• No results found

Affine Markov processes on a general state space - Appendix A: Cauchy's functional equation

N/A
N/A
Protected

Academic year: 2021

Share "Affine Markov processes on a general state space - Appendix A: Cauchy's functional equation"

Copied!
4
0
0

Bezig met laden.... (Bekijk nu de volledige tekst)

Hele tekst

(1)

UvA-DARE is a service provided by the library of the University of Amsterdam (https://dare.uva.nl)

UvA-DARE (Digital Academic Repository)

Affine Markov processes on a general state space

Veerman, E.

Publication date

2011

Link to publication

Citation for published version (APA):

Veerman, E. (2011). Affine Markov processes on a general state space. Uitgeverij BOXPress.

General rights

It is not permitted to download or to forward/distribute the text or part of it without the consent of the author(s) and/or copyright holder(s), other than for strictly personal, individual use, unless the work is under an open content license (like Creative Commons).

Disclaimer/Complaints regulations

If you believe that digital publication of certain material infringes any of your rights or (privacy) interests, please let the Library know, stating your reasons. In case of a legitimate complaint, the Library will make the material inaccessible and/or remove it from the website. Please Ask the Library: https://uba.uva.nl/en/contact, or a letter to: Library of the University of Amsterdam, Secretariat, Singel 425, 1012 WP Amsterdam, The Netherlands. You will be contacted as soon as possible.

(2)

Appendix

A

Cauchy’s functional equation

We adapt well-known results for Cauchy’s functional equation (see e.g. [1]), which we apply in Chapter 4 to extend exponential affine expressions beyond their initial domains.

Lemma A.1. Suppose f : [0, 1] → R is a bounded function that satisfies Cauchy’s functional equation f (t + s) = f (t) + f (s) for t, s ∈ [0, 1] with t + s ∈ [0, 1]. Then f is linear, i.e. f (t) = f (1)t for all t ∈ [0, 1].

Proof. Define g(t) = f (t) − f (1)t. Then g(t) also satisfies Cauchy’s functional equation and g(1) = 0. We have to show that g(t) = 0 for all t ∈ [0, 1]. For n, m ∈ N with m ≤ n we deduce from Cauchy’s functional equation that

ng(1/n) = g(n · 1/n) = g(1) = 0

and

g(m/n) = g(m · 1/n) = mg(1/n) = 0.

Hence g(t) = 0 for all t ∈ Q ∩ [0, 1]. Since f is bounded, g is also bounded. Let M = supt∈[0,1]|g(t)| and suppose M > 0. Then there exists t0 ∈ [0, 1] such that

|g(t0)| > M/2. Let q ∈ Q ∩ [0, 1/2] be such that t0− q ∈ [0, 1/2]. Since g(q) = 0,

it follows that

g(2(t0− q)) = 2g(t0− q) = 2(g(t0− q) + g(q)) = 2g(t0).

Hence |g(2(t0− q))| > M , which contradicts the definition of M .

(3)

154 A. Cauchy’s functional equation

Lemma A.2. Let E be closed convex with 0 ∈ E◦ and let g : E → C be either a continuous function or a real valued, non-negative function that is bounded in a neighborhood of 0. If g satisfies Cauchy’s functional equation

g(x + y) = g(x)g(y), for all x, y ∈ E with x + y ∈ E, (A.1)

then either g = 0 or g(x) = exp(u>x) for some u ∈ Cp.

Proof. Suppose g(x0) = 0 for some x0 ∈ E. We first show that g(0) = 0. Since

0 ∈ E◦ and E is convex, it holds that tx0 ∈ E for all t ∈ [0, 1]. We have 0 =

g(x0)2k = g(x0/2k) for all k ∈ N. There exists k ∈ N such that −x0/2k ∈ E.

This gives g(0) = g(−x0/2k)g(x0/2k) = 0. Let ε > 0 be such that B(0, ε) ⊂ E.

We show that g(x) = 0 for all x ∈ B(0, ε/2). Let x0 ∈ B(0, ε/2). Then we have

g(x0)g(−x0) = g(0) = 0, so either g(x0) = 0 or g(−x0) = 0. Suppose g(−x0) = 0.

Since 2x0∈ E, it follows that

g(x0) = g(−x0+ 2x0) = g(−x0)g(2x0) = 0.

Hence g(x) = 0 for all x ∈ B(0, ε/2). For arbitrary x ∈ E we have g(x) = g(tx)g((1 − t)x) for all t ∈ [0, 1]. Since tx ∈ B(0, ε/2) for small t, it follows that g(x) = 0.

Now suppose g(x) 6= 0 for all x ∈ E. By assumption, there exists ε > 0 such that for t ∈ [−ε, ε] we have tei ∈ E and t 7→ g(tei) is bounded, for all i ≤ p. Fix

i ≤ p and define f : [0, 1] → C by

f (t) = g(εtei). (A.2)

Since g(x) 6= 0 for all x ∈ E, we can write

f (t) = φ(t)eψ(t)i, (A.3)

for some strictly positive, bounded function φ and real valued function ψ that satisfy

φ(t + s) = φ(t)φ(s)

ψ(t + s) = ψ(t) + ψ(s) + 2kπ,

for t, s ∈ [0, 1] such that t + s ∈ [0, 1], with k some integer, possibly depending on t and s. The assumptions allow us to choose k constant. Indeed, if g is real-valued and non-negative, then we can chose ψ and k equal to 0. If g is continuous, then we can chose ψ continuous by taking the distinguished logarithm (see [7,

(4)

155

Theorem 7.6.2]), so that necessarily k is constant. Since φ is bounded and strictly positive, it is also bounded away from 0, as

φ(t) = φ(1)/φ(1 − t).

Applying Lemma A.1 to log φ and to ψ −2kπ yields φ(t) = eatand ψ(t) = bt+2kπ, for some a, b ∈ R. Substituting these in (A.3) and (A.2) we derive the existence of ci ∈ C for i ≤ p such that

g(tei) = ecit,

for t ∈ [0, ε]. For t ∈ [−ε, 0] we also obtain

g(tei) = g(0)/g(−tei) = ecit.

Now it follows that for all x ∈ E we have g(x) = ec>x. Indeed, take x ∈ E and let n ∈ N be such that |xi/n| ≤ ε. Then it holds that

g(x) = g(nx/n) = g(x/n)n= g( p X i=1 xiei/n)n= p Y i=1 g(xi/n)n= p Y i=1 (ecixi/n)n = ec>x.

Referenties

GERELATEERDE DOCUMENTEN

Topographic maps for LI (left) and HI (right), at Pz, for No-Go trials in the Go/No-Go task. Visual representation of one trial in the SSRT. a blue circle) on Go trials (75%

Stopping the “World’s Greatest Threat”: Canadian Policy and Rhetoric towards the Iranian Nuclear Program during Stephen Harper’s Conservative Government, 2006-2015.. by

I think joy, and like, you know, just taking care of yourself and the people around you is really important to this work because we’re in it for the long haul. we have to take care

German’s report, the Corporate Registration program plays a key role in GPEB’s regulatory framework, and is a principal mechanism through which GPEB maintains control over

Britton (1997) concluded that race and gender are contributing factors in stress and further identified the need for future researchers to explore how these intersections

These structural investigations into the mechanism for germ-line antibody recognition of carbohydrate antigens utilizing chlamydial-specific and anti-lipid A antibodies

Our structural analysis revealed that while the N- terminal region of TbFam50.360 adopted a three-helical structure similar to previously characterized trypanosome surface

I showed that data on the structural differences between the native and aggregated forms of the prion protein, obtained from multiple structural proteomics approaches