Fountains, histograms, and –identities q Peter Paule

advertisement
Discrete Mathematics and Theoretical Computer Science 6, 2003, 101–106
Fountains, histograms, and q–identities
Peter Paule1† and Helmut Prodinger2‡
1 Research
Institute for Symbolic Computation, Johannes Kepler University Linz, A-4040 Linz, Austria
e-mail: Peter.Paule@risc.uni-linz.ac.at
Url: http://www.risc.uni-linz.ac.at/research/combinat/
2
The John Knopfmacher Centre for Applicable Analysis and Number Theory, School of Mathematics, University of
the Witwatersrand, P. O. Wits, 2050 Johannesburg, South Africa
e-mail: helmut@maths.wits.ac.za
Url: http://www.wits.ac.za/helmut/
received Jan 14, 2003, accepted Aug 15, 2003.
We solve the recursion Sn = Sn−1 − qn Sn−p , both, explicitly, and in the limit for n → ∞, proving in this way a formula
due to Merlini and Sprugnoli. It is also discussed how computer algebra could be applied.
Keywords: q–identities, fountains, histograms, Schur polynomials
1
Fountains and histograms
Merlini and Sprugnoli [6] discuss fountains and histograms; for the reader’s convenience, we review a
few key issues here.
A fountain with n coins is an arrangement of n coins in rows such that each coin in a higher row touches
exactly two coins in the next lower row.
A p-histogram is a sequence of columns in which the height of the ( j + 1)st column is at most k + p, if
k is the height of column j; the first column has height r, with 1 ≤ r ≤ p.
It can be shown that the enumeration of coins in a fountain is equivalent with the enumeration of
1-histograms. The paper [6] addresses the enumeration of p-histograms with respect to area (=number of
[p]
cells). Let fn be the number p-histograms with area n and F [p] (q) the corresponding generating function
[p]
F [p] (q) = ∑n fn qn . The authors of [6] use two different approaches: one produces the answer in the form
F [p] (q) = lim
m→∞
Dm
,
Em
† Partially
‡ The
supported by SFB grant F1305 of the Austrian FWF.
research was started when this author visited the RISC in 2002. Partially supported by NRF grant 2053748.
c 2003 Discrete Mathematics and Theoretical Computer Science (DMTCS), Nancy, France
1365–8050 102
Peter Paule and Helmut Prodinger
with some polynomials Dm , Em defined in the next section, and the other gives it as
k+1
k
(−1)k q p( 2 )
(−1)k qk+p(2)
F (q) = ∑
.
∑
k
k
k≥0 (1 − q) . . . (1 − q )
k≥0 (1 − q) . . . (1 − q )
[p]
According to [5], it would be nice to have a direct argument that these two answers coincide. This is
the subject of the present note.
2
Generalized Schur polynomials
The polynomials mentioned in the introduction are for fixed p ≥ 1 defined as follows:
En = En−1 − qn En−p ,
n ≥ p,
E0 = · · · = E p−1 = 1,
Dn = Dn−1 − qn Dn−p ,
n ≥ p,
Di = 1 − ∑ q j , i = 0, . . . , p − 1.
i
j=1
They can be compared with the classical Schur polynomials [8], which occur for p = 2 and q = −1. Then
Merlini and Sprugnoli want a direct proof of the formulæ
E∞ := lim En =
n→∞
k+1
(−1)k q p( 2 )
,
∑
k
k≥0 (1 − q) . . . (1 − q )
k
(−1)k qk+p(2)
D∞ := lim Dn = ∑
.
k
n→∞
k≥0 (1 − q) . . . (1 − q )
We will not only achieve that but actually derive explicit expressions for these polynomials!
It should be mentioned that Cigler [4] developed independently a combinatorial method to deal with
recursions as ours, but also more general ones.
Let us study the generic recursion
Sn = Sn−1 + tqn−p Sn−p ,
with unspecified initial values S0 , . . . , S p−1 . For p = 2, these polynomials were studied by Andrews (and
others) in the context of Schur polynomials, see [2].
We will use standard notation from q–calculus, see [1]:
n
(q)n
(x)n = (1 − x)(1 − xq) . . . (1 − xqn−1 ),
=
.
(q)k (q)n−k
k
It will be convenient to define nk = 0 for n < 0 or k > n.
Now we will proceed as in [1] and consider noncommutative variables x, η, such that xη = qηx; all
other variables commute.
Lemma 1.
n n
n p(n)−pnk+p(k+1) k+p(n−k) n−k
p
2 x
q 2
x+x η = ∑
η .
k=0 k
Fountains, histograms, and q–identities
103
Proof. We write
n
x + xpη =
n
∑ an,k xk+p(n−k) ηn−k ,
k=0
n+1
n
n+1
n
and x + x p η
= x + x p η x + x p η resp. as x + x p η
= x + x p η x + x p η , compare coefficients, and get the recursions
an+1,k = an,k−1 + an,k qk+p(n−k) ,
an+1,k = an,k−1 qn+1−k + an,k q p(n−k) .
From this we derive, taking differences,
an,k =
1 − qn+1−k −p(n−k)
q
an,k−1 .
1 − qk
n
The result follows from iteration by noting that an,0 = q p(2) .
Of course we also have
n n
n p(n)−pnk+p(k+1) k+p(n−k) n−k n−k
2 x
t η .
x + tx p η = ∑
q 2
k=0 k
Now we derive the generating function for
F(x) =
∑ Sn xn ;
n≥0
the following procedure is inspired by [2]. Note that we can alternatively view η as an operator, defined
by η f (x) = f (qx). Cigler worked also much with this technique [3, 4]. We find
∑ Sn xn = ∑ Sn−1 xn + ∑ tqn−p Sn−p xn = x ∑
n≥p
n≥p
n≥p
or
F(x) −
n≥p−1
∑ Sn xn = xF(x) − x ∑
n<p
1
F(x) =
1 − x − tx p η
Now we can apply our lemma and write
n
p
F(x) = ∑ x + tx η
∑ Si x i −
i<p
n
∑ ηSn xn
n≥0
Sn xn + tx p ηF(x),
n<p−1
and
n≥0
Sn xn + tx p
∑
Si x
∑ Si x − ∑
i
i<p
i+1
Si x
i+1
.
i<p−1
i<p−1
n p(n)−pnk+p(k+1) k+p(n−k) n−k n−k
i
i+1
2
2
=∑∑
q
x
t η
∑ Si x − ∑ Si x
i<p
n≥0 k=0 k
i<p−1
n n p(n)−pnk+p(k+1) k+p(n−k) n−k
i(n−k) i
(i+1)(n−k) i+1
2
2
q
=∑∑
x
t
x
∑ Si q x − ∑ Si q
i<p
n≥0 k=0 k
i<p−1
104
Peter Paule and Helmut Prodinger
n
n p(k) n−k+pk k
2 x
q
t
∑∑ k
∑ Si qik xi − ∑ Si q(i+1)k xi+1
i<p
i<p−1
n≥0 k=0
n + k p(k) n+pk k
(i+1)k
i+1
ik
i
x
q 2 x
t ∑ Si q x − ∑ Si q
= ∑
k
i<p
i<p−1
k,n≥0
1
p(2k) pk k
(i+1)k i+1
ik i
= ∑q
x t
∑ Si q x − ∑ Si q x .
(x)k+1 i<p
i<p−1
k≥0
=
From this we find an explicit formula for Sn (the quantity S−1 has to be interpreted as 0):
Sn =
∑
n − (p − 1)k − i p(k)+ik k
q 2
t .
k
k≥0
(Si − Si−1 ) ∑
0≤i<p
Now we specialize this to our instance. Here, t = −q p , and thus
n − (p − 1)k − i p(k+1)+ik
Sn = ∑ (Si − Si−1 ) ∑
(−1)k .
q 2
k
0≤i<p
k≥0
Therefore
En =
n − (p − 1)k p(k+1)
q 2 (−1)k .
∑
k
k≥0
From this, the limit of En is immediate. For Dn we eventually get the following form
n − (p − 1)(k − 1) k+p(k)
2 (−1)k ,
Dn = ∑
q
k
k≥0
from which the formula for D∞ is immediate. To prove it, we need a simple lemma whose proof is just a
routine calculation.
Lemma 2.
m − i i(k+1)
m − i (i+1)(k+1)
q
= g(i) − g(i − 1)
where
g(i) = −
q
.
k
k+1
Now we can plug into the general formula above and compute
p−1
n − (p − 1)k − i p(k+1)+i(k+1)
Dn = En − ∑ ∑
q 2
(−1)k
k
i=1 k≥0
p−1 k+1
n − (p − 1)k − i i(k+1)
= En − ∑ (−1)k q p( 2 ) ∑
q
k
i=1
k≥0
k+1
n − (p − 1)k
n − (p − 1)(k + 1)
− q p(k+1)
= En − ∑ (−1)k q p( 2 ) qk+1
k+1
k+1
k≥0
k+1
n − (p − 1)k
= 1 − ∑ (−1)k q p( 2 ) qk+1
,
k+1
k≥0
which is the announced formula after a simple change of variable. Note that in the penultimate step the
telescoping property of the lemma has been used.
Fountains, histograms, and q–identities
3
105
Computer algebra proofs
The polynomial families (En ) and (Dn ) give rise to the following study with respect to possible computer
proofs. Let us take as input our sum representations of En and Dn :
n − (p − 1)k p(k+1)
q 2 (−1)k ,
∑
k
k≥0
n − (p − 1)(k − 1) k+p(k)
2 (−1)k .
Dn = ∑
q
k
k≥0
En =
(3.1)
Then, if p is chosen as a specific positive integer, Riese’s package qZeil [7] returns the recurrences Sn =
Sn−1 − qn Sn−p (n ≥ p) together with a certificate function Cert for independent verification. Despite the
fact that for general “generic” integer parameter p there is no algorithm available, a general pattern can
be easily guessed from running the algorithm for p = 1, p = 2, and p = 3, say.
For example, let F(n, k) be the kth summand in our sum representation (3.1) of En , then the recurrence
for En can be refined to the following statement.
Theorem 3.1. For n ≥ p and δk f (n, k) = f (n, k) − f (n, k − 1), we have
F(n, k) − F(n − 1, k) + qn F(n − p, k) = δk Cert(n, k)F(n, k),
(3.2)
where
Cert(n, k) = qn
(qn−p(k+1)+1 ) p
.
(qn−(p−1)(k+1) ) p
Proof. After dividing both sides of (3.2) by F(n, k) the proof reduces to checking equality of rational
functions. Namely, note that
1 − qn−pk
F(n − 1, k)
=
,
F(n, k)
1 − qn−(p−1)k
(qn−pk+1 ) p
F(n, k − 1)
q pk
=−
,
F(n, k)
1 − qk (qn−(p−1)k+1 ) p−1
and
F(n − p, k)
= q−n Cert(n, k).
F(n, k)
Analogously, there is a refined version of the recurrence for Dn . The certificate in this case is
Cert(n, k) = qn
(qn−pk ) p
.
(qn−(p−1)k ) p
Summarizing, with the sum representation for En and Dn in hand, the corresponding recurrences follow
immediately by summing both sides of the computer recurrences (3.2) over all k ≥ 0.
106
Peter Paule and Helmut Prodinger
References
[1] G. E. Andrews, R. Askey, and R. Roy, Special functions, Encyclopedia of Mathematics and its Applications, vol. 71, Cambridge University Press, 1999.
[2] G. E. Andrews, Fibonacci numbers and Rogers–Ramanujan identities, The Fibonacci Quarterly, to
appear (2003), 15 pp.
[3] J. Cigler, Elementare q–Identitäten, Séminaire Lotharingien de Combinatoire B05a (1981), 29 pp.
[4] J. Cigler, Some algebraic aspects of Morse code sequences, Discrete Mathematics and Theoretical
Computer Science 6 (2003), 55–68.
[5] D. Merlini, Private communication, (2002).
[6] D. Merlini and R. Sprugnoli, Fountains and histograms, J. Algorithms 44 (2002), no. 1, 159–176.
[7] P. Paule and A. Riese, A Mathematica q–analogue of Zeilberger’s algorithm based on an algebraically
motivated approach to q–hypergeometric telescoping, Special functions, q–series and related topics (Toronto, ON, 1995), Fields Inst. Commun., vol. 14, Amer. Math. Soc., Providence, RI, 1997,
pp. 179–210.
[8] I. Schur, Ein Beitrag zur additiven Zahlentheorie und zur Theorie der Kettenbrüche, S.-B. Preuss.
Akad. Wiss. Phys.-Math. Kl., 1917, 302–321, reprinted in I. Schur, Gesammelte Abhandlungen, vol.
2, pp. 117–136, Springer, 1973.
Download