Integr. equ. oper. theory 64 (2009), 1–20 c 2009 Birkh¨
auser Verlag Basel/Switzerland 0378-620X/010001-20, published online April 24, 2009 DOI 10.1007/s00020-009-1675-0
Integral Equations and Operator Theory
Admissibility and Observability of Observation Operators for Semilinear Problems Mahmoud Baroun and Birgit Jacob Abstract. This paper deals with semilinear evolution equations with unbounded observation operators. Sufficient conditions are given guaranteeing that the output function of a semilinear system is in L2loc ([0, ∞); Y ). We prove that the Lebesgue extension of the observation operators are invariant under nonlinear globally Lipschitz continuous perturbations. Further, relations between the corresponding Λ-extensions are studied. We show that exact observability of linear autonomous system is conserved under small Lipschitz perturbations. The obtained results are illustrated by several examples. Mathematics Subject Classification (2000). Primary 47H20; Secondary 93C73, 93B07, 93C25. Keywords. Admissible observation operators, exact observability, Lebesgue extension, nonlinear semigroup, semilinear problems.
1. Introduction In this work we consider the following abstract semilinear evolution equation u0 (t) = Au(t) + F (u(t)),
u(0) = x,
t ≥ 0,
x ∈ X,
(1.1)
equipped with the output equation y(t) = Cu(t),
(1.2)
where A is assumed to be the infinitesimal generator of a C0 -semigroup (T (t))t≥0 in a Banach space X and F is a nonlinear continuous function on X. Further, it is assumed that C, the observation operator, is a linear bounded operator from D(A), the domain of A, to another Banach space Y . It is well-known that global Lipschitz continuity of the nonlinearity F implies that the problem (1.1) admits a unique mild solution given by the variation of
2
Baroun and Jacob
IEOT
parameters formula Z
t
T (t − σ)F (u(σ, x))dσ, t ≥ 0, x ∈ X.
u(t, x) = T (t)x + 0
We define a nonlinear semigroup (S(t))t≥0 associated to the solution of (1.1) by S(t)x = u(t, x). Hence the output function is formally given by y(t) = CS(t)x. The output function is only well-defined if C is bounded, i.e. if the operator C can be extended to a linear bounded operator from X to Y . However, in case of unbounded observation operators, even if x ∈ D(A), it might happen that u(t, x) is not in D(A), so that Cu(t, x) is not defined. We call the operator C admissible for the nonlinear semigroup (S(t))t≥0 if the output function y is well-defined as locally square integrable function with values in Y . The problem of admissibility has been studied by many authors, e.g., [3, 4, 8, 18], but in their works they are interested in linear systems only. In this article we extend the definition of admissibility of the observation operator C for semilinear systems and we develop conditions guaranteeing that the set of admissible observation operators for the semilinear problem coincides with the set of admissible observation operators for the linearized system. In applications, it is often required that the system is exactly observable, that is, the initial state x ∈ X can be recovered from the output function y by a bounded operator. This problem is well studied for linear systems, see e.g. [9, 10, 14, 17, 21]. In this paper, we generalize the concept of exact observability to semilinear problems and we develop conditions guaranteeing that the semilinear system is exactly observable if and only if the linearized system has this property. Our paper is organized as follows. In Section 2 we describe, as a preliminary, the solutions of (1.1) by a semigroup of nonlinear operators and we summarize some properties of this semigroup. In Section 3 we introduce the definition of admissible observation operators C for semilinear systems and we develop conditions on the nonlinearity guaranteeing that the set of admissible observation operators for the semilinear problem coincides with the set of admissible observation operators for the linearized system. Some examples are given to illustrate our theoretical results. In Section 4, we study the invariance of the Lebesgue extension under globally Lipschitz continuous perturbations of the generator. We give also some relations between the Λ-extensions of such observation operators with respect to the original generator and the perturbed generator. Finally, in Section 5, we study the concept of exact observability for semilinear systems and we prove that the exact observability is not changed under small Lipschitz perturbations. We conclude Section 5 by means of an example: a semilinear wave equation with Neumann boundary observation.
Vol. 64 (2009)
Admissibility and Observability
3
2. Notations and preliminaries We begin by introducing some notions and preliminary tools. We denote by XA := (D(A), k · kA ) the Banach space D(A) endowed with the graph norm, i.e., kxkA := kxk + kAxk, for x ∈ D(A). The resolvent set of A is denoted by ρ(A) and its resolvent operator by R(λ, A) := (λ − A)−1 for λ ∈ ρ(A). Throughout this paper, we suppose that (H1) F : X → X is globally Lipschitz continuous, i.e, kF (x) − F (y)k ≤ Lkx − yk, for all x, y ∈ X, where L is a positive constant and F (0) = 0. Under the assumption (H1), equation (1.1) admits a unique mild solution u(·, x) given by the variation of parameters formula Z t T (t − σ)F (u(σ; x))dσ, t ≥ 0, (2.1) u(t; x) = T (t)x + 0
y(t) = Cu(t; x).
(2.2)
Let (S(t))t≥0 be the family of nonlinear operators defined in X by S(t)x = u(t; x), for t ≥ 0, x ∈ X.
(2.3)
The operators S(t) map X into itself and they satisfy the two properties below: (P1) S(0)x = x, S(t + s)x = S(t)S(s)x for s, t ≥ 0 and x ∈ X. (P2) For each x ∈ X, the X-valued function S(·)x is continuous over [0, +∞). The first property is obtained through the uniqueness of mild solutions, and the second property follows from the fact that the solution u(t; x) to (2.1) is continuous. By a nonlinear semigroup on X we mean a family (S(t))t≥0 of nonlinear operators on X with the above mentioned properties (P1) and (P2). If in particular a semigroup on X provides mild solutions of (1.1) in the sense of (2.3), we call it the nonlinear semigroup on X associated with the semilinear evolution equation (1.1) and we have Z t S(t)x = T (t)x + T (t − σ)F (S(σ)x)dσ, t ≥ 0, x ∈ X. (2.4) 0
Since (T (t))t≥0 is a C0 -semigroup, there exists the constants M ≥ 1, ω ∈ R, such that kT (t)k ≤ M eωt for all t ≥ 0. Moreover, we have the following property Proposition 2.1. For every x, y ∈ X and t ≥ 0, we have kS(t)xk ≤ M e(ω+M L)t kxk, (ω+M L)t
kS(t)x − S(t)yk ≤ M e
kx − yk.
(2.5) (2.6)
4
Baroun and Jacob
IEOT
Proof. Let x, y ∈ X. Since F is globally Lipschitz continuous, it follows that for t ≥ 0, Z t kS(t)x − S(t)yk ≤ kT (t)x − T (t)yk + kT (t − σ)[F (S(σ)x) − F (S(σ)y)]kdσ 0 Z t ≤ M eωt kx − yk + M Leω(t−σ) kS(σ)x − S(σ)ykdσ. 0
By Gronwall’s lemma, we obtain the assertion (2.6). Writing y = 0 in (2.6), we get the assertion (2.5). Corollary 2.2. If ω < −M L, then (T (t))t≥0 and (S(t))t≥0 are exponentially stable.
3. Admissibility We start this section with the definition of finite-time (resp. infinite-time) admissibility of output operators C for linear semigroups. Definition 3.1. Let C ∈ L(D(A), Y ). We say that C is a finite-time admissible observation operator for (T (t))t≥0 , if for every t0 > 0, there is some Kt0 > 0 such that Z t0 kCT (t)xk2Y dt ≤ Kt0 kxk2 , (3.1) 0
for any x ∈ D(A). Definition 3.2. Let C ∈ L(D(A), Y ). Then C is called an infinite-time admissible observation operator for (T (t))t≥0 , if there is some K > 0 such that Z ∞ kCT (t)xk2Y dt ≤ Kkxk2 , (3.2) 0
for any x ∈ D(A). Note that the admissibility of C guarantees that we can extend the mapping x 7→ CT (·)x to a bounded linear operator from X to L2 ([0, t0 ]; Y ) for every t0 > 0. Similarly, if C is an infinite-time admissible observation operator, we can extend this mapping to a bounded linear operator from X to L2 ([0, ∞); Y ). The reader is referred to see [8, 18, 19, 20] for more details on this concept of admissibility. Next, we introduce the concept of finite-time (resp. infinite-time) admissibility of output operators C for the nonlinear semigroup (S(t))t≥0 given by (2.4) as follows: Definition 3.3. Let C ∈ L(D(A), Y ) with S(t)D(A) ⊂ D(A) for every t ≥ 0. We say that C is a finite-time admissible observation operator for (S(t))t≥0 , if for every t0 > 0, there is some Kt0 > 0 such that Z t0 kCS(t)x − CS(t)yk2Y dt ≤ Kt0 kx − yk2 , (3.3) 0
for any x, y ∈ D(A).
Vol. 64 (2009)
Admissibility and Observability
5
Definition 3.4. Let C ∈ L(D(A), Y ) with S(t)D(A) ⊂ D(A) for every t ≥ 0. Then C is called an infinite-time admissible observation operator for (S(t))t≥0 , if there is some K > 0 such that Z ∞ kCS(t)x − CS(t)yk2Y dt ≤ Kkx − yk2 , (3.4) 0
for any x, y ∈ D(A). Equation (3.3) (resp. (3.4)) implies that the mapping x 7→ CS(·)x has a continuous extension from X to L2 ([0, t0 ]; Y ) for every t0 > 0 (resp. L2 ([0, ∞); Y )). Remark 3.5. (i) It is immediately clear that for a linear semigroup equation (3.3) (resp. (3.4)) is equivalent to equation (3.1) (resp. (3.2)). (ii) It is not difficult to verify that C is a finite-time admissible observation operator for (T (t))t≥0 (resp. (S(t))t≥0 ) if (3.1) (resp. (3.3)) holds for one t0 > 0. (iii) If (T (t))t≥0 (resp. (S(t))t≥0 ) is exponentially stable, then the notion of finitetime admissibility and infinite-time admissibility are equivalent. The objective of this section is to find sufficient conditions guaranteeing that the output function y of the system (1.1) is in L2 ([0, t0 ]; Y ). To begin with, we introduce another Banach space that contains the range of F and has the following properties: Definition 3.6. (Desch, Schappacher [5, Definition 4]) Let A be the infinitesimal generator of a linear C0 -semigroup (T (t))t≥0 on X. A Banach space (Z, | · |Z ) is said to satisfy assumption (Z) with respect to A if and only if (Z1) Z is continuously embedded in X; (Z2) for all continuous functions ϕ : [0, ∞) → Z we have Z t T (t − s)ϕ(s)ds ∈ D(A) for all t > 0, 0
and there exists a continuous nondecreasing function γ : [0, ∞) → [0, ∞) such that γ(0) = 0 and
Z t
A T (t − s)ϕ(s)ds
≤ γ(t) sup |ϕ(s)|Z . 0
0≤s≤t
Important examples of Banach spaces that satisfy assumption (Z) with respect to A are provided by: (1) XA = (D(A), k · kA ) with k · kA the graph norm of A. (2) The Favard class of A, given by 1 Z = FA = x ∈ X| sup kT (t)x − xk < ∞ , 0
6
Baroun and Jacob
IEOT
This set is often also called the generalized domain of the semigroup (T (t))t≥0 . In practice, it can also be determined via the characterization
FA = x ∈ X| sup λA(λ − A)−1 x < ∞ . λ>0
Recall that in case of a reflexive space X we have FA = XA , see [6] for details. (3) If A generates an analytic semigroup we may take either Z = D((−A)α ), α ∈ (0, 1), the fractional power space of −A, or Z = DA (α, p), α ∈ (0, 1), p ∈ [1, ∞] the interpolation space. For more details and definitions of these spaces, we refer the reader to [6, 13, 15]. One main result concerning admissibility is Theorem 3.7. Let (Z, | · |Z ) satisfy assumption (Z) with respect to A and C ∈ L(D(A), Y ). We assume additionally that F maps X to Z and that F : X → Z is globally Lipschitz continuous. Then the following assertions are equivalent: (i) C is finite-time admissible for (T (t))t≥0 . (ii) C is finite-time admissible for (S(t))t≥0 . Proof. To begin with, we show that (i) implies (ii). Let x, y ∈ D(A) and t0 ≥ 0. We have, for 0 ≤ t ≤ t0 ,
Z t
T (t − s)[F (S(s)x − F (S(s)y)]ds
0
X
A
Z t
A = T (t − s)[F (S(s)x − F (S(s)y)]ds
0
Z t
T (t − s)[F (S(s)x − F (S(s)y)]ds +
0
Z
t
≤ γ(t) sup |F (S(s)x − F (S(s)y)|Z + M R 0≤s≤t
eω(t−s) |F (S(s)x − F (S(s)y)|Z ds
0
Z
t
≤ γ(t)L sup kS(s)x − S(s)yk + M LR 0≤s≤t
eω(t−s) kS(s)x − S(s)ykds
0 (ω+M L)t0
Z
2
t
≤ γ(t)LM max{1, e }kx − yk + M LR eω(t−s) e(ω+M L)s kx − ykds 0 ≤ γ(t)LM max{1, e(ω+M L)t0 } + M Re(ω+M L)t kx − yk. Since γ is nondecreasing and positive, we obtain
Z t
2
T (t − s)[F (S(s)x − F (S(s)y)]ds
0
XA
2
2
2
2(ω+M L)t0
≤ 2 γ(t0 ) L M max{1, e
} + M 2 R2 e2(ω+M L)t kx − yk2
≤ 2M 2 max{γ(t0 )2 L2 , R2 } max{1, e2(ω+M L)t0 }kx − yk2 .
Vol. 64 (2009)
Admissibility and Observability
7
On the other hand, we have Z t0 kCS(t)x − CS(t)yk2Y dt 0 Z t0 ≤2 kCT (t)x − CT (t)yk2Y dt 0
Z
t0
+2
0
0 t0
Z ≤2
2
Z t
C T (t − s)[F (S(s)x − F (S(s)y)]ds
dt
kCT (t)x −
Y
CT (t)yk2Y
dt
0
Z
t0
kCk2L(XA ,Y )
+2 0
2
Z t
T (t − s)[F (S(s)x − F (S(s)y)]ds
0
dt
XA
≤ 2Kt0 kx − yk2 + 4M 2 kCk2L(XA ,Y ) max{γ(t0 )2 L2 , R2 } max{1, e2(ω+M L)t0 } t0 kx − yk2 . Defining Kt00 := 2Kt0 +4M 2 kCk2L(XA ,Y ) max{γ(t0 )2 L2 , R2 } max{1, e2(ω+M L)t0 }t0 , this implies that Z t0 kCS(t)x − CS(t)yk2Y dt ≤ Kt00 kx − yk2 . 0
Conversely, suppose that (ii) holds. Using the formula, Z t CT (t)x = CS(t)x − C T (t − s)F (S(s)x)ds, x ∈ D(A), 0
and by similar calculations as above, we have Z t0 kCT (t)x − CT (t)yk2Y dt ≤ Kt0 kx − yk2 x, y ∈ D(A).
(3.5)
0
Therefore C is finite-time admissible for (T (t))t≥0 by Remark 3.5 (i).
Theorem 3.8. Suppose that the assumptions of Theorem 3.7 are satisfied. If (T (t))t≥0 and (S(t))t≥0 are exponentially stable, then the following statements are equivalent: (i) C is infinite-time admissible for (T (t))t≥0 . (ii) C is infinite-time admissible for (S(t))t≥0 . Proof. The proof follows immediately from Remark 3.5 (iii).
Note that by Corollary 2.2 the exponential stability of both semigroups is for example satisfied if ω < −M L. Now, we consider the situation where A generates an analytic semigroup (T (t))t≥0 . For 0 < α < 1, we call a Banach space Xα with norm k · kα an intermediate space between D(A) and X, or a space of class Jα , if D(A) ,→ Xα ,→ X
8
Baroun and Jacob
IEOT
and there is a constant c > 0 such that kxkα ≤ ckxk1−α kxkα A , x ∈ D(A), where k·kA is the graph norm associated to A. Examples of Xα are D((−A)α ), α ∈ (0, 1), the domains of the fractional powers of −A, the real interpolation spaces DA (α, ∞), α ∈ (0, 1), defined as follows ( DA (α, ∞) := x ∈ X : [x]α = sup0
. For more details about interand the abstract H¨ older spaces DA (α) := D(A) mediate spaces, see [6, Chap. II, Section 5.b] and [13]. Another main result of this section is the following theorem. Theorem 3.9. Assume that A generates an analytic semigroup (T (t))t≥0 and that C ∈ L(Xα , Y ). Then the following assertions are equivalent: (i) C is finite-time admissible for (T (t))t≥0 . (ii) C is finite-time admissible for (S(t))t≥0 . Proof. We may assume without loss of generality that 0 ∈ ρ(A). Then the graph norm on D(A) is equivalent to the norm x 7→ kAxk, which will be used here. Let t0 ≥ 0. For x ∈ Xα and 0 ≤ t ≤ t0 , we have T (t)x ∈ D(A) ,→ Xα and Z t v(t) = T (t − s)F (S(s)x)ds 0
is bounded with values in Xα because kT (t − s)kL(X,Xα ) ≤ cM 1−α max{1, eω(1−α)t0 } (t − s)−α . We set sup kS(t)k ≤ M1 := M max{1, e(ω+M L)t0 }, 0≤t≤t0
and c1 := cM 1−α max{1, eω(1−α)t0 }. Then kv(t)kXα
Z t
T (t − s)F (S(s)x)ds =
0
Z
t
≤
kT (t − s)F (S(s)x)kXα ds 0
Xα
Z
t
≤
kT (t − s)kL(X,Xα ) kF (S(s)x)k ds Z t ≤ c1 L (t − s)−α kS(s)xkds. 0
0
Therefore
Z t
kv(t)kXα = T (t − s)F (S(s)x)ds
0
Xα
≤ c1 LM1
t1−α 0 kxk. 1−α
(3.6)
Vol. 64 (2009)
Admissibility and Observability
9
Then S(t)x ∈ Xα . Moreover we have for every x, y ∈ Xα Z t0 kCS(t)x − CS(t)yk2Y dt 0 Z t0 ≤2 kCT (t)x − CT (t)yk2Y dt 0
2
Z t
T (t − s)[F (S(s)x) − F (S(s)y)]ds +2
dt
0 0 Xα Z t0 1−α 2 t c1 LM1 0 ≤ 2Kt0 kx − yk2 + 2kCk2L(Xα ,Y ) dtkx − yk2 1−α 0 " 2 # t1−α 2 0 ≤ 2Kt0 + kCkL(Xα ,Y ) c1 LM1 t0 kx − yk2 . 1−α Z
t0
kCk2L(Xα ,Y )
The converse can be obtain by the same procedure as above and in the same way as in the second part of the proof of Theorem 3.7. Theorem 3.10. Suppose that the assumptions of Theorem 3.9 are satisfied. If (T (t))t≥0 and (S(t))t≥0 are exponentially stable, then the following statements are equivalent: (i) C is infinite-time admissible for (T (t))t≥0 . (ii) C is infinite-time admissible for (S(t))t≥0 . Proof. The proof follows immediately from Remark 3.5 (iii).
We conclude this section by two examples to illustrate our theory. Example. Let Ω be a bounded domain with smooth boundary ∂Ω in R2 and let Γ be an open subset of ∂Ω. Consider the following nonlinear initial and boundary value problem ¨ t) = −∆2 w(x, t) + w3 (x, t), t ≥ 0, x ∈ Ω, w(x, w(x, t) = ∆w(x, t) = 0, t ≥ 0, x ∈ ∂Ω, (3.7) w(x, 0) = w0 (x), w(x, ˙ 0) = w1 (x), x ∈ Ω, with the output function ∂ w(x, ˙ t) |Γ . (3.8) ∂ν We take H = L2 (Ω) and A : D(A) ⊂ H → H the linear unbounded operator defined by Aϕ = ∆2 ϕ, where D(A) = {φ ∈ H 4 (Ω) ∩ H01 (Ω)| ∆φ = 0 on ∂Ω}, y(t) =
1
D(A 2 ) = H 2 (Ω) ∩ H01 (Ω). Setting W := (w, w), ˙ the problem (3.7) can be rewritten as an abstract semilinear 1 equation in the Hilbert space X = D(A 2 ) × H of the form ˙ (t) = AW (t) + F (W (t)), W
10
Baroun and Jacob
IEOT
1 0 IX is defined on a domain D(A) = D(A) × D(A 2 ). Then −A 0 A is the generator of a C0 -group on X. The nonlinear mapping F (W ) = (0, w3 ) maps X into D(A). Next we show that for W = (w, w), ˙ V = (v, v) ˙ ∈ X we have where A :=
kF (W )kD(A) ≤ Kkwk2L∞ (Ω) kW kX kF (W ) − F (V )kD(A) ≤
K(kwk2L∞ (Ω)
+
(3.9)
kvk2L∞ (Ω) )kW
− V kX .
(3.10)
1
Indeed, since D(A 2 ) ⊂ H 2 (Ω) it follows from Sobolev’s Imbedding Theorem [1] that H 2 (Ω) ,→ L∞ (Ω) and that there is a constant K such that 1
kwkL∞ (Ω) ≤ KkwkH 2 (Ω) for w ∈ D(A 2 ).
(3.11) 1
Denoting by D any first order differential operator we have for every w ∈ D(A 2 ) |D2 w3 | ≤ K(6|w| |Dw| + 3|w|2 |D2 w|), and therefore kw3 kH 2 (Ω) ≤ 6K(kwkL∞ (Ω) kwkH 2 (Ω) + kwk2L∞ (Ω) kwkH 2 (Ω) ) kw3 kH 2 (Ω) ≤ 6KkwkL∞ (Ω) (kwkL∞ (Ω) + 1)kwkH 2 (Ω) . Then kF (W )kD(A)
0
=
w3
D(A)
= kw3 kH 2 (Ω) ≤ 6KkwkL∞ (Ω) (kwkL∞ (Ω) + 1)kwkH 2 (Ω)
w
≤ 6KkwkL∞ (Ω) (kwkL∞ (Ω) + 1)
w˙ . X
The inequality (3.10) is proved similarly using Leibniz’s formula for the derivatives of products and the estimate (3.11). It follows from the inequalities (3.9) and (3.10) that F : X → D(A) = Z, and it is Lipschitz continuous in D(A). Next, we define the output space Y = L2 (Γ) and we can rewrite (3.8) as y(t) = Cx(t), where C = (0 C0 ), C0 w =
1 ∂w |Γ ∀w ∈ D(A 2 ). ∂ν 1
In [11, p. 287], the author proved that C0 ∈ L(D(A 2 ), Y ) is an admissible observation operator for the linear problem, i.e. for all T ≥ 0 there exist a constant KT > 0 such that Z TZ ky(t)k2 dΓdt ≤ KT2 (kw0 k2H 2 (Ω) + kw1 k2L2 (Ω) ), 0
Γ
Vol. 64 (2009)
Admissibility and Observability
11
1
for all (w0 , w1 ) ∈ D(A) × D(A 2 ). Moreover, one deduces from Theorem 3.7 that C ∈ L(D(A), Y ) is an admissible observation operator for the problem (3.7). Example. Let Ω be a bounded domain with smooth boundary ∂Ω in Rn . We consider the following nonlinear initial value problem ˙ t) = ∆w(x, t) + sin(w(x, t)), x ∈ Ω, t ≥ 0, w(x, w(x, t) = 0, x ∈ ∂Ω, t ≥ 0, (3.12) w(x, 0) = w0 (x), x ∈ Ω, with the output function ∂w(x, t) |∂Ω . (3.13) ∂ν Let X = L2 (Ω), Y = L2 (∂Ω). Consider the operator A : D(A) → X, Aϕ = ∆ϕ, with D(A) = H 2 (Ω) ∩ H01 (Ω). Recall that A generates an analytic semigroup ε+ 43 3 (T (t))t≥0 . Consider Cϕ = ∂ϕ ) → Y, for ∂ν |∂Ω ∈ Y. Since C : Xε+ 4 := D((−A) every ε > 0, is bounded, see [12, Section 3.1], and by Theorem 2.6.13 of [15] we have that y(t) =
7
3
7
kC(−A)1−γ T (t)k2 = kC(−A)−ε− 4 (−A)−γ+ε+ 4 T (t)k ≤ ct2γ−2ε− 2 is integrable near 0 for every γ > 54 . This means that C ∈ L(X1−γ , Y ) is admissible for γ > 45 . Considering the function F : X −→ X, F (x) = sin(x), it is easy to see that F is globally Lipschitz. Now Theorem 3.9 guarantees that C is an admissible observation operator for the problem (3.12)-(3.13).
4. Invariance under perturbations In this section we show that the Lebesgue extension of C is invariant under Lipschitz perturbations and we give relations between the Λ-extension of admissible operators with respect to the semigroup (T (t))t≥0 and the nonlinear semigroup (S(t))t≥0 . Definition 4.1. Let X, Y be Banach spaces, (T (t))t≥0 a C0 -semigroup on X with generator A and C ∈ L(D(A), Y ). We define the operator CL : D(CL ) → Y, the Lebesgue extension of C with respect to (T (t))t≥0 by Z 1 τ CL x = lim C T (t)xdt, (4.1) τ ↓0 τ 0 where D(CL ) = {x ∈ X| the limit in (4.1) exists} . On the domain D(CL ) we define the norm
Z
1 kxkD(CL ) = kxk + sup
0<τ ≤1 τ
0
τ
T (t)xdt
.
12
Baroun and Jacob
IEOT
Then (D(CL ), k · kD(CL ) ) is a Banach space. We then have D(A) ⊂ D(CL ) ⊂ X with continuous injections, and CL ∈ L(D(CL ), Y ). For this definition and further properties we refer the reader to [18, Section 4]. In a similar manner we define the Lebesgue extension of C with respect to a nonlinear semigroup (S(t))t≥0 : Definition 4.2. Let X, Y be Banach spaces, (S(t))t≥0 a nonlinear semigroup on X given by (2.4) and C ∈ L(D(A), Y ). We define the operator CL0 : D(CL0 ) → Y, the Lebesgue extension of C with respect to (S(t))t≥0 by Z 1 τ S(t)xdt, (4.2) CL0 x = lim C τ ↓0 τ 0 where D(CL0 ) = {x ∈ X| the limit in (4.2) exists} . Theorem 4.3. Let (T (t))t≥0 be a C0 -semigroup with generator A, let (S(t))t≥0 be the nonlinear semigroup given by (2.4) and C ∈ L(D(A), Y ). Then the Lebesgue extension of C with respect to (S(t))t≥0 is the same as with respect to (T (t))t≥0 . Proof. Let x ∈ X, τ > 0, and let CL0 be the Lebesgue extension of C with respect to (S(t))t≥0 , given by Z Z Z 1 τ 1 τ t CL0 x = lim C T (t)xdt + C T (t − σ)F (S(σ)x)dσdt , (4.3) τ ↓0 τ 0 τ 0 0 if this limit exists. If we can prove that
Z τZ t
1
T (t − σ)F (S(σ)x)dσdt lim
= 0, τ ↓0 τ 0
0
(4.4)
A
then the second term on the right-hand side of (4.3) tends to 0. Therefore, the limit in (4.3) exists if and only if the limit in (4.1) exists, and the two limits are equal. Now, we have to show that limit (4.4) exists. By Fubini’s theorem we have Z τZ t Z τZ τ T (t − σ)F (S(σ)x)dσdt = T (t − σ)F (S(σ)x)dtdσ. 0
0
0
Rτ
R τ −σ
σ
The integral σ T (t − σ)F (S(σ)x)dt = 0 T (t)F (S(σ)x)dt belongs to D(A) and Rτ A σ T (t − σ)F (S(σ)x)dt = (T (τ − σ) − I)F (S(σ)x). It follows that Z τZ t T (t − σ)F (S(σ)x)dσdt ∈ D(A), 0
0
and Z
τ
Z
t
Z
τ
T (t − σ)F (S(σ)x)dσdt =
A 0
0
Z A
Z0 τ
τ −σ
T (t)F (S(σ)x)dtdσ 0
(T (τ − σ) − I)F (S(σ)x)dσ.
= 0
Vol. 64 (2009)
Admissibility and Observability
13
Hence, 1 A τ
Z
τ
Z
t
T (t − σ)F (S(σ)x)dσdt = 0
0
1 τ
Z
τ
(T (τ − σ) − I)F (S(σ)x)dσ. 0
We decompose T (τ − σ)F (S(σ)x) − F (S(σ)x) = T (τ − σ) [F (S(σ)x) − F (x)] + (T (τ − σ) − I)F (x) − [F (S(σ)x) − F (x)] , and we denote M := max kT (t)k. t∈[0,1]
Fix x ∈ X and let ε > 0. Then there exists δε ∈ (0, 1], such that for t ∈ [0, δε ] ε ε ε kS(t)x − xk ≤ , k(T (t) − I)F (x)k ≤ and kF (S(t)x) − F (x)k ≤ . 3M L 3 3 Then for τ ∈ (0, δε ] and σ ∈ [0, τ ] we obtain kT (τ − σ)F (S(σ)x) − F (S(σ)x)k ≤ ε, which implies
Z τZ t
1
A T (t − σ)F (S(σ)x)dσdt
τ
≤ ε. 0 0 On the other hand, it is not difficult to verify that Z Z 1 τ t T (t − σ)F (S(σ)x)dσdt = 0. lim τ ↓0 τ 0 0 Consequently
Z τZ t
1
lim T (t − σ)F (S(σ)x)dσdt
= 0. τ ↓0 τ 0 0 A
Remark 4.4. This result coincides with Weiss’ result (see [18, Theorem 5.2]), if one considers F ∈ L(X). In [19, 20], Weiss introduced another extension of C, the Λ-extension. Definition 4.5. Let (T (t))t≥0 be a C0 -semigroup with generator A and let C ∈ L(D(A), Y ). We define the Λ-extension CΛ of C by D(CΛ ) := x ∈ X| lim CλR(λ, A)x exists , λ→+∞ (4.5) CΛ x := lim CλR(λ, A)x, x ∈ D(CΛ ). λ→+∞
D(CΛ ) endowed with the norm kxkD(CΛ ) = kxk + sup kCλR(λ, A)xkY , λ≥λ0
14
Baroun and Jacob
IEOT
for λ0 ∈ C such that [λ0 , +∞) ⊂ ρ(A), is a Banach space satisfying the continuous embedding D(A) ,→ D(CΛ ) ,→ X, and CΛ ∈ L(D(CΛ ), Y ). The following result is due to Weiss. The proof was given for Lebesgue extension CL of C, see [18, Theorem 4.5]. Since D(CΛ ) contains D(CL ) (see [20, Remark 5.7]), we obtain the following. Theorem 4.6. Let x ∈ X. Assume that C is an admissible observation operator for (T (t)t≥0 ). Then T (t)x ∈ D(CΛ ) for all t ≥ 0, and CΛ T (·)x ∈ L2 ([0, τ ], Y ) for all τ > 0. The following proposition is proved in [7, Proposition 3.3] Proposition 4.7. Let f ∈ L2loc (R+ , X). Suppose that C is an admissible observation Rt operator for (T (t))t≥0 . Then (T ∗ f )(t) := 0 T (t − s)f (s)ds ∈ D(CΛ ) for all t ≥ 0 and kCΛ (T ∗ f )kL2 ([0,τ ],Y ) ≤ c(τ )kf kL2 ([0,τ ],Y ) , for all τ > 0 with c(τ ) > 0 is independent of f. Moreover, limτ ↓0 c(τ ) = 0. Theorem 4.8. Let C be an admissible observation operator for (T (t)t≥0 ) and let (S(t))t≥0 be the nonlinear semigroup given by (2.4). Then S(t)x, S(t)y ∈ D(CΛ ) for all x, y ∈ X and kCΛ S(t)x − CΛ S(t)ykL2 ([0,τ ],Y ) ≤ Kτ kx − yk, for τ, Kτ > 0. Proof. Let x, y ∈ X. From Theorem 4.6 and Proposition 4.7, we deduce that S(t)x, S(t)y ∈ D(CΛ ) and kCΛ (T ∗ F (S(·)x)) − CΛ (T ∗ F (S(·)y))kL2 ([0,τ ],Y ) ≤ c(τ )kF (S(·)x) − F (S(·)y)kL2 ([0,τ ],X) , for τ > 0. On the other hand, we have kF (S(·)x) − F (S(·)y)k2L2 ([0,τ ],X) Z τ = kF (S(t)x) − F (S(y)x)k2 dt 0 Z τ ≤ L2 kS(t)x − S(t)yk2 dt 0 Z τ 2 2 ≤L M e2(ω+M L)t dtkx − yk2 =: η(τ )kx − yk2 . 0
Vol. 64 (2009)
Admissibility and Observability
15
Using formula (2.4), we can write kCΛ S(t)x − CΛ S(t)ykL2 ([0,τ ],Y ) ≤ kCΛ T (t)x − CΛ T (t)ykL2 ([0,τ ],Y ) + kCΛ (T ∗ F (S(·)x)) − CΛ (T ∗ F (S(·)y))kL2 ([0,τ ],Y ) ≤ c0 (τ )kx − yk + c(τ )η(τ )kx − yk ≤ Kτ kx − yk.
5. Exact observability The object of this section is to prove that exact observability is not changed under small Lipschitz perturbations. We start by giving the definition of exact observability of linear system described by the equations u0 (t) = Au(t),
u(0) = x,
y(t) = Cu(t), t ≥ 0,
(5.1)
and of the semilinear system (1.1), respectively. Definition 5.1. Let C ∈ L(D(A), Y ) be an admissible observation operator for the linear C0 -semigroup (T (t))t≥0 and let τ > 0. Then, the system (5.1) is exactly observable if there is some K > 0 such that kCT (·)xkL2 ([0, ∞);Y ) ≥ Kkxk,
x ∈ D(A),
(5.2)
and (5.1) is τ -exactly observable if there is some Kτ > 0 such that kCT (·)xkL2 ([0, τ ];Y ) ≥ Kτ kxk,
x ∈ D(A).
(5.3)
Definition 5.2. Let C ∈ L(D(A), Y ) be an admissible observation operator for the nonlinear semigroup (S(t))t≥0 given by (2.4) and let τ > 0. Then, the system (1.1) is exactly observable if there is some K 0 > 0 such that kCS(·)x − CS(·)ykL2 ([0, ∞);Y ) ≥ K 0 kx − yk, and (1.1) is τ -exactly observable if there is some kCS(·)x − CS(·)ykL2 ([0, τ ];Y ) ≥
Kτ0 kx
Kτ0
x, y ∈ D(A),
(5.4)
> 0 such that
− yk,
x, y ∈ D(A).
(5.5)
Remark 5.3. (i) It is well-known that the notion of τ -exactly observable may depend on τ , see [14, section 5]. (ii) If (T (t))t≥0 (resp. (S(t))t≥0 ) is exponentially stable then for the system (5.1) (resp. (1.1)-(1.2)) there is an equivalence between exact observability and τ -exact observability for some τ > 0, see [17]. Throughout this section, we suppose that we have the following condition (H2): (i) For all τ > 0 and ϕ ∈ C([0, τ ]; X) Z τ T (τ − s)ϕ(s)ds ∈ D(A). (5.6) 0
16
Baroun and Jacob
IEOT
(ii) There exists τ0 > 0 and a constant α > 0 such that
Z τ0
A T (τ0 − s)ϕ(s)ds
≤ α sup kϕ(s)k,
(5.7)
s∈[0, τ0 ]
0
for all ϕ ∈ C([0, τ ]; X). Remark 5.4. (a) It is easy to see that (H2) holds if X satisfies assumption (Z). (b) If there exists τ > 0 and p ∈ [1, ∞) such that (5.6) holds for all ϕ ∈ Lp ([0, τ ]; X), then (H2) is satisfied. Indeed, by [5, Proposition 8], one can see that X satisfies the assumption (Z) and as a consequence of (a), we obtain our result. Here we give a useful exponential estimate of the inequality (5.7). Lemma 5.5. Let ϕ satisfy (H2), let τ0 > 0 and M ≥ 1, ω ∈ R such that kT (t)k ≤ M eωt for all t ≥ 0. Then, for all τ > 0, we have
Z τ
A
≤ N (ω, τ, τ0 )α sup kϕ(s)k, T (τ − s)ϕ(s)ds (5.8)
s∈[0, t]
0
where e|ω|τ0 M eωτ , ω > 0, ωτ0 − 1| |e τ , ω = 0, N (ω, τ, τ0 ) := M 1 + (5.9) τ0 M , ω < 0. ωτ |e 0 − 1| Rt Proof. We set (V A ϕ)(t) := A 0 T (t − s)ϕ(s)ds for all ϕ ∈ C([0, ∞); X) and let t ≥ τ ≥ 0. One first has to verify the following equality, (V A ϕ)(t) = T (t − τ )(V A ϕ)(τ ) + (V A ϕτ )(t − τ ),
(5.10)
where ϕτ := ϕ(· + τ ). Indeed, using integration by parts of (V A ϕ)(t) and (5.6) we obtain Z τ Z t A (V ϕ)(t) = A T (t − s)ϕ(s)ds + A T (t − s)ϕ(s)ds 0 τ Z τ Z t−τ = AT (t − τ ) T (τ − s)ϕ(s)ds + A T (t − τ − s)ϕ(τ + s)ds 0 0 Z τ Z t−τ = T (t − τ )A T (τ − s)ϕ(s)ds + A T (t − τ − s)ϕ(τ + s)ds 0
0
= T (t − τ )(V A ϕ)(τ ) + (V A ϕτ )(t − τ ). The remaining of the proof follows the proof of Boulite et al. [2, Proposition 4]. Now, we can state the main result of this section as follows. Theorem 5.6. Let L be the Lipschitz constant of F and τ > 0. Then we have:
Vol. 64 (2009)
Admissibility and Observability
(a) There exists a constant L0 > 0 If L < L0 and the system (5.1) is τ -exactly observable. (b) There exists a constant L1 > 0 If L < L1 and the system (1.1) is τ -exactly observable.
17
such that: is τ -exactly observable, then the system (1.1) such that: is τ -exactly observable, then the system (5.1)
Proof. (a) We assume that the system (5.1) is exactly observable on [0, τ ] for τ > 0. Let x, y ∈ D(A). We have CT (τ )x − CT (τ )y τ
Z = CS(τ )x − CS(τ )y − C
T (τ − σ)[F (S(σ)x) − F (S(σ)y)]dσ. 0
Using the hypotheses (H2), we obtain kCT (τ )x − CT (τ )yk2Y CS(τ )yk2Y
≤ 2kCS(τ )x −
Z
+ 2
C
0
τ
2
T (τ − σ)[F (S(σ)x) − F (S(σ)y)]dσ
Y
≤ 2kCS(τ )x − CS(τ )yk2Y
Z τ
2
+ 2kCk2L(D(A),Y ) T (τ − σ)[F (S(σ)x) − F (S(σ)y)]dσ
0
A
≤ 2kCS(τ )x − CS(τ )yk2Y
Z τ
2
T (τ − σ)[F (S(σ)x) − F (S(σ)y)]dσ + 2kCkL(D(A),Y ) A
0
2
Z τ
T (τ − σ)[F (S(σ)x) − F (S(σ)y)]dσ +
0
≤ 2kCS(τ )x − CS(τ )yk2Y + 2kCk2L(D(A),Y ) α N (ω, τ, τ0 ) sup kF (S(σ)x) − F (S(σ)y)k 0≤σ≤τ
+ M 2 Leωτ
Z
τ
eM Ls kx − ykds
2
0
≤ 2kCS(τ )x − CS(τ )yk2Y 2 + 4kCk2L(D(A),Y ) α N (ω, τ, τ0 )M L max{1, e(ω+M L)τ } kx − yk2 + 4kCk2L(D(A),Y ) M 4 L2 τ 2 e2(ω+M L)τ kx − yk2 ≤ 2kCS(τ )x − CS(τ )yk2Y + 8kCk2L(D(A),Y ) α N (ω, τ, τ0 )M 2 Lτ
2
max{1, e2(ω+M L)τ }kx − yk2 .
18
Baroun and Jacob
IEOT
Set M2 := kCk2L(D(A),Y ) M 4 τ 2 . Then Z τ kCS(r)x − CS(r)xk2Y dr 0 Z 1 τ kCT (r)x − CT (r)xk2Y dr ≥ 2 0 Z τ N 2 (ω, r, τ0 ) max{1, e2(ω+M L)r }kx − yk2 dr − 4α2 M2 L2 0 Z 1 τ kCT (r)x − CT (r)yk2Y dr ≥ 2 0 Z τ 2 2 2(ω+M L)τ N 2 (ω, r, τ0 )drkx − yk2 . − 4α M2 L max{1, e } 0
Consequently, Z τ 1 2 2 2 kCS(r)x − CS(r)ykY dr ≥ Kτ − 4η(L)α L kx − yk2 , 2 0 Rτ where η(L) := M2 max{1, e2(ω+M L)τ } 0 N 2 (ω, r, τ0 )dr. Set f (L) = 21 Kτ − 4η(L)α2 L2 . The function f is continuous from [0, +∞) to (−∞, 21 Kτ ] and strictly decreasing, hence it is bijective. Then there exists a unique L0 > 0 such that f (L0 ) = 0. The parenthesis above becomes positive for L < L0 , which implies that the system (1.1) is τ -exact observable. The proof of (b) is easy since we use the same procedure as above. Corollary 5.7. Let L be the Lipschitz constant of F . If the semigroups (T (t))t≥0 and (S(t))t≥0 are exponentially stable then we have: (a) There exists a constant L0 > 0 such that: If L < L0 and the system (5.1) is exactly observable, then the system (1.1) is exactly observable. (b) There exists a constant L1 > 0 such that: If L < L1 and the system (1.1) is exactly observable, then the system (5.1) is exactly observable. The statements of the Theorem 5.6 and the Corollary 5.7 still hold if we drop the assumption (H2) and instead it is just assumed that A generates an analytic semigroup (T (t))t≥0 , F : X → X is globally Lipschitz and C ∈ L(Xα , Y ). The proof is similar to the Theorem 5.6 using (3.6). Example. Let Ω = (0, π) × (0, π) and let Γ = ([0, π] × 0) ∪ (0 × [0, π]) be a subset of ∂Ω. We consider the following semilinear problem for the wave equation with Neumann boundary observation: ¨ t) = ∆w(x, t) + λw3 (x, t), x ∈ Ω, t ≥ 0, w(x, w(x, t) = 0, x ∈ ∂Ω, t ≥ 0, (5.11) w(x, 0) = w0 (x), w(x, ˙ 0) = w1 (x), x ∈ Ω,
Vol. 64 (2009)
Admissibility and Observability
19
with the output function ∂w(x, t) |Γ , (5.12) ∂ν where λ > 0. Let X = L2 (Ω), Y = L2 (Γ). We set x := (w, w). ˙ The system (5.11)1/2 (5.12) can be written in the form (1.1)-(1.2) in the Hilbert space H = D(A0 )×X, where 1 0 IX A := , D(A) = D(A0 ) × D(A02 ), −A0 0 y(t) =
A0 φ = −∆φ ∀φ ∈ D(A0 ), D(A0 ) = H 2 (Ω) ∩ H01 (Ω), ∂φ |Γ ∀φ ∈ D(A0 ). ∂ν It is known that the operator A generates a C0 -group on H and the nonlinear mapping F (x) = (0, λw3 ) is globally Lipschitz continuous from H to D(A) as in Example 3. From [11, p. 44], it follows that C ∈ L(D(A), Y ) is an admissible observation operator for the linearized problem (5.11)-(5.12) and in [16, Theorem 6.2] it is shown that the linearized system of (5.11)-(5.12) is exactly observable in some time τ . Now for a small constant λ, all assumptions of Theorem 5.6 are satisfied and hence the semilinear problem (5.11)-(5.12) is exactly observable in some time τ . 1
D(A02 ) = H01 (Ω), C = (C0 , 0), C0 φ =
Acknowledgement The authors would like to thank the reviewer for his/her comments that helped to improve the paper.
References [1] R. A. Adams, Sobolev spaces. Pure and Applied Mathematics, Vol. 65. Academic Press [A subsidiary of Harcourt Brace Jovanovich, Publishers], New York-London, 1975. [2] S. Boulite, A. Idrissi, L. Maniar, Robustness of controllability under some unbounded perturbations. J. Math. Anal. Appl. 304 (2005), no. 1, 409–421. [3] R. F. Curtain and A. J. Pritchard, Infinite Dimensional Linear Theory, Lecture Notes in Control and Information Sciences, Vol. 8, Springer-Verlag, 1978. [4] R. F. Curtain and G. Weiss, Well posedness of triples of operators (in the sense of linear systems theory), International Series of Numerical Mathematics 91 Birkh¨ auserVerlag, (1989), 41–58. [5] W. Desch and W. Schappacher, Some generation results for pertubed semigroup, Semigroup Theory and Applications (Cl´emnet, Invernizzi, Mitidieri, and Vrabie, eds.) Lect. Notes Pure Appl. Math. 116, (1989), 125–152. [6] K. J. Engel, and R. Nagel, One Parameter Semigroups for Linear Evolution Equations, Grad. Texts in Math., Springer-Verlag, 1999.
20
Baroun and Jacob
IEOT
[7] S. Hadd, Unbounded perturbations of C0 -semigroups on Banach spaces and applications, Semigroup Forum 70 (2005), no. 3, 451–465. [8] B. Jacob, J.R. Partington, Admissibility of control and observation operators for semigroups: a survey, in: J.A. Ball, J.W. Helton, M. Klaus, L. Rodman (Eds.), Current Trends in Operator Theory and its Applications, Proceedings of IWOTA 2002, Operator Theory: Advances and Applications, vol. 149, Birkh¨ auser, Basel, 199–221. [9] B. Jacob, H. Zwart, Exact observability of diagonal systems with a one-dimensional output operator. Infinite-dimensional systems theory and operator theory (Perpignan, 2000). Int. J. Appl. Math. Comput. Sci. 11 (2001), no. 6, 1277–1283. [10] B. Jacob, H. Zwart, Exact observability of diagonal systems with a finite-dimensional output operator. Systems Control Lett. 43 (2001), no. 2, 101–109. [11] J.-L. Lions, Contrˆ olabilit´e exacte, perturbations et stabilisation de syst`emes distribu´es. Tome 1, Recherches en Math´ematiques Appliqu´ees, Vol. 8, Masson, Paris, 1988. [12] I. Lasiecka, R. Triggiani, Control theory for partial differential equations: continuous and approximation theories, Volume I, Cambridge University Press, Cambridge, 2000. [13] A. Lunardi, Analytic Semigroups and Optimal Regularity in Parabolic Problems, Birkh¨ auser, Basel, 1995. [14] J.R. Partington, S. Pott, Admissibility and exact observability of observation operators for semigroups. Irish Math. Soc. Bull. 55 (2005), 19–39. [15] A. Pazy, Semigroups of Linear Operators and Applications to Partial Differential Equations. Applied Mathematical Sciences, 44. Springer-Verlag, New York, 1983. [16] K. Ramdani, T. Takahashi, G. Tenenbaum, M. Tucsnak, A spectral approach for the exact observability of infinite-dimensional systems with skew-adjoint generator. J. Funct. Anal. 226 (2005), no. 1, 193–229. [17] D. L. Russell, G. Weiss, A general necessary condition for exact observability. SIAM J. Control Optimization 32 (1994), 1–23. [18] G. Weiss, Admissible observation operators for linear semigroups, Israel J. Math. 65 (1989) 17–43. [19] G. Weiss, Regular linear systems with feedback, Math. Control Signals Systems 7 (1994) 23–57. [20] G. Weiss, Transfer functions of regular linear systems. Part I: Characterization of regularity, Trans. Amer. Math. Soc. 342 (1994) 827–854. [21] G. Q. Xu, C. Liu, S. P. Yung, Necessary conditions for the exact observability of systems on Hilbert spaces. Systems Control Lett. 57 (2008), no. 3, 222–227. Mahmoud Baroun and Birgit Jacob Institute for Mathematics, University of Paderborn Warburger Str. 100, 33098 Paderborn, Germany e-mail:
[email protected] [email protected] Submitted: August 6, 2008. Revised: March 5, 2009.
Integr. equ. oper. theory 64 (2009), 21–33 c 2009 Birkh¨
auser Verlag Basel/Switzerland 0378-620X/010021-13, published online March 25, 2009 DOI 10.1007/s00020-009-1670-5
Integral Equations and Operator Theory
On the Structure of L1 of a Vector Measure via its Integration Operator J.M. Calabuig, J. Rodr´ıguez and E.A. S´anchez-P´erez Abstract. Geometric and summability properties of the integration operator associated to a vector measure m can be translated in terms of structure properties of the space L1 (m). In this paper we study the cases of the integration operator being: (i) p-concave on Lp (m), or (ii) positive p-summing on L1 (m) (where 1 ≤ p < ∞). We prove that (i) is equivalent to saying that L1 (m) contains continuously the Lp space of a (non-negative scalar) control measure for m. On the other hand, we show that (ii) holds if and only if L1 (m) is order isomorphic to the L1 space of a non-negative scalar measure. Mathematics Subject Classification (2000). 46E30, 46G10. Keywords. Banach function space, integration operator, p-concave operator, positive p-summing operator, vector measure.
1. Introduction Let E be an order continuous Banach function space (over a non-negative scalar measure) having weak order unit. It is known that there is a vector measure m such that E is order isomorphic to L1 (m), see [3, Theorem 8] or [12, Proposition 3.30]. In this case, we say that m represents E. This representation is not unique. However, the properties of the integration operator associated to some/every vector measure representing E determine some features of E. From this point of view, properties of the integration operator like compactness or weak compactness have already been studied (see [12, Section 3.3] and the references therein). J.M. Calabuig was supported by MEC and FEDER (MTM2005-08350-C03-03) and Generalitat Valenciana (GV/2007/191). J. Rodr´ıguez was supported by MEC and FEDER (MTM200508379) and Generalitat Valenciana (GVPRE/2008/312). E.A. S´ anchez-P´ erez was supported by MEC and FEDER (MTM2006-11690-C02-01).
22
Calabuig, Rodr´ıguez and S´ anchez-P´erez
IEOT
In this paper we analyze the continuous injection in E of usual Lebesgue spaces Lr (λ) (λ being a non-negative scalar measure and 1 ≤ r < ∞). Some results in this direction can be found in [12, Chapter 6]. Our arguments are closely related to the ones presented there. In our main result, Theorem 2.3, we characterize the vector-valued norm inequalities that the integration operator associated to certain vector measure m representing E must satisfy in order to have the following property: There is a (non-negative scalar) control measure λ for m such that Lr (m) ,→ Lr (λ) ,→ L1 (m) ' E. Moreover, in Theorem 2.3 we also prove that the property above is equivalent to saying that the integration operator on Lr (m) is r-concave. Here, the notation E1 ,→ E2 (where E1 and E2 are Banach function spaces over non-negative scalar measures defined on the same measurable space) means that ‘identity’ mapping is a well-defined one-to-one operator (i.e. linear continuous mapping) from E1 to E2 . The last part of the paper is devoted to the ‘extreme case’: when is E order isomorphic to L1 (λ) for some non-negative scalar measure λ? In Theorem 2.7 we show that the positive p-summability (1 ≤ p < ∞) of the integration operator associated to some/every vector measure representing E provides a complete answer to the previous question. Terminology and preliminaries. All unexplained terminology can be found in our standard references [6], [9] and [12]. All our vector spaces are real. Given a Banach space Y , the symbol Y 0 stands for the topological dual of Y and the duality is denoted by h·, ·i. We write BY to denote the closed unit ball of Y . If in addition Y is a Banach lattice, we write Y + and BY+ for the positive cone of Y and its intersection with BY , respectively. A relevant class of Banach lattices is that of Banach function spaces. Given a finite measure space (Ω, Σ, µ), a linear subspace E of L0 (µ) equipped with a complete norm k · kE is called a Banach function space over µ if the following conditions are satisfied: (i) if f ∈ L0 (µ) and g ∈ E are such that |f | ≤ |g| (for the µ-a.e. order), then f ∈ E and kf kE ≤ kgkE ; (ii) every simple function belongs to E; and (iii) the ‘identity’ defines a one-to-one operator from E to L1 (µ). Throughout this paper X is a Banach space, (Ω, Σ) is a measurable space and m : Σ → X is a (countably additive) vector measure. By a control measure for m we mean a non-negative scalar measure λ on (Ω, Σ) such that λ(A) = 0 if and only if kmk(A) = 0, where kmk denotes the semivariation of m. For each x0 ∈ X 0 we write hm, x0 i to denote the scalar measure defined by hm, x0 i(A) := hm(A), x0 i, for all A ∈ Σ. From now on we fix a Rybakov control measure for m, that is, a control measure of the form µ = |hm, x00 i| with x00 ∈ BX 0 , cf. [6, p. 268]. In this way, a property holds µ-a.e. if and only if it holds kmk-a.e. A Σ-measurable function f : Ω → R is m-integrable if f is integrable with 0 0 0 respect for R to hm, x i for every xR ∈ X and, R each A ∈ Σ, there exists a vector A f dm ∈ X such that h A f dm, x0 i = A f dhm, x0 i for all x0 ∈ X 0 . Given
Vol. 64 (2009)
On the Structure of L1 of a Vector Measure
23
1 ≤ p < ∞, the space Lp (m) is the Banach function space over µ made up of all equivalence classes of functions f such that |f |p is m-integrable, endowed with the norm Z p1 kf kLp (m) := sup |f |p d|hm, x0 i| . x0 ∈BX 0
Ω
p
The space L (m) is p-convex, order continuous and has weak unit. Observe that kf kpLp (m) = k|f |p kL1 (m) for all f ∈ Lp (m). For the basic properties of this space, we refer the reader to [7] and [12, Chapter 3]. R 1 1 The operator Im : L1 (m) → X defined by Im (f ) := Ω f dm is called the integration operator associated to m. Since Lp (m) ,→ L1 (m) (cf. [12, p. 122]), we can also consider the operator on Lp (m) defined by Z p p Im : Lp (m) → X, Im (f ) := f dm. Ω 1
The fact that L (m) is order continuous ensures that its topological dual L1 (m)0 coincides with its K¨ othe dual L1 (m)× (cf. [11, Corollary 2.6.5]) and we identify each functional ϕ ∈ L1 (m)0 with the (unique) function u ∈ L1 (µ) such R that hf, ϕi = Ω f u dµ for all f ∈ L1 (m). AsR usual, we write u dµ to denote the real-valued measure on (Ω, Σ) given by A u dµ. A R R For simplicity, from now on we just write the symbol instead of Ω to denote any ‘integral’ over Ω. Remark 1.1. Let λ be a control measure for m. The following statements are equivalent: (1) L1 (m) ,→ L1 (λ). (2) λ = u dµ for some u ∈ L1 (m)0 , u ≥ 0. 1 Proof. (1)⇒(2). We can write λ = uRdµ for some R u ∈ L (µ), u ≥ 0. Since the linear 1 functional on L (m) given by f f dλ = f u dµ is continuous, it follows that u belongs to L1 (m)0 . (2)⇒(1). For each f ∈ L1 (m) we have f ∈ L1 (λ) and Z kf kL1 (λ) = |f |u dµ ≤ kf kL1 (m) kukL1 (m)0 ,
hence L1 (m) ,→ L1 (λ).
2. Results Let r ≥ 1 and p, q > 1 be real numbers such that 1/r = 1/p + 1/q. Then the product f g belongs to Lr (m) whenever f ∈ Lp (m) and g ∈ Lq (m), with kf gkLr (m) ≤ kf kLp (m) kgkLq (m) , cf. [12, (3.88)]. Therefore, we can consider the bilinear continuous mapping Lp (m) × Lq (m) → X defined by Z r (f, g) Im (f g) = f g dm.
24
Calabuig, Rodr´ıguez and S´ anchez-P´erez
IEOT
In [8] this approach has been used to obtain factorization theorems for operators defined between Banach lattices satisfying adequate convexity/concavity properties. In our main result, Theorem 2.3 below, we discuss the r-concavity of the r integration operator Im : Lr (m) → X in terms of the bilinear mapping described r above. Moreover, we show that the r-concavity of Im is equivalent to the fact that r r 1 L (m) ,→ L (λ) ,→ L (m) for some control measure λ for m. We stress that the 1 1-concavity of Im is analyzed in [12] (see Section 3.4 and Chapter 6), where some relevant examples can also be found. To state our Theorem 2.3 we need the following: Definition 2.1. A set S ⊂ BL+1 (m)0 is positively norming for L1 (m) if kf kL1 (m) = sup h|f |, ϕi
for all f ∈ L1 (m).
ϕ∈S
Remark 2.2. Some examples of positively norming sets: • BL+1 (m)0 is positively norming for L1 (m). • If λ is a non-negative scalar measure on (Ω, Σ), then the singleton {χΩ } ⊂ BL+∞ (λ) is positively norming for L1 (λ). R • Given x0 ∈ BX 0 , define ϕx0 ∈ BL+1 (m)0 by ϕx0 (f ) := f d|hm, x0 i|. The RadonNikod´ ym derivative of |hm, x0 i| with respect to µ d|hm, x0 i| dhm, x0 i = dµ dµ is the function associated to ϕx0 via the identification L1 (m)0 ' L1 (m)× . Clearly, the set {ϕx0 : x0 ∈ BX 0 } is positively norming for L1 (m). Condition (3) in Theorem 2.3 involves some spaces of multiplication operators recently studied in [2]. Recall that if E1 and E2 are two Banach function spaces over non-negative scalar measures defined on (Ω, Σ), then an operator T : E1 → E2 is called a multiplication operator if there is (a unique) h ∈ E2 such that T (f ) = f h for all f ∈ E1 ; in this case we write T = Mh . The space M(E1 , E2 ) of all multiplication operators from E1 to E2 becomes a Banach space when endowed with the operator norm, cf. [10]. Theorem 2.3. Let r ≥ 1 and p, q > 1 be such that 1/r = 1/p+1/q. Let S ⊂ BL+1 (m)0 be a weak∗ compact convex set which is positively norming for L1 (m). The following statements are equivalent: (1) There is a constant K > 0 such that the inequality n Z n n
r r1
X
X X p1 q1
≤ K |fi |p |gi |q
fi gi dm
p q i=1
i=1 p
L (m)
i=1 q
L (m)
holds for every f1 , . . . , fn ∈ L (m) and g1 , . . . , gn ∈ L (m), n ∈ N. (2) There exist a constant K > 0 and u0 , v0 ∈ S such that the inequality
Z
Z p1 Z q1
p |f | u0 dµ |g|q v0 dµ
f g dm ≤ K
Vol. 64 (2009)
On the Structure of L1 of a Vector Measure
25
holds for every f ∈ Lp (m) and g ∈ Lq (m). (3) There exist u0 , v0 ∈ S such that: – u0 dµ and v0 dµ are control measures for m. – Each f ∈ Lp (u0 dµ) induces a multiplication operator Mf ∈ M(Lq (v0 dµ), L1 (m)). – The mapping f Mf is a one-to-one operator from Lp (u0 dµ) to q 1 M(L (v0 dµ), L (m)). r/p r/q (4) There exist u0 , v0 ∈ S such that for h0 = u0 v0 ∈ BL+1 (m)0 we have Lr (m) ,→ Lr (h0 dµ) ,→ L1 (m). (5) There is a control measure ν for m such that Lr (m) ,→ Lr (ν) ,→ L1 (m). r (6) The integration operator Im : Lr (m) → X is r-concave, that is, there is a constant K > 0 such that the inequality n n Z
X
r r1 r1 X
|fi |r r ≤K
fi dm i=1
i=1
L (m)
holds for every f1 , . . . , fn ∈ Lr (m), n ∈ N. Proof. (1)⇒(2). Observe first that S × S is a convex compact subset of the linear space L1 (m)0 × L1 (m)0 endowed with the (locally convex) product topology T obtained from (L1 (m)0 , weak∗ ). We now divide the proof of the implication (1)⇒(2) in several steps. Step 1. Fix f1 , . . . , fn ∈ Lp (m) and g1 , . . . , gn ∈ Lq (m). Using (1), the fact that S is positively norming and Young’s inequality we obtain n Z
r X
fi gi dm i=1
≤ K r sup
n Z X
h∈S
Kr r sup ≤ p h∈S
i=1 n Z X i=1
n Z pr X rq |fi |p h dµ sup |gi |q h dµ h∈S
(2.1)
i=1
n Z Kr r X |fi | h dµ + sup |gi |q h dµ . q h∈S i=1 p
Define the function φ : S × S → R (depending on the fi ’s and gi ’s) by Z n Z n Z
r X X 1 1
r p φ(u, v) := |fi | u dµ + |gi |q v dµ
fi gi dm − K r p q i=1 i=1
(2.2)
for all (u, v) ∈ S × S. Clearly, φ is affine (hence convex) and T-continuous. Inequality (2.1) can be read as inf (u,v)∈S×S
φ(u, v) ≤ 0
26
Calabuig, Rodr´ıguez and S´ anchez-P´erez
IEOT
and, since this infimum is attained (bear in mind that S × S is T-compact and φ is T-continuous), it follows that φ(uφ , vφ ) ≤ 0 for some (uφ , vφ ) ∈ S × S. Step 2. Let Φ be the family made up of all φ’s which can be constructed (as in Step 1 ) from different sets of functions in Lp (m) and Lq (m). We claim that Φ is a convex cone of RS×S . Indeed, take α1 , α2 ≥ 0 and, for each j ∈ {1, 2}, take nj ∈ N and choose functions f1,j , . . . , fnj ,j ∈ Lp (m) and g1,j , . . . , gnj ,j ∈ Lq (m) whose associated function belonging to Φ (via (2.2)) is denoted by φj . Let φ ∈ Φ be the function associated to the collection: 1/p
αj fi,j ∈ Lp (m),
1/q
αj gi,j ∈ Lq (m),
j ∈ {1, 2}, i ∈ {1, . . . , nj }.
A direct computation shows that α1 φ1 + α2 φ2 = φ. This proves the claim. Step 3. Ky Fan’s lemma (cf. [5, Lemma 9.10]) applied to the family Φ ensures the existence of u0 , v0 ∈ S such that φ(u0 , v0 ) ≤ 0 for all φ ∈ Φ. In particular, for each f1 ∈ Lp (m) and g1 ∈ Lq (m) we have Z
r
Z K r r Z Kr r
(2.3) |f1 |p u0 dµ + |g1 |q v0 dµ .
f1 g1 dm ≤ p q Take f ∈ Lp (m) and g ∈RLq (m). Suppose without loss of generality that a := R p ( |f | u0 dµ)1/p and b := ( |g|q v0 dµ)1/q are non-zero. Inequality (2.3) applied to f1 := (1/a)f ∈ Lp (m) and g1 := (1/b)g ∈ Lq (m) yields Z Z
r K r r Z 1 Kr r
p f g dm ≤ |f | u dµ + |g|q v0 dµ
0 r r p q a b pa qb Kr r Kr r + = Kr, = p q R R R hence k f g dmk ≤ K( |f |p u0 dµ)1/p ( |g|q v0 dµ)1/q . This completes the proof of the implication (1)⇒(2). (2)⇒(3). We first show that u0 dµ isRa control measure for m. To this end, take A ∈ Σ with (u0 dµ)(A) = 0, that is, χA u0 dµ = 0. Given any B ⊂ A with B ∈ Σ, condition (2) applied to f = χB and g = 1 implies that m(B) = 0, hence kmk(A) = 0. Similarly, v0 dµ is a control measure for m. Let Y1 ⊂ Lp (u0 dµ) and Y2 ⊂ Lq (v0 dµ) be the linear subspaces made up of all simple functions. Given f ∈ Y1 and g ∈ Y2 , their product f g is again a 1 simple function, R so it belongs to L (m). Its norm can be computed as kf gkL1 (m) = supz∈BL∞ (µ) k f gz dmk (cf. [12, Lemma 3.11]) and condition (2) yields
Z
kf gkL1 (m) = sup f gz dm ≤ K kf kLp (u0 dµ) kgkLq (v0 dµ) . z∈BL∞ (µ)
Thus we can define a bilinear continuous mapping P : Y1 × Y2 → L1 (m) by P(f, g) := f g. Since Y1 and Y2 are dense in Lp (u0 dµ) and Lq (v0 dµ), respectively, a standard argument ensures the existence of a bilinear continuous mapping P : Lp (u0 dµ) × Lq (v0 dµ) → L1 (m) extending P. We claim that f g ∈ L1 (m) and f g = P(f, g) whenever f ∈ Lp (u0 dµ) and g ∈ Lq (v0 dµ). Indeed, choose sequences (fn ) in Y1 and (gn ) in Y2 such that
Vol. 64 (2009)
On the Structure of L1 of a Vector Measure
27
kfn − f kLp (u0 dµ) → 0 and kgn − gkLq (v0 dµ) → 0. We can assume without loss of generality that fn → f u0 dµ-a.e. and gn → g v0 dµ-a.e. Then fn gn → f g µ-a.e. On the other hand, the continuity of P ensures that P(fn , gn ) = fn gn → P(f, g) in L1 (m), and so we have fn gn → P(f, g) in L1 (µ) as well (because µ = |hm, x00 i| for some x00 ∈ BX 0 ). It follows that f g ∈ L1 (m) and f g = P(f, g). Therefore, for each f ∈ Lp (u0 dµ) we can define a multiplication operator Mf : Lq (v0 dµ) → L1 (m),
Mf (g) := f g,
Mf is a one-to-one with norm kMf k ≤ kPk kf kLp (u0 dµ) . The natural mapping f operator from Lp (u0 dµ) to M(Lq (v0 dµ), L1 (m)), as required. r/p r/q (3)⇒(4). Set h0 := u0 v0 . Since 0 ≤ h0 ≤ pr u0 + rq v0 (by Young’s inequality) and pr u0 + rq v0 ∈ BL+1 (m)0 , we also have h0 ∈ BL+1 (m)0 . Moreover, since u0 dµ and v0 dµ are control measures for m, we can assume without loss of generality that u0 > 0 and v0 > 0 pointwise. Fix h ∈ Lr (h0 dµ). Set r r v pq u pq r r 0 0 ∈ Lp (u0 dµ) and g := |h| q ∈ Lq (v0 dµ). f := sign(h)|h| p u0 v0 According to (3), h = f g ∈ L1 (m) and khkL1 (m) ≤ kMf k kgkLq (v0 dµ) ≤ K kf kLp (u0 dµ) kgkLq (v0 dµ) for some constant K > 0 independent of h. But p1 Z Z q1 r |h| h0 dµ kf kLp (u0 dµ) kgkLq (v0 dµ) = |h|r h0 dµ = khkLr (h0 dµ) , hence khkL1 (m) ≤ KkhkLr (h0 dµ) . This shows that the ‘identity’ mapping from Lr (h0 dµ) to L1 (m) is a welldefined one-to-one operator. In particular, h0 dµ is a control measure for m and so L1 (m) ,→ L1 (h0 dµ), hence Lr (m) ,→ Lr (h0 dµ). (4)⇒(5). Just bear in mind that the condition Lr (m) ,→ Lr (h0 dµ) implies that h0 dµ is a control measure for m. (5)⇒(6). By Remark 1.1 we can write λ = h dµ for some h ∈ L1 (m)0 with h ≥ 0. We can assume further that h ∈ BL+1 (m)0 . Let K > 0 be a constant such that kf kL1 (m) ≤ Kkf kLr (λ) for all f ∈ Lr (λ). Given simple functions f1 , . . . , fn ∈ Lr (m), we have n Z n
r r1 X X r1
≤ kfi krL1 (m)
fi dm i=1
i=1
≤K
n X
kfi krLr (λ)
r1
i=1
=K
=K
n Z X
r1 |fi |r dλ
i=1
n Z X i=1
|fi |r
n
X r1 r1
h dµ ≤K |fi |r i=1
Lr (m)
.
28
Calabuig, Rodr´ıguez and S´ anchez-P´erez
IEOT
Since simple functions are dense in Lr (m) (because this space is order continuous, r cf. [12, Proposition 3.28]), the r-concavity of Im can be deduced easily from the previous chain of inequalities. To this end, it suffices to bear in mind that the mapping from Lr (m) to L1 (m) given by f |f |r is continuous because, as in the case of scalar measures (cf. [13, Chapter 3, Exercise 24]), the inequality
r r−1
|f | − |g|r 1 r ≤ r kf kr−1 Lr (m) + kgkLr (m) kf − gkL (m) L (m) holds for all f, g ∈ Lr (m). (6)⇒(1). Given f1 , . . . , fn ∈ Lp (m) and g1 , . . . , gn ∈ Lq (m), each product r fi gi belongs to Lr (m) and the r-concavity of Im yields n n Z
X
r r1 r1 X
(2.4) ≤ K |fi gi |r r .
fi gi dm L (m)
i=1
i=1
By H¨ older’s inequality (for real numbers!) we have n n n X pr X rq X |fi gi |r ≤ |fi |p |gi |q , i=1
i=1
i=1
0
hence for each x ∈ BX 0 the inequality Z X Z X n n n pr X rq |fi gi |r d|hm, x0 i| ≤ |fi |p |gi |q d|hm, x0 i| i=1
i=1
i=1
holds and again H¨ older’s inequality (now for integrals!) applied to the right hand side of the previous inequality allows us to conclude that Z X n |fi gi |r d|hm, x0 i| i=1
≤
n Z X
n pr Z X rq |fi |p d|hm, x0 i| |gi |q d|hm, x0 i|
i=1
i=1
n
X p1 r
≤ |fi |p p
L (m)
i=1
n
X 1 r
q q |g |
q i
As x0 ∈ BX 0 is arbitrary, it follows that n n
X
X r1 p1
|fi gi |r ≤ |fi |p
r i=1
L (m)
i=1
.
L (m)
i=1
Lp (m)
n
X q1
|gi |q
i=1
Lq (m)
,
which combined with (2.4) yields the inequality in (1). The proof of the theorem is over. Remark 2.4. In the previous theorem, the equivalence (1)⇔(2) can also be obtained as a particular case of a result of Defant [4, Theorem 1]. The equivalence (4)⇔(6) can be found essentially in [12, Section 6.4], see in particular Lemma 6.39, Proposition 6.40 and Theorem 6.41.
Vol. 64 (2009)
On the Structure of L1 of a Vector Measure
29
Given 1 ≤ p < ∞, a Banach function space E is called p-concave (resp. pconvex) if the identity operator on E is p-concave (resp. p-convex), that is, there is a constant K > 0 such that the inequality n n
X X p1 p1
(resp. the reverse one) kzi kpE ≤K |zi |p i=1
i=1
E
holds for every z1 , . . . , zn ∈ E, n ∈ N. It is known that E is order isomorphic to the Lp space of a non-negative scalar measure whenever it is simultaneously p-concave and p-convex, cf. [9, p. 59]. As Lp (m) is always p-convex, the following result (cf. [12, Proposition 3.74]) can be seen as a specialized version of the previous statement. Corollary 2.5. The following statements are equivalent: (1) Lp (m) is p-concave for some 1 ≤ p < ∞. (2) L1 (m) is 1-concave. (3) Lp (m) is p-concave for every 1 ≤ p < ∞. 1 (4) The integration operator Im : L1 (m) → X is 1-concave. + (5) There is h0 ∈ BL1 (m)0 such that the ‘identity’ map from L1 (m) to L1 (h0 dµ) is an isomorphism. (6) There is a control measure λ for m such that L1 (m) is order isomorphic to L1 (λ). Proof. The equivalence (1)⇔(2)⇔(3) follows from a simple computation. (2)⇒(4) is straightforward. (4)⇒(5) follows from the implication (6)⇒(4) in Theorem 2.3 (taking there r = 1). For (5)⇒(6) just observe that h0 dµ is a control measure for m. Finally, the implication (6)⇒(2) is a consequence of the 1-concavity of L1 (λ) and the general fact that p-concavity is preserved by order isomorphisms (cf. [9, Proposition 1.d.9]). Following [1], we say that an operator T from a Banach function space E to X is positive p-summing (where 1 ≤ p < ∞) if there is a constant K > 0 such that the inequality n n X p1 X p1 kT zi kp ≤ K sup |hzi , z 0 i|p z 0 ∈BE 0
i=1
i=1
+
holds for every z1 , . . . , zn ∈ E . This property lies strictly between being absolutely p-summing and being p-concave, see [1]. For more information about this subject, we refer the reader to [5]. We will need the following folk characterization of positive p-summing operators. Remark 2.6. Let T be an operator from a Banach function space E to X and let 1 ≤ p < ∞. Then T is positive p-summing if and only if there is a constant K > 0 such that the inequality n n X p1 X p1 kT zi kp |h|zi |, z 0 i|p ≤ K sup i=1
z 0 ∈BE 0
i=1
30
Calabuig, Rodr´ıguez and S´ anchez-P´erez
IEOT
holds for every z1 , . . . , zn ∈ E. We arrive at the last result of the paper. Theorem 2.7. Let E be an order continuous Banach function space having weak order unit. The following statements are equivalent: (1) For every vector measure ν representing E and every 1 ≤ p < ∞, the integration operator Iν1 is positive p-summing. (2) There exist a vector measure ν representing E and 1 ≤ p < ∞ such that Iν1 is positive p-summing. (3) There exist a vector measure ν representing E and 1 ≤ p < ∞ such that Iν1 is absolutely p-summing. (4) E is order isomorphic to the L1 space of a non-negative scalar measure. Proof. (1)⇒(2) and (3)⇒(2) are obvious. For the implication (4)⇒(3), just bear in mind that the integration operator of the L1 space of a non-negative scalar measure has rank 1 and, therefore, it is absolutely p-summing for any 1 ≤ p < ∞. (2)⇒(4). The case p = 1 follows from Corollary 2.5 since Iν1 is p-concave. Assume now that p > 1 and let q > 1 such that 1/p + 1/q = 1. By Corollary 2.5, we only have to check that Lp (ν) is p-concave. To this end, fix f1 , . . . , fn ∈ Lp (ν). Take arbitrary g1 , . . . , gn ∈ BLq (ν) and denote by µ0 a fixed Rybakov control measure for ν. Since Iν1 is positive p-summing, Remark 2.6 ensures that n n Z
p X X
|h|fi gi |, hi|p
fi gi dν ≤ K p sup i=1
= Kp = Kp
h∈BL1 (ν)0 i=1 n X
sup
h|fi gi |, |h|ip
h∈BL1 (ν)0 i=1 n Z X
sup
(2.5)
|fi gi ||h| dµ0
p
h∈BL1 (ν)0 i=1
for some constant K > 0 which depends only on Iν1 . For each 1 ≤ i ≤ n and each older’s inequality implies h ∈ BL1 (ν)0 , H¨ Z Z p1 Z q1 p |fi gi ||h| dµ0 ≤ |fi | |h| dµ0 |gi |q |h| dµ0 Z p1 Z p1 p ≤ |fi | |h| dµ0 kgi kLq (ν) ≤ |fi |p |h| dµ0 , which combined with (2.5) yields n Z n Z
p X X
|fi |p |h| dµ0
fi gi dν ≤ K p sup h∈BL1 (ν)0 i=1
i=1
=K
p
sup h∈BL1 (ν)0
Z X n i=1
n
X p1 p
|fi |p |h| dµ0 ≤ K p |fi |p p i=1
L (ν)
.
Vol. 64 (2009)
On the Structure of L1 of a Vector Measure
31
R Since each kfi kLp (ν) can be computed as the supremum of k fi g dνk where g runs over BLq (ν) (cf. [12, (3.64)]), we conclude that n X
kfi kpLp (ν)
p1
n
X p1
≤ K |fi |p i=1
i=1
Lp (ν)
.
It follows that Lp (m) is p-concave, as required. (4)⇒(1). Let T : L1 (λ) → L1 (ν) be an order isomorphism, where λ is a nonnegative scalar measure. We can assume without loss of generality thatRkT −1 k = 1. Then the functional h ∈ BL+1 (ν)0 defined by the formula hf, hi := T −1 (f ) dλ satisfies Z Z kf kL1 (ν) −1 h|f |, hi = T (|f |) dλ = |T −1 (f )| dλ = kT −1 (f )kL1 (λ) ≥ kT k for all f ∈ L1 (ν). Given f1 , . . . , fn ∈ L1 (ν)+ , we have n n n Z
X X X
hfi , hi ≤ kT k kfi kL1 (ν) ≤ kT k
fi dν ≤ i=1
i=1
i=1
sup
n X
z 0 ∈BL1 (ν)0 i=1
|hfi , z 0 i|.
Therefore, the operator Iν1 is positive 1-summing. By [1, Proposition 2], Iν1 is also positive p-summing for all 1 ≤ p < ∞. The proof is over. Remark 2.8. For an order continuous Banach function space E having weak order unit, in general the statements of Theorem 2.7 are not equivalent to the following one: For every vector measure ν representing E and every 1 ≤ p < ∞, the integration operator Iν1 is absolutely p-summing. Indeed, observe that the E-valued measure A χA (the characteristic function of A) represents E and its corresponding integration operator is just the identity mapping on E, which is not absolutely p-summing (for any 1 ≤ p < ∞) whenever E is infinite-dimensional. We finish the paper with two questions: 1. We have shown that concavity type properties for the integration operator characterize the continuous injection of Lebesgue spaces in L1 (m). Is it possible to generalize these ideas to characterize the continuous injection of other classical spaces (Lorentz, Orlicz, etc.) in L1 (m)? 2. Lozanovskii lattice interpolation spaces obtained from Lebesgue spaces and L1 (m) are a well described class of Banach function spaces. Which are the vector-valued norm inequalities for the integration operator that characterize the continuous injection of such spaces in L1 (m)?
32
Calabuig, Rodr´ıguez and S´ anchez-P´erez
IEOT
References [1] O. Blasco, Positive p-summing operators on Lp -spaces, Proc. Amer. Math. Soc. 100 (1987), no. 2, 275–280. MR 884466 (88c:47033) [2] J.M. Calabuig, F. Galaz-Fontes, E. Jim´enez-Fern´ andez and E.A. S´ anchez-P´erez, Strong factorization of operators on spaces of vector measure integrable functions and unconditional convergence of series, Math. Z. 257 (2007), no. 2, 381–402. MR 2324807 (2008f:46058) [3] G.P. Curbera, Operators into L1 of a vector measure and applications to Banach lattices, Math. Ann. 293 (1992), no. 2, 317–330. MR 1166123 (93b:46083) [4] A. Defant, Variants of the Maurey-Rosenthal theorem for quasi K¨ othe function spaces, Positivity 5 (2001), no. 2, 153–175. MR 1825653 (2002a:46031) [5] J. Diestel, H. Jarchow and A. Tonge, Absolutely summing operators, Cambridge Studies in Advanced Mathematics, vol. 43, Cambridge University Press, Cambridge, 1995. MR 1342297 (96i:46001) [6] J. Diestel and J. J. Uhl, Jr., Vector measures, American Mathematical Society, Providence, R.I., 1977, With a foreword by B. J. Pettis, Mathematical Surveys, No. 15. MR 0453964 (56 #12216) [7] A. Fern´ andez, F. Mayoral, F. Naranjo, C. S´ aez and E.A. S´ anchez-P´erez, Spaces of p-integrable functions with respect to a vector measure, Positivity 10 (2006), no. 1, 1–16. MR 2223581 (2006m:46053) [8] A. Fern´ andez, F. Mayoral, F. Naranjo, C. S´ aez and E.A. S´ anchez-P´erez, Spaces of integrable functions with respect to a vector measure and factorizations through Lp and Hilbert spaces, J. Math. Anal. Appl. 330 (2007), no. 2, 1249–1263. MR 2308439 (2008f:46034) [9] J. Lindenstrauss and L. Tzafriri, Classical Banach spaces. II Function spaces, Results in Mathematics and Related Areas, vol. 97, Springer-Verlag, Berlin, 1979. MR 540367 (81c:46001) [10] L. Maligranda and L.E. Persson, Generalized duality of some Banach function spaces, Nederl. Akad. Wetensch. Indag. Math. 51 (1989), no. 3, 323–338. MR 1020026 (91b:46028) [11] P. Meyer-Nieberg, Banach lattices, Universitext, Springer-Verlag, Berlin, 1991. MR 1128093 (93f:46025) [12] S. Okada, W.J. Ricker and E.A. S´ anchez-P´erez, Optimal domain and integral extension of operators. Acting in function spaces, Operator Theory: Advances and Applications, vol. 180, Birkh¨ auser Verlag, Basel, 2008. MR 2418751 [13] W. Rudin, Real and complex analysis, Third Edition, McGraw-Hill Book Co., New York, 1987. MR 924157 (88k:00002) J.M. Calabuig Instituto Universitario de Matem´ atica Pura y Aplicada (IUMPA-UPV) Universidad Polit´ecnica de Valencia Camino de Vera, s/n, 46022 Valencia Spain e-mail:
[email protected]
Vol. 64 (2009)
On the Structure of L1 of a Vector Measure
J. Rodr´ıguez Departamento de Matem´ atica Aplicada Facultad de Inform´ atica Universidad de Murcia 30100 Espinardo (Murcia) Spain e-mail:
[email protected] E.A. S´ anchez-P´erez Instituto Universitario de Matem´ atica Pura y Aplicada (IUMPA-UPV) Universidad Polit´ecnica de Valencia Camino de Vera, s/n, 46022 Valencia Spain e-mail:
[email protected] Submitted: December 16, 2008.
33
Integr. equ. oper. theory 64 (2009), 35–59 c 2009 Birkh¨
auser Verlag Basel/Switzerland 0378-620X/010035-25, published online April 24, 2009 DOI 10.1007/s00020-009-1679-9
Integral Equations and Operator Theory
State Space Formulas for a Solution of the Suboptimal Nehari Problem on the Unit Disc Ruth F. Curtain and Mark R. Opmeer
Abstract. We give state space formulas for a (“central”) solution of the suboptimal Nehari problem for functions defined on the unit disc and taking values in the space of bounded operators in separable Hilbert spaces. Instead of assuming exponential stability, we assume a weaker stability concept (the combination of input-, output- and input-output stability), which allows us to solve the problem for general H-infinity functions. Mathematics Subject Classification (2000). Primary 47B35; Secondary 41A30, 47N70, 93B28. Keywords. Infinite-dimensional linear systems, J-spectral factorizations, Hankel operators, Lyapunov equations, Nehari problem.
1. Introduction The Nehari problem on the unit disc can be formulated as follows. Given (separable) Hilbert spaces U and Y and the coefficients Gn ∈ L(U, Y ) of the power series ∞ X
Gn z n ,
n=1
find coefficients Gn with n ≤ 0 such that the Laurent series ∞ X n=−∞
Gn z n ,
(1)
36
Curtain and Opmeer
IEOT
defines a L∞ (T; L(U, Y )) function on the unit circle. It is well-known that the Hankel operator H : l2 (N; U ) → l2 (N; Y ) formed from the problem data as G1 G 2 G3 . . . G2 G 3 G3 .. . plays a crucial role: the problem is solvable if and only if H is a bounded operator and the norm of H equals the infimum of the L∞ norms of all the Laurent series solutions. In the scalar case this is due to Nehari [13] and in the Hilbert space case it is due to Page [17] (see also Nikolskii [14] and Peller [18] for treatments in book form and further references). The suboptimal Nehari problem is: for a given σ > kHk, parameterize all solutions with L∞ norm smaller than or equal to σ. This problem was solved in the scalar case by Adamjan, Arov and Krein [1, 2] and in the Hilbert space case by Kheifets [12] (see also Peller [18]). The suboptimal Nehari problem has many applications in control theory, e.g. the problem of designing robustly stabilizing controllers (see e.g. Curtain and Zwart [8]). For such applications the above mentioned abstract existence and parametrization results are not enough. More specific information about (at least) one of the solutions is needed in the form of so-called state space formulas, which we explain below. In the applications to control theory that we have in mind the power series (1) defines a function in the Hardy space H∞ (D; L(U, Y )) of the unit disc. This is often called input-output stability. Moreover, there is a realization in terms of operators A ∈ L(X), B ∈ L(U, X) and C ∈ L(X, Y ), where the Hilbert space X is called the state space, and Gn = CAn+1 B, n > 0. Whenever the Hankel operator is bounded, there is always a ‘trivial’ state space realization of (1) called the shift realization with X = l2 (N; Y ) and (Ax)n = xn+1 ,
Bu = (Gn u)n∈N ,
Cx = x1 .
In fact, there are infinitely many state space realizations. However, in control applications the state space parameters A, B and C are given and they have physical significance. The to be determined operators Gn with n ≤ 0 should also ˜ B ˜ and C˜ be given in state space form, since these state space parameters A, are needed for implementation of the controller. Consequently, in this paper we ˜ ∈ L(U, X) and seek expressions for the to be determined operators A˜ ∈ L(X), B −n−1 ˜ ˜ ˜ ˜ C ∈ L(X, Y ) in terms of A, B, C such that Gn = C A B for n < 0. This is what we mean by a state space solution to the suboptimal Nehari problem. Since the state space solutions given in Section 7 involve the expressions LB =
∞ X k=0
A∗k B ∗ BAk ,
LC =
∞ X k=0
Ak CC ∗ A∗k ,
(2)
Vol. 64 (2009)
The Suboptimal Nehari Problem
37
we require that both of these expressions be in L(X). This is satisfied if and only if the realization is input and output stable (see Section 2). A stronger sufficient condition is that A is exponentially stable, i.e., its spectral radius is strictly less than one. Our three basic assumptions of input stability, output stability and input-output stability are much weaker than the exponential stability assumption. It is interesting to note that our state space formulas applied to the specific case of the shift realization give an explicit formula for Gn with n ≤ 0 in terms of the Hankel operator H, the shift τ and the first element e1 of the standard basis of l2 (N): −n+1 XHe1 u , Gn u = −HH ∗ τ ∗ Tτ X −1 1
with X = (σ 2 − HH ∗ )−1 , the inverse of the square of the defect operator of H and Tτ = (σ 2 − τ HH ∗ τ ∗ )−1 , the inverse of the square of the defect operator of H ∗ τ ∗ . Since the Hankel operator is bounded, the condition LB , LC ∈ L(X) is automatically satisfied for the shift realization. So in the light of the known results on the Nehari problem the condition LB , LC ∈ L(X) is a natural one. Note also that the above formulas in terms of the Hankel operator make perfect sense even if the power series is not in the Hardy space H∞ . Although our proof breaks down in this case, we conjecture that the formulas remain valid. We now compare our results with existing results in the literature on state space formulas for solutions of the suboptimal Nehari problem. There are many results in the half-plane case under the assumption of exponential stability: e.g. Curtain and Zwart [8], Glover et al. [10], Ran [19], Curtain and Ran [7], Curtain and Zwart [3], Curtain and Ichikawa [4]. We generalized these results for systems with realizations that are input stable, output stable and input-output stable in [5], [6, Section 6]. As already mentioned, not every H∞ function has an exponentially stable realization, but it does always possess an input stable, output stable and input-output stable realization. The best existing result for the disc case is by Foias et al in [9, Section VI.8] where they assume exponential stability of the state space realization. Their approach uses commutant lifting results which is very different from our approach and unfortunately the formulas are given in a different form. (Their central solution does agree with ours). In contrast, we use the J-spectral factorization approach that we used in the half-plane case [5], [6, Section 6] adapted to the case of the disc. In obtaining the formulas for the J-spectral factorization we were aided by the exposition for the case of rational functions in Ionescu et al ˜ should read R). ˆ [11, Section 8] (in spite of the typo in (8.94) there: R Our paper is arranged as follows. We begin in Section 2 with some background on infinite-dimensional discrete-time state space systems and in Section 3 we introduce the special Riccati equations that lie behind the formulas for the solution to the suboptimal Nehari problem. In Section 4 we introduce and solve the
38
Curtain and Opmeer
IEOT
associated J-spectral factorization problem. For notational simplicity in the proofs we assume that σ = 1. The inverse of the solution to the J-spectral factorization problem found in Section 4 is analyzed in Section 5. These results are then used in Section 6 to obtain an explicit state space solution to the suboptimal Nehari problem for the case σ = 1. Finally, in Section 7 the solution to the general case (where σ may not equal one) is derived. In the sequel we shall use the following notation G(z) =
∞ X n=1
Gn z n ,
Z(z) =
0 X n=−∞
Gn
1 , zn
K(z) =
0 X
Gn z n .
n=−∞
2. Transfer functions, characteristic functions and stability We recall some basic facts on infinite-dimensional discrete-time state space systems (a more comprehensive treatment can be found in Opmeer [16]). For the state space system Σ(A, B, C, D) defined by a bounded operator A B X X ∈L , U Y C D with U , X, Y separable Hilbert spaces, we define the transfer function G(z) = D +
∞ X
CAi Bz i+1 .
i=0
The system is called input-output stable if G is analytic and uniformly bounded on the unit disc, i.e. G ∈ H∞ (D, L(U, Y )). The Hankel operator of the system has the infinite matrix representation CB CAB CA2 B . . . CAB CA2 B CA3 B . . . CA2 B CA3 B CA4 B . . . . .. .. .. .. . . . . Note that all of this is consistent with what was mentioned in the introduction (where D = 0). The characteristic function of the state space system is G(z) := Cz(I − −1 zA)−1 B + D, which for z 6= 0 may also be written as C z1 − A B + D. The characteristic function and the transfer function of a state space system are equal for |z| < 1/r(A), where r(A) is the spectral radius of the operator A, but they might have different values at other points (see [8, Example 4.3.8] or [21]). If one assumes exponential stability (also called power stability), i.e. r(A) < 1, then G = G on the closed unit disc and the difference is insignificant for the Nehari problem. In this article we do not assume exponential stability and therefore we do have to be careful about this difference. The main advantage of the characteristic
Vol. 64 (2009)
The Suboptimal Nehari Problem
39
function is that it lends itself better for algebraic computations, but it is the transfer function of the system that we are in fact interested in. At several points in this article we will need to find a state space realization of the inverse of a characteristic function given a realization of that function itself. The following simple lemma will be used for that purpose. Lemma 2.1. The characteristic function of the state space system Σ(A, B, C, D) is invertible if and only if D is invertible. In this case it is the characteristic function of the state space system Σ(A − BD−1 C, BD−1 , −D−1 C, D−1 ). Proof. By multiplying out we obtain # " # " −1 −1 1 1 −1 −1 −1 −1 I −A B + D × −D C I − A + BD C BD + D C z z −1 1 1 1 = I+C I −A × I − A + BD−1 C − I − A − BD−1 C z z z −1 1 I − A + BD−1 C BD−1 × z = I. That the product in the reverse order is also the identity follows similarly.
The following stability concept plays an important role in this article. Here H2 (D, Y ) is the usual Hardy space. Definition 2.2. A state space system is called output stable if, with ∞ X C(z) := CAi z i , i=0
for every x ∈ X we have C(·)x ∈ H2 (D, Y ). Note that the transfer function of an output stable system, being equal to D + zC(z)B, is analytic in the open unit disc. Output stability is equivalent to the observation Lyapunov equation A∗ LA − L + C ∗ C = 0
(3)
having a nonnegative, selfadjoint solution. The observability gramian LC is the smallest nonnegative, selfadjoint solution of the observation Lyapunov equation. An explicit formula for the observability gramian is given in (2). A state space system is input stable if the dual system Σ(A∗ , C ∗ , B ∗ , D∗ ) is output stable. The controllability gramian LB of the system is the observability gramian of this dual system. It is is the smallest nonnegative, selfadjoint solution of the control Lyapunov equation ALA∗ − L + BB ∗ = 0. The transfer function of an input stable system is analytic in the open unit disc, just as the transfer function of an output stable system is, as we saw above.
40
Curtain and Opmeer
IEOT
The following key result was first established, in a different context, in Weiss and Weiss [20] for the continuous-time case. See also Oostveen [15, Lemma 4.2.6]. The dashes indicate unimportant entries. Lemma 2.3. Let LC be the observability gramian of the output stable and inputoutput stable system Σ(A, B, C, −). Then Σ(A, −, B ∗ LC A, −) is output stable. Proof. Since the system is input-output stable we have G ∈ H∞ (D, L(U, Y )) and since it is output stable we have Cx ∈ H2 (D, Y ) for all x ∈ X. It follows that G∗ Cx ∈ L2 (T, U ) for all x ∈ X with T the unit circle. From this it follows that the analytic part of G∗ Cx is in H2 (D, U ). We calculate for z ∈ T (so that z¯ = 1/z): ! ∞ ! ∞ X X ∗ ∗ ∗k ∗ −k−1 m m CA z G(z) C(z) = B A C z . m=0
k=0
It follows that the analytic part is: ∞ ∞ X X B ∗ A∗k C ∗ CAm z m−k−1 . k=0 m=k+1
Substituting j = m − k − 1 we obtain for this analytic part ∞ X ∞ X B ∗ A∗k C ∗ CAk Aj+1 z j , j=0 k=0
and using that LC =
∞ X
A∗k C ∗ CAk ,
k=0
we can rewrite this as
∞ X
B ∗ LC AAj z j .
j=0
It follows that the analytic part of G∗ C equals the ‘C’ function of the system Σ(A, −, B ∗ LC A, −) defined in Definition 2.2. It follows from this definition and the above that this system is output stable. Our stability assumption on the state space realization Σ(A, B, C, D) of G is that it is input stable, output stable and input-output stable. This assumption is implied by and is strictly weaker than exponential stability. Any function in H∞ (D, L(U, Y )) has a realization that satisfies our stability assumption (for example the shift realization mentioned in the introduction).
3. Algebraic Riccati equations In this section we introduce two algebraic Riccati equations that play a key role in the solution of the suboptimal Nehari problem. We first recall some general facts about algebraic Riccati equations.
Vol. 64 (2009)
The Suboptimal Nehari Problem
41
Definition 3.1. The control algebraic Riccati equation of a system Σ(A, B, C, D) is the equation A∗ QA − Q + C ∗ C = F ∗ SF, where S := I + D∗ D + B ∗ QB, F := −S −1 (B ∗ QA + D∗ C). The closed-loop system corresponding to a nonnegative selfadjoint solution Q is A + BF BS −1/2 (4) F S −1/2 . C + DF DS −1/2 The filter algebraic Riccati equation of a system Σ(A, B, C, D) is the equation AP A∗ − P + BB ∗ = LRL∗ , where R := I + DD∗ + CP C ∗ , L := −(AP C ∗ + BD∗ )R−1 . The following theorem can be proven as was done for the corresponding continuous-time result in [6] (see [16, Proposition 6.34, Corollary 6.40]). Lemma 3.2. If the control Riccati equation of Σ(A, B, C, D) has a nonnegative, selfadjoint solution Q, then the closed-loop system (4) is output stable and inputoutput stable. Moreover, the H∞ norm of its transfer function is bounded from above by one. If the filter algebraic Riccati equation of Σ(A, B, C, D) also has a nonnegative, selfadjoint solution, then the afore-mentioned closed-loop system is also input stable. Standing hypothesis. From here on, until section 7, we assume that G ∈ H∞ (D, L(U, Y )) is such that its Hankel operator has norm strictly smaller than one and G(0) = 0. We take σ = 1 and fix an input stable, output stable and input-output stable realization Σ(A, B, C, 0) of G. The spectral radius of the product LB LC of the controllabilty and observability gramians equals the square of the norm of the Hankel operator HG (see [16, Lemma 3.1.8]). Since we take σ = 1 > kHG k it follows that I − LB LC has a bounded inverse and that, with
∗
N : = (I − LB LC )−1 ,
(5)
W : = N LB ,
(6)
X : = LC N,
(7)
∗
we have W = W ≥ 0, X = X ≥ 0. Some nontrivial algebraic manipulations show that W and X satisfy the algebraic Riccati equations given below. We first define the following operators TX := (I + B ∗ XB)1/2 , TW := (I + CW C ∗ )1/2 .
(8)
42
Curtain and Opmeer
IEOT
Lemma 3.3. The nonnegative selfadjoint operator X defined by (7) is a solution of the control algebraic Riccati equation of the system A B , (9) −1 TW CN 0 −2 −2 ∗ A∗ XA − X + N ∗ CTW CN = A∗ XBTX B XA.
The nonnegative selfadjoint operator W defined by (6) is a solution of the filter algebraic Riccati equation of the system −1 A N BTX , (10) C 0 −2 ∗ ∗ −2 AW A∗ − W + N BTX B N = AW C ∗ TW CW A∗ .
(11)
Proof. We only give a proof the case of the system (10) since that for the system (9) is very similar. We first note that the following identities hold: I + BB ∗ X = (I − ALB A∗ LC ) (I − LB LC )−1 , ∗
∗
−1
I + C CW = (I − A LC ALB ) (I − LC LB )
.
(12) (13)
We will prove only (13) since the proof for (12) is similar. Using the definition (6) of W and the observation Lyapunov equation (3) we have I + C ∗ CW = I + (LC − A∗ LC A) LB (I − LC LB )−1 . This can be rewritten as (I − LC LB + LC LB − A∗ LC ALB ) (I − LC LB )−1 , which simplifies to the right-hand side of (13). Our goal is to show that (11) holds. We first note that by the definition (5) of N we have N B(I + B ∗ XB)−1 B ∗ N ∗ = (I − LB LC )−1 (I + BB ∗ X)−1 BB ∗ (I − LC LB )−1 . Next we use the control Lyapunov equation to rewrite this as (I − LB LC )−1 (I + BB ∗ X)−1 (LB − ALB A∗ ) (I − LC LB )−1 , which by (12) in turn equals −1
(I − ALB A∗ LC )
(LB − ALB A∗ ) (I − LC LB )−1 .
Rewriting this first as −1
(I − ALB A∗ LC )
([I − ALB A∗ LC ]LB − ALB A∗ [I − LC LB ]) (I − LC LB )−1
and then simplifying this via −1
LB (I − LC LB )−1 − (I − ALB A∗ LC )
ALB A∗
to −1
LB (I − LC LB )−1 − ALB (I − A∗ LC ALB )
A∗
Vol. 64 (2009)
The Suboptimal Nehari Problem
43
and using the definition (6) of W gives W − AW (I − LC LB )(I − A∗ LC ALB )−1 A∗ . We now use (13) and obtain for the above W − AW (I + C ∗ CW )−1 A∗ , which we first rewrite as W − AW (I + C ∗ CW )−1 (−C ∗ CW + I + C ∗ CW ) A∗ and subsequently simplify to W + AW (I + C ∗ CW )−1 C ∗ CW A∗ − AW A∗ . So we finally obtain N B(I + B ∗ XB)−1 B ∗ N ∗ = W + AW (I + C ∗ CW )−1 C ∗ CW A∗ − AW A∗ , which is easily seen to be equivalent to the desired (11).
From Lemmas 3.2 and 3.3 we obtain the following. Lemma 3.4. The system B AX −T −2 B ∗ XA 0 , X −1 TW CN 0
(14)
AX := (I + BB ∗ X)−1 A,
(15)
where is output stable and input-output stable. The system −2 AW −AW C ∗ TW C 0
−1 N BTX 0
,
(16)
where AW := A(I + W C ∗ C)−1 ,
(17)
is input stable and input-output stable. Proof. The system (14) is the closed-loop system (up to an insignificant similarity transformation in the input space) of the control Riccati equation for the system (9). So by Lemma 3.2 it is output stable and input-output stable. The argument for the system (16) is similar, but based on the filter Riccati equation for (10). The following important result shows that N intertwines AX and AW . Lemma 3.5. The following identity holds: N AX = AW N.
(18)
44
Curtain and Opmeer
IEOT
Proof. Using the definitions of AX , AW and N we see that (18) is equivalent to A(I − LB LC )(I + W C ∗ C) = (I + BB ∗ X)(I − LB LC )A, and using X = LC N and W = N LB this in turn is equivalent to A(I − LB LC + LB C ∗ C) = (I + BB ∗ LC − LB LC )A, which is easily seen to be true by using C ∗ C = LC − A∗ LC A as well as BB ∗ = LB − ALB A∗ . The following formula that relates N A to AN will also be useful. Lemma 3.6. The following identity holds: N A = AN − N ALB C ∗ CN + N BB ∗ LC AN. ∗
(19)
∗
Proof. This follows easily after substituting C C = LC − A LC A and BB ∗ = LB − ALB A∗ .
4. J-spectral factorization The following J-spectral factorization plays a crucial role. I G∗ −I 0 I 0 −I 0 −X X∗ ≤ 0. 0 I 0 I G I 0 I The objective is to find a analytic function on the open unit disc X such that the above inequality holds on the open unit disc. This function X is subsequently used to define a function K and the above inequality is used to show that this K is a solution of the suboptimal Nehari problem. It was first realized in [6] that it is this inequality that is important and not equality on the unit circle, which was used in all previous approaches via J-spectral factorization to the Nehari problem. Our candidate solution is the following. Definition 4.1. Denote by X the transfer function and by X the characteristic function of the system −1 −1 A −N BTX AW C ∗ TW −1 −1 B ∗ LC A . (20) TX B ∗ LC AW C ∗ TW C 0 TW By an application of Lemma 2.3 we obtain the following stability result. Lemma 4.2. The system given by (20) is output stable. Proof. By our standing hypothesis Σ(A, −, C, −) is input-output and output stable. It then immediately follows from Lemma 2.3 that Σ(A, −, [B ∗ LC A; C], −) is output stable and then the same conclusion can be made about the system (20). It will prove useful to have the following alternative formula for X.
Vol. 64 (2009)
The Suboptimal Nehari Problem
45
Lemma 4.3. We have X = X1 T with X1 the transfer function of the system A −N B N ALB C ∗ B ∗ LC A (21) I 0 C 0 I and
−1 −1 TX B ∗ LC AW C ∗ TW T := . 0 TW The corresponding result for characteristic functions also holds.
(22)
Proof. The only thing to prove is that −1 −1 Bh := [−N B, N ALB C ∗ ] T = −N BTX , AW C ∗ TW ,
(23)
for the first component this is trivial and for the second component this amounts to proving that −1 −1 −N BB ∗ LC AW C ∗ TW + N ALB C ∗ TW = AW C ∗ TW .
(24)
∗
Multiplying (19) from the right with LB C and noting that W = N LB gives N ALB C ∗ = AW C ∗ − N ALB C ∗ CW C ∗ + N BB ∗ LC AW C ∗ , −1 which after rearranging and multiplication to the right with TW gives (24).
We have the following useful identities involving the operator T . Lemma 4.4. With the notation J :=
−1 0
0 1
,
the following identities hold: −I + B ∗ LC B + B ∗ LC AW A∗ LC B B ∗ LC AW C ∗ ∗ T JT = , 2 CW A∗ LC B TW ∗ −B ∗ N ∗ B + B ∗ LC AW A∗ ∗ T JT = CLB A∗ N ∗ CW A∗ and −B ∗ N ∗ ∗ ∗ [−N B, N ALB C ] T JT = AW A∗ − W. CLB A∗ N ∗
(25) (26)
(27)
Proof. To prove (25) we only need to show that −2 −2 −TX + B ∗ LC AW C ∗ TW CW A∗ LC B = −I + B ∗ LC B + B ∗ LC AW A∗ LC B. (28)
By the algebraic Riccati equation for W we have for the left-hand side of (28) −2 −2 ∗ ∗ −TX + B ∗ LC AW A∗ − W + N BTX B N LC B. Thus (28) is equivalent to −2 −2 ∗ ∗ −TX − B ∗ LC W LC B + B ∗ LC N BTX B N LC B = −I + B ∗ LC B,
46
Curtain and Opmeer
IEOT
i.e. that −2 ∗ ∗ 2 ∗ 2 ∗ 2 2 ∗ −TX B LC W LC B + TX B LC N BTX B N LC B + TX − TX B LC B = I.
Using that LC N = X and LC W = XLB this is equivalent to −2 ∗ 2 ∗ 2 ∗ 2 2 ∗ −TX B XLB LC B + TX B XBTX B XB + TX − TX B LC B = I. −2 −2 ∗ Furthermore, we have B ∗ XBTX = TX B XB so that the above is equivalent to 2 ∗ 2 2 ∗ −TX B XLB LC B + B ∗ XBB ∗ XB + TX − TX B LC B = I.
Using the definition of TX from (8) this is equivalent to − B ∗ XLB LC B − B ∗ XBB ∗ XLB LC B + B ∗ XBB ∗ XB + B ∗ XB − B ∗ LC B − B ∗ XBB ∗ LC B = 0.
(29)
Combining the first and fourth term on the left-hand side gives −B ∗ XLB LC B + B ∗ XB = B ∗ X(I − LB LC )B = B ∗ LC B, so that these terms cancel against the fifth term on the left-hand side of (29). The second and third term on the left-hand side of (29) are − B ∗ XBB ∗ XLB LC B + B ∗ XBB ∗ XB = B ∗ XBB ∗ X (I − LB LC ) B = B ∗ XBB ∗ LC B, so that they cancel against the sixth term on the left-hand side of (29). So (29) holds and consequently (28) and (25) hold. Using (25) we see that the left-hand side of (26) equals ∗ B − B ∗ LC BB ∗ − B ∗ LC AW A∗ LC BB ∗ + B ∗ LC AW C ∗ CLB A∗ N ∗ . (30) −CW A∗ LC BB ∗ + CLB A∗ + CW C ∗ CLB A∗ Now using the Lyapunov equations we see that the first component of (30) equals B ∗ (I − LC LB + LC ALB A∗ − LC AW A∗ LC LB + LC AW A∗ LC ALB A∗ +LC AW LC LB A∗ − LC AW A∗ LC ALB A∗ ) N ∗ . We see that the fifth and seventh terms cancel against each other. Using that W = LB N ∗ and the definition of N we obtain B ∗ (I − LC LB + LC AW [(I − LC LB )A∗ − A∗ LC LB + LC LB A∗ )]) N ∗ . Cancelling terms we obtain B ∗ (I − LC LB + LC AW A∗ [I − LC LB ]) N ∗ , which equals B ∗ + B ∗ LC AW A∗ , as desired. Using that W = LB N ∗ and the definition of N we see that the second component of (30) equals CW (−A∗ LC BB ∗ + (I − LC LB )A∗ + C ∗ CLB A∗ ) N ∗ .
Vol. 64 (2009)
The Suboptimal Nehari Problem
47
Now using the Lyapunov equations we see that this equals CW HN ∗ , with H := −A∗ LC LB + A∗ LC ALB A∗ + (I − LC LB )A∗ + LC LB A∗ − A∗ LC ALB A∗ . After cancellations we see that this equals CW (−A∗ LC LB + A∗ ) N ∗ = CW A∗ , as desired. The equality (27) follows by recognizing that the left-hand side equals Bh JBh∗ with −1 −1 Bh = [−N BTX , AW C ∗ TW ]
(compare (23)), so that (27) is nothing else than the Riccati equation (11).
The following lemma is proven by more algebraic manipulations. Lemma 4.5. On 1/ρ(A) we have
G∗ I
−I 0 I 0 −I 0 −X X∗ 0 I G I 0 I ∗ |z|2 − 1 L0 L ∗ ∗ L M L 0 + , = 0 M 0 |z|2 I 0
(31)
where L is the characteristic function of the system
W 1/2 A ∗ B LC A 0
,
(32)
M is the characteristic function of the system
A C
W 1/2 0
,
(33)
and L0 is the characteristic function of the system
A 1/2 LC
B 0
.
(34)
48
Curtain and Opmeer
IEOT
Proof. We have XJX∗ = X1 T JT ∗ X1 ∗ −1 1 B LC A [−N B, N ALB C ∗ ] T ∗ JT = T JT ∗ + −A C z −∗ 1 −B ∗ N ∗ ∗ [A∗ LC B, C ∗ ] + T JT −A CLB A∗ N ∗ z ∗ −1 1 B LC A [−N B, N ALB C ∗ ] T ∗ JT + −A C z −∗ 1 −B ∗ N ∗ × −A [A∗ LC B, C ∗ ] . CLB A∗ N ∗ z Using (25), (26) and (27) we see that the right-hand side equals
−I + B ∗ LC B + B ∗ LC AW A∗ LC B B ∗ LC AW C ∗ 2 CW A∗ LC B TW −1 ∗ 1 B LC A −A [B + AW A∗ LC B, AW C ∗ ] (35) + C z ∗ −∗ 1 B + B ∗ LC AW A∗ + − A [A∗ LC B, C ∗ ] CW A∗ z ∗ −1 −∗ 1 1 B LC A ∗ + −A (AW A − W ) −A [A∗ LC B, C ∗ ] . C z z
We proceed by considering the separate components of this 2 by 2 matrix. The (1,1) component of (35) equals −1 −∗ 1 1 ∗ − I + B LC B + B LC A −A B+B −A ALC B z z −1 −∗ 1 1 1 + − 1 B ∗ LC A −A W −A A∗ LC B, 2 |z| z z ∗
∗
where we have used the identity
1 − 1 W |z|2 ∗ ∗ 1 1 1 1 = −A W − A + AW −A + − A W A∗ + AW A∗ − W. z z z z
Vol. 64 (2009)
The Suboptimal Nehari Problem
49
Using a similar calculation we obtain −∗ −1 1 1 G∗ G = B ∗ −A C ∗C −A B z z −∗ ∗ ∗ 1 1 1 1 ∗ × = B −A − A LC A + − A LC −A z z z z 1 1 ∗ + A LC − A + 1 − 2 LC z |z| −1 1 × −A B z −1 −∗ 1 1 ∗ ∗ = B LC A −A B + B LC B + −A A∗ LC B z z −∗ −1 1 1 1 −A LC −A B. + 1 − 2 B∗ |z| z z where we have used the observation Lyapunov equation. It follows from the formulas obtained for XJX∗ and G∗ G that the (1,1) component of the left-hand side of (31) equals 1 1 − 2 (H1 + H2 ) , |z| with −∗ −1 1 1 −A LC −A B, H1 = B z z −1 −∗ 1 1 H2 = B ∗ LC A −A W −A A∗ LC B, z z ∗
as desired. The proof for the other components is obtained by similar tedious calculations and hence is omitted. The following lemma gives the corresponding result for transfer functions. Lemma 4.6. On the open unit disc we have I G∗ −I 0 I 0 −I 0 −X X∗ 0 I 0 I G I 0 I ∗ |z|2 − 1 L ∗ L0 ∗ L M L0 0 + , = M 0 |z|2 where L is the transfer function of the system (32), M is the transfer function of the system (33) and L0 is the transfer function of the system (34). Proof. From Lemma 4.5 we obtain equality of the transfer functions in a neighborhood of zero. The transfer functions involved are all analytic on the open unit disc: for G, M and L0 this follows directly from our stability assumptions, while for
50
Curtain and Opmeer
IEOT
X this follows from Lemma 4.2 and for L this follows using Lemma 2.3. The leftand right-hand sides of the equation are not analytic on the unit disc, but they are real-analytic there. This last assertion follows from the fact that both analytic functions and their adjoints are real-analytic and that the product of real-analytic functions is again real-analytic. By the identity theorem for real-analytic functions the equality holds on the whole unit disc (see [5, Appendix]). Remark 4.7. We note that the right-hand sides of the equations obtained in Lemmas 4.5 and 4.6 are strictly speaking not defined for z = 0, since we divide by |z|2 . Noting that the feedthrough terms of the systems (32), (33) and (34) are zero this singularity is seen to be removable, i.e. the functions can be continuously (and even analytically) extended to z = 0. It is in this sense that the equalities hold in z = 0. From Lemma 4.6 we deduce the following. Lemma 4.8. On the open unit disc we have I G∗ −I 0 I 0 −I ≤X 0 I 0 I G I 0
0 I
X∗ .
Proof. The term between brackets on the right-hand side of the equation obtained in Lemma 4.6 is of the form T1∗ T1 + T2∗ T2 and so it is nonnegative. The fraction in 2 front, |z||z|−1 2 , is negative since by assumption |z| < 1. It follows that the right-hand side of the equation obtained in Lemma 4.6 is, for every z ∈ D, nonpositive. It follows that the left-hand side is, which gives the desired inequality. The following lemma gives important formulas for the inverse of one of the components of X. Lemma 4.9. The inverse of the (2, 2) component of X on the open unit disc is the transfer function of the input stable and input-output stable system −2 AW C ∗ TW AW . (36) −1 −1 −TW C TW Proof. That the characteristic functions of (36) is the inverse of that of the (2,2) component of (20) follows by an application of Lemma 2.1 together with the identity −2 A − AW C ∗ TW C = AW , which is easily proven using only the definition of TW . That the system (36) is input and input-output stable follows from Lemma 3.4. Since the characteristic functions of the two systems are inverses it follows that the product of the two transfer functions equals the identity for z in a neighborhood of zero. This equality extends to the whole of the open unit disc since these transfer functions are analytic on the open unit disc by the stability properties of the given realizations.
Vol. 64 (2009)
The Suboptimal Nehari Problem
51
5. The inverse of the spectral factor Definition 5.1. Define V as the transfer function and V as the characteristic function of the system B −ALB C ∗ A T −1 B ∗ XA TX −T −1 B ∗ XALB C ∗ . (37) X X −1 −1 0 TW TW CN Lemma 5.2. The system given by (37) is input stable. Proof. This follows similarly as Lemma 4.2.
Lemma 5.3. We have V = T −1 V1 with V1 the transfer function of the system A B −ALB C ∗ B ∗ LC AN I (38) 0 CN 0 I and
−1 ∗ TX −TX B XALB C ∗ T = (39) −1 0 TW the inverse of the operator T defined by (22). The corresponding result for characteristic functions also holds. −1
Proof. We first show that the right-hand side of (39) is indeed T −1 . It is easily seen that the inverse of T defined by (22) is given by −2 TX −TX B ∗ LC AW C ∗ TW . (40) −1 0 TW To show that this equals (39) we need to show that −2 −1 ∗ TX B ∗ LC AW C ∗ TW = TX B XALB C ∗ ,
or equivalently that −2 ∗ 2 B ∗ LC AW C ∗ = TX B XALB C ∗ TW .
Since W = N LB , with (19) we see that the left-hand side equals B ∗ LC N [ALB + ALB C ∗ CN LB − BB ∗ LC AN LB ] C ∗ , which by using X = LC N and W = N LB is seen to equal B ∗ X AN −1 − BB ∗ XN −1 A(I + W C ∗ C)−1 (I + W C ∗ C)W C ∗ . Using (15) and (17) this can be rewritten as 2 B ∗ X(I + BB ∗ X) AX N −1 − (I + BB ∗ X)−1 BB ∗ XN −1 AW W TW C ∗. From (18) we have AX N −1 = N −1 AW so that the above equals 2 B ∗ X(I + BB ∗ X) I − (I + BB ∗ X)−1 BB ∗ X AX N −1 W TW C ∗.
52
Curtain and Opmeer
IEOT
Simplifying shows that this equals 2 B ∗ XAX LB TW C ∗,
and using (15) shows that this in turn equals −2 ∗ 2 TX B XALB TW C ∗,
as desired. To show that V = T V1 it only remains to show that −1 ∗ −1 ∗ TX B XA = TX B ∗ LC AN − TX B XALB C ∗ CN.
After multiplying (19) from the left by B ∗ LC we obtain B ∗ LC N A = B ∗ LC AN − B ∗ LC N ALB C ∗ CN + B ∗ LC N BB ∗ LC AN. But LC N = X and so rearranging we obtain B ∗ XA = (I + B ∗ XB)B ∗ LC AN − B ∗ XALB C ∗ CN. −1 Multplication from the left by TX gives the desired equality.
The following is the analogue of Lemma 4.9 and is proven similarly. Lemma 5.4. The inverse of the (1, 1) component of V on the open unit disc is the transfer function of the output stable and input-output stable system −1 −BTX AX . (41) −2 ∗ −1 TX B XA TX Proof. That the characteristic function of the system (41) is the inverse of that of the (1, 1) component of (37) follows by an application of Lemma 2.1 together with the identity −2 ∗ A − BTX B XA = AX ,
which is easily proven using only the definition of TX . That the system (41) is output and input-output stable follows from Lemma 3.4. Since the characteristic functions of the two systems are inverses it follows that the product of the two transfer functions equals the identity for z in a neighborhood of zero. This equality extends to the whole of the open unit disc since these transfer functions are analytic on the open unit disc by the stability properties of the given realizations.
Vol. 64 (2009)
The Suboptimal Nehari Problem
53
The following lemma can be proven by algebraic manipulation. Lemma 5.5. On 1/ρ(A) we have VX = I = XV, where X is the characteristic function of the system (21) and V is the characteristic function of the system (38). Proof. We first note that equivalently we may show that the characteristic functions of the systems (21) and (38) are each others inverses. Define ∗ B LC A Bl := [−N B, N ALB C ∗ ], Cl := . C We apply Lemma 2.1 to obtain the inverse of the characteristic function of the system (21). This is the characteristic function of the system A − Bl Cl Bl . (42) −Cl I The system (38) may be written in terms of Bl and Cl as −N −1 Bl A , Cl N I
(43)
provided that A − Bl Cl = N AN −1 . But after multiplication from the right by N and substituting the definitions of Bl and Cl this simplifies to (19) The case of transfer functions follows immediately. Lemma 5.6. On the open unit disc we have VX = I = XV, where X is the transfer function of the system (21) and V is the transfer function of the system (38). Proof. Using Lemma 5.5 for the corresponding result for characteristic functions, the output stability of the system (21) and the input stability of the system (38) (which follows from the dual version of Lemma 2.3) we obtain the desired result. From the previous lemma and the J-spectral factorization inequality obtain in Lemma 4.8 we obtain the following. Lemma 5.7. On the open unit disc we have I G∗ −I 0 I V 0 I 0 I G
0 I
V∗ ≤
−I 0
0 I
.
Proof. This follows from multiplying both sides of the inequality obtained in Lemma 4.8 from the left with V, from the right with V∗ and using that V is the inverse of X by Lemma 5.6.
54
Curtain and Opmeer
IEOT
6. The Nehari problem In this section we give an explicit solution to our Nehari problem using the inverse J-spectral factor V found in Section 5. Definition 6.1. Define Z as the transfer function of the system A∗X −A∗X XB . CLB A∗X −CLB A∗X XB
(44)
Lemma 6.2. The system (44) is input stable. Proof. Since AX = (I+BB ∗ X)−1 A, we see that the adjoint of the control operator, B ∗ XAX , equals (I + B ∗ XB)−1 B ∗ XA. Using Lemma 3.4, specifically that the system (14) is output stable, we obtain the desired result. The following can be proven by algebraic manipulation. Lemma 6.3. The characteristic function of the system (44) equals the characteristic function of the system −A∗W LC B A∗W . (45) CW A∗W −CW A∗W LC B Proof. From (18) it follows by multiplication from the left with LC and from the right with LB that XAX LB = LC AW W , which in turn implies that the rightbottom terms in (44) and (45) are equal. Using (18) it follows that the top righthand corner of (44) equals that of (45) multiplied from the left by N ∗ , the bottom left-hand corner of (44) equals that of (45) multiplied from the right by N −∗ and the top left-hand corner of (44) equals that of (45) multiplied from the right by N −∗ and from the left by N ∗ . In the calculation of the characteristic functions this causes cancellation, showing that the characteristic functions are equal. The following can be proven in a similar manner as Lemma 6.2. Lemma 6.4. The system (45) is output stable. Lemma 6.5. The transfer functions of the systems (44) and (45) are equal on the open unit disc. Proof. Since the system (44) is input stable, its transfer function is analytic on the open unit disc. Since the system (45) is output stable, the same holds for this system. By Lemma 6.3 the characteristic functions of these systems are equal. So the transfer functions restricted to the open unit disc are analytic extensions of the same function. By the identity theorem for analytic functions they must be equal. The following lemmas relate Z to the J-spectral factor X and its inverse V. The first of these lemmas deals with the corresponding characteristic functions and can by proven by algebraic manipulation.
Vol. 64 (2009)
The Suboptimal Nehari Problem
55
Lemma 6.6. On 1/ρ(A∗ ) ∩ 1/ρ(A∗X ) we have Z(z) = V12 (¯ z )∗ V11 (¯ z )−∗ .
(46)
On 1/ρ(A∗ ) ∩ 1/ρ(A∗W ) we have Z(z) = −X22 (¯ z )−∗ X21 (¯ z )∗ .
(47)
−2 ∗ Proof. We first note that TX B XA = B ∗ XAX , and that if follows from this −2 ∗ equality using Lemma 3.5 that TX B XA = B ∗ LC AW N . −2 ∗ Using Definition 5.1, Lemma 5.4 and the identity TX B XA = B ∗ LC AW N , we have
V11 (z)−1 V12 (z) −1 1 BB ∗ LC AW W C ∗ I − AX = −B LC AW W C + z −1 1 1 −2 ∗ −2 ∗ + TX B XA I − AX I − AX + BTX B XA − z z −1 1 I −A ALB C ∗ . × z The term in square brackets is easily seen to equal − z1 I − A , so that the above simplifies to −1 1 −2 ∗ −B ∗ LC AW W C ∗ + TX B XA I − AX [BB ∗ LC AW W C ∗ − ALB C ∗ ] . z ∗
∗
−2 ∗ TX B XA
The term in square brackets simplifies to −AX LB C ∗ . Using this, the identity −2 ∗ TX B XA = B ∗ XAX and comparing to the formula for Z in (44) (and (45) for the constant term) we obtain (46). The equality (47) is proven similarly. Lemma 6.7. On the open unit disc we have Z(z) = V12 (¯ z )∗ V11 (¯ z )−∗ = −X22 (¯ z )−∗ X21 (¯ z )∗ .
(48)
Proof. This follows from Lemma 6.6 and the stability properties of the given realizations of the involved transfer functions. The following is the main result of this article. Theorem 6.8. Define K(z) := Z(1/z), where Z is defined as in Definition 6.1. Then K ∈ H∞ (D+ , L(U, Y )) and kG + KkL∞ (T,L(U,Y )) ≤ 1. Proof. Noting that all the transfer functions G, V, and Z are holomorphic on D, we perform some elementary calculations on D. We first verify that −∗ I I 0 ∗ V11 (z) = V(z) G(z) + Z(¯ z) G(z) I 0
56
Curtain and Opmeer
IEOT
by expanding the right hand-side: I 0 V11 (z)∗ V21 (z)∗ V11 (z)−∗ G(z) I V12 (z)∗ V22 (z)∗ 0 I 0 I = G(z) I V12 (z)∗ V11 (z)−∗ I , = G(z) + Z(¯ z) where by Lemma 6.7 Z(¯ z ) = V12 (z)∗ V11 (z)−∗ holds on the open unit disc. Using the just established identity we have ∗
(G(z) + Z(¯ z )) (G(z) + Z(¯ z )) − I ∗ I −I 0 I = G(z) + Z(¯ z) 0 I G(z) + Z(¯ z) ∗ ∗ −∗ V11 (z) I 0 −I 0 = V(z) × 0 G(z) I 0 I −∗ I 0 V11 (z) × V(z)∗ . G(z) I 0
(49)
Applying Lemma 5.7 we obtain ∗
(G(z) + Z(¯ z )) (G(z) + Z(¯ z )) − I ∗ V11 (z)−∗ −I 0 V11 (z)−∗ ≤ 0 0 I 0
(50)
= −V11 (z)−1 V11 (z)−∗ ≤ 0. This shows that the analytic function Z is bounded in norm on D and so it is in H∞ (D, L(U, Y )). We also obtain the estimate kG(z) + Z(¯ z )k ≤ 1 for z ∈ D. By taking nontangential limits we obtain the same estimate almost everywhere on the unit circle. It follows from Z ∈ H∞ (D, L(U, Y )) that K(z) = Z(1/z) is in ¯ H∞ (D+ ; L(U, Y )). The boundary functions of Z and K are related by K(ζ) = Z(ζ) with ζ on the unit circle. So K satisfies the following for almost all ζ on the unit circle kG(ζ) + K(ζ)k ≤ 1. Remark 6.9. Theorem 6.8 gives one solution of the sub-optimal Nehari problem. With little extra effort one can actually obtain infinitely many. To show this we −1 first note that V21 V11 equals the second component of the transfer function of the closed-loop system (as defined by (4)) of the system (9). The proof is very similar −1 to that of Lemma 6.6. It follows from Lemma 3.2 that kV21 V11 k∞ ≤ 1. So if kQk∞ < 1, then V11 +QV21 has a well-defined inverse in H∞ . Now define Z(¯ z) = (V12 (z)∗ +V22 (z)∗ Q(z)∗ )(V11 (z)∗ +V21 (z)∗ Q(z)∗ )−1 . Entirely analogously to the proof of Theorem 6.8 it follows that K defined by K(z) = Z(1/z) is a solution of
Vol. 64 (2009)
The Suboptimal Nehari Problem
57
the suboptimal Nehari problem (Theorem 6.8 being the special case Q = 0). In the analogue of inequality (50) we used that kQk∞ ≤ 1 (strict inequality is not needed for this). So for any Q ∈ H∞ (D, L(U, Y )) with kQk∞ < 1 we obtain a solution. From the analogy with similar formulas known to give a parametrization of all solutions of the suboptimal Nehari problem, one would expect that the above given linear fractional formula (possibly rewritten in Redheffer form) with parameter Q ranging over the closed unit ball kQk∞ ≤ 1 should give rise to all solutions. However, justification of such a statement would require further work beyond the scope of the present article.
7. The general case In this section we make some elementary observations that allow us to obtain the general case of the suboptimal Nehari problem from the special with D = 0 and σ = 1 considered above. Remark 7.1. If K is a solution of the suboptimal Nehari problem for data G−G(0), then K + G(0) is a solution of the suboptimal Nehari problem for data G. Let a, b > 0. If K is a solution of the suboptimal Nehari problem for data G/a and parameter b, then aK is a solution of the suboptimal Nehari problem for data G and parameter ab. If S := Σ(A, B, C, D) is a realization of G, then Sa := Σ(A, B, aC, aD) is a realization of aG. If LC is the observability gramian of S, then a2 LC is the observability gramian of Sa . From the above remark and Theorem 6.8 it follows that if G is the transfer function of the state space system Σ(A, B, C, D) and σ > kHG k, then the function K defined for |z| > r(AXσ ) by K(z) = −D − CLB A∗Xσ Xσ B − CLB A∗Xσ (z − A∗Xσ )−1 A∗Xσ Xσ B extends to K ∈ H∞ (D+ , L(U, Y )) which satisfies kG + KkL∞ (T,L(U,Y )) ≤ σ. Here Xσ = (σ 2 I − LC LB )−1 LC , AXσ = (I + BB ∗ Xσ )−1 A.
References [1] V. M. Adamjan, D. Z. Arov, and M. G. Kre˘ın. Infinite Hankel matrices and generalized Carath´eodory-Fej´er and I. Schur problems. Funkcional. Anal. i Priloˇzen., 2(4):1–17, 1968. [2] V. M. Adamjan, D. Z. Arov, and M. G. Kre˘ın. Infinite Hankel block matrices and related problems of extension. Izv. Akad. Nauk Armjan. SSR Ser. Mat., 6(2-3):87– 112, 1971.
58
Curtain and Opmeer
IEOT
[3] Ruth Curtain and Hans Zwart. The Nehari problem for the Pritchard-Salamon class of infinite-dimensional linear systems: a direct approach. Integral Equations Operator Theory, 18(2):130–153, 1994. [4] Ruth F. Curtain and Akira Ichikawa. The Nehari problem for infinite-dimensional linear systems of parabolic type. Integral Equations Operator Theory, 26(1):29–45, 1996. [5] Ruth F. Curtain and Mark R. Opmeer. The suboptimal Nehari problem for wellposed linear systems. SIAM J. Control Optim., 44(3):991–1018, 2005. [6] Ruth F. Curtain and Mark R. Opmeer. Normalized doubly coprime factorizations for infinite-dimensional linear systems. Math. Control Signals Systems, 18(1):1–31, 2006. [7] Ruth F. Curtain and A. C. M. Ran. Explicit formulas for Hankel norm approximations of infinite-dimensional systems. Integral Equations Operator Theory, 12(4):455– 469, 1989. [8] Ruth F. Curtain and Hans Zwart. An introduction to infinite-dimensional linear systems theory, volume 21 of Texts in Applied Mathematics. Springer-Verlag, New York, 1995. [9] C. Foias, A. E. Frazho, I. Gohberg, and M. A. Kaashoek. Metric constrained interpolation, commutant lifting and systems, volume 100 of Operator Theory: Advances and Applications. Birkh¨ auser Verlag, Basel, 1998. [10] Keith Glover, Ruth F. Curtain, and Jonathan R. Partington. Realisation and approximation of linear infinite-dimensional systems with error bounds. SIAM J. Control Optim., 26(4):863–898, 1988. [11] Vlad Ionescu, Cristian Oar˘ a, and Martin Weiss. Generalized Riccati theory and robust control: A Popov function approach. John Wiley & Sons Ltd., Chichester, 1999. [12] A. Kheifets. Parametrization of solutions of the Nehari problem and nonorthogonal dynamics. In Operator theory and interpolation (Bloomington, IN, 1996), volume 115 of Oper. Theory Adv. Appl., pages 213–233. Birkh¨ auser, Basel, 2000. [13] Zeev Nehari. On bounded bilinear forms. Ann. of Math. (2), 65:153–162, 1957. [14] Nikolai K. Nikol0 ski˘ı. Treatise on the shift operator, volume 273 of Grundlehren der Mathematischen Wissenschaften. Springer-Verlag, Berlin, 1986. [15] Job Oostveen. Strongly stabilizable distributed parameter systems, volume 20 of Frontiers in Applied Mathematics. Society for Industrial and Applied Mathematics (SIAM), Philadelphia, PA, 2000. [16] Mark R. Opmeer. Model reduction for controller design for infinite-dimensional systems. PhD thesis, University of Groningen, 2006. [17] Lavon B. Page. Bounded and compact vectorial Hankel operators. Trans. Amer. Math. Soc., 150:529–539, 1970. [18] Vladimir V. Peller. Hankel operators and their applications. Springer Monographs in Mathematics. Springer-Verlag, New York, 2003. [19] A. C. M. Ran. Hankel norm approximation for infinite-dimensional systems and Wiener-Hopf factorization. In Modelling, robustness and sensitivity reduction in control systems (Groningen, 1986), volume 34 of NATO Adv. Sci. Inst. Ser. F Comput. Systems Sci., pages 57–69. Springer, Berlin, 1987.
Vol. 64 (2009)
The Suboptimal Nehari Problem
59
[20] Martin Weiss and George Weiss. Optimal control of stable weakly regular linear systems. Math. Control Signals Systems, 10(4):287–330, 1997. [21] Hans Zwart. Transfer functions for infinite-dimensional systems. Systems Control Lett., 52(3-4):247–255, 2004. Ruth F. Curtain Department of Mathematics University of Groningen P.O. Box 800 9700 AV Groningen The Netherlands e-mail:
[email protected] Mark R. Opmeer Department of Mathematical Sciences University of Bath Claverton Down Bath BA2 7AY United Kingdom e-mail:
[email protected] Submitted: July 17, 2008. Revised: November 9, 2008.
Integr. equ. oper. theory 64 (2009), 61–81 c 2009 Birkh¨
auser Verlag Basel/Switzerland 0378-620X/010061-21, published online April 24, 2009 DOI 10.1007/s00020-009-1680-3
Integral Equations and Operator Theory
Eigenvalues of Integral Operators Defined by Smooth Positive Definite Kernels J. C. Ferreira and V. A. Menegatto Abstract. We consider integral operators defined by positive definite kernels K : X × X → C, where X is a metric space endowed with a strictly-positive measure. We update upon connections between two concepts of positive definiteness and upgrade on results related to Mercer like kernels. Under smoothness assumptions on K, we present decay rates for the eigenvalues of the integral operator, employing adapted to our purposes multidimensional versions of known techniques used to analyze similar problems in the case where X is an interval. The results cover the case when X is a subset of Rm endowed with the induced Lebesgue measure and the case when X is a subset of the sphere S m endowed with the induced surface Lebesgue measure. Mathematics Subject Classification (2000). Primary 45P05; Secondary 42A82, 45C05, 43A35, 41A99. Keywords. Integral operators, eigenvalue estimates, positive definiteness, Mercer’s theorem, trace, trace norm.
1. Introduction This paper is concerned with the analysis of decay rates for eigenvalues of integral operators construct from positive definite kernels on subsets of metric spaces. Such operators appear quite naturally in approximation theory, integral equations and operator theory, playing an important role in many problems. We will consider two different notions of positive definiteness as explained below. If X is a nonempty set, a kernel K : X × X → C is positive definite when the inequality n X ci cj K(xi , xj ) ≥ 0, i,j=1
The first author was partially supported by FAPESP, grants # 2005/56694−4, # 2007/58086−7.
62
Ferreira and Menegatto
IEOT
holds for all n ≥ 1, x1 , x2 , . . . , xn ∈ X and scalars c1 , c2 , . . . , cn . If X is endowed with a measure ν and K belongs to L2 (X × X, ν × ν), we say that K is L2 -positive definite when the corresponding integral operator Z K(f )(x) := K(x, y)f (y) dν(y), f ∈ L2 (X, ν), x ∈ X, (1.1) X
is positive, that is, when the following condition holds Z Z K(x, y)f (y) dν(y) f (x) dν(x) ≥ 0, X
f ∈ L2 (X, ν).
X
We will write P D(X) and L2 P D(X, ν) to denote these two classes of kernels. Needless to say that the expression on the left-hand side of the above inequality is just hK(f ), f i2 , in which h·, ·i2 is the inner product of L2 (X, ν). Keeping the context as general as possible, we will investigate possible connections between these two concepts of positive definiteness. Assuming positive definiteness of the kernel and reasonable additional smoothness assumptions on K, we will update on the corresponding Mercer’s theory and analyze decay rates for the eigenvalues of the integral operator (1.1). A quite general formulation for the classical result of Mercer is as follows (see [11, 13]). Theorem 1.1 (Mercer’s Theorem). Let X be a topological Hausdorff space equipped with a finite Borel measure ν. Then for every continuous positive definite kernel K : X × X → C there exist a scalar sequence {λn } ∈ l1 , λ1 ≥ λ2 ≥ . . . ≥ 0 and an orthonormal system {φn } in L2 (X, ν) consisting of continuous functions only, such that the expansion K(x, y) =
∞ X
λn (K)φn (x)φn (y),
x, y ∈ supp(ν),
n=1
converges uniformly. If the integral operator has countably many eigenvalues λ1 (K) ≥ λ2 (K) ≥ · · · ≥ 0, the basic decay rate given by Mercer’s theory is λn (K) = o(n−1 ), as n → ∞. The following example ([16]) shows that this rate can not be improved, unless additional assumptions are added. Indeed, consider X = [−1, 1] endowed with the Lebesgue measure µ. The kernel K(x, y) =
∞ X n=1
1 np+1+
cos(nπx) cos(nπy),
x, y ∈ [−1, 1],
where p is a nonnegative integer and > 0, is an element of L2 P D([−1, 1], µ). If φn (x) := cos(nπx),
x ∈ [−1, 1],
then the sequence {φn } is L2 ([−1, 1], µ) -orthonormal and λn (K) = n−1−p− , n = 1, 2, . . .. As so, λn (K) = O(n−1−p− ) = o(n−1−p ), as n → ∞, but
Vol. 64 (2009)
Eigenvalues of Integral Operators
63
λn (K) 6= o(n−1−p− ), as n → ∞. The series ∞ X n=1
nq np+1+
,
0 ≤ q ≤ p,
being convergent, it is not hard to see that the partial derivatives of order at most p of K are continuous. As so, K is of class C p . Improvements on the basic estimate exhibit above can be found in many contexts under different sets of hypotheses. For instance, reference [15] considers the case when X is a compact interval while references [12, 13] analyze the case when X is a compact metric space or even a differentiable manifold, endowed with a finite measure. In [2], now dropping the compactness assumption on X, Buescu and Paix˜ ao investigated generalizations when X is a closed interval and K satisfies certain smoothness hypotheses. A similar analysis can be found in [3, 4]. In this paper these questions will be take up again, just assuming that X is a metric space endowed with a strictly-positive measure. In Section 2, we investigate possible connections between the notions of positive definiteness and recover Mercer’s Theorem in this new setting. In Section 3, we analyze important properties of the square root of an integral operator, under the light of the assumptions adopted on X and on the kernel. In particular we show that the square root is also an integral operator and deduce a recovery formula via the kernel defining the original operator. In Section 4, using the results in Section 3, we discuss basic finite approximations for the integral operator based upon special decompositions of X. The last result of the section describes an estimate for the sum of the eigenvalues of the operator deduced from such finite approximations. Section 5 begins with the concept of (q, t)-compactness, a very special decomposition for metric spaces endowed with a measure. Later in the section, we deduce the main results of the paper. They describe decay rates for the eigenvalues of the integral operator when X is (q, t)-compact and the generating kernel satisfies a smoothness condition of Lipschitz type. It is important to emphasize that the approach we take here is based upon arguments found in [2] and references therein.
2. Positive definiteness and Mercer’s theory revisited The results in this section indicate possible contexts in which the classes P D(X) and L2 P D(X, ν) coincide. Henceforth, if X is a metric space, we will write C(X) to denote the set of continuous functions on X and CB (X) to denote the subset of C(X) formed by bounded functions vanishing outside a bounded subset of X. The letter ν will be used to denote a measure over X. If X is a subset of Rm and the measure is the restriction of the usual Lebesgue measure of Rm to X, the letter µ will be used instead. The first result describes a setting where the inclusion P D(X) ⊂ L2 P D(X, ν) holds.
64
Ferreira and Menegatto
IEOT
Theorem 2.1. If X is a measurable subset of Rm endowed with the usual Lebesgue measure µ then P D(X) ∩ C(X × X) ∩ L2 (X × X, µ × µ) ⊂ L2 P D(X, µ). Proof. Let K be in P D(X) ∩ C(X × X) ∩ L2 (X × X, µ × µ). Since CB (X) is dense in L2 (X, µ) ([8, p.217]), to show that hK(f ), f i2 ≥ 0, f ∈ L2 (X, µ), it suffices to verify that hK(f ), f i2 ≥ 0, f ∈ CB (X). Let f ∈ CB (X) and write Xf to denote a bounded subset of X for which f (x) = 0, x ∈ X \Xf . There exists a sequence {An } of compact subsets of Xf such that An ⊂ An+1 , n = 1, 2, . . ., and limn→∞ µ(Xf \ An ) = 0. In particular, the kernel Kf given by Kf (x, y) = K(x, y)f (x)f (y), x, y ∈ X, is uniformly continuous in An ×An . The Monotone Convergence Theorem shows that {Kf χAn ×An } converges to Kf in L1 (X × X, µ × µ). Next, for each n, we can km find r = r(n) > 0 so that An ⊂ [−r/2, r/2]m . Writing [−r/2, r/2]m = ∪j=1 Cjk , k k k in which C1 , C2 , . . . , Ckm , are m-dimensional cubes having sides of length r/n, parallel to the coordinate axes, we may decompose An in the form m
An = ∪kj=1 Akj , Choosing
xkj
∈
Akj ,
Akj ⊂ Cjk ,
j = 1, 2, . . . , k
m
Akj ∩ Akl = ∅,
l 6= k.
and defining
m
gkn =
k X
K(xki , xkj )f (xki )f (xkj )χAki ×Akj ,
i,j=1
{gkn }
it is easily seen that converges uniformly to Kf χAn ×An in An × An , when k → ∞. Also, since K ∈ P D(X), it follows that gkn (x, y) ≥ 0, x, y ∈ An . Taking into account that Kf χAn ×An is bounded and the fact that µ(An ) < ∞, we can use the Dominated Convergence Theorem to deduce that Z Z Kf (x, y) dµ(x) dµ(y) = Kf (x, y) dµ(x) dµ(y) Xf ×Xf
X×X
Z Kf (x, y) dµ(x) dµ(y)
= lim
n→∞
An ×An
= lim
n→∞
Z lim
k→∞
gkn (x, y) dµ(x) dµ(y) ≥ 0.
An ×An
2
Thus, K ∈ L P D(X, µ).
In a similar manner, the following extension can be proved. Corollary 2.2. If X is a locally compact Hausdorff space endowed with a Radon measure ν that is finite on compact subsets then P D(X) ∩ C(X × X) ∩ L2 (X × X, ν × ν) ⊂ L2 P D(X, ν). The other inclusion can be guaranteed in a quite general context. If X is a topological space, we say that a measure ν on X is strictly-positive when it is a Borel measure fulfilling the following requirements: every open nonempty subset
Vol. 64 (2009)
Eigenvalues of Integral Operators
65
of X has positive measure and every x ∈ X belongs to an open subset of X having finite measure. Theorem 2.3. If a topological space X is endowed with a strictly-positive measure ν, then L2 P D(X, ν) ∩ C(X × X) ⊂ P D(X). Proof. Let K ∈ L2 P D(X) ∩ C(X × X), x1 , x2 , . . . , xn ∈ X and c1 , c2 , . . . , cn ∈ C. Due to the continuity of K, for each > 0 and j ∈ {1, 2, . . . , n} there exist open sets Xj so that xj ∈ Xj and x ∈ Xi ,
|K(x, y) − K(xi , xj )| < ,
y ∈ Xj ,
i, j = 1, 2, . . . , n.
Since ν is strictly-positive, we can assume that 0 < µ(Xj ) < ∞, j = 1, 2 . . . , n. As so, integration implies that Z Z 1 |K(x, y) − K(xi , xj )| dν(x) dν(y) < . ν(Xi )ν(Xj ) Xi Xj In particular, 1 1 lim →0+ ν(Xi ) ν(Xj )
Z
Z K(x, y) dν(x) dν(y) = K(xi , xj ).
Xi
Since the functions f :=
Xj
n X j=1
cj χX , µ(Xj ) j
> 0,
belong to L2 (X, ν), the inequality 0 ≤ hK(f ), f i2 =
n X
ci cj
i,j=1
leads to
1 ν(Xi )ν(Xj ) n X
0≤
Z
Z K(x, y) dν(x) dν(y)
Xi
Xj
ci cj K(xi , xj ),
i,j=1
that is, K ∈ P D(X).
Next, we introduce a general formulation for Mercer’s Theorem. We will need some additional notation attached to a measure space (X, ν). Precisely, we will write A(X, ν) to denote the subset of C(X × X) ∩ L2 P D(X, ν) formed by all kernels K : X × X → C for which x ∈ X → K(x, x) is an element of L1 (X, ν). Theorem 2.4 below includes in its statement a generalization of the classical Mercer’s Theorem. The proof we include here uses adaptations of methods introduced in [1, 6, 12, 14, 18]. Recall that an operator T on a Hilbert space H is trace-class ([9]), when its square root |T | := (T ∗ T )1/2 satisfies the condition X h|T |(f ), f iH < ∞, (2.1) f ∈B
66
Ferreira and Menegatto
IEOT
for every orthonormal basis B of (H, h·, ·iH ). The trace acts linearly over the vector space of all trace-class operators over H. If T is trace-class, the sum in (2.1) does not depend upon the basis and it is called the trace of T , here denoted by tr(T ). If T is a compact operator, then |T | is compact, positive and self-adjoint. As so, denoting by {sn (T )} the sequence of eigenvalues ofP|T |, each repeated as often as ∞ its multiplicity, then T is trace-class if and only if n=1 sn (T ) < ∞. As a matter of fact, the sum coincides with the trace of |T | when T is trace-class. If T is also self-adjoint, then sn (T ) = |λn (T )|, n = 1, 2, . . . , so that ∞ X tr (T ) = λn (T ). n=1
An important family of trace-class operators is that encompassing all finite rank operators on H. If H is a separable Hilbert space, the set of all trace-class operators on H is a vector space and the formula ∞ X kT ktr := sn (T ) n=1
defines a norm on it, the so-called trace norm. From now on, all general Hilbert spaces mentioned in the paper are assumed to be separable. Theorem 2.4. Let X be a metric space endowed with a strictly-positive measure ν. If K ∈ A(X, ν) then the following assertions hold: (i) The range of K is a subset of C(X) ∩ L2 (X, ν); (ii) The operator K is compact and selfadjoint, having an L2 (X, ν)-convergent series representation in the form ∞ X K(f ) = λn (K)hf, φn i2 φn , f ∈ L2 (X, ν). n=1
The series is absolutely and uniformly convergent on compact subsets of X; (iii) K has a L2 (X × X, ν × ν)-convergent series representation in the form ∞ X K(x, y) = λn (K)φn (x)φn (y), x, y ∈ X, n=1
{λn (K)} decreases to 0 and {φn } is L2 (X, ν)-orthonormal. The convergence of the series is absolute and uniform on compact subsets of X × X. If λn (K) > 0 then φn is an eigenfunction of K associated with the eigenvalue λn (K), taking into account multiplicities; (iv) The operator K is trace-class and Z tr(K) = K(x, x) dν(x). X
Proof. Assume K ∈ A(X, ν). Since ν is strictly-positive, Theorem 2.3 shows that K ∈ P D(X). In particular, |K(x, y)|2 ≤ K(x, x)K(y, y),
x, y ∈ X.
(2.2)
Vol. 64 (2009)
Eigenvalues of Integral Operators
67
If y ∈ X → K(y, y) is integrable, it is quite clear that every function y ∈ X → K(x, y), x ∈ X, belongs to L2 (X, ν). Next, we show that the mapping x ∈ X → K(x, ·) ∈ L2 (X, ν) is continuous. Let {xn } be a sequence in X converging to x0 ∈ X. Since K is continuous, the sequence {K(xn , y)} converges to K(x0 , y), for every y ∈ X fixed. Using (2.2), we deduce that |K(xn , y) − K(x0 , y)|2 ≤ |K(xn , y)|2 + 2|K(xn , y)||K(x0 , y)| + |K(x0 , y)|2 ≤ K(y, y) (K(xn , xn ) + K(x0 , x0 )) + 2K(y, y)K(xn , xn )1/2 K(x0 , x0 )1/2 ≤ 4 sup {K(xm , xm )} K(y, y),
y ∈ X.
m∈Z+
The Dominated Convergence Theorem leads to Z |K(xn , y) − K(x0 , y)|2 dν(x) = 0. lim n→∞
X
The continuity of x ∈ X 7→ K(x, ·) ∈ L2 (X, ν) follows. Since K(f )(x) = hf, K(x, ·)i2 ,
f ∈ L2 (X, ν),
x ∈ X,
assertion (i) follows. Since (X, ν) is a measure space and K ∈ L2 (X × X, ν × ν), the integral operator K : L2 (X, ν) → L2 (X, ν) is compact ([5, p.86]). Being K hermitian, K is selfadjoint. Applying the Spectral Theorem for compact selfadjoint operators ([5, p.93]), we can deduce that K is an L2 (X, ν)-convergent series of the form K(f ) =
∞ X
λn (K)hf, φn i2 φn ,
f ∈ L2 (X, ν),
(2.3)
n=1
where {λn (K)} decreases to 0 and {φn } is L2 (X, ν)-orthonormal. Next, we consider auxiliary kernels Kp , p ≥ 1, given by the formula Kp (x, y) = K(x, y) −
p X
λn (K)φn (x)φn (y),
x, y ∈ X.
n=1
Obviously, Kp ∈ L2 (X × X, ν × ν) ∩ C(X × X) while standard computations show that Kp ∈ A(X, ν). Lemma 2.2 in [6] reveals that Kp (x, x) ≥ 0, x ∈ X, that is, p X
λn (K)|φn (x)|2 ≤ K(x, x),
x ∈ X.
n=1
The inequality p+q 2 p+q X X λ (K)hf, φ i φ (x) ≤ λ (K) sup K(y, y) |hf, φn i2 |2 , n 2 n 1 n=p n y∈Y n=p
x ∈ Y,
68
Ferreira and Menegatto
IEOT
holds whenever Y is a compact subset of X and q, p ≥ 1. As so, the convergence of the series in (2.3) is uniform on compact subsets of X. This takes care of (ii). From the Cauchy-Schwarz inequality we now obtain p+q 2 p+q X X λn (K)φn (x)φn (y) ≤ (K(x, x) + 1) λn (K)|φn (y)|2 , x, y ∈ X, p, q ≥ 1. n=p n=p The Cauchy P∞ Criterion for convergence and the continuity of K imply that the series n=1 λn (K)φn (x)φn (y) is convergent to a function in C(X), when one of the variables is held fixed. However, due to (i) and (ii), ! Z ∞ ∞ X X λn (K)φn (x)φn (y) f (y) dν(y) = λn (K)hf, φn i2 φn (x) = K(f )(x), X
n=1
n=1 2
whenever f ∈ L (X, ν) and x ∈ X. Using this information with a convenient choice for f and recalling our assumption on X, we deduce that ∞ X
λn (K)φn (x)φn (y) = K(x, y),
x, y ∈ X.
n=1
Dini’s Theorem leads to ∞ X
λn (K)|φn (x)|2 = K(x, x),
x ∈ X,
(2.4)
n=1
with uniform and absolute convergence on compact subsets of X. Finally, the Cauchy Criterion for uniform convergence and the Cauchy-Schwarz inequality imply uniform and absolute convergence of the series on compact subsets of X × X. The Monotone Convergence Theorem along with (2.4) resolves (iv). The assumptions listed in the previous theorem are to be assumed from now on. Theorem 2.4 provides basic information on decay rates for the eigenvalues of the integral operator K, at least when K fits the description considered there. That we quote in a separated result. Corollary 2.5. Under the conditions stated in Theorem 2.4, it holds λn (K) = o(n−1 ), as n → ∞.
3. The square root of K In this section, we will list some of the properties the square root K1/2 of the integral operator K has, when K fits the assumptions in Theorem 2.4. Such properties will be used ahead in some key arguments. The existence of K1/2 of K is guaranteed by a well-known result from Hilbert space theory ([19, p.142]).
Vol. 64 (2009)
Eigenvalues of Integral Operators
69
Lemma 3.1. Let X and ν be as in Theorem 2.4 and K ∈ A(X, ν). Consider the representation for K provided by Theorem 2.4-(iii). Then K1/2 coincides with the integral operator S : L2 (X, ν) → L2 (X, ν), in which S ∈ L2 P D(X, ν) is the kernel S(x, y) :=
∞ X
λn (K)1/2 φn (x)φn (y),
x, y ∈ X.
(3.1)
n=1
Proof. Due to Theorem 2.4-(iv), it is easily seen that the series ∞ X
λn (K)1/2 φn ⊗ φn ,
n=1
in which φn ⊗ φn (x, y) := φn (x)φn (y), x, y ∈ X, converges in L2 (X × X, ν × ν) (see Theorem 4.11 in [19]. Hence, Formula (3.1) defines an element S in L2 (X×X, ν×ν). On the other hand, due to Theorem 2.4-(ii), Z ∞ X S(x, y)f (y) dν(y) = λn (K)1/2 hf, φn i2 φn (x) X
n=1 1/2
=K
(f )(x), x ∈ X,
f ∈ L2 (X, ν).
Thus, S = K1/2 . The L2 -positive definiteness of S is clear.
Lemma 3.2 below describes a crucial information regarding the range of K
1/2
.
Lemma 3.2. Under the conditions stated in Lemma 3.1, the range of K1/2 is a subset of C(X) ∩ L2 (X, ν). Proof. The proof uses the formula ∞ X K1/2 (f )(x) = λn (K)1/2 hf, φn i2 φn (x),
x ∈ X,
f ∈ L2 (X, ν).
(3.2)
n=1
If λn (K) > 0, Theorem 2.4-(iii) asserts that φn is an eigenfunction of K associated with the eigenvalue λn (K). Hence, Theorem 2.4-(i) implies that φn is continuous. Thus, to reach the continuity of K1/2 , it suffices to show that the series in (3.2) converges uniformly on compact subsets of X. But, that follows from the inequalities p+q 2 p+q p+q X X X λn (K)1/2 hf, φn i2 φn (x) ≤ |λn (K)1/2 φn (x)|2 |hf, φn i2 |2 n=p n=p n=p ≤ hf, f i2
p+q X
λn (K)|φn (x)|2 ,
x ∈ X,
p, q ≥ 1,
n=p
consequences of the Cauchy-Schwarz and Bessel inequalities.
Lemma 3.3 establishes an integral connection between the kernels K and S associated with K and S = K1/2 respectively.
70
Ferreira and Menegatto
IEOT
Lemma 3.3. Under the conditions stated in the previous lemmas, K can be recovered from S through the formula Z S(x, u)S(x, v) dν(x) = K(v, u), u, v ∈ X. X
Proof. Due to Lemma 3.1, S ∈ L2 (X × X, ν × ν). For y ∈ X, define Syj
j X
:=
λn (K)1/2 φn (y) φn ,
j = 1, 2, . . . .
n=1
Since Syj ∈ L2 (X, ν), j = 1, 2, . . . and S(·, y) ∈ L2 (X, ν), it is easily seen that hS(·, y) −
Syj , S(·, y)
−
Syj i2
=
∞ X
λn (K)|φn (y)|2 ,
y ∈ X,
j = 1, 2, . . . .
n=j+1
Due to the continuity of the inner product, it now follows that lim hSuj , Svj i2 = hS(·, u), S(·, v)i2 ,
j→∞
u, v ∈ X.
Meanwhile, the orthonormality of {φn } implies that lim hSuj , Svj i2 = lim
j→∞
j→∞
j X
λn (K)φn (v)φn (u) = K(v, u),
u, v ∈ X.
n=1
By uniqueness, hS(·, u), S(·, v)i2 = K(v, u), u, v ∈ X, and the result follows.
4. Finite rank kernels Let (X, d) be as in the statement of Theorem 2.4. In this section we will deal with the integral operator F generated by the kernel F given by the formula F (x, y) :=
Γ X
1 χC (x)χCn (y), ν(Cn ) n n=1
x, y ∈ X,
(4.1)
in which {Cn : n = 1, 2, . . . , Γ} is a family of subsets of X satisfying the following two requirements: 0 < ν(∪Γn=1 Cn ) < ∞ and ν(Cn ∩ Cl ) = 0, n 6= l. The inequality is needed in order to guarantee that F is an element of L2 (X × X, ν × ν) while the other condition enters in some orthonormality arguments (see the beginning of the proof of Lemma 4.1 below for example). The symbol χCn will stand for the usual characteristic function of Cn . Depending on the family {Cn : n = 1, 2, . . . , Γ}, F can be used to construct a convenient finite rank approximation to K, with respect to the trace norm, at least when K ∈ A(X, ν). That will become clear at the end of the section when we estimate the sum of all eigenvalues of K. The symbol I stands for the identity operator.
Vol. 64 (2009)
Eigenvalues of Integral Operators
71
Lemma 4.1. The following assertions hold: (i) The integral operator F : L2 (X, ν) → L2 (X, ν) is positive of rank at most Γ; (ii) The operator I − F is positive. Proof. The set {ν(Cn )−1/2 χCn : n = 1, 2, . . . , Γ} being L2 (X × X, ν × ν)-orthonormal, we can write F in the form F(f ) =
Γ D X
f, ν(Cn )−1/2 χCn
n=1
E 2
ν(Cn )−1/2 χCn ,
f ∈ L2 (X, ν),
(4.2)
and assertion (i) follows. The same representation shows that F is positive, having 0 and 1 as the only possible eigenvalues. As so, it is an operator of norm 1. It is now clear that, for all f ∈ L2 (X, ν), h(I − F)(f ), f i2 = hf, f i2 − hF(f ), f i2 ≥ hf, f i2 − kFkhf, f i2 = 0,
(4.3)
and the proof is complete.
In Lemma 4.2 below we will deal with the operator K1/2 FK1/2 . Lemma 4.2. Let K be an element of A(X, ν). The following assertions hold: (i) K1/2 FK1/2 is an integral operator whose kernel is an element of A(X, ν); (ii) The number Γ is an upper bound for the rank of K1/2 FK1/2 ; (iii) The operator K − K1/2 FK1/2 is positive. Proof. Let us write S := K1/2 . Recalling the proof of Lemma 3.1, we deduce that Z Z Z SFS(f )(x) = S(x, u) F (u, v) S(v, y)f (y) dν(y) dν(v) dν(u), X
X
X
2
whenever f ∈ L (X, ν) and x ∈ X. Due to Fubini’s Theorem, we conclude that SFS is an integral operator on L2 (X, ν), with kernel G ∈ L2 (X × X, ν × ν) given by the formula Z Z G(x, y) = S(x, u)F (u, v)S(v, y) dν(u) dν(v), x, y ∈ X, X
or, alternatively, Z G(x, y) = ∪Γ n=1 Cn
X
Z S(x, u)F (u, v)S(v, y) dν(u) dν(v),
x, y ∈ X.
(4.4)
∪Γ n=1 Cn
Returning to the definition of F , Z Γ Z X χCn (v) χCn (u) dν(v) dν(u) S(v, y) G(x, y) = S(x, u) 1/2 ν(Cn )1/2 ν(Cn ) X n=1 X Z Γ Z X χCn (u) χCn (v) = S(x, u) dν(u) S(y, v) dν(v), 1/2 ν(Cn ) ν(Cn )1/2 X n=1 X
x, y ∈ X.
72
Ferreira and Menegatto
IEOT
It follows that SFS has rank at most Γ. Lema 3.2 reveals that G is continuous while Lemma 4.1-(i) justifies hSFS(f ), f i2 = hFS(f ), S(f )i2 ≥ 0,
f ∈ L2 (X, ν).
In other words, G ∈ L2 P D(X) ∩ C(X × X). To finish the proof, first we use the Cauchy-Schwarz inequality to obtain 2 X Γ Z Γ Z X S(x, u) χCn (u) dν(u) ≤ |S(x, u)|2 dν(u), x ∈ X. 0 ≤ G(x, x) = 1/2 ν(C ) n X X n=1 n=1 Due to Lemma 3.3, it follows that 0 ≤ G(x, x) ≤ K(x, x)Γ,
x ∈ X,
and, therefore, the function x ∈ X → G(x, x) belongs to L1 (X, ν). This takes care of (i) and (ii). From Lemma 4.1-(ii) and (4.3), we can write hK(f ), f i2 = hS(f ), S(f )i2 ≥ hFS(f ), S(f )i2 = hSFS(f ), f i2 ,
f ∈ L2 (X, ν).
Assertion (iii) follows.
In Lemma 4.3 below, we will deduce a formula that allows one to compare the traces of K and K1/2 FK1/2 . Lemma 4.3. If K is an element of A(X, ν) then Z Z Γ X 1 [K(u, u) − K(v, u)] dν(u) dν(v) tr(K) − tr(K1/2 FK1/2 ) = ν(Cn ) Cn Cn n=1 Z + K(u, u) dν(u). X\(∪Γ n=1 Cn )
Proof. If K ∈ A(X, ν) then, due to Lemma 4.2-(i), Theorem 2.4-(iv) can be applied to both K and K1/2 FK1/2 . Hence, Z Z tr(K) − tr(K1/2 FK1/2 ) = K(x, x) dν(x) − G(x, x)dν(x). X
X
We compute these two integrals separately. Employing (4.4), Fubini’s Theorem and then Lemma 3.3, it is not hard to see that Z Z Z G(x, x) dν(x) = F (u, v)K(v, u) dν(u) dν(v) X ZX X Z = F (u, v)K(v, u) dν(u) dν(v). ∪Γ n=1 Cn
∪Γ n=1 Cn
The definition of F reveals that Z Γ X F (u, v) dν(u) = χCn (v) = 1, ∪Γ n=1 Cn
n=1
v ∈ ∪Γn=1 Cn , a.e.,
Vol. 64 (2009)
Eigenvalues of Integral Operators
so that Z
"Z
Z
#
K(u, u) dν(u) =
F (v, u) dν(v) K(u, u) dν(u)
∪Γ n=1 Cn
∪Γ n=1 Cn
∪Γ n=1 Cn
"Z
Z
#
=
F (u, v) dν(u) K(v, v) dν(v). ∪Γ n=1 Cn
Hence, Z
73
∪Γ n=1 Cn
Z
Z
K(u, u) dν(u) =
K(u, u) dν(u) + X\(∪Γ n=1 Cn )
X
K(u, u) dν(u) ∪Γ n=1 Cn
Z =
K(u, u) dν(u) X\(∪Γ n=1 Cn )
Z
Z
+
F (u, v)K(v, v) dν(u) dν(v). ∪Γ n=1 Cn
Thus, denoting S = K1/2 , Z tr(K − SFS) =
∪Γ n=1 Cn
K(u, u) dν(u)
X\(∪Γ n=1 Cn )
Z
Z F (u, v) [K(v, v) − K(v, u)] dν(u) dν(v).
+ ∪Γ n=1 Cn
∪Γ n=1 Cn
The formula in the statement of the lemma follows from (4.2).
Proposition 4.4 below is an extension of a result on best approximation by finite rank operators, originally found in [15]. Proposition 4.4. Let T be a compact self-adjoint operator on a Hilbert space H and consider its series representation T (f ) =
∞ X
λn (T )hf, φn iH φn ,
f ∈ H,
n=1
as given by the spectral theorem for such operators. If R ∈ L(H) has rank at most k then kT − Rktr ≥ kT − Tk ktr , where Tk ∈ L(H) is the truncated sum Tk (f ) =
k X
λn (T )hf, φn iH φn ,
f ∈ H.
n=1
Proof. Since T − R is compact and self-adjoint, we may consider its spectral representation ∞ X (T − R)(f ) = λn (T − R)hf, ψn iH ψn , f ∈ H. n=1
74
Ferreira and Menegatto
IEOT
Defining A0 = R and Ap (f ) = R(f ) +
p X
λn (T − R)hf, ψn iH ψn ,
f ∈ H,
p = 1, 2, . . . ,
n=1
it is easily seen that Ap has rank at most j + p and (T − Ap )(f ) =
∞ X
λn (T − R)hf, ψn iH ψn ,
f ∈ H.
n=p+1
Using Theorem 2.5 in [9] it is now seen that |λp+1 (T − R)| = kT − Ap k ≥ kT − Tj+p k ≥ |λj+p+1 (T )|,
p = 0, 1, . . . ,
and the proof follows.
Next, using Proposition 4.4, we describe a method to estimate the eigenvalues of K using the family {Cn : n = 1, 2, . . . , Γ} behind the definition of F . Theorem 4.5. Let K be an element of A(X, ν). If {Cn : n = 1, 2, . . . , Γ} is a family of subsets of X such that 0 < ν(∪Γn=1 Cn ) < ∞ and ν(Cn ∩ Cl ) = 0, n 6= l, then ∞ X
λn (K) ≤
n=Γ+1
Γ X
1 ν(Cn ) n=1 Z +
Z
Z [K(u, u) − K(v, u)] dν(u) dν(v)
Cn
Cn
K(u, u) dν(u).
X\(∪Γ n=1 Cn )
Proof. Consider the series representation for K as described in Theorem 2.4-(ii) and write T to denote the operator obtained from the series by truncating it at Γ: T (f )(x) =
Γ X
λn (K)hf, φn i2 φn ,
f ∈ L2 (X, ν).
n=1
Proposition 4.4 implies that ∞ X
λn (K) = kK − T ktr ≤ kK − K1/2 FK1/2 ktr ,
n=Γ+1
in which F is the kernel described in (4.1). Since kK − K1/2 FK1/2 ktr = tr (K) − tr (K1/2 FK1/2 ), the inequality in the statement of the theorem follows from Lemma 4.3. An alternative for the inequality in Theorem 4.5 is provided below.
Vol. 64 (2009)
Eigenvalues of Integral Operators
75
Theorem 4.6. Let K be an element of A(X, ν). If {Cn : n = 1, 2, . . . , Γ} is a family of subsets of X such that 0 < ν(∪Γn=1 Cn ) < ∞ and ν(Cn ∩ Cl ) = 0, n 6= l, then Z Z ∞ Γ X X K(u, u) + K(v, v) 1 − K(v, u) dν(u) dν(v) λn (K) ≤ ν(Cn ) Cn Cn 2 n=1 n=Γ+1 Z + K(u, u) dν(u). X\(∪Γ n=1 Cn )
Proof. It is analogous to the proof of Theorem 4.5, but using a version of Lemma 4.3 leading to an inequality involving the kernel 2−1 (K(u, u) + K(v, v)) − K(v, u). The details are left to the readers.
5. Decay rates for the eigenvalues under Lipschitz conditions Keeping the context described in Theorem 2.4, this section describes decay rates for the eigenvalues of the integral operator K, at least when the kernel K comes from A(X, ν) and satisfies a convenient Lipschitz condition. The rates hold when the metric space (X, d) fits in the description below. Let q be a positive integer and t a positive real. The space (X, d) is said to be (q, t)-compact when there exist x0 ∈ X and positive real numbers a, b, c and r0 for which the following condition holds: if N ∈ Z+ and r ≥ r0 there exist a family {Cnr : n = 1, 2, . . . , k(N )} of subsets of X, all having finite measure, such that (i) ν(Cnr ∩ Clr ) = ∅, n 6= l; (ii) d(x, y) ≤ art N −t , x, y ∈ Cnr , n = 1, 2, . . . , k(N ); (iii) k(N ) ≤ bN q ; k(N ) (iv) B[x0 , r c] := {x ∈ X : d(x, x0 ) ≤ r c} = ∪n=1 Cnr . Example.√Let X be a measurable subset of Rm having positive Lebesgue measure. Set a = m, b = 1, c = 1/2 and choose x0 ∈ X. Clearly, B[x0 , r/2] is a subset of the m-dimensional (closed) cube of edge r. Subdividing the cube in N m (not necessarily closed) m-dimensional (disjoint) cubes Qrn , n = 1, 2, . . . , N m := k(N ), then Cnr := Qrn ∩B[x0 , r/2] satisfy the conditions in the definition above with t = 1 and q = m. The number r0 can be any positive real. Example. Results in [7] and [17, p.219] reveal that a subset of the unit sphere S m−1 in Rm , endowed with its usual Lebesgue measure, is (m − 1, 1)-compact. The numbers in the definition are now a = π/2, c = 1, and r0 = 2. The constant b can be 10 while the point x0 can be any point in S m−1 . Example. A similar process can be applied to a subset X of a p-dimensional surface in Rm , endowed with its surface measure. It can be shown that (X, d), in which d is the metric induced by the usual norm of Rm , is (m1 , 1)-compact for some m1 ≤ m. If X is a subset of a p-dimensional C k -manifold M , endowed with some measure which is finite on balls, then using a Whitney-type Theorem ([10, p.54]) it can be shown that (X, d) is (m, 1)-compact whenever m is large enough and
76
Ferreira and Menegatto
IEOT
d(x, y) := d1 (f (x), f (y)), where f : M → Rm+p is an embedding and d1 is a metric in f (M ), induced by the usual norm of Rm+p . Next, we introduce the Lipschitz condition we will adopt. Let α > 0 and s ≥ 0 be constants. A kernel K : X × X → C belongs to the Lipschitz class Lipα,s (X, ν) when the following two conditions hold: (i) There exist δ > 0 and a locally integrable function A : X → [0, +∞] so that |K(x, x) − K(x, y)| ≤ A(x)d(x, y)α , (ii) There exists B ≥ 0 such that Z −s lim sup r r→∞
x, y ∈ X,
A(x) dν(x) ≤ B,
d(x, y) ≤ δ;
y ∈ X.
(5.1)
(5.2)
B[y,r]
The definition above is a weaker version of others in the literature (see [7, 12, 13]). For instance, the first inequality above is easily found in a nonlocal form such as |K(x, y) − K(x, y 0 )| ≤ A(x)d(y, y 0 )α ,
x, y, y 0 ∈ X.
Theorem 5.1. Let X be (q, t)-compact and K ∈ A(X, ν) ∩ Lipα,s (X, ν). Assume there exist β > 0 and C > 0 such that Z lim sup rβ K(x, x) dν(x) ≤ C, y ∈ X. (5.3) r→∞
X\B[y,r]
Define γ := tαβ(β + s + tα)−1 . If N is large enough then there exists a constant C1 > 0 such that ∞ X C1 λn (K) ≤ γ , N n=k(N )+1
for some k(N ) ∈ {0, 1, . . . , bN q }. Proof. Let x0 , a, b, c, and r0 be as in the definition of (q, t)-compactness and let δ, A and B as in the definition of the class Lipα,s (X, ν). Write S := K1/2 . Due to (5.2), there exists a rx0 > 0 such that Z A(x)dν(x) ≤ Brs , r ≥ rx0 . (5.4) B[x0 ,r c]
Without loss of generality we can assume that r0 > rx0 and r0 c > rx0 . For each N ∈ Z+ and r ≥ r0 consider families {Cnr : n = 1, 2, . . . , k(N )} as described in the definition of (q, t)-compactness. Theorem 4.5 implies that ∞ X n=k(N )+1
k(N )
λn (K) ≤
1 ν(Cnr ) n=1 Z + X
Z
Z [K(u, u) − K(v, u)] dν(u) dν(v)
r Cn
X\B[x0 ,r c]
r Cn
K(u, u) dν(u).
Vol. 64 (2009)
Eigenvalues of Integral Operators
77
By increasing r0 if necessary, we can use (5.3) to conclude that Z Cc−β . K(u, u) dν(u) ≤ rβ X\B[x0 ,r c] If art N −t < δ, which is always guaranteed when N is large enough, we can use (5.1) to write k(N ) ∞ X X 1 Z Z Cc−β α A(u)d(u, v) . λn (K) ≤ dν(u) dν(v) + ν(Cnr ) Cnr Cnr rβ n=1 n=k(N )+1
It is now clear that ∞ X
k(N )
λn (K) ≤
n=k(N )+1
X n=1
1 ν(Cnr )
Z
Z
r Cn
r Cn
A(u)aα
r tα Cc−β dν(u) dν(v) + N rβ
r tα k(N X) Z Cc−β A(u) dν(u) + ≤a N rβ r n=1 Cn Z r tα Cc−β ≤ aα . A(u) dν(u) + N rβ B[x0 ,r c] α
Recalling (5.4), we finally deduce that ∞ r tα αt+s X Cc−β Cc−β αr Brs + = Ba + , λn (K) ≤ aα N rβ N αt rβ
(5.5)
n=k(N )+1
as long as r ≥ r0 and N is large enough. To conclude the proof, we will apply the above estimate using a special choice of r. Precisely, we will put r = r(N ) := N αt/(β+αt+s) . Since limN →∞ r(N ) = ∞, r(N ) ≥ r0 when N is large enough. Since r(N ) = 0, N the inequality art N −t < δ can be equally captured. Since σ := αt/(β + αt + s) satisfies αt − σ(αt + s) = σβ, inequality (5.5) takes the form ∞ X Baα + Cc−β λn (K) ≤ αtβ/(αt+β+s) . N lim
N →∞
n=k(N )+1
A special case is as follows. Theorem 5.2. Let X be (q, t)-compact and K ∈ A(X, ν) ∩ Lipα,s (X, ν). If either X is bounded or K vanishes outside of a bounded set and N is large enough then there exists a constant C1 > 0 such that ∞ X C1 λn (K) ≤ tα , N n=k(N )+1
for some k(N ) ∈ {0, 1, . . . , bN q }.
78
Ferreira and Menegatto
IEOT
Proof. Under either condition mentioned in the statement of the theorem, there exists r0 > 0 such that Z K(u, u) dν(u) = 0, r > r0 , y ∈ X. X\B[y,r]
Repeating the arguments used in the proof of Lemma 5.1 and adjusting r0 , if necessary, inequality (5.5) reduces itself to ∞ X
λn (K) ≤ Baα
n=k(N )+1
rαt+s N αt
as long as r ≥ r0 and N is large enough. In particular, ∞ X
λn (K) ≤ Baα
n=k(N )+1
(r0 + 1)αt+s N αt
for N arbitrarily large.
In order to re-phrase the previous results in a language a little bit more familiar, we will need a lemma ([7]). Lemma 5.3. Let {an } be a non-increasing sequence of nonnegative real numbers. Let l, q and N0 be nonnegative integers, p a positive integer at least 1 and γ ∈ R. Suppose there exists a constant C > 0 satisfying the following property: if N ≥ N0 , there exists k(N ) ≤ pN q such that ∞ X
an ≤
n=k(N )+l+1
C . Nγ
Then, the set {n1+γ/q an : n = 1, 2, . . .} is bounded. In particular, an = O(n−1−γ/q ),
as n → ∞.
The main results of the paper are as follows. Theorem 5.4. Let X be (q, t)-compact and K ∈ A(X, ν) ∩ Lipα,s (X, ν). If there exist β > 0 and C ≥ 0 such that Z β lim sup r K(x, x) dν(x) ≤ C, y ∈ X, (5.6) r→∞
X\B[y,r]
then λn (K) = O(n−1−γ/q ), −1
where γ := tαβ(β + s + tα)
as n → ∞,
(5.7)
.
Proof. This follows from Theorem 5.1 and Lemma 5.3.
Vol. 64 (2009)
Eigenvalues of Integral Operators
79
Theorem 5.5. Let X be (q, t)-compact and K ∈ A(X, ν)∩Lipα,s (X, ν). If for every β > 0 there exists C = C(β) ≥ 0 such that Z lim sup rβ K(x, x) dν(x) ≤ C, y ∈ X, (5.8) r→∞
X\B[y,r]
then λn (K) = o(n−1−θ/q ),
as n → ∞,
β , β + s + tα
β ∈ [0, ∞),
whenever θ ∈ [0, tα). Proof. The function γ(β) := tα
is continuous with range [0, tα). As so, the previous theorem implies that λn (K) = O(n−1−θ/q ),
as n → ∞,
λn (K) 6= o(n−1−γ0 /q ),
as n → ∞,
whenever θ ∈ [0, tα). If
for some γ0 ∈ [0, tα), then there would exist C > 0 such that lim sup{n−1−γ0 /q λn (K)} ≥ C. n→∞
But this would imply in unbounded sequences {n1+θ/q λn (K)} when θ ∈ (γ0 , tα), a clear contradiction. Theorem 5.6. Let X be (q, t)-compact and K ∈ A(X, ν) ∩ Lipα,s (X, ν). If either X is bounded or K vanishes outside a bounded set then λn (K) = O(n−1−tα/q ),
as n → ∞.
Proof. This follows from Theorem 5.2 and Lemma 5.3.
The reader is advised that the results above generalize some of the results proved in [2] to the multi-dimensional case. There, the authors use a particular case of Theorem 4.6 to obtain decay rates for the eigenvalues of K under differentiability hypotheses. We intend to use Theorem 4.6 to investigate multi-dimensional versions of such context in a future work. Lets return to the context of Rm . If X is a finite union of convex subsets m of R and the assumption K ∈ Lipα,s (X, µ) is changed to the existence and boundedness of ∂K/∂x then the mean value inequality and the continuity of K show that K ∈ Lip1,m (Xl , µ), in which Xl is a convex component of X. In view of this, some of the proofs can be adapted to show that the estimate (5.7) holds with γ := β(β + m + 1)−1 . Finally, we would like to observe that the existence of a β > 0 so that lim sup |x|β+m K(x, x) < ∞ |x|→∞
80
Ferreira and Menegatto
IEOT
implies condition (5.6) in Theorem 5.4. Here, | · | stands for the usual norm in Rm . A similar remark applies to condition (5.8) in Theorem 5.5.
References [1] Buescu, J., Positive integral operators in unbounded domains. J. Math. Anal. Appl. 296 (2004), no. 1, 244–255. [2] Buescu, J.; Paix˜ ao, A. C., Eigenvalues of positive definite integral operators on unbounded intervals. Positivity 10 (2006), no. 4, 627–646. [3] Buescu, J.; Paix˜ ao, A. C., Eigenvalue distribution of positive definite kernels on unbounded domains. Integral Equations Operator Theory 57 (2007), no. 1, 19–41. [4] Buescu, J.; Paix˜ ao, A. C., Eigenvalue distribution of Mercer-like kernels. Math. Nachr. 280 (2007), no. 9-10, 984–995. [5] Cheney, E. W., Analysis for applied mathematics. Graduate Texts in Mathematics, 208. Springer-Verlag, New York, 2001. [6] Ferreira, J. C.; Menegatto, V. A.; Oliveira, C. P., On the nuclearity of integral operators, Positivity, to appear. [7] Ferreira, J. C.; Menegatto, V. A.; Peron, A. P., Integral operators on the sphere generated by positive definite smooth kernels, J. Complexity, 24 (2008), no. 5-6, 632– 647. [8] Folland, G. B., Real analysis. Modern techniques and their applications. Second edition. Pure and Applied Mathematics (New York). A Wiley-Interscience Publication. John Wiley & Sons, Inc., New York, 1999. [9] Gohberg, I.; Goldberg, S.; Krupnik, N., Traces and determinants of linear operators. Operator Theory: Advances and Applications, 116. Birkh¨ auser Verlag, Basel, 2000. [10] Guillemin, V.; Pollack, A., Differential Topology. Prentice Hall, 1974. [11] K¨ onig, H., Eigenvalue distribution of compact operators. Operator Theory: Advances and Applications, 16. Birkh¨ auser Verlag, Basel, 1986. [12] K¨ uhn, T., Eigenvalues of integral operators with smooth positive definite kernels. Arch. Math. (Basel), 49 (1987), no. 6, 525–534. [13] K¨ uhn, T., Eigenvalues of integral operators generated by positive definite H¨ older continuous kernels on metric compacta. Indag. Math. 49 (1987), no. 1, 51–61. [14] Novitski˘ı, I. M., Representation of kernels of integral operators by bilinear series. (Russian) Sibirsk. Mat. Zh. 25 (1984), no. 5, 114–118. [15] Reade, J. B., Eigenvalues of positive definite kernels. SIAM J. Math. Anal. 14 (1983), no. 1, 152–157. [16] Reade, J. B., On the sharpness of Weyl’s estimate for eigenvalues of smooth kernels. SIAM J. Math. Anal., vol. 16 (1985), no. 3, 137–142. [17] Reimer, M., Multivariate polynomial approximation, Vol. 144, Birkh¨ auser, Berlin, 2003. [18] Sun, Hongwei, Mercer theorem for RKHS on noncompact sets. J. Complexity 21 (2005), no. 3, 337–349.
Vol. 64 (2009)
Eigenvalues of Integral Operators
81
[19] Young, N., An introduction to Hilbert space. Cambridge Mathematical Textbooks. Cambridge University Press, Cambridge, 1988. J. C. Ferreira and V. A. Menegatto Departamento de Matem´ atica ICMC-USP - S˜ ao Carlos Caixa Postal 668 13560-970 S˜ ao Carlos SP Brasil e-mail:
[email protected] [email protected] Submitted: September 17, 2008. Revised: March 4, 2009.
Integr. equ. oper. theory 64 (2009), 83–113 c 2009 Birkh¨
auser Verlag Basel/Switzerland 0378-620X/010083-31, published online April 24, 2009 DOI 10.1007/s00020-009-1678-x
Integral Equations and Operator Theory
Generalized Polar Decompositions for Closed Operators in Hilbert Spaces and Some Applications Fritz Gesztesy, Mark Malamud, Marius Mitrea and Serguei Naboko Abstract. We study generalized polar decompositions of densely defined closed linear operators in Hilbert spaces and provide some applications to relatively (form) bounded and relatively (form) compact perturbations of self-adjoint, normal, and m-sectorial operators. Mathematics Subject Classification (2000). Primary: 47A05, 47A07; Secondary: 47A55. Keywords. Polar decomposition, relatively bounded and relatively form bounded perturbations, relatively compact and relatively form compact perturbations.
1. Introduction This paper had its origin in attempts of proving that certain operators of the type (A + IH )−1/2 B(A + IH )−1/2 ,
(1.1)
in a complex, separable Hilbert space H (where S denotes the closure of the operator S and IH is the identity operator in H), are bounded, respectively, compact, where A > 0 is self-adjoint in H, and B is a densely defined closed operator in H. To prove such a result, it became desirable to replace the standard polar decomposition of B (cf. [5, Sect. IV.3], [11, Sect. VI.2.7]), B = U |B| = |B ∗ |U on dom(B) = dom(|B|),
(1.2)
by some modified polar decomposition of the type B = |B ∗ |1/2 U |B|1/2 on dom(B) = dom(|B|),
(1.3)
Based upon work partially supported by the US National Science Foundation under Grant Nos. DMS-0400639 and FRG-0456306, and the Austrian Science Fund (FWF) under Grant No. Y330.
84
Gesztesy, Malamud, Mitrea and Naboko
IEOT
and then reduce boundedness, respectively, compactness of the operator (1.1) to that of |B|1/2 (A + IH )−1/2 and |B ∗ |1/2 (A + IH )−1/2 . (1.4) With (1.3) in mind, it is natural to try to establish that, in fact, the following version of (1.3) holds B = |B ∗ |α U |B|1−α on dom(B) = dom(|B|)
(1.5)
for all α ∈ [0, 1]. In fact, after this was accomplished, it became clear that the following rather general polar-type decomposition can be established B = φ(|B ∗ |)U ψ(|B|) on dom(B) = dom(|B|),
(1.6)
where φ and ψ are Borel functions on R with the property that φ(λ)ψ(λ) = λ, λ ∈ R, and such that dom(|B|) ⊆ dom(ψ(|B|)). Finally, an even more general version of (1.6) is to show that an operator T introduced as T = V A1 = A2 V on dom(T ) = dom(A1 ), (1.7) also has the representation T = φ(A2 )V ψ(A1 ) on dom(T ) = dom(A1 )
(1.8)
for any pair of self-adjoint (in fact, also normal) operators Aj , j = 1, 2, and any bounded operator V satisfying V dom(A1 ) ⊆ dom(A2 ), assuming also dom(A1 ) ⊆ dom(ψ(A1 )) (cf. Theorems 2.1 and 2.3 for details). In Section 2 we provide proofs of (1.6) and (1.8), and in Section 3 we discuss some applications to relatively (form) bounded and relatively (form) compact perturbations of self-adjoint operators. In the final Section 4 we discuss some applications to m-sectorial operators.
2. Generalized polar decompositions To set the stage, let Hj , j = 1, 2, be two separable complex Hilbert spaces with scalar products and norms denoted by (·, ·)Hj and k · kHj , j = 1, 2, respectively. The identity operators in Hj are written as IHj , j = 1, 2. We denote by B(H1 , H2 ) (resp., B∞ (H1 , H2 )) the Banach space of linear bounded (resp., compact) operators from H1 into H2 . If H1 = H2 = H, these spaces are denoted by B(H) (resp., B∞ (H)). The domain, range, kernel (null space), resolvent set, and spectrum of a linear operator will be denoted by dom(·), ran(·), ker(·), ρ(·), and σ(·), respectively. Finally, we let S stand for the closure of an operator S. We assume that Aj are self-adjoint operators in Hj with domains dom(Aj ), j = 1, 2,
(2.1)
and that V ∈ B(H1 , H2 )
(2.2)
V dom(A1 ) ⊆ dom(A2 ).
(2.3)
satisfies
Vol. 64 (2009)
Generalized Polar Decompositions
85
In addition, suppose that V A1 = A2 V on dom(A1 ).
(2.4)
Next, given a self-adjoint operator A in a complex separable Hilbert space H, we denote by {EA (λ)}λ∈R the family of spectral projections associated with A, and we introduce the function ρf by ( R → [0, ∞), f ∈ H. (2.5) ρf : λ 7→ kEA (λ)f k2H , Clearly, ρf is bounded, non-decreasing, right-continuous, and lim ρf (λ) = 0,
λ↓−∞
lim ρf (λ) = kf k2H ,
λ↑∞
f ∈ H.
(2.6)
Hence, ρf generates a measure, denoted by dρf , in a canonical manner. A function φ : R → C is then called dEA -measurable if it is dρf -measurable for all f ∈ H. Standard examples of dEA -measurable functions are all continuous functions, all step functions, all pointwise limits of step functions, and all Borel measurable functions. Given a dEA -measurable function φ, the operator φ(A) is then defined in terms of the spectral representation of A as usual by Z Z dkEA (λ)f k2H |φ(λ)|2 < ∞ . φ(A) = dEA (λ) φ(λ), dom(φ(A)) = f ∈ H R
R
(2.7)
Our first result then reads as follows: Theorem 2.1. Suppose Aj , j = 1, 2, and V satisfy (2.1)–(2.4), and consider the operator T given by T = V A1 = A2 V on dom(T ) = dom(A1 ).
(2.8)
(i) If ψ is both a dEA1 - and dEA2 -measurable function on R, then V dom(ψ(A1 )) ⊆ dom(ψ(A2 ))
(2.9)
V ψ(A1 ) = ψ(A2 )V on dom(ψ(A1 )).
(2.10)
and (ii) Assume that φ and ψ are simultaneously dEA1 - and dEA2 -measurable functions on R such that φ(λ)ψ(λ) = λ,
λ ∈ R,
(2.11)
and dom(A1 ) ⊆ dom(ψ(A1 )).
(2.12)
T = φ(A2 )V ψ(A1 ) on dom(T ) = dom(A1 ).
(2.13)
Then
86
Gesztesy, Malamud, Mitrea and Naboko
IEOT
Proof. Since V A1 ⊆ A2 V , one infers V (A1 − zIH1 ) ⊆ (A2 − zIH2 )V and hence V (A1 − zIH1 )−1 = (A2 − zIH2 )−1 V,
z ∈ C\R.
(2.14)
In the following we denote by {EAj (λ)}λ∈R the family of (strongly right-continuous) spectral projections of the self-adjoint operators Aj , j = 1, 2. Then, the representation (cf. [11, Sect. VI.5.2]) EAj (λ) = IHj − 21 Uj (λ) + Uj (λ)2 , λ ∈ R, j = 1, 2, (2.15) where 2 ε↓0, R↑∞ π
Z
Uj (λ) = s-lim
R
−1 dη (Aj −λIHj ) (Aj −λIHj )2 +η 2 IHj ,
λ ∈ R, j = 1, 2,
ε
(2.16) (here s-lim denotes the strong limit in Hj ) yields V EA1 (λ) = EA2 (λ)V,
λ ∈ R.
Next, choose f ∈ dom(ψ(A1 )). Then Z R Z R dkEA2 (λ)V f k2H2 |ψ(λ)|2 = dkV EA1 (λ)f k2H2 |ψ(λ)|2 −R −R Z dkV EA1 (λ)f k2H2 |ψ(λ)|2 ≤ kV k2B(H1 ,H2 ) kψ(A1 )f k2H1 . −→ R↑∞
(2.17)
(2.18)
R
Thus, f ∈ dom(ψ(A1 )) implies V f ∈ dom(ψ(A2 )), proving (2.9). Choosing f ∈ dom(ψ(A1 )) and g ∈ H2 then yields Z (V ψ(A1 )f, g)H2 = d(V EA1 (λ)f, g)H2 ψ(λ) ZR = d(EA2 (λ)V f, g)H2 ψ(λ) R
= (ψ(A2 )V f, g)H2 ,
(2.19)
and hence (2.10) is proven. Finally, (2.13) follows from (2.10)–(2.12) since φ(A2 )V ψ(A1 ) = φ(A2 )ψ(A2 )V = A2 V = T, concluding the proof.
(2.20)
Remark 2.2. (i) The crucial intertwining relation (2.17) also follows from (2.14) and the Stieltjes inversion formula for (finite) complex measures (cf., e.g., [23, App. B]). Indeed, Z Z d(V EA1 (λ)f, g)H2 (λ − z)−1 = d(EA2 (λ)V f, g)H2 (λ − z)−1 , (2.21) R R z ∈ C\R, f ∈ H1 , g ∈ H2 , implies d(V EA1 (·)f, g)H2 = d(EA2 (·)V f, g)H2 ,
f ∈ H1 , g ∈ H2 ,
(2.22)
Vol. 64 (2009)
Generalized Polar Decompositions
87
and hence (2.17). (ii) In the special case where in addition to (2.1)–(2.4), Aj are bounded, Aj ∈ B(Hj ), j = 1, 2, one can also derive (2.13) for functions φ and ψ continuous in an open neighborhood of the spectra of A1 and A2 using a Stone–Weierstrass approximation argument. Now we turn our attention to a pair of normal operators Aj , j = 1, 2, with the aim of proving the analog of Theorem 2.1 in this case. For an extensive treatment of normal operators and the spectral family and spectral theorem associated with them, we refer to [23, Sects. 5.6 and 7.5]. Thus, we assume that Aj are normal operators in Hj with domains dom(Aj ), j = 1, 2, (i.e.,
Aj A∗j
=
A∗j Aj
and dom(Aj ) =
dom(A∗j ),
(2.23)
j = 1, 2) such that
ρ(A1 ) ∩ ρ(A2 ) 6= ∅.
(2.24)
V ∈ B(H1 , H2 )
(2.25)
V dom(A1 ) ⊆ dom(A2 ),
(2.26)
In addition, suppose that satisfies and assume that V A1 = A2 V on dom(A1 ). (2.27) Given a normal operator A in a complex separable Hilbert space H we denote by {EA (ν)}ν∈C the family of spectral projections associated with A. We recall that (A + A∗ )/2 and (A − A∗ )/(2i) are self-adjoint, in addition, we denote by {E(A+A∗ )/2 (λ)}λ∈R and {E(A−A∗ )/(2i) (λ)}λ∈R the corresponding family of spectral projections. Then the family of spectral projections {EA (ν)}ν∈C for the normal operator A is given by (cf. [23, Theorem 7.32]) EA (ν) = E(A+A∗ )/2 (λ) E(A−A∗ )/(2i) (µ) = E(A−A∗ )/(2i) (µ) E(A+A∗ )/2 (λ), ν = λ + iµ ∈ C, λ, µ ∈ R.
(2.28)
In analogy to the self-adjoint case one then defines the function τf by ( C → [0, ∞), τf : f ∈ H. (2.29) ν 7→ kEA (ν)f k2H , As discussed in [23, Appendix A.1], introducing N = L × M = {z ∈ C | Re(z) ∈ L, Im(z) ∈ M }
(2.30)
for arbitrary intervals L, M ⊆ R, then τf (N ) = kEA (N )f k2H = kE(A+A∗ )/2 (L) E(A−A∗ )/(2i) (M )f k2H
(2.31)
defines a regular interval function and hence a measure dτf for each f ∈ H. A function φ : C → C is then called dEA -measurable if it is dτf -measurable for all f ∈ H.
88
Gesztesy, Malamud, Mitrea and Naboko
IEOT
Theorem 2.3. Suppose Aj , j = 1, 2, and V satisfy (2.23)–(2.27), and consider the operator T given by T = V A1 = A2 V on dom(T ) = dom(A1 ).
(2.32)
(i) If ψ is both a dEA1 - and dEA2 -measurable function on C then V dom(ψ(A1 )) ⊆ dom(ψ(A2 ))
(2.33)
and V ψ(A1 ) = ψ(A2 )V on dom(ψ(A1 )). (2.34) (ii) Assume that φ and ψ are simultaneously dEA1 - and dEA2 -measurable functions on C such that φ(λ)ψ(λ) = λ, λ ∈ C, (2.35) and dom(A1 ) ⊆ dom(ψ(A1 )). (2.36) Then T = φ(A2 )V ψ(A1 ) on dom(T ) = dom(A1 ). (2.37) Proof. The idea of the proof is to try to reduce the case of normal operators to that of self-adjoint ones treated in Theorem 2.1. With this goal in mind, pick z ∈ C\(σ(A1 ) ∪ σ(A2 )) for the remainder of this proof. Then V A1 ⊆ A2 V implies again V (A1 − zIH1 )−1 = (A2 − zIH2 )−1 V, (2.38) and hence also V eiζ(A1 −zIH1 )
−1
−1
= eiζ(A2 −zIH2 ) V,
ζ ∈ C,
(2.39)
applying (2.38) repeatedly to all terms in the norm convergent Taylor expansion of both exponentials in (2.39). (Here ζ denotes the complex conjugate of ζ ∈ C.) In particular, −1
−1
V = eiζ(A2 −zIH2 ) V e−iζ(A1 −zIH1 ) ,
ζ ∈ C.
(2.40)
Thus, one obtains ∗
−1
∗
eiζ(A2 −z) V e−iζ(A1 −z) ∗
−1
−1
−1
−1
∗
= eiζ(A2 −z) eiζ(A2 −zIH2 ) V e−iζ(A1 −zIH1 ) e−iζ(A1 −z) = eiB2 (ζ) V e−iB1 (ζ) ,
−1
ζ ∈ C,
(2.41)
where we have set B1 (ζ) = ζ(A∗1 − z)−1 + ζ(A1 − zIH1 )−1 = B1 (ζ)∗ , B2 (ζ) = ζ(A∗2 − z)−1 + ζ(A2 − zIH2 )−1 = B2 (ζ)∗ . Consequently,
iζ(A∗ −z)−1 −iζ(A∗ −z)−1
e
2 1 Ve = kV kB(H1 ,H2 ) , B(H1 ,H2 )
ζ ∈ C.
(2.42)
(2.43)
Since the left-hand side of (2.41) is entire with respect to ζ ∈ C, the uniform boundedness in (2.43) and Liouville’s theorem yield that the left-hand side of
Vol. 64 (2009)
Generalized Polar Decompositions
89
(2.41) is actually constant with respect to ζ ∈ C. Thus, the left-hand side of (2.41) equals its value at ζ = 0, allowing one to conclude that ∗
−1
∗
eiζ(A2 −z) V e−iζ(A1 −z)
−1
= V,
ζ ∈ C.
(2.44)
Differentiating (2.44) with respect to ζ and subsequently taking ζ = 0, then yields V (A∗1 − z)−1 = (A∗2 − z)−1 V,
(2.45)
and consequently, V A∗1 = A∗2 V on dom(A∗1 ). Equations (2.32) and (2.46) together imply
(2.46)
V (A1 ± A∗1 ) = (A2 ± A∗2 )V on dom(A1 ) = dom(A∗1 ).
(2.47)
Next we will show that (2.47) extends to the closures of Aj ± A∗j , j = 1, 2, as follows: First, we note that Aj ± A∗j , j = 1, 2, are symmetric and hence closable. Next, pick arbitrary f± ∈ dom A1 ± A∗1 and let f±,n ∈ dom(A1 ) = dom(A∗1 ) be such that
lim kf±,n −f± kH1 = 0 and lim (A1 ±A∗1 )f±,n −(A1 ± A∗ )f± = 0. (2.48) n→∞
1
n→∞
H1
Given that V ∈ B(H1 , H2 ), one also has
lim kV f±,n − V f± kH = 0 and lim V (A1 ± A∗1 )f±,n − V (A1 ± A∗ )f± 2
n→∞
1
n→∞
H2
= 0.
(2.49) Since A2 ± A∗2 are closable and
lim (A2 ± A∗2 )V f±,n − V (A1 ± A∗1 )f± H2 n→∞
= lim V (A1 ± A∗1 )f±,n − V (A1 ± A∗1 )f± H2 = 0,
(2.50)
n→∞
one obtains V f±,n ∈ dom A2 ± A∗2
and
lim (A2 ± A∗2 )V f±,n − (A2 ± A∗2 )V f± H2 = 0,
n→∞
(2.51) and thus, (2.52) V (A1 ± A∗1 )f± = (A2 ± A∗2 )V f± . ∗ Upon recalling that f± ∈ dom A1 ± A1 were arbitrary, this finally implies that V (A1 ± A∗1 ) = (A2 ± A∗2 )V on dom A1 ± A∗1 . (2.53) Next, we recall that (Aj + A∗j )/2 and (Aj − A∗j )/(2i), j = 1, 2, are selfadjoint, and we denote by {E(Aj +A∗ )/2 (λ)}λ∈R and {E(Aj −A∗ )/(2i) (λ)}λ∈R , j = j j 1, 2, the corresponding family of spectral projections. Analogously to (2.28), the families of spectral projections {EAj (ν)}ν∈C for the normal operators Aj , j = 1, 2, are given by EAj (ν) = E(Aj +A∗ )/2 (λ) E(Aj −A∗ )/(2i) (µ) = E(Aj −A∗ )/(2i) (µ) E(Aj +A∗ )/2 (λ), j
j
j
j
ν = λ + iµ ∈ C, λ, µ ∈ R, j = 1, 2.
(2.54)
90
Gesztesy, Malamud, Mitrea and Naboko
IEOT
As in the proof of (2.17), equations (2.53) then yield V E(A1 +A∗ )/2 (λ) = E(A2 +A∗ )/2 (λ)V, 1
2
V E(A1 −A∗ )/(2i) (µ) = E(A1 −A∗ )/(2i) (µ)V, 2
2
λ, µ ∈ R.
(2.55)
From (2.54) and (2.55) one then deduces that V EAj (ν) = EAj (ν)V,
ν ∈ C, j = 1, 2.
(2.56)
With this in hand, the proof is then completed by following the last part of the RR R proof of Theorem 2.1 step by step (replacing −R by |ν|6R , etc.). Remark 2.4. We note that the strategy just employed to prove that (2.32) implies (2.46) is essentially outlined in the special context of similarity and unitarity of normal operators (where A2 = A1 ) in [23, p. 219]. After completing this proof, we became aware of the detailed history of this type of results: Apparently, Fuglede [6] first proved that V A ⊆ AV , with V bounded and A normal, implies V A∗ ⊆ A∗ V . This was extended by Putnam [15] to the result at hand, viz., V A1 ⊆ A2 V , with V bounded and Aj normal, j = 1, 2, implies V A∗1 ⊆ A∗2 V . Finally, the proof of (2.46) we presented is basically due to Rosenblum [19]. For the convenience of the reader (and for some measure of completeness) we decided to keep the short proof of (2.46). For a detailed history of this circle of ideas we refer to [16, p. 9–11]. Remark 2.5. For Aj ∈ B(Hj ) (Aj not necessarily normal), j = 1, 2, and functions φ, ψ analytic in an open neighborhood of the spectra of A1 and A2 , one can also use the Dunford–Taylor functional calculus (see, e.g., [3, Sect. VII.3]) to prove (2.37). To make the connection with the polar decomposition of densely defined closed operators in Hilbert spaces, and some of its generalizations, which originally motivated the writing of this paper, we next recall a few facts: Given a densely defined closed linear operator S : dom(S) → H2 , dom(S) ⊆ H1 , the self-adjoint operator |S| is defined as usual by |S| = (S ∗ S)1/2 ≥ 0.
(2.57)
Moreover, we denote by PM the orthogonal projection onto the closed linear subspace M of a Hilbert space. The basic facts about the polar decomposition of closed linear operators then read as follows: Theorem 2.6. ([11, Sect. VI.2.7] (see also [5, Sect. IV.3])) Let T : dom(T ) ⊆ H1 → H2 be a densely defined closed linear operator. Then, T = U |T | = |T ∗ |U = U T ∗ U on dom(T ) = dom(|T |), ∗
∗
∗
∗
∗
T = U |T | = |T |U = U T U ∗
∗
∗
∗
∗
on dom(T ) = dom(|T |),
∗
|T | = U T = T U = U |T |U on dom(|T |), ∗
∗
∗
|T | = U T = T U = U |T |U
∗
(2.58) ∗
∗
on dom(|T |),
(2.59) (2.60) (2.61)
Vol. 64 (2009)
Generalized Polar Decompositions
91
where U ∗ U = Pran(|T |) = Pran(T ∗ ) ,
U U ∗ = Pran(|T ∗ |) = Pran(T ) .
(2.62)
In particular, U is a partial isometry with initial set ran(|T |) and final set ran(T ). Identifying V = U , A1 = |T |, A2 = |T ∗ |, Theorem 2.1 immediately implies the following generalized polar decomposition of T in (2.58): Theorem 2.7. Let T : dom(T ) → H2 , dom(T ) ⊆ H1 be a densely defined closed operator with polar decomposition as in (2.58). In addition, assume that φ and ψ are Borel functions on R such that φ(λ)ψ(λ) = λ, λ ∈ R, and dom(|T |) ⊆ dom(ψ(|T |)). Then T has the representation T = φ(|T ∗ |)U ψ(|T |) on dom(T ) = dom(|T |).
(2.63)
In particular, for each α ∈ [0, 1], T = |T ∗ |α U |T |1−α on dom(T ) = dom(|T |).
(2.64)
Remark 2.8. We note that in the case of a bounded operator T , (2.64) also follows from (2.58) and a Stone–Weierstrass-type approximation argument. More precisely, approximating the functions λ 7→ λα uniformly by a sequence of polynomials on a compact interval then yields (2.64) in analogy to the treatment in [22, p. 6–7] in connection with contractions and their associated defect operators. Closely related to this circle of ideas is the proof of the identity T f (|T |) = f (|T ∗ |)T,
(2.65)
for bounded operators T and continuous functions f on [0, ∞) in the proof of Lemma 9.5.1 in [2], using a Weierstrass approximation argument. Remark 2.9. The symmetric case α = 1/2 in (2.64) (which will play a special role in the following sections) permits a fairly simple and direct proof that we briefly sketch next: Define R = U ∗ |T ∗ |1/2 U . Then R ≥ 0 and R is densely defined since dom(R) = dom(|T ∗ |1/2 U ) ⊇ dom(|T ∗ |U ) = dom(T ). Thus one concludes that R is symmetric, R∗ ⊇ U ∗ |T ∗ |1/2 U = R. In addition, R∗ R ⊇ U ∗ |T ∗ |1/2 U U ∗ |T ∗ |1/2 U = U ∗ |T ∗ |U = |T |,
(2.66)
using the second relation in (2.62), U U ∗ = Pran(|T ∗ |) = Pran(|T ∗ |1/2 ) . Thus (R)∗ R ⊇ |T |, and since |T | is self-adjoint and hence maximal, one obtains (R)∗ R = |T |. In exactly the same manner one infers RR∗ ⊇ U ∗ |T ∗ |1/2 U U ∗ |T ∗ |1/2 U = U ∗ |T ∗ |U = |T |, ∗
∗
(2.67)
∗
hence, R(R) ⊇ |T | and thus, (R) R = R(R) = |T |. That is, R is normal and symmetric, and hence self-adjoint. Since in addition, R ≥ 0, R is the unique selfadjoint, nonnegative square root of |T |, R = (R)∗ = |T |1/2 .
(2.68)
92
Gesztesy, Malamud, Mitrea and Naboko
IEOT
Introducing S = U |T |1/2 U ∗ , one obtains analogously, S = (S)∗ = |T ∗ |1/2 .
(2.69)
Thus, |T |1/2 ⊇ R = U ∗ |T ∗ |1/2 U,
|T ∗ |1/2 ⊇ S = U |T |1/2 U ∗ .
(2.70)
Next, using also the first relation in (2.62), U ∗ U = Pran(|T |) = Pran(|T |1/2 ) , one infers U ∗ |T ∗ |1/2 ⊇ U ∗ U |T |1/2 U ∗ = |T |1/2 U ∗ ,
|T |1/2 U ∗ ⊇ U ∗ |T ∗ |1/2 U U ∗ = U ∗ |T ∗ |1/2 , (2.71)
and hence U ∗ |T ∗ |1/2 = |T |1/2 U ∗ , implying U U ∗ |T ∗ |1/2 = |T ∗ |1/2 = U |T |1/2 U ∗ .
(2.72)
But then, |T ∗ |1/2 U |T |1/2 = U |T |1/2 U ∗ U |T |1/2 = U |T | = T,
(2.73)
as was to be proven.
3. Some applications to relatively (form) bounded and relatively (form) compact perturbations of self-adjoint operators The symmetric version T = |T ∗ |1/2 U |T |1/2 on dom(T ) = dom(|T |)
(3.1)
of equation (2.64) permits some applications to relatively (form) bounded and compact perturbations of a self-adjoint operator which we briefly discuss in this section. The first application concerns circumstances in which relatively bounded perturbations are also relatively form bounded perturbations of a self-adjoint operator. While, as noted in [11, Sect. VI.1.7], there seems to be no general connection between relative boundedness and relative form boundedness, such a connection does exist for symmetric perturbations of a self-adjoint operator (cf. [11, Sect. VI.1.7] and [17, Sect. X.2]). Here we add another result of this type. To set the stage, we briefly recall the notion of relatively bounded and relatively form bounded perturbations of an operator A in some complex separable Hilbert space H. For simplicity we will actually assume that A is a closed operator with nonempty resolvent set for the remainder of this section. We recall the following definition: Definition 3.1. (i) Suppose that A is a closed operator in H and ρ(A) 6= ∅. An operator B in H is called relatively bounded (resp., relatively compact ) with respect to A (in short, B is called A-bounded (resp., A-compact )), if dom(B) ⊇ dom(A) and B(A − zIH )−1 ∈ B(H) (resp., ∈ B∞ (H)),
z ∈ ρ(A). (3.2)
Vol. 64 (2009)
Generalized Polar Decompositions
93
(ii) Assume, in addition, that A is self-adjoint in H and bounded from below, that is, A > cIH for some c ∈ R. Then a densely defined and closed operator B in H is called relatively form bounded (resp., relatively form compact ) with respect to A (in short, B is called A-form bounded (resp., A-form compact )), if dom |B|1/2 ⊇ dom |A|1/2 (3.3) and |B|1/2 ((A + (1 − c)IH ))−1/2 ∈ B(H) (resp., ∈ B∞ (H)). In particular, B is A-form bounded (resp., A-form compact), if and only if |B| is. We emphasize that in Definition 3.1 (ii), since A1/2 and |B|1/2 are closed, dom |B|1/2 ⊇ dom A1/2 already implies |B|1/2 ((A + (1 − c)IH ))−1/2 ∈ B(H) (cf. [11, Remark IV.1.5]), and hence the first condition in (3.3) suffices in the relatively form bounded context. In this context we note that in the special case where B is self-adjoint, condition (i) in the definition used by Reed and Simon [17, p. 168] already implies their condition (ii). In fact, it implies a bit more, namely, the existence of α ≥ 0 and β ≥ 0, such that
|B|1/2 f, sgn(B)|B|1/2 f ≤ |B|1/2 f 2 ≤ α |A|1/2 f 2 + βkf k2H , H H H (3.4) f ∈ dom |A|1/2 . Similarly, if B is closed (in fact, closability of B suffices) in Definition 3.1 (i), then the first condition dom(B) ⊇ dom(A) in (3.2) already implies B(A−zIH )−1 ∈ B(H), z ∈ ρ(A), and hence the A-boundedness of B. Using the polar decomposition of B (i.e., B = U |B|), one observes that B is A-bounded (resp., A-compact) if and only if |B| is A-bounded (resp., A-compact). We recall that in connection with relative boundedness, (3.2) can be replaced by the condition dom(B) ⊇ dom(A), and there exist numbers a > 0, b > 0 such that kBf kH 6 akAf kH + bkf kH for all f ∈ dom(A),
(3.5)
or equivalently, by dom(B) ⊇ dom(A), and there exist numbers e a > 0, eb > 0 such that kBf k2H 6 e a2 kAf k2H + eb2 kf k2H for all f ∈ dom(A).
(3.6)
Clearly, (3.6) implies (3.5) with a = e a, b = eb and conversely, (3.5) implies (3.6) with e a2 = (1 + ε)a2 , eb2 = (1 + ε−1 )b2 for each ε > 0. We also note that if A is self-adjoint and bounded from below, the number α defined by
α = lim B(A + µIH )−1 B(H) = lim |B|(A + µIH )−1 B(H) (3.7) µ↑∞
µ↑∞
equals the greatest lower bound (i.e., the infimum) of the possible values for a in (3.5) (resp., for e a in (3.6)). This number α is called the A-bound of B. Similarly,
94
we call
Gesztesy, Malamud, Mitrea and Naboko
IEOT
−1
β = lim |B|1/2 |A|1/2 + µIH B(H)
(3.8)
µ↑∞
the A-form bound of B (resp., |B|). If α = 0 in (3.7) (resp., β = 0 in (3.8)) then B is called infinitesimally bounded (resp., infinitesimally form bounded ) with respect to A. We then have the following result: Theorem 3.2. Assume that A > 0 is self-adjoint in H. (i) Let B be a closed, densely defined operator in H and suppose that dom(B) ⊇ dom(A). Then B is A-bounded and hence (3.5) holds for some constants a ≥ 0, b ≥ 0. In addition, B is also A-form bounded, |B|1/2 (A + IH )−1/2 ∈ B(H).
(3.9)
1/2
|B| (A + IH )−1/2 6 (a + b)1/2 , B(H)
(3.10)
More specifically,
and hence, if B is A-bounded with A-bound α strictly less than one, 0 ≤ α < 1 (cf. (3.7)), then B is also A-form bounded with A-form bound β strictly less than one, 0 ≤ β < 1 (cf. (3.8)). In particular, if B is infinitesimally bounded with respect to A, then B is infinitesimally form bounded with respect to A. (ii) Suppose that B is closed and densely defined in H, that dom(B) ∩ dom(B ∗ ) ⊇ dom(A), and hence (3.5) holds for some constants a ≥ 0, b ≥ 0. Then also B ∗ is A-bounded, and hence (3.5) with B replaced by B ∗ holds for some constants a∗ ≥ 0, b∗ ≥ 0. In particular,
|B ∗ |1/2 (A + IH )−1/2 ∈ B(H) and |B ∗ |1/2 (A + IH )−1/2 6 (a∗ + b∗ )1/2 . B(H)
(3.11) Moreover, one has (A + IH )−1/2 B(A + IH )−1/2 , (A + IH )−1/2 B ∗ (A + IH )−1/2 ∈ B(H),
(A + IH )−1/2 B(A + IH )−1/2 6 (a∗ + b∗ )1/2 (a + b)1/2 , B(H)
(A + IH )−1/2 B ∗ (A + IH )−1/2 6 (a∗ + b∗ )1/2 (a + b)1/2 . B(H)
(3.12) (3.13) (3.14)
Proof. (i) Equation (3.5) implies
B(A + IH )−1 = |B|(A + IH )−1 B(H) 6 a + b, B(H)
(3.15)
using the polar decomposition B = U |B| of B (cf. (2.58)). Since also
∗
(A + IH )−1 |B| = |B|(A + IH )−1 B(H) 6 a + b, B(H)
(3.16)
the proof of Theorem X.18 in [17] yields that
(A + IH )−1/2 |B|(A + IH )−1/2 B(H)
1/2
−1/2 ∗ 1/2
= |B| (A + IH ) |B| (A + IH )−1/2 B(H) 6 a + b,
(3.17)
Vol. 64 (2009)
Generalized Polar Decompositions
95
T using complex interpolation. Indeed, one considers C ∞ (A) = n∈N dom(An ), introduces Hp (A), p ∈ R, as the completion of C ∞ (A) with respect to the norm kf kp = k(A + IH )p/2 f kH , f ∈ C ∞ (A). Then Hp∗ = H−p , p ∈ R. Given p0 , p1 ∈ R and pt = tp0 + (1 − t)p1 , t ∈ [0, 1], one can prove that Hpt are interpolating spaces between Hp0 and Hp1 . Given m, n ∈ N, an operator C : C ∞ (A) → H extends to a bounded operator from Hm to H−n , if and only if (A + IH )−n/2 C(A + IH )−m/2 ∈ B(H).
(3.18)
The case at hand in (3.17) then alludes to the special situation m = n = 1 in (3.18). Since kT ∗ T kB(H) = kT T ∗ kB(H) = kT k2B(H) = kT ∗ k2B(H) for all T ∈ B(H),
(3.19)
(3.17) yields the estimate (3.10). To prove the remaining assertions in item (i) one substitutes (A − µ)−1 f in place of f in (3.5) and obtains kB(A + µ)−1 f kH 6 akA(A + µ)−1 f kH + bk(A + µ)−1 f kH 6 (a + b/µ)kf kH , f ∈ dom(A), µ > 0,
(3.20)
f ∈ dom(A), µ > 0.
(3.21)
and hence, kBf kH ≤ [a + (b/µ)]kAf kH + (aµ + b)kf kH , Similarly, the inequality
1/2
|B| (A + µIH )−1/2
B(H)
≤ [a + (b/µ)]1/2
(3.22)
which follows from (3.20) in the same manner as (3.10) follows from (3.3) (i.e., by the same interpolation argument), implies
1/2
|B| f kH ≤ [a + (b/µ)]1/2 |A|1/2 f + (aµ + b)1/2 kf kH , H (3.23) f ∈ dom |A|1/2 , µ > 0. (ii) By symmetry of our hypotheses one obtains (3.11). Next, using the generalized polar decomposition B = |B ∗ |1/2 U |B|1/2 (cf. (3.1)), one thus obtains from (3.10) and (3.11) that
(A + IH )−1/2 B(A + IH )−1/2 B(H)
−1/2 ∗ 1/2 1/2
= (A + IH ) |B | U |B| (A + IH )−1/2 B(H)
∗ = |B ∗ |1/2 (A + IH )−1/2 U |B|1/2 (A + IH )−1/2 B(H) 6 (a∗ + b∗ )1/2 kU kB(H) (a + b)1/2 6 (a∗ + b∗ )1/2 (a + b)1/2 . Since h
(A + IH )−1/2 B(A + IH )−1/2
i∗
= (A + IH )−1/2 B ∗ (A + IH )−1/2 ,
this completes the proof of (3.12)–(3.14).
(3.24)
(3.25)
96
Gesztesy, Malamud, Mitrea and Naboko
IEOT
Theorem 3.2 extends Theorem 1.38 in [11, Sect. VI.1.7] and Theorem X.18 in [17] since B is not assumed to be self-adjoint or symmetric. We note in connection with the hypotheses in Theorem 3.2, that if B is A-bounded, then B ∗ need not be A∗ -bounded nor A-bounded (we recall that A∗ = A > 0 in our present case). Indeed, the following simple example illustrates this point: Example 3.3. Consider the densely defined closed operators in L2 ((0, 1); dx): Tmin = −
d2 , dx2
dom(Tmin ) = {g ∈ L2 ((0, 1); dx) | g, g 0 ∈ AC([0, 1]); g(0) = g 0 (0) = g(1) = g 0 (1) = 0; g 00 ∈ L2 ((0, 1); dx)}
TF = −
d2 , dx2
dom(TF ) = {g ∈ L2 ((0, 1); dx) | g, g 0 ∈ AC([0, 1]);
(3.26)
g(0) = g(1) = 0; g 00 ∈ L2 ((0, 1); dx)} Tmax = −
d2 , dx2
dom(Tmax ) = {g ∈ L2 ((0, 1); dx) | g, g 0 ∈ AC([0, 1]); g 00 ∈ L2 ((0, 1); dx)},
where TF∗ = TF > 0 is the Friedrichs extension of the minimal operator Tmin . (Here AC(I) denotes the set of absolutely continuous functions on the interval I ⊂ R.) Then the maximal operator Tmax is TF -bounded since dom(Tmax ) ⊃ dom(TF ) ∗ and both operators are closed (cf. [11, Remark IV.1.5]), but Tmax = Tmin is not TF -bounded since dom(Tmin ) is strictly contained in dom(TF ). Before we turn to relatively (form) compact perturbations, we recall a useful interpolation result due to Heinz: Theorem 3.4. ( [7, Theorem 3], [13, Theorem IV.1.11]) Suppose A > 0 and B > 0 are self-adjoint operators in H with dom(B) ⊇ dom(A). If kBf kH 6 kAf kH for all f ∈ dom(A), α
(3.27)
α
then for all α ∈ [0, 1], one has dom(B ) ⊇ dom(A ) and
α
B f 6 Aα f for all f ∈ dom Aα . H H
(3.28)
Theorem 3.5. Assume that A > 0 is self-adjoint in H. (i) Let B be a densely defined closed operator in H and suppose that dom(B) ⊇ dom(A). In addition, suppose that B is A-compact. Then B is also A-form compact, |B|1/2 (A + IH )−1/2 ∈ B∞ (H). (3.29) (ii) Assume that B is densely defined and closed in H and suppose that dom(B) ∩ dom(B ∗ ) ⊇ dom(A). In addition, assume that B or B ∗ is A-compact. Then (A + IH )−1/2 B(A + IH )−1/2 , (A + IH )−1/2 B ∗ (A + IH )−1/2 ∈ B∞ (H).
(3.30)
Vol. 64 (2009)
Generalized Polar Decompositions
97
Proof. (i) An elementary computation shows that (3.6) implies
2 2 1/2 2 kBf k2H = kB ∗ f k2H = e a A + eb2 IH f H , f ∈ dom(A).
(3.31)
Replacing |B| by |B| + IH and A by A + IH , Theorem 3.4 implies dom |B|α ⊇ dom Aα , α ∈ [0, 1].
(3.32)
As a result, terms of the type (A + IH )−z |B|(A + IH )−1+z = (A + IH )−z |B|z |B|1−z (A + IH )−1+z ∗ = |B|z (A + IH )−z |B|1−z (A + IH )−1+z , (3.33) z ∈ C, Re(z) ∈ [0, 1], are well-defined as operators in B(H). Next we allude to the complex interpolation proof of the Lemma on p. 115 in [18]. The proof of this lemma and equation (3.33) yield that (A + IH )−z |B|(A + IH )−1+z ∈ B∞ (H) for all z ∈ C, Re(z) ∈ (0, 1).
(3.34)
Taking z = 1/2 in (3.34) one concludes (A + IH )−1/2 |B|(A + IH )−1/2 ∈ B∞ (H),
(3.35)
and the latter is then equivalent to |B|1/2 (A + IH )−1/2 ∈ B∞ (H)
(3.36)
(since T ∗ T ∈ B∞ (H) is equivalent to T ∈ B∞ (H)). (ii) Using again the generalized polar decomposition (3.1) of B, that is, B = ∗ 1/2 |B | U |B|1/2 , one obtains (A + IH )−1/2 B(A + IH )−1/2 = (A + IH )−1/2 |B ∗ |1/2 U |B|1/2 (A + IH )−1/2 ∗ = |B ∗ |1/2 (A + IH )−1/2 U |B|1/2 (A + IH )−1/2 ∈ B∞ (H), (3.37) since both square brackets in the last equality in (3.37) are bounded operators and by hypothesis at least one of them is compact. Employing (3.25) again completes the proof of (3.30). Equation (3.30) extends [18, Problem 73 (a), p. 373], since B is not assumed to be symmetric. In a completely analogous manner one proves membership of the operators in (3.30) in the Schatten–von Neumann classes Bp (H), p > 1; we omit further details. Remark 3.6. We conclude this section by recalling a well-known example, where A and B are self-adjoint, B is A-form bounded and even A-form compact, but B is not A-bounded (let alone A-compact): Denote by R the class of Rollnik potentials in R3 , that is, Z 3 3 3 |V (x)||V (y)| R = V : R → C d xd y <∞ , (3.38) |x − y|2 R6
98
Gesztesy, Malamud, Mitrea and Naboko
IEOT
and by H0 the L2 (R; d3 x)-realization of (minus) the Laplacian −∆ defined on the Sobolev space H 2,2 (R3 ). Then there exist potentials 0 ≤ V0 ∈ L1 (R3 ; d3 x) ∩ R such that −1/2 1/2 ∈ B4 L2 (R3 ; d3 x) , (3.39) V0 H0 + IL2 (R3 ;d3 x) (cf. Simon [20], Theorem I.22 and Example 4 in Sect. I.6) and hence V0 is H0 -form compact, but dom(V0 ) ∩ dom(H0 ) = {0}, (3.40) and thus V0 is not H0 -bounded.
4. Some applications to maximally sectorial operators In this section we relax the condition that A is self-adjoint and study maximally sectorial operators A instead. We recall that A is called accretive if the numerical range of A (i.e., the set {(f, Af )H ∈ C | f ∈ dom(A), kf kH = 1}) is a subset of the closed right complex half-plane. A is called m-accretive if A is a closed and maximal accretive operator (i.e., A has no proper accretive extension). Moreover, A is called an m-sectorial operator with a vertex 0 and a corresponding semi-angle θ ∈ [0, π/2) if A is a maximal accretive, closed (and hence densely defined) operator, and the numerical range of A is contained in a sector | arg(z)| 6 θ < (π/2) in the complex z-plane. We also recall that an equivalent definition of an m-accretive operator A in H is 1 (A + ζIH )−1 ∈ B(H), k(A + ζIH )−1 k ≤ , Re(ζ) > 0. (4.1) Re(ζ) With A assumed to be m-sectorial, one associates the quadratic form t0A [f, g] = (f, Ag)H ,
f, g ∈ dom(t0A ) = dom(A).
(4.2)
t0A
The form is closable (cf. [11, Theorem VI.1.27]) and according to the first representation theorem (see, e.g., [11, Theorem VI.2.1]), A is associated with its closure tA = t0A , that is, dom(A) ⊆ dom(tA ) and tA [f, g] = (f, Ag)H ,
f ∈ dom(tA ), g ∈ dom(A). (4.3)
∗
Denoting by t the adjoint form of a sesqulinear form t in H, t∗ [f, g] = t[g, f ],
f, g ∈ dom(t∗ ) = dom(t),
(4.4)
t∗A )/2
the form tAR = (tA + is closed and nonnegative on dom(tAR ) = dom(tA ). We denote by AR > 0 the self-adjoint operator uniquely associated with tAR , that is, dom(AAR ) ⊆ dom(tA ) and tAR [f, g] = (f, AR g)H ,
f ∈ dom(tA ), g ∈ dom(AR ). (4.5) By the second representation theorem (cf. [11, Theorem VI.2.23]) 1/2 1/2 1/2 tAR [f, g] = AR f, AR g H , f, g ∈ dom(tAR ) = dom AR . (4.6)
Vol. 64 (2009)
Generalized Polar Decompositions
99
We denote by A1/2 the unique m-sectorial square root of A, and recall that ∗ (4.7) (A∗ )1/2 = A1/2 . It should be emphasized that in general, dom A1/2 6= dom (A∗ )1/2 . (4.8) 1/2 ∗ 1/2 However, if in fact, dom A = dom (A ) , then one can obtain the analog of the second representation theorem for densely defined closed, sectorial forms. For this purpose we next recall the following results: Theorem 4.1. ([11, Theorem VI.3.2]) Let A be m-sectorial in H with a vertex 0 and semi-angle θ ∈ [0, π/2). Then AR > 0 and there exists a bounded self-adjoint operator X ∈ B(H) such that kXkB(H) 6 tan(θ) and 1/2
1/2
A = AR (IH + iX)AR ,
1/2
1/2
A∗ = AR (IH − iX)AR .
(4.9)
Lemma 4.2. (cf. [8], [11, Theorem VI.3.2] and [5, Theorem IV.2.10]) Let A be m-sectorial in H with a vertex 0 and assume that dom A1/2 = dom (A∗ )1/2 . (4.10) Then the sesquilinear form f, g ∈ dom A1/2 = dom (A∗ )1/2 ,
(4.11)
is sectorial and closed. In particular, 1/2 dom(tA ) = dom A1/2 = dom (A∗ )1/2 = dom AR = dom(tAR ).
(4.12)
tA [f, g] = (A∗ )1/2 f, A1/2 g
H
,
Proof. Although this result is known (cf. Kato [8]), we thought it might be of some interest to present an alternative proof. Since tA+IH [f, g] = (A∗ + IH )1/2 f, (A + IH )1/2 g H = (A∗ )1/2 f, A1/2 g H + (f, g)H , = tA [f, g] + (f, g)H , f, g ∈ dom A1/2 = dom (A∗ )1/2 , (4.13) it suffices to consider tA+IH remainder of this proof. Since instead of tA in the 1/2 1/2 ∗ 1/2 dom A = dom (A ) , and the operators A and (A∗ )1/2 are closed, one concludes that the operator Y defined below, satisfies Y = (A + IH )1/2 (A∗ + IH )−1/2 ∈ B(H), Y −1 = (A∗ + IH )1/2 (A + IH )−1/2 ∈ B(H). (4.14) Next we show that the operator Y is accretive. Since A is m-accretive, one gets 2 Re(Y ) = Y + Y ∗ = (A + IH )1/2 (A∗ + IH )−1/2 + (A + IH )−1/2 (A∗ + IH )1/2 = (A + IH )1/2 (A∗ + IH )−1 + (A + IH )−1 (A∗ + IH )1/2 > 0. (4.15) Similarly one obtains 2i Im(Y ) = (Y − Y ∗ ) = (A + IH )1/2 (A∗ + IH )−1/2 − (A + IH )−1/2 (A∗ + IH )1/2 = 2i(A + IH )1/2 Im (A∗ + IH )−1 (A∗ + IH )1/2 . (4.16)
100
Gesztesy, Malamud, Mitrea and Naboko
IEOT
Combining (4.15) with (4.16) one concludes that Y is a bounded θ-sectorial operator, because so is (A∗ + IH )−1 . Using this fact and 0 ∈ / σ(Y ), we next show that 0 ∈ / σ(Re(Y )). Indeed, assuming the contrary, 0 ∈ σ(Re(Y )), we get 0 ∈ σ (Re(Y ))1/2 . Then there exists a sequence {fn }n∈N ⊂ H, kfn k = 1, n ∈ N, such that (Re(Y ))1/2 fn −→ 0. n→∞
On the other hand, by Theorem 4.1, Y admits the representation Y = (Re(Y ))1/2 (I + iK)(Re(Y ))1/2 ,
(4.17)
∗
where K = K and kKk 6 tan(θ). Consequently,
kY fn k = (Re(Y ))1/2 (I + iK)(Re(Y ))1/2 fn 6 C (Re(Y ))1/2 fn −→ 0. (4.18) n→∞
Thus, 0 ∈ σ(Y ), a contradiction. Hence, the operator (Re(Y ))1/2 (A + I)1/2 is closed as (A + I)1/2 is and Re(Y ) is boundedly invertible. Moreover, using (4.14) one obtains tAR +IH [f, g] + 2−1 (A + IH )1/2 f, (A∗ + IH )1/2 g H = 2−1 (Y + Y ∗ )(A∗ + IH )1/2 f, (A∗ + IH )1/2 g H = (Re(Y ))1/2 (A∗ + IH )1/2 f, (Re(Y ))1/2 (A∗ + IH )1/2 g H , (4.19) 1/2 ∗ 1/2 f, g ∈ dom A = dom (A ) . = 2−1 (A∗ + IH )1/2 f, (A + IH )1/2 g
H
Since the operator (A∗ + IH )1/2 is closed and Re(Y ) is boundedly invertible, also the operator (Re(Y ))1/2 (A∗ +IH )1/2 is closed, and hence the form tAR +IH is closed too (cf. [11, Problem III.5.7, Example VI.1.13]). Remark 4.3. Let A = diag (it0 , −it0 ), t0 ∈ R\{0}. Then A is maximal accretive operator in C2 and 0 ∈ ρ(A), although AR = 0 and hence 0 ∈ σ(AR ). This simple example shows that the assumption on A to be m-sectorial is important in proving the implication 0 ∈ ρ(A) =⇒ 0 ∈ ρ(AR ). Corollary 4.4. Let A be m-sectorial in H with a vertex 0 and assume that dom A1/2 = dom (A∗ )1/2 (4.20) and that 0 ∈ ρ(A).
(4.21)
Then, in addition to (4.11) and (4.12), there exists an ε0 > 0 such that the following inequalities hold:
2
2 tAR [f, f ] = Re (A∗ )1/2 f, A1/2 f H > ε0 max A1/2 f H , (A∗ )1/2 f H , (4.22)
1/2 ∗ 1/2 ∗ 1/2 1/2
tA [f, f ] = Re (A ) f, A f > ε0 A f (A ) f , (4.23) R
H
H
H
f ∈ dom(tAR ).
Vol. 64 (2009)
Generalized Polar Decompositions
101
Proof. As in the proof of Lemma 4.2, we may write (A)1/2 = Y (A∗ )1/2 , where Y is m-accretive and 0 ∈ ρ(Re(Y )). In this context we note that we replaced A + IH and A∗ + IH by A and A∗ in the definition of Y in (4.14) to arrive at the operator Y = A1/2 (A∗ )−1/2 ∈ B(H),
(4.24) ∗
which is possible due to the hypothesis 0 ∈ ρ(A) (implying 0 ∈ ρ(A )). Therefore, tAR [f, f ] = Re (A∗ )1/2 f, (A)1/2 f H = (A∗ )1/2 f, Re(Y )(A∗ )1/2 f H (4.25)
2 > ε1 (A∗ )1/2 f H , f ∈ dom(tAR ), where ε1 = inf σ(Re(Y )) . Similarly, one gets
2 Re (A∗ )1/2 f, (A)1/2 f H > ε2 (A)1/2 f H , f ∈ dom(tAR ), (4.26) −1 where ε2 = inf σ Re Y . Setting ε0 = min{ε1 , ε2 } one arrives at (4.22). Inequality (4.23) is then immediate from (4.22). Remark 4.5. (i) Inequality (4.23) is mentioned in [10], and because of inequality (4.23), A1/2 and (A∗ )1/2 are said to have an acute angle. (ii) In general, if A is m-accretive (i.e., without assuming (4.20) and (4.21)), Kato [9] proved dom(Aα ) = dom((A∗ )α ), α ∈ (0, 1/2), (4.27) and that the (right-hand) inequality in (4.23) holds with 1/2 replaced by α (cf. also [10], [22, Theorem IV.5.1]), that is, there exists an ε0 (α) > 0 such that
Re (A∗ )α f, Aα f H > ε0 (α) Aα f H (A∗ )α f H , (4.28) f ∈ dom(Aα ), α ∈ (0, 1/2). (iii) We recall that ker(A) = ker(A∗ ) if A is m-accretive, in particular, ker(A) is a reducing subspace for A (cf., e.g., [22, p. 171]). Thus, one can write A = A0 ⊕ A1 with respect to the decomposition H = P0 H ⊕ [IH − P0 ]H, where P0 denotes the orthogonal projecton onto ker(A), such that A0 = P0 AP0 = 0 and ker(A1 ) = {0}. α Thus, also Aα = A0 ⊕ Aα 1 , α ∈ (0, 1], with ker(A1 ) = {0}. Hence, one actually obtains ker(A) = ker(Aα ) = ker(A∗ ), α ∈ (0, 1], (4.29) if A is m-accretive. Definition 4.6. Let A be an m-sectorial operator in H with a vertex 0 and B a densely defined closed operator in H. Then B is called A-form bounded (resp., A-form compact ) if dom |B|1/2 ⊇ dom A1/2 and |B|1/2 (A + IH )−1/2 ∈ B(H) (resp., ∈ B∞ (H)). (4.30) Again, B is A-form bounded (resp., A-form compact) if and only if |B| is. We also that due to the closedness of |B|1/2 and A1/2 , epmhasize1/2again 1/2 dom |B| ⊇ dom A alone implies that |B|1/2 is A1/2 -bounded (cf. [11,
102
Gesztesy, Malamud, Mitrea and Naboko
IEOT
Remark IV.1.5]), and hence the first condition in (4.30) implies the second in connection with form boundedness. In the following, for simplicity of notation, we agree that for a densely defined linear operator C in H, the symbol C # either equals C or C ∗ .
(4.31)
If the symbol C # occurs twice in a formula, as it does occasionally below, both C # stand for C or both stand for C ∗ , so such a formula should be read in two possible ways (just as if C # occurs only once in a formula). Theorem 4.7. Let A be m-sectorial in H with a vertex 0 and assume that dom A1/2 = dom (A∗ )1/2 . (4.32) In addition, suppose that B is a densely defined and closed operator in H. Then the following assertions hold: (i) B is A-form bounded (resp., A-form compact ) if and only if it is AR -form bounded (resp., AR -form compact ), that is, −1/2 |B|1/2 A# + IH ∈ B(H) (resp., ∈ B∞ (H)) if and only if 1/2
|B|
(4.33) −1/2
(AR + IH )
∈ B(H) (resp., ∈ B∞ (H)).
(ii) The following conditions (α)–(δ) are equivalent: −1/2 −1/2 (α) (A# )∗ + IH B A# + IH is closable in H,
(γ)
(A∗ + IH )−1/2 B(A∗ + IH )−1/2 is closable in H, −1/2 (A + IH B(A + IH )−1/2 is closable in H,
(δ)
(AR + IH )−1/2 B(AR + IH )−1/2 is closable in H.
(β)
(4.34)
(iii) The following conditions (α)–(δ) are equivalent: (α)
(A# )∗ + IH
−1/2
B A# + IH
−1/2
∈ B(H) (resp., ∈ B∞ (H)),
(β)
(A∗ + IH )−1/2 B(A∗ + IH )−1/2 ∈ B(H) (resp., ∈ B∞ (H)),
(γ)
(A + IH )−1/2 B(A + IH )−1/2 ∈ B(H) (resp., ∈ B∞ (H)),
(δ)
(AR + IH )−1/2 B(AR + IH )−1/2 ∈ B(H) (resp., ∈ B∞ (H)).
(4.35)
1/2 1/2 Proof. (i) Since dom A1/2 = dom AR and the operators A1/2 and AR are closed, one concludes that the operator T# defined below, satisfies 1/2 T# = A# + IH (AR + IH )−1/2 ∈ B(H), (4.36) −1/2 −1 T# = (AR + IH )1/2 A# + IH ∈ B(H).
Vol. 64 (2009)
Generalized Polar Decompositions
Therefore, if |B|1/2 (AR + IH )−1/2 ∈ B(H), then also |B|1/2 A# + IH and the identity −1/2 −1 |B|1/2 (AR + IH )−1/2 T# = |B|1/2 A# + IH
103
−1/2
∈ B(H) (4.37)
holds. By (4.36), this argument can be reversed, proving the equivalence (4.33). −1/2 That |B|1/2 A# + IH ∈ B∞ (H) if and only if |B|1/2 (AR + IH )−1/2 ∈ B∞ (H) is proven in the same manner. (ii) Assume that (AR + IH )−1/2 B(AR + IH )−1/2 is closable in H. Then so −1 ∗ −1 is T# (AR + IH )−1/2 B(AR + IH )−1/2 T# due to (4.36). This follows from the following two facts: (1) If S1 ∈ B(H) and S2 is a closable (resp., closed) operator in H, then S2 S1 is closable (resp., closed) in H. (2) If T1 , T2 are closable (resp., closed) operators in H, and T2−1 ∈ B(H), then T2 T1 is closable (resp., closed) in H (cf. [23, p. 96]). Since −1/2 −1/2 −1 ∗ −1 T# (AR + IH )−1/2 B(AR + IH )−1/2 T# = (A# )∗ + IH B A# + IH , (4.38) −1/2 −1/2 this proves the closability of (A# )∗ + IH B A# + IH in H. Again by (4.36), this argument can be reversed, proving the equivalence of (α) and (δ) in (4.34). The remaining equivalences in (4.34) follow from (4.14) which permits one to individually exchange A and A∗ (or A∗ and A) in the most left and/or most right factor (. . . )−1/2 in (α). (iii) If (AR +IH )−1/2 B(AR +IH )−1/2 has a closure in B(H) (resp., in B∞ (B)), then (4.36) and (4.38) yield −1 −1 ∗ (AR + IH )−1/2 B(AR + IH )−1/2 T# T# −1 ∗ −1 (AR + IH )−1/2 B(AR + IH )−1/2 T# = T# −1 ∗ −1 = T# (AR + IH )−1/2 B(AR + IH )−1/2 T# −1/2 −1/2 = (A# )∗ + IH B A# + IH . (4.39) Here we used the following facts: (1) Let S be a bounded operator in H with domain dom(S). Then S is closable and the closure of S has domain dom(S) ⊆ H. (2) S 1 ∈ B(H), S2 ∈ B(H), dom(S1 S2 ) dense in H, then S1 S2 = S 1 S2 . (3) T1 ∈ B(H), T 2 ∈ B(H), then T1 T2 = T1 T 2 . −1/2 −1/2 Thus, (A# )∗ + IH B A# + IH has closure in B(H) (resp., in B∞ (B)). Once more by (4.36), this argument is reverseable, proving the equivalence of (α) and (δ) in (4.35). As in the final part of the proof of item (ii), the remaining equivalences in (4.35) follow from (4.14). To prove one of our main results on sectorial operators we next need a generalization of Theorem 3.4 to the sectorial case.
104
Gesztesy, Malamud, Mitrea and Naboko
IEOT
First we recall that S1 is called subordinated to S2 (cf., e.g., [12, Sect. 14.5]) if dom(S1 ) ⊇ dom(S2 ), and for some C > 0, kS1 f kH 6 CkS2 f kH , f ∈ dom(S2 ). (4.40) Theorem 4.8. ([8, Theorem 1]) Let A, B be m-accretive operators in H and assume that T ∈ B(H). In addition, assume that there exists a constant C > 0 such that T dom(A) ⊆ dom(B) and kBT f kH 6 CkAf kH , f ∈ dom(A).
(4.41)
Then for all α ∈ (0, 1], there exists a constant Cα > 0 such that T dom(Aα ) ⊆ dom(B α ) and kB α T gkH 6 Cα kAα gkH , g ∈ dom(Aα ).
(4.42)
In the sequel we need the special case of Theorem 4.8 corresponding to T = IH . However, it turns out, that this special case is, in fact, equivalent to the general case displayed in Theorem 4.8, as will be shown subsequently. Corollary 4.9. Suppose A and B are m-accretive operators in H and B is subordinated to A. Then for all α ∈ (0, 1], B α is subordinated to Aα , that is, the inequality kBf kH 6 C1 kAf kH , f ∈ dom(A) ⊆ dom(B) (4.43) for some constant C1 > 0 independent of f ∈ dom(A), implies dom(Aα ) ⊆ dom(B α ) and kB α gkH 6 Cα kAα gkH , g ∈ dom(Aα )
(4.44)
for some constant Cα > 0 independent of g ∈ dom(Aα ). The following result was deduced in [8] from Theorem 4.8. (Actually, it is equivalent to Theorem 4.8 as we will show below.) For the sake of completeness we present a short proof based on the generalized polar decomposition (2.64) and on Corollary 4.9. Theorem 4.10. ([8, Theorem 2]) Let A and B be m-accretive operators in H and let Q be a densely defined closed linear operator in H such that dom(Q) ⊇ e 1 > 0 such that dom(A), dom(Q∗ ) ⊇ dom(B) and there exist constants D1 > 0, D kQgkH 6 D1 kAgkH , g ∈ dom(A),
e 1 kBf kH , f ∈ dom(B). (4.45) kQ∗ f kH 6 D
Then for each α ∈ (0, 1), there exists a constant Cα > 0 such that the following inequality holds: |(f, Qg)H | 6 Cα kB 1−α f kH kAα gkH ,
f ∈ dom(B), g ∈ dom(A).
(4.46)
Proof. By Corollary 4.9 and the fact that kQgkH = k|Q|gkH , kQ∗ f kH = k|Q∗ |f kH , the inequalities (4.45) yield for β, γ ∈ (0, 1],
β
|Q| g 6 Dβ kAβ gkH , g ∈ dom(A), H (4.47) ∗ γ e γ kB γ f kH , f ∈ dom(B) k|Q | f kH 6 D
Vol. 64 (2009)
Generalized Polar Decompositions
105
e γ > 0. On the other hand, by equation (2.64), for some constants Dβ > 0, D Q = |Q∗ |1−α U |Q|α , α ∈ [0, 1]. Combining these facts one arrives at |(f, Qg)H | = |(U ∗ |Q∗ |1−α f, |Q|α g)H | 6 k|Q∗ |1−α f kH k|Q|α gkH e 1−α kB 1−α f kH D e α kAα gkH , 6D
f ∈ dom(B), g ∈ dom(A),
(4.48)
completing the proof.
Next we show that Theorem 4.10, in fact, implies Theorem 4.8. This was stated (without proof) in Kato [8]): Deduction of Theorem 4.8 from Theorem 4.10. Let Q = BT . Then Q∗ ⊇ T ∗ B ∗ , and dom(Q∗ ) ⊇ dom(B ∗ ) and kQ∗ f k 6 kT ∗ kkB ∗ f kH , f ∈ dom(B ∗ ).
(4.49)
In addition, T dom(A) ⊆ dom(B) yields dom(Q) ⊇ dom(A). Therefore, by Theorem 4.10 (with B replaced by B ∗ ), for any α ∈ (0, 1),
|(f, Qg)H | 6 Cα (B ∗ )(1−α) f H kAα gkH , f ∈ dom(B ∗ ), g ∈ dom(A). (4.50) (The case α = 1 is obvious and needs not be considered.) Hence, |(f, Qg)H | = |(f, BT g)H | = |((B ∗ )1−α f, B α T g)H | 6 Cα k(B ∗ )1−α f kH kAα gkH , f ∈ dom(B ∗ ), g ∈ dom(A).
(4.51)
Clearly, |((B ∗ )1−α f, B α T g)H | = |(P (B ∗ )1−α f, B α T g)H | = |(P (B ∗ )1−α f, P B α T g)H |, f ∈ dom(B ∗ ), g ∈ dom(A),
(4.52)
∗
where P is the orthogonal projection onto the closure of ran(B ). Therefore, fixing g ∈ dom(A), inequality (4.51) yields kP B α T gkH 6 Cα kAα gkH ,
α ∈ (0, 1).
(4.53)
On the other hand, by (4.29), ker(B) = ker(B β ) = ker(B ∗ ), β ∈ (0, 1], since B is m-accretive. Therefore, ran(B) = ran(B β ) = ran(B ∗ ), α
β ∈ (0, 1].
(4.54)
α
Thus, P B T g = B T g, g ∈ dom(A), and hence finally, kB α T gkH = kP B α T gkH 6 Cα kAα gkH ,
g ∈ dom(A).
(4.55)
Thus we have shown Theorem 4.9 =⇒ Corollary 4.10 =⇒ Theorem 4.10 =⇒ Theorem 4.9 (4.56) and hence the equivalence of Theorem 4.9, Corollary 4.10, and Theorem 4.10 (illustrating the usefulness of the generalized polar decomposition (2.64) in this context). We conclude with the following two results:
106
Gesztesy, Malamud, Mitrea and Naboko
IEOT
Theorem 4.11. Let A be m-sectorial in H with a vertex 0 and assume that B is densely defined and closed in H. (i) Suppose that B and B ∗ are AR -bounded. Then, −1 −1 |B|1/2 A# + IH |B|1/2 , |B|1/2 A# + IH |B ∗ |1/2 ∈ B(H), (4.57) −1 −1 |B ∗ |1/2 A# + IH |B|1/2 , |B ∗ |1/2 A# + IH |B ∗ |1/2 ∈ B(H). (ii) Suppose that B and B ∗ are AR -bounded and that dom A1/2 = dom (A∗ )1/2 . Then, −1/2 −1/2 |B|1/2 A# + IH , |B ∗ |1/2 A# + IH ∈ B(H), (4.58) and (A + IH )−1/2 B # (A + IH )−1/2 , (A + IH )−1/2 B # (A∗ + IH )−1/2 ∈ B(H), (A∗ + IH )−1/2 B # (A + IH )−1/2 , (A∗ + IH )−1/2 B # (A∗ + IH )−1/2 ∈ B(H). (4.59) In particular, B and B ∗ are A# -form bounded. Moreover, B and B ∗ are AR -form bounded, −1/2 |B # |1/2 AR + IH ∈ B(H), (4.60) and (AR + IH )−1/2 B # (AR + IH )−1/2 ∈ B(H). (4.61) 1/2 ∗ 1/2 (iii) Suppose that B is A-bounded and that dom A = dom (A ) . Then B is AR -form bounded. Moreover, if B ∗ is also A-bounded, then equation (4.61) and the relations (4.59) hold as well. Proof. (i) Since B and B ∗ are AR -bounded, Theorem 3.2 implies that |B # |1/2 (AR + IH )−1/2 , (AR + IH )−1/2 |B # |1/2 ∈ B(H).
(4.62)
Combining these inclusions with (4.9) one obtains |B|1/2 (A + IH )−1 |B|1/2 = |B|1/2 (AR + IH )−1/2 (IH + iX)−1 (AR + IH )−1/2 |B|1/2 ∈ B(H),
(4.63)
|B|1/2 (A∗ + IH )−1 |B|1/2 = |B|1/2 (AR + IH )−1/2 (IH − iX)−1 (AR + IH )−1/2 |B|1/2 ∈ B(H),
(4.64)
proving the first claim in assertion (i). The remaining three are proven in precisely the same manner. (ii) Since by hypothesis 1/2 dom A1/2 = dom (A∗ )1/2 = dom AR , (4.65) and A1/2 , (A∗ )1/2 , and (AR )1/2 are closed, one infers that (AR + IH )1/2 (A# + IH )−1/2 , (A# + IH )−1/2 (AR + IH )1/2 ∈ B(H).
(4.66)
Vol. 64 (2009)
Generalized Polar Decompositions
107
Hence, −1/2 |B|1/2 A# + IH −1/2 = |B|1/2 (AR + IH )−1/2 (AR + IH )1/2 A# + IH ∈ B(H), −1/2 ∗ 1/2 # |B | A + IH ∗ 1/2 −1/2 = |B | (AR + IH )−1/2 (AR + IH )1/2 A# + IH ∈ B(H),
(4.67)
(4.68)
applying Theorem 4.7 (i) (also with B replaced by B ∗ ). Using the generalized polar decomposition (3.1), B = |B ∗ |1/2 U |B|1/2 , one obtains from (4.62) and (4.66) that (A + IH )−1/2 B(A + IH )−1/2 = (A + IH )−1/2 (AR + IH )1/2 (AR + IH )−1/2 B(AR + IH )−1/2 × (AR + IH )1/2 (A + IH )−1/2 = (A + IH )−1/2 (AR + IH )1/2 (AR + IH )−1/2 |B ∗ |1/2 U × |B|1/2 (AR + IH )−1/2 (AR + IH )1/2 (A + IH )−1/2 ∈ B(H).
(4.69)
Precisely the same argument works for the remaining three operators in (4.59) (using also B ∗ = |B|1/2 U ∗ |B ∗ |1/2 ). Finally, since AR > 0 is self-adjoint, (4.60) and (4.61) follow from Theorem 3.2. (iii) By Corollary 4.9, |B|α is subordinated to (A + IH )α , α ∈ (0, 1]. In particular, the operator |B|1/2 is (A+IH )1/2 -bounded, that is, |B|1/2 (A+IH )−1/2 ∈ B(H). On the other hand, by (4.36), T = (A+IH )1/2 (AR +IH )−1/2 ∈ B(H). Thus, |B|1/2 (AR + IH )−1/2 = |B|1/2 (A + IH )−1/2 (A + IH )1/2 (AR + IH )−1/2 = |B|1/2 (A + IH )−1/2 T ∈ B(H),
(4.70)
and hence B is AR -form bounded. If, in addition, B ∗ is A-bounded, then again by Corollary 4.9, |B ∗ |1/2 (A+IH )−1/2 ∈ B(H) and hence also B ∗ is AR -form bounded, |B ∗ |1/2 (AR + IH )−1/2 = |B ∗ |1/2 (A + IH )−1/2 T ∈ B(H).
(4.71)
Combining (4.70) and (4.71) and using the generalized polar decomposition (3.1), one arrives at (AR + IH )−1/2 B # (AR + IH )−1/2 = (AR + IH )−1/2 |(B # )∗ |1/2 U |B # |1/2 (AR + IH )−1/2 ∈ B(H). Relations (4.59) then follow as in the proof of item (ii).
(4.72)
Finally, we state an analog of Theorem 4.11 in connection with relative (form) compactness:
108
Gesztesy, Malamud, Mitrea and Naboko
IEOT
Theorem 4.12. Let A be m-sectorial in H with a vertex 0, assume that B is densely defined and closed in H. (i)Suppose that dom(B) ∩ dom(B ∗ ) ⊇ dom(AR ) and that B (resp., B ∗ ) is AR compact. Then, −1 −1 |B|1/2 A# + IH |B|1/2 , |B|1/2 A# + IH |B ∗ |1/2 ∈ B∞ (H), −1 |B|1/2 ∈ B∞ (H), (4.73) and |B ∗ |1/2 A# + IH −1 −1 resp., |B|1/2 A# + IH |B ∗ |1/2 , |B ∗ |1/2 A# + IH |B|1/2 ∈ B∞ (H), −1 and |B ∗ |1/2 A# + IH |B ∗ |1/2 ∈ B∞ (H). (ii) Suppose that dom(B) ∩ dom(B ∗ ) ⊇ dom(A B (resp., B ∗ ) is AR R ) and that 1/2 ∗ 1/2 compact. In addition, assume that dom A = dom (A ) . Then, −1/2 |B|1/2 (A# + IH )−1/2 ∈ B∞ (H) resp., |B ∗ |1/2 A# + IH ∈ B∞ (H) , (4.74) and (A + IH )−1/2 B # (A + IH )−1/2 , (A + IH )−1/2 B # (A∗ + IH )−1/2 ∈ B∞ (H), (4.75) (A∗ + IH )−1/2 B # (A + IH )−1/2 , (A∗ + IH )−1/2 B # (A∗ + IH )−1/2 ∈ B∞ (H). In particular, B (resp., B ∗ ) is A# -form compact. Moreover, B (resp., B ∗ ) is AR form compact, −1/2 |B|1/2 AR + IH ∈ B∞ (H) resp., |B ∗ |1/2 (AR + IH )−1/2 ∈ B∞ (H) (4.76) and (AR + IH )−1/2 B # (AR + IH )−1/2 ∈ B∞ (H).
(4.77)
(iii) Suppose that dom(B) ∩ dom(B ∗ ) ⊇ dom(A) and that B (resp., B ∗ ) is A1−ε compact for some ε ∈ (0, 1). In addition, assume that dom A1/2 = dom (A∗ )1/2 . Then B (resp., B ∗ ) is AR -form compact. Moreover, equation (4.77) and relations (4.75) hold as well. Proof. (i) Since by hypothesis B and B ∗ are AR -bounded and B (resp., B ∗ ) is AR -compact, Theorem 3.5 implies that |B|1/2 (AR + IH )−1/2 = (AR + IH )−1/2 |B|1/2 ∈ B∞ (H) resp., |B ∗ |1/2 (AR + IH )−1/2 = (AR + IH )−1/2 |B ∗ |1/2 ∈ B∞ (H) .
(4.78)
At this point one can follow the proof of Theorem 4.11 (i), noting that each operator in (4.63) and (4.64) contains at least one compact factor from (4.78). (ii) Again, one can follow the proof of Theorem 4.11 (ii), noting that the righthand side of (4.67) (resp., (4.68)) contains a compact factor from (4.78). Similarly, the right-hand side of (4.69) and the analogous equations with A replaced by A∗ (resp., B replaced by B ∗ ) contains at least one compact factor from (4.78). Relations (4.76) and (4.77) are clear from Theorem 3.5 since AR > 0 is self-adjoint.
Vol. 64 (2009)
Generalized Polar Decompositions
109
(iii) Since by hypothesis, dom(B) ∩ dom(B ∗ ) ⊇ dom(A), B and B ∗ are Abounded and hence Theorem 4.11 (iii) and the results (4.70)–(4.72) in its proof are at our disposal. Next, we first assume that B(A + IH )−1+ε ∈ B∞ (H). Then (using |B| = U ∗ B, cf. (2.60)), |B|(A + IH )−1+ε0 +iγ = |B|(A + IH )−1+ε (A + IH )−(ε−ε0 )+iγ ∈ B∞ (H), (4.79) 0 ≤ ε0 < ε, since (A + IH )−β+iγ ∈ B(H),
β ∈ (0, 1), γ ∈ R,
(4.80)
as is clear from the formula (cf. [11, Remark V.3.50], [12, Sect. 14.12]), Z sin(πz) ∞ dt t−z (S +(t+1)IH )−1 , z ∈ C, Re(z) ∈ (0, 1), (4.81) (S +IH )−z = π 0 for any m-accretive operator S in H. Since by hypothesis B(A + IH )−1+ε ∈ B∞ (H) ⊂ B(H), B is subordinated to (A + IH )1−ε , and hence by Corollary 4.9, |B|α is subordinated to (A + IH )(1−ε)α for all α ∈ (0, 1], |B|α (A + IH )−(1−ε)α ∈ B(H),
α ∈ (0, 1].
(4.82)
In the following we assume without loss of generality that ker(|B|) = ker(B) = {0}.
(4.83)
Thus, one obtains (A∗ + IH )−z |B|(A + IH )−1+z = (A∗ + IH )−z |B|z |B|1−z (A + IH )−1+z ∗ = |B|z (A + IH )−z |B|1−z (A + IH )−1+z ∈ B(H), Re(z) ∈ (0, 1),
(4.84)
since by (4.80) and (4.82), |B|α+iβ (A + IH )−α−iβ = |B|iβ |B|α (A + IH )−(1−ε)α (A + IH )−εα−iβ ∈ B(H), α ∈ (0, 1], β ∈ R, (4.85) as |B|iβ is unitary. Moreover, choosing a compact subinterval of (0, 1) containing 1/2 in its interior, for instance, [ε0 , 1 − ε0 ] for some ε0 ∈ (0, 1/2), one obtains for z = ε0 + iγ in (4.84), k(A∗ + IH )−ε0 −iγ |B|(A + IH )−(1−ε0 )+iγ k
∗ = |B|ε0 −iγ (A + IH )−ε0 +iγ |B|1−ε0 −iγ (A + IH )−(1−ε0 )+iγ
≤ |B|ε0 (A + IH )−ε0 +iγ
|B|1−ε0 (A + IH )−(1−ε0 )+iγ
≤ |B|ε0 (A + IH )−(1−ε)ε0
(A + IH )−εε0 +iγ
× |B|1−ε0 (A + IH )−(1−ε)(1−ε0 )
(A + IH )−ε(1−ε0 )+iγ
≤ |B|ε0 (A + IH )−(1−ε)ε0
|B|1−ε0 (A + IH )−(1−ε)(1−ε0 ) Ce2π|γ|
(4.86)
110
Gesztesy, Malamud, Mitrea and Naboko
IEOT
for some C = C(ε, ε0 ) > 0 (cf. (4.87)). (In fact, using [10, Theorem 4], one can replace 2π by π in the exponent of (4.86), but this plays no role in our context.) Here we used the fact that by (4.1) and (4.81),
Z ∞
−z −1
(A + IH )−z = sin(πz) dt t (A + (t + 1)IH ) π 0 Z sin(πz) ∞
≤ dt t−Re(z) (A + (t + 1)IH )−1 π 0 Z sin(πz) ∞ t−Re(z) sin(πz) ≤ dt (4.87) = sin(πRe(z)) , Re(z) ∈ (0, 1). π 0 t+1 The same computation applies to z = 1 − ε0 + iγ in (4.84), and more generally, one has
sup (A∗ + IH )−α−iγ |B|(A + IH )−1+α+iγ e−2π|γ| < ∞, α ∈ (0, 1). (4.88) γ∈R
In addition, the map 2
z 7→ ez (A∗ + IH )−z |B|(A + IH )−1+z is analytic in the strip Re(z) ∈ (0, 1). (4.89) By the proof of the Lemma in [18, p. 115], (4.79), (4.84), (4.88) (for α = ε0 and α = 1 − ε0 ), and (4.89) imply, by complex interpolation, that 2
ez (A∗ + IH )−z |B|(A + IH )−1+z ∈ B∞ (H),
z ∈ C, Re(z) ∈ (ε0 , 1 − ε0 ). (4.90)
Since ε0 ∈ (0, 1/2) can be taken arbitrarily small, one finally concludes that (A∗ + IH )−z |B|(A + IH )−1+z ∈ B∞ (H),
z ∈ C, Re(z) ∈ (0, 1).
(4.91)
In particular, (A∗ + IH )−1/2 |B|(A + IH )−1/2 ∈ B∞ (H).
(4.92)
Thus, (AR + IH )−1/2 |B|(AR + IH )−1/2 = cl (AR + IH )−1/2 (A∗ + IH )1/2 (A∗ + IH )−1/2 |B|(A + IH )−1/2 × (A + IH )1/2 (AR + IH )−1/2 ∗ = (A + IH )1/2 (AR + IH )−1/2 (A∗ + IH )−1/2 |B|(A + IH )−1/2 × (A + IH )1/2 (AR + IH )−1/2 = T ∗ (A∗ + IH )−1/2 |B|(A + IH )−1/2 T ∈ B∞ (H),
(4.93)
where cl{·} abbreviates the operator closure (we made an exception to our usual notation due to lack of space), T = [(A + IH )1/2 (AR + IH )−1/2 ∈ B(H) (cf. (4.36)), and we used again the reasoning (1)–(3) as in the proof of (4.39). Relation (4.93) and the fact that an operator D is compact if and only if D∗ D is, then finally implies |B|1/2 (AR + IH )−1/2 ∈ B∞ (H). (4.94)
Vol. 64 (2009)
Generalized Polar Decompositions
111
In exactly the same manner, the assumption B ∗ (A + IH )−1+ε ∈ B∞ (H) then implies |B ∗ |1/2 (AR + IH )−1/2 ∈ B∞ (H). (4.95) In particular, since the operator in (4.70) (resp. in (4.71)) now lies in B∞ (H), B (resp., B ∗ ) is AR -form compact, that is, (4.76) holds. Equation (4.77) then follows as in (4.72) from (4.76). Finally, relations (4.75) again follow as in the proof of item (ii). Remark 4.13. We do not know if one can generally take ε = 0 in Theorem 4.12 (iii). Of course, if the condition
(4.96) sup (A + IH )iγ < ∞ γ∈R
holds, the proof of Theorem 4.12 (iii) (c.f., in particular, estimates (4.86)) shows that ε can indeed be taken equal to zero. In particular, (4.96) holds if A is similar to a self-adjoint operator S in some complex, separable Hilbert space H0 with S ≥ −IH0 and {−1} not an eigenvalue of S (by applying the spectral theorem to S). Conversely, suppose A is m-sectorial in H with a vertex 0 and consider i T = (A + IH )−i = (A + IH )−1 . Then by (4.96), T t , t ∈ R, is a uniformly bounded one-parameter commutative group of transformations, in fact, a C0 -group with generator i log (A + IH )−1 (cf. the discussion in [14, Corollary 5.4]),
−1 T t = (A + IH )−it = eit log((A+IH ) ) , T t ≤ C, t ∈ R, (4.97) for some fixed constant C > 0. Thus, by Sz.-Nagy’s theorem [21] (see also [1, Sect. I.6], [4, Lemma XV.6.1]), there exists an operator V ∈ B(H) with V −1 ∈ B(H), such that V −1 T t V = U (t) = eitH , t ∈ R, (4.98) where U (t), t ∈ R, is a strongly continuous unitary one-parameter group with a self-adjoint (possibly unbounded) generator H = H ∗ in H. Thus, T t = eit log((A+IH )
−1
)
= V eitH V −1 = eitV HV
−1
t ∈ R,
,
(4.99)
implying log (A + IH )−1 = V HV −1 .
(4.100) −1
) is also the generator
t ≥ 0,
(4.101)
On the other hand (cf. [14, Proposition 2.1]), log((A + IH ) of a C0 -semigroup of contractions in H, (A + IH )−t = et log((A+IH )
−1
)
,
and hence, (A + IH )−t = et log((A+IH )
−1
)
= etV HV
−1
= V etH V −1 ,
t ≥ 0.
(4.102)
Taking t = 1 in (4.102) then shows that A is similar to a self-adjoint operator in H. (Incidentally, we note that necessarily H ≤ cIH for some c ∈ R, since (4.101) represents a family of contractions.)
112
Gesztesy, Malamud, Mitrea and Naboko
IEOT
Acknowledgments. We are indebted to Brian Davies, Nigel Kalton, Heinz Langer, Yuri Latushkin, Vladimir Ovchinnikov, Leiba Rodman, and Barry Simon for helpful correspondence. One of us (F.G.) gratefully acknowledges the extraordinary hospitality of the Faculty of Mathematics of the University of Vienna, Austria, and especially, that of Gerald Teschl, during his three month visit in the first half of 2008, where parts of this paper were written.
References [1] Ju. L. Dalecki˘ı and M. G. Kre˘ın, Stability of Solutions of Differential Equations in Banach Space, Transl. Math. Monographs, 43, Amer. Math. Soc., Providence, RI, 1974. [2] E. B. Davies, Linear Operators and their Spectra, Cambridge Studies in Advanced Mathematics, Vol. 106, Cambridge University Press, Cambridge, 2007. [3] N. Dunford and J. T. Schwartz, Linear Operators, Part I: General Theory, Wiley– Interscience, New York, 1988. [4] N. Dunford and J. T. Schwartz, Linear Operators, Part III: Spectral Operators, Wiley–Interscience, New York, 1988. [5] D. E. Edmunds and W. D. Evans, Spectral Theory and Differential Operators, Clarendon Press, Oxford, 1989. [6] B. Fuglede, A commutativity theorem for normal operators, Proc. Nat. Acad. Sci., USA, 33, 35–40 (1950). [7] E. Heinz, Beitr¨ age zur St¨ orungstheorie der Spektralzerlegung, Math. Ann. 123, 415– 438 (1951). [8] T. Kato, A generalization of the Heinz inequality, Proc. Japan Acad. 37, 305–308 (1961). [9] T. Kato, Fractional powers of dissipative operators, J. Math. Soc. Japan, 13, 246–274 (1961). [10] T. Kato, Fractional powers of dissipative operators, II, J. Math. Soc. Japan, 14, 242–248 (1962). [11] T. Kato, Perturbation Theory for Linear Operators, corr. printing of the 2nd ed., Springer, Berlin, 1980. [12] M. A. Krasnoselskii, P. P. Zabreiko, E. I. Pustylnik, and P. E. Sobolevskii, Integral Operators in Spaces of Summable Functions, Noordhoff, Leyden, 1976. [13] S. G. Krein, Ju. I. Petunin, and E. M. Semenov, Interpolation of Linear Operators, Transl. Math. Monographs, 54, Amer. Math. Soc., Providence, RI, 1982. [14] N. Okazawa, Logarithms and imaginary powers of closed linear operators, Integral Equ. Oper. Theory 38, 458–500 (2000). [15] C. R. Putnam, On normal operators in Hilbert space, Amer. J. Math. 73, 357–362 (1951). [16] C. R. Putnam, Commutation Properties of Hilbert Space Operators and Related Topics, Springer, Berlin, 1967.
Vol. 64 (2009)
Generalized Polar Decompositions
113
[17] M. Reed and B. Simon, Methods of Modern Mathematical Physics. II: Fourier Analysis, Self-Adjointness, Academic Press, New York, 1975. [18] M. Reed and B. Simon, Methods of Modern Mathematical Physics. IV: Analysis of Operators, Academic Press, New York, 1978. [19] M. Rosenblum, On a theorem of Fuglede and Putnam, J. London Math. Soc. 33, 376–377 (1958). [20] B. Simon, Quantum Mechanics for Hamiltonians Defined as Quadratic Forms, Princeton University Press, Princeton, NJ, 1971. [21] B. Sz.-Nagy, On uniformly bounded linear transformations in Hilbert space, Acta Sci. Math. (Szeged) 11, 152–157 (1947). [22] B. Sz.-Nagy and C. Foia¸s, Harmonic Analysis of Operators on Hilbert Space, NorthHolland, Amsterdam, 1970. [23] J. Weidmann, Linear Operators in Hilbert Spaces, Springer, New York, 1980. Fritz Gesztesy Department of Mathematics, University of Missouri, Columbia, MO 65211, USA e-mail:
[email protected] URL: http://www.math.missouri.edu/personnel/faculty/gesztesyf.html Mark Malamud Mathematics, Institute of Applied Mathematics and Mechanics, R. Luxemburg str. 74, Donetsk 83114, Ukraine e-mail:
[email protected] Marius Mitrea Department of Mathematics, University of Missouri, Columbia, MO 65211, USA e-mail:
[email protected] URL: http://www.math.missouri.edu/personnel/faculty/mitream.html Serguei Naboko Department of Mathematical Physics, Institute of Physics St. Petersburg State University, 1 Ulia- novskaia, St. Petergoff, St. Petersburg, 198504, Russia and Department of Mathematics, University of Alabama at Birmingham Birmingham, AL 35294-1170, USA e-mail:
[email protected] [email protected] Submitted: February 20, 2009.
Integr. equ. oper. theory 64 (2009), 115–136 c 2009 Birkh¨
auser Verlag Basel/Switzerland 0378-620X/010115-22, published online April 24, 2009 DOI 10.1007/s00020-009-1676-z
Integral Equations and Operator Theory
Norm Attaining Operators and Pseudospectrum S. Shkarin Abstract. It is shown that if 1 < p < ∞ and X is a subspace or a quotient of an `p -direct sum of finite dimensional Banach spaces, then for any compact operator T on X such that kI + T k > 1, the operator I + T attains its norm. A reflexive Banach space X and a bounded rank one operator T on X are constructed such that kI + T k > 1 and I + T does not attain its norm. Mathematics Subject Classification (2000). Primary 47A30; Secondary 47A10. Keywords. Norm of the resolvent, pseudospectrum, norm attaining operators.
1. Introduction All vector spaces in this paper are assumed to be over the field K, being either the field C of complex numbers or the field R of real numbers. As usual, N is the set of positive integers and R+ is the set of non-negative real numbers. The Banach space of all bounded linear operators from a Banach space X to a Banach space Y is denoted by L(X, Y ) and K(X, Y ) stands for the space of compact linear operators T : X → Y . We write L(X) instead of L(X, X), K(X) instead of K(X, X) and X ∗ instead of L(X, K). We say that T ∈ L(X, Y ) attains its norm on x ∈ X if kxk = 1 and kT xk = kT k. It is said that T attains its norm if there is an x ∈ X with kxk = 1 such that T attains its norm on x. We would like to mention a few classical results on the norm attaining property. The James theorem [10] says that a Banach space X is reflexive if and only if any f ∈ X ∗ attains its norm. As a corollary of the James theorem, we have that X is reflexive if and only if any T ∈ K(X) attains its norm. Indeed, if X is non-reflexive, then the James theorem provides a bounded rank one operator which does not attain its norm. On the other hand, if X is reflexive and T ∈ K(X), then the function x 7→ kT xk is weakly sequentially continuous and the closed unit ball of X is weakly sequentially compact and therefore the above The author would like to thank E. Shargorodsky for his interest and comments.
116
Shkarin
IEOT
function attains its maximum on the unit ball. Below it is shown that the situation with attaining of the norm for operators I +T with compact T is quite different. For further results on norm attaining operators we refer to [1, 2, 3, 4, 5, 12, 14, 16, 17] and references therein. The norm attaining property of operators is related to the concept of the pseudospectrum. Let X be a complex Banach space. For ε > 0 and T ∈ L(X), the ε-pseudospectrum of T is usually defined as σε (T ) = {λ ∈ C : k(T − λI)−1 k > ε−1 }
(1.1)
or as Σε (T ) = {λ ∈ C : k(T − λI)−1 k > ε−1 }, (1.2) −1 where k(T − λI) k is assumed to be infinite if λ belongs to the spectrum σ(T ) of T , see, for instance, [7, 8, 9, 13, 23, 24, 19, 20]. Recently Shargorodsky [19] demonstrated that the level set Σε (T ) \ σε (T ) = {λ ∈ C : k(T − λI)−1 k = ε−1 }
(1.3)
can have non-empty interior in general, while its interior is empty when the space X or the dual space X ∗ is complex uniformly convex. It is well-known that [ σε (T ) = σ(T + A), (1.4) kAk<ε
see, for instance, [9, 11]. This equality is one of the main reasons why many authors prefer (1.1) rather than (1.2) as the definition of pseudospectrum. We study the question whether the similar equality holds in the case of non-strict inequalities: [ Σε (T ) = Σ0ε (T ), where Σ0ε (T ) = σ(T + A). (1.5) kAk6ε
It is worth noting that the inclusion Σ0ε (T ) ⊆ Σε (T )
(1.6)
holds for any bounded operator T on any Banach space [9, 13]. It is proved by Finck and Ehrhardt, see [15], that the equality (1.5) holds if X is a Hilbert space. Shargorodsky [20] constructed a bounded linear operator T on the reflexive space X = `p × `q with 1 < p < q < ∞ and the norm k(x, y)k = kxkp + kykq for which (1.5) fails. He also constructed T ∈ K(`1 ) for which (1.5) fails. These examples naturally lead to the following question, raised in [20]. Question 1.1. Is it true that (1.5) holds for any compact operator on a reflexive complex Banach space? We show that, in general, the answer to Question 1.1 is negative and demonstrate that if 1 < p < ∞ and X is an `p -direct sum of finite dimensional Banach spaces, then (1.5) holds for each bounded operator T on X. In particular, it holds when X = `p with 1 < p < ∞. It turns out that the validity of (1.5) for any compact operator T on a Banach space X is closely related to the norm-attaining property.
Vol. 64 (2009)
Norm Attaining Operators and Pseudospectrum
117
Proposition 1.2. Let X be a complex Banach space, T ∈ K(X), ε > 0 and z ∈ Σε (T ). Then the following conditions are equivalent: (1.2.1) z ∈ Σ0ε (T ); (1.2.2) if k(T − zI)−1 k = ε−1 > |z|−1 , then (T − zI)−1 attains its norm. We use the above proposition in order to prove the following result. Proposition 1.3. Let X be a complex Banach space. Then the following conditions are equivalent: (1.3.1) the equality (1.5) holds for any ε > 0 and any T ∈ K(X); (1.3.2) for any T ∈ K(X) such that I + T is invertible and kI + T k > 1, the operator I + T attains its norm. The above proposition motivates the introduction of the following class of Banach spaces. Definition 1. We say that a Banach space X belongs to the class W if for each T ∈ K(X) such that kI + T k > 1, I + T attains its norm. From Proposition 1.3 it follows that for any X ∈ W and any compact operator T on X, the equality (1.5) holds. It is also worth noting that the restriction kI + T k > 1 is natural. Indeed, the diagonal operator D on `2 with the diagonal entries {1 − 2−n }n∈N has norm 1 which is not attained and D is the sum of the identity operator and a compact operator. The following proposition provides a sufficient condition for a Banach space to belong to W. Definition 2. Let 1 < p < ∞. We say that a Banach space X is a p-space if X is reflexive and for any x ∈ X and any sequence {un }n∈N in X weakly converging to zero, lim kx + un k − (kxkp + kun kp )1/p = 0. (1.7) n→∞
It is easy to see that any Hilbert space is a 2-space and that any finite dimensional Banach space is a p-space for any p. Note that an infinite dimensional Banach space cannot be a p-space and a q-space for p 6= q. Recall that if 1 6 p < ∞ and {Xα }α∈Λ is a family of Banach spaces, then their `p -direct sum is the space Y X p X= x∈ Xα : kxα k < ∞ α∈Λ
α∈Λ
endowed with the norm kxk =
X
p
kxα k
1/p .
α∈Λ
When the family consists of just 2 spaces X and Y we denote its `p -direct sum by X ⊕p Y . We also denote X × Y with the norm k(x, y)k = max{kxk, kyk} by the symbol X ⊕∞ Y . Proposition 1.4. Let 1 < p < ∞. Then any closed linear subspace of an `p -direct sum of any family of finite dimensional Banach spaces is a p-space.
118
Shkarin
IEOT
The following two theorems provide, in particular, a partial affirmative answer to Question 1.1. The next one extends the validity of (1.5) for any bounded operator T from just Hilbert spaces to a wider class of Banach spaces. Theorem 1.5. Let 1 < p < ∞ and X be an `p -direct sum of a family of complex finite dimensional Banach spaces. Then (1.5) holds for any T ∈ L(X). In the case of compact operators, we can extend the last theorem. Theorem 1.6. Let 1 < p 6 q < ∞, X be a p-space and Y be a q-space. Then for any J ∈ L(X, Y ) and T ∈ K(X, Y ) such that kJ + T k > kJk, the operator J + T attains its norm. In particular, any p-space belongs to W. Theorem 1.6 and Proposition 1.3 imply the following corollary. Corollary 1.7. Let 1 < p < ∞ and X be a complex p-space. Then (1.5) holds for any T ∈ K(X). Even a slight perturbation of the norm destroys the above results. The following theorem provides a negative answer to Question 1.1. Theorem 1.8. Let 1 < p < ∞, 1 6 q 6 ∞, q 6= p and X = K ⊕q `p . Then there exists a compact operator T on X such that I + T is invertible, kI + T k > 1 and I + T does not attain its norm. Proposition 1.3 and Theorem 1.8 imply that for 1 < p < ∞ and 1 6 q 6 ∞, q 6= p there are ε > 0 and T ∈ K(C ⊕q `p ) such that (1.5) fails. Since K ⊕q `p is isomorphic to `p , we see that belonging to W and validity of (1.5) are renorming sensitive properties. In particular, K ⊕p `2 is isomorphic to the Hilbert space `2 for any 1 6 p 6 ∞ and belongs to W if and only if p = 2. However, for the spaces K ⊕p `2 the situation improves if we consider finite rank operators instead of compact ones. Proposition 1.9. Let 1 6 p 6 ∞, Y be a finite dimensional Banach space and X = Y ⊕p `2 . Then for any bounded finite rank operator T on X, the operator I + T attains its norm. The last proposition suggests that the answer to Question 1.1 might be affirmative if we replace the compactness condition by the stronger one of T having finite rank. Unfortunately this is not the case. Proposition 1.10. There exists a norm k · k on `2 , equivalent to the original norm k · k2 , and a rank one operator T on `2 such that T 2 = 0, kI + T k = 2 (with respect to the norm k · k on `2 ) and the norm of I + T is not attained. The equality T 2 = 0 for the operator from the above proposition ensures invertibility of T − I and the equality I + T = −(T − I)−1 . Thus (T − I)−1 does not attain its norm and k(T − I)−1 k = 2 > 1. By Proposition 1.2, we have −1 ∈ Σ1/2 (T ) \ Σ01/2 (T ) and (1.5) fails for T with ε = 1/2.
Vol. 64 (2009)
Norm Attaining Operators and Pseudospectrum
119
2. Proof of Propositions 1.2 and 1.3 The following lemma is a known fact [9, 13]. For convenience of the reader we reproduce its short proof. Lemma 2.1. Let X be a complex Banach space ε > 0 and T ∈ L(X). Assume also that z ∈ Σε (T ) \ σ(T ) and (T − zI)−1 attains its norm. Then there is A ∈ L(X) such that kAk 6 ε and z ∈ σ(T + A). Proof. Since (T − zI)−1 attains its norm, there exist x, y ∈ X such that kyk = kxk = 1 and (T − zI)−1 x = cy, where c = k(T − zI)−1 k. Using the Hahn-Banach theorem, we can pick f ∈ X ∗ for which kf k = f (y) = 1. Consider the operator A ∈ L(X),
Au = −c−1 f (u)x.
Clearly kAk 6 c−1 . Since z ∈ Σε (T ), we have c−1 6 ε. Thus kAk 6 ε. Moreover, Ay = −c−1 x. From the equality (T − zI)−1 x = cy it follows that T y = zy + c−1 x. Hence (T + A)y = zy and z ∈ σ(T + A). 2.1. Proof of Proposition 1.2 If X is finite dimensional, then any S ∈ L(X) attains its norm and according to Lemma 2.1, both (1.2.1) and (1.2.2) are satisfied. Thus for the rest of the proof, we can assume that X is infinite dimensional. Assume that (1.2.2) is satisfied. Since X is infinite dimensional and T is compact, k(T − zI)−1 k > |z|−1 . If the relation k(T − zI)−1 k = ε−1 > |z|−1 fails, then either k(T − zI)−1 k > ε−1 or k(T − zI)−1 k = ε−1 = |z|−1 . If k(T − zI)−1 k > ε−1 , then z ∈ σε (T ) and, according to (1.4), z ∈ Σ0ε (T ). If k(T − zI)−1 k = ε−1 = |z|−1 , then kAk = ε, where A = zI. Since X is infinite dimensional and T is compact, we have 0 ∈ σ(T ). Hence z ∈ σ(T + zI) = σ(T + A). Thus z ∈ Σ0ε (T ). It remains to consider the case when k(T − zI)−1 k = ε−1 > |z|−1 and (T − zI)−1 attains its norm. In this case, from Lemma 2.1 it follows that z ∈ Σ0ε (T ). The implication (1.2.2) =⇒ (1.2.1) is verified. Assume now that (1.2.1) is satisfied. That is, there exists A ∈ L(X) such that kAk 6 ε and z ∈ σ(T + A). Hence 0 ∈ σ(T − zI + A). Suppose that (1.2.2) fails. Then k(T − zI)−1 k = ε−1 > |z|−1 and the norm of (T − zI)−1 is not attained. Since kAk 6 ε and |z| > ε, the operator −zI + A is invertible. Then T − zI + A is a Fredholm operator of index zero as a sum of a compact operator T and an invertible operator −zI + A. Since 0 ∈ σ(T − zI + A), T − zI + A is non-invertible and therefore, being a Fredholm operator of index zero, it has non-trivial kernel. Thus we can pick x ∈ X such that kxk = 1 and (T − zI + A)x = 0. It follows that −Ax = (T − zI)x and therefore x = −(T − zI)−1 Ax. Using the relations k(T − zI)−1 k = ε−1 and kAk 6 ε, we obtain 1 = kxk = k − (T − zI)−1 Axk 6 ε−1 kAxk 6 ε−1 kAkkxk 6 kxk = 1. Obviously, all inequalities in the above display should be equalities which can only happen if kAk = kAxk = ε. Then kyk = 1, where y = −ε−1 Ax. Since −(T − zI)−1 Ax = x, we obtain (T − zI)−1 y = ε−1 x. Thus k(T − zI)−1 yk = ε−1 =
120
Shkarin
IEOT
k(T − zI)−1 k. That is, (T − zI)−1 attains its norm on y. This contradiction completes the proof of the implication (1.2.1) =⇒ (1.2.2) and that of Proposition 1.2. 2.2. Proof of Proposition 1.3 First, assume that (1.3.2) is satisfied. Let also T ∈ K(X), ε > 0 and z ∈ Σε (T ). According to (1.6), it suffices to show that z ∈ Σ0ε (T ). By Proposition 1.2, the latter happens if and only if (1.2.2) is satisfied. Assume that it is not the case. Then k(T − zI)−1 k = ε−1 > |z|−1 and the norm of (T − zI)−1 is not attained. On the other hand, (T − zI)−1 = −z −1 (I + S), where S = −z(T − zI)−1 − I is compact. Moreover kI + Sk > 1 since k(T − zI)−1 k > |z|−1 . By (1.3.2), I + S attains its norm and therefore so does (T − zI)−1 . This contradiction proves the implication (1.3.2) =⇒ (1.3.1). Next, assume that (1.3.1) is satisfied, T ∈ K(X), I + T is invertible and c = kI +T k > 1. Let S = (I +T )−1 −I. Clearly S is compact and I +T = (S +I)−1 . Let ε = c−1 . Since k(S + I)−1 k = kI + T k = ε−1 > 1, we have −1 ∈ Σε (S). According to (1.3.2), −1 ∈ Σ0ε (S). Proposition 1.2 implies now that (S + I)−1 = I + T attains its norm. This completes the proof of the implication (1.3.1) =⇒ (1.3.2) and that of Proposition 1.3.
3. `p -direct sums of finite dimensional Banach spaces Throughout this section 1 < p < ∞ and X is the `p -direct sum of a family {Xα : α ∈ Λ} of finite dimensional Banach spaces. For x ∈ X, the support of x is the set supp(x) = {α ∈ Λ : xα 6= 0}. From the definition of the `p -direct sum it follows that the support of any element of X is at most countable. For a subset B of Λ, we consider PB ∈ L(X) defined by the formula xα if α ∈ B, (PB x)α = (3.1) 0 if α ∈ / B. Clearly PB is a linear projection and kPB k = kI − PB k = 1 if B is non-empty and B 6= Λ. Lemma 3.1. Let {xn }n∈N be a sequence in X weakly convergent to zero and {εk }k∈N be a sequence of positive numbers. Then there exist a strictly increasing sequence {nk }k∈N of positive numbers and a sequence {uk }k∈N of elements of X such that kxnk − uk k < εk for each k ∈ N and the sets supp(uk ) are finite and pairwise disjoint. Proof. We construct the required sequences inductively. On the first step we take n1 = 1, pick a finite subset B of Λ such that kx1 −PB x1 k < ε1 and put u1 = PB x1 . Assume now that k > 2, n1 < . . . < nk−1 , u1 , . . . , uk−1 are vectors in X with pairwise disjoint finite supports such that kxnj − uj k < εj for 1 6 j 6 k − 1. Let now C be the union of supp(uj ) for 1 6 j 6 k−1. Since C is finite, PC is a compact
Vol. 64 (2009)
Norm Attaining Operators and Pseudospectrum
121
operator and therefore kPC xn k → 0 as n → ∞. Thus we can pick nk > nk−1 such that kPC xnk k < εk /2. Next, choose a finite subset A of Λ such that C ⊆ A and kxnk − PA xnk k < εk /2 and put uk = PA xnk − PC xnk . Clearly supp(uk ) ⊆ A \ C and therefore uk has finite support and the supports of u1 , . . . , uk are pairwise disjoint. Finally, kxnk − uk k = kPC xnk + (xnk − PA xnk )k 6 kxnk − PA xnk k + kPC xnk k < εk /2 + εk /2 = εk . The description of the inductive construction of sequences {nk } and {uk } is now complete. Lemma 3.2. X is a p-space. Proof. Since 1 < p < ∞, X is reflexive as an `p -direct sum of reflexive Banach spaces. Let x ∈ X and {un }n∈N be a sequence in X weakly convergent to 0. Let also ε > 0. Pick a finite subset B of Λ such that kx − PB xk < ε. Since PB is a compact operator and {un } converges weakly to 0, we have kPB un k → 0 as n → ∞. Let xn = un − PB un . Then kxn − un k → 0 as k → ∞ and supports of xn do not meet B. Since the support of PB x is contained in B, the supports of xn do not intersect the support of PB x and from the definition of the norm on X it follows that kPB x + xn k = (kPB xkp + kxn kp )1/p . Since kx − PB xk < ε and kxn − un k → 0 as n → ∞, we see that |kPB x + xn k − kx + un k| < ε and (kxkp + kun kp )1/p − (kPB xkp + kxn kp )1/p < ε for all sufficiently large n. From the last two displays it follows that kx + un k − (kxkp + kun kp )1/p < 2ε for all sufficiently large n. Since ε > 0 is arbitrary, the equality (1.7) follows.
3.1. Proof of Proposition 1.4 By Lemma 3.2, the class of p-spaces contains `p -direct sums of finite dimensional Banach spaces. From the definition it immediately follows that (closed linear) subspaces of p-spaces are p-spaces. Hence closed linear subspaces of `p -direct sums of finite dimensional Banach spaces are p-spaces. 3.2. Operators on p-spaces Lemma 3.3. Let 1 < p 6 q < ∞, Y be a p-space, Z be a q-space, T ∈ L(Y, Z), {xn }n∈N be a sequence in Y such that kxn k → 1 and kT xn k → kT k as n → ∞ and {xn } is weakly convergent to x ∈ X. Then kT xk = kT kkxk. Proof. Let un = xn − x. Then {un } is weakly convergent to 0. Since T is linear and bounded, T is also continuous with respect to the weak topology and therefore
122
Shkarin
IEOT
{T un } is weakly convergent to 0. For brevity denote c = kT k. Since Y is a p-space and Z is a q-space, we have 1 = lim kxn k = lim kx + un k = lim (kxkp + kun kp )1/p ,
(3.2)
c = lim kT xn k = lim kT x + T un k = lim (kT xkq + kT un kq )1/q .
(3.3)
n→∞
n→∞
n→∞
n→∞
n→∞
n→∞
Clearly kT un k 6 ckun k for each n ∈ N. Assume that kT xk = 6 ckxk. Then kT xk < ckxk. Using these inequalities together with (3.2) and (3.3) and taking into account that p 6 q, we obtain c = lim (kT xkq + kT un kq )1/q < lim (cq kxkq + cq kun kq )1/q n→∞
n→∞
6 c lim (kxkp + kun kp )1/p = c. n→∞
This contradiction proves the equality kT xk = ckxk.
Recall that X is the `p -direct sum of the family {Xα : α ∈ Λ} of finite dimensional Banach spaces. Lemma 3.4. Let T ∈ L(X) be such that inf kT xk = c > 0.
kxk=1
(3.4)
Then there exists S ∈ L(X) such that kSk = c and inf k(T + S)xk = 0.
kxk=1
(3.5)
Proof. Pick a sequence {xn }n∈N in X such that kxn k → 1 and kT xn k → c as n → ∞. Since X is reflexive, we can choose such a sequence {xn } being weakly convergent to x ∈ X. Clearly kxk 6 1. Case x = 0. That is, {xn } weakly converges to 0. By Lemma 3.1, we can find a strictly increasing sequence {nk }k∈N of positive integers and a sequence {yk }k∈N of elements of X0 such that the supports of yk are pairwise disjoint and kxnk − yk k < 2−k for any k ∈ N.
(3.6)
Since the sequence {xnk } weakly converges to 0, formula (3.6) implies that {yk } also weakly converges to 0. Since T ∈ L(X), the sequence {T yk } weakly converges to 0. Using Lemma 3.1 once again, we see that there exist a strictly increasing sequence {km }m∈N of positive integers and a sequence {wm }m∈N in X0 such that the supports of wm are pairwise disjoint and kT ykm − wm k < 2−m for any m ∈ N.
(3.7)
From (3.6) it follows that kT xnk −T yk k 6 2−k kT k for any k ∈ N. Since kT xnk k → c as k → ∞, we have kT yk k → c as k → ∞. Now by (3.7) and (3.6) we obtain lim kykm k = 1
m→∞
and
lim kwm k = c.
m→∞
(3.8)
Vol. 64 (2009)
Norm Attaining Operators and Pseudospectrum
123
For each m ∈ N let Am = supp(ykm ), Pm = PAm and Xm = Pm (X). By the ∗ Hahn-Banach theorem, for any m ∈ N, we can find ϕm ∈ Xm such that kϕm k = 1 and ϕm (ykm ) = kykm k. Consider the operator S ∈ L(X) defined by the formula Su = −c
∞ X ϕm (Pm u) wm . kwm k m=1
From the equalities kϕm k = 1, pairwise disjointness of Am and pairwise disjointness of supp(wm ) it immediately follows that kSk = c. On the other hand, by the definition of S ckykm k wm for any m ∈ N. Sykm = − kwm k According to (3.8) we have kSykm + wm k → 0 as m → ∞. Hence, by (3.7), k(T + S)ykm k → 0 as m → ∞. From (3.8) it follows that kykm k → 1 as m → ∞. Therefore, (3.5) is satisfied. Case x 6= 0. Let Y = T (X). According to (3.4), Y is a closed linear subspace of X and T : X → Y is invertible. Consider R ∈ L(Y, X) being the inverse of T : X → Y . From (3.4) it follows that kRk = c−1 . It is also clear that the sequence un = c−1 T xn is weakly convergent to c−1 T x and kun k → 1 as n → ∞. Moreover Run = c−1 xn for any n ∈ N and therefore Run weakly converges to c−1 x and kRun k → c−1 = kRk as n → ∞. By Proposition 1.4, X and Y are p-spaces. Hence, according to Lemma 3.3, kRkkc−1 T xk = kc−1 RT xk. Taking into account that RT x = x and kRk = c−1 , we have kT xk = ckxk. By the HahnBanach theorem, we can find ϕ ∈ X ∗ such that kϕk = 1 and ϕ(x) = kxk. Let now S ∈ L(X), Su = −kxk−1 ϕ(u)T x. Since kT xk = ckxk, we have kSk 6 c. Moreover (T + S)x = T x − T x = 0 and therefore T + S has non-trivial kernel. Hence (3.5) is satisfied. 3.3. Proof of Theorem 1.5 Let T ∈ L(X), ε > 0 and z ∈ Σε (T ). In view of (1.6), it suffices to show that z ∈ Σ0ε (T ). Since z ∈ Σε (T ), we have k(T − zI)−1 k > ε−1 . If k(T − zI)−1 k > ε−1 , the inclusion z ∈ Σ0ε (T ) follows from (1.4). It remains to consider the case k(T − zI)−1 k = ε−1 . In this case ε = inf k(T − zI)xk. kxk=1
By Lemma 3.4, we can find S ∈ L(X) such that kSk 6 ε and 0 = inf k(T − zI + S)xk. kxk=1
The last display implies that T + S − zI is not invertible. Hence z ∈ σ(T + S). Since kSk 6 ε, we obtain the required inclusion z ∈ Σ0ε (T ).
124
Shkarin
IEOT
3.4. Proof of Theorem 1.6 Lemma 3.5. Let Y and Z be Banach spaces, J ∈ L(Y, Z) and T ∈ K(Y, Z) be such that kJ + T k > kJk. Assume also that {xn }n∈N is a sequence of vectors in Y weakly convergent to x ∈ Y for which kxn k → 1 and k(J + T )xn k → kJ + T k as n → ∞. Then x 6= 0. Proof. Since T is compact, kT xn − T xk → 0 as n → ∞. Hence limn kJxn + T xk = kJ +T k. On the other hand, limn kJxn k 6 kJk. Thus using the triangle inequality, we obtain kT xk > kJ +T k−kJk. It follows that kxkkT k > kT xk > kJ +T k−kJk > 0. Hence, x 6= 0. We are ready to prove Theorem 1.6. Pick a sequence {xn }n∈N of elements of X such that kxn k = 1 for any n ∈ N and k(J + T )xn k → kJ + T k as n → ∞. Since X is reflexive, we, passing to a subsequence, if necessary, may assume that {xn } weakly converges to x ∈ X. By Lemma 3.5 x 6= 0. According to Lemma 3.3, kJx + T xk = kxkkJ + T k. Hence J + T attains its norm on the vector x/kxk.
4. Operators on K ⊕q `p We start by a series of elementary observations. Lemma 4.1. Let X and Y be Banach spaces and T ∈ L(X, Y ) be an operator attaining its norm. Then the dual operator T ∗ ∈ L(Y ∗ , X ∗ ) attains its norm. Proof. Since T attains its norm, there exists x ∈ X such that kxk = 1 and kT xk = kT k. By the Hahn-Banach theorem, we can pick ϕ ∈ Y ∗ such that kϕk = 1 and ϕ(T x) = kT xk. Since ϕ(T x) = (T ∗ ϕ)(x), we have ϕ(T x) 6 kT ∗ ϕkkxk = kT ∗ ϕk. Since kT xk = kT k = kT ∗ k, we see that kT ∗ ϕk > kT ∗ k and kϕk = 1. Thus kT ∗ ϕk = kT ∗ k and therefore T ∗ attains its norm at ϕ. The above lemma immediately implies the following corollary. Corollary 4.2. Let X be a reflexive Banach space and T ∈ L(X). Then T attains its norm if and only if T ∗ attains its norm. In particular, using the facts that an operator is compact if and only if its dual is compact and an operator is invertible if and only if its dual is invertible, we have the following result. Corollary 4.3. Let X be a reflexive Banach space. Then X ∈ W if and only if X ∗ ∈ W. Moreover, the following two statements are equivalent: (4.3.1) there is a compact operator T on X such that I +T is invertible, kI +T k > 1 and I + T does not attain its norm; (4.3.2) there is a compact operator S on X ∗ such that I +S is invertible, kI +Sk > 1 and I + S does not attain its norm.
Vol. 64 (2009)
Norm Attaining Operators and Pseudospectrum
125
4.1. Proof of Theorem 1.8 Let 1 < p < ∞, 1 6 q 6 ∞, p 6= q and X = K ⊕q `p . Clearly X is reflexive and X ∗ is naturally isometrically isomorphic to K ⊕q0 `p0 , where p1 + p10 = 1q + q10 = 1. It is also easy to see that p0 > q 0 if p < q and p0 < q 0 if p > q. According to Corollary 4.3, it is enough to prove Theorem 1.8 in the case p < q. Thus from now on, we assume that p < q. We naturally interpret X as a space of sequences x = {xn }n>0 , where x0 and {xn }n∈N correspond to the K-component and the `p -component in the decomposition X = K ⊕q `p respectively. For any x ∈ X, we denote X 1/p ∞ α(x) = |x0 |, β(x) = |x1 | and γ(x) = |xn |p . (4.1) n=2
Clearly, for x ∈ X, kxk = f (α(x), β(x), γ(x)), where ( 1/q αq + (β p + γ p )q/p if q < ∞, f (α, β, γ) = p p 1/p max α, (β + γ ) if q = ∞.
(4.2) (4.3)
Consider the operator S ∈ L(X) defined by the formula (Sx)0 = x1 , (Sx)1 = x0 nxn if n > 2. That is, and (Sx)n = n+1 2x2 3x3 Sx = x1 , x0 , , ,... . 3 4 Clearly T = S − I is compact. Thus in order to verify that T satisfies the required conditions, it suffices to show that S = I + T is invertible, kSk > 1 and S does not attain its norm. Invertibility of S is obvious. Indeed, the operator R ∈ L(X) defined as Rx = x1 , x0 , 3x2 /2, 4x3 /3, . . . is the inverse of S. Next, let x ∈ X be such that kxk = 1 and let α(x), β(x) and γ(x) be the numbers defined in (4.1). It is clear that α(Sx) = β(x), β(Sx) = α(x), γ(Sx) 6 γ(x). Moreover, γ(Sx) < γ(x) if γ(x) > 0. Thus according to (4.2), f (α(x), β(x), γ(x)) = 1, kSxk = f (β(x), α(x), γ(Sx)) 6 f (β(x), α(x), γ(x)).
(4.4)
Moreover, since γ(Sx) < γ(x) when γ(x) > 0, we have kSxk < f (β(x), α(x), γ(x)) if q < ∞ and γ(x) > 0 and if q = ∞, γ(x) > 0 and β(x) < (α(x)p + γ(x)p )1/p .
(4.5)
According to (4.4), kSxk 6 C, where C = sup{f (β, α, γ) : (α, β, γ) ∈ K} and K = {(α, β, γ) ∈ R3+ : f (α, β, γ) = 1}. Since K is compact and f is continuous, the supremum in the definition of C is attained. Using, for instance, the Lagrange multipliers technique, one can easily see that the function (α, β, γ) 7→ f (β, α, γ) from K to R+ attains its maximal
126
Shkarin 1
IEOT
1
value C = 2 p − q in exactly one point being (2−1/q , 0, 2−1/q ). From (4.5) it now follows that 1 1 (4.6) kSxk < C = 2 p − q whenever kxk = 1. Now consider the sequence xn = 2−1/q e0 + 2−1/q en , n ∈ N, where {ek } is the canonical basis in the sequence space X. Clearly kxnk = 1 for each n ∈ N. On the n other hand, for any n > 2, Sxn = 2−1/q e1 + n+1 en and therefore n p 1/p 1 1 (4.7) → 2 p − q as n → ∞. kSxn k = 2−1/q 1 + n+1 1
1
From (4.6) and (4.7) it follows that kSk = 2 p − q > 1 and the norm of S is not attained. The proof of Theorem 1.8 is now complete.
5. Proper extensions of Hilbert spaces and finite rank operators In this section we prove a theorem slightly stronger then Proposition 1.9. We need some preparation. Throughout this section H is a Hilbert space and n ∈ N. We say that X = Kn × H is a proper extension of H if X is endowed with a norm such that k(t, x)k = ϕ(t, kxk) for any t ∈ Kn , x ∈ H, (5.1) where ϕ : Kn × R+ → R+ is a function and ϕ(0, 1) = 1. The fact that (t, x) 7→ ϕ(t, kxk) is a norm on X implies immediately that ϕ is Lipschitzian, convex, ϕ(t, a) > 0, whenever (t, a) 6= (0, 0) and ϕ(st, sa) = sϕ(t, a) for any s, a ∈ R+ and t ∈ Kn . The normalization condition ϕ(0, 1) = 1 implies that k(0, x)k = kxkH for any x ∈ H. Thus H is naturally isometrically embedded into X. Since H has finite codimension in X, we see that X is a Banach space and admits an equivalent norm which turns it into a Hilbert space. In particular, X is reflexive. Theorem 5.1. Let X = Kn × H be a proper extension of a Hilbert space H. Then for any bounded finite rank operator T on X, I + T attains its norm. Proof. Let ϕ : Kn × R+ → R+ be a function defining the norm on X according to (5.1). If H is finite dimensional, the result becomes trivial. Thus we can assume that H is infinite dimensional. Pick a sequence {ξk = (tk , xk )}k∈N of elements of X such that kξk k → 1 and k(I + T )ξk k → c as k → ∞. Since X is reflexive, we can, passing to a subsequence, if necessary, assume that {ξk } converges weakly to ξ = (t, x) ∈ X. Since T has finite rank, {T ξk } is norm convergent to T ξ = (s, y). Next, since weak and norm convergences on a finite dimensional Banach space coincide, we see that {tk } converges to t in Cn . Passing to a subsequence again, if necessary, we can assume that kxk − xk → α ∈ R+ . Since xk − x is weakly convergent to zero in the Hilbert space H and any Hilbert space is a 2-space, we see that lim kxk k = (kxk2 + α2 )1/2
k→∞
and
lim kxk + yk = (kx + yk2 + α2 )1/2 .
k→∞
(5.2)
Vol. 64 (2009)
Norm Attaining Operators and Pseudospectrum
127
Since kξk k → 1, k(I + T )ξk k → c, tk → t and kT ξk − (s, y)k → 0, we have 1 = lim kξk k = lim k(tk , xk )k = lim k(t, xk )k, k→∞
k→∞
k→∞
c = lim k(I + T )ξk k = lim kξk + (s, y)k = lim k(t + s, xk + y)k. k→∞
k→∞
k→∞
Using (5.1), (5.2) and continuity of ϕ, we obtain ϕ(t, (kxk2 + α2 )1/2 ) = 1 and ϕ(t + s, (kx + yk2 + α2 )1/2 ) = c.
(5.3)
Since H is infinite dimensional and T has finite rank, the linear subspace L = {v ∈ H : T (0, v) = 0, hu, xi = hu, yi = 0} has finite codimension and therefore is non-trivial. Hence we can pick u ∈ L such that kuk = α. Since u is orthogonal to both x and y, we see that kx + uk = (kxk2 + α2 )1/2 and kx + y + uk = (kx + yk2 + α2 )1/2 . Hence, according to (5.1) and (5.3) k(t, x + u)k = ϕ(t, kx + uk) = 1 and k(t + s, x + y + u)k = ϕ(t, kx + y + uk) = c. Finally, since T (0, u) = 0, we have T (t, x + u) = T (t, x) = (s, y). Hence (I + T )(t, x + u) = (t + s, x + y + u). Since c = kI + T k, from the last two displays it follows that I + T attains its norm on the vector (t, x + u). Theorem 1.9 follows from Theorem 5.1 since Y ⊕p `2 for a finite dimensional Banach space Y is a particular case of a proper extension.
6. Examples with rank one operators As was already mentioned in the introduction, Shargorodsky [20] constructed T ∈ K(`1 ) such that (1.5) fails for T for one prescribed ε > 0. We shall demonstrate that for X = `1 and X = c0 one can find a rank 1 operator T for which (1.5) fails for any ε > 0. As usual, we denote the canonical basis in c0 or `1 by {en }n>0 . Example 6.1. Let T ∈ L(c0 ), Tx =
X ∞
−n
2
xn e0 .
n=1
Then T has rank 1, T 2 = 0 and for any z ∈ K, kT + zIk = 1 + |z| and the operator T + zI does not attain its norm. Proof. Obviously, T has rank 1, kT k = 1 and T 2 = 0. Let z ∈ K and r = |z|. Since kT k = 1, we have kT + zIk 6 1 + r. For n ∈ N, consider xn = (r/z)e0 + e1 + e2 + . . . + en . Clearly kxn k = 1 and the e0 -coefficient of (T + zI)xn equals r + 1 − 2−n . Hence kT + zIk > r + 1 − 2−n for any n ∈ N. Thus kT + zIk > 1 + r. Since the opposite inequality is also true, kT + zIk = 1 + r. It remains to show that T + zI does not attain its norm. Assume the contrary. Then there exists x ∈ c0 such that
128
Shkarin
IEOT
kxk = 1 and kyk = 1 + r, where y = zx + T x. Since T x is a scalar multiple of e0 , we have yn = zxn for n ∈ N. Hence |yn | 6 r forPn ∈ N. Thus 1 + r = kyk = |y0 |. ∞ Using the definition of T we obtain y0 = zx0 + n=1 2−n xn . Hence 1 + r = |y0 | 6 |z||x0 | +
∞ X
2−n |xn | 6 r +
n=1
∞ X
2−n = 1 + r.
n=1
The latter is possible only if |xj | = 1 for any j which contradicts the inclusion x ∈ c0 . Example 6.2. Let T ∈ L(`1 ), Tx =
X ∞
(1 − 2−n )xn e0 .
n=1 2
Then T has rank 1, T = 0 and for any z ∈ C, kT + zIk = 1 + |z| and the operator T + zI does not attain its norm. Proof. Obviously, T has rank 1, kT k = 1 and T 2 = 0. Let z ∈ K and r = |z|. For n ∈ N, we have (T + zI)en = (1 − 2n )e0 + zen . Hence k(T + zI)en k = 1 + r − 2−n . Since ken k = 1, we see that kT + zIk > 1 + r. Since the opposite inequality is also true, kT + zIk = 1 + r. It remains to show that T + zI does not attain its norm. Assume the contrary. Then there exists x ∈ `1 such that kxk = 1 and kyk = 1 + r, where y = zx + T x. By definition of T , ∞ ∞ ∞ X X X −n (1 − 2 )xn +r |xn | 6 r|x0 | + (1 + r − 2−n )|xn |. 1 + r = kyk = zx0 + n=1
n=1
n=1
−n
Since the coefficients r and 1 + r − 2 in the last sum are strictly less than 1 + r, we get 1 + r < (1 + r)kxk = 1 + r. This contradiction completes the proof. The following proposition clarifies the situation with the above two operators and formula (1.5). Proposition 6.3. Let T be the operator from either Example 6.1 or Example 6.2 in the case K = C. Then for any ε > 0, Σ0ε (T ) = σε (T ) 6= Σε (T ). Proof. Since T 2 = 0, we have σ(T ) = {0} and, for any z ∈ C \ {0}, (T − zI)−1 = (−z −2 )(T + zI). Thus (T − zI)−1 attains its norm if and only if so does T + zI and k(T − zI)−1 k = |z|−2 kT + zIk = |z|−1 + |z|−2 > |z|−1 . Since T + zI never attains its norm, we, applying Proposition 1.2, see that for any ε > 0, p Σ0ε (T ) = σε (T ) = z ∈ C : |z|−1 + |z|−2 > ε−1 = z : |z| < ε + 4ε + ε2 . On the other hand, for any ε > 0, p Σε (T ) = z ∈ C : |z|−1 + |z|−2 > ε−1 = z : |z| 6 ε + 4ε + ε2 . According to the last two displays, Σ0ε (T ) 6= Σε (T ) for each ε > 0.
Vol. 64 (2009)
Norm Attaining Operators and Pseudospectrum
129
6.1. Proof of Proposition 1.10 Recall that a subset A of a vector space X is called balanced if λx ∈ A whenever x ∈ A, λ ∈ K and |λ| 6 1. A set is called absolutely convex if it is convex and balanced. By aconv(A) we denote the absolutely convex hull of A, being the minimal absolutely convex set containing A. Clearly X n n X aconv(A) = λj xj : n ∈ N, xj ∈ A, λj ∈ K, |λj | 6 1 . (6.1) j=1
j=1
For a subset A of a topological vector space X, aconv(A) stands for the closure of aconv(A). We recall two elementary properties of absolutely convex hulls. The proof of the first one can be found in virtually any book on topological vector spaces, see, for instance, [18]. The second one is proved in [6]. For a different proof see [22]. Lemma 6.4. Let n ∈ N and K1 , . . . , Kn be compact convex subsets of a Hausdorff topological vector space X. Then [ X [ n n n n X Kj = λj xj : λj ∈ K, xj ∈ Kj , |λj | 6 1 . Kj = aconv aconv j=1
j=1
j=1
j=1
Moreover, the above set is compact. Lemma 6.5. Let {xn }n∈N be a sequence of elements of a sequentially complete locally convex Hausdorff topological vector space X converging to x ∈ X as n → ∞. Then ∞ X aconv(A) = α0 x + αn xn : α ∈ `1 , kαk1 6 1 where A = {xn : n ∈ N}. n=1
Moreover, aconv(A) is metrizable and compact. From now on in this section, by k · k2 we denote the canonical norm on `2 . We use the same symbol to denote the standard Euclidean norm on K2 : k(t, s)k2 = (|t|2 + |s|2 )1/2 . Let also {en }n∈N be the canonical orthonormal basis in `2 . For x ∈ `2 we denote x0 = x − x1 e1 − x2 e2 . That is, x0 is the orthogonal projection of x onto the closed linear span of the vectors √ e3 , e4 , . . . . Fix a sequence {qn }n∈N of positive numbers such that 1/2 < qn < 1/ 2 for each n ∈ N and limn→∞ qn = 1/2. Consider the set B ⊂ `2 , ∞ X B = x+ (αn (e2 + en+2 ) + βn qn (e1 + e2 + en+2 )) : n=1
kx k2 + k(x1 , x2 )k2 + kαk1 + kβk1 6 1 , 0
(6.2)
130
Shkarin
IEOT
where x ∈ `2 , α, β ∈ `1 and k · k1 is the canonical norm in√ `1 . Obviously, B is absolutely convex. Taking into account that ke2 + en+2 k2 = 2 and kqn (e1 + e2 + p √ en+2 )k2 = qn 3 6 3/2, we see that √ kuk2 6 2 for any u ∈ B. (6.3) Now if kuk2 6 1/2, then ku0 k22 + |u1 |2 + |u2 |2 6 1/4. An elementary application of the Cauchy inequality gives ku0 k2 + k(u1 , u2 )k2 6 1. Taking α = β = 0 and x = u, we see then that u ∈ B. Thus u∈B
if kuk2 6 1/2.
(6.4)
We consider the norm k · k on `2 being the Minkowski functional of the set B. Formulae (6.3) and (6.4) imply that it is indeed a norm and that it is equivalent to the Hilbert space norm k · k2 : 2−1/2 kuk2 6 kuk 6 2kuk2 for all u ∈ `2 . In particular, `2 endowed with the norm k · k is a reflexive Banach space. Using the definition of the Minkowski functional, we have that for u ∈ `2 , kuk = inf kx0 k2 + k(x1 , x2 )k2 + kαk1 + kβk1 : u=x+
∞ X
(αn (e2 + en+2 ) + βn qn (e1 + e2 + en+2 )) .
(6.5)
n=1
We shall show that B coincides with the closed unit ball with respect to the norm k · k. Since B is bounded and absolutely convex, it suffices to show that B is closed in `2 . First, note that the set B1 = {x ∈ `2 : kx0 k2 + k(x1 , x2 )k2 6 1}
(6.6)
is weakly compact and B1 ⊆ B. Next, let B2 = aconv{e2 +en+2 : n ∈ N}. Since the sequence e2 + en+2 converges weakly to e2 , Lemma 6.5 implies that B2 is weakly compact and ∞ X αn (e2 + en+2 ) : |s| + kαk1 6 1 . (6.7) B2 = se2 + n=1
P∞ It follows that B2 ⊆ B. Indeed, for u = se2 + n=1 αn (e2 + en+2 ) ∈ B2 , one just has to take x = se2 and β = 0 to see that u ∈ B. Similarly, let B3 = aconv{qn (e1 + e2 + en+2 ) : n ∈ N}. Since the sequence qn (e1 + e2 + en+2 ) converges weakly to (e1 + e2 )/2, Lemma 6.5 implies that B3 is weakly compact and ∞ X t B3 = (e1 + e2 ) + βn qn (e1 + e2 + en+2 ) : |t| + kβk1 6 1 . (6.8) 2 n=1 As above, it is clear that B3 ⊆ B. Since B is absolutely convex, we have B0 = aconv(B1 ∪ B2 ∪ B3 ) ⊆ B.
Vol. 64 (2009)
Norm Attaining Operators and Pseudospectrum
131
By Lemma 6.4, B0 is weakly compact and B0 = {ax + by + cw : x ∈ B1 , y ∈ B2 , w ∈ B3 , |a| + |b| + |c| 6 1}.
(6.9)
From formulae (6.6–6.9) and (6.2) it follows that B ⊆ B0 . Hence B = B0 and therefore B is weakly compact. Thus B is closed in `2 which ensures that B is the closed unit ball for the norm (6.5). It follows that the infimum in (6.5) is always attained and that we can write kuk = min kx0 k2 + k(x1 , x2 )k2 + kαk1 + kβk1 : u=x+
∞ X
(αn (e2 + en+2 ) + βn qn (e1 + e2 + en+2 )) .
(6.10)
n=1
Lemma 6.6. The norm on `2 defined by (6.5) satisfies the following conditions: (6.6.1) ke2 + en+2 k = 1 for any n ∈ N; (6.6.2) qn ke1 + e2 + en+2 k = 1 for any n ∈ N. Proof. Taking x = 0, β = 0 and α = en , we see that e2 + en+2 ∈ B. Hence ke2 + en+2 k 6 1. Assume that ke2 + en+2 k < 1. Then there exist x ∈ `2 and α, β ∈ `1 such that kx0 k2 + k(x1 , x2 )k2 + kαk1 + kβk1 < 1
(6.11)
and e2 + en+2 = x +
∞ X
(αk (e2 + ek+2 ) + βk qk (e1 + e2 + ek+2 )).
k=1
Taking the inner product of both sides of the above equality with e2 , we obtain 1 = x2 +
∞ X
(αk + qk βk ).
k=1
Hence |x2 | +
∞ X
(|αk | + qk |βk |) > 1,
k=1
which contradicts (6.11). This contradiction proves (6.6.1). Taking x = 0, α = 0 and β = en , we see that qn (e1 + e2 + en+2 ) ∈ B. Hence qn ke1 + e2 + en+2 k 6 1. Assume that qn ke1 + e2 + en+2 k < 1. Then there exist x ∈ `2 and α, β ∈ `1 such that qn (e1 + e2 + en+2 ) = x +
∞ X k=1
(αk (e2 + ek+2 ) + βk qk (e1 + e2 + ek+2 )).
132
Shkarin
IEOT
and (6.11) is satisfied. Taking the inner product of both sides of the above equality with en+2 , e1 and e2 we obtain the following equality in K3 : X qn (1 − βn )(1, 1, 1) = (xn+2 , x1 , x2 ) + αn (1, 0, 1) + (αk (0, 0, 1) + βk qk (0, 1, 1)) k6=n
= (xn+2 , τ, σ) + αn (1, 0, 1), where (τ, σ) = (x1 , x2 ) +
(6.12) X
(αk (0, 1) + βk qk (1, 1)).
k6=n
√ Note that k(0, 1)k2 = 1 and kqk (1, 1)k2 6 1 since qk 6 1/ 2. Using (6.12) and the triangle inequality, we obtain X k(τ, σ)k2 6 k(x1 , x2 )k2 + (|αk | + |βk |). k6=n
From the last display together with (6.11) and (6.12), it follows that qn (1 − βn )(1, 1, 1) = ((xn+2 + αn )en+2 , τ, σ + αn ) where |xn+2 | + |αn | + |βn | + k(τ, σ)k2 < 1. Dividing by 1−βn and denoting y = xn+2 /(1−βn ), a = αn /(1−βn ), r = τ /(1−βn ) and p = σ/(1 − βn ) we see arrive to the following equality in K3 : p (qn , qn , qn ) = (y + a, r, p + a), where |y| + |a| + |r|2 + |p|2 < 1. Hence r = qn , p = y = qn − a and |a| + |qn − a| +
p
|qn |2 + |qn − a|2 < 1.
(6.13)
On p the other hand, qn > 1/2 and therefore |a| + |qn − pa| > qn > 1/2 and |qn |2 + |qn − a|2 > qn > 1/2. Hence |a| + |qn − a| + |qn |2 + |qn − a|2 > 1 which contradicts (6.13). This contradiction completes the proof of (6.6.2). Remark. In a similar way one can show that kuk = kuk2 if either u1 = u2 = 0 or u belongs to the linear span of e1 and e2 . Now we consider the operator S ∈ L(`2 ) defined by the formula Su = u+u2 e1 . Clearly S is the sum of the identity operator and a bounded rank 1 operator T u = u2 e1 . Obviously, T 2 = 0. Proposition 1.10 will be proved if we verify that kSk = 2 and S does not attain its norm. Lemma 6.7. For any non-zero u ∈ `2 , kSuk < 2kuk. Proof. Let u ∈ `2 be such that kuk = 1. It suffices to show that kSuk < 2. Since kuk = 1, from (6.10) it follows that there are x ∈ `2 and α, β ∈ `1 such that u=x+
∞ X
(αn (e2 + en+2 ) + βn qn (e1 + e2 + en+2 )),
(6.14)
n=1
kx0 k2 + k(x1 , x2 )k2 + kαk1 + kβk1 = 1.
(6.15)
Vol. 64 (2009)
Norm Attaining Operators and Pseudospectrum
133
Next, from (6.14) and the definition of S, we obtain that Su = x + τ e1 +
∞ X
qn (βn + qn−1 αn )(e1 + e2 + en+2 ),
∞ X
where τ = x2 +
n=1
qn βn .
n=1
Using (6.5), we see that kSuk 6 kx0 k2 + k(x1 + τ, x2 )k2 +
∞ X
|βn + qn−1 αn |.
n=1
From the definition of τ it follows that kSuk 6 kx0 k2 + k(x1 + x2 , x2 )k2 +
∞ X
((1 + qn )|βn | + qn−1 |αn |).
n=1
1 0
1 acting 1
Taking into account that the norm of the operator with the matrix √ 1/2 < 53 , we have k(x1 + on the 2-dimensional Hilbert space K2 equals 3+2 5 x2 , x2 )k2 6 35 k(x1 , x2 )k2 . Substituting this into the last display and taking into account that 1 + qn 6 1 + 2−1/2 < 74 , we obtain ∞ X 5 7 kSuk 6 kx0 k2 + k(x1 , x2 )k2 + kβk1 + qn−1 |αn |. 3 4 n=1
Since the coefficients in the above display in front of kx0 k2 , k(x1 , x2 )k2 , kβk1 and each |αn | are all strictly less than 2, formula (6.15) implies that kSuk < 2. Now, observe that S(e2 + en+2 ) = e1 + e2 + en+2 . By Lemma 6.6 we have ke2 + en+2 k = 1 and ke1 + e2 + en+2 k = qn−1 . Hence kSk > qn−1 for any n ∈ N. Since qn−1 → 2 as n → ∞, we have kSk > 2. Thus from Lemma 6.7 it follows that kSk = 2 and S does not attain its norm. This completes the proof of Proposition 1.10.
7. Concluding remarks 1. A more general approach to study the class W is to consider the following property. Definition 3. We say that a Banach space X is tame if for any y ∈ X, x ∈ X \ {0} and any sequence {un }n∈N in X weakly convergent to zero, ky + un k kyk lim 6 max 1, . (7.1) n→∞ kx + un k kxk It is easy to see that p-spaces for 1 < p < ∞ are tame. Proposition 7.1. Let X be a reflexive Banach space such that either X or X ∗ is tame. Then X ∈ W.
134
Shkarin
IEOT
Proof. According to Corollary 4.3, it is sufficient to consider the case, when X is tame. Let T ∈ K(X) and kI + T k = c > 1. Since X is reflexive, we can pick a sequence {xn }n∈N of elements of X such that kxn k → 1, k(I + T )xn k → c and {xn } is weakly convergent to x ∈ X. By Lemma 3.5, x 6= 0. Since the sequence un = xn − x is weakly convergent to 0 and T is compact, T xn is norm-convergent to T x. Hence kx + T x + un k = kxn + T xk → c. Since X is tame, we have kx + T xk kx + T x + un k 6 max 1, . c = lim n→∞ kx + un k kxk The inequality c > 1 and the last display imply that kx + T xk > ckxk. Taking into account that c = kI + T k, we see that I + T attains its norm on x/kxk. Unfortunately, it seems there are no known examples of tame Banach spaces which are not p-spaces. This naturally leads to the problem of characterizing the tame spaces. 2. Analyzing the proof of Theorem 1.6, one can easily see that if 1 < p < ∞, X is a p-space and T ∈ K(X) is such that kI + Kk > 1, then whenever {xn }n∈N is a sequence of elements of X weakly converging to x ∈ X and satisfying kxn k → 1, k(I + T )xn k → kI + T k as n → ∞, then {xn } is norm convergent to x and I + T attains its norm on x. 3. In a recent paper [21] Shargorodsky and the author constructed a strictly convex reflexive Banach space X and S ∈ L(X) such that for some ε > 0, the level set Σε (S) \ σε (S) has non-empty interior. The space X constructed in [21] is an `2 -direct sum of a countable family of finite dimensional Banach spaces. Thus by Theorem 1.5, (1.5) holds for any T ∈ L(X). This observation shows that there is no relation between validity of (1.5) and meagreness of the level sets of the norm of the resolvent. 4. Let 1 < p < ∞. As it follows from Proposition 1.4 and Theorem 1.6, any subspace of an `p -direct sum X of a family of finite dimensional Banach spaces belongs to W. Applying Corollary 4.3, one can easily see that same holds true for quotients of X as well. Indeed, X ∗ is naturally isometrically isomorphic to an `p0 -direct sum of a family of finite dimensional Banach spaces, where p1 + p10 = 1. Moreover, for any closed linear subspace Y of X, (X/Y )∗ is naturally isometrically isomorphic to a subspace of X ∗ . 5. It would be interesting to figure out which classical Banach spaces do belong to the class W. A good starting point would be to address the spaces Lp [0, 1] for 1 < p < ∞. There is a strong indication against their membership in W for p 6= 2. Namely, it is easy to show that Lp [0, 1] for p 6= 2 is not tame. 6. The compactness condition in Propositions 1.3 and 1.2 can be replaced by the weaker condition of T being strictly singular. The proofs work without any changes.
Vol. 64 (2009)
Norm Attaining Operators and Pseudospectrum
135
References [1] M. Acosta, Denseness of norm-attaining operators into strictly convex spaces, Proc. Roy. Soc. Edinburgh Sect. A129 (1999), 1107–1114. [2] M. Acosta, F. Aguirre and R. Pay´ a, A new sufficient condition for the denseness of norm attaining operators, Rocky Mountain J. Math. 26 (1996), 407–418. [3] M. Acosta and G. Ruiz, Norm attaining operators and reflexivity, Rend. Circ. Mat. Palermo (2) Suppl. 1998, no. 56, 171–177. [4] M. Acosta and C. Ruiz, Norm attaining operators on some classical Banach spaces, Math. Nachr. 235 (2002), 17–27. [5] F. Aguirre, Norm-attaining operators into strictly convex Banach spaces, J. Math. Anal. Appl. 222 (1998), 431–437. [6] J. Bonet and P. P´erez-Carreras, Barrelled locally convex spaces, North-Holland Mathematics Studies 131, North-Holland Publishing Co., Amsterdam, 1987. [7] A. B¨ ottcher, Pseudospectra and singular values of large convolution operators, J. Integral Equations Appl. 6 (1994), 267–301. [8] A. B¨ ottcher, S. Grudsky and B. Silbermann, Norms of inverses, spectra, and pseudospectra of large truncated Wiener-Hopf operators and Toeplitz matrices, New York J. Math. 3 (1997), 1–31. [9] F. Chaitin-Chatelin and A. Harrabi, About definitions of pseudospectra of closed operators in Banach spaces, Tech. Rep. TR/PA/98/08, CERFACS. [10] J. Diestel, Geometry of Banach spaces—selected topics, Lecture Notes in Mathematics 485, Springer-Verlag, Berlin, 1975. [11] E. Gallestey, D. Hinrichsen and A. Pritchard, Spectral value sets of closed linear operators, Proc. R. Soc. London, Ser. A 456 (2000), 930–937. [12] B. Godun and S. Troyanski, Norm-attaining operators, and the geometry of the unit sphere of a Banach space, Soviet Math. Dokl. 42 (1991), 532–534. [13] A. Harrabi, Pseudospectre d’une suite d’op´erateurs born´es, RAIRO Mod´el. Math. Anal. Mum´er. 32 (1998) 671–680. [14] J. Partington, Norm attaining operators, Israel J. Math. 43 (1982), 273–276. [15] S. Roch and B. Silberman, C ∗ -algebra technique in numerical analysis, J. Operator Theory 35 (1996), 241–280. [16] W. Schachermayer, Norm attaining operators on some classical Banach spaces, Pacific J. Math. 105 (1983), 427–438. [17] W. Schachermayer, Walter Norm attaining operators and renormings of Banach spaces, Israel J. Math. 44 (1983), 201–212. [18] H. Sch¨ afer, Topological vector spaces, MacMillan, New York, 1966. [19] E. Shargorodsky, On the level sets of the resolvent norm of linear operators, Bull. Lond. Math. Soc. 40 (2008), 493–504. [20] E. Shargorodsky, On the definition of pseudospectra, Bull. Lond. Math. Soc. [to appear]. [21] E. Shargorodsky and S. Shkarin, The level sets of the resolvent norm and convexity properties of Banach spaces, [preprint].
136
Shkarin
IEOT
[22] S. Shkarin, Some results on solvability of ordinary linear differential equations in locally convex spaces, Math. USSR Sbornik 71 (1992), 29–40. [23] L. Trefethen, Pseudospectra of linear operators, SIAM Rev. 39 (1997), 383–406. [24] L. Trefethen and M. Embree, Spectra and pseudospectra: the behavior of non-normal matrices and operators, Princeton University Press, Priceton, NJ, 2005. S. Shkarin Queen’s University Belfast Department of Pure Mathematics University road, BT7 1NN Belfast, UK e-mail:
[email protected] Submitted: August 20, 2008. Revised: November 6, 2008.
Integr. equ. oper. theory 64 (2009), 137–154 c 2009 Birkh¨
auser Verlag Basel/Switzerland 0378-620X/010137-18, published online April 24, 2009 DOI 10.1007/s00020-009-1677-y
Integral Equations and Operator Theory
Algebraic Properties of Toeplitz Operators with Radial Symbols on the Bergman Space of the Unit Ball Ze-Hua Zhou∗ and Xing-Tang Dong Abstract. In this paper, we discuss some algebraic properties of Toeplitz operators with radial symbols on the Bergman space of the unit ball in Cn . We first determine when the product of two Toeplitz operators with radial symbols is a Toeplitz operator. Next, we investigate the zero-product problem for several Toeplitz operators with radial symbols. Also, the corresponding commuting problem of Toeplitz operators whose symbols are of the form ξ k ϕ is studied, where k ∈ Zn and ϕ is a radial function. Mathematics Subject Classification (2000). Primary 47B35; Secondary 32A36. Keywords. Toeplitz operator, Bergman space, Mellin transform, radial symbol, quasihomogeneous symbol.
1. Introduction Let dv denote the Lebesgue volume measure on the unit ball Bn of Cn , normalized so that the measure of Bn equals 1. The Bergman space L2a (Bn ) is the Hilbert space consisting of holomorphic functions on Bn that are also in L2 (Bn , dv). Each point evaluation is easily verified to be a bounded linear functional on L2a (Bn ). Hence, for each z ∈ Bn , there exists a unique function Kz ∈ L2a (Bn ) which has the following reproducing property f (z) = hf, Kz i for every f ∈ L2a (Bn ). It is known that the reproducing kernel Kw is given by Kz (w) = ∗
1 , w ∈ Bn . (1 − hw, zi)n+1
Corresponding author, supported in part by the National Natural Science Foundation of China (Grand Nos.10671141, 10371091).
138
Zhou and Dong
IEOT
Let P be the orthogonal projection from L2 (Bn , dv) onto L2a (Bn ). For a function ϕ ∈ L∞ (Bn , dv), the Toeplitz operator Tϕ : L2a (Bn ) 7→ L2a (Bn ) with symbol ϕ is defined by Z Tϕ (f )(z) = P (ϕf )(z) = (1.1) f (w)ϕ(w)Kz (w)dv(w), f ∈ L2a (Bn ). Bn
The operators defined in this way are the simplest and most natural Toeplitz operators, but we prefer to consider a more general class of Toeplitz operators. Let µ be any finite complex measure on Bn , then we define an operator Tµ on L2a (Bn ) by Z Tµ f (z) = f (w)Kz (w)dµ(w), f ∈ L2a (Bn ). Bn
If dµ(w) = F (w)dv(w) for some F ∈ L1 (Bn , dv), then we simply write Tµ = TF . This operator is always defined on the polynomials and the image of any polynomial is always a holomorphic function on the unit ball. We are interested in the case where this densely defined operator is bounded in the L2a (Bn ) norm. This happens often. For example, if µ has compact support, then Tµ is not only bounded, but also compact. Thus, if F ∈ L1 (Bn , dv) and there is an r ∈ (0, 1) such that F is (essentially) bounded on the annulus {z : r < |z| < 1}, then TF is bounded on L2a (Bn ) because F can be written as an L1 function with compact support plus a bounded function. This motivates two of the following definitions, which are based on the definitions on the unit disk in [9]. Definition 1.1. Let F ∈ L1 (Bn , dv). (a) We say that F is a T-function if the equation (1.1), with ϕ = F , defines a bounded operator on L2a (Bn ). (b) If F is a T-function, we write TF for the continuous extension of the operator defined by equation (1.1). We say that TF is a Toeplitz operator if and only if TF is defined in this way. (c) If there is an r ∈ (0, 1) such that F is (essentially) bounded on the annulus {z : r < |z| < 1}, then we say that F is “nearly bounded”. Remark 1.2. Grudsky, Karapetyants and Vasilevski [8] gave sufficient and necessary conditions for boundedness of Toeplitz operators with radial symbols on the Bergman spaces of the unit ball. Thus those conditions give a characterization of the radial functions in L1 (Bn , dv) which correspond to bounded operators. Generally, the T-functions form a proper subset of L1 (Bn , dv) which contains all bounded and “nearly bounded” functions. In 1964, Brown and Halmos [4] gave simple conditions for the product of two Toeplitz operators on the Hardy space to be equal to a Toeplitz operator, and showed that two bounded Toeplitz operators Tϕ and Tψ commute if and only if: (I) both ϕ and ψ are analytic, or (II) both ϕ and ψ are analytic, or (III) one is a linear function of the other. On the Bergman space of the unit disk, Axler, Ahern and ˘ ckovi´c showed that a similar result holds for Toeplitz operators with bounded Cu˘
Vol. 64 (2009)
Toeplitz operators with radial symbols
139
harmonic symbols (see [2, 1]). In spite of several results obtained in recent years, it seems to be far from its solution. However, some results with special symbols ˘ ckovi´c and Rao [7] gave necessary and sufficient conditions for a were obtained. Cu˘ symbol that produces a Toeplitz operator commuting with another such operator whose symbol is a monomial. In [9] Louhichi, Strouse and Zakariasy gave necessary and sufficient conditions for the product of two Toeplitz operators whose symbols are quasihomogeneous (i.e., it is of the form eikθ φ, where φ is a radial function) to be a Toeplitz operator, then they characterized commuting Toeplitz operators with quasihomogeneous symbols (see [10]). On the Bergman space of several complex variables, the situation is much more complicated, and it is not clear whether they will have some interesting results. Zheng [18] studied commuting Toeplitz operators with pluriharmonic symbols on the unit ball in Cn . Recently, extending Vasilevski’s results in [15] and [16], Quiroga-Barranco and Vasilevski gave the description of many (geometrically defined) classes of commuting Toeplitz operators on the unit ball (see [11, 12]). Motivated by recent work on the disk of Louhichi, Strouse and Zakariasy, we discuss the same questions for more general symbols on the unit ball in this paper. However, we need different methods and some complex calculation skills in the proof. The remainder of the present paper is assembled as follows: In section 2, we introduce some basic properties of the Mellin transform and Mellin convolution which will be needed later. In Section 3, we first investigate some basic results concerning Toeplitz operators with radial symbols on the Bergman space of the unit ball in Cn , then use these results to characterize when the product of two Toeplitz operators with radial symbols is a Toeplitz operator. As an application, in Section 3, an explicit formula for the symbol of the product in the certain cases is given. Then, we investigate the zero-product problem for several Toeplitz operators with radial symbols. In the last section, the corresponding commuting problem of Toeplitz operators with quasihomogeneous symbols is studied. Suppose ϕ and ψ are bounded radial functions. First we will see that a Toeplitz operator with a radial symbol may only commute with another such operator whose symbol is of s the form ξ p ξ ϕ in certain trivial cases. Then, we show that two Toeplitz operators s with symbols ξ p ϕ and ξ ψ commute only in the trivial case, i.e., if one of them is the constant operator. Finally, we will prove that the symbol ξ k ϕ must be a monomial if Tξk ϕ commutes with a Toeplitz operator whose symbol is a nonconstant bounded holomorphic function.
2. The Mellin transform and Mellin convolution One of the most useful tools in the following calculations will be the Mellin transform. The Mellin transform ϕˆ of a function ϕ ∈ L1 ([0, 1], r dr) is defined by the
140
Zhou and Dong
IEOT
equation: Z ϕ(z) ˆ =
1
ϕ(s)sz−1 ds.
0
It is known that ϕˆ is a bounded analytic function in the half plane {z : Re(z) > 2}. The use of the Mellin transform in the study of Toeplitz operators was introduced for the first time in [7]. It is important and helpful to know that the Mellin transform is uniquely determined by its value on an arithmetic sequence of integers. In fact we have the following classical theorem (see [13, p. 102]). Theorem 2.1. Suppose that f is a bounded analytic function on {z : Re(z) > 0} which vanishes at the pairwise distinct points z1 , z2 , · · · , where i) P inf{|zn |} > 0 and 1 ii) n≥1 Re( zn ) = ∞. Then f vanishes identically on {z : Re(z) > 0}. Remark 2.2. We shall often use this theorem to show that if ϕ ∈ L1 ([0, 1], r dr) and if there exists a sequence (nk )k≥0 ⊂ N such that X 1 ϕ(n b k ) = 0 and = ∞, nk k≥0
then ϕ(z) b = 0 for all z ∈ {z : Re(z) > 2} and so ϕ = 0. When considering the product of two Toeplitz operators we need a known fact about the Mellin convolution of their symbols. If f and g are defined on [0, 1), then their Mellin convolution is defied by Z 1 dt r (f ∗M g)(r) = g(t) , 0 ≤ r < 1. f t t r The Mellin convolution theorem states that f\ ∗M g(s) = fb(s)b g (s),
(2.1)
and that, if f and g are in L1 ([0, 1], r dr) then so is f ∗M g.
3. Products of Toeplitz operators with radial symbols For any multi-index α = (α1 , · · · , αn ), where each αi is a nonnegative integer, we write |α| = α1 + · · · + αn and α! = α1 ! · · · αn !. We will also write z α = z1α1 · · · znαn for z = (z1 , · · · , zn ) ∈ Bn .
Vol. 64 (2009)
Toeplitz operators with radial symbols
141
For two multi-indexes α = (α1 , · · · , αn ) and β = (β1 , · · · , βn ), the notation α β means that αi ≥ βi ,
i = 1, · · · , n,
and α⊥β means that α1 β1 + · · · + αn βn = 0. We also define α − β = (α1 − β1 , · · · , αn − βn ). Moreover, if α β then we obtain |α − β| = |α| − |β|. Recall that a function ϕ on Bn is radial if ϕ(z) depends only on |z|. It is known that ϕ is radial if and only if ϕ(U z) = ϕ(z) for any unitary transform U of Cn . Then for each radial function ϕ, we define the function ϕ e on [0, 1) by ϕ(r) e = ϕ(re) where e is a unit vector in Cn . It is obvious that ϕ e is well-defined. In the following, we shall often identify an integrable radial function ϕ on the unit ball with the corresponding function ϕ e defined on the interval [0, 1). First, we will give some basic results concerning Toeplitz operators with radial symbols on the Bergman space of the unit ball. Let ϕ ∈ L1 (Bn , dv) be a radial T-function, then for any multi-index α, it follows from formula (4.1) of [8] that Tϕ (z α ) = (2n + 2|α|)ϕ(2n ˆ + 2|α|)z α .
(3.1)
Thus, the Toeplitz operator with a radial symbol on the Bergman space of the unit ball acts in a very simple way. In fact, we have the following very simple but essential theorem. Theorem 3.1. Let ϕ ∈ L1 (Bn , dv). Then the following assertions are equivalent: (a) For each multi-index α there exists λ|α| ∈ C which depends only on |α| such that Tϕ (z α ) = λ|α| z α . (b) ϕ is a radial function. Proof. The implication (b) ⇒ (a) is obvious by equation (3.1). Next, we prove the converse implication (a) ⇒ (b). Assume Tϕ (z α ) = λ|α| z α , then for any unitary transformation U of Cn with U −1 = (a1 , · · · , an )T = (aij )1≤i,j≤n ,
142
Zhou and Dong
IEOT
we have Tϕ (U −1 z)α = Tϕ [(a11 z1 + · · · + a1n zn )α1 · · · (an1 z1 + · · · + ann zn )αn ] X 1 1 α1 ! = Tϕ (a11 z1 )m1 · · · (a1n zn )mn × · · · 1 m ! |m1 |=α1 X αn ! mn mn 1 · · · (a n (a z ) z ) × n1 1 nn n mn ! n |m |=αn
=
X |m1 |=α1
= λ|α|
X
···
|mn |=αn
X
···
|m1 |=α1
1 n 1 n α1 ! αn ! · · · n (a1 )m · · · (an )m Tϕ (z m · · · z m ) m1 ! m !
X |mn |=αn
1 n 1 n αn ! α1 ! · · · n (a1 )m · · · (an )m (z m · · · z m ) 1 m ! m !
= λ|α| (a11 z1 + · · · + a1n zn )α1 · · · (an1 z1 + · · · + ann zn )αn = λ|α| (U −1 z)α , where m1 , · · · , mn are multi-indexes. It follows that Z ϕ(U u)uα α Tϕ◦U (z )(w) = dv(u) n+1 Bn (1 − hw, ui) Z ϕ(u)(U −1 u)α dv(u) = −1 ui)n+1 Bn (1 − hw, U Z ϕ(u)(U −1 u)α = dv(u) n+1 Bn (1 − hU w, ui) = Tϕ (U −1 z)α (U w) = λ|α| (U −1 z)α (U w) = λ|α| wα = Tϕ (z α )(w), which implies Tϕ◦U = Tϕ . Thus ϕ ◦ U = ϕ and ϕ is a radial function.
Corollary 3.2. Let ϕ1 and ϕ2 be two radial T-functions on Bn . If Tϕ1 Tϕ2 = Tψ , then ψ is a radial T-function. Proof. Using equation (3.1) to calculate Tϕ1 Tϕ2 (z α ), we can get Tϕ1 Tϕ2 (z α ) = (2n + 2|α|)2 ϕ c1 (2n + 2|α|)c ϕ2 (2n + 2|α|)z α .
(3.2)
It follows from Theorem 3.1 that ψ is a radial function. Moreover, Tψ is clearly a bounded operator. The question of when the product of two Toeplitz operators is equal to a Toeplitz operator is more complicated and still open. Grudsky, Karapetyants and Vasilevski [8] gave a particular answer to this question considering the Toeplitz operators with radial symbols. Let ϕ1 and ϕ2 be two radial T-functions on Bn , and let further √ √ A1 (t) = ϕ1 ( e−t )e−nt , A2 (t) = ϕ2 ( e−t )e−nt .
Vol. 64 (2009)
Toeplitz operators with radial symbols
143
The formal construction (inverse Fourier-Laplace transform) Z 1 (F −1 A)(z) = √ A(t)eizt dt, z ∈ Π ∪ R, 2π R defines a holomorphic function in the upper half-plane Π (⊂ C) which coincides on the real axis with the inverse Fourier transform (F −1 A)(ζ) of the function A(t). Theorem 3.7 of [8] shows that if the function √ 2π(n − iζ)(F −1 A1 )(ζ)(F −1 A2 )(ζ), ζ ∈ R, belongs to Wiener ring W0 of the inverse Fourier transforms of sumable functions, then there exists a Toeplitz operator with the radial symbol ψ such that Tϕ1 Tϕ2 = Tψ . The following theorem will give another condition for the product of two Toeplitz operators with radial symbols to be a Toeplitz operator. Theorem 3.3. Let ϕ1 and ϕ2 be two radial T-functions on Bn . Then Tϕ1 Tϕ2 is equal to the Toeplitz operator Tψ if and only if ψ is a solution of the equation I ∗M ψ = ϕ1 ∗M ϕ2 ,
(3.3)
where I denotes the constant function with value one. Proof. For each multi-index α, it follows from (3.1) and (3.2) that Tϕ1 Tϕ2 (z α ) = Tψ (z α ) if and only if 1 b ψ(2n + 2|α|) = ϕ1\ ∗M ϕ2 (2n + 2|α|). 2n + 2|α| A direct calculation gives bI(2n + 2|α|) = χ[ [0,1] (2n + 2|α|) =
(3.4)
1 , 2n + 2|α|
by (2.1) we have 1 b b ψ(2n + 2|α|) = bI(2n + 2|α|)ψ(2n + 2|α|) = I\ ∗M ψ(2n + 2|α|). 2n + 2|α| So (3.4) is equivalent to I\ ∗M ψ(2n + 2|α|) = ϕ1\ ∗M ϕ2 (2n + 2|α|). By Remark 2.2, (3.5) is equivalent to (3.3).
(3.5)
Remark 3.4. Since the Mellin transform is closely related, using the change of variables s = e−t , to the inverse Fourier-Laplace transform, the arguments of the both theorems are equivalent. About some products of Toeplitz operators, we have the following fun calculation.
144
Zhou and Dong
IEOT
Corollary 3.5. Let l and m be two real numbers greater than or equal to −1. Then l m m if l 6= m l−m T|z|l − l−m T|z| T|z|l T|z|m = T|z|l (1+l ln |z|) if l = m. Proof. By Theorem 3.3, T|z|l T|z|m is equal to the Toeplitz operator Tψ if and only if ψ is a solution of the equation Z 1 Z 1 −1 ψ(t)t dt = rl tm−l−1 dt, r
r
from which we can get ψ(r) =
l l l−m |r| l
m − l−m |r|m |r| (1 + l ln |r|)
if l 6= m if l = m.
Then the desired result is obvious.
˘ ckovi´c solved the zero-product problem for two Toeplitz In [1] Ahern and Cu˘ operators with harmonic symbols. On the Bergman space of the unit ball, Choe and Koo [5] gave a similar result with an assumption about the continuity of the symbols on an open subset of the boundary, and solved the zero-product problem for several Toeplitz operators with harmonic symbols that have Lipschitz continuous extensions to the whole boundary. This problem for Toeplizt operators with arbitrary symbols still remains open, even for two Toeplitz operators. Next, we will study the zero-product problem for several Toeplitz operators with radial symbols acting on the Bergman space of the unit ball. Theorem 3.6. Let ϕ1 , · · · , ϕN be radial T-functions on Bn . If Tϕ1 · · · TϕN = 0, then ϕi = 0 for some i. Proof. Suppose Tϕ1 · · · TϕN = 0, then for any multi-index α, using equation (3.1), we can easily see that ϕ c1 (2n + 2|α|) · · · ϕc N (2n + 2|α|) = 0. Let Ei = {|α| ∈ N : ϕbi (2n + 2|α|) = 0} . Notice that E1 ∪ · · · ∪ EN = N, hence there exists some i such that X 1 = ∞, |α| |α|∈Ei
then by Remark 2.2 ϕi = 0.
The following corollary states that the only idempotent Toeplitz operators with radial symbols are 0 and I. Corollary 3.7. Let ϕ be a radial T-function on Bn . Then Tϕ2 = Tϕ if and only if either ϕ = 0 or ϕ = 1.
Vol. 64 (2009)
Toeplitz operators with radial symbols
145
Proof. If Tϕ2 = Tϕ , then Tϕ Tϕ−1 = 0, and by Theorem 3.6, ϕ = 0 or ϕ = 1. The converse implication is clear.
4. Commuting Toeplitz operators with quasihomogeneous symbols In this section, we characterize commuting Toeplitz operators with bounded quasihomogeneous symbols on the Bergman space of the unit ball. The definition of the quasihomogeneous function on the unit disk has been given in many papers (see [9] or [17]), and we will give a similar definition on the unit ball. Definition 4.1. Let k ∈ Zn and let f be a function in L1 (Bn , dv). Then we say that f is a quasihomogeneous function of quasihomogeneous degree k if f is of the form ξ k ϕ where ϕ is a radial function, i.e., f (rξ) = ξ k ϕ(r) for any ξ in the unit sphere Sn and r ∈ [0, 1). Remark 4.2. It is obvious that any k ∈ Zn , can be uniquely written as p − s, where p and s are two multi-indexes such that p ⊥ s. Thus in this paper, we always define the function s ξ k = ξ p ξ , ξ ∈ Sn , for any k ∈ Zn . A direct calculation gives the following lemma which we shall use often. Lemma 4.3. Let p, s be two multi-indexes and let ϕ be a bounded radial function on Bn . Then, for any multi-index α, Tξp ϕ (z α ) = 2(n + |α| + |p|)ϕ(2n b + 2|α| + |p|)z α+p ; 0 if α 6 s, 2α!(n + |α| − |s|)! Tξs ϕ (z α ) = α−s ϕ(2n b + 2|α| − |s|)z if α s; (α − s)!(n − 1 + |α|)! Tξp ξs ϕ (z α ) 0 if α + p 6 s, 2(α + p)!(n + |α| + |p| − |s|)! = α+p−s ϕ(2n b + 2|α| + |p| − |s|)z if α + p s. (α + p − s)!(n − 1 + |α| + |p|)! Proof. Here we only give the proof of the third equation. For all multi-indexes α and β, Z s α β s hTξp ξ ϕ (z ), z i = ϕ(z)ξ p ξ z α z β dv(z) Bn
Z = 2n ( =
0
1
r2n−1 dr
Z
ϕ(r)r|α|+|β| ξ p+α ξ
s+β
dσ(ξ)
Sn
0 if α + p 6 s, R p+α s+β 2nϕ(2n b + |α| + |β|) Sn ξ ξ dσ(ξ) if α + p s.
146
Zhou and Dong
IEOT
If α + p s, then by the well-known equations (see Proposition 1.4.9 of [14]) Z 0 if β 6= α + p − s, s+β (n − 1)!(α + p)! ξ p+α ξ dσ(ξ) = if β = α + p − s Sn (n − 1 + |α| + |p|)! and hz α+p−s , z β i =
0 n!(α + p − s)! (n + |α| + |p| − |s|)!
if β 6= α + p − s, if β = α + p − s,
we obtain hTξp ξs ϕ (z α ), z β i =
2(α + p)!(n + |α| + |p| − |s|)!ϕ(2n b + 2|α| + |p| − |s|) α+p−s β hz , z i. (α + p − s)!(n − 1 + |α| + |p|)!
Note that hTξp ξs ϕ (z α ), z β i = 0 if α + p 6 s, then we can get Tξp ξs ϕ (z α ) 0 2(α + p)!(n + |α| + |p| − |s|)! = ϕ(2n b + 2|α| + |p| − |s|)z α+p−s (α + p − s)!(n − 1 + |α| + |p|)!
if α + p 6 s, if α + p s.
This completes the proof.
We are now ready to discuss the commuting problem of Toeplitz operators with quasihomogeneous symbols. Theorem 4.4. Let p, s be two multi-indexes and let ψ and φ be two bounded radial functions on Bn . If ψ is nonconstant, then Tψ Tξ p ξ s φ = Tξ p ξ s φ Tψ if and only if either |p| = |s| or φ = 0. Proof. If Tξp ξs φ and Tψ commute, then for any multi-index α such that α + p s, it follows from (3.1) and Lemma 4.3 that b b (2n + 2|α| + 2|p| − 2|s|)ψ(2n + 2|α| + 2|p| − 2|s|)φ(2n + 2|α| + |p| − |s|) b b = (2n + 2|α|)ψ(2n + 2|α|)φ(2n + 2|α| + |p| − |s|).
(4.1)
Assume |p| = 6 |s|, without loss of generality, we can also assume that |p| > |s|, for otherwise we could take the adjoins. Let n o b E = |α| ∈ N : φ(2n + 2|α| + |p| − |s|) = 0 , P 1 then we will show that |α| = ∞, which implies φ = 0 by Remark 2.2. |α|∈E
Vol. 64 (2009)
Suppose
Toeplitz operators with radial symbols
P |α|∈E
1 |α|
147
< ∞, then we will derive a contradiction. Let
E 0 = E c ∩ |α| ∈ N : α ∈ Zn+ , α + p s , where E c is the complement of E in N, then X 1 = ∞. |α| 0 |α|∈E
On the other hand, for any |α| ∈ E 0 , (4.1) gives b b (2n + 2|α| + 2|p| − 2|s|)ψ(2n + 2|α| + 2|p| − 2|s|) = (2n + 2|α|)ψ(2n + 2|α|). (4.2) Denote b + 2n + 2|p| − 2|s|) − F (z) = ψ(z
z + 2n b + 2n), ψ(z z + 2n + 2|p| − 2|s|
then F is analytic and bounded on {z : Re(z) > 0} since ψ is bounded. Moreover, (4.2) implies that F (2|α|) = 0, ∀|α| ∈ E 0 . According to Theorem 2.1, F must be zero, thus b +2n+2|p|−2|s|) = (z +2n)ψ(z b +2n), z ∈ {z : Re(z) > 0} . (z +2n+2|p|−2|s|)ψ(z For any integer n0 greater than 2n, the above equation gives that b 0 + 2m(|p| − |s|)) = n0 ψ(n b 0 ), ∀m ∈ N. (n0 + 2m(|p| − |s|))ψ(n b 0 ), we obtain If we denote by C the constant n0 ψ(n b 0 + 2m(|p| − |s|)) = ψ(n
C = C bI(n0 + 2m(|p| − |s|)) n0 + 2m(|p| − |s|)
for any m ∈ N, by Remark 2.2 again, and then clearly ψ is constant, which is a contradiction. Thus we conclude that either |p| = |s| or φ = 0. Conversely, if |p| = |s| or φ = 0, then we can easily show that the equation (4.1) holds, and consequently Tξp ξs φ Tψ (z α ) = Tψ Tξp ξs φ (z α ) for each multi-index α, which implies Tξp ξs φ and Tψ commute.
It was shown in [7], that a Toeplitz operator with a radial symbol on the Bergman space of the unit disk D may only commute with another such operator with a radial symbol, but it is not true in the higher dimension by the theorem above. It is known that every function f ∈ L2 (D, dA) has the decomposition f (reikθ ) =
+∞ X k=−∞
eikθ fk (r),
(4.3)
148
Zhou and Dong
IEOT
where fk (r) are square integrable in [0, 1] with respect to the measure r dr. More details can be found in [7]. Similarly, let Z 1 2n−1 2 r |ϕ(r)| dr < ∞ . < = ϕ : Bn → C radial 0
k
n
Denote
0
Sn
It is also clear that
but we still might study a P function being of that form. In the one-dimensional case, the function f (rξ) = ξ k fk (r) is exactly the same as (4.3). Moreover, if k∈Zn
f (rξ) =
X
ξ k fk (r) ∈ L∞ (Bn , dv),
k∈Zn n
then for each k ∈ Z , |fk (r)| =
Z k ≤ sup |f (z)|, f (rξ)ξ dσ(ξ) z∈B k 2 ||ξ || Sn n 1
and so the functions fk are bounded on Bn . Lemma 4.5. Let p be a multi-index and let φ be a bounded radial function on Bn . If X f (rξ) = ξ k fk (r) ∈ L∞ (Bn , dv), k∈Zn
then Tf Tξp φ = Tξp φ Tf ⇐⇒ Tξk fk Tξp φ = Tξp φ Tξk fk , ∀k ∈ Zn . P k Proof. Suppose f (rξ) = ξ fk (r) ∈ L∞ (Bn , dv), then for any multi-index α, a k∈Zn
direct calculation by Lemma 4.3 gives that X Tf Tξp φ (z α ) =
T ξ k fk T ξ p φ z α
k+α+p0
and Tξp φ Tf (z α ) =
X
T ξ p φ T ξ k fk z α .
k+α0
If Tf and T
commute, the identity of the above two series implies that 0 if k + α + p 0 and k + α 6 0 α p Tξk fk Tξ φ (z ) = Tξp φ Tξk fk (z α ) if k + α 0. ξp φ
Vol. 64 (2009)
Toeplitz operators with radial symbols
149
Recall that Tξp φ Tξk fk (z α ) is equal to zero if k + α 6 0, then for each multi-index α and for all k ∈ Zn , Tξk fk Tξp φ (z α ) = Tξp φ Tξk fk (z α ). Thus Tξk fk Tξp φ = Tξp φ Tξk fk , ∀k ∈ Zn . The converse implication is clear.
Corollary 4.6. Let ϕ be a nonconstant bounded radial function on Bn . If X f (rξ) = ξ k fk (r) ∈ L∞ (Bn , dv), k∈Zn
then Tϕ Tf = Tf Tϕ if and only if f (eiθ z) = f (z) for almost all θ ∈ R and z ∈ Bn . Proof. It follows from Lemma 4.5 that Tϕ commutes with Tf if and only if Tϕ Tξk fk = Tξk fk Tϕ for all k ∈ Zn . Suppose k = p − s, where p and s be two multi-indexes such that p ⊥ s, then by Theorem 4.4, the above equation is equivalent to |p| = |s| or fk = 0.
(4.4)
Obviously, (4.4) is equivalent to (ξ k fk )(eiθ z) = (ξ k fk )(z), ∀θ ∈ R and z ∈ Bn . Therefore Tϕ commutes with Tf if and only if f (eiθ z) = f (z) for almost all θ ∈ R and z ∈ Bn . Remark 4.7. In the one-dimensional case, the function such that f (eiθ z) = f (z) is exactly a radial function, so this corollary coincides with Theorem 6 of [7]. There are lots of examples of functions with the form of ξ p φ, which are the symbols of commuting Toeplitz operators (see [7]), but the following theorem will show that two Toeplitz operators with quasihomogeneous symbols of degrees p and −s respectively commute only in a trivial case. Theorem 4.8. Suppose p and s be two nonzero multi-indexes, and let ψ and φ be two bounded radial functions on Bn . If Tξ p φ Tξ s ψ = Tξ s ψ Tξ p φ then, φ = 0 or ψ = 0. Proof. For any multi-index α, it follows from Lemma 4.3 that, if α s, then Tξp φ Tξs ψ (z α ) =
4α!(n + |α| − |s|)!(n + |α| + |p| − |s|) (α − s)!(n − 1 + |α|)! b b × φ(2n + 2|α| + |p| − 2|s|)ψ(2n + 2|α| − |s|)z α+p−s ,
and if α 6 s, then Tξp φ Tξs ψ (z α ) = 0.
150
Zhou and Dong
IEOT
Similarly, if α + p s, then Tξs ψ Tξp φ (z α ) =
4(α + p)!(n + |α| + |p| − |s|)!(n + |α| + |p|) (α + p − s)!(n − 1 + |α| + |p|)! b b × φ(2n + 2|α| + |p|)ψ(2n + 2|α| + 2|p| − |s|)z α+p−s ,
and if α + p 6 s, then Tξs ψ Tξp φ (z α ) = 0. For two nonzero multi-indexes p and s, to prove this theorem we need to consider two cases. Case 1. Suppose pi0 6= 0 and si0 6= 0 for some i0 ∈ {1, · · · , n}. If Tξp φ and Tξs ψ commute, then b b (a) φ(2n + 2|α| + |p|)ψ(2n + 2|α| + 2|p| − |s|) = 0 if α + p s and α 6 s; b b (b) φ(2n + 2|α| + |p|)ψ(2n + 2|α| + 2|p| − |s|) b b = Cα φ(2n + 2|α| + |p| − 2|s|)ψ(2n + 2|α| − |s|) if α s, α!(α + p − s)!(n + |α| − |s|)!(n − 1 + |α| + |p|)! . (α + p)!(α − s)!(n − 1 + |α|)!(n + |α| + |p| − |s| − 1)!(n + |α| + |p|) 0 0 Suppose multi-index α = (s1 , · · · , si0 −1 , si0 −1, si0 +1 , · · · , sn ), then αi0 < si0 0 0 and α + p s since pi0 6= 0 and si0 6= 0. Denote a0 = |α |, then it follows from (a) that b b φ(2n + 2a0 + |p|)ψ(2n + 2a0 + 2|p| − |s|) = 0. b If φ(2n + 2a0 + |p|) = 0, we will let a1 = a0 + |s|, otherwise, let a1 = a0 + |p|, then a direct calculation from (b) shows that
where Cα =
b b φ(2n + 2a1 + |p|)ψ(2n + 2a1 + 2|p| − |s|) = 0. So we can find a sequence {am }m∈N , which is defined by am+1 = am + |s| or am + |p|, such that b b φ(2n + 2am + |p|)ψ(2n + 2am + 2|p| − |s|) = 0. n o P 1 b It is clear that m ∈ N : φ(2n + 2am + |p|) = 0 and am = ∞. Let E1 = m∈N n o b E2 = m ∈ N : ψ(2n + 2am + 2|p| − |s|) = 0 . Since X 1 X 1 X 1 ≤ + , am am am m∈E1 m∈E2 m∈N P P 1 we know that at least one of the series am and m∈E1
m∈E2
1 am
diverges, then it
follows from Remark 2.2 that φ = 0 or ψ = 0. Case 2. Suppose either pi = 0 or si = 0 for all i ∈ {1, · · · , n}. Without loss of generality, we can also assume |s| ≥ |p| > 0. Obviously, for any multi-index α s, the fact either pi = 0 or si = 0 for all i ∈ {1, · · · , n} implies α!(α + p − s)! = (α + p)!(α − s)!.
Vol. 64 (2009)
Toeplitz operators with radial symbols
151
Thus if Tξp φ and Tξs ψ commute, it follows from (b) that b b (n + |α| + |p| − |s|)ψ(2n + 2|α| − |s|)φ(2n + 2|α| + |p| − 2|s|) (n + |α| − |s| + 1) · · · (n + |α| − |s| + |s| − 1) b b (n + |α| + |p|)ψ(2n + 2|α| + 2|p| − |s|)φ(2n + 2|α| + |p|) = . (n + |α| + |p| − |s| + 1) · · · (n + |α| + |p| − |s| + |s| − 1) As in the proof of Theorem 4.3, the above equation implies that b ψ(2z + |s|) b (z + |p|)φ(2z + |p|) (z + 1) · · · (z + |s| − 1) b ψ(2z + 2|p| + |s|) b (z + |p| + |s|)φ(2z + |p| + 2|s|) = (z + |p| + 1) · · · (z + |p| + |s| − 1) for z ∈ {z : Re(z) > 0}. Let
f (z) =
b ψ(2z + |s|) b and g(z) = (z + |p|)φ(2z + |p|), (z + 1) · · · (z + |s| − 1)
thus the above equation can be written as f (z)g(z) = f (z + |p|)g(z + |s|).
(4.5)
Next, denote H(z) = f (z)f (z + 1) · · · f (z + |p| − 1)g(z)g(z + 1) · · · g(z + |s| − 1). Obviously, H(z) is analytic on {z : Re(z) > 0}. It follows from equation (4.5) and |s| ≥ |p| > 0 that H(z) = f (z + |p|)g(z + |s|) · · · f (z + |p| − 1 + |p|)g(z + |p| − 1 + |s|) × g(z + |p|) · · · g(z + |s| − 1) = f (z + |p|)f (z + |p| + 1) · · · f (z + 2|p| − 1) × g(z + |p|)g(z + |p| + 1) · · · g(z + |p| + |s| − 1) = H(z + |p|), which implies H(z) is periodic function with period |p| on {z : Re(z) > 0}. Thus, the function H(z) can be extended to whole plane C, so we can think of the function H(z) as an entire function. By the definition of the Mellin transform, we
152
Zhou and Dong
IEOT
can get |H(z)| = |f (z)f (z + 1) · · · f (z + |p| − 1)g(z)g(z + 1) · · · g(z + |s| − 1)| Z 1 |s| t2z+|s|−1 dt × · · · ≤ kψk|p| kφk |(z + |p|) · · · (z + |p| + |s| − 1)| ∞ ∞ 1
1
0 1
t2z+2(|s|−1)+|p|−1 dt 0 0 0 1 1 × ··· (z + 1) · · · (z + |s| − 1) (z + |p|) · · · (z + |p| + |s| − 1) Z
×
t2z+2(|p|−1)+|s|−1 dt
Z
t2z+|p|−1 dt · · ·
Z
= O(|z|−|p||s| ). Noting that −|p||s| < 0, we obtain H(z) = 0, which implies φ = 0 or ψ = 0.
˘ ckovi´c [6] showed that if Tzn and Tψ commute, then ψ is an analytic Cu˘ ˘ ckovi´c and Rao [3] extended Cu˘ ˘ ckovi´c’s result function on the unit disk. Axler, Cu˘ by replacing the disk with an arbitrary bounded domain and more importantly by replacing z n with an arbitrary bounded analytic function, then they asked a question what is the situation on Bergman spaces in higher dimensions. The following result will give an answer in a special situation on the unit ball. Theorem 4.9. Let f be a nonconstant bounded holomorphic function and g be a nonzero bounded quasihomogeneous function respectively. If Tf and Tg commute, then g is a monomial. P Proof. Suppose f = fβ z β is a power series representation of f and g = ξ k ϕ. If β0
Tf and Tg commute, then for any multi-index β, it is easy to see that fβ Tzβ Tξk ϕ = fβ Tξk ϕ Tzβ . Recall that f is nonconstant and therefore fγ 6= 0 for some γ with |γ| ≥ 1. Then it yields T z γ T ξ k ϕ = Tξ k ϕ T z γ . Suppose k = p−s, where p and s be two multi-indexes such that p ⊥ s. The equality Tzγ Tξp ξs ϕ (z α ) = Tξp ξs ϕ Tzγ (z α ) for each multi-index α together with Lemma 4.3 gives (a) ϕ(2n b + 2|α| + 2|γ| + |p| − |s|) = 0, if α + γ s and α 6 s; (b) ϕ(2n b + 2|α| + 2|γ| + |p| − |s|) = Cα ϕ(2n b + 2|α| + |p| − |s|), if α s, (α + p)!(α + γ + p − s)!(n + |α| + |p| − |s|)!(n − 1 + |α| + |γ| + |p|)! . (α + γ + p)!(α + p − s)!(n + |α| + |γ| + |p| − |s|)!(n − 1 + |α| + |p|)! First, we claim that s = 0. Otherwise, for two nonzero multi-indexes s and γ, we can consider two cases: si0 γi0 6= 0 for some i0 and si γi = 0 for all i ∈ {1, · · · , n}.
where Cα =
Vol. 64 (2009)
Toeplitz operators with radial symbols
153
Analogously to the proof of Theorem 4.8, we can prove that ϕ = 0 in both cases, which is a contradiction. Then, it follows from (b) that (2n + 2|α| + 2|p|)ϕ(2n b + 2|α| + |p|) = (2n + 2|α| + 2|γ| + 2|p|)ϕ(2n b + 2|α| + 2|γ| + |p|), which implies that (z + 2n + |p|)ϕ(z b + 2n) = (z + 2n + |p| + 2|γ|)ϕ(z b + 2n + 2|γ|) for z ∈ {z : Re(z) > 0}. Using the similar argument as in the proof of Theorem 4.4, we can conclude that (z + 2n + |p|)ϕ(z b + 2n) = c for some constant c. Then the uniqueness of the Mellin transform implies that ϕ(r) = cr|p| , and consequently g = cz p . P k Corollary 4.10. Let p be a nonzero multi-index and let f (rξ) = ξ fk (r) ∈ L∞ (Bn , dv). If Tf and Tzp commute, then f is holomorphic.
k∈Zn
Proof. If Tf and Tzp commute, it follows from Lemma 4.5 that T ξ k fk T z p = T z p T ξ k fk for each k ∈ Zn . Hence the desired result is obvious by Theorem 4.9.
Remark 4.11. In the one-dimensional case, every bounded function can be written ˘ ckovi´c [6] mentioned above. as (4.3), so this corollary recover the result of Cu˘ Acknowledgment The authors would like to thank the referee for his (or her) excellent suggestions.
References ˇ Cu˘ ˘ ckovi´c, A theorem of Brown-Halmos type for Bergman space [1] P. Ahern and Z. Toeplitz operators, J. Funct. Anal. 187 (2001), 200–210. ˇ Cu˘ ˘ ckovi´c, Commuting Toeplitz operators with harmonic symbols, [2] S. Axler and Z. Integral Equations Operator Theory. 14 (1991), 1–12. ˘ Cu˘ ˘ ckovi´c and N.V. Rao, Commutants of analytic Toeplitz operators on [3] S. Axler, Z. the Bergman space, Proc. Amer. Math. Soc. 128 (1999), 1951–1953. [4] A. Brown and P.R. Halmos, Algebraic properties of Toeplitz operators, J. Reine Angew. Math. 213 (1963), 89–102. [5] B. Choe, H. Koo, Zero products of Toeplitz operators with harmonic symbols, J. Funct. Anal. 233 (2006), 307–334. ˘ Cu˘ ˘ ckovi´c, Commutants of Toeplitz operators on the Bergman space, Pacific J. [6] Z. Math. 162 (1994), 277–285. ˘ Cu˘ ˘ ckovi´c and N.V. Rao, Mellin transform, monomial symbols, and commuting [7] Z. Toeplitz operators, J. Funct. Anal. 154(1) (1998), 195–214.
154
Zhou and Dong
IEOT
[8] S. Grudsky, A. Karapetyants and N. Vasilevski, Toeplitz operators on the unit ball in Cn with radial symbols, Journal of Operator Theory. 49 (2003), 325–346. [9] I. Louhichi, E. Strouse and L. Zakariasy, Products of Toeplitz operators on the Bergman space, Integral Equations Operator Theory. 54 (2006), 525–539. [10] I. Louhichi and L. Zakariasy, On Toeplitz operators with quasihomogeneous symbols, Arch. Math. 85 (2005), 248–257. [11] R. Quiroga-Barranco and N. Vasilevski, Commutative C ∗ -algebras of Toeplitz operators on the unit ball, I. Bargman-type transforms and spectral representations of Toeplitz operators, Integral Equations Operator Theory. 59 (2007), 379–419. [12] R. Quiroga-Barranco and N. Vasilevski, Commutative C ∗ -algebras of Toeplitz operators on the unit ball, II. Geometry of the level sets of symbols, Integral Equations Operator Theory. 60 (2008), 89–132. [13] R. Remmert, Classical Topics in Complex Function Theory. Graduate Texts in Methematics, Springer, New York, 1998. [14] W. Rudin, Function Theory in the Unit Ball of Cn . Springer-Verlag, BerlinHeidelberg-New York, 1980. [15] N. Vasilevski, Toeplitz operator on the Bergman spaces: Inside-the-Dommain Effects, Contemp. Math. 289 (2001), 79–146. [16] N. Vasilevski, Bergman space structure, commutative algebras of Toeplitz operators and hyperbolic geometry, Integral Equations Operator Theory. 46 (2003), 235–251. [17] L. Zakariasy, The rank of Hankel operators on harmonic Bergman spaces, Proc. Amer. Math. Soc. 131(4) (2003), 1177–1180. [18] D. Zheng, Commuting Toeplitz operators with pluriharmonic symbols, Trans. Amer. Math. Soc. 350 (1998), 1595–1618. Ze-Hua Zhou and Xing-Tang Dong Department of Mathematics Tianjin University Tianjin 300072 P.R. China e-mail:
[email protected] [email protected] Submitted: July 19, 2008. Received: February 4, 2009.
Integr. equ. oper. theory 64 (2009), 155–175 c 2009 Birkh¨
auser Verlag Basel/Switzerland 0378-620X/020155-21, published online May 12, 2009 DOI 10.1007/s00020-009-1683-0
Integral Equations and Operator Theory
Projection-Iterative Methods for a Class of Difference Equations Petru A. Cojuhari and Michal A. Nowak Abstract. We develop a theoretical framework for projection-iterative methods to solve operator equations of the form Au + Bu = f, where A is a Toeplitz operator in a Banach space lp (N) (1 ≤ p < ∞), B is considered as a perturbation (of general form) of A, and f is a given element in this space. The methods are adopted for application to general situations, in particular, to the equations in which A need not be a Fredholm operator. The idea to involve iteration procedures and the technique which we apply allow to obtain conditions on perturbations for convergence and effective error estimates in terms of some weighted spaces (without any restrictions on the norms for perturbations). Based on established evaluations we derive further information about decaying properties of the solutions. The obtained results are illustrated by considering concrete classes of equations as, for instance, equations corresponding to Jacobi type operators. Mathematics Subject Classification (2000). Primary 65J10; Secondary 65Q05. Keywords. Projection methods, iterative methods, Toeplitz operators, difference equations.
1. Introduction Let lp (N) (1 ≤ p < ∞) P stand for the usual Banach space of complex-valued ∞ sequences (xn ) such that n=1 |xn |p < ∞, and let A denote a Toeplitz operator defined on lp (N) by the matrix ∞ A = aj−k j,k=1 , where aj ∈ C (j = 0, ±1, . . . ). For the sake of simplicity we assume that ∞ X j=−∞
|aj | < ∞ .
156
Cojuhari and Nowak
IEOT
The function defined on the complex unit circle T by A(z) =
∞ X
an z n
(z ∈ T)
n=−∞
is referred to as the symbol of the operator ∞ A. We take another operator B = bjk j,k=1 bounded on lp (N) and consider the following equation Au + Bu = f , (1.1) where f is a given element in lp (N). Equations of the form (1.1) occur in a wide variety of concrete applications and they were objects of study for many authors. In particular, various approximation methods have been developed for these equations. Among them the projection methods are distinguished eloquently; cf. [2], [29], [11], [3], [16], [23], [28] (see also the references cited therein). Generally, solving an equation (1.1) by a projection method means to give two sequences (Pn ) and (Qn ) of projections on lp (N) converging strongly to the identity operator, and pass to the approximate equation Qn (A + B)Pn un = Qn f
(un ∈ Pn (lp (N))) .
(1.2)
If for each f ∈ lp (N) the equation (1.2) has a unique solution un ∈ Pn (lp (N)) for sufficiently large n, and if the sequence of the approximate solutions (un ) converges in lp (N) to a solution u of the initial equation, then one says that the projection method is convergent in lp (N). Note that the problem of the convergence of a projection method for difference equations of the form (1.1) is in general a delicate question. The analysis of convergence of projection methods is referred mostly to the case when A is a Fredholm operator (the elliptic case) while the perturbation B is a compact operator or of small norm (cf. [11], [3], [23]). However, in case that the operator A is not Fredholm, that means that its symbol A(z) vanishes on some points of the unit circle, the projection method in general is not convergent (even for B = 0). For the first this fact was observed by Gohberg and Levcenko in [12], [13], [14], [20], [21]. It turns out that the projection method (with Pn = Qn being the canonical projections) applied in a space lp (N) (1 ≤ p < ∞) to the equation Au = f (i.e. when B = 0) is always divergent and it is convergent in the space c0 of all sequences convergent to zero if and only if the zeros of the symbol A(z) lying on the unit circle are simple. The investigations on this topic were then continued and extended to other classes of convolution equations by I. Gohberg and S. Pr¨ ossdorf in [15], S. Pr¨ ossdorf [24], S. Pr¨ossdorf and B. Silbermann [25], [26], etc. An account of this research area has been reviewed in [23] and [27] (see also the references cited therein). In this paper we propose another approach to solve operator equations of the form (1.1). The basic idea is to combine projection and iterative procedures with a view to obtain an approximation method suitable for applications to (1.1) in nonelliptic cases. As far as we know iteration processes were not involved practically for the equations under discussion. The technique which we apply allows to describe
Vol. 64 (2009)
Projection-Iterative Methods
157
conditions on perturbations for the convergence of the method and give effective error estimates for solutions. The obtained conditions turned out to depend essentially on the maximal multiplicity of zeros (those lying on the unit circle) of the symbol of the unperturbed operator (see Theorem 4.3). As a rule in the presence of an iteration procedure perturbations need to be relatively small (in sense of the norms). We avoid such restrictions by involving a family of weighted spaces in terms of which the evaluations are made. Namely for this purpose Assumptions 3.7 and 3.8 were introduced (see Remark 3.9) being ensured by estimations (4.23) and (4.24) in our applications with c(τ ) → 0 as τ → ∞ via Hardy type inequalities. Besides, we derive further information about decaying properties of the solutions. The problems are treated within the framework of operator-theoretical methods. Then the obtained results are applied to difference equations of the form (1.1). The methods developed in the present paper can be applied to other equations involving block Toeplitz operators, Wiener-Hopf integral operators, differential and integro-differential operators, etc.. Note that our approaches somewhat differ of those generally used in successive approximation procedures. We would like to mention the works [1], [5], [18], [22] for standard texts on iterated projection methods and the more recent overview [4] where a theoretical framework, mostly related to our approaches, is developed for the analysis of convergence of the iterated Petrov-Galerkin method with applications to Fredholm integral equations of the second kind. The paper is organized as follows: in Sections 2 and 3 we develop projectioniterative methods for abstract operator equations. At this level of generality, we give convergence analysis for our approximate algorithms. Effective error estimates are also presented. We apply these approximation methods in Section 4 to the class of difference equations of the form (1.1). In Section 5 we illustrate the methods by considering perturbed second-order difference equations. In particular, equations corresponding to Jacobi and discrete Schr¨odinger operators are examined. The results of Section 5 are of interest by themselves.
2. Projection-iterative methods Let X be a Banach space and let T be a bounded linear operator on X. We consider an equation, in an unknown u, of the form u − Tu = g ,
(2.1)
where g is a given element of X. We are concerned with the approximate solution of the equation (2.1). The method which we apply can be described as follows. Let (Pn ) and (Qn ) be sequences of bounded projections acting on X with the property that Pn → I and Qn → I strongly (I designates the identity operator in X). For convenience we denote Pn0 = I − Pn and Q0n = I − Qn . We take an arbitrary element u0 ∈ X, and define a sequence (un ) of elements of X, successively, by un = Tn un−1 + Qn g
(n = 1, 2, . . . ) ,
(2.2)
158
Cojuhari and Nowak
IEOT
where Tn = Qn T Pn (n = 1, 2, . . . ) . This is simply a combination of the general projection method and the iterative one. We call the procedure defined by means of (2.2) the general projectioniterative method. Conditions under which the method (2.2) is convergent can be obtained by standard arguments. To this end we assume (throughout this section) that the equation (2.1) has a solution u, u ∈ X, for a given g. According to (2.1) and (2.2), we have un − u = Tn un−1 + Qn g − u = Tn un−1 + Qn u − Qn T u − u = Tn un−1 − Tn u − Q0n u − Qn T Pn0 u = Tn (un−1 − u) + Sn u , i.e. un − u = Tn (un−1 − u) + Sn u ,
(2.3)
where Sn := −Q0n − Qn T Pn0 Further, we have from (2.3)
(n = 1, 2, . . .) .
un − u = Tn (un−1 − u) + Sn u = Tn (Tn−1 (un−2 − u) + Sn−1 u) + Sn u = Tn Tn−1 (un−2 − u) + Tn Sn−1 u + Sn u, and repeating this substitution, we obtain, for each n = 1, 2, . . . , un − u = Tn1 (u0 − u) + Tn2 S1 u + . . . + Tnn Sn−1 u + Sn u ,
(2.4)
where Tnk := Tn Tn−1 . . . Tk
(k = 1, 2, . . . , n) .
Next we put tnk := kTn Tn−1 . . . Tk k
(k = 1, 2, . . . , n; n = 1, 2, . . .) ,
(2.5)
and make the following assumption. Assumption 2.1. The numbers tnk (k = 1, 2, . . . , n; n = 1, 2, . . .) defined by (2.5) satisfy the following conditions: (i) tnk → 0 as n → ∞ (for each fixed k); (ii) There is a constant M such that n X
tnk ≤ M
k=1
for each n = 1, 2, . . . . Let sn := kSn uk According to (2.4), we obtain
(n = 1, 2, . . .) .
kun − uk ≤ tn1 ku0 − uk + tn2 s1 + . . . + tnn sn−1 + sn .
(2.6)
Vol. 64 (2009)
Projection-Iterative Methods
159
Since Pn → I and Qn → I strongly, it follows that sn → 0 as n → +∞, and then, by Assumption 2.1 (applying a theorem of Toeplitz ([10], Chapter 11, [391])) we derive that the right side of (2.6) tends to zero as n → +∞. Thus the sequence (un ) converges in X to the solution u of the equation (2.1). Remark 2.2. An analysis of the formula (2.4) shows that the convergence of (un ) does not depend on the initial approximation u0 , and also that (under the assumptions which we made) the equation (2.1) has a unique solution. In order to obtain an a posteriori error estimate of the method we need the following additional assumption. Assumption 2.3. I − T and also I − Tn for all sufficiently large n are (boundedly) invertible operators on X. Again from (2.3) we have (I − Tn )(un − u) = Tn (un−1 − un ) + Sn u or, talking into account Assumption 2.3, we can write un − u = (I − Tn )−1 Tn (un−1 − un ) + (I − Tn )−1 Sn (I − T )−1 g
(2.7)
for sufficiently large n. In this way we obtain for all sufficiently large n the following estimation kun − uk ≤ cn kun−1 − un k + kRn gk ,
(2.8)
where cn = k(I − Tn )−1 Tn k and Rn = (I − Tn )−1 Sn (I − T )−1
(n = 1, 2, . . . ) .
The following theorem summarizes the discussion above. Theorem 2.4. Under conditions of Assumption 2.1 the sequence (un ) determined by (2.2) is convergent to a solution u, u ∈ X, of the equation (2.1). Moreover, the equation (2.1) has a unique solution. If the conditions of Assumption 2.1 are satisfied together with Assumption 2.3, then the error estimate (2.8) holds. Remark 2.5. In case T is a compact operator in X, the strong convergence Qn → I implies the uniform convergence Qn T → T . This fact implies that the operators I − T and I − Tn for sufficiently large n are (boundedly) invertible, simultaneously. Remark 2.6. In case Pn = Qn = I the general method (2.2) reduces to the standard iteration un = T un−1 + g (n = 1, 2, . . . ; u0 ∈ X) , (2.9) which converges to the solution u of (2.1) if kT k < 1. In this case Rn = 0 and the error estimate (2.8) becomes kun − uk ≤ ckun−1 − un k
160
Cojuhari and Nowak
IEOT
with c = k(I − T )−1 T k, or by a less precise but a more practical estimate kun − uk ≤
kT kn ku0 − u1 k . 1 − kT k
3. A realization of the method In this section we discuss situations in which the approximation method considered before can be applied. We are still in the abstract framework of a class of perturbed operator equations Au + Bu = f , (3.1) where A and B are linear bounded operators in a Banach space E, and f is a given element in E. We will give conditions on A and B such that the corresponding equation (3.1) can be reduced to a suitable equation of the form (2.1) for which the method (2.2) is applicable. To this end, we introduce several assumptions which are listed below depending on the requirement of the exposition of the material. Assumption 3.1. The operator A is invertible on the left in the sense that there is an operator A(−1) , in general unbounded in E but Dom(A(−1) ) ⊃ Ran(A) (Dom(A(−1) ) denotes the domain of A(−1) and Ran(A) is the range of A) such that A(−1) A = I. In the sequel we consider a family of operators (in general unbounded) Lτ (τ ≥ 0) with the following property (cf. [6], Assumption 4). Assumption 3.2. For each τ ≥ 0 the operator Lτ is one-to-one, i.e. KerLτ = 0, and L0 = I. On the domain Dτ = Dom(Lτ ) of the operator Lτ (τ ≥ 0) we introduce a new norm |u|τ = kLτ uk (u ∈ Dτ ) (k · k stands for the norm of the space E). The norm |u|τ turns the linear manifold Dτ into a normed space which we denote by Eτ . Clearly E0 = E. The next assumption is the following. Assumption 3.3. For τ 0 ≥ τ ≥ 0 there holds |u|τ ≤ |u|τ 0
(u ∈ Eτ 0 ) .
(3.2)
Remark 3.4. Assumption 3.3 states that Eτ 0 ⊂ Eτ for τ 0 ≥ τ ≥ 0 and that the embedding operator from Eτ 0 into Eτ is bounded. Of course, instead of (3.2) it can be required that |u|τ ≤ c|u|τ 0 (u ∈ Eτ 0 ) with an arbitrary constant c.
Vol. 64 (2009)
Projection-Iterative Methods
161
Remark 3.5. Eτ in general is not complete. But if Lτ is a closed operator and there is a constant c = c(τ ) such that kLτ uk ≥ c(τ )kuk
(u ∈ Dτ ) ,
then the space Eτ is complete. We connect the family (Lτ ) with the operators A and B by the next assumptions. Assumption 3.6. There exists a number m > 0 and a constant a > 0 independent of τ such that for every τ ≥ 0 the estimate |A(−1) u|τ ≤ a|u|τ +m
(u ∈ Eτ +m )
(3.3)
holds. We note that from (3.3) it follows a−1 |u|τ ≤ |Au|τ +m
(3.4)
for each τ ≥ 0 and u ∈ Eτ . However, in general, (3.4) does not imply (3.3). It is true that from (3.4) it follows that the operator A is one-to-one, and its inverse A−1 considered as an operator from Eτ +m to Eτ is bounded for τ ≥ 0, i.e. A−1 ∈ B(Eτ +m , Eτ ) for τ ≥ 0. Of course, from (3.4) it follows |A−1 v|τ ≤ a|v|τ +m for each v ∈ A(Eτ ) and τ ≥ 0. These arguments show that the operator A(−1) considered in Assumption 3.1 is in fact an exstention of A−1 defined above. Assumption 3.7. There exists τ ≥ 0 such that |A(−1) Bu|τ ≤ c(τ )|u|τ
(u ∈ Eτ )
(3.5)
with 0 ≤ c(τ ) < 1. We need the following supplementary assumption. Assumption 3.8. There exists a constant b > 0 independent of τ such that |A(−1) Bu|τ ≤ b|u|τ −
(u ∈ Eτ − )
(3.6)
if τ ≥ > 0. Remark 3.9. Assumptions 3.6–3.8, a prototype of which was introduced in [7] (see also [8]), play an essential role in our applications considered in the next sections. On the basis of them we will obtain conditions on the perturbed operator B in order to make applicable the method (2.2). In Assumption 3.7, a relative boundedness of the perturbation with a constant c(τ ) less than 1 in the norm of Eτ allows the perturbing operator B to have an unrestricted norm in the basic space E.
162
Cojuhari and Nowak
IEOT
Theorem 3.10. Let Assumptions 3.1–3.3, 3.6 and 3.8 be satisfied. (i) If f ∈ Eτ0 with τ0 ≥ m, then each solution of the equation (3.1) belongs to Eτ for τ ≤ τ0 − m. (ii) In addition, if Assumption 3.7 is also fulfilled with τ ≤ τ0 − m, then for each f ∈ Eτ0 (τ0 ≥ m) the equation (3.1) can have only a unique solution u and u ∈ Eτ for every τ ≤ τ0 − m. Proof. (i) Choose a positive integer n such that τ0 − m ≤ n, where is as in (3.6), and put 0 = (τ0 − m)/n. Let u, u ∈ E, satisfy the equation (3.1), that is Au + Bu = f . Then we can write |u|τ = |A(−1) Au|τ = |A(−1) (f − Bu)|τ ≤ |A(−1) f |τ + |A(−1) Bu|τ ≤ a|f |τ +m + b|u|τ − ≤ a|f |τ0 + b|u|τ −0 for each τ , 0 ≤ τ ≤ τ0 − m. Thus we have |u|τ ≤ a|f |τ0 + b|u|τ −0
(0 ≤ τ ≤ τ0 − m) .
(3.7)
For τ = 0 from (3.7) it follows |u|0 ≤ a|f |τ0 + b|u|0 = a|f |τ0 + bkuk < ∞ . Then, for τ = 20 we have |u|20 ≤ a|f |τ0 + b|u|0 < ∞ , and, continuing this process, we finally obtain for τ = n0 = τ0 − m |u|τ0 −m ≤ a|f |τ0 + b|u|(n−1)0 < ∞ , that is u ∈ Eτ0 −m , and hence u ∈ Eτ for τ ≤ τ0 − m. This proves the first part of the theorem. In order to prove (ii), first we observe that the equation (3.1) has a unique solution in E, because if the homogeneous equation of (3.1) has a nontrivial solution u, i.e. if Au + Bu = 0 (u 6= 0; u ∈ E) , then by Assumption 3.7 we have |u|τ = |A(−1) Bu|τ ≤ c(τ )|u|τ , and since, by what was proved in (i), u ∈ Eτ for each τ ≥ 0, it follows 1 ≤ c(τ ), a contradiction. From the above arguments it is seen that under Assumptions 3.1–3.3 and 3.6–3.8 for f ∈ Eτ with τ ≥ m the equation (3.1) can be reduced to u − Tu = g ,
(3.8)
Vol. 64 (2009)
Projection-Iterative Methods
163
where g = A(−1) f and T = −A(−1) B . (3.9) We apply the projection-iterative method (2.2) to the equation (3.8) by supposing that the sequences (Pn ) and (Qn ) of projections on E are connected with the corresponding topologies of the norms | · |τ according to the following assumption. Assumption 3.11. Pn and Qn (n = 1, 2, . . .) are bounded operators in each space Eτ , and the sequences (Pn ) and (Qn ) converge strongly to the identity operator on Eτ , τ ≥ 0. Remark 3.12. Let (Pn ) and (Qn ) be sequences of bounded projections on E and let Pn → I and Qn → I strongly on E. If Pn Lτ = Lτ Pn and Qn Lτ = Lτ Qn for each n = 1, 2, . . . and τ ≥ 0, then Assumption 3.11 is fulfilled. For the sake of simplicity we require the following. Assumption 3.13. kPn k = kQn k = 1 (n = 1, 2, . . . ). Now, using Theorem 2.4, we prove that the projection-iterative process (2.2) for the equation (3.8) converges to a solution of the equation (3.1). For that purpose let τ ≥ 0 be fixed satisfying Assumption 3.7 and let us choose an initial element u0 in (2.2) belonging to Eτ . Theorem 3.14. Let Assumptions 3.1–3.3, 3.6 and 3.8 be satisfied together with Assumptions 3.11 and 3.13, and let (un ) be the approximating sequence determined by the process (2.2) for the equation (3.8), with the initial element u0 chosen as above, i.e. u0 ∈ Eτ for τ as in Assumption 3.7. If f ∈ Eτ0 (τ0 ≥ τ + m), then (un ) converges in the norm of Eτ to the solution u of the (3.1) with the error estimate |un − u|τ ≤
c(τ ) |un−1 − un |τ + |Rn g|τ , 1 − c(τ )
(3.10)
where c(τ ) is defined by (3.5) and Rn = (I − Tn )−1 Sn (I − T )−1
(n = 1, 2, . . . ) .
Proof. For convenience we preserve the notations used in Section 2. In particular, let tnk denote the values expressed in (2.5) with Tn = Qn T Pn for T defined by (3.9). By hypothesis u0 ∈ Eτ and, since T maps Eτ boundedly in Eτ , it follows that un ∈ Eτ for each n = 1, 2, . . . . We prove the convergence of (un ) to the solution of (3.8) by applying Theorem 2.4. To this end we evaluate the values tnk (k = 1, . . . , n; n = 1, 2, . . .). By virtue of Assumptions 3.11, 3.13 and (3.5) we have |Tn u|τ ≤ |T Pn u|τ ≤ c(τ )|u|τ for every u ∈ Eτ . Thus |Tn |τ ≤ c(τ )
(n = 1, 2, . . . ) ,
and hence tnk = |Tn Tn−1 . . . Tk |τ ≤ |Tn |τ |Tn−1 |τ . . . |Tk |τ ≤ (c(τ ))n−k+1 ,
(3.11)
164
Cojuhari and Nowak
IEOT
i.e. tnk ≤ (c(τ ))n−k+1 (k = 1, . . . , n; n = 1, 2, . . . ) , where c(τ ) is as in Assumption 3.7. By hypothesis 0 ≤ c(τ ) < 1, hence tnk → 0 as n → ∞ for each fixed k, and also n n X X c(τ ) . tnk ≤ (c(τ ))n−k+1 ≤ 1 − c(τ ) k=1
k=1
Thus the conditions (i) and (ii) of Assumption 2.1 are satisfied and, in view of Theorem 2.4, we may conclude that (un ) converges in Eτ to the solution u of the equation (3.8) or, which is the same, of the equation (3.1). The error estimate (3.10) follows immediately from (2.8). The proof of Theorem 3.14 is complete. According to Remark 2.6 we can formulate the following assertion. Corollary 3.15. In the particular case Pn = Qn = I (n = 1, 2, . . . ), under Assumptions 3.1–3.3, 3.6, 3.7 and 3.8, the standard iteration (2.9) for the equation (3.8), where f ∈ Eτ0 (τ0 ≥ τ + m; τ as in Assumption 3.7 ), with an arbitrary initial element u0 belonging to Eτ converges in the norm Eτ with the error estimate |un − u|τ ≤
(c(τ ))n |u0 − u1 |τ , 1 − c(τ )
(3.12)
As before c(τ ) is determined by (3.5).
4. Perturbed discrete convolution equations In this section we illustrate the applicability of the projection-iterative method developed in Sections 2 and 3, by considering a concrete class of discrete equations. Let lp (N) for 1 ≤ p < ∞ be the Banach space of all sequences u = (un ) of complex numbers satisfying ∞ X kukpp = |un |p < ∞ . n=1
By V we denote the elementary shift in lp (N), i.e. (V u)n = un−1 The operator V
(−1)
defined by
(V
(−1)
u)n = un+1
(n = 1, 2, . . . ; u0 = 0) . (n = 1, 2, . . . ; u = (un ) ∈ lp (N))
is obviously an inverse on the left of V , i.e. V (−1) V = I. In the sequel E denotes one of the Banach spaces lp (N) (1 ≤ p < ∞), and A stands for a Toeplitz operator defined on E by ∞ X (Au)n = an−k uk (u = (un ) ∈ E) , (4.1) k=1
Vol. 64 (2009)
Projection-Iterative Methods
165
where an (n = 0, ±1, . . . ) are complex numbers such that ∞ X
|an | < ∞ .
(4.2)
n=−∞
According to the theory of Toeplitz operators (or, in other terms, discrete Wiener-Hopf operators) [3] (see also [11] and [23]) the operator A can be regarded (in a certain sense) to be the value of some function A (we preserve the same notation as for the operator) of the operator V , i.e. A = A(V ). Namely, the function A is given on the complex unit circle T = {z ∈ C : |z| = 1} and is represented in the form A(z) =
∞ X
an z n
(z ∈ T) .
n=−∞
The function A(z), z ∈ T, is called the symbol of the operator A. Note that the numbers an (n = 0, ±1, . . . ) are the Fourier coefficients of A, so that, in case A is given, they can be computed by the formula Z 2π 1 A(eiφ )e−inφ dφ (n = 0, ±1, . . . ) . an = 2π 0 Clearly, the function A is continuous on T. Next we assume that the function A(z) has only a finite number of zeros on T, and that each of them has finite multiplicity. In this setting it will be convenient to write the symbol A(z), z ∈ T, as follows: A(z) =
r Y
(z −1 − αj )mj A0 (z)
(z ∈ T) ,
(4.3)
j=1
where αj (j = 1, . . . , r) are pairwise distinct points on the unit circle T, mj ≥ 0 (j = 1, . . . , r) and A0 (z) (z ∈ T) is a continuous function on T such that A0 (z) 6= 0 (z ∈ T). In order to avoid supplementary prudence, henceforth we consider that mj (j = 1, . . . , r) are non-negative integers. Let 2π 1 κ = ind A0 (z) = arg A0 (eiφ ) φ=0 2π 2π ( [ ]φ=0 means the increment of the function on the interval [0, 2π]). Then A0 (z), z ∈ T, can be written in the form (the Wiener-Hopf factorization) [19] A0 (z) = A− (z)z κ A+ (z) ,
(4.4)
where A+ (z) and A− (z) are functions holomorphic inside and continuous up to the boundary in domains |z| ≤ 1 and |z| ≥ 1, respectively, and A+ (z) 6= 0 (|z| ≤ 1) and A− (z) 6= 0 (|z| ≥ 1). Note that the functions A− (z) and A+ (z) can be considered in turn as symbols of some Toeplitz operators; let us denote them by A− and A+ , respectively.
166
Cojuhari and Nowak
IEOT
Thus, in view of (4.3) and (4.4), we may express the operator A in the form A = RA− V (κ) A+ ,
(4.5)
where R=
r Y
(V (−1) − αj I)mj ,
j=1
and where V (κ) stands for V κ if κ ≥ 0 and (V (−1) )−κ if κ < 0. We note that an operator V (−1) − αI, where α ∈ T, is one-to-one, and there exists a closed and unbounded operator (V (−1) − αI)−1 . It is easy to see that (V (−1) − αI)−1 u = (−
∞ X
αn−j−1 uj )
(u = (un ) ∈ Ran(V (−1) − αI)) . (4.6)
j=n
In the sequel we assume that κ > 0. In this case the operator A admits an inverse operator on the left A(−1) in the sense of Assumption 3.1, and via (4.5), we can write (−κ) −1 −1 A(−1) u = A−1 A− R u + V
(u ∈ Ran(A)) .
(4.7)
Next, let B denote a bounded operator defined on the space E by B = [bnk ]∞ n,k=1 , i.e. (Bu)n =
∞ X
bnk uk
(n = 1, 2, . . . ; u = (un ) ∈ E) ,
(4.8)
k=1
where bnk ∈ C (n, k = 1, 2, . . . ). Our problem is to apply the general procedure discussed in Sections 2 and 3 for the approximate solution of the operator equation (A + B)u = f ,
(4.9)
where f is a given element in E, and A and B are operators defined on E by (4.1) and (4.8), respectively. We first consider the case where the factor A+ (z) in factorization (4.4) is a constant. This means in particular that the symbol A(z) is not equal to zero on the domain |z| > 1. In other words, we study the case where the symbol A(z) can be written in the form r Y (z −1 − αj )mj A− (z) (z ∈ T) , (4.10) A(z) = z κ j=1
where κ > 0 and A− (z) is a function holomorphic inside and continuous up to the boundary in |z| ≥ 1, and A− (z) 6= 0 (|z| ≥ 1). In order to apply the results from Section 3 we define the family of operators (Lτ )τ ≥0 by (Lτ u)n = nτ un (n = 1, 2, . . . ; u ∈ Dom(Lτ )) ,
Vol. 64 (2009)
Projection-Iterative Methods
167
where Dom(Lτ ) = {u ∈ E :
∞ X
|nτ un |p < ∞}.
n=1
For the introduced family (Lτ )τ ≥0 Assumption 3.2 is trivially fulfilled, the corresponding spaces Eτ , τ ≥ 0, are complete and Assumption 3.3 is also obvious. We now proceed to the verification of Assumption 3.6. To this end, we let m = max{mj : j = 1, . . . , r} (recall that mj are multiplicities of the zeros of the symbol A(z) belonging to the unit circle T, cf. (4.3)). The following auxiliary assertions will be used. Lemma 4.1 ([6]).
(i) For every τ ≥ 0 the operator V (−1) is bounded on Eτ , and |V (−1) u|τ ≤ |u|τ
(u ∈ Eτ ) .
(4.11)
(ii) For τ > 0 and > 0 there exists a0 (τ, ) > 0 such that a0 (τ, ) → 0 as τ → ∞, and |V (−1) u|τ ≤ a0 (τ, )|u|τ +
(u ∈ Eτ + ) .
(4.12)
(iii) For every τ ≥ 0 and every α ∈ T the estimate |(V (−1) − αI)−1 u|τ ≤ c|u|τ +1
(u ∈ Eτ +1 )
(4.13)
holds with c = p when E = lp (N). Proof. The assertions (i)–(iii) were pointed out in [6] (see Lemmas 1 and 3 [6]). For the sake of the completeness we give the proofs of them. Let τ and τ 0 be arbitrary non-negative numbers and u ∈ Eτ 0 . Then it is easily verified that |V (−1) u|τ ≤ a(τ, τ 0 )|u|τ 0
(u ∈ Eτ 0 ) ,
(4.14)
where a(τ, τ 0 ) = max nτ (n + 1)−τ n
0
.
For τ = τ 0 we have a(τ, τ 0 ) = 1, and hence the assertion (i) follows. For τ 0 = τ + we obtain a(τ, τ 0 ) = max nτ (n + 1)−τ − ≤ τ τ (τ + )−τ − . n
Clearly a(τ, τ + ) → 0 as τ → ∞, and thus the assertion (ii) is verified. The assertion (iii) is less trivial. The estimate (4.13) is a kind of Hardy’s inequality with weights (cf. [9]). It can also be obtained directly by using the following classical Hardy’s inequality (see [17], Theorem 331, pag. 246) ∞ X ∞ X X ∞ −1 p j u j ≤ pp |un |p n=1 j=n
n=1
(u = (un ) ∈ lp (N)) .
(4.15)
168
Cojuhari and Nowak
IEOT
Indeed, for p when E = lp (N) and u ∈ Eτ +1 denote v = Lτ +1 u. Then, in view of (4.6) and (4.15), we can write ∞ ∞ X τX p p1 (−1) −1 |(V − αI) u|τ = n αn−j−1 uj n=1
≤
j=n
∞ ∞ X X n=1
∞ X p1 p p1 ≤p = p|u|τ +1 . |vn |p j −1 |vj | n=1
j=n
Remark 4.2. In (4.13) the constant is the best possible [17]. Next we note that, by virtue of a Wiener theorem [19] (see also [3]), the Toeplitz operator A−1 − like A− is upper triangular. In terms of its symbol this means that b− (z) = 1/A− (z) can be represented in the form b− (z) =
0 X
n b− nz
(z ∈ T)
with
kb− kW =
n=−∞
0 X
|b− n| < ∞.
n=−∞
(Here the Wiener norm is denoted as usual by k · kW ). Taking into account this fact, by Lemma 4.1 (i), we conclude that the operator A−1 is bounded in each space Eτ , and − |A−1 − u|τ ≤ kb− kW |u|τ .
(4.16)
In order to estimate R−1 we observe that, since the roots αj−1 (j = 1, . . . , r) of A(z) are pairwise distinct, there exist numbers ajk (k = 1, . . . , mj ; j = 1, . . . , r) such that mj r r X Y X (z −1 − αj )−mj = ajk (z −1 − αj )−k (z ∈ T) . (4.17) j=1
j=1 k=1
From (4.17) it follows that the operator R−1 can be represented as R−1 =
mj r X X
ajk (V (−1) − αj I)−k .
(4.18)
j=1 k=1
In view of (4.13) we can obtain |(V (−1) − αj I)−k u|τ ≤ pk |u|τ +k
(u ∈ Eτ +k ; k = 1, . . . , mj , j = 1, . . . , r)
in case E = lp (N). Therefore, from (4.18) we arrive at the following estimate (recall that m is the maximal multiplicity of zeros αj−1 (j = 1, . . . , r)) |R−1 u|τ ≤ c1 |u|τ +m where c1 =
mj r X X j=1 k=1
(u ∈ Eτ +m ) , pk |ajk | .
(4.19)
Vol. 64 (2009)
Projection-Iterative Methods
169
Now, let u ∈ Eτ +m (τ ≥ 0). In view of (4.11), (4.16) and (4.19) we can estimate −1 −1 |A(−1) u|τ ≤ |V (−κ) A−1 u|τ ≤ |A−1 u|τ − R − R
≤ kb− kW |R−1 u|τ ≤ c1 kb− kW |u|τ +m , i.e. |A(−1) u|τ ≤ a|u|τ +m
(u ∈ Eτ +m )
(4.20)
with a = c1 kb− kW . Thus the Assumption 3.6 is verified. We point out the estimate |A(−1) u|τ ≤ a|V (−κ) u|τ +m
(u ∈ Eτ +m )
(4.21)
which will be used later. Obviously, (4.21) can be obtained by using similar arguments as above. The constant a is the same as in (4.20). Next, we find conditions on B such that Assumptions 3.7 and 3.8 are also verified. Let u ∈ Eτ , τ ≥ 0. By virtue of (4.21) and (4.12) we have |A(−1) Bu|τ ≤ a|V (−κ) Bu|τ +m ≤ aa0 (τ, )|V (−κ+1) Bu|τ +m+ ≤ aa0 (τ, )kBτ, k|u|τ , where Bτ, = Lτ +m+ V (−κ+1) BL−1 τ . Note that the operator Bτ, is induced on E by the matrix ∞ Bτ, = j τ +m+ k −τ bj+κ−1 k j,k=1 . It is seen that the operator Bτ, is generally speaking unbounded in the basic space E, and even if it is bounded, its norm could increase as the parameter τ increases. However, if we let bjk = 0 for j >k+κ−1 and require that the operator ∞ B1 = j m+ | bj+κ−1 k | j,k=1
(4.22)
is bounded on the space E, then we have kBτ, k ≤ kB1 k . In this way we obtain conditions for which estimates |A(−1) Bu|τ ≤ c(τ )|u|τ
(4.23)
hold with c(τ ) = aa0 (τ, )kB1 k. Clearly c(τ ) → 0 as τ → +∞, and thus the fulfilment of Assumption 3.7 is ensured. It turns out that under the same conditions Assumptions 3.8 is also satisfied. Indeed, let u ∈ Eτ − , τ ≥ > 0. Then, again by virtue of (4.21) and by (4.11), we have |A(−1) Bu|τ ≤ a|V (−κ+1) Bu|τ +m ≤ akLτ +m V (−κ+1) BL−1 τ − k|u|τ − .
170
Cojuhari and Nowak
IEOT
As before, the operator m+we show that ∞ under conditions bjk = 0 for j > k + κ − 1 if(−κ+1) B1 = j bj+κ−1 k j,k=1 is bounded on E, then the operator Lτ +m V BL−1 τ − is bounded on E and its norm does not exceed kB1 k. Therefore |A(−1) Bu|τ ≤ b|u|τ − (τ ≥ > 0) (4.24) with b = akB1 k. Assumption 3.7 is verified. According to the discussion in Section 3, the equation (4.9) for a given element f in Eτ with τ enough large can be reduced to an equation of the form (3.8), namely u − Tu = g ,
(4.25)
where g = A(−1) f and T = −A(−1) B. We apply to the equation (4.25) the projection-iterative method (2.2) by taking Pn and Qn canonical projections in the space E, that is Pn = Qn
(n = 1, 2, . . . )
and Pn u = (u1 , . . . , un , 0, 0, . . . )
(u = (un ) ∈ E) .
Evidently, Pn → I strongly in E, kPn k = 1 and Pn Lτ = Lτ Pn for each n = 1, 2, . . . . Hence, Assumptions 3.11 and 3.13 are fulfilled. We have thus verified all the required assumptions, and Theorem 3.14 can be applied. We denote Tn = Pn T Pn ,
gn = Pn g
(n = 1, 2, . . . ),
take an arbitrary element u0 ∈ Eτ (τ ≥ 0) and define the approximating sequence (un ) by un = Tn un−1 + gn (n = 1, 2, . . . ). (4.26) We have the following result. Theorem 4.3. Let A and B be operators defined by (4.1) and (4.8), respectively. Assume that the symbol A(z) of A can be factorized as in (4.10), κ > 0 and m = max{mj : j = 1, . . . , r}. Furthermore, assume that for any f ∈ Eτ0 with sufficiently large τ0 (for instance, τ0 ≥ τ +m; τ being as in Assumption 3.7) the equation (4.9) possesses a solution u in Eτ . If under the conditions bjk = 0 for j > k + κ − 1 the operator B1 defined by (4.22) is bounded on E, then the approximating sequence (un ) determined by the process (4.26) converges in the norm Eτ (τ ≤ τ0 ) to the solution u of the equation (4.9) for any initial approximation u0 in Eτ . The error estimate is given by |un − u|τ ≤
1 + c(τ ) c(τ ) |un−1 − un |τ + |hn |τ , 1 − c(τ ) 1 − c(τ )
where c(τ ) is as in (4.23) and hn = Pn0 (I − T )−1 g.
(4.27)
Vol. 64 (2009)
Projection-Iterative Methods
171
Proof. That the approximating sequence (un ) converges to the solution of the equation (4.9) follows immediately from Theorem 3.14. Furthermore, since f ∈ Eτ0 with τ0 sufficiently large, by Assumptions 3.3 and 3.6 it follows that g ∈ Eτ and also hn ∈ Eτ by virtue of Theorem 3.10. The error estimate (4.27) is a consequence of (3.10). Corollary 4.4. In the particular case Pn = I (n = 1, 2, . . . ) under the hypotheses of Theorem 4.3 the sequence (un ) determined by the iterative process un = T un−1 + g
(n = 1, 2, . . . )
converges in the norm of Eτ (τ ≤ τ0 ) to the solution u of the equation (4.9) for any initial approximation u0 in Eτ . The error estimate is given by |un − u|τ ≤
c(τ )n |u0 − u1 |τ 1 − c(τ )
(4.28)
with c(τ ) given as in (4.23). Finally, we note that the general case when the symbol A(z) of A contains a non-constant factor A+ (z) (cf. (4.4)) can be reduced to the previous one by denoting v = A+ u (recall that A+ is the Toeplitz operator corresponding to the symbol A+ (z)) and reducing the equation (4.9) to the following e + Bv e =f Av
(4.29)
e is a Toeplitz operator associated to a symbol of the form (4.10) and in which A −1 e B = BA+ . Note that, due to the fact that A+ is a boundedly invertible operator in E, u is a solution of the equation (4.9) if and only if v = A+ u is a solution of the corresponding equation (4.29).
5. Examples. Perturbed second-order difference equations In this section we illustrate the obtained results by considering perturbed secondorder difference equations. We are concentrated mainly on the singular cases, that is when the symbols of the unperturbed operators degenerate on the unit circle. Let A denote the Toeplitz operator generated on the space E (we preserve notations used in the previous section) by the function (the symbol of A) A(z) = a−1 z −1 + a1 z
(z ∈ T) ,
where a−1 , a1 ∈ C. For determination let us consider that |a1 | ≥ |a−1 | > 0. Note that the set of all values of the symbol A(z), z ∈ T, represents an ellipse E on the complex plane. In what follows E+ denotes the interior of this ellipse. Let B be a bounded operator of the form (4.8) and consider the following equation Au + Bu − λu = f (f ∈ E) , (5.1) where λ is a given scalar parameter.
172
Cojuhari and Nowak
IEOT
In dependence of the parameter λ we describe conditions under which the scheme given in the previous section can be applied to the equation (5.1). First, we consider the case |a1 | > |a−1 |. For this case it is easy to observe that if λ ∈ E the symbol A(z) − λ has a root on the unit circle T, another one lying inside of the unit disk. In other words we have the factorization A(z) − λ = a−1 z(z −1 − α)(z −1 − β)
(z ∈ T)
(5.2)
with, for instance, |α| = 1 and |β| > 1. Obviously, a similar factorization (5.2) holds for λ ∈ E+ but with |α| > 1 and |β| > 1. It is seen that Theorem 4.3 can be applied to the pair A − λI and B. We have κ = 1, m = 1 for λ ∈ E and κ = 1, m = 0 for λ ∈ E+ . Therefore, if the perturbation ∞ B is such that bjk = 0 for j > k and the operator defined by Bδ = j δ bjk j,k=1 is bounded on E with δ > 1 for λ ∈ E and δ > 0 for λ ∈ E+ , then the equation (5.1) can be reduced to u − T (λ)u = g (5.3) with g = (A − λI)(−1) f and T (λ) = −(A − λI)(−1) B, where (A − λI)(−1) is a left inverse of A − λI the existence of which follows from the representation (5.2). Actually, as in the hypotheses of Theorem 4.3 we assume that the equation (5.1) possesses a solution u in E for f ∈ Eτ0 with sufficiently large τ0 . Similarly as in Section 4 we denote Tn (λ) = Pn T (λ)Pn ,
gn = Pn g ,
take an arbitrary element u0 ∈ Eτ (τ > 0) and define the approximating sequence (un ) by un = Tn (λ)un−1 + gn (n = 1, 2, . . . ) . (5.4) According to Theorem 4.3 the equation (5.1) has a solution u, u ∈ Eτ , the procedure (5.4) converges in the norm of Eτ to u. Moreover, it can be computed that the corresponding constant c(τ ) in (4.27) is c(τ ) = p kB1+ k |a−1 |−1 (|β| − 1)−1 a0 (τ, ) −1
c(τ ) = kB k |a−1 |
−1
(|α| − 1)
−1
(|β| − 1)
a0 (τ, )
for
λ∈E,
for
λ ∈ E+
with a0 (τ, ) = τ τ (τ + )−τ − as in (4.12). Therefore, we can conclude the following result. Theorem 5.1. Under the above conditions ifthe perturbation B is such that bjk = 0 ∞ for j > k and the operator defined by Bδ = j δ bjk j,k=1 is bounded on E with δ > 1 for λ ∈ E and δ > 0 for λ ∈ E+ , then the approximating sequence (un ) determined by (5.4) converges in the norm of Eτ (τ ≤ τ0 ) to the solution u, which belongs to Eτ , of the equation (5.1). The error estimate is given by a formula like (4.27), with c(τ ) = O(τ − ).
Vol. 64 (2009)
Projection-Iterative Methods
173
Corollary 5.2. In the particular case Pn = I (n = 1, 2, . . .) under the hypotheses of Theorem 5.1 the sequence (un ) determined by the iterative process un = T (λ)un−1 + g
(n = 1, 2, . . . )
(5.5)
converges in the norm of Eτ (τ ≤ τ0 ) to the solution u, u ∈ Eτ , of the equation (5.1) for any initial approximation u0 in Eτ , and the effective error estimate | un − u |τ = O(τ −n )
(5.6)
holds. In case |a−1 | = |a1 | the ellipse E degenerates to a segment, so that E+ = ∅. In this case both roots of the symbol A(z) − λ for λ ∈ E are situated on T. Moreover, 2 it is observed that for λ2 6= 4a−1 a1 these roots are simple, √ but for λ √= 4a−1 a1 −1 the symbol A(z) − λ has only a root lying on T (either − a−1 a1 or a−1 a−1 1 ) with multiplicity m = 2. Therefore, for this case the following result holds. Theorem 5.3. The procedure (5.4) converges in the norm of Eτ (τ ≤ τ0) to the ∞solution of the equation (5.1) if bjk = 0 for j > k and the operator Bδ = j δ bjk j,k=1 is bounded on E with δ > 1 for λ ∈ E and λ2 6= 4a−1 a1 , and δ > 2 for λ2 = 4a−1 a1 . Similar error estimates as in Theorem 4.1 hold with c(τ ) = O(τ − ). Remark 5.4. Under the conditions assumed in Theorem 5.3 the iterative process (5.5) (i.e. when Pn = I, n = 1, 2, ...) is convergent in the space Eτ (τ ≤ τ0 ) to the solution u, u ∈ Eτ , of the equation (5.1) with error estimates similar to (5.6). Remark 5.5. The requirement that B be an∞upper-triangular matrix is essential. For instance, let a−1 = a1 = 1, and B = bjk j,k=1 with b23 = b32 = −1 and bjk 6= 0 otherwise. In this case E = [−2, 2] and it is easy to calculate that the numbers λ = ±1 are eigenvalues for the operator A+B. The corresponding eigenvectors are u1 = (1, 1, 0, 0, . . . ) and u2 = (1, −1, 0, 0, . . . ). Therefore, for this case the equation (5.1) in general can have no solutions. Remark ∞ 5.6. In the particular case when B is a diagonal matrix, that is B = bj δjk j,k=1 (δjk denotes the Kronecker symbol: δjk = 1 for j = k and δjk = 0 for j 6= k), the above conditions on the perturbation (in case that |a−1 | = |a1 |) are equivalent with sup j δ |bj | < ∞ j 2
for δ > 1 if λ ∈ E and λ 6= 4a−1 a1 , and δ > 2 for λ2 = 4a−1 a1 . A similar remark can be made for the previous case |a−1 | < |a1 |. The results in this section represent interest by themselves. In this connection we note that in case B is a diagonal matrix the corresponding perturbed operator A + B is referred to Jacobi operators, or often if a−1 = a1 = 1 to discrete Schr¨ odinger operators (see, for instance, [30] and the references quoted there).
174
Cojuhari and Nowak
IEOT
References [1] Atkinson K., Han W., Theoretical numerical analysis. A functional analysis framework, Springer-Verlag, New York, 2005. [2] Baxter G., A norm inequality for a “finite-section” Wiener-Hopf equation, Illinois J. Math. 7 (1963), 97–103. [3] B¨ ottcher A., Silbermann B., Analysis of Toeplitz Operators, Springer-Verlag, Berlin, 1990. [4] Chen Z., Xu Y., The Petrov-Galerkin and iterated Petrov-Galerkin methods for second-kind integral equations, SIAM J. Numer. Anal., 35 (1998), 406–434. [5] Chatelin F., Spectral approximation of linear operators, Academic Press, New York, 1983. [6] Cojuhari P.A., The absence of eigenvalues for operators that are close to operators generated by infinite-dimensional Jacobi matrices [Russian], Izv. Akad. Nauk Moldav. SSR Mat. 1990, no. 2, 15–21. [7] Cojuhari P.A., The absence of eigenvalues in a perturbed discrete Wiener-Hopf operator [Russian], Izv. Akad. Nauk Moldav. SSR Mat. 1990, no. 3, 26–35 [8] Cojuhari P.A., On the spectrum of singular nonselfadjoint differential operators. Operator extensions, interpolation of functions and related topics, Oper. Theory Adv. Appl., 61, Birkh¨ auser, Basel, 1993, 47–64. [9] Cojuhari P.A., Generalized Hardy type inequalities and some applications to spectral theory. Operator theory, operator algebras and related topics, 79–99, Theta Found., Bucharest, 1997. [10] Fichtenholz G.M., Differential- und Integralrechnung II, Hochschulb¨ ucher f¨ ur Mathematik, Band 62, VEB Deutscher Verlag der Wissenschaften, Berlin, 1966. [11] Gohberg I., Feldman I.A., Convolution equations and projection methods for their solution, Transl. of Math. Monographs, Vol. 41. Amer. Math. Soc., Providence, R.I., 1974. [12] Gohberg I., Levcenko V.I., The projection method of solution of degenerate discrete Wiener-Hopf equations [Russian], Funkcional. Anal. i Priloˇzen. 5 (1971) no. 4, 69–70. [13] Gohberg I., Levcenko V.I., The convergence of the projection method for the solution of the degenerate discrete Wiener-Hopf equation [Russian], Mat. Issled. 6 (1971), no. 4(22), 20–36. [14] Gohberg I., Levcenko V.I., The projection method for a degenerate discrete WienerHopf equation [Russian], Mat. Issled. 7 (1972), no. 3(25), 238–253. [15] Gohberg I., Pr¨ ossdorf S., Ein Projektionsverfahren zur L¨ osung entarteter System von diskreten Wiener-Hopf-Gleichungen, Math. Nachr., 65 (1975), 19–45. [16] Hagen R., Roch S., Silbermann B., Spectral theory of approximation methods for convolution equations, Birkh¨ auser Verlag, Basel, 1995. [17] Hardy G.H., Littlewood J.E., P´ olya G., Inequalities, Cambridge University Press, Cambridge 1952. [18] Krasnosel’skii M.A., Vainikko G.M., Zabreiko P.P., Rutitskii Ya.B., Stetsenko V.Ya., Approximate solution of operator equations, Wolters-Noordhoff, Groningen, 1972. [19] Krein M.G., Integral equations on the half-line with a kernel depending on the difference of the arguments [Russian], Uspehi Mat. Nauk 13 (1958) no. 5 (83), 3–120.
Vol. 64 (2009)
Projection-Iterative Methods
175
[20] Levcenko V.I., The projection method for operators that are defined by degenerate Toeplitz matrices [Russian], Mat. Issled. 7 (1972), no. 4(26), 123–140. [21] Levcenko V.I., The projection method for the solution of degenerate dual discrete Wiener-Hopf equations [Russian], Mat. Issled. 8 (1973), no. 3(29), 26–45. [22] Luchka A. Ju., Projective-iterative methods for solving differential and integral equations [Russian], “Naukova Dumka”, Kiev, 1980 [23] Pr¨ ossdorf S., Einige Klassen singul¨ arer Gleichungen, Akademie Verlag, Berlin 1974. [24] Pr¨ ossdorf S., Systeme einiger singul¨ arer Gleichungen vom nicht normalen Typ und Projektionsverfahren zur ihrer L¨ osung, Studia Math., 53 (1975), 225–252. [25] Pr¨ ossdorf S., Silbermann B., Ein Projektionsverfahren zur L¨ osung abstrakter singular Gleichungen vom nicht normalen Typ und einige seiner Anwendungen, Math. Nachr., 61 (1974), 133–155. [26] Pr¨ ossdorf S., Silbermann B., Projektionsverfahren zur L¨ osung von System singul¨ arer Gleichungen vom nicht normalen Typ, Revue Roum. Math. Pures Appl., 22:7 (1977), 965–991. [27] Pr¨ ossdorf S., Silbermann B., Projektionsverfahren und die n¨ aherungsweise L¨ osung singul¨ arer Gleichungen, Teubner-Verlag, Leipzig, 1977. [28] Pr¨ ossdorf S., Silbermann B., Numerical analysis for integral and related operator equations., Birkh¨ auser Verlag, Basel, 1991. [29] Reich E., On non-Hermitian Toeplitz matrices, Math. Scand. 10 (1962), 145–152. [30] Teschl G., Jacobi Operators and Completely Integrable Nonlinear Lattices, Mathematical Surveys and Monographs, Volume 72, Amer. Math. Soc., Providence 2000. Petru A. Cojuhari AGH University of Science and Technology Faculty of Applied Mathematics al. Mickiewicza 30 30-059 Krak´ ow Poland e-mail:
[email protected] Michal A. Nowak AGH University of Science and Technology Faculty of Applied Mathematics al. Mickiewicza 30 30-059 Krak´ ow Poland e-mail:
[email protected] Submitted: October 5, 2008. Revised: February 12, 2009.
Integr. equ. oper. theory 64 (2009), 177–192 c 2009 Birkh¨
auser Verlag Basel/Switzerland 0378-620X/020177-16, published online May 12, 2009 DOI 10.1007/s00020-009-1681-2
Integral Equations and Operator Theory
Multipliers of Fractional Cauchy Transforms Evgueni Doubtsov Abstract. Let Bn denote the unit ball of Cn , n ≥ 2. Given an α > 0, let Kα (n) denote the class of functions defined for z ∈ Bn by integrating the kernel (1 − hz, ζi)−α against a complex-valued measure on the sphere {ζ ∈ Cn : |ζ| = 1}. Let Hol(Bn ) denote the space of holomorphic functions in the ball. A function g ∈ Hol(Bn ) is called a multiplier of Kα (n) provided that f g ∈ Kα (n) for every f ∈ Kα (n). In the present paper, we obtain explicit analytic conditions on g ∈ Hol(Bn ) which imply that g is a multiplier of Kα (n). Also, we discuss the sharpness of the results obtained. Mathematics Subject Classification (2000). Primary 32A26; Secondary 32A37, 42B35, 46E15, 46J15. Keywords. Fractional Cauchy transform, Hardy–Sobolev space, holomorphic Lipschitz space, pointwise multiplier.
1. Introduction Let B = Bn denote the unit ball of Cn and let M = M(n) denote the space of complex-valued Borel measures on the sphere ∂B = ∂Bn . 1.1. Fractional Cauchy transforms Let α > 0. Given a measure µ ∈ M(n), its fractional Cauchy transform of order α is defined by the formula Z 1 dµ(ζ), z ∈ Bn . Kα [µ](z) = (1 − hz, ζi)α ∂Bn Here and in what follows we use the principal branch of the logarithm. Put Kα = Kα (n) = {Kα [µ] : µ ∈ M(n)} . This research was supported by RFBR (grant no. 08-01-00358-a), by the Russian Science Support Foundation and by the programme “Key scientific schools NS 2409.2008.1”.
178
Doubtsov
IEOT
1.2. Multipliers Let Hol(Bn ) denote the space of holomorphic functions in the ball Bn . A function g ∈ Hol(Bn ) is called a (pointwise) multiplier of Kα (n) provided that f g ∈ Kα (n) for every f ∈ Kα (n). Let Mα (n) denote the set of all multipliers of Kα (n). 1.3. The families Kα (n) and Mα (n) as Banach spaces Standard arguments show that Kα (n), α > 0, is a Banach space with respect to the norm defined by kf kKα (n) = inf kµkM(n) : f = Kα [µ] , f ∈ Kα (n). Also, note that the above infimum is attained. The set Mα (n), α > 0, is a Banach algebra with the natural norm defined by kgkMα (n) = sup kf gkKα (n) : kf kKα (n) ≤ 1 , g ∈ Mα (n). 1.4. The problem under consideration The following abstract characterization of Mα (n) is known. Lemma 1.1. ([5]) Assume that n ∈ N and α > 0. Then the following properties are equivalent: (i) g ∈ Mα (n); (ii) g(z)(1 − hz, ζi)−α ∈ Kα (n) for all ζ ∈ ∂Bn , and ) (
g(z)
: ζ ∈ ∂Bn < ∞. sup
(1 − hz, ζi)α Kα (n)
(1.1)
In the present paper, we are interested in explicit analytic conditions on a function g ∈ Hol(Bn ) which imply g ∈ Mα (n) when n ≥ 2 and α > 0. 1.5. Comments 1.5.1. The spaces Kα (n) generalize the standard family Kn (n) of Cauchy integrals. Investigations of the family K1 (1) as a Banach space were initiated by V. P. Havin [7, 8]. Main results about M1 (1) were obtained in [20, 19, 11]. The classical families K1 (1) and M1 (1) are investigated in the recent monograph [4]. The spaces Kα (1), α > 0, were introduced by T. H. MacGregor [13]. Main results about Mα (1), α > 0, were obtained in [9, 6, 12, 10]. Various properties of the spaces Kα (1) and Mα (1) are collected in the recent monograph [10]. See [4] and [10] for historical remarks, further references and motivations. 1.5.2. Certain basic properties of Mα (n), n ∈ N, are proved in [5]. In particular, Mα (n) ⊂ Kα (n) and Mα (n) ⊂ H ∞ (Bn ) for all n ∈ N and α > 0. Here H ∞ (Bn ) denotes the space of bounded holomorphic functions in the ball. To the best knowledge of the author, the spaces Mα (n), n ≥ 2, have not been investigated systematically.
Vol. 64 (2009)
Multipliers of Fractional Cauchy Transforms
179
1.5.3. Families of fractional Cauchy transforms are closely related with holomorphic Sobolev spaces in the ball. The multipliers of holomorphic Besov spaces were investigated in [14]; see also [15]. The multipliers of Hardy–Sobolev spaces were recently studied in [16, 3, 18]. 1.6. Organization of the paper Auxiliary results are collected in Section 2. General properties of the families Mα (n), n ∈ N, α > 0, are obtained in Sections 3 and 4. The main results of this paper are presented in Sections 5 and 6. It is proved in Section 5 that various Lipschitz and Hardy–Sobolev restrictions on g ∈ Hol(Bn ) guarantee that g ∈ Mα (n). Further results are obtained in Section 6. For example, the following assertion is a particular case of Theorem 6.1. Theorem 1.2. Let n ∈ N. Suppose that n > α > n − 1, g ∈ Hol(Bn ) and Z 1 |gξ0 (r)|(1 − r)α−n dr < +∞, sup ξ∈∂Bn
0
where gξ (w) = g(wξ) for w ∈ B1 . Then g ∈ Mα (n). For n = 1, Theorem 1.2 is proved in [12, Theorem 2]; it generalizes several results from [6].
2. Auxiliary results 2.1. Basic results Let σ = σn denote the normalized Lebesgue measure on the sphere ∂B = ∂Bn . In the following lemma, the notation a(z) ≈ b(z) means that the quotient a(z)/b(z) has a finite positive limit as |z| → 1−. Lemma 2.1. ([17, Proposition 1.4.10]) Let n ∈ N and let c ∈ R. Put Z dσn (ζ) , z ∈ Bn. Jc (z) = n+c ∂Bn |1 − hz, ζi| (i) If c < 0, then Jc (z) is bounded in B n . (ii) If c > 0, then Jc (z) ≈ (1 − |z|2 )−c . (iii) Finally, J0 (z) ≈ log
1 . (1 − |z|2 )
Recall that the radial derivative R : Hol(Bn ) → Hol(Bn ) is defined by the identity n X ∂f Rf (z) = zj (z), z ∈ Bn . ∂z j j=1 The radial differential operator of order 1 is defined as R1 = R + I. For 0 < p ≤ +∞, let H p (Bn ) denote the Hardy class in the ball Bn .
180
Doubtsov
IEOT
Lemma 2.2. ([1, Chapter 2, Theorem 1.3.3], see also [2, Theorem 5.13]) Assume that n ∈ N, p1 , p2 ∈ (0, +∞) and n n − = 1. p2 p1 If f ∈ Hol(Bn ) and R1 f ∈ H p2 (Bn ), then f ∈ H p1 (Bn ). 2.2. Families of fractional Cauchy transforms For n ∈ N, denote by K0 = K0 (n) the family of functions f such that Z 1 f (z) − f (0) = dµ(ζ), z ∈ Bn , log 1 − hz, ζi ∂Bn for a measure µ ∈ M(n). Lemma 2.3. ([5]) Let n ∈ N. (i) If α > 0, β > 0, then Kα (n) · Kβ (n) ⊂ Kα+β (n). (ii) If 0 ≤ α < β, then Kα (n) ⊂ Kβ (n). Lemma 2.4. ([5]) Assume that n ∈ N, f ∈ Hol(Bn ) and α ≥ 0. Then f ∈ Kα (n) if and only if Rf ∈ Kα+1 (n). Assume that n ∈ N, j ∈ N and γ > 0. Denote by Bγj (Bn ) the space of functions f ∈ Hol(Bn ) for which Z 1Z X ∂mf kf kBγj (Bn ) = |Rj f (rζ)|(1 − r)γ−1 dσn (ζ) dr < +∞, ∂z m (0) + |m|≤j−1
0
∂Bn
where m = (m1 , . . . , mn ) ∈ Zn+ and |m| = m1 + · · · + mn . The Besov space Bγj (Bn ) with the norm k · kBγj (Bn ) is a Banach space (cf. [21, Proposition 6.2]). Lemma 2.5. ([5]) Suppose that n ∈ N, j ∈ {1, . . . , n} and α > n − j. If f ∈ j Bα−n+j (Bn ), then kf kKα (n) ≤ Ckf kBj (Bn ) , α−n+j
where the constant C > 0 does not depend on f . 2.3. Multiplier spaces Lemma 2.6. ([5]) If n ∈ N and 0 < α < β, then Mα (n) ⊂ Mβ (n). 2.4. Lipschitz spaces Fix β ∈ (0, 1). By definition, a function f : B n → C is in the real Lipschitz space LipR β (Bn ) if there exists a constant C > 0 such that |f (z) − f (w)| ≤ C|z − w|β ,
z, w ∈ B n .
Fix α ∈ (0, 1/2). By definition, a function f : B n → C is in the complex Lipschitz space LipC α (Bn ) if there exists a constant C > 0 such that |f (z) − f (w)| ≤ C|1 − hz, wi|α ,
z, w ∈ B n .
Vol. 64 (2009)
Multipliers of Fractional Cauchy Transforms
181
Lemma 2.7. Let n ∈ N. Assume that 0 < β < 1, f ∈ Hol(Bn ) and |Rf (rζ)| ≤
C , (1 − r)1−β
r ∈ [0, 1), ζ ∈ ∂Bn .
(2.1)
Then f ∈ LipC γ (Bn ), where 0 < γ < min{1/2, β}. Proof. Given an f ∈ Hol(Bn ) with property (2.1), let the same symbol denote the continuous extension of f to the closed ball B n . Such extension exists by [17, Theorem 6.4.10]; moreover, (2.1) guarantees that f ∈ LipR β (Bn ). Therefore, |f (z) − f (w)| ≤ Cγ |1 − hz, wi|γ ,
z, w ∈ B n ,
where 0 < γ < 1/2 and 0 < γ ≤ β (see [17, Theorem 6.4.10] and [1, Chapter 3, Corollary 3.2.4]).
3. Multipliers and the family K0 (n) Proposition 3.1. Let n ∈ N. Then Mβ (n) ∩ K0 (n) = Mα (n) ∩ K0 (n) for all β ≥ α > 0. Proof. Assume that α ≤ β ≤ βe and βe−α ∈ N. We have Mα (n) ⊂ Mβ (n) ⊂ Mβe(n) by Lemma 2.6. Thus, it suffices to prove the proposition under the additional assumption β − α ∈ N. Hence, we may assume, without loss of generality, that β = α + 1. So, suppose that g ∈ Mα+1 (n) ∩ K0 (n). We have to prove that g ∈ Mα (n). In other words, given a function f ∈ Kα (n), we must prove that f g ∈ Kα (n). By Lemma 2.4, f g ∈ Kα (n) if and only if f Rg + gRf = R(f g) ∈ Kα+1 (n). On the one hand, g ∈ K0 (n) implies Rg ∈ K1 (n) by Lemma 2.4. Therefore, f Rg ∈ Kα (n) · K1 (n) ⊂ Kα+1 (n) by Lemma 2.3. On the other hand, f ∈ Kα (n) implies Rf ∈ Kα+1 (n) by Lemma 2.4. Thus, gRf ∈ Mα+1 (n) · Kα+1 (n) ⊂ Kα+1 (n) by the definition of the multiplier space. Finally, we obtain R(f g) ∈ Kα+1 (n) and f g ∈ Kα (n), as required.
4. General sufficient conditions The results of this section are motivated by [12, Theorem 1], where the families Mα (1), 0 < α < 1, are investigated. If n = 1, then the corresponding sufficient conditions are known to be quite close to related necessary conditions (see [12] for further details). Theorem 4.1. Let n ∈ N. Assume that j ∈ {1, . . . , n}, α > n − j, g ∈ Hol(Bn ) ∩ LipC ε (Bn )
182
Doubtsov
IEOT
for some ε ∈ (0, 1/2) and Z
1
Z
Iα (g, j, k) = sup ζ∈∂Bn
0
∂Bn
|Rk g(rξ)|(1 − r)α+j−n−1 dσn (ξ) dr < ∞ |1 − rhξ, ζi|α+j−k
for k = 1, . . . , j. Then g ∈ Mα (n). Proof. First, we prove the following claim. Claim. For ζ ∈ ∂Bn , put hζ (z) =
g(z) − g(ζ) , (1 − hz, ζi)α
z ∈ Bn .
(4.1)
Then khζ kKα (n) ≤ C,
(4.2)
where the constant C > 0 does not depend on ζ ∈ ∂Bn . Proof of the claim. The definition of hζ (z) implies that Rj hζ (z), z ∈ Bn , is a linear combination of the following terms: 1 k j−k Qk (ζ, z) = R g(z) · R , z ∈ Bn , k = 1, . . . , j, (1 − hz, ζi)α 1 j , z ∈ Bn . Q0 (ζ, z) = (g(z) − g(ζ)) · R (1 − hz, ζi)α Below we estimate the integrals Z 1Z |Qk (ζ, rξ)|(1 − r)(α+j−n)−1 dσn (ξ) dr, 0
k = 0, . . . , j.
∂Bn
1. By the definition of Qj (ζ, z), z ∈ Bn , we have Z 1Z |Qj (ζ, rξ)|(1 − r)(α+j−n)−1 dσn (ξ) dr 0
∂Bn 1Z
|Rj g(rξ)|(1 − r)α+j−n−1 dσn (ξ) dr |1 − rhξ, ζi|α 0 ∂Bn ≤ Iα (g, j, j). Z
≤
2. Note that R
1 (1 − hz, ζi)α
=
−α α + . (1 − hz, ζi)α (1 − hz, ζi)α+1
Hence, 1 R (1 − hz, ζi)α is a linear combination of the fractions 1 , m = 0, . . . , j. (1 − hz, ζi)α+m j
(4.3)
Vol. 64 (2009)
Multipliers of Fractional Cauchy Transforms
183
To estimate the integral (4.3) with k = 0, it suffices to consider the case m = j, since |1 − hz, ζi| ≤ 2. Recall that g ∈ LipC ε (Bn ). Assume, without loss of generality, that α+j −ε 6= n. Then the definition of the space LipC ε (Bn ) and Lemma 2.1 imply the following chain of inequalities: Z 1Z |g(rξ) − g(ζ)| dσn (ξ)(1 − r)α+j−n−1 dr α+j |1 − rhξ, ζi| 0 ∂Bn Z 1Z C ≤ dσn (ξ)(1 − r)α+j−n−1 dr |1 − rhξ, ζi|α+j−ε 0 ∂Bn Z 1 Z 1 (1 − r)α+j−n−1 dr, (1 − r)α+j−n−1−α−j+ε+n dr ≤ C max 0
0
≤C because α + j − n − 1 > −1 and −1 + ε > −1. So, we have Z 1Z |Q0 (ζ, rξ)|(1 − r)(α+j−n)−1 dσn (ξ) dr ≤ C, 0
∂Bn
where the constant C > 0 does not depend on ζ ∈ ∂Bn . 3. If j ≥ 2, then we have to consider the integrals (4.3) with k = 1, . . . , j − 1. The derivative 1 Rj−k (1 − hz, ζi)α is a linear combination of the fractions 1 , (1 − hz, ζi)α+m
m = 0, . . . , j − k.
As above, to estimate the integral (4.3), it suffices to consider the case m = j − k. Now, note that Z 1Z |Rk g(rξ)|(1 − r)α+j−n−1 dσn (ξ) dr ≤ Iα (g, j, k). |1 − rhξ, ζi|α+j−k 0 ∂Bn So, we have Z 1Z 0
|Qk (ζ, rξ)|(1 − r)(α+j−n)−1 dσn (ξ) dr ≤ C,
k = 1, . . . , j − 1,
∂Bn
where the constant C > 0 does not depend on ζ ∈ ∂Bn . So, all integrals (4.3) are bounded by a universal constant C > 0. Thus, Z 1Z |Rj hζ (rξ)|(1 − r)(α+j−n)−1 dσn (ξ) dr ≤ C, 0
∂Bn
184
Doubtsov
IEOT
where C > 0 does not depend on ζ ∈ ∂Bn . Also, we have X X ∂ m hζ ∂z m (0) ≤ C kgkH ∞ (Bn ) +
|m|≤j−1
|m|≤j−1
Therefore, we obtain khζ kBj
m ∂ g ∂z m (0) .
≤ C. Finally, since α > n − j, Lemma 2.5 guar-
α+j−n
antees that (4.2) holds.
Now, we return to the proof of the theorem. Let ζ ∈ ∂Bn . We have g(z) g(ζ) = + hζ (z), (1 − hz, ζi)α (1 − hz, ζi)α
z ∈ Bn ,
where hζ (z) is defined by (4.1). Note that
g(ζ)
= |g(ζ)| ≤ kgkH ∞ (Bn ) .
(1 − hz, ζi)α Kα (n)
Therefore, applying the claim, we obtain
g(z)
(1 − hz, ζi)α
≤ C,
Kα (n)
where the constant C > 0 does not depend on ζ ∈ ∂Bn . Finally, Lemma 1.1 guarantees that g ∈ Mα (n). Corollary 4.2. Let n ∈ N. (i) Assume that α > n − 1 and g ∈ Hol(Bn ) ∩ LipC ε (Bn ) for some ε ∈ (0, 1/2). If Iα (g, 1, 1) < +∞, then g ∈ Mα (n). (ii) Assume that j ∈ {2, . . . , n}, α > n − j, g ∈ Hol(Bn ) and Rj−1 g ∈ H ∞ (Bn ). If Iα (g, j, j) < +∞, then g ∈ Mα (n). Proof. Part (i). Theorem 4.1 applies. Part (ii). Lemma 2.7 yields Rk g ∈ H ∞ (Bn ) for k = 1, . . . , j − 1. Also, Lemma 2.7 guarantees that g ∈ LipC ε (Bn ), 0 < ε < 1/2. So, to prove part (ii), it suffices to verify that Iα (g, j, k) < +∞ for k = 1, . . . , j − 1. Let ζ ∈ ∂Bn . By Lemma 2.1, Z 1Z |Rk g(rξ)|(1 − r)α+j−n−1 dσn (ξ) dr |1 − rhξ, ζi|α+j−k 0 ∂Bn Z 1Z kRk gkH ∞ (Bn ) dσn (ξ) ≤ (1 − r)α+j−n−1 dr |1 − rhξ, ζi|α+j−k ∂Bn 0 Z 1 Z 1 1 ≤ C max (1 − r)α+j−n−1 dr, (1 − r)α+j−n−1−α−j+k− 2 +n dr 0
0
≤C because α + j − n − 1 > −1 and k − 3/2 ≥ −1/2. In other words, Iα (g, j, k) < +∞ and Theorem 4.1 is applicable.
Vol. 64 (2009)
Multipliers of Fractional Cauchy Transforms
185
5. Smoothness conditions and Mα (n) 5.1. Holomorphic Lipschitz functions Below we assume that R0 = I. Corollary 5.1. Let n ∈ N. Suppose that j ∈ {1, . . . , n}, n + 1 − j > α > n − j, g ∈ Hol(Bn ) and Rj−1 g ∈ LipR β (Bn )
for some β ∈ (n + 1 − j − α, 1).
Then g ∈ Mα (n). Proof. Note that β > 0. Since Rj−1 g ∈ LipR β (Bn ), we obtain |Rj g(rξ)| ≤
C , (1 − r)1−β
r ∈ [0, 1), ξ ∈ ∂Bn ,
by [17, Theorem 6.4.9]. So, on the one hand, Lemma 2.7 guarantees that g ∈ LipC ε (Bn ) for some ε ∈ (0, 1/2). On the other hand, applying Lemma 2.1, we have Z 1Z |Rj g(rξ)|(1 − r)α+j−n−1 dσn (ξ) dr |1 − rhξ, ζi|α 0 ∂Bn Z 1Z Cdσn (ξ) ≤ (1 − r)α+β+j−n−2 dr |1 − rhξ, ζi|α 0 ∂Bn Z 1 ≤C (1 − r)α+β+j−n−2 dr 0
≤C because n > α and α + β + j − n − 2 > −1. Hence, Iα (g, j, j) < +∞. So, all hypotheses of Corollary 4.2 are satisfied. Finally, g ∈ Mα (n) by Corollary 4.2. Corollary 5.2. Let n ∈ N. Suppose that g ∈ Hol(Bn )∩LipR β (Bn ) for some β ∈ (0, 1). Then g ∈ Mn (n). Proof. Put j = 1 in Corollary 5.1 and apply Lemma 2.6.
5.2. Lipschitz functions and Hardy–Sobolev functions Let j ∈ N. The fractional differential operator of order j is defined as Rj = (R+I)j . Also, we assume that R0 = I. Given 0 < p < ∞, the Hardy–Sobolev space Hjp (Bn ) is defined by the identity Hjp (Bn ) = g ∈ Hol(Bn ) : Rj g ∈ H p (Bn ) . Corollary 5.3. Let n ∈ N and let β ∈ (0, 1). Assume that one of the following properties holds: (i) g ∈ K0 (Bn ) ∩ LipR β (Bn ); 1 (ii) g ∈ Hn (Bn ) ∩ LipR β (Bn ); (iii) g ∈ Hnp (Bn ) for some p > 1. Then g ∈ Mα (n) for all α > 0.
186
Doubtsov
IEOT
Proof. Assume that (i) holds. By Corollary 5.2, we obtain g ∈ Mn (n). Hence, g ∈ Mα (n) for all α > 0 by Proposition 3.1. Next, assume that Rn g ∈ H 1 (Bn ). By Lemma 2.2, we have Rn g ∈ H 1 (Bn ) ⊂ Kn (n). Therefore, repeated application of Lemma 2.4 guarantees that g ∈ K0 (n). So, (ii) implies (i). Now, assume that (iii) holds. By induction, Lemma 2.2 guarantees that Rk g ∈ H pk (Bn ) for some pk > n/k, where k = n, . . . , 1. Also, we may assume, without loss of generality, that pk ≥ pk+1 for k = 1, . . . , n − 1 when n ≥ 2. So, we obtain Rg ∈ H p1 (Bn ) with p1 > n. Now, [17, Theorem 7.2.5] yields |Rg(rξ)| ≤
C , (1 − r)n/p1
r ∈ [0, 1), ξ ∈ ∂Bn .
Since n/p1 < 1, Lemma 2.7 guarantees that g ∈ LipC ε (Bn ), where 0 < ε < min{1/2, 1−n/p1 }. So, (iii) implies (ii). The proof of the corollary is complete. 5.3. Comments R 5.3.1. It is well-known that Hn1 (Bn ) 6⊂ LipR β (Bn ) and Hol(Bn ) ∩ Lipβ (Bn ) 6⊂ Hn1 (Bn ) for any β ∈ (0, 1) (cf. property (ii) from Corollary 5.3). 5.3.2. Assume that n − 1 < α < n. Then Corollary 5.1 with j = 1 guarantees that g ∈ Mα (n) if g ∈ LipR β (Bn ) for some β ∈ (n − α, 1). For n = 1, this result was obtained in [6, Corollary 4]. The nature of Corollary 5.3 is different. Namely, the additional assumption g ∈ K0 (n) guarantees that g ∈ Mα (n) for all α > 0 if g ∈ LipR β (Bn ) for an arbitrarily small β ∈ (0, 1). 5.3.3. It would be interesting to know whether g ∈ Hn1 (Bn ) implies that g ∈ Mα (n) for all α > 0 when n ≥ 2 (cf. properties (ii) and (iii) from Corollary 5.3). Note that the above implication is known to be true when n = 1 (see [19] and [9]). 5.3.4. If q < 1, then Hnq (Bn ) 6⊂ Mα (n) for all α > 0 (cf. property (iii) from Corollary 5.3). Indeed, by Lemmas 2.3 and 2.4, we have Rn K0 (n) ⊂ Kn (n) ⊂ H p (Bn ) for all p ∈ (0, 1). Hence, K0 (n) ⊂ Hnq (Bn ). It remains to observe that Mα (n) ⊂ H ∞ (Bn ) for all α > 0 (see Section 1.5.2) but K0 (n) 6⊂ H ∞ (Bn ); thus, K0 (n) 6⊂ Mα (n) and Hnq (Bn ) 6⊂ Mα (n) for all α > 0. 5.4. Hardy–Sobolev functions Corollary 5.4. Let n ∈ N. Suppose that j ∈ {1, . . . , n}, α > n − j and g ∈ Hjp (Bn ) for some p > n/j. Then g ∈ Mα (n). Proof. By hypothesis, Rj g ∈ H pj (Bn ) for some pj > n/j. By induction, Lemma 2.2 guarantees that Rk g ∈ H pk (Bn ) for some pk > n/k, where k = j, . . . , 1. Also, we may assume, without loss of generality, that pk ≥ pk+1 for k = 1, . . . , j − 1 when j ≥ 2. So, we obtain Rk g ∈ H pk (Bn ) for some pk > n/k, where k = 1, . . . , j.
Vol. 64 (2009)
Multipliers of Fractional Cauchy Transforms
187
1. We have Rg ∈ H p (Bn ) for some p = p1 > n. So, [17, Theorem 7.2.5] yields |Rg(rξ)| ≤
C , (1 − r)n/p
r ∈ [0, 1), ξ ∈ ∂Bn .
Since n/p < 1, Lemma 2.7 guarantees that g ∈ LipC ε (Bn ), where 0 < ε < min{1/2, 1 − n/p}. −1 2. Let k ∈ {1, . . . , j}. Given pk ∈ (n/k, +∞), assume that p−1 k +qk = 1. Then k pk k 1 < qk < n/(n − k). If R g ∈ H (Bn ) for some pk > n/k, then R g ∈ H pek (Bn ) for all pek ∈ (n/k, pk ). Therefore, without loss of generality, we may assume that (α + j − k)qk 6= n. Let ζ ∈ ∂Bn . Put 1/qk Z dσn (ξ) . I(r, α, qk ) = (α+j−k)qk ∂Bn |1 − rhξ, ζi| Lemma 2.1 guarantees that n o n −α−j+k I(r, α, qk ) ≤ C max 1, (1 − r) qk . Indeed, if (α + j − k)qk < n, then I(r, α, qk ) ≤ C; if (α + j − k)qk > n, then n −α−j+k . I(r, α, qk ) ≤ C(1 − r) qk Thus, applying H¨ older’s inequality, we obtain Z 1 Z |Rk g(rξ)| dσn (ξ) dr (1 − r)α+j−n−1 α+j−k 0 ∂Bn |1 − rhξ, ζi| Z 1 ≤ (1 − r)α+j−n−1 kRk gkH pk (Bn ) I(r, α, qk ) dr 0 Z 1 Z 1 α+j−n−1+ qn −α−j+k α+j−n−1 k dr ≤ C max (1 − r) dr, (1 − r) 0
0
≤C because α + j − n − 1 > −1 and qnk + k − n − 1 > −1, respectively. In other words, Iα (g, j, k) < +∞ for k = 1, . . . , j. To finish the proof of the corollary, it remains to apply Theorem 4.1. 5.5. Comments 5.5.1. If n = 1 or j = n, then Corollary 5.4 is a particular case of Corollary 5.3. So, assume that n ≥ 2. Then, by Lemma 2.2, the assumption g ∈ H1p (Bn ) for some p > n is the weakest among the following properties: p
g ∈ Hj j (Bn )
for some pj > n/j, j = 1, . . . , n.
5.5.2. Corollary 5.4 does not imply Corollary 5.1 and vice versa.
188
Doubtsov
IEOT
6. Further results 6.1. Radial variations Theorem 6.1. Let n ∈ N. Suppose that j ∈ {1, . . . , n}, n − j + 1 > α > n − j, g ∈ Hol(Bn ) and Z 1 |Rj g(rξ)|r−1 (1 − r)α+j−n−1 dr < +∞. Jα (g, j) = sup ξ∈∂Bn
0
Then g ∈ Mα (n). Proof. Fix ζ ∈ ∂Bn . Assume that ξ ∈ ∂Bn and ζ 6= ξ. For r ∈ [0, 1], put Z r u(r) = |Rj g(ρξ)|(1 − ρ)α+j−n−1 dρ and 0
v(r) = |1 − rhξ, ζi|−α . On the one hand, we have u0 (r) = |Rj g(rξ)|(1 − r)α+j−n−1 . On the other hand, v(r) = |f (r)|, where the function f (λ) =
1 (1 − λhξ, ζi)α
is holomorphic in a neighborhood of B1 ∪ [0, 1] ⊂ C. Since f (r) 6= 0, we obtain ∂|f (λ)| C 0 (r) ≤ |f 0 (r)| ≤ . |v (r)| = ∂r |1 − rhξ, ζi|α+1 So, integrating by parts, we have Z 1 j |R g(rξ)|(1 − r)α+j−n−1 dr |1 − rhξ, ζi|α 0 R1 j Z 1 Rr j |R g(ρξ)|(1 − ρ)α+j−n−1 dρ |R g(ρξ)|(1 − ρ)α+j−n−1 dρ 0 0 ≤ + dr |1 − hξ, ζi|α |1 − rhξ, ζi|α+1 0 Z 1 Jα (g, j) dr + Jα (g, j) . ≤ α α+1 |1 − hξ, ζi| 0 |1 − rhξ, ζi| We consider integrals of non-negative functions, thus, Fubini’s theorem and Lemma 2.1 guarantee that Z Z 1 j |R g(rξ)|(1 − r)α+j−n−1 dr dσn (ξ) |1 − rhξ, ζi|α ∂Bn 0 Z Z 1Z dσn (ξ) dσn (ξ) ≤ Jα (g, j) + J (g, j) dr α α |1 − hξ, ζi| |1 − rhξ, ζi|α+1 ∂Bn 0 ∂Bn Z 1 n−α−1 ≤ CJα (g, j) 1 + max 1, (1 − r) dr 0
≤ CJα (g, j)
Vol. 64 (2009)
Multipliers of Fractional Cauchy Transforms
189
because n > α. Since the above constant C > 0 does not depend on ζ ∈ ∂Bn , applying Fubini’s theorem, we obtain Iα (g, j, j) < +∞.
(6.1)
Now, put h(z) = Rj−1 g(z), z ∈ Bn . Also, for ζ ∈ ∂Bn , put hζ (w) = h(wζ), w ∈ B1 . Recall that hζ is said to be a slice function. Observe that Rj g(rλζ) = Rh(rλζ) = rλh0ζ (rλ) for r ∈ [0, 1) and λ ∈ ∂B1 . Therefore, Z 1 Jα (hζ ) = sup |h0ζ (rλ)|(1 − r)α+j−n−1 dr ≤ Jα (g, j) < +∞. (6.2) λ∈∂B1
0
By [10, Theorem 6.13], for every ζ ∈ ∂Bn , the function hζ extends continuously to B1 and hζ satisfies the Lipschitz condition hζ (ei(θ+t) ) − hζ (eiθ ) ≤ C(α)Jα (hζ )tn+1−α−j ≤ C(α)Jα (g, j)tn+1−α−j for h > 0 and θ ∈ R. Also, the hypothesis Jα (g, j) < +∞ implies Rj−1 g ∈ H ∞ (Bn ) because n + 1 − α − j > 0. If j 6= 1, then, applying Corollary 4.2, we complete the proof of the theorem. If j = 1, then g = h ∈ H ∞ (Bn ) and (6.2) holds with g in place of h. Hence, [17, Theorem 6.4.9] guarantees that C |Rg(rξ)| ≤ , r ∈ [0, 1), ξ ∈ ∂Bn . (1 − r)α+j−n Therefore, by Lemma 2.7, we have g ∈ LipC ε (Bn ) for 0 < ε < min{1/2, n+1−α−j}. By (6.1), all hypotheses of Corollary 4.2 are fulfilled. So, to finish the proof, it remains to apply Corollary 4.2. 6.2. Comments 6.2.1. For n = 1, Theorem 6.1 was obtained in [12, Theorem 2]. 6.2.2. Assume that n ∈ N, j ∈ {1, . . . , n}, n − j + 1 > α > n − j and g ∈ Hol(Bn ). Observe that Jα (g, j) < +∞ if and only if Z 1 sup |Rj g(rξ)|(1 − r)α+j−n−1 dr < +∞. ξ∈∂Bn
0
6.2.3. Theorem 6.1 implies Corollary 5.1. Indeed, suppose that n ∈ N, j ∈ {1, . . . , n}, n − j + 1 > α > n − j, g ∈ Hol(Bn ) and Rj−1 g ∈ LipR β (Bn )
for some β ∈ (n + 1 − j − α, 1).
Then β > 0 and |Rj g(rξ)| ≤
C , (1 − r)1−β
r ∈ [0, 1), ξ ∈ ∂Bn ,
by [17, Theorem 6.4.9]. Hence, Z 1 Z 1 sup |Rj g(rξ)|(1 − r)α+j−n−1 dr ≤ C (1 − r)α+j+β−n−2 dr < +∞ ξ∈∂Bn
0
0
190
Doubtsov
IEOT
because α + j + β − n − 2 > −1. 6.2.4. Let α > 0. It is proved in [5] that g ∈ Mα (n) implies Z 1 sup |Rg(rξ)| dr < +∞. ξ∈∂Bn
0
On the other hand, Section 6.2.2 and Lemma 2.6 guarantee that g ∈ Mn (n) if Z 1 sup |Rg(rξ)|(1 − r)−β dr < +∞ ξ∈∂Bn
0
for some β > 0. 6.3. Slice functions The last result concerns the second differences of slice functions. Given f : ∂B1 → C and t ∈ R, let D(f, t) = f (eit ) − 2f (1) + f (e−it ). Corollary 6.2. Let n ∈ N. Suppose that j ∈ {1, . . . , n}, n − j + 1 > α > n − j, g ∈ Hol(Bn ) and h = Rj−1 g ∈ H ∞ (Bn ). For ξ ∈ ∂Bn , put hξ (w) = h(wξ), w ∈ B 1 . If Z π |D(hξ , t)| Dα (h) = sup dt < +∞, n+2−α−j ξ∈∂Bn 0 t then g ∈ Mα (n). Proof. Fix ξ ∈ ∂Bn . Note that hξ ∈ H ∞ (B1 ). Hence, as shown in the proof of [12, Theorem 3], we have Z 1 Z π |D(hξ , t)| |h0ξ (r)|(1 − r)α+j−n−1 dr ≤ C dt. n+2−α−j 0 0 t Since |Rj g(rξ)| = |Rh(rξ)| = |rh0ξ (r)|, we obtain Z Jα (g, j) = sup ξ∈∂Bn
1
|Rj g(rξ)|r−1 (1 − r)α+j−n−1 dr ≤ CDα (h) < +∞.
0
Finally, g ∈ Mα (n) by Theorem 6.1.
6.4. Comments 6.4.1. For n = 1, Corollary 6.2 was obtained in [12, Theorem 3]; see also [20, 6]. 6.4.2. Corollary 6.2 implies Corollary 5.1.
Vol. 64 (2009)
Multipliers of Fractional Cauchy Transforms
191
References [1] A. B. Aleksandrov, Function theory in the ball, Current problems in mathematics. Fundamental directions, vol. 8, Itogi Nauki i Tekhniki, Akad. Nauk SSSR Vsesoyuz. Inst. Nauchn. i Tekhn. Inform., Moscow, 1985, pp. 115–190, 274 (Russian); English transl.: G. M. Khenkin and A. G. Vitushkin (Eds.), Several Complex Variables II, Encyclopaedia Math. Sci., vol. 8, Springer–Verlag, Berlin, 1994, pp. 107–178. [2] F. Beatrous and J. Burbea, Holomorphic Sobolev spaces on the ball, Dissertationes Math. (Rozprawy Mat.) 276 (1989), 60pp. [3] F. Beatrous and J. Burbea, On multipliers for Hardy–Sobolev spaces, Proc. Amer. Math. Soc. 136 (2008), no. 6, 2125–2133. [4] J. A. Cima, A. L. Matheson, and W. T. Ross, The Cauchy transform, Mathematical Surveys and Monographs, vol. 125, American Mathematical Society, Providence, RI, 2006. [5] E. S. Dubtsov, Families of fractional Cauchy transforms in the ball, Algebra i Analiz, to appear. [6] D. J. Hallenbeck, T. H. MacGregor, and K. Samotij, Fractional Cauchy transforms, inner functions and multipliers, Proc. London Math. Soc. (3) 72 (1996), no. 1, 157– 187. [7] V. P. Havin, On analytic functions representable by an integral of Cauchy–Stieltjes type, Vestnik Leningrad. Univ. Ser. Mat. Meh. Astr. 13 (1958), no. 1, 66–79 (Russian). [8] V. P. Havin, Relations between certain classes of functions regular in the unit circle, Vestnik Leningrad. Univ. 17 (1962), no. 1, 102–110 (Russian). [9] R. A. Hibschweiler and T. H. MacGregor, Multipliers of families of Cauchy–Stieltjes transforms, Trans. Amer. Math. Soc. 331 (1992), no. 1, 377–394. [10] R. A. Hibschweiler and T. H. MacGregor, Fractional Cauchy transforms, Chapman & Hall/CRC Monographs and Surveys in Pure and Applied Mathematics, vol. 136, Chapman & Hall/CRC, Boca Raton, FL, 2006. [11] S. V. Hruˇsˇcev and S. A. Vinogradov, Inner functions and multipliers of Cauchy type integrals, Ark. Mat. 19 (1981), no. 1, 23–42. [12] D. Luo and T. MacGregor, Multipliers of fractional Cauchy transforms and smoothness conditions, Canad. J. Math. 50 (1998), no. 3, 595–604. [13] T. H. MacGregor, Analytic and univalent functions with integral representations involving complex measures, Indiana Univ. Math. J. 36 (1987), no. 1, 109–130. [14] J. M. Ortega and J. F` abrega, Pointwise multipliers and decomposition theorems in analytic Besov spaces, Math. Z. 235 (2000), no. 1, 53–81. [15] J. M. Ortega and J. F` abrega, Pointwise multipliers and decomposition theorems in Fs∞,q , Math. Ann. 329 (2004), no. 2, 247–277. [16] J. M. Ortega and J. F` abrega, Multipliers in Hardy–Sobolev spaces, Integral Equations Operator Theory 55 (2006), no. 4, 535–560. [17] W. Rudin, Function theory in the unit ball of Cn , Grundlehren der Mathematischen Wissenschaften [Fundamental Principles of Mathematical Science], vol. 241, Springer-Verlag, New York, 1980. [18] P. Ryan and M. Stoll, Hardy–Sobolev spaces and algebras of holomorphic functions on the unit ball in Cn , Complex Var. Elliptic Equ. 53 (2008), no. 6, 565–584.
192
Doubtsov
IEOT
[19] S. A. Vinogradov, Properties of multipliers of integrals of Cauchy–Stieltjes type, and some problems of factorization of analytic functions, Mathematical programming and related questions (Proc. Seventh Winter School, Drogobych, 1974), Theory of ` functions and functional analysis (Russian), Central Ekonom.-Mat. Inst. Akad. Nauk SSSR, Moscow, 1976, pp. 5–39; English transl.: Amer. Math. Soc. Transl. (2) 115 (1980), 1–32. [20] S. A. Vinogradov, M. G. Goluzina, and V. P. Havin, Multipliers and divisors of Cauchy–Stieltjes type integrals, Zap. Nauˇcn. Sem. Leningrad. Otdel. Mat. Inst. Steklov. (LOMI) 19 (1970), 55–78 (Russian); English transl.: Seminars in Math., V. A. Steklov Math. Inst., Leningrad 19 (1972), 29–42. [21] K. Zhu, Spaces of holomorphic functions in the unit ball, Graduate Texts in Mathematics, vol. 226, Springer-Verlag, New York, 2005. Evgueni Doubtsov St. Petersburg Department of V.A. Steklov Mathematical Institute Fontanka 27 St. Petersburg 191023 Russia e-mail:
[email protected] Submitted: September 1, 2008.
Integr. equ. oper. theory 64 (2009), 193–201 c 2009 Birkh¨
auser Verlag Basel/Switzerland 0378-620X/020193-9, published online May 12, 2009 DOI 10.1007/s00020-009-1684-z
Integral Equations and Operator Theory
Spectral Radius Algebras of Idempotents John David Herron Abstract. We show that the spectral radius algebras of certain quadratic operators possess nontrivial invariant subspaces. Additionally, such algebras properly contain the operator’s commutant, so that the invariant subspaces are in some sense beyond hyperinvariant. The spectral radius algebras of idempotents are completely described and, as a consequence, it is shown that every intransitive collection of operators must be contained in a norm-closed proper spectral radius algebra. Mathematics Subject Classification (2000). Primary 47A15. Keywords. Spectral radius algebra, idempotent, invariant subspace.
1. Introduction Let H be a separable infinite-dimensional complex Hilbert space, and denote by L(H) the algebra of bounded linear operators on H. By a subspace of H we mean a closed linear manifold in H, and a subspace M is said to be invariant under an operator T if T M ⊆ M . If A is a subset of L(H), we say that M is invariant under A if it is invariant under every operator in A. A nontrivial invariant subspace is one that is not equal to H nor {0}, and the lattice of all invariant subspaces of a collection A is denoted Lat A. The invariant subspace problem is the question as to whether every bounded linear operator on H has a nontrivial invariant subspace. Among the central results concerning this open problem is a 1973 result by V.I. Lomonosov: 0
Theorem 1.1. [6] If K ∈ L(H) is a nonzero compact operator, then {K} has a nontrivial invariant subspace. In other words, every operator commuting with a nonzero compact operator must have a nontrivial invariant subspace. More recently, a new class of operator algebra was introduced in [5] that allowed for a generalization of Lomonosov’s result. In [5] Alan Lambert and Srdjan Petrovic define the spectral algebra (or
194
Herron
IEOT
spectral radius algebra as it is called in [2]) of a bounded linear operator T with spectral radius r(T ) to be the unital subalgebra
−1 <∞ , BT = S ∈ L(H) : sup Rm SRm m
where, for each positive integer m, Rm = Rm (T ) =
∞ X
!1/2 ∗ n n d2n m (T ) T
n=0
and
1 . 1/m + r(T ) The study of such algebras is motivated by the fact that the spectral radius al0 gebra BT of an operator T contains the operator’s commutant {T } . Consequently, every invariant subspace of BT is a hyperinvariant subspace of T (i.e., invariant 0 0 under {T } ); and if {T } is properly contained in BT , such a subspace would be, as the title of [5] suggests, “beyond hyperinvariant”. Among the principal results in this line of inquiry is the following: dm = dm (T ) =
Theorem 1.2. [5] If K ∈ L(H) is a nonzero compact operator, then BK has a 0 nontrivial invariant subspace. Moreover, BK 6= {K} whenever r(K) > 0. Characterizations of spectral radius algebras of normal operators can be found in [2]: Theorem 1.3. [2] Let N ∈ L(H) be a nonzero normal operator and let A = N/ kN k. 1. If A is unitary, then BN = L(H). 2. If A is completely nonunitary, then BN is a weakly dense proper subalgebra of L(H). 3. If A is neither unitary nor completely nonunitary, then BN has a nontrivial invariant subspace. In this paper we add to the list of these types of results the following: Theorem 1.4. Let T ∈ L(H) be a nonzero operator for which T 2 = αT , where 0 T 6= αI. Then, BT has a nontrivial invariant subspace and BT 6= {T } . Operators for which T 2 = αT belong to the class of quadratic operators and include idempotents (α = 1). In the case of idempotent operators, we will also obtain (in Theorem 2.2) a complete description of BT in terms of the invariant subspace guaranteed in Theorem 1.4. Therefore, in addition to the types of compact and normal operators studied in [5] and [2], we shall find that certain types of quadratic operator have subspaces associated with them that are “beyond hyperinvariant”. Our interest in idempotents stems from a 1976 paper by E. Nordgren, H. Radjavi and P. Rosenthal, wherein the following equivalence is proved:
Vol. 64 (2009)
Spectral Radius Algebras of Idempotents
195
Theorem 1.5. [8] Every bounded linear operator on H has a nontrivial invariant subspace if and only if every pair of idempotents has a common nontrivial invariant subspace. This equivalence was later broadened to include pairs of quadratic operators in [7]. In 1998, G. Allan and J. Zemanek published several results providing conditions under which two idempotents will have a common nontrivial invariant subspace (see [1]), and further work along these lines can be found in [4] and [9]. Having a complete description of the spectral radius algebras of idempotents allows us to show that every collection of bounded operators leaving a given nontrivial subspace invariant must be contained in the spectral radius algebra of a nontrivial idempotent. In light of Theorem 1.5 this suggests the following question: Is there a pair of idempotents that is not contained in a proper normed-closed spectral radius algebra?
2. Idempotents A bounded linear operator T is said to be quadratic if there are complex numbers α and β such that (T − αI)(T − βI) = 0. The class of quadratic operators includes involutions (where α = −1 and β = 1), nilpotent operators of order 2 (where α = β = 0) and idempotents (where α = 1 and β = 0). The spectral radius algebras of involutions can be determined by an immediate application of a result in [5]: BT = L(H) whenever T n = λI for any positive integer n and nonzero complex number λ. In the case when T is an involution, n = 2 and λ = 1. 2 Suppose T is nilpotent. Let u be any nonzero vector in ker T . Then, Rm u = u; −1 u. Let v be any nonzero vector in H and consider the that is, Rm u = Rm rank-one operator
−1 u
⊗ v. It is shown
−1 in [5] that u ⊗ v ∈ BT if and only if
≤ 1, we have supm kRm uk Rm v < ∞. Since Rm
−1
−1 2
kuk kvk < ∞. sup kRm uk Rm v ≤ sup Rm m
m
Lastly, T ∈ QT , where n o
−1 QT = S ∈ BT : lim Rm SRm =0 . m−→∞
In [5] it is shown that, for any T , QT is a two-sided ideal consisting entirely of quasinilpotent operators, and if QT 6= {0} and BT contains a compact operator, then BT has a nontrivial invariant subspace. Since T need not commute with u ⊗ v (take v 6∈ (ran T )⊥ ), we have that if T is nilpotent, then BT has a nontrivial 0 invariant subspace and BT 6= {T } .
196
Herron
IEOT
We begin our study of idempotents by considering the slightly more general case when {α, β} = 6 {0}. We will show that in this case the spectral radius algebra of the corresponding quadratic operator leaves the operator’s nullspace invariant. Lemma 2.1. Let T ∈ L(H) be a quadratic operator and let α and β be complex numbers such that (T − αI)(T − βI) = 0. If at least one of the α or β is nonzero, then ker T is an invariant subspace of BT . Proof. Let T ∈ L(H) be a quadratic operator and let α and β be scalars defined as above. Suppose α 6= 0 and β 6= 0. Let x ∈ ker T . Then, 0 = T 2 x = (α + β)T x − αβx = −αβx. Thus, ker T = {0}, and the statement holds trivially in this case. We consider, then, the case when α 6= 0 and β = 0. Then, T 2 = αT . Moreover, by induction it can be shown that T n = αn−1 T for any n ∈ N. By the spectral radius formula, r(T ) = |α|, and we have dm =
m 1 = , 1/m + r(T ) 1 + |α| m
for each positive integer m. From this we have 2 Rm
=
∞ X n=0
∗ n n d2n m (T ) T
=I+
∞ X
! d2n m
2(n−1)
|α|
T ∗T = I +
n=1
m2 T ∗ T. 1 + 2 |α| m
2 −1 Let S ∈ BT and let x ∈ ker T . Since Rm x = x, it follows that Rm x = x = Rm x. Therefore,
−1 −1 −1 2
Rm SRm x, Rm SRm x x = Rm SRm
2 = Rm Sx, Sx m2 ∗ = I+ T T Sx, Sx 1 + 2 |α| m m2 = hSx, Sxi + hT Sx, T Sxi 1 + 2 |α| m m2 2 2 = kSxk + kT Sxk . 1 + 2 |α| m
−1 Since S ∈ BT , supm Rm SRm < ∞. Therefore,
m2 2 2 −1 2 −1 2 kxk < ∞ kT Sxk ≤ Rm SRm x ≤ sup Rm SRm 1 + 2 |α| m m from which we conclude that T Sx = 0; that is, Sx ∈ ker T .
In addition to obtaining facts about the spectral radius algebras of more general types of quadratic operators, we will specifically be interested in describing completely the spectral radius algebras of idempotents. To this end, we shall need the following result from [5]. Recall that an operator B is power-bounded if supn kB n k < ∞.
Vol. 64 (2009)
Spectral Radius Algebras of Idempotents
197 0
Theorem 2.1. [5] If T ∈ L(H) is nonzero, B is a power-bounded operator in {T } , and S ∈ L(H) such that T S = BST , then S ∈ BT . Lemma 2.1, together with our earlier discussion of nilpotent operators, guarantees the existence of a nontrivial invariant subspace for BT whenever T 2 = αT . Our next result states that this invariant subspace is invariant in the sense of 0 [5]; that is, {T } ⊂ BT ⊂ L(H), where the inclusions are proper, and Lat BT 6= {{0} , H}. Lemma 2.2. Let T ∈ L(H) such that T 2 = αT for some nonzero α ∈ C. Then, 0 ST ∈ BT for all S ∈ L(H). Moreover, if T 6= αI, then BT 6= {T } . Proof. If T is a scalar multiple of the identity, then its spectral radius algebra is all of L(H). Therefore, suppose T 2 = αT with T 6= αI and α 6= 0. Let B = α−1 T . −1 Note that for any n ∈ N, kB n k = |α| kT k, so that B is a power-bounded 0 operator in {T } . Let S ∈ L(H) and consider the operator A = ST . Then, BAT = (α−1 T )(ST )T = T A, and so ST ∈ BT by Theorem 2.1. Since T 2 = αT , it follows that ker T is nontrivial if and only if T 6= αI. So, let u be a nonzero vector in ker T and let v be a nonzero vector in ran T . Let S be the rank-one operator u ⊗ v. We have already shown that ST ∈ BT . We now 0 show that ST is not in {T } . Let x ∈ H. Then, (ST )T x = (u ⊗ v)T 2 x = α hT x, vi u. Clearly, this is not the zero operator. However, T (ST )x = T (u ⊗ v)T x = hT x, vi T u = 0 for all x. Hence, 0 ST 6∈ {T } . The proof of Theorem 1.4 now proceeds as follows: Let T 2 = αT , where T is not a scalar multiple of the identity. If α = 0, then T is nilpotent of order 2 and the theorem follows from the application of various results in [5] as outlined at the start of this section. If α 6= 0, then Lemma 2.1 guarantees that ker T is a nontrivial invariant subspace of BT . Furthermore, Lemma 2.2 states that the 0 commutant {T } is a proper subalgebra of BT . As noted in [5] explicit descriptions of the operators in a given spectral radius algebra are generally difficult to obtain. In the case of a bounded idempotent, however, we have a simple description of the spectral radius algebra in terms of the operator’s nullspace. Theorem 2.2. Let T ∈ L(H) be an idempotent. Then, BT = {S ∈ L(H) : ker T ∈ Lat S} . Proof. Let T ∈ L(H) with T 2 = T . If T ∈ {0, I}, then BT = L(H) and the nullspace of T is a trivial subspace, invariant under every operator in L(H). Assume, then, that T is a nontrivial idempotent. Let S ∈ L(H) such that ker T is an invariant subspace of S. Let x ∈ H. Then, T Sx = T S((x − T x) + T x) = T S(x − T x) + T ST x = T ST x. Therefore, T S = T ST , and since T is a power 0 bounded element of {T } , we have S ∈ BT . If S ∈ BT , then it follows from Lemma 2.1 that ker T ∈ Lat S.
198
Herron
IEOT
The following are immediate consequences of Theorem 2.2. Corollary 2.1. Let T ∈ L(H) be an idempotent. 1. BT = L(H) if and only if T ∈ {0, I}. 2. BT is closed in the norm topology on L(H). Proof. Statement (1) follows from the fact that if T 2 = T , then ker T = {{0} , H} if and only if T ∈ {0, I}. Statement (2) is a consequence of the fact that in the norm topology, if {Sn } is a sequence of bounded operators such that Sn leaves invariant a given subspace M for each n, then the norm-limit of {Sn } (if one exists) must likewise leave M invariant. A collection A of operators is said to be transitive if Lat A = {{0} , H}. If A has a nontrivial invariant subspace, A is said to be intransitive. Theorem 2.3. Every intransitive collection of bounded operators is contained within a norm-closed proper spectral radius algebra. Proof. Let A ⊂ L(H) with M ∈ Lat A for some nontrivial subspace M of H. Let P be the orthogonal projection of H onto M ⊥ . Then, P is a nontrivial idempotent. Moreover, if S ∈ A, then ker P = (ran P )⊥ = M ∈ Lat S, which implies that S ∈ BP . In [1] it is shown that every pair of orthogonal projections (self-adjoint idempotents) has a common nontrivial invariant subspace. By Theorem 2.3 this implies that every such pair is in the proper norm-closed spectral radius algebra of some idempotent. Of course, were this to hold for pairs of more general quadratic operators, the invariant subspace problem would be answered affirmatively by a result in [7], which states that every bounded operator on H has a nontrivial invariant subspace if and only if every pair of quadratic operators has a common nontrivial invariant subspace (a generalization of Theorem 1.5). This leads to the following question: Question 2.1. Is there a pair of quadratic operators that is not contained in any proper norm-closed spectral radius algebra? It is interesting that the question has a negative answer in the case of three quadratic operators, even when the operators in question are orthogonal projections [3]. It is easy to show, however, that every quadratic operator must be in the spectral radius algebra of some nontrivial idempotent. Corollary 2.2. Every quadratic operator on H is in the spectral radius algebra of some nontrivial idempotent. Proof. Let T ∈ L(H) be a quadratic operator. If T is a scalar multiple of the identity, then T is in the spectral radius algebra of every bounded operator (since such algebras are unital). Therefore, suppose T is not a multiple of the identity. Let α, β ∈ C such that (T −αI)(T −βI) = 0. If α 6= β, then S = (α −β)−1 (T −βI) 0 is an idempotent and T ∈ {S} ⊂ BS .
Vol. 64 (2009)
Spectral Radius Algebras of Idempotents
199
If α = β, then one can show that α is an eigenvalue of T . Let M = ker(T −αI) and let P be the orthogonal projection of H onto M ⊥ . Then, by Theorem 2.2, T ∈ BP .
3. Orthogonal Projections and Reducing Subspaces An idempotent P ∈ L(H) is an orthogonal projection if and only if it is selfadjoint; and this, of course, is equivalent to ker P = (ran P )⊥ . Therefore, if P is the orthogonal projection of H onto M = ran P , then BP = S ∈ L(H) : M ⊥ ∈ Lat S . As to be expected, the conditions P ∗ = P = P 2 allow for a relatively easy calcu−1 lation of the operators Rm and Rm . For each positive integer m, 2 Rm
=
∞ X
∗ n n d2n m (P ) P = I +
n=0
m2 P. 2m + 1
A calculation shows that Rm = Q + γm P where Q = I − P (the orthogonal projection onto ker P ) and 1/2 m2 . γm = 1 + 2m + 1 Furthermore, it can be verified that −1 −1 Rm = Q + γm P.
Recall that M is said to be a reducing subspace for an operator S ∈ L(H) (or M reduces S) if M and its orthogonal complement M ⊥ are invariant subspaces of S. It is well-known that M reduces S if and only if P S = SP , where P is the orthogonal projection of H onto M . If we consider the direct sum decomposition H = M ⊕ M ⊥ , then S ∈ L(H) has a 2 × 2 matrix representation W X S= , Y Z where W = (P S)|M , X = (P S)|M ⊥ , Y = [(I − P )S]|M and Z = [(I − P )S]|M ⊥ . The subspace M then reduces T if and only if X = 0 and Y = 0 between the appropriate spaces. Moreover, S ∈ BP if and only if X = 0. Theorem 3.1. Let M be a subspace of H, P the orthogonal projection of H onto M , and S ∈ L(H). The following statements are equivalent: −1 1. Rm SRm = S for some m ∈ Z+ ; 2. M reduces S; −1 3. Rm SRm = S for all m ∈ Z+ , where Rm = Rm (P ).
200
Herron
IEOT
−1 Proof. (1) =⇒ (2) Suppose Rm0 SRm = S for some positive integer m0 . Let 0 W X S= Y Z
be the matrix representation of S with respect to the direct sum decomposition −1 H = M ⊕ M ⊥ . Then, Rm0 SRm = S implies 0 W γm0 X W X = −1 γm Y Z Y Z 0 from which we conclude X = 0 and Y = 0, with 0 being defined on the appropriate spaces in each case. Hence, M reduces S. (2) =⇒ (3) If M reduces S, then X and Y are both the zero operator (again, −1 on the appropriate spaces) and we have Rm SRm = S for every m ∈ Z+ . (3) =⇒ (1) Trivial. The following is an example of how, in addition to providing information regarding invariant subspaces, spectral radius algebra techniques can be applied to the study of structural features of an operator algebra. Example 3.1. For a subalgebra A of L(H), the Jacobson radical of A is the set R = {S ∈ A : r(SX) = 0 for all X ∈ A}. The algebra A is said to be semisimple if its Jacobson radical contains only the zero operator; it is a radical algebra if A = R. As an illustration of some of our earlier ideas, we will use spectral radius algebra techniques to show that the algebra of all operators leaving a specific subspace invariant is never semisimple nor is it a radical algebra. Let M be a nontrivial subspace of H and let Alg(M ) denote the set of all bounded operators leaving M invariant. Then, Alg(M ) = BP , where P is the orthogonal projection of H onto M ⊥ . Recall that o n
−1 =0 QP = S ∈ BP : lim Rm SRm m−→∞
is a two-sided ideal consisting entirely of quasinilpotent operators. Therefore, QP ⊆ R and it is enough to show that QP 6= {0}. Consider the nonzero operator QSP , where Q = I − P and S is any operator for which M 6∈ Lat S. Consider the following:
−1 −1 −1
Rm (QSP )Rm kQSP k −→ 0 P ) = γm = (Q + γm P )(QSP )(Q + γm as m −→ ∞. Therefore, QSP ∈ QP and Alg(M ) cannot be semisimple. On the other hand, it is clear that BP is never a radical algebra, since P itself is not quasinilpotent. Of course in the example above it need not be the case that QP contains every quasinilpotent operator in BP [5]. For instance, if S is a nonzero quasinilpotent operator possessing a nontrivial reducing subspace M , then S ∈ BP , where P is −1 the orthogonal projection of H onto M ⊥ . By Theorem 3.1, Rm SRm = kSk for every m, and so S 6∈ QP .
Vol. 64 (2009)
Spectral Radius Algebras of Idempotents
201
References [1] G. Allan; J. Zemanek, Invariant subspaces for pairs of projections. J. London Math. Soc. (2) 57 (1998), 449–468. [2] A. Biswas, A. Lambert, S. Petrovic, On spectral radius algebras and normal operators. Indiana Univ. Math. J. 56, No. 4 (2007), 1661–1674. [3] C. Davis, Generators of the ring of bounded operators. Proc. Amer. Math. Soc. 6 (1955), 970–972. [4] R. Drnovsek, H. Radjavi, P. Rosenthal, A characterization of commutators of idempotents. Linear Algebra and its Applications 347 (2002), 91–99. [5] A. Lambert, S. Petrovic, Beyond hyperinvariance for compact operators. J. Funct. Anal. 219 (2005), 93–108. [6] V.I. Lomonosov, Invariant subspaces of the family of operators that commute with a completely continuous operator. Funkcional. Anal. i Prilozen. 7 (1973), 55–56. [7] E.A. Nordgren, M. Radjablipour, H. Radjavi, P. Rosenthal, Quadratic operators and invariant subspaces. Studia Math. 88 (1988), 263–268. [8] E.A. Nordgren, H. Radjavi, P. Rosenthal, A geometric equivalent of the invariant subspace problem. Proc. Amer. Math. Soc. 61 (1976), 66–68. [9] H. Radjavi, P. Rosenthal, On commutators of idempotents. Linear and Multilinear Algebra 50 (2002), No. 2, 121–214. John David Herron 224 Harman Hall Department of Biology, Chemistry and Mathematics University of Montevallo Montevallo, Alabama 35115-6000 USA e-mail:
[email protected] Submitted: August 29, 2008.
Integr. equ. oper. theory 64 (2009), 203–237 c 2009 Birkh¨
auser Verlag Basel/Switzerland 0378-620X/020203-35, published online May 12, 2009 DOI 10.1007/s00020-009-1685-y
Integral Equations and Operator Theory
Wiener-Hopf Operators with Slowly Oscillating Matrix Symbols on Weighted Lebesgue Spaces Yu.I. Karlovich and J. Loreto Hern´andez Abstract. Fredholm conditions and an index formula are obtained for WienerHopf operators W (a) with slowly oscillating matrix symbols a on weighted Lebesgue spaces LpN (R+ , w) where 1 < p < ∞, w is a Muckenhoupt weight on R and N ∈ N. The entries of matrix symbols belong to a Banach subalgebra of Fourier multipliers on Lp (R, w) that are continuous on R and have, in general, different slowly oscillating asymptotics at ±∞. To define the Banach algebra SOp,w of corresponding slowly oscillating functions, we apply the theory of pseudodifferential and Calder´ on-Zygmund operators. Established sufficient conditions become a Fredholm criterion in the case of Muckenhoupt weights with equal indices of powerlikeness, and also for Muckenhoupt weights with different indices of powerlikeness under some additional condition on p, w and a. Mathematics Subject Classification (2000). Primary 47B35; Secondary 42A45, 47A53, 47G10, 47G30. Keywords. Wiener-Hopf operator, pseudodifferential operator, limit operator, weighted Lebesgue space, slowly oscillating matrix function, local principle, symbol, Fredholmness, index.
1. Introduction Given 1 ≤ p ≤ ∞, let Lp (R) be the usual Lebesgue space with norm denoted by k · kp . A measurable function w : R → [0, ∞] is called a weight if w−1 ({0, ∞}) has Lebesgue measure zero. For 1 ≤ p < ∞ and a weight w, we denote by Lp (R, w) the weighted Lebesgue space with the norm Z 1/p kf kp,w := |f (x)|p wp (x)dx . R
Work was supported by the SEP-CONACYT Project No. 25564 (M´ exico). The second author was also sponsored by the CONACYT scholarship No. 163480.
204
Karlovich and Loreto Hern´ andez
IEOT
Given N ∈ N, let LpN (R, w) be the Banach space of vector-functions f = (fk )N 1/p k=1 PN p . If A kf k with entries fk ∈ Lp (R, w) and the norm kf kLpN (R,w) = k p,w k=1 is a subalgebra of L∞ (R), then AN ×N or [A]N ×N denote the matrix functions a : R → CN ×N whose entries belong to A. Let B(X) be the Banach algebra of all bounded linear operators on a Banach space X, and K(X) the closed two-sided ideal of all compact operators in B(X). An operator A ∈ B(X) is called Fredholm if Im A is closed in X and the numbers n(A) := dim Ker A and d(A) := dim(X/Im A) are finite. In that case Ind A := n(A) − d(A). In what follows we assume that 1 < p < ∞ and w is a Muckenhoupt weight on R (w ∈ Ap (R)), which means that 1/p Z 1/q Z 1 1 p −q w (x) dx w (x) dx < ∞, cp,w := sup |I| I |I| I I where 1/p + 1/q = 1, I ranges over all bounded intervals I ⊂ R, and |I| is the length of I. Then the Cauchy singular integral operator SR given by Z 1 f (t) (SR f )(x) = lim dt, x ∈ R, (1.1) ε→0 πi R\(x−ε,x+ε) t − x is bounded on the space Lp (R, w) (see [18] and also [15]). Let F : L2 (R) → L2 (R) denote the Fourier transform, Z ˆ (Ff )(x) := f (x) := f (t)eitx dt, x ∈ R. R
A function a ∈ L∞ (R) is called a Fourier multiplier on Lp (R, w) if the convolution operator W 0 (a) := F −1 aF maps L2 (R) ∩ Lp (R, w) into itself and extends to a bounded linear operator on Lp (R, w) (notice that L2 (R) ∩ Lp (R, w) is dense in Lp (R, w) if w ∈ Ap (R)). Let Mp,w stand for the set of all Fourier multipliers on Lp (R, w). One can show that Mp,w is a Banach algebra under the norm kakMp,w := kW 0 (a)kB(Lp (R,w)) . Let χ+ be the characteristic function of R+ = (0, ∞). By Lp (R+ , w) we understand the space Lp (R+ , w|R+ ). For a ∈ Mp,w , the Wiener-Hopf operator W (a) is defined on the space Lp (R+ , w) by W (a)f = χ+ W 0 (a)χ+ f, for f ∈ Lp (R+ , w). ˙ = R ∪ {∞}, R = [−∞, +∞], and let P C be the C ∗ -algebra of all Let R ˙ By Stechkin’s functions on R having finite one-sided limits at every point t ∈ R. inequality (see, e.g., [7, Theorem 17.1]), if a ∈ P C has finite total variation V1 (a), then a ∈ Mp,w and kakMp,w ≤ kSR kB(Lp (R,w)) kak∞ + V1 (a) , (1.2) ˙ (resp. Cp,w (R), P Cp,w ) the where SR is given by (1.1). We denote by Cp,w (R) ˙ closure in Mp,w of the set of all functions a ∈ C(R) (resp. a ∈ C(R), a ∈ P C) with
Vol. 64 (2009) Wiener-Hopf Operators with Slowly Oscillating Symbols
205
˙ ⊂ C(R), ˙ Cp,w (R) ⊂ C(R), P Cp,w ⊂ P C. finite total variation. Obviously, Cp,w (R) ˙ Cp (R), P Cp and so on. In the case w = 1, we will omit w and write Cp (R), Fredholm theories for Wiener-Hopf operators W (a) with symbols a ∈ P Cp on Lebesgue spaces Lp (R+ ) and for the algebras alg {P C, W 0 (P Cp )} ⊂ B(Lp (R)) generated by the multiplication operators aI (a ∈ P C) and by the convolution operators W 0 (b) (b ∈ P Cp ) were constructed by R. V. Duduchava (see [12] and [13]). Fredholmness and index formulas for such operators on weighted Lebesgue spaces and algebras generated by these operators were studied in [30] and [28] in the case of power weights, and in [9] and [10] for general Muckenhoupt weights. These results were generalized to a bigger algebra in [21]. For the theory of Wiener-Hopf operators with almost periodic and semi-almost periodic matrix symbols, see [7] and the references therein. We intend to study Wiener-Hopf operators with slowly oscillating matrix symbols on weighted Lebesgue spaces. Let Cb (R) be the C ∗ -algebra of all bounded continuous functions a : R → C. Following [26] we denote by SO the C ∗ -algebra of slowly oscillating at ∞ functions, n o SO := f ∈ Cb (R) : lim sup |f (t) − f (s)| = 0 . (1.3) x→+∞ t,s∈[−2x,−x]∪[x,2x]
Fredholmness for Banach algebras of convolution type operators generated by the multiplication operators aI (a ∈ [SO, P C]N ×N ) and by the convolution operators W 0 (b) with symbols b ∈ [SOp , P Cp ]N ×N on unweighted Lebesgue spaces LpN (R) was studied in [2]–[3]. Consider the Banach algebra [SOp,w , Cp,w (R)]N ×N generated by all matrix functions in [SOp,w ]N ×N and [Cp,w (R)]N ×N , where SOp,w is the Banach algebra of slowly oscillating functions in Mp,w defined in Section 3. In the present paper we establish Fredholm conditions and an index formula for Wiener-Hopf operators W (a) with matrix symbols a ∈ [SOp,w , Cp,w (R)]N ×N on weighted Lebesgue spaces LpN (R+ , w) with Ap (R) weights w. Appearance of weights leads to a joint influence of oscillations of symbols and weights. To define an Mp,w analogue of slowly oscillating functions, we first study convolution operators from the viewpoint of pseudodifferential and Calder´on-Zygmund operators. A further investigation of Wiener-Hopf operators with mentioned oscillating symbols on weighted Lebesgue spaces is based on the Allan-Douglas local principle (see, e.g., [8]) and on the techniques of limit operators (see [25], [6], [27]). The paper is organized as follows. In Section 2 we estimate the norms of convolution operators W 0 (a) on weighted Lebesgue spaces in terms of the quantities kDγ akL∞ (R) (γ = 0, 1, 2, 3) where (Da)(x) := xa0 (x) for x ∈ R. To this end we apply the pointwise estimates from [1] and the theory of pseudodifferential and Calder´ on-Zygmund operators on weighted Lebesgue spaces with Muckenhoupt weights (see [11], [14], [19], [32], [5]). In Section 3 we define the Banach subalgebras SOp,w and [SOp,w , Cp,w (R)] of Mp,w that consist, respectively, of the functions slowly oscillating at ∞ and the functions having different slowly oscillating behavior at ±∞, and then we characterize their maximal ideal spaces M(SOp,w ) and M([SOp,w , Cp,w (R)]).
206
Karlovich and Loreto Hern´ andez
IEOT
In Section 4, applying the techniques of limit operators, we calculate basic limit operators for the operators wW 0 (a)w−1 I ∈ B(Lp (R)) with symbols a ∈ [SOp,w , Cp,w (R)] in the case of symmetric weights w = ev ∈ Ap (R) for which the function σ : x 7→ xv 0 (x) belongs to Cb (R+ ) and slowly oscillates at 0. In Section 5 we prove that all compact operators on the space Lp (R+ , w) are contained in the Banach subalgebra of B(Lp (R+ , w)) generated by the Wiener˙ establish the compactness of the comHopf operators with symbols in Cp,w (R), mutators W (a)W (b) − W (b)W (a) for a, b ∈ [SOp,w , Cp,w (R)] and, making use of the Allan-Douglas local principle, study the invertibility of corresponding cosets in local quotient algebras. Here we also obtain a Fredholm criterion for the WienerHopf operators W (a) with symbols a ∈ [SOp,w ]N ×N on the spaces LpN (R+ , w). Section 6 contains the main results of the paper. Applying results of Sections 3–5, we establish here sufficient Fredholm conditions and an index formula for Wiener-Hopf operators W (a) with matrix symbols a ∈ [SOp,w , Cp,w (R)]N ×N on weighted Lebesgue spaces LpN (R+ , w) with Ap (R) weights w. These sufficient conditions become a Fredholm criterion for the operators W (a) on the spaces LpN (R+ , w) in the case of Muckenhoupt weights with equal indices of powerlikeness (see definition of such indices in [5, Section 3.6]), and also for weights w ∈ Ap (R) with different indices of powerlikeness under some additional condition on p, w and symbols a (see Theorem 6.2 and Corollary 6.3). In these cases the regularizers of Fredholm Wiener-Hopf operators belong to the Banach algebra generated by all operators W (a) with symbols a ∈ [SOp,w , Cp,w (R)]N ×N .
2. Convolution operators from the viewpoint of pseudodifferential and Calder´on-Zygmund operators Let C n (R) be the set of all n times continuously differentiable functions a : R → C, and let K denote the distribution whose Fourier transform is a. We suppose that a ∈ C 3 (R \ {0}) and Aγ := kDγ akL∞ (R) < ∞ (γ = 0, 1, 2, 3)
(2.1)
0
where (Da)(x) = xa (x) for x ∈ R. Below we need the following dyadic decomposition (see, e.g., [32, Chapter VI, Subsection 4.1]). Let η be a C ∞ function of compact support and such that η(λ) = 1 for |λ| ≤ 1, η(λ) = 0 for |λ| ≥ 2, and η is monotone for 1 ≤ |λ| ≤ 2. Put δ(λ) = η(λ) − η(2λ). Then we have the following “partition of unity”: X+∞ 1= δ(2−j λ) for all λ ∈ R \ {0}, (2.2) j=−∞
where δ(2−j λ) are supported in the shells 2j−1 ≤ |λ| ≤ 2j+1 , and for each λ ∈ R \ {0} there are at most two non-zero terms in (2.2). The series (2.2) converges pointwise. For every j ∈ Z, put Z 1 aj (λ)e−ixλ dλ, aj (λ) := a(λ)δ(2−j λ). (2.3) Kj (x) := 2π R
Vol. 64 (2009) Wiener-Hopf Operators with Slowly Oscillating Symbols
207
Following [32, p. 244] we prove the next assertion. Lemma 2.1. If a ∈ C 3 (R \ {0}) and eγ := sup xγ (dγx a)(x) < ∞ A
(γ = 0, 1, 2, 3),
(2.4)
x∈R
then for all α = 0, 1 and all γ = 0, 1, 2, 3 there are constants Aγ,α < ∞ such that γ α x (dx Kj )(x) ≤ Aγ,α 2j(1+α−γ) (2.5) for all x ∈ R and all j ∈ Z. Proof. Applying integration by parts, we obtain Z (−1)α aj (λ)(ix)γ ∂xα {e−iλx }dλ (−1)α (ix)γ (dα K )(x) = j x 2π R Z Z 1 1 γ α γ −iλx = (−1) aj (λ)(iλ) ∂λ {e dγ {aj (λ)(iλ)α }e−iλx dλ. }dλ = 2π R 2π R λ
(2.6)
If α = 0, then according to the Leibniz rule we deduce from (2.5) that γ X γ dβλ a (λ)2−j(γ−β) dλγ−β δ (2−j λ). (2.7) dγλ aj (λ) = β β=0
Hence, taking into account (2.4) and the lower estimate |λ| ≥ 2j−1 of the support β eβ 2−β(j−1) and therefore of δ(2−j λ), we infer from (2.7) that dλ a ∞ ≤ A ! γ X γ
γ−β γ β eβ 2 d eγ,0 2−jγ . d aj (λ) ≤ A δ ∞ 2−jγ =: A (2.8) λ λ β β=0
Since the integrand in (2.6) is supported in the interval |λ| ≤ 2j+1 of length 4 · 2j , we deduce from (2.6) and (2.8) that 4 e |x|γ |Kj (x)| ≤ Aγ,0 2j(1−γ) =: Aγ,0 2j(1−γ) , (2.9) 2π which gives (2.5) in the case α = 0. By analogy, if α = 1, then γ 1 X X γ γ − β −j(γ−β−k) γ−β−k γ β dλ {aj (λ)iλ} = (dλ a)(λ) 2 (dλ δ)(2−j λ)iλ1−k , β k β=0 k=0
β eβ 2−β(j−1) and |λ| ≤ 2j+1 , we obtain
whence, applying the estimate dλ a ∞ ≤ A ! γ X γ
γ−β−1 i j(1−γ) γ e βh γ−β ∂ {aj (λ)iλ} ≤
Aβ 2 2 dλ δ ∞ + (γ − β) dλ δ ∞ 2 λ β β=0
eγ,1 · 2j(1−γ) . =: A
(2.10)
Finally, by (2.6) and (2.10), |x|γ |Kj0 (x)| ≤
4 e Aγ,1 2j(2−γ) =: Aγ,1 2j(2−γ) , 2π
(2.11)
208
Karlovich and Loreto Hern´ andez
which is consistent with (2.5) for α = 1.
IEOT
We see from (2.8) to (2.11) that for all α = 0, 1 and all γ = 0, 1, 2, 3, eβ : β = 0, 1, . . . , γ Aγ,α ≤ Cγ,α max A (2.12) where the constants Cγ,α depend only on γ and α. Since D0 a = a, D1 a = xa0 , D2 a = xa0 + x2 a00 , D3 a = xa0 + 3x2 a00 + x3 a000 , and hence x2 a00 = D2 a − D1 a, x3 a000 = D3 a − 3D2 a + 2D1 a, we conclude that 1 e0 , A e1 , A e2 , A e3 } ≤ 6 max{A0 , A1 , A2 , A3 }. (2.13) max{A0 , A1 , A2 , A3 } ≤ max{A 5 As a result, (2.12) and (2.13) imply the estimates Aγ,α ≤ 6Cγ,α max{A0 , A1 , A2 , A3 } (α = 0, 1; γ = 0, 1, 2, 3).
(2.14)
Following the proof of Proposition 2(a) in [32, p. 245] we get the next result. Lemma 2.2. If a ∈ C 3 (R \ {0}) satisfies (2.1), then the distribution K = F −1 a agrees with a function K(·) differentiable in R \ {0} and such that |(Dα K)(x)| ≤ A0α |x|−1 f or all x ∈ R \ {0} and all α = 0, 1, where the constants
A0α
are estimated by A0α ≤ Cα0 max{A0 , A1 , A2 , A3 }
and the constants
Cα0
(2.15)
(2.16)
∈ (0, ∞) depend only on α.
Proof. Applying the dyadic decomposition (2.2), we get X+∞ X+∞ a(λ) = a(λ)δ(2−j λ) = aj (λ). j=−∞ j=−∞ Pn Since j=−n aj (λ) converges to a(λ) uniformly on compacts of R \ {0}, it follows Pn from (2.3) that Kj converges to K in the sense of distributions. So it j=−n P suffices to estimate j |dα x Kj (x)| for x 6= 0. Using (2.5) for γ = 0 and α = 0, 1 gives X X α 2j0 (x)(1+α) dx Kj (x) ≤ A0,α 2j(1+α) = A0,α j −1 j −1 2 ≤|x| 2 ≤|x| 1 − 2−(1+α) A0,α e0α |x|−1−α , ≤ |x|−1−α =: A (2.17) 1 − 2−(1+α) where j0 (x) is the maximal integer j satisfying the inequality 2j ≤ |x|−1 . Similarly, by (2.5) with γ = 3 and α = 0, 1, we get X 2j >|x|−1
X α A3,α 2j1 (x)(α−2) dx Kj (x) ≤ A3,α 2j(1+α−3) = 3 j −1 2 >|x| |x| |x|3 1 − 2α−2 A3,α e00α |x|−1−α , ≤ |x|−1−α =: A (2.18) 1 − 2α−2
Vol. 64 (2009) Wiener-Hopf Operators with Slowly Oscillating Symbols
209
where j1 (x) is the minimal integer j satisfying the inequality 2j > |x|−1 . Hence, for α = 0, 1 we obtain α X+∞ −1 e0 e00 (D K)(x) ≤ |x|α (dα =: A0α |x|−1 x Kj )(x) ≤ (Aα + Aα )|x| j=−∞
where the constants
A0α
are estimated by (2.16) due to (2.17), (2.18) and (2.14).
It follows from (2.15) that K(·) is a classical Calder´on-Zygmund kernel with K(x) ≤ A00 |x|−1 , K 0 (x) ≤ A01 |x|−2 for all x ∈ R \ {0}, (2.19) where the constants A0α (α = 0, 1) are estimated by (2.16). It is well known (see, e.g., [14, p. 248]) that the classical Calder´on-Zygmund operator given by Z (T f )(x) = v.p. K(x − y)f (y)dy for x ∈ R, (2.20) R
where K is a Calder´ on-Zygmund kernel satisfying (2.19), is bounded on every weighted Lebesgue space Lp (R, w) (1 < p < ∞, w ∈ Ap (R)). We want to estimate kT kB(Lp (R,w)) via max{A0 , A1 , A2 , A3 }. In what follows, let |Ω| be the Lebesgue measure of a measurable set Ω ⊂ R. As is well known (see, e.g., [14], [32]), the Calder´on-Zygmund operator (2.20) is of weak-type (1, 1), that is, there exists a finite constant C1,1 > 0 such that kT f k∼ := sup λ x ∈ R : |(T f )(x)| > λ ≤ C1,1 kf kL1 (R) (2.21) λ>0
1
for all f ∈ L (R). To determine C1,1 , we need the following two results on the Calder´ on-Zygmund decomposition (cf. [11] and [5, Lemma 5.4, Theorem 5.5]). Let I(x, ε) := (x − ε, x + ε) for x ∈ R and ε > 0. Lemma 2.3. If f ∈ L1 (R), then for every λ > 0 there exists an at most countable (and possible empty) set of intervals I(xk , εk ) centered at points xk ∈ R such that Z 1 |f (τ )|dτ ≤ 2λ for all k; (a) λ < |I(xk , εk )| I(xk ,εk ) S (b) |f (x)| ≤ λ for all x ∈ R \ k I(xk , εk ); (c) every point x ∈ R is contained in at most θ1 = 2 of the intervals I(xk , εk ). Theorem 2.4. Let f, λ and {I(xk , εk )} be as in the preceding lemma. Then there exist functions g and hk ∈ L1 (R) such that X f =g+ hk ; (2.22) k
|g(x)| ≤ 4λ f or almost all x ∈ R, kgkL1 (R) ≤ kf kL1 (R) ;
(2.23)
hk (x) = 0 f or all x ∈ R \ I(xk , εk ) and all k; X hk (τ )dτ = 0 f or all k, khk kL1 (R) ≤ 2kf kL1 (R) .
(2.24)
Z R
k
(2.25)
Applying Lemma 2.3 and Theorem 2.4, we can determine the constant C1,1 in (2.21) following the scheme of the proof in [5, Theorem 5.6].
210
Karlovich and Loreto Hern´ andez
IEOT
Theorem 2.5. If the operator T is given by (2.20) with a kernel K satisfying (2.19), (2.16) and (2.1), then (2.21) is fulfilled for all f ∈ L1 (R) with C1,1 := (20 + 16C10 ) max{A0 , A1 , A2 , A3 }. C0∞ (R)
1
(2.26) 1
Proof. Because is dense in L (R) and convergence in L (R) implies convergence in measure, it is sufficient to prove (2.21) for all functions f ∈ C0∞ (R). Since the operator T is bounded on the space L2 (R), we conclude that the set {x ∈ R : |(T f )(x)| > λ} is measurable for every f ∈ C0∞ (R), and kT kB(L2 (R)) = kakL∞ (R) = A0 .
(2.27)
Without loss of generality we may assume that max{A0 , A1 , A2 , A3 } = 1. (2.28) P Fix λ > 0 and let f = g + h, h = k hk be the Calder´on-Zygmund decomposition of f in accordance with Theorem 2.4. Then T f = T g + T h and hence n λ o λ o n + x ∈ R : |(T h)(x)| > . x ∈ R : |(T f )(x)| > λ ≤ x ∈ R : |(T g)(x)| > 2 2 (2.29) S Put Y := R \ k I(xk , 2εk ). From assertions (a) and (c) of Lemma 2.3 we obtain Z Z X 1 X 2 1X |f (τ )|dτ = χk (τ )|f (τ )|dτ ≤ kf kL1 (R) , (2.30) |I(xk , εk )| ≤ λ λ λ I(xk ,εk ) R k k k S and hence the set Rλ := k I(xk , εk ) is bounded. Since f has a compact support, we deduce from (2.22) and (2.24) that the set supp g ⊂ supp f ∪Rλ is also bounded. Consequently, from (2.23) it follows that kgk2L2 (R) ≤ 4λkgkL1 (R) ≤ 4λkf kL1 (R) < ∞,
(2.31)
whence, by Chebyshev’s inequality (see, e.g., [5, p. 145]) and by (2.31) and (2.27), Z n 2 λ o 2 2 (T g)(x) dx ≤ x ∈ R : |(T g)(x)| > 2 λ R 2 2 16 2 2 2 kT kB(L2 (R)) kgkL2 (R) ≤ A kf kL1 (R) . (2.32) ≤ λ λ 0 On the other hand, (2.30) implies that n λ o n λ o [ x ∈ R : |(T h)(x)| > ≤ x ∈ Y : |(T h)(x)| > + I(xk , 2εk ) 2 2 k n λ o 4 ≤ x ∈ Y : |(T h)(x)| > + kf kL1 (R) . (2.33) 2 λ R As supp hk ⊂ [xk − εk , xk + εk ] and R hk (τ )dτ = 0 in view of (2.24) and (2.25), we see that for almost all x ∈ Y , Z Z (T hk )(x) = K(x − y)hk (y)dy = K(x − y) − K(x − xk ) hk (y)dy. I(xk ,εk )
I(xk ,εk )
(2.34)
Vol. 64 (2009) Wiener-Hopf Operators with Slowly Oscillating Symbols
211
Since |x − ξ| ≥ 2−1 |x − xk | for any ξ in the interval with the endpoints xk and y ∈ I(xk , εk ), we infer by the mean value theorem and (2.19) that |y − xk | 4A01 εk ≤ . (2.35) K(x − y) − K(x − xk ) ≤ |K 0 (x − ξ)||y − xk | ≤ A01 |x − ξ|2 |x − xk |2 Hence from (2.34) and (2.35) it follows that Z Z Z K(x − y) − K(x − xk ) hk (y) dydx (T hk )(x) dx ≤ Y I(xk ,εk ) Y Z Z dx hk (y) dy ≤ 4A01 εk 2 Y |x − xk | I(xk ,εk ) Z
εk dx 0 = 4A01 hk L1 (R) . (2.36) ≤ 4A1 hk L1 (R) 2 |x−xk |≥2εk |x − xk | Consequently, by (2.36) and (2.25), Z XZ X (T h)(x) dx ≤ (T hk )(x) dx ≤ 4A01 khk kL1 (R) ≤ 8A01 kf kL1 (R) , Y
k
Y
k
which implies that Z n 0 λ o 2 (T h)(x) dx ≤ 16A1 kf kL1 (R) . x ∈ Y : |(T h)(x)| > ≤ 2 λ Y λ
(2.37)
Combining (2.33) and (2.37), we obtain n λ o 16A01 + 4 kf kL1 (R) , x ∈ R : |(T h)(x)| > ≤ 2 λ which together with (2.32) and (2.29) shows that (2.21) holds if C1,1 = 16A20 + 16A01 + 4. On the other hand, from (2.16) and (2.28) it follows that 16A20 + 16A01 + 4 ≤ 16A20 + 4 + 16C10 max{A0 , A1 , A2 , A3 } ≤ 20 + 16C10 , and therefore (2.21) holds with C1,1 = 20 + 16C10 if max{A0 , A1 , A2 , A3 } = 1. Obviously, the latter implies (2.21) with (2.26) for any max{A0 , A1 , A2 , A3 }. Following [1], let us now estimate kT kB(Lp (R,w)) via kM kB(Lp (R,w)) where M is the Hardy-Littlewood maximal operator, Z 1 (M f )(x) = sup |f (τ )|dτ, x ∈ R, (2.38) I3x |I| I the supremum is taken over all intervals I ⊂ R containing x, |I| is the length of I. As is well known (see, e.g., [15, Section 6.6] or [5, Corollary 5.3]), the operator M is bounded on every space Lp (R, w) with 1 < p < ∞ and w ∈ Ap (R). Let M ] be the sharp maximal operator of C. Fefferman and E. Stein, Z Z 1 1 (M ] f )(x) = sup |f (τ ) − fI |dτ, where fI = f (τ )dτ (2.39) |I| I I3x |I| I
212
Karlovich and Loreto Hern´ andez
IEOT
and the supremum is taken over all intervals I ⊂ R containing x. Consider the s-sharp maximal operator Ms] (0 < s < 1) given by 1/s Ms] (g) = M ] (|g|s ) . (2.40) For each interval I = I(x0 , r) ⊂ R, let ZZ 1 K(z − y) − K(x − y) dxdz. (DI K)(y) = 2 |I| I×I According to [1] we assume that (D) There are constants CD , N ∈ (0, ∞) such that Z sup (DI K)(y)|f (y)|dy ≤ CD (M f )(x0 ) r>0
(2.41)
(2.42)
|y−x0 |>N r
for all f ∈ C0∞ (R) and all x0 ∈ R. From [1, Theorem 2.1] we infer the following. Theorem 2.6. Let T be the Calder´ on-Zygmund operator (2.20) with a kernel K satisfying (2.42) and (2.19) with (2.1) and (2.16). Then for every s ∈ (0, 1) there is the finite constant Cs := 22/s−1 N (1 − s)−1/s C1,1 + CD (2.43) such that for all f ∈ C0∞ (R) and all x0 ∈ R, ] Ms (T f ) (x0 ) ≤ Cs (M f )(x0 ).
(2.44)
Proof. Fix x0 ∈ R. It is easily seen from (2.39) that, for every f ∈ L1loc (R), Z Z 2 1 ] (M f )(x0 ) = sup |f (τ ) − fI |dτ ≤ sup inf |f (τ ) − c|dτ. (2.45) I3x0 |I| I I3x0 c∈C |I| I Fix f ∈ C0∞ (R). Hence, by (2.40) and (2.45), for every s ∈ (0, 1) we obtain Z 1/s ] 1/s 1 |(T f )(τ )|s − c dτ . Ms (T f ) (x0 ) = M ] (|T f |s ) (x0 ) ≤ 21/s sup inf I3x0 c∈C |I| I (2.46) Let f = f1 + f2 where f1 = f χI(x0 ,N r) and N is given by condition (D). Since s |a| − |b|s ≤ |a − b|s , (|a| + |b|)1/s ≤ 21/s−1 (|a|1/s + |b|1/s ) for 0 < s < 1, setting cI := (T f2 )I , we obtain 1/s Z Z 1/s 1 1 |T f |s − |(T f2 )I |s dτ T f − (T f2 )I s dτ ≤ |I| I |I| I 1/s Z s 1 s |T f1 | + T f2 − (T f2 )I dτ (2.47) ≤ |I| I Z 1/s Z s 1/s 1 1 1/s−1 s ≤2 |T f1 | dτ + T f2 − (T f2 )I dτ =: 21/s−1 (I1 + I2 ). |I| I |I| I
Vol. 64 (2009) Wiener-Hopf Operators with Slowly Oscillating Symbols
213
By Theorem 2.5, T possesses the property (2.21) where C1,1 is given by (2.26). Hence, applying [14, Lemma 1.4] (also see [5, (5.48)]), (2.21) and (2.38), we get Z 1/s 1 1/s 1 1 s |T f1 | dτ ≤ kT f1 k∼ I1 = |I| I 1−s |I| −1/s −1/s C1,1 (M f )(x0 ). (2.48) C1,1 |I|−1 kf1 kL1 (R) ≤ N 1 − s ≤ 1−s Further, Jensen’s inequality for the concave function ϕ(x) = xs (0 < s < 1), Fubini’s theorem, (2.41) and condition (D) yield according to [1] that Z 1/s Z s 1 1 T f2 − (T f2 )I dx ≤ T f2 − (T f2 )I dx I2 = |I| I |I| I Z Z Z 1 K(x − y) − K(z − y) |f (y)|dydzdx ≤ 2 |I| I I R\I(x0 ,N r) Z (DI K)(y)|f (y)|dy ≤ CD (M f )(x0 ). (2.49) = |y−x0 |>N r
Finally, (2.46), (2.47) with cI := (T f2 )I , (2.48) and (2.49) imply the relation (2.44) with the constant Cs given by (2.43). Lemma 2.7. If T is the Calder´ on-Zygmund operator (2.20) with a kernel K satisfying (2.19), (2.16) and (2.1), then (2.42) holds for all f ∈ C0∞ (R), N = 2 and CD := 32C10 max{A0 , A1 , A2 , A3 }.
(2.50)
Proof. Let us estimate the constant CD in (2.42) on the basis of (2.19). Put N = 2 and fix y ∈ / I(x0 , 2r). Then, by the mean value theorem, there is a point ξ in the interval with the endpoints z, x ∈ I(x0 , r) such that 0 A01 2r K(z − y) − K(x − y) = |K 0 (ξ − y)||z − x| ≤ A1 |z − x| ≤ , |ξ − y|2 (|y − x0 | − r)2 which implies in view of (2.41) that (DI K)(y) ≤
A01 2r (|y − x0 | − r)2
if |y − x0 | > 2r.
(2.51)
Hence, for I = I(x0 , r), we infer from (2.51) that for all f ∈ C0∞ (R), Z X∞ Z |f (y)| 0 (DI K)(y)|f (y)|dy ≤ 2A1 r dy n=0 (|y − x0 | − r)2 n+1 n+2 |y−x0 |>2r 2 r<|y−x0 |≤2 r Z X∞ 1 ≤ 2A01 r |f (y)|dy n=0 (2n+1 r − r)2 I(x ,2n+2 r) 0 Z X∞ 1 |f (y)|dy ≤ 16A01 2−n n=0 |I(x0 , 2n+2 r)| I(x0 ,2n+2 r) ≤ 32A01 (M f )(x0 ), which together with (2.16) gives (2.42) with N = 2 and CD defined by (2.50).
214
Karlovich and Loreto Hern´ andez
IEOT
Theorems 2.5 and 2.6 and Lemma 2.7 immediately imply the following. Corollary 2.8. If the conditions of Lemma 2.7 are fulfilled, s ∈ (0, 1) and (2.52) Cs = 22/s−1 2(1 − s)−1/s (20 + 16C10 ) + 32C10 max{A0 , A1 , A2 , A3 }, then Ms] (T f ) (x0 ) ≤ Cs (M f )(x0 ) for every x0 ∈ R and every f ∈ C0∞ (R). By [19, p. 41], for each p ∈ (1, ∞), each w ∈ Ap (R) and each s ∈ (0, 1) there exists a constant Cp,w,s ∈ (0, ∞) such that Z Z p/s p ] p/s p (M f )(x) w (x)dx ≤ Cp,w,s (M f )(x) w (x)dx (f ∈ C0∞ (R)). R
R
(2.53) Since M ∈ B(Lp (R, w)) for all 1 < p < ∞ and all w ∈ Ap (R), the Lebesgue differentiation theorem, (2.53) and Corollary 2.8 yield, as in [1], that for every f ∈ C0∞ (R), Z h Z ip/s p (T f )(x) p wp (x)dx ≤ M (|T f |s ) (x) w (x)dx R R Z h Z h ip ip/s p w (x)dx = Cp,w,s Ms] (T f ) (x) wp (x)dx ≤ Cp,w,s M ] (|T f |s ) (x) R R Z p ≤ Cp,w,s Csp (M f )(x) wp (x)dx ≤ Cp,w,s Csp kM kpB(Lp (R,w)) kf kpLp (R,w) . (2.54) R
Thus, taking s = 1/2 in (2.54) and (2.52), we obtain the following. Theorem 2.9. If T is the Calder´ on-Zygmund operator given by (2.20), with a kernel K satisfying (2.19), (2.16) and (2.1), then T is bounded on every weighted Lebesgue space Lp (R, w) with 1 < p < ∞ and w ∈ Ap (R), and ep,w max{Aγ : γ = 0, 1, 2, 3}, kT kB(Lp (R,w)) ≤ C 0 ep,w := 20 · 64 C 1/p p C p,w,1/2 (1 + C1 )kM kB(L (R,w)) < ∞.
Corollary 2.10. If a ∈ C 3 (R \ {0}) and kDγ akL∞ (R) < ∞ for all γ = 0, 1, 2, 3, then the convolution operator W 0 (a) is bounded on every weighted Lebesgue space Lp (R, w) with 1 < p < ∞ and w ∈ Ap (R), and ep,w max kDγ akL∞ (R) : γ = 0, 1, 2, 3 < ∞, kW 0 (a)kB(Lp (R,w)) ≤ C ep,w ∈ (0, ∞) depends only on p and w. where the constant C
3. Slowly oscillating symbols and Fourier multipliers on Lp (R, w) Consider the commutative C ∗ -algebra SO of slowly oscillating functions defined by ˙ (1.3). Clearly, SO is a subalgebra of L∞ (R) which contains all functions in C(R). ˙ ˙ Identifying the points t ∈ R with the evaluation functionals δt on R, δt (f ) = f (t),
Vol. 64 (2009) Wiener-Hopf Operators with Slowly Oscillating Symbols
215
where δ∞ (f ) = lim f (x), we see that the maximal ideal space M(SO) of SO is x→∞
of the form M(SO) = R ∪ M∞ (SO) where n o M∞ (SO) = ξ ∈ M(SO) : ξ|C(R) ˙ = δ∞ is the fiber of M(SO) over ∞. By [4, Proposition 5], M∞ (SO) = (clos SO∗ R) \ R where clos SO∗ R is the weak-star closure of R in SO∗ , the dual space of SO. Thus, any functional ξ ∈ M∞ (SO) is the limit of a net tα ∈ R that does not converge to functionals t ∈ R, that is, f (ξ) := ξ(f ) = lim f (tα ) for every f ∈ SO. α
{ak }∞ k=1
Proposition 3.1. [4, Proposition 6] Let be a countable subset of SO. If ξ ∈ M∞ (SO), then there exists a sequence g = {gn } ⊂ R such that gn → ∞ and ξ(ak ) = lim ak (gn ), n→∞
k ∈ N.
(3.1)
Conversely, if gn ∈ R, gn → ∞, and the limits lim ak (gn ) exist for all k, then n→∞
there is a ξ ∈ M∞ (SO) such that (3.1) holds. Consider the commutative Banach algebras n o 3 g := a ∈ Cb (R) ∩ C 3 (R) : lim (Dγ a)(x) = 0, γ = 1, 2, 3 SO |x|→∞
(3.2)
3
g ∩ SO equipped with the norm and SO3 := SO kakSO3 := max kDγ akL∞ (R) : γ = 0, 1, 2, 3 = max Aγ : γ = 0, 1, 2, 3 .
(3.3)
3
g ⊂ Mp,w . Let Let 1 < p < ∞ and w ∈ Ap (R). By Corollary 2.10, SO3 ⊂ SO 3 SOp,w denote the closure of SO in Mp,w . Clearly, SOp,w is a commutative Banach subalgebra of Mp,w . Since Mp,w ⊂ M2 = L∞ (R), we conclude that SOp,w ⊂ SO. To determine the maximal ideal space M(SOp,w ) of SOp,w , we take three unital commutative Banach algebras homomorphically embedded one into another, SO3 ⊂ SOp,w ⊂ SO,
(3.4)
and, by analogy with [2], apply the following result (see [31, Theorem 3.10]). Theorem 3.2. Let Bi (i = 1, 2, 3) be commutative Banach algebras with the same unit which are homomorphically embedded one into another, B1 ⊂ B2 ⊂ B3 . Suppose that B1 is dense in B2 and every multiplicative linear functional defined on B1 extends to a multiplicative linear functional on B3 . Then every multiplicative linear functional on B2 also extends to a multiplicative linear functional on B3 . Lemma 3.3. Every multiplicative linear functional defined on SO3 extends to a multiplicative linear functional on SO. Proof. As SO3 ⊂ SO, it follows that M(SO) ⊂ M(SO3 ). Indeed, let η ∈ M(SO) and a ∈ SO3 . Then, a ∈ SO and, by (3.3), kak∞ ≤ kakSO3 . Hence η(a) ≤ kηkSO∗ kak∞ ≤ kηkSO∗ kakSO3 = kakSO3 , and thus η is a (non-zero) multiplicative linear functional on SO3 .
216
Karlovich and Loreto Hern´ andez
IEOT
Suppose that ξ ∈ M(SO3 ) is not extendable to a multiplicative linear functional on SO, that is, ξ ∈ M(SO3 ) \ M(SO). Clearly, there exists a function a ∈ SO3 such that η(a) 6= 0 for all η ∈ M(SO) and ξ(a) = 0. Since a ∈ SO and SO is a C ∗ -algebra, we infer that the function a is invertible in SO. But the inverse function 1/a automatically belongs to SO3 , that is, SO3 is inverse closed in SO. Then from the Gelfand theory (see e.g., [29, Chapter 11]) it follows that ξ(a) 6= 0, and we arrive at a contradiction, which completes the proof. Choosing the commutative Banach algebras B1 = SO3 , B2 = SOp,w and B3 = SO that satisfy (3.4) and have the same unit, and taking into account the density of SO3 in SOp,w in the norm of Mp,w , we deduce from Theorem 3.2 and Lemma 3.3 that every multiplicative linear functional on SOp,w extends to a multiplicative linear functional on SO, that is, M(SOp,w ) ⊂ M(SO). On the other hand, M(SO) ⊂ M(SOp,w ) because SOp,w ⊂ SO. Thus we get the following. Lemma 3.4. If 1 < p < ∞ and w ∈ Ap (R), then the maximal ideal spaces of SOp,w and SO coincide as sets, that is, M(SOp,w ) = M(SO). Lemma 3.4 and the Gelfand theory immediately give the following assertion. Corollary 3.5. If 1 < p < ∞ and w ∈ Ap (R), then the Banach algebra SOp,w is inverse closed in the C ∗ -algebras SO and L∞ (R). Let V (R) be the Banach algebra of all functions a : R → C of bounded total variation equipped with the norm kakV := kakL∞ (R) + V1 (a), where V1 (a) is the total variation of a. Then V (R) ⊂ P C (see, e.g., [23, Chapter VI, § 2]). ˙ ⊂ SOp,w and, for every Lemma 3.6. If 1 < p < ∞ and w ∈ Ap (R), then Cp,w (R) ˙ vanishing at infinity and every a ∈ SOp,w , the product ba belongs to b ∈ Cp,w (R) ˙ and (ba)(∞) = 0. the algebra Cp,w (R) ˙ with b(∞) = 0 can be approximated Proof. Since every function b ∈ Cp,w (R) ˙ ∩ V (R) with compact support and since every in Mp,w by functions bn ∈ C(R) function a ∈ SOp,w can be approximated in Mp,w by functions an ∈ SO3 , we infer ˙ and (ba)(∞) = 0 because all the functions bn an that ba = limn→∞ bn an ∈ Cp,w (R) ˙ ∩ V (R). have compact support and belong to C(R) ˙ On the other hand, every function c ∈ C(R)∩V (R) with compact support can be approximated in Mp,w by continuous piecewise linear functions with compact support (see [12, Lemma 2.10 and Theorem 2.11]). Hence the function c can be ˙ ∩ V (R) and therefore in Mp,w by functions cn ∈ C 3 (R) ˙ approximated in C(R) with compact support. Obviously, cn ∈ SO3 , which implies that c ∈ SOp,w . Let ˙ Since the function b−b(∞) can be approximated in Mp,w by functions b ∈ Cp,w (R). ˙ in C(R) ∩ V (R) with compact support and these functions belong to SOp,w , we ˙ ⊂ SOp,w . conclude that Cp,w (R) If u± (x) := [1 ± tanh x]/2 for x ∈ R, then u± ∈ Cp,w (R) and u+ (+∞) = 1, u+ (−∞) = 0, u− = 1 − u+ .
(3.5)
Vol. 64 (2009) Wiener-Hopf Operators with Slowly Oscillating Symbols
217
Clearly, from Lemma 3.6 it follows that the set a+ u+ + a− u− : a± ∈ SOp,w , u± ∈ Cp,w (R) and (3.5) holds is an algebra. Consider the Banach subalgebra [SOp,w , Cp,w (R)] of Mp,w generated 3 gp,w be the closure of SO g in Mp,w , by all functions in SOp,w ∪ Cp,w (R), and let SO 3
g is given by (3.2). Obviously, SO gp,w is a Banach subalgebra of Mp,w . where SO gp,w and Lemma 3.7. If 1 < p < ∞ and w ∈ Ap (R), then the Banach algebras SO [SOp,w , Cp,w (R)] coincide, and every function a in [SOp,w , Cp,w (R)] is of the form a = a+ u+ + a− u− ,
(3.6)
where a± ∈ SOp,w and u± (x) = [1 ± tanh x]/2 for x ∈ R. Proof. By [12, Lemma 2.10 and Theorem 2.11], every function c ∈ C(R) ∩ V (R) can be approximated in Mp,w by continuous piecewise linear functions. Hence the function c can be approximated in C(R)∩V (R) and therefore in Mp,w by functions 3 g , which cn ∈ C 3 (R) whose derivative c0n have compact supports. Clearly, cn ∈ SO gp,w . Thus, C(R) ∩ V (R) ⊂ SO gp,w . Since Cp,w (R) implies that c = limn→∞ cn ∈ SO gp,w too. is the closure of C(R) ∩ V (R) in Mp,w , we conclude that Cp,w (R) ⊂ SO g g Obviously, SOp,w ⊂ SOp,w and, consequently, [SOp,w , Cp,w (R)] ⊂ SOp,w . gp,w . Put e Conversely, let a ∈ SO a+ (x) := a(|x|) and e a− (x) := a(−|x|) for x ∈ R. Obviously, e a± ∈ SOp,w , which implies that ˙ a0 := a − e a+ u+ − e a− u− ∈ Cp,w (R)
and a(∞) = 0.
(3.7)
gp,w . Hence, a ∈ [SOp,w , Cp,w (R)], and therefore [SOp,w , Cp,w (R)] = SO ˙ Finally, since Cp,w (R) ⊂ SOp,w according to Lemma 3.6, we deduce from (3.7) that a is represented in the form (3.6) where a± := e a± + a0 ∈ SOp,w . Consider the homomorphic embeddings of the commutative Banach algebras [SO3 , C 3 (R) ∩ V (R)] ⊂ [SOp,w , Cp,w (R)] ⊂ [SO, C(R)], where [SO3 , C 3 (R) ∩ V (R)] is the Banach algebra with the norm n o kf k = max kf kL∞ (R) , V1 (f ), kDγ f kL∞ (R) , γ = 1, 2, 3 . Representing functions a ∈ [SO, C(R)] in the form (3.6) due to Lemma 3.7, one can identify the fibers M± ∞ (SO) of M([SO, C(R)]) with the fiber M∞ (SO) of M(SO) by the rule: for every ξ± ∈ M± ∞ (SO) there is a ξ ∈ M∞ (SO) and for every ξ ∈ M∞ (SO) there are ξ± ∈ M± (SO) such that ξ± (a+ u+ + a− u− ) = ξ(a± ). ∞ Analogously to Lemma 3.4 and Corollary 3.5 one can prove the following. Lemma 3.8. For every p ∈ (1, ∞) and every w ∈ Ap (R), the Banach algebra [SOp,w , Cp,w (R)] is inverse closed in the C ∗ -algebras [SO, C(R)] and L∞ (R), and + M([SOp,w , Cp,w (R)]) = M([SO, C(R)]) = M− ∞ (SO) ∪ R ∪ M∞ (SO).
218
Karlovich and Loreto Hern´ andez
IEOT
4. Limit operators To study Wiener-Hopf operators with symbols in the algebra [SOp , Cp,w (R)] on weighted Lebesgue spaces Lp (R+ , w), we need to apply the limit operators techniques (see [4], [6], [27]) to corresponding operators acting on the space Lp (R). Given p ∈ (1, ∞), for every k > 0 we consider the isometric dilation operators Uk ∈ B(Lp (R)),
(Uk f )(x) = k 1/p f (kx)
p
(x ∈ R).
(4.1)
p
Let A ∈ B(L (R)). The operator Ah ∈ B(L (R)) is called the limit operator of A with respect to a sequence h = {hm } of positive real numbers tending to +∞ if Ah = s-lim Uhm AUh−1 . m m→∞
By [4] and [6], for every function a ∈ SO and every sequence h ⊂ R+ tending to +∞ there is a subsequence g of h such that there exists the limit operator (aI)g := s-lim Uhm aUh−1 = a g I and ag is a constant. Thus, if a ∈ SO and m m→∞
ξ ∈ M∞ (SO), then (aI)g = ξ(a)I under the conditions of Proposition 3.1. Following [5, Section 1.5], for every continuous function ψ : R+ → R+ , we consider the submultiplicative functions ψ(xR) ψ(xR) , (W00 ψ)(x) := lim sup (x ∈ R+ ). (4.2) (W0 ψ)(x) := sup ψ(R) ψ(R) R→0 R>0 If the function W0 ψ is regular, that is, if W0 ψ is bounded from above in some open neighborhood of the point 1, then, by [5, Lemma 1.16], the function W00 ψ is also regular and has the same with W0 ψ lower and upper indices log(W00 ψ)(x) log(W00 ψ)(x) , βψ := lim (4.3) x→∞ x→0 log x log x where −∞ < αψ ≤ βψ < +∞ (see, e.g., [5, Theorem 1.13]). A slight modification of the proof in [5, Theorem 2.33] gives the following. αψ := lim
Theorem 4.1. If 1 < p < ∞, w : R+ → R+ is a continuous function and W0 w is regular, then w ∈ Ap (R+ ) if and only if −1/p < αw ≤ βw < 1 − 1/p. We say that σ ∈ SO0 if σ ∈ Cb (R+ ) and lim max σ(y) − σ(z) = 0. x→0 y,z∈[x,2x]
(4.4)
Obviously, SO0 is a C ∗ -subalgebra of L∞ (R+ ). If w = ev ∈ Ap (R+ ) for some p ∈ (1, ∞) where the function v : R+ → R is continuously differentiable (v ∈ C 1 (R+ )) and the function σ : t 7→ tv 0 (t) belongs to the C ∗ -algebra SO0 , then Z xR dt lim sup v(xR) − v(R) = lim sup tv 0 (t) t R→0 R→0 R 0 (4.5) lim inf [tv (t)] ln x if x ∈ (0, 1), t→0 = lim sup [tv 0 (t)] ln x if x ∈ (1, ∞). t→0
Vol. 64 (2009) Wiener-Hopf Operators with Slowly Oscillating Symbols
219
Hence the function W0 w is regular in view of the estimate (W0 w)(x) = sup ev(xR)−v(R) ≤ ekσkL∞ (R+ ) | ln x|
(x ∈ R+ ),
R>0
and from (4.2), (4.3) and (4.5) it follows that αw = lim inf [tv 0 (t)], t→0
βw = lim sup [tv 0 (t)].
(4.6)
t→0
Consequently, by Theorem 4.1 and [5, Corollary 1.14], for every ε > 0 for which −1/p < αw − ε < βw + ε < 1/q there are x0 ∈ (0, 1) and Cw ∈ (0, ∞) such that α −ε x w for x ∈ (0, x0 ), w(kx) Cw for x ∈ [x0 , x−1 sup (4.7) ≤ 0 ], βw +ε k>0 w(k) x for x ∈ (x−1 , ∞). 0 We now consider the Banach space L := χ[0,1] Lp (R+ , xαw −ε ) + χ[1,∞) Lp (R+ , xβw +ε )
(4.8)
equipped with the norm kf kL = kχ[0,1] f kLp (R+ ,xαw −ε ) + kχ[1,∞) f kLp (R+ ,xβw +ε ) . Obviously, from (4.7) it follows that the operators w(kx) I : L → Lp (R+ ) (k > 0) (4.9) w(k) w +ε are uniformly bounded and kAk k ≤ Cw max x−α , 1, xβ0 w +ε . 0 Since for every function σ ∈ SO0 the function σ e(x) := σ(1/|x|) e−1/|x| belongs to SO, we can identify the fibers M0 (SO0 ) and M∞ (SO) by the rule: ξ0 (σ) := ξ(e σ ) for every ξ ∈ M∞ (SO). Hence, if a± ∈ SOp,w and the function σ : t 7→ tv 0 (t) belongs to the C ∗ -algebra SO0 , then, by Proposition 3.1, for every ξ ∈ M∞ (SO) there is a sequence {kn } ⊂ R+ such that Ak :=
lim kn = 0, γξ := ξ(e σ ) = lim kn v 0 (kn ), a± (ξ) := ξ(a± ) = lim a± (1/kn ).
n→∞
n→∞
n→∞
(4.10) Lemma 4.2. If a = a+ u+ + a− u− where a± ∈ SO3 and u± (x) = 2−1 [1 ± tanh x] on R, and {kn } ⊂ R+ is a sequence satisfying the first and the last relations in (4.10) for some ξ ∈ M∞ (SO), then for every p ∈ (1, ∞) and every γ ∈ (−1/p, 1 − 1/p), s-lim Ukn |x|γ W 0 (a)|x|−γ Uk−1 = |x|γ W 0 (a+ (ξ)χ+ + a− (ξ)χ− )|x|−γ I n n→∞
(4.11)
on the space Lp (R), where χ± are the characteristic functions of R± . Proof. Because a± ∈ SO3 and u± ∈ V (R), the operator W 0 (a) is bounded on every space Lp (R, |x|γ ) with p ∈ (1, ∞) and γ ∈ (−1/p, 1 − 1/p). Since Ukn |x|γ W 0 (a)|x|−γ Uk−1 = |x|γ W 0 (a(·/kn ))|x|−γ I ∈ B(Lp (R)), n to prove (4.11), it remains to show that s-lim W 0 (a± (·/kn ) − a± (ξ)) = 0, n→∞
s-lim W 0 (u± (·/kn ) − χ± ) = 0 n→∞
(4.12)
220
Karlovich and Loreto Hern´ andez
IEOT
on the spaces Lp (R, |x|γ ). By analogy with [20, Lemma 2.5], one can prove that if 1 < p < ∞ and w ∈ Ap (R), then the set Y of all functions ψ ∈ L2 (R)∩Lp (R, w) for which Fψ has compact support in R \ {0} is dense in Lp (R, w). Therefore, taking any function f ∈ Lp (R, |x|γ ) for which Ff has a compact support in R \ {0}, we infer that W 0 (a± (·/kn ) − a± (ξ))f = W 0 (a± (·/kn ) − a± (ξ))χl f, (4.13) W 0 (u± (·/kn ) − χ± )f = W 0 (u± (·/kn ) − χ± )χl f, −1 where χl is the characteristic function of a set l = [−t0 , −t−1 0 ] ∪ [t0 , t0 ] containing supp Ff for some t0 > 1. Since a± , u± ∈ SO, it follows that
lim (u± (·/kn ) − χ± )χl = 0. (4.14) lim (a± (·/kn ) − a± (ξ))χl = 0, ∞
n→∞
∞
n→∞
On the other hand, we obtain Z
V1 (a± (·/kn ) − a± (ξ))χl ≤ kn−1 a0± (t/kn ) dt + 2 (a± (·/kn ) − a± (ξ))χl ∞ , Zl
V1 (u± (·/kn ) − χ± )χl ≤ kn−1 u0± (t/kn ) dt + 2 (u± (·/kn ) − χ± )χl ∞ . l
(4.15) As a± ∈ SO3 and u± (x) = 2−1 [1 ± tanh x], we conclude that lim kn−1 a0± (t/kn ) = 0,
n→∞
lim kn−1 u0± (t/kn ) = 0
n→∞
uniformly on the compact l, which implies in view of (4.14) and (4.15) that lim V1 (a± (·/kn ) − a± (ξ))χl = 0, lim V1 (u± (·/kn ) − χ± )χl = 0. (4.16) n→∞
n→∞
Finally, from (4.14) and (4.16) it follows due to Stechkin’s inequality (1.2) that
lim (a± (·/kn ) − a± (ξ))χl M γ = 0, p,|x| n→∞
lim (u± (·/kn ) − χ± )χl M γ = 0, n→∞
p,|x|
which according to (4.13) gives (4.12) and hence proves (4.11).
If w ∈ Ap (R), then w|R+ ∈ Ap (R+ ). On the other hand, with every weight w ∈ Ap (R+ ) we will identify the symmetric weight w(| · |) ∈ Ap (R). Let Uk (k > 0) denote both the dilation operators (4.1) on Lp (R) and their restrictions on Lp (R+ ). Theorem 4.3. If a = a+ u+ + a− u− ∈ [SOp,w , Cp,w (R)] where a± ∈ SOp,w and u± (x) = 2−1 [1 ± tanh x] on R, 1 < p < ∞, w = ev ∈ Ap (R+ ), v ∈ C 1 (R+ ), the function σ : t 7→ tv 0 (t) belongs to the C ∗ -algebra SO0 , and {kn } ⊂ R+ is a sequence satisfying (4.10) for some ξ ∈ M∞ (SO), then s-lim Ukn ev W (a)e−v Uk−1 = xγξ W (a+ (ξ)χ+ + a− (ξ)χ− )x−γξ I (4.17) n n→∞
where γξ = lim (kn v 0 (kn )), a± (ξ) = lim a± (1/kn ), and χ± are the characteristic n→∞ n→∞ functions of R± .
Vol. 64 (2009) Wiener-Hopf Operators with Slowly Oscillating Symbols
221
Proof. Put α := αw , β := βw . Since w ∈ Ap (R+ ), then by Theorem 4.1 and (4.6), −1/p < α = lim inf [tv 0 (t)] ≤ β = lim sup[tv 0 (t)] < 1 − 1/p. t→0
t→0
Taking a sequence {kn } ⊂ R+ satisfying (4.10), let us show that for the operators Ak : L → Lp (R+ ) given by (4.9), where L is defined by (4.8), we get s-lim Akn = xγξ I n→∞
where
γξ = ξ0 (σ) = ξ(e σ ).
(4.18)
Note that for every γ ∈ [α, β] the operator xγ I is bounded from the space L into the space Lp (R+ ) and kxγ Ik ≤ 1. Indeed, Z ∞ Z Z 1 (γ−α+ε)p α−ε p γp p x(γ−β−ε)p |xβ+ε f (x)|p dx x |x f (x)| dx + x |f (x)| dx = 1
0
R+
1
Z
|xα−ε f (x)|p dx +
≤ 0
Z
∞
|xβ+ε f (x)|p dx = kf kpL .
1
(4.19)
Since σ ∈ SO, from (4.4) it follows that for every x0 > 1, lim
n→∞
|σ(t) − γξ | = 0.
sup t∈[kn x−1 0 ,kn x0 ]
Hence the equality Z
kn x
v(kn x) − v(kn ) − γξ ln x =
[tv 0 (t) − γξ ]
kn
dt t
implies that lim v(kn x) − v(kn ) − γξ ln x = 0
(4.20)
n→∞
uniformly with respect to x ∈ [x−1 0 , x0 ]. Further, for every segment l ⊂ R+ and every f ∈ L, from (4.19) it follows that
Akn − xγξ I χl f p = ev(kn x)−v(kn )−γξ ln x − 1 χl xγξ f Lp (R+ ) L (R+ )
≤ ev(kn x)−v(kn )−γξ ln x − 1 L∞ (l) kxγξ f kLp (R+ ) ≤ esupx∈l |v(kn x)−v(kn )−γξ ln x| − 1 kf kL . (4.21) γξ Relations (4.20) and (4.21) imply that lim Akn − x I χl f = 0 for every l ⊂ R+ n→∞
and every f ∈ L, which gives (4.18) because the operators Akn −xγξ I are uniformly bounded in B(L, Lp (R+ )). Clearly, for every a ∈ Cp,w (R), Ukn ev W (a)e−v Uk−1 = ev(kn x)−v(kn ) W (a(x/kn ))e−v(kn x)+v(kn ) I, n and these operators are uniformly bounded on the space Lp (R+ ). Thus, to prove (4.17), it remains to show that for every segment l = [x−1 0 , x0 ] ⊂ R+ and every function f ∈ Lp (R+ ),
γξ −γξ I χl f p = 0. lim Akn W (a(x/kn ))A−1 kn − x W (a+ (ξ)χ+ + a− (ξ)χ− )x n→∞
L (R+ )
(4.22)
222
Karlovich and Loreto Hern´ andez
IEOT
Since every function a ∈ Cp,w (R) can be approximated in Mp,w by functions in V (R), it is sufficient to prove (4.22) for functions a ∈ V (R). By Stechkin’s inequality (1.2) the operators W (a(x/kn )) are uniformly bounded on every Banach space Lp (R+ , w) with 1 < p < ∞ and w ∈ Ap (R+ ). Thus, to prove (4.22) for a ∈ V (R), it remains to show that every summand on the right of the following estimate tends to zero as n → ∞:
γξ −γξ − x W (a (ξ)χ + a (ξ)χ ) x I χ f
Akn W (a(x/kn ))A−1 + + − − l p kn L (R+ )
−1 −γξ
≤ kAkn kB(L,Lp (R+ )) W (a(x/kn )) Akn − x I χl f L
+ kAkn kB(L,Lp (R+ )) W (a(x/kn )) − W (a+ (ξ)χ+ + a− (ξ)χ− ) x−γξ χl f L
+ Akn − xγξ I W (a+ (ξ)χ+ + a− (ξ)χ− ) x−γξ χl f Lp (R+ ) . (4.23) Since W (a+ (ξ)χ+ + a− (ξ)χ− )x−γξ χl f ∈ L in view of the estimate
W (a+ (ξ)χ+ + a− (ξ)χ− ) x−γξ χl f L
≤ W (a+ (ξ)χ+ + a− (ξ)χ− ) B(Lp (R+ ,xα−ε )) x−γξ χl f Lp (R+ ,xα−ε )
+ W (a+ (ξ)χ+ + a− (ξ)χ− ) B(Lp (R+ ,xβ+ε )) x−γξ χl f Lp (R+ ,xβ+ε ) < ∞,
(4.24)
we infer from (4.18) that
lim Akn − xγξ I W (a+ (ξ)χ+ + a− (ξ)χ− )x−γξ χl f Lp (R+ ) = 0.
(4.25)
By analogy with (4.24), we obtain
W (a(x/kn )) − W (a+ (ξ)χ+ + a− (ξ)χ− ) x−γξ χl f L
≤ W (a(x/kn )) − W (a+ (ξ)χ+ + a− (ξ)χ− ) x−γξ χl f Lp (R+ ,xα−ε )
+ W (a(x/kn )) − W (a+ (ξ)χ+ + a− (ξ)χ− ) x−γξ χl f Lp (R+ ,xβ+ε )
(4.26)
n→∞
and
W (a(x/kn )) A−1 − x−γξ I χl f kn
L
−γξ ≤ W (a(x/kn )) B(Lp (R+ ,xα−ε )) A−1 I χl f Lp (R+ ,xα−ε ) kn − x
−γξ + W (a(x/kn )) B(Lp (R ,xβ+ε )) A−1 I χl f Lp (R ,xβ+ε ) . kn − x +
+
(4.27)
Since x−γξ χl f ∈ Lp (R+ , xα−ε ) ∩ Lp (R+ , xβ+ε ) and since, by Lemma 4.2, s-lim W (a(x/kn )) = W (a+ (ξ)χ+ + a− (ξ)χ− ) n→∞
on both the spaces Lp (R+ , xα−ε ) and Lp (R+ , xβ+ε ), we conclude from (4.26) that
lim W (a(x/kn )) − W (a+ (ξ)χ+ + a− (ξ)χ− ) x−γξ χl f L = 0. (4.28) n→∞
Vol. 64 (2009) Wiener-Hopf Operators with Slowly Oscillating Symbols
223
Applying (4.20), we infer from the estimate
−1
A − x−γξ I χl f p kn L (R+ ,xα−ε )
−(v(k x)−v(k )−γ ln x)
n n ξ = e − 1 x−γξ χl f Lp (R ,xα−ε ) + ≤ esupx∈l |v(kn x)−v(kn )−γξ ln x| − 1 kx−γξ χl f kLp (R+ ,xα−ε ) that
−γξ lim A−1 I χl f Lp (R kn − x
= 0.
(4.29)
−γξ lim A−1 I χl f Lp (R+ ,xβ+ε ) = 0. kn − x
(4.30)
n→∞
+ ,x
α−ε )
Analogously, n→∞
Since the operators W (a(x/kn )) are uniformly bounded for a ∈ V (R) on both the spaces Lp (R+ , xα−ε ) and Lp (R+ , xβ+ε ), we deduce from (4.27), (4.29) and (4.30) that
−γξ lim W (a(x/kn )) A−1 I χl f L = 0. (4.31) kn − x n→∞
Finally, as the operators Akn ∈ B(L, Lp (R+ )) are uniformly bounded, we infer from (4.25), (4.28) and (4.31) that every summand on the right of (4.23) tends to zero as n → ∞, which completes the proof.
5. Local Fredholm study Consider the Laguerre polynomials Ln (x) :=
n X n (−1)k k 1 x dn n −x e (x e ) = x n n! dx k k!
(n = 0, 1, 2, . . .).
k=0
As is known (see, e.g. [33, Chapter 5]), the functions √ ψn (x) := 2 Ln (2x) e−x (n = 0, 1, 2, . . .)
(5.1)
form an orthogonal basis in L2 (R+ ). By [8, p. 487] and [16, Chapter I, § 8.3], ψn = W n (x − i)/(x + i) ψ0 for all n ∈ N. (5.2) Obviously, ψn ∈ Lp (R+ , w) for n = 0, 1, 2, . . ., all p ∈ (1, ∞) and all w ∈ Ap (R+ ). By analogy with [23, p. 404], one can prove the following. Lemma 5.1. If 1 < p < ∞ and w ∈ Ap (R+ ), then the linear hull of the system {ψ0 , ψ1 , ψ2 , . . .} given by (5.1) is dense in the space Lp (R+ , w). Proof. According to (5.1), it is sufficient to prove that the linear hull of the system {xn e−x : n = 0, 1, 2, . . .} ⊂ Lp (R+ , w) is dense in Lp (R+ , w). Suppose this is false. Then, by the Hahn-Banach theorem, there exists a non-zero function h ∈ Lq (R+ , w−1 ) such that Z xn e−x h(x)dx = 0 for all n = 0, 1, 2, . . . . (5.3) R+
224
Karlovich and Loreto Hern´ andez
IEOT
Let f be the extension of the function x 7→ e−x h(x) by zero to the whole R. Since eδ|x| f ∈ L1 (R) for every δ ∈ [0, 1), the function Z g(λ) = f (x)e−iλx dx (λ ∈ R) R
admits an analytic extension to the strip Π := {z ∈ C : |Im z| < 1} (see [23, Chapter VIII, § 4]). By (5.3), for all n = 0, 1, 2, . . . it follows that Z (n) n g (0) = (−1) xn f (x)dx = 0. R
Hence, the analytic function g equals zero for all z ∈ Π, and therefore h(x) = 0 for all x ∈ R+ , which is impossible. Thus, the span of the system {ψ0 , ψ1 , ψ2 , . . .} is dense in the space Lp (R+ , w). ˙ denote the smallest Given 1 < p < ∞ and w ∈ Ap (R+ ), let alg p,w W (C(R)) p ˙ closed subalgebra of B(L (R+ , w)) containing the set {W (c) : c ∈ Cp,w (R)}. Taking into account (5.2), applying Lemma 5.1 and literally repeating the proof of [8, p. 487] for Lp (R+ , w) in place of Lp (R+ ), we obtain the following. ˙ Lemma 5.2. For p ∈ (1, ∞) and w ∈ Ap (R+ ), the Banach algebra alg p,w W (C(R)) p p contains the ideal K(L (R+ , w)) of all compact operators in B(L (R+ , w)). We also need the following compactness results. Lemma 5.3. If a ∈ P C and b ∈ SOp,w where 1 < p < ∞ and w ∈ Ap (R), then the commutator [aI, W 0 (b)] = aW 0 (b) − W 0 (b)aI is compact on the space Lp (R, w). Proof. Since the algebra SO3 is dense in every Banach algebra SOp,w (1 < p < ∞, w ∈ Ap (R)), it is sufficient to prove the compactness of the commutator [aI, W 0 (b)] on the spaces Lp (R, w) for a ∈ P C and b ∈ SO3 . By [2, Theorem 4.2], for such a and b, the commutator [aI, W 0 (b)] is compact on every space Lp (R) (1 < p < ∞). Since this operator is bounded on all the spaces Lp (R, w) with w ∈ Ap (R), we infer by analogy with [24, Theorem 3.10] and [22, Theorem 3.2] that the commutator [aI, W 0 (b)] is compact on all the spaces Lp (R, w) (1 < p < ∞, w ∈ Ap (R)). Lemma 5.4. If a, b ∈ [SOp,w , Cp,w (R)] where 1 < p < ∞ and w ∈ Ap (R), then the commutator [W (a), W (b)] is compact on the space Lp (R+ , w). Proof. If b ∈ SOp,w where 1 < p < ∞ and w ∈ Ap (R), from Lemma 5.3 it follows that the operator χ+ W 0 (b) − W 0 (b)χ+ I is compact on the space Lp (R, w). Hence, for every a ∈ [SOp,w , Cp,w (R)] and every b ∈ SOp,w , we obtain χ+ W 0 (a)χ+ W 0 (b)χ+ I ' χ+ W 0 (ab)χ+ ' χ+ W 0 (b)χ+ W 0 (a)χ+ I,
(5.4)
where A ' B means that A − B is a compact operator. Obviously, (5.4) implies that for every a ∈ [SOp,w , Cp,w (R)] and every b ∈ SOp,w , W (a)W (b) − W (ab), W (b)W (a) − W (ab) ∈ K(Lp (R+ , w)), p
W (a)W (b) − W (b)W (a) ∈ K(L (R+ , w)).
(5.5) (5.6)
Vol. 64 (2009) Wiener-Hopf Operators with Slowly Oscillating Symbols
225
e where c, d, e If both a, b ∈ [SOp,w , Cp,w (R)], then a = c + du and b = e c + du c, de ∈ SOp,w and u(x) = tanh x for x ∈ R. Consequently, (5.5) and (5.6) imply that e (u) W (a)W (b) ' W (c) + W (d)W (u) W (e c) + W (d)W e (u) + W (dd)[W e ' W (ce c) + W (de c + cd)W (u)]2 e (u) W (c) + W (d)W (u) ' W (b)W (a) ' W (e c) + W (d)W for all a, b ∈ [SOp,w , Cp,w (R)], which completes the proof.
Given p ∈ (1, ∞), w ∈ Ap (R) and N ∈ N, we consider the Banach subalgebras n o A = alg W (a) : a ∈ [SOp,w , Cp,w (R)]N ×N , n o Z = alg W (bIN ) : b ∈ SOp,w of B(LpN (R+ , w)) generated by the operators W (a) with a ∈ [SOp,w , Cp,w (R)]N ×N and a = bIN (b ∈ SOp,w ), respectively, where IN is the N × N identity matrix. We also consider the quotient Banach algebras Aπ := A/K and Z π := (Z + K)/K with elements W π (a) := W (a) +K, where K = K(LpN (R+ , w)) ⊂ A by Lemma 5.2. Obviously, (5.6) implies that Z π is a central subalgebra of Aπ . Let Λ = Λ(Z) stand for the Banach subalgebra of B(LpN (R+ , w)) consisting of all operators of local type with respect to Z, that is, n o Λ := A ∈ B(LpN (R+ , w)) : W (bIN )A − AW (bIN ) ∈ K for all b ∈ SOp,w . For every ξ ∈ M(SO) = M(SOp,w ), let Jξπ and Jeξπ be the smallest closed two-sided ideals of the Banach algebra Aπ and Λπ , respectively, that contain the maximal ideal n o Iξπ := W π (bIN ) : b ∈ SOp,w , ξ(b) = 0 (5.7) of the commutative algebra Z π . Consider the quotient Banach algebras Aπξ := Aπ /Jξπ and Λπξ := Λπ /Jeξπ . Then for a ∈ [SOp,w , Cp,w (R)]N ×N it follows that Wξπ (a) := W π (a) + Jξπ ∈ Aπξ ,
fξπ (a) := W π (a) + Jeξπ ∈ Λπξ . W
The Banach algebra Λπ := Λ/K is inverse closed in the Calkin algebra B π := B/K, Aπ ⊂ Λπ , and Z π is a central subalgebra of Λπ . Thus, the operator W (a) ∈ A with a symbol a ∈ [SOp,w , Cp,w (R)]N ×N is Fredholm on the space LpN (R+ , w) if and only if the coset W π (a) is invertible in the quotient algebra Λπ . By the AllanDouglas local principle (see, e.g. [8, Theorem 1.35]), the coset W π (a) is invertible f π (a) is invertible in the quotient algebra in the algebra Λπ if and only if the coset W ξ π Λξ for every ξ ∈ M(SO), which gives a Fredholm criterion for the operator W (a). On the other hand, the coset W π (a) is invertible in the quotient algebra Aπ if and only if the coset Wξπ (a) is invertible in the quotient algebra Aπξ for every ξ ∈ M(SO), which gives sufficient Fredholm conditions for the operators W (a) and guarantees that the regularizers for such operators belong to the algebra A.
226
Karlovich and Loreto Hern´ andez
IEOT
Lemma 5.5. If a ∈ [SOp,w , Cp,w (R)]N ×N where 1 < p < ∞, w ∈ Ap (R) and N ∈ N, then for every ξ ∈ R the following assertions are equivalent: (i) the coset Wξπ (a) is invertible in the quotient algebra Aπξ , f π (a) is invertible in the quotient algebra Λπ , (ii) the coset W ξ ξ (iii) det a(ξ) 6= 0. Proof. Given a ∈ [SOp,w , Cp,w (R)]N ×N and ξ ∈ R, let us show that W π (a) − W π (a(ξ)) = W π (a − a(ξ)) ∈ Jξπ ,
(5.8)
is represented in the form n Xn o Jξπ = closAπ Aπi Biπ : Aπi ∈ Aπ , Biπ ∈ Iξπ , n ∈ N .
(5.9)
where the ideal
Jξπ
i=1
Because the matrix function e a := a − a(ξ) belongs to [SOp,w , Cp,w (R)]N ×N along with a, we conclude that W π (e a) ∈ Aπ . Moreover, e a(ξ) = 0N where 0N is the N × N zero matrix. By (3.6), e a is represented in the form e a = a+ u+ + a− u− , where a± ∈ [SOp,w ]N ×N and the functions u± : x 7→ 2−1 [1 ± tanh x] are in Cp,w (R) and satisfy (3.5). Hence we obtain e a = [a+ − a+ (ξ)]u+ + [a− − a− (ξ)]u− + a+ (ξ)[u+ − u+ (ξ)] + a− (ξ)[u− − u− (ξ)], = [a+ − a+ (ξ)]u+ + [a− − a− (ξ)]u− + [a+ (ξ) − a− (ξ)] [c+ u+ − c− u− ], where the matrix functions a+ − a+ (ξ) and a− − a− (ξ) belong to [SOp,w ]N ×N and equal 0N at the point ξ, and the functions c± =
u2 u− u+ u2− u+ (ξ)u− (ξ) − u+ u− + + − u± (ξ) u+ (ξ) u− (ξ)
˙ ⊂ SOp,w and vanish at the point ξ. Hence are in Cp,w (R) W π (e a) = W π (a+ − a+ (ξ))W π (u+ ) + W π (a− − a− (ξ))W π (u− ) + W π (a+ (ξ) − a− (ξ)) W π (c+ )W π (u+ ) − W π (c− )W π (u− ) .
(5.10)
As c± (ξ) = 0, the cosets W π (c± ) belong to the ideal Iξπ given by (5.7). Let Ei,j be the N × N matrix whose (i, j)-entry is 1 and all other entries equal zero. Since for every matrix function b = (bi,j )N i,j=1 ∈ [SOp,w ]N ×N with b(ξ) = 0N , XN XN W π (b) = W π (Ei,j )W π (bi,j ) i=1
j=1
where W π (Ei,j ) ∈ Aπ and W π (bi,j ) ∈ Iξπ , we conclude from (5.9) that W π (b) ∈ Jξπ . Hence the cosets W π (a± − a± (ξ)) are in the ideal Jξπ . Therefore, from (5.10) it follows that W π (e a) ∈ Jξπ too, which gives (5.8). Since W (a(ξ)) = χ+ F −1 a(ξ)F = a(ξ)I, we have W π (a(ξ)) = [a(ξ)I]π . Hence we infer from (5.8) and Jξπ ⊂ Jeξπ that for every ξ ∈ R, Wξπ (a) = W π (a(ξ)) + Jξπ = [a(ξ)I]π + Jξπ , f π (a) = W π (a(ξ)) + Jeπ = [a(ξ)I]π + Jeπ , W ξ ξ ξ
Vol. 64 (2009) Wiener-Hopf Operators with Slowly Oscillating Symbols
which immediately implies the assertion of the lemma.
227
Let GA denote the group of invertible elements in a unital algebra A. Lemma 5.6. If a ∈ [SOp,w , Cp,w (R)]N ×N and the Wiener-Hopf operator W (a) is Fredholm on the space LpN (R+ , w), then a ∈ G[SOp,w , Cp,w (R)]N ×N . Proof. Fix a ∈ [SOp,w , Cp,w (R)]N ×N . By Lemma 3.7, a = a+ u+ + a− u− where a± ∈ [SOp,w ]N ×N and u± (x) = 2−1 [1 ± tanh x] for x ∈ R. Then for every ξ ∈ M∞ (SO) there is a sequence {hn } ⊂ R+ such that hn → +∞ as n → ∞ and lim a± (hn ) = a± (ξ), which implies that lim a(±hn ) = lim a± (hn ) = a± (ξ). n→∞ n→∞ n→∞ Hence, by analogy with Lemma 4.2, we infer that (5.11) s-lim e±ixhn W (a)e∓ixhn I = s-lim W (a(· ± hn )) = a± (ξ)I. n→∞
n→∞
Suppose the operator W (a) is Fredholm on the space LpN (R+ , w). Then, by analogy with [7, Corollary 18.11], from (5.11) it follows that for every ξ ∈ M∞ (SO) the limit operators a± (ξ)I are invertible on the space LpN (R+ , w), and therefore + det a(ξ) 6= 0 for all ξ ∈ M+ ∞ (SO)∪M∞ (SO) (see Lemma 3.8). On the other hand, f π (a) = a(ξ)I π +Jeπ by the Allan-Douglas local principle, for every ξ ∈ R the coset W ξ ξ π is invertible in the quotient algebra Λξ , and hence, by Lemma 5.5, det a(ξ) 6= 0 for all ξ ∈ R. Consequently, by Lemma 3.8, det a(ξ) 6= 0 for all ξ ∈ M([SO, C(R)]), which implies that a is invertible in the algebra [SOp,w , Cp,w (R)]N ×N . Corollary 5.7. Let b ∈ [SOp,w ]N ×N . Then the following assertions are equivalent: (i) (ii) (iii) (iv)
the Wiener-Hopf operator W (b) is Fredholm on the space LpN (R+ , w), the matrix function b is invertible in the Banach algebra [SOp,w ]N ×N , inf x∈R | det b(x)| > 0, det b(ξ) 6= 0 for every ξ ∈ M(SOp,w ) = M(SO).
Proof. The inverse closedness of the algebra SOp,w in L∞ (R) implies the equivalence (ii)⇔(iii). The equivalence (ii)⇔(iv) follows from the Gelfand theory for det b ∈ SOp,w . Lemma 5.6 and the inverse closedness of [SOp,w ]N ×N in the algebra [SOp,w , Cp,w (R)]N ×N (see Corollary 3.5) give the implication (i)⇒(ii). Finally, if b is invertible in [SOp,w ]N ×N , then the operator W (b−1 ) is a regularizer of the operator W (b) in view of (5.5), which proves the implication (ii)⇒(i). Let 1 < p < ∞ and w ∈ Ap (R). Then each of the sets n o λ Ix (p, w) := λ ∈ R : (ξ − x)/(ξ + i) w(ξ) ∈ Ap (R) (x ∈ R), n o I∞ (p, w) := λ ∈ R : |ξ + i|−λ w(ξ) ∈ Ap (R) is an open interval of length not greater than 1 which contains the origin. Thus, ˙ Ix (p, w) = (−νx− (p, w), 1 − νx+ (p, w)) (x ∈ R)
228
Karlovich and Loreto Hern´ andez
IEOT
˙ where 0 < νx− (p, w) ≤ νx+ (p, w) < 1 (see, e.g., [9, Theorem 2.10]). For every x ∈ R, the numbers νx± (p, w) are closely related to the indices of powerlikeness αx (w) and βx (w) of the weight w ∈ Ap (R) (see [5, Section 3.6]): νx− (p, w) = 1/p + αx (w),
νx+ (p, w) = 1/p + βx (w).
In particular, if w = ev ∈ Ap (R+ ) where p ∈ (1, ∞) and the function σ : t 7→ tv 0 (t) belongs to the C ∗ -algebra SO0 , then in view of (4.6) we get ν0− (p, w) = 1/p + lim inf [tv 0 (t)], t→0
ν0+ (p, w) = 1/p + lim sup [tv 0 (t)].
(5.12)
t→0
Further, for all ν ∈ (0, 1), we consider the circular arcs o n Lν := µ = 2−1 (1 + coth[π(x + iν)]) : x ∈ R with the endpoints 0 and 1, where L1/2 = [0, 1], and also the horn [ Hp,w := H(0, 1; ν0− (p, w), ν0+ (p, w)) := Lν .
(5.13)
(5.14)
ν∈[ν0− (p,w),ν0+ (p,w)]
By [17, Vol. 2] (also see [8, p. 255]), with every θ ∈ (−π, π) we associate the number p(θ) := 2π/(π − θ) and the homeomorphism ϕθ : [0, 1] → L1/p(θ) given by ( 2iθt sin(θt) iθ(t−1) −1 if θ ∈ (−π, π) \ {0}, e = ee2iθ −1 sin θ ϕθ (t) = (5.15) t if θ = 0. Taking ν = 1/p(θ), we get θ = π − 2πν, and therefore ϕπ−2πν maps [0, 1] onto Lν and ϕπ−2πν (0) = 0, ϕπ−2πν (1) = 1. By (5.15), we obtain 1 − ϕπ−2πν (1 − t) = ϕ−π+2πν (t)
for all t ∈ [0, 1],
(5.16)
where ϕ−π+2πν maps [0, 1] onto L1−ν and ϕ−π+2πν (j) = j for j ∈ {0, 1}. Hence, for every ν ∈ (0, 1), 1 − Lν = L1−ν , (5.17) and the arc Lν in contrast to L1−ν is traced in the opposite direction: from 1 to 0. Let ξ ∈ M∞ (SO) and let a = a+ u+ + a− u− ∈ [SOp,w , Cp,w (R)]N ×N where a± ∈ [SOp,w ]N ×N and u± (x) = 2−1 [1 ± tanh x] on R. Since W π (a± − a± (ξ)) ∈ Jξπ and W π (u± ) ∈ Aπ , we infer that W π (a) − W π a+ (ξ)u+ − a− (ξ)u− = W π (a+ − a+ (ξ))W π (u+ ) + W π (a− − a− (ξ))W π (u− ) ∈ Jξπ ⊂ Jeξπ . Thus, we get Wξπ (a) = Wξπ (a+ (ξ)u+ + a− (ξ)u− ),
f π (a) = W f π (a+ (ξ)u+ + a− (ξ)u− ). W ξ ξ
Lemma 5.8. If a ∈ [SOp,w , Cp,w (R)]N ×N where 1 < p < ∞, w ∈ Ap (R) and N ∈ N, then for every ξ ∈ M∞ (SO) the assertions (i),(ii) below are equivalent and imply (iii),(iv):
Vol. 64 (2009) Wiener-Hopf Operators with Slowly Oscillating Symbols
229
˙ N ×N such that a0 (∞) = 0N and the operator (i) there is an a0 ∈ [Cp,w (R)] W (a+ (ξ)u+ + a− (ξ)u− + a0 ) is Fredholm on the space LpN (R+ , w); 1 − coth[π(x + iν)] 1 + coth[π(x + iν)] (ii) det a+ (ξ) + a− (ξ) 6= 0 2 2 − + for every x ∈ R and every ν ∈ [ν0 (p, w), ν0 (p, w)]; (iii) the coset Wξπ (a+ (ξ)u+ + a− (ξ)u− ) is invertible in the quotient algebra Aπξ ; f π (a+ (ξ)u+ + a− (ξ)u− ) is invertible in the quotient algebra Λπ . (iv) the coset W ξ ξ Proof. (i)⇔(ii). If the operator W (a+ (ξ)u+ + a− (ξ)u− + a0 ) is Fredholm on the ˙ with a0 (∞) = 0N , then [7, Theorem 17.10] space LpN (R+ , w) for some a0 ∈ Cp,w (R) implies assertion (ii) according to (5.13) and (5.14). ˙ Conversely, if (ii) holds, then there exists a matrix function a0 ∈ [C p,w (R)]N ×N such that a0 (∞) = 0N and the function det a+ (ξ)u+ + a− (ξ)u− + a0 is separated from zero. In this case [7, Theorem 17.10] implies that W (a+ (ξ)u+ +a− (ξ)u− +a0 ) is a Fredholm operator on the space LpN (R+ , w), that is, assertion (i) holds. (i)⇒(iii)⇒(iv). It follows from [7, Theorem 17.9] that the Banach algebra alg p,w W π (C(R)) ⊂ Aπ generated by all cosets W π (b) with b ∈ [Cp,w (R)]N ×N is inverse closed in the algebra Λπ . Hence, if the operator W (a+ (ξ)u+ +a− (ξ)u− +a0 ) ˙ N ×N with a0 (∞) = is Fredholm on the space LpN (R+ , w) for some a0 ∈ [Cp,w (R)] 0N , then the coset W π (a+ (ξ)u+ + a− (ξ)u− + a0 ) is invertible in the quotient algebra Aπ . By the Allan-Douglas local principle, the latter is equivalent to the invertibility of the cosets Wηπ (a+ (ξ)u+ + a− (ξ)u− + a0 ) in the quotient algebras Aπη for all η ∈ M(SO). In particular, for ξ ∈ M∞ (SO) the coset Wξπ (a+ (ξ)u+ + a− (ξ)u− ) = Wξπ (a+ (ξ)u+ + a− (ξ)u− + a0 ) is invertible in the algebra Aπξ . Finally, as Aπ ⊂ Λπ and Jξπ ⊂ Jeξπ , the invertibility of the coset Wξπ (a+ (ξ)u+ + a− (ξ)u− ) in the algebra Aπξ implies the invertibility f π (a+ (ξ)u+ + a− (ξ)u− ) in the algebra Λπ . of the coset W ξ ξ
6. Fredholm theory Lemmas 5.5 and 5.8 and the Allan-Douglas local principle applied to the algebra Λπ immediately give the following sufficient Fredholm condition. Theorem 6.1. Let 1 < p < ∞, w ∈ Ap (R), N ∈ N and a ∈ [SOp,w , Cp,w (R)]N ×N . Then the Wiener-Hopf operator W (a) is Fredholm on the space LpN (R+ , w) if a ∈ G[SOp,w , Cp,w (R)]N ×N and 1 − coth[π(x + iν)] 1 + coth[π(x + iν)] det a+ (ξ) + a− (ξ) 6= 0 (6.1) 2 2 for every ξ ∈ M∞ (SO), every x ∈ R, and every ν ∈ [ν0− (p, w), ν0+ (p, w)]. For special Muckenhoupt weights we obtain the following Fredholm criterion.
230
Karlovich and Loreto Hern´ andez
IEOT
Theorem 6.2. Let a ∈ [SOp,w , Cp,w (R)]N ×N where 1 < v ∈ C 1 (R+ ), the function σ : t 7→ tv 0 (t) belongs to the and let n [ a+ (ξ)(1 − µ) + a− (ξ)µ : ξ∈M∞ (SO) n [ = a+ (ξ)(1 − µ) + a− (ξ)µ :
p < ∞, w = ev ∈ Ap (R), C ∗ -algebra SO0 , N ∈ N,
ξ∈M∞ (SO)
µ ∈ Lνξ
o
o µ ∈ Hp,w ,
(6.2)
where νξ := 1/p + ξ(e σ ) ∈ [ν0− (p, w), ν0+ (p, w)], the function σ e : x 7→ σ(1/|x|) e−1/|x| is in SO, and Lν and Hp,w are given by (5.13) and (5.14), respectively. Then the Wiener-Hopf operator W (a) is Fredholm on the space LpN (R+ , w) if and only if a ∈ G[SOp,w , Cp,w (R)]N ×N and, for every ξ ∈ M∞ (SO) and every x ∈ R, 1 + coth[π(x + iνξ )] 1 − coth[π(x + iνξ )] + a− (ξ) 6= 0. (6.3) det a+ (ξ) 2 2 If W (a) is Fredholm, then all its regularizers belong to the algebra A. Proof. Sufficiency follows from Theorem 6.1 because the relation (6.3), fulfilled for every ξ ∈ M∞ (SO) and every x ∈ R, implies in view of (6.2) that (6.1) holds for every ξ ∈ M∞ (SO), every x ∈ R, and every ν ∈ [ν0− (p, w), ν0+ (p, w)]. Necessity. Suppose the operator W (a) with symbol a ∈ [SOp,w , Cp,w (R)]N ×N is Fredholm on the space LpN (R+ , w). By Lemma 3.7, a = a+ u+ + a− u− , where a± ∈ [SOp,w ]N ×N and u± (x) = [1 ± tanh x]/2 for x ∈ R. Identifying the fibers M0 (SO0 ) and M∞ (SO) as in Section 4, for every ξ ∈ M∞ (SO) we can choose a sequence {kn } ⊂ R+ satisfying (4.10). Then from Theorem 4.3 it follows that s-lim Ukn ev W (a)e−v Uk−1 = xγξ W (a+ (ξ)χ+ + a− (ξ)χ− )x−γξ I, n n→∞
where v = ln w, γξ := ξ(e σ ) and a± (ξ) = ξ(a± ) for ξ ∈ M∞ (SO), and χ± are the characteristic functions of R± . By analogy with [7, Corollary 18.11], the Fredholmness of the operator ev W (a)e−v I on the space LpN (R+ ) implies that the operator W (a+ (ξ)χ+ + a− (ξ)χ− ) is invertible on the space LpN (R+ , xγξ ) for every ξ ∈ M∞ (SO), which gives (6.3) for every ξ ∈ M∞ (SO) and every x ∈ R by the matrix analogue of [7, Theorem 17.7] with νξ = 1/p + γξ . On the other hand, by Lemma 5.6, a ∈ G[SOp,w , Cp,w (R)]N ×N , which completes the proof of necessity. Finally, if a ∈ G[SOp,w , Cp,w (R)]N ×N and (6.3) holds for all ξ ∈ M∞ (SO) and all x ∈ R, then Lemmas 5.5 and 5.8 imply due to (6.2) that for each ξ ∈ M(SO) the coset Wξπ (a) is invertible in the quotient algebra Aπξ . Applying now the Allan-Douglas local principle to the algebra Aπ , we deduce that the regularizers of any Fredholm operator W (a) with symbol a ∈ [SOp,w , Cp,w (R)]N ×N belong to the algebra A. S Since Hp,w = ν∈[ν − (p,w),ν + (p,w)] Lν due to (5.14), we conclude that (6.2) 0
0
always holds if a ∈ [Cp,w (R)]N ×N . On the other hand, if ν0− (p, w) = ν0+ (p, w), then for any a ∈ [SOp,w , Cp,w (R)]N ×N the equality (6.2) also holds.
Vol. 64 (2009) Wiener-Hopf Operators with Slowly Oscillating Symbols
231
Consider now less trivial examples related to (6.2). Let w = ev ∈ Ap (R), where v ∈ C 1 (R+ ), the function σ : t 7→ tv 0 (t) in SO0 is such that the function σ e(x) = σ(1/|x|) e−1/|x| belongs to SOp,w , and 0 < ν0− (p, w) := 1/p + lim inf [tv 0 (t)] < 1/p + lim sup [tv 0 (t)] =: ν0+ (p, w) < 1. t→0
t→0
Taking a = a+ u+ + a− u− ∈ [SOp,w , Cp,w (R)] such that u± (x) = [1 ± tanh x]/2 and a± (x) = ±1 + i(1/p + σ e(x)) ∈ SOp,w , we infer that for every ξ ∈ M∞ (SO), o n o n (6.4) a+ (ξ)(1 − µ) + a− (ξ)µ : µ ∈ Lνξ = N (νξ , νξ , x) : x ∈ R , where νξ = 1/p + ξ(e σ ) ∈ [ν0− (p, w), ν0+ (p, w)], Lν is given by (5.13) and 1 − coth[π(x+iν)] 1 + coth[π(x+iν)] + (−1 + iλ) 2 2 = iλ − coth[π(x+iν)]. (6.5)
N (λ, ν, x) := (1 + iλ)
Applying (6.5), we conclude that Im N (ν1 , ν1 , x) ≤ min Im N (ν1 , ν2 , x), Im N (ν2 , ν1 , x) ≤ max Im N (ν1 , ν2 , x), Im N (ν2 , ν1 , x) ≤ Im N (ν2 , ν2 , x) for ν0− (p, w) ≤ ν1 < ν2 ≤ ν0+ (p, w) and x ∈ R, which implies in view of (6.4) that (6.2) holds. On the other hand, if a± (x) = ±1 − i(1/p + σ e(x)), then n o n o a+ (ξ)(1 − µ) + a− (ξ)µ : µ ∈ Lνξ = N (−νξ , νξ , x) : x ∈ R for every ξ ∈ M∞ (SO), and therefore (6.2) does not hold because by (6.5), Im N (−ν2 , ν1 , x) < min Im N (−ν1 , ν1 , x), Im N (−ν2 , ν2 , x) ≤ max Im N (−ν1 , ν1 , x), Im N (−ν2 , ν2 , x) < Im N (−ν1 , ν2 , x) for ν0− (p, w) ≤ ν1 < ν2 ≤ ν0+ (p, w) and x ∈ R. If ν0− (p, w) = ν0+ (p, w), then ν0± (p, w) = 1/p + lim [tv 0 (t)] in view of (5.12), t→0
and Theorem 6.2 implies the following result. Corollary 6.3. Let a ∈ [SOp,w , Cp,w (R)]N ×N where 1 < p < ∞, w = ev ∈ Ap (R), v ∈ C 1 (R+ ), the function σ : t 7→ tv 0 (t) belongs to the C ∗ -algebra SO0 , N ∈ N, and ν0− (p, w) = ν0+ (p, w). Then the Wiener-Hopf operator W (a) is Fredholm on the space LpN (R+ , w) if and only if a ∈ G[SOp,w , Cp,w (R)]N ×N and 1 − coth[π(x + iν0 )] 1 + coth[π(x + iν0 )] det a+ (ξ) + a− (ξ) 6= 0 2 2 for every ξ ∈ M∞ (SO) and every x ∈ R, where ν0 := ν0± (p, w) = 1/p + lim [tv 0 (t)]. t→0
If W (a) is Fredholm, then all its regularizers belong to the algebra A. We now proceed to establishing an index formula for operators W (a).
232
Karlovich and Loreto Hern´ andez
IEOT
Lemma 6.4. If 1 < p < ∞, w ∈ Ap (R+ ), N ≥ 1, and a is an even matrix function in [SOp,w ]N ×N , then the operator W (a) is Fredholm on the space LpN (R+ , w) if and only if a ∈ G[SOp,w ]N ×N . If W (a) is Fredholm, then Ind W (a) = 0. Proof. By Corollary 5.7, the operator W (a) is Fredholm on the space LpN (R+ , w) if and only if a ∈ G[SOp,w ]N ×N . Thus, it remains to prove that Ind W (a) = 0. With the operator W (a) ∈ B(LpN (R+ , w)) we associate the operator A := χ+ F −1 aFχ+ I + χ− I ∈ B(LpN (R, w)) e
(6.6)
where the weight w e ∈ Ap (R) is defined by w(x) e = w(|x|) for x ∈ R. As is well known, the operator A is Fredholm along with W (a), and Ind A = Ind W (a). B(LpN (R, w)) e
Consider the operator V ∈ Since a(−x) = a(x), we deduce that
(6.7)
given by (V f )(x) = f (−x) for x ∈ R.
e := V AV −1 = V (χ+ F −1 aFχ+ I + χ− I)V −1 = χ− F −1 aFχ− I + χ+ I. A
(6.8)
e is Fredholm along with A, and Hence the operator A e = Ind A. Ind A
(6.9)
Further, we deduce from (6.6) and (6.8) that e = F −1 aF − (χ+ F −1 aFχ− I + χ− F −1 aFχ+ I). AA
(6.10)
By [2, Theorem 4.2], the operators χ+ F −1 aFχ− I and χ− F −1 aFχ+ I are compact on all the spaces LpN (R) (1 < p < ∞). Since these operators are bounded on all the spaces LpN (R, w) with 1 < p < ∞ and w ∈ Ap (R), we infer by analogy with [24, Theorem 3.10] and [22, Theorem 3.2] that the operators χ+ F −1 aFχ− I and χ− F −1 aFχ+ I are compact on all the spaces LpN (R, w) (1 < p < ∞, w ∈ Ap (R)). Hence, by (6.10), the operator W 0 (a) = F −1 aF is Fredholm, and e Ind W 0 (a) = Ind A + Ind A.
(6.11)
Because W 0 (a) is invertible in case of Fredholmness and therefore Ind W 0 (a) = 0, ˜ = 0, which together with we infer from (6.9) and (6.11) that 2 Ind A = Ind (AA) (6.7) completes the proof. With every matrix function a ∈ [SOp,w , Cp,w (R)]N ×N and every r > 0 we associate the matrix functions ar ∈ [Cp,w (R)]N ×N given by ( a(x) if |x| ≤ r, ar (x) = (6.12) a(±r) if ± x > r, Let us calculate Ind W (a) in terms of Ind W (ar ).
Vol. 64 (2009) Wiener-Hopf Operators with Slowly Oscillating Symbols
233
Theorem 6.5. Let 1 < p < ∞, w ∈ Ap (R+ ), N ≥ 1, and a ∈ [SOp,w , Cp,w (R)]N ×N . If the conditions of Theorem 6.1 are fulfilled, then for all sufficiently large r > 0 the Wiener-Hopf operators W (ar ) with symbols ar ∈ [Cp,w (R)]N ×N given by (6.12) are Fredholm on the space LpN (R+ , w) along with W (a), and Ind W (a) = lim Ind W (ar ). r→∞
(6.13)
Proof. By Theorem 6.1, the operator W (a) is Fredholm on the space LpN (R+ , w) if the following conditions hold: inf | det a(t)| > 0, t∈R det a+ (ξ)(1 − µ) + a− (ξ)µ 6= 0 for all (ξ, µ) ∈ M∞ (SO) × Hp,w ,
(6.14) (6.15)
where Hp,w is given by (5.14). By (6.14), the even matrix function e a given on R by e a(x) = a(|x|) belongs to G[SOp,w ]N ×N . Hence, by Lemma 6.4, the operator W (e a) is Fredholm on the space LpN (R+ , w) and Ind W (e a) = 0. Let b := e a−1 a. By (6.14) and (6.15), b ∈ G[SOp,w , Cp,w (R)]N ×N and det IN (1 − µ) + b− (ξ)µ 6= 0 for all (ξ, µ) ∈ M∞ (SOp,w ) × Hp,w ,
(6.16)
(6.17)
where b− (ξ) = a−1 + (ξ)a− (ξ) and IN is the N × N identity matrix. Then, by Theorem 6.1, the operator W (b) is Fredholm on the space LpN (R+ , w). Moreover, as W (a) − W (e a)W (b) is a compact operator, from (6.16) it follows that Ind W (a) = Ind W (b).
(6.18)
Since the set [
det IN (1 − µ) + b− (ξ)µ
(ξ,µ)∈M∞ (SO)×Hp,w
is compact on C
N ×N
, in view of (6.17) there exists an ε > 0 such that det IN (1 − µ) + (b− (ξ) + c)µ 6= 0
(6.19)
for all ξ ∈ M∞ (SO), all µ ∈ Hp,w and all matrices c ∈ CN ×N with kckCN ×N < ε. Further, in view of (6.19) and Proposition 3.1, there exists an x0 < 0 such that det IN (1 − µ) + b(x)µ 6= 0 for all x ≤ x0 and all µ ∈ Hp,w . (6.20) Let ϕ := ϕ−π+2πν00 (p,w) , where ν00 (p, w) = 2−1 ν0− (p, w) + ν0+ (p, w) and ϕθ is defined by (5.15). Hence ϕ is a homeomorphism of [0, 1] onto L1−ν00 (p,w) such that ϕ(0) = 0 and ϕ(1) = 1. For every z ∈ [0, 1], we define the continuous matrix function if x < x0 − 1, IN ϕ(z) + b(x)(1 − ϕ(z)) b(z) (x) := IN ϕ(z|x − x0 |) + b(x)(1 − ϕ(z|x − x0 |)) if x ∈ [x0 − 1, x0 ], b(x) if x > x0 ,
234
Karlovich and Loreto Hern´ andez
IEOT
where b(x) = IN for all x ≥ 0. Obviously, the matrix functions b(z) belong to [SOp,w , Cp,w (R)]N ×N for every z ∈ [0, 1]. Moreover, b(z) ∈ G[SOp,w , Cp,w (R)]N ×N for all z ∈ [0, 1] according to (6.20), (5.16) and (5.17). We claim that the operator function [0, 1] → B(LpN (R+ , w)), z 7→ W (b(z) ), is continuous. Indeed, for all z, ζ ∈ [0, 1] we get W (b(z) ) − W (b(ζ) ) = W (IN − b)ηz,ζ , (6.21) where, for x ∈ R, ηz,ζ (x) := ϕ(z) − ϕ(ζ) χ(−∞,x0 −1) (x) + ϕ(z|x − x0 |) − ϕ(ζ|x − x0 |) χ[x0 −1,x0 ] (x) and χγ is the characteristic function of a set γ. If ϕ = ϕ0 , then from (5.15) it follows that kηz,ζ kL∞ (R) = |z − ζ|, V1 (ηz,ζ ) = |z − ζ|, and, by Stechkin’s inequality (1.2), kηz,ζ kMp,w ≤ 2 kSR kB(Lp (R,w)) |z − ζ|.
(6.22)
If ϕ = ϕθ where θ ∈ (−π, 0) ∪ (0, π), then 2iθzt e − e2iθζt 2θ|z − ζ| = max kηz,ζ k = max ϕ(zt) − ϕ(ζt) ≤ , e2iθ − 1 |e2iθ − 1| t∈[0,1] t∈[0,1] Z 1 Z 1 0 1 2θze2iθzt − 2θζe2iθζt dt zϕ (zt) − ζϕ0 (ζt) dt ≤ V1 (ηz,ζ ) = 2iθ |e − 1| 0 0 Z 1 2θ 2θ(1 + θ) ≤ 2iθ |z − ζ|, (1 + 2θt)|z − ζ| dt = 2iθ |e − 1| 0 |e − 1| L∞ (R)
and therefore there is a constant C ∈ (0, ∞) such that kηz,ζ kMp,w ≤ 2 CkSR kB(Lp (R,w)) |z − ζ|.
(6.23)
Finally, (6.21)–(6.23) imply the continuity of the function z 7→ W (b(z) ) on [0, 1]. ˙ the stability of operator indices with respect to small perSince b(1) ∈ Cp,w (R), turbations gives 1 arg det b(1) (x) x∈R . (6.24) Ind W (b) = Ind W (b(0) ) = Ind W (b(1) ) = − 2π On the other hand, replacing the functions e a, b and b(z) by the functions e ar (x) := ar (|x|), br (x) := e a−1 r (x)ar (x) (x ∈ R), if x < x0 − 1, IN ϕ(z) + br (x)(1 − ϕ(z)) b(z) (x) := I ϕ(z|x − x |) + b (x)(1 − ϕ(z|x − x |)) if x ∈ [x0 − 1, x0 ], N 0 r 0 r br (x) if x > x0 , (z)
respectively, where the function ar is given by (6.12) and the functions br are invertible in [Cp,w (R)]N ×N for all z ∈ [0, 1], and repeating the previous arguments,
Vol. 64 (2009) Wiener-Hopf Operators with Slowly Oscillating Symbols
235
we infer that, for every sufficient large r > 0, Ind W (ar ) = Ind W (br ) = Ind W (b(0) r ) 1 = Ind W (b(1) {arg det b(1) r )=− r (x)}x∈R . 2π
(6.25) (1)
But if r > 0 is sufficiently large, then the matrix functions b(1) and br coincide. Consequently, for these r the formulas (6.18), (6.24) and (6.25) imply that Ind W (a) = Ind W (b(1) ) = Ind W (b(1) r ) = Ind W (ar ), which gives (6.13).
Acknowledgment The authors are grateful to the referee for useful comments and suggestions.
References [1] J. Alvarez and C. P´erez, Estimates with A∞ weights for various singular integral operators. Boll. Un. Mat. Ital. (7) 8-A (1994), 123–133. [2] M. A. Bastos, A. Bravo, and Yu. I. Karlovich, Convolution type operators with symbols generated by slowly oscillating and piecewise continuous matrix functions. Operator Theory: Advances and Applications 147 (2004), 151–174. [3] M. A. Bastos, A. Bravo, and Yu. I. Karlovich, Symbol calculus and Fredholmness for a Banach algebra of convolution type operators with slowly oscillating and piecewise continuous data. Math. Nachrichten 269–270 (2004), 11–38. [4] M. A. Bastos, Yu. I. Karlovich, and B. Silbermann, Toeplitz operators with symbols generated by slowly oscillating and semi-almost periodic matrix functions. Proc. London Math. Soc. 89 (2004), 697–737. [5] A. B¨ ottcher and Yu. I. Karlovich, Carleson Curves, Muckenhoupt Weights, and Toeplitz Operators. Progress in Mathematics 154, Birkh¨ auser, Basel, 1997. [6] A. B¨ ottcher, Yu. I. Karlovich, and V. S. Rabinovich, The method of limit operators for one-dimensional integrals with slowly oscillating data. J. Operator Theory 43 (2000), 171–198. [7] A. B¨ ottcher, Yu. I. Karlovich, and I. M. Spitkovsky, Convolution Operators and Factorization of Almost Periodic Matrix Functions. Operator Theory: Advances and Applications 131, Birkh¨ auser, Basel, 2002. [8] A. B¨ ottcher and B. Silbermann, Analysis of Toeplitz Operators, 2nd ed. Springer, Berlin, 2006. [9] A. B¨ ottcher and I. M. Spitkovsky, Wiener-Hopf integral operators with P C symbols on spaces with Muckenhoupt weight. Revista Matem´ atica Iberoamericana 9 (1993), 257–279. [10] A. B¨ ottcher and I. M. Spitkovsky, Pseudodifferential operators with heavy spectrum. Integral Equations and Operator Theory 19 (1994), 251–269. [11] R. R. Coifman and G. Weiss, Analyse Harmonique Non-Commutative sur Certains Espaces Homog´enes. Lect. Notes in Math. 242, Springer-Verlag, Berlin, 1971.
236
Karlovich and Loreto Hern´ andez
IEOT
[12] R. V. Duduchava, Integral Equations with Fixed Singularities. B. G. Teubner Verlagsgesellschaft, Leipzig, 1979. [13] R. V. Duduchava, On algebras generated by convolutions and discontinuous functions. Integral Equations and Operator Theory 10 (1987), 505–530. [14] E. M. Dyn’kin, Methods of the theory of singular integrals: Hilbert transform and Calderon-Zygmund theory. Commutative Harmonic Analysis I: General Surveys, Classical Aspects. V. P. Khavin, N. K. Nikol’skij (Eds.). Encyclopaedia of Mathematical Sciences 15, Springer-Verlag, Berlin, 1991, pp. 167-259. Russian original: VINITI, Moscow, 1987. [15] J. B. Garnett, Bounded Analytic Functions. Academic Press, New York, 1981. [16] I. Gohberg and I. A. Feldman, Convolution Equations and Projection Methods for Their Solutions. Transl. of Math. Monographs 41, Amer. Math. Soc., Providence, R.I., 1974. Russian original: Nauka, Moscow, 1971. [17] I. Gohberg and N. Krupnik, One-Dimensional Linear Singular Integral Equations, Vols. 1 and 2, Birkh¨ auser, Basel, 1992. Russian original: Shtiintsa, Kishinev, 1973. [18] R. Hunt, B. Muckenhoupt, and R. Wheeden, Weighted norm inequalities for the conjugate function and Hilbert transform. Trans. Amer. Math. Soc. 176 (1973), 227– 251. [19] J.-L. Journ´e, Calder´ on-Zygmund Operators, Pseudo-Differential Operators and the Cauchy Integral of Calder´ on. Lect. Notes in Math. 994, Springer-Verlag, Berlin, 1983. [20] Yu. I. Karlovich and J. Loreto Hern´ andez, Wiener-Hopf operators with matrix semialmost periodic symbols on weighted Lebesgue spaces. Integral Equations and Operator Theory 62 (2008), 85–128. [21] Yu. I. Karlovich and E. Ram´ırez de Arellano, A shift-invariant algebra of singular integral operators with oscillating coefficients. Integral Equations and Operator Theory 39 (2001), 441–474. [22] Yu. I. Karlovich and E. Ram´ırez de Arellano, Singular integral operators with fixed singularities on weighted Lebesgue spaces. Integral Equations and Operator Theory 48 (2004), 331–363. [23] A. N. Kolmogorov and S. V. Fomin, Elements of Function Theory and Functional Analysis. Nauka, Moscow, 1972 [Russian]. [24] M. A. Krasnoselskii, P. P. Zabreiko, E. I. Pustylnik, and P. E. Sobolevskii, Integral Operators in Spaces of Summable Functions. Noordhoff I. P., Leyden, 1976. Russian original: Nauka, Moscow, 1966. [25] B. V. Lange and V. S. Rabinovich, Pseudo-differential operators on Rn and limit operators. Math. USSR-Sb. 57 (1987), 183–194. [26] S. C. Power, Fredholm Toeplitz operators and slow oscillation. Can. J. Math. 32 (1980), 1058–1071. [27] V. Rabinovich, S. Roch, and B. Silbermann, Limit Operators and Their Applications in Operator Theory, Birkh¨ auser, Basel, 2004. [28] S. Roch and B. Silbermann, Algebras of Convolution Operators and Their Image in the Calkin Algebra. Report R-Math-05/90, Akad. Wiss. DDR, Karl-WeierstrassInstitut f. Mathematik, Berlin, 1990. [29] W. Rudin, Functional Analysis. 2nd ed., McGraw-Hill Inc., New York 1991.
Vol. 64 (2009) Wiener-Hopf Operators with Slowly Oscillating Symbols
237
[30] R. Schneider, Integral equations with piecewise continuous coefficients in Lp spaces with weight. J. Integral Equations 9 (1985), 135–152. [31] I. B. Simonenko and Chin Ngok Min, Local Method in the Theory of One-Dimensional Singular Integral Equations with Piecewise Continuos Coefficients. Noetherity. University Press, Rostov on Don, 1986 [Russian]. [32] E. M. Stein, Harmonic Analysis: Real-Variable Methods, Orthogonality, and Oscillatory Integrals. Princeton Univ. Press, Princeton, NJ, 1993. [33] G. Szeg¨ o, Orthogonal Polynomials. 4th ed., Amer. Math. Soc., Providence, R.I., 1975. Yu.I. Karlovich Facultad de Ciencias Universidad Aut´ onoma del Estado de Morelos Av. Universidad 1001, Col. Chamilpa, C.P. 62209 Cuernavaca, Morelos M´exico e-mail:
[email protected] J. Loreto Hern´ andez Instituto de Matem´ aticas Universidad Nacional Aut´ onoma de M´exico Av. Universidad 1001, Col. Chamilpa, C.P. 62210 Cuernavaca, Morelos M´exico e-mail:
[email protected] Submitted: October 29, 2008. Revised: February 23, 2009.
Integr. equ. oper. theory 64 (2009), 239–249 c 2009 Birkh¨
auser Verlag Basel/Switzerland 0378-620X/020239-11, published online June 5, 2009 DOI 10.1007/s00020-009-1687-9
Integral Equations and Operator Theory
Boundary Integral Solution of the Time-Fractional Diffusion Equation J. Kemppainen and K. Ruotsalainen Abstract. Here we consider initial boundary value problem for the time– fractional diffusion equation by using the single layer potential representation for the solution. We derive the equivalent boundary integral equation. We will show that the single layer potential admits the usual jump relations and discuss the mapping properties of the single layer operator in the anisotropic Sobolev spaces. Our main theorem is that the single layer operator is coercive in an anisotropic Sobolev space. Based on the coercivity and continuity of the single layer operator we finally show the bijectivity of the operator in a certain range of anisotropic Sobolev spaces. Mathematics Subject Classification (2000). Primary 31A10; Secondary 26A33. Keywords. Boundary integral equation, time-fractional diffusion, fundamental solution, single layer operator.
1. Introduction In this paper we discuss the boundary integral solution of the fractional diffusion equation ∂tα Φ − ∆Φ = 0 in QT = Ω × (0, T ), B(Φ) = g on ΣT = Γ × (0, T ),
(1.1)
Φ(x, 0) = 0 for x ∈ Ω, where the boundary operator B(Φ) = Φ|ΣT , and ∂tα is the Caputo time derivative of the fractional order 0 < α ≤ 1. For α = 1 we get the ordinary diffusion equation, and for α = 0 we have the Helmholtz equation. Here we assume that the domain Ω is open and bounded with smooth boundary. Hilbert space methods to study the initial boundary value problems has been well known by now for the heat and wave equations [9], [10].
240
Kemppainen and Ruotsalainen
IEOT
The boundary integral equation method for elliptic, parabolic and hyperbolic equations has been extensively studied by several authors (see [2] and references therein). The idea to represent the solution of these equations with boundary potentials is well known already for decades (centuries). In this way the problem will be converted to an equivalent integral equation on the boundary of the domain. The method has been well studied in the papers [2], [3], [6]. The functional framework has been the interpretation of the boundary integral operators as anisotropic pseudo-differential operators acting on anisotropic Sobolev spaces [4]. In this way the boundary integral method is closely connected with the Hilbert space approach of the initial boundary value problems studied in [9] and [10]. In this paper we present the fundamental solution by means of the Fox Hfunctions, and represent the solution of (1.1) as the single layer potential. By the jump relations of the potential we derive the appropriate boundary integral operator. We give detailed mapping properties of the single-layer operator in anisotropic Sobolev spaces, which yields the unique solution of the boundary integral equation and thus the unique solution of the initial boundary value problem as well.
2. Function spaces Let r, s be non–negative real numbers. The anisotropic Sobolev space H r,s (Rn ×R) contains those distributions u ∈ S 0 (Rn+1 ) for which the norm Z 12 − n+1 2 {(1 + |ξ|2 )r + (1 + |η|2 )s }|b u(ξ, η)|2 dξ dη kukH r,s = (2π) Rn+1
is finite. The spaces H r,s (QT ) consist of restrictions of elements in H r,s (Rn × R) to QT equipped with the norm kukr,s;T = inf{kU kH r,s : u = U |QT }. Furthermore, the space H0r,s (QT ) is defined as the closure of C0∞ (QT ) in H r,s (QT ) and H −r,−s (QT ) is defined by duality H −r,−s (QT ) = (H0r,s (QT ))0 . For r, s ≥ 0 the space H r,s (Γ × R) is defined by H r,s (Γ × R) = L2 (R; H r (Γ)) ∩ H s (R; L2 (Γ)) with the norm kuk2H r,s (Γ×R) = kuk2L2 (R;H r (Γ)) + kuk2H s (R;L2 (Γ)) . The spaces H r,s (ΣT ) and H −r,−s (ΣT ) are defined analogously with H r,s (QT ) and H −r,−s (QT ). e r,s (Rn × R) which takes In the following we need the anisotropic Sobolev space H the vanishing initial condition at t = 0 into account, e r,s (Rn × R) = {u ∈ H r,s (Rn × R) : supp(u) ⊂ Rn × [0, ∞[ }. H For a finite time interval we denote Rn+1 := Rn × (0, T ) for T > 0, and define T e r,s (Rn+1 ) = {u = U |Rn ×(−∞,T ) : U ∈ H e r,s (Rn × R)}, H T
Vol. 64 (2009)
Boundary Integral Solution
241
equipped with the norm kukr,s;T = inf{kU kH r,s : u = U |Rn ×(−∞,T ) }. e r,s (ΣT ) are defined analogously [9], [10]. The spaces H
3. Boundary integral formulation of the problem 3.1. The fundamental solution In order to formulate the boundary integral equation corresponding to (1.1), we need to calculate the fundamental solution E(x, t). It is constructed by taking the Laplace-transform in the time and the Fourier-transform in the spatial variable of the fractional diffusion equation (∂tα − ∆)E(x, t) = δ(x, t), where δ(x, t) is the Dirac’s delta function. The transformed equation is then be (|ξ|2 + sα )E(ξ, s) = 1, where the Fourier-transform is defined by Z u b(ξ, t) = e−ihx,ξi u(x, t) dx Rn
and the Laplace-transform by Z u e(x, s) =
∞
e−st u(x, t) dt.
0
Hence the Fourier-Laplace-transform of the fundamental solution is be E(ξ, s) =
|ξ|2
1 . + sα
(3.1)
Using the Laplace-transform of the Mittag-Leffler functions [8] Z ∞ k!sµ−β (k) e−st tµk+β−1 Eµ,β (−atµ ) dt = a + sµ 0 we find out that the Fourier-transform of the fundamental solution is (0) b t) = F(E)(ξ, t) = tα−1 Eα,α E(ξ, (−|ξ|2 tα ).
By taking the inverse Fourier-transform of the Mittag-Leffler function we notice that the fundamental solution is (α,α) 20 1 E(x, t) = π −n/2 tα−1 |x|−n H12 ( |x|2 t−α |(n/2,1),(1,1) ), 4 where H is the Fox H-function [8], [13].
242
Kemppainen and Ruotsalainen
IEOT
3.2. The mapping properties of the single layer potential Once the fundamental solution is known, we now define the single layer potential Z Z t Φ(x, t) = Sσ(x, t) = σ(y, τ )E(x − y, t − τ ) dsy dτ, x ∈ Ω, t ∈ (0, T ) Γ
0
for a given boundary distribution σ(x, t) ∈ C ∞ (ΣT ). The potential is the solution of the fractional diffusion equation both in interior domain Ω × (0, T ) and on the exterior domain QcT := [Rn \ Ω] × (0, T ) with the zero initial condition. We denote the direct value of Sσ on the boundary by V σ. This leads us to the boundary relation γ(Sσ)(x, t) = γ(Φ)(x, t) = V σ(x, t). In other words we have converted the initial boundary value problem of the fractional diffusion equation (1) to a boundary integral equation V σ(x, t) = γ(Φ)(x, t) = g(x, t), (x, t) ∈ ΣT .
(3.2)
In our analysis we need the mapping properties of the single layer potential in Sobolev-spaces. The single layer potential can be written as Sφ = E ∗ γ 0 (φ).
(3.3)
By (3.1) we have F(E ∗ f )(ξ, η) =
|ξ|2
1 fˆ(ξ, η) + (iη)α
(3.4)
for smooth f with suppf ⊂ Rn × [0, ∞[. It follows that the map α
α
r, 2 r e r+2, 2 (r+2) (Rn × (0, T )) e comp (Rn × (0, T )) → H ψ 7→ E ∗ ψ : H loc
(3.5)
is continuous for any r ∈ R, where comp means compact support and loc local behaviour in space variables. Since the trace map γ : H r,s (QT ) → H λ,µ (ΣT ) is continuous and surjective for every λ = r − 12 , µ = rs λ, r > 12 and s ≥ 0 ([9], Theorem 4.2 of Chapter 1, and [10], Theorem 2.1 of Chapter 4), by duality we have −r,−s γ 0 : H −λ,−µ (ΣT ) → Hcomp (Rn × (0, T )).
(3.6)
Using trace theorem once again , combining (3.5) and (3.6) and noting that the e r,s (ΣT ) coincide if and only if |s| < 1 [9], we may conclude spaces H r,s (ΣT ) and H 2 the following result. Theorem 3.1. Let 0 < s < 1. The operator α
α
e −s,− 2 s (ΣT ) → H e 1−s, 2 (1−s) (ΣT ) V :H is continuous.
(3.7)
Vol. 64 (2009)
Boundary Integral Solution
243
3.3. The jump relations As usual we define the jump of the traces across the boundary as [γ(u)] = γ(u+ ) − γ(u− ), where γ is the spatial trace operator and u+ = u|Ωc (u− = u|Ω ) is a function which is defined in the exterior (interior) of the domain Ω. Respectively, the jump of the normal derivative across the boundary is defined as [γ1 (u)] = [γ(∂n u)] = γ(∂n u+ ) − γ(∂n u− ). For the proof of jump relations we need some basic properties of fractional derivatives and Green’s formula in the case of fractional time–derivatives. Because the properties of fractional derivatives are crucial for the proof of Green’s formula, we consider them first. α In the sequel ∂tα := c D0+ denotes the left Caputo-derivative on time interval (0, T ), and the right Caputo-derivative on the interval (0, T ) is denoted by c DTα − . They are defined by the formulas Z t ϕ0 (s) 1 c α ds, D0+ ϕ(t) = Γ(1 − α) 0 (t − s)α Z T 1 ϕ0 (s) c α DT − ϕ(t) = − ds. Γ(1 − α) t (s − t)α The right and left Riemann-Liouville derivatives on the interval (0, T ) are defined by setting Z d t ϕ(s) 1 α D0+ ϕ(t) = ds, Γ(1 − α) dt 0 (t − s)α Z 1 d T ϕ(s) α DT − ϕ(t) = − ds, Γ(1 − α) dt t (s − t)α respectively. Note that for sufficiently smooth functions ϕ for which ϕ(0) = 0 the left Caputo and Riemann-Liouville derivatives coincide ([12], Formula (2.165)), i.e. c
α α D0+ ϕ(t) = D0+ ϕ(t).
(3.8)
Integration by parts gives the following relation between the left Caputo and the right Riemann-Liouville derivative: Z T Z T α ∂t ϕ(t)ψ(t) dt = ϕ(t)DTα − ψ(t) dt (3.9) 0
0
for ϕ ∈ C 1 ([0, T ]) with ϕ(0) = 0 and ψ ∈ C 1 ([0, T ]). The time reversal operator on the interval (0, T ) is defined by setting κT ϕ(t) = ϕ(T − t). Applying the time reversal operator to the left Riemann–Liouville derivative we have α DTα − (κT ϕ)(t) = κT D0+ ϕ(t). (3.10)
244
Kemppainen and Ruotsalainen
Combining (3.8), (3.9) and (3.10) we have Z T Z ∂tα ϕ(t)(κT ψ)(t) dt = 0
IEOT
T
(κT ϕ)(t)∂tα ψ(t) dt
(3.11)
0
for ϕ ∈ C 1 ([0, T ]) and ψ ∈ C 1 ([0, T ]) with ψ(0) = 0. Let us next consider the Green’s formula for the fractional diffusion equation. By the Green’s formula with respect to the space variable we have the relation Z Z Z Z α ∇u · ∇v dx dt + ∂t u v dx dt − ∂n u v dsΓ dt = (∂tα − ∆)u v dx dt. QT
QT
ΣT
QT
In the previous identity we have assumed that functions are at least in C 1 (QT ). On the other hand, using the time reversal on the function v(x, t) we get Z Z Z (∂tα − ∆)u κT v dx dt = ∇u · ∇κT v dx dt + ∂tα u κT v dx dt QT QT QT Z (3.12) − ∂n u κT v dsΓ dt. ΣT
Changing in the previous identity the role of u and v we get Z Z Z α ∂tα v κT u dx dt ∇κT u · ∇v dx dt + (∂t − ∆)v κT u dx dt = QT QT QT Z − ∂n v κT u dsΓ dt.
(3.13)
ΣT
Assuming that v has zero initial condition and using (3.11) in (3.13) we have Z Z Z (∂tα − ∆)v κT u dx dt = ∇u · ∇κT v dx dt + ∂tα uκT v dx dt QT QT QT Z (3.14) − ∂n vκT u dsΓ dt. ΣT
Cancelling equation (3.12) from equation (3.14) we finally obtain the Green formula for the fractional diffusion equation: Z Z {(∂tα − ∆)u κT v − κT u (∂tα − ∆)v} dx dt = (u∂n κT v − ∂n u κT v) dsΓ dt QT
ΣT
= hγ(u), γ1 (κT v)i − hγ1 (u), γ(κT v)i. Now we are able to state and prove the jump relations for the single layer potential of the fractional diffusion operator: 1
α
Theorem 3.2. For every ψ ∈ H − 2 ,− 4 (ΣT ) there hold the jump relations: [γ(Sψ)] = 0, [γ1 (Sψ)] = −ψ. Proof. For the function ψ let us denote u = Sψ. By the assumption on ψ and e 1, α2 (BR × (0, T )), the properties of the trace map we have the inclusion u ∈ H where the radius of the ball BR is so large that Ω ⊂ BR . Hence by the trace
Vol. 64 (2009)
Boundary Integral Solution
245
theorem ([9], Theorem 4.2 of Chapter 1, and [10], Theorem 2.1 of Chapter 4) γ(u|QT ) = γ(u|QcT ) which proves the continuity of the trace across the boundary. Using the representation formula (3.3) we have (∂tα − ∆)u = γ 0 (ψ) in the distributional sense in Rn × (0, T ). Choosing φ ∈ C0∞ (BR × (0, T )) we get hψ, γ(φ)i = hγ 0 (ψ), φi = h(∂tα − ∆)u, φi =
hu, (DTα −
− ∆)φi.
(3.15) (3.16)
Making the time reversal and using the properties of the Caputo fractional derivatives, DTα − κT φ = κT ∂tα φ, we obtain from the previous equation Z hψ, γ(κT φ)i = (∂tα − ∆)φ κT u dx dt. (3.17) BR ×(0,T )
Using the Green formula for the fractional diffusion operator with respect to the sets QT and QcT we get (remember that on QT ∪ QcT we have (∂tα − ∆)u = 0) Z (∂tα − ∆)φ κT u dx dt = hγ1 (u), γ(κT φ)i − hγ(u), γ1 (κT φ)i (3.18) Q Z T (∂tα − ∆)φ κT u dx dt = −hγ1 (u), γ(κT φ)i + hγ(u), γ1 (κT φ)i. (3.19) QcT
The jump of the traces for u is [γ(u)] = 0 by the first part of the theorem. Since the test function φ is smooth it’s traces are continuous across the boundary, i.e. [γ(κT φ)] = [γ1 (κT φ)] = 0. Adding equations (3.18) and (3.19) together and using the previous trace properties of u and κT φ we obtain Z (∂tα − ∆)φ κT u dx dt = −h[γ1 (u)], γ(κT φ)i. (3.20) BR ×(0,T )
Combining the equations (3.18) and (3.20) we finally obtain hψ, γ(κT φ)i = −h[γ1 (u)], γ(κT φ)i ∀φ ∈ C0∞ (BR × (0, T )), which proves the second statement.
(3.21)
3.4. The coercivity of the single layer potential For the proof of coercivity we use the standard technique by proving G˚ arding’s inequality and positivity for the single layer potential (see the proof of Theorem 3.11 in [2]). To begin with we apply the Green formula to the function u = Sψ, where 1 α ψ ∈ H − 2 ,− 4 (ΣT ). By the Gauss divergence formula we have h∇u, ∇viQT + h∂tα (u), viQT = hγ1 (u), viΣT + h(∂tα − ∆)u, viQT , for some appropriate test function v. Since u is the solution of the homogeneous fractional diffusion equation we obtain by setting v = u: h∇u, ∇uiQT + h∂tα (u), uiQT = hγ1 (u), uiΣT .
246
Kemppainen and Ruotsalainen
IEOT
Since the Caputo derivative is positive semidefinite, we’ll get Z hγ1 (u|QT ), γ(u|QT )iΣT ≥ |∇u|2 dx dt. QT
QcR
QTc
Respectively, on the domain = ∩ BR we’ll have Z Z −hγ1 (u|QcR ), γ(u|QcR )i = |∇u|2 dx dt + h∂tα u, uiQcR − QcR
u∂n u ds∂BR dt.
∂BR ×(0,T )
By the jump relations we have hψ, V ψi = hγ1 (u|QT ), γ(u|QT )i − hγ1 (u|QcR ), γ(u|QcR )i. Hence we obtain Z
Z
2
hψ, V ψi ≥
|∇u| dx dt − QT ∪QcR
u∂n u ds∂BR dt. ∂BR ×(0,T )
Since the fundamental solution E(x, t) is smooth on the boundary ∂BR [8], α 1 α 1 there exists a compact operator T1 : H − 2 ,− 4 (ΣT ) → H 2 , 4 (ΣT ) such that Z u∂n u ds∂BR dt = hψ, T1 ψiΣT . ∂BR ×(0,T ) α
e 1, 2 (QT ) ,→ L2 (QT ) is a compact embedding, On the other hand, since H 1 1 α α there exists a compact operator T2 : H − 2 ,− 4 (ΣT ) → H 2 , 4 (ΣT ) such that Z |∇u|2 dx dt = kuk2H 1,0 (QT ) + kuk2H 1,0 (Qc ) − hψ, T2 ψi. R
QT ∪QcR
We need the following lemma. e 1, α2 (QT ), 0 < α < 1, and H e 1,0 (QT ) are equivalent on Lemma 3.3. The norms of H the subspace of functions satisfying the homogeneous fractional diffusion equation. This lemma can be proved similarly as Lemma 2.15 in [2] by defining the space V(QT ) consisting of those functions u ∈ L2 (I; H 1 (Ω)) for which there holds ∂tα u ∈ L2 (I; H −1 (Ω)). After that we use proper interpolation results to conclude the claim. Utilizing the norm equivalence we obtain hψ, (V + T1 + T2 )ψi ≥ C(kuk2H 1, α2 (Q
T)
+ kuk2H 1, α2 (Qc ) ).
(3.22)
R
By Theorem 3.2 we have kψk
1
α
H − 2 ,− 4 (ΣT )
= kγ1 (u|QT ) − γ1 (u|QcR )k
1
α
H − 2 ,− 4 (ΣT )
.
Combining this with the inequality (3.22) and trace theorem and denoting T := T1 + T2 , we finally get G˚ arding’s inequality: hψ, (V + T )ψi ≥ Ckψk2
1
α
H − 2 ,− 4 (ΣT )
.
Now we consider the positivity of the single layer operator.
Vol. 64 (2009)
Boundary Integral Solution 1
247
α
e − 2 ,− 4 (ΣT ) we have Lemma 3.4. For all σ ∈ H Re(V σ, σ) > 0, if σ 6= 0. Proof. By the standard density argument it is enough to show the positivity for smooth functions σ(x, t) for which the initial condition σ(x, 0) = 0 is valid. Let us define the potential φ = Sσ which is the solution of the homogeneous equation: (∂tα − ∆)φ(x, t) = 0 ∀(x, t) ∈ QT ∪ QcT . For a fixed t > 0 we get by the Green formula Z Z Z Z 0 = (∂tα φ − ∆φ) · φ dx = ∂tα φ · φ dx + |∇φ|2 dx − ∂n φ− · φ dsΓ , Ω Γ ZΩ Z Z ZΩ α α 2 (∂t φ − ∆φ) · φ dx = ∂t φ · φ dx + |∇φ| dx + ∂n φ+ · φ dsΓ . 0= Ω
c
Ω
c
Ω
c
Γ
Adding the identities together we obtain Z Z −[γ1 φ]φ dsΓ = (∂tα φ · φ + |∇φ|2 ) dx. Γ
Ω∪Ω
c
Note that in the right hand side we have used the continuity of the traces of the single layer potential proved in Theorem 3.2. Integrating the previous identity with respect to the time variable over the interval [0, T ] yields us Z Z (∂tα φ · φ + |∇φ|2 ) dx dt. [γ1 φ]φ dsΓ dt = − QT ∪QcT
ΣT
Using the jump relations once again we obtain Z Z σV σ dsΓ dt = (∂tα Sσ · Sσ + |∇Sσ|2 ) dx dt. QT ∪QcT
ΣT 1
1
Since the operators J and D commute when acting on functions with zero initial conditions, and they possess the semigroup property J α J β = J α+β , we obtain by using the positive semidefiniteness of the operator J α : Z T Z T Z T ∂tα φ · φ dt = J 1−α D1 φ dt = J 1−α D1 φ · J 1 D1 φ dt 0
0
Z
0 T
J 1−α D1 φ · J α J 1−α D1 φ dt
= 0
Z = 0
T
J |
1−α
1
α
D φ ·J J {z } | g
1−α
1
D φ dt = {z } g
Z
T
J α g · g dt ≥ 0.
0
Hence the single layer operator is at least positive semidefinite: Z Z V σ · σ dsΓ dt ≥ |∇Sσ|2 dx dt ≥ 0. ΣT
QT ∪QcT
248
Kemppainen and Ruotsalainen
IEOT
If there exists a boundary distribution such that Z σV σ dsΓ dt = 0 ΣT
we obtain that ∇Sσ = 0 for all x ∈ QT ∪ QcT and 0 < t < T . Thus we have ∂tα φ − ∆φ = ∂tα φ = 0. Now for every fixed x ∈ QT ∪ QcT we have ∂tα φ = J 1−α D1 φ = 0. Since the Abel integral equation J 1−α ϕ = ψ is uniquely solvable we have that D1 φ = 0, and thus φ(x, t) = C. By the zero initial condition we finally obtain that the constant φ(x, t) = C = 0 proving the positivity of the single layer operator. As in [6] or in [2] we obtain the strong coercivity of the single layer operator, and we thus are able to state our main theorem: e 12 , α4 (ΣT ) is an e − 21 ,− α4 (ΣT ) → H Theorem 3.5. The single layer operator V : H isomorphism. Furthermore, it is coercive, i.e. there exists a positive constant c such that Re(V σ, σ) ≥ ckσk2 − 1 ,− α H
e − 12 ,− α4
for all σ ∈ H
2
4
(ΣT )
(ΣT ).
e 12 , α4 (ΣT ) the fractional diffusion equation admits a Corollary 3.6. For every g ∈ H α e 1, 2 (QT ) which is given by the single layer potential: unique solution Φ(x, t) ∈ H Φ(x, t) = Sσ(x, t), e − 21 ,− α4
where σ ∈ H
(ΣT ) is the unique solution of the boundary integral equation V σ = g.
References [1] M. Abramowitz, I.A. Stegun (eds.), Handbook of mathematical functions and with formulas, graphs and mathematical tables, U.S. Government Printing Office, Washington DC, 1971. [2] M. Costabel, Boundary integral operators for the heat equation, Integr. Equ. Oper. Theory, 13(4), (1992), 498–552. [3] M. Costabel, Time-dependent problems with the boundary integral equation method. In: E. Stein, R. de Borst and T.J.R. Hughes (eds.), Encyclopedia of Computational Mechanics. John Wiley & Sons, Ltd. 2004. [4] M. Costabel, J. Saranen, Parabolic boundary integral operators, symbolic representations and basic properties, Integr. Equ. Oper. Theory, 40, (2001), 185–211. [5] I.S. Gradshteyn, I.M. Ryzhik, Table of integrals, series and products, Academic Press, New York, 1996. [6] G.C. Hsiao, J. Saranen, Coercivity of the single layer heat operator, Report 89–2, Center for Mathematics and Waves, Newark, Delaware, 1989.
Vol. 64 (2009)
Boundary Integral Solution
249
[7] G.C. Hsiao, J. Saranen, Boundary Integral Solution of the Two-dimensional Heat Equation, Math. Meth. Appl. Sci. 16 (1993), 87–114. [8] A.A. Kilbas, M. Saigo, H-transforms: Theory and Applications, CRC Press, LLC, 2004. [9] J.L. Lions, E. Magenes, Non-homogeneous boundary value problems and applications I, Springer, Berlin, 1972. [10] J.L. Lions, E. Magenes, Non-homogeneous boundary value problems and applications II, Springer, Berlin, 1972. [11] F. Oberhettinger, Fourier expansions, Academic Press, New York, London, 1973. [12] I. Podlubny, Fractional Differential Equations, Academic Press, San Diego, California, 1999. [13] A.P. Prudnikov, Y.A. Brychkov, O.I. Marichev, Integrals and Series, vol. 3. More special functions, Overseas Publishers Association, Amsterdam, 1990. J. Kemppainen and K. Ruotsalainen University of Oulu Mathematics Division P.O. Box 4500 FI-90014 Oulu Finland e-mail:
[email protected] [email protected] Submitted: August 1, 2008.
Integr. equ. oper. theory 64 (2009), 251–260 c 2009 Birkh¨
auser Verlag Basel/Switzerland 0378-620X/020251-10, published online June 5, 2009 DOI 10.1007/s00020-009-1690-1
Integral Equations and Operator Theory
Bloch-Bergman Pullbacks with Logarithmic Weights E. G. Kwon Abstract. We characterize the composition operators mapping Blochs boundedly into the weighted Bergman spaces of logarithmic weight. For 0 < p < ∞, 1 < α < ∞, let Ap,log α denote the space of holomorphic functions F in the unit disc D for which −α Z e dxdy p |F (z)| log < ∞, 2 1 − |z| 1 − |z|2 D α and let Ap,log denote the class of holomorphic self maps f of D for which σ p −α Z 1 dxdy e log log < ∞. 1 − |f (z)|2 1 − |z|2 1 − |z|2 D
Then for the Bloch pullback operator Cf , the following are equivalent: (1) Cf maps Bloch space B boundedly into A2p,log α α (2) f ∈ Ap,log p−1 0 2 1−α Z σ |f (z)| 1 e (3) log (1 − |z|) log dxdy < ∞. 1 − |f (z)|2 1 − |z|2 1 − |z| D Mathematics Subject Classification (2000). Primary 47B33; Secondary 30D45, 32A37. Keywords. Bloch space, weighted Bergman space, composition operators.
1. Introduction Let D = {z : |z| < 1} be the open unit disc of the complex plane. For functions f on D and for 0 < p < ∞, 0 ≤ r < 1, Mp (r, f ) and kf kp are defined respectively as usual by p1 Z 2π 1 iθ p Mp (r, f ) = |f (re )| dθ and kf kp = sup Mp (r, f ). 2π 0 r This work was supported by the Korea Research Foundation Grant funded by the Korean Government (MOEHRD, Basic Research Promotion Fund) (KRF-2007-313-C00026).
252
Kwon
IEOT
The classical Hardy space H p = H p (D) is defined to consist of those f holomorphic in D for which kf kp < ∞, and the Yamashita hyperbolic Hardy class Hσp is defined as the set of those holomorphic self maps f of D for which kσ(f )kp < ∞, where σ(z) denotes the hyperbolic distance of z and 0 in D i.e. σ(z) =
1 1 + |z| log . 2 1 − |z|
We set, following Yamashita, λ(f ) = log
1 1 − |f |2
and f ] =
|f 0 | 1 − |f |2
for holomorphic self maps f of D. Note that f ∈ Hσp if and only if kλ(f )kp < ∞ and that f ] is derivative of f in the hyperbolic version. For −1 < α < ∞ and 0 < p < ∞, the weighted Bergman space Ap,α is defined to consist of those holomorphic functions f in D for which Z p1 kf kAp,α := |f (z)|p (1 − |z|2 )α dxdy < ∞. D
Ap,α is a Banach space or a Frechet space depending on the size of p. We refer to [D, G] for H p and Ap,α , and to [Y] for Hσp . As a hyperbolic counterpart, in this paper we are going to consider the hyperbolic Bergman class. We let Ap,α σ , −1 < α < ∞, 0 < p < ∞, be the set of those holomorphic self maps f of D for which Z p [λ(f )(z)] (1 − |z|2 )α dxdy < ∞. D
But, compared to the hyperbolic Hardy class the hyperbolic Bergman class Ap,α σ was less considered in the literature mainly because it simply turns out to be Ap,α σ = {f : f holomorphic self map of D}. We pass to the case of logarithmic weights. For 1 < α < ∞ and 0 < p < ∞, α , respectively the euclidian and let us define in this paper Ap,log α and Ap,log σ hyperbolic Bergman class of logarithmic weights, consisting of those holomorphic functions F of D and holomorphic self maps f of D for which (Z ) p1 −α e dxdy p kF kAp,log α := |F (z)| log < ∞ 1 − |z|2 1 − |z|2 D and (Z kf kAp,log α := σ
p
[λ(f )(z)] D
e log 1 − |z|2
−α
dxdy 1 − |z|2
) p1 < ∞.
Ap,log α also is a Banach space when 1 ≤ p < ∞ or a Frechet space when 0 < p < 1.
Vol. 64 (2009)
Bloch-Bergman Pullbacks with Logarithmic Weights
253
Note that H p and Hσp may be regarded as the limiting class of Ap,log α and α respectively as α → 1. Note also that Ap,log is meaningless if α < 1 σ because then Z 1 dr α = ∞. 0 (1 − r) log e 1−r Aσp,log α
The subjective of this paper is the positive subharmonic Bergman function α class Ap,log . Our aim is to use the space in characterizing the Bloch pullback σ problems; see [RU, K4, K5] for the problems. Our results are described in Section 2 and are proven in the remaining sections. Main result of this paper, Theorem 2.3 α α in Section 2, says that Ap,log characterizes the Bloch-A2p,log pullback problem. σ σ
2. Statements of Results We begin with the Euclidian space Ap,log α and are going to establish an equivalent condition involving derivatives for the membership of the space. Among studies on Ap,α , we pay attention to the well-known equivalence Z f ∈ Ap,α ⇐⇒ |f (z)|p−2 |f 0 (z)|2 (1 − |z|2 )α+2 dxdy < ∞. (2.1) D
The question on characterizing general weight functions substituting (1 − |z|2 )α in (2.1) that maintain the equivalence was considered quite extensively. See, for example, [K1, K6]. We establish the following which verifies an example of the weight that the equivalence fails. Theorem 2.1. Let 0 < p < ∞ and 1 < α < ∞, and f be holomorphic on D. Then 1−α Z e dxdy. |f (z)|p−2 |f 0 (z)|2 (1 − |z|) log kf kpAp,log α ≈ |f (0)|p + 1 − |z| D α , we have the following parallel result. Also for the hyperbolic class Ap,log σ
Theorem 2.2. Let 0 < p < ∞ and 1 < α < ∞, and f : D −→ D be holomorphic. Then 1−α Z 2 e p−1 ] kf kp p,log α ≈ |f (0)|p + [λ(f )(z)] f (z) (1 − |z|) log dxdy. Aσ 1 − |z| D We next pay attention to the composition operators. We note that Hσp first occurred in the literature as a hyperbolic counterpart of H p , but later it is found out to have a close connection with the behavior of composition operators. We note the following equivalence (see [K2, K4]) on holomorphic self maps f : g ◦ f ∈ H 2p for all g ∈ B ⇐⇒ f ∈ Hσp ,
(2.2)
where B denotes the space of Bloch functions which is defined to consist of holomorphic functions g on D for which sup (1 − |z|2 )|g 0 (z)| < ∞. z∈D
(2.3)
254
Kwon
IEOT
It is a general phenomenon that the composition operator maps the Bloch space boundedly into a (Euclidian) holomorphic function space if the inducing holomorphic self map belongs to the corresponding hyperbolic function class; see, for example, [K3]. Parallel to the general phenomena, we conjecture the following α g ◦ f ∈ A2p,log α for all g ∈ B ⇐⇒ f ∈ Ap,log . σ
(2.4)
Actually two cases are true : the limiting case α = 1 of (2.4) is nothing but (2.2) and, in [K5], the case p = 1 of (2.4) was verified. We prove (2.4) in general in this paper. The Bloch space B is a Banach space if the norm kgkB of g ∈ B is defined to be the sum of |g(0)| and the left side of (2.3). If we let Cf denote the composition operator defined by Cf g = g ◦ f , then Theorem 2.2 and (2.4) give, by the closed graph theorem, Theorem 2.3. For 0 < p < ∞, 1 < α < ∞, and for holomorphic self map f of D, the following are equivalent. (1) Cf maps Bloch space B boundedly into A2p,log α . α . (2) f ∈ Ap,log σ Z 2 p−1 ] (3) [λ(f )(z)] f (z) (1 − |z|) log D
e 1 − |z|
1−α dxdy < ∞.
Finally, we see that the compactness of Cf is equivalent to the boundedness in our case. Recall that a linear operator T from a Banach space X into another Banach space Y is compact if, for each bounded subset B of X, T (B) is relatively compact in Y . Theorem 2.4. Let f be a holomorphic self map of D and 1 < α < ∞, 1 ≤ p < ∞. Then Cf : B → Ap,log α is bounded if and only if it is compact.
3. Proofs of Theorem 2.1 and Theorem 2.2 Proof of Theorem 2.1. By the Hardy-Stein identity we have Z 2π Z p2 r iθ p dθ p |f (re )| = |f (0)| + |f (z)|p−2 |f 0 (z)|2 log dA(z), 2π 2 |z| 0 rD so that Z |f (z)|p α dA(z) kf kpAp,log α = e D (1 − |z|) log 1−|z| Z Z 1 r r dr α |f (z)|p−2 |f 0 (z)|2 log dA(z) ≈ |f (0)|p + |z| rD 0 (1 − r) log e 1−r Z Z 1 r r log |z| α dr dA(z). = |f (0)|p + |f (z)|p−2 |f 0 (z)|2 D |z| (1 − r) log e 1−r
Vol. 64 (2009)
Bloch-Bergman Pullbacks with Logarithmic Weights
Let us consider the inner integral Z 1 r |z| (1 − r) log
e 1−r
α log
255
r dr. |z|
Integration by parts gives " 1−α # Z 1 d 1 e r log dr r log dr 1 − α 1 − r |z| |z| 1−α Z 1 1 e r log log + 1 dr. = α − 1 |z| 1−r |z| If
1 2
≤ |z| ≤ 1, then the inner integral is comparable to 1−α Z 1 e dr. Iα−1 (z) = log 1−r |z|
But, since α > 1, Z
1
Iα−1 (z) =
log |z|
and simultaneously Z 1 Iα−1 (z) = log |z|
e 1−r
e 1−r
1−α
dr ≤
log
e 1 − |z|
1−α (1 − |z|)
1−α dr
1−α d e (1 − r) dr =− log 1−r dr |z| " #1 1−α −α Z 1 e e = − log (1 − r) + (1 − α) log dr 1−r 1−r |z| |z| 1−α e = log (1 − |z|) − (α − 1) Iα (z) 1 − |z| 1−α e ≥ log (1 − |z|) − (α − 1) Iα−1 (z). 1 − |z| Z
1
Thus, 1 α
log
e 1 − |z|
1−α
(1 − |z|) ≤ Iα−1 (z) ≤
log
e 1 − |z|
1−α (1 − |z|).
Noting that all singularities on {|z| < 21 } are integrable, we have 1−α Z e p p p−2 0 2 kf kAp,log α ≈ |f (0)| + |f (z)| |f (z)| (1 − |z|) log dA(z). 1 − |z| D
256
Kwon
IEOT
Proof of Theorem 2.2. The idea and the process of the proof is quite similar to Theorem 2.1. Green’s Theorem with a limiting process gives that Z 2π Z r iθ p dθ p [λ(f )(re )] ≈ [λ(f )(0)] + ∆[λ(f )(z)]p log dA(z); 2π |z| 0 rD see [K4]. Hence, Z kf kp p,log α = Aσ
[λ(f )(z)]p α dA(z) e D (1 − |z|) log 1−|z| Z 1 Z r dr r α ≈ [λ(f )(0)]p + dA(z) ∆[λ(f )(z)]p log |z| e 0 (1 − r) log rD 1−r Z Z 1 r r log |z| α dr dA(z). = [λ(f )(0)]p + ∆[λ(f )(z)]p D |z| (1 − r) log e 1−r
The remaining process of dealing the inner integral is identical to that of proof of Theorem 2.1. The result then follows by noting that 2 ∆[λ(f )(z)]p ≈ [λ(f )(z)]p−1 f ] (z) ; see [K4].
4. Proof of Theorem 2.3 By means of Theorem 2.2, we are left to show (1) ⇐⇒ (2). (1) =⇒ (2) : Suppose Cf : B −→ A2p,log α is bounded. Then kg ◦ f kA2p,log α ≤ CkgkB for a constant C independent of g. By the subharmonicity of |g ◦ f |2p , M2p (g ◦ f )2p is increasing function of r, so that we obtain Z 1 Z π dr dθ α |g ◦ f (reiθ )|2p ≤ Ckgk2p (4.1) B 2π e 0 (1 − r) log −π 1−r for all g ∈ B. Let us take for each non-dyadic t ∈ [0, 1] the function gt (z) =
∞ X
k
γk (t)z 2 ,
z ∈ D,
0
where γk is the Rademacher function; γk (t) = sign sin(2k+1 πt),
t ∈ [0, 1].
Vol. 64 (2009)
Bloch-Bergman Pullbacks with Logarithmic Weights
257
Then it follows that kgt kB = |gt (0)| + sup(1 − |z|2 )|gt0 (z)| z∈B
≤ 2 sup(1 − |z|) z∈B
∞ X
2k |z|2
k
−1
0
≤ 4 sup(1 − |z|) z∈B
∞ X
|z|k ≤ 4
0
simply because 1 + 2|z|1 + 22 |z|3 + 23 |z|7 + 24 |z|15 + · · · ≤ 2 + 2|z| + 2|z|2 + 2|z|3 + 2|z|4 + · · · . So by (4.1) Z 0
1
dr (1 − r) log
Z e 1−r
α
π
|gt ◦ f (reiθ )|2p
−π
dθ ≤ C 2π
for some C independent of gt . Integrating (4.2) with respect to t and applying Fubini’s Theorem, Z 1 Z Z π dr dθ 1 α |gt ◦ f (reiθ )|2p dt ≤ C. 0 (1 − r) log e −π 2π 0 1−r
(4.2)
(4.3)
But by Khinchin’s Inequality ([Z]), the inner integral of the left hand side of (4.3) is 2p Z Z ∞ Z π Z π dθ 1 dθ 1 X iθ 2k iθ 2p γk (t)f (re ) dt |gt ◦ f (re )| dt = −π 2π 0 −π 2π 0 0 ! p Z π X ∞ k 2 1 dθ (4.4) ≥ f (reiθ )2 C −π 2π 0 p Z 1 π dθ 1 ≥ , log C −π 1 − |f (reiθ )|2 2π where we used the inequality ∞
∞
X |f (reiθ )2 |k X k 1 log = = |f (reiθ )2 |2 . iθ 2 1 − |f (re )| k 0 0 Here C in (4.4) is another constant independent of gt and f . Plugging (4.4) into (4.3), we finally obtain p Z π Z 1 dr 1 dθ α log < ∞. iθ 2 1 − |f (re )| 2π 0 (1 − r) log e −π 1−r α (2) =⇒ (1) : Suppose f ∈ Ap,log . By the Closed Graph Theorem, it is σ 2p,log α sufficient to show that g ◦ f ∈ A for all g ∈ B. By a routine argument, we may assume f (0) = 0.
258
Kwon
IEOT
We will make use of the following two equivalences. One is the well-known euclidian g-function equivalence Z
π
1
Z
0
iθ
2
p
(1 − r)|F (re )| dr −π
dθ ≈ kF k2p 2p
(4.5)
0
valid for all holomorphic F on D with F (0) = 0. The other one is the hyperbolic g-function equivalence ([K3]) Z
π
−π
Z
1
2 (1 − r) f # (reiθ ) dr
p
dθ ≈ kλ(f )kpp
(4.6)
0
valid for all holomorphic self maps f on D with f (0) = 0. Let g ∈ B. Then by (4.5), 1
Z π dr α |g ◦ f (reiθ ) − g(0)|2p dθ e 0 (1 − r) log −π 1−r p Z 1 Z π Z 1 dr 0 iθ 2 α ≤C (1 − ρ)|(g ◦ fr ) (ρe )| dr dθ. 0 (1 − r) log e −π 0 1−r
Z
(4.7)
Since |(g ◦ fr )0 (ρeiθ )| = |g 0 ◦ fr (ρeiθ )| · |fr0 (ρeiθ )| ≤ kgkB fr# (ρeiθ ), by (4.7) and (4.6) we have Z π dr α |g ◦ f (reiθ )|2p dθ − C|g(0)|2p e −π 0 (1 − r) log 1−r p Z 1 Z π Z 1 # iθ 2 dr 2p α ≤ CkgkB (1 − ρ) fr (ρe ) dρ dθ 0 (1 − r) log e −π 0 1−r p Z 1 Z π 1 1 2p α lim ≤ CkgkB log dθ dr ρ→1 −π 1 − |fr (ρeiθ )|2 0 (1 − r) log e 1−r p Z π Z 1 dr 1 = Ckgk2p log dθ, α B 1 − |f (reiθ )|2 0 (1 − r) log e −π 1−r
Z
1
where we used the subharmonicity of log
1 1−|f |2
p
in the last equality.
The last integral is finite by the hypothesis so that g ◦ f ∈ Ap,log α , which completes the proof.
Vol. 64 (2009)
Bloch-Bergman Pullbacks with Logarithmic Weights
259
5. Proof of Theorem 2.4 To prove Theorem 2.4, we note that Cf is compact if and only if, for each bounded sequence gn in B, the sequence Cf gn contains a subsequence converging to some limit in Ap,log α (see [TL]). Since every compact linear operator is continuous, one direction is obvious. Suppose that Cf : B → Ap,log α is bounded. Then g ◦ f ∈ Ap,log α for all g ∈ B. Let gn ∈ B be such that kgn kB ≤ 1. We are going to show that Cf gn has a convergent subsequence in Ap,log α . Since 1 1 + |z| |gn (z)| ≤ |gn (0)| + kgn kB log , z ∈ D, (5.1) 2 1 − |z| {gn } forms a normal family, so that there is a subsequence of {gn } that converges on compact subsets of D to an analytic function g. g belong to B with kgkB ≤ 1 because 2
2
|g 0 (z)|(1 − |z| ) = lim |gn0 (z)|(1 − |z| ) ≤ 1. n→∞
Thus, by (5.1) and Minkowski’s Inequality, 1/p e −α 1 dxdy log lim |(gn − g) ◦ f (z)| n→∞ 1 − |z| 1 − |z| D ≤ lim kgn − gkB n→∞ Z 1/p p 1 e −α 1 1 + |f (z)| × log 1 + log dxdy 1 − |z| 2 1 − |f (z)| D 1 − |z| ≤ Cp lim kgn − gkB n→∞ # "Z 1/p p e −α 1 1 + |f (z)| 1 log log dxdy +1 . × 1 − |z| 2 1 − |f (z)| D 1 − |z| Z
p
p
Since Cf is bounded, the last quantity is finite by Theorem 2.3. So |(gn − g) ◦ f (z)| −α 1 e is dominated by an L1 function 1−|z| log 1−|z| p
kgn − gkpB
1 e −α 1 1 + |f (z)| log 1 + log . 1 − |z| 1 − |z| 2 1 − |f (z)|
Now by the hypothesis we have Cf g ∈ Ap,log α , and by the Dominated Convergence Theorem we obtain Z e −α 1 p log dxdy = 0. lim |(gn − g) ◦ f (z)| n→∞ D 1 − |z| 1 − |z| Therefore Cf gn → Cf g in Ap,log α .
260
Kwon
IEOT
References [D] [G] [K1] [K2] [K3] [K4] [K5] [K6] [RU] [TL] [Y] [Z]
P. L. Duren, The theory of H p spaces, Academic Press, New York, 1970. J. B. Garnett, Bounded analytic functions, Academic Press, New York, 1981. E. G. Kwon, A characterization of Bloch space and Besov space, J. Math. Anal. Appl. 324 (2006), 1429–1437. , Composition of Blochs with bounded analytic functions, Proceedings of American Mathematical Society 124 (1996), 1473–1480. , Hyperbolic g-function and Bloch pullback operators, J. Math. Anal. Appl. 309 (2005), 626–637. , Hyperbolic mean growth of bounded holomorphic functions in the ball, Trans. Amer. Math. Soc. 355 (2003), 1269–1294. , On analytic functions of Bergman BMO in the ball, Can. Math. Bull. 42(1) (1999), 97–103. , Quantities equivalent to the norm of a weighted Bergman space, J. Math. Anal. Appl. 338 (2008), 758–770. W. Ramey and D. Ullrich, Bounded mean oscillations of Bloch pullbacks, Math. Ann. 291 (1991), 591–606. A. E. Taylor and D. C. Lay, Introduction to functional analysis, John Wiley and Sons, Inc., New York, 1980. S. Yamashita, Hyperbolic Hardy class and hyperbolically Dirichlet finite functions, Hokkaido Math. J. Special Issue 10 (1981), 709–722. A. Zygmund, Trigonometric series, Cambridge Univ. Press, London, 1959.
E. G. Kwon Department of Mathematics Education Andong National University Andong 760-749 Korea e-mail:
[email protected] Submitted: January 7, 2009. Revised: April 2, 2009.
Integr. equ. oper. theory 64 (2009), 261–271 c 2009 Birkh¨
auser Verlag Basel/Switzerland 0378-620X/020261-11, published online June 5, 2009 DOI 10.1007/s00020-009-1689-7
Integral Equations and Operator Theory
Lie Derivations of Reflexive Algebras Fangyan Lu and Benhong Liu Abstract. A Lie derivation is called standard if it is a sum of a derivation and a linear map with image in the center vanishing on commutators. In this paper we show that Lie derivations of a reflexive algebra AlgL on a Banach space are standard if L is a nest, or has the non-trivial smallest element, or has the non-trivial greatest element. Mathematics Subject Classification (2000). Primary 47L35; Secondary 17B40, 17B60. Keywords. Lie derivations, derivations, reflexive algebras, nest algebras.
1. Introduction and Preliminaries Let A be an associative algebra and M be an A-bimodule. By Z(M, A) we denote the center of M relative to A, that is, Z(M, A) = {M ∈ M : AM = M A for all A ∈ A}. A linear map δ : A → M is called a derivation if δ(AB) = δ(A)B + Aδ(B) for all A, B ∈ A, and a Lie derivation if δ([A, B]) = [δ(A), B] + [A, δ(B)] for all A, B, ∈ A, where [A, B] = AB − BA is the usual Lie product. We say that a Lie derivation δ is standard if it can be decomposed as δ = d + τ , where d is a derivation from A into M and τ is a linear map from A into the center Z(M, A) of M relative to A vanishing on each commutator. The classical problem, which has been studied for many years, is to find conditions on A under which each Lie derivation is standard or standard-like. This problem has been investigated for prime rings in [2, 5, 14, 17, 18], for C*-algebras and for more general semisimple Banach algebras in [1, 9, 15, 16, 19], for triangular algebras in [3, 6]. In the present note, we pursue this line of investigation for reflexive algebras. Throughout, all algebras and vector spaces will be over F, where F is either the real field R or the complex field C. Given a Banach space X with topological dual X ∗ , by B(X) we mean the algebra of all bounded linear operators on X. The terms operator on X and subspace of X will mean ‘bounded linear map of X This work was supported by NNSFC (No. 10771154) and PNSFJ (No. BK2007049).
262
Lu and Liu
IEOT
into itself’ and ‘norm closed linear manifold of X’, respectively. For A ∈ B(X), denote by A∗ the adjoint of A. For any non-empty subset L ⊆ X, L⊥ denotes its annihilator, that is, L⊥ = {f ∈ X ∗ : f (x) = 0 for all x ∈ L}. A family L of subspaces of X is a subspace lattice if it contains (0) and X, and is complete in the sense that it is closed under the formation of arbitrary closed linear spans (denoted by ∨) and intersections (denoted by ∧). A nest is a totally ordered subspace lattice. Given a subspace lattice L on X, the associated subspace lattice algebra AlgL is the set of operators on X leaving every subspace in L invariant, that is, AlgL = {A ∈ B(X) : Ax ∈ E for every x ∈ E and for every E ∈ L}. Dually, if A is a subalgebra of B(X), by LatA we denote the lattice of subspaces of X that are left invariant by each operator in A. An algebra A is reflexive if A = AlgLatA, and a lattice L is reflexive if L = LatAlgL. Clearly, every reflexive algebra is of the form AlgL for some subspace lattice L and vice versa. In this paper, we are mainly interested in a certain tractable class of reflexive algebras, namely those which are rich in rank one operators. Let x ∈ X and f ∈ X ∗ be non-zero. The rank one operator x ⊗ f is defined by y 7→ f (y)x for y ∈ X. If L is a subspace lattice of X and E ∈ L, we define E− = ∨{F ∈ L : F 6⊇ E}, E 6= 0, E+ = ∧{F ∈ L : F 6⊆ E}, E 6= X. It is well known that x ⊗ f belongs to AlgL if and only if there exists an element ⊥ ⊥ means (E− )⊥ . . Here and subsequently, E− E ∈ L such that x ∈ E and f ∈ E− It turns out that the problem of characterizing Lie derivations of algebras on Banach spaces is much more difficult than the problem of describing Lie derivations of algebras on Hilbert spaces. Suppose that each derivation d of a subalgebra A of B(X) is spatial, i.e, there exists an operator T in B(X) such that d(A) = T A−AT for A ∈ A. Then it is easily seen that d(A) ker(A) is contained in the range of A for each A in A. Hence if a Lie derivation δ of A is standard, then there exits a center-valued map τ such that (δ(A) − τ (A)) ker(A) is contained in the range of A for each A ∈ A. The main idea in this paper is to show that this is true in some cases. The following proposition makes it possible to prove this only for the set of rank one operators. Proposition 1.1. Let E and F be non-zero subspaces of X and X ∗ , respectively. Let Φ : E × F → B(X) be a bilinear map such that Φ(x, f ) ker(f ) ⊆ Fx for all x ∈ E and f ∈ F . Then there exist two linear maps T : E → X and S : F → X ∗ such that Φ(x, f ) = T x ⊗ f + x ⊗ Sf for all x ∈ E and f ∈ F . ⊥ Proof. For any non-zero vectors x ∈ X and f ∈ X− , since Φ(x, f ) ker(f ) ⊆ Fx , there is a continuous linear functional hx,f on ker(f ) such that, for each z ∈ ker(f ),
Φ(x, f )z = hx,f (z)x.
Vol. 64 (2009)
Lie Derivations of Reflexive Algebras
263
˜ x,f be a Let zf be in X such that f (zf ) = 1. Then X = Fzf ⊕ ker(f ). Let h ˜ ˜ continuous extension of hx,f to X. Then hx,f − hx,f (zf )f is also an extension of hx,f which vanishes at zf . Still by hx,f we denote such a special extension. Define a linear map Tf : E → X by Tf x = Φ(x, f )zf for x ∈ E. Then for all λ ∈ F and all z ∈ ker(f ), we have that Φ(x, f )(λzf + z) = λTf x + hx,f (z)x = λTf x + hx,f (λzf + z)x. So for all x ∈ E and f ∈ F , Φ(x, f ) = Tf x ⊗ f + x ⊗ hx,f .
(1.1)
We claim that hx,f depends only on f . To see this, fix a non-zero functional f in F , and let x1 and x2 be non-zero vectors in E. First suppose that x1 and x2 are linearly independent. For all z ∈ ker(f ), by (1.1) we have that Tf (x1 + x2 ) + hx1 +x2 ,f (z)(x1 + x2 ) = Φ(x1 + x2 , f )(zf + z) = (Φ(x1 , f ) + Φ(x2 , f ))(zf + z) = Tf x1 + hx1 ,f (z)x1 + Tf x2 + hx2 ,f (z)x2 , from which we get (hx1 +x2 ,f (z) − hx1 ,f (z))x1 = (hx2 ,f (z) − hx1 +x2 ,f (z))x2 . So hx1 ,f = hx1 +x2 ,f = hx2 ,f . Now suppose that x1 and x2 are linearly dependent, say x2 = λx1 . Then Tf x2 ⊗ f + x2 ⊗ hx2 ,f = Φ(x2 ⊗ f ) = λΦ(x1 ⊗ f ) = λ(Tf x1 ⊗ f + x1 ⊗ hx1 ,f ) = Tf x2 ⊗ f + x2 ⊗ hx1 ,f . So hx1 ,f = hx2 ,f , establishing the claim. Therefore, for each f ∈ F there exists a unique functional hf in X ∗ which vanishes at zf such that Φ(x, f ) = Tf x ⊗ f + x ⊗ hf
(1.2)
holds for all x ∈ E. We now claim that if f1 and f2 in F are linearly independent then the difference Tf1 − Tf2 is a scalar multiple of the identity IE on E. By the independency of f1 and f2 , we have ker(f1 ) 6⊆ ker(f2 ) and ker(f2 ) 6⊆ ker(f1 ). Accordingly, there exist two vectors x1 and x2 such that fi (xj ) = δij . By (1.2), for all x ∈ E, Tf1 x ⊗ f1 + x ⊗ hf1 + Tf2 x ⊗ f2 + x ⊗ hf2 = Φ(x, f1 + f2 ) = Tf1 +f2 x ⊗ (f1 + f2 ) + x ⊗ hf1 +f2 . Applying this equation to x1 − x2 , we get a scalar λi such that (Tf1 − Tf2 )x = λi x for all x ∈ E, proving the claim. Now fix a non-zero functional f0 ∈ F and set T = Tf0 . Let f be in F . If f is linearly dependent of f0 , say f = µf f0 , then by (1.2) we have, for all x ∈ E, that Φ(x, f ) = µf Φ(x, f0 ) = µf (Tf0 x ⊗ f0 + x ⊗ hf0 ) = T x ⊗ f + x ⊗ (µf hf0 );
264
Lu and Liu
IEOT
if f is linearly independent of f0 , then Tf = Tf0 + λf IE for some λf ∈ F. Thus, by (1.2) we have, for all x ∈ E, that Φ(x, f ) = Tf x ⊗ f + x ⊗ hf = (Tf0 + λf IE )x ⊗ f + x ⊗ hf = T x ⊗ f + x ⊗ (λf f + hf ). So there exists a unique functional Sf from F into X ∗ such that Φ(x, f ) = T x ⊗ f + x ⊗ Sf . It is easy to see that the map S : F → X ∗ is well-defined and linear. The proof is complete.
2. Lie derivations of reflexive algebras In this section, we shall study Lie derivations of reflexive algebras AlgL for which L has the non-trivial smallest element or the non-trivial greatest element. Theorem 2.1. Let X be a Banach space with dimension greater than 1. Let L be a subspace lattice of X with X− 6= X. Let δ : AlgL → B(X) be a Lie derivation. Then δ is standard. Proof. If X− = (0), then AlgL = B(X). The result follows from [14]. If (0) < X− < X and X is 2-dimensional, then δ is a Lie derivation from the two-by-two upper triangular matrix algebra into the two-by-two matrix algebra. The result follows from [3, 4, 6]. In the sequel, we assume that X is of dimension greater than 2 and (0) < X− < X. We first establish two claims. ⊥ Claim 1. There is a map ψ : X×X− → F such that (δ(x⊗f )−ψ(x, f )I) ker(f ) ⊆ Fx ⊥ for all x ∈ X and f ∈ X− . Moreover, if f (x) = 0 then ψ(x, f ) = 0. ⊥ . First suppose that f (x) 6= 0. For z ∈ ker(f ), we Let x be in X and f in X− have f (x)δ(z ⊗ f ) = δ([z ⊗ f, x ⊗ f ]) = [δ(z ⊗ f ), x ⊗ f ] + [z ⊗ f, δ(x ⊗ f )] = δ(z ⊗ f )x ⊗ f − (x ⊗ f )δ(z ⊗ f ) + (z ⊗ f )δ(x ⊗ f ) − δ(x ⊗ f )z ⊗ f. Applying this equation to x, we get f (x)δ(x ⊗ f )z = f (δ(x ⊗ f )x)z − f (δ(z ⊗ f )x)x 1 for all z ∈ ker(f ). Let ψ(x, f ) = f (x) f (δ(x ⊗ f )x), as required. Now suppose that f (x) = 0. Since ker(f ) is of dimension at least 2, we can take x1 from ker(f ) which is linearly independent of x. Take y1 from X such that
Vol. 64 (2009)
Lie Derivations of Reflexive Algebras
265
f (y1 ) = 1. Let y2 = y1 + x1 . Then y1 , y2 , x are linearly independent. For i = 1, 2, a computation gives δ(x ⊗ f ) = δ([x ⊗ f, yi ⊗ f ]) = δ(x ⊗ f )yi ⊗ f − (yi ⊗ f )δ(x ⊗ f ) + (x ⊗ f )δ(yi ⊗ f ) − δ(yi ⊗ f )x ⊗ f. Let z be in ker(f ). Applying the above equation to z we get δ(x ⊗ f )z = λi yi + µi x for some λi , µi ∈ F, i = 1, 2. Thus λ1 y1 + µ1 x = λ2 y2 + µ2 x. Hence λ1 = λ2 = 0 since y1 , y2 , x are linearly independent. Consequently, δ(x ⊗ f ) ker(f ) ⊆ Fx. Claim 2. The map ψ obtained in Claim 1 is bilinear. The homogeneity is obvious. ⊥ Let f be in X− . Let x1 and x2 be in X. If both x1 and x2 are in ker(f ), then ψ(x1 , f ) = ψ(x2 , f ) = ψ(x1 + x2 , f ) = 0. So ψ(x1 + x2 , f ) = ψ(x1 , f ) + ψ(x2 , f ). If one of x1 and x2 is not in ker(f ), then span{x1 , x2 } ∩ ker(f ) is of dimension at most one. So we can take y from ker(f ) such that y ∈ / span{x1 , x2 }. Then we have δ(x1 ⊗ f )y = ψ(x1 , f )y + µ1 x1 , δ(x2 ⊗ f )y = ψ(x2 , f )y + µ2 x2 and δ((x1 + x2 ) ⊗ f )y = ψ(x1 + x2 , f )y + µ(x1 + x2 ) for some µ, µ1 , µ2 ∈ F. Comparing those equations and noting δ((x1 + x2 ) ⊗ f ) = δ(x1 , f ) + δ(x2 , f ), we get (ψ(x1 + x2 , f ) − ψ(x1 , f ) − ψ(x2 , f ))y = µ1 x1 + µ2 x2 − µ(x1 + x2 ). Since y ∈ / span{x1 , x2 }, it follows that ψ(x1 + x2 , f ) − ψ(x1 , f ) − ψ(x2 , f ) = 0. So ψ is additive in the first variable. ⊥ . To show that ψ is additive in the second variable, we let f1 and f2 be in X− Let x be in X. If x ∈ ker(f1 ) ∩ ker(f2 ), then ψ(x, f1 ) = ψ(x, f2 ) = ψ(x, f1 + f2 ). So ψ(x, f1 + f2 ) = ψ(x, f1 ) + ψ(x, f2 ). If x ∈ / ker(f1 ) ∩ ker(f2 ), then we can take z ∈ X− which is in k(f1 ) ∩ ker(f2 ) and is linearly independent of x. By Claim 1 we have δ(x ⊗ f1 )z = ψ(x, f1 )z + λ1 x, δ(x ⊗ f2 )z = ψ(x, f2 )z + λ2 x and δ(x ⊗ (f1 + f2 ))z = ψ(x, f1 + f2 )z + λx for some λ, λ1 , λ2 ∈ F. Comparing those equations and noting that δ(x ⊗ (f1 + f2 )) = δ(x ⊗ f1 ) + δ(x ⊗ f2 ), we get (ψ(x, f1 + f2 ) − ψ(x, f1 ) − ψ(x, f2 ))z = (λ1 + λ2 − λ)x. Since z and x are linearly independent, it follows that ψ(x, f1 + f2 ) = ψ(x, f1 ) + ψ(x, f2 ), establishing the claim.
266
Lu and Liu
IEOT
⊥ Now, for x ∈ X and f ∈ X− , let Φ(x, f ) = δ(x ⊗ f ) − ψ(x, f )I. By the two claims above, Φ(x, f ) is bilinear and Φ(x, f ) ker(f ) ⊆ Fx. Hence by Proposition 1.1,
Φ(x, f ) = T x ⊗ f + x ⊗ Sf, ⊥ where maps T : X → X and S : X− → X ∗ are linear. ⊥ Fix a non-zero functional f in X− . Let A be in AlgL. For x ∈ X,
δ([A, x ⊗ f ]) = δ(Ax ⊗ f − x ⊗ A∗ f ) = T Ax ⊗ f + Ax ⊗ Sf + ψ(Ax, f )I − T x ⊗ A∗ f − x ⊗ SA∗ f − ψ(x, A∗ f )I, on the other hand, δ([A, x ⊗ f ]) = [δ(A), x ⊗ f ] + [A, δ(x ⊗ f )] = δ(A)x ⊗ f − x ⊗ δ(A)∗ f + AT x ⊗ f + Ax ⊗ Sf − T x ⊗ A∗ f − x ⊗ A∗ Sf. So (δ(A) + AT − T A)x ⊗ f = x ⊗ (δ(A)∗ + A∗ S − SA∗ )f + (ψ(Ax, f ) − ψ(x, A∗ f ))I. Let z be in ker(f ) which is linearly independent of x. Applying both sides to z, we get λx + (ψ(Ax, f ) − ψ(x, A∗ f ))z = 0 for some λ ∈ F and hence ψ(Ax, f ) − ψ(x, A∗ f ) = 0. So (δ(A) + AT − T A)x ⊗ f = x ⊗ (δ(A)∗ + A∗ S − SA∗ )f for all x ∈ X. Applying this to a vector u with f (u) = 1, we get δ(A) + AT − T A = τ (A) for some τ (A) ∈ FI. Now for A ∈ AlgL, we define d(A) = δ(A) − τ (A). Then d(A) = AT − T A. Using this, it is easy to verify that d is a derivation. Hence τ is a linear map into FI vanishing on commutators. Adapting the ideas in the above proof, we give a kind of a dual. Note that if L is a subspace lattice of a reflexive Banach space, then L⊥ = {L⊥ : L ∈ L} is a subspace lattice. In nonreflexive spaces, the set L⊥ of subspaces of X ∗ fails, usually, to be a lattice. But even in the case of reflexive spaces, the elements (L− )⊥ and (L⊥ )− of L⊥ bear no relation: Examples show that they can be incomparable. So the following theorem does not seem to follow from the previous one. Theorem 2.2. Let L be a subspace lattice of a Banach space X with dimension at least 2 and suppose that (0)+ 6= (0). Let δ : AlgL → B(X) be a Lie derivation. Then δ is standard. Proof. (sketch) We can assume that (0) < (0)+ < X and X has dimension at least 3. Let x 7→ x ˆ be the canonical map from X into X ∗∗ . With x ∈ X, we fix a functional ϕx in X ∗ such that ϕx (x) = 1. Then X ∗ = Fϕx ⊕ker(ˆ x). Hence there is a x) ⊆ Ff bilinear map ψ from (0)+ ×X ∗ to B(X) such that (δ(x⊗f )−ψ(x, f )I)∗ ker(ˆ
Vol. 64 (2009)
Lie Derivations of Reflexive Algebras
267
for all (x, f ) ∈ (0)+ ×X ∗ . Let Φ(f, x ˆ) = (δ(x⊗f )−ψ(x, f )I)∗ . Then Φ is a bilinear d+ into B(X ∗ ). Hence there exist linear maps T : X ∗ → X ∗ and map from X ∗ × (0) d+ → X ∗∗ such that S : (0) Φ(f, x ˆ) = T f ⊗ x ˆ + f ⊗ Sx ˆ ∗
for all (x, f ) ∈ (0)+ × X . Hence with A ∈ AlgL, we have that \ + A∗∗ S x c (δ(A)∗ + A∗ T − T A∗ )f ⊗ x ˆ = f ⊗ (δ(A)x ˆ − S Ax) for all (x, f ) ∈ (0)+ × X ∗ . So δ(A)∗ + A∗ T − T A∗ = τ (A) for some τ (A) ∈ FI. Clearly, τ is a linear map. Define d(A) = δ(A) − τ (A) for A ∈ AlgL. Then d is linear. Moreover, for A, B ∈ L, d(AB)∗ = T (AB)∗ − (AB)∗ T = B ∗ d(A)∗ + d(B)∗ A∗ = (d(A)B + Ad(B))∗ . Consequently, d(AB) = d(A)B +Ad(B) for all A, B ∈ A. Namely, d is a derivation. Now δ = d + τ . From this, it is easy to see that τ vanishes on commutators, completing the proof.
3. Lie derivations of nest algebras We now turn to the nest algebra case. To prove the main result we need some lemmas. Lemma 3.1. Let E be an infinite-dimensional subspace of a Banach space X. Let f be in X ∗ . Then the subspace ker(f ) ∩ E is infinite-dimensional. Proof. If f (E) = {0}, then the lemma is obviously true. Now suppose that f (x) = 1 for some x ∈ E. Let P = x ⊗ f . Then ker(f ) = (I − P )X and hence ker(f ) ∩ E = (I − P )E. Since E is infinite-dimensional, so is (I − P )E, proving the lemma. An alternative proof is as follows. Let g = f |E . Then ker(f ) ∩ E = ker(g) and hence it is infinite-dimensional since E is infinite-dimensional. Lemma 3.2. Let E and F be infinite-dimensional subspaces of X and X ∗ respectively. Let φ and ψ be two maps from E × F into B(X). Suppose that φ is bilinear and (φ(x, f ) − ψ(x, f )) ker(f ) ⊆ Fx for all x ∈ E and f ∈ F . Then ψ is bilinear. Proof. Let f be a functional in F . Let x1 and x2 be in E and α1 and α2 be in F. Choose y in ker(f ) such that y ∈ / span{x1 , x2 }. By the assumption, we have φ(x1 , f )y = ψ(x1 , f )y + µ1 x1 , φ(x2 , f )y = ψ(x2 , f )y + µ2 x2 and φ(α1 x1 + α2 x2 , f )y = ψ(α1 x1 + α2 x2 , f )y + µ(α1 x1 + α2 x2 ) for some µ, µ1 , µ2 ∈ F. Comparing those equations and noting φ(α1 x1 +α2 x2 , f ) = α1 φ(x1 , f ) + α2 φ(x2 , f ), we get (ψ(α1 x1 + α2 x2 , f ) − α1 ψ(x1 , f ) − α2 ψ(x2 , f ))y = µ1 x1 + µ2 x2 − µ(α1 x1 + α2 x2 ).
268
Lu and Liu
IEOT
Since y ∈ / span{x1 , x2 }, it follows that ψ(α1 x1 + α2 x2 , f ) − α1 ψ(x1 , f ) − α2 ψ(x2 , f ) = 0. So ψ is linear in the first variable. To show that ψ is linear in the second variable, we let f1 and f2 be in F and β1 and β2 be in F. By Lemma 3.1, ker(f1 ) ∩ ker(f2 ) is infinite dimensional. Let x be in E. Choose z from ker(f1 ) ∩ ker(f2 ) such that z is linearly independent of x. Note that z ∈ ker(f1 + f2 ). By the assumption, we have φ(x, f1 )z = ψ(x, f1 )z + λ1 x, φ(x, f2 )z = ψ(x, f2 )z + λ2 x and φ(x, β1 f1 + β2 f2 )z = ψ(x, β1 f1 + β2 f2 )z + λx for some λ, λ1 , λ2 ∈ F. Comparing those equations and noting that φ(x, β1 f1 + β2 f2 ) = β1 φ(x, f1 ) + β2 δ(x, f2 ), we get (ψ(x, β1 f1 + β2 f2 ) − β1 ψ(x, f1 ) − β2 ψ(x, f2 ))z = (λ1 + λ2 − λ)x. Since z and x are linearly independent, it follows that ψ(x, β1 f1 + β2 f2 ) = β1 ψ(x, f1 ) + β2 ψ(x, f2 ), completing the proof.
The following was proved in the Hilbert space case. The method here is very different from one in [13] because of the lack of invariant projections. Theorem 3.3. Let N be a nest on a Banach space X. Let δ : AlgN → B(X) be a Lie derivation. Then δ is standard. Proof. By Theorems 2.1 and 2.2, we can assume that (0)+ = (0) and X− = X. Let N 0 = N \ {(0), X}. Then (0) = ∧{N : N ∈ N 0 } and X = ∨{N : N ∈ N 0 }. We first prove two claims. Claim 1. Let f be in X ∗ . Then ker(f ) = ∨{ker(f ) ∩ N : N ∈ N 0 }. If f = 0, then the claim is obviously true. Now suppose that f 6= 0. Since ∨{N : N ∈ N 0 } = X, there must be an M in N 0 such that f (z) = 1 for some z ∈ M . Let x be in ker(f ). Since ∨{N : N ∈ N 0 } = X again, there is a net Nk in N 0 and a net yk with each yk ∈ Nk such that limk yk = x. Since X = Fz + ker(f ), we can write yk = λk z +xk with λk ∈ F and xk ∈ ker(f ). Then xk ∈ M ∨Nk ∈ N 0 . Now lim λk = lim f (yk ) = f (x) = 0. k
k
So lim xk = lim(yk − λk z) = lim yk = x. k
k
k
Thus we have shown that ker(f ) ⊆ ∨{ker(f ) ∩ N : N ∈ N 0 }. But the inverse inclusion is clear, establishing the claim 1. Claim 2. There is a map ψ from the set of all rank one operators in AlgN into F such that (δ(x ⊗ f ) − ψ(x, f )I) ker(f ) ⊆ Fx for all x ⊗ f ∈ AlgN .
Vol. 64 (2009)
Lie Derivations of Reflexive Algebras
269
Let x ⊗ f in AlgN be non-zero. Let N be in N 0 such that f |N 6= 0. It follows from x ⊗ f ∈ AlgN that x ∈ N . Choose a non-zero functional g ∈ N ⊥ . Obviously, g is linearly independent of f . Accordingly, there is a vector z in X such that f (z) = 0 and g(z) = 1. For y ∈ ker(f ) ∩ N , we have that 0 = δ([x ⊗ f, y ⊗ g]) = δ(x ⊗ f )y ⊗ g − y ⊗ gδ(x ⊗ f ) + x ⊗ f δ(y ⊗ g) − δ(y ⊗ g)x ⊗ f. Applying this to z, we get, for each y ∈ ker(f ) ∩ N , that δ(x ⊗ f )y = µ(x, f, y, N )x + ψ(x, f, N )y
(3.1)
for some µ(x, f, y, N ), ψ(x, f, N ) ∈ F. We first show that the quantity ψ(x, f, N ) in Eq. (3.1) is unique. To do this, suppose that the scalar λ satisfies that for each y ∈ ker(f ) ∩ N there is a scalar µ(y) such that δ(x ⊗ f )y = µ(y)x + λy. (3.2) Since (0)+ = (0), N is infinite-dimensional and so is ker(f ) ∩ N . Thus we can choose y0 ∈ ker(f ) ∩ N which is linearly independent of x. By Eqs. (3.1) and (3.2), we have that (ψ(x, f, N ) − λ)y0 = (µ(y0 ) − µ(x, f, y0 , N ))x. By the linear independence of y0 and x, we get that λ = ψ(x, f, N ). We next show that ψ(x, f, N ) = ψ(x, f, M ) for all N, M ∈ N 0 with f |N 6= 0 and f |M 6= 0. In fact, without loss of gernerality, we can assume that N ≤ M . Then for each y ∈ ker(f ) ∩ N , since ker(f ) ∩ N ⊆ ker(f ) ∩ M , we have δ(x ⊗ f )y = µ(x, f, y, M )x + ψ(x, f, M )y. By the uniqueness of the quantity ψ(x, f, N ), ψ(x, f, M ) = ψ(x, f, N ). Now by ψ(x, f ) denote the common values ψ(x, f, N ). Then (δ(x ⊗ f ) − ψ(x, f )I)y ∈ Fx for all N ∈ N 0 with f |N 6= 0 and all y ∈ ker(f ) ∩ N . However, by the claim 1 span{ker(f ) ∩ N : N ∈ N 0 , f |N 6= 0} is dense in ker(f ). It follows that (δ(x ⊗ f ) − ψ(x, f )I) ker(f ) ⊆ Fx, establishing the claim 2. Therefore, for N ∈ N 0 , (δ(x ⊗ f ) − ψ(x, f )I) ker(f ) ⊆ Fx ⊥ . N−
By Lemma 3.2 and Proposition 1.1, there are two linear for all x ∈ N and f ∈ ⊥ maps TN : N → X and SN : N− → X ∗ such that δ(x ⊗ f ) − ψ(x, f )I = TN x ⊗ f + x ⊗ SN f
(3.3)
⊥ for all x ∈ N and f ∈ N− . Then for N, M ∈ N 0 , we have
T N x ⊗ f + x ⊗ SN f = T M x ⊗ f + x ⊗ SM f for all x ∈ N ∩ M and f ∈ (N ∨ M )⊥ − . So the restriction of TN − TM to N ∩ M is a scalar multiple of the identity on N ∩ M .
270
Lu and Liu
IEOT
⊥ Let A be in AlgN . Let N be in N 0 . Then for x ∈ N and f ∈ N− , by δ([A, x ⊗ f ]) = [δ(A), x ⊗ f ] + [A, δ(x ⊗ f )] and Eq.(3.3), we have
(δ(A)+ATN −TN A)x⊗f = x⊗(δ(A)∗ +A∗ SN −SN A∗ )f −(ψ(x, A∗ f )−ψ(Ax, f ))I. Since I is infinite-rank, it follows that ψ(x, A∗ f ) − ψ(Ax, f ) = 0. So (δ(A) + ATN − TN A)x ⊗ f = x ⊗ (δ(A)∗ + A∗ SN − SN A∗ )f. Hence there is a scalar τN (A) such that (δ(A) + ATN − TN A)x = τN (A)x
(3.4)
for all x ∈ N . Fix an N0 in N 0 . Set τ (A) = τN0 (A). For N ∈ N 0 and x ∈ N ∩ N0 , by Eq. (3.4) we have (A(TN − TN0 ) − (TN − TN0 )A)x = (τN (A) − τ (A))x. Since we have shown that the restriction of TN − TN0 to N ∩ N0 is a scalar multiple of the identity on N ∩ N0 , it follows that τN (A) = τ (A) for all N ∈ N 0 . Moreover, τ is linear. Now let d = δ − τ . Then for N ∈ N and x ∈ N , d(A)x = (TN A − ATN ) and hence d(AB)x = (d(A)B + Ad(B))x. Since ∪{N : N ∈ N 0 } is dense in X, it follows that d(AB) = d(A)B + Ad(B). Namely d is a derivation, completing the proof.
References [1] J. Alaminos, M. Mathieu and A. R. Villena, Symmetric amenability and Lie derivations. Math. Proc. Cambridge Philos. Soc. 137(2004), 433–439. [2] K. I. Beidar and M. A. Chebotar, On Lie derivations of Lie ideals of prime rings. Israel J. Math. 123(2001), 131–148. [3] D. Benkovi˘c, Lie derivations on triangular matrices. Linear Multilinear Algebra 55(2007), 619–626. [4] D. Benkovi˘c and D. Eremita, Commuting traces and commutativity preserving maps on triangular algebras. J. Algebra 280(2004), 797–824. [5] M. Bre˘sar, Commuting traces of biadditive mappings, commutativity-preserving mappings and Lie mappings. Trans. Amer. Math. Soc. 335(1993), 525–546. [6] W. Cheung, Lie derivations of triangular algebras. Linear Multilinear Algebra 51(2003), 299–310. [7] K. Davidson, Nest algebras. Pitman Res. Notes, Math. Ser. 191, Longman Sci. Tech., New York, 1988. [8] P. R. Halmos, A Hilbert Space Problem Book. 2nd Edition, Springer-Verlag, New York/Heidelberg/Berlin, 1982. [9] B. E. Johnson, Symmetric amenability and the nonexistence of Lie and Jordan derivations. Math. Proc. Cambridge Philos. Soc. 120(1996), 455–473. [10] M. S. Lambrou, Approximants, commutants and double commutants in normed algebras. J. London Math. Soc. 25(1982), 499–513.
Vol. 64 (2009)
Lie Derivations of Reflexive Algebras
271
[11] M. S. Lambrou, Automatic continuity and implementation of homomorphisms. (manuscript). [12] W. E. Longstaff, Strongly reflexive lattices. J. London Math. Soc. 11(1975), 491–498. [13] F. Lu, Lie triple derivations on nest algebras. Math. Nachr. 280(2007), 882–887. [14] W. S. Martindale, Lie derivations of primitive rings. Michigan J. Math. 11(1964), 183–187. [15] M. Mathieu and A. R. Villena, The structure of Lie derivations on C*-algebras. J. Funct. Anal. 202(2003), 504–525. [16] C. R. Miers, Lie derivations of von Neumann algebras. Duke Math. J. 40(1973), 403–409. [17] G. A. Swain, Lie derivations of the skew elements of prime rings with involution. J. Algebra 184(1996), 679–704. [18] G. A. Swain and P. S. Blau, Lie derivations in prime rings with involution. Canad. Math. Bull. 42(1999), 401–411. [19] R. A. Villena, Lie derivations on Banach algebras. J. Algebra 226(2000), 390–409. Fangyan Lu and Benhong Liu Department of Mathematics Suzhou University Suzhou 215006 People’s Republic of China e-mail:
[email protected] honglb−
[email protected] Submitted: November 17, 2008. Revised: January 14, 2009.
Integr. equ. oper. theory 64 (2009), 273–299 c 2009 Birkh¨
auser Verlag Basel/Switzerland 0378-620X/020273-27, published online June 2, 2009 DOI 10.1007/s00020-009-1686-x
Integral Equations and Operator Theory
A Schur Analysis of the Minimal Weak Unitary Dilations of a Contraction Operator and the Relaxed Commutant Lifting Theorem S.A.M. Marcantognini and M.D. Mor´an Abstract. A Schur-type analysis of the minimal weak unitary dilations of a given contraction operator is obtained from the Arov-Grossman functional model. The result is combined with the coupling method to give a description of the interpolants in the Relaxed Commutant Lifting Theorem. Mathematics Subject Classification (2000). Primary 47A20; Secondary 47A57, 47A56. Keywords. Weak unitary dilations of contractions, Schur analysis, interpolants, Relaxed Commutant Lifting Theorem, Arov-Grossman model, coupling.
1. Introduction The Arov-Grossman model [3, 4] gives a labeling of the minimal unitary extensions of a given Hilbert space isometry by means of operator valued Schur functions. In this setting if V is an isometry defined in a closed linear subspace D of a separable Hilbert space H (all Hilbert spaces are supposed to be separable,) by a minimal e⊇H unitary extension of V we mean a unitary operator U on a Hilbert space H e such that U |D = V (the extension property) and H is the minimal Hilbert space containing all the orbits of H under U and U −1 (the minimality condition.) If V : D ⊆ H → H is an isometry then its defect subspaces are N := H D and M := H V (D). These spaces are relevant in the Arov-Grossman model since the values of the Schur functions in the description provided by the model are bounded linear operators from N into M. Roughly speaking, if ϑ is an L(N , M)valued Schur function on the open unit disk D of the complex plane, then there exists a model unitary operator Uϑ on a Hilbert space Fϑ such that Uϑ is a minimal unitary extension of V . Conversely, if U is a minimal unitary extension of V acting e then ϑ(z) := PM U (1 − zP e U )−1 |N (z ∈ D) is an L(N , M)-valued Schur on H H H
274
Marcantognini and Mor´ an
IEOT
e function whose associated model Uϑ ∈ L(Fϑ ) is undistinguishable from U ∈ L(H) e via an isometric isomorphism τ : H → Fϑ such that τ |H = 1 and τ U = Uϑ τ . Above and hereafter 1 denotes the identity operator on the corresponding Hilbert e PE is the orthogonal space and, for any closed subspace E of a Hilbert space E, e projection from E onto E. The Arov-Grossman model is a useful tool in problem solving. Its use as a theoretical device in finding solutions and as a practical method for constructing them relies on its combination with the coupling method. The coupling method is an operator theoretic technique that, when applicable to a given problem, provides a Hilbert space operator containing all the information within the data of the problem. In several interesting cases, for instance, in the framework of the classical Commutant Lifting Theorem, the coupling operator is an isometry V on a Hilbert space H and it happens that the solutions of the problem are in oneto-one correspondence, up to isometric isomorphism, with some (or all) minimal unitary extensions of V . Therefore, in this setting, the combination of the coupling method and the Arov-Grossman model gives a parameterization of the solutions of the problem, yielding, as by-product, solvability and non-uniqueness criteria. In some other problems, associated with more complex situations, for instance, in dealing with the Relaxed Commutant Lifting Theorem, the coupling operator is no longer an isometry but just a contraction. Nonetheless some unitary operators related to the coupling contraction, a subclass of its minimal weak unitary dilations (to be defined in Section 2,) still happen to correspond to the solutions we are looking for. If X is an isometry then a weak unitary dilation of X is no different than a unitary extension of X. Even though a more general situation is determined when X is only a contraction operator, a description of its minimal weak unitary dilations can still be obtained from the Arov-Grossman model. We present such a description in Section 2 while in Section 3 we use it to describe all the interpolants in the Relaxed Commutant Lifting Theorem. The description is given by a map from certain set of Schur functions (the parameters) onto the set of all interpolants. The map, however, does not establish a one-to-one correspondence between the parameter and the interpolant, as it may happen that different parameters provide the same interpolant. We give a necessary and sufficient condition for two parameters to yield the same interpolant. The special case of the classical Commutant Lifting Theorem is also discussed in this framework. For this case we get that the map provides a proper parameterization. We complement this note with an Appendix containing a sketch of the proof of the Arov-Grossman model as we state it and use it in Section 2. The relaxation of the Commutant Lifting Theorem was introduced by C. Foias, A.E. Frazho and M.A. Kaashoek in [9]. Descriptions of the interpolants in the relaxed version of the Commutant Lifting Theorem were provided by A.E. Frazho, S. ter Host and M.A. Kaashoek in [10] and [11], and by W.S. Li and D. Timotin in [12]. The coupling method was used in [10] in combination with system theory techniques and in [12] in conjunction with a choice sequence approach.
Vol. 64 (2009)
A Schur analysis
275
The results we obtained differ from the ones given by those authors, in particular, because ours are proved by merging the coupling method with the Arov-Grossman functional model. In [11] the use of an elementary harmonic majorant argument results in a more refined and more explicit description of the interpolants than the one presented by the same authors in the previous paper. The coupling method was used to study commutant lifting problems by R. Arocena [1, 2]. In essence the same treatment was independently outlined by M. Cotlar and C. Sadosky in [6] (see also [8, Section VII.8] and [7, Section 5].) A proper parameterization of the interpolants in the classical Commutant Lifting Theorem was obtained in [13] by methods which are similar to the ones we used here.
2. The minimal weak unitary dilations of a contraction Let X : B ⊆ A → A be a Hilbert space contraction. A unitary operator W on a Hilbert space Ae ⊇ A is a weak unitary dilation of X if PA W |B = X. A weak unitary dilation W of X on Ae is said to be minimal if Ae is the minimal Hilbert space containing all the orbits of A under W and W −1 . Two minimal weak unitary e and W 0 ∈ L(Ae0 ), are regarded as identical whenever dilations of X, say W ∈ L(A) there is an isometric isomorphism τ : Ae0 → Ae such that τ |A = 1 and τ W 0 = W τ . In the sequel we denote by W U D(X) the set of the undistinguishable minimal weak unitary dilations of X. We use the term “weak” dilation for contrast as the term dilation has been used in the literature for “strong” or “power” dilation, meaning that D ∈ L(D) is a dilation of C ∈ L(C) if C ⊆ D and PC Dn |C = C n for all n = 0, 1, . . .. When V : D ⊆ H → H is an isometry, W U D(V ) is the set of the undistinguishable minimal unitary extensions of V . We write U(V ) for W U D(V ) in this case. 1 If X : B ⊆ A → A is a contraction, then DX := (1 − X ∗ X) 2 and DX ∗ := 1 (1−XX ∗ ) 2 are the defect operators of X and X ∗ , respectively. The corresponding defect spaces are DX := DX (B) and DX ∗ := DX ∗ (A). Clearly, the operator V1 defined in B by X A V1 := :B→ (2.1) DX DX is an isometry on the Hilbert space H1 := A ⊕ DX .
(2.2)
e is a weak unitary dilation of X, then W admits a 2 × 2 block If W ∈ L(A) matrix representation in the form B A X DX ∗ Z W = : e → e , Y DX W22 A B A A
276
Marcantognini and Mor´ an
IEOT
e e where Y : DX → A A is an isometry, Z : A B → DX ∗ ⊆ A is a co-isometry, that is, Z ∗ : DX ∗ → Ae B is an isometry, and W22 : Ae B → Ae A is a contraction such that Y ∗ W22 = −X ∗ Z, ∗ ZW22 = −XY ∗ , ∗ W22 W22 (1 − Z ∗ Z) = 1 − Z ∗ Z,
and ∗ W22 W22 (1 − Y Y ∗ ) = 1 − Y Y ∗ .
In particular, VY := W |B is an isometry on HY := A ⊕ Y (DX ): X A VY = :B→ ; Y DX Y (DX ) and if W is minimal, that is, W ∈ W U D(X), then W ∈ U(VY ). On the other hand, if V1 is the isometry in (2.1)-(2.2) (in which case V1 = VY with Y the identity operator on DX ) then U(V1 ) ⊆ W U D(X). These simple observations lead to contrast W U D(X) with U(V1 ) by comparX DX ∗ Z ing U(V1 ) to U(VY ) for each W = in W U D(X). To accomplish Y DX W22 the task we appeal to the Arov-Grossman model. In the sequel, if N and M are two Hilbert spaces, then S(N , M) stands for the L(N , M)-Schur class, so that ϑ ∈ S(N , M) if and only if ϑ : D → L(N , M) is an analytic function such that sup kϑ(z)k ≤ 1. z∈D
For any (separable) Hilbert space E we denote by L2 (E) the class of functions f on the unit circle T of the complex plane with values in E, measurable (strongly or weakly, which comes to be the same due to the separability of E) and such that Z 2π 1 2 kf (eit )k2 dt < ∞. kf k := 2π 0 With the pointwise linear operations and the scalar product Z 2π 1 hf, giL2 (E) := hf (eit ), g(eit )iE dt (f, g ∈ L2 (E)) 2π 0 L2 (E) becomes a (separable) Hilbert space under the interpretation that two functions in L2 (E) are considered identical if they coincide almost everywhere. MoreL∞ over, L2 (E) = n=−∞ Gn (E), where, for each integer number n, Gn (E) is the subspace of those functions f ∈ L2 (E) such that f (eit ) = eint x for some x ∈ E. elements of H 2 (E) are all the analytic functions u : D → E, u(z) = P∞ The n n=0 z un , z ∈ D and {un } ⊆ E, such that kuk2 :=
∞ X n=0
kun k2 < ∞.
Vol. 64 (2009)
A Schur analysis
277
We recall that H 2 (E) is a Hilbert space with the pointwise linear operations and the scalar product ! ∞ ∞ ∞ X X X n n 2 hu, viH 2 (E) := hun , vn iE u(z) = z un , v(z) = z vn ∈ H (E) . n=0
n=0
n=0
As a consequence of Fatou’s Theorem, the radial limit limr↑1 u(reit ) exists almost everywhere. The application that maps each u(z) ∈ H 2 (E) into its radial limit provides an embedding of H 2 (E) into L2 (E) preserving the Hilbert space structures. Via the Poisson be shown that the application maps H 2 (E) L∞integral, it can 2 ontoL the subspace n=0 Gn (E) of L (E). Therefore we may consider that H 2 (E) ∞ and n=0 Gn (E) amount to the same Hilbert space. If ϑ ∈ S(N , M) then limr↑1 ϑ(reit ) exists almost everywhere as a strong limit of operators and determines a contraction operator in L(N , M). With each ϑ ∈ S(N , M) we associate a contraction operator from L2 (N ) into L2 (M) defined by f (eit ) 7→ ϑ(eit )f (eit ) (f (eit ) ∈ L2 (N )) and a contraction operator from H 2 (N ) into H 2 (M) defined by u(z) 7→ ϑ(z)u(z) u(z) ∈ H 2 (N ) and z ∈ D . L∞ Due to identification of H 2 (N ) (and H 2 (M)) with the subspace n=0 Gn (N ) Lthe ∞ (and n=0 Gn (M), respectively) the latter operator may be consider as a restriction of the former one. We denote both of them by ϑ. When N = M = E and ϑ(z) ≡ z (z times the identity operator on E) the associated operator is the (forward) shift S. Given ϑ ∈ S(N , M) we can likewise consider the operator ∆(eit ) = Dϑ(eit ) almost everywhere. The basic reference for vector and operator valued analytic functions is [14]. We refer the reader to the detailed exposition given therein. As a matter of notation, if C, D are Hilbert spaces and E = C ⊕ D, we will c write the elements of E either as sums c ⊕ d or as columns . d Theorem 2.1. (Arov-Grossman [3, 4]) Let V : D ⊆ H → H be an isometry with defect subspaces N and M. Given ϑ ∈ S(N , M), set Eϑ := H 2 (M) ⊕ ∆L2 (N ) ∩ {(ϑχ, ∆χ) : χ ∈ H 2 (N )}⊥ , where ∆(ζ) := Dϑ(ζ) ,
|ζ| = 1.
Define Fϑ := H ⊕ Eϑ and Uϑ : Fϑ → Fϑ by h V PD h + ϑ(0)PN h + φ(0) S ∗ (φ + ϑPN h) Uϑ φ := ψ S ∗ (ψ + ∆PN h)
h ∈ H,
φ ∈ Eϑ ψ
278
Marcantognini and Mor´ an
IEOT
where S is the shift on either H 2 (M) or L2 (N ), depending on context. Then: (i) Uϑ ∈ L(Fϑ ) is a minimal unitary extension of V such that PM Uϑ (1 − zPEϑ Uϑ )−1 |N = ϑ(z) for all z ∈ D. e the function (ii) For any minimal unitary extension U of V on H, U )−1 |N ϑ(z) := PM U (1 − zPH H e
(z ∈ D)
belongs to S(N , M). e 0 ) is a minimal unitary extension of V undistinguishable from (iii) U 0 ∈ L(H e under an isometric isomorphism τ : H e0 → H e such that τ |H = 1 U ∈ L(H), and τ U 0 = U τ , if and only if PM U 0 (1 − zPHe0 H U 0 )−1 |N = PM U (1 − zPH H U )−1 |N e for all z ∈ D. Therefore, the map ϑ 7→ Uϑ ∈ L(Fϑ ) establishes a bijective correspondence between S(N , M) and U(V ) (up to isometric isomorphisms as far as U(V ) is concerned.) As we have already remarked, the model in Theorem 2.1 is due to D.Z. Arov and L.Z. Grossman (see [3, 4].) For the sake of completeness we include a sketch of the proof in the Appendix. In what follows we freely apply the model to analyze U(VY ) and the archetypical representative U(V1 ). The defect subspaces of V1 are N1 = (A B) ⊕ DX
and M1 = {x ∈ H1 : X ∗ PA x + DX PDX x = 0}.
On the other hand, for a given W ∈ W U D(X), the defect subspaces of the associated isometry VY are NY = (A B)⊕Y (DX )
and MY = {x ∈ HY : X ∗ PA x+DX Y ∗ PY (DX ) x = 0}.
So, if γY : HY → H1 is defined to be the identity operator on A and Y ∗ on Y (DX ), then γY is a unitary operator such that γY VY = V1 = V1 γY |B , γY (NY ) = N1 and γY (MY ) = M1 . Let ρ be the function in the Schur class S(NY , MY ) corresponding with the given W ∈ W U D(X), when W is viewed as an element of U(VY ) through the ArovGrossman model. Let σ be the isometric isomorphism from Ae onto Fρ = HY ⊕ Eρ satisfying σ|HY = 1 and σW = Uρ σ. Here Eρ = H 2 (MY ) ⊕ EL2 (NY ) ∩ {(ρχ, Eχ) : χ ∈ H 2 (NY )}⊥ , where E(ζ) := Dρ(ζ) ,
|ζ| = 1,
Vol. 64 (2009)
A Schur analysis
279
and hY VY PB hY + ρ(0)PNY hY + φ(0) S ∗ (φ + ρPNY hY ) Uρ φ := ψ S ∗ (ψ + EPNY hY )
hY ∈ H Y ,
φ ∈ Eρ . ψ
A function ϑ in the Schur class S(N1 , M1 ) is obtained from ρ and γY by setting ϑ(z) := γY ρ(z)γY∗ |N1 (z ∈ D). Let Uϑ ∈ L(Fϑ ) be the element in W U D(X) given by the minimal unitary extension of V1 associated with ϑ in the ArovGrossman model, so that Fϑ = H1 ⊕ Eϑ , Eϑ := H 2 (M1 ) ⊕ ∆L2 (N1 ) ∩ {(ϑχ, ∆χ) : χ ∈ H 2 (N1 )}⊥ , where ∆(ζ) := Dϑ(ζ) ,
|ζ| = 1,
and h1 V1 PB h1 + ϑ(0)PN1 h1 + φ(0) S ∗ (φ + ϑPN1 h1 ) Uϑ φ := ∗ ψ S (ψ + ∆PN1 h1 )
φ h1 ∈ H 1 , ∈ Eϑ . ψ
Extend γY to a unitary operator from Fρ onto Fϑ by setting hY γY hY φ γY φ = γY φ , hY ∈ HY , ∈ Eρ , ψ ψ γY ψ and let τ be the unitary operator from Ae onto Fϑ given by τ := γY σ. e and Uϑ ∈ L(Fϑ ) are undistinguishable We claim that the given W ∈ L(A) under τ as elements in W U D(X). Note that τ |A = 1, since the restrictions to A of both σ and γY equal 1. Hence we only need to show the intertwinnig relation τ W = Uϑ τ . e For all e a ∈ A, τWe a = γY σW e a = γY Uρ σe a. hY a then Whence, if φ := σe ψ VY PB hY + ρ(0)PNY hY + φ(0) hY S ∗ (φ + ρPNY hY ) τWe a = γY Uρ φ = γY ψ S ∗ (ψ + EPNY hY )
V1 γY PB hY + ϑ(0)γY PNY hY + γY φ(0) , S ∗ (γY φ + ϑγY PNY hY ) = S ∗ (γY ψ + γY EPNY hY )
280
Marcantognini and Mor´ an
and
IEOT
V1 PB γY hY + ϑ(0)PN1 γY hY + γY φ(0) S ∗ (γY φ + ϑPN1 γY hY ) τWe a = Uϑ τe a= ∗ S (γY ψ + ∆PN1 γY hY )
whenever γY PB |HY = PB γY |HY ,
(2.3)
γY PNY |HY = PN1 γY |HY ,
(2.4)
γY E = ∆γY |NY .
(2.5)
The condition (2.3) is satisfied since, for all hY ∈ HY , hγY hY , BiH1 = hγY hY , γY (B)iH1 = hhY , BiHY = hPB hY , BiHY = hγY PB hY , BiH1 . Similarly, the condition (2.4) is equivalent to hγY hY , N1 iH1 = hγY hY , γY (NY )iH1 = hhY , NY iHY = hPNY hY , NY iHY = hγY PNY hY , N1 iH1 , for all hY ∈ HY . As for (2.5), note that, for any polynomial p, p(1 − ϑ∗ ϑ)γY |NY = γY p(1 − ρ∗ ρ), so that ∆γY |NY = γY E. The above arguments show that the map S(N1 , M1 ) → W U D(X) ϑ 7→ Uθ ∈ L(Fϑ ) e belonging to W U D(X), is surjective, in the sense that, given any W ∈ L(A) e is isometrically there exists ϑ in the Schur class S(N1 , M1 ) such that W ∈ L(A) isomorphic to Uϑ ∈ L(Fϑ ). Furthermore, as we will see next, the map is also one-to-one. Theorem 2.2. (Labeling of WUD(X)) Given a contraction X : B ⊆ A → A, set N1 := (A B) ⊕ DX
and
M1 := {x ∈ A ⊕ DX : X ∗ PA x + DX PDX x = 0}.
Given ϑ ∈ S(N1 , M1 ), set Eϑ := H 2 (M1 ) ⊕ ∆L2 (N1 ) ∩ {(ϑχ, ∆χ) : χ ∈ H 2 (N1 )}⊥ , where ∆(ζ) := Dϑ(ζ) ,
|ζ| = 1.
Define Fϑ := A ⊕ DX ⊕ Eϑ and Uϑ : Fϑ → Fϑ by h XPB h + DX PB h + ϑ(0)PN1 h + φ(0) S ∗ (φ + ϑPN1 h) Uϑ φ := ∗ ψ S (ψ + ∆PN1 h)
φ h ∈ A ⊕ DX , ∈ Eϑ ψ
where S is the shift on either H 2 (M1 ) or L2 (N1 ), depending on context. Then the map ϑ 7→ Uθ ∈ L(Fϑ )
Vol. 64 (2009)
A Schur analysis
281
establishes a bijective correspondence between S(N1 , M1 ) and W U D(X) (up to isometric isomorphisms as far as W U D(X) is concerned.) Proof. Only the injectivity is to be shown as we have already seen that for each ϑ ∈ S(N1 , M1 ) the unitary operator Uϑ ∈ L(Fϑ ) belongs to W U D(X) and any e is undistinguishable from some Uϑ ∈ L(Fϑ ). Consider two S(N1 , M1 )W ∈ L(A) functions α, β and let Uα ∈ L(Fα ), Uβ ∈ L(Fβ ) be the corresponding unitary operators. Assume there exists an isometric isomorphism σ : Fα → Fβ such that σ|A = 1 and σUα = Uβ σ. Then, for all a ∈ A and all integer number n, hUαn a, AiFα = hσUαn a, σAiFβ = hUβn a, AiFβ . Therefore PA (1 − zUα )−1 |A = PA (1 − zUβ )−1 |A ,
z ∈ D.
(2.6)
Conversely, if (2.6) holds then hUαn a, a0 iFα = hUβn a, a0 iFβ for all a, a0 ∈ A and all natural number n. Hence the operator defined on the linear n n span of {Uαn (A)}∞ n=−∞ and mapping Uα a into Uβ a (a ∈ A, n = 0, ±1, ±2, . . .) can be extended by continuity to an isometric isomorphism σ : Fα → Fβ such that σ|A = 1 and σUα = Uβ σ. These arguments show that Uα ∈ L(Fα ) and Uβ ∈ L(Fβ ) can be regarded as undistinguishable elements of W U D(X) if and only if (2.6) is satisfied. Next we show that if Uϑ ∈ L(Fϑ ) is the unitary operator corresponding with an arbitrary ϑ ∈ S(N1 , M1 ) then, for all z ∈ D, PA (1 − zUϑ )−1 |A n h io−1 −1 = 1 − z XPB + PA ϑ(z) (1 − zPDX ϑ(z)) (PA B + zDX PB ) .
(2.7)
For a given a ∈ A, define a1 (= a1 (z)) (z ∈ D) by a1 := PA (1 − zUϑ )−1 a. φ The vector a1 is related to a as above if and only if there exist b ∈ B and ∈ Eϑ ψ φ φ b = b(z), = (z) (z ∈ D) such that ψ ψ a1 + DX b , φ (1 − zUϑ )−1 a = ψ
282
Marcantognini and Mor´ an
IEOT
that is, such that a a1 + DX b a1 + DX b 0 = − zUϑ φ φ 0 ψ ψ a1 + DX b XPB a1 + DX PB a1 + ϑ(0)PN1 (a1 + DX b) + φ(0) −z . φ S ∗ (φ + ϑPN1 (a1 + DX b)) = ψ S ∗ (ψ + ∆PN1 (a1 + DX b)) Equivalently, a1 := PA (1 − zUϑ )−1 a φ if and only if there exist b ∈ B and ∈ Eϑ such that ψ a = a1 − z {XPB a1 + PA [ϑ(0)(PA B a1 + DX b) + φ(0)]} ,
(2.8)
0 = DX b − z {DX PB a1 + PDX [ϑ(0)(PA B a1 + DX b) + φ(0)]} ,
(2.9)
∗
0 = φ − zS [φ + ϑ(PA B a1 + DX b)] ,
(2.10)
∗
0 = ψ − zS [ψ + ∆(PA B a1 + DX b)] .
(2.11) ∗ −1
∗
Set ω := PA B a1 + DX b ∈ N1 . Then (2.10) says that φ = (1 − zS ) zS ϑω. It follows that φ(0) = (ϑ(z) − ϑ(0))ω. Replacing φ(0) by (ϑ(z) − ϑ(0))ω in (2.9) we get that (2.9) is equivalent to 0 = DX b − z(DX PB a1 + PDX ϑ(0)ω + PDX φ(0)) = DX b − z(DX PB a1 + PDX ϑ(z)ω) = (1 − zPDX ϑ(z))DX b − z(DX PB a1 + PDX ϑ(z)PA B a1 ), that is, DX b = z(1 − zPDX ϑ(z))−1 (DX PB a1 + PDX ϑ(z)PA B a1 ). Hence ω = PA B a1 + DX b = (1−zPDX ϑ(z))−1 [(1−zPDX ϑ(z))PA B a1 +z(DX PB a1 +PDX PA B ϑ(z)a1 )] = (1−zPDX ϑ(z))−1 (PA B a1 +zDX PB a1 ) and (2.8) can be rewritten as a = a1 − z(XPB a1 + PA ϑ(0)ω + PA φ(0)) = a1 − z(XPB a1 + PA ϑ(z)ω) = a1 − z XPB + PA ϑ(z)(1 − zPDX ϑ(z))−1 (PA B + zDX PB ) a1 . Therefore a1 := PA (1 − zUϑ )−1 a if and only if n h io−1 −1 a1 = 1 − z XPB + PA ϑ(z) (1 − zPDX ϑ(z)) (PA B + zDX PB ) a.
Vol. 64 (2009)
A Schur analysis
283
This shows (2.7). In particular, (2.6) holds if and only if n h io−1 −1 1 − z XPB + PA α(z) (1 − zPDX α(z)) (PA B + zDX PB ) n h io−1 −1 = 1 − z XPB + PA β(z) (1 − zPDX β(z)) (PA B + zDX PB ) for all z ∈ D. Therefore Uα ∈ L(Fα ) and Uβ ∈ L(Fβ ) can be regarded as undistinguishable elements of W U D(X) if and only if, for all z ∈ D, PA α(z)(1 − zPDX α(z))−1 PA B = PA β(z)(1 − zPDX β(z))−1 PA B , PA α(z)(1 − zPDX α(z))−1 DX PB = PA β(z)(1 − zPDX β(z))−1 DX PB that is, PA α(z)(1 − zPDX α(z))−1 |N1 = PA β(z)(1 − zPDX β(z))−1 |N1 . Note that, for all z ∈ D, PA α(z)(1 − zPDX α(z))−1 − β(z)(1 − zPDX β(z))−1 |N1 = PA (1 − zα(z)PDX )−1 (α(z) − β(z))(1 − zPDX β(z))−1 |N1 . For all u ∈ N1 and all z ∈ D, (1 − zPDX β(z))u ∈ N1
and (1 − zα(z)PDX )−1 (α(z) − β(z))u ∈ M1 .
So PA (1 − zα(z)PDX )−1 (α(z) − β(z))(1 − zPDX β(z))−1 |N1 = 0,
z∈D
(2.12)
whenever, for all u ∈ N1 , the M1 -vector v(z) := (1 − zα(z)PDX )−1 (α(z) − β(z))u verifies PA v(z) = 0. Since X ∗ PA v(z)+DX PDX v(z) = 0, it follows that PA v(z) = 0 only when v(z) = 0. Thus Uα ∈ L(Fα ) and Uβ ∈ L(Fβ ) are undistinguishable as elements of W U D(X), meaning that (2.12) holds, if and only if α ≡ β. This shows that the map S(N1 , M1 ) → W U D(X) ϑ 7→ Uθ ∈ L(Fϑ ) is one-to-one. The proof of the theorem is complete.
3. The Relaxed Commutant Lifting Theorem We are given five Hilbert space operators • a contraction C : E → H, • a contraction T : H → H with minimal isometric dilation VT : K → K, • two contractions R, Q : E0 → E,
284
Marcantognini and Mor´ an
IEOT
so that T CR = CQ and R∗ R ≤ Q∗ Q. The Relaxed Commutant Lifting Theorem states that there exists a contraction D:E →K satisfying the relations PH D = C
and VT DR = DQ.
An operator D with the above properties is said to be an interpolant for {C, T, VT , R, Q}. The problem we address is to give a parametric description of the set of interpolants for {C, T, VT , R, Q}. We recall that VT ∈ L(K) is an isometry such that K ⊇ H, PH VTn |H = T n for all n = 0, 1, 2, . . . and K is the least Hilbert space containing {VTn (H)}∞ n=0 . The isometric dilation VT is essentially unique, in the sense that any other isometry V 0 ∈ L(K0 ) with the same properties is undistinguishable from VT ∈ L(K) under an isometric isomorphism τ : K0 → K such that τ |H = 1 and τ V 0 = VT τ . The space H is invariant under VT∗ and T ∗ = VT∗ |H . In particular, VT is an isometric lifting of T , meaning that T PH = PH VT . A minimal unitary dilation of T is a unitary operator UT acting on a larger Hilbert space G ⊇ H satisfying PH UTn |H = T n and PH UT−n |H = T ∗n for all n = 0, 1, 2, . . . and such that G is the least Hilbert space containing {UTn (H)}∞ n=−∞ . The latter condition determines UT up to isometric isomorphism, thus one can call it “the” minimal unitary dilation of T . If UT ∈ L(G) is the minimal unitary dilation of T then the subspace containing all the orbits of H under UT is invariant for UT , contains H and the restriction of UT to it is a minimal isometric dilation of T . Therefore, when speaking on the minimal isometric dilation VT ∈ L(K) of T we always consider that K ⊆ G and VT = UT |K . Likewise if WT : F → F is the minimal isometric dilation of T ∗ then F ⊆ G and WT = UT∗ |F . For a complete account concerning isometric and unitary dilations of contractions we refer to [14]. Consider the product space E × F with the sesquilinear hermitian form 0 0 0 e e 1 C ∗ PH e e e e , 0 := , 0 , 0 ∈E ×F f f C 1 f f f f C E⊕F so that 0 e e = he, e0 iE + hf, Ce0 iF + hCe, f 0 iF + hf, f 0 iF , 0 f f C 0 e e for all , 0 ∈ E × F. f f It can be easily seen that AC := DC ⊕ F is the Hilbert space which is obtained from (E × F, h·, ·iC ) by modding out by isotropic vectors and completing. The Hilbert space AC is the coupling space associated with C, when C is viewed as a linear operator from E into F ⊇ H. It readily follows:
Vol. 64 (2009)
A Schur analysis
285
Lemma 3.1. If σC : E × F → AC is the linear map given by e e σC := DC e ⊕ (Ce + f ) ∈E ×F f f then σC is an isometric map from (E × F, h·, ·iC ) into AC with dense range and such that e 0 σC = DC e and σC =f −Ce f for all e ∈ E and all f ∈ F. Also, BC := DC Q(E0 )⊕F is a closed subspace of AC which equals the closure of σC (Q(E0 ) × F). Define σC
Qe0 Re0 7→ σC f WT f
Qe0 ∈ Q(E0 ) × F . f
(3.1)
Then, for all e0 ∈ E0 and f ∈ F,
2
σC Re0 = kRe0 k2 + 2RehCRe0 , WT f iF + kWT f k2
WT f = kRe0 k2 + 2RehT CRe0 , f iF + kf k2 = kRe0 k2 + 2RehCQe0 , f iF + kf k2 since it is assumed that T CR = CQ. As R∗ R ≤ Q∗ Q it follows that, for all e0 ∈ E0 and f ∈ F,
2 2
σC Re0 ≤ kQe0 k2 + 2RehCQe0 , f iF + kf k2 = σC Qe0 .
WT f f Therefore (3.1) gives rise to a contraction XC : BC ⊆ AC → AC satisfying XC σC
Qe0 Re0 = σC f WT f
for all e0 ∈ E0 and f ∈ F. Furthermore, in the particular case that R∗ R = Q∗ Q, XC is an isometry on AC with domain BC and range XC (BC ) = {DC Re0 ⊕ (CRe0 + WT f ) : e0 ∈ E0 , f ∈ F}. The contraction XC : BC ⊆ AC → AC is the coupling contraction underlying the lifting data set {C, T, VT , R, Q}. 1 Write D0 := (Q∗ Q − R∗ R) 2 and D0 = D0 (E0 ). Notice that
2 2
XC σC Qe0 = σC Qe0 − kD0 e0 k2
f f
286
Marcantognini and Mor´ an
IEOT
for all e0 ∈ E0 and f ∈ F. Hence the defect operator DXC of XC is determined by D0 via the relation
Qe0
DX σC Qe0 = kD0 e0 k ∈ Q(E0 ) × F .
C f f We now consider the set W U D(XC ) as described in Theorem 2.2. Here, instead of N1 and M1 , we deal with NC := (AC BC ) ⊕ DXC and MC := {x ∈ AC ⊕ DXC : XC∗ PAC x + DXC PDXC x = 0}, so that for each ϑ ∈ S(NC , MC ) Eϑ := H 2 (MC ) ⊕ ∆L2 (NC ) ∩ {(ϑχ, ∆χ) : χ ∈ H 2 (NC )}⊥ , where ∆(ζ) := Dϑ(ζ) , |ζ| = 1, Fϑ := AC ⊕ DXC ⊕ Eϑ and Uϑ : Fϑ → Fϑ is given by XC PBC h+DXC PBC h+ϑ(0)PNC h+φ(0) h φ ∗ S (φ+ϑPNC h) Uϑ φ := h ∈ AC ⊕DXC , ∈ Eϑ . ψ ψ S ∗ (ψ+∆PNC h) Given ϑ ∈ S(NC , MC ), define ϕϑ VTn h := Uϑ−n h,
h ∈ H, n = 0, 1, 2, . . .
and extend ϕϑ by linearity to the linear span of {VTn (H)}∞ n=0 . Note that, for all h ∈ H and all n = 0, 1, 2, . . ., Uϑn h = WTn h. Therefore, for all h, h0 ∈ H and all n = 0, 1, 2, . . ., hϕϑ VTn h, ϕϑ h0 iFϑ = hUϑ−n h, h0 iFϑ = hh, Uϑn h0 iFϑ = hh, WTn h0 iFϑ = hh, WTn h0 iF = hh, T ∗n h0 iH = hT n h, h0 iH = hVTn h, h0 iK . It follows that ϕϑ is an isometric map from the linear span of {VTn (H)}∞ n=0 into Fϑ . Thus its extension by continuity to all of K, say Φϑ , is a unitary operator from K onto the least closed subspace of Fϑ containing all the subspaces Uϑ−n (H), n = 0, 1, 2, . . .. Moreover, Φϑ |H = 1 and Φϑ VT = Uϑ−1 Φϑ . Now define D : E → K by hDe, kiK :=
e σC , Φϑ k 0 F
(e ∈ E, k ∈ K). ϑ
(3.2)
Vol. 64 (2009)
A Schur analysis
287
For all e ∈ E and all k ∈ K,
e
|hDe, kiK | ≤
σC 0 kΦϑ kk = kekkkk. Therefore kDk ≤ 1. For all e ∈ E and all h ∈ H, e e hDe, hiK := σC , Φϑ h = σC ,h = hCe, hiH . 0 0 F F ϑ
ϑ
Hence PH D = C. Let e0 ∈ E0 and h ∈ H be given. Then hVT DRe0 , hiK = hDRe0 , T ∗ hiK = hCRe0 , T ∗ hiH = hT CRe0 , hiH = hCQe0 , hiH = hDQe0 , hiK and Re0 σC ,h 0 A C Qe0 = Uϑ σC ,h 0 Fϑ Qe0 = σC , Φϑ V T h 0 F
hVT DRe0 , VT hiK = hDRe0 , hiK = hCRe0 , hiH = Qe0 XC σC ,h 0 A C Qe0 = σC , Uϑ−1 h 0 F =
ϑ
ϑ
= hDQe0 , VT hiK , so that hVT DRe0 , (VT − T )hiK = hDQe0 , (VT − T )hiK . As L := (VT − T )(H) is known to be the wandering subspace for VT , in the sense that VTn (L) ⊥ L for all n ∈ N (N for the set of natural numbers) and K = H ⊕ L ⊕ VT (L) ⊕ VT2 (L) ⊕ · · · , it is clear that VT DR = DQ as far as hVT DRe0 , VTn (VT − T )hiK = hDQe0 , VTn (VT − T )hiK for any given e0 ∈ E0 , h ∈ H and all n ∈ N. Note that Φϑ VTn (VT − T )h = Uϑ−n−1 h − Uϑ−n T h = Uϑ−n−1 (1 − WT T )h and Qe0 Re0 Qe0 Uϑ σC = σC + DXC σC . 0 0 0
288
Marcantognini and Mor´ an
IEOT
Whence Qe0 σC , Φϑ VTn (VT − T )h 0 Fϑ Qe0 −n−1 = σC , Uϑ (1 − WT T )h 0 F ϑ Qe0 = Uϑ σC , Uϑ−n (1 − WT T )h 0 Fϑ Re0 Qe0 −n = σC + DXC σC , Uϑ (1 − WT T )h 0 0 F
hDQe0 , VTn (VT − T )hiK =
ϑ
and hVT DRe0 , VTn (VT − T )hiK = hDRe0 , VTn−1 (VT − T )hiK Re0 = σC , Φϑ VTn−1 (VT − T )h 0 F ϑ Re0 = σC , Uϑ−n (1 − WT T )h . 0 F ϑ
Thus VT DR = DQ if and only if, for all e0 ∈ E0 , h ∈ H and n ∈ N, Qe0 Uϑn DXC σC , (1 − WT T )h = 0. 0 F
(3.3)
ϑ
Therefore, ϑ ∈ S(NC , MC ) gives rise to an interpolant D for {C, T, VT , R, Q} if and only if the corresponding element in W U D(XC ), Uϑ ∈ L(Fϑ ), satisfies
(1 − zUϑ )−1 Uϑ u, (1 − WT T )h F = 0, z ∈ D, u ∈ DXC and h ∈ H. (3.4) ϑ
Set J := {(1 − WT T )h : h ∈ H}. Then J = ker(WT∗ ), the null space of WT∗ , and (3.4) is equivalent to PJ (1 − zUϑ )−1 Uϑ |DXC = 0,
z ∈ D.
(3.5)
In a similar way as we established (2.7) in the proof of Theorem 2.2, we can see that, for all z ∈ D, PJ (1 − zUϑ )−1 Uϑ |DX= PJ (1 − zXC PBC − zDXC PBC − zϑ(z)PNC )−1 ϑ(z)|DXC C =PJ (1 − zXC PBC − zϑ(z)PNC )−1 ϑ(z)|DXC . So, for (3.5) to hold, we must grant that PJ (1 − zXC PBC − zϑ(z)PNC )−1 ϑ(z)|DXC = 0. Given x ∈ NC , define y(= y(z)) (z ∈ D) by y := ϑ(z)x. Since y ∈ MC , then XC∗ PAC y + DXC PDXC y = 0. Hence, for all f ∈ F, 0 = hXC∗ PAC y + DXC PDXC y, f iAC = hy, XC f iAC = hy, WT f iAC = hWT∗ PF y, f iF ,
Vol. 64 (2009)
A Schur analysis
289
so that PF y ∈ J . On the other hand, for all e ∈ DC , PBC e = PDC Q(E0 ) e while, for all e0 ∈ E0 , Qe0 Re0 Re0 XC DC Qe0 = XC σC = σC = σC −CQe0 −WT CQe0 −WT T CRe0 = DC Re0 ⊕ (1 − WT T )CRe0 . Whence PF XC PBC e ∈ J for all e ∈ DC as well. Thus, for any given u ∈ DXC and all z ∈ D, PF(1 − zXC PBC − zϑ(z)PNC )−1 ϑ(z)u = PF ϑ(z)u + zPF ϑ(z)PNC (1 − zXC PBC − zϑ(z)PNC)−1 ϑ(z)u + zPF XC PBC PDC (1 − zXC PBC − zϑ(z)PNC )−1 ϑ(z)u + zWT PF (1 − zXC PBC − zϑ(z)PNC )−1 ϑ(z)u = v(u, z) + w(u, z), where v(u, z) := PF ϑ(z)u + zPF ϑ(z)PNC (1 − zXC PBC − zϑ(z)PNC )−1 ϑ(z)u + zPF XC PBC PDC (1 − zXC PBC − zϑ(z)PNC )−1 ϑ(z)u ∈ J and w(u, z) := zWT PF (1 − zXC PBC − zϑ(z)PNC )−1 ϑ(z)u ⊥ J . Consequently, for any given u ∈ DXC and all z ∈ D, PJ (1 − zXC PBC − zϑ(z)PNC )−1 ϑ(z)u = v(u, z). We get that v(u, z) = (1 − zWT )PF (1 − zXC PBC − zϑ(z)PNC )−1 ϑ(z)u. Since 1 − zWT is an invertible operator for each z ∈ D, we can conclude that v(u, z) = 0 for all u ∈ DXC and all z ∈ D whenever PF (1 − zXC PBC − zϑ(z)PNC )−1 ϑ(z)u = 0. We point out that the above discussion gives a proof of the following: Proposition 3.2. The following statements are equivalent: (a) The operator D associated with a give ϑ ∈ S(NC , MC ) by means of (3.2) satisfies VT DR = DQ and, hence, is an interpolant for {C, T, VT , R, Q}. (b) PJ (1 − zXC PBC − zϑ(z)PNC )−1 ϑ(z)|DXC = 0. (c) PF (1 − zXC PBC − zϑ(z)PNC )−1 ϑ(z)|DXC = 0. The proposition leads to conclude that the operator D associated with a given ϑ ∈ S(NC , MC ) by means of (3.2) satisfies VT DR = DQ and, hence, is an interpolant for {C, T, VT , R, Q} if, in particular, ϑ(z)|DXC = 0 for each z ∈ D. Before embarking in the problem of analyzing the map (3.2), let us establish a closed formula for the direct connection between ϑ and D.
290
Marcantognini and Mor´ an
IEOT
Hereafter it could be helpful to recall that NC and MC can be interpreted as the defect subspaces of the isometry VC on HC := AC ⊕ DXC defined in BC by XC AC VC := : BC → DXC DXC and that each Uϑ ∈ L(Fϑ ) belongs not only to W U D(XC ) but also to U(VC ). In particular, under this viewpoint, we could cope with a more compact notation. P∞ It is clear that D = C + n=0 PVTn (L) D, with L := (VT − T )(H) the wandering subspace for VT . Therefore D is determined by the sequence of operators {PVTn (L) D}∞ n=0 (cf. [5].) With each D we associate the (formal) power series SD (z) :=
∞ X
z n Sc D (n)
(z ∈ D)
n=0
where ∗n Sc D (n) := VT PVTn (L) D
(n = 0, 1, 2, . . .).
For all e ∈ E and all h ∈ H, hSD (z)e, (VT − T )hiK =
e PJ (1 − zUϑ )−1 Uϑ σC , (1 − WT T )h . 0 F ϑ
e Set F e := σC (e ∈ E) so that F : E → AC is the embedding of E into AC . 0 Define G(1 − WT T )h := (VT − T )h (h ∈ H) to get a unitary operator G : J → L. Then SD (z) = GPJ (1 − zUϑ )−1 Uϑ F, z ∈ D. In computing PJ (1 − zUϑ )−1 Uϑ |HC it is relevant to take into account that ⊆ BC and V n+1 (J ) ⊥ J for all n = 0, 1, 2, . . .. Then a straightforward computation we omit in the present discussion gives the following:
VCn (J )
Lemma 3.3. For all z ∈ D, PJ (1 − zUϑ )−1 Uϑ |HC = a(z) + b(z)ϑ(z)(1 − c(z)ϑ(z))−1 d(z), where −1 a(z) := PJ X C → J, C PBC (1 − z(1 − PJ )VC PBC ) : H−1 b(z) := PJ 1 + zXC PBC (1 − z(1 − PJ )VC PBC ) (1 − PJ ) |MC : MC → J , c(z) := zPNC (1 − z(1 − PJ )VC PBC )−1 (1 − PJ )|MC : MC → NC , d(z) := PNC (1 − z(1 − PJ )VC PBC )−1 : HC → NC .
Therefore ˜ SD (z) = a ˜(z) + ˜b(z)ϑ(z)(1 − c˜(z)ϑ(z))−1 d(z), ˜ := d(z)F and a(z), b(z), where a ˜(z) := Ga(z)F , ˜b(z) := Gb(z), c˜(z) := c(z), d(z) 2 c(z), d(z) as in the lemma. So if Γ : H (L) → L ⊕ VT (L) ⊕ VT2 (L) ⊕ · · · is the
Vol. 64 (2009)
A Schur analysis
unitary operator given by ! ∞ ∞ X X n z xn := Γ VTn xn n=0
then
∞ X
x(z) =
n=0
291
∞ X
! n
2
z xn ∈ H (L) ,
n=0
˜ PVTn (L) D := Γ a ˜(z) + ˜b(z)ϑ(z)(1 − c˜(z)ϑ(z))−1 d(z) .
n=0
Theorem 3.4. (Description of the interpolants in the Relaxed Commutant Lifting Theorem) Consider the lifting data set {C, T, VT , R, Q}. Let WT ∈ L(F) be the minimal isometric dilation of T ∗ . Let AC = DC ⊕ F be the coupling Hilbert space associated with C, when C is viewed as a linear operator from E into F ⊇ H, and let XC : BC ⊆ AC → AC be the coupling contraction underlying the lifting data set {C, T, VT , R, Q}. Write L for the wandering subspace of VT and Γ : H 2 (L) → L ⊕ VT (L) ⊕ VT2 (L) ⊕ · · · for the unitary operator given by ! ! ∞ ∞ ∞ X X X n n n 2 Γ z xn := VT xn x(z) = z xn ∈ H (L) . n=0
n=0
n=0
Set F e := DC e ⊕ Ce (e ∈ E) so that F : E → AC is the embedding of E into AC . Define G(1 − WT T )h := (VT − T )h (h ∈ H) to get a unitary operator G : J → L, where J := (1 − WT T )(H) is the null space of WT∗ . Set NC := (AC BC ) ⊕ DXC and MC := {x ∈ AC ⊕ DXC : XC∗ PAC x + DXC PDXC x = 0}. Given ϑ ∈ S(NC , MC ) such that ϑ(z)|DXC = 0 for each z ∈ D, put C H ∞ : E → L D := VTn (L) −1 ˜ ˜ Γ a ˜(z) + b(z)ϑ(z)(1 − c˜(z)ϑ(z)) d(z) n=0
(3.6)
where a ˜(z) := GPJ XC PBC (1−z(1−PJ )(XC PBC +DXC PBC ))−1 F : E → L, ˜b(z) := GPJ [1 + zXC PB C ×(1−z(1−PJ )(XC PBC +DXC PBC ))−1 (1−PJ ) |MC : MC → L, c˜(z) := zPNC (1−z(1−PJ )(XC PBC +DXC PBC ))−1 (1−PJ )|MC : MC → NC , ˜ := PN (1−z(1−PJ )(XC PB +DX PB ))−1 F : E → NC . d(z) C
C
C
C
Then D is an interpolant for {C, T, VT , R, Q}. Moreover, in this way all interpolants for {C, T, VT , R, Q} are obtained. A Schur class function ϑ ∈ S(NC , MC ) satisfying ϑ(z)|DXC = 0 for each z ∈ D always exists. For instance, one can take ϑ ≡ 0. This choice for ϑ yields the central interpolant.
292
Marcantognini and Mor´ an
IEOT
Proof. We have already seen that D is an interpolant for {C, T, VT , R, Q}. Now, given an interpolant D, so that D : E → K is a contraction satisfying PH D = C
and VT DR = DQ,
let us show that D can be obtained from a function ϑ ∈ S(NC , MC ) as in (3.6). Let UT : G → G be the minimal unitary dilation of T (recall that K ⊆ G and VT = UT |K .) View D as a linear operator from E into G and let AD := DD ⊕ G be the coupling space associated with D. Since PH D = C and PK |F = PK |H (indeed G = F ⊕ L ⊕ VT (L) ⊕ VT2 (L) ⊕ · · · ) it can be seen that kDD e ⊕ (De + f )k = kDC e ⊕ (Ce + f )k for all e ∈ E and all f ∈ F. If the product space E × G is endowed with the sesquilinear hermitian form 0 0 0 e e 1 D∗ PH e e e e , 0 := , 0 , ∈E ×G g g D 1 g g g g D E⊕G and e σD := DD e ⊕ (De + g) g
e ∈E ×G g
then σD is an isometry from (E × G, h·, ·iD ) into AD with dense range and such that e 0 σD = DD e and σD =g −De g for all e ∈ E and all g ∈ G. Moreover, if σC is like in Lemma 3.1 then
σD e = σC e
f f for all e ∈ E and all f ∈ F. Therefore, e e ρσC := σD f f defines an isometry from AC into AD . Set BD := DQ(E0 ) × G and define Qe0 Re0 σD 7→ σD g UT∗ g
e ∈E ×F f
Qe0 ∈ Q(E0 ) × G . g
(3.7)
As VT DR = DQ, VT = UT |K and R∗ R ≤ Q∗ Q, it follows that (3.7) gives rise to a contraction XD : BD ⊆ AD → AD . Since WT = UT∗ |F , it holds that ρXC = XD ρ|BC . As before for XC , the defect operator DXD of XD is determined by D0 := 1 ∗ (Q Q − R∗ R) 2 via the identity
Qe0
DX σD Qe0 = kD0 e0 k ∈ Q(E0 ) × G .
D g g
Vol. 64 (2009)
A Schur analysis
293
Write HD := AD ⊕ DXD and define XD AD VD := : BD → . DXD DXD Extend ρ from AC to all of HC by setting ρDXC := DXD ρ|BC . Then ρ : HC → HD is an isometry such that ρVC = VD ρ|BC . If ND := (AD BD ) ⊕ DXD and ∗ MD := {x ∈ HD : XD PAD x + DXD PDXD x = 0}
are the defect subspaces of VD then fix ν ∈ S(ND , MD ) and let Uν ∈ L(Fν ) be the corresponding minimal weak unitary dilation of XD . For the sake of simplicity we consider ν ≡ 0 and call U0 the corresponding unitary operator on F0 . Notice that, for all h ∈ H and all n ∈ N, U0n UTn h = VDn UTn h = h, whence, for all e ∈ E, hDe, VTn hiK =
e e σD = ρσC . , U0−n h , U0−n ρh 0 0 F F 0
0
So, if U = ∨n∈Z U0n ρ(AC ) (the least Hilbert space containing U0n ρ(AC ) for all n ∈ Z) and U = U0 |U then U = ∨n∈Z U0n ρ(HC ) and, for all e ∈ E, h ∈ H and n ∈ N, e hDe, VTn hiK = U n ρσC , ρh . (3.8) 0 U If V = VD |ρBC then V is an isometry acting on ρHC with defect subspaces N = ρNC and M = ρMC and U is a minimal unitary extension of V . Set ϑU (z) = PρMC U (1 − zPU ρHC U )−1 |ρNC and ϑ(z) = ρ∗ ϑU (z)ρ|NC . Then ϑ ∈ S(NC , MC ) and the associated unitary operator Uϑ ∈ L(Fϑ ) is a minimal weak unitary dilation of XC . It can be computed ρ∗ PρHC U (1 − zU )−1 ρ|HC to yield −1
ρ∗ PρHC U (1−zU )−1 ρ|HC = (VC PBC +ϑ(z)PNC ) [1−z(VC PBC +ϑ(z)PNC )]
|HC
= PHC Uϑ (1 − zUϑ )−1 |HC . From here and (3.8) it follows that, for all e ∈ E, h ∈ H and n ∈ N, e hDe, VTn hiK = σC , Uϑ−n h . 0 F ϑ
Therefore D is given by ϑ as in (3.2), hence, by formula (3.6). It remains to see that ϑ(z)|DXC = 0 for each z ∈ D. Notice that ϑ can also be written as ϑ(z) = PMC ρ∗ PρHC (1 − zVD PBD ρBC PU ρHC )−1 VD PBD ρHC ρ|NC .
294
Marcantognini and Mor´ an
IEOT
As DXC ⊥ BD it readily follows that ϑ is constrained as required. This completes the proof. The setting for the Commutant Lifting Theorem appears when R is the identity on E (thus E0 = E) and Q is an isometry on E. In this case, R∗ R = Q∗ Q = 1 and the underlying contraction XC is an isometry. As a matter of fact, the formula (3.6) is known to yield a proper parameterization of the interpolants (see [13]). That is, in the Commutant Lifting Theorem, the map ϑ 7→ D, which is defined for all ϑ ∈ S(NC , MC ), is one-to-one and onto. The latter is not true in general. It may happen that different parameters ϑ’s in S(NC , MC ), constrained to satisfy ϑ(z)|DXC = 0 for each z ∈ D, provide the same interpolant D via (3.6). As for a concrete example, consider C = 0, T an isometry and R = Q such that ker(Q∗ ) 6= {0}. In this particular case, the coupling Hilbert space is E ⊕ F and the coupling contraction is indeed an isometry. Its domain and both defect subspaces are given by Q(E0 )⊕F and ker(Q∗ ), respectively. Since T is isometric, VT = T . Hence, there is only one interpolant D for the data set {0, T, T, Q, Q}, namely D = C = 0. Also, as T is isometric, WT∗ = T . Thus J = {0}. Therefore, a ˜, ˜b ≡ 0 in formula (3.6) and any ϑ ∈ S(ker(Q∗ ), ker(Q∗ )) gives D. Theorem 3.5. With the notation of Theorem 3.4, set S := {ϑ ∈ S(NC , MC ) : ϑ(z)|DXC = 0 for each z ∈ D}. Let D be the interpolant obtained from a given α ∈ S via (3.6). Then β ∈ S is mapped to D via (3.6) if and only if there exist analytic functions µ : D → L(AC BC , DC ) and ν : D → L(AC BC , DXC ) such that, for each z ∈ D, β(z) = α(z)(1 − zPAC BC µ(z)) + (1 − zXC PBC )µ(z) + ν(z). In particular, β produces the central interpolant if and only if PF (1 − zXC PBC )−1 β(z) ≡ 0. Proof. It is clear that α, β ∈ S provide the same interpolant D via (3.6) if and only if ˜b(z)α(z)(1 − c˜(z)α(z))−1 d(z) ˜ ≡ ˜b(z)β(z)(1 − c˜(z)β(z))−1 d(z), ˜ that is, if and only if PJ (1 − zXC PBC − zPAC α(z)PAC BC )−1 F ≡ PJ (1 − zXC PBC − zPAC β(z)PAC BC )−1 F. Since PJ (1 − zXC PBC − zPAC θ(z)PAC BC )−1 Ce = PJ Ce for all e ∈ E, we get that the above condition is equivalent to PJ (1 − zXC PBC − zPAC α(z)PAC BC )−1 |DC ≡ PJ (1 − zXC PBC − zPAC β(z)PAC BC )−1 |DC
Vol. 64 (2009)
A Schur analysis
295
or PJ (1 − zXC PBC − zα(z)PAC BC )−1 (α(z)−β(z)) ≡ 0. The same reasoning as in the proof of Proposition 3.2 yields that PJ (1 − zXC PBC − zα(z)PAC BC )−1 |MC = PF (1 − zXC PBC PDC − zα(z)PAC BC )−1 |MC . Therefore two functions α, β ∈ S are mapped to the same D via (3.6) if and only if PF (1 − zXC PBC PDC − zα(z)PAC BC )−1 (α(z)−β(z)) ≡ 0. (3.9) For (3.9) to hold it is necessary and sufficient that there exist analytic functions µ : D → L(AC BC , DC ) and ν : D → L(AC BC , DXC ) such that, for each z ∈ D, (1 − zXC PBC PDC − zα(z)PAC BC )−1 (α(z)−β(z)) = −µ(z) − ν(z). A straightforward computation shows that the above equation can be rewritten as β(z) = α(z)(1 − zPAC BC µ(z)) + (1 − zXC PBC )µ(z) + ν(z). When α ≡ 0 (in which case the corresponding D is the central interpolant) we get that β ∈ S is mapped to the central interpolant by (3.6) if and only if there exist analytic functions µ : D → L(AC BC , DC ) and ν : D → L(AC BC , DXC ) such that, for each z ∈ D, β(z) = (1 − zXC PBC )µ(z) + ν(z). As the above equation holds if and only if (1 − zXC PBC )−1 β(z) = µ(z) + ν(z), the last statement in the theorem is proved and the proof of the theorem is complete itself. Note that if µ : D → L(AC BC , DC ) and ν : D → L(AC BC , DXC ) verify β(z) ≡ α(z)(1 − zPAC BC µ(z)) + (1 − zXC PBC )µ(z) + ν(z) for given α, β ∈ S, then, for each z ∈ D, kα(z)(1 − zPAC BC µ(z)) + (1 − zXC PBC )µ(z) + ν(z)k ≤ 1 and XC∗ (1 − zXC PBC )µ(z) + DXC ν(z) = 0. The classical Commutant Lifting Theorem is included as a particular case of the following corollary. Corollary 3.6. Assume that R∗ R = Q∗ Q and DC R(E0 ) = DC . Then the map in (3.6) establishes a one-to-one correspondence between ϑ ∈ S(NC , MC ) and the interpolant D for {C, T, VT , R, Q}, with NC and MC being given by NC = DC DC Q(E0 )
296
Marcantognini and Mor´ an
IEOT
and MC = DC ⊕ J {DC Re0 ⊕ (1 − WT T )CRe0 : e0 ∈ E0 }. Proof. From the assumption that R∗ R = Q∗ Q it readily follows that XC is an isometry. In particular NC = AC BC = DC DC Q(E0 ). As for the defect subspace MC , we get that MC = ker(XC∗ ) = DC ⊕ J {DC Re0 ⊕ (1 − WT T )CRe0 : e0 ∈ E0 }. If α is any given function in S(NC , MC ) and D is the corresponding interpolant, then β ∈ S(NC , MC ) yields the same D via (3.6) if and only if there exists an analytic function µ : D → L(AC BC , DC ) such that, for each z ∈ D, β(z) = α(z)(1 − zPAC BC µ(z)) + (1 − zXC PBC )µ(z). Note that, for each z ∈ D, 0 = XC∗ (1 − zXC PBC )µ(z) = XC∗ µ(z) − zPBC µ(z). In particular, XC∗ µ(0) = 0. As DC R(E0 ) = DC , it follows that µ(0) = 0. Hence, µ(z) ≡ zµ1 (z) for some analytic function µ1 : D → L(AC BC , DC ). The same argument as before yields µ1 (0) = 0. By iteration we get µ ≡ 0 and β ≡ α. Other sufficient conditions under which Theorem 3.4 provides a proper parameterization are simple to obtain. To find necessary and sufficient conditions for this to happen remains an open problem.
4. Appendix We herein include a sketch of the proof of Theorem 2.1. P∞ (i) Given ϑ ∈ S(N , M), ϑ(z) = k=0 z k ϑk , z ∈ D, let Uϑ be the linear operator defined in Fϑ := H ⊕ Eϑ by h V PD h + ϑ(0)PN h + φ(0) φ ∗ S (φ + ϑPN h) Uϑ φ := h ∈ H, ∈ Eϑ . ψ ψ S ∗ (ψ + ∆PN h) Recall that Eϑ := H 2 (M) ⊕ ∆L2 (N ) ∩ {(ϑχ, ∆χ) : χ ∈ H 2 (N )}⊥ , with ∆(ζ) := Dϑ(ζ) , 2
|ζ| = 1, 2
and that S is the shift on either H (M) or L (N ), depending on context.
Vol. 64 (2009)
A Schur analysis
297
φ ∈ Eϑ , we ψ get that S ∗ (φ + ϑPN h) ∈ H 2 (M), S ∗ (ψ + ∆PN h) ∈ ∆L2 (N ) and that, for all u ∈ H 2 (N ), ∗ S (φ + ϑPN h) ϑu , = hϑPN h, ϑSui + h∆PN h, ∆Sui = hPN h, Sui = 0. S ∗ (ψ + ∆PN h) ∆u As Sϑ = ϑS|H 2 (N ) and S∆ = ∆S, given any h ∈ H and
Therefore Uϑ ∈ L(Fϑ ). φ It can be seen that Uϑ is unitary. In point of fact, if h ∈ H and ∈ Eϑ , ψ ∗ h h then φ∗ = Uϑ∗ φ is given by ψ∗ ψ h∗ = V ∗ PV (D) h + ϑ(0)∗ PM h + PN (ϑ∗ Sφ + ∆Sψ), φ∗ = PM h + Sφ − ϑ[ϑ(0)∗ PM h + PN ((ϑ∗ Sφ + ∆Sψ)], ψ ∗ = Sψ − ∆[ϑ(0)∗ PM h + PN ((ϑ∗ Sφ + ∆Sψ). Also, it can be seen that Fϑ is the least Hilbert space containing Uϑn (H) for all n = 0, ±1, ±2, . . .. From this and since Uϑ |D = V it comes that Uϑ ∈ L(Fϑ ) is a minimal unitary extension of V . It remains to show that PM Uϑ (1 − zPEϑ Uϑ )−1 |N = ϑ(z) for all z ∈ D. This follows from the relations 0 k (PEϑ Uϑ ) h = S ∗k ϑh , S ∗k ∆h
h ∈ N , k ∈ N,
and k
PM Uϑ (PEϑ Uϑ ) h = ϑk h,
h ∈ N , k = 0, 1, 2, . . . .
e be a minimal unitary extension of V . Define (ii) Let U ∈ L(H) ϑ(z) := PM U (1 − zPH H U )−1 |N e
(z ∈ D).
Set U11 := PM U |N , U12 := PM U |H H , U21 = PH H U |N , U22 := PH H U |H H . e e e e Then ϑ(z) = U11 + zU12 (1 − zU22 )−1 U21 ,
z ∈ D,
where (Ujk )j,k=1,2 is the 2×2 block matrix representation of the isometric operator e H) onto M ⊕ (H e H). Hence ϑ is the characteristic U |N ⊕(H H) from N ⊕ (H e n o e H; U | function of the unitary colligation N , M, H with state space e N ⊕(H H)
298
Marcantognini and Mor´ an
IEOT
e H H, input space N and output space M. It is known from the theory of operator colligations that it is the case that ϑ ∈ S(N , M). e 0 ) be a minimal unitary extension of V undistinguishable from (iii) Let U 0 ∈ L(H e e0 → H e such that τ |H = 1 and U ∈ L(H), under an isometric isomorphism τ : H 0 τU = Uτ. Then τ PH H U = PHe0 H U 0 τ . So, for all x ∈ N , y ∈ M and k = 0, 1, 2, . . ., e k k 0 0 x, y . PM U PH H U x, y = PM U PHe0 H U e H
H
Hence U )−1 |N = PM U 0 (1 − zPHe0 H U 0 )−1 |N PM U (1 − zPH H e for all z ∈ D. As for the converse, write ϑ(z) := PM U (1 − zPH H U )−1 |N = PM U 0 (1 − zPHe0 H U 0 )−1 |N e
(z ∈ D)
and note that, for all z ∈ D, −1
PH U (1 − zU )−1 |H = (V PD + ϑ(z)PN ) [1 − z(V PD + ϑ(z)PN )] = PH U 0 (1 − zU 0 )−1 |H . Therefore hU n h, HiHe = hU 0n h, HiHe0
for all h ∈ H and n ∈ N. Hence the operator defined on the linear span of n 0n {U n (H)}∞ n=−∞ and mapping U h into U h (h ∈ H, n = 0, ±1, ±2, . . .) can be exe→H e 0 such that τ |H = 1 and τ U 0 = U τ . tended to an isometric isomorphism τ : H
References [1] R. Arocena, Generalized Toeplitz kernels and dilations of intertwining operators, Integral Equations and Operator Theory, 6(1983), 759–778. [2] ,Unitary extensions of isometries and contractive intertwining dilations, in: The Gohberg Anniversary Collection II, Operator Theory: Advances and Applications 41, Birkh¨ auser-Verlag Basel, 1989, pp. 13–23. [3] D.Z. Arov and L.Z. Grossman, Scattering matrices in the theory of dilations of isometric operators, Soviet Math. Dokl., 27(1983), No. 3, 518–522. [4] , Scattering matrices in the theory of unitary extension of isometric operators, Math. Nachr., 157(1992), 105–123. [5] Gr. Arsene, Z. Ceau¸sescu and C. Foia¸s, On intertwining dilations. VIII. J. Operator Theory 4(1980), No. 1, 55–91. [6] M. Cotlar and C. Sadosky, Transference of metrics induced by unitary couplings, a Sarason theorem for the bidimensional torus and a Sz.-Nagy-Foia¸s theorem for two pairs of dilations, J. Funct. Anal., 111(1993), 473–488.
Vol. 64 (2009)
A Schur analysis
299
[7] C. Foia¸s, On the extension of intertwining operators, in: Harmonic Analysis and Operator Theory, A Conference in Honor of Mischa Cotlar, January 3–8, 1994, Caracas, Venezuela, Contemporary Mathematics 189, American Mathematical Society, Providence, Rhode Island, 1995, pp. 227–234. [8] C. Foia¸s and A.E Frazho, The Commutant Lifting Approach to Interpolation Problems, Operator Theory: Advances and Applications 44, Birkh¨ auser-Verlag, Basel, 1990. [9] C. Foia¸s, A.E. Frazho and M.A. Kaashoek, Relaxation of metric constrained interpolation and a new lifting theorem, Integral Equations and Operator Theory, 42(2002), 253–310. [10] A.E. Frazho, S. ter Horst and M.A. Kaashoek, Coupling and relaxed commutant lifting, Integral Equations and Operator Theory, 54(2006), 33–67. [11] , All solutions to the relaxed commutant lifting problem, Acta Sci. Math. (Szeged), 72(2006), No. 1-2, 299–318. [12] W.S. Li and D. Timotin, The relaxed intertwining lifting in the coupling approach, Integral Equations and Operator Theory, 54(2006), 97–111. [13] M.D. Mor´ an, On intertwining dilations, J. Math. Anal. Appl., 141(1989), No. 1, 219–234. [14] B. Sz.-Nagy and C. Foia¸s, Harmonic analysis of operators on Hilbert space, NorthHolland Publishing Co., Amsterdam-London, 1970. S.A.M. Marcantognini Departamento de Matem´ aticas Instituto Venezolano de Investigaciones Cient´ıficas Apartado Postal 21827 Caracas 1020A Venezuela e-mail:
[email protected] M.D. Mor´ an Escuela de Matem´ aticas Facultad de Ciencias Universidad Central de Venezuela Apartado Postal 20513 Caracas 1020A Venezuela e-mail:
[email protected] Submitted: 05 October 2008.
Integr. equ. oper. theory 64 (2009), 301–323 c 2009 Birkh¨
auser Verlag Basel/Switzerland 0378-620X/030301-23, published online June 26, 2009 DOI 10.1007/s00020-009-1696-8
Integral Equations and Operator Theory
Factorisation of Non-negative Fredholm Operators and Inverse Spectral Problems for Bessel Operators S. Albeverio, R. Hryniv and Ya. Mykytyuk Abstract. We study the problem of factorisation of non-negative Fredholm operators acting in the Hilbert space L2 (0, 1) and its relation to the inverse spectral problem for Bessel operators. In particular, we derive an algorithm of reconstructing the singular potential of the Bessel operator from its spectrum and the sequence of norming constants. Mathematics Subject Classification (2000). Primary 47A68; Secondary 34A55, 34B24, 34B30, 47E05. Keywords. Factorisation in operator algebras, non-negative operators, Bessel operators, inverse problems.
1. Introduction In the Hilbert space L2 (0, 1), we consider an operator S = I + F , where F is of the Hilbert–Schmidt class. It is well known [11,20] that if S is positive, then it can uniquely be factorised in the form S = (I + K)−1 (I + K ∗ )−1 ,
(1.1)
where K is a Volterra integral operator of the Hilbert–Schmidt class with uppertriangular kernel k (i.e., k(x, t) = 0 for a.e. (x, t) satisfying 0 ≤ t ≤ x ≤ 1). The kernel k can be found from the equation Z 1 k(x, t) + f (x, t) + k(x, s)f (s, t) ds = 0, 0 ≤ x < t ≤ 1, (1.2) x
where f is the kernel of F . In the special case where f has the form f (x, t) = φ(2 − x − t) ± φ(|x − t|)
302
Albeverio, Hryniv and Mykytyuk
IEOT
for some function φ ∈ L2 (0, 2), equation (1.2) is called the Gelfand–Levitan– Marchenko (GLM) equation, and if f (x, t) = φ(|x − t|), then (1.2) is the Krein equation. These equations naturally arise while solving the inverse spectral problems for the Sturm–Liouville operators d2 +q dx2 on the interval (0, 1) subject to suitable boundary conditions; then F is constructed from the spectral data for T , and I + K is the transformation operator between the unperturbed (q = 0) and perturbed (q 6= 0) Sturm–Liouville operators, see Subsection 4.2. Moreover, under suitable regularity assumptions on the potential q the kernel k is continuous in the domain {(x, t) | 0 ≤ x ≤ t ≤ 1}, and the potential q is related to k via T =−
dk(x, x) . dx On the other hand, there are Sturm–Liouville operators with singular potentials, for which the above reconstruction procedure is impossible because the corresponding operator I +F is only non-negative and has a non-trivial null-space. One such an example is given by the so called Bessel operators arising as follows. It is well known (see, e.g., Example 4 of Appendix to X.1 of [18]) that a radial Schr¨ odinger operator −∆+q(|x|) considered in the unit ball of R3 with q supported on (0, 1) decomposes into the direct sum of the Bessel operators Tm corresponding to the angular momenta m ∈ Z+ , i.e., the operators generated in L2 (0, 1) by the differential expressions d2 m(m + 1) − 2+ +q (1.3) dx x2 and suitable boundary conditions. If one tries to follow the same classical approach to solve the inverse spectral problem for the Bessel operators Tm with m > 0 as for the Sturm–Liouville case m = 0, then one immediately encounters the problem that the operator S constructed via the spectral data for Tm is non-negative and has a non-trivial null-space. Therefore the representation (1.1) is clearly impossible, and the very existence of the transformation operators is questionable. However, such an operator S (i.e., non-negative and with finite-dimensional null-space) might still be factorisable as q(x) = −2
∗ S = S+ S+ ,
(1.4)
where S+ is an upper-triangular operator, see definitions in Section 2. This question is studied in detail in Section 3, and the main result there (Theorem 3.12) states that such a representation is always possible and, moreover, it is even unique under some extra conditions imposed on S and S+ . In Section 4 we study properties of the factor S+ in the case where S is constructed from the spectral data for some Bessel operator Tm , m > 0, as explained
Vol. 64 (2009)
Factorisation of non-negative Fredholm operators
303
above. We prove in Theorem 4.2 that then the factor S+ is the transformation operator between Tm and the unperturbed Sturm–Liouville operators and might be used to reconstruct the potential q, as in the regular case of Sturm–Liouville operators. This leads to a new algorithm of solving the inverse spectral problems for Bessel operators with momenta m ∈ N, which is described in Section 4. It should be mentioned that the inverse spectral problem for Bessel operators Tm was earlier studied in several papers; see, e.g., [1,4,5,7,21,24]. For m ≥ − 14 , uniqueness of solution was established in [5, 24] and the spectra of Tm where characterised in [4]. In [21] the author gave a complete solution of the inverse spectral problem for m ∈ N and q ∈ L2 (0, 1) using the method of [17]. Another approach based on the double commutation method was suggested in [7] and further developed in [1] to treat the case m ∈ N and a wide class of singular potentials. Our treatment of the inverse spectral problem for Bessel operators is close to the classical one as suggested by Gelfand and Levitan [8] and Marchenko [14] in that it uses the transformation operators and the related integral equations. Although the reconstruction method of this paper generalises in a straightforward manner to the class of Bessel operators with real-valued potentials in L1 (0, 1) or to those treated in [1], potentials q ∈ L2 (0, 1) produce spectral data that are easy to characterise, and we decided to sacrifice generality for the sake of simplicity. We remark that, to the best of our knowledge, no complete solution to the inverse spectral problem for Bessel operators with non-integer m has been given so far. In particular, the problems arising after decomposition of the radial Laplace operator in even dimensions lead to Tm with half-integer m and have not been solved; in odd dimensions greater than 3 the analysis remains unchanged. The main obstacle for applying the method of this paper to solve the inverse spectral problem for the Bessel operators Tm with non-integer m is not a non-trivial null-space of the corresponding operator I + F (e.g., this operator is positive if m ∈ [− 21 , 12 )), but rather the fact that F is then no longer compact. Unfortunately, there is no general theory of factorization of positive operators I + F with non-compact F . We hope that for particular operators F related to the Bessel operators Tm such a theory can be developed. This would make it possible to extend the method of reconstructing the Bessel operators Tm to arbitrary angular momenta m ≥ − 12 . Such a project will be discussed elsewhere. Although we study the the factorization problem for operators acting in L2 (0, 1), a generalization to the spaces L2 (0, a) with any a > 0 or a = ∞ is straightforward. We restricted ourselves to the unit interval since we apply the results obtained to the inverse spectral problems for Bessel operators defined on finite intervals. Inverse problems for Schr¨odinger operators on the semi-axis generated by the differential expressions (1.3) with angular momenta m ∈ N have been treated in the framework of the scattering theory [6, Ch. 14,15] and operate with different objects.
304
Albeverio, Hryniv and Mykytyuk
IEOT
2. Factorisation in operator algebras 2.1. Definitions In the Hilbert space H := L2 (0, 1), we introduce the chain of orthoprojectors P (t), t ∈ [0, 1], given by P (t)f (x) := χt (x)f (x), where χt is the characteristic function of the interval [0, t], and set Q(t) := I −P (t). A bounded operator S+ (resp. S− ) is called an upper-triangular (resp. lowertriangular ) operator if, for all t ∈ [0, 1], Q(t)S+ P (t) = 0
(resp.,
P (t)S− Q(t) = 0).
All bounded upper-triangular (resp. lower-triangular) operators constitute a closed subalgebra B + (resp. B − ) in the Banach algebra B = B(H) of all bounded linear operators in H. It is clear that the involution A 7→ A∗ maps B + (resp. B − ) into B − (resp. B + ). Definition 2.1. Let A be a subalgebra of B. We say that an operator S ∈ A admits factorisation, or is factorisable in A if there exist S+ ∈ A ∩ B + and S− ∈ A ∩ B − such that S = S+ S− . Clearly, this notion is an infinite-dimensional generalisation of the Gauss method of inverting a square matrix S using its LU -decomposition, i.e., using the representation of S as the product of lower- and upper-triangular matrices. M. Krein [12, 13] was seemingly the first to consider the factorisation problem in an infinite-dimensional algebra—namely, in the algebra of operators of the form zI + K, where z ∈ C, I is the identity operator, and K is an integral operator with continuous kernel. A more general algebra A∞ = {zI + B | B ∈ B∞ }, with B∞ denoting the ideal of all compact operators was studied in detail in the book by I. Gokhberg and M. Krein [11], and the case of a Banach space H was considered in [3]. L. Sakhnovich in [19, 20] investigated factorisation in the group Binv of all invertible operators; he required that the factors S+ and S− in S = S+ S− be in addition invertible in B + and B − and called such a factorisation the special factorisation. We observe that also in [3,11–13] only invertible operators were considered. 2.2. The necessary condition for special factorisability In all cases above, there is a simple necessary condition for special factorisability. Indeed, assume that an operator S admits a factorisation S = S+ S− , in which S+ and S− are invertible in B + and B − respectively. We set, for every t ∈ [0, 1], S+ (t) := P (t) + Q(t)S+ ∈ B + , S− (t) := P (t) + S− Q(t) ∈ B − , S(t) := P (t) + Q(t)SQ(t).
Vol. 64 (2009)
Factorisation of non-negative Fredholm operators
305
It is easy to see that S(t) = S+ (t)S− (t) and that the operators S+ (t) and S− (t) are boundedly invertible, with −1 −1 S+ (t) = P (t) + Q(t)S+ , −1 −1 S− (t) = P (t) + S− Q(t). Hence if an invertible operator S ∈ Binv admits a special factorisation, then the following condition holds: (I) for every t ∈ [0, 1], the operator S(t) is boundedly invertible in the algebra B. For a generic algebra A condition (I) is by no means sufficient in order that an operator S ∈ A be factorisable in A . However, (I) is sufficient, e.g., in the algebras Ap := CI + Bp := {zI + B | z ∈ C, B ∈ Bp }, where Bp is the Schatten–von Neumann ideal, cf. [11, IV.5]. In particular, we have the following statement: Proposition 2.2. Assume that F is a Hilbert–Schmidt operator such that S := I +F is positive. Then S admits a special factorisation in the algebra A2 . Some other non-classical operator algebras in which (I) is sufficient for factorisability were given in [15,16], where also methods for constructing such algebras were presented. 2.3. Uniqueness Assume that S ∈ A admits two special factorisations in the algebra A , S = S+ S− = S˜+ S˜− . By definition, the factors S+ and S˜+ are invertible in A ∩ B + , and S− and S˜− are invertible in A ∩ B − ; therefore the operator −1 −1 S˜+ S+ = S˜− S−
belongs to the subalgebra D := B + ∩ B − of diagonal operators. Every diagonal operator D is in fact the operator of multiplication by a function d ∈ L∞ (0, 1). Every diagonal operator D that is invertible in A causes therefore non-uniqueness of factorisation in A via S = S+ S− = (S+ D)(D−1 S− ). Conversely, if the only diagonal operators in A that are invertible in A are the scalar operators (i.e., the operators zI for z ∈ C \ {0}), then every S ∈ A can admit at most one special factorisation in A modulo scalar factors.
306
Albeverio, Hryniv and Mykytyuk
IEOT
These scalar factors can actually be fixed by requiring that the factors S± should belong to the set BI of operators having diagonal equal to the identity operator I. By definition, an operator A ∈ B has diagonal D if the limit n(τ )
s-lim diam(τ )→0
X
∆j P A∆j P
(2.1)
j=1
exists and is equal to D; here τ = {0 =: t0 < t1 < · · · < tn(τ ) := 1} is a partition of the interval [0, 1], diam(τ ) := max{tj − tj−1 | j = 1, . . . , n(τ )} is its diameter, ∆j P := P (tj ) − P (tj−1 ), and the limit is taken over all possible partitions in the strong operator topology. Clearly, if D is the diagonal of an operator A, then D belongs to D. Also, every operator D in D coincides with its own diagonal. We shall need later the following auxiliary results. Lemma 2.3. (i) Every compact operator has diagonal equal to zero. (ii) Assume that operators A and B in B + have diagonals DA and DB respectively; then AB has diagonal DA DB . Proof. Part (i) follows from a stronger result established in [11, Lemma I.5.1]. If A and B belong to B + and τ is an arbitrary partition of [0, 1], then ∆j P A = ∆j P A(I − Ptj−1 ),
B∆j P = P (tj )B∆j P.
Therefore, n(τ )
X
n(τ )
∆j P AB∆j P =
j=1
X
n(τ )
∆j P A∆j P B∆j P =
j=1
X j=1
and (ii) follows.
n(τ )
∆j P A∆j P
X
∆k P B∆k P,
k=1
Corollary 2.4. Under the assumptions of Proposition 2.2, the operator I + F has a unique factorisation in A2 with factors S± belonging to the sets BI± := B ± ∩ BI ; ∗ . moreover, S− = S+ Proof. In view of the above lemma elements of A2 that belong to BI have the form I + K with K ∈ B2 . Moreover, if I + K ∈ A2 ∩ BI± and I + K is invertible in B, then the inverse (I + K)−1 =: I + K1 also belongs to A2 ∩ BI± . The inclusion K1 ∈ B2 follows from the equality K1 = −K(I + K1 ), and that K1 ∈ B ± can be proved directly by studying the integral equation Z 1 k(x, t) + k1 (x, t) + k(x, s)k1 (s, t) ds = 0 0
for the corresponding kernels. Assume now that a positive operator I+F with a Hilbert–Schmidt operator F is factorisable in A2 as S+ S− , where S+ and S− belong to BI+ and BI− respectively. Then S± have the form I + K± with some K± ∈ B2 . Clearly, S− has a trivial nullspace and thus is a bijection; hence S+ has a trivial null-space and is a bijection as well. Therefore every factorisation of I + F in A2 with factors having diagonal
Vol. 64 (2009)
Factorisation of non-negative Fredholm operators
307
equal to I is a special one. Since the only diagonal operator belonging to A2 ∩ BI is the identity operator, the arguments at the beginning of this subsection imply that such a factorisation is unique. Since I + F = (S− )∗ (S+ )∗ is also a factorisation of I + F with the specified properties, it follows that S− = (S+ )∗ as claimed.
3. Factorisation of non-negative Fredholm operators In this section, we consider the factorisation problem for non-invertible Fredholm operators, which, to the best of our knowledge, has not been studied yet. We denote by F the algebra of all Fredholm operators in B and set F ± := F ∩ B ± , FI := F ∩ BI , and FI± := F ± ∩ FI . We shall start with the simplest situation of factorisation of orthogonal projectors with one-dimensional null-space. 3.1. Factorisation of orthogonal projectors with one-dimensional null-space Let φ be a function in L2 (0, 1) of norm 1 whose support contains 0. We set Z x a(x) := |φ(t)|2 dt 0
and introduce an operator Vφ in L2 (0, 1) via Z
1
(Vφ y)(x) := y(x) − φ(x) x
φ(t)y(t) dt. a(t)
A variant of the following lemma has appeared in [10]. We give the proof here for the sake of completeness. Lemma 3.1. The operator Vφ is isometric and Vφ Vφ∗ = I − Pφ , where Pφ := (·, φ)φ is the orthogonal projector onto φ. Proof. Take arbitrary functions f and g in L2 (0, 1) whose support does not contain the origin. Direct calculations give Z 1 Z 1 Z 1 φ(t)g(t) (Vφ f, Vφ g) = f (t)g(t) dt − dxf (x)φ(x) dt a(t) 0 0 x Z 1 Z 1 φ(t)f (t) − dxφ(x)g(x) dt a(t) 0 x Z 1 Z 1 Z 1 φ(t)g(t) φ(t)f (t) 2 dt dt. + dx|φ(x)| a(t) a(t) x 0 x
308
Albeverio, Hryniv and Mykytyuk
IEOT
Observing that |φ(x)|2 = a0 (x) and integrating by parts in the last integral, we see that the last three integrals sum up to zero, thus showing that Vφ is isometric. The equality Vφ∗ y = 0 implies that Z a0 (x) x φ(x)y(x) = φ(t)y(t) dt, a(x) 0 i.e., by integrating, that Z
x
φ(t)y(t) dt = ca(x) 0
for some constant c, and finally, upon differentiating, that y = cφ. It thus follows that ker Vφ∗ is spanned by φ. Since Vφ Vφ∗ is the orthogonal projector onto (ker Vφ∗ )⊥ , we get Vφ Vφ∗ = I − Pφ as claimed. Clearly, the factorisation of I −Pφ as Vφ Vφ∗ is a very special one, and it would be desirable to understand in what sense it is unique. It follows from Lemma 3.6 below (take B = I therein) that Vφ has diagonal equal to I and thus belongs to FI+ . However, there are many different operators V ∈ FI+ such that I − Pφ = V V ∗ , as the following example demonstrates. Example 3.2. Let B be any co-isometry in L2 (0, 1) belonging to FI+ ; then V := Vφ B is in FI+ by Lemma 2.3(ii) and V V ∗ = Vφ BB ∗ Vφ∗ = Vφ Vφ∗ = I − Pφ . Such a co-isometry B can be constructed e.g. as B = RV ∗ R, where R is the reflection operator, (Rf )(x) = f (1 − x), and V is any isometry in FI+ (see Remark 3.11). Every operator V constructed as suggested in the above example has a nontrivial null-space, and one could hope that Vφ is singled out by requiring that the factor V in the equality I − Pφ = V V ∗ should be injective. However, this is also not true, since there are unitary operators in BI+ different from the identity operator I. We construct one such an operator in the example below; it should be clear how to modify and/or iterate this construction to get many other examples. It seems that the problem of characterising all unitary operators in BI+ is quite difficult; we shall not touch upon it here as it goes beyond our main aims. Example 3.3. We construct here a non-trivial unitary operator U in H = L2 (0, 1) belonging to BI+ . The main idea of the construction is to take an isometry U1 and an co-isometry U2 in BI+ , make them act on L2 (0, 1) and L2 (1, 2) respectively, take their direct sum in L2 (0, 2), then perturb the sum by a partial isometry that sends vectors in the null-space of U2 in L2 (1, 2) into the orthogonal complement of the range of U1 in L2 (0, 1), and finally make the resulting operator act in L2 (0, 1) by an appropriate scaling. To this end we take arbitrary unit vectors φ1 and φ2 of L2 (0, 1) whose support R2 contain the point x = 0, set U1 := Vφ1 , ψ(x) := φ2 (2 − x) and b(x) := x |ψ(t)|2 dt
Vol. 64 (2009)
Factorisation of non-negative Fredholm operators
309
for x ∈ (1, 2), and define (U2 f2 )(x) := f2 (x) −
ψ(x) b(x)
Z
2
ψ(t)f2 (t) dt x
for x ∈ (1, 2) and f2 ∈ L2 (1, 2). Then the operator f1 U1 f1 φ1 U := + (f2 , ψ)L2 (1,2) f2 U2 f2 0 −1 is unitary in L2 (0, 1) √ ⊕ L2 (1, 2) = L2 (0, 2), and it remains to set U := W UW , where (W f )(x) := 2f (2x) is a unitary dilation of L2 (0, 2) into L2 (0, 1). It is clear that U has diagonal I and belongs to B + .
To point out yet another important property of the operator Vφ , we introduce the following definition. Definition 3.4. We say that a bounded operator T is almost Hilbert–Schmidt if, for every t ∈ (0, 1), the compression Q(t)T Q(t) L2 (t,1) of T onto the subspace L2 (t, 1) is a Hilbert–Schmidt operator therein. Clearly, the operator Vφ − I is almost Hilbert–Schmidt in the above sense. The main result of this subsection now reads as follows: Theorem 3.5. Let φ be an arbitrary function in L2 (0, 1) of unit norm whose support contains x = 0. (a) If V satisfies the relation V V ∗ = I − Pφ and V − I is an almost Hilbert– Schmidt operator, then V = Vφ . (b) If V is an injective operator in FI+ such that V V ∗ = I − Pφ , then V = Vφ U , where U is some unitary operator in BI+ . Our proof will rely on several auxiliary results, which we establish first. Lemma 3.6. Assume that B ∈ B and that φ is a unit vector in L2 (0, 1) whose support contains 0. Then the operator A := Vφ B − B has diagonal equal to zero. Proof. For B ∈ B and f ∈ H, we set )
n(τ
X ∆j P B∆j P f , D(B, f ) := lim sup diam(τ )→0 j=1
with notations explained after the displayed formula (2.1). It is easily seen that for every B and C in B and every f ∈ H, one gets D(B, f ) ≤ kBkkf k, D(B + C, f ) ≤ D(B, f ) + D(C, f ), D(P (t)B, f ) = D(B, P (t)f ),
(3.1)
t ∈ [0, 1].
Fix an arbitrary t ∈ (0, 1) and observe that the operator Q(t)(Vφ − I) is compact. Therefore for such t compact is also the operator At := Q(t)A,
310
Albeverio, Hryniv and Mykytyuk
IEOT
so that At has diagonal zero and D(At , f ) = 0 for every f ∈ H. Using properties (3.1), we conclude that D(A, f ) ≤ D(P (t)A, f ) = D(A, P (t)f ) ≤ kAkkP (t)f k. Since t ∈ (0, 1) is arbitrary, it follows that D(A, f ) = 0, i.e., that A has diagonal zero. Corollary 3.7. If, under the above assumptions, one of the operators Vφ B or B belongs to BI , then so does the other one. Lemma 3.8. Assume that B ∈ B and that φ is a unit vector in L2 (0, 1) whose support contains 0. If Vφ B belongs to B + , then B belongs to B + , too. Proof. Since Vφ B ∈ B + by assumption, we have for every t ∈ (0, 1) Q(t)Vφ BP (t) = 0. Using the fact that Vφ belongs to B + , we rewrite the above equality as Q(t)Vφ Q(t) Q(t)BP (t) = 0.
(3.2)
The operator Q(t)Vφ Q(t) L2 (t,1) , being equal to the identity operator plus a Volterra one, is invertible in L2 (t, 1); hence (3.2) yields Q(t)BP (t) = 0 for every t ∈ (0, 1). Thus B ∈ B + as claimed.
Proof of Theorem 3.5. (a) Assume that V = I + K with an almost Hilbert– Schmidt operator K ∈ BI+ is such that I − Pφ = V V ∗ . Applying Q(t), t ∈ (0, 1), from both sides, using the fact that K ∈ B + and K ∗ ∈ B − , and setting K(t) := Q(t)KQ(t), we get Q(t) − Q(t)Pφ Q(t) = Q(t) + K(t) Q(t) + K ∗ (t) . (3.3) We restrict this equality onto L2 (t, 1); since Q(t) acts there as the identity operator, (3.3) can be regarded as a factorisation in the algebra of operators on L2 (t, 1), viz. I − Q(t)Pφ Q(t) = I + K(t) I + K ∗ (t) . L2 (t,1)
L2 (t,1)
L2 (t,1)
The assumption 0 ∈ supp φ implies that kQ(t)φk < kφk, and thus the operator I −Q(t)Pφ Q(t) is positive in L2 (t, 1). Applying Corollary 2.4, we conclude that the operator K(t) is uniquely determined by φ and thus coincides with the operator Q(t)(Vφ −I)Q(t). Since t ∈ (0, 1) was arbitrary, this yields the equality K = Vφ −I, i.e., V = Vφ as claimed. (b) Assume that V verifies the assumptions of the theorem. Then the equality kV ∗ f k = k(I − Pφ )f k shows that V ∗ is a partial isometry and ker V ∗ is spanned by φ. Therefore, ran V = H ker V ∗ = ran(I − Pφ ),
Vol. 64 (2009)
Factorisation of non-negative Fredholm operators
311
so that V V ∗ V = (I − Pφ )V = V , i.e., V (V ∗ V − I) = 0. Since V is injective, it follows that V ∗ V = I and thus V is an isometry. We conclude that the operator U := Vφ∗ V is unitary and that Vφ U = (I − Pφ )V = V . By Lemma 3.8 and Corollary 3.7, the latter equality implies that U ∈ BI+ as claimed. Remark 3.9. The assumption that the support of the function φ contains zero was made only to simplify the constructions and can easily be dropped. Indeed, let φ be of unit norm in L2 (0, 1) and inf supp φ = c > 0. We then interpret the operator Vφ as acting via ( f (x) if x ≤ c, R1 (Vφ f )(x) := if x > c. f (x) + φ(x) x φ(t)y(t)/a(t) dt Thus Vφ is the direct sum of the identity operator in L2 (0, c) and an uppertriangular √ operator in L2 (c, 1) that is unitarily equivalent to the operator Vψ with ψ(x) := 1 − c φ c + (1 − c)x of unit norm in L2 (0, 1) whose support contains 0. It is straightforward to verify that under suitable modifications all the results of this subsection remain valid. Therefore we do not need to have 0 ∈ supp φ, although this assumption will be satisfied for concrete applications to Bessel operators treated in Section 4. 3.2. Factorisation of orthogonal projectors with finite-dimensional null-space We now extend the results of the previous subsection to Fredholm orthogonal projectors as follows: Theorem 3.10. Assume that P is an orthoprojector in L2 (0, 1) of finite rank such that, for every t ∈ (0, 1), ran P ∩ Q(t)L2 (0, 1) = {0}. Then there exists a unique operator VP in FI+ such that VP − I is almost Hilbert–Schmidt and VP VP∗ = I − P. The operator VP is isometric; moreover, every injective operator V in FI+ satisfying V V ∗ = I − P is isometric and equals VP U , where U is a unitary operator in BI+ . Proof. The proof of existence and uniqueness of VP with the stated properties is by induction on rank P . Theorem 3.5 handles the case where rank P = 1. We assume next that, for some n ∈ N, the theorem is already proved whenever rank P ≤ n and let P be an orthoprojector of rank n + 1. Fix an element φ ∈ ran P of unit norm whose support contains 0 and set Q := Vφ∗ P Vφ ; existence of such a φ is guaranteed by the assumption on ran P . Since Q = Q∗ and, by Lemma 3.1, Q2 = Vφ∗ P (I − Pφ )P Vφ = Q, we conclude that Q is an orthoprojector on ran Q. Taking into account that Vφ is injective and ran Vφ = L2 (0, 1) φ, we see that Q is of rank n. We set VP := Vφ VQ ,
312
Albeverio, Hryniv and Mykytyuk
IEOT
where VQ is a unique operator in FI+ such that VQ − I is almost Hilbert–Schmidt and VQ VQ∗ = I − Q, whose existence is guaranteed by the hypothesis of induction. The operator VP is isometric and belongs to F + . Since VQ has diagonal equal to I, so does VP by Corollary 3.7, i.e., VP ∈ FI+ . Next we see that VP VP∗ = Vφ VQ VQ∗ Vφ∗ = Vφ (I − Q)Vφ∗ = Vφ Vφ∗ (I − P )Vφ Vφ∗ = (I − Pφ )(I − P )(I − Pφ ) = I − P, as required. Finally, VP − I = (Vφ − I)VQ + (VQ − I) is an almost Hilbert–Schmidt operator. To show uniqueness of VP with the specified properties, we assume that V V ∗ = I − P for some operator V ∈ FI+ such that V − I is almost Hilbert– Schmidt. Since, for every t ∈ (0, 1), the operator I − Q(t)P Q(t) is positive in L2 (t, 1), we conclude as in the proof of Theorem 3.5 that Q(t)V Q(t) is uniquely determined by P and thus coincides with Q(t)VP Q(t). As t ∈ (0, 1) was arbitrary, we conclude that V = VP . Finally, assuming that there is an injection V in FI+ such that V V ∗ = I − P and putting VeQ := Vφ∗ V , we see that VeQ VeQ∗ = Vφ∗ V V ∗ Vφ = Vφ∗ (I − P )Vφ = I − Q. As in the proof of Theorem 3.5 we can show that V ∗ is a partial isometry and thus V is an isometry. Since ran V = ran(I − P ), VeQ is injective, and the equalities Vφ VeQ = (I − Pφ )V = V and Lemma 3.8 imply then that VeQ belongs to FI+ . We showed above that Q is an orthoprojector of rank n, so that by the assumption of induction we have VeQ = VQ U for some unitary U ∈ BI+ resulting in V = Vφ VeQ = V φ V Q U = VP U . Remark 3.11. It follows from the proof that the operator VP has the form VP = Vφ1 Vφ2 · · · Vφn
(3.4)
for a suitable (not unique!) choice of vectors φ1 , φ2 , . . . , φn of unit length; here n is the rank of the projector P . Indeed, take an orthonormal basis ψ1 , . . . , ψn of the range of P and set recursively φ1 := ψ1 , φ2 := Vφ∗1 ψ2 , . . . , φn := Vφ∗n−1· · · Vφ∗2 Vφ∗1 ψn . That φk are of unit norm can be deduced from the fact that Vφ∗ is a partial isometry between H φ and H. It is clear now that the null-space of the operator Vφ∗n Vφ∗n−1 · · · Vφ∗2 Vφ∗1
(3.5)
is of dimension n and is spanned by the vectors ψ1 , ψ2 , . . . , ψn , hence it coincides with the range of P . Thus the operator of (3.5) coincides with VP∗ , and VP takes the form (3.4).
Vol. 64 (2009)
Factorisation of non-negative Fredholm operators
313
3.3. Factorisation of non-negative Fredholm operators We combine here the above partial results to treat a general case of non-negative Fredholm operator I + F with F ∈ B2 . Theorem 3.12. Assume that F is a self-adjoint operator of Hilbert–Schmidt class such that I + F is non-negative but I + Q(t)F Q(t) is positive for every t ∈ (0, 1), and denote by P the orthoprojector on ker(I + F ). Then I + F admits a unique factorisation of the form I + F = (VP + K+ )(VP + K+ )∗ ,
(3.6)
in which VP is the isometric operator introduced in Theorem 3.10 and K+ ∈ B + is a Hilbert–Schmidt operator. Proof. The assumptions of the theorem imply that the support of every nontrivial function in ker(I + F ) contains zero and thus ran P ∩ Q(t)L2 (0, 1) = {0} for every t ∈ (0, 1). By Theorem 3.10, we have I − P = VP VP∗ , so that I + F = VP VP∗ (I + F )VP VP∗ . It is easily seen that the operator Se = VP∗ (I + F )VP = I + VP∗ F VP is strictly positive and thus by Corollary 2.4 it admits a unique factorisation as e + )(I + K e + )∗ Se = (I + K e + ∈ B + ∩ B2 . Now we conclude that with K e + )(I + K e + )∗ VP∗ =: (VP + K+ )(VP + K+ )∗ , I + F = VP (I + K
(3.7)
e + is a Hilbert–Schmidt operator in B + as required. where K+ := VP K Uniqueness is proved as in the previous subsections, by considering the induced factorisation in the operator algebra over L2 (t, 1), t ∈ (0, 1) of the positive operator Q(t) + Q(t)F Q(t). There is another way to show that factorisation of I + F of the form (3.6) is unique if we assume in addition that the null-space of the factor VP + K+ is trivial. Then the range of (VP + K+ )∗ is the whole space H, and thus ran(VP + K+ ) = ran(I − P ). Therefore we have VP + K+ = VP VP∗ (VP + K+ ) = VP (I + VP∗ K+ ). In view of Remark 3.11, repeated application of Lemma 3.8 shows that, for a bounded ope+ erator B, the inclusion VP B ∈ B + yields B ∈ B + . Therefore VP∗ K+ =: K + belongs to B ∩ B2 , and thus every factorisation of the form (3.6) can be recast e + = V ∗ K+ ∈ B + ∩ B2 . It follows that the operator in the form (3.7) with K P ∗ Se := I + VP F VP is factorised as e + )(I + K e + )∗ Se = (I + K
314
Albeverio, Hryniv and Mykytyuk
IEOT
e + is unique. Therefore K+ = VP K e+ in A2 , and thus by Corollary 2.4 the operator K is also uniquely determined by F .
4. Application to the inverse spectral problem for Bessel operators In this section, we shall consider the factorisation problem for the operator I + F constructed from the spectral data for a Bessel operator and study the properties of the corresponding factors. 4.1. Special property of Vφ A careful examination of the transformation Vφ studied in Subsection 3.1 reveals that it is inverse to the well known double commutation transformation used in the spectral analysis of the Sturm–Liouville and Dirac operators [1, 2, 9, 10, 23]. This suggests that the factorisation problem discussed in the previous section is intimately related to Sturm–Liouville and Dirac differential operators and might be of much use in the spectral analysis of the latter. We demonstrate this for the Sturm–Liouville case. Assume that q0 ∈ L2 (0, 1) is real-valued and that a real-valued function φ0 of unit norm in L2 (0, 1) obeys the terminal condition φ0 (1) = 0 and is a solution of the differential equation −y 00 + q0 y = λ20 y with a real λ0 . We set q1 := q0 − 2(log a)00 , (4.1) Rx 2 where a(x) := 0 |φ0 (t)| dt, and, for every λ ∈ C, denote by u(·, λ) a solution of the equation −u00 + q1 u = λ2 u satisfying the terminal conditions u(1) = 0 and u0 (1) = 1. Lemma 4.1. Under the above assumptions, for every λ ∈ C the function Z 1 φ0 (t)u(t, λ) dt v(·, λ) := Vφ0 u(·, λ) = u(x, λ) − φ0 (x) a(t) x
(4.2)
verifies the relations v(1) = 0 and v 0 (1) = 1 and solves the equation −y 00 + q0 y = λ2 y. Proof. We start by observing that the function φ0 /a is collinear to u(·, λ0 ). Indeed, direct calculations give 0 2 φ 00 φ00 a0 φ00 a0 φ0 a0 φ0 0 = 0 −2 − + , a a a a a a a a which in view of the relations 2a0 φ00 = a00 φ0 and φ000 = (q0 − λ20 )φ0 implies that φ 00 φ φ0 0 0 = q0 − 2(log a)00 − λ20 = (q1 − λ2 ) . a a a
Vol. 64 (2009)
Factorisation of non-negative Fredholm operators
315
It remains to observe that φ0 /a satisfies along with φ0 the Dirichlet condition at x = 1. Next, it is clear that v(·, λ) obeys the stated conditions at x = 1. Differentiating (4.2), we get Z 1 φ0 (t)u(t, λ) a0 (x) 0 0 0 v (x, λ) = u (x, λ) − φ0 (x) dt + u(x, λ), a(t) a(x) x and then, using the fact that u(·, λ) and φ0 satisfy the corresponding differential equations, we find that Z 1 φ0 (t)u(t, λ) 00 00 00 dt v (x, λ) = u (x, λ) − φ0 (x) a(t) x a0 (x) 0 1 a00 (x) a0 (x) 0 + u(x, λ) + u(x, λ) + u (x, λ) 2 a(x) a(x) a(x) Z 1 φ0 (t)u(t, λ) dt = q1 (x) − λ2 u(x, λ) − q0 (x) − λ20 φ0 (x) a(t) x a0 (x) 0 1 a00 (x) a0 (x) 0 + u(x, λ) + u(x, λ) + u (x, λ) 2 a(x) a(x) a(x) Z 1 φ0 (t)u(t, λ) dt = (q0 − λ2 )v(x, λ) + (λ20 − λ2 )φ0 (x) a(t) x a0 (x) 0 1 a00 (x) a0 (x) 0 + u(x, λ) − u(x, λ) + u (x, λ). 2 a(x) a(x) a(x) Recalling that φ0 /a is collinear to u(·, λ0 ) and using the Lagrange identity, we derive the relation Z 1 φ (x) 0 φ0 (x) 0 φ0 (t)u(t, λ) 0 (λ20 − λ2 ) dt = u(x, λ) − u (x, λ) a(t) a(x) a(x) x which, on account of the Riccati identity (a0 /a)0 = a00 /a − (a0 /a)2 , shows that the last four summands above cancel out. Therefore v 00 (x, λ) = (q0 − λ2 )v(x, λ). 4.2. Solution of the classical Sturm–Liouville inverse spectral problem We recall first in some more detail the classical method of reconstruction of a Sturm–Liouville operator d2 S(θ, q) := − 2 + q dx subject to the boundary conditions cos θ y(0) − sin θ y 0 (0) = y(1) = 0 from its spectral data, the sequences of eigenvalues and norming constants. We assume that the potential q is real-valued and belongs to L2 (0, 1). For every λ ∈ C, we denote by y(·, λ) a solution to the equation −y 00 + qy = 2 λ y subject to the terminal conditions y(1) = 0 and y 0 (1) = λ. Then y(·, λ) has
316
Albeverio, Hryniv and Mykytyuk
IEOT
the representation Z
1
k(x, t) sin λ(t − 1) dt,
y(x, λ) = sin λ(x − 1) +
(4.3)
x
where k is the kernel of the corresponding transformation operator I + K. The kernel k has the property that, for every fixed x ∈ [0, 1), the function k(x, ·) belongs to the Sobolev space W21 (x, 1). The eigenvalues λ2n of the operator S(0, q) are then squared zeros of the characteristic function Z 1 ∆(λ) := sin λ + k(0, t) sin λ(1 − t) dt 0
and have the asymptotics ˜n, λ2n = π 2 n2 + A + λ (4.4) ˜ with A := 0 q(t) dt and an `2 -sequence (λn ). For the non-Dirichlet boundary condition at x = 0 (θ > 0) the leading term of the above asymptotics becomes π 2 (n − 1/2)2 . For the eigenvalue λ2n , we denote the norming constant αn as the squared L2 -norm of the eigenfunction y(·, λn ), i.e., Z 1 αn := |y(x, λn )|2 dx. (4.5) R1
0
Using the properties of the operator K, it is easy to prove that the αn have the form 1 α ˜n αn = + , (4.6) 2 n where the numbers α ˜ n form a sequence from `2 . Now the resolution of the identity for the operator S(θ, q) reads I = s-lim
N X
N →∞
αn−1 ·, yn yn ,
n=1
with yn := y(·, λn ). Setting sn (x) := sin λn (x − 1) and using the representation (4.3), we conclude that N h X i I = (I + K) s-lim αn−1 ·, sn sn (I + K ∗ ). N →∞
n=1
The operator in the square brackets is uniformly positive in L2 (0, 1) and has the form I + F , where F is a Hilbert–Schmidt operator with kernel f (x, y) = ϕ(2 − x − y) − ϕ(|x − y|), where ϕ(s) :=
i 1 Xh 2 cos πks − αk−1 cos λk s 2 k∈N
(4.7) (4.8)
Vol. 64 (2009)
Factorisation of non-negative Fredholm operators
317
is a function from W21 (0, 2). Setting I + L := (I + K)−1 , we get I + F = (I + L)(I + L∗ ); since I + L belongs to BI+ , by Corollary 2.4 this is a unique factorisation of I + F with factors in BI+ . Finally, we recall that the potential q of the operator S(θ, q) can be reconstructed through dl(x, x) , (4.9) dx where l is the kernel of L; it is proved in the classical inverse theory that the function l(x, x) belongs to W21 (0, 1) and thus the above formula yields a function from L2 (0, 1) as required. Summarising, we arrive at the following reconstruction algorithm: first, given the spectral data, we construct the function ϕ and the operator F , then factorise the operator I + F , call the factor I + L, and finally use the kernel l of L to determine q via (4.9). It is worth noting that any two sequences of real numbers λ2n and αn such that λ2n strictly increase and satisfy the asymptotics of (4.4) and αn are positive and satisfy (4.6), are sequences of eigenvalues and norming constants of a unique Sturm–Liouville operator S(0, q) with q ∈ L2 (0, 1). The method of finding this q is precisely the same as above. q(x) = 2
4.3. Reconstruction in the Bessel case Now assume that m ∈ N and q ∈ L2 (0, 1) is real-valued and consider the Bessel operator T (m; q) given by the differential expression d m d m m(m + 1) d2 − + +q =− +q t(m; q) := − 2 + 2 dx x dx x dx x subject to the Dirichlet boundary condition at x = 1. The differential expression t(m; q) is well defined on the set of functions y that together with their quasiderivatives y [1] := y+(m/x)y are absolutely continuous on [ε, 1] for every ε ∈ (0, 1). It is well known [1, 4, 5, 7, 21] that being considered on the domain dom T (m; q) := {y ∈ dom t(m; q) ∩ L2 (0, 1) | t(m; q)y ∈ L2 (0, 1), y(1) = 0} the operator T (m; q) becomes self-adjoint, bounded below, and has a discrete spectrum. As earlier, for a nonzero λ ∈ C, we denote by y(·, λ) a solution of the equation m(m + 1) −y 00 + y + q(x)y = λ2 y (4.10) x2 satisfying the terminal conditions y(1) = 0 and y 0 (1) = λ. The function y(x, λ) either vanishes at x = 0 or has there a pole. In the former case λ2 is an eigenvalue of T (m; q) (and thus is real) and y(·, λ) is a corresponding eigenfunction. We enumerate the eigenvalues λ21 < λ22 < . . . in increasing order and recall [4, 5, 7, 21] the asymptotic relation 2 ˜n, λ2n = π 2 n − m +A+λ (4.11) 2
318
Albeverio, Hryniv and Mykytyuk
IEOT
˜ n ). Without loss of generality we assume that with A ∈ R and an `2 -sequence (λ λ21 > 0 as otherwise we can shift the spectrum by adding a suitable constant to q. Slightly modifying the arguments of [1, Lemma 2.2], we can show that the eigenfunctions y(·, λn ) have the form y(x, λn ) = xm+1 un (x),
(4.12)
W22 (0, 1)
where un is a function from that does not vanish at x = 0. Next, we introduce the norming constants αn corresponding to λ2n via (4.5); then [1, 7] the αn have the same asymptotics as in the case m = 0. Keeping the notations of the previous subsection, we introduce the function ϕ of (4.8), the kernel f of (4.7), and the corresponding integral operator F . Then I + F = s-lim
N →∞
N X
αn−1 ·, sn sn
n=1
is non-negative but in view of the asymptotic behaviour of λn it has a non-trivial null-space of dimension [(m + 1)/2], [a] denoting the integral part of a number a. Since the system {sn }∞ n=1 forms a Riesz basis of its closed linear span and is complete in L2 (ε, 1) for every ε > 0, the support of every function in ker(I + F ) contains zero. Therefore by Theorem 3.12 there is a unique operator S+ := VP +K+ such that ∗ I + F = S+ S + ; here P is the orthogonal projector on the null-space of I +F , VP is the isometric operator introduced in Theorem 3.10, and K+ is a Hilbert–Schmidt operator in B + . Since the operator VP − I is almost Hilbert–Schmidt in the sense of Definition 3.4, it follows that S+ has the form I + L with an almost Hilbert–Schmidt operator L. The properties of the kernel l of the operator L are given in the following theorem. Theorem 4.2. Under the above assumptions, (I + L)y(x, λ) = sin λ(x − 1), i.e., I +L transforms solutions of the equation (4.10) into those for the unperturbed Sturm–Liouville equation −y 00 = λ2 y. Moreover, the kernel l is continuous if x > 0, the function l(x, x) belongs to W21 (ε, 1) for every ε > 0, and dl(x, x) m(m + 1) + q(x) = 2 . 2 x dx Proof. The proof is by induction on m ∈ N; moreover, we have to consider separately the cases of even and odd m. Even m: base of induction. We start with the case m = 2 and fix arbitrary positive λ20 and α0 such that λ20 < λ21 . By the results of Subsection 4.2 the sets {λ2n }n≥0 and {αn }n≥0 are sets of eigenvalues and norming constants for a unique Dirichlet Sturm–Liouville operator T (0, q0 ) := −
d2 + q0 , dx2
Vol. 64 (2009)
Factorisation of non-negative Fredholm operators
319
with some q0 ∈ L2 (0, 1). Put F0 := F + α0−1 (·, s0 )s0 with s0 (x) := sin λ0 (x − 1). Then I + F0 = (I + L0 )(I + L∗0 ), where I + L0 ∈ BI+ , the kernel l0 of L0 is continuous on Ω, and dl0 (x, x) . dx The operator I + L0 is the transformation operator between T (0, q0 ) and T (0, 0), i.e., if v(·, λ) is the solution of the equation `(0, q0 )v = λ2 v subject to the terminal conditions v(1) = 0 and v 0 (1) = λ, then (I + L0 )v(x, λ) = sin λ(x − 1). Next we find that I + F = (I + L0 ) I − (·, φ0 )φ0 (I + L∗0 ), q0 (x) = 2
where φ0 := α−1/2 (I + L0 )−1 s0 is an eigenfunction of the operator T (0, q0 ) of norm 1 corresponding to the eigenvalue λ20 . Therefore I − (·, φ0 )φ0 = Vφ0 Vφ∗0 (see Subsection 3.1), and, setting I +L := (I +L0 )Vφ0 , we get the required factorisation I + F = (I + L)(I + L∗ ) of I + F . The kernel l of L equals l(x, t) = l0 (x, t) − with a(x) := over,
Rx 0
φ0 (x)φ0 (t) − a(t)
Z
t
l0 (x, s) x
φ0 (s)φ0 (t) ds a(t)
|φ0 (t)|2 dt and thus it has the stated smoothness properties; more-
dl(x, x) = q0 (x) − 2 (log a)00 (x) =: q1 (x). (4.13) dx Applying Lemma 4.1, we conclude that the operator I +L transforms the solutions of the equation −y 00 + q1 y = λ2 y (4.14) satisfying the terminal conditions y(1) = 0 and y 0 (1) = λ into such solutions sin λ(x − 1) for zero potential (i.e., for q1 ≡ 0). Next we observe that the function a has the form a(x) = x3 b(x) for some function b ∈ W22 (0, 1) that is positive on [0, 1]; this follows from the behaviour of the eigenfunction φ0 at the origin and the properties of the Hardy operators, see details in [1, App. A]. Therefore, 2(log a)00 = −2 · 3/x2 + 2(log b)00 ; it follows that the function q1 has the form 2·3 q1 (x) = 2 + q˜(x) x with q˜ := q0 (x) − 2(log b)00 ∈ L2 (0, 1), and it remains to show that q˜ = q. To this end we recall that the operator Vφ0 maps isometrically L2 (0, 1) onto its range L2 (0, 1) φ0 . Thus the pre-images of the eigenfunctions v(·, λn ), n ≥ 1, of the 1/2 operator T (0, q0 ) have norm αn in L2 (0, 1), satisfy the Dirichlet condition at x = 1, and solve (4.14) with λ = λn . Therefore the operator T (2, q˜) has eigenvalues λ2n , n ≥ 1, and the corresponding norming constants are equal to αn . The direct 2
320
Albeverio, Hryniv and Mykytyuk
IEOT
spectral analysis of Bessel operators (in particular, the known asymptotics of their eigenvalues) suggests that T (2, q˜) has no other eigenvalues. By the Borg–Levinson uniqueness result [1, 4, 5], we get q˜ = q, and the case m = 2 is done. Even m: Induction step. Assume that we have already proved the theorem for all even m less than 2k and consider the case m = 2k. We again augment the spectral data {(λ2n )n∈N , (αn )n∈N } of the operator T (2k, q) by the pair (λ20 , α0 ) with λ20 < λ21 and α0 > 0. The augmented data {(λ2n )n≥0 , (αn )n≥0 } are the spectral data for a unique operator T0 := T (2k − 2, q0 ) with some q0 ∈ L2 (0, 1). We denote by F0 the operator constructed for T0 and observe that, by the induction hypothesis, I + F0 = (I + L0 )(I + L∗0 ) for some L0 ∈ BI+ . Denote by φ0 an eigenfunction of the operator T (2k − 2, q0 ) of norm 1 corresponding to the eigenvalue λ20 and satisfying the relation φ00 (1) > 0; −1/2 then (I + L0 )φ0 = α0 s0 with s0 (x) := sin λ0 (x − 1), and thus we get I + F = I + F0 − α0−1 (·, s0 )s0 = (I + L0 ) I − (·, φ0 )φ0 (I + L∗0 ). Again the required factorisation follows with I + L := (I + L0 )Vφ0 ; moreover, by the inductive assumption, the kernel l of L satisfies 2
dl0 (x, x) d a0 (x) (2k − 2)(2k − 1) dl(x, x) =2 −2 = y + q1 dx dx dx a(x) x2
with q1 := q0 − 2(log a)00 . By Lemma 4.1 and the induction assumption, I + L transforms solutions of the equation (2k − 2)(2k − 1) y + q 1 y = λ2 y x2 into sin λ(x−1). The representation (4.12) with m = 2k−2 and the properties of the Hardy operators [1, App. A] imply that a(x) = x4k−1 b(x) with some b ∈ W22 (0, 1) that is positive on (0, 1); therefore, −y 00 +
(2k − 2)(2k − 1) 2k(2k + 1) + q1 = + q˜, 2 x x2 with q˜ := q0 − 2(log b)00 ∈ L2 (0, 1). The equality q˜ = q is justified as above, using the Borg–Levinson uniqueness theorem. The proof by induction for even m is complete. Odd m. Augmenting the spectral data for the operator T (1, q), we get spectral data for a unique Sturm–Liouville operator Th (0, q0 ) with a real-valued potential q0 ∈ L2 (0, 1) and subject to the Robin–Dirichlet boundary conditions y 0 (0) − hy(0) = y(1) = 0 for some h ∈ R. Repeating the arguments used in the case m = 2, we find an operator I + L that factorises the operator I + F constructed for T (1, q) and maps solutions of equation (4.14) with q1 given by (4.13) into sin λ(x − 1). However, now φ0 does not vanish at x = 0, and thus a has a simple zero at x = 0, which results in 2 q0 − 2(log a)00 = 2 + q˜ x
Vol. 64 (2009)
Factorisation of non-negative Fredholm operators
321
with some q˜ ∈ L2 . We then justify that q˜ = q in the usual way. Finally, the induction step proceeds then as for the case of even m. 4.4. Reconstruction algorithm ∞ Assume that we are given two sequences (λ2n )∞ n=1 and (αn )n=1 of real numbers satisfying the following conditions: ˜ n ) ∈ `2 ; (i) the sequence (λ2n ) is increasing and λ2n obey (4.11) with A ∈ R and (λ (ii) the αn are positive and obey (4.6) with (˜ αn ) ∈ `2 . The results of [7,21] imply that there is a unique real-valued q ∈ L2 (0, 1) such that λ2n are all eigenvalues and αn the corresponding norming constants for the Bessel operator T (m; q). To find this q, we perform the following steps: (1) construct the integral operator F as explained in the previous subsection; (2) uniquely factorise I + F as (I + L)(I + L∗ ) with an almost Hilbert–Schmidt integral operator L ∈ FI+ with kernel l; (3) set dl(x, x) m(m + 1) − . q(x) := 2 dx x2 Theorem 4.2 implies that the function q obtained on the third step gives the required potential. We conclude with remark that similar results also hold for the Dirac operators with singular potentials appearing in the angular momentum decomposition of the radial Dirac operators in the unit ball of R3 , cf. [2,22]. All constructions and proofs can be carried over by analogy with those presented here using the results of [2,22]. Acknowledgements. The authors thank the anonymous referee for stimulating criticism and express their gratitude to Deutsche Forschungsgemeinschaft, DFG, for financial support of the project 436 UKR 113/84. The research of the second author was partially supported by the Alexander von Humboldt Foundation, which is gratefully acknowledged. The second and the third authors thank the Institute for Applied Mathematics of Bonn University for the warm hospitality.
References [1] S. Albeverio, R. Hryniv, and Ya. Mykytyuk, Inverse spectral problems for Bessel operators, J. Differential Equations 241 (2007), no. 1, 130–159. [2] S. Albeverio, R. Hryniv, and Ya. Mykytyuk, Reconstruction of radial Dirac operators, J. Math. Phys. 48 (2007), no. 4, 043501 (14 p.). [3] M. A. Barkar0 and I. Ts. Gohberg, Factorization of operators in a Banach space, Mat. Issled. 1 (1966), no. 2, 98–129 (in Russian). [4] R. Carlson, Inverse spectral theory for some singular Sturm–Liouville problems, J. Diff. Equat. 106 (1993), 121–140. [5] R. Carlson, A Borg–Levinson theorem for Bessel operators, Pacific J. Math. 177 (1997), 1–26.
322
Albeverio, Hryniv and Mykytyuk
IEOT
[6] L. D. Faddeev, The inverse problem in the quantum theory of scattering, Uspekhi Mat. Nauk 14 (1959), 57–119 (in Russian); Engl. transl. in J. Math. Phys. 4 (1963), 72–104. [7] M. G. Gasymov, Determination of a Sturm–Liouville equation with a singularity by two spectra, Dokl. Akad. Nauk SSSR 161 (1965), 274–276 (in Russian); Engl. transl. in Soviet Math. Dokl. 6 (1965), 396–399. [8] I. M. Gelfand and B. M. Levitan, On determination of a differential equation by its spectral function, Izv. AN USSR, Ser. Mat. 15 (1951), no. 4, 309–360 (in Russian); Engl. transl. in Amer. Math. Soc. Transl. (2) 1 (1955), 253–304. [9] F. Gesztesy, A complete spectral characterization of the double commutation method, J. Funct. Anal. 117 (1993), 401–446. [10] F. Gesztesy and G. Teschl, On the double commutation method, Proc. Amer. Math. Soc. 124 (1996), 1831–1840. [11] I. Gohberg and M. Krein, Theory of Volterra Operators in Hilbert Space and its Applications, Nauka Publ., Moscow, 1967 (in Russian); Engl. transl.: Amer. Math. Soc. Transl. Math. Monographs, 24, Amer. Math. Soc., Providence, RI, 1970. [12] M. G. Kre˘ın, On integral equations generating differential equations of 2nd order, Dokl. Akad. Nauk SSSR (N.S.) 97 (1954), no. 1, 21–24 (in Russian). [13] M. G. Kre˘ın, On a new method of solution of linear integral equations of first and second kinds, Dokl. Akad. Nauk SSSR (N.S.) 100 (1955), no. 3, 413–416 (in Russian). [14] V. A. Marchenko, Some questions of the theory of one-dimensional linear differential operators of the second order. I, Trudy Moskov. Mat. Obˇsˇc. 1 (1952), 327–420 (in Russian); Engl. transl. in Amer. Math. Soc. Transl. (2) 101 (1973), 1–104. [15] Ya. V. Mykytyuk, Factorization of Fredholm operators, Mat. Stud. 20 (2003), no. 2, 185–199 (in Ukrainian). [16] Ya. V. Mykytyuk, Factorization of Fredholm operators in operator algebras, Mat. Stud. 21 (2004), no. 1, 87–97 (in Ukrainian). [17] J. P¨ oschel and E. Trubowitz, Inverse Spectral Theory, Academic Press, Orlando, Florida, 1987 (Pure and Applied Math., Vol. 130). [18] M. Reed and B. Simon, Methods of Modern Mathematical Physics. II. Fourier Analysis, Self-adjointness, Academic Press, New York-London, 1975. [19] L. A. Sakhnovich, Factorization of operators in L2 (a, b), Funkt. Anal. Prilozh. 13 (1979), 40–45 (in Russian). [20] L. A. Sakhnovich, Factorization of operators, theory and applications, Ukrain. Mat. Zh. 46 (1994), no. 3, 293–304 (in Russian); Engl. transl. in Ukrainian Math. J. 46 (1994), no. 3, 304–317. [21] F. Serier, The inverse spectral problem for radial Schr¨ odinger operators on [0, 1], J. Differential Equations 235 (2007), no. 1, 101–126. [22] F. Serier, Inverse spectral problem for singular Ablowitz–Kaup–Newell–Segur operators on [0, 1], Inverse Problems 22 (2006), no. 4, 1457–1484. [23] G. Teschl, Deforming the point spectra of one-dimensional Dirac operators, Proc. Amer. Math. Soc. 126 (1998), 2873–2881. [24] L. A. Zhornitskaya and V. S. Serov, Inverse eigenvalue problems for a singular Sturm– Liouville operator on [0, 1], Inverse Problems 10 (1994), no. 4, 975–987.
Vol. 64 (2009)
Factorisation of non-negative Fredholm operators
S. Albeverio Institut f¨ ur Angewandte Mathematik Universit¨ at Bonn Wegelerstr. 6 D–53115 Bonn Germany; IZKS and SFB 611, Bonn, Germany; BiBoS, Bielefeld, Germany; CERFIM, Locarno, Switzerland and Accademia di Architettura, Mendrisio, Switzerland e-mail:
[email protected] R. Hryniv Institute for Applied Problems of Mechanics and Mathematics 3b Naukova st. 79601 Lviv Ukraine and Lviv National University, 1 Universytetska st., 79602 Lviv, Ukraine e-mail:
[email protected] Ya. Mykytyuk Lviv National University 1 Universytetska st. 79602 Lviv Ukraine e-mail:
[email protected] Submitted: May 28, 2008. Revised: May 8, 2009.
323
Integr. equ. oper. theory 64 (2009), 325–355 c 2009 Birkh¨
auser Verlag Basel/Switzerland 0378-620X/030325-31, published online June 26, 2009 DOI 10.1007/s00020-009-1692-z
Integral Equations and Operator Theory
On Positive Linear Volterra-Stieltjes Differential Systems P. H. Anh Ngoc, S. Murakami, T. Naito, J. Son Shin and Y. Nagabuchi Abstract. We first introduce the notion of positive linear Volterra-Stieltjes differential systems. Then, we give some characterizations of positive systems. An explicit criterion and a Perron-Frobenius type theorem for positive linear Volterra-Stieltjes differential systems are given. Next, we offer a new criterion for uniformly asymptotic stability of positive systems. Finally, we study stability radii of positive linear Volterra-Stieltjes differential systems. It is proved that complex, real and positive stability radius of positive linear Volterra-Stieltjes differential systems under structured perturbations coincide and can be computed by an explicit formula. The obtained results in this paper include ones established recently for positive linear Volterra integrodifferential systems [36] and for positive linear functional differential systems [32]-[35] as particular cases. Moreover, to the best of our knowledge, most of them are new. Mathematics Subject Classification (2000). Primary 45J05; Secondary 34K20, 93D09. Keywords. Linear Volterra-Stieltjes system, positive system, Perron-Frobenius theorem, stability and robust stability.
1. Introduction Roughly speaking, a dynamical system is called positive if for any nonnegative initial condition, the corresponding solution of the system is also nonnegative. In particular, a dynamical system with state space Rn is positive if any trajectory of the system starting at an initial state in the positive orthant Rn+ remains forever in Rn+ . Positive dynamical systems play an important role in the modeling of dynamical phenomena whose variables are restricted to be nonnegative, see [3], [22]. They The first author is supported by the Alexander von Humboldt Foundation.
326
Anh Ngoc, Murakami, Naito, Son Shin and Nagabuchi
IEOT
are often encountered in applications, for example, networks of reservoirs, industrial processes involving chemical reactors, heat exchangers, distillation columns, storage systems, hierarchical systems, compartmental systems used for modeling transport and accumulation phenomena of substances, etc. In the book “Introduction to Dynamic Systems: Theory, Models and Applications” [22], David G. Luenberger wrote that “the theory of positive systems is deep and elegant and yet pleasantly consistent with intuition ... . It is for positive systems, therefore, that dynamic systems theory assumes one of its most potent forms”. The mathematical theory of positive systems is based on the theory of nonnegative matrices founded by Perron and Frobenius. As references we mention [3], [6], [22]. In the last few years, problems of positive systems have attracted a lot of attention from researchers, see e.g. [2], [6], [10]–[11], [15]–[16], [36]–[35], [41]–[43]. In the literature, there are some criteria for familiar positive linear systems such as positive linear time-invariant differential (difference) systems, positive linear time delay systems of retarded type. For example, it is well-known that a linear time-delay differential system of the form x(t) ˙ = A0 x(t) + A1 x(t − h), t ≥ 0, is positive if and only if A0 is a Metzler matrix and A1 is a nonnegative matrix and a linear discrete time system of the form x(k + 1) = A0 x(k) + A1 x(k − h), k ∈ N, is positive if and only if A0 , A1 are nonnegative matrices, see e.g. [28], [29], [43]. Recently, we developed an advanced theory of positive systems for some new classes of linear systems such as: positive linear functional (difference) differential system, see e.g. [32]–[33], [35]; positive linear Volterra integro-differential system [26], [36] and positive linear Volterra integral system [27]. More precisely, we first introduced various notions of positive system for these classes of systems. Then, we offered explicit criteria for them in terms of positivity of system matrices. Furthermore, we gave some extensions of the classical Perron-Frobenius theorems which are important tools for analyzing stability and robust stability of positive systems. Finally, we obtained new criteria for asymptotic stability of the above classes of positive systems. For example, in recent paper [35], we showed that a linear functional differential system of the form Z
0
x(t) ˙ = Ax(t) +
d[η(θ)]x(t + θ),
x(t) ∈ Rn ,
t ≥ 0,
(1)
−h
is positive (it means that its solution semi-group is positive) if and only if A is a Metzler matrix and η(·) is an increasing matrix function on [−h, 0]. Then a positive system of the form (1) is exponentially stable if and only if the spectral abscissa of the matrix A + η(0) is strictly less than zero. Moreover, stability radius problems of positive linear functional differential systems (1) under multi-perturbations and affine perturbations have been studied in [32] where some explicit formulae for these stability radii were given. Some similar results for positive linear Volterra integro-differential systems [26], [36] and for positive linear Volterra integral systems [27] have just been given in only recent time.
Vol. 64 (2009) On Positive Linear Volterra-Stieltjes Differential Systems
327
In the present paper, we continue to introduce the notion of positive linear Volterra-Stieltjes differential systems. Then, we give characterizations of these positive systems. An explicit criterion and a Perron-Frobenius type theorem for positive linear Volterra-Stieltjes differential systems are presented. Finally, we study stability and robust stability of positive linear Volterra-Stieltjes differential systems. The results of this paper include ones established earlier for positive linear Volterra integro-differential systems [36] and for positive linear functional differential systems [32]–[35] as particular cases. The organization of the paper is as follows. In the next section, we summarize some notations and preliminary results which will be used in what follows. In Section 3, we first introduce the notion of positive linear Volterra-Stieltjes differential systems and then offer an explicit criterion for these positive systems. As direct consequences, we get back the criteria for positive linear Volterra integro-differential systems [36] and for positive linear functional differential systems [35]. In Section 4, a new Perron-Frobenius type theorem for positive linear Volterra-Stieltjes differential systems is given, which includes those for positive linear Volterra integro-differential systems [36], positive linear functional differential systems [33] and for positive quasi-polynomial matrices [34] as particular cases. In Section 5, we offer an explicit criterion for uniformly asymptotic stability of positive linear Volterra-Stieltjes differential systems. Finally, we study stability radii of positive linear Volterra-Stieltjes differential systems. It is proved that complex, real and positive stability radius of positive systems under structured perturbations coincide and can be computed by an explicit formula. Some examples are given to illustrate the obtained results. Section 6 gives a brief summary of the obtained results of this paper and the last section are appendices which include proofs of some technical lemmas utilized in the previous sections
2. Preliminaries In this section we shall define some notations and recall some well-known results which will be used in the subsequent sections. Let K = C or R where C and R denote the sets of all complex and all real numbers, respectively. For an integer l, q ≥ 1, Kl denotes the l−dimensional vector space over K, (Kl )∗ is its dual and Kl×q stands for the set of all l × q-matrices with entries in K. Inequalities between real matrices or vectors will be understood componentwise, i.e. for two real matrices A = (aij ) and B = (bij ) in Rl×q , we write A ≥ B if and only if aij ≥ bij for i = 1, · · · , l, j = 1, · · · , q. In particular, if aij > bij for i = 1, · · · , l, j = 1, · · · , q, then we write A B instead of A ≥ B. We denote by Rl×q + the set of all nonnegative matrices A ≥ 0. Similar notations are adopted for vectors. For x ∈ Kn and P ∈ Kl×q we define |x| = (|xi |) and |P | = (|pij |). For any matrix A ∈ Kn×n the spectral abscissa of A is denoted by µ(A) = max{<λ; λ ∈ σ(A)}, where σ(A) := {s ∈ C; det(sIn − A) = 0} is the spectrum of A. A matrix A ∈ Rn×n is called a Metzler matrix if all off-diagonal elements of A are nonnegative.
328
Anh Ngoc, Murakami, Naito, Son Shin and Nagabuchi
IEOT
A norm k · k on Kn is said to be monotonic if kxk ≤ kyk whenever |x| ≤ |y|, x, y ∈ Kn . Every p-norm on Kn , 1 ≤ p ≤ ∞, is monotonic. Throughout the paper, if otherwise not stated, the norm of a matrix P ∈ Kl×q is understood as its operator norm associated with a given pair of monotonic vector norms on Kl and Kq , that is kP k = max{kP yk; kyk = 1}. We note that the operator norm is in general not monotonic norm on Kl×q even if Kl , Kq are provided with monotonic norms. However, such monotonicity holds for nonnegative matrices. Moreover, we have (see, e.g. [42]) P ∈ Kl×q , Q ∈ Rl×q + , |P | ≤ Q
⇒
kP k ≤ k |P | k ≤ kQk.
The following theorem summarizes some existing results on properties of Metzler matrices which will be used in what follows. Theorem 2.1. [42] Suppose that A ∈ Rn×n is a Metzler matrix. Then: (i) (Perron-Frobenius) µ(A) is an eigenvalue of A and there exists a nonnegative eigenvector x ≥ 0, x 6= 0 such that Ax = µ(A)x. (ii) Given α ∈ R, there exists a nonzero vector x ≥ 0 such that Ax ≥ αx if and only if µ(A) ≥ α. (iii) (tIn − A)−1 exists and is nonnegative if and only if t > µ(A). n×n (iv) Given B ∈ Rn×n . Then + , C ∈C |C| ≤ B
=⇒
µ(A + C) ≤ µ(A + B).
Let Km×n be endowed with the norm k · k and C([α, β], Km×n ) be the Banach space of all continuous functions on [α, β] with values in Km×n normed by the maximum norm kφk = maxθ∈[α,β] kφ(θ)k. For φ ∈ C([α, β], Rm×n ), the notation φ(·) ≥ 0 (or simply φ ≥ 0) means that φ(θ) ≥ 0 for every θ ∈ [α, β]. To make the presentation self-contained we present here some basic facts on vector functions of bounded variation and relative knowledge. Let J be an interval of R. A matrix function η(·) : J → Rl×q is called a increasing matrix function if η(θ2 ) ≥ η(θ1 ) for θ1 , θ2 ∈ J, θ1 < θ2 . A matrix function η(·) : [α, β] → Km×n is said to be of bounded variation if X Var(η; α, β) := sup kη(θk ) − η(θk−1 )k < +∞, P [α,β] k
where the supremum is taken over the set of all finite partitions of the interval [α, β]. The set BV ([α, β], Km×n ) of all matrix functions η(·) of bounded variation on [α, β] satisfying η(α) = 0 is a Banach space endowed with the norm kηk = Var(η; α, β). Let η(·) : R+ → Kl×q be given. For T > 0, we define Vη (T ) := sup
N X
kη(θk ) − η(θk−1 )k,
k=1
where the supremum is taken over all N and over all choices of θk such that 0 ≤ θ1 < θ2 < ... < θN = T. In general, 0 ≤ Vη (T1 ) ≤ Vη (T2 ) ≤ ∞, 0 < T1 < T2 .
Vol. 64 (2009) On Positive Linear Volterra-Stieltjes Differential Systems
329
If the limit limT →+∞ Vη (T ) exists and is finite then we say that η(·) is of bounded variation on R+ and Vη := limT →+∞ Vη (T ) is called the total variation of η(·). R +∞ One often writes 0 |dη(s)| instead of Vη . Given η(·) ∈ BV ([α, β], Km×n ) then for any γ ∈ C([α, β], K) and φ ∈ C([α, β], Kn ), Rβ Rβ the integrals α γ(θ)d[η(θ)] and α d[η(θ)]φ(θ) exist and are defined respectively as Pp Pp the limits of S1 (P ) := k=1 γ(ζk )(η(θk ) − η(θk−1 )) and S2 (P ) := k=1 (η(θk ) − η(θk−1 ))φ(ζk ) as d(P ) := maxk |θk − θk−1 | → 0, where P = {θ1 = α ≤ θ2 ≤ · · · ≤ θp = β} is any finite partition of the interval [α, β] and ζk ∈ [θk−1 , θk ]. It is immediate from the definition that
Z β
γ(θ)d[η(θ)]
≤ max |γ(θ)| kηk,
Z
α β
α
θ∈[α,β]
d[η(θ)]φ(θ)
≤ max kφ(θ)k kηk. θ∈[α,β]
Let L : C([α, β], Kn ) → Kn be a linear bounded operator. Then, by the Riesz representation theorem, there exists a unique matrix function η(·) ∈ BV ([α, β], Kn×n ) which is continuous from the right (or briefly c.f.r.) on (α, β) such that Z β Lφ = d[η(θ)]φ(θ), ∀φ ∈ C([α, β], Kn ). α
In particular, an operator L : C([α, β], Rn ) → Rn is called positive if Lφ ≥ 0, for every φ ∈ C([α, β], Rn ), φ ≥ 0. Finally, the following spaces will be used frequently in the subsequent sections N BV ([α, β], Kl×q ) := {η ∈ BV ([α, β], Kl×q ), η(α) = 0, η is c.f.r. on [α, β]}; l×q N BV (R+ , K ) := δ(·) : R+ → Kl×q / δ(·) is c.f.r. on R+ , δ(0) = 0, Z +∞ and kδk := |dδ(s)| < +∞ . 0
3. Positive linear Volterra-Stieltjes differential systems Consider a linear Volterra-Stieltjes differential system of the form Z t x(t) ˙ = Ax(t) + d[B(s)]x(t − s), for a.a. t ∈ R+ ,
(2)
0
where A ∈ Rn×n is a given matrix and B(·) : R+ → Rn×n is a given matrix function of locally bounded variation on R+ . Furthermore, we always assume that B(·) is normalized to be right-continuous on R+ and vanishes at 0. From the theory of integro-differential systems, it is well-known that there exists a unique locally absolutely continuous matrix function R(·) : R+ → Rn×n
330
Anh Ngoc, Murakami, Naito, Son Shin and Nagabuchi
IEOT
such that ˙ R(t) = AR(t) +
t
Z
d[B(s)]R(t − s),
a.a. t ∈ R+ ,
R(0) = In .
(3)
0
Then R(·) is called the resolvent of (2). Moreover, for given f ∈ L1loc (R+ , Rn ), the following nonhomogeneous system Z t x(t) ˙ = Ax(t) + d[B(s)]x(t − s) + f (t), a.a. t ∈ R+ , (4) 0
has a unique locally absolutely continuous solution x(·) satisfying the initial condition x(0) = x0 ∈ Rn and it is given by the variation of constants formula Z t x(t) = R(t)x0 + R(t − s)f (s)ds, t ∈ R+ , (5) 0
see e.g. [8, p. 81]. Definition 3.1. Let σ ∈ R+ and φ ∈ C([0, σ], Rn ). A vector function x(·) : R+ → Rn is called a solution of (2) through (σ, φ) if x(·) is absolutely continuous on any compact subinterval of [σ, +∞) and satisfies (2) for almost all t ∈ [σ, +∞) and x(t) = φ(t), ∀t ∈ [0, σ]. We denote it by x(· ; σ, φ). Remark 3.2. By the fact mentioned above on the solution of the nonhomogeneous system (4) and the variation of constants formula (5), it is easy to check that for a fixed σ ∈ R+ and a given φ ∈ C([0, σ], Rn ), there exists a unique solution of (2) through (σ, φ) and it is given by Z u+σ Z t x(t+σ; σ, φ) = R(t)φ(σ)+ R(t−u) d[B(s)]φ(u+σ−s) du, t ∈ R+ . (6) 0
In the above, it is understood that
u
R u+σ u
d[B(s)]φ(u + σ − s) = 0 when σ = 0.
Definition 3.3. We say that (2) is positive, if for every σ ≥ 0 and every φ ∈ C([0, σ], Rn ), φ ≥ 0, the corresponding solution x(· ; σ, φ) is also nonnegative, that is x(t; σ, φ) ≥ 0, ∀t ≥ σ. Remark 3.4. Roughly speaking, (2) is positive if for any “input” φ ∈ C([0, σ], Rn ) being nonnegative, the corresponding “output” x(· ; σ, φ), is also nonnegative. Furthermore, we will see below that the notion of positive linear Volterra-Stieltjes differential system is an extension of that of linear functional differential systems. Proposition 3.5. If A ∈ Rn×n is a Metzler matrix and B(·) is an increasing matrix function on R+ then for every x0 ∈ Rn+ , the solution x(· ; 0, x0 ) of (2) is nonnegative. In particular, we have R(·) ≥ 0. Proof. Let x0 ∈ Rn+ , and x(t) := x(t; 0, x0 ), t ≥ 0. Then x(·) satisfies Z u Z t At A(t−u) x(t) = e x0 + e d[B(s)]x(u − s) du, t ≥ 0. 0
0
Vol. 64 (2009) On Positive Linear Volterra-Stieltjes Differential Systems
331
Set f (t) := eAt x0 , t ≥ 0. Fix σ > 0 and consider the operator T defined by C([0, σ], Rn ) −→ C([0, σ], Rn ) Z u Z t d[B(s)]φ(u − s) du, eA(t−u) φ 7→ T φ(t) := f (t) + T :
t ∈ [0, σ].
0
0
By induction, it is easy to show that for φ1 , φ2 ∈ C([0, σ], Rn ) and k ∈ N, we have kT k φ2 (t) − T k φ1 (t)k ≤
M k tk kφ2 − φ1 k, ∀t ∈ [0, σ], k!
where M := M1 M2 and M1 := maxs∈[0,σ] keAs k, M2 := Var(B; 0, σ). This implies that T k is a contraction for k ∈ N sufficiently large. Fix k0 ∈ N sufficiently large, by the contraction mapping principal, there exists a unique solution of the equation x = T x in C([0, σ], Rn ). Moreover, it is well-known that the sequence (T mk0 φ0 )m∈N , with an arbitrary φ0 ∈ C([0, σ], Rn ) converges to this solution in the space C([0, σ], Rn ). Choose φ0 ∈ C([0, σ], Rn ), φ0 ≥ 0. Since A ∈ Rn×n is a At Metzler matrix, it follows R u that e ≥ 0, ∀t ≥ 0. Moreover, since B(·) is increasing, it is easy to see that 0 d[B(s)]φ(u − s) ≥ 0 for every φ ∈ C([0, u], Rn ), φ ≥ 0. Thus, T mk0 φ0 ≥ 0, ∀m ∈ N and we deduce that x(t) := x(t; 0, x0 ) ≥ 0, ∀t ∈ [0, σ]. Since σ > 0 is arbitrary, we conclude that x(t) ≥ 0, ∀t ≥ 0. To prove a criterion for positive linear Volterra-Stieltjes differential systems, we need the two following auxiliary lemmas whose proofs are given in Appendices A and B, respectively. Lemma 3.6. Assume that B(·) ∈ N BV (R+ , Rn×n ), that is Z +∞ |dB(t)| < +∞.
(7)
0
Then the resolvent R(·) of (2) is of exponential order. Lemma 3.7. Let σ > 0 and suppose the linear operator L is defined by Z σ n n L : C([0, σ], R ) → R , φ 7→ Lφ = d[η(θ)]φ(θ), 0 n×n
where η ∈ N BV ([0, σ], R ). Then L is a positive operator if and only if η is an increasing matrix function. Let h : [0, +∞) → R. Then the Laplace transform of h is formally defined to be Z +∞ ˆ h(z) := e−zt h(t)dt. 0
R +∞
ˆ If β ∈ R and 0 e |h(t)|dt < +∞, then h(z) exists for z ∈ C,
β}. If ˆ := (dˆij ). D(t) = (dij (t)) is a matrix function, then we define D −βt
332
Anh Ngoc, Murakami, Naito, Son Shin and Nagabuchi
IEOT
In the remainder of this section, we assume that (7) holds true. Then, the Laplace-Stieltjes transform of B(·) is defined by Z +∞ ˜ B(z) := e−zs dB(s). 0
which is well-defined for every z ∈ C,
0
R u+σ Since B(·) is increasing and φ ≥ 0, it follows that u d[B(s)]φ(u + σ − s) ≥ 0, ∀u ≥ 0. By this fact and R(·) ≥ 0, (8) implies that x(t + σ) ≥ 0, ∀t ≥ 0. (The “only if” part) Assume that (2) is positive. Let σ > 0 and let φ ∈ C([0, σ], Rn ) satisfy φ(σ) = 0. Set x(t) := x(t; σ, φ), t ≥ σ. Suppose the sequence (tk )k , tk ∈ [σ, σ + 1/k] satisfies Z tk x(t ˙ k ) = Ax(tk ) + d[B(s)]x(tk − s). (9) 0
Then, we have
Z tk
Z σ
d[B(s)]x(t − s) − d[B(s)]φ(σ − s) k
0 0
Z tk
Z σ
+ d[B(s)]x(t − s) d[B(s)](x(t − s) − x(σ − s)) ≤ k k
0
σ
≤ Var(B; 0, σ) sup kx(tk − s) − x(σ − s)k + Var(B; σ, tk )L, s∈[0,σ]
for some positive number L. As x(·) is uniformly continuous on the interval [0, σ+1] and B(·) is continuous from the right at σ, it is easy to see that Z tk Z σ d[B(s)]x(tk − s) → d[B(s)]φ(σ − s) as k → +∞. 0
0
It follows that
Z k→+∞
σ
d[B(s)]φ(σ − s).
lim x(t ˙ k) =
(10)
0
Let B(·) = (bij (·)). Using this fact, we prove that bij (·) is increasing on R+ for every i, j ∈ {1, 2, ..., n}. To do so, let ψ ∈ C([0, σ], R), ψ ≥ 0, ψ(σ) = 0. Fix i0 ∈ {1, 2, ..., n} and let us define φ := (φ1 , ..., φn )T ∈ C([0, σ], Rn ), where φi (·) = 0 if i 6= i0 otherwise φi = ψ. Set x(t) := x(t; σ, φ) = (x1 (t), x2 (t), ..., xn (t))T ≥ 0, ∀t ≥ σ. Fix k ∈ N. Since x1 (·) is absolutely continuous on [σ, σ + 1/k] and
Vol. 64 (2009) On Positive Linear Volterra-Stieltjes Differential Systems
333
x1 (·) ≥ 0, x1 (σ) = 0, there exists tk ∈ [σ, σ + 1/k] such that x(·) satisfies (2) at tk and x˙ 1 (tk ) ≥ 0. In particular, R σ(9) holds true. Therefore, we get (10). In particular, we have limk→+∞ x˙ 1 (tk ) = 0 ψ(σ − s)d[b1i0 (s)] ≥ 0. Thus, the linear functional defined by Z σ L : C([0, σ], R) → R, ψ 7→ Lψ := ψ(σ − s)d[b1i0 (s)], 0
is positive. Taking into account Lemma 3.7 and Remark 7.1, we conclude that b1i0 (·) is increasing on [0, σ). Since σ > 0 is arbitrary, b1i0 (·) is increasing on R+ . By a similar way, we can show that bij (·) is increasing on R+ for any i, j ∈ {1, 2, ..., n}. We now show that A is a Metzler matrix. By Lemma 3.6, R(·) is of exponential order. Taking the Laplace transforms on both sides of (3), we get [sIn − A − ˜ ˆ B(s)] R(s) = R(0) = In , for s ∈ R sufficiently large. By Proposition 3.5, R(t) ≥ −1 ˆ ˜ 0, ∀t ≥ 0. It follows that R(s) = sIn − A − B(s) ≥ 0, for s ∈ R sufficiently large. Let A = (aij ) and assume on the contrary that ai0 j0 < 0 for some i0 6= j0 . ˜ It follows from the assumption (7) that B(s) → 0, as s → +∞. Therefore, we can represent −1 −1 ˜ ˜ sIn − A − B(s) = s−1 In − s−1 A + B(s) +∞ X k ˜ ˜ = s−1 In + s−2 A + B(s) + s−(k+1) A + B(s) , k=2
for s > 0 sufficiently large. We thus get, +∞ k X ˜ ˜ s−(k−1) A + B(s) sIn + A + B(s) + ≥0
(11)
k=2
k P+∞ ˜ for s > 0 sufficiently large. Note that lims→+∞ k=2 s−(k−1) A + B(s) = 0. Then, it follows from (11) that the entry bi0 j0 of the matrix on the left-hand side of (11) is negative for s > 0 sufficiently large. This is a contradiction. Hence, A must be a Metzler matrix. Corollary 3.9. Let A ∈ Rn×n be a given matrix and let C(·) : R+ → Rn×n be a given continuous matrix function. Assume that Z +∞ kC(s)kds < +∞. (12) 0
Then, a linear Volterra integro-differential system of convolution type Z t x(t) ˙ = Ax(t) + C(t − s)x(s)ds, t ∈ R+ ,
(13)
0
is positive if and only if A ∈ Rn×n is a Metzler matrix and C(t) ∈ Rn×n + , ∀t ∈ R+ . Proof. First, we note that (13) can be rewritten in the form (2) with B(t) = Rt C(s)ds, t ≥ 0. Furthermore, (12) implies that (7) holds true. The conclusion of 0 the corollary now follows directly from Theorem 3.8.
334
Anh Ngoc, Murakami, Naito, Son Shin and Nagabuchi
Next, we consider a linear functional differential system of the form Z h d[η(s)]x(t − s), t ≥ h, x(t) ˙ = Ax(t) +
IEOT
(14)
0
where A ∈ Rn×n and η(·) ∈ N BV ([0, h], Rn×n ) are given. It is well-known that for an initial function φ ∈ C([0, h], Rn ), the linear functional differential system (14) has a unique solution x(·; φ) satisfying the initial condition x(t) = φ(t), t ∈ [0, h]. (15) Definition 3.10. The system (14) is called positive if for every nonnegative initial function φ ∈ C([0, h], Rn ), the unique solution of (14)–(15) x(· ; φ), is also nonnegative. Corollary 3.11. The system (14) is positive if and only if A ∈ Rn×n is a Metzler matrix and η(·) is an increasing matrix function on [0, h]. Proof. Let A ∈ Rn×n be a Metzler matrix and η(·) be an increasing matrix function on [0, h]. We now consider a linear Volterra-Stieltjes differential system of the form (2) where the matrix function B(·) is defined by ( η(s) if s ∈ [0, h), B(s) := η(h) if s ∈ [h, +∞). It is easy to see that (2) now coincides with (14) on the interval [h, +∞). Since B(·) is increasing on R+ and A ∈ Rn×n is a Metzler matrix, it follows that (2) is positive. Therefore, the solution x(· ; φ) is nonnegative whenever φ(·) is nonnegative. Conversely, if (14) is positive then by a similar argument as in the last part of the proof of Theorem 3.8, we can show that A ∈ Rn×n is a Metzler matrix and η(·) is an increasing matrix function on [0, h]. Remark 3.12. Corollary 3.9 and Corollary 3.11 are the main results of [36] and of [35], respectively, which have been given by ourselves in very recent time.
4. Perron-Frobenius type theorems for positive linear systems It is well-known that Perron-Frobenius type theorems are principal tools for analysis of stability and robust stability of positive linear time-invariant systems. To our knowledge, there is a large number of extensions of the classical Perron-Frobenius theorems, see e.g. [1], [7], [18], [30], [33], [34], [40] and the references therein. Recall that a linear time-invariant differential system of the form x(t) ˙ = Ax(t), t ≥ 0 is positive if and only if the system matrix A ∈ Rn×n is a Metzler matrix. Therefore, the classical Perron-Frobenius theorem (Theorem 2.1) can be seen as the Perron-Frobenius theorem for the class of these positive systems. From this dynamic point of view, we recently presented a series of extensions of the classical Perron-Frobenius theorem such as: Perron-Frobenius theorem for positive linear higher order difference systems [30], Perron-Frobenius theorem for positive linear
Vol. 64 (2009) On Positive Linear Volterra-Stieltjes Differential Systems
335
time-delay systems [34], Perron-Frobenius theorem for positive linear functional differential systems [33], Perron-Frobenius theorem for positive linear Volterra systems [27], [36]. In this section, we first give a new Perron-Frobenius type theorem for positive linear Volterra-Stieltjes differential systems of the form (2). Then, as direct consequences, we get back some variations of the classical Perron-Frobenius theorem which have just been mentioned in the above. Let us define a formal formula Z +∞ ˜ ∆(z) := zIn − A − B(z) = zIn − A − e−zt dB(t). (16) 0
Set +∞
Z µ A, B(·) := sup
−
e
|dB(t)| < +∞, det ∆(z) = 0 ,
0
where by convention, µ A, B(·) := −∞ if
Z z∈C:
+∞
e−
= ∅.
0
Then, µ(A, B(·)) is called spectral abscissa of the Volterra system (2). It is important to note that if B(t) = 0, ∀t ≥ 0 then µ(A, B(·)) coincides with the spectral abscissa µ(A) of the matrix A. Theorem 4.1. Suppose A ∈ Rn×n is a Metzler matrix and B(·) is an increasing R +∞ matrix function on R+ . Let β := inf γ ∈ R : 0 e−γt |dB(t)| < +∞ and assume that β < +∞, α ∈ (β, +∞). If µ∗ := µ A, B(·) > −∞ then (i) (Perron-Frobenius theorem for positive linear Volterra-Stieltjes differential systems) µ∗ is a root of the characteristic equation, that is det ∆(µ∗ ) = 0. Moreover, there exists a vector x ≥ 0, x 6= 0 such that Z +∞ −µ∗ t A+ e dB(t) x = µ∗ x, 0
R +∞ (ii) there exists a nonzero vector x ≥ 0 such that A + 0 e−αt dB(t) x ≥ αx if and only if µ∗ ≥ α, −1 R +∞ (iii) the matrix ∆(α)−1 = αIn −A− 0 e−αt dB(t) exists and is nonnegative if and only if α > µ∗ . Proof. First, we show that µ∗ < +∞. To do this, we first assume that β > −∞ and det ∆(s) = 0 for some s ∈ C, <s ≥ β + 1. This implies that <s ≤ µ(A + R +∞ −st e dB(t)). Since B(·) is increasing on R+ , it follows that 0 Z +∞ Z +∞ Z +∞ −st −<st e dB(t) ≤ e dB(t) ≤ e−(β+1)t dB(t). 0
0
0
336
Anh Ngoc, Murakami, Naito, Son Shin and Nagabuchi
IEOT
Since A ∈ Rn×n is a Metzler matrix, by Theorem 2.1 (iv), Z +∞ Z +∞ −st −(β+1)t µ A+ e dB(t) ≤ µ A + e dB(t) . 0
0
Note that if det ∆(s) = 0 for some s ∈ C then Z +∞ e−(β+1)t dB(t) . <s ≤ max β + 1, µ A + 0
R +∞
−(β+1)t
Thus, µ∗ ≤ max{β + 1, µ(A + 0 e dB(t))}. In case of β = −∞, the proof is similar to the above. Next, we prove that Z +∞ e−µ∗ t dB(t) . (17) µ∗ ≤ µ A + 0
In fact, by the assumption µ∗ > −∞, there exists s0 ∈ C such that det ∆(s0 ) = 0, β ≤ <s0 ≤ µ∗ . If <s0 = µ∗ then using Theorem 2.1 (iv) again, we get (17). If β ≤ <s0 < µ∗ then there exists a sequence (sk )k such that det ∆(sk ) = 0, β < <sk < µ∗ , ∀k ∈ N and <sk → µ∗ as k → +∞. Then by Theorem 2.1 (iv), we get Z +∞ <sk ≤ µ A + e−<sk t dB(t) . (18) 0
Letting k → +∞ in (18), we also get (17). We now consider the continuous real function given by Z +∞ f (θ) := θ − µ A + e−θt dB(t) , 0
R +∞
−βt
where θ ∈ [β, +∞) if 0 e |dB(t)| < +∞, otherwise θ ∈ (β, +∞). By (17), f (µ∗ ) ≤ 0. Assume that f (µ∗ ) < 0. Since, clearly, limθ→+∞ f (θ) = +∞, we derive R +∞ that f (θ0 ) = 0, for some θ0 > µ∗ . This gives θ0 = µ A + 0 e−θ0 t dB(t) . By R +∞ −θ t Theorem 2.1(i), it implies that det(θ0 In − A − 0 e 0 dB(t)) = 0. However, this conflicts with the definition of µ∗ . Thus f (µ∗ ) = 0, or equivalently, µ∗ = R +∞ µ A0 + 0 e−µ∗ t dB(t) . Then, (i) now follows from Theorem 2.1(i). Moreover, Z +∞ Z +∞ µ A+ e−θ2 t dB(t) ≤ µ A + e−θ1 t dB(t) , β < θ1 ≤ θ2 , 0
0
by Theorem 2.1(iv). Therefore, f is strictly increasing on (β, +∞). Moreover, f (µ∗ ) = 0. Now, it is easy to see that (ii), (iii) follows from Theorem 2.1(ii), Theorem 2.1(iii), respectively. The following theorems are seen as Perron-Frobenius theorems for positive linear Volterra integro-differential systems and for positive linear functional differential systems, respectively. The proofs of them are straightforward from Theorem 4.1.
Vol. 64 (2009) On Positive Linear Volterra-Stieltjes Differential Systems
337
Theorem 4.2. Suppose A ∈ Rn×n is a Metzler matrix and C(·) : R+ → Rn×n is a + continuous matrix function. Let Z +∞ β := inf γ ∈ R : e−γt kC(t)kdt < +∞ 0
and Z µ0 := sup −∞ then
+∞ −γt
e
kC(t)kdt < +∞, det ∆0 (z) = 0 ,
0 R +∞ −zt e C(t)dt. 0
Assume that β < +∞, α ∈ (β, +∞).
(i) (Perron-Frobenius theorem for positive linear Volterra integro-differential systems) µ0 is a root of the characteristic equation, that is det ∆0 (µ0 ) = 0. Moreover, there exists a vector x ≥ 0, x 6= 0 such that Z +∞ e−µ0 t C(t)dt x = µ0 x, A+ 0
R +∞ (ii) there exists a nonzero vector x ≥ 0 such that A + 0 e−αt C(t)dt x ≥ αx if and only if µ0 ≥ α, −1 R +∞ (iii) the matrix ∆0 (α)−1 = αIn − A − 0 e−αt C(t)dt exists and is nonnegative if and only if α > µ0 . Theorem 4.3. Let the linear functional differential equation (14) be positive. Set Rh µ1 := sup{
(ii) Given α ∈ R, there exists a nonzero vector x ≥ 0 such that ∆1 (α)x ≤ 0 if and only if µ1 ≥ α. (iii) ∆1 (t)−1 exists and is nonnegative if and only if t > µ1 . We now consider a quasi-polynomial matrix of the form Q(z) := zIn − A0 − e−h1 z A1 − ... − e−hm z Am ,
z ∈ C,
(19)
where Ai ∈ Rn×n , i ∈ {0, 1, 2, ..., m} are given matrices and 0 < h1 < h1 < ... < hm are given positive numbers. Let us denote µ Q(·) := sup
338
Anh Ngoc, Murakami, Naito, Son Shin and Nagabuchi
IEOT
a linear time delay system of the form x(t) ˙ = A0 x(t) + A1 x(t − h1 ) + ... + Am x(t − hm ),
t ≥ 0.
(20)
Then the quasi-polynomial matrix (19) is said to be positive if (20) is positive. That is, for any nonnegative initial function φ ∈ C([−hm , 0], Rn ), the unique solution of (20) satisfying the initial condition x(t) = φ(t), t ∈ [−hm , 0, ] is also nonnegative. Furthermore, it is shown that the quasi-polynomial matrix (19) is positive if and only if A0 ∈ Rn×n is a Metzler matrix and Ai ∈ Rn×n , i ∈ {1, 2, ..., m} are nonnegative matrices, see e.g. [35]. The following result is seen as a Perron-Frobenius theorem for positive quasipolynomial matrices of the form (19). Theorem 4.4. Let the quasi-polynomial matrix (19) be positive and α ∈ R be given. Then (i) (Perron-Frobenius theorem for positive quasi-polynomial matrices) µq := µ Q(·) is a root of the characteristic equation, that is det Q(µq ) = 0. Moreover, there exists a vector xq ≥ 0, xq 6= 0 such that Q(µq )xq = 0, (ii) there exists a nonzero vector x ≥ 0 such that Q(α)x ≤ 0 if and only if µq ≥ α. (iii) the matrix Q(α)−1 exists and is nonnegative if and only if α > µq , Proof. Let us consider the step function B(·) : R+ 0 if if A1 B(t) := A1 + A2 if . . . if A + A + · · · + A if 1 2 m
→ Rn×n defined by t ∈ [0, h1 ), t ∈ [h1 , h2 ), t ∈ [h2 , h3 ), ..., t ∈ [hm , +∞).
Then, the matrix function ∆(·) defined by (16) now becomes the polynomial matrix Q(·). Finally, Theorem 4.4 directly follows from Theorem 4.1. This completes the proof. Remark 4.5. Theorems 4.2, 4.3, 4.4 have been found recently by ourselves, see [36], [33] and [34].
5. Stability and robust stability of positive linear Volterra-Stieltjes differential systems 5.1. An explicit criterion for uniformly asymptotic stability of positive linear Volterra-Stieltjes differential systems In this subsection, we offer a new and novel criterion for uniformly asymptotic stability of positive linear Volterra-Stieltjes differential systems of the form (2). First, we give some definitions on stability of Volterra-Stieltjes differential systems.
Vol. 64 (2009) On Positive Linear Volterra-Stieltjes Differential Systems
339
Definition 5.1. The zero solution of (2) is said to be uniformly stable (US) if for each > 0, there exists δ() > 0 such that φ ∈ C([0, σ], Rn ), kφk < δ ⇒ kx(t, σ, φ)k < ,
∀t ≥ σ.
Definition 5.2. The zero solution of (2) is said to be uniformly asymptotically stable (UAS) if it is US and if there exists δ0 > 0 such that ∀ > 0, ∃T () > 0 : φ ∈ C([0, σ], Rn ), kφk < δ0 ⇒ kx(t, σ, φ)k < ,
∀t ≥ σ + T ().
If the zero solution of (2) is US (UAS) then we say that (2) is US (UAS), respectively. The following theorem is a generalization of the Grossman and Miller’s result [9] to Volterra-Stieltjes differential systems of the form (2). Theorem 5.3. Let (7) hold true. Then the following statements are equivalent R +∞ (i) det ∆(z) 6= 0, ∀z ∈ C,
v
Hence we get Z v+σ kx(t + σ; σ, φ)k ≤ kR(t)kkφk + kφk kR(t − v)k |dB(s)| dv 0 v Z +∞ ≤N 1+ |dB(s)| kφk, t ≥ 0, Z
t
0
which shows that (2) is US. Likewise, we get Z Z t kx(t + σ; σ, φ)k ≤ kR(t)kkφk + kφk kR(t − v)k 0
Rt
+∞
|dB(s)| dv.
v
R +∞ Observe that R(·) ∈ L1 (R+ , Rn×n ) and 0 kR(t − v)k( v |dB(s)|)dv → 0 as R +∞ t → +∞ because of v |dB(s)| → 0 as v → +∞. This yields that (2) is UAS. Next we will prove that (iii) implies (i). Assume that (2) is UAS. Then, there exists δ0 > 0 such that for any > 0, ∃ T () > 0 : kx(t, 0, x0 )k = kR(t)x0 k < , ∀t > T (), whenever kx0 k < δ0 . It follows that limt→+∞ kR(t)k = 0. Given > 0 with < 1/2. Since (2) is UAS and limt→+∞ kR(t)k = 0, there exist constants K and T1 () > 0 such that kx(t + σ, σ, φ) − R(t)φ(σ)k ≤ K if t ≥ 0,
340
Anh Ngoc, Murakami, Naito, Son Shin and Nagabuchi
IEOT
and kx(t + σ, σ, φ) − R(t)φ(σ)k ≤ if t ≥ T1 (), whenever φ ∈ C([0, σ], Rn ) with kφk ≤ 1. Thus,
Z t ( Z τ +σ K, ∀ t ≥ 0,
d[B(s)]φ(τ + σ − s) dτ R(t − τ )
≤
, ∀ t ≥ T1 (), τ 0 or σ
Z t Z
R(t − τ )
0
0
( K, ∀ t ≥ 0,
du [B(u + τ )]φ(σ − u) dτ
≤ , ∀ t ≥ T1 (),
whenever φ ∈ C([0, σ], Rn ) with kφk ≤ 1. Notice that the function u ∈ [0, σ] 7→ Rt R(t − τ )B(u + τ )dτ is right continuous, and moreover it is of bounded variation 0 R +∞ Rt kR(s)kds 0 |dB(τ )|. Applying an whose total variation does not exceed 0 un-symmetric Fubini’s theorem (see [4] or [12, Th. 2.2.11]), we get Z σ Z t Z σ Z t R(t−τ ) du [B(u+τ )]φ(σ−u) dτ = du R(t−τ )B(u+τ )dτ φ(σ−u) 0
0
and hence
Z
0
σ
t
Z du
0
0
0
( K, ∀ t ≥ 0
≤ R(t − τ )B(u + τ )dτ φ(σ − u)
, ∀ t ≥ T1 (),
whenever φ ∈ C([0, σ], Rn ) with kφk ≤ 1. Therefore it follows that ( Z σ Z t K, ∀ t ≥ 0, du ≤ R(t − τ )B(u + τ )dτ , ∀ t ≥ T1 (), 0 0 for any σ > 0. Now assume that (i) is not true. Then there is a z0 ∈ C with
t
and hence we have Z
t
y(t) = R(t)x0 + 0
Z R(t − s)
+∞ z0 (s−τ )
e
d[B(τ )]x0 ds.
s
Note that
Z
s
s+u z0 (s−τ )
e
Z
d[B(τ )]x0
≤
0
+∞
|dB(τ )| < +∞
Vol. 64 (2009) On Positive Linear Volterra-Stieltjes Differential Systems
341
for any u ≥ 0. Applying Lebesgue’s convergence theorem, we get Z +∞ Z t ez0 (s−τ ) d[B(τ )]x0 ds R(t − s) s 0 Z s+σ Z t ez0 (s−τ ) d[B(τ )]x0 ds, R(t − s) = lim σ→+∞
s
0
in turn, by an un-symmetric Fubini’s theorem the last term in the above becomes Z t Z σ −z0 u e du R(t − s)B(u + s)ds x0 . lim σ→+∞
0
0
Therefore, if t ≥ T1 () then kR(t)k < and
Z t Z σ
−z0 u e R(t − s)B(u + s)ds x0 R(t)x + lim d 1 ≤ ky(t)k = 0 u
σ→+∞ 0 0 Z σ Z t d u R(t − s)B(u + s)ds < 2 < 1, ≤ kR(t)k + lim sup σ→+∞
0
0
which is a contradiction. Thus (i) must hold true.
The following theorem offers an explicit criterion for uniformly asymptotic stability of positive linear Volterra-Stieltjes differential systems. Theorem 5.4. Suppose that (7) holds true and (2) is positive. Then, (2) is UAS if R +∞ and only if µ(A + 0 dB(t)) < 0. R +∞ Proof. Assume that µ(A + 0 dB(t)) < 0. For an arbitrary z ∈ C,
0
By Theorem 2.1 (iv), Z µ A+
+∞ −zt
e
0
Z dB(t) ≤ µ A +
0
+∞
dB(t) < 0,
0
R +∞
−zt
which implies that z 6∈ σ(A + 0 e dB(t)). That is, det ∆(z) = 6 0. By Theorem 5.3, (2) is UAS. Conversely, suppose (2) is UAS. Then, det ∆(z) 6= 0 ∀z ∈ C,
Clearly, f is continuous and limθ→+∞ f (θ) = +∞. We show that f (0) > 0. Seeking a contradiction, assume that f (0) ≤ 0. Then there is λ1 ≥ 0 such R +∞ that f (λ1 ) = 0. That is, λ1 = µ(A + 0 e−λ1 t dB(t)). Consequently, we have R +∞ −λ t λ1 ∈ σ(A + 0 e 1 dB(t)), by Theorem 2.1 (i). Thus, det ∆(λ1 ) = 0. Hence, R +∞ µ(A + 0 dB(t)) = −f (0) < 0, as required.
342
Anh Ngoc, Murakami, Naito, Son Shin and Nagabuchi
IEOT
The following is immediate from Theorem 5.4. Corollary 5.5. Let A ∈ Rn×n be a Metzler matrix and let C(·) : R+ → Rn×n be a + R +∞ continuous matrix function. Assume that 0 kC(s)kds < +∞. Then, a positive linear Volterra integro-differential system of the form (13) is UAS if and only if R +∞ µ(A + 0 C(t)dt) < 0. Before stating the next corollary, we recall the notion of exponential stability of the linear functional differential systems (14). Definition 5.6. The linear functional differential system (14) is said to be exponentially stable if there exists M ≥ 1 and α > 0 such that for any initial function φ ∈ C([0, h], Rn ) the solution of (14)–(15) x(· ; φ), satisfies kx(t; φ)k ≤ M e−αt kφk,
∀t ≥ 0.
Furthermore, it is well-known that (14) is exponentially stable if and only if its characteristic equation has no zeros in the closed right half complex plane, that is Z h −zt det zIn − A − e dη(t) 6= 0, ∀z ∈ C,
see e.g. [5]. Corollary 5.7. Let the linear functional differential system (14) be positive. Then it is exponentially stable if and only if µ(A + η(h)) < 0. Proof. The proof is immediate from Theorem 5.4 and omitted here.
We illustrate the obtained results by two examples. Example 5.8. Consider a positive linear Volterra integro-differential system in R2 given by Z t x(t) ˙ = Ax(t) + B(t − τ )x(τ )dτ, x(t) ∈ R2 , t ≥ 0, (21) 0
where A=
a 1 0 a
;
B(t) =
e−pt
0
1 (t+1)2
e−pt
,
t ≥ 0,
(22)
and a, p ∈ R, p > 0 are parameters. Since p > 0, the condition (12) is satisfied. By Corollary 5.5, (21) is UAS if and only if Z +∞ a + 1/p 1 µ A+ B(t)dt = µ = a + 1 + 1/p < 0. 1 a + 1/p 0 Taking into account that p > 0, it is easy to see that this is equivalent to a < −1, p > −1/(a + 1).
Vol. 64 (2009) On Positive Linear Volterra-Stieltjes Differential Systems
343
Example 5.9. Consider the scalar linear functional differential equation given by Z x(t) ˙ = −x(t) +
1
e−s x(t − s)ds t ≥ 0, x(t) ∈ R.
(23)
0
The equation (23) can be rewritten in the form (14) with η(s) = 1 − e−s , s ∈ [0, 1]. Clearly, η(·) is increasing on [0, 1] and η(0) = 0. Moreover, −1 + η(1) = −e−1 . By Corollary 5.7, (23) is exponentially stable. 5.2. Stability radius of positive linear Volterra-Stieltjes differential systems Motivated by many applications in control engineering, problems of robust stability of dynamical systems have attracted a lot of attention from researchers during the last twenty years. In the study of these problems, the notion of stability radius was proved to be an effective tool. By definition, the stability radius of an asymptotically stable linear differential system x(t) ˙ = Ax(t), t ≥ 0 is the maximal r > 0 for which all the systems of the form x(t) ˙ = (A + D∆E)x(t), k∆k < r, are asymptotically stable. Here, ∆ is unknown disturbance matrix, D and E are given matrices defining the structure of the perturbations. Depending upon whether complex or real disturbances ∆ are considered this maximal r is called complex or real stability radius respectively. The basic problem in the study of robustness of stability of the system is to characterize and compute these radii in terms of given matrices A, D, E. It is important to note that these two stability radii are in general distinct. The analysis and computation of the complex stability radius for systems under structured perturbations has been done first in [13] and extended later in many subsequent papers (see [14] for a survey up till 1990) while the computation of the real stability radius, being a much more difficult problem, has been solved quite recently with a complicated solution, see e.g. [38]. The situation is much simpler for the class of positive systems. It has been shown in [15], [41] that if A is a Metzler matrix (i.e. x(t) ˙ = Ax(t), t ≥ 0 is a positive system) and D, E are nonnegative matrices, then the complex and the real stability radii coincide and can be computed directly by a simple formula. These results have been extended recently to many various classes of positive systems such as positive linear time-delay differential systems, see e.g. [29], [31], [43], positive linear discrete time-delay systems, see e.g. [16], [28] and positive linear functional differential systems, see e.g. [32], [44]. Although there have been many works dedicated to studying the stability radius problems of linear dynamical systems, however, the problem of computing of stability radii of linear Volterra-Stieltjes differential systems has not been studied yet in the literature. In this section, we deal with the problem of computing stability radii of positive linear Volterra-Stieltjes differential system (2) under structured perturbations.
344
Anh Ngoc, Murakami, Naito, Son Shin and Nagabuchi
IEOT
We now assume that (7) holds true and (2) is UAS. Consider perturbed systems of the following form Z t d[B + D1 δ(s)E]x(t − s), (24) x(t) ˙ = (A + D0 ∆E)x(t) + 0 n×li
where Di ∈ R (i ∈ I := {0, 1}), E ∈ Rq×n are given matrices determining the structure of perturbations and ∆ ∈ Kl0 ×q , δ(·) ∈ N BV (R+ , Kl1 ×q ), (K = R, C), are unknown disturbances. We shall measure the size of each perturbation (∆, δ(·)) by the norm Z +∞ k(∆, δ(·))k := k∆k + |dδ(s)|. 0
The main problem here is to find the maximal r > 0 for which the perturbed systems (24) remain UAS whenever k(∆, δ(·))k < r. In this case, we say that A, B(·) are subjected to structured perturbations of the form A
A + D0 ∆E;
B(·)
B(·) + D1 δ(·)E.
(25)
Let σ(A + D0 ∆E, B(·) + D1 δ(·)E) be the set of all roots of the characteristic equation of a perturbed system of the form (24). That is, σ(A + D0 ∆E, B(·) + D1 δ(·)E) Z := z ∈ C : det zIn − (A + D0 ∆E) −
+∞
e−zs d[B(s) + D1 δ(s)E] = 0 .
0
Recall that, by Theorem 5.3, a perturbed system of the form (24) is UAS if and only if σ(A + D0 ∆E, B(·) + D1 δ(·)E) ⊂ C− := {z ∈ C :
Vol. 64 (2009) On Positive Linear Volterra-Stieltjes Differential Systems
345
From the above definition, it is easy to see that 0 < rC ≤ rR ≤ r+ ≤ +∞.
(26)
To get characterizations of the stability radii for the class of positive systems, we need two following technical lemmas whose proofs are given in Appendices C and D, respectively. q×n Lemma 5.11. Suppose (2) is positive, UAS and D ∈ Rn×l + , E ∈ R+ . Then, −1 −1 Z +∞ Z +∞ −zs zIn − A − |x|, ∀x ∈ Cn , dB(s) x ≤ − A − e dB(s) 0
0
for every z ∈ C,
−1 Z +∞ Z
−zs
E − A − = e dB(s) D max E zI − A − n
z∈C,
0
0
+∞
−1
dB(s) D
.
Lemma 5.12. Suppose (2) is positive, UAS and Di ∈ ∈ I, E ∈ Rq×n + . If R +∞ −1 maxi∈I kE(−A − 0 dB(s)) Di k 6= 0, then there exists a nonnegative perturbation (∆0 , δ1 (·)) ∈ D+ such that 1 k(∆0 , δ1 (·))k = (27) R +∞ maxi∈I kE(−A − 0 dB(s))−1 Di k i Rn×l ,i +
and 0 ∈ σ A + D0 ∆0 E, B(·) + D1 δ1 (·)E .
(28)
The following theorem shows that for the class of positive Volterra-Stieltjes differential systems, the complex, real and positive stability radius coincide and they can be computed by an explicit formula. n×li Theorem 5.13. Suppose (2) is positive, UAS and E ∈ Rq×n , i ∈ I. + , D i ∈ R+ Then 1 rC = rR = r+ = . R +∞ maxi∈I kE(−A − 0 dB(s))−1 Di k
Proof. Suppose that rC < +∞, as otherwise, there is nothing to show. Let (∆, δ(·)) ∈ DC be a destabilizing complex disturbance. By Theorem 5.3, σ(A + D0 ∆E, B(·) + D1 δ(·)E) 6⊂ C− . Then, there exist z ∈ C,
Since (2) is UAS, it follows that −1 Z +∞ Z zIn − A − e−zs dB(s) D0 ∆E + D1 0
+∞
e−zs d[D1 δ(s) E] x = x.
0
Therefore, Ex 6= 0 and we thus get −1 Z +∞ Z −zs E zIn − A − e dB(s) D0 ∆E + D1 0
0
+∞ −zs
e
dδ(s) E x = Ex.
346
Anh Ngoc, Murakami, Naito, Son Shin and Nagabuchi
IEOT
Taking norms, we deduce that
−1 Z +∞
−zs
E zIn − A − D0 e dB(s)
k∆kkExk
0
Z
+ E zIn − A −
+∞ −zs
e
−1
Z
D1 dB(s)
+∞ −zs
e
0
0
dδ(s)
kExk ≥ kExk.
Hence, Z
max E zIn − A − i∈I
+∞ −zs
e
−1 Z
dB(s) Di k∆k +
+∞
|dδ(t)| ≥ 1.
0
0
Using Lemma 5.11, we get Z
max E − A − i∈I
+∞
0
−1
Di dB(s)
k(∆, δ(·))k ≥ 1.
This is equivalent to k(∆, δ(·))k ≥ maxi∈I
1 −1 . R +∞ kE − A − 0 dB(s) Di k
Since this inequality holds true for an arbitrary destabilizing complex perturbation, we conclude that rC ≥
maxi∈I
1 −1 . R +∞ kE − A − 0 dB(s) Di k
Taking into account the inequalities (26), it remains to show that r+ ≤
maxi∈I
1 −1 . R +∞ kE − A − 0 dB(s) Di k
However, this is immediate from Lemma 5.12.
The following is immediate from Theorem 5.13. Corollary 5.14. Suppose that (12) holds and the linear Volterra integro-differential n×li system (13) is positive and UAS and E ∈ Rq×n , (i ∈ I = {0, 1}). Then + , Di ∈ R+ a perturbed system of the form Z t x(t) ˙ = A + D0 ∆E x(t) + C(t − s) + D1 δ(t − s)E x(s)ds, t ∈ R+ , 0
where ∆ ∈ R
l0 ×q
Z k∆k +
, δ(·) ∈ L ([0, +∞), Rl1 ×q ) ∩ C([0, +∞), Rl1 ×q ), is still UAS if 1
+∞
kδ(s)kds < 0
maxi∈I kE − A −
1 R +∞ 0
C(s)ds
−1
. Di k
Vol. 64 (2009) On Positive Linear Volterra-Stieltjes Differential Systems
347
Corollary 5.15. Suppose the linear functional differential system (14) is positive n×li , (i ∈ I = {0, 1}). Then a and exponentially stable. Let E ∈ Rq×n + , Di ∈ R+ perturbed system of the form Z h x(t) ˙ = A + D0 ∆E x(t) + d[η(s) + D1 δ(s)E]x(t − s)ds, t ≥ h, 0
where ∆ ∈ R
l0 ×q
, δ(·) ∈ N BV ([0, h], Rl1 ×q ), is still exponentially stable if
k∆k + Var(δ; 0, h) <
1
−1 . maxi∈I kE − A − η(h) Di k
We conclude the paper by two examples. Example 5.16. Consider again the positive linear Volterra differential system defined by (21)-(22) with a = −2, p = 2. By Theorem 5.4, the system (21) is UAS. We now consider a perturbed system of the form Z t x(t) ˙ = A∆ x(t) + Bδ (τ )x(t − τ )dτ, x(t) ∈ R2 , t ≥ 0 (29) 0
where A∆ := Bδ (t) :=
−2 + 2a1 0
e−2t + b1 e−t
1 + 2a2 −2
0 e−2t + b2 e−t
1 (t+1)2
, ,
t ≥ 0,
where a1 , a2 , b1 , b2 ∈ R, are unknown parameters. It is important to note that we can rewrite A∆ and Bδ (·) in the following form A∆ = A + D0 ∆E; Bδ (·) = B(·) + D1 δ(·)E where D0 =
2 0
,
D1 =
0 1
and
E = I2 ,
and δ(t) = (b1 e−t , b2 e−t ),
∆ = (a1 , a2 );
t ≥ 0.
2
Assume that R is endowed with 2−norm, by Corollary 5.14, the system (29) is still UAS if √ Z +∞ q q q q 5 13 2 2 2 2 2 2 2 2 . a1 + a2 + δ1 (t) + δ2 (t) dt = a1 + a2 + b1 + b2 < 52 0 Example 5.17. Consider a positive linear functional differential equation Z 1 x(t) ˙ = −x(t) + e−s x(t − s)ds t ≥ 0, x(t) ∈ R. 0
(30)
348
Anh Ngoc, Murakami, Naito, Son Shin and Nagabuchi
IEOT
Equation (30) can be rewritten in the form of (14), with η(s) = 1 − e−s , s ∈ [0, 1]. By Theorem 5.4, it is easy to see that (30) is exponentially stable. Assume the system (30) is perturbed as follows Z 1 x(t) ˙ = − 1 + δ0 x(t) + e−s + 2006∆1 (s) + 2007∆2 (s) x(t − s)ds, (31) 0
where δ0 ∈ R is an unknown parameter scalar and ∆1 (θ), ∆2 (θ) are unknown integrable functions on [0, 1]. This perturbed system can be rewritten in the form Z 1 x(t) ˙ = − 1 + δ0 x(t) + d[η(θ) + 2006δ1 (s) + 2007δ2 (s)]x(t − s), 0
where Z
s
Z
s
∆2 (τ )dτ, s ∈ [0, 1].
∆1 (τ )dτ, δ2 (s) =
δ1 (s) =
0
0
By Corollary 5.15, we conclude that the perturbed system (31) is exponentially stable for all δ0 ∈ R, ∆1 (·), ∆2 (·) ∈ L1 ([0, 1], R) satisfying Z 1 Z 1 1 . |δ0 | + |∆1 (θ)|dθ + |∆2 (θ)|dθ < 2007e 0 0
6. Conclusion A general class of positive linear systems (namely, positive linear Volterra-Stieltjes differential systems) is introduced and then an explicit criterion for systems of this class is given. A new Perron-Frobenius type theorem for positive linear VolterraStieltjes differential equations is presented. Furthermore, an explicit criterion for uniformly asymptotic stability of positive systems is provided. Finally, it is proved that complex, real and positive stability radius of positive linear Volterra-Stieltjes differential systems under structured perturbations coincide and can be computed by an explicit formula.
7. Appendices 7.1. Appendix A: Proof of Lemma 3.6 It is sufficient to show that, for every x0 ∈ Rn , the solution x(t) := x(· ; 0, x0 ) of (2) is of exponential order. In fact, x(·) satisfies Z t Z tZ τ x(t) = x0 + Ax(τ )dτ + d[B(s)]x(τ − s) dτ, t ≥ 0. 0
0
0
Taking norms to two sides of the above equality, we deduce that Z t Z t kx(t)k ≤ kx0 k + kAkkx(τ )kdτ + Var(B(·); 0, τ ) max kx(s)kdτ, 0
0
s∈[0,τ ]
t ≥ 0.
Vol. 64 (2009) On Positive Linear Volterra-Stieltjes Differential Systems
349
Hence, Z kx(t)k ≤ kx0 k +
t
Z
t
kAkkx(τ )kdτ + M
max kx(s)kdτ,
t ≥ 0,
0 s∈[0,τ ]
0
R +∞ where M := 0 |dB(s)|. For a fixed t ≥ 0, we set xt := maxs∈[0,t] kx(s)k. Then, it is easy to see that the real function defined by t 7→ xt , is continuous on R+ . Moreover, the last inequality implies that Z t Z t kx(t)k ≤ kx0 k + kAkxτ dτ + M xτ dτ, t ≥ 0. 0
0
Therefore
t
Z xt ≤ kx0 k +
t ≥ 0.
(kAk + M )xτ dτ, 0
By Gronwall’s inequality, we get kx(t)k ≤ xt ≤ kx0 ke(M +kAk)t ,
t ≥ 0.
This completes the proof. 7.2. Appendix B: Proof of Lemma 3.7 Suppose η is an increasing matrix function on [0, σ]. By the definition of RiemannStieltjes integrals, we have Lφ =
lim d(P )→0
p X
(η(θk ) − η(θk−1 ))φ(ζk ) ≥ 0,
k=1
for every φ ∈ C([−h, 0], Rn ), φ ≥ 0. It means that L is positive. Conversely, let η(·) = (ηij (·)) and let L be positive. We show that ηij (·) : [0, σ] → R is an increasing scalar function for every i, j ∈ {1, 2, ..., n}. Since L is positive, it is easy to see that the functional Z σ Lij : C([0, σ], R) −→ R; φ 7→ Lij φ := φ(θ)dηij (θ), 0
is also positive for every i, j ∈ {1, 2, ..., n}. Fix θ1 , θ2 ∈ [0, σ), θ1 < θ2 , k ∈ N, sufficiently large and consider the continuous function φk defined by if θ ∈ [0, θ1 ], 0 if θ ∈ (θ1 , θ1 + 1/k], kθ − kθ1 (32) φk (θ) := 1 if θ ∈ (θ1 + 1/k, θ2 ], −kθ + kθ2 + 1 if θ ∈ (θ2 , θ2 + 1/k], 0 if θ ∈ (θ2 + 1/k, σ]. Since φk is continuous on [0, σ], it follows from a standard property of RiemannStieltjes integrals that Z θ1 Z θ1 +1/k Z θ2 Z σ Z θ2 +1/k Z σ φk (θ)dηij (θ) = + + + + φk (θ)dηij (θ), 0
0
θ1
θ1 +1/k
θ2
θ2 +1/k
350
Anh Ngoc, Murakami, Naito, Son Shin and Nagabuchi
see e.g. [39]. This gives Z Z θ1 +1/k φk (θ)dηij (θ) + ηij (θ2 ) − ηij (θ1 + 1/k) +
IEOT
θ2 +1/k
φk (θ)dηij (θ) ≥ 0,
θ2
θ1
for every k ∈ N sufficiently large. Taking into account that ηij is continuous from the right at θ1 , θ2 and letting k → ∞, we get ηij (θ2 ) ≥ ηij (θ1 ) for every θ1 , θ2 ∈ [0, σ). In case of 0 < θ1 < θ2 = σ, by a similar way, we also get ηij (θ2 ) ≥ ηij (θ1 ). This completes the proof. Remark 7.1. Taking into account the formula of the function φk given by (32), by the same argument used in the proof of the above lemma, one can show that the matrix function η(·) is increasing on subinterval [0, σ), provided Lφ ≥ 0, for every φ ∈ C([0, σ], Rn ), φ ≥ 0, φ(σ) = 0. 7.3. Appendix C: Proof of Lemma 5.11 (i) Since (2) is positive, it follows that A is a Metzler matrix and B(·) is increasing on R+ . For every z ∈ C,
0
0
R +∞
On the other hand, because (2) is UAS, we get µ A+ 0 dB(s) < 0, by Theorem R +∞ −zs 5.4. Therefore, µ A + 0 e dB(s) < 0, for every z ∈ C,
0
for any x ∈ Cn , see e.g. [25], [37]. Since A is a Metzler matrix, there exists a real number α0 > 0 such that (A + α0 In ) ≥ 0. As (A + α0 In ) ≥ 0 and B(·) is increasing on R+ , it follows that R +∞ −zs R +∞ −zs eα0 θ eθ(A+ 0 e dB(s)) = eθ((A+α0 In )+ 0 e dB(s)) ≤ eθ((α0 In +A)+
R +∞ 0
dB(s))
This implies that R θ(A+R +∞ e−zs dB(s)) ≤ eθ(A+ 0+∞ dB(s)) , e 0 Taking (33), (34) into account, we get −1 Z Z +∞ −zs zIn − A − e dB(s)ds x ≤ 0
R +∞
= eα0 θ eθ(A+
0
dB(s))
θ ≥ 0, z ∈ C,
+∞
R +∞
eθ(A+
0
dB(s))
dθ|x|
0
=
Z −A− 0
+∞
−1 dB(s) |x|,
.
(34)
Vol. 64 (2009) On Positive Linear Volterra-Stieltjes Differential Systems
351
for every z ∈ C,
0
for every z ∈ C,
−1 −1 Z +∞ Z +∞
−zs
E zIn − A − D dB(s) D ≤ E − A − e dB(s)dt
,
0
0
for every z ∈ C,
−1 R +∞ q×li By Theorem 2.1 (iii), we get E(−A − 0 B(t)dt Di ∈ R+ , i ∈ I. Assume that
−1 −1 Z +∞ Z +∞
dB(s) Di0 max kE −A− dB(s) Di k = E −A−
, i0 ∈ I. i∈I
0
Then
Z
E −A−
0
0
−1
dB(s) Di0
= max
+∞
li
u∈R+0 , kuk=1
Z
E −A−
0
−1
dB(s) Di0 u
,
+∞
l R+i0
such that ku0 k = 1 and see e.g. [17]. Therefore, we can choose u0 ∈
−1 −1 Z +∞ Z +∞
E − A −
dB(s) Di0 u0 = E − A − dB(s) Di0
. 0
0
R +∞
−1
By E(−A − 0 dB(s)) Di0 u0 ≥ 0, there exists, by a theorem of Krein and Rutman [19], a positive linear form y ∗ ∈ (Cq )∗ of dual norm ky ∗ k = 1 such that
−1 −1 Z +∞ Z +∞
E − A − dB(s) D u y∗ E − A − dB(s) Di0 u0 = i0 0 .
0
0
Define
Z
∆ := E − A −
0
+∞
−1 −1
li0 ×q ∗ dB(s) Di0
u 0 y ∈ R+ .
R +∞ It is easy to see that k∆k = kE(−A − 0 dB(s))−1 Di0 k−1 . Set x0 := (−A − R +∞ dB(s))−1 Di0 u0 . This implies that ∆Ex0 = u0 . Therefore, x0 6= 0 and x0 = 0 R +∞ (−A − 0 dB(s))−1 Di0 ∆Ex0 . It follows that Z +∞ Z +∞ (A + Di0 ∆E) + dB(s) x0 = A + d[B(s) + Di0 δ(s)E] x0 = 0, 0
0
352
Anh Ngoc, Murakami, Naito, Son Shin and Nagabuchi
IEOT
Rs where δ(s) := 0 e−τ ∆dτ = (1 − e−s )∆, s ≥ 0. We consider two separate cases as follows: - If i0 = 0, then we set ∆0 = ∆ and δ1 (·) = 0. Then it is easy to see that (∆0 , δ1 (·)) ∈ D+ satisfies (27)-(28). - If i0 = 1, then we set ∆0 = 0 and δ1 (·) = δ(·). Then, (∆0 , δ1 (·)) ∈ D+ satisfies (27)-(28). This completes the proof.
References [1] A. Aeyels and P. D. Leenheer, Extension of the Perron-Frobenius theorem to homogeneous systems, SIAM Journal on Control and Optimization, Vol. 41, no. 2, pp. 563–582, 2002. [2] L. Benvenuti and L. Farina, Eigenvalue regions for positive systems, Systems Control Lett. Vol. 51, no. 3–4, pp. 325–330, 2004. [3] A. Berman and R. J. Plemmons, Nonnegative Matrices in Mathematical Sciences, Acad. Press, New York, 1979. [4] R. H. Cameron and W. T. Martin, An unsymmetric Fubini theorem, Bull. Amer. Math. Soc. Vol. 47, pp. 121–125, 1941. [5] O. Diekmann, S. A. van Gils, S. M. Verduyn Lunel and H. O. Walther, Delay Equations, Functional-, Complex- and Nonlinear Analysis, Springer-Verlag, New-york, 1995. [6] L. Farina and S. Rinaldi, Positive Linear Systems: Theory and Applications, John Wiley and Sons, New York, 2000. [7] S. Gaubert and J. Gunawardena, The Perron-Frobenius theorem for homogeneous, monotone functions, Trans. Amer. Math. Soc. Vol. 356, no. 12, pp. 4931–4950, 2004. [8] G. Gripenberg, S. O. Londen and O. Staffans, Volterra Integral and Functional Equations, Cambridge Univeristy Press, 1990. [9] G. S. Grossman and R. K. Miller, Nonlinear Volterra integro-differential systems with L1 −kernels, Journal of Differential Equations Vol. 13, pp. 551–566, 1973. [10] W. M. Haddad and V. Chellaboina, Stability and dissipativity theory for nonnegative and compartmental dynamical systems with time delay, Advances in time-delay systems, pp. 421–435, Lect. Notes Comput. Sci. Eng., 38 (2004), Springer, Berlin. [11] W. M. Haddad and V. Chellaboina, Stability and dissipativity theory for nonnegative dynamical systems: a unified analysis framework for biological and physiological systems, Nonlinear Anal. Real World Appl. Vol. 6, no. 1, pp. 35–65, 2005. [12] Y. Hino, S. Murakami and T. Naito, Functional-differential equations with infinite delay, Lecture Notes in Mathematics, 1473. Springer-Verlag, Berlin, 1991. [13] D. Hinrichsen and A. J. Pritchard, Stability radius for structured perturbations and the algebraic Riccati equation, Systems & Control Letters, Vol. 8, no. 2, pp. 105–113, 1986. [14] D. Hinrichsen and A. J. Pritchard, Real and complex stability radii: a survey, in D. Hinrichsen and B. M˚ artensson (Eds), Control of Uncertain Systems, volume 6 of Progress in System and Control Theory, Basel. Birkh¨ auser (1990), 119–162.
Vol. 64 (2009) On Positive Linear Volterra-Stieltjes Differential Systems
353
[15] D. Hinrichsen and N. K. Son, µ-analysis and robust stability of positive linear systems, Appl. Math. and Comp. Sci. Vol. 8, no. 2, pp. 253–268, 1998. [16] D. Hinrichsen N. K. Son and P. H. A. Ngoc, Stability radii of positive higher order difference systems, Systems & Control Letters, Vol. 49, no. 5, pp. 377–388, 2003. [17] R. A. Horn and C. R. Johnson, Matrix Analysis, Cambridge University Press, Cambridge, 1993. [18] F. E. Kloeden and A. M. Rubinov, A generalization of Perron-Frobenius theorem, Nonlinear Analysis, Vol. 41, no. 1–2, pp. 97–115, 2000. [19] M. G. Krein and M. A. Rutman, Linear operators leaving invariant a cone in a Banach space, Amer. Math. Soc. Transl. Vol. 26, pp. 199–325, 1950. [20] V. Lakshmikantham and M. Rama Mohana Rao, Theory of integro-differential equations. Stability and Control: Theory, Methods and Applications, Gordon and Breach Science Publishers, Lausanne, 1995 [21] De Leenheer and D. Patrick Aeyels, Stabilization of positive systems with first integrals, Automatica, Vol. 38, no. 9, pp. 1583–1589, 2002. [22] D. G. Luenberger, Introduction to Dynamic Systems, Theory, Models and Applications, J. Wiley, New York, 1979. [23] R. K. Miller, Asymptotic stability properties of Volterra integro-differential systems, Journal of Differential Equations, Vol. 10, pp. 485–506, 1971. [24] R. K. Miller, Structure of solutions of unstable linear Volterra integro-differential equations, Journal of Differential Equations, Vol. 15, pp. 129–157, 1974. [25] R. Nagel (Ed.), One-Parameter Semigroups of Positive Operators, Springer-Verlag, Berlin, 1986. [26] T. Naito, J. S. Shin, S. Murakami, P. H. A. Ngoc, Characterizations of positive linear Volterra integro-differential systems, Integral Equations and Operator Theory, Vol. 58, no.2, pp. 255–272, 2007. [27] T. Naito, J. S. Shin, S. Murakami, P. H. A. Ngoc, Characterizations of positive linear Volterra integral equations with nonnegative kernels, Journal of Mathematical Analysis and Applications, Vol. 335, no.1, pp. 298–313, 2007. [28] P. H. A. Ngoc and N. K. Son, Stability radii of positive linear difference equations under affine parameter perturbations, Applied Mathematics and Computation, Vol. 134, no. 2-3, pp. 577–594, 2003. [29] P. H. A. Ngoc and N. K. Son, Stability radii of linear systems under multiperturbations, Numer. Funct. Anal. Optim., Vol. 25, no. 3-4, pp. 221–238, 2004. [30] P. H. A. Ngoc, B. S. Lee and N. K. Son, Perron Frobenius theorem for positive polynomial matrices, Vietnam Journal of Mathematics, Vol. 32, no.4, pp. 475–481, 2004. [31] P. H. A. Ngoc, Strong stability radii of positive linear time-delay systems, International Journal of Robust and Nonlinear Control, Vol. 15, no. 10, pp. 459–472, 2005. [32] P. H. A. Ngoc and N. K. Son, Stability radii of positive linear functional differential equations under multi perturbations, SIAM Journal on Control and Optimization, Vol. 43, no. 6, pp. 2278–2295, 2005.
354
Anh Ngoc, Murakami, Naito, Son Shin and Nagabuchi
IEOT
[33] P. H. A. Ngoc and B. S. Lee, A characterization of spectral abscissa and PerronFrobenius theorem of postive linear functional differntial equations, IMA Journal of Mathematical Control and Information, Vol. 23, no. 3, pp. 259–268, 2006. [34] P. H. A. Ngoc, A Perron-Frobenius theorem for a class of positive quasi-polynomial matrices, Applied Mathematic Letters, Vol. 19, no. 8, pp. 747–751, 2006. [35] P. H. A. Ngoc, T. Naito and J. S. Shin, Characterizations of postive linear functional differential equations, Funkcialaj Ekvacioj, Vol. 50, no. 1, pp. 1–17, 2007. [36] P. H. A. Ngoc, T. Naito, J. S. Shin and S. Murakami, On stability and robust stability of positive linear Volterra equations, SIAM Journal on Control and Optimization, Vol. 47, no. 2, pp. 975–996, 2008. [37] A. Pazy, Semigroups of Linear Operators and Applications to Partial Differential Equations, Springer-Verlag, Berlin, 1983. [38] L. Qiu et al., A formula for computation of the real stability radius, Automatica, Vol. 31, no. 5, pp. 879–890, 1995. [39] W. Rudin, Real and Complex Analysis, McGraw-Hill, New York, 1987. [40] S. M. Rump, Theorems of Perron-Frobenius type for matrices without sign restrictions, Linear Algebra and its Applications, Vol. 266, pp. 1–42, 1997. [41] B. Shafai, J. Chen and M. Kothandaraman, Explicit formulas for stability radii of nonnegative and Metzlerian matrices, IEEE Trans. Autom. Control, Vol. 42, no. 2, pp. 265–269, 1997. [42] N. K. Son and D. Hinrichsen, Robust stability of positive continuous time systems, Numer. Funct. Anal. Optim., Vol. 17, no. 5-6, pp. 649–659, 1996. [43] N. K. Son and P. H. A. Ngoc, Robust stability of positive linear time delay systems under affine parameter perturbations, Acta Mathematica Vietnamica, Vol. 24, no. 3, pp. 353–372, 1999. [44] N. K. Son and P. H. A. Ngoc, Robust stability of linear functional differential equations, Advanced Studies in Contemporary Mathematics, Vol. 3, no. 2, pp. 43–59, 2001. P. H. Anh Ngoc Institute of Mathematics Technical University Ilmenau Weimarer Straße 25 98693 Ilmenau Germany e-mail: [email protected] S. Murakami and Y. Nagabuchi Department of Applied Mathematics Okayama University of Science Ridaicho Okayama 700-0005 Japan e-mail: [email protected] [email protected]
Vol. 64 (2009) On Positive Linear Volterra-Stieltjes Differential Systems T. Naito and J. Son Shin Department of Mathematics University of Electro-Communication Chofu Tokyo 182-8585 Japan e-mail: [email protected] [email protected] Submitted: October 23, 2008. Revised: November 28, 2008.
355
Integr. equ. oper. theory 64 (2009), 357–379 c 2009 Birkh¨
auser Verlag Basel/Switzerland 0378-620X/030357-23, published online July 3, 2009 DOI 10.1007/s00020-009-1698-6
Integral Equations and Operator Theory
Theorem of Completeness for a Dirac-Type Operator with Generalized λ-Depending Boundary Conditions Seppo Hassi and Leonid Oridoroga Abstract. A completeness theorem is proved involving a system of integrodifferential equations with some λ-depending boundary conditions. Also some sufficient conditions for the root functions to form a Riesz basis are established. Mathematics Subject Classification (2000). Primary 34L40; Secondary 47E05. Keywords. Dirac-type operator, λ-depending boundary condition, completeness theorem, Riesz basis.
1. Introduction It is well known [13, Chap. 1, §3] that the system of eigenfunctions and associated functions (SEAF) of the Sturm-Liouville problem −y 00 + q(x)y = λ2 y, 0
(1.1)
0
y (0) − h0 y(0) = y (1) − h1 y(1) = 0, (1.2) is complete in L2 [0, 1] for arbitrary complex valued potential q ∈ L1 [0, 1] and h0 , h1 ∈ C. A similar result is also known for arbitrary nondegenerate boundary conditions (see [13, Chap. 1, §3]). A completeness result for a boundary value problem of arbitrary order differential equations of the form y (n) +
n−2 X
qj (x)y = λn y,
(1.3)
j=0
with separated boundary conditions, has been announced by M.V. Keldysh [9] and was first proved by A.A. Shkalikov [19]. The research was supported by the Academy of Finland (project 129092).
358
Hassi and Oridoroga
IEOT
In [12] M.M. Malamud and one of the authors have generalized the above mentioned results from [13, Chap. 1, §3] to the case of first order systems with arbitrary boundary conditions (not depending on a spectral parameter). A more specific system, involving λ-polynomial boundary conditions, treated in [22] is using a linearization method and asymptotic estimates of the Green’s function, cf. [14, p. 388]; see also other references in [22]. In [20] and [21] the completeness results for the problem (1.1), (1.2) have been generalized to the case of nonlinear λ-depending boundary conditions of the form ( P11 (λ)y(0) + P12 (λ)y 0 (0) = 0, (1.4) 2 P21 (λ)y 2 ( 21 ) + P22 (λ)y( 21 )y 0 ( 12 ) + P23 (λ)y 0 ( 21 ) = 0 and of the form 2 2 P10 (λ)y 2 (0) + P11 (λ)y 0 (0) + P12 (λ)y 2 ( 13 ) + P13 (λ)y 0 ( 13 ) + P14 (λ)y(0)y 0 (0) + P15 (λ)y(0)y( 13 ) + P16 (λ)y(0)y 0 ( 31 ) + P17 (λ)y 0 (0)y( 1 ) + P18 (λ)y 0 (0)y 0 ( 1 ) + P19 (λ)y( 1 )y 0 ( 1 ) = 0, 3 3 3 3 2 2 P20 (λ)y 2 (0) + P21 (λ)y 0 (0) + P22 (λ)y 2 ( 31 ) + P23 (λ)y 0 ( 13 ) + P24 (λ)y(0)y 0 (0) + P25 (λ)y(0)y( 13 ) + P26 (λ)y(0)y 0 ( 31 ) + P27 (λ)y 0 (0)y( 13 ) + P28 (λ)y 0 (0)y 0 ( 31 ) + P29 (λ)y( 31 )y 0 ( 13 ) = 0,
(1.5)
where Pij (λ) are polynomials. Moreover, in [17] analogous results were obtained for a system with a pair of separated λ-depending boundary conditions similar to the conditions (1.4) and (1.5). In the recent papers [23], [24] a related problem concerning the Riesz basis property of the SEAF for a first-order system of the form (1.6) given below with separated boundary conditions, not depending on a spectral parameter, has been established. In the present paper completeness and Riesz basis property of the SEAF are considered for Dirac-type systems with certain λ-depending boundary conditions. Naturally the results cover the case of Dirac operators, which have been more extensively studied in the literature. In particular, we wish to mention the recent studies on spectral decompositions of 1D periodic Dirac operators and related convergence results by B. Mityagin and P. Djakov; see [15] and [2], [3, Sec. 4]; see also Remark 3.8. The paper is organized as follows. In Section 2 we prove some completeness results for the first order systems of certain integro-differential equations involving general linear or quadratic λ-depending boundary conditions. More precisely, consider in L2 [0, 1] ⊕ L2 [0, 1] a boundary value problem for the first order system of ordinary integro-differential equations of the form Z x 1 0 By + Q(x)y + M (x, t)y(t) dt = λy (1.6) i 0
Vol. 64 (2009)
Completeness Theorems for a Dirac-Type Operator
359
with B=
a−1 0
0
b−1
, Q(x) =
0 q1 (x) M11 (x, t) M12 (x, t) , M (x, t) = , q2 (x) 0 M21 (x, t) M22 (x, t)
where it is assumed that a < 0 < b, and that qj ∈ L∞ [0, 1],
Mij ∈ L∞ (Ω),
Ω = {0 ≤ t ≤ x ≤ 1},
i, j = 1, 2.
(1.7)
In addition, y stands for y(x) = (y1 (x), y2 (x))> . If −a = b = 1 and M (x, t) ≡ 0, then the system (1.6) reduces to a Dirac system (see [10]). Therefore it is natural to call the general system (1.6) a Dirac-type system. Two types of λ-depending boundary conditions will be treated. Namely: (i) arbitrary linear conditions of the form ( P11 (λ)y1 (0) + P12 (λ)y2 (0) + P13 (λ)y1 (1) + P14 (λ)y2 (1) = 0, P21 (λ)y1 (0) + P22 (λ)y2 (0) + P23 (λ)y1 (1) + P24 (λ)y2 (1) = 0, (ii) arbitrary quadratic conditions of the form 2 2 2 1 2 1 P10 (λ)y1 (0) + P11 (λ)y2 (0) + P12 (λ)y1 ( 2 ) + P13 (λ)y2 ( 2 ) + P14 (λ)y1 (0)y2 (0) + P15 (λ)y1 (0)y1 ( 21 ) + P16 (λ)y1 (0)y2 ( 12 ) + P17 (λ)y2 (0)y1 ( 1 ) + P18 (λ)y2 (0)y2 ( 1 ) + P19 (λ)y1 ( 1 )y2 ( 1 ) = 0, 2 2 2 2 P20 (λ)y12 (0) + P21 (λ)y22 (0) + P22 (λ)y12 ( 21 ) + P23 (λ)y22 ( 12 ) + P24 (λ)y1 (0)y2 (0) + P25 (λ)y1 (0)y1 ( 1 ) + P26 (λ)y1 (0)y2 ( 1 ) 2 2 + P27 (λ)y2 (0)y1 ( 12 ) + P28 (λ)y2 (0)y2 ( 21 ) + P29 (λ)y1 ( 21 )y2 ( 12 ) = 0,
(1.8)
(1.9)
where Pij (λ) are polynomials. In what follows it is tacitly assumed that the two boundary conditions in (1.8) (as well as in (1.9)) are linearly independent from each other. In Section 3 some general sufficient conditions for polynomials Pij are established in order that the SEAF of the problem (1.6) with separated λ-depending boundary conditions forms a Riesz basis. Here instead of (1.7) the following stronger smoothness assumptions on Q(x) and M (x, t) are used Q ∈ C 1 [0, 1]⊗C2×2 ,
M ∈ C 1 (Ω)⊗C2×2 ,
Ω = {0 ≤ t ≤ x ≤ 1}.
Some of the main results of this paper has been announced without proofs in [6], [7], and have been published as a preprint [8].
2. Theorems on completeness of SEAF In this section some sufficient conditions for the completeness of the SEAF of the problems (1.6), (1.8) and (1.6), (1.9) in L2 [0, 1] ⊕ L2 [0, 1] are established. The starting point is to estimate the growth of the solution of the Cauchy problem for the system (1.6) with special initial conditions.
360
Hassi and Oridoroga
IEOT
Let ϕα (x; λ) =
ϕα1 (x; λ) ϕα2 (x; λ)
and
ψα (x; λ) =
ψα1 (x; λ) ψα2 (x; λ)
(2.1)
be the solutions of the Cauchy problem for the system (1.6) with the initial conditions ϕα1 (α; λ) = ψα2 (α; λ) = 1
and
ϕα2 (α; λ) = ψα1 (α; λ) = 0,
(2.2)
where α ∈ [0, 1]. The next lemma gives some estimates for the growth of ϕ0j (x; λ) and ψ0j (x; λ), j = 1, 2. Lemma 2.1. Let the solutions ϕ0 (x; λ) and ψ0 (x; λ) for the system (1.6) satisfying (1.7) be defined by (2.1), (2.2) with α = 0. Then ϕ0j (x; λ) and ψ0j (x; λ), j = 0, 1, satisfy the following estimates w.r.t. λ, uniformly in x (as λ → ∞): 1 )) exp(aλix), ϕ01 (x; λ) = (1 + O( =λ 1 ψ01 (x; λ) = O( =λ ) exp(aλix),
1 ϕ02 (x; λ) = O( =λ ) exp(aλix),
1 ψ02 (x; λ) = O( =λ ) exp(aλix),
(2.3)
when λ ∈ C+ , and 1 ) exp(bλix), ϕ01 (x; λ) = O( =λ
1 ϕ02 (x; λ) = O( =λ ) exp(bλix),
1 ψ01 (x; λ) = O( =λ ) exp(bλix),
1 ψ02 (x; λ) = (1 + O( =λ )) exp(bλix),
(2.4)
when λ ∈ C− . Proof. We prove the first of the estimates in (2.3). All the other estimates can be proved similarly. Due to the assumptions (1.7) the system (1.6) admits a triangular transformation operator; see [11, Thm. 1.1]. This means that the solution ϕ0 admits a representation iaλx Z x iaλt e e ϕ0 (x; λ) = + K(x, t) ibλt dt, (2.5) 0 e 0 K11 (x, t) K12 (x, t) where K(x, t) := ∈ L∞ (Ω) ⊗ C2×2 . In particular, K21 (x, t) K22 (x, t) Z x Z x ϕ01 (x; λ) = eiaλx + K11 (x, t)eiaλt dt + K12 (x, t)eibλt dt. 0
0
Rx
If =λ > 0, then |eibλt | < 1 and 0 K12 (x, t)eibλt dt = O(1) since a < Rx 0 < b and K12 (x, t) is bounded, and then, in particular, 0 K12 (x, t)eibλt dt = 1 O( =λ ) exp(aλix). Moreover, since K11 (x, t) is bounded, one has Z x Z x iaλx Z x e iaλt iaλt −a(=λ)t . K11 (x, t)e dt = O |e | dt = O e dt = O =λ 0 0 0
Vol. 64 (2009)
Completeness Theorems for a Dirac-Type Operator
361
Therefore, for =λ > 0 one gets iaλx
ϕ01 (x; λ) = e
iaλx e 1 +O = 1+O eiaλx . =λ =λ
When the functions Q(x) and M (x, t) admit some smoothness properties, the above estimates can be strengthened. The stronger assumptions stated in the next lemma are used in Section 3 when establishing Riesz basis properties for the root functions. Lemma 2.2. Let ϕ0 (x; λ) and ψ0 (x; λ) be as in Lemma 2.1 and, in addition, assume that Q(x) ∈ C 1 [0, 1] ⊗ C2×2 and M (x, t) ∈ C 1 (Ω)⊗C2×2 . Then the functions ϕj (x; λ) and ψj (x; λ), j = 0, 1, satisfy the following estimates w.r.t. λ, uniformly in x (as λ → ∞): ϕ01 (x; λ) = exp(aλix) + λ1 O(exp(aλix)), ϕ02 (x; λ) = λ1 O(exp(aλix)), ψ01 (x; λ) = λ1 O(exp(aλix)), ψ02 (x; λ) = λ1 O(exp(aλix)); ϕ11 (x; λ) = λ1 O(exp(bλi(x − 1))),
(2.6)
ϕ12 (x; λ) = λ1 O(exp(bλi(x − 1))), ψ11 (x; λ) = λ1 O(exp(bλi(x − 1))), ψ12 (x; λ) = exp(bλi(x − 1)) + λ1 O(exp(bλi(x − 1))), when λ ∈ C+ , and ϕ01 (x; λ) = λ1 O(exp(bλix)), ϕ02 (x; λ) = λ1 O(exp(bλix)), ψ01 (x; λ) = λ1 O(exp(bλix)), ψ02 (x; λ) = exp(bλix) + λ1 O(exp(bλix)); ϕ11 (x; λ) = exp(aλi(x − 1)) + λ1 O(exp(aλi(x − 1))),
(2.7)
ϕ12 (x; λ) = λ1 O(exp(aλi(x − 1))), ψ11 (x; λ) = λ1 O(exp(aλi(x − 1))), ψ12 (x; λ) = λ1 O(exp(aλi(x − 1))), when λ ∈ C− . Proof. As in Lemma 2.1 we just prove the first of the estimates in (2.6). For this purpose the formula (2.5) in the proof of Lemma 2.1 will be used. In [11] (see step (iii) of the proof [11, Thm 1.1]) it was shown that if Q(x) ∈ C 1 [0, 1] ⊗ C2×2 and M (x, t) ∈ C 1 (Ω)⊗C2×2 then Kij (x, t) ∈ C 1 (Ω)⊗C2×2 , too. Now integration by
362
Hassi and Oridoroga
IEOT
parts yields Z x Z x x 1 ∂ K11 (x, t)eiaλt dt = K11 (x, t)eiaλt t=0 − K11 (x, t)eiaλt dt iaλ 0 0 ∂t −a(=λ)x iaλx e iaλx − 1 1 1 K11 (x, x)e − K11 (x, 0) , − O = = λO e iaλ iaλ =λ and Z
x
1 dt = ibλ
x
∂ ibλt K12 (x, t)e − K12 (x, t)e dt 0 0 ∂t 1 1 = O(1) = O eiaλx , ibλ λ since =λ > 0 and a < 0 < b. Therefore from the formula (2.5) one gets ibλt
x K12 (x, t)eibλt t=0
Z
ϕ01 (x; λ) = exp(aλix) + λ1 O(exp(aλix)). All the other estimates in Lemma 2.2 are proved in a similar manner.
In the next lemma some estimates for the growth of the Wronski determinant are presented. Lemma 2.3. Let y1 (x; λ) and y2 (x; λ) be two linearly independent solutions of the system (1.6) satisfying the assumptions (1.7). Then the Wronski determinant y (x; λ) y21 (x; λ) W (x; λ) = det 11 (2.8) y12 (x; λ) y22 (x; λ) admits the following estimate w.r.t. λ, uniformly in x (as λ → ∞): W (x; λ) = (1 + o(1)) exp((a + b)λi)W (0; λ).
(2.9)
Proof. It was proved in [12] that in C± the system (1.6) with (1.7) has two linearly independent solutions ε1 (x, λ) and ε2 (x, λ) satisfying the following estimates (1 + o(1))exp(aλix) o(1)exp(bλix) ε1 (x, λ) = , ε2 (x, λ) = (2.10) o(1)exp(aλix) (1 + o(1))exp(bλix) for λ ∈ C± uniformly in x. Since yj (x; λ) is a linear combination of ε1 (x, λ) and ε2 (x, λ), one has y11 (x; λ) y21 (x; λ) y12 (x; λ) y22 (x; λ) −1 ε11 (x; λ) ε21 (x; λ) ε11 (0; λ) ε21 (0; λ) y11 (0; λ) y21 (0; λ) = . ε12 (x; λ) ε22 (x; λ) ε12 (0; λ) ε22 (0; λ) y12 (0; λ) y22 (0; λ) (2.11) It follows that −1 ε11 (x; λ) ε21 (x; λ) ε11 (0; λ) ε21 (0; λ) W (x; λ) = det det W (0; λ) ε12 (x; λ) ε22 (x; λ) ε12 (0; λ) ε22 (0; λ)
= (1 + o(1)) exp((a + b)λi)W (0; λ)
(2.12)
Vol. 64 (2009)
Completeness Theorems for a Dirac-Type Operator
which gives the required estimate (2.9).
363
Now some further definitions and notations are given. First, recall the following definition from [16, Chap. 1]. The point λ0 ∈ C is an eigenvalue of the operator Z x 1 M (x, t)y(t) dt − λy (2.13) L(y; λ) = By 0 + Q(x)y + i 0 subject to the boundary conditions U1 (y; λ) = 0, U2 (y; λ) = 0 if there exists a nonzero vector function y0 such that L(y0 ; λ0 ) = 0,
U1 (y0 ; λ0 ) = U2 (y0 ; λ0 ) = 0.
Furthermore, a sequence y0 , y1 , y2 , . . . , yn is called a chain of the eigenfunction y0 and the associated functions y1 , y2 , . . . , yn (corresponding to the eigenvalue λ0 ) if the following equalities hold for k = 0, . . . , n: k X 1 ∂j = 0, L(yk−j ; λ) j j! ∂λ λ=λ0 j=0 k X 1 ∂j = 0, U (y ; λ) 1 k−j j j! ∂λ λ=λ0 j=0
(2.14)
k X 1 ∂j = 0. U2 (yk−j ; λ) j j! ∂λ λ=λ0 j=0 Clearly, for any eigenvalue λ0 of L(y, λ) defined by (2.13), dim ker(L(y, λ0 )) ≤ 2 holds. If dim ker(L(y, λ0 )) = 2, then the length of a maximal chain of an eigenfunction and its associated functions depends on the choice of an eigenvector. It is easily seen that the length of a maximal chain takes at most two values. De(1) (2) note these lengths by p0 and p0 . If the length of all such chains are equal, (1) (2) then p0 = p0 is equal to the length of each maximal chain. Otherwise, there (1) (2) is a maximal chain whose length is equal to min{p0 , p0 }, and maximal chains (1) (2) whose lengths are equal to max{p0 , p0 }. If dim ker(L(y, λ0 )) = 1 then we put (1) (2) min{p0 , p0 } = 0. Finally, the function χ(λ) defined by Q11 (λ) Q12 (λ) χ(λ) := det , (2.15) Q21 (λ) Q22 (λ) where Q11 (λ) = P11 (λ) + P13 (λ)ϕ01 (1; λ) + P14 (λ)ϕ02 (1; λ), Q12 (λ) = P12 (λ) + P13 (λ)ψ01 (1; λ) + P14 (λ)ψ02 (1; λ), Q21 (λ) = P21 (λ) + P23 (λ)ϕ01 (1; λ) + P24 (λ)ϕ02 (1; λ), Q22 (λ) = P22 (λ) + P23 (λ)ψ01 (1; λ) + P24 (λ)ψ02 (1; λ),
(2.16)
364
Hassi and Oridoroga
IEOT
is said to be the characteristic function of the problem (1.6), (1.8). The definition of χ(λ) in (2.15) is motivated by the next result. Proposition 2.4. The number λ0 ∈ C is an eigenvalue of the operator associated with the problem (1.6)–(1.8) if and only if χ(λ0 ) = 0. Moreover, the functions ω1 (x; λ0 ) and ω2 (x; λ0 ) given by ω1 (x; λ) = Q12 (λ)ϕ0 (x; λ) − Q11 (λ)ψ0 (x; λ)
(2.17)
ω2 (x; λ) = Q22 (λ)ϕ0 (x; λ) − Q21 (λ)ψ0 (x; λ)
(2.18)
and are eigenfunctions corresponding to the eigenvalue λ0 , or, one has ωj (x; λ0 ) ≡ 0. Moreover, all the eigenfunctions and associated functions corresponding to the eigenvalue λ0 are the nonzero functions of the form 1 ∂k , where 0 ≤ k < p0 , j = 1, 2. (2.19) ω (x; λ) j k k! ∂λ λ=λ0 Proof. It follows from (2.2) with α = 0 that for all λ ∈ C the function ω1 (x; λ) = (P12 (λ) + P13 (λ)ψ01 (1; λ) + P14 (λ)ψ02 (1; λ))ϕ0 (x; λ) − (P11 (λ) + P13 (λ)ϕ01 (1; λ) + P14 (λ)ϕ02 (1; λ))ψ0 (x; λ)
(2.20)
is a solution of the first equation in (1.8). Moreover, since P21 (λ)ω11 (0, λ) + P22 (λ)ω12 (0, λ) + P23 (λ)ω11 (1, λ) + P24 (λ)ω12 (1, λ) = −χ(λ), (2.21) ω1 (x; λ0 ) is a solution of the second equation in (1.8), if λ0 is a root of χ(λ). Similarly, for all λ ∈ C the function ω2 (x; λ) = (P22 (λ) + P23 (λ)ψ01 (1; λ) + P24 (λ)ψ02 (1; λ))ϕ0 (x; λ) − (P21 (λ) + P23 (λ)ϕ01 (1; λ) + P24 (λ)ϕ02 (1; λ))ψ0 (x; λ).
(2.22)
is a solution of the second equation in (1.8) and since P11 (λ)ω21 (0, λ) + P12 (λ)ω22 (0, λ) + P13 (λ)ω21 (1, λ) + P14 (λ)ω22 (1, λ) = χ(λ), (2.23) ω2 (x; λ0 ) is a solution of the first equation in (1.8) too, if λ0 is a root of χ(λ). Observe, that ω1 (x; λ) and ω2 (x; λ) are linearly independent for all λ 6= λ0 . If ωj (x; λ0 ), j = 1, 2, is nontrivial, then it is an eigenfunction corresponding to the eigenvalue λ0 . Moreover, if λ0 is a root of χ(λ) of the order p0 , then the functions ωj (x; λ) in (2.17), (2.17) give rise to at most p0 eigenfunctions and associated functions corresponding to λ0 . In fact, by differentiation w.r.t. λ it follows from (2.21), (2.23) that all nonzero functions given by 1 ∂k ω (x; λ) , where 0 ≤ k < p0 , j = 1, 2, (2.24) j k k! ∂λ λ=λ0
Vol. 64 (2009)
Completeness Theorems for a Dirac-Type Operator
365
are eigenfunctions and associated functions corresponding to the eigenvalue λ0 ; (1) (2) cf. (2.14). If dim ker(L(y, λ0 )) = 2 and p0 6= p0 and the maximal chains determined by the functions ω1 (x; λ) and ω2 (x; λ) via (2.24) both are of the length (1) (2) (2) (1) (2) max{p0 , p0 }, then we can put p0 = min{p0 , p0 } to get linearly independent chains. On the other hand, it follows from the definition (2.14) that all the eigenfunctions and the associate functions are obtained in this manner. The following two examples clarify the formulation of Proposition 2.4 and some of the definitions preceding it. Example. Consider the Dirac system, i.e. the system (1.6) with Q ≡ 0, M ≡ 0, a = −1, b = 1. The functions ϕ0 (x; λ) and ψ0 (x; λ) appearing in (2.1), (2.2) are given by −iλx e 0 ϕ0 (x; λ) = , ψ0 (x; λ) = iλx . 0 e Consider the boundary value problem for this system by adding the following boundary conditions ( y1 (0) + y2 (1) = 0 (2.25) y2 (0) + y1 (1) = 0. The characteristic determinant corresponding to the boundary condition (2.25) is now a zero function; 1 eiλ χ(λ) = det −iλ = 1 − 1 ≡ 0, e 1 though the boundary conditions are linearly independent. Since χ(λ) = 0, the eigenfunctions ω1 (x; λ) and ω2 (x; λ) in (2.17) and (2.18) are linearly dependent for each λ ∈ C. In fact, iλ(1−x) e ω1 (x; λ) = = eiλ ω2 (x; λ). −eiλx Example. Consider the Dirac system subject to the boundary conditions ( y1 (0) − y1 (1) = 0 y2 (0) − y2 (1) = 0. The characteristic determinant is now given by 1 − e−iλ 0 χ(λ) = det = −e−iλ (1 − eiλ )2 . 0 1 − eiλ The corresponding eigenvalues are λn = 2πn and their multiplicity is equal to two. Here the functions ω1 (x; λ) and ω2 (x; λ) in (2.17) and (2.18) associated to the 0 eigenvalues λn = 2πn satisfy ωj (x; λn ) ≡ 0. In fact, ω1 (x; λ) = −(1 − e−iλ ) eiλx , 0 and clearly ω1 (x; 2πn) ≡ 0 . At the same time, the corresponding derivative 0 ∂ ω1 (x; λ) = ∂λ −ie2πnix λ=2πn
366
Hassi and Oridoroga
IEOT
is an eigenfunction corresponding to the eigenvalue λn . −iλx Similarly, ω2 (x; λ) = (1−eiλ ) e 0 and ω2 (x; 2πn) ≡ 00 . The corresponding −2πnix ∂ derivative ∂λ ω2 (x; λ) λ=2πn = −ie 0 is a linearly independent eigenfunction associated to λn . The completeness result for the system (1.6) satisfying the assumptions (1.7) and involving the boundary conditions (1.8) can now be stated as follows. Theorem 2.5. Let Pij (i = 1, 2; j = 1, 2, 3, 4) be polynomials, let the rank of the polynomial matrix P11 (λ) P12 (λ) P13 (λ) P14 (λ) P (λ) = (2.26) P21 (λ) P22 (λ) P23 (λ) P24 (λ) be equal to 2 for all λ ∈ C, and let deg J14 = deg J32 ≥ max{deg J13 , deg J42 , M }, where M = max{ deg Pij : i ∈ {1, 2}; j ∈ {1, 2, 3, 4} } and P1i P1j Jij = det , i, j ∈ {1, 2, 3, 4}. P2i P2j
(2.27)
(2.28)
Then the SEAF of the problem (1.6)–(1.8) is complete in L2 [0, 1] ⊕ L2 [0, 1]. Moreover, let the set Φ, which consists of N := deg J14 − M eigenfunctions and associated functions, satisfy the following condition: If Φ contains either an eigenfunction or an associated function ωk corresponding to an eigenvalue λk , then it also contains all the associated functions of higher order corresponding to the same eigenvalue and the same function ωk . Then the SEAF of the problem (1.6)–(1.8) without the set Φ is also complete in the space L2 [0, 1] ⊕ L2 [0, 1]. Proof. Suppose that the SEAF of the problem (1.6), (1.8) without the set Φ is not complete in the space L2 [0, 1] ⊕ L2 [0, 1]. Then there exists a nonzero vector function f (x) = (f1 (x), f2 (x))> , which is orthogonal to the SEAF of the problem (1.6), (1.8) (possibly, excluding functions from the set Φ). Define Z 1 fj (λ) := hωj (x; λ), f (x)i = (2.29) F (ωj1 (x; λ)f1 (x) + ωj2 (x; λ)f2 (x)) dx. 0
fj (λ) is an entire function. If λs is an eigenvalue of multiplicity ps (= Clearly, F (1) (2) ps + ps ) and the set Φ contains neither an eigenfunction nor an associated function corresponding to λs , then it follows from Proposition 2.4 that λs is a root fj (λ) of order greater than or equal to ps . of F If Φ contains k eigenfunctions or associated functions corresponding to the fj (λ) of order greater than or equal to ps − k. eigenvalue λs , then λs is a root of F Let Φ 6= ∅ and denote by Λ the set of all eigenvalues of the problem (1.6), (1.8), such that the corresponding eigenfunctions or associated functions belong
Vol. 64 (2009)
Completeness Theorems for a Dirac-Type Operator
367
to the set Φ. For each λs ∈ Λ denote by qs the number of eigenfunctions and associated functions in Φ corresponding to λs . Define Y Π(λ) = (λ − λs )qs . (2.30) λs ∈Λ
Let λk be an eigenvalue of the problem (1.6), (1.8) of multiplicity pk . Then λk is a zero of the product Π(λ)Fej (λ) at least of order pk . Consequently, the functions fj (λ) Π(λ)F χ(λ) are entire. Next an estimate for these functions will be derived. One can rewrite χ(λ) as follows: Fj (λ) =
χ(λ) = J12 + J13 ψ01 (1; λ) + J14 ψ02 (1; λ) + J32 ϕ01 (1; λ) ϕ01 (1; λ) ψ01 (1; λ) + J42 ϕ02 (1; λ) + J34 det ϕ02 (1; λ) ψ02 (1; λ)
(2.31)
(2.32)
= J12 + J13 ψ01 (1; λ) + J14 ψ02 (1; λ) + J32 ϕ01 (1; λ) 1 + J42 ϕ02 (1; λ) + J34 1 + O =λ exp((a + b)λi). Then one obtains from (2.3), (2.4) in Lemma 2.1, and the assumption (2.27) the following estimates for χ(λ): 1 ))J32 exp(aλi), χ(λ) = (1 + O( =λ
λ ∈ C+ ;
1 O( =λ ))J14
−
χ(λ) = (1 + exp(bλi), λ ∈ C . Moreover, the definition of ωj (x; λ) (cf. (2.20) and (2.22)) implies that
(2.33) (2.34)
ωj (x; λ) = −Pj1 (λ)ψ0 (x; λ) + Pj2 (λ)ϕ0 (x; λ) 1 ) exp((a + b)λi)(−Pj3 (λ)ψ1 (x; λ) + Pj4 (λ)ϕ1 (x; λ)). + (1 + O =λ (2.35) If λ ∈ C+ , then (2.35) and the estimate (2.3) imply ωjk (x; λ) = (O(Pj1 (λ)) + O(Pj2 (λ))) exp(aλix) + (O(Pj3 (λ)) + O(Pj4 (λ))) exp(aλi) exp(bλix).
(2.36)
By using the Cauchy-Schwartz inequality one gets ! Z 1 exp(aλi) p , |fk (x) exp(aλix)| dx = O |=λ| 0 ! Z 1 1 |fk (x) exp(bλix)| dx = O p , |=λ| 0 since a < 0 < b. Consequently there exists a constant c1 > 0, such that, for =λ > c1 , ! ! exp(aλi) λM f Fj (λ) = O max |Pjk (λ)| p =O p eaλi . (2.37) k |=λ| |=λ|
368
Hassi and Oridoroga
Similarly, there exists a constant c2 < 0, such that, for =λ < c2 , ! M λ fj (λ) = O p F ebλi . |=λ|
IEOT
(2.38)
From (2.33), (2.34), (2.37), (2.38), and the assumption (2.27) one obtains finally the estimate ! 1 , |=λ| > c. (2.39) Fj (λ) = O p |=λ| By applying the Phragmen-Lindel¨of theorem for a strip one concludes that Fj (λ) ≡ 0. Consequently, Fej (λ) ≡ 0, i.e. f (x) is orthogonal to ω1 (x; λ) and ω2 (x; λ) for all λ. Observe, that if χ(λ) 6= 0 then the functions ω1 (x; λ) and ω2 (x; λ) are linearly independent. Hence, the functions ω1 (x; λ) and ω2 (x; λ) form a fundamental system of solutions of the equation (1.6) if λ is not an eigenvalue. Since the set of eigenvalues coincides with the set of all roots of χ(λ), this set is discrete. This implies that f (x) is orthogonal to all solutions of the equation (1.6), so that f (x) ≡ 0. Therefore, there is no nontrivial function f (x) orthogonal to the SEAF of the problem (1.6)–(1.8) (maybe without the set Φ). Remark 2.6. The estimates in (2.37) and (2.38) can be sharpened as follows: ! Mj λ fj (λ) = O p eaλi if =λ > c1 , F |=λ| ! λMj f ebλi if =λ < c2 , Fj (λ) = O p |=λ| where Mj = max{ deg Pjk : k ∈ {1, 2, 3, 4} }, j = 1, 2. Next the completeness result for the system (1.6) satisfying the assumptions (1.7) and involving the quadratic boundary conditions (1.9) is given. Theorem 2.7. Let Pij (i = 1, 2; j = 0, 1, . . . , 9) be polynomials, let the rank of the matrix P10 (λ) P11 (λ) . . . P19 (λ) (2.40) P20 (λ) P21 (λ) . . . P29 (λ) be equal to 2 for all λ ∈ C, and let deg J03 = deg J12 = M, where
P1i Jij = det P2i
P1j , P2j
i, j = 0, 1, . . . , 9,
(2.41) (2.42)
and M = max{ deg Pij : i ∈ {1, 2}; j ∈ {0, 1, . . . , 9} }. Then the SEAF of the problem (1.6), (1.7), (1.9) is complete in L2 [0, 1] ⊕ L2 [0, 1]. Moreover, let the set Φ, which consists of M eigenfunctions and associated functions, satisfy the following condition:
Vol. 64 (2009)
Completeness Theorems for a Dirac-Type Operator
369
If Φ contains either an eigenfunction or an associated function ωk corresponding to an eigenvalue λk , then it also contains all the associated functions of higher order corresponding to the same eigenvalue and the same function ωk . Then the SEAF of the problem (1.6), (1.7), (1.9) without the set Φ is also complete in the space L2 [0, 1] ⊕ L2 [0, 1]. Proof. The proof of this theorem is similar to the proof of Theorem 2.5. As in Theorem 2.5 one considers the characteristic function and the functions ω1 (x; λ) and ω2 (x; λ), but in this case these functions will be defined by other formulas. Let ω(x; λ) be an arbitrary solution of the system (1.6) with (1.7). Then ω(x; λ) may be written in the form ω(x; λ) = Aϕ0 (x; λ) + Bψ0 (x; λ). It follows that the solution ω(x; λ) to (1.6) satisfies the boundary conditions (1.9) if and only if P10 (λ)A2 + P11 (λ)B 2 + P12 (λ)(Aϕ01 ( 21 ; λ) + Bψ01 ( 12 ; λ))2 + P13 (λ)(Aϕ02 ( 12 ; λ) + Bψ02 ( 21 ; λ))2 + P14 (λ)AB + P15 (λ)A(Aϕ01 ( 21 ; λ) + Bψ01 ( 21 ; λ)) + P16 (λ)A(Aϕ02 ( 12 ; λ) + Bψ02 ( 12 ; λ)) + P17 (λ)B(Aϕ01 ( 12 ; λ) + Bψ01 ( 12 ; λ)) + P18 (λ)B(Aϕ02 ( 21 ; λ) + Bψ02 ( 12 ; λ)) + P19 (λ)(Aϕ01 ( 1 ; λ) + Bψ01 ( 1 ; λ))(Aϕ02 ( 1 ; λ) + Bψ02 ( 1 ; λ)) = 0, 2 2 2 2 P20 (λ)A2 + P21 (λ)B 2 + P22 (λ)(Aϕ01 ( 21 ; λ) + Bψ01 ( 12 ; λ))2 + P23 (λ)(Aϕ02 ( 12 ; λ) + Bψ02 ( 21 ; λ))2 + P24 (λ)AB + P25 (λ)A(Aϕ01 ( 21 ; λ) + Bψ01 ( 21 ; λ)) + P26 (λ)A(Aϕ02 ( 12 ; λ) + Bψ02 ( 12 ; λ)) + P27 (λ)B(Aϕ01 ( 12 ; λ) + Bψ01 ( 12 ; λ)) + P28 (λ)B(Aϕ02 ( 21 ; λ) + Bψ02 ( 12 ; λ)) + P29 (λ)(Aϕ01 ( 12 ; λ) + Bψ01 ( 21 ; λ))(Aϕ02 ( 12 ; λ) + Bψ02 ( 12 ; λ)) = 0. (2.43) The system (2.43) may be rewritten in the form ( Q11 (λ)A2 + Q12 (λ)AB + Q13 (λ)B 2 = 0, (2.44) Q21 (λ)A2 + Q22 (λ)AB + Q23 (λ)B 2 = 0, where Q11 (λ) = P10 (λ) + P12 (λ)ϕ201 ( 21 ; λ) + P13 (λ)ϕ202 ( 12 ; λ) + P15 (λ)ϕ01 ( 12 ; λ) + P16 (λ)ϕ02 ( 21 ; λ) + P19 (λ)ϕ01 ( 21 ; λ)ϕ02 ( 12 ; λ), Q12 (λ) = 2P12 (λ)ϕ01 ( 21 ; λ)ψ01 ( 12 ; λ) + 2P13 (λ)ϕ02 ( 21 ; λ)ψ02 ( 12 ; λ) + P14 (λ) + P15 (λ)ψ01 ( 12 ; λ) + P16 (λ)ψ02 ( 12 ; λ) + P17 (λ)ϕ01 ( 21 ; λ) + P18 (λ)ϕ02 ( 12 ; λ) + P19 (λ)(ϕ01 ( 21 ; λ)ψ02 ( 12 ; λ) + ψ01 ( 12 ; λ)ϕ02 ( 12 ; λ)),
370
Hassi and Oridoroga
IEOT
2 1 2 1 Q13 (λ) = P11 (λ) + P12 (λ)ψ01 ( 2 ; λ)) + P13 (λ)ψ02 ( 2 ; λ)
+ P17 (λ)ψ01 ( 12 ; λ)) + P18 (λ)ψ02 ( 12 ; λ) + P19 (λ)ψ01 ( 12 ; λ)ψ02 ( 12 ; λ), Q21 (λ = P20 (λ) + P22 (λ)ϕ201 ( 21 ; λ) + P23 (λ)ϕ202 ( 12 ; λ) + P25 (λ)ϕ01 ( 12 ; λ) + P26 (λ)ϕ02 ( 21 ; λ) + P29 (λ)ϕ01 ( 21 ; λ)ϕ02 ( 12 ; λ), Q22 (λ) = 2P22 (λ)ϕ01 ( 21 ; λ)ψ01 ( 12 ; λ) + 2P23 (λ)ϕ02 ( 21 ; λ)ψ02 ( 12 ; λ) + P24 (λ) + P25 (λ)ψ01 ( 12 ; λ) + P26 (λ)ψ02 ( 12 ; λ) + P27 (λ)ϕ01 ( 21 ; λ) + P28 (λ)ϕ02 ( 12 ; λ) + P29 (λ)(ϕ01 ( 21 ; λ)ψ02 ( 12 ; λ) + ψ01 ( 12 ; λ)ϕ02 ( 12 ; λ)), 2 1 2 1 Q23 (λ) = P21 (λ) + P22 (λ)ψ01 ( 2 ; λ)) + P23 (λ)ψ02 ( 2 ; λ)
+ P27 (λ)ψ01 ( 12 ; λ)) + P28 (λ)ψ02 ( 12 ; λ) + P29 (λ)ψ01 ( 12 ; λ)ψ02 ( 12 ; λ). It is well known (see, for example, [25, Chap. 5, §34]), that a system of two quadratic equations has a nonzero solution if and only if, the resultant is equal to 0. Therefore, λ0 is an eigenvalue of the problem (1.6), (1.9) if and only if χ(λ0 ) = 0, where Q11 Q12 Q13 0 0 Q11 Q12 Q13 2 = D13 − D12 D23 (2.45) χ(λ) = det Q21 Q22 Q23 0 0 Q21 Q22 Q23 with Q1i Q1j Dij = det . (2.46) Q2i Q2j Moreover, the multiplicity of λ0 as a zero of the function χ(λ) is equal to the number of eigenfunctions and associated functions corresponding to the eigenvalue λ0 . To see this, introduce the functions ω1 (x; λ) := D13 ϕ0 (x; λ) − D12 ψ0 (x; λ), (2.47) ω2 (x; λ) := D23 ϕ0 (x; λ) − D13 ψ0 (x; λ). The function ω1 (x; λ) satisfies the boundary conditions (1.9) if and only if ( 2 2 Γ1 (λ) := Q11 (λ)D13 (λ) − Q12 (λ)D13 (λ)D12 (λ) + Q13 (λ)D12 (λ) = 0 (2.48) 2 2 Γ2 (λ) := Q21 (λ)D13 (λ) − Q22 (λ)D13 (λ)D12 (λ) + Q23 (λ)D12 (λ) = 0. Observe that Γ1 (λ) = Q11 (λ)χ(λ)
and Γ2 (λ) = Q21 (λ)χ(λ).
Hence, if λ0 is an eigenvalue of multiplicity p0 , then ∂k ∂k Γ (x; λ) = 0 and Γ (x; λ) =0 1 2 k k ∂λ ∂λ λ=λ0 λ=λ0 Therefore, in this case, all nonzero functions ∂k ω (x; λ) with k < p0 , 1 k ∂λ λ=λ0
for all k < p0 .
(2.49)
(2.50)
(2.51)
Vol. 64 (2009)
Completeness Theorems for a Dirac-Type Operator
371
are eigenfunctions and associated functions, corresponding to the eigenvalue λ0 . Similarly all nonzero functions given by ∂k with k < p0 , (2.52) ω2 (x; λ) k ∂λ λ=λ0
are eigenfunctions and associated functions, corresponding to the eigenvalue λ0 , too. Now, introduce the Wronski determinant ϕ01 (x; λ) ψ01 (x; λ) W (x; λ) = det . ϕ02 (x; λ) ψ02 (x; λ) Then χ(λ) may be transformed to a polynomial of degree 4 with the arguments ϕ01 ( 21 ; λ), ψ01 ( 21 ; λ), ϕ02 ( 12 ; λ), ψ02 ( 12 ; λ), and W ( 12 , λ), having all the coefficients 2 of form Jij Jkl . In particular, the coefficient of ϕ40,1 ( 12 ; λ) is equal to J12 , and the 4 2 coefficient of ψ0,2 ( 21 ; λ) is equal to J03 . Therefore, from the condition (2.41), the estimates (2.3), (2.4), and the following estimate (cf. Lemma 2.3) 1 exp((a + b)λi), (2.53) W (x; λ) = 1 + O =λ one can derive the following estimates for the characteristic function χ(λ): 2 1 χ(λ) = (1 + O( =λ ))J12 exp(2aλi)
for λ ∈ C+ ;
(2.54)
and 2 1 χ(λ) = (1 + O( =λ ))J03 exp(2bλi) for λ ∈ C− . (2.55) Suppose that the SEAF of the problem (1.6), (1.9) without the set Φ is not complete in the space L2 [0, 1]⊕L2 [0, 1]. Then there exists a nonzero vector-function f1 (x) f (x) = (2.56) f2 (x)
which is orthogonal to the SEAF of problem (1.6)–(1.9) (possibly excluding the functions from the set Φ). Just as in the proof of Theorem 2.5 introduce the functions F˜j (λ) and Π(λ) by the formulae (2.29) and (2.30). Then, as before, the functions Π(λ)F˜j (λ) (2.57) Fj (λ) = χ(λ) are entire. Let g(x) = (c1 ψ01 ( 12 ; λ) + c2 ψ02 ( 21 ; λ))ϕ0 (x; λ) − (c1 ϕ01 ( 21 ; λ) + c2 ϕ02 ( 12 ; λ))ψ0 (x; λ), where c1 and c2 are arbitrary complex coefficients. From (2.53) one gets the estimate (−c1 + O λ1 ) exp((a + b)λi) 1 g( 2 ) = (c2 + O λ1 ) exp((a + b)λi) and this implies that the function g(x) satisfies the estimate 1 g(x) = 1 + O =λ exp( 12 (a + b)λi)(−c1 ψ 1 (x; λ) + c2 ϕ 1 (x; λ)), (2.58) 2
2
372
Hassi and Oridoroga
IEOT
where the functions ϕ 1 (x; λ) and ψ 1 (x; λ) are solutions of the Cauchy problem 2
2
for the system (1.6) with the initial conditions ϕ 1 ( 12 ; λ) = ψ 1 ( 12 ; λ) = 1 21
22
and
ϕ 1 ( 21 ; λ) = ψ 1 ( 12 ; λ) = 0. 22
21
(2.59)
As in Lemma 2.1 one can derive for these functions the following estimates: • if λ ∈ C+ and x > 21 , then 1 )) exp(aλi(x − 21 )), ϕ 1 (x; λ) = (1 + O( =λ 21
1 ϕ 1 (x; λ) = O( =λ ) exp(aλi(x − 21 )), 22
1 ψ 1 (x; λ) = O( =λ ) exp(aλi(x − 21 )),
(2.60)
21
1 ψ 1 (x; λ) = O( =λ ) exp(aλi(x − 21 )); 22
• if λ ∈ C+ and x < 12 , then 1 ϕ 1 (x; λ) = O( =λ ) exp(bλi(x − 21 )), 21
1 ϕ 1 (x; λ) = O( =λ ) exp(bλi(x − 21 )), 22
1 ψ 1 (x; λ) = O( =λ ) exp(bλi(x − 21 )),
(2.61)
21
1 ψ 1 (x; λ) = (1 + O( =λ )) exp(bλi(x − 12 )); 22
• if λ ∈ C− and x > 12 , then 1 ϕ 1 (x; λ) = O( =λ ) exp(bλi(x − 21 )), 21
1 ϕ 1 (x; λ) = O( =λ ) exp(bλi(x − 21 )), 22
1 ψ 1 (x; λ) = O( =λ ) exp(bλi(x − 21 )),
(2.62)
21
1 ψ 1 (x; λ) = (1 + O( =λ )) exp(bλi(x − 12 )); 22
• if λ ∈ C− and x < 12 , then 1 ϕ 1 (x; λ) = (1 + O( =λ )) exp(bλi(x − 12 )), 21
1 ) exp(bλi(x − 21 )), ϕ 1 (x; λ) = O( =λ 22
1 ψ 1 (x; λ) = O( =λ ) exp(bλi(x − 21 )),
(2.63)
21
1 ψ 1 (x; λ) = O( =λ ) exp(aλi(x − 12 )). 22
Using the formula (2.58) and the estimates (2.3), (2.4), (2.60)–(2.63) one gets the following estimates for the functions in (2.47) ωi (x; λ) = O(λM exp(iaλ(x + 1)))
if =λ > 0,
(2.64)
Vol. 64 (2009)
Completeness Theorems for a Dirac-Type Operator
373
and ωi (x; λ) = O(λM exp(ibλ(x + 1))) if =λ < 0. (2.65) From the estimates (2.54), (2.55), (2.64), (2.65) one finally gets the estimates ! 1 Fi (λ) = O p , |=λ| > C, (2.66) |=λ| where C > 0 is a constant. Then, by the Phragmen-Lindel¨of theorem for a strip, one again concludes that Fj (λ) ≡ 0, and therefore F˜j (λ) ≡ 0, i.e. f (x) is orthogonal to ω1 (x; λ) and ω2 (x; λ) for all λ. Observe that, if χ(λ) 6= 0, then the functions ω1 (x; λ) and ω2 (x; λ) are linearly independent. Therefore, for these values of λ, ω1 (x; λ) and ω2 (x; λ) form a fundamental system of solutions of the system (1.6). Now as in the proof of Theorem 2.5 one concludes that f (x) is orthogonal to all solutions of the system (1.6). Consequently, f (x) ≡ 0 and this completes the proof.
3. Riesz basis property of the SEAF In this section some sufficient conditions for the Riesz basis property of the SEAF of the system (1.6) with separated λ-depending boundary conditions will be established. First recall the definition of a Riesz basis. Definition 3.1. A system of vectors {ψn }∞ n=1 is called a Riesz basis in the Hilbert space H if there exists a bounded operator A with bounded inverse A−1 , such that the transformed system {Aψn }∞ n=1 forms an orthonormal basis in H. The following lemma is well known (see [5, Chap. VI, §3]). Lemma 3.2. Let the system of the vectors {ψn }∞ a Hilbert space n=1 P∞be complete in 2 H. Let {ϕn }∞ be a Riesz basis of H such that kψ − φ k < ∞. Then the n n n=1 n=1 system {ψn }∞ is a Riesz basis of H, too. n=1 Also the following lemma, which concerns the spectrum of the system (1.6) with separated λ-depending boundary conditions, will be needed. Lemma 3.3. Assume that Q(x) ∈ C 1 [0, 1] ⊗ C2×2 and M (x, t) ∈ C 1 (Ω)⊗C2×2 . Let P11 (λ) and P12 (λ) be relatively prime polynomials such that deg P11 = deg P12 = N0 and let P21 (λ) and P22 (λ) be relatively prime polynomials such that deg P21 = deg P22 = N1 . Let Cij be the leading coefficient of the polynomial Pij (λ) and denote C1 = C12 C21 and C2 = C11 C22 . Furthermore, assume that the set Λ contains N = N0 + N1 (arbitrary) eigenvalues of the problem (1.6) with separated λ-depending boundary conditions given by ( P11 (λ)y1 (0) + P12 (λ)y2 (0) = 0 (3.1) P21 (λ)y1 (1) + P22 (λ)y2 (1) = 0.
374
Hassi and Oridoroga
IEOT
Then it is possible to enumerate the remaining (all but N ) eigenvalues, so that i ln(C1 /C2 ) + 2πn 1 λn = +O , where n ∈ Z. (3.2) b−a |n| Proof. The characteristic function χ(λ) in (2.15) of the system (1.6) with the boundary conditions in (3.1) takes the form (compare (2.21), (2.23)) χ(λ) = P11 (λ)(P21 (λ)ψ01 (1; λ) + P22 (λ)ψ02 (1; λ)) − P12 (λ)(P21 (λ)ϕ01 (1; λ) + P22 (λ)ϕ02 (1; λ)), where the products of polynomials are all of degree N by assumptions. Introduce the function Y ˜ s )ps , (λ − λ Π(λ) = ˜ s ∈Λ λ
˜ s in the set Λ. Then the eigenvalues where ps is the multiplicity of the eigenvalue λ which do not belong to the set Λ are the roots of the entire function χ(λ) ˜ := −
χ(λ) . Π(λ)
It follows from Lemma 2.2 that the function χ(λ) ˜ satisfies the following estimate: χ(λ) ˜ = C1 exp(aλi) − C2 exp(bλi) +
1 O(max{exp(aλi), exp(bλi)}), λ
(3.3)
where C1 C2 6= 0. On the line = ln(C1 /C2 ) + (2n + 1)π , b−a which is determined by the equation arg(C1 exp(aλi)) = arg(−C2 exp(bλi)), one has |C1 exp(aλi) − C2 exp(bλi)| = |C1 exp(aλi)| + |C2 exp(bλi)|. (3.4) <λ =
From (3.3) and (3.4) one concludes that on this line, with |λ| large enough, |χ(λ) ˜ − (C1 exp(aλi) − C2 exp(bλi))| < |C1 exp(aλi) − C2 exp(bλi)|.
(3.5)
Therefore, it follows from Rouche’s theorem (see [18, Theorem 10.43; Exercise 24, p.229]) and the estimates (3.3) and (3.5) that for |n| large enough there exists precisely one root of χ(λ) ˜ in the strip (2n − 1)π < (b − a)<λ + = ln(C1 /C2 ) < (2n + 1)π,
(3.6)
and, furthermore, that there are 2|n| − 1 roots of the function χ(λ) ˜ in the strip −(2|n| − 1)π < (b − a)<λ + = ln(C1 /C2 ) < (2|n| − 1)π.
(3.7)
Thus, in particular, the roots of χ(λ) ˜ except for, possibly, a finite number of them, are simple. Moreover, the roots λn of χ(λ) ˜ can be ordered as a bilateral sequence, so that for |n| > n0 , λn belongs to the strip (3.6).
Vol. 64 (2009)
Completeness Theorems for a Dirac-Type Operator
375
Let λn,0 =
i ln(C1 /C2 ) + 2πn b−a
(3.8)
be the root of the function χ ˜0 (λ) = C1 exp(aλi) − C2 exp(bλi). Consider a disk D(n, ρ) with the radius ρ and the center λn,0 . For λ ∈ D(n, ρ) it follows from (3.3) that there exist K1 and K2 , such that |λ||χ(λ) ˜ −χ ˜0 (λ)| < K2 (| exp(a=λ)| + | exp(b=λ)|) < K1 .
(3.9)
Moreover, because =λ is independent of n, K1 is independent of n, too. On the other hand, because the derivative of the function χ ˜0 (λ) at λn,0 is nonzero, then, for ρ small enough there exists K3 , such that |χ ˜0 (λ)| > K3 |λ−λn,0 |. 1 and |λ − λn,0 | = ρ, then (3.9) implies that Therefore, if ρ ≥ KK3 |λ| |χ ˜0 (λ)| >
K1 | exp(a=λ)| + | exp(b=λ)| > K2 > |χ(λ) ˜ −χ ˜0 (λ)|. |λ| |λ|
(3.10)
Hence, again by Rouche’s theorem, in this disk the functions χ(λ) ˜ and χ ˜0 (λ) have the same number of roots, i.e., precisely one root. 2πn Therefore, |λn − λn,0 | < K3K|λ1 n | and since λn = b−a + O(1), one has K3K|λ1 n | = 1 ). Now, using the formula (3.8), the statement in (3.2) follows. O( |n| Lemmas 3.2 and 3.3 are used to prove the following theorem. Theorem 3.4. Assume that Q(x) ∈ C 1 [0, 1] ⊗ C2×2 and M (x, t) ∈ C 1 (Ω)⊗C2×2 . Let P11 (λ) and P12 (λ) be relatively prime polynomials such that deg P11 = deg P12 = N0 and let P21 (λ) and P22 (λ) be relatively prime polynomials such that deg P21 = deg P22 = N1 . Moreover, let Φ be a set, which consists of N = N0 + N1 eigenfunctions and associated functions of the problem (1.6), (3.1) and assume that the SEAF of this problem without the set Φ is complete in the space L2 [0, 1] ⊕ L2 [0, 1]. Then the SEAF of problem (1.6), (3.1) without the set Φ forms a Riesz basis in the space L2 [0, 1] ⊕ L2 [0, 1]. Proof. By Lemma 3.3, it is possible to enumerate the eigenvalues λn , corresponding to the eigenfunctions ωn (x) which are not contained in the set Φ, such that i ln(C1 /C2 ) + 2πn 1 λn = +O . b−a |n| Because ωn (x) satisfies the first of the conditions in (3.1), it may be written in the form ωn (x) = P12 (λn )ϕ0 (x; λn ) − P11 (λn )ψ0 (x; λn ) (up to a constant multiplier); cf. (2.17). Then, by Lemma 2.2, C12 exp(aλn ix) 1 (O(exp(aλn ix)) + O(exp(bλn ix))). (3.11) ωn (x) = + −C11 exp(bλn ix) λn
376
Hassi and Oridoroga
IEOT
Combining the estimates (3.2) in Lemma 3.3 with (3.11) one obtains /C2 )+2πn i ln(C /C ) + 2πn C12 exp(a i ln(C1b−a ix) 1 1 2 ωn (x) = + O exp a ix /C2 )+2πn n b−a ix) −C11 exp(b i ln(C1b−a i ln(C /C ) + 2πn 1 2 ix + O exp b b−a /C2 )+2πn 1 C12 exp(a i ln(C1b−a ix) . (3.12) = + O n −C11 exp(b i ln(C1 /C2 )+2πn ix) b−a
Now define the operator A : L2 [0, 1] ⊕ L2 [0, 1] → L2 [a, b] via ( 1 y1 ( x ), where a < x < 0 y1 A (x) = C121 a x y2 − C11 y2 ( b ), where 0 < x < b.
(3.13)
Then A and A−1 are bounded. Therefore, the system ωn (x) is a Riesz basis in the space L2 [0, 1] ⊕ L2 [0, 1] if and only if the system A(ωn ) is a Riesz basis in the space L2 [a, b]. From the estimate (3.12) and the definition of A in (3.13) one obtains 1 i ln(C /C ) + 2πn 1 2 ix + O . (3.14) A(ωn ) = exp b−a n It is obvious that the system i ln(C /C ) + 2πn 1 2 ix ω ˜ n = exp b−a is a Riesz basis in the space L2 [a, b] and that the norms of ω ˜ n are given by Z b <(ln(C /C )) 1 2 k˜ ωn k2 = x dx, n ∈ Z. exp −2 b − a a From the estimate (3.14) one concludes that ∞ X
kA(ωn ) − ω ˜ n k2 < ∞.
n=−∞
Therefore, by Lemma 3.2, A(ωn ) is a Riesz basis in L2 [a, b].
Theorem 3.4 is conditional in character since it assumes completeness of the root vectors of the problem (1.6), (3.1). Using Theorem 2.5 one can obtain an unconditional result under some additional assumptions on the set Φ and the polynomials Pjk (λ) in the boundary conditions (3.1). Theorem 3.5. Let Q(x) ∈ C 1 [0, 1] ⊗ C2×2 and M (x, t) ∈ C 1 (Ω)⊗C2×2 . Let deg P11 = deg P12 = 0, i.e., P11 6= 0 and P12 6= 0 are constants. Let P21 (λ) and P22 (λ) be relatively prime polynomials with deg P21 = deg P22 = N . Moreover, let Φ be a set, which consists of N eigenfunctions and associated functions, which satisfies the following condition:
Vol. 64 (2009)
Completeness Theorems for a Dirac-Type Operator
377
If Φ contains either an eigenfunction or an associated function uk corresponding to an eigenvalue λk , then it also contains all the associated functions of higher order corresponding to the same eigenvalue and the same function uk . Then the SEAF of the problem (1.6), (3.1) without the set Φ forms a Riesz basis in the space L2 [0, 1] ⊕ L2 [0, 1]. Proof. It is shown that the SEAF of the problem (1.6), (3.1) without the set Φ is complete in the space L2 [0, 1]⊕L2 [0, 1]. Let ωn (x) be the eigenfunctions associated to the eigenvalues λn as in the proof of Theorem 3.4, i.e., they corresponding to the function ω1 (x; λ) in Proposition 2.4. Now it suffices to consider orthogonality of f (x) only to ω1 (x; λ) in Theorem 2.5. The estimates in Remark 2.6 with j = 1 show that in the present case we can allow in Theorem 2.5 deg J14 − M1 = deg J14 = N eigenfunctions and associated functions in the set Ω therein. Hence, Theorem 2.5 implies that the SEAF of the problem (1.6), (3.1) without the set Φ is complete in the space L2 [0, 1] ⊕ L2 [0, 1]. Therefore, by Theorem 3.4 it is also a Riesz basis. By taking N = 0 in Theorem 3.5 we arrive at the following corollary for the system (1.6) with boundary conditions not depending on a spectral parameter. Corollary 3.6. Let Q(x) ∈ C 1 [0, 1] ⊗ C2×2 and M (x, t) ∈ C 1 (Ω)⊗C2×2 , and let h1 and h2 be nonzero numbers. Then the SEAF of problem (1.6) with the boundary conditions ( y1 (0) + h1 y2 (0) = 0, (3.15) y1 (1) + h2 y2 (1) = 0, forms a Riesz basis in the space L2 [0, 1] ⊕ L2 [0, 1]. Remark 3.7. For the special case of Dirac systems (b = −a = 1, M (x, t) ≡ 0) the result in Corollary 3.6 was proved earlier by I. Trooshin and M. Yamamoto [23] under the same assumption Q ∈ C 1 [0, 1] ⊗ C2×2 ; this smoothness assumption has been weakened to Q ∈ L2 [0, 1] ⊗ C2×2 in [24]. Also B. Mityagin has relaxed the smoothness assumptions on Q and established in [15, Theorem 8.8] an unconditional convergence result for the associated spectral decompositions involving Riesz projections for Dirac systems with periodic or anti-periodic boundary conditions. Remark 3.8. A referee has drawn our attention to the recent preprint [4] by P. Djakov and B. Mityagin which was submitted on arXiv.org after the submission of the present paper on arXiv.org and to IEOT. In [4] the Riesz basis property for Dirac systems has been established under the assumption Q ∈ L2 [0, 1] ⊗ C2×2 in the case of periodic, anti-periodic, and Dirichlet boundary conditions; see [4, Theorem 9]. Furthermore, in [4, Section 5.2] a similar statement is announced also for general regular boundary conditions. Their approach relies on the convergence P of the series |n|>N kPn − Pn0 k2 < ∞ (N sufficiently large) involving certain Riesz projections corresponding to the Dirac operator L with an L2 -potential and the free Dirac operator L0 (see [4, Theorem 3]) and then applies Bari-Markus Theorem (see e.g. [5]).
378
Hassi and Oridoroga
IEOT
Acknowledgment The authors would like to thank Mark Malamud for the fruitful discussions and useful remarks during the preparation of this paper.
References [1] N.I. Akhiezer, I.M. Glazman, Theory of linear operators in Hilbert space, Moskow, “Nauka”, 1966. [2] P. Djakov, B. Mityagin, Instability zones of periodic 1D Schr¨ odinger and Dirac opero ators (Russian), Uspehi Mat. Nauk 61 N-4 (2006), 77–182 (English: Russian Math. o Surveys 61 N-4 (2006), 663–766). [3] P. Djakov, B. Mityagin, Bari-Markus property for Riesz projections of Hill operators with singular potentials, Manuscript, arXiv:0803.3170. [4] P. Djakov, B. Mityagin, Bari-Markus property for Riesz projections of 1D Periodic Dirac operators, Manuscript, arXiv:0901.0856. [5] I.C. Gohberg, M.G. Kre˘ın, Introduction to the theory of linear nonselfajoint operators, Moskva, “Nauka”, 1965. [6] S. Hassi, L.L. Oridoroga, Completeness theorems for Dirac-type operators with boundary conditions of general form depending on the spectral parameter, Math. Notes 74 o N-2 (2003), 316–320. [7] S. Hassi, L.L. Oridoroga, Completeness and Riesz basis property of systems of eigenfunctions and associated functions of Dirac-type operators with boundary conditions o depending on the spectral parameter, Math. Notes 79 N-4 (2006), 636–640. [8] S. Hassi, L.L. Oridoroga, Theorem of completeness for a Dirac-type operator with generalized λ-depending boundary conditions, Manuscript, arXiv:0808.0135v1. [9] M.V. Keldysh, On the characteristic values and characteristic functions of certain o classes of non-self-adjoint equations (Russian), Dokl. Akad. Nauk SSSR 77 N-1 (1951), 11–14. [10] B.M. Levitan, I.S. Sargsjan, Introduction to the spectral theory, Moscow, “Nauka”, 1970. [11] M.M. Malamud, Problems of the uniqueness in the inverse problems for the system of differential equations in bounded interval, Trans. Moscow Math. Soc. 60 (1999), 199–258. [12] M.M. Malamud, L.L. Oridoroga, Theorems of the completeness for the systems of o ordinary differential equations, Functional Analysis and Applications 34 N-3 (2000), 88–90. [13] V.A. Marchenko, Sturm-Liouville operators and their applications, Kyiv, “Naukowa dumka”, 1977. [14] R. Mennicken, M. M¨ oller, Non-self-adjoint boundary eigenvalue problems, NorthHolland Mathematics Studies, 192. North-Holland Publishing Co., Amsterdam, 2003. [15] B. Mityagin, Spectral expansions of one-dimensional periodic Dirac operators, Dyn. o Partial Differ. Equ. 1 N-2 (2004), 125–191. [16] M.A. Na˘ımark, Linear differential operators, Moscow, “Nauka”, 1968.
Vol. 64 (2009)
Completeness Theorems for a Dirac-Type Operator
379
[17] L.L. Oridoroga, Boundary value problems for 2 × 2 Dirac type systems with spectral parameter in boundary conditions, Methods of Functional Analysis and Topology 7 o N-1 (2001), 82–87. [18] W. Rudin, Real and complex analysis 3rd Edition, McGraw-Hill, 1986. [19] A.A. Shkalikov, The completeness of eigenfunctions and associated functions of an ordinary differential operator with irregular-spliting boundary conditions, Functional o Analysis and Applications 10 N-4 (1976), 69–80. [20] E.I. Tarapowa, Boundary-value problem of Sturm–Liouville equations with nonlinear boundary conditions. I, Theory of Functions, Functional Analysis and Applications 31 (1979), 157–160. [21] E.I. Tarapowa, Boundary-value problem of Sturm–Liouville equations with nonlinear boundary conditions. II, Theory of Functions, Functional Analysis and Applications 33 (1979), 82–87. [22] C. Tretter, Spectral problems for systems of differential equations y 0 + A0 y = λA1 y with λ-polynomial boundary conditions, Math. Nachr. 214 (2000), 129–172. [23] I. Trooshin, M. Yamamoto, Riesz basis of root vectors of a nonsymmetric system of first-order ordinary differential operators and application to inverse eigenvalue o problems, Appl. Anal. 80 N-1-2 (2001), 19–51. [24] I. Trooshin, M. Yamamoto, Spectral properties and an inverse eigenvalue problem for nonsymmetric systems of ordinary differential operators, J. Inverse Ill-Posed Probl. o 10 N-6 (2002), 643–658. [25] B.L. van der Waerden, Algebra, Frederick Ungar Publishing Co., New York, 1970. Seppo Hassi Department of Mathematics and Statistics University of Vaasa P.O. Box 700 65101 Vaasa Finland e-mail: [email protected] Leonid Oridoroga Department of Mathematical Analysis Donetsk National University Universitetskaya str. 24 83055 Donetsk Ukraine e-mail: [email protected] Submitted: August 28, 2008. Revised: June 18, 2009.
Integr. equ. oper. theory 64 (2009), 381–398 c 2009 Birkh¨
auser Verlag Basel/Switzerland 0378-620X/030381-18, published online June 26, 2009 DOI 10.1007/s00020-009-1695-9
Integral Equations and Operator Theory
Maximal Abelian von Neumann Algebras and Toeplitz Operators with Separately Radial Symbols Hansong Huang Abstract. This paper mainly concerns abelian von Neumann algebras generated by Toeplitz operators on weighted Bergman spaces. Recently a family of abelian w∗ -closed Toeplitz algebras has been obtained (see [5,6,7,8]). We show that this algebra is maximal abelian and is singly generated by a Toeplitz operator with a “common” symbol. A characterization for Toeplitz operators with radial symbols is obtained and generalized to the high dimensional case. We give several examples for abelian von Neumann algebras in the case of high dimensional weighted Bergman spaces, which are different from the one dimensional case. Mathematics Subject Classification (2000). Primary 47C15; Secondary 32A36. Keywords. Weighted Bergman spaces, abelian von Neumann algebra, Toeplitz operator, radial, separately radial.
1. Introduction Let D be the unit disk in C and dA the normalized area measure on it, i.e. 2 dA(z) = dxdy π (z = x+iy). Consider the weighted Bergman space Aα (D) (α > −1), consisting of all holomorphic functions which are square integrable on D with respect to the weighted measure dAα (z) = cα (1 − |z|2 )α dA(z), where cα satisfies R c (1 − |z|2 )α dA(z) = 1. Given a function a(z) ∈ L1 (D, dAα ), the Toeplitz operD α ator Taα with the symbol a is defined on A2α (D) as follows: Z Taα f (z) = K (α) (z, w)f (w)a(w)dAα (w), f ∈ A2α (D), D
where K (α) (z, ·) is the reproducing kernel at the point z ∈ D, i.e. 1 K α (z, w) = , w ∈ D. (1 − zw)2+α
382
Huang
IEOT
It is well known (for example, see [11]) that Toeplitz operators with radial symbols commute. Recently, S. Grudsky, A. Karapetyants, R. Quiroga-Barranco and N. Vasilevski have found a rich family of symbols which generate an abelian C ∗ algebra of Toeplitz operators. These abelian properties strongly depend on the geometry of the unit disk, the hyperbolic geometry, but less on the smoothness of symbols. Precisely, given a pencil of geodesics on D, consider the set A(D) of all (bounded) symbols constant on the corresponding cycles (see [2,8] for the definitions of pencil and cycles). The C ∗ -algebra or von Neumann algebra generated by Toeplitz operators with such symbols is abelian on each weighted Bergman space. For details, the reader can consult [5,6,7] and [20,21]. The inverse is true in an appropriate sense. In [8], they showed that under certain conditions, there are no other sets of symbols inducing abelian C ∗ -algebras of Toeplitz operators on each weighted Bergman space. The characterization for commutativity is surprising and deep. And very recently, a high dimensional approach to the unit ball Bn has been made by R. Quiroga-Barranco and N. Vasilevski, see [14] and [15]. There the commutativity property of C ∗ -algebras generated by Toeplitz operators and the geometric properties of these symbols of those operators are tightly related. These fruitful results are both interesting and instructive. It seems that the von Neumann algebra generated by Toeplitz operators related to a pencil (as mentioned above) is maximal abelian on each weighted Bergman space A2α (D). Actually, this is the case. Given a pencil of geodesics, the corresponding von Neumann algebra is maximal abelian. Moreover, we find that there is a single bounded symbol, whose corresponding Toeplitz operator generates this von Neumann algebra. And this symbol is independent of the parameter α of the space A2α (D). Moreover, it can be chosen to be smooth. A similar result is partially obtained in the high dimensional case. But there the term radial is substituted by separately radial, which plays an important role in our discussion. In what follows, when we say a symbol a is radial, we mean a is essentially radial. As far as the elliptic case is concerned, an interesting phenomenon is found, named “cycles determining cycles”. Given a Hilbert space H and two operators A and B on H, let [A, B] denote the commutator of A and B, i.e. AB − BA. Now assume that two Toeplitz operators commute on a weighted Bergman space: [Ta , Tb ] = 0 and a is radial and nontrivial, then b is radial. When a and b are bounded, this result is first proved on Bergman space as a corollary in [4]. Moreover, it can be translated to generic elliptic case via a M¨obius transformation and is reformulated as follows: suppose [Ta , Tb ] = 0 and neither a nor b is constant, and a is constant on cycles C corresponding to an elliptic pencil, then b is also constant on the same cycles C. Yet this result fails on the Fock space. When passing to high dimensional Bergman spaces, it fails either; and we find nontrivial examples for symbol class which induce abelian von Neumann algebra on each weighted Bergman space. These examples are different from one dimensional case. The author guesses that the cycles-determining-cycles phenomenon is likely to appear in the hyperbolic and parabolic cases.
Vol. 64 (2009)
Maximal Abelian von Neumann Algebras
383
As for weighted Bergman spaces, if a Toeplitz operator is diagonal with respect to the standard orthogonal basis, then its symbol is radial. This result can nontrivially be passed to the high dimensional case. The paper is organized as follows: In Section 2 we show the maximal abelian property of the von Neumann algebra generated by Toeplitz operators with symbols which are constant on cycles corresponding to a given pencil. And we pick out the common symbol for each given pencil. In Section 3 we discuss with the elliptic case, which has been reduced to the radial case there. A cycles-determining-cycles phenomenon is found. Separately in Section 4 the radial case is treated in high dimensional weighted Bergman spaces. We give examples for abelian von Neumann algebras.
2. Maximal abelian von Neumann algebra For the definitions of pencil and cycles, the reader can consult [2] or [8]. Given a pencil P of geodesics, consider the set A(D) of L∞ -symbols which are constant on the corresponding cycles, then our main theorem in this section can be stated as follows: Theorem 2.1. On each weighted Bergman space A2α (D), let Tα (A(D)) be the Toeplitz algebra generated by Toeplitz operators with symbols in A(D). Then the w∗ -closure of Tα (A(D)) is maximal abelian. That is, any operator in the commutator of Tα (A(D)) lies in the w∗ -closure of the Toeplitz algebra Tα (A(D)). To prove Theorem 2.1, we need the following two lemmas. In fact, they are known to be consequences of a general result. For example, [3, p.55, Exercise 6] shows that if (X, Ω, µ) is a separable measure space and φ ∈ L∞ (X, µ), then the von Neumann algebra W ∗ (φ) generated by Mφ equals {Mg : g ∈ L∞ (X, µ)} if and only if there is a measurable subset Y of X having full measure on which φ is one-to-one. However, we include a proof independently. Lemma 2.2. Let X = R+ or R and f be a bounded, strictly increasing (or decreasing) function on X. Suppose T is a (bounded) operator acting on L2 (X) such that [T, Mf ] = T Mf − Mf T = 0. Then there is a g ∈ L∞ (X) such that T = Mg , where Mg denotes the multiplication operator by g on L2 (X). Proof. We will apply the spectral projection and deal with the case X = R only. The proof for the case X = R+ is similar. Let Eλ = E(f −1 (−∞, λ]) be the orthogonal projection from L2 (X) onto χf −1 (−∞,λ] L2 (X) . It is easily checked that Z Mf = f dEλ . X
It is well known that an operator T commutes with Mf if and only if it commutes with all spectral projections Eλ of Mf . Since f is strictly increasing (or decreasing),
384
Huang
IEOT
T commutes with all projections from L2 (X) onto χ(λ,µ] L2 (X) (λ < µ). Namely, T commutes with Mχ(λ,µ] . Thus T commutes with MPk ci χ(a ,b ] . A standard i=1 i i argument using the Lebesgue dominated convergence theorem shows that T commutes with each Mh with h ∈ L∞ (X). Hence the assertion follows at once from Theorem 4.1.2 in [1]. Applying the spectral projection or using functional calculus, we have the following lemma. Lemma 2.3. Let T be an operator on l2 = l2 (Z+ ) and S a diagonal operator with respect to the standard orthogonal basis of l2 . Write S = diag(λ1 , λ2 , λ3 , . . . ) with λi 6= λj provided i 6= j. If [T, S] = 0, then T is also a diagonal operator. In Lemma 2.2, the von Neumann algebra W ∗ (f ) generated by Mf is maximal abelian. The reasoning is as follows. By Lemma 2.2, it is not difficult to see that an operator T belongs to {Mf , Mf∗ }0 if and only if T is a multiplication operator. Thus the commutant W ∗ (f )0 of W ∗ (f ) equals {Mg : g ∈ L∞ (X)}, and then it is easy to see that W ∗ (f )00 = W ∗ (f )0 . By von Neumann’s bicommutant theorem, W ∗ (f )00 = W ∗ (f ), and hence W ∗ (f ) = W ∗ (f )0 , which implies that W ∗ (f ) is a maximal abelian von Neumann algebra. A similar argument shows that in Lemma 2.3 the von Neumann algebra generated by S is maximal abelian. Now we come to the proof of Theorem 2.1. Proof of Theorem 2.1. The theorem will be proved for three cases: elliptic, parabolic and hyperbolic pencils. 1. Elliptic case. In this case, it suffices to consider the radial case, which is also considered in [18]. To see this, notice that Uz is a unitary operator on the weighted Bergman space A2α (D) defined by ∀f ∈ A2α (D),
Uz f = (f ◦ ϕz )kz ,
where ϕz is the M¨ obius transformation that interchanges z and 0, and kz is the normalized reproducing kernel at the point z. Notice also that Uz intertwines Ta and Ta◦ϕz , i.e., Uz Ta = Ta◦ϕz Uz , which implies that studying the elliptic case can be reduced to studying the radial case. Assume without loss of generality that a is radial. The symbol a = a(r) defines a Toeplitz operator Ta on the weighted Bergman space A2α (D), which is unitarily isomorphic to the diagonal operator diag(λ(1), λ(2), λ(3), . . . ) on l2 (see [5]), where Z 1 √ λ(n) = B(n + 1, α + 1)−1 a( r)rn (1 − r)α dr. 0
Here B is the Beta function.
Vol. 64 (2009)
Maximal Abelian von Neumann Algebras
385
To prove the theorem in this case, it suffices to show that the von Neumann algebra generated by some single operator Ta is maximal abelian. In particular, √ we take a( r) = r. Now B(n + 2, α + 1) B(n + 1, α + 1) n+1 α+1 = =1− . n+α+2 n+α+2
λ(n) =
Notice that α > −1, so α + 1 > 0. Thus λ(n) is strictly increasing. By Lemma 2.3, the corresponding diagonal operator diag(λ(1), λ(2), λ(3), . . . ) generates a maximal abelian w∗ -closed algebra (that is, a maximal abelian von Neumann algebra). The same is true for Ta . 2. Parabolic case. In this case, we write λ for α. Let A2λ (Π) denote the weighted Bergman space consisting of functions that are analytic in the upper half-plane λ and square integrable with respect to the measure (λ+1) π (2y) dxdy (z = x + iy). It is shown in [6] that a symbol a = a(y) on the upper half plane induces the Toeplitz operator Ta on A2λ (Π), which is unitarily isomorphic to the multiplication operator Mγλ on L2 (R+ ) with Z ∞ xλ+1 γλ (x) = a(t/2)tλ e−xt dt. Γ(λ + 1) 0 The study of Toeplitz algebra in parabolic case is equivalent to the study of the subalgebra of the multiplication algebra generated by multipliers of the above form. It is easy to check that Z ∞ Γ(λ + 1)γλ0 (x) = xλ a(t/2)tλ e−xt (λ + 1 − xt)dt. 0
Write I =
R∞ 0
a(t/2)tλ e−xt (λ + 1 − xt)dt. 1
Put h(t) = e− 1−t χ[0,1) (t) and set a(t) = h(2t)(t > 0). Then a(t/2) = h(t). Notice that h is a decreasing function in C 1 [0, 1] satisfying h(1) = 0. Integration by parts yields Z 1 I= h(t)tλ e−xt (λ + 1 − xt)dt 0
Z
1
h(t)tλ e−xt dt +
= (λ + 1) 0
Z = (λ + 1) =− 0
1
h(t)tλ tde−xt
0 1 λ −xt
h(t)t e
Z dt + 0 − 0 −
0
Z
Z
1
h0 (t)tλ+1 e−xt dt > 0.
0
1
[h0 (t)tλ+1 + (λ + 1)tλ h]e−xt dt
386
Huang
IEOT
Then it follows that γλ (x) is a strictly increasing function. Its boundedness follows from that of a. Thus by Lemma 2.2, Mγλ generates a maximal abelian von Neumann algebra in B(L2 (R+ )). Thus Ta generates a maximal abelian von Neumann algebra in B(A2λ (Π)). 3. Hyperbolic case. In this case, we write λ for α. The symbol a on L∞ (Π) can be written as a = a(θ). It is shown in [7] that the corresponding Toeplitz operator Ta on A2λ (Π) is unitarily isomorphic to the multiplier on L2 (R) by Z π γλ (ξ) = 2λ (λ + 1)ϑ2 (ξ) a(θ)e−2ξθ sinλ (θ)dθ, ξ ∈ R 0
−1 . where ϑ2 (ξ) = [2λ (λ + 1)]−1 0 e−2ξθ sinλ (θ)dθ Let us take a = χ[δ,π] , where δ ∈ (0, π). It will be shown that this a gives a strictly decreasing function γλ for each λ ∈ (−1, ∞). For any 4ξ > 0, R π −2(ξθ+4ξθ) λ e sin (θ)dθ γλ (ξ + 4ξ) = Rδπ −2(ξθ+4ξθ) sinλ (θ)dθ e 0 R −24ξθ 0 π −2(ξθ) e e sinλ (θ)dθ δ = Rπ e−2(ξθ+4ξθ) sinλ (θ)dθ 0 Rπ
where θ0 ∈ (δ, π). The last identity is derived from the mean-value theorem of integral. Notice that Z δ Z π Z π e−2(ξθ+4ξθ) sinλ (θ)dθ = + e−2(ξθ+4ξθ) sinλ (θ)dθ 0
0 −24ξθ 00
Z
δ −2(ξθ)
=e
> e−24ξθ
0
e Z
δ −24ξθ 0
λ
0 δ
Z
=e
π
sin (θ)dθ + e
e−2(ξθ) sinλ (θ)dθ + e−24ξθ
0 −24ξθ 0
Z
0
Z
e−2(ξθ) sinλ (θ)dθ
δ π
e−2(ξθ) sinλ (θ)dθ
δ π
e−2(ξθ) sinλ (θ)dθ,
0 e−24ξθ
0
Rπ
where θ00 ∈ (0, δ). Thus γλ (ξ + 4ξ) < e−24ξθ0 Rδπ = γλ (ξ), and then γλ is strictly 0 decreasing. If a is substituted by the finite linear span of χ[δ,π] with positive coefficients, the same result holds. The above a can be chosen to be smooth. For example, let a(θ) = θ. Since this a can be uniformly approximated by the finite linear span of {χ[δ,π] : 0 < δ < 1} with positive coefficients, then γλ is decreasing. Moreover, γλ is strictly decreasing. To see this, assume conversely that there exist ξ1 < ξ2 and a constant c such that γλ (ξ) = c, ξ ∈ (ξ1 , ξ2 ). That is, Z π e−2ξθ sinλ (θ)(a(θ) − c)dθ = 0, ξ ∈ (ξ1 , ξ2 ). 0
Vol. 64 (2009)
Maximal Abelian von Neumann Algebras
387
Fix ξ = ξ0 ∈ (ξ1 , ξ2 ) and take the nth derivative at x0 of the above identity. Then we get Z π
θn e−2ξ0 θ sinλ (θ)(a(θ) − c)dθ,
n = 1, 2, . . . .
0
Since the span of {θn } is dense (with respect to maximum norm) in those continuous functions on [0, π], the above shows that e−2(ξ0 θ) sinλ (θ)(a(θ) − c)) = 0,
a.e. θ.
So a = c, e.e., which is a contradiction. Therefore γλ is strictly decreasing. Again, Lemma 2.2 guarantees the maximality of the von Neumann algebra generated by the multiplication operator Mγλ on L2 (R) and of the von Neumann algebra generated by the Toeplitz operator Ta on A2λ (Π). The proof of Theorem 2.1 is complete. From the above proof, we have the following consequence of Theorem 2.1. Corollary 2.4. The von Neumann algebra Tα (A(D)) can be generated by a single Ta , whose symbol a is smooth and independent of α ∈ (−1, +∞).
3. Toeplitz operators with radial symbols In this section, we will study the cycles-determining-cycles phenomenon. That is, if a Toeplitz operator commutes with another Toeplitz operator with nonconstant radial symbol, then the symbol of the first Toeplitz operator is also radial. In this section, for a fixed α, each symbol is assumed to be in L1 (D, dAα ). We call a symbol trivial if it is almost everywhere constant with respect to the area measure over D. When we say a symbol is radial, we mean that the symbol is essentially radial. When a and b are bounded, the following theorem appears as a corollary of Theorem 6 in [4]. However, the proof is completely different. Theorem 3.1. Given a weighted Bergman space A2α (D), if [Ta , Tb ] = 0 and a is radial and nontrivial, then b is radial. As an immediate consequence of Theorem 3.1, we have Corollary 3.2 (cycles-determining-cycles phenomenon). Given an elliptic pencil, let a be a nontrivial symbol which is constant on the corresponding cycles. Suppose b is such that [Ta , Tb ] = 0. Then b is constant on the same cycles. The cycles in Corollary 3.2 are exactly the image of all those circles in D with the center 0 under some M¨ obius map; equivalently, they are just those hyperbolic circles in D with a same center w0 ∈ D. However, Theorem 3.1 does not hold for the Fock space F 2 (C) consisting of square integrable entire functions over C with respect to the Gaussian measure 2 e−|z| dA(z). The following example shows this.
388
Huang
IEOT
Example. Consider the Fock space F 2 (C). For each pair of integers (m, t) with 0 ≤ m < t, there is a radial symbol whose associated Toeplitz operator is precisely the projection P onto the closed span of {z m+nt |n ∈ Z+ }. The existence is granted by Theorem 3.7 in [9]. Then any bounded operators Ta and Ta∗ commute with P , provided that a is of the form z t f (|z|). The following lemmas are the essential ingredients of Theorem 3.1. Lemma 3.3. Let f be a bounded holomorphic function defined on the half plane {z | Rez > a} (a is a real number), and let λ1 , λ2 , λ3 , . . . be all its zeros on the half real axis {x|x > a} (repeated according to multiplicity). Then for any δ > 0, X |λi |−1 < +∞. 06=λi >a+δ z−(a+δ) is bi-holomorphic from {z | Rez > a} Proof. The mapping w = w(z) = z−(a−δ) onto the unit disk. Let z = z(w) be its inverse. So f ◦z(w) is a bounded holomorphic function on the unit disk. w(λ1 ), w(λ2 ), w(λ3 ), . . . are contained in the zero-set of f , so they satisfy the Blaschke condition: X (1 − |w(λi )|) < +∞. P P −1 So < +∞. Basic λi >a+δ (1 − |w(λi )|) < +∞, i.e., 2δ λi >a+δ (λi − a + δ) arguments lead to the desired conclusion.
The following proposition is inspired by the Muntz-Szasz Theorem ([16, Theorem 15.26]), which is of independent interest. P 1 Proposition 3.4. Let Λ be a subset of Z+ satisfying n∈Λ n+1 = +∞. For a Toeplitz operator Ta on the weighted Bergman space A2α (D) (−1 < α < ∞), if Ta z n = λ(n)z n for all n ∈ Λ, then a is radial and Ta is diagonal with respect to {z n |n ∈ Z+ }. Moreover, if λ(n) ≡ c, then a = c, a.e. Proof. Assume Ta z n = λ(n)z n , ∀n ∈ Λ. Then for any n ∈ Λ and m 6= n, hTa z n , z m i = 0. So hTa z n , z n+k i = 0, where 0 < |k| ≤ n. By computations, for such n and k we have Z 1 Z 2π r2n+k {r(1 − r2 )α a(reiθ )e−ikθ dθ} dr = 0. 0
0
Set Z fk (z) =
1
Z r2z+k r(1 − r2 )α
0
2π
a(reiθ )e−ikθ dθ dr
0 2 α
R 2π
iθ
−ikθ
and let gk (r) = r(1 − r ) 0 a(re )e dθ. Notice that fk (z) is analytic in Ω = {z| 2Rez + k > 0}. Moreover fk can be continuously extended to the closure Ω of Ω; and by Fubini’s theorem, fk is bounded since gk lies in L1 [0, 1].
Vol. 64 (2009)
Maximal Abelian von Neumann Algebras
389
Notice also that for all integers n ≥ |k|, n are zeros of fk . Then by Lemma 3.3, fk is constantly 0. In particular, for those z satisfying 2z+k = 0, 1, 2, . . . , fk (z) = 0. That is, Z 1 rm gk (r)dr = 0, ∀ m ∈ Z+ . 0
(The identity fk (−k/2) = 0 is deduced from the continuity property of fk ). Since the linear span of polynomials on the unit interval is dense in C[0, 1], gk = 0, a.e. Therefore for each integer k 6= 0, there is a Lebesgue null set Ek in [0, 1] such that Z 2π a(reiθ )e−ikθ dθ = 0, r ∈ / Ek . (3.1) 0 S For each r outside the null set Ek , (3.1) holds for all k ∈ Z − {0}. Since a is iθ integrable, / E0 . S there is a null set E0 such that a(re ) is integrable in θ for all r ∈ For r 6∈ k∈Z Ek , put Z 2π 1 a(reiθ )dθ, ar = 2π 0 and by (3.1), Z 2π (a(reiθ ) − ar )e−ikθ dθ, k ∈ Z. 0 S By the theory of Fourier analysis, a(reiθ ) − ar = 0, a.e. θ holds for r 6∈ k∈Z Ek . Thus a is radial. The proof of the second assertion is similar and is omitted here. Now we are ready to prove Theorem 3.1. Proof of Theorem 3.1. To prove the theorem, it suffices to deal with the case that a is real valued. In fact, we notice that Ta is diagonal. Write a = a1 + ia2 , where a1 and a2 are real valued. Since a is radial, a1 and a2 are radial. Without loss of generality, a1 is nontrivial. We will show [Ta1 , Tb ] = 0. Since Ta is diagonal, Ta is normal. It is well known that any operator that commutes with a normal operator N also commutes with its adjoint N ∗ (see [12, Proposition 4.4.12]). Consequently, if V commutes with Ta , then V commutes with Ta∗ or Ta¯ . It follows immediately that V commutes with Ta1 and Ta2 . Taking V = Tb , we have [Ta1 , Tb ] = 0. Thus it suffices to prove the theorem in the case that a is real valued. We will deal with the unweighted case first, and the proof is split into two steps for convenience. Step 1. The Toeplitz operator Ta is unitarily isomorphic to the the diagonal operator diag(λ(1), λ(2), λ(3), . . . ) on l2 where Z 1 −1 Z 1 √ λ(n) = rn (1 − r)α dr a( r)rn (1 − r)α dr. 0
0
We will show that there is a strictly increasing sequence {µn }: 0 < µ1 < µ2 < µ3 < . . .
390
such that
Huang
P
1 µi
IEOT
< +∞ and λ(j) 6= λ(k), ∀j < k
if there is an l such that j, k ∈ [µl , µl+1 ]. R1 R1 √ Write λ(z) = ( 0 rz (1 − r)α dr)−1 0 a( r)rz (1 − r)α dr with α = 0. Then Z 1 Z 1 √ √ λ0 (z) 1 a( r)rz dr. = a( r)rz ln rdr + z+1 z + 1 0 0 λ0 (z) is not constantly zero. Otherwise λ(z) is constant on {x ∈ R|x ≥ 1}. Therefore λ(n) = λ(2)(n ≥ 2), and by Proposition 3.4, a is trivial. This is a contradiction to the assumption. 0 (z) is a bounded holomorphic function on the right half plane, Notice that λz+1 and it has the same zero set as λ0 on {x ∈ R|x > 0}. By Lemma 3.3, we may assume without loss of generality that there are infinitely many zeros of λ0 on (0, +∞) which we may write as µ1 < µ2 < µ3 < . . . satisfying ∞ X 1 < +∞. µ i=1 i
Since λ(x) is real on R+ , λ(x) is strictly monotone in [µi , µi+1 ], which leads to our assertion as desired. Step 2. Since Tb commutes with TaP , Tb commutes with all spectral projections of Ta . Precisely, we can write Ta = λ(nj )Ej , where λ(nj ) are pairwise different and Ej are pairwise orthogonal projections. Denote the range of Ej by Hj . Let Fj denote the set {n ∈ Z+ |z n ∈ Hj }. Since Tb commutes with each Ej , hTb z n , z m i = 0,
where n ∈ Fj , m ∈ Fk with j 6= k.
(3.2)
Given an integer ∆ 6= 0, we will seek integers n with |∆| ≤ n, such that there are two integers j, k (j 6= k) (depending of both n and ∆) satisfying n ∈ Fj , m = n + ∆ ∈ Fk . Then by (3.2), we have Z 1 r
2n+4
Z r
0
2π iθ
−i4θ
b(re )e
dθ dr = 0.
(3.3)
0
P We will show that for each nonzero integer ∆, there is a set Λ such that n∈Λ +∞ and that each n ∈ Λ satisfies (3.3). If this has been shown, then the proof of Proposition 3.4 yields that Z 2π r b(reiθ )e−i4θ dθ = 0
1 n
=
0
for a.e. r and all nonzero integers 4. Then following the last paragraph of the proof of Proposition 3.4, b is radial. Thus it suffices to construct the set Λ.
Vol. 64 (2009)
Maximal Abelian von Neumann Algebras
391
Without loss of generality, fix 4 > 0. As for those intervals of the form (µj , µj+1 ] whose lengths are ≤ 24, we choose all the integers in such intervals to compose Γ. And on each interval (µi , µi+1 ] whose length is > 24, we pick the integers mi , mi + 4, mi + 24, . . . , mi + ti 4, where ti is the largest integer satisfying mi + (ti + 1)4 ≤ µi+1 . These numbers make up Λ. Now we have a trivial identity: X1 X1 X 1 = + = +∞, n n n c n≥1
n∈Γ
n∈Γ
c
where Γ denotes the complement of Γ in Z+ − {0}. It is not difficult to see that there exist two positive constants c1 and c2 such that X 1 X1 ≤ c1 + c2 < +∞. n µi n∈Γ P So n∈Γc n1 = +∞. But a simple calculation shows that there are also constants M1 , M2 > 0 such that X 1 X 1 X 1 ≤ M1 + M2 4 , forcing = +∞. n n n c n∈Γ
n∈Λ
n∈Λ
Since λ(x) is strictly monotone in [µi , µi+1 ], we have, by the construction of Λ, that each n ∈ Λ satisfies (3.3). So the construction of Λ is complete and we are done in the unweighted case. For the weighted case, it is sufficient to discuss the step 1. Step 2 is similar. We regard γ as a real valued function on R+ , and then discussing with its derivation comes down to studying the function Z 1 √ Z 1 x α Dα (x) = a( r)r ln r(1 − r) dr rx (1 − r)α dr 0
−
Z
1
√ a( r)rx (1 − r)α dr
0
Z
0 1
rx ln r(1 − r)α dr .
0
This Dα can be naturally extended to a bounded holomorphic function on the half plane {z | Rez > 1}. The remaining is similar. Remark 3.5. In some sense, P the1 result of Proposition 3.4 is the best possible. Precisely, the condition n∈Λ n+1 = ∞ is sharp. In fact, by the proof of [16, Theorem 15.26], we P have the following: for any sequence of real numbers 0 < λ1 < λ2 < . . . satisfying n λ1n < ∞, there exists a bounded continuous function u on (0, 1], such that Z 1 F (z) = tz u(t)dt 0
is a bounded holomorphic function over {z ∈ C : Re z ≥ −1}, whose zero set equals {λn }. For example, consider the Bergman space A2 (D). Take a subset Λ = {λn } of
392
Huang
IEOT
P 1 Z+ satisfying n∈Λ n+1 < ∞ and put f (z) = u(|z|2 ). Then by simple calculations n we have Tf z = 0, n ∈ Λ. However, Tf 6= 0. In the high dimensional case, Theorem 3.1 fails. Theorem 1.2 in [19] shows that if f is a nontrivial bounded radial function over the unit ball Bn , and g is a square-integrable function over Bn , then [Tf , Tg ] = 0 holds on the Bergman space A2 (Bn ) if and only if g(eiθ z) = g(z) holds for a.e. (θ, z) ∈ R × Bn . In what follows, we shall discuss in detail the counterpart of the radial case in the high dimensional case.
4. High dimensional case In this section we study Toeplitz operators with radial symbols and separately radial symbols on high dimensional weighted Bergman spaces. Proposition 3.4 is generalized. Examples of abelian von Neumann algebras are given. And Theorem 2.1 is partially generalized. We adopt the notations in [17]. Bd will denote the open unit ball in Cd , z = (z1 , z2 , . . . , zd ) and z 0 = (z1 , z2 , . . . , zd−1 ). Let v be a normalized Lebesgue measure on Cd such that v(Bd ) = 1. If m2d is the ordinary Lebesgue measure d on R2d , then cd v = m2d where cd = πd! . Let β and γ (or β 0 , γ 0 ) be multi-indices referring to an ordered d-tuple (respectively (d−1)-tuple ) of nonnegative integers. Multi-indexes I and J are adopted in a symbol. The following abbreviated notations will be used: |β| = β1 + β2 + · · · + βd , Pd 2 β! = β1 !β2 ! . . . βd !, and z β = z1β1 z2β2 . . . zdβd . Let |z|2 = j=1 |zj | . A function on Bd is called separately radial if it depends only on |z1 |, |z2 |, . . . and |zd |. As in Section 3, when we say a symbol is separately radial, we mean the symbol is essentially separately radial. The following theorem can be regarded as an extension of Proposition 3.4, which was independently obtained by L. Trieu [18]. We include a proof for completeness. Actually the “if” part is an immediate consequence of Theorem 3.1 in [13], which states that a Teoplitz operator with radial like symbol is diagonal in the weighted Bergman space A2µ (Ω), consisting of analytic functions square integrable with respect to the weighted measure µdm (note that the term separately radial is synonymous with the term radial like in [13]). Here µ is a radial like, positive measurable function and Ω is a logarithmically convex complete Reinhardt domain centered at the origin. Theorem 4.1. Suppose that a ∈ L1 (Bd ). Then Ta is diagonal with respect to {z β | β ∈ Zd+ } on the Bergman space A2 (Bd ) if and only if a is separately radial. Proof. “If” part: It suffices to show that for all β 6= γ, hTa z β , z γ i = 0, i.e. haz β , z γ i = 0.
Vol. 64 (2009)
Maximal Abelian von Neumann Algebras
393
Without loss of generality, assume that βd 6= γd . Since a is separately radial, Fubini’s theorem implies that Z Z 0 γ0 haz β , z γ i = d z 0 β z 0 dv(z 0 ) √ a(z 0 , |zd |)zdβd zd γd dv(zd ). 1−|z 0 |2 D
Bd−1
(Notice that in the above identity, the former v denotes the normalized Lebesgue measure such that v(Bd−1 ) = 1, and the latter v denotes the normalized Lebesgue measure such that v(D) = 1.) But for each fixed z 0 , the latter integral is killed by passing to polar coordinates. So haz β , z γ i = 0. “Only if” part: We shall first show that, for almost every z 0 , a(z 0 , zd ) is essentially constant on {zd ||zd | = c} for a.e. c ∈ (0, 1). To this end, consider β, γ with βd 6= γd . Thus haz β , z γ i = 0 by assumption. We deduce that Z Z 0 γ0 βd γd a(z 0 , zd )z 0β z 0 dv(z 0 ) = 0. zd zd dv(zd ) √ 1−|zd |2 Bd−1
D
R 0 γ0 Denote √1−|z |2 B a(z 0 , zd )z 0β z 0 dv(z 0 ) by I = I(zd ), which is in L1 (D) apd d−1 pealing to Fubini’s theorem. Thus applying Proposition 3.4 shows that I is a radial function in zd . R 2π Denote by a ˜ =a ˜(z 0 , |zd |) the integral 0 a(z 0 , zd eiθ )dθ/(2π) and put g = a−a ˜. We write g = gzd (z 0 ) now. It is evident that for fixed |zd |, Z 0 γ0 gzd (z 0 )z 0β z 0 dv(z 0 ) = 0 √ 1−|zd |2 Bd−1
holds for all β 0 , γ 0 . Then the Stone-Weierstrass theorem forces gzd = 0 a.e. z 0 . Recall that g = a − a ˜ and a ˜=a ˜(z 0 , |zd |), and we will have a = a ˜ by changing the values of a on a null set. So a = a(z 0 , |zd |), as desired. A similar argument shows that after changing the values of a on a null set carefully, we have a = a(z1 , . . . , zd−2 , |zd−1 |, |zd |). By induction, we have a = a(|z1 |, . . . , |zd−1 |, |zd |) after changing the values of a on a null set, which completes the proof. Using the idea in Proposition 3.4 and that in Theorem 4.1, we get a more general result as follows, which is probably contained in [18]. Proposition 4.2. Pick d subsets of Z+ , Λ1 , Λ2 , . . . , Λd such that X 1 = +∞, ∀1 ≤ j ≤ d. n+1 n∈Λj
If a ∈ L1 (Bd ) and Ta is diagonal with respect to {z β |β ∈ Λ1 × Λ2 × · · · × Λd } on A2 (Bd ), then a is separately radial. Notice that Proposition 4.2 still holds if A2 (Bd ) is replaced with A2 (Dd ).
394
Huang
IEOT
Before continuing, let us introduced two spaces of holomorphic functions. Denote by A2ρ (Bd ) the function space Z n o f ∈ Hol(Bd ) kf k2 = |f (z)|2 ρ(|z|)dv(z) < +∞ , Bd
which can be viewed as a special case of A2τ (Bd ) defined by Z o n |f (z)|2 τ (|z1 |, . . . , |zd |)dv(z) < +∞ f ∈ Hol(Bd ) kf k2 = Bd
where τ = τ (r1 , r2 , . . . , rd ) is a strictly positive continuous function. Both A2ρ (Bd ) and A2τ (Bd ) are Hilbert spaces with reproducing kernels. They are special cases of A2µ (Ω) in [13]. Denote by K τ (z, ·) (z ∈ Bd ) the reproducing kernel in A2τ (Bd ) satisfying hf, K τ (z, ·)i = f (z), ∀f ∈ A2τ (Bd ). Then define the Toeplitz operator Taτ with the symbol a ∈ L1 (Bd , τ dA(z)) on A2τ (Bd ) as follows: Z Taτ f (z) = a(w)f (w)K τ (z, w)τ (w)dA(w), f ∈ A2τ (Bd ). Bd 2 α In particular, R if we take ρ(r) = cα (1 − r ) where α ∈ (−1, +∞), and cα is such that cα Bd (1 − |z|2 )α dv(z) = 1, the weights cα (1 − r2 )α define the oneparameter family of weighted Bergman spaces. In this case, we write A2α (Bd ) for A2ρ (Bd ). Generally, we rewrite Ta for Taτ if there is no confusion. Theorem 4.1 wins on generality. Precisely, it remains valid on A2τ (Bd ). The proof is essentially the same. Our next objective is to show that all separately radial symbols induce a maximal abelian von Neumann algebra on each weighted Bergman space and that we can pick a “common” symbol which gives the generator as in Section 2.
Theorem 4.3. Denote by A(Bd ) the set of all bounded separately radial symbols over Bd . On each weighted Bergman space A2α (Bd ), let Tα (A(Bd )) be the Toeplitz algebra generated by Toeplitz operators with symbols in A(Bd ). Then the w∗ closure of Tα (A(Bd )) is maximal abelian. Moreover, we can pick a smooth symbol b (independent of α) in A(Bd ) so that Tb generates Tα (A(Bd )) for each α ∈ (−1, +∞). Proof. To prove the theorem, it suffices to show that there is a symbol b such that the von Neumann algebra generated by Tb is maximal abelian. On the weighted Bergman space A2α (Bd ), consider the d + 1 symbols a0 , a1 , . . . , ad , where aj = |zj |2 ( i = 1, 2, . . . , d) and a0 = a0 (r) is chosen to be the function in the elliptic case in Section 2 (for example a0 (r) = r2 ). All Taj are diagonal.
Vol. 64 (2009)
Maximal Abelian von Neumann Algebras
395
Let Taj z β = λi (β)z β . By [17, 1.4.3], we have βj + 1 κ(|β|, α) for 1 ≤ j ≤ d, d + |β| R1 R1 where κ(|β|, α) = 0 r2d+1+2|β| (1−r2 )α dr/ 0 r2d−1+2|β| (1−r2 )α dr. We also have Z 1 Z 1 r2d−1+2|β| (1 − r2 )α dr. r2d−1+2|β| a0 (r)(1 − r2 )α dr/ λ0 (β) = λj (β) =
0
0
λ0 (β) is injective in |β| by our choice. That is, if |β| = 6 |γ|, then λ0 (β) 6= λ0 (γ). The imaginary unit i simplifies our construction of the common symbol. βj +1 Note that all d+|β| are rational numbers. Pick d rationally linear independent real Pd irrational numbers ε1 , . . . , εd and let b = ia0 + j=1 εj aj . Write Tb z β = λb (β)z β , Pd where λb (β) = iλ0 (β) + j=1 εj λj (β). λb (β) is injective in β. Namely, the λb (β) are pairwise different. In fact, if Pd λb (β) = λb (γ), we have λ0 (β) = λ0 (γ), forcing |β| = |γ|. So j=1 εj λj (β) = Pd j=1 εj λj (γ). That is, d X j=1
d
εj
X γj + 1 βj + 1 κ(|β|, α) = εj κ(|β|, α). d + |β| d + |β| j=1
Noting that κ is never zero, we have d X j=1
d
εj
X γj + 1 βj + 1 = εj , d + |β| j=1 d + |β|
forcing βj = γj , ∀j.
By Lemma 2.3, the usual unitary isomorphism between B(A2α (Bd )) and B(l2 ) shows that Tb generates a maximal abelian von Neumann algebra on A2α (Bd ). Remark 4.4. After the author gave the proof of Theorem 4.3, he found that a similar result has also been obtained by L. Trieu, see [18] and [19]. But there the smoothness for the symbol b is not required. Generally speaking, TzI1 z¯J1 does not commute with TzI2 z¯J2 . However, the following proposition will give abundant examples for abelian von Neumann algebras generated by Toeplitz operators. Note that a d-tuple index can also be regarded as a function on {1, 2, . . . , d}, so the support supp I of I makes sense. Proposition 4.5. Consider A2ρ (Bd ). If supp(I1 + J1 ) ∩ supp(I2 + J2 ) = φ and |I1 | = |J1 | = |I2 | = |J2 |, then TzI1 z¯J1 h1 (r) commutes with TzI2 z¯J2 h2 (r) , where qP d 2 r = j=1 |zj | . Moreover Tz I1 z¯J1 h1 (r) commutes with Toeplitz operators with radial symbols.
396
Huang
IEOT
Proof. To prove the proposition, we shall first compute the integral Z |z γ |2 b(|z|)ρ(|z|)dv(z) = I. Bd
R1 R By [17, 1.4.3], we have I = 2d 0 r2d−1+2|γ| b(r)ρ(r)dr S |ζ γ |2 dσ(ζ). Thus I = c1 (b, |γ|)γ!, where c1 (b, |γ|) denotes some constant depending on b and |γ|. It is easy to see that TzI z¯J h(r) z β = λ(β)z β+I−J (if one component of β +I −J is < 0, we understand z β+I−J to be 0). We must determine λ(β) now. Since hTzI z¯J h(r) z β , z β+I−J i = λ(β)hz β+I−J , z β+I−J i, we have Z |z
β+I 2
Z
| h(|z|)ρ(|z|)dv(z) = λ(β)
Bd
|z β+I−J |2 h(|z|)ρ(|z|)dv(z).
Bd
(β+I)! . It is remarkBy some manipulations, we get λ(β) = c2 (|β|, |I|, |J|) (β+I−J)! (β+I)! able that (β+I−J)! depends only on I, J and the components of β on supp J. This observation grantees our first conclusion. A similar argument shows that any Toeplitz operator with radial symbol is of P the form n≥0 c0n Pn , where Pn is the orthogonal projection onto the linear span of {z β | |β| = n}. Then our second conclusion follows and the proof is complete.
This proposition immediately gives one type of abelian von Neumann algebras. Example. Now take a = z I1 z¯J1 h1 (r) and b = z I2 z¯J2 h2 (r) where I1 , J1 , I2 , J2 satisfy the conditions in Proposition 4.5 and h1 , h2 are real valued. Let a ˜ = a+a ¯ and ˜b = b + ¯b. Proposition 4.5 shows that if we denote by A(Bd ) the function space spanned by {˜ a, ˜b} ∪ {radial functions over Bd }, then A(Bd ) induces an abelian von Neumann algebra on each A2ρ (Bd ). But it is notable that there is a symbol ˜b which is not separately radial. This implies that abelian C ∗ -algebras or von Neumann algebras on weighted Bergman spaces A2α (Bd ) in the high dimensional case are different from those in the one dimensional case. Recall that in the dimension-one case, no nontrivial examples were given except the standard three cases: elliptic, parabolic and hyperbolic. Let us see more examples. Example. On the weighted Bergman space A2α (Bd ) (d ≥ 4), let a = a(|z1 |2 + |z2 |2 ). Then for each pair of natural numbers m ≤ n, each orthogonal projection P onto the span of {z β | |β| = n, β1 + β2 = m} is in the commutant of Ta . Indeed, Ta can be written as the sum (in the strong topology sense) of multiples of the above pairwise orthogonal projections. Thus it is readily seen that Tb commutes with Ta provided b has one of the following forms: z12 z2 2 , z1 z2 , or z3 z4 . As in the above example, let now A(Bd ) be the linear span of {z3 z4 + z4 z3 } ∪ {b| b = b(|z1 |2 + |z2 |2 ) or b = b(r)}.
Vol. 64 (2009)
Maximal Abelian von Neumann Algebras
397
Note also that Tz1 z2 and Tz2 z1 commute with Tb if b = b(|z1 |2 + |z2 |2 ), but Tz1 z2 does not commute with Tz2 z1 . This is different from the one-dimensional case: by Theorem 3.1, if Tb1 and Tb2 commute with some Ta where a is radial and nontrivial, then Tb1 commutes with Tb2 . The next example can be viewed as interesting, compared with the example below Proposition 4.5. Example. Let ˜bh = (z I z¯J + z J z¯I )h(r) (|I| = |J|). Then T˜bh commutes with each orthogonal projection Pn onto the linear span of {z β | |β| = n}. So T˜bh can be decomposed into diagonal blocks. Precisely, T˜bh is of the form Vh0 ⊕ Vh1 ⊕ · · · ⊕ Vhn ⊕ . . . , where Vhn is an operator on the linear span of {z β ||β| = n}. It is remarkable that for fixed I, J and n, the linear space {Vhn | h = h(r)} is at most one dimensional. Thus if there is another function h0 = h0 (r), then we have [T˜bh , T˜bh0 ] = 0. So in the example below Proposition 4.5, when we choose a and b, the restriction that h1 and h2 are real valued can be removed. Moreover, in that example, we can take A(Bd ) as the function space spanned by {˜ ah , ˜bh | h = h(r)} ∪ {radial functions over Bd }. Acknowledgment The author is deeply indebted to his advisor Professor Kunyu Guo for his advices and suggestions. He also takes the opportunity to express his appreciation to Professor N. Vasilevski for his emails helping a lot in writing this paper.
References [1] W. Arveson, A Short Course on Spectral Theory, GTM 209, Springer-Verlag, New York, 2001. [2] A. Beardon, The Geometry of Discrete Groups, Springer, Berlin, 1983. [3] J. Conway, A course in operator theory, Graduate Studies in Mathematics 21, AMS, Rhode Island, 2000. [4] Z. Cuckovic and N. Rao, Mellin Transform, monomial symbols, and commuting Toeplitz operators, J. Funct. Anal. 154(1998), 195–214. [5] S. Grudsky, A. Karapetyants and N. Vasilevski, Dynamics of properties of Toeplitz operators with radial symbols, Integral Equations and Operator Theory 20(2004), 217–253. [6] S. Grudsky, A. Karapetyants and N. Vasilevski, Dynamics of properties of Toeplitz operators on the upper half-plane: Parabolic case, J. Operator Theory 52(2004), 185– 204. [7] S. Grudsky, A. Karapetyants and N. Vasilevski, Dynamics of properties of Toeplitz operators on the upper half-plane: Hyperbolic case, Bol. Soc. Mat. Mexicana 10(2004), 119–138.
398
Huang
IEOT
[8] S. Grudsky, R. Quiroga-Barranco and N. Vasilevski, Commutative C ∗ -algebras of Toeplitz operators and quantization on the unit disk, J. Funct. Anal. 234(2006), 1– 44. [9] S. Grudsky and N. Vasilevski, Toeplitz operators on the Fock space: Radial component effects, Integral Equations and Operator Theory 44(2002), 10–37. [10] H. Hedenmalm, B. Korenblum and K. Zhu, Theory of Bergman Spaces, GTM 199, Springer-Verlag, New York, 2000. [11] B. Korenblum and K. Zhu, An application of Tauberian theorems to Toeplitz operators, J. Operator Theory 44(2002), 10–37. [12] G. Pederson, Analysis NOW, GTM 118, Springer-Verlag, New York, 1989. [13] R. Quiroga-Barranco and N. Vasilevski, Commutative algebras of Toeplitz operators on the Reinhardt domains, Integral Equations and Operator Theory 59(2007), 67–98. [14] R. Quiroga-Barranco and N. Vasilevski, Commutative C*-algebras of Toeplitz operators on the unit ball, I. Bargmann-type transforms and spectral representations of Toeplitz operators, Integral Equations and Operator Theory 59(2007), 379–419. [15] R. Quiroga-Barranco and N. Vasilevski, Commutative C*-algebras of Toeplitz operators on the unit ball, II. Geometry of the level sets of symbols, Integral Equations Operator Theory 60(2008), 89–132. [16] W. Rudin, Real and Complex Analysis, China Machine Press, 3rd Edition. [17] W. Rudin, Function Theory in the Unit Ball of Cn , Springer-Verlag, New York, Heidelberg, Berlin, 1980. [18] L. Trieu, Diagonal Toeplitz operators on weighted Bergman spaces, preprint, available at http://www.math.uwaterloo.ca/∼t29le/Papers.htm. [19] L. Trieu, The commutants of certain Toeplitz operators on weighted Bergman spaces, preprint, available at http://www.math.uwaterloo.ca/∼t29le/Papers.htm. [20] N. Vasilevski, Quasi-radial quasi-homogeneous symbols and commutative Banach algebras of Toeplitz operators, Reporte Interno # 386, Departamento de Matematicas, CINVESTAV del I.P.N., Mexico, 2008, 13 p. [21] N. Vasilevski, Parabolic quasi-radial quasi-homogeneous symbols and commutative algebras of Toeplitz operators, Reporte Interno # 387, Departamento de Matematicas, CINVESTAV del I.P.N., Mexico, 2008, 19 p. Hansong Huang Fudan University Mathematical Science Department East Building 1903 220 Handan Road Shanghai 200433 China e-mail: [email protected] Submitted: August 16, 2007. Revised: May 19, 2009.
Integr. equ. oper. theory 64 (2009), 399–408 c 2009 Birkh¨
auser Verlag Basel/Switzerland 0378-620X/030399-10, published online July 3, 2009 DOI 10.1007/s00020-009-1697-7
Integral Equations and Operator Theory
On Some Product of Two Unbounded Self-Adjoint Operators Mohammed Hichem Mortad Abstract. We give a spectral analysis of some unbounded normal product HK of two self-adjoint operators H and K (which appeared in [7]) and we say why it is not self-adjoint even if the spectrum of one of the operators is sufficiently “asymmetric”. Then, we investigate the self-adjointness of KH (given it is normal) for arbitrary self-adjoint H and K by giving a counterexample and some positive results and hence finishing off with the whole question of normal products of self-adjoint operators (appearing in [1, 7, 12]). Mathematics Subject Classification (2000). Primary 47B15; Secondary 47B25, 47A05. Keywords. Normal operator, self-adjoint operator, closed operator, product of unbounded operators.
1. Introduction If we consider a self-adjoint operator, then it is normal regardless of its boundedness. For the converse to be true, one has to add some conditions. One simple property is that an unbounded normal operator which is symmetric is self-adjoint. Another one is that a normal operator with real spectrum is self-adjoint. Less obvious is the following: If N = HK is a normal product of two self-adjoint operators, then when is it self-adjoint? This was answered by Albrecht and Spain [1] who showed that if a product of two bounded self-adjoint operators H, K is normal, then it is self-adjoint provided that the spectrum of K satisfies σ(K)∩σ(−K) ⊆ {0} (this condition will be referred to as the condition “C”). The author, in a previous work [7], extended their result (using the same condition) to the case when one or both of the operators are unbounded (the proofs were mainly based on the Fuglede-Putnam theorem [10, 4]). The author was supported in part by CNEPRU: B01820070020 (Ministry of Higher Education, Algeria).
400
Mortad
IEOT
It is worth mentioning that W. Rehder [12] proved in 1982 the same result for bounded operators, where one of them was positive, which is included in the condition “C”. Neither the author nor Albrecht-Spain were aware of this reference. So it is just fair now to call this result the Rehder-Albrecht-Spain theorem. A generalization of the Fuglede-Putnam theorem is also proved in [7] subject to some extra hypotheses. In the end, a counterexample that showed that the result is no longer true in the most naive form of generalization is also given in the same reference, i.e., if H and K are self-adjoint operators such that K is positive and if HK has a normal closure then HK need not have a self-adjoint closure (and so it need not be essentially self-adjoint). This paper constitutes mainly the follow-up of [7]. Here we examine the counterexample in detail and identify what goes wrong and why the proof of Theorem 5 in [7], which in this paper is called Theorem A (see below), cannot be applied to the counterexample. In order to do this, we find the spectral measure for the normal operator in question which will be the key point. In the end of this paper we treat a natural question left open in [7], although not explicitly mentioned. Before this we recall briefly the main results in [7]. Let K be a bounded self-adjoint operator satisfying the condition “C” and let H be an unbounded selfadjoint operator. Then if HK (respectively KH) is normal then HK (respectively KH) is self-adjoint. The proof for the case KH was deduced from that of HK. If we no longer assume that K is bounded, then only HK normal implies that HK is self-adjoint. Nothing was said about the case KH. So in the penultimate section we give a counterexample which shows the failure of this property in general and we also give additional assumptions that make it true. We digress to say that W. Rehder [12] gave some references to some applications of products of self-adjoint operators in both Quantum Mechanics and Mathematics. We now recall the following theorem (which, for bounded K, is an immediate consequence of the Fuglede-Putnam-Rosenblum theorem) Theorem A ([7]). Let N and K be two unbounded operators. Assume that K is self-adjoint and that N is normal such that D(N ) ⊂ D(K). Then KN ⊂ N ∗ K implies KN ∗ ⊂ N K. Theorem A was mainly used to prove Theorem B ([7]). Let K, H be two unbounded self-adjoint operators such that σ(K) ∩ σ(−K) ⊆ {0}. If HK is normal then it is self-adjoint. We recall briefly the counterexample. Let H and K be defined as follows: d : H 1 (R) → L2 (R), K = |x| : D(K) → L2 (R). dx These two operators are known to be self-adjoint (see e.g. [11]) on their respective domains D(H) = H 1 (R) = {f ∈ L2 (R) : f 0 ∈ L2 (R)} and D(K) = {f ∈ L2 (R) : H = −i
Vol. 64 (2009)
Product of Self-Adjoint Operators
401
|x|f ∈ L2 (R)}. Then setting N = HK we proved that N is normal but not selfadjoint, i.e., N is not essentially self-adjoint. Since N : f 7→ N f = −i(|x|f )0 (we actually mean N ) is normal on D(N ) = {f ∈ L2 (R) : xf 0 ∈ L2 (R)}, there is a unitary transformation, say U , that diagonalizes N (see e.g. [3]). In other words, via U , N will be unitarily equivalent to a multiplication operator by a complex-valued function. Notations and Definitions. An operator A is said to be an extension of B, and we write B ⊂ A, if D(B) ⊂ D(A) and A and B coincide on each element of D(B). A stands for the closure of the operator which is by definition the smallest closed extension of A. An operator A is called normal if it is densely defined, closed and satisfies AA∗ = A∗ A. It is known that if A is normal, then so is its adjoint. An operator is said to be self-adjoint if A = A∗ . For the sake of simplicity, the operator N , which was introduced above, is denoted by N in this paper. The spectral measure (on the ball BR ) of the normal operator N is denoted by PBR . For any R > 0 put HR = ran PBR . All operators considered in this paper are unbounded linear operators on a complex Hilbert space. Any other notion or result which will be used will be assumed to be known by the reader. There is a vast literature concerning this subject. We cite [3] and [13] among others.
2. Spectral Analysis of N = HK First, we find an explicit unitary operator U which diagonalizes N in the way we will need it. Theorem 2.1. Let N be the normal operator defined on D(N ) = {f ∈ L2 (R) : xf 0 ∈ L2 (R)} by N f = −i(|x|f )0 . Then N is unitarily equivalent to M = M+ ⊕M− where M+ is defined on L2 (R) by M+ f (s) = (s − 12 i)f (s) and M− is defined on L2 (R) by M− f (s) = (s + 12 i)f (s). The required unitary transformation is given by U f = U+ f+ ⊕ U− f− where f+ is the restriction of f to R+ , f− is the restriction of f to R− . The operator U+ is defined by U+ = F −1 V where F −1 is the inverse L2 -Fourier transform and V : L2 (R+ ) → L2 (R) is the unitary operator defined by t
(V f )(t) = e 2 f (et ) and U− is defined by U− = F −1 W where W : L2 (R− ) → L2 (R) is defined by t
(W f )(t) = e− 2 f (e−t ). Proof. Since we have the decomposition L2 (R) = L2 (R+ ) ⊕ L2 (R− ), N may be written as N+ ⊕ N− where ∗ N+ h = N+ h − ih
∗ and N− h = N− h + ih.
402
Mortad
IEOT
Let λ ∈ σ(N+ ). Then λ = λ − i which gives =λ = − 12 , that is σ(N+ ) ⊆ {α − 21 i|α ∈ R} (it is actually equal to this set as we will see below). The idea now is to try to find the eigenvalues of the operator N+ . We have −ixh0 (x) − ih(x) = λh(x)
or
h0 (x) i(λ + i) = , h(x) x
1
hence h(x) = cx− 2 +iα where c is arbitrary and where α = λ + 21 i. This h is clearly not in L2 (R+ ). Thus there are no eigenvalues but this is sufficient to find the unitary equivalence of N . Define Z ∞ 1 1 x− 2 +iu f (x)dx where f ∈ L2 (R+ ). (U+ f )(u) = √ (1) 2π 0 The previous equation is a well-defined Fourier transform in L2 (R) (it may be considered as a form of the Mellin transform). One can verify this by using the change of variable x = et in (1). We then get Z Z 1 1 1 1 [e 2 t f (et )]eiut dt = √ f (et )eiut+ 2 t dt. (U+ f )(u) = √ 2π 2π R
R
The inversion formula is given by 1 F (t) = f (e ) = √ 2π t
Z
1
(U+ f )(u)e− 2 t−iut du.
(2)
R
Let us check using the formula in (2) that N+ is unitarily equivalent to M+ . We have F 0 (t) = et f 0 (et ) = xf 0 (x) and at the same time Z 1 1 1 F 0 (t) = √ − − iu (U+ f )(u)e− 2 t−iut du. 2 2π R
Hence
1 −iF 0 (t) − iF (t) = √ 2π
Z
1 1 −u − i (U+ f )(u)e− 2 t−iut du. 2
R
Then 1 N+ f (x) = −ixf (x) − if (x) = √ 2π 0
Z
1 1 −u − i (U+ f )(u)e− 2 t−iut du. 2
R
Thus
1 U+ N+ f (s) = s − i (U+ f )(s) = (M+ U+ f )(s). 2 So N+ is unitarily equivalent to M+ and the unitary operator is given by (1) and hence σ(N+ ) = σ(M+ ) = {s − 21 i|s ∈ R}. The proof for the case L2 (R− ) is just a matter of “cut and paste”. So we just give the unitary operator in this case, that is Z 1 1 f (e−t ) = √ (U− f )(u)e+ 2 t−iut du 2π R
Vol. 64 (2009)
Product of Self-Adjoint Operators
403
and hence σ(N− ) = σ(M− ) = {s + 12 |s ∈ R}. In the end N = N+ ⊕ N− is unitarily equivalent to M = M+ ⊕ M− where M+ f (α) = (−α − 21 i)f (α) and M− f (α) = (−α + 12 i)f (α). Thus n o n o 1 1 σ(N ) = σ(N+ ) ∪ σ(N− ) = s − i s ∈ R ∪ s + i s ∈ R . 2 2 Now we have the necessary tools to investigate what goes wrong in the proof of Theorem A when applied to our counterexample. The operator N is not closed (see [7]) but there is something else that makes the result untrue. The crucial point in the proof Theorem A is that we restricted K to HR and unfortunately this is not possible when using this counterexample, i.e., HR is not a subset of D(K). This is shown in the following proposition. Proposition 2.2. Let PBR be the spectral measure of the normal operator N . Then HR is not a subset of D(K). Proof. We need to find an f that is in HR and not in D(K) i.e. xf ∈ / L2 (R). 2 + It suffices to do this in L (R ). We also denote the spectral projection for N + by PBR . The operator M+ has R × {− 12 } as its spectrum. So it lies in some line parallel to the x-axis. Also since the multiplication operator M+ has the multiplication by a characteristic function, say 1Im , as its spectral measure and since N+ is unitarily equivalent to M+ , it follows that PBR is unitarily equivalent to 1Im (m and −m represent the intersection of the disc of radius R and the line y = − 21 ) via the transform defined in (2). Then we have F PBR F −1 = 1Im
where
Im = [−m, m].
Hence PBR F −1 = F −1 1Im . So for g ∈ L2 (R+ ) one has f = PBR F −1 g = F −1 1Im g. We observe that to say that f ∈ HR or F f = 1Im g, g ∈ L2 (R+ ) is the same thing. Hence we seek an f such that F f (s) = 1 on [0, m] and zero otherwise (we have taken g = 1[0,m] ) such that xf ∈ / L2 (R+ ) or et f (et ) ∈ / L2 (R). By (2) we have Z m 1 1 1 1 f (et ) = √ e− 2 t−ist ds = √ e− 2 t (1 − e−imt ). 2π 0 it 2π Obviously, f ∈ L2 (R+ ),
but
et f (et ) ∈ / L2 (R)
since Z Z t Z t 2 e e 1 12 t −imt ) dt = (2 − 2 cos(mt))dt ≥ (2 − 2 cos(mt))dt = ∞. e (1 − e it t t + R R R
404
Mortad
IEOT
There is nothing special with this counterexample. We may take other pairs d of self-adjoint operators such as K = x2 , H = −i dx and we will encounter the same problem, i.e., HK not being closed. To sort out this point, we use the following elementary theorem about the product of closed operators (there are more results in the literature). Theorem 2.3. Let H and K be two closed operators in a Hilbert space. Then HK (in this order) is closed if one of the following occurs: 1. K bounded; 2. H invertible with a bounded inverse. Now we can state with ease the following corollary Corollary 2.4. Let K, H be two unbounded self-adjoint operators with K satisfying the condition “C”. Suppose further that one of the two properties listed in the previous theorem is satisfied. If HK has a normal closure, then it is essentially self-adjoint.
3. Normality of KH Now, we give a counterexample that shows that the order of the operators H and K cannot be interchanged in Theorem B above. Proposition 3.1. There exist two unbounded self-adjoint operators H and K such that K satisfies condition “C”, KH is normal but not self-adjoint. d with D(H) = H 1 (R), the Sobolev space. Then H is selfProof. Let H = −i dx adjoint. Take Kf (x) = (1 + |x|)f (x) with domain
D(K) = {f ∈ L2 (R) : (1 + |x|)f ∈ L2 (R)}. Then it is well known that K has a bounded inverse. Besides, K is self-adjoint since it is a multiplication operator by a real-valued function and obviously K satisfies σ(K) ∩ σ(−K) ⊆ {0} since it is a positive operator. So, it only remains to verify that M = KH is normal, i.e. M is closed and M M ∗ = M ∗ M and that M is not self-adjoint. For f in D(M ) = {f ∈ L2 (R) : (1 + |x|)f 0 ∈ L2 (R)}, where the derivative is considered in distributional sense, one has M f (x) = −i(1 + |x|)f 0 (x). The closedness of M then follows from Theorem 2.3 (property 2). To find its adjoint we proceed exactly as in [7] by first doing it for f ∈ C0∞ (R \ {0}), the space of smooth functions with compact support away from the origin, and then approximating using the graph norm of M since C0∞ (R \ {0}) is dense in D(M ) (the interested reader finds all the details about a similar question in [7]). We find M ∗ f (x) = sgn(x)if (x) − i(1 + |x|)f 0 (x) where “sgn” is the usual sign function.
Vol. 64 (2009)
Product of Self-Adjoint Operators
405
Clearly M is not self-adjoint but M M ∗ f (x) = M ∗ M f (x) = −(1 + |x|)(2 sgn(x)f 0 (x) − (1 + |x|)f 00 (x)). The previous equation combined with (as one can verify) D(M M ∗ ) = D(M ∗ M ) = {f ∈ L2 (R) : (1 + |x|)f 0 ∈ L2 (R), (1 + |x|)f 00 ∈ L2 (R)} allow us to conclude that M = KH is a normal operator.
Remark. If we interchange the roles of H and K in the previous example and set Kf (x) = −if 0 (x)
and
Hf (x) = (1 + |x|)f (x),
then HK is normal and not self-adjoint. We also observe that σ(K) = R, and hence σ(K) ∩ σ(−K) = R 6⊆ {0}. This shows that Condition “C” cannot merely be dropped in Theorem B. Remark. In the spirit of the previous section we can verify that D(KM ) = {f ∈ L2 (R) : (1 + |x|)2 f 0 ∈ L2 (R)} and D(M ∗ K) = {f ∈ L2 (R) : (1 + |x|)2 f, (1 + |x|)2 f 0 ∈ L2 (R)}. Hence KM ∗ 6⊂ M K (this will be shown by giving an explicit function in D(KM ) which does not belong to D(M ∗ K), and a way of doing this is to use a method used in [8] in a different setting by a simple linear interpolation). We also observe that D(M ) 6⊂ D(K) and this means that the assumptions of Theorem A are not all fulfilled. This shows the power of Theorem A. So it appears that for the result to be true one has to add some hypotheses. We give two possible assumptions which will guarantee the self-adjointness of KH (given KH is normal). They are both a consequence of Theorem B but with two different approaches and a slightly different method of proof. Here is the first one: Corollary 3.2. Let K, H be two unbounded self-adjoint operators such that σ(K) ∩ σ(−K) ⊆ {0}. If KH and HK are both normal, then KH is self-adjoint. Proof. Since KH is normal, then so is (KH)∗ . Since K and H are self-adjoint and using a known property about the adjoint of a product of two unbounded operators, one has HK = H ∗ K ∗ ⊂ (KH)∗ . Since HK is normal and it has a normal extension which is (KH)∗ , we have HK = (KH)∗ (as normal operators are maximally normal, see e.g., [13]). Now by Theorem B we deduce that HK or (KH)∗ is self-adjoint. Since KH is closed, we obtain (KH)∗ = (KH)∗∗ = KH = KH, and hence the result. Now we exploit the following result due to K. Gustafson to give the second approach to the problem.
406
Mortad
IEOT
Lemma 3.3 ([5]). Let A and B be two (unbounded) self-adjoint operators in a Hilbert space H and suppose that D(AB) is dense, that R(B) ⊃ D(A), and D(B) ⊃ R(A). Then (AB)∗ = B ∗ A∗ . Proposition 3.4. Let H and K be two unbounded self-adjoint operators such that σ(K) ∩ σ(−K) ⊆ {0}. Let R(H) ⊃ D(K), and D(H) ⊃ R(K). If KH is normal, then it is self-adjoint. Proof. Since KH is normal, then its adjoint (KH)∗ is also normal. By the previous lemma and the self-adjointness of H and K we get (KH)∗ = HK so that HK is also normal and hence Theorem B allows us to deduce the self-adjointness of HK. This means that (HK)∗ = HK which, in turn, gives: (KH)∗ is self-adjoint. This, combined with the fact that KH is closed (it is normal!), yields (KH)∗∗ = KH = KH = (KH)∗ , and hence the self-adjointness of KH.
Remark. Now, since there are similar results to that of K. Gustafson, one can use them to give different versions of the foregoing proposition. See for instance [2, 6].
4. A Question Let K, N and M be bounded operators on a Hilbert space H (N and M being normal) such that KN = M K. Then the following assertions are equivalent: 1. KN ∗ = M ∗ K. 2. N commutes with K ∗ K. 3. M commutes with KK ∗ .
∗
4. The subspace of those x ∈ H for which supλ∈C KeλN −λN x < ∞ is dense in H.
∗
5. The subspace of those x ∈ H for which supλ∈C K ∗ eλM −λM x < ∞ is dense in H. This is partly based on the Fuglede-Putnam theorem in its classical form. Now, can we prove Theorem A for two different unbounded normal operators M and N (as for the Fuglede-Putnam theorem [4, 10])? I.e., if one has KN ⊂ M K then does it follow that KN ∗ ⊂ M ∗ K (probably under some extra conditions)? The general form does not hold, i.e., we cannot have a fourth operator involved in this question, i.e., if (we just consider the bounded case) AN = M B then it is not necessary that AN ∗ = M ∗ B. For if A = M = I (the identity operator) and N = B, then it holds only if B is self-adjoint! Some answers to this question should be found in [9].
Vol. 64 (2009)
Product of Self-Adjoint Operators
407
Acknowledgments The spectral analysis section appeared in the author’s Ph.D. thesis at Edinburgh University under the supervision of Professor Alexander M. Davie. The author takes this opportunity to thank him again for the great supervision work he did. The author also owes thanks to Professor K. Gustafson for providing him with his reference [5]. Finally, I also thank the referee for his comments and for the first paragraph of the section “A Question”.
References [1] E. Albrecht, P. G. Spain, When Products of Selfadjoints Are Normal, Proc. Amer. Math. Soc., 128/8 (2000) 2509–2511. [2] J. A. W. van Casteren, S. Goldberg, The Conjugate of the Product of Operators, Studia Math., 38 (1970) 125–130. [3] J. B. Conway, A Course in Functional Analysis, Springer, 1990 (2nd edition). [4] B. Fuglede, A Commutativity Theorem for Normal Operators, Proc. Nati. Acad. Sci., 36 (1950) 35–40. [5] K. Gustafson, A Composition Adjoint Lemma, Stochastic processes, physics and geometry: new interplays, II (Leipzig), (1999), 253–258, CMS Conf. Proc., 29, Amer. Math. Soc., Providence, RI, (2000). [6] S. S. Holland Jr., On the Adjoint of the Product of Operators, J. Functional Analysis, 3 (1969) 337–344. [7] M. H. Mortad, An Application of the Putnam-Fuglede Theorem to Normal Products of Self-adjoint Operators, Proc. Amer. Math. Soc., 131/10 (2003) 3135–3141. [8] M. H. Mortad, Self-adjointness of the Perturbed Wave Operator on L2 (Rn ), n ≥ 2, Proc. Amer. Math. Soc., 133/2, (2005) 455–464. [9] M. H. Mortad, Yet More Versions of The Fuglede-Putnam Theorem, Glasg. Math. J. (to appear). doi:10.1017/S0017089509005114 [10] C. R. Putnam, On Normal Operators in Hilbert Space, Amer. J. Math., 73 (1951) 357–362. [11] M. Reed, B. Simon, Methods of Modern Mathematical Physics, Vol. 1: Functional Analysis, Academic Press, 1972. [12] W. Rehder, On the Product of Self-adjoint Operators, Internat. J. Math. and Math. Sci., 5/4 (1982) 813–816 . [13] W. Rudin, Functional Analysis, McGraw-Hill, 1991 (2nd edition). Mohammed Hichem Mortad D´epartement de Math´ematiques Universit´e d’Oran (Es-senia) B.P. 1524, El Menouar Oran 31000 Algeria
408 Postal address: Dr. Mohammed Hichem Mortad B.P. 7085 Seddikia Oran 31025 Algeria e-mail: mortad [email protected] [email protected] Submitted: March 26, 2008. Revised: June 15, 2009.
Mortad
IEOT
Integr. equ. oper. theory 64 (2009), 409–428 c 2009 Birkh¨
auser Verlag Basel/Switzerland 0378-620X/030409-20, published online June 2, 2009 DOI 10.1007/s00020-009-1688-8
Integral Equations and Operator Theory
Positive Schatten(-Herz) Class Toeplitz Operators on Pluriharmonic Bergman Spaces Kyunguk Na Abstract. We study characterizations of arbitrary positive Toeplitz operators of Schatten (or Schatten-Herz) type in terms of averaging functions and Berezin transforms of symbol functions on the ball of pluriharmonic Bergman space. Mathematics Subject Classification (2000). Primary 47B35; Secondary 31B05. Keywords. Toeplitz operator, Schatten-Herz type, pluriharmonic Bergman space.
1. Introduction For a fixed integer n ≥ 2, let B = Bn denote the open unit ball in Cn . Given α > −1, the weighted pluriharmonic Bergman space b2α = b2α (B) is the set of all complex-valued pluriharmonic functions f on B such that Z 1/2 2 kf k2 = |f | dVα <∞ B 2 α
where dVα (z) = (1 − |z| ) dV (z) and V denotes the Lebesgue volume measure on B. For 1 ≤ p ≤ ∞, let Lpα = Lp (Vα ) be the weighted Lebesgue spaces on B and Rzα (w) = Rα (z, w) be the reproducing kernel for b2α . It is known that a pluriharmonic function f belongs to B if and only if we can decompose f = g + h, where g, h are holomorphic. Furthermore, if f ∈ L2α , then the boundedness of the Bergman projection implies that both g and h are in A2α = A2α (B), the holomorphic Bergman space with respect to the weight (1−|z|2 )α to simplify the notation. Thus, we see that b2α = A2α + A2α This work was supported by a Hanshin University Research Grant.
410
Na
IEOT
and the explicit formula of Rzα (w) is as follows: Rzα (w) =
1 1 + −1 n+α+1 (1 − w · z) (1 − z · w)n+α+1
(1.1)
for z, w ∈ B. Here and subsequently, z · w = z1 w1 + · · · + zn wn denotes the Hermitian inner product on Cn . We let Qα be the Hilbert space orthogonal projection from L2α onto b2α . It is known that Qα is an integral operator given by Z Qα ψ(z) = ψ(w)Rzα (w) dVα (w), z ∈ B, (1.2) B 2
for functions ψ ∈ L . From (1.1), one can see that |Rzα (z)| ≈
1 (1 − |z|2 )n+α+1
and
|Rzα (w)| .
1 |1 − z · w|n+α+1
(1.3)
for all z, w ∈ B so that Rzα is bounded for fixed z ∈ B. Thus, the projection Qα can be extended to an integral operator via (1.2) from L1α into the space of all pluriharmonic functions on B. Moreover, for 1 < p < ∞, one can see from (1.3) and Lemma 2.3 (see Section 2) that Qα is bounded projection from Lpα onto bpα . The integral transform Qα can be extended to M, the space of all complex Borel measures on B. That is to say, for each µ ∈ M, the integral Z Qα µ(z) = Rzα (w) dµ(w), z ∈ B, B
defines a function pluriharmonic on B. For µ ∈ M, the Toeplitz operator Tµ with symbol µ is defined by Tµ f = Qα (f dµ) for f ∈ b2α ∩ L∞ . In case dµ = ϕ dVα , we write Tµ = Tϕ . Note that Tµ is defined on a dense subset of b2α , because bounded pluriharmonic functions form a dense subset of b2α . A Toeplitz operator Tµ is called positive if µ ∈ M is a positive (finite) Borel measure (we will simply write µ ≥ 0). In the case 1 ≤ p ≤ ∞, Choi ([4]) studied boundedness, compactness and the membership of the Schatten classes Sp (see Section 3) for positive Toeplitz operators on pluriharmonic Bergman spaces. Also, Choi and Na ([5]) studied another aspect of positive Toeplitz operators, namely, the notion of the so-called Schatten-Herz classes Sp,q (see Section 4). This concept was introduced and studied in [7] in the holomorphic case on the unit disk. Harmonic and pluriharmonic analogues were subsequently studied in [2] and [5]. However, these works only considered the restricted range of parameter of p with 1 ≤ p, q ≤ ∞. Recently, Choe et al. ([1]) extended the characterizations in [3] and [2] for Schatten(-Herz) classes of positive Toeplitz operators to the full range of parameters p and q. We also extend such characterizations in [4] and [5] to the full range of parameters p and q.
Vol. 64 (2009)
Positive Toeplitz Operators
411
To state our main results, we let λ denote the measure on B defined by dλ(z) = Rz0 (z)dV (z). Note that λ = V−n−1 . Also, we let Kqp (λ) denote the so-called Herz spaces (see Section 4). We also refer to Section 2 for definitions of the averaging functions µ bδ and the Berezin transforms µ e of µ ∈ M. The following theorems are the main results of this paper. In the case 1 ≤ p < ∞ and α = 0, Theorems 1.1 and 1.2 below have been proved in [4] and [5], respectively. Theorem 1.1. Let 0 < p < 1, α > −1 and r ∈ (0, 1). If µ ≥ 0 then the following conditions are equivalent: (a) Tµ ∈ Sp . (b) µ br ∈ Lp (λ). Moreover, if n/(n + α + 1) < p, then the above statements are also equivalent to (c) µ e ∈ Lp (λ). Theorem 1.2. Let 0 < p ≤ ∞, 0 ≤ q ≤ ∞, α > −1 and r ∈ (0, 1). If µ ≥ 0 then the following conditions are equivalent: (a) Tµ ∈ Sp,q . (b) µ br ∈ Kqp (λ). Moreover, if n/(n+α+1) < p ≤ ∞, then the above statements are also equivalent to (c) µ e ∈ Kqp (λ). In Section 2 we recall some basic properties of automorphisms and some basic estimates for pseudohyperbolic distance and the kernel functions. We also investigate weighted Lp -behavior of averaging functions and Berezin transforms. In Section 3 we introduce Schatten class Toeplitz operators and prove Theorem 1.1. In the last section we define Herz and Schatten-Herz spaces and prove Theorem 1.2. We often abbreviate inessential constants involved in inequalities by writing X . Y for positive quantities X and Y if the ratio X/Y has a positive upper bound. Also, we write X ≈ Y if X . Y and Y . X.
2. Preliminaries In this section we introduce some notations and collect several basic lemmas which will be used in later sections. We first recall automorphisms on B. For z, w ∈ B, define ϕz (w) =
z − Pz (w) − (1 − |z|2 )1/2 Qz (w) , 1 − w · z¯
z ∈ B,
(2.1)
412
Na
IEOT
where Pz is the orthogonal projection of Cn onto the subspace [z] generated by z, namely, P0 = 0, w · z¯ Pz (w) = z if z 6= 0 |z|2 and Qz (w) = w − Pz (w). Then each ϕz is a automorphism on B and ϕz ◦ ϕz is the identity on B. Note that 1 − |ϕz (w)|2 =
(1 − |z|2 )(1 − |w|2 ) , |1 − z · w|2
z, w ∈ B,
(2.2)
and for a ∈ B, 1 − ϕa (z) · ϕa (w) =
(1 − |a|2 )(1 − z · w) , (1 − z · a)(1 − a · w)
z, w ∈ B,
(2.3)
;see Section 2 of [10] for details. We also recall the hyperbolic metric β(z, w) on B defined by β(z, w) =
1 1 + ρ(z, w) log 2 1 − ρ(z, w)
where ρ(z, w) = |ϕz (w)| is the pseudohyperbolic metric on B. Note that ρ is automorphism invariant, namely ρ(ϕa (z), ϕa (w)) = ρ(z, w). For z ∈ B and r ∈ (0, 1), let Er (z) be the pseudohyperbolic ball with center z ∈ B and radius r ∈ (0, 1) is defined by Er (z) = ϕz (rB). Since ϕz is an involution, w ∈ Er (z) if and only if |ϕz (w)| < r. Using this with (2.1), a little manipulation shows that Er (z) consists of all w ∈ B that satisfy |Pz (w) − cz |2 |Qz (w)|2 + <1 2 2 r ρz r 2 ρz where center cz and radius ρz defined by cz =
(1 − r2 )z 1 − |z|2 r2
and ρz =
1 − |z|2 . 1 − |z|2 r2
(2.4)
(2.5)
Thus we can see that Er (z) is an ellipsoid with center at cz . It is also known that Vα [Er (z)] ≈ (1 − |z|2 )n+α+1 .
(2.6)
The constants suppressed above depend only on r (see [10] for details). Using the invariance of ρ under automorphism and (2.2), we have the following result. Lemma 2.1. The inequality 1 − |z|2 1 − ρ(z, w) 1 + ρ(z, w) ≤ ≤ 2 1 + ρ(z, w) 1 − |w| 1 − ρ(z, w) holds for z, w ∈ B.
Vol. 64 (2009)
Positive Toeplitz Operators
413
Proof. Let z, w ∈ B with ρ(z, w) < r for some r ∈ (0, 1). Write w = ϕz (a) for some a ∈ B with ρ(0, a) < r. Since 1 − |a| ≤ |1 − z · a| ≤ 1 + |a|, we have 1 − |a| 1 + |a| |1 − z · a|2 ≤ ≤ 1 + |a| 1 − |a|2 1 − |a| for ρ(0, a) < r. Since ρ is invariant under automorphisms, we obtain 1+r 1−r |1 − z · a|2 ≤ ≤ 1+r 1 − |a|2 1−r for ρ(z, w) < r. Thus (2.2) implies the desired result.
Note that since ρ(z, w) < r is symmetric, we have 1−|z| ≈ |1−z ·w| ≈ 1−|w| for ρ(z, w) < r. The constants suppressed above depend only on r. Lemma 2.2. The inequality |1 − z · a| 1 + ρ(z, w) 1 − ρ(z, w) ≤ ≤ 1 + ρ(z, w) |1 − w · a| 1 − ρ(z, w) holds for z, w, a ∈ B. Proof. Note that 1 − |a| ≤ |1 − z · a| ≤ 1 + |a| and 1 − |a| ≤ |1 − w · a| ≤ 1 + |a|. Using these facts, the result follows as in the proof of Lemma 2.1. The following lemma is taken from Proposition 1.4.10 of [10]. Here and elsewhere, dS denotes the surface area measure on ∂B. Lemma 2.3. For −1 < a < ∞, c real and z ∈ B, let Z dS(ζ) Jc (z) = n+c ∂B |1 − z · ζ| and
(1 − |w|)a dV (w) n+1+a+c B |1 − z · w| for z ∈ B. Then the following estimates hold: if c < 0, 1 1 if c = 0, Jc (z) ≈ Ia,c (z) ≈ 1 + log 1−|z|2 1 if c > 0, (1−|z|2 )c Z
Ia,c (z) =
as |z| → 1. The constants suppressed above depend only on n and c. Lemma 2.4. Given α > −1, there exist some rα = rα (n) ∈ (0, 1) and a constant C = C(n, α) such that C −1 ≤ Rzα (w)(1 − |z|2 )n+α+1 ≤ C whenever w ∈ Er (z) and 0 < r ≤ rα .
414
Na
IEOT
Proof. We just prove the lower estimate by (2.6). Let z ∈ B and w ∈ Er (z) where r is to be chosen later. We have by (1.1) and (2.3) Rzα (w)(1 − |z|2 )n+α+1 = (1 − ϕz (w) · z)n+α+1 + (1 − z · ϕz (w))n+α+1 − (1 − |z|2 )n+α+1 = F (ϕz (w), z) where F (a, z) = (1 − a · z)n+α+1 + (1 − z · a)n+α+1 − (1 − |z|2 )n+α+1 . Since F is uniformly continuous on B × B, there exists rα ≥ r in (0, 1) such that if |ϕz (w)| ≤ rα , then |F (ϕz (w), z) − F (0, z)| < 1/2 for z ∈ B. It follows that 1 3 1 Rzα (w)(1 − |z|2 )n+α+1 = F (ϕz (w), z) ≥ F (0, z) − = − (1 − |z|2 )n+α+1 ≥ . 2 2 2 Thus we have the desired result.
3. Schatten class of positive Toeplitz operators In this section we collect the Lp (λ)-behavior of the averaging functions (as well as its discretized version) and the Berezin transforms. Let α > −1 and z ∈ B. Given µ ≥ 0 and r ∈ (0, 1), the averaging function µ br and Berezin transform µ e are defined by Z µ[Er (z)] and µ e(z) = |rzα (w)|2 dµ(w) µ br (z) = Vα [Er (z)] B where rzα (·) = Rzα (·)/kRzα k2 is the normalized reproducing kernel. Note that these notations are slightly different from those of [4] and [5]. Actually, the authors of [4] and [5] used the above two notations with α = 0. Also, we let µ br = ϕ br for dµ = ϕ dVα . For measurable functions f , we define fbr and fe similarly, whenever they are well defined. Also, given a sequence a = {am } in B, we let `p,α (a) denote the p-summable sequence space weighted by {(1 − |am |2 )α }. For α = 0, we let `p = `p,0 (a). Lemma 3.1. Let α > −1, µ ≥ 0 and 0 < r ≤ rα where rα is the number provided by Lemma 2.4. Then there exists a constant C = C(n, α, r) such that Z µ br (z) ≤ C |Rzα (w)|2 dµ(w), z ∈ B. B
In particular, µ br ≤ C µ e for 0 < r ≤ r0 . Proof. Given z ∈ B, we have by Lemma 2.4 and (2.6) Z |Rzα (w)|2 dµ(w) & (1 − |z|2 )−2(n+α+1) µ(Er (z)) & (1 − |z|2 )−(n+α+1) µ br (z) Er (z)
where the constants suppressed depend only on n, α and r. This implies the first part of the lemma. Using (1.3), the second part follows from this. The proof is complete.
Vol. 64 (2009)
Positive Toeplitz Operators
415
Let {am } be a sequence in B and r ∈ (0, 1). We say that {am } is a r-separated if the balls Er (am ) are pairwise disjoint or simply say that {am } is separated if it is r-separatedSfor some r. Also, we say that {am } is an r-lattice if it is 2r -separated and B = m Er (am ). For a ∈ B, we note that if {am } maximal 2r -separated sequence, thenSthere exists am such that a ∈ Er (am ) by the maximality, which implies B ⊂ m Er (am ). From this with Er (am ) ⊂ B for all m, we have the following: Any ’maximal’ 2r -separated sequence is an r-lattice. The next two lemmas are basic properties involving separated sequences we use later. Before proceeding, we note the intersection of Er (z) with [z], the subspace generated by z, is a disk of radius rρz and the intersection of Er (z) with the real (2n − 2)-dimensional space perpendicular to [z] at cz is a ball of much larger √ radius r ρz . Here cz and ρz are provided by (2.5). Thus (2.4) implies that B1 ⊂ Er (z) ⊂ B2 where B1 and B2 are the balls as follows: B1 = {w ∈ B : |Pz (w) − cz |2 + |Qz (w)|2 < r2 ρ2z } and B2 = {w ∈ B : |Pz (w) − cz |2 + |Qz (w)|2 < r2 ρz }. p √ Note that rρz ≈ r(1 − |z|2 )2 and r ρz ≈ r 1 − |z|2 when r is small; see [8] for details. Using the facts above, the following results can be proved by the same argument as in Lemma 3.2 and Lemma 3.3 of [1], respectively. Lemma 3.2. For α > 0 and r ∈ (0, 1) with αr < 1, there exists a constant N = N (α, r) with the following property: If {am } is an r-separated sequence, then more than N of the balls Eαr (am ) contain no point in common. Lemma 3.3. Given 0 < r < δ < 1, there exists a positive integer N = N (δ, r) with the following property: Any r-separated sequence can be decomposed into N δ-separated subsequences. We now turn to Schatten class operators. For a positive compact operator T on a separable Hilbert space H, there exist an orthonormal set {em } in H and a decreasing sequence {sm } tending to 0 such that X Tx = sm hx, em iem m
for all x ∈ H where h, i denotes the inner product on H. For 0 < p < ∞, we say that a positive operator T is in the Schatten p-class Sp (H) if ( ) p1 X p kT kp := sm < ∞. m
More generally, given a compact operator T on H, we say that T ∈ Sp (H) if the positive operator |T | = (T T ∗ )1/2 belongs to Sp (H) and we define kT kp = k |T | kp .
416
Na
IEOT
Also, we denote by S∞ the class of all bounded linear operators on H and let kT k∞ denote the operator norm kT k of T ∈ S∞ . In what follows, we take H = b2α and, in that case, we put Sp = Sp (b2α ). If a = {am } is an r-lattice in the Bergman metric, one can obtain the following result extending Theorem 7.16 of [9] for the holomorphic Bergman spaces. Theorem 3.4. Let 0 < p ≤ 1 and µ ≥ 0. For r ∈ (0, 1), suppose a = {am } is an r-lattice. Then the following conditions are equivalent: (a) Tµ ∈ Sp . (b) µ br ∈ Lp (λ). (c) {b µr (am )} ∈ `p (a). Remark. In the case 1 ≤ p ≤ ∞ and α = 0, the above result was proved in Theorems 3.9 and 3.12 of [4]. The same conclusion can be drawn for general α > −1 in much the same way as Theorems 3.9 and 3.12 of [4]. Proof. This can be proved by the same method as in Theorem 7.16 of [9] with the hyperbolic metric. Note that a simple calculation gives the following relation between the hyperbolic metric β and pseudohyperbolic metric ρ: ρ(z, w) = tanh β(z, w) for z, w ∈ B. From (3.1), it follows with pseudohyperbolic metric.
(3.1)
In Theorem 3.4, the Lp (λ)-behavior of averaging functions of positive measure is independent of the radii. Thus, we have the following result. Corollary 3.5. Let 0 < p ≤ ∞, α > −1 and r, δ ∈ (0, 1). Assume µ ≥ 0. Then µ br ∈ Lp (λ) if and only if µ bδ ∈ Lp (λ). We establish the boundedness of the Berezin transform on the weighted Lebesgue spaces Lp (Vγ ). Given a and b real, we let Z f (w) Ψa,b f (z) = (1 − |z|2 )a dVb (w) n+1+a+b B (1 − z · w) and Z
f (w) dVb (w) w|n+1+a+b |1 − z · B for z ∈ B. The following result is taken from Proposition 3.5 of [5]. 2 a
Φa,b f (z) = (1 − |z| )
Proposition 3.6. Let 1 ≤ p < ∞ and a, b, c be real. Then the following conditions are equivalent: (a) Ψa,b is bounded on Lp (Vc ). (b) Φa,b is bounded on Lp (Vc ). (c) −pa < c + 1 < p(b + 1). For the discretized version of Corollary 3.5, we first need the following which is a special case of Proposition 3.6.
Vol. 64 (2009)
Positive Toeplitz Operators
417
Lemma 3.7. Let 1 ≤ p ≤ ∞, α > −1 and γ be real. Then the Berezin transform is bounded on Lpγ if and only if −(n + α + 1) < (γ + 1)/p < α + 1. As in Lemma 2.24 of [10], using subharmonicity and Fubini’s theorem, we get the following: given δ ∈ (0, 1), there is a constant C = C(δ) such that Z Z f dµ ≤ C fµ bδ dVα (3.2) B
B
for all f ≥ 0 subharmonic on B and µ ≥ 0. The following is an immediate consequence of (3.2). Corollary 3.8. Given δ ∈ (0, 1), there exists a positive constant C = C(δ) such g that µ e ≤ C (b µδ ) for µ ≥ 0. The following is our first main result. Theorem 3.9. Let 0 < p < ∞, α > −1 and µ ≥ 0. Assume that {am } is an r-lattice with r ∈ (0, 1). Then the following statements are equivalent: (a) Tµ ∈ Sp . (b) {b µr (am )} ∈ `p . (c) µ br ∈ Lp (λ). Moreover, if n/(n + α + 1) < p, then the above statements are also equivalent to (d) µ e ∈ Lp (λ). Proof. From Theorem 3.4, we only need to show that (d) =⇒ (c) and either (b) or (c) =⇒ (d). (d) =⇒ (c): This follows from Lemma 3.1 and Corollary 3.5. We now assume n/(n + α + 1) < p and prove that either (b) or (c) implies (d). If p ≥ 1, one may use Lemma 3.7 and Corollary 3.8 to see that (c) implies (d). If p < 1 we have n < p < 1. n+α+1 Now we assume this and prove below that (b) implies (d). Assume {b µr (am )} ∈ `p (a). We have by (2.6) and Lemma 2.2 XZ dµ(w) µ e(z) ≤ (1 − |z|2 )n+α+1 |1 − z · w|2(n+α+1) E (a ) r m m X (1 − |z|2 )n+α+1 . µ[Er (am )] |1 − z · am |2(n+α+1) m X (1 − |z|2 )n+α+1 ≈ (1 − |am |2 )n+α+1 µ br (am ) |1 − z · am |2(n+α+1) m
(3.3)
418
Na
IEOT
for all z ∈ B. Now, since p(n + α + 1) > n, we obtain by Lemma 2.3 and (3.3) Z X µ e(z)p dλ(z) . (1 − |am |2 )p(n+α+1) µ br (am )p B
m
(1 − |z|2 )p(n+α+1)−n−1 dV (z) × 2p(n+α+1) B |1 − z · am | X ≈ µ br (am )p . Z
m
Thus, we have the desired result.
We also mention that corresponding characterizations for boundedness and compactness. In case α = 0, (a) ⇐⇒ (b) ⇐⇒ (d) was proved in Theorems 3.1 and 3.2 (Theorems 3.3 and 3.4 resp.) of [4]. Here, L0 denote the space of all bounded functions f on B such that f (z) → 0 as |z| → 1. Theorem 3.10. Let r ∈ (0, 1), α > −1 and µ ≥ 0. Then the following conditions are equivalent: (a) Tµ is bounded (compact) on b2α . (b) µ br ∈ L∞ (L0 ). (c) {b µr (am )} ∈ `∞ (`0 ). (d) µ e ∈ L∞ (L0 ). Proof. (a) ⇐⇒ (b) ⇐⇒ (d): These statements can be proved as Theorems 3.1 and 3.2 (Theorems 3.3 and 3.4 resp.) of [4]. (b) =⇒ (c): It follows from |am | → 1 as m → ∞. (c) =⇒ (d): Note that 1 − |a| ≤ |1 − z · a| for all a, z ∈ B. Given a positive integer j, put Mj = supm≥j µ br (am ) and let N be the positive integer provided by Lemma 3.2. By the proof of (b) =⇒ (d) of Theorem 3.9, Lemma 2.2 and Lemma 2.4 we have for each j X (1 − |z|2 )n+α+1 (1 − |am |2 )n+α+1 µ e(z) . µ br (am ) |1 − z · am |2(n+α+1) m n+α+1 X 1 − |z|2 . µ br (am ) 1 − |am |2 m<j XZ (1 − |z|2 )n+α+1 + Mj dV (w) |1 − z · w|2(n+α+1) m≥j Er (am ) n+α+1 X 1 − |z|2 . µ br (am ) + Mj N. 1 − |am |2 m<j Now, letting |z| → 1 for fixed j, we have lim µ e(z) . sup µ br (am )
|z|→1
m≥j
Vol. 64 (2009)
Positive Toeplitz Operators
419
for each j. Thus, taking the limit j → ∞, we have the desired result.
Since the averaging functions of positive measure in the above theorem is independent of the radii, we obtain the following result. Corollary 3.11. Let 0 < p ≤ ∞, α > −1 and r, δ ∈ (0, 1). Assume µ ≥ 0. Then µ br ∈ L0 if and only if µ bδ ∈ L0 .
4. Schatten-Herz class of positive Toeplitz operators In this section we prove Theorem 1.2. First, we introduce the Herz spaces. Let Am = {z ∈ B : rm ≤ |z| < rm+1 } −m
where rm = 1 − 2 for each integer m ≥ 0. Recall that we write χm for the characteristic function of Am for each m. Also, given µ ∈ M, we let µχm stand for the restriction of µ to Am for each m. Let α > −1. Given γ real and 0 < p, q ≤ ∞, the Herz space Kqp,γ is the space consisting of all locally Lpα -integrable functions f such that
kf kKqp,γ = 2−mγ kf χm kLpα q < ∞. `
Equipped with the norm above, the space Kqp,γ is a Banach space. Also, we let p,γ p,γ K0p,γ be the subspace of K∞ consisting of all functions f ∈ K∞ such that lim 2−mγ kf χm kLpα = 0.
m→∞
Note that Kqp,γ ⊂ K0p,γ for all q < ∞. For more information on the Herz spaces, see [6] and references therein. For α > −1, let 0 < p < ∞ and γ real. Then, given m ≥ 0, we have 1 − |z|2 ≈ 2−m for z ∈ Am and thus we obtain Z p p −mγp 2 kf χm kLpα = 2−mγ |f (z)| dVα (z) A Z m ≈ (1 − |z|2 )γp |f (z)|p dVα (z) Am
≈ kf χm kpLp
α+γp
and this estimate is uniform in m. It follows that
n o
kf kKqp,γ ≈ kf χm kLpα+γp
(4.1)
`q
for 0 < q ≤ ∞. In particular, since λ = V−n−1 , we have
kf kKp,−(n+α+1)/p ≈ kf χm kLp (λ)
`q
q
and this estimate is easily seen to be valid even for p = ∞ since −(n + α + 1)/p = 0 if p = ∞. For this reason, we put p,− n+α+1 p
Kqp (λ) = Kq
420
Na
IEOT
for the full range 0 < p ≤ ∞ and 0 ≤ q ≤ ∞. Note that Kpp (λ) ≈ Lp (λ) for 0 < p ≤ ∞. That is, these two spaces are the same as sets and have equivalent norms as Banach spaces. Note that H¨ older’s inequality holds in the Herz space as follows : Z f g dVα ≤ kf kKp,γ kgk p0 ,−γ (4.2) q Kq0 B
0
for functions f ∈ and g ∈ Kqp0 ,−γ for the full range 1 ≤ p, q ≤ ∞ and arbitrary γ real (see [2] for the details). Here and in what follows, p0 is the conjugate exponent of p. Given 0 < p ≤ ∞, note that kχm kLpγ ≈ 2−(α+1)m/p for m ≥ 0. From this we deduce the following: the space Kqp,γ contains constants ⇐⇒ either γ > −(α+1)/p; or γ = −(α + 1)/p and q = ∞. Hence we obtain by (4.2), Kqp,γ
p,γ 1 ≤ p ≤ ∞ and γ < (α + 1)/p0 =⇒ K∞ ⊂ L1α .
The similar conclusion can be obtained for the case γ = (α + 1)/p0 , namely, 1 ≤ p ≤ ∞ and γ = (α + 1)/p0 =⇒ K1p,γ ⊂ L1α . Now, we can see that if 1 ≤ p ≤ ∞ and if either γ < (α + 1)(1 − 1/p); Kqp,α
or γ = (α + 1)(1 − 1/p) and 0 < q ≤ 1,
(4.3)
L1α .
then the Herz space ⊂ Next, we introduce a discrete version of Herz spaces. Let a = {am } be an arbitrary lattice. Given a complex sequence ξ = {ξm } and a positive integer k, let ξχk denote the sequence defined by (ξχk )m = ξm χk (am ). Now, given 0 < p, q ≤ ∞, α > −1 and γ real, we let `p,γ q (a) be mixed-norm space of all complex sequences ξ such that
n o
kξk`p,γ (a) = 2−kγ kξχk k`p,α (a) q < ∞. q `
So, we have ) pq
( kξkq`p,γ (a) = q
X k
2−kγp
X
|ξm |p (1 − |am |2 )α
,
0 < p, q < ∞.
am ∈Ak
−kγ p ξχk k`p,α (a) } ∈ `0 . Finally, we let `p,0 Also, we say ξ ∈ `p,γ q (a) = `q (a). 0 (a) if k{2 We now introduce the so-called Schatten-Herz class of Toeplitz operators. Let S∞ denote the class of all bounded linear operators on b2 and k k∞ denote the operator norm. Given 0 < p, q ≤ ∞, the Schatten-Herz class Sp,q is the class of all Toeplitz operators Tµ such that Tµχk ∈ Sp for each k and the sequence {kTµχk kLpα } belongs to `q . The norm of Tµ ∈ Sp,q is defined by
kTµ kp,q = {kTµχk kLpα } q . `
Vol. 64 (2009)
Positive Toeplitz Operators
421
Also, we say Tµ ∈ Sp,0 if Tµ ∈ Sp,∞ and {kTµχk kLpα } ∈ `0 . Note that Sp,q ⊂ Sp,0 for all q < ∞. Theorem 4.1. Let 0 < p, q ≤ ∞, r ∈ (0, 1), α > −1 and γ real. Then the following statements hold for µ, τ ≥ 0. (a) {2−kγ kb µr χk kLp (τα ) } ∈ `q if and only if {2−kγ k(µχ dk )r kLp (τα ) } ∈ `q . −kγ −kγ (b) {2 kb µr χk kLp (τα ) } ∈ `0 if and only if {2 k(µχ dk )r kLp (τα ) } ∈ `0 . Here, dτα (z) = (1 − |z|2 )α dτ (z). Before proceeding to the proof, we note the following covering property (see Lemma 4.1 of [5]): If r ∈ (0, 1) and N = N (r) is a positive integer such that 1+r N − 1 ≤ log2 ≤ N, (4.4) 1−r then k+N [ Er (z) ⊂ Aj , z ∈ Ak . (4.5) j=k−N
Here and in the proof below, we let Aj = ∅ if j < 0. Proof. Let µ, τ ≥ 0 be given. We prove the theorem only for q < ∞; the case q = ∞ is implicit in the proof below. Choose N = N (r) as in (4.4) and put γp = γ(p, N ) = max{1, (2N + 1)p−1 }. We note by (4.5) k+N X
µ br χk ≤
(µχ dj )r
j=k−N
for all k. Thus, we have 1
kb µr χk kLp (τα ) ≤ γpp
k+N X
k(µχ dj )r kLp (τα )
j=k−N
for all k. Since 2−kγ ≤ 2N |γ| 2−jγ for k − N ≤ j ≤ k + N , it follows that k+N X
2−kγ kb µr χk kLp (τα ) .
2−jγ k(µχ dj )r kLp (τα )
j=k−N
for all k. This implies one direction of (b). Also, it follows that −kγq
2
kb µr χk kqLp (τα )
. γq
k+N X
2−jγq k(µχ dj )r kqLp (τα )
j=k−N
for all k. Thus, summing up the both sides of the above over all k, we have ∞ ∞ X X 2−kγq kb µr χk kqLp (τα ) . (2N + 1) 2−jγq k(µχ dj )r kqLp (τα ) , k=0
which gives one direction of (a).
j=0
422
Na
IEOT
We now prove the other directions. Note that Er (z) can intersect Ak with k ≥ 0 only when z ∈ ∪k+N j=k−N Aj by (4.5). Thus we have (µχ dk )r =
k+N X
(µχ dk )r χj ≤
j=k−N
k+N X
µ br χj .
j=k−N
Thus, a similar argument yields the other directions of (a) and (b).
As an immediate consequence of Corollary 3.5 and Theorem 4.1 with τ = V , we have the following Herz space version of Corollary 3.5. Corollary 4.2. Let 0 < p ≤ ∞, 0 ≤ q ≤ ∞ and δ, r ∈ (0, 1). Let µ ≥ 0. Then µ br ∈ Kqp (λ) if and only if µ bδ ∈ Kqp (λ). Also, applying Theorem 4.1 with discrete measures τ = denotes the point mass at z ∈ B, we have the following.
P
m δam
where δz
Corollary 4.3. Let 0 < p, q ≤ ∞, r ∈ (0, 1) and γ be real. Let µ ≥ 0. Assume \ that a = {am } is an r-lattice and put ξk = 2−kγ k{(µχ k )r (am )}m k`p,α (a) for k ≥ 0. Then the following statements hold. q (a) {b µr (am )} ∈ `p,γ q (a) if and only if {ξk } ∈ ` . p,γ (b) {b µr (am )} ∈ `0 (a) if and only if {ξk } ∈ `0 .
The following shows that Kqp (λ)-boundedness of the Berezin transform. Proposition 4.4. Let 1 ≤ p < ∞, 1 ≤ q ≤ ∞, α > −1 and γ be real. If −(n + α + 1) − (α + 1)/p < γ < (α + 1)(1 − 1/p), then the Berezin transform is bounded on Kqp,γ . In particular, the Berezin transform is bounded on Kqp (λ). Proof. Assume −(n + α + 1) − (α + 1)/p < γ < (α + 1)(1 − 1/p), or equivalently, −(n + α + 1)p < γp + α + 1 < (α + 1)p. Note that Kqp,γ ⊂ L1α whenever γ < (α+1)(1−1/p). Thus the Berezin transform is well defined on Kqp,γ by the condition of p, α and γ. Choosing an > 0 such that −(n + α + 1)p < γp ± + α + 1 < (α + 1)p, we see by Proposition 3.6 (with a = n+α+1 and b = α) that the Berezin transform is actually bounded on Lp (Vα+γp± ). In other words, Z Z |fg χm |p dVα+γp± ≤ C1 |f |p dVα+γp± B
Am
Vol. 64 (2009)
Positive Toeplitz Operators
423
for each m ≥ 0. Note that 1 − |z| ≈ 2−m for z ∈ Am and m ≥ 0. Thus the above estimate yields Z Z p ∓k g |f χm | dVα+γp ≈ 2 |fg χm |p dVα+γp± Ak Ak Z ∓k .2 |f |p dVα+γp± Am Z ∓(k−m) ≈2 |f χm |p dVα+γp B
so that k(fg χm )χk kLpα+γp . 2−|k−m|/p kf χm kLpα+γp
(4.6)
for all integers m, k ≥ 0. So, for each k = 0, 1, · · · , we have by (4.6) X X kfeχk kLpα+γp ≤ k(fg χm )χk kLpα+γp . 2−|k−m|/p kf χm kLpα+γp m
m
and therefore conclude by (4.1) ( )
X
kfekKp,γ . 2−k/p {kf χm kLp
}
α+γp
q
k
`q
≈ kf kKqp,γ ,
where the first inequality holds by Young’s inequality. This completes the proof of the first part of the proposition. Taking γ = −(n + α + 1)/p, we have the second part of the proposition. The proof is complete. We now extend the parameter q to the full range 0 ≤ q ≤ ∞ in the above proposition. Lemma 4.5. Let 1 ≤ p ≤ ∞, α > −1 and γ be real. For 0 ≤ q ≤ ∞, if −(n + α + 1) < γ + (α + 1)/p < α + 1, then the Berezin transform is bounded on Kqp,γ . Proof. Assume −(n + α + 1) − γ < (α + 1)/p < α + 1 − γ and let f ≥ 0 be a given measurable function. For 1 ≤ p ≤ ∞, the proof of Proposition 3.6 and Lemma 3.7 of [5] yield that there exist positive constants = (p, α, γ) and C = C(p, α, γ) such that −kγ
2 for all k ≥ 0.
kfeχk kLpα ≤ C
∞ X 2−mγ kf χm kLpα 2|m−k| m=0
(4.7)
424
Na
IEOT
Now, for 0 < q ≤ 1, we have by (4.7) kfekqKqp,γ ≤ C q ≤ Cq ≤ Cq
∞ X
∞ X 2−mγ kf χm kLpα 2|m−k| m=0
k=0 ∞ X ∞ X
k=0 m=0 ∞ X
!q
2−mqγ kf χm kqLpα 2q|m−k| ! 2−q|k|
kf kqKqp,γ .
k=−∞
Combining this with Proposition 4.4, we have kfekKqp,γ .
∞ X
!1/q −q|k|
2
kf kKqp,γ
k=−∞
for 0 < q ≤ ∞. Finally, we consider the case q = 0. Assume f ∈ K0p,γ and let an integer k ≥ 0 be given. Then we have by (4.7) −kγ
2
∞ X X X 2−mγ kf χm kLpα = + 2|m−k| m=0 m>d m≤d X −mγ p,γ . sup 2 kf χm kLpα + kf kK∞
kfeχk kLpα .
1 |m−k| 2 m≤d
m>d
for each integer d ≥ 1. Now, taking the limit k → ∞ with d fixed, we obtain lim sup 2−kγ kfeχk kLpα . sup 2−mγ kf χm kLpα k→∞
m>d
for all d. So, taking another limit d → ∞, we conclude fe ∈ K0p,γ .
Theorem 4.6. Let 0 < p ≤ ∞, 0 ≤ q ≤ ∞ and α > −1. Assume that µ ≥ 0 and a = {am } is an r-lattice with r ∈ (0, 1). Then the following statements are equivalent. (a) Tµ ∈ Sp,q . (b) µ br ∈ Kqp (λ). (c) {b µr (am )} ∈ `pq . Moreover, if n/(n + α + 1) < p ≤ ∞, then the above statements are equivalent to (d) µ e ∈ Kqp (λ). Proof. The proofs of Theorems 3.9 and 4.1 show that all the associated norms are equivalent. We have (a) ⇐⇒ (b) by Theorem 3.9 and Corollary 4.3. (d) =⇒ (a): This follows from Lemma 3.1 and Corollary 3.5. We now assume n/(n + α + 1) < p ≤ ∞ and prove that (a) or (b) implies (d). For 1 ≤ p ≤ ∞, one may use Lemma 4.5 and Corollary 3.8 to see that (a) implies (d). So, we may further assume that p < 1 in the proof below.
Vol. 64 (2009)
Positive Toeplitz Operators
425
(b) =⇒ (d): Assume (b). First, consider the case 0 < q < ∞. By the proof of Theorem 3.9, we have X (1 − |z|2 )p(n+α+1) µ e(z)p . (4.8) (1 − |am |2 )p(n+α+1) µ br (am )p |1 − z · am |2p(n+α+1) m for z ∈ B. Let j and k be given. Note that by an integration in polar coordinates and Lemma 2.3 Z 2−j dV (z) . 2p(n+α+1) [1 − (1 − 2−j−1 )|a|]2p(n+α+1)−n Aj |1 − z · a| ≈
2−j (2−j
+
2−k )2p(n+α+1)−n
,
a ∈ Ak ;
this estimate is uniform in j and k. Hence, if am ∈ Ak , then we have Z (1 − |z|2 )p(n+α+1) 2 p(n+α+1) (1 − |am | ) (1 − |z|2 )−n−1 dV (z) 2p(n+α+1) Aj |1 − z · am | Z dV (z) ≈ 2−kp(n+α+1) 2−j{p(n+α+1)−n−1} 2p(n+α+1) Aj |1 − z · am | .
2−kp(n+α+1) 2−j{p(n+α+1)−n} (2−j + 2−k )2p(n+α+1)−n
=
2−kp(n+α+1) 2jp(n+α+1) (1 + 2j−k )2p(n+α+1)−n
=
2p(j−k)(n+α+1) . (1 + 2j−k )2p(n+α+1)−n
P Thus, setting ξkp = am ∈Ak µ br (am )p and integrating both sides of (4.8) over Aj against the measure dλ(z), we obtain Z X p 2p(j−k)(n+α+1) µ e(z)p (1 − |z|2 )−n−1 dV (z) . ξk . (1 + 2j−k )2p(n+α+1)−n Aj k Note that for k ≥ j 1 2p(j−k)(n+α+1) ≤ 2p(j−k)(n+α+1) = p(n+α+1)|k−j| (1 + 2j−k )2p(n+α+1)−n 2 and for k < j 2p(j−k)(n+α+1) 1 1 ≈ (j−k){p(n+α+1)−n} = {p(n+α+1)−n}|k−j| . j−k 2p(n+α+1)−n (1 + 2 ) 2 2 Therefore, combining these estimates, we have Z X µ e(z)p (1 − |z|2 )−n−1 dV (z) . Aj
k
ξkp 2γ|k−j|
for all j where γ = p(n + α + 1). Note that γ > 0 since n/(n + α + 1) < p.
(4.9)
426
Na
IEOT
We first consider the case p < q ≤ ∞. From (4.9) and Young’s inequality, we have ke µkpKqp (λ) . k{ξkp }k
q
`p
= k{ξk }kp`q
Now, for 0 < q ≤ p, we have again by (4.9) ( ) pq p X X X qX ξ 1 k ke µkpKqp (λ) . ≈ k{ξk }kq`q . ξk γ|k−j| γq|k−j|/p 2 2 j j k k as desired. The case q = 0 also easily follows from (4.9).
5. Remarks In this section, we prove the cut-off point n/(n + α + 1) in Theorems 3.9 and 4.6 is sharp. In order to prove this, we set Γa,b,θ = {z = (z1 , · · · zn ) ∈ B : a < |z| < b, | arg(zi )| < θ}. Then we have the following result. Lemma 5.1. Let α > −1 and (n + α + 1)δ = cos−1 34 . Then there exists a constant C > 0 such that C Rzα (w) ≥ |1 − z · w|n+α+1 for z ∈ Γ1/2,1,δ/2 , w ∈ Γ1/4,1/2,δ/2 . Proof. Let z ∈ Γ1/2,1,δ/2 . Then one can see that arg(z · w) < δ
and
1 1 < |z||w| < 8 2
for w ∈ Γ1/4,1/2,δ/2 so that arg(1 − z · w) < δ
and |1 − z · w| < 1.
This implies that 1 − z · w ∈ Γ1/2,1,δ . Now we let u = (1 − z · w)n+α+1 . Then |u| < 1
and
cos(arg u) <
3 . 4
Using these above facts, we have Rzα (w) =
2Re u − |u|2 1 1 = (2 cos(arg u) − |u|) ≥ 2 |u| |u| |u|
for z ∈ Γ1/2,1,δ/2 and w ∈ Γ1/4,1/2,δ/2 .
3 1 − |u| ≥ 2 2|u|
We let β be real with β > n/p and consider the function fβ (z) = (1 − |z|)β . d Note that fβ ≈ (f β )r for each r ∈ (0, 1). We also have Z Z 1 p 2 −n−1 |fβ (z)| (1 − |z| ) dV (z) ≤ (1 − r)pβ−n−1 dr < ∞ (5.1) B
0
Vol. 64 (2009)
Positive Toeplitz Operators
427
for pβ − n > 0. Note Lemma 5.1 implies that 2 n+α+1 ff β (z) & (1 − |z| )
for z ∈ Γ1/2,1,δ/2 . From this, we have Z Z p 2 −n−1 |ff dV (z) & C β (z)| (1 − |z| ) B
(5.2)
(1 − |z|2 )p(n+α+1)−n−1 dV (z) = ∞
Γ1/2,1,δ/2
(5.3) for p(n + α + 1) ≤ n. Thus we have by (5.1) and (5.3) p d (f β )r ∈ L (λ),
but ff / Lp (λ) β ∈
for (n + α + 1) ≤ n/p < β, which implies that the cut-off point n/(n + α + 1) in Theorem 3.9 is sharp. Finally, we prove n/(n + α + 1) is sharp in Theorem 4.6. First we have q/p X n oq/p X Z p 2 −n−1 2−m(pβ−n) <∞ |fβ (z)| (1 − |z| ) dV (z) ≈ m
Am
m
for pβ − n > 0. In the case q < ∞, we also have by (5.2) q/p X X Z p 2 −n−1 f |fβ (z)| (1 − |z| ) dV (z) & 2−mq/p(p(n+α+1)−n) = ∞ m
Am
m
for p(n + α + 1) ≤ n. Thus, we have p d (f β )r ∈ Kq (λ),
but feβ ∈ / Kqp (λ)
for (n + α + 1) ≤ n/p < β and q < ∞. Similarly, one can obtain the same result in the case q = ∞. Acknowledgments The author thanks Professor Boo Rim Choe for giving some ideas concerning Theorem 3.4 and also thanks the referee for helpful comments.
References [1] B. R. Choe, H. Koo and Y. J. Lee, Positive Schatten class Toeplitz operators on the ball, Studia Math. 189 (2008), 65–90. [2] B. R. Choe, H. Koo and K. Na, Positive Toeplitz operators of Shatten-Herz type, Nagoya Math. J. 185 (2007), 31–62. [3] B. R. Choe, Y. J. Lee and K. Na, Toeplitz operators on harmonic Bergman spaces, Nagoya Math. J. 174 (2004), 165–186. [4] E. S. Choi, Positive Toeplitz operators on pluriharmonic Bergman space, J. Math. Kyoto. Univ. 47 (2007), 93–111. [5] E. S. Choi and K. Na, Schatten-Herz type positive Toeplitz operators on pluriharmonic Bergman spaces, J. Math. Anal. Appl. 327 (2007), 679–694.
428
Na
IEOT
[6] E. Hern´ andez and D. Yang, Interpolation of Herz spaces and applications, Math. Nachr. 205 (1999), 69–87. [7] M. Loaiza, M. L´ opez-Garc´ıa and S. P´erez-Esteva, Herz classes and Toeplitz operators in the disk, Integr. equ. oper. theory 53 (2005), 287–296. [8] W. Rudin, Function theory in the unit ball of Cn , Springer Verlag, 1980. [9] K. Zhu, Operator theory in function spaces, Marcel Dekker, New York and Basel, 1989. [10] K. Zhu, Spaces of holomorphic functions in the unit ball of C n , Springer-Verlag (GTM 226), 2004. Kyunguk Na General Education, Mathematics Hanshin University Gyeonggi 447-791 Korea e-mail: [email protected] Submitted: September 10, 2008. Revised: April 22, 2009.
Integr. equ. oper. theory 64 (2009), 429–453 c 2009 Birkh¨
auser Verlag Basel/Switzerland 0378-620X/030429-25, published online May 12, 2009 DOI 10.1007/s00020-009-1682-1
Integral Equations and Operator Theory
Riesz Systems and Controllability of Heat Equations with Memory L. Pandolfi Abstract. The main result we derive is the proof that a particular set of functions related to the controllability of the heat equation with memory and finite signal speed, with suitable kernel, is a Riesz system. Riesz systems are important tools in applied mathematics, for example for the solution of inverse problems. In this paper we shows that the Riesz system we identify can be used to give a constructive method for the computation of the control steering a given initial condition to a prescribed target. Mathematics Subject Classification (2000). Primary 44A60; Secondary 93B05. Keywords. Heat equation with memory, controllability, moment problem.
1. Introduction Let us consider the following heat equation with memory in one space dimension, Z t θt = N (t − s)∆θ(s) ds . (1.1) 0
Here, θ = θ(t, x) with x ∈ (0, π) and t > 0. We associate the following initial and boundary conditions to Eq. (1.1): θ(0) = θ(0, x) = ξ(x),
x ∈ (0, π) ,
θ(t, 1) = 0 ,
t > 0.
θ(t, 0) = u(t) ,
(1.2)
The function u(·) is locally square integrable for t > 0 and the initial condition ξ belongs to L2 (0, π). The operator ∆ in Eq. (1.1) is the laplacian in one space dimension, ∆θ(x) = θxx (x) . Assumptions on the kernel N (t) are described below. This paper fits into the research program of the GNAMPA-INDAM .
430
Pandolfi
IEOT
Equation (1.1) has been independently proposed by several authors as a version of the “heat equation” with finite signal speed, noticeably in [8] and [14]. The goal of this paper is the identification of a special sequence {zn (t)} of functions, related to Eq. (1.1), which forms a Riesz system in L2 (0, π) (the definition is in Section 1.1). The functions zn (t) are the solution of the integrodifferential equation Z t N (t − s)zn (s) ds , zn (0) = 1 . zn0 (t) = −n2 0
The introduction of these functions is suggested by a control problem (described below) and in this paper we use these functions (and known results on the controllability of Eq. (1.1)) in order to represent a function u, a “control”, which drives the initial condition ξ to a final target (both in L2 (0, π)) in time T (it will be T ≥ π); i.e. a control which solves the problem θ(T ) = η .
(1.3)
So, we can interpret the results in this paper as a “constructive” solution of the control problem (1.1)–(1.3). In fact, this is only a part of the story since moment problems appear often in applied mathematics, for example in the solution of inverse problems, see [1, 4], so that the identification of a suitable Riesz system which is naturally associated to Eq. (1.1) is interesting by itself, in particular because the solution of moment problems posed with respect to Riesz systems are well posed. Algorithms for the solution of moment problems are described in [1]. Applications of the Riesz system introduced here to the solution of inverse problems will appear elsewhere, see [22]. Let us now comment on the solvability of the problem (1.1)-(1.2). Existence and uniqueness of the solution for every locally square integrable control u is proved in [20], provided that the kernel N (t) is twice differentiable and N (0) > 0 (so we can assume N (0) = 1.) In that paper it is proved that for every square integrable control u, the solution is a continuous L2 (0, π)-valued function, so that evaluation of the solution at a certain time T is permissible. The controllability problem for Equation (1.1) has been studied and solved firstly in [5]. It was proved in that paper that the controllability problem is solvable under an additional regularity condition on η, provided that T > π. The solution rests on Carleman estimates and it can’t be considered constructive. The case that the space variable belongs to IRn has been considered in [27], still using Carleman estimates, and in [20]. The proof in this last paper (see also [21]) is based on Baire’s theorem and compactness arguments, and it is not constructive. In this paper we first show that the controllability problem can be reduced to a suitable moment problem with respect to the Riesz system {zn }. The known results on the controllability problem shortly recalled above (and described with more details in Section 3.2) are derived under the assumption that N (t) is of class C 3 . So, as in the previous papers on controllability, the standing
Vol. 64 (2009)
Riesz Systems and Heat Equations with Memory
431
assumptions in this paper are that the kernel N (t) is of class C 3 and N (0) = 1. Controllability for a different class of kernels is studied in [19]. Finally, let us note that even if η = 0 then we don’t have controllability to rest: we construct a control which forces the solution to hit the 0 target at a certain time T but we cannot force the solution to remain at rest in the future: in fact, in the case of heat equations with memory, controllability to rest can be achieved only in exceptional cases, see [15]. 1.1. Preliminaries on the abstract moment problem Key references for this section are [1, 2, 12, 28]. We consider a separable Hilbert space H. A sequence {zn }n≥1 in H is a Schauder basis when every element h ∈ H can be represented in a unique way as h=
+∞ X
αn zn .
(1.4)
n=1
The convergence of the series is in the norm of H. A Schauder basis has the additional property of being a minimal basis, i.e. for every j we have zj ∈ / cl span{zr , r 6= j} , see [12, p. 312]. A sequence which is a minimal basis in its span is called a minimal sequence. An abstract moment problem in H is as follows. Let zn be elements of H and let {cn } ∈ l2 . We want to know whether it is possible to find v ∈ H such that hv, zn i = cn
(1.5)
(the inner product is that of H.) A moment problem like (1.5) can be defined in a Banach space too and in this case the crochet represents duality. Moment problems are mostly studied in the case that the functions zn have a special form (polynomials or exponentials) and this study has been at the core of functional analysis. However, even if the functions zn do not have any special form, conditions for solvability are in [2, Theorem I.2.1]. In particular, if the moment problem is solvable for every element {cn } of a dense subset of l2 then the sequence {zn } is ω-(linearly) independent, i.e. the following property holds: X {αn } ∈ l2 and αn zn = 0 =⇒ {αn } = 0 . (1.6) If {zn } is a minimal sequence, then it is possible to give a formula for the coefficients associated to h in (1.4). It is possible to construct a biorthogonal sequence of {zn }. That is, it is possible to find a sequence {ζn } such that hzn , ζk i = δn,k (δn,k is the Kronecker delta) and the (unique) element αn in the representation (1.4) of h is αn = hh, ζn i .
432
Pandolfi
IEOT
So, when {zn } is a minimal sequence and problem (1.5) is solvable, its solution is v=
+∞ X
cn ζn .
n=1
In spite of this, practical computations with minimal sequences do not lead to well posed problems, since the biorthogonal sequence can be unbounded. A more restrictive condition, under which practical computations are feasible, is that the sequence {zn } be a Riesz sequence (or “Riesz system”. A Riesz sequence is called an L-sequence in [2].) The meaning of this is as follows: let L ⊆ H be the closed linear space spanned by the vectors zn . The sequence {zn } is a Riesz sequence when there exists an orthogonal basis {n } (of a Hilbert space H 0 ) and a linear bounded operator T 0 from H 0 onto L which is boundedly invertible and such that T 0 n = zn . If L = H then the sequence {zn } is called a Riesz basis of H. Riesz systems share the following properties with Fourier series: 1) every Riesz system is bounded; 2) there exist positive numbers m and M such that
2
X X X
αn zn ≤ M |αn |2 . m |αn |2 ≤ H
Note that the biorthogonal sequence of a Riesz basis is a Riesz basis too, hence it is bounded. If a system is a Riesz system in the Hilbert space H, which is not a basis, then it may have an unbounded “biorthogonal system” due to the fact that the set of the projections of ζn on [span {zn }]⊥ can be unbounded but it is possible to find such biorthogonal sets which are bounded. In particular, the one which belongs to cl span {zn } is bounded and it is a Riesz system too. Moreover, when {zn } is a Riesz system, then the series X αn zn converges if and only if {αn } ∈ l2 and every f ∈ L = cl span{zn } can be represented as X f= αn zn , αn = hf, ζn i where {ζn } is biorthogonal to {zn }. So, we wish not only that our moment problem is solvable, but also that our sequence {zn } is a Riesz sequence. Several tests have been given for this. We shall use the following one: Theorem 1.1 (Bari Theorem). If {n } is a Riesz basis in H and if the sequence {zn } satisfies conditions (1.6) and +∞ X
kzn − n k2 < +∞
n=1
then the sequence {zn } is a Riesz sequence too.
(1.7)
Vol. 64 (2009)
Riesz Systems and Heat Equations with Memory
433
See [28, p. 45] and [12, p. 322] for the proof (the proof in [28, p. 45] assumes that {n } is an orthonormal basis.) As we said, if condition (1.6) holds, then the sequence {zn } is called ωindependent; if condition (1.7) holds, the sequence {zn } is called quadratically close to {n } (when H = L2 (0, T ) we also say “L2 –close” to {n }) and the Riesz basis {zn } is called in particular a “Bari sequence”. In fact, we need a minor variant of Bari’s theorem, which is as follows: Theorem 1.2. Let {n }n≥0 be a Riesz sequence of H. If {zn }n≥1 is ω-independent and quadratically close to {n }n≥1 , then {zn }n≥1 is a Riesz sequence in H. The proof is outlined in [12, Remarque 2.1, p. 323] and it is reported in the Appendix for the sake of completeness. A different version of Bari’s theorem used in control theory is in [13]. 1.2. Preliminaries on the wave equation In order to put this paper in the proper setting, we recall here the very well known problem of the controllability of the wave equation in one space dimension, wtt = wxx ,
0 < x < π,
t>0
(1.8)
with conditions w(t, 0) = u(t) ,
( w(0, x) = ξ0 , wt (0, x) = ξ1 .
w(t, π) = 0 ,
The problem we consider is as follows: a target η ∈ L2 (0, π) is given and we want to find a suitable time T > 0 and a square integrable control u(·) such that w(T, ·) = η(·). Note that we are controlling the final shape but not the final velocity. We shall see that it is possible to choose T = π, the same time for every initial conditions and target (if instead we want to control both the configuration and the velocity then it must be T = 2π.) The proof of this result goes as follows: we consider the functions φn (x) = sin nx, n ∈ IN, which solve the eigenvalue problem φ00n (x) = −n2 φn (x) , φn (0) = φn (π) = 0 . (1.9) We compute the scalar product (in L2 (0, π)) of both the sides of (1.8) with φn . Integration by parts in x gives the equality d2 hw, φn i = −n2 hw, φn i + φ0n (0)u(t) dt2 so that Z hw(t), φn i = An cos nt + Bn sin nt +
t
[sin ns]u(t − s) ds . 0
The coefficients An and Bn are given by An = hξ0 , φn i ,
Bn =
1 hξ1 , φn i n
434
Pandolfi
IEOT
(so that w(t, ·) ∈ H 1 (0, π) if ξ0 (·) ∈ H 1 (0, π) and ξ1 (·) ∈ L2 (0, π).) The condition w(π, ·) = η(·) is then equivalent to the moment problem Z π [sin ns]v(s) ds = hη, φn i − (−1)n hξ0 , φn i = cn (1.10) 0
where v(s) = u(π − s): the control u(·) exists if and only if there exists a function v which solves the equalities (1.10) for every n. The known theory of the Fourier series shows that this problem is very easily solved: v(t) =
+∞ 2X ck sin kt . π
(1.11)
k=1
We can go the opposite way: if controllability of the wave equation has been independently proved, then the previous arguments are a proof of the fact that the moment problem (1.10) is solvable. This is the turn of ideas we follow in this paper: we first prove that the sequence {zn } is L2 -close to a Riesz system; we then use the fact that control problem (1.1)–(1.3) is known to be solvable in order to prove that the sequence {zn } is ω-independent so that Bari Theorem can be applied. So, it will turn out that the sequence {zn } is a Riesz sequence. We then use this property in order to derive a formula for the control which drives the initial condition ξ to the target η, which extends (1.11). 1.3. References It seems that one of the first papers which uses moment problems in control theory is [7], followed by several papers in particular by Russel and Fattorini (see [10, 11, 23].) Among the numerous recent papers we confine ourselves to cite the papers [3, 16]. Apart from the papers too numerous to be cited, the applications of the moment problem to control theory has been examined in three books: [2, 17, 18]. As we noted, Riesz systems are crucial in the solution of a large class of inverse problems. As an example of this, we cite the paper [4]. We note that the “classical” moment problems, when {zn } is a sequence of polynomials, do not correspond to Riesz basis and in fact the truncated problems obtained by considering only finitely many equation is severely ill conditioned, see [25]. In contrast with this, moment problems which correspond to Riesz basis are well posed problems. An application of the results proved here to the solution of an identification problem can be found in [22].
2. Reduction to a moment problem In this section we are going to prove that the controllability problem we presented for the equation (1.1) is equivalent to a certain moment problem. As in the case of the wave equation, we consider the functions φn (x) = sin nx, n ∈ IN, which solve the eigenvalue problem (1.9). We note thatp{φn } is a complete orthogonal system in L2 (0, π) (not a normal system: kφn k = π/2.)
Vol. 64 (2009)
Riesz Systems and Heat Equations with Memory
435
Let λ be one of the numbers −n2 and let φ be the corresponding eigenfunction sin nx. Let h(t) solve Z T h0 (t) = −λ N (r − t)h(r) dr , h(T ) = 1 (2.1) t
(here T is any fixed number. Its value for the controllability problem will be specified later on.) Let the control function u(t) and the initial datum ξ be fixed. We consider the integral Z π Z T d [h(t)θ(t, x)] dt dx . I= φ(x) dt 0 0 Integration by parts shows that this integral is Z T Z π Z T Z π h(t)θt (t, x) dt dx φ(x) h0 (t)θ(t, x) dt dx + φ(x) I= 0 0 0 0 # Z Z " Z π
=
T
T
−λ
φ(x) 0
0 π
Z +
φ(x)
π
=
Z
T
0
0
Z
=
T
"0
0
Z
−λ
φ(x) 0
0 T
Z + So we have Z π
T
π
φ(x)θxx (r, x) dx dr dt #
N (r − t)h(r) dr θ(t, x) dt dx t
Z h(t)
0
Z N (t − r)
h(t) Z
N (r − t)h(r) dr θ(t, x) dt dx
t
Z
0 π
dt dx
t
T
+
T
−λ
N (t − r)θxx (r, x) dr #
h(t)
0
Z
t
Z
"0
φ(x)
Z
T
Z
0
Z
N (r − t)h(r) dr θ(t, x) dt dx t
t
Z 0 N (t − r) φ (0)u(r) + λ
0
π
φ(x)θ(r, x) dx dr dt .
0
Z
π 0
φ(x)θ(T, x) dx − h(0) φ(x)ξ(x) dx = φ (0) 0 0 Z t v˜(t) = N (t − r)u(r) dr .
Z
T
h(t)˜ v (t) dt , 0
(2.2)
0
Smoothness assumptions needed to justify integration by parts hold provided that u is smooth and certain compatibility conditions between u and ξ hold, see [20]. These conditions are satisfied by the pairs (ξ, u) in a dense subset of L2 (0, π) × L2 (0, T ). Both the sides of (2.2) are continuous functions of u and ξ so that equality (2.2) holds for every initial condition ξ ∈ L2 (0, π) and every control u ∈ L2 (0, T ). This proves the necessity part of the following result:
436
Pandolfi
IEOT
Lemma 2.1. Let hn (t) be the solution of problem (2.1) with λ = −n2 . Let ξ be an initial condition and let η be the prescribed target, both in L2 (0, π). A square integrable control u which transfer ξ to η in time T exists if and only if for every n we have Z π Z T 1 φn (x) [η(x) − hn (0)ξ(x)] dx (2.3) hn (r)˜ v (r) dr = 0 φn (0) 0 0 where Z
r
N (r − s)u(s) ds .
v˜(r) =
(2.4)
0
Proof. We need to prove the sufficiency part. We assume that there exists a control u such that the function v˜ defined in (2.4) solves (2.3) for every n. Repeating the computations above we see that Z T Z π 1 hn (r)˜ v (r) dr = 0 φn (x) [θ(T, x) − hn (0)ξ(x)] dx . φn (0) 0 0 Our assumption is that (2.3) holds for the function v˜(r) given by (2.4) so that we have also Z π Z T φn (x)θ(T, x) dx = φn (x)η(x) dx . 0
0 2
The set {φn (x)} being complete in L (0, π), we get θ(t, x) = η(x), as wanted. In the next section, we shall concentrate on the solution of the problem (2.3) in terms of v˜ and we disregard the fact that v˜ should have a special expression in terms of u. I.e., we study a different problem: the problem of finding a square integrable function v˜ which solves (2.3). Once this problem is solved and the regularity properties of the solution v˜ have been studied, we shall see that also the original control problem (in terms of u) can be solved. Let us consider now the right hand side of (2.3). The integral on the right hand side is cn = hφn , ηiL2 (0,π) − hn (0)hφn , ξiL2 (0,π) . We shall see in Section 3 that the sequence {hn (0)} is bounded so that the sequence {cn } belongs to l2 : the problem of determining a function v˜ which solves (2.3) is a moment problem in L2 (0, T ), Z
T
hn (r)˜ v (r) dr = 0
cn , n
{cn } ∈ l2 .
(2.5)
The sequence {hn (0)} being bounded, the sequence {cn /n} fills a dense subspace of l2 , which is a proper subspace of l2 .
Vol. 64 (2009)
Riesz Systems and Heat Equations with Memory
437
3. The Riesz system In this section we prove that the sequence {hn } which appears in (2.5) is a Riesz system in a suitable bounded interval identified below (and, in the course of the proof, we shall also see boundedness of the sequence of functions {hn (t)} on every bounded interval.) Computations have a more natural appearance if we use the following transformation: zn (t) = hn (T − t) (note that T will be π later on. For the moment, T is a any fixed number.) The function zn (t) solves Z t zn0 (t) = −n2 N (t − s)zn (s) ds , zn (0) = 1, (3.1) 0
and the moment problem takes the form Z π Z T 1 φn (x)[η(x) − zn (T )ξ(x)] dx, zn (t)v(t) dt = cn , cn = n 0 0
(3.2)
where now v(t) = v˜(T − t) and u(t) has to be determined from the equation Z t N (t − s)u(s) ds = v(T − t) . (3.3) 0
The proof that {zn (t)}n≥1 is a Riesz sequence in L2 (0, π) is based on Theorem 1.2 and it is divided in two parts: we first prove (in Subsection 3.1) that {zn (t)}n≥1 is quadratically close to the sequence√{eαt cos nt}n≥1 , where α = N 0 (0)/2, (the sequence {cos nt} plus the element 1/ 2 is a complete orthogonal system of elements of constant norm in L2 (0, π) so that the sequence {eαt cos nt}n≥1 is a Riesz system.) The property of ω-independence is in Subsection 3.2. In order to illustrate the ideas in this paper as clearly as possible, the computations in Section 3.1 uses the restrictive assumption N 0 (0) = 0. At the expenses of more involved computations, the same ideas can be used in the general case, even if N 0 (0) 6= 0, as shown in the Appendix. 3.1. L2 -closedness to a Riesz sequence In this section we prove that {zn (t)} is quadratically close to a Riesz sequence. The sole conditions on the kernel N (t) needed in this proof are the standing assumptions of this paper: N (t) is of class C 3 with N (0) = 1. The computations in this case are involved and relegated to the appendix. For the sake of clarity, we present here the computations under the restrictive condition N 0 (0) = 0 and we prove that {zn (t)}n≥1 is L2 -close to the the Riesz sequence {cos nt}n≥1 . We compute the derivatives of both sides of (3.1) and we see that Z t zn00 (t) = −n2 zn (t) − n2 N 0 (t − s)zn (s) ds , zn (0) = 1 , zn0 (0) = 0 0
so that Z zn (t) = cos nt − n
t
Z sin n(t − s)
0
0
s
N 0 (s − r)zn (r) dr ds .
438
Pandolfi
IEOT
Integration by parts gives Z s Z t d zn (t) = cos nt − N 0 (s − r)zn (r) dr ds cos n(t − s) ds 0 0 Z t Z t 0 = cos nt + N (0) cos n(t − s)zn (s) ds − N 0 (t − r)zn (r) dr 0 0 Z t Z s + cos n(t − s) N 00 (s − r)zn (r) dr ds 0 0 Z t = cos nt + [N 0 (0) cos n(t − r) − N 0 (t − r)]zn (r) dr 0 Z t Z t cos n(t − s)N 00 (s − r) ds zn (r) dr . (3.4) + 0
r
The Gronwall inequality shows the existence of a constant M such that |zn (t)| < M ,
t ∈ [0, T ] .
The number M does depend on T but not on n. This shows: Lemma 3.1. The sequence {cn } in (3.2) belongs to l2 . Note that this holds also if N 0 (0) 6= 0. From now on instead we use the restrictive condition N 0 (0) = 0 (to be removed later on.) Equality (3.4) suggests comparison of zn (t) with cos nt. The sequence {cos nt} being orthogonal on L2 (0, π), with constant norm, from now on we impose T = π. We introduce en (t) = zn (t) − cos nt and, using (3.4), we see that, when N 0 (0) = 0, Z t Z t Z r en (t) = − N 0 (t − r)en (r) dr + cos n(t − r) N 00 (r − s)en (s) ds dr 0
0
0
=A+B where Z t A = − N 0 (t − s) cos ns ds , 0 Z t Z r B = cos n(t − r) N 00 (r − s) cos ns ds dr . 0
(3.5)
0
Both these integrals can be integrated by parts: Z Z 1 t d 1 t 00 1 sin ns N 0 (t − s) ds = N (t − s) sin ns ds , (3.6) −A = n 0 ds n 0 n Z Z r 1 t 1 00 000 B= cos n(t − r) N (0) sin nr + N (r − s) sin ns ds dr (3.7) n 0 n 0
Vol. 64 (2009)
Riesz Systems and Heat Equations with Memory
439
(the integral in (3.6) can be integrated by parts once more, and (3.6) is of the order 1/n2 ). Using again Gronwall inequality we see the existence of a constant M such that M |en (t)| ≤ . n This shows that the sequence {zn (t)} is quadratically close to the sequence {cos nt}. The inequality above is sufficient for the application of Bari’s theorem, but Section 4 will use a refined version of this inequality. Remark 3.2. Similar computations show that the sequence {zn0 (t)/n} is L2 -close to Rt the sequence {− sin nt} and the fact that the sequence {n 0 zn (s) ds} is L2 -close to the sequence {sin nt}. The inequalities in this section have been derived in the simple case when N 0 (0) = 0. We state now the general result, proved in the appendix: Theorem 3.3. Let N (t) be of class C 3 and let N 0 (0) = 1. We define α = N 0 (0)/2. The sequence {zn (t)} is then L2 (0, T )-close to the sequence {e−αt cos nt} for every T > 0. 3.2. The property of ω-independence In the previous section we stated that the sequence {zn (t)} is L2 (0, T )-close to the Riesz sequence {e−αt cos nt} where α = N 0 (0)/2. Here T > 0 is arbitrary. In this section we use known controllability results in order to prove that if T ≥ π, then {zn (t)} is ω–independent so that, from Theorem 1.2, it is a Riesz system in L2 (0, π). This is the point where finite signal speed has to be taken into account. This property, derived by many authors, see for example [6, 9], is recalled in the form we need in this paper. For completeness, a sketch of the proof is given in the Appendix. We consider system (1.1), but now • on the interval (−, π) with > 0; • with homogeneous Dirichlet boundary condition θ(t, −) = 0, θ(t, π) = 0 and null initial condition, θ(0, x) = 0; • the system is acted upon by a control distributed on (−, 0). So we consider the system Z t θ (t, x) = N (t − s)∆θ(s, x) ds + χ(x)ν(t, x), x ∈ (−, π), t (3.8) 0 θ(0, x) = 0, x ∈ (−, π) , θ(t, −) = θ(t, π) = 0 . The function χ(x) is the characteristic function of (−, 0). The function ν(t, x) is a “distributed control”, and belongs to L2loc ((0, +∞) × (−, 0)). The property of “finite propagation” we need is that θ(t, x) is supported on x ∈ [−, π − ] for every t < π − . Now we observe that a smooth control ν(t, x) produces a smooth solution θ(t, x) so that evaluation of θ(t, x) at x = 0 is possible and, when we restrict the
440
Pandolfi
IEOT
space variable x to [0, π], this corresponds to consider the above control problem with “boundary control” at 0 given by u(t) = θ(t, 0). The conditions under which θ(t, x) is smooth (so that the computation of u(t) = θ(t, 0) makes sense) are in [20, Appendix]. The required (smoothness) conditions on ν(t, x) are satisfied in a dense subset of L2 ((0, T ) × (−, 0)). Now we recall the known controllability results, from [5] (under more restrictive assumptions) and from [26, 27], under the assumption in this paper (and in fact more general, see below.) These papers study controllability under distributed control. The results proved in these paper cover the case of a space interval [−, π] with distributed control supported on [−, 0] and every initial and final condition in L2 (−, π) (actually, [5] imposes further regularity to the target.) Exact controllability is proved in time T ≥ π + . As described in [5], this result on controllability with control acting on [−, 0] implies boundary controllability on [0, π]. Let for simplicity the initial condition ξ, defined on [0, π], be ξ = 0. Extend ξ and the target η(x) (given on [0, π]) with 0 to [−, 0] and consider the distributed system (3.8). Construct the stearing distributed control, in time T + for this new function, defined on (−, π) and then use the trace u(t) = θ(t; 0) as the boundary control. So, we have exact controllability in every time T > π; and, more in general, boundary controllability is possible in an arbitrary time, longer then the width of the interval. However, the steering control ν(t, x) so constructed needs not be smooth so that in principle u(t) might not be well defined. In spite of this, we are going to show that the previous argument implies approximate controllability, and this is sufficient for our needs. Approximate controllability is seen as follows: let RT ⊆ L2 (−, π) be the reachable set at time T for the control system (3.8) and let RT ;0 ⊆ L2 (0, π) be the set of the restrictions to L2 (0, π) of the elements of RT . The previous observations on controllability proves that, for every σ > 0, every function of L2 (0, π) whose support is in [0, π−σ] belongs to Rπ;0 . Hence the subspace Rπ;0 is dense in L2 (0, π). Density is retained if we confine ourselves to consider solely those elements which are reachable by using smooth controls ν(t, x). So, we conclude approximate controllability: every η(x) in a dense subset of L2 (0, π) is a reachable target for the control system (1.1)-(1.2). Let us go back to consider the moment problem (3.2) with ξ = 0. The moment problem is solvable for every reachable target. So, the set of the sequences {ηn } for which the following moment problem is solvable is a dense subspace of l2 . The moment problem is Z π Z T 1 ηn = φn (x)η(x) dx , η ∈ Rπ;0 . (3.9) zn (t)v(t) dt = ηn , n 0 0 Also the set of the sequences {ηn /n} which correspond to solvable moment problems is dense in l2 . This shows that the sequence {zn (t)}n≥1 is ω-independent, see [2, Theorem I.2.1 (d)], as we wanted: Theorem 1.2 can be applied and we conclude that the sequence {zn } is a Riesz sequence in L2 (0, π). In conclusion, we have the following result:
Vol. 64 (2009)
Riesz Systems and Heat Equations with Memory
441
Theorem 3.4. The sequence {zn (t)}n≥1 is a Riesz system in L2 (0, π), provided that N (t) ∈ C 3 (0, π + ), N (0) = 1. Remark 3.5. The results on controllability in [5] concern a one dimensional space variable and require that N (t) is continuous for t ≥ 0 and completely monotonic, i.e. of class C ∞ with derivatives of alternating sign; in particular, N (t) ≥ 0. The result in [27] considers the case of elliptic operators with variable coefficients in a region Ω of IRn . The kernel N can depend on x, N = N (t, x). The coefficients and N (t, x) have to be of class C 3 and N (0, x) > 0. Both these papers identify the controllability time as a consequence of Carleman estimates. Also the papers [20, 21] studies the problem in a region of IRn but the controllability time is not identified there. Finally, we note that the controllability result which is really needed in this section is approximate controllability.
4. Back to the control problem In the previous section we proved that the moment problem (3.2), i.e. (2.3), is solvable for a suitable square integrable function v. The proof is based on the fact that controllability of our system has been already proved with different methods but, as we noted, these methods do not provide a real construction of the control u(t) which steers the initial datum ξ to the prescribed target η. This problem is examined now. The moment method gives a formula for the solution v(t) of problem (3.2), i.e. +∞ X cn ζn (t) (4.1) v(t) = n n=1 where {ζn (t)} is biorthogonal to {zn (t)}. The steering control solves the Volterra integral equation of the first kind (3.3). We are now going to prove that the function v(t) in (4.1) is of class W 1,2 (0, π) so that the control u(t) can be computed from the Volterra integral equation of the second kind Z t u(t) + N 0 (t − s)u(s) ds = v 0 (t) . (4.2) 0
In order to prove this additional regularity of v(t), we need the following estimate: Lemma 4.1. Let α = N 0 (0)/2. There exists a sequence of square integrable functions {an (t)} such that for t ∈ [0, π] we have: a (t) eαt n [2α + N 00 (0)t] sin nt ≤ , (4.3) zn (t) − eαt cos nt − 2n n " # Z +∞ +∞ π X X |an (t)|2 < M < +∞ , |an (t)|2 dt < +∞ . (4.4) n=1
0
n=1
442
Pandolfi
IEOT
Proof. We present the proof in the case N 0 (0) = 0 (see the appendix for the general case). We observed already that the row (3.6) is of the order 1/n2 . Instead, row (3.7) gives a term of the order 1/n2 plus the contribution a ˜n (t) N 00 (0) t sin nt + . 2n n For fixed t, a ˜n (t) is Z t a ˜n (t) = cos n(t − r)bn (r) dr ,
Z bn (r) =
0
r
N (3) (r − s) sin ns ds .
0
Now t
Z
Z cos n(t − r)bn (r) dr =
a ˜n (t) = 0
=
1 2
t
N (3) (s)
0
Z
t
Z
cos n(t − r) sin n(r − s) dr ds s
t
N (3) (s)(t − s) sin n(t − s) ds .
0
Expanding sin n(t − s), we get the sum of several terms. One of them is Z t sin nt t (3) N (s) cos ns . 2 0 So, using Parseval’s equality, 2 2 Z +∞ Z t +∞ X X t sin nt t (3) (3) ≤M N (s) cos ns N (s) cos ns 2 0 0 n=1 n=1 Z T ≤M |N (3) (s)|2 ds . 0
The remaining terms are estimated in a similar way so that +∞ X
|˜ an (t)|2 ≤ M
∀t ∈ [0, π] .
n=1
We introduce eˆn (t) = [en (t) − (N 00 (0)/2n)t sin nt] in (3.5) so that, with certain kernels Mn (t), we get Z t Z t N 00 (0) eˆn (t) = Mn (t − s)ˆ en (s) + − N 0 (t − r)r sin nr 2n 0 0 Z t Z r 1 1 + ˜n (t) + 2 Ψn (t) . cos n(t − r) N 00 (r − s)s sin ns ds dr + a n n 0 0 The functions Mn (t) and Ψn (t) are bounded on [0, π], uniformly with respect to n. Moreover, the integrals in brackets are of the order of 1/n so that (with a suitable constant M ) the following inequality holds for every n and every t ∈ [0, π]: Z t M 1 |ˆ en (t)| ≤ M |ˆ en (s)| ds + 2 + |˜ an (t)| . (4.5) n n 0
Vol. 64 (2009)
Riesz Systems and Heat Equations with Memory
443
Now we proceed as in the proof of the generalized Gronwall inequality in [24, p. 11]. Multiplying both the sides of (4.5) with M e−M t we see that Z 1 d −M t t M + e M |ˆ en (s)| ds ≤ e−M t |˜ a (t)| . n dt n2 n 0 So, with suitable constants H and K we get on [0, π] Z t Z H K t M |ˆ en (s)| ds ≤ 2 + |˜ an (s)| ds . n n 0 0 We replace this estimate in (4.5) and we see that Z t an (t) M +H |ˆ en (t)| ≤ |˜ an (s)| ds . , an (t) = + a ˜n (t) + K n n 0 The sequence {an (t)} inherits properties (4.4) from the corresponding properties of {˜ an (t)}. Remark 4.2. Note that when N (t) ∈ W 4,2 (0, π) then |bn (t)| < M/n and in this case we easily find |ˆ en (t)| < M/n2 . Now we present an additional piece of information from the proof of Bari’s theorem: let n = eαt cos nt (this is a Riesz sequence, its biorthogonal sequence being {e−2αt n }). We know that {zn (t)} is ω-independent and L2 -close to {n }. It is then seen from the proof of Bari’s theorem that ζk = T ∗ ζk + k where T is the operator Tf =−
+∞ X
hf, k iek ,
T ∗g = −
k=1
+∞ X
k hg, ek i .
k=1
Hence, each function ζn (t) has the following representation ζn (t) = e−αt cos nt −
+∞ X k=1
αs
Z
π
ζn (s)ˆ ek (s) ds −
k 0
+∞ X k=1
Z k
π
Φn (s) 0
sin ks ds , (4.6) k
00
Φn (s) = e [α + (N (0)s)/2]ζn (s) . We recall that the biorthogonal sequence of a Riesz basis is a Riesz basis, hence it is bounded. So, also the sequence {Φn (t)} is bounded in L2 (0, π). Finally, we introduce the sequence of the functions 1 0 cos kt αt rk (t) = k (t) = e α − sin kt . (4.7) k k
444
Pandolfi
IEOT
We shall see in the appendix the existence of a number M such that the following inequalities hold, for every f ∈ L2 (0, π) and {γn } ∈ l2 : 2 Z π X Z π ≤M |f (s)|2 ds , f (s)r (s) ds k 0 0 k 2 (4.8) Z π X X 2 |γk | . γk rk (t) dt < M 0 k
k
We compute: Z π Z Φn (s) sin ks ds = − 0
π
−αs e Φn (s) rk (s) ds + α
Z
0
π
Φn (s) 0
cos ks ds k
so that Z
0
π
2 M 2 +2 2 Φn (s) sin ks ds ≤ 2γn,k k
(4.9)
where M does not depend on n and Z π −αs γn,k = e Φn (s) rk (s) ds. 0
Hence, from (4.8), +∞ X k=1
2
π
Z
e2αs |Φn (s)|2 ds < M
|γn,k |
(4.10)
0
(M does not depend on n since {ζn (t)} is bounded in L2 (0, π).) We are now ready to study the regularity of the function v(t). We first prove a result which is of independent interest: Lemma 4.3. We have ζn (t) ∈ W 1,2 (0, π) for every n. Proof. We need to see that the series of the derivatives of the two series in (4.6) converge in L2 (0, π). Using (4.7), the derivative of the first series has the following form Z π +∞ X ζn (s)kˆ ek (s) ds ≤ kζn kL2 (0,π) kak kL2 (0,π) . − (kγn,k )rk (t) , |kγn,k | = k=1
0
Using (4.4), we see that {γn,k } ∈ l2 so that the series converges in L2 (0, π). P+∞ The derivative of the second series has the form − k=1 γn,k rk (t) and now Z π γn,k = Φn (s) sin ks ds , 0
the Fourier coefficients of Φn (s) so that also in this case we have {γn,k } ∈ l2 and the series converges.
Vol. 64 (2009)
Riesz Systems and Heat Equations with Memory
445
We now consider the function v(t), which is a linear combination of the three series +∞ X cn n , (4.11) n n=1 "+∞ Z # +∞ π X sin ks cn X k Φn (s) ds , (4.12) n k 0 n=1 k=1 "+∞ Z # +∞ π X cn X k ζn (s)ˆ ek (s) ds . (4.13) n 0 n=1 k=1
We have to prove that the series of the derivatives converge in L2 (0, π). This is clear for the series (4.11). We consider the series (4.12) and we prove that the series which is obtained with a formal termwise differentiation converges in L2 (0, π). So we consider "+∞ # 2 Z π Z π X R sin ks cn X 0 k (t) ds dt Φn (s) n k 0 0 n=M k=1 "+∞ # 2 Z π X Z π R cn X = rk (t) Φn (s) sin ks ds dt n 0 0 n=M k=1 2 ! Z π X Z π R R +∞ X X 1 |cn |2 ≤ r (t) Φ (s) sin ks ds dt k n n2 0 0 n=M n=M k=1 ! R ! +∞ R R R X X X 1 X X 1 M 2 2 γ + ≤ (const) · |c | ≤ |cn |2 n n,k n2 k2 n2 n=M
n=M
n=M
k=1
n=M
(here we used inequalities (4.8)-(4.10).) This shows L2 (0, π)-convergence of the sequence of the partial sums, as wanted. We now consider the series of the derivatives of (4.13), i.e. the series 2 Z π Z π X +∞ R cn X 0 k (t) ζn (s)ˆ ek (s) ds dt n 0 0 n=M k=1 ! 2 Z π X Z π R +∞ cn X = rk (t) ζn (s)[kˆ ek (s)] ds dt 0 n=M n 0 k=1 ! 2 Z π X R R +∞ X X 1 ≤ |cn |2 γn,k rk (t) dt n2 0 n=M n=M k=1 ! ! +∞ R R X X 1 X |γn,k |2 . (4.14) ≤M |cn |2 n2 n=M
n=M
k=1
446
Pandolfi
IEOT
Here we used (4.8) with Z
π
γn,k =
ζn (s)[kˆ ek (s)] ds . 0
Hence, Z π 2 |ζn (s)|2 ds |kˆ ek (s)| ds 0 Z π 0 Z 2 |ak (s)|2 ds ≤ M ≤ kζn kL2 (0,π)
|γn,k |2 ≤
Z
π
0
π
|ak (s)|2 ds .
0
Property (4.4) shows that +∞ X
|γk,n |2 < M
k=1
and the number M does not depend on n. Going back to (4.14), we see that the partial sums of the series of the derivatives of (4.13) converges in L2 (0, π), as wanted. This concludes the proof that the solution to the control problem is the solution u(t) of (4.2), where v(t) is given by (4.1). In this sense, this paper provides a constructive approach to the computation of the solution u of the control problem (1.1)–(1.3). We have also a minor improvement on the existing controllability results: the sequence {zn }n≥1 being a Riesz sequence in L2 (0, π), the moment problem can be solved for every sequence {cn } ∈ l2 so that, thanks to Lemma 2.1, the controllability time with boundary control is π. This result has been proved in [19] under different assumptions on the kernel N (t). Remark 4.4. Note the role of the factor 1/n in (3.2) and see [22] for further applications of the results in this paper.
5. Appendix In this appendix we remove the assumption N 0 (0) = 0, which was used solely to show in a simple case the ideas in this paper and, for completeness, we outline the proof of the finite signal speed and of the preliminary result Theorem 1.2. Proof of Theorem 1.2 The proof of Theorem 1.2 is as follows: if we can find a vector z0 ∈ H which is orthogonal to the sequence {zn }n≥1 , then the new sequence {zn }n≥0 is ωindependent and quadratically close to the basis {}n≥0 . Theorem 1.1 can be applied and we see that {zn }n≥0 is a Riesz basis; hence, {zn }n≥1 is a Riesz system. So, we have to prove the existence of such orthogonal element z0 . For this, we add any element z˜ as the first element of the sequence {zn }n≥1 and we consider this new sequence.
Vol. 64 (2009)
Riesz Systems and Heat Equations with Memory
447
As in the proof of Theorem 1.1, we consider the operator T defined by " +∞ # +∞ X X αn n = α0 [˜ T z − 0 ] + αn [zk − n ] . n=0
n=1
It is possible to prove that this operator is compact. We then consider the operator T 0 = (I + T ) which has the following property: T 0 k = zk . If T 0 is boundedly invertible, we are done. Otherwise, thanks to the compactness of T , the rank of T 0 is closed and different from H. Hence, there exists an element z0 ∈ [im T 0 ]⊥ . In particular, this element is orthogonal to every zk and we are done. The proof of inequalities (4.8) The sequence {rk (t)} is L2 (0, π)-close to the Riesz sequence {eαt sin kt}. Using [28, Theorem 13], it is possible to prove the existence of a number N such that {rk (t)}k≥N is a Riesz system. This proves the existence of a number M such that 2 X Z π f (s)rk (s) ds ≤ M kf k2L2 (0,π) . k≥N
0
So, the series is convergent and it is easy to estimate also the first term from above, and to get the required inequality. The second inequality is obtained as follows: 2 2 Z π NX Z π NX −1 X −1 γ r (t) + γ r (t) dt ≤ 2 γ r (t) dt k k k k k k 0 k=1 0 k≥N k=1 2 Z π X +2 γk rk (t) dt 0 k≥N −1 X NX X ≤M |γk2 | + |γk |2 , k=1
k≥N
the finite sum being directly estimated. The estimate on the series is obtained from the properties of Riesz systems. The case N 0 (0) 6= 0 The proofs in Section 3.1 (and that of Lemma 4.1) used the artificial assumption N 0 (0) = 0 in order to have short computations and to show clearly the key ideas of this paper. Now, we present the proofs in the general case N 0 (0) 6= 0.
448
Pandolfi
IEOT
It is convenient to introduce the following transformation. We define α = ˜ = e2αt θ(t) (compare with Theorem 3.3 and Lemma 4.1 and −N 0 (0)/2 and θ(t) ˜ solves note the minus sign we use here.) Clearly, θ(t) Z t ˜ + ˜ ds , ˜ (t − s)∆θ(s) ˜ (t) = e2αt N (t) . θ˜0 (t) = 2αθ(t) N N (5.1) 0
˜ (t) = e2αt N (t) satisfies N ˜ (0) = 1, N ˜ 0 (0) = 0. Controllability The new kernel N of the original system and the system so modified being equivalent, we study the controllability of system (5.1). The corresponding moment problem has the same form as in Section 2, i.e. Z T Z T Z T ˜ (T − r − s)u(s) ds dr z˜n (r)v(r) dr = z˜n (r) N 0 0 T −r Z π 1 φn (x) [θ(T, x) − zn (T )θ(0, x)] dx = 0 φn (0) 0 where φn (x) still solves (1.9) while zn (t) now solves Z t z˜n0 (t) = 2α˜ zn (t) − n2 N (t − s)˜ zn (s) ds,
z˜n (0) = 1 .
(5.2)
0
Of course, z˜n (t) = e2αt zn (t) . We must prove estimates similar to those in Section 3.1 when z˜n (t) solves Eq. (5.2) ˜ 0 (0) = 0. In fact we shall prove the following and now, after this transformation, N estimate for z˜n (t): M 0 |˜ zn (t) − eαt cos nt| = ˜ zn (t) − e−N (0)t/2 cos nt ≤ , n which is equivalent to M 0 |zn (t) − e−αt cos nt| = zn (t) − eN (0)t/2 cos nt < n (with a different constant M , which depends on the interval [0, T ] we are considering). This being understood, we work with Eq. (5.2) and for simplicity of notations we drop the ˜. We note that Z t zn00 (t) = 2αzn0 (t) − n2 zn (t) − n2 zn (0) = 1 , zn0 (0) = 2α . N 0 (t − s)zn (s) ds , 0
The zeros of the characteristic polynomial λ2 − 2αλ + n2 are p σ1 = α + iβn , σ2 = α − iβn , βn = n 1 − α2 /n2 . Note that βn is real for large n and that |n − βn | ≤
α2 . n
(5.3)
Vol. 64 (2009)
Riesz Systems and Heat Equations with Memory
449
The solution z(t) of the problem z 00 − 2αz 0 + n2 z = f ,
z(0) = 1 ,
z 0 (0) = 2α
is z(t) = eαt cos βn t +
α αt 1 e sin βn t + βn βn
Z
t
eα(t−s) sin βn (t − s)f (s) ds .
0
We apply this formula and find α αt zn (t) = eαt cos βn t + e sin βn t βn Z Z t−r n2 t αr − e sin βn r N 0 (t − r − s)zn (s) ds dr βn 0 0 α αt = eαt cos βn t + e sin βn t βn Z t−r 2 Z t d n cos βn r eαr N 0 (t − r − s)zn (s) ds dr + 2 βn 0 dr 0 Z t α αt n2 αt = e cos βn t + e sin βn t − 2 N 0 (t − s)zn (s) ds βn βn 0 Z t Z t−r +α eαr cos βn r N 0 (t − r − s)zn (s) ds dr 0 0 Z t Z t−r αr 00 − e cos βn r N (t − r − s)zn (s) ds dr . 0
(5.4)
0
We introduce en (t) = zn (t) − eαt cos βn t and see that Z t n2 α αt e sin βn t − 2 N 0 (t − s)en (s) ds en (t) = βn βn 0 Z t Z t−r +α eαr cos βn r N 0 (t − r − s)en (s) ds dr 0 0 Z t Z t−r − eαr cos βn r N 00 (t − r − s)en (s) ds dr 0 0 Z t 2 n − 2 N 0 (t − s)eαs cos βn s ds βn 0 Z t Z t−r +α eαr cos βn r N 0 (t − r − s)eαs cos βn s ds dr 0 0 Z t Z t−r αr 00 αs − e cos βn r N (t − r − s)e cos βn s ds dr . 0
0
(5.5)
450
Pandolfi
IEOT
We recall that βn n (see (5.3)) and we integrate by parts the integrals in the last brace, as in Section 3.1. We see that |en (t)| ≤
M n
∀t ∈ [0, T ] .
(5.6)
The constant M does depend on T but not on n. Using (5.3), we see that there exists a constant M such that |cos nt − cos βn t| <
M n
t ∈ [0, T ]
(5.7)
so that the sequence {zn (t)} is L2 -close to the sequence {eαt cos nt} as we wanted to prove. We now sketch the proof of Lemma 4.1 in the general case N 0 (0) 6= 0. The first and a second integral in the second brace of (5.5) can be integrated twice by parts so that their contribution is of the order 1/n2 . Instead, partial integration of the third integral gives Z t 1 00 αt N (0)e cos βn r sin βn (t − r) dr βn 0 Z t Z t−r 1 + αeαr cos βn r N 00 (t − r − s)eαs sin βn s ds dr βn 0 0 Z t Z t−r 1 − eαr cos βn r N 000 (t − r − s)eαs sin βn s ds dr . βn 0 0 When inserted in (5.5), the first integral above gives terms of the order 1/n2 and the term N 00 (0) n2 αt e t sin βn t , 2 βn3 which has a difference of the order 1/n2 with N 00 (0) αt e t sin nt . 2n The remaining terms are dominated by an (t) M + 2. n n Using (sin βn t − sin nt) ∼ M/n, we see that the sequence {an (t)} has the properties (4.4). This (and the first addendum in (5.5)) suggests the definition eˆn (t) = e(t) −
eαt 1 [α + N 00 (0)t] sin nt . n 2 αt
Inequality (4.3) is obtained by adding and subtracting − en [α + 12 N 00 (0)t] sin nt to en (s) in (5.5), integrating by parts and using the method in Lemma 4.1.
Vol. 64 (2009)
Riesz Systems and Heat Equations with Memory
451
Finite signal speed The following fact, that we enunciate with reference to system (3.8), has been noted in several papers. We adapt the proof in [6], which considers the case that x is not confined to a bounded set. Using the formula for the solutions given in [20], we see that when ξ = 0, the solution of problem (3.8) is given by the following Volterra equation of the second kind: Z t Z t R+ (t − s)χν(s) ds . (5.8) L(t − s)θ(s) ds , Ψ(t) = θ(t) = Ψ(t) + 0
0
The operator L(t) is defined by L(t)φ = N 0 (0)R+ (t)φ − N 0 (t)φ +
t
Z
R+ (t − s)N 00 (s)φ ds
0
for every φ ∈ L2 (−, π). The operator R+ (t) is given by [R+ (t)φ](·) = w(t, ·) where w(t, x) solves wtt = wxx ,
t > 0,
x ∈ (−, π) ,
with conditions w(t, −) = w(t, π) = 0 ,
w(0, x) = φ(x) ,
wt (0, x) = 0 .
It is known that when the support of φ is in (−, 0) then [R+ (t)φ](x) = w(t, x) = 0 for x ∈ (π − , π) and t < π − . This is the “finite signal speed” property of the wave equation, and we see that it is shared by the solution θ(t) of (3.8), i.e. of (5.8). We proceed as follows: we note that if a function y(t, ·) has support in x ≤ π − Rt for every t ≤ π − , then the same property is retained by its integrals 0 y(s, ·) ds, t ≤ π − . So, Ψ(t, x) = 0 for x ∈ (π − , π) and t < π − because it is obtained as the integral of functions which have this property for every s ≤ t ≤ π − . The Volterra integral equation (5.8) can be solved by successive approximations. If L is the integral operator in (5.8), then θ(t) =
+∞ X
Ln Ψ .
n=0
The result follows since each term in the expression of L(t − s)θ(s) in (5.8) is supported in x ≤ π − for t ≤ π − , a property which is retained by every integral Ln Ψ.
References [1] D.D. Ang, R. Gorenflo, L.V. Khoi and D.D.Trong, Moment theory and some inverse problems in potential theory and heat conduction. Lecture Notes in Mathematics, 1792. Springer-Verlag, Berlin 2002.
452
Pandolfi
IEOT
[2] S.A. Avdonin and S.A. Ivanov, Families of Exponentials. The Method of Moments in Controllability Problems for Distributed Parameter Systems. Cambridge University Press, New York 1995. [3] S.A. Avdonin, S.A. Ivanov and D.L. Russell, Exponential bases in Sobolev spaces in control and observation problems for the wave equation. Proc. Roy. Soc. Edinburgh A-130 (2000) 947–970. [4] S.A. Avdonin, L. Suzanne and V. Protopopescu, Solving the dynamical inverse problem for the Schr¨ odinger equation by the boundary control method. Inverse Problems 18 (2002) 349–361. [5] V. Barbu and M. Iannelli, Controllability of the heat equation with memory. Diff. Integral Eq. 13 (2000) 1393–1412. [6] A. Belleni-Morante, An integro-differential equation arising from the theory of heat conduction in rigid materials with memory. Boll. Unione Mat. Ital. (5) 15-B (1978) 470–482. [7] A.G. Butkovski, The method of moments in optimal control theory with distributed parameter systems. Avtomat. i Telemeh. 24 (1963) 1217–1225. [8] C. Cattaneo, Sulla conduzione del calore. Atti del Seminario Matematico e Fisico dell’Universit` a di Modena 3 (1948) 3–21. [9] G.W. Desch, R. Grimmer, and R. Zeman, Wave propagation for abstract integrodifferential equations. In Infinite-dimensional systems (Retzhof, 1983), 62–70, Lecture Notes in Math., 1076, Springer, Berlin (1984). [10] H.O. Fattorini and D.L. Russell, Uniform bounds on biorthogonal functions for real exponentials with an application to the control theory of parabolic equations. Quart. Appl. Math. 32 (1974/75) 45–69. [11] H.O. Fattorini and D.L. Russell, Exact controllability theorems for linear parabolic equations in one space dimension. Arch. Rational Mech. Anal. 43 (1971) 272–292. [12] I.C. Gohberg and M.G. Krejn, Op`erateurs lin`eairs non auto-adjoints dans un espace hilbertien. Dunod, Paris 1971. [13] B.Z. Guo, Riesz basis approach to the stabilization of a flexible beam with a tip mass. SIAM J. Control Optim. 39 (2001) 1736–1747. [14] M.E. Gurtin and A.G. Pipkin, A general theory of heat conduction with finite wave speed. Arch. Rat. Mech. Anal. 31 (1968) 113–126. [15] S.A. Ivanov and L. Pandolfi, Heat equation with memory: lack of controllability to the rest. J. Math. Anal. Appl. 355 (2009) 1–11, doi:10.1016/j.jmaa.2009.01.008. [16] S. Jaffard, M. Tucsnak and E. Zuazua, Singular internal stabilization of the wave equation. Differential Equations 145 (1998) 184–215. [17] W. Krabs, On moment theory and controllability of one-dimensional vibrating systems and heating processes. Lecture Notes in Control and Information Sciences, 173. Springer-Verlag, Berlin 1992. [18] V. Komornik and P. Loreti, Fourier series in control theory. Springer Monographs in Mathematics. Springer-Verlag, New York 2005. [19] G. Leugering, time optimal boundary controllability of a simple linear viscoelastic liquid. Math. Methods in the Appl. Sci. 9 (1987) 413–430.
Vol. 64 (2009)
Riesz Systems and Heat Equations with Memory
453
[20] L. Pandolfi, The controllability of the Gurtin-Pipkin equation: a cosine operator approach. Applied Mathematics and Optimization 52 (2005) 143–165. [21] L. Pandolfi, Controllability of the Gurtin-Pipkin equation. SISSA, Proceedings of Science, PoS(CSTNA2005)015. [22] L. Pandolfi, Riesz systems and an identification problem for heat equations with memory. in preparation. [23] D.L. Russell, Nonharmonic Fourier series in the control theory of distributed parameter systems. J. Math. Anal. Appl. 18 (1967) 542–560. [24] G. Sansone, R. Conti, Non-linear differential equations, Pergamon Press, Oxford, 1964. [25] G. Talenti, Recovering a function from a finite number of moments. Inverse Problems 3 (1987) 501–517. [26] X. Fu, J. Yong and X. Zhang, Controllability and observability of the heat equation with hyperbolic memory kernel. Submitted [27] J. Yong and X. Zhang, Exact controllability of the heat equation with hyperbolic memory kernel. In Control of Partial Differential Equations, Control theory of partial differential equations, 387–401, Lect. Notes Pure Appl. Math. 242, Chapman & Hall/CRC, Boca Raton, FL 2005. [28] R.M. Young, An Introduction to Nonharmonic Fourier Series. Academic Press, New York 1980. L. Pandolfi Politecnico di Torino Dipartimento di Matematica Corso Duca degli Abruzzi 24 10129 Torino Italy e-mail: [email protected] Submitted: October 20, 2008. Revised: April 1, 2009.
Integr. equ. oper. theory 64 (2009), 455–486 c 2009 Birkh¨
auser Verlag Basel/Switzerland 0378-620X/040455-32, published online August 3, 2009 DOI 10.1007/s00020-009-1702-1
Integral Equations and Operator Theory
Bounds on Variation of Spectral Subspaces under J -Self-adjoint Perturbations Sergio Albeverio, Alexander K. Motovilov and Andrei A. Shkalikov Abstract. Let A be a self-adjoint operator on a Hilbert space H. Assume that the spectrum of A consists of two disjoint components σ0 and σ1 . Let V be a bounded operator on H, off-diagonal and J-self-adjoint with respect to the orthogonal decomposition H = H0 ⊕ H1 where H0 and H1 are the spectral subspaces of A associated with the spectral sets σ0 and σ1 , respectively. We find (optimal) conditions on V guaranteeing that the perturbed operator L = A + V is similar to a self-adjoint operator. Moreover, we prove a number of (sharp) norm bounds on the variation of the spectral subspaces of A under the perturbation V . Some of the results obtained are reformulated in terms of the Krein space theory. As an example, the quantum harmonic oscillator under a PT -symmetric perturbation is discussed. Mathematics Subject Classification (2000). Primary 47A15; Secondary 47A25, 47A62, 47B50. Keywords. Subspace perturbation problem, Krein space, J-symmetric operator, J-self-adjoint operator, P T symmetry, P T -symmetric operator, Riccati equation, Sylvester equation, Davis-Kahan theorems.
1. Introduction Let A be a (possibly unbounded) self-adjoint operator on a Hilbert space H. Assume that V is a bounded operator on H. It is well known that in such a case the spectrum of the perturbed operator L = A+V lies in the closed kV k-neighborhood of the spectrum of A even if V is non-self-adjoint. Thus, if the spectrum of A consists of two disjoint components σ0 and σ1 , that is, if spec(A) = σ0 ∪ σ1 and dist(σ0 , σ1 ) = d > 0,
(1.1)
This work was supported by the Deutsche Forschungsgemeinschaft (DFG), the Heisenberg-Landau Program, and the Russian Foundation for Basic Research.
456
Albeverio, Motovilov and Shkalikov
IEOT
then the perturbation V with a sufficiently small norm does not close the gaps between σ0 and σ1 in C. This allows one to think of the corresponding disjoint spectral components σ00 and σ10 of the perturbed operator L = A + V as a result of the perturbation of the spectral sets σ0 and σ1 , respectively. Assuming (1.1), by EA (σ0 ) and EA (σ1 ) we denote the spectral projections of A associated with the disjoint Borel sets σ0 and σ1 , and by H0 and H1 the respective spectral subspaces, H0 = Ran EA (σ0 ) and H1 = Ran EA (σ1 ). If there is a possibility to associate with the disjoint spectral sets σ00 and σ10 the corresponding spectral subspaces of the perturbed (non-self-adjoint) operator L = A + V , we denote them by H00 and H01 . In particular, if one of the sets σ00 and σ10 is bounded, this can easily be done by using the Riesz projections (see, e.g. [24, Sec. III.4]). In the present note we are mainly concerned with bounded perturbations V that possess the property V ∗ = JV J, (1.2) where J is a self-adjoint involution on H given by J = EA (σ0 ) − EA (σ1 ).
(1.3)
Operators V with the property (1.2) are called J-self-adjoint. A bounded perturbation V is called diagonal with respect to the orthogonal decomposition H = H0 ⊕ H1 if it commutes with the involution J, VJ = JV . If V anticommutes with J, i.e. VJ = −JV , then V is said to be off-diagonal. Clearly, any bounded V can be represented as the sum V = Vdiag + Voff of the diagonal, Vdiag , and off-diagonal, Voff , terms. The spectral subspaces H0 and H1 remain invariant under A + Vdiag while adding a non-zero Voff does break the invariance of H0 and H1 . Thus, the core of the perturbation theory for spectral subspaces is in the study of their variation under off-diagonal perturbations (cf. [25]). This is the reason why we add to the hypothesis (1.2) another basic assumption, namely that all the perturbations V involved are off-diagonal with respect to the decomposition H = H0 ⊕ H1 . We recall that if an off-diagonal perturbation V is self-adjoint in the usual sense, that is, V ∗ = V , then the condition d (1.4) 2 ensuring the existence of gaps between the perturbed spectral sets σ00 and σ10 may be essentially relaxed. Generically, if no assumptions on the mutual position of the initial spectral sets σ0 and σ1 are made except (1.1), the sets σ00 and σ10√ remain disjoint for any off-diagonal self-adjoint V satisfying the bound kV k < 23 d (see [27, Theorem 1 (i)] and [49, Theorem 5.7 (ii)]). If, in addition to (1.1), it is known that one of the sets σ0 and σ1 lies in a finite gap of the other set then this bound may be relaxed further: for the√perturbed sets σ00 and σ10 to be disjoint it only suffices to require that kV k < 2d (see [26, Theorem 3.2 and Remark 3.3]; cf. [27, Theorem 2 (i)] and [49, Theorem 5.7 (iii)]). Finally, if the sets σ0 and σ1 are subordinated, say sup σ0 < inf σ1 , then no requirements on kV k are needed kV k <
Vol. 64 (2009)
Bounds on Variation of Spectral Subspaces
457
at all: the interval (sup σ0 , inf σ1 ) belongs to the resolvent set of the perturbed operator L = A + V for any bounded off-diagonal self-adjoint V (see [2, 17, 33]; cf. [28]) and even for some off-diagonal unbounded symmetric V (see [41, Theorem 1] and [49, Corollary 5.3]). It is easily seen from Example 5.5 below that in the case of J-self-adjoint off-diagonal perturbations the condition (1.4) ensuring the disjointness of the perturbed spectral sets σ00 and σ10 can be relaxed for none of the above dispositions of the initial spectral sets σ0 and σ1 . Assuming that V is a bounded J-self-adjoint off-diagonal perturbation of the (possibly unbounded) self-adjoint operator A we address the following questions: (i) Does the spectrum of the perturbed operator L = A + V remain real under conditions (1.1) and (1.4)? (ii) If yes, is it then true that L is similar to a self-adjoint operator? (iii) What are the (sharp) bounds on variation of the spectral subspaces associated with the spectral sets σ0 and σ1 as well as on the variation of these sets themselves? In our answers to the above questions we distinguish two cases: (G) the generic case where no assumptions on the mutual positions of the spectral sets σ0 and σ1 are made except for the disjointness assumption (1.1); (S) the particular case where the sets σ0 and σ1 are either subordinated, e.g. sup σ0 < inf σ1 , or one of these sets lies in a finite gap of the other set, say σ0 lies in a finite gap of σ1 . We have to underline that this distinction is quite different from the one that arises when the perturbations V are self-adjoint in the usual sense: the case (S) now combines the two spectral dispositions that should be treated separately if V were self-adjoint (see [7, 17, 27, 41]). Our answers to the questions (i) and (ii) are complete and positive in the case (S). In this case the spectrum of the perturbed operator L = A+V does remain real for any off-diagonal J-self-adjoint V satisfying the bound kV k ≤ d/2. Moreover, the operator L turns out to be similar to a self-adjoint operator whenever the strict inequality (1.4) holds. These results combined in Theorem 5.8 (ii) below (see also Remark 5.13) represent an extension of similar results previously known due to [1] and [37] for the spectral dispositions with subordinated σ0 and σ1 . By using the results of [32, 50], we give a positive answer to the question (i) also in the generic case (G) provided that the unperturbed operator A is bounded (see Theorem 5.12). For A unbounded, we prove that in case (G) the spectrum of L = A + V for sure is purely real if V satisfies a stronger bound kV k ≤ d/π. The strict bound kV k < d/π guarantees that, in addition, L is similar to a self-adjoint operator see Theorem 5.8 (i) . The question whether this is true for d/π ≤ kV k < d/2 remains an open problem. We answer the question (iii) by using the concept of the operator angle between two subspaces (for discussion of this notion and references see, e.g., [25]). Recall that if M and N are subspaces of a Hilbert space, the operator angle Θ(M, N) between M and N measured relative to the subspace M is introduced by
458
Albeverio, Motovilov and Shkalikov
IEOT
the following formula [26]: Θ(M, N) = arcsin
q
IM − PM PN M ,
(1.5)
where IM denotes the identity operator on M and PM and PN stand for the orthogonal projections onto M and N, respectively. Set 2d/π, case (G), δ= (1.6) d, case (S), and assume that kV k < δ/2. Since in both the cases (G) and (S) under this assumption we have got the positive answer to the question (ii), one can easily identify the spectral subspaces H00 and H01 of L associated with the corresponding perturbed spectral sets σ00 and σ10 (cf. Lemma 5.6). Let Θj = Θ(Hj , H0j ), j = 0, 1, be the operator angle between the unperturbed spectral subspace Hj and the perturbed one, H0j . Our main result (presented in Theorem 5.8) regarding the operator angles Θ0 and Θ1 is that under condition kV k < δ/2 the following bound holds: 2kV k 1 arctanh , j = 0, 1, (1.7) tan Θj ≤ tanh 2 δ which means, in particular, that Θj < π4 , j = 0, 1. Theorem 5.8 also gives the bounds on location of the perturbed spectral sets σ00 and σ10 see formulas (5.20) . In the case (S) the bounds on σ00 and σ10 as well as the bounds (1.7) are optimal (see Remark 5.10). Inequalities (1.7) resemble the sharp norm estimate for the operator angle between perturbed and unperturbed spectral subspaces from the celebrated Davis-Kahan tan 2Θ Theorem (see [17], p. 11; cf. [28, Theorem 2.4] and [41, Theorem 1]). Recall that the latter theorem serves for the case where the unperturbed spectral subsets σ0 and σ1 are subordinated and the off-diagonal perturbation V is self-adjoint. The difference is that the usual tangent of the Davis-Kahan tan 2Θ Theorem is replaced on the right-hand side of (1.7) by the hyperbolic one. Another distinction is that the bound (1.7) holds not only for the subordinated spectral sets σ0 and σ1 but also for the disposition where one of these sets lies in a finite gap of the other set and thus σ0 and σ1 are not subordinated. The results obtained are of particular interest for the theory of operators on Krein spaces [9]. The reason for this is that introducing an indefinite inner product [x, y] = (Jx, y), x, y ∈ H, instead of the initial inner product (·, ·), turns H into a Krein space. The operators V and L = A + V being J-self-adjoint on H appear to be self-adjoint operators on the newly introduced Krein space K. Under the condition kV k < δ/2 in both cases (G) and (S) we establish that the perturbed spectral subspaces H00 and H01 are mutually orthogonal with respect to the inner product [·, ·]. Moreover, these subspaces are maximal uniformly positive and maximal uniformly negative, respectively (see Remark 5.11). The restrictions of L onto H00 and H01 are K-unitary equivalent to self-adjoint operators on H0 and H1 , respectively. This extends similar results previously known from [1] and [37] for the case where the spectral sets σ0 and σ1 are subordinated.
Vol. 64 (2009)
Bounds on Variation of Spectral Subspaces
459
Another motivation for the present paper is in the spectral analysis of nonself-adjoint Schr¨ odinger operators that involve the so-called PT -symmetric potentials. Starting from the pioneering works [11, 12], these potentials attracted considerable attention because of their property to produce, in some cases, purely real spectra (see, e.g., [3, 4, 10, 29, 39, 53]). Some PT -symmetric potentials appear to be J-self-adjoint with respect to the space parity operator P (see, e.g., [32, 39]), allowing for an embedding the problem into the context of the spectral theory for J-self-adjoint perturbations (this also means that the PT -symmetric perturbations may be studied within the framework of the Krein space theory [4, 32, 48]). The main tool we use in our analysis is a reduction of the problems (i)–(iii) to the study of the operator Riccati equation KA0 + A1 K + KBK = −B ∗ associated with the representation of the perturbed operator L = A + V in the 2 × 2 block matrix form A0 B L= , −B ∗ A1 where A0 = A H0 , A1 = A H1 , and B = V H1 . Assuming (1.6), we prove that the Riccati equation has a bounded (in fact, uniformly contractive) solution K for any B such that kBk < δ/2. The key statement is that the perturbed spectral subspaces H00 and H01 are the graphs of the operators K and K ∗ , respectively, which then allows us to derive the bounds (1.7). The plan of the paper is as follows. In Section 2 we give necessary definitions and present some basic results on the operator Riccati equations associated with a class of unbounded non-self-adjoint 2 × 2 block operator matrices. Section 3 is devoted to the related Sylvester equations. In Section 4 we prove a number of existence and uniqueness results for the operator Riccati equations. In Section 5 we consider J-self-adjoint perturbations and find conditions on their norm guaranteeing the reality of the resulting spectrum. In this section we also prove the bound (1.7) on the variation of the spectral subspaces and discuss the embedding of the problem into the context of the Krein space theory. Finally, in Section 6 we apply some of the results obtained to a quantum-mechanical Hamiltonian describing the harmonic oscillator under a PT -symmetric perturbation. We conclude the introduction with the description of some more notations that are used throughout the paper. By a subspace we always understand a closed linear subset of a Hilbert space. The identity operator on a subspace (or on the whole Hilbert space) M is denoted by IM . If no confusion arises, the index M may be omitted in this notation. The Banach space of bounded linear operators from a Hilbert space M to a Hilbert space N is denoted by B(M, N). For B(M, M) we use a shortened notation B(M). By M ⊕ N we will understand the orthogonal sum of two Hilbert spaces (or orthogonal subspaces) M and N. By Or (M, N), 0 ≤ r < ∞, we denote the closed ball in B(M, N), having radius r and being centered at zero,
460
Albeverio, Motovilov and Shkalikov
IEOT
that is, Or (M, N) = {K ∈ B(M, N) kKk ≤ r}. If it so happens that r = +∞, by O∞ (M, N) we will understand the whole space B(M, N). The notation conv(σ) is used for the convex hull of a Borel set σ ⊂ R. By Or (Ω), r ≥ 0, we denote the closed r-neighborhood of a Borel set Ω in the complex plane C, i.e. Or (Ω) = {z ∈ C dist(z, Ω) ≤ r}.
2. Operator Riccati equation We start by recalling the concepts of weak, strong, and operator solutions to the operator Riccati equation (see [5, 6]). Definition 2.1. Assume that A0 and A1 are possibly unbounded densely defined closed operators on the Hilbert spaces H0 and H1 , respectively. Let B and C be bounded operators from H1 to H0 and from H0 to H1 , respectively. A bounded operator K ∈ B(H0 , H1 ) is said to be a weak solution of the Riccati equation KA0 − A1 K + KBK = C (2.1) if (KA0 x, y) − (Kx, A∗1 y) + (KBKx, y) = (Cx, y) for all x ∈ Dom(A0 ) and y ∈ Dom(A∗1 ). A bounded operator K ∈ B(H0 , H1 ) is called a strong solution of the Riccati equation (2.1) if (2.2) Ran K|Dom(A0 ) ⊂ Dom(A1 ) and KA0 x − A1 Kx + KBKx = Cx for all x ∈ Dom(A0 ).
(2.3)
Finally, K ∈ B(H0 , H1 ) is said to be an operator solution of the Riccati equation (2.1) if Ran(K) ⊂ Dom(A1 ), (2.4) the operator KA0 is bounded on Dom(KA0 ) = Dom(A0 ), and the equality KA0 − A1 K + KBK = C
(2.5)
holds as an operator equality, where KA0 denotes the closure of KA0 . Remark 2.2. We will call the equation XA∗1 − A∗0 X − XB ∗ X = −C ∗
(2.6)
the adjoint of the operator Riccati equation (2.1). It immediately follows from the definition that an operator K ∈ B(H0 , H1 ) is a weak solution to the Riccati equation (2.1) if and only if the adjoint of K, X = K ∗ , is a weak solution to the adjoint equation (2.6).
Vol. 64 (2009)
Bounds on Variation of Spectral Subspaces
461
Clearly, any operator solution K ∈ B(H0 , H1 ) to the Riccati equation (2.1) is automatically a strong solution. Similarly, any strong solution is also a weak solution. But, in fact, by a result of [6] one does not need to distinguish between weak and strong solutions to the Riccati equation (2.1). This is seen from the following statement. Lemma 2.3 ([6], Lemma 5.2). Let A0 and A1 be densely defined possibly unbounded closed operators on the Hilbert spaces H0 and H1 , respectively, and B ∈ B(H1 , H0 ), C ∈ B(H0 , H1 ). If K ∈ B(H0 , H1 ) is a weak solution of the Riccati equation (2.1) then K is also a strong solution of (2.1). If the operators A0 , A1 , B, and C are as in Definition 2.1, then a 2 × 2 operator block matrix A0 B L= , Dom(L) = Dom(A0 ) ⊕ Dom(A1 ), (2.7) C A1 is a densely defined and possibly unbounded closed operator on the Hilbert space H = H0 ⊕ H1 .
(2.8)
The operator L will often be viewed as the result of the perturbation of the block diagonal matrix A = diag(A0 , A1 ),
Dom(A) = Dom(A0 ) ⊕ Dom(A1 ),
by the off-diagonal bounded perturbation 0 B V = . C 0
(2.9)
(2.10)
The operator Riccati equation (2.1) and the block operator matrix L are usually said to be associated to each other. Surely, one can also associate with the matrix L another operator Riccati equation, K 0 A1 − A0 K 0 + K 0 CK 0 = B,
(2.11)
0
assuming that a solution K (if it exists) should be a bounded operator from H1 to H0 . It is well known that the solutions to the Riccati equations (2.1) and (2.11) determine invariant subspaces for the operator matrix L (see, e.g., [5] for the case where the matrix L is self-adjoint or [31] for the case of a non-self-adjoint L). These subspaces have the form of the graphs G(K) = {x ∈ H0 ⊕ H1 | x = x0 ⊕ Kx0 for some x0 ∈ H0 }
(2.12)
and G(K 0 ) = {x ∈ H0 ⊕ H1 | x = K 0 x1 ⊕ x1 for some x1 ∈ H1 } (2.13) 0 of the corresponding (bounded) solutions K and K . Notice that the subspaces of the form (2.12) and (2.13) are usually called the graph subspaces associated with the operators K and K 0 , respectively, while K and K 0 themselves are called the angular operators. Usage of the latter term is explained, in particular, by the fact
462
Albeverio, Motovilov and Shkalikov
IEOT
that if a subspace G ⊂ H is a graph G = G(K) of a bounded linear operator K from a subspace M to its orthogonal complement M⊥ , M⊥ = H M, then the following equality holds (see [25]; cf. [17] and [21]): |K| = tan Θ(M, G), (2.14) √ where |K| is the absolute value of K, |K| = K ∗ K, and Θ(M, G) the operator angle (1.5) between the subspaces M and G. The precise statement relating solutions of the Riccati equations (2.1) and (2.11) to invariant subspaces of the operator matrix (2.7) is as follows. Lemma 2.4. Let the entries A0 , A1 , B, and C be as in Definition 2.1 and let a 2 × 2 block operator matrix L be given by (2.7). Then the graph G(K) of a bounded operator K from H0 to H1 satisfying (2.2) is an invariant subspace for the operator matrix L if and only if K is a strong solution to the operator Riccati equation (2.1). Similarly, the graph G(K 0 ) of an operator K 0 ∈ B(H1 , H0 ) such 0 that Ran K |Dom(A1 ) ⊂ Dom(A0 ) is an invariant subspace for L if and only if this operator is a strong solution to the Riccati equation (2.11). The proof of this lemma is straightforward and follows the same line as the proof of the corresponding part in [5, Lemma 5.3]. Thus, we omit it. The next assertion contains two useful identities involving the strong solutions to the Riccati equations (2.1) and (2.11). Lemma 2.5. Let the entries A0 , A1 , B, and C be as in Definition 2.1. Assume that operators K ∈ B(H0 , H1 ) and K 0 ∈ B(H1 , H0 ) are strong solutions to equations (2.1) and (2.11), respectively. Then (2.15) Ran K 0 K|Dom(A0 ) ⊂ Dom(A0 ), Ran KK 0 |Dom(A1 ) ⊂ Dom(A1 ), and (I − K 0 K)(A0 + BK)x = (A0 − K 0 C)(I − K 0 K)x for all x ∈ Dom(A0 ), (I − KK 0 )(A1 + CK 0 )y = (A1 − KB)(I − KK 0 )y for all y ∈ Dom(A1 ).
(2.16) (2.17)
Proof. The inclusions (2.15) follow immediately from the definition of a strong solution to the operator Riccati equation (see condition (2.2)). Let x ∈ Dom(A0 ). Taking into account the first of the inclusions(2.15) as well as the inclusions Ran K|Dom(A0 ) ⊂ Dom(A1 ) and Ran K 0 |Dom(A1 ) ⊂ Dom(A0 ) one can write (A0 − K 0 C)(I − K 0 K)x = (A0 − K 0 C)x − (A0 K 0 − K 0 CK 0 )Kx = (A0 − K 0 C)x − (K 0 A1 − B)Kx,
(2.18)
by making use of the Riccati equation (2.11) itself at the second step. Similarly, (I − K 0 K)(A0 + BK)x = (A0 + BK)x − K 0 (KA0 + KBK)x = (A0 + BK)x − K 0 (C + A1 K)x,
(2.19)
Vol. 64 (2009)
Bounds on Variation of Spectral Subspaces
463
due to the Riccat