Loading [MathJax]/jax/output/SVG/jax.js
Research article Special Issues

Traces of certain integral operators related to the Riemann hypothesis

  • Received: 28 May 2023 Revised: 14 August 2023 Accepted: 17 August 2023 Published: 28 August 2023
  • MSC : 35J62, 35A15, 35J20

  • We prove the existence of a nontrivial singular trace τ defined on an ideal J closed with respect to the logarithmic submajorization such that τ(Aρ(α))=0, where Aρ(α):L2(0,1)L2(0,1), [Aρ(α)f](θ)=10ρ(αθ/x)f(x)dx, 0<α1. We also show that τ(Aρ(α))=0 for every τ nontrivial singular trace on J. Finally, we give a recursion formula from which we can evaluate all the traces Tr(Arρ(α)), rN, r2.

    Citation: Alfredo Sotelo-Pejerrey. Traces of certain integral operators related to the Riemann hypothesis[J]. AIMS Mathematics, 2023, 8(10): 24971-24983. doi: 10.3934/math.20231274

    Related Papers:

    [1] Mohamed Obeid, Mohamed A. Abd El Salam, Mohamed S. Mohamed . A novel generalized symmetric spectral Galerkin numerical approach for solving fractional differential equations with singular kernel. AIMS Mathematics, 2023, 8(7): 16724-16747. doi: 10.3934/math.2023855
    [2] Imran Talib, Md. Nur Alam, Dumitru Baleanu, Danish Zaidi, Ammarah Marriyam . A new integral operational matrix with applications to multi-order fractional differential equations. AIMS Mathematics, 2021, 6(8): 8742-8771. doi: 10.3934/math.2021508
    [3] Chang Phang, Abdulnasir Isah, Yoke Teng Toh . Poly-Genocchi polynomials and its applications. AIMS Mathematics, 2021, 6(8): 8221-8238. doi: 10.3934/math.2021476
    [4] Zahra Pirouzeh, Mohammad Hadi Noori Skandari, Kamele Nassiri Pirbazari, Stanford Shateyi . A pseudo-spectral approach for optimal control problems of variable-order fractional integro-differential equations. AIMS Mathematics, 2024, 9(9): 23692-23710. doi: 10.3934/math.20241151
    [5] P. Pirmohabbati, A. H. Refahi Sheikhani, H. Saberi Najafi, A. Abdolahzadeh Ziabari . Numerical solution of full fractional Duffing equations with Cubic-Quintic-Heptic nonlinearities. AIMS Mathematics, 2020, 5(2): 1621-1641. doi: 10.3934/math.2020110
    [6] Ismail Gad Ameen, Dumitru Baleanu, Hussien Shafei Hussien . Efficient method for solving nonlinear weakly singular kernel fractional integro-differential equations. AIMS Mathematics, 2024, 9(6): 15819-15836. doi: 10.3934/math.2024764
    [7] Shazia Sadiq, Mujeeb ur Rehman . Solution of fractional boundary value problems by ψ-shifted operational matrices. AIMS Mathematics, 2022, 7(4): 6669-6693. doi: 10.3934/math.2022372
    [8] Fawaz K. Alalhareth, Seham M. Al-Mekhlafi, Ahmed Boudaoui, Noura Laksaci, Mohammed H. Alharbi . Numerical treatment for a novel crossover mathematical model of the COVID-19 epidemic. AIMS Mathematics, 2024, 9(3): 5376-5393. doi: 10.3934/math.2024259
    [9] Najat Almutairi, Sayed Saber . Chaos control and numerical solution of time-varying fractional Newton-Leipnik system using fractional Atangana-Baleanu derivatives. AIMS Mathematics, 2023, 8(11): 25863-25887. doi: 10.3934/math.20231319
    [10] Samia Bushnaq, Kamal Shah, Sana Tahir, Khursheed J. Ansari, Muhammad Sarwar, Thabet Abdeljawad . Computation of numerical solutions to variable order fractional differential equations by using non-orthogonal basis. AIMS Mathematics, 2022, 7(6): 10917-10938. doi: 10.3934/math.2022610
  • We prove the existence of a nontrivial singular trace τ defined on an ideal J closed with respect to the logarithmic submajorization such that τ(Aρ(α))=0, where Aρ(α):L2(0,1)L2(0,1), [Aρ(α)f](θ)=10ρ(αθ/x)f(x)dx, 0<α1. We also show that τ(Aρ(α))=0 for every τ nontrivial singular trace on J. Finally, we give a recursion formula from which we can evaluate all the traces Tr(Arρ(α)), rN, r2.



    Consider the general frame work of system of linear equations

    Ax=b, (1.1)

    where ARn×n is the coefficients matrix, bRn is a constant vector and xRn is an unknown vector. Various problems arising in different fields such as computer science, electrical engineering, mechanical engineering and economics are modeled in this general frame work of system of linear equations (1.1).

    Importance of the methods for systems of linear equations can not be denied due to the requirement of solutions of systems occurring in almost all fields. Babylonians first introduced the system of linear equations with two unknowns about 4000 years ago. Later on Cramer [1] gave the idea for solving the systems of linear equations by using determinants. In the nineteenth century, Gauss introduced a method to solve the linear system (1.1) by elimination of variables one by one and later on using backward substitutions. There also exist many other methods in the literature to solve (1.1). Usually, these methods are classified into two categories, called direct and iterative methods.

    The objective of a direct method is to get an exact solution in minimal number of operations. While, an iterative method starts with an initial guess and produces an infinite sequence of approximations in the direction of exact solution. This sequence can be limited by using a suitable stopping criteria. Direct methods involve the Gauss elimination method, Gauss-Jordan elimination method, Cholasky method, LU decomposition method [2]. Large and sparsely populated systems often arise in solving partial differential equations numerically or dealing with optimization problems. For such cases the conjugate gradient method is implemented and also suggested for sparse systems [3]. Direct methods are ineffective for a system consisting on a large number of equations, mostly when the coefficient matrix is sparse.

    Iterative methods consist on successive approximations that are used to gain approximate solution for system (1.1) at each step, starting with a given initial approximation. Moreover, iterative methods can be further categorized into stationary and non-stationary methods. Stationary methods are older and more straightforward methods involving an iteration matrix that remains constant throughout the whole iterations during calculation. Examples of stationary iterative methods are the Jacobi method, Gauss-Seidel method, Successive Over Relaxation method [2]. The computations in non-stationary methods involve information that changes at each iteration. These iterative methods are used to derive the inner products of residuals [2].

    We observe that in any iterative method the system may be represented in the form of x=Px+c, and the iterative scheme x(k+1)=Px(k)+c is suggested by using an initial approximation x(0) to obtain the best approximate solution. The iterative method is convergent if and only if ρ(P)<1, where ρ(P) is spectral radius of P. In order to obtain the iterative scheme we partition A=(aij) as A=DLU, where D=diag(aii), L and U are strictly, lower and upper triangular matrices respectively.

    Jacobi method and Gauss-Seidel method are the classical methods which are used for the diagonally dominant systems by spiting the coefficient matrix into three matrices. In Jacobi method, the iterative scheme [2] can be expressed as:

    x(k)=D1(L+U)x(k1)+D1b, (1.2)

    and similarly, for Gauss-Seidel method [2], the iterative scheme is suggested as:

    x(k)=(DL)1Ux(k1)+(DL)1b. (1.3)

    If the coefficient matrix A is strictly diagonally dominant, the Jacobi and Gauss-Seidel methods converge for any x0. However Gauss-Seidel method converges rapidly as compare to Jacobi method [2,4].

    The Successive Over-Relaxation (SOR) techniques

    x(k)=(DwL)1((1w)D+wU)x(k1)+w(DwL)1b, (1.4)

    are nicely addressed in literature [2,5,6]. Requirement for the parameter w for SOR is that it lies between zero and two and for each particular matrix the optimal value of w is discussed very comprehensively [7].

    In 1978, the accelerated over-relaxation (AOR) method was initially presented by Hadjidimos as a modification of the successive over-relaxation (SOR) method with two parameters [8]. In mostly cases, the AOR technique improves the Jacobi, Gauss-Seidel, and SOR methods [8,9,10,11]. Significance of AOR method can be seen in [9,12,13,14]. For the convergence of AOR method sufficient conditions are discussed [15,16,17,18,19]. Various aspects of applications of AOR method can also be studied in [21,22,23]. We also see in literature the preconditioned AOR technique to improve the convergence rate of AOR method [24,25,26,27,28,29]. While Krylov subspace techniques [3,30,31,32] are recognized as one of the most significant and effective iterative approaches to solve the sparse linear systems because they are inexpensive to be implemented and are able to fully exploit the sparsity of the coefficient matrix. Krylov subspace techniques are extremely slow or fail to converge when the coefficient matrix of the system is ill-conditioned and excessively indefinite which is the drawback of these schemes.

    The purpose of this paper is to present a new iterative method for solving the systems of linear equations (1.1), which is the generalization of existing methods and fast convergent than the Jacobi, Gauss-Seidel, SOR, and AOR methods. In Section 2, generalized iterative scheme is developed for the best approximate solution. In Section 3, convergence of the proposed iterative scheme is discussed. Numerical and graphical results are discussed in Section 4.

    In this section, we construct a generalized iterative scheme for solving the system of linear equations (1.1). Jacobi method, Gauss-Seidel method, SOR method, and AOR method are the special cases for this presented scheme.

    System (1.1) can be written as:

    wAx=wb, (2.1)

    where 0<w<2 and

    w(DLU)x=bw. (2.2)

    We split matrix A as sum of three matrices D,L and U. Here, D is a diagonal matrix, L is the strictly lower triangular matrix, and U is the strictly upper triangular matrix.

    Above Eq (2.2) can be re-written as:

    (DrLtU)x=[(1w)D+(wr)L+(wt)U]x+bw. (2.3)

    Now (2.3) can be expressed as:

    x=(DrLtU)1[(1w)D+(wr)L+(wt)U]x+(DrLtU)1bw, (2.4)

    where 0<t<w<r<2.

    Relation (2.4) is a fixed point formulation which allows us to suggest the following iterative scheme.

    Algorithm 2.1. For a given initial vector x(0), find the approximate solution x(k) from the following iterative scheme:

    x(k)=(DrLtU)1[(1w)D+(wr)L+(wt)U]x(k1)+(DrLtU)1bw,k=1,2,3,...

    Algorithm 2.1 is the main iterative scheme that converges to the solution rapidly as compared with other methods. This is the generalized scheme for obtaining the solution of a system of linear equations. We present some special cases.

    If t=0, Algorithm 2.1 reduces to the following iterative scheme.

    Algorithm 2.2. For a given initial vector x(0), find the approximate solution x(k) from the following technique:

    x(k)=(DrL)1[(1w)D+(wr)L+wU]x(k1)+(DrL)1bw,k=1,2,3,...

    which is well-known AOR method [2,3].

    If t=0 and w=r, the Algorithm 2.1 reduces to the following SOR method [2,3].

    Algorithm 2.3. For a given initial vector x(0), find the approximate solution x(k) from the following technique:

    x(k)=(DwL)1[(1w)D+wU]x(k1)+(DwL)1bw,k=1,2,3,...

    If t=0 and w=r=1, the Algorithm 2.1 reduces to the following scheme.

    Algorithm 2.4. For a given initial vector x(0), find the approximate solution x(k) from the following technique:

    x(k)=(DL)1Ux(k1)+(DL)1b,k=1,2,3,...

    Algorithm 2.4 is Gauss-Seidel method [2,3].

    If t=r=0 and w=1, the Algorithm 2.1 reduces to the following scheme.

    Algorithm 2.5. For a given initial vector x(0), find the approximate solution x(k) from the following technique:

    x(k)=D1(L+U)x(k1)+D1b,k=1,2,3,...

    Algorithm 2.5 is well-known Jacobi method [2,3].

    In this section, we consider the convergence analysis of the newly developed iterative scheme mentioned as Algorithm 2.1.

    x(k)=(DrLtU)1[(1w)D+(wr)L+(wt)U]x(k1)+(DrLtU)1bw.

    Lemma 3.1. [2] If the spectral radius satisfies

    ρ[(DrLtU)1(1w)D+(wr)L+(wt)U)]1,

    then

    [I(DrLtU)1((1w)D+(wr)L+(wt)U)]1

    exists and

    [I(DrLtU)1((1w)D+(wr)L+(wt)U)]1=I+[(DrLtU)1((1w)D+(wr)L+(wt)U)]+[(DrLtU)1((1w)D+(wr)L+(wt)U)]2+=j=0[(DrLtU)1((1w)D+(wr)L+(wt)U)]j. (3.1)

    Theorem 3.2. For a given any x(0)Rn, the sequence {x(k)}k=0 defined by

    x(k)=[(DrLtU)1((1w)D+(wr)L+(wt)U)]x(k1)+(DrLtU)1bw,

    for each k1, converges to the unique solution

    x=[(DrLtU)1((1w)D+(wr)L+(wt)U)]x+(DrLtU)1bw,

    if and only if

    ρ[(DrLtU)1((1w)D+(wr)L+(wt)U)]<1.

    Proof. For the proof of the statement, it is enough to show that spectral radius of iteration matrix <1. For this, let us consider the iterative scheme suggested in Algorithm 2.1.

    x(k)=[(DrLtU)1((1w)D+(wr)L+(wt)U)]x(k1)+(DrLtU)1bw,

    which can be rewritten as:

    x(k)=[(DrLtU)1((1w)D+(wr)L+(wt)U)][((DrLtU)1((1w)D+(wr)L+(wt)U))x(k2)+(DrLtU)1bw]+(DrLtU)1bw=[(DrLtU)1((1w)D+(wr)L+(wt)U)]kx(0)+[[(DrLtU)1((1w)D+(wr)L+(wt)U)]x(k1)++[(DrLtU)1((1w)D+(wr)L+(wt)U)]+I](DrLtU)1bw. (3.2)

    Since

    ρ([(DrLtU)1((1w)D+(wr)L+(wt)U)])1,

    the matrix converges and

    limk[(DrLtU)1((1w)D+(wr)L+(wt)U)]kx(0)=0,

    and Lemma 3.1 implies that

    limkx(k)=0+limk[k1j=0[(DrLtU)1((1w)D+(wr)L+(wt)U)]j](DrLtU)1bw=[I[(DrLtU)1((1w)D+(wr)L+(wt)U)]]1(DrLtU)1bw.

    As a result, the sequence x(k) converges to the vector

    x=[I(DrLtU)1((1w)D+(wr)L+(wt)U)]1(DrLtU)1bw.

    We can also view the convergence criteria of the purposed method as an application of the Banach fixed point theorem [33]. System of linear equations can be described with the relations of parameters in the equation form as:

    {x1=(1wa11)x1(w2t)a12x2(w2t)a1nxn+wb1x2=(w2r)a21x1+(1wa22)x2(w2t)a2nxn+wb2xn=(w2r)an1x1(w2r)an2x2+(1wann)xn+wbn. (3.3)

    This system is equivalent to

    x=cx+d (3.4)

    with d=wb and cij={(1waij)ifi=j(w2t)aijifi<j(w2r)aijifi>j.

    The solution can be obtained by

    x(k+1)=cx(k)+d. (3.5)

    The iteration method is defined by

    xj(k+1)=1cjj(γnk=1,kjcjkx(k)). (3.6)

    Assuming that cjj0 for j=1,...n. This iteration is suggested for the jth equation of the system. It is not difficult to verify that (3.6) can be written in the form of

    c=(DrLtU)1[(1w)D+(wr)L+(wt)U], (3.7)

    and

    d=(DrLtU)1wb. (3.8)

    Here D = diag(cjj) is the diagonal matrix whose non-zero elements are of those of the principle diagonal of A. Condition of diagonally dominant applied to c is sufficient for the convergence of Algorithm 2.1. We can express directly in terms of the elements of A. The result is the row sum criteria for the convergence will be

    nk=1,kj|ajkajj|<1, (3.9)

    or

    nk=1,kj|ajk|<|ajj|. (3.10)

    This shows that convergence is guaranteed, if the elements in principle diagonal of A are sufficiently large.

    Note that all the components of a new approximation are introduced simultaneously at the end of an iteration cycle.

    In this section, we provide few numerical applications to clarify the efficiency of new developed three parameter iterative scheme Algorithm 2.1, on some system of linear equations for 0<t<w<r<2, whose coefficient matrices satisfy

    max1in1ui=α and max1in1li=β,α+β1,

    where

    li=maxi1j=1βij, for i=2,3,,n,

    and

    ui=maxnj=i+1αij, for i=1,2,,n1.

    In this part, we will compare our developed scheme with previous techniques as namely AOR method, SOR method, Jacobi method and Gauss-Seidel method. All computations are calculated by using computer programming by MATLAB. We use ε=1015 and the following stopping criteria is used for computer programs as:

    ||x(k)x(k1)||||x(k)||ε.

    This stopping criteria is deduced from relative error and the infinite sequence generated by the computer code will be chopped at the stage when this criteria is satisfied. We assume the following examples to compare the new developed method Algorithm 2.1 (Alg 2.1) with various iterative methods AOR (Alg 2.2), SOR (Alg 2.3), Gauss-Seidel (Alg 2.4) and Jacobi (Alg 2.5), to analyze the new iterative scheme's feasibility and effectiveness.

    For the numerical and graphical comparison of methods, we select some examples from the literature.

    Example 4.1. [3] We consider a problem where the loop-current approach is combined with Ohm's law and Kirchhoff's voltage law. Each loop in the network is supposed to be circulated by a loop current. Thus, the loop current I1 cycles the closed-loops a,b,c, and d in the network shown in Figure 1. As a result, the current I1I2 passes via the link joining b and c.

    Figure 1.  Network of loop-current.

    From the above network as shown in Figure 1, we get a four-variable linear equations system by letting R1=R4=1Ω,R2=2Ω,R3=4Ω and V=5volts. We get the following system of the form

    4I12I2=5,2I1+6I22I3=0,2I2+6I32I4=0,2I3+8I4=0.

    Table 1 displays the numerical results for Example 4.1, which indicate that Alg 2.1 is more efficient than the other methods.

    Table 1.  Tabular comparison.
    Methods Parameters Iterations Relative error
    Alg 2.1 w=1.02,r=1.05,t=0.88 14 8.9966e18
    Alg 2.2 w=1.02,r=1.05 28 2.8789e16
    Alg 2.3 w=1.02 30 2.8789e16
    Alg 2.4 ... 32 4.3184e16
    Alg 2.5 ... 61 7.1973e16

     | Show Table
    DownLoad: CSV

    In Figure 2 the residual fall of different methods shows that new method is faster convergent than the other methods. Figure 3 is the comparison of iterations of different algorithms that shows our new iterative method which described in Alg 2.1 is more efficient than other methods described in Alg 2.2–2.5.

    Figure 2.  Log of residual.
    Figure 3.  Comparison of iterations.

    Example 4.2. [34] Consider the following system of the form

    x1+0.250x2=0.75,0.250x1+x2+0.250x3=1.50,0.250x2+x3+0.250x4=1.50,0.250x3+x4+0.250x5=1.50,0.250x4+x5=1.25.

    Table 2 displays the numerical results which indicate that Alg 2.1 is more efficient than the other techniques.

    Table 2.  Tabular comparison.
    Methods Parameters Iterations Relative error
    Alg 2.1 w=1.01,r=1.06,t=0.86 13 5.8249e16
    Alg 2.2 w=1.01,r=1.06 19 4.8541e16
    Alg 2.3 w=1.01 23 2.4271e16
    Alg 2.4 ... 24 2.4271e16
    Alg 2.5 ... 44 7.7666e16

     | Show Table
    DownLoad: CSV

    The residual fall of different technique can be seen in Figure 4 which illustrate that the new method is rapidly convergent than the other methods. Figure 5 is the comparison of iterations of different algorithms that shows our new iterative method which described in Alg 2.1 is more efficient than other methods described in Alg 2.2–2.5.

    Figure 4.  Log of residual.
    Figure 5.  Comparison of iterations.

    Example 4.3. [2] Consider the following system of linear equations of the form

    4x1x2x3=1,x1+4x2x4=1,x1+4x3x4=1,x2x3+4x4=1.

    Table 3 displays the numerical results for Example 4.5, which indicate that Alg 2.1 is more efficient than the other methods.

    Table 3.  Tabular comparison.
    Methods Parameters Iterations Relative error
    Alg 2.1 w=1.05;r=1.07;t=0.9 15 5.5511e16
    Alg 2.2 w=1.05;r=1.07 19 9.9920e16
    Alg 2.3 w=1.05 22 5.5511e16
    Alg 2.4 .... 28 4.4409e16
    Alg 2.5 .... 51 8.8818e16

     | Show Table
    DownLoad: CSV

    In Figure 6 the residual fall of different methods shows that New method is faster convergent than the other methods. Figure 7 is the comparison of iterations of different algorithms that shows our new iterative method which described in Alg 2.1 is more efficient than other methods described in Alg 2.2–2.5.

    Figure 6.  Log of residual.
    Figure 7.  Comparison of iterations.

    Example 4.4. [35] Let the matrix A be given by

    ai,j={8,ifj=i;1,if{j=i+1,fori=1,2,,n1;j=i1,fori=2,3,,n;0,otherwise.

    Let b=(6,5,5,,5,6)T, we take n=100.

    Table 4 displays the numerical results for Example 4.4, which indicate that Alg 2.1 is more efficient than the other techniques.

    Table 4.  Tabular comparison.
    Methods Parameters Iterations Relative error
    Alg 2.1 w=1.02;r=0.97;t=0.50 15 3.8978e16
    Alg 2.2 w=1.02;r=0.97 19 7.7956e16
    Alg 2.3 w=1.02 19 3.8978e16
    Alg 2.4 .... 20 5.1970e16
    Alg 2.5 .... 27 6.4963e16

     | Show Table
    DownLoad: CSV

    The residual fall of different methods can be seen in Figure 8 which illustrate that the new method is rapidly convergent than the other methods. Figure 9 is the comparison of iterations of different algorithms that shows our new iterative method which described in Alg 2.1 is more efficient than other methods described in Alg 2.2–2.5.

    Figure 8.  Log of residual.
    Figure 9.  Comparison of iterations.

    Example 4.5. [2,36] Consider the system (1.1), having co-efficient matrix A is given by

    aij={2i,ifi=jandi=1,2,,1000;1,if{j=i+1,fori=1,2,,999;j=i1,fori=2,3,,1000;0,otherwise.

    and bi=1.5i6 for each i=1,2,,1000.

    Table 5 shows the numerical results for Example 4.3, which indicate that Alg 2.1 is much more efficient than the other techniques.

    Table 5.  Tabular comparison.
    Methods Parameters Iterations Relative error
    Alg 2.1 w=1.021;r=1.079;t=0.98 13 3.6092e17
    Alg 2.2 w=1.021;r=1.079 18 4.3310e16
    Alg 2.3 w=1.0219 20 2.8873e16
    Alg 2.4 .... 22 5.7747e16
    Alg 2.5 .... 41 5.7747e16

     | Show Table
    DownLoad: CSV

    The residual fall of different techniques can be seen in Figure 10 which illustrate that the new method is rapidly convergent than the other methods. Figure 11 is the comparison of iterations of different algorithms that shows our new iterative method which described in Alg 2.1 is more efficient than other methods described in Alg 2.2–2.5.

    Figure 10.  Log of residual.
    Figure 11.  Comparison of iterations.

    In Table 6, IT stands for the number of iterations in above tabular comparison which shows that our new iterative method work much effectively.

    Table 6.  Comparison table for Algorithm 2.1 with various combinations of parameters.
    Parameters Example 4.1 Example 4.2 Example 4.3 Example 4.4 Example 4.5
    w r t IT IT IT IT IT
    0.2 0.7 0.9 186 160 181 160 169
    0.4 0.5 0.8 102 82 96 77 86
    0.6 0.5 0.8 63 50 58 46 52
    0.3 0.8 0.5 138 111 132 108 120
    0.2 0.8 0.3 229 186 217 174 195
    0.3 0.8 1.2 96 97 97 97 95
    0.3 0.8 0.2 155 124 145 114 129
    0.5 0.8 0.3 85 67 79 61 70
    0.5 0.8 0.5 77 61 73 59 66
    0.8 0.4 0.4 57 40 50 33 42
    0.8 0.5 0.7 46 34 41 30 36
    0.9 0.5 0.8 36 27 32 23 28
    0.9 1.04 0.5 24 21 22 21 21
    1.02 1.08 0.8 15 14 14 12 14
    1.03 1.09 0.9 14 13 14 12 13

     | Show Table
    DownLoad: CSV

    In this article, a new generalized iterative scheme is suggested for solving systems of linear equations. We have studied the convergence criteria of this iterative scheme. This scheme is not only the generalized one but also give good results as compared to the existing schemes. This iterative scheme is also suitable for sparse matrices. Numerical results show that this scheme is more effective than the conventional schemes. We would also like to purpose that the given scheme can be extended for the absolute value problems of the type Ax+B|x|=b.

    All authors declare no conflicts of interest in this paper.

    The authors would like to thank the editor and the anonymous reviewers for their constructive comments and suggestions, which improved the quality of this paper.



    [1] A. Albeverio, D. Guido, A. Ponosov, S. Scarlatti, Singular traces and compact operators, J. Funct. Anal., 137 (1996), 281–302. https://doi.org/10.1006/jfan.1996.0047 doi: 10.1006/jfan.1996.0047
    [2] J. Alcántara-Bode, An integral equation formulation of the Riemann hypothesis, Integr. Equat. Oper. Th., 17 (1993), 151–168. https://doi.org/10.1007/bf01200216. doi: 10.1007/bf01200216
    [3] J. Alcántara-Bode, An algorithm for the evaluation of certain Fredholm determinants, Integr. Equat. Oper. Th., 39 (2001), 153–158. https://doi.org/10.1007/bf01195814 doi: 10.1007/bf01195814
    [4] J. Alcántara-Bode, A completeness problem related to the Riemann hypotesis, Integr. Equat. Oper. Th., 53 (2005), 301–309. https://doi.org/10.1007/s00020-004-1315-7 doi: 10.1007/s00020-004-1315-7
    [5] J. Alcántara-Bode, An example of two non-unitarily equivalent compact operators with the same traces and kernel, Pro. Math., 23 (2009), 105–111.
    [6] N. Azamov, F. Sukochev, A Lidskii type formula for Dixmier traces, C. R. Math. Acad. Sci. Paris, 340 (2005), 107–112. https://doi.org/10.1016/j.crma.2004.12.005 doi: 10.1016/j.crma.2004.12.005
    [7] A. Beurling, A closure problem related to the Riemann zeta-function, Proc. Nat. Acad. Sci., 41 (1955), 312–314. https://doi.org/10.1073/pnas.41.5.312 doi: 10.1073/pnas.41.5.312
    [8] P. Borwein, T. Erdelyi, The full Muntz theorem in C[0,1] and L1[0,1], J. London Math. Soc., 54 (1996), 102–110. https://doi.org/10.1112/jlms/54.1.102 doi: 10.1112/jlms/54.1.102
    [9] J. Calkin, Two-ideals and congruences in the ring of bounded operators in Hilbert space, Ann. Math., 42 (1941), 839–873. https://doi.org/10.2307/1968771 doi: 10.2307/1968771
    [10] A. Connes, Geometrie non commutative (Inter-Editions), Paris, 1990.
    [11] J. Dixmier, Existences de traces non normales, C. R. Acad. Sci. Paris, 262 (1966). doi: 10.1515/crll.1998.103
    [12] K. J. Dykema, N. J. Kalton, Spectral characterization of sums of commutators Ⅱ, J. Reine Angew. Math., 504 (1998), 127–137. https://doi.org/10.1515/crll.1998.103 doi: 10.1515/crll.1998.103
    [13] I. Gohberg, S. Goldberg, N. Krupnik, Traces and determinants of linear operators, Operator Theory: Advances and Applications, Birkhauser Verlag, Basel, 116 (2000).
    [14] I. Gohberg, S. Goldberg, M. Kaashoek, Basic classes of linear operators, Birkhauser, 2003.
    [15] D. Guido, T. Isola, On the domain of singular traces, J. Funct. Anal., 13 (2002), 667–674. https://doi.org/10.1142/s0129167x02001447 doi: 10.1142/s0129167x02001447
    [16] S. I. Kabanikhin, Inverse and Ⅲ-posed problem: Theory and applications, De Gruyter, 2012. https://doi.org/10.1515/9783110224016
    [17] N. J. Kalton, Unusual traces on operators ideals, Math. Nachr., 134 (1987), 119–130. https://doi.org/10.1002/mana.19871340108 doi: 10.1002/mana.19871340108
    [18] N. J. Kalton, Spectral characterization of sums of commutators I, J. Reine Angew. Math., 504 (1998), 115–125. https://doi.org/10.1515/crll.1998.102 doi: 10.1515/crll.1998.102
    [19] V. Lidskii, Conditions for completeness of a system of root subspaces for non-selfadjoint operators with discrete spectrum, Tr. Mosk. Mat. Obs., 8 (1959), 83–120. https://doi.org/10.1090/trans2/034/08 doi: 10.1090/trans2/034/08
    [20] S. Lord, F. Sukochev, D. Zanin, Singular traces, theory and applications, De Gruyter, 2012.
    [21] A. Pietsch, Traces and shift invariant functionals, Math. Nachr., 145 (1990), 7–43. https://doi.org/10.1002/mana.19901450102 doi: 10.1002/mana.19901450102
    [22] A. Sedaev, F. Sukochev, D. Zanin, Lidskii-type formulae for Dixmier traces, Integr. Equat. Oper. Th., 68 (2010), 551–572. https://doi.org/10.1007/s00020-010-1828-1 doi: 10.1007/s00020-010-1828-1
    [23] A. Sotelo-Pejerrey, Singular traces of an integral operator related to the Riemann hypothesis, Pro. Math., 32 (2022), 55–71. Available from: https://revistas.pucp.edu.pe/index.php/promatematica/article/wiew/25729.
    [24] F. Sukochev, D. Zanin, Which traces are spectral? Adv. Math., 252 (2014), 406–428. https://doi.org/10.1016/j.aim.2013.10.028 doi: 10.1016/j.aim.2013.10.028
    [25] J. V. Varga, Traces on irregular ideals, Proc. Amer. Math. Soc., 107 (1989), 715–723. https://doi.org/10.1090/s0002-9939-1989-0984818-8 doi: 10.1090/s0002-9939-1989-0984818-8
    [26] J. Von Neumann, Mathematische grundlagen der quantenmechanik, Grundlehren Math. Wiss. Einzeldarstellungen, Bd. XXXVIII, Springer-Verlag, Berlin, 1932.
    [27] A. C. Zaanen, Linear analysis, North Holland, Amsterdam, 1984.
  • This article has been cited by:

    1. Osama Moaaz, Ahmed E. Abouelregal, Multi-fractional-differential operators for a thermo-elastic magnetic response in an unbounded solid with a spherical hole via the DPL model, 2022, 8, 2473-6988, 5588, 10.3934/math.2023282
    2. Mohamed Karim Bouafoura, Naceur Benhadj Braiek, Suboptimal control synthesis for state and input delayed quadratic systems, 2022, 236, 0959-6518, 944, 10.1177/09596518211067476
  • Reader Comments
  • © 2023 the Author(s), licensee AIMS Press. This is an open access article distributed under the terms of the Creative Commons Attribution License (http://creativecommons.org/licenses/by/4.0)
通讯作者: 陈斌, bchen63@163.com
  • 1. 

    沈阳化工大学材料科学与工程学院 沈阳 110142

  1. 本站搜索
  2. 百度学术搜索
  3. 万方数据库搜索
  4. CNKI搜索

Metrics

Article views(1441) PDF downloads(60) Cited by(0)

Other Articles By Authors

/

DownLoad:  Full-Size Img  PowerPoint
Return
Return

Catalog