Processing math: 100%
Research article

Numerical computations for Operator axioms

  • Received: 24 October 2020 Accepted: 27 January 2021 Published: 04 February 2021
  • MSC : 11Y16, 65H05, 49M25, 11B85, 03D05

  • The Operator axioms have produced new real numbers with new operators. New operators naturally produce new equations and thus extend the traditional mathematical models which are selected to describe various scientific rules. So new operators help to describe complex scientific rules which are difficult described by traditional equations and have an enormous application potential. As to the equations including new operators, engineering computation often need the approximate solutions reflecting an intuitive order relation and equivalence relation. However, the order relation and equivalence relation of real numbers are not as intuitive as those of base-b expansions. Thus, this paper introduces numerical computations to approximate all real numbers with base-b expansions.

    Citation: Pith Peishu Xie. Numerical computations for Operator axioms[J]. AIMS Mathematics, 2021, 6(4): 4011-4024. doi: 10.3934/math.2021238

    Related Papers:

    [1] Tareq M. Al-shami, Zanyar A. Ameen, A. A. Azzam, Mohammed E. El-Shafei . Soft separation axioms via soft topological operators. AIMS Mathematics, 2022, 7(8): 15107-15119. doi: 10.3934/math.2022828
    [2] Mohammad H. M. Rashid, Feras Bani-Ahmad . An estimate for the numerical radius of the Hilbert space operators and a numerical radius inequality. AIMS Mathematics, 2023, 8(11): 26384-26405. doi: 10.3934/math.20231347
    [3] Mustafa Ekici . On an axiomatization of the grey Banzhaf value. AIMS Mathematics, 2023, 8(12): 30405-30418. doi: 10.3934/math.20231552
    [4] Younes Talaei, Sanda Micula, Hasan Hosseinzadeh, Samad Noeiaghdam . A novel algorithm to solve nonlinear fractional quadratic integral equations. AIMS Mathematics, 2022, 7(7): 13237-13257. doi: 10.3934/math.2022730
    [5] Thabet Abdeljawad, Kifayat Ullah, Junaid Ahmad, Muhammad Arshad, Zhenhua Ma . On the convergence of an iterative process for enriched Suzuki nonexpansive mappings in Banach spaces. AIMS Mathematics, 2022, 7(11): 20247-20258. doi: 10.3934/math.20221108
    [6] Amit K. Pandey, Manoj P. Tripathi, Harendra Singh, Pentyala S. Rao, Devendra Kumar, D. Baleanu . An efficient algorithm for the numerical evaluation of pseudo differential operator with error estimation. AIMS Mathematics, 2022, 7(10): 17829-17842. doi: 10.3934/math.2022982
    [7] Jagdev Singh, Jitendra Kumar, Devendra kumar, Dumitru Baleanu . A reliable numerical algorithm based on an operational matrix method for treatment of a fractional order computer virus model. AIMS Mathematics, 2024, 9(2): 3195-3210. doi: 10.3934/math.2024155
    [8] Yonghong Duan, Ruiping Wen . An alternating direction power-method for computing the largest singular value and singular vectors of a matrix. AIMS Mathematics, 2023, 8(1): 1127-1138. doi: 10.3934/math.2023056
    [9] Najla Altwaijry, Cristian Conde, Silvestru Sever Dragomir, Kais Feki . Further norm and numerical radii inequalities for operators involving a positive operator. AIMS Mathematics, 2025, 10(2): 2684-2696. doi: 10.3934/math.2025126
    [10] Mesfer H. Alqahtani, Alaa M. Abd El-latif . Separation axioms via novel operators in the frame of topological spaces and applications. AIMS Mathematics, 2024, 9(6): 14213-14227. doi: 10.3934/math.2024690
  • The Operator axioms have produced new real numbers with new operators. New operators naturally produce new equations and thus extend the traditional mathematical models which are selected to describe various scientific rules. So new operators help to describe complex scientific rules which are difficult described by traditional equations and have an enormous application potential. As to the equations including new operators, engineering computation often need the approximate solutions reflecting an intuitive order relation and equivalence relation. However, the order relation and equivalence relation of real numbers are not as intuitive as those of base-b expansions. Thus, this paper introduces numerical computations to approximate all real numbers with base-b expansions.



    In [1], we distinguished the limit from the infinite sequence. In [2], we defined the Operator axioms to extend the traditional real number system. In [3], we promoted the research in the following areas:

    1. We improved on the Operator axioms.

    2. We defined the VE function and EV function. For clarity, we rename VE Function [3] to Prefix Function. For clarity, we rename EV Function [3] to Suffix Function.

    3. We proved two theorems about the Prefix function and Suffix function.

    The Operator axioms forms a new arithmetic axiom. The [3,Definition 2.2] defines real number system on the basis of the logical calculus {Φ,Ψ}. The [2,TABLE 2] defines new operators according to the definition of number systems. Real operators naturally produce new equations such as y=[x++++[1+1]], y=[[1+1]x], y=[x////[1+1]] and so on. In other words, real operators extend the traditional mathematical models which are selected to describe various scientific rules. Operator axioms have included infinite operators, so no other operator can be added to them. This means the Operator axioms is a complete real number system. In fact, infinite operators imply the completeness.

    Thus, real operators exhibit potential value as follows:

    1. Real operators can give new equations and inequalities so as to precisely describe the relation of mathematical objects.

    2. Real operators can give new equations and inequalities so as to precisely describe the relation of scientific objects.

    So real operators help to describe complex scientific rules which are difficult described by traditional equations and have an enormous application potential.

    As to the equations including real operators, engineering computation often need the approximate solutions reflecting an intuitive order relation and equivalence relation. Although the order relation and equivalence relation of real numbers are consistent, they are not as intuitive as those of base-b expansions. In practice, it is quicker to determine the order relation and equivalence relation of base-b expansions. So we introduce numerical computations to approximate real numbers with base-b expansions.

    The numerical computations we proposed are not the best methods to approximate real numbers with base-b expansions, but the simple methods to approximate real numbers with base-b expansions. The compution complexity of the numerical computations we proposed could be promoted furtherly. However, we first prove that the Operator axioms can run on any modern computer. The numerical computation we proposed blends mathematics and computer science. Modern science depends on both the mathematics and the computer science. Arithmetic is the core of both the mathematics and the science. As a senior arithmetic, the Operator axioms will promote both the mathematics and the science in the future.

    Theorem 1.1. Any positive number ξ may be expressed as a limit of an infinite base-b expansion sequence

    limnA1A2As+1. a1a2a3an, (1.1)

    where 0A1<b,0A2<b,,0an<b, not all A and a are 0, and an infinity of the an are less than (b-1). If ξ1, then A10.

    Proof. Let [ξ] be the integral part of ξ. Then we write

    ξ=[ξ]+x=X+x, (1.2)

    where X is an integer and 0x<1, and consider X and x separately.

    If X>0 and bsx<bs+1, and A1 and X1 are the quotient and remainder when X is divided by bs, then X=A1bs+X1, where 0<A1=[bsX]<b, 0X1<bs.

    Similarly

    X1=A2bs1+X2(0A2<b,0X2<bs1),X2=A3bs2+X3(0A3<b,0X3<bs2),Xs1=Asb+Xs(0As<b,0Xs<b),Xs=As+1(0As+1<b).

    Thus X may be expressed uniquely in the form

    X=A1bs+A2bs1++Asb+As+1, (1.3)

    where every A is one of 0, 1, , (b-1), and A1 is not 0. We abbreviate this expression to

    X=A1A2AsAs+1, (1.4)

    the ordinary representation of X in base-b expansion notation.

    Passing to x, we write

    X=f1(0f1<1).

    We suppose that a1=[bf1], so that

    a1bf1<a1+1b;

    a1 is one of 0, 1, , (b-1), and

    a1=[bf1],bf1=a1+f2(0f2<1).

    Similarly, we define a2,a3, by

    a2=[bf2],bf2=a2+f3(0f3<1),a3=[bf3],bf3=a3+f4(0f4<1),

    Every an is one of 0, 1, , (b-1). Thus

    x=xn+gn+1, (1.5)

    where

    xn=a1b+a2b2++anbn, (1.6)
    0gn+1=fn+1bn<1bn. (1.7)

    We thus define a base-b expansion .a1a2a3an associated with x. We call a1,a2, the first, second, digits of the base-b expansion.

    Since an<b, the series

    1anbn (1.8)

    is convergent; and since gn+10, its sum is x. We may therefore write

    x=. a1a2a3, (1.9)

    the right-hand side being an abbreviation for the series (1.8).

    We now combine (1.2), (1.4), and (1.9) in the form

    ξ=X+x=A1A2AsAs+1. a1a2a3; (1.10)

    and the claim follows.

    Theorem 1.1 implies that every real number has base-b expansions arbitrary close to it. So in numerical computations for the Operator axioms, all operands and outputs are denoted by base-b expansions to intuitively show the order relation and equivalence relation.

    The paper is organized as follows. In Section 2, we define the operation order for all operations in the Operator axioms. In Section 3, we construct the numerical computations for binary operations. In Section 4, we define some concepts in the Operator axioms.

    In the Operator axioms, the number '1' is the only base-b expansion while the others derive from the operation of two numbers and one operator. For example, the number "[[1+[1+1]][1+1]]" derives from the operation of the number "[1+[1+1]]", the number "[1+1]" and the real operator "".

    Definition 2.1. Numerical computation is a conversion from an operation to an approximate base-b expansion.

    In general, an operation includes many binary operators. For example, the operation "[[1+[1+1]][1+1]]" includes three "+" and one "". Since each operator produces a binary operation, n operator in an operation will produce n binary operations. It is better to compute all binary operations in an operation in order. The order is denoted as Operation Order.

    [4,§5.3.1] stores tradition operations as an expression tree and then applies traversal algorithm to evaluate the expression tree. Likewise, each operation of the Operator axioms can be stored as an expression tree in which each number '1' become a leaf node and each operator become an internal node. Then Operation Order is just the traversal order of the expression tree. In this paper, we choose inorder traversal as Operation Order. Figure 1 illustrates an expression tree for the number "[[1+[1+1]][1+1]]".

    Figure 1.  An expression tree for the number "[[1+[1+1]][1+1]]".

    It is supposed that the numerical computation applies base-10 expansions. Then the numerical computation for "[[1+[1+1]][1+1]]" will proceed with the following Operation Order:

    [[1+[1+1]][1+1]]=[[1+2][1+1]]=[3[1+1]]=[32]

    In summary, every operation in the Operator axioms can divide into many binary operations by Operation Order. So numerical computations focus on the binary operations.

    In [3], Operator axioms have expressed the real number system. In this section, "real number" refer to the real number deduced from Operator axioms [3].

    According to the complexity of numerical computations, we divide binary operations into low operations, middle operations and high operations. Table 1 lists their elements in detail.

    Table 1.  Division of binary operations.
    Low operations Middle operations High operations
    Operators +,++,,,/,// +++,,/// ++++,+++++,,
    ,,,
    ////,/////,

     | Show Table
    DownLoad: CSV

    In the Operator axioms, / is equal to while // is equal to . From a traditional viewpoint, the low operations "+,++,," are equal to basic arithmetic operations "+,×,,÷". So numerical computations for low operations have been constructed in elementary arithmetic.

    From a traditional viewpoint, +++ is an exponentiation operation, is a root-extraction operation and /// is a logarithm operation. In this subsection, we import the numerical computations for the middle operations "+++,,///" in [5,§23].

    Let e be Euler's number. It is supposed that a(,+) is a base-b expansion, nZ and kN. The numerical computation for [e+++a] can be constructed with the Taylor-series expansion as follows.

    [e+++a]=[limk+(kn=0[[a+++n][n!]])][1+[a[1!]]+[[a+++2][2!]]+[[a+++3][3!]]++[[a+++n][n!]]+]

    It is supposed that a(0,+) is a base-b expansion and nZ. Let b=[[a1][a+1]], then the numerical computation for [a///e] can be constructed with the Taylor-series expansion as follows.

    [a///e]=[[[1+b][1b]]///e]=[2++[limk+(kn=0[[b+++[2n+1]][2n+1]])]][2++[b+[[b+++3]3]+[[b+++5]5]++[[b+++[2n+1]][2n+1]]+]]

    It is supposed that a and b are two base-b expansions, where a(0,+) and b(,+). Then the numerical computation for [a+++b] can be divided and conquered with the identity [a+++b]=[e+++[b++[a///e]]].

    It is supposed that [a+++b] is a real number, where a(,0] and b(,+) are two base-b expansions. Then the numerical computation for [a+++b] can always be equated with the basic numerical computations as above and the basic arithmetic operations in the axioms (OA.1)(OA.75).

    It is supposed that the constants n,a1,a2,b1,b2,c1,c2,mN.

    Zero can be equated with a fraction [[11]1]. Any non-zero base-b expansion can be equated with a fraction [[11]±[a1a2]] for a1,a2N.

    It is supposed that the constant dR with [11]<d. It is supposed that the constant eR with 1<e. For clarity, we rename VE Function [3] to Prefix Function. For clarity, we rename EV Function [3] to Suffix Function.

    Definition 3.1. [3,Definition 3.1] Prefix Function is the function f:[1,+)R defined by f(x)=[x+++˙ed].

    Definition 3.2. [3,Definition 3.2] Suffix Function is the function f:RR defined by f(x)=[e+++˙ex].

    Definition 3.3. [3,Definition 3.3] Fundamental operator functions are Prefix Function and Suffix Function.

    Theorem 3.4. [3,Theorem 3.4] The Prefix Function f(x)=[x+++˙ed] is continuous, unbounded and strictly increasing.

    Theorem 3.5. [3,Theorem 3.5] The Suffix Function f(x)=[e+++˙ex] is continuous, unbounded and strictly increasing.

    It is supposed that the constant t,u,vR.

    Definition 3.6. Root Equations are the equations such as f(x)=t such that:

    1. The function f(x) is real and continuous on any closed interval [u,v] in the domain;

    2. The equation f(x)=t has only one root on the above interval [u,v];

    [6,TABLE PT2.3] lists common root-finding methods and their convergence conditions. When a acts as the lower guess and b acts as the upper guess, both the bisection method [6,§5.2] and Brent's method [6,§6.4] always converge and find the only root on [u,v]. But Brent's method converges faster than the bisection method and thus acts as the main root-finding method for Root Equations.

    In the following, we construct all numerical computations for high operations by induction. It is supposed that the constant p1R with 1p1. It is supposed that the constant p2R. It is supposed that the constant q1R with 1q1. It is supposed that the constant q2R with [11]q2. It is supposed that the constant r1R with [11]<r1. It is supposed that the constant r2R with 1<r2. In the following, we approximate these constants with those fractions such as [a1a2].

    1. The numerical computations for the operations [p1++++p2], [q1q2], [r1////r2] are constructed.

    (a) A numerical computation for [[a1a2]++++[b1b2]] with 1[a1a2] and [11][b1b2] can be constructed.

    i. [b1b2]1.

    (A1)(ˉc=[[[a1a2]1]++[1+[1+1]]])(ˉd=[[[a1a2]1]++[1+1]])(ˉe=[[b1b2]+++[1+1]])(ˉf=[[b1b2]+++[1+[1+1]]])([[a1a2]++++[b1b2]]=[[1+[ˉc++[ˉe+++1]]][ˉd++[ˉf+++1]]])by (OA.83), (OA.28)(A2)(ˉc=[[[a1a2]1]++[1+[1+1]]])(ˉd=[[[a1a2]1]++[1+1]])(ˉe=[[b1b2]+++[1+1]])(ˉf=[[b1b2]+++[1+[1+1]]])([[a1a2]++++[b1b2]]=[[1+[ˉc++ˉe]][ˉd++ˉf]])by (OA.83), (OA.62)

    ii. 1<[b1b2].

    (B1)[[a1a2]++++[b1b2]]=[[a1a2]+++[[a1a2]++++[[b1b2]1]]]by (OA.82)(B2)It is supposed that [11][[b1b2]n] and [[b1b2]n]1. Let us distinguish these [a1a2] with the subscripts {(1),(2),(3),}.(B3)[[a1a2]++++[b1b2]]=[[a1a2](1)+++[[a1a2](2)+++[[a1a2]n+++[[a1a2]++++[[b1b2]n]]]]by (OA.82), (B2)(B4)(ˉc=[[[a1a2]1]++[1+[1+1]]])(ˉd=[[[a1a2]1]++[1+1]])(ˉe=[[[b1b2]n]+++[1+1]])(ˉf=[[[b1b2]n]+++[1+[1+1]]])([[a1a2]++++[[b1b2]n]]=[[1+[ˉc++ˉe]][ˉd++ˉf]])by (B2), (A2)(B5)(ˉc=[[[a1a2]1]++[1+[1+1]]])(ˉd=[[[a1a2]1]++[1+1]])(ˉe=[[[b1b2]n]+++[1+1]])(ˉf=[[[b1b2]n]+++[1+[1+1]]])([[a1a2]++++[b1b2]]=[[a1a2](1)+++[[a1a2](2)+++[[a1a2]n+++[[1+[ˉc++ˉe]][ˉd++ˉf]]]])by (B3), (B4)

    Then (A1)(A2) and (B1)(B4) have reduced one ++++ operation to many +++ operations. Since §3.3 has constructed the numerical computation for [[a1a2]++++[b1b2]], (A1)(A2) and (B1)(B4) can achieve a numerical computation for [[a1a2]++++[b1b2]].

    (b) A numerical computation for [[a1a2][b1b2]] with 1[a1a2] and [11]<[b1b2] can be constructed.

    The numerical computation for [[a1a2][b1b2]] is equated with the numerical root finding of the equation x=[[a1a2][b1b2]].

    (A1)x=[[a1a2][b1b2]](A2)[x++++[b1b2]]=[[[a1a2][b1b2]]++++[b1b2]]by (OA.108)(A3)[x++++[b1b2]]=[a1a2]by (OA.79), (OA.24), (OA.25)

    According to (OA.37)(OA.40), the function f(x)=[x++++[b1b2]] is defined on the domain [1,+). Theorem 3.4 implies that we can iteratively increase v by step 1 from v=1 until [a1a2]<[v++++[b1b2]] holds.

    Theorem 3.4 implies that f(x)=[x++++[b1b2]] is continuous on the domain [1,v]. (OA.75) derives that [1++++[b1b2]]=1. So (OA.95) derives that [1++++[b1b2]][a1a2]. In summary, both [1++++[b1b2]][a1a2] and [a1a2]<[v++++[b1b2]] hold.

    Then Intermediate Value Theorem derives that the equation [x++++[b1b2]]=[a1a2] has only one root on the domain [1,v]. Since Theorem 3.4 implies that the equation [x++++[b1b2]]=[a1a2] has no root on the domain (v,+), the equation [x++++[b1b2]]=[a1a2] has only one root on the domain [[11],+). Since the equation [x++++[b1b2]]=[a1a2] belongs to Root Equations, Brent's method can find the only root of the equation and constructs the numerical computation for [[a1a2][b1b2]].

    (c) A numerical computation for [[a1a2]////[b1b2]] with 1[a1a2] and with 1<[b1b2] can be constructed.

    The numerical computation for [[a1a2]////[b1b2]] is equated with the numerical root finding of the equation x=[[a1a2]////[b1b2]].

    (A1)x=[[a1a2]////[b1b2]](A2)[11]<[[a1a2]////[b1b2]]by (OA.33)(A3)1<[[b1b2]++++[[a1a2]////[b1b2]]]by (OA.37), (OA.72)(A4)([[b1b2]++++[[a1a2]////[b1b2]]])by (OA.90)(A5)[[b1b2]++++x]=[[b1b2]++++[[a1a2]////[b1b2]]]by (OA.105)(A6)[[b1b2]++++x]=[a1a2]by (OA.80), (OA.104)

    According to (OA.37)(OA.40) and (OA.73), the function f(x)=[[b1b2]++++x] is defined on the domain (,+). Theorem 3.5 implies that we can iteratively decrease u by step 1 from u=1 until [[b1b2]++++u]<[a1a2] holds. Theorem 3.5 also implies that we can iteratively increase v by step 1 from v=1 until [a1a2]<[[b1b2]++++v] holds.

    Theorem 3.5 implies that f(x)=[[b1b2]++++x] is continuous on the domain (,+). In summary, both [[b1b2]++++u]<[a1a2] and [a1a2]<[[b1b2]++++v] hold.

    Then Intermediate Value Theorem derives that the equation [[b1b2]++++x]=[a1a2] has only one root on the domain [u,v]. Since Theorem 3.5 implies that the equation [[b1b2]++++x]=[a1a2] has no root on the domains (,u) and (v,+), the equation [[b1b2]++++x]=[a1a2] has only one root on the domain [u,v]. Since the equation [[b1b2]++++x]=[a1a2] belongs to Root Equations, Brent's method can find the only root of the equation and constructs the numerical computation for [[a1a2]////[b1b2]].

    2. If the numerical computations for [p1+++˙ep2], [q1˙fq2], [r1///˙gr2] have been constructed, then the numerical computations for [p1++++˙ep2], [q1˙fq2], [r1////˙gr2] can also be constructed.

    According to (OA.19), the symbol 'e' represents some successive '+'—"++". According to (OA.20), the symbol 'f' represents some successive ''—"". According to (OA.21), the symbol 'g' represents some successive '/'—"//".

    (a) A numerical computation for [[a1a2]++++˙e[b1b2]] with 1[a1a2] and [11][b1b2] can be constructed.

    i. [b1b2]1.

    (A1)(ˉc=[[[a1a2]1]++[1+[1+1]]])(ˉd=[[[a1a2]1]++[1+1]])(ˉe=[[b1b2]+++[1+1]])(ˉf=[[b1b2]+++[1+[1+1]]])([[a1a2]++++˙h[b1b2]]=[[1+[ˉc++[ˉe+++[1+˙k]]]][ˉd++[ˉf+++[1+˙k]]]])by (OA.83), (OA.29)

    ii. 1<[b1b2].

    (B1)[[a1a2]++++˙e[b1b2]]=[[a1a2]+++˙e[[a1a2]++++˙e[[b1b2]1]]]by (OA.82)(B2)It is supposed that [11][[b1b2]n] and [[b1b2]n]1. Let us distinguish these [a1a2] with the subscripts {(1),(2),(3),}.(B3)[[a1a2]++++˙e[b1b2]]=[[a1a2](1)+++˙e[[a1a2](2)+++˙e[[a1a2]n+++˙e[[a1a2]++++˙e[[b1b2]n]]]]by (OA.82), (B2)(B4)(ˉc=[[[a1a2]1]++[1+[1+1]]])(ˉd=[[[a1a2]1]++[1+1]])(ˉe=[[[b1b2]n]+++[1+1]])(ˉf=[[[b1b2]n]+++[1+[1+1]]])([[a1a2]++++˙e[[b1b2]n]]=[[1+[ˉc++ˉe]][ˉd++ˉf]])by (B3), (A1)(B5)(ˉc=[[[a1a2]1]++[1+[1+1]]])(ˉd=[[[a1a2]1]++[1+1]])(ˉe=[[[b1b2]n]+++[1+1]])(ˉf=[[[b1b2]n]+++[1+[1+1]]])([[a1a2]++++˙e[b1b2]]=[[a1a2](1)+++˙e[[a1a2](2)+++˙e[[a1a2]n+++˙e[[1+[ˉc++ˉe]][ˉd++ˉf]]]])by (B3), (B4)

    Then (A1) and (B1)(B5) have reduced one ++++˙e operation to many +++˙e operations. Since the numerical computation for [[a1a2]+++˙e[b1b2]] has been supposed to be constructed, (A1) and (B1)(B5) can achieve a numerical computation for [[a1a2]++++˙e[b1b2]].

    (b) A numerical computation for [[a1a2]˙f[b1b2]] with 1[a1a2] and [11]<[b1b2] can be constructed.

    The numerical computation for [[a1a2]˙f[b1b2]] is equated with the numerical root finding of the equation x=[[a1a2]˙f[b1b2]].

    (A1)x=[[a1a2]˙f[b1b2]](A2)[x++++˙e[b1b2]]=[[[a1a2]i[b1b2]]++++h[b1b2]]by (OA.105)(A3)[x++++˙e[b1b2]]=[a1a2]by (OA.78), (OA.24), (OA.25)

    According to (OA.37)(OA.40), the function f(x)=[x++++˙e[b1b2]] is defined on the domain [1,+). Theorem 3.4 implies that we can iteratively increase v by step 1 from v=1 until [a1a2]<[v++++˙e[b1b2]] holds.

    Theorem 3.4 implies that f(x)=[x++++˙e[b1b2]] is continuous on the domain [1,v]. (OA.75) derives that [1++++˙e[b1b2]]=1. So (OA.95) derives that [1++++˙e[b1b2]][a1a2]. In summary, both [1++++˙e[b1b2]][a1a2] and [a1a2]<[v++++˙e[b1b2]] hold.

    Then Intermediate Value Theorem derives that the equation [x++++˙e[b1b2]]=[a1a2] has only one root on the domain [1,v]. Since Theorem 3.4 implies that the equation [x++++˙e[b1b2]]=[a1a2] has no root on the domain (v,+), the equation [x++++˙e[b1b2]]=[a1a2] has only one root on the domain [[11],+). Since the equation [x++++˙e[b1b2]]=[a1a2] belongs to Root Equations, Brent's method can find the only root of the equation and constructs the numerical computation for [[a1a2]˙f[b1b2]].

    (c) A numerical computation for [[a1a2]////˙g[b1b2]] with 1[a1a2] and with 1<[b1b2] can be constructed.

    The numerical computation for [[a1a2]////˙g[b1b2]] is equated with the numerical root finding of the equation x=[[a1a2]////˙g[b1b2]].

    (A1)x=[[a1a2]////˙g[b1b2]](A2)[11]<[[a1a2]////˙g[b1b2]]by (OA.33)(A3)1<[[b1b2]++++h[[a1a2]////j[b1b2]]]by (OA.37), (OA.72)(A4)([[b1b2]++++h[[a1a2]////j[b1b2]]])by (OA.90)(A5)[[b1b2]++++˙ex]=[[b1b2]++++h[[a1a2]////j[b1b2]]]by (OA.105)(A6)[[b1b2]++++˙ex]=[a1a2]by (OA.80), (OA.104)

    According to (OA.37)(OA.40) and (OA.73), the function f(x)=[[b1b2]++++˙ex] is defined on the domain (,+). Theorem 3.5 implies that we can iteratively decrease u by step 1 from u=1 until [[b1b2]++++˙eu]<[a1a2] holds. Theorem 3.5 also implies that we can iteratively increase v by step 1 from v=1 until [a1a2]<[[b1b2]++++˙ev] holds.

    Theorem 3.5 implies that f(x)=[[b1b2]++++˙ex] is continuous on the domain (,+). In summary, both [[b1b2]++++˙eu]<[a1a2] and [a1a2]<[[b1b2]++++˙ev] hold.

    Then Intermediate Value Theorem derives that the equation [[b1b2]++++˙ex]=[a1a2] has only one root on the domain [u,v]. Since Theorem 3.5 implies that the equation [[b1b2]++++˙ex]=[a1a2] has no root on the domains (,u) and (v,+), the equation [[b1b2]++++˙ex]=[a1a2] has only one root on the domain [u,v]. Since the equation [[b1b2]++++˙ex]=[a1a2] belongs to Root Equations, Brent's method can find the only root of the equation and constructs the numerical computation for [[a1a2]////˙g[b1b2]].

    3. By induction, the numerical computations for [p1+++++p2], [p1++++++p2], [p1+++++++p2], , [q1q2], [q1q2], [q1q2], , [r1/////r2], [r1//////r2], [r1///////r2], can all be constructed.

    We define some replacements for the notations of the Operator axioms, as is shown in Table 2.

    Table 2.  Replacements of notations.
    Replacement Notation in Operator axioms
    + ˙e
    ˙f
    / ˙j
    +1 +
    +2 ++
    +3 +++
    +n +++n
    1
    2
    3
    n n
    /1 /
    /2 //
    /3 ///
    /n ///n

     | Show Table
    DownLoad: CSV

    The notation + can be replaced by any element of the set {+,++,+++,++++,}. The notation can be replaced by any element of the set {,,,,}. The notation / can be replaced by any element of the set {/,//,///,////,}.

    We define the pronunciations for some expressions in the Operator axioms, as is shown in Table 3.

    Table 3.  Pronunciations for some expressions.
    Expression Pronunciation
    + addote
    subote
    / logote
    a+nb a addote n to b
    anb a subote n to b
    a/nb a logote n to b

     | Show Table
    DownLoad: CSV

    We divide the real operators into an ordered level with the natural numbers. Table 4 lists the levels of the real operators in detail.

    Table 4.  Level of operators.
    Level Operators
    1 +1,1,/1
    2 +2,2,/2
    3 +3,3,/3
    n +n,n,/n

     | Show Table
    DownLoad: CSV

    The order of real operators is listed as follows:

    level-1 < level-2 < level-3 < < level-n

    We define the operations of real operators as follows.

    Definition 4.1. Complete Operations are all the binary operations of real operators.

    According to the Definition 4.1, all operations such as a+nb, anb, a/nb compose the complete operations.

    The author declares no conflict of interest.



    [1] P. Xie, A logical calculus to intuitively and logically denote number systems, Prog. Appl. Math., 1 (2011), 43-70.
    [2] P. Xie, Number systems based on logical calculus, Int. Math. Forum, 8 (2013), 1663-1689. doi: 10.12988/imf.2013.39167
    [3] P. Xie, Improvement on operator axioms and fundamental operator functions, Int. J. Math. Appl., 5 (2017), 125-151.
    [4] C. A. Shaffer, Data structures and algorithm analysis in C++, Third Edition, Dover Publications, 2011.
    [5] B. Parhami, Computer arithmetic: algorithms and Hardware designs, Oxford University Press, 2000.
    [6] S. C. Chapra, R. P. Canale, Numerical methods for engineers, Sixth Edition, McGraw-Hill Companies, Inc., 2009.
  • Reader Comments
  • © 2021 the Author(s), licensee AIMS Press. This is an open access article distributed under the terms of the Creative Commons Attribution License (http://creativecommons.org/licenses/by/4.0)
通讯作者: 陈斌, bchen63@163.com
  • 1. 

    沈阳化工大学材料科学与工程学院 沈阳 110142

  1. 本站搜索
  2. 百度学术搜索
  3. 万方数据库搜索
  4. CNKI搜索

Metrics

Article views(2279) PDF downloads(69) Cited by(0)

Figures and Tables

Figures(1)  /  Tables(4)

Other Articles By Authors

/

DownLoad:  Full-Size Img  PowerPoint
Return
Return

Catalog