pn (t)
n≥0
368 Methods for the Summation of Series
where M h(t) = (h(t) + h(t + 1))/2. Particularly, the above expressions are
convergent analytic expressions in case h(t) are taken to be entire functions
satisfying the following conditions, respectively:
1/n 1/n
limn→∞ ∆Dn−1 h(0) < 2π, limn→∞ |M Dn h(0)| < π.
where the index 0 in the above equation means the corresponding functions
take their values at t = 0.
For Lagrange arrays (α(t), φ(t)) and (β(t), ψ(t)), i.e., α(t) = β(t) = 1, we
have the following lemma to evaluate the high order derivatives in (5.133).
for all n ≥ k ≥ 0.
Proof. First, for pn (t) = tn /n! and h(t) ∈ F we observe the nth coefficient of
Maclaurin expansion of
X
h(t) = Dk h(0)pk (t)
k≥0
can be written as
Dn h(0) = [pn (t)]h(t).
Let h(u) = uk and u = f (t). Then
Using the Lagrange inversion formula (4.179) (cf. also Theorem 5.1 in [216])
and noting the compositional inverse of u = f (t) satisfies u = ut/f¯(u) with
u/f¯(u) ∈ F 0 , we can write the last equation as
Corollary 5.2.21 Let f (t) ∈ F 1 , and let g(t) ∈ F 0 be the generating function
of sequence {gn }n≥0 . Then
n
X ℓ
n k
gn−ℓ ℓ−k u
D g(t)f (t) t=0
= kn! [u ] ¯ (5.135)
ℓ f (u)
ℓ=max{k,1}
for all n ≥ k ≥ 0.
Denote the compositional inverses of φ(t), ψ(t), and (ψ◦φ)(t) by φ(t), ψ(t),
and (ψ ◦ φ)(t), respectively. Using Proposition 5.2.20, we can immediately
write Identity (5.133) as
Xn n λ ! !n
n−λ u λ−k u n−k u
[u ] [u ] = [u ]
λ=k
φ(u) ψ(u) (ψ ◦ φ)(u)
(5.136)
for α(t) = β(t) = 1.
Let α(t), β(t) ∈ F 0 with α(t)β(t) 6= 1 and φ(t), ψ(t) ∈ F 1 . Using Corollary
5.2.21, we can modify Identity (5.133) as
Xn X n ℓ !
1 u
λ [tn−ℓ ]α(t) [uℓ−λ ]
ℓ φ(u)
λ=0 ℓ=max{λ,1}
Xλ j !
1 u
× [tλ−j ]β(t) [uj−k ]
j ψ(u)
j=max{k,1}
!ℓ
Xn
1 n−ℓ u
= [t ]α(t)β(φ(t)) [uℓ−k ] (5.137)
ℓ (ψ ◦ φ)(u)
ℓ=max{k,1}
for all n ≥ k ≥ 0.
Extension Methods 371
n
implies that Λn (D) = ∆ . Consequently, we obtain the convolution formula
X
n φ(t) λ ψ(t)
∆ α(t) ∆ β(t)
λ 0 k 0
λ≥0
ψ(φ(t))
= ∆n α(t)β(φ(t)) , (5.139)
k 0
among which the particular case with α(t) = β(t) = 1 seems more interesting,
since
X
n φ(t) λ ψ(t) n ψ(φ(t))
∆ ∆ =∆ . (5.140)
λ 0 k 0 k 0
λ≥0
For the basic sequence (iii), the Newton series in terms of central difference
X t[n] X
f (t) = δ (n) f (0) = δ n f (0)pn (t),
n!
n≥0 n≥0
372 Methods for the Summation of Series
where 2φ(0), 2ψ(0), 2ψ(φ(0)) ∈ / N0 , among which the particular case with
α(t) = β(t) = 1 yields
X φ(t) φ(t) + λ − 1 ψ(t) ψ(t) + k − 1
δn λ
2 δλ k
2
φ(t) − 2
λ 0 ψ(t) − 2
k 0
λ≥0
k
ψ(φ(t)) ψ(φ(t)) + 2 − 1
= δn . (5.144)
ψ(φ(t) − k2 k 0
λ≥0
(a − λ−n k−λ
2 )(b − 2 )
λ−n k−λ
a+b a + b + k−n
2 −1
= k−n
(5.146)
a+b− 2 k−n
where Z 1
[D−1 f (t)]10 = f (t)dt.
0
Extension Methods 373
where we assume n ≥ 2.
For the basic sequence (vi), similar to (iv) and (v), from the property of
Boole’s polynomials (cf. [44]) we have the series expansion
X1 X
f (t) = (∆n f (1) + ∆n f (0))ξn (t) = [M ∆n f (0)]ξn (t).
2
n≥0 n≥0
where we assume n ≥ 2.
Finally, for the basic sequence (vii), from Theorem C on page 130 of [44]
there holds X
f (t) = f (n) (nx)pn (t, x)
n≥0
Remark 5.2.23 The Lagrange inversion formula (4.175) (cf. also Theorem
A of [44]) guarantees the relation
k
tn f¯(t)k ¯ k
n f (t) n−1 n−k t
= D0 = D0 ,
n! k! k! k−1 f (t)
suggesting that for the case g(t) = 1, (5.130) may be reformulated in the form
n ¯ k
t f (t)
σ ∗ (n, k) =
n! k!
n−k n
n−1 t t
=
k − 1 (n − k)! f (t)
n
n−1 t
= Dn−k . (5.152)
k−1 f (t) t=0
Xn Xj
1 ℓ
= [t ]h(f (t))[tj−ℓ ]g(t)
j=1
αn,j
ℓ=0
n
X n X
X n
1 1 ℓ
= [1]h(f (t))[tj ]g(t) + [t ]h(f (t))[tj−ℓ ]g(t)
j=1
αn,j αn,j
ℓ=1 j=ℓ
n X
X n
1 ℓ
= h0 [pn (t)]g(t) + [t ]h(f (t))[tj−ℓ ]g(t),
αn,j
ℓ=1 j=ℓ
which implies (5.155). We may use the Lagrange inversion formula (4.179) to
write ℓ
ℓ 1 ℓ−1 ′ t
[t ]h(f (t)) = [t ]h (t) ¯ , ℓ ≥ 1.
ℓ f (t)
376 Methods for the Summation of Series
Remark 5.2.25 From the proof of (5.155), it is easy to see that the initial
terms of both sides of (5.155) can be extended to k = 0 and ℓ = 0, respectively,
namely,
Xn Xn X j
1 ℓ
dn,k hk = [t ]h(f (t))[tj−ℓ ]g(t).
j=1
αn,j
k=0 ℓ=0
where v0 = h0 and
k
X j
1 t
vk = [pk (t)]v(f¯(t)) = [tj−1 ]v ′ (t) (5.159)
j=1
jαk,j f (t)
Proof. Since v(t) = h(f (t)), then v(f¯(t)) = h(t). Thus, (5.154) becomes
X
[pn (t)]g(t)v(t) = dn,k hk ,
k≥0
or equivalently,
n
X
n
γ (γ − βk)k−1 (α + βk)n−k = (α + γ)n .
k
k=0
From (5.158), we can find another type identities. Let (g(t), f (t)) =
(dn,k )n≥k≥0 be a (c)-generalized Riordan array with respect to a (c)-sequence
{ck }k≥0 with cP
0 = 1 and ck 6= 0 for all k > 0, where g(t) ∈ F 0 and f (t) ∈ F 1 ,
and let h(t) = n≥0 hn tn /cn . Then, there holds identity
n
X X n
hk
dn,k = [tj ]h(f (t))[tn−j ]g(t). (5.163)
ck j=1
k=1
378 Methods for the Summation of Series
Indeed, substituting vk = hk and v(t) = h(f (t)) into (5.158), we can write it
as
n
X hk
dn,k = [tn ]g(t)h(f (t))
ck
k=0
n
X
= [tj ]h(f (t))[tn−j ]g(t)
j=0
n
X
= f0 dn,0 + [tj ]h(f (t))[tn−j ]g(t),
j=1
when h(t) = et . For h(t) = (a + t)m , formula (5.165) yields the identity
n
X m
n m m−k X m m + n − l
a = (a − 1)l .
k k l m−l
k=0 l=0
Extension Methods 379
X
m−1
m−1
Xn
1 m−l+j−1
= m (a − 1)l
l j=1
j j−1
l=0
m−1
X Xn
m m−1 m−ℓ+j −1
= (a − 1)ℓ
m−ℓ ℓ j=1
m−ℓ−1
l=0
X m
m−1 Xn
m − ℓ + j − 1
= (a − 1)ℓ − 1 .
ℓ j=0
m − ℓ − 1
l=0
Applying these to make further simplification, in which we have used the sum-
mation formula
Xn
m+k n+m+1
= .
m m+1
k=0
because that ∞
X 2k (−t)k
h(t) =
k 4k
k=0
and
1 (−3/2 + j)j −3/2 + j
− [tj−1 ](1 + t)−3/2+j = = .
2 j! j
380 Methods for the Summation of Series
(1 − q)(1 − q 2 ) · · · (1 − q n )
cn = n!q := . (5.166)
(1 − q)n
1 X k (−at)k
= q (2 ) .
ǫa (t) ck
k≥0
to evaluate k
n t
dn,k = [t ]ǫa (t) .
1−t
Therefore we obtain q−identities
n
X n n j−1
1 X ℓ − 1 an−ℓ X an−j X 1 j
=
k! k − 1 cn−ℓ c
j=1 n−j
jℓ! j − 1 − ℓ
k=1 ℓ=k ℓ=0
and
n
n X
X Xn j−1
ℓ − 1 an−ℓ an−j X ℓ + 1 j
=
k − 1 cn−ℓ c
j=1 n−j
j j−1−ℓ
k=1 ℓ=k ℓ=0
since
n
X −1
[tj−1 ](1 + t)j−2 [tn−j ]ǫa (t)
j=1
j
(at)n−1
= −[tn−1 ]ǫa (t) = − .
cn−1
which can also be proved by using the following process as shown in [202].
P
Theorem 5.2.30 Let (g, f ) be a Riordan array, and let h = n≥0 hn tn be a
formal power series. Denote the compositional inverse of f by f¯. Then
X
[tn ]g(t)f (t)k [tk ]h(f¯)(t) = [tn ]g(t)h(t). (5.168)
k≥0
Proof. The left-hand side of (5.168) is (g, f )h(f¯) = gh(f¯ ◦ f ) = gh, which
gives the desired formula (5.168).
For the Riordan array ((1 + αt)p , t(1 + αt)q ), p, q ∈ R, its (n, k) entry is
p + qk n−k
dn,k = [tn ](1 + αt)p (t(1 + αt)q )k = [tn−k ](1 + αt)p+qk = α .
n−k
382 Methods for the Summation of Series
Let h(t) = ts (1 + αt)r . Then for k 6= 0 and k ≥ s, from the Lagrange inversion
formula (4.179), we have
k
k ¯ 1 k−1 ′ t 1
[t ]h(f ) = [t ]h (t) = [tk−1 ]h′ (t)(t/t(1 + αt)q )k
k f (t) k
1
= [tk−1 ](sts−1 (1 + αt)r + rαts (1 + αt)r−1 )(1 + αt)−qk
k
s αr k−s−1
= [tk−s ](1 + αt)r−qk + [t ](1 + αt)r−1−qk
k k
s r − qk αr k−s−1 r − qk − 1
= αk−s + α
k k−s k k−s−1
r − qk s r(k − s)
=αk−s +
k−s k k(r − qk)
r − qs k−s r − qk
= α .
r − qk k−s
Meanwhile, we have
p+r
[tn ]g(t)h(t) = [tn ](1 + αt)p ts (1 + αt)r = [tn−s ](1 + αt)p+r = αn−s .
n−s
(x + y)2n−2(k+i)−1 (xy)k+i
X X
n n−k n+k−j −1
= (−1)j
n−k k j−k
0≤k≤[n/2] 0≤j≤n
(x + y)2n−2j−1 (xy)j
X X
n n−k n+k−j −1
= (−1)j
n−k k j−k
0≤j≤n 0≤k≤[n/2]
2n−2j−1
(x + y) (xy)j
X
k 2n − k − 1
= (−1) (x + y)2n−2k−1 (xy)k .
k
0≤k≤n
Hence,
X
n n−k
k
(−1) (x + y)n−2k (xy)k
n−k k
0≤k≤[n/2]
X
2n − k − 1
= (−1)k (x + y)2n−2k−1 (xy)k /
k
0≤k≤n
X
n−k−1
(−1)k (x + y)n−2k−1 (xy)k
k
0≤k≤[n/2]
2n
x − y 2n xn − y n
= / = xn + y n ,
x−y x−y
which implies (5.171).
Similarly, we can use Theorem 5.2.30 to prove Abel identity
Xn
n
a(a + k)k−1 (b + n − k)n−k = (a + b + n)n . (5.173)
k
k=0
The Riordan array we now considering is (g, f ) = (ept , teqt ) with p, q ∈ R, the
formal power series we are using is h(t) = ts ert . For k 6= 0 and k ≥ s, we use
the Lagrange inversion formula (4.179) to obtain
k
k ¯ 1 k−1 ′ t 1
[t ]h(f ) = [t ]h (t) = [tk−1 ](sts−1 ert + rts ert )e−qk
k f (t) k
s (r − qk)k−s r (r − qk)k−s−1
= +
k (k − s)! k (k − s − 1)!
384 Methods for the Summation of Series
(p + qk)n−k
dn,k = [tn ]ept (teqt )k = [tn−k ]e(p+qk)t =
(n − k)!
and
(p + r)n−s
[tn ]gh = [tn ]ept ts ert = [tn−s ]e(p+r)t = ,
(n − s)!
the formula (5.168) in Theorem 5.2.30 yields
∞
X (p + qk)n−k r − qs (r − qk)k−s (p + r)n−s
= .
(n − k)! r − qk (k − s)! (n − s)!
k=0
and partially because that the summations dealing with involve Stirling num-
bers, Bernoulli numbers and polynomials, Euler numbers and polynomials,
etc. for which other methods either hardly to be applied or offer no hope.
Hence an extension of those methods are needed. This section only intends an
initial and intuitive discussion of the recent related work. We just use exam-
ples to demonstrate snack oil method and hypergeometric series method and
leave W-Z method and its extension in the second subsection. Finally, W-Z
method, snack oil method, hypergeometric function method are foundation
of computer proof of combinatorial identities, particularly, the identities with
binomial coefficients. However, the computer proof for the identities involving
Stirling numbers, Bernoulli numbers, Euler numbers, etc. is still on the way
for developing.
The snack method might be called two variable generating function
method, which is an extension method from known identities to develop more
wide classes of identities. The book [216] phased it as following steps: (1)
Name the P sum in terms of n that we are working on, say f (n). (2) Denote
F (x) = n f (n)xn , i.e., the ordinary power series generating function of f (n),
that is a double sum. (3) Interchange the order of two summation and perform
the inner one in a closed form by using some known series sums such as
X r xk X n
xr = (k ≥ 0), xr = (1 + x)n ,
k (1 − x)k+1 r
r≥0 r≥0
√
X k mn + k 1 − 1 − 4t
k
= Fm (k ≥ 1), where F2 = C(t) = ,
mn + k n 2t
n≥0
(5.175)
etc. (4) Try to identify the coefficients of the generating function. The method
procedure and the P demonstrating
example shown below are givenP in [216].
k
Let f (n) = k≥0 n−k for n = 0, 1, 2, . . ., and let F (x) = n f (n)xn .
Then, taking r = n − k yields
X X k X Xk X 1
n
F (x) = x = xk xr = xk (1 + x)k = ,
n
n − k r 1 − x − x2
k≥0 k≥0 r≥0 k≥0
P k
which implies f (n) = = Fn+1 for n = 0, 1, 2, . . ..
k≥0 n=k
The process proving the following identity (cf. [212, 116]) may demonstrate
the purely algorithmic method by using hypergeometric series.
X m k
m−n
m−n−1
m−2n−1
=2 + . (5.176)
2k n n n−1
k
Since any term in the sum on the left-hand side is non-zero, we require m ≥ 2k
and k ≥ n, so m ≥ 2n and the sum can be written as
X m k X m n + k
S= =
2k n 2n + 2k n
k≥n k≥0
386 Methods for the Summation of Series
Xm
(2n)!(m − 2n)! (n + k)!
=
2n (2n + 2k)!(m − 2n − 2k)! n!k!
k≥0
X
m (m − 2n − 2k + 1)2k (n + 1)k
= ,
2n (2n + 1)2k k!
k≥0
S can ba written as
m X
−m+2n −m+2n+1
2
S= k 2 k
. (5.177)
2n
k≥0
k! n + 12 k
Now define X
a, b (a)k (b)k k
2 F1 ;x = x .
c k!(c)k
k≥0
Proof. Suppose that F (−z) = ǫF (z) for all z where ǫ ∈ {1, −1}. Consider the
generating function
∞ X ∞ m
!
X X m ym z n
m
G(x, y, z) = (−1) fn+k (x) .
n=0 m=0
k m! n!
k=0
Thus, we have to show that G(x, y, z) = ǫG(−x, z, y). By changing the order
of summation in the above equation, we obtain
∞ X
X ∞ X
∞
m ym z n
G(x, y, z) = (−1)m fn+k (x)
n=0 k=0 m=k
k m! n!
∞
XX ∞ ∞ m
zn X m m y
= fn+k (x) (−1)
n=0
n! k m!
k=0 m=k
∞ X
X ∞
z n (−y)k −y
= fn+k (x) e
n=0 k=0
n! k!
X∞ X j
−y fj (x) j j−k
=e z (−y)k
j=0
j! k
k=0
∞
X (z − y)j
=e−y fj (x) = e−y e(x−1/2)(z−y) F (z − y)
j=0
j!
x(z−y)−(y+z)/2
=e F (z − y),
which implies
as desired.
Corollary 5.3.2 Let F (z) be an even or odd formal power series, and let
fk (x) (k ∈ N0 ) be given by (5.187). Let m, n ∈ N0 and ǫ = 1 or −1 depend on
whether F (z) is even or odd. Then
X
m+1
m+1
m
(−1) (n + k + 1)fn+k (x)
k
k=0
X n + 1
n+1
= − ǫ(−1)n (m + j + 1)fm+j (−x). (5.190)
j=0
j
X
m+1
m+1 ∗ X n + 1
n+1
(−1)m+1 fn+1+k (x) = −ǫ(−1)n+1 ∗
fm+1+j (−x),
k j=0
j
k=0
Observe that
∞
X zn z
Bn (x) = e(x−1/2)z z/2 and
n=0
n! e − e−z/2
X∞
zn 2
En (x) = e(x−1/2)z z/2 .
n=0
n! e + e−z/2
Also,
and
and
Xm
mm+1
(−1) (n + k + 1)Bn+k (x)
k
k=0
X n
n+1
+(−1)n (m + j + 1)Bm+j (−x)
j=0
j
=(−1)m (m + n + 2)(m + n + 1)xm+n , (5.193)
Xm
m m+1
(−1) (n + k + 1)En+k (x)
k
k=0
X n
n+1
+(−1)n (m + j + 1)Em+j (−x)
j=0
j
=(−1)m 2(m + n + 2)(xm+n+1 − Em+n+1 (x)). (5.194)
and Momiyama’s formula (5.186), respectively, and the latter in the case of
m = n implies Kaneko’s recurrent formula (5.185). Similarly, (5.192) and
(5.194) in the case of x = 1/2 provides recurrent formulas for Euler polyno-
mials, for instance,
m
X Xn
m En+k n 1
(−1)m = (−1)n Em+j − .
k 2n+k j=0
j 2
k=0
Motivated by the results shown in Theorem 5.3.3, Sun [206] established the
following extension.
Theorem 5.3.4 Let An and A∗n be the formal power series defined in (5.195),
and let k, ℓ ∈ N0 and x + y + z = 1. Then
k
! ℓ
!
∗
Xk k k−j Aℓ+j+1 (y) ℓ
X ℓ ℓ−j Ak+j+1 (z) a0 (−x)k+ℓ+1
(−1) x + (−1) x = .
j=0
j ℓ+j +1 j=0
j k+j +1 (k + ℓ + 1) k+ℓ
k
(5.196)
In addition, we have
Xk Xℓ
k k k−j ℓ ℓ ℓ−j ∗
(−1) x Aℓ+j (y) = (−1) x Ak+j (z) (5.197)
j=0
j j=0
j
and
Xk
k k+1
(−1) (ℓ + j + 1)xk−j+1 Aℓ+j (y)
j=0
j
Xℓ
ℓ ℓ+1
+ (−1) (k + j + 1)xℓ−j+1 A∗k+j (z)
j=0
j
=(k + ℓ + 2) (−1)k+1 Ak+ℓ+1 (y) + (−1)ℓ+1 A∗k+ℓ+1 (z) . (5.198)
Here is an application of Theorem 5.3.4 given in [206].
Theorem 5.3.5 Let k and ℓ be non-negative integer.
(i) If x + y + z = 0, then
X k Xℓ
k k−j y ℓ+j+1 ℓ ℓ−j z k+j+1 (−x)k+ℓ+1
(−1)k x +(−1)ℓ x = .
j=0
j ℓ+j+1 j=0
j k + j + 1 (k + ℓ + 1) k+ℓ
k
(5.199)
In particular,
k
X k (−1)j 2k
j
= 2k
(5.200)
j=0
j (k + j + 1)2 (2k + 1) k
In addition, we have
Xk Xℓ
k k−j ℓ ℓ−j
(−1)k x Bℓ+j (y) = (−1)ℓ x Bk+j (z) and (5.202)
j=0
j j=0
j
Xk
k+1
(−1)k (ℓ + j + 1)xk−j+1 Bℓ+j (y)
j=0
j
Xℓ
ℓ+1
+(−1)ℓ (k + j + 1)xℓ−j+1 Bk+j (z)
j=0
j
(iii) The part (ii) remains valid if we replace all the Bernoulli polynomials
in (5.201)–(5.203) by corresponding Euler polynomials defined in (5.88):
2ext X tn
t
= En (x) .
e +1 n!
n≥0
In addition, we have
Xk Xℓ
j k−j k j ℓ−j ℓ ∗
(−1) x Cℓ+j,α (y) = (−1) x Ck+j,α (z) (5.206)
j=0
j j=0
j
and
k
X
j k−j+1 k+1
(−1) (ℓ + j + 1)x Cℓ+j,α (y)
j=0
j
ℓ
X
j ℓ−j+1 ℓ+1 ∗
+ (−1) (k + j + 1)x Ck+j,α (z)
j=0
j
= (k + ℓ + 2) (−1)k Ck+ℓ+1,α (y) + (−1)ℓ Ck+ℓ+1,α
∗
(z) . (5.207)
The proof of Theorem 5.3.6 is left as Exercise 5.12.
The following corollary of Theorem 5.3.6 are analogs of the results as shown
in Theorems 5.3.4 and 5.3.5.
∗
Corollary 5.3.7 Let Cn,0 (x) and Cn,0 (x) be defined as (5.204), and let k, ℓ ∈
N and x + y + z = 1. Then there holds
k
! ℓ
!
∗
X j k−j k Cℓ+j+1,0 (y) X j ℓ−j ℓ Ck+j+1,0 (z) a0 xk+ℓ+1
(−1) x + (−1) x = .
j=0
j ℓ+j+1 j=0
j k+j+1 (k + ℓ + 1) k+ℓ
k
(5.208)
In addition, we have
Xk Xℓ
j k−j k j ℓ−j ℓ ∗
(−1) x Cℓ+j,0 (y) = (−1) x Ck+j,0 (z) (5.209)
j=0
j j=0
j
394 Methods for the Summation of Series
and
k
X
j k−j+1 k+1
(−1) (ℓ + j + 1)x Cℓ+j,0 (y)
j=0
j
ℓ
X
j ℓ−j+1 ℓ+1 ∗
+ (−1) (k + j + 1)x Ck+j,0 (z)
j=0
j
= (k + ℓ + 2) (−1)k Ck+ℓ+1,0 (y) + (−1)ℓ Ck+ℓ+1,0
∗
(z) .
In addition, we have
k
X Xℓ
ℓ k−j k k ℓ−j ℓ
(−1) x Bℓ+j (y) = (−1) x Bk+j (z) (5.211)
j=0
j j=0
j
and
k
X
ℓ k−j k+1
(−1) (ℓ + j + 1)x Bℓ+j (y)
j=0
j
ℓ
X
k ℓ−j ℓ+1
+(−1) (k + j + 1)x Bk+j (z)
j=0
j
= (k + ℓ + 2) (−1)k Bk+ℓ+1 (y) + (−1)ℓ Bk+ℓ+1 (z) .
The conjugate Bernoulli polynomials B̃n (x) are introduced in [92] by using
their generating function shown below:
∞
X
ext tn
1+t−et
= B̃n (x) , (5.212)
1+ t n=0
n!
where the first few terms of the conjugate polynomial sequence (B̃n )n≥0 are
B̃0 (x) = 1,
1
B̃1 (x) = x + ,
2
5
B̃2 (x) = x2 + x + ,
6
Extension Methods 395
3 5
B̃3 (x) = x3 + x2 + x + 2,
2 2
191
B̃4 (x) = x4 + 2x3 + 5x2 + 8x + ,
30
5 25 191 76
B̃5 (x) = x5 + x4 + x3 + 20x2 + x + , etc.
2 3 6 3
Let (B̃n (x))n≥0 be the conjugate Bernoulli polynomial sequence defined
by (5.212), and let the conjugate Bernoulli numbers (B̃n )n≥0 be defined by
B̃n = B̃n (0). Then we may find that
n
X n n−k
B̃n (x) = x B̃k (5.213)
k
k=0
for all n ≥ 0.
We define the dual sequence of the
conjugate
Bernoulli numbersequence
with respect to inverse matrix R1 = 1−t , 1−t (1, −t) = (−1)k nk n,k≥0 as
1 t
Xk ℓ
k k−j B̃ℓ+j+1 (−y) X ℓ ℓ−j B̃k+j+1
∗
(−z)
(−1)k x (−1)j+1 + x
j=0
j ℓ+j+1 j=0
j k+j+1
(−1)k+1 xk+ℓ+1
= , (5.215)
(k + ℓ + 1) k+ℓ
k
where B̃n (x) are defined by (5.212), and B̃n∗ (x) are defined by (5.214). In
addition,
k
X Xℓ
k k k−j ℓ ℓ
(−1) (−x) B̃ℓ+j (−y) = (−1) (−x)ℓ−j B̃k+j
∗
(−z) (5.216)
j=0
j j=0
j
and
Xk
k+1
(−1)ℓ (−x)k−j+1 (ℓ + j + 1)B̃ℓ+j (−y)
j=0
j
ℓ
X
ℓ+1
+(−1)k (−x)ℓ−j+1 (k + j + 1)B̃k+j
∗
(−z)
j=0
j
where the duals a∗k are derived by using (5.103) of Theorem 5.1.69. Hence,
from (5.195), the corresponding dual polynomials An (x) and A∗n (x) are
respectively.
∗
Corollary 5.3.9 Let Cn,α (x) and Cn,α (x) be defined as (5.204) with α = 1/2,
and let k, ℓ ∈ N and x + y + z = 2. For ak and a∗k as shown in (5.218), there
holds
k
X ℓ
k Eℓ+j+1 (y) X ℓ Ek+j+1 (−z + 1)
(−1)ℓ+1 xk−j + (−1)j xℓ−j
j=0
j ℓ + j + 1 j=0
j k+j+1
Z y Z x+y Z x+y−1
= (−1)ℓ+1 tℓ (t + x)k dt − tk (x − t)ℓ dt + 2 tk (x − t)ℓ dt.
0 0 0
(5.219)
In addition, we have
k
X
k
(−1)ℓ xk−j Eℓ+j (y) − (−1)ℓ y ℓ (x + y)k
j=0
j
ℓ
X
ℓ
= (−1)j xℓ−j Ek+j (1 − z) + (x + y)k (−y)ℓ − 2(x + y − 1)k (1 − y)ℓ .
j=0
j
(5.220)
Xk
k Eℓ+j+1 (0)
(−1)ℓ+1 xk−j
j=0
j ℓ+j+1
ℓ
X
ℓ Ek+j+1 (0) 1
+ (−1)j xℓ−j =− k+ℓ
.
j=0
j k+j+1 (k + ℓ + 1) k
Extension Methods 397
Xk X ℓ
ℓ+1 k−j k Eℓ+j+1 (1/2) j ℓ−j ℓ Ek+j+1 (1/2)
(−1) x + (−1) x
j=0
j ℓ+j+1 j=0
j k+j+1
1 1 3
= − + 2B , k + 1, ℓ + 1 − 2B , k + 1, ℓ + 1 ,
(k + ℓ + 1) k+ℓ
k
2 2
Rα
where B(α, a, b) = 0 ta−1 (1 − t)b−1 dt is an incomplete beta function. From
the last two identities, we have
k
X
ℓ+1 k−j k Eℓ+j+1 (1/2) − Eℓ+j+1 (0)
(−1) x
j=0
j ℓ+j+1
ℓ
X
j ℓ−jℓ Ek+j+1 (1/2) − Ek+j+1 (0)
+ (−1) x
j=0
j k+j+1
1 3
=2 B , k + 1, ℓ + 1 − B , k + 1, ℓ + 1 .
2 2
Let A and B be any m × m and n × n square matrices, respectively. Cheon
and Kim [39] introduce the notation ⊕ for the direct sum of matrices A and
B:
A 0
A⊕B = . (5.221)
0 B
By using the notation, we may obtain the following results on the conjugate
Bernoulli polynomials B̃(x) defined by (5.214), which includes the matrix form
of Lemma 3.2 of Pan and Sun [173] as a special case.
Theorem 5.3.10 Let n be a positive integer, and let B̃(t) and P [t] be defined
as
2 T
respectively.
h n−k i Let (x) = (1, x, x , . . .) , D = diag(0, 1, 1/2, . . .), and [X] =
[0] ⊕ x k , i.e.,
1≤k≤n
0 0 0 ··· 0
0 1 0 ··· 0
1
0 x ··· 0
2
[X] = .. .. .. .. .. .
. . . . .
0 xn−1 xn−2
··· 1
2 n
.. .. .. .. ..
. . . . .
398 Methods for the Summation of Series
Then we have
[X]B̃(x + y) = P [x]DB̃(y) + [X](x), (5.222)
which implies
n
X n
X
B̃k (x + y) n B̃l (y)
xn−k = xn−l + Hn xn (5.223)
k l l
k=1 l=1
Proof. Noting that B̃0 (y) = 1, the left-hand side of (5.222) can be written as
1 0
11 B̃1 (y)
x
2
x2 2
1 xB̃1 (y) + 2 B̃2 (y)
= [X] .. .
+ ..
.
n
x n xn−1 B̃ (y) + · · · + nB̃ (y)
1 1 n n
.. ..
. .
0 0
x 11 B̃1 (y)
2
(1 + 1 )x2 2
2 1 xB̃1 (y) + 2 B̃2 (y)
= .
..
+ [X] ..
.
,
(1 + 1 + · · · + 1 )xn n xn−1 B̃ (y) + · · · + n
2 n 1 1 n B̃n (y)
.. ..
. .
n
X n
X
n n B̃l (y) n−l n B̃l (y)
LHS of (5.223) = Hn x + x = xn−l + Hn xn ,
l l l l
l=1 l=1
zn zn 1
= = zn+1 (5.227)
tn zn+1 − zn zn −1
a(n) c(n + 1)
r(n) = , (5.229)
b(n) c(n)
where a(n), b(n), and c(n) are polynomials in n with gcd(a(n), b(n + ℓ)) = 1
for all ℓ ∈ N0 . It is always possible to put a rational function in this form, for
if gcd(a(n), b(n + ℓ)) = d(n) for all ℓ ∈ N0 , then the common factor can be
eliminated with the change of variables: a′n = an /d(n), b′n = b(n)/d(n − ℓ),
and c′ (n) = c(n)d(n)d(n− 1) . . . d(n− ℓ + 1), which leaves the ratio unchanged.
The values of ℓ for which such d(n − i) (0 ≤ i ≤ ℓ − 1) exist can be detected
as the non-negative integer roots of the resultant of a(n) and b(n + ℓ) with
respect to n.
Extension Methods 401
If we write
b(n − 1)x(n)
y(n) = , (5.230)
c(n)
where x(n) is an unknown rational function of n. Substituting (5.229) and
(5.230) into the first equation of (5.228) shows that x(n) satisfies
a(n)x(n + 1) − b(n − 1)x(n) = c(n). (5.231)
Then [69] proved that under the above conditions of a(n), b(n), and c(n), the
rational function x(n) satisfying (5.231) is a polynomial in n. Hence, finding
hypergeometric solutions of (5.226) is equivalently to find polynomial solutions
of (5.231). This is because if x(n) is a nonzero polynomial solution of (5.231),
then
b(n − 1)x(n)
zn = tn
c(n)
is a hypergeometric solution of (5.226), and vice verse. A general way to find
polynomial solutions of (5.231), if they exist, or to prove that there does not
exist a solution, is given in Section 5.4 of [177]. In the following example, we
can see x(n) can be found by using test and try method. After finding zn , one
may have sn = zn − z0 or sn = zn − zk0 if the sum starts from k0 .
As an example that is shown in [177], let us consider
n
X k!
Sn = (4k + 1) ,
(2k + 1)!
k=0
for some nice functions G(n, k). Then, under the condition
where ∆−1 is the indefinite summation operator, and ∆ is the forward dif-
ference operator. As what we know, for some continuous functions, although
their indefinite integrals have no a closed Rform, their definite integrals is cal-
2
culable. For instance, indefinite integral e−t dt has no a closed form, but
R ∞ −t2 √
−∞ e dt = π. Similarly, there exist non-Gosper-summable series that are
W-Z or Zeilberger summable.
Extension Methods 403
P n
Now we go back to the non-Gosper-summable
n series k k and change
P n n n
it to the
series k k /2 . Let F (n, k) = k /2 (n ≥ 0), and let G(n, k) =
n
− k−1 /2n+1 . G(n, k) satisfies (5.234). Then from the relation
1 n+1 1 n
F (n + 1, k) − F (n, k) = n+1 − n
2 k 2 k
1 n 1 n
= − n+1 + n+1 = G(n, k + 1) − G(n, k),
2 k 2 k−1
of the form (5.236), in which G(n, k)/F (n, k) is a rational function of n and
k, i.e., such that
J
X
aj (n)F (n + j, k) = G(n, k + 1) − G(n, k). (5.237)
j=0
if (5.234) holds or G(n, k) has compact support in k for each n. Now we may
solve the last recurrence equation
P for f (n) in terms
of n.
For instance, for f (n) = 0≤k≤[n/3] 2k n n−k2k /(n − k), [177] shows it satis-
n−k
fies (5.236) with p(n, N ) = (N −2)(N 2 +1) and G(n, k) = 2k n 2k−2 /(n−3k+
2
3). Thus, the sum f (n) satisfies recurrence relation (N − 2)(N + 1)f (n) = 0,
which gives solution f (n) = c1 2n + c2 in + c3 (−i)n . Substituting the values
f (1) = 1, f (2) = 1, and f (3) = 4, we solve c1 = c2 = c3 = 1/2. Therefore,
f (n) = 2n−1 + (in + (−i)n )/2 = 2n−1 + cos(nπ/2).
Denote the left-hand side of (5.237) by tk . Section 6.3 of [177] gives a
procedure similar to Gosper’s procedure to write
where coefficients aj only appear in the first polynomial ratio on the right-
hand side of the above equation, the numerator and denominator in the second
polynomial ratio on the right-hand side are coprime and gcd(p2 (k), p3 (k+j)) =
1 for all non-negative integer j. The expressions of those polynomials are
shown in [177, 226]. If tk+1 /tk is written as
where p(k) = p0 (k)p1 (k), then G(n, k) = (b(k)p3 (k − 1)/p(k))tk , where b(k) is
a polynomial solution of
Furthermore, it was also proved that the last recurrence equation has a polyno-
mial solution b(k) if and only if tk is an indefinitely summable hypergeometric
term.
Extension Methods 405
respectively, where the contour encloses the origin, has radius less than 2π (to
avoid the poles at ±2πi), and is traversed in a counterclockwise direction. We
will see there will be no need to compute the contour integrals, and one can
formally treat the contour integrals as linear operators. The integral repre-
sentation plays a crucial role in connecting the Bernoulli numbers and Euler
numbers to hypergeometric terms. The Bernoulli numbers are also given by
the recursion
X n
n+1
Bk = 0, n > 0, and B0 = 1. (5.239)
k
k=0
It is well known that B2n+1 = 0 for n ≥ 1. The first few values of the Bernoulli
numbers are B0 = 1, B1 = −1/2, B2 = 1/6, B4 = −1/30, B6 = 1/42, etc. For
the Euler numbers, we have E2n+1 = 0 for n ≥ 0.
The Bernoulli polynomials and Euler polynomials obey the relations (5.90)
and (5.91), which we repeat here for easy reference:
Xn
n
Bn (x) = Bk xn−k , n ≥ 0, (5.240)
k
k=0
Xn n−k
n 1 Ek
En (x) = x− , n ≥ 0. (5.241)
k 2 2k
k=0
We need the properties of Bn (x) and En (x) given in (5.183) and (5.184), i.e.,
We also need the following well known binomial expansions for Bernoulli and
Euler polynomials to calculate initial values for the recurrence relations de-
rived by the algorithm given in [35, 46].
n
X X n
n n
Bn (x + y) = Bk (x)y n−k and En (x + y) = Ek (x)y n−k .
k k
k=0 k=0
(5.244)
The original Zeilberger’s
P algorithm is devised to find recurrence relations
of the summation k F (n, k) by solving the equation (5.236), i.e.,
and Euler polynomials. Let us consider Gessel (cf. [66, Lemma 7.2]) identity
as an example
m
X Xn
m n
Bn+k = (−1)m+n Bm+k , (5.245)
k k
k=0 k=0
where bi ’s are k-free rational functions of n and m, namely, k does not appear
in bi ’s. Moreover, we require that the rational functions bi ’s are independent
of the variable z. By Gosper’s algorithm, it is easy to check that C(n, m, k) =
zk+1 − zk has no hypergeometric solution for zk . Moreover, since the Bernoulli
numbers are not P -recursive, Zeilberger’s algorithm does not work in this case.
Then, we will try to solve the equation
where a(k) = (m−k +1)(n+k +1), b(k) = z(k +1), c(k) = b2 k 2 +(b2 n−b2 m+
b0 z − b3 m− b3 )k − b0 z(m+ 1)−b1z(m+ 1)− b2 (n+ 1)(m+ 1)− b3 (n+ 1)(m+ 1).
408 Methods for the Summation of Series
Assume that G(n, m, k) = y(k)F (n, m, k), where y(k) is an unknown ratio-
nal function of k. Substituting y(k)F (n, m, k) for G(n, m, k) in (5.247) reveals
that y(k) satisfies
r(k)y(k + 1) − y(k) = 1.
From Zeilberger’s algorithm, by substituting the factorization (5.248) into the
above equation and setting
y(k)c(k)
x(k) = ,
b(k − 1)
Notice that the coefficients a(k) and b(k) are independent of the unknowns
bi ’s, and c(k) is a linear combination of bi ’s. One can estimate the degree of
the polynomial x(k), as in Gosper’s algorithm. In this case, x(k) is of degree
0. Assume that x(k) = a0 . Then Equation (5.249) becomes
By the same procedure, we see that the right-hand side of (5.245), de-
noted by R(n, m), satisfies the same recurrence relation as L(n, m), namely,
R(n, m) − R(n, m + 1) + R(n + 1, m) = 0.
Finally, we verify initial values. By considering the parity of Bm , we see
that (−1)m Bm = Bm unless m = 1. Hence, L(0, 1) = R(0, 1) = 1/2 and
L(0, m) = R(0, m) = Bm for m 6= 1. The proof is complete.
We now consider Momiyama identity
Xm X n
m+1 n+1
(−1)m (n+k +1)Bn+k +(−1)n (m+j +1)Bm+j = 0,
k j=0
j
k=0
(5.252)
where m + n > 0. The identity was proved by using Volkenborn integral in
[167] and, later, by using the auxiliary formal series method in [219]. We now
show that it can also be proved by using extended Zeilberger’s algorithm after
noting that the identity contains parameters m and n.
Denote the left-hand side and the right-hand side of (5.252) by L(n, m)
and R(n, m), respectively. By the contour integral definition of the Bernoulli
numbers, we have
I m !
1 1 X
m m+1 (n + k)!
L(n, m) = (−1) (n + k + 1) n+k dz.
2πi ez − 1 k z
k=0
Denote the summand in the above summation by F (n, m, k), that is,
m+1 (n + k)!
F (n, m, k) = (−1)m (n + k + 1) n+k .
k z
Therefore, both sides of Momiyama’s identity (5.252) satisfy the same recur-
rence relation.
To compute the initial values, setting m = 0, we get L(n, 0) = (n + 1)Bn .
It follows from the recurrence relation (5.239) that
n
X n
X n
X n
X
n+1 n n n
0= Bk = Bk + Bk = Bn + Bk ,
k k k−1 k−1
k=0 k=0 k=0 k=0
Pn n
which implies k=0 k−1 Bk = −Bn . On the other hand, for n 6= 1, we have
Xn
n n+1
R(n, 0) = − (−1) (k + 1)Bk
k
k=0
Xn Xn !
n+1 n+1 n+1
=(−1) kBk + Bk
k k
k=0 k=0
Xn
n+1 n
=(−1) (n + 1) Bk = (−1)n (n + 1)Bn = (n + 1)Bn .
k−1
k=0
Exercises
5.1 Consider a special
P case of (5.22) for k = 0: Let D = (g, f ) be a Riordan
array, and let f¯ = k≥0 f¯k tk be the compositional inverse of f . Then
∞
X
dn,k f¯k = [tn−1 ]g(t) = gn−1
k=0
for n ≥ 1.
Hint: (i) Since the exponential Riordan array (S(n, k))n,k≥0 is (1, et − 1),
the generating functions of the corresponding c-sequence and r-sequence can
be found by using formulae in (5.27) as c(t) = 0 and r(t) = 1 + t. Then the
recurrence relation of Stirling numbers of the second kind can be obtained
from (5.30):
(1 + αt)β/α − 1
d(t) = (1 + αt)γ/α and h(t) = ,
β
from (5.27) we get
Comparing the coefficients of the nth term on the both sides, we obtain
(5.255). For α = 1 and β = 0, we have the recursive relation for the Stirling
numbers of the first kind, while the recursive relation of the Stirling numbers
of the second kind S(n, k) = S(n, k; 0, 1, 0) as shown in (i) can also be derived
from (5.255).
Extension Methods 413
P
5.3 Denote A(s) = n≥0 an sn . Show
a0 + (a1 − pa0 )s
A(s) = . (5.257)
1 − ps − qs2
Furthermore, prove the Taylor expansion A165998 [197] of A(s) is
A(s)
[n/2]
!
X
a1 pn−1 +
X 1 n − j − 1
= a0 + pn−2j−1 q j (jpa0 + (n − 2j)a1 ) sn .
j=1
j j−1
n≥1
(5.258)
U R = RP, (5.259)
or equivalently,
P = R−1 U R,
414 Methods for the Summation of Series
respectively. Namely,
c0 r0 0 0 0 ···
1!c1 1! (c0 + r1 ) r0 0 0 ···
1!
P = 2!c2 2!
1! (c1 + r2 )
2!
2! (c0 + 2r1 ) r0 0 ··· .
3!c3 3! (c2 + r3 ) 3! 3!
1! 2! (c1 + 2r2 ) (c
3! 0 + 3r1 ) r 0 ···
.. .. .. .. .. ..
. . . . . .
Extension Methods 415
P = D−1 U D .
417
418 Bibliography
[14] P. Barry, On the halves of a Riordan array and their antecedents, Linear
Algebra Appl. 582 (2019), 114–137.
[15] P. Barry, On the r-shifted central triangles of a Riordan array,
https://arxiv.org/abs/1906.01328.
[16] P. Barry, On the central coefficients of Riordan matrices, J. Integer Seq.
16 (2013), 13.5.1.
[17] P. Barry, Riordan Arrays: A Primer, LOGIC Press, Kilcock, 2016.
[18] F. R. Bernhart, Catalan, Motzkin, and Riordan numbers, Discrete Math.
204 (1999), 73–112.
[19] I. N. Bernstein, Modules over a ring of differential operators, study of the
fundamental solutions of equations with constant coefficients, Functional
Anal. Appl. 5 (2) (1971) 1–16 (in Russian); 89–101 (English translation).
[20] J.-E. Björk, Rings of Differential Operators, North-Holland Publishing
Com. Amsterdam, 1979.
[21] R. P. Boas and R. C. Buck, Polynomial Expansions of Analytic Func-
tions Springer, New York, 1964.
[22] J. M. Borwein, P. B. Borwein, and K. Dilcher, Pi, Euler numbers, and
asymptotic expansions, Amer. Math. Monthly, 96 (1989), 681–687.
[23] N. Bourbaki, Algèbre, Hermann, 1959.
[24] D. M. Bressoud, A matrix inverse, Proc. Amer. Math. Soc. 88 (1983),
446–448.
[25] E. H. M. Brietzke, An identity of Andrews and a new method for the Ri-
ordan array proof of combinatorial identities, Discrete Math. 308 (2008),
4246–4262.
[26] A. Z. Broder, The r-Stirling numbers, Discrete Math. 49(1984), 241–259.
[27] U. Buijs, J. G. Carrasquel-Vera, and A. Murillo, The gauge action,
DG Lie Algebra and identities for Bernoulli numbers, arXiv:1403.3630
[math.NT].
[28] N. T. Cameron and A. Nkwanta, On some (pseudo) involutions in the
Riordan group, J. Integer Seq. 8 (2005), no. 3, Article 05.3.7, 16 pp.
[29] L. Carlitz, Some inverse relations, Duke Math. J. 40 (1972), 893–901.
[30] L. Carlitz, Note on some convolved power Sums, SIAM J. Math. Anal.,
8(1977), no. 4, 701–709.
[31] L. Carlitz, Degenerate Stirling, Bernoulli and Eulerian numbers, Utilitas
Mathematica, 15 (1979), 51–88.
Bibliography 419
[108] T.-X. He and L. W. Shapiro, Row sums and alternating sums of Riordan
arrays, Linear Algebra Appl. 507 (2016), 77–95.
[109] T.-X. He and L. W. Shapiro, Fuss-Catalan matrices, their weighted
sums, and stabilizer subgroups of the Riordan group, Linear Algebra
Appl. 532 (2017), 25–42.
[110] T.-X. He and L. W. Shapiro, Palindromes and pseudo-involution multi-
plication, Linear Algebra Appl. 593 (2020), 1–17.
[111] T.-X. He, P.J.-S. Shiue, On sequences of numbers and polynomials de-
fined by linear recurrence relations of order 2, Int. J. Math. Math. Sci.
2009 (2009), 709386.
424 Bibliography
[112] T. X. He, P. J.-S. Shiue, S. Nie, and M. Chen, Recursive sequences and
Girard-Waring identities with applications in sequence transformation,
Electron. Res. Arch. 28 (2020), no. 2, 1049–1062.
[113] T.-X. He and R. Sprugnoli, Sequence characterization of Riordan arrays,
Discrete Math. 309 (2009), no. 12, 3962–3974.
[114] T.-X. He and J. Zheng, Duals of the Bernoulli numbers and polynomials
and the Euler numbers and polynomials, Integers, 17 (2017), Paper No.
A1, 26 pp.
[115] M. D. Hirschhorn, The Andrews formula for Fibonacci numbers, Fi-
bonacci Quart. 19 (1981), 373–375.
[116] M. D. Hirschhorn, A notes posted online, https://web.maths.unsw.edu.
au/ ∼ mikeh/ webpapers/ paper87.pdf.
[117] M. D. Hirschhorn, Solution to problem 1621, Math. Mag. 75 (2002),
149–150.
[118] J. Hirshfeld, Nonstandard combinatorics, Studia Logica, 47 (1988), no.
3, 221–232.
[119] F. T. Howard, Degenerate weighted Stirling numbers, Discrete Math.
57(1985), no. 1, 45–58.
[120] L. C. Hsu, Some combinatorial formulas with applications to probable
values of a polynomial-product and to differences of zero, Ann. Math.
Statistics, 15 (1944), 399–413.
[121] L. C. Hsu, Application of a symbolic operator to the evaluation of certain
sums, Sci. Rep. Nat. Tsing Hua Univ. Ser. A., 5 (1948), 139–149.
[122] L. C. Hsu, Some remarks on a generalized Newton interpolation formula,
Math. Student, 19 (1951), 25–29.
[123] L. C. Hsu, Selected Topics of Methods and Examples of Mathematical
Analysis, Business Publishers, Beijing, 1955.
[124] L. C. Hsu. Generalized Möbius-Rota inversion theory associated with
nonstandard analysis, Sci. Exploration, 3 (1983), no.1, 1–8.
[125] L. C. Hsu, Generalized Stirling number pairs associated with inverse
relations, Fibonacci Quart. 25 (1987), 346–351.
[126] L. C. Hsu, Theory and application of general Stirling number pairs, J.
Math. Res. & exposition, 9 (1989), no. 2, 211–220.
[127] L. C. Hsu, A summation rule using Stirling numbers of the second kind,
Fibonacci Quart. 31 (1993), no. 3, 256–262.
Bibliography 425
[188] G.-C. Rota, Finite Operator Calculus, Academic Press, New York, 1975.
[189] R. Roy, Binomial identities and hypergeometric series, American Math.
Monthly, 94 (1987), 36–46.
[190] W. H. Schikhof, Ultrametric Calculus Cambridge: Cambridge University
Press, 1984.
[191] I. J. Schwatt, An Introduction to the Operations with Series, Chelsea
Publishing Company, New York, 1962.
[192] I. Schur, On Faber polynomials, Amer. J. Math. 67 (1945), 33–41.
[193] L. W. Shapiro, A survey of the Riordan group, Talk at a meeting of the
American Mathematical Society, Richmond, Virginia, 1994.
[194] L. W. Shapiro, Some open questions about random walks, involutions,
limiting distributions and generating functions, Adv. in Appl. Math., 27
(2001), 585–596.
[195] L. Shapiro, Bijections and the Riordan group, Theoretical Computer
Science, 307 (2003), 403–413.
[196] L. W. Shapiro, S. Getu, W. J. Woan and L. Woodson, The Riordan
group, Discrete Appl. Math. 34 (1991), 229–239.
[197] N. J. A. Sloane, The On-Line Encyclopedia of Integer Sequences,
https://oeis.org/, founded in 1964.
[198] R. Sowik, Sequence characterization of 3-dimensional Riordan arrays
and some application, Results Math. 74 (2019), no. 4, Paper No. 169, 7
pp.
[199] R. Sowik, Some (counter)examples on totally positive Riordan arrays,
Linear Algebra Appl. 594 (2020), 117–123.
[200] A. Sofo, Computational Techniques for the Summation of Series, Kluwer
Acad. New York, 2003.
[201] R. Sprugnoli, Riordan arrays and combinatorial sums, Discrete Math.
132 (1994), no. 1-3, 267–290.
[202] R. Sprugnoli, Riordan arrays and the Abel-Gould identity, Discrete
Math. 142 (1995), no. 1-3, 213–233.
[203] R. P. Stanley, Enumerative Combinatorics, Vol. 2, Cambridge University
Press, 1999.
[204] R. P. Stanley, Catalan Numbers, Cambridge University Press, New York,
2015.
430 Bibliography
[221] S.-L. Yang, Y.-X. Xu, and X. Gao, On the half of a Riordan array, Ars
Combin. 133 (2017), 407–422.
[222] S.-L. Yang, Y.-X. Xu, and T.-X. He, (m, r)-central Riordan arrays and
their applications, Czechoslovak Math. J. 67(142) (2017), no. 4, 919–936.
[223] S.-L. Yang, S.-N. Zheng, S.-P. Yuan, and T.-X. He, Schröder matrix as
inverse of Delannoy matrix, Linear Algebra Appl. 439 (2013), no. 11,
3605–3614.
[224] D. A. Zave, A series expansion involving the harmonic numbers, Inform.
Process. Lett. 5 (1976), 75–77.
[225] D. Zeilberger, A holonomic systems approach to special functions iden-
tities, J. Comput. Appl. Math. 32 (1990), no. 3, 321–368.
[226] D. Zeilberger, The method of creative telescoping, J. Symbolic Comput.
11 (1991), 195–204.
[227] X. Zhao and T. Wang, Some identities related to reciprocal functions,
Discrete Math. 265 (2003), 323–335.
Index
433
434 Index
shift, 38
Sigm-summation (ΣS class), 219
Sigma-Delta class (Σ∆ class), 219
Sigma-Delta-D (Σ∆D) class, 187
snack oil method, 384
Stanley’s identity, 208
Stirling inversion, 201
Stirling matrix of the first kind, 317
Stirling matrix of the second kind,
318
Stirling number of the second kind,
76
Stirling numbers of the first kind, 201
Stirling’s formula, 73
Stirling’s summation formula, 212
sum function, 263
summation by part formula, 27
symbolization process, 202
symmetry formulas, 53
telescoping series, 3
ternary number sequence, 287
Toeplitz’s sequence transformation
theorem, 10
Touchard differential operator, 338
Touchard polynomial, 338
transformed sequence, 10