Next Article in Journal
A Hierarchy of Covariant Generalized Schwarz Maps in M2(ℂ)
Previous Article in Journal
Golden Meta-Spring Inspired by Bone Fractal Operators
Previous Article in Special Issue
On Solutions of Some Functional Equations of Radical Type
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Some Comments on the Superstability of a General Functional Equation

Faculty of Applied Mathematics, AGH University of Kraków, Mickiewicza 30, 30-059 Krakow, Poland
Symmetry 2024, 16(12), 1654; https://doi.org/10.3390/sym16121654
Submission received: 12 November 2024 / Revised: 3 December 2024 / Accepted: 10 December 2024 / Published: 14 December 2024

Abstract

:
In this paper, we prove a superstability theorem for a general functional equation j = 1 a j f ( γ j ( t , s ) ) = h ( t ) g ( s ) , with the unknown functions g : T X , h : S K and f : S X , such that the series j = 1 f ( γ j ( t , s ) ) is convergent for every ( s , t ) S × T , where S and T are nonempty sets, and X is a Banach space over a field K , which is either the set of real numbers R or the set of complex numbers C . Namely, we show that if h is unbounded, and the difference j = 1 a j f ( γ j ( t , s ) ) h ( t ) g ( s ) is bounded, then h and g satisfy the equation j = 1 a j g ( γ j ( t , s ) ) = h ( t ) g ( s ) . Next, we show that the superstability of pexiderizations and radical versions of several well-known functional equations (e.g., of Cauchy, d’Alembert, Wilson, Reynolds, and homogeneity) is a consequence of this simple outcome. In this way, we generalize several classical superstability results and, in particular, the first superstability outcome of J. Baker, J. Lawrence, and F. Zorzitto, which states that every unbounded mapping f, from a real vector space X into the set of real numbers R , satisfying the inequality | f ( x + y ) f ( x ) f ( y ) | δ for every x , y X , with some real δ > 0 , is an exponential function, i.e., satisfies the equality f ( x + y ) = f ( x ) f ( y ) for all x , y X . In order to make this publication more accessible to a wider range of readers, we limit various related information, avoid very abstract generalizations, and provide some simple examples.

1. Introduction

The well-known problem of Ulam stability concerns the size of the difference between the solutions and approximate solutions to various equations (e.g., difference, differential, functional, integral, etc.). This question was asked by S. M. Ulam in 1940, for the first time, with regard to homomorphisms and approximate homomorphisms of some groups. The first answer was given by D. H. Hyers [1] in Banach spaces. Further results in this area were soon published in [2,3,4] on approximate isometries and then in papers [5,6,7]. A generalization of Hyers’ result [1] was published in 1950 in [8] and rediscovered much later in [9] in a somewhat modified form.
Afterward, this problem attracted the attention of numerous researchers, and for relevant information on this topic and other references, we refer to monographs [10,11,12]. More up-to-date results can be found in [13,14] (also for difference, differential, and integral equations).
Clearly, this idea of stability has much to do with the issues studied in some other fields of mathematics, including theories of optimization, approximation, perturbation, and shadowing (see [15,16]). The following theorem (see, e.g., refs. [10,12] or [14] (Theorem 36)) can be considered to be one of the main outcomes in Ulam stability theory:
Theorem 1.
Let V and U be normed spaces, V 0 : = V { 0 } , and η 0 and μ 1 be real numbers. Assume that ξ : V U satisfies the following inequality:
ξ ( a 1 + a 2 ) ξ ( a 1 ) ξ ( a 2 )     η ( a 1 μ + a 2 μ ) , a 1 , a 2 V 0 .
Then, the following two statements are valid.
(i) 
If μ < 0 , then ξ is additive, i.e.,
ξ ( a 1 + a 2 ) = ξ ( a 1 ) + ξ ( a 2 ) , a 1 , a 2 V .
(ii) 
If U is complete, and μ 0 , then there is a unique additive mapping A : V U , such that
ξ ( a ) A ( a ) η a μ | 1 2 μ 1 | , a V 0 .
The case μ = 0 of this theorem was proved in [1]. For this reason, results concerning inequalities modeled on (1), with a constant on the right-hand side of the inequality, are usually called the Ulam–Hyers (or Hyers–Ulam) stability. The case μ 0 was first considered by T. Aoki [8], who proved the result contained in Theorem 1 for μ [ 0 , 1 ) . His result was later rediscovered by Th. M. Rassias [9], in a somewhat different form. The paper of Rassias [9] became so influential that results of this type, concerning inequalities modeled on (1), with certain functions on the right-hand side of the inequality, came to be quite often referred to as Ulam–Hyers–Rassias stability (see, e.g., [10,11,12]). Sometimes, the names of Aoki, Bourgain, Gavruţa, and Forti were also added there (see [10,11,12] for some results of those authors and the relevant references). A somewhat different terminology was used, e.g., in [14,17,18].
Recently, results much finer than those in Theorem 1 have been obtained in [19], but only for mappings taking real values.
During research in this area, a special phenomenon was discovered, which is now called superstability. The first such result was found by J. Baker, J. Lawrence, and F. Zorzitto [17] (see also [20,21,22]) while studying the Ulam stability of the exponential equation
f ( x + y ) = f ( x ) f ( y ) .
Namely, they proved that if f is a function mapping a real vector space X into the set of real numbers R , and
| f ( x + y ) f ( x ) f ( y ) | δ , x , y X ,
with some real δ > 0 , then f is bounded or must be an exponential function (i.e., f ( x + y ) = f ( x ) f ( y ) for all x , y X ). It is exactly this property that has usually been named superstability.
Afterward, numerous other similar results were obtained for various equations. Some of them concern the so-called pexiderizations of several well-known equations. In the case of the Cauchy exponential Equation (2) such pexiderization means the following equation:
f ( x + y ) = h ( x ) g ( y ) .
For example, such results have already been obtained in [18,23,24] for the following well-known functional equations:
ψ ( s + t ) + ψ ( s t ) = 2 ψ ( t ) ψ ( s ) ,
ψ ( s + t ) + ψ ( s t ) = h ( t ) ψ ( s ) ,
ψ s + t 2 2 ψ s t 2 2 = ψ ( t ) ψ ( s ) ,
ψ s + t 2 2 ψ s t 2 2 = h ( t ) ψ ( s ) .
More involved and general outcomes in this area have been proved in [22,25]. For more abstract versions of them, we refer to [20,26,27,28]. More recent related results have been published in [28,29,30]. Various similar outcomes for several other equations can be found in [31] (for the Dhombres equation), refs. [32,33] (for the Gołąb-Schinzel equation), ref. [34] (for some systems of functional equations for generalized hyperbolic functions and generalized cosine function), refs. [35,36,37] (for the homogeneity equation), ref. [38] (for a Cauchy type equation), ref. [39] (for the d’Alembert type functional equation), and [37,40] (for other equations). Let us add that, in many of those results, the constants on the right-hand side of the considered inequalities have been replaced by functions of one variable.
Equations (3) and (5) are generally called the d’Alembert (or cosine) and Wilson (or sine) equations, respectively. Equation (6) is sometimes called the first generalization of the Wilson equation (see, e.g., [41]); Equation (4) was introduced by Wilson [42]. For more information related to those equations, we refer, e.g., to [41,43,44].
The Wilson (or sine) Equation (5) is sometimes better known in the following form:
ψ ( x + y ) ψ ( x y ) = ψ ( x ) 2 ψ ( y ) 2 ,
which is (5) with x = 1 2 ( s + t ) and y = 1 2 ( s t ) . Equation (7) is patterned on the following trigonometric identity:
sin ( x + y ) sin ( x y ) = sin 2 x sin 2 y .
Let us also mention that in [45] the authors initiated a study of the superstability of several particular cases of the following (so-called radical) functional equations:
ψ 1 s n + t n n + ψ 1 s n t n n = ψ 2 ( t ) ψ 3 ( s ) ,
ψ 1 s n + t n n ψ 1 s n t n n = ψ 2 ( t ) ψ 3 ( s ) ,
ϕ s n + t n 2 n 2 ϕ s n t n 2 n 2 = ψ 2 ( t ) ψ 3 ( s ) ,
for real or complex functions of real variable. More recent related results can be found in [46,47]. Note that actually (10) is (9), with
ψ 1 ( u ) ϕ 1 2 n u 2 .
Throughout this paper, N stands, as usual, for the set of positive integers, and N 0 : = N { 0 } . Next, K is either the field of real numbers R or the field of complex numbers C , X is a Banach space over K , S and T are nonempty sets, and R + : = [ 0 , ) .
Let a j K and γ j : S × T S for j N . Motivated by several quite recent results on the superstability of functional equations in, e.g., [45,46,47], we investigate the superstability of the following very general functional equation:
j = 1 a j f ( γ j ( t , s ) ) = h ( t ) g ( s ) ,
with the unknown functions g : T X , h : S K and f : S X , under the assumption that the series j = 1 f ( γ j ( t , s ) ) is convergent for every ( s , t ) S × T . In this way, we generalize one of the main outcomes in [48] (Theorem 1), which has been proved for (11) with f = g .
Note that all the above-mentioned equations are special cases of (11). For further examples of particular forms of (11), we refer to the next section.

2. Auxiliary Information

In this paper (in the next section), we prove a generalization of the result given below, obtained in [48] (Theorem 1) for the functional equation
j = 1 a j f ( γ j ( t , s ) ) = h ( t ) f ( s ) ,
considered for unknown functions h : T K and f F , where
F : = { f : S X : j = 1 a j f ( γ j ( t , s ) )   is   uniformly   convergent   in   T × S } .
Theorem 2.
Suppose that h : T K , f F , N N , ε l : S R for l N 0 , δ > 0 ,
j , k = 1 N + l a j a k [ f ( γ j ( t 2 , γ k ( t 1 , s ) ) ) f ( γ k ( t 1 , γ j ( t 2 , s ) ) ) ] ε l ( s ) , t 1 , t 2 T , s S , l N 0 ,
and
j = 1 a j f ( γ j ( t , s ) ) h ( t ) f ( s ) δ , t T , s S .
Then, one of the following two conditions holds.
(i) 
h is bounded.
(ii) 
h and f satisfy the equation
j = 1 a j f ( γ j ( t , s ) ) = h ( t ) f ( s ) ,
and there is M N , such that
a M + j f ( γ M + j ( t , s ) ) = 0 , s S , t T , j N .
Below, we provide various examples of functions γ j satisfying a stronger version of (13) (cf. [48], Example 1), i.e., the condition
γ j ( t 2 , γ k ( t 1 , s ) ) = γ k ( t 1 , γ j ( t 2 , s ) ) , t 1 , t 2 T ,   s S ,   j , k N ,
which obviously implies
j , k = 1 N + l a j a k [ f ( γ j ( t 2 , γ k ( t 1 , s ) ) ) f ( γ k ( t 1 , γ j ( t 2 , s ) ) ) ] = 0 , t 1 , t 2 T ,   s S ,   l N 0 ,
for every function f : S X and N = 1 .
Example 1.
Assume that ( U , + ) is an abelian semigroup, η : S U is a surjection, and ρ : U S is a selection of η (i.e., η ( ρ ( x ) ) = x for x U ). Fix ξ j : T U for j N , and let
γ j ( t , s ) = ρ ( ξ j ( t ) + η ( s ) ) , j N ,   t T ,   s S .
Then,
γ j ( t 2 , γ k ( t 1 , s ) ) = ρ ( ξ j ( t 2 ) + η ( γ k ( t 1 , s ) ) ) = ρ ( ξ j ( t 2 ) + η ( ρ ( ξ k ( t 1 ) + η ( s ) ) ) = ρ ( ξ j ( t 2 ) + ξ k ( t 1 ) + η ( s ) ) = ρ ( ξ k ( t 1 ) + ξ j ( t 2 ) + η ( s ) ) = γ k ( t 1 , γ j ( t 2 , s ) ) , t 1 , t 2 T , s S , k , j N .
Consequently, condition (16) is fulfilled for each f : S X (with N = 1 ), and Equation (11) takes the form
j = 1 a j f ρ ξ j ( t ) + η ( s ) = h ( t ) g ( s ) .
In a simplified situation, when U = S and η ( s ) = s for s S , Equation (11) becomes
j = 1 a j f ( ξ j ( t ) + s ) = h ( t ) g ( s ) .
With appropriate assumptions about S, T and X (which can be easily guessed), we have the following special cases of it: Equation (2) and (when ( U , + ) is the semigroup ( K , · ) ) the multiplicative version of it
f ( x y ) = f ( x ) f ( y ) ,
the next two pexiderizations (see, e.g., [41], Chapter 2.2) of them
f ( x y ) = h ( x ) g ( y ) ,
f ( x + y ) = h ( x ) g ( y ) ,
the d’Alembert (cosine) equation
f ( x + y ) + f ( x y ) = 2 f ( x ) f ( y ) ,
its generalization
f ( x + y ) + f ( x + σ ( y ) ) = h ( y ) g ( x )
(introduced by Wilson [42] with σ ( y ) y ) studied recently, e.g., in [28,49,50], the Reynolds exponential equation (cf. [51])
f ( f ( x ) + y ) = f ( x ) f ( y )
(closely related to the Reynolds operator considered in, e.g., [52,53]) and the subsequent pexiderized version of it:
f ( σ ( x ) + y ) = h ( x ) g ( y ) .
Let us mention that a superstability result for (20) has been proved in [54].
If n N , n > 1 , S = R , U = P : = { x n : x R } , η ( s ) = s n for s R , and ρ ( u ) = u n for u P , then (17) becomes
γ j ( t , s ) = ξ j ( t ) + s n n , j N , t , s R .
So, for T = R (whenever s n + σ ( t n ) n makes sense for all s , t R ), we have, for instance, the following particular radical cases of Equation (18) (and also of (11)):
f σ ( x n ) + y n n = h ( x ) g ( y ) ,
a 1 f x n + y n n + a 2 f x n + σ ( y n ) n = h ( y ) g ( x )
that are related to Equations (19) and (21) (cf., e.g., [28,45,46,47]). Clearly, Equation (22) is a generalization of (8) and (9).
If n is odd, and X = K , then Equation (10) can also be considered a particular case of (22) with a 1 = 1 , a 2 = 1 , and
f ( s ) = ψ 1 2 n s 2 , s R .
Example 2.
Let F be a commutative ring and Y be a module over F , ξ : S Y be surjective, ρ : Y S be a selection of ξ , τ j : T F for j N , and γ j be given by γ j ( t , s ) = ρ ( τ j ( t ) ξ ( s ) ) for t T , s S , j N . Then,
γ j ( t 2 , γ k ( t 1 , s ) ) = ρ ( τ j ( t 2 ) ξ ( γ k ( t 1 , s ) ) ) = ρ ( τ j ( t 2 ) ξ ( ρ ( τ k ( t 1 ) ξ ( s ) ) ) ) = ρ ( τ j ( t 2 ) τ k ( t 1 ) ξ ( s ) ) = ρ ( τ k ( t 1 ) τ j ( t 2 ) ξ ( s ) ) = γ k ( t 1 , γ j ( t 2 , s ) ) , t 1 , t 2 T , s S , k , j N .
Hence, condition (16) is satisfied for every f X S (with N = 1 ).
If S = Y and ξ ( s ) = s for s S , then (11) has the form
j = 1 a j f ( τ j ( t ) s ) = h ( t ) g ( s ) .
The homogeneity functional equation
f ( γ ( t ) s ) = h ( t ) f ( s )
is a particular case of it. The superstability of (23) has been investigated, e.g., in [35,36,37,40]. Note that (23) is actually a partial pexiderization of the functional equation
f ( f ( x ) y ) = f ( x ) f ( y ) ,
i.e., the multiplicative version of the Reynolds Equation (20).
Example 3.
Assume that ξ : S ( 0 , ) is surjective, ρ : ( 0 , ) S is a selection of ξ , and η j : T R for j N is given. Define γ j : T × S S by γ j ( t , s ) = ρ ξ ( s ) η j ( t ) for s S , t T . Then,
γ j ( t 2 , γ k ( t 1 , s ) ) = ρ ξ ( γ k ( t 1 , s ) ) η j ( t 2 ) = ρ ξ ρ ξ ( s ) η k ( t 1 ) η j ( t 2 ) = ρ ξ ( s ) η k ( t 1 ) η j ( t 2 ) = ρ ξ ( s ) η k ( t 1 ) η j ( t 2 ) = ρ ξ ( s ) η j ( t 2 ) η k ( t 1 ) = γ k ( t 1 , γ j ( t 2 , s ) ) , t 1 , t 2 T ,   s S ,   k , j N .
This implies that condition (16) is valid for every f : S X (with N = 1 ).
For S = ( 0 , ) and ξ ( s ) = s for s S , Equation (11) has the form
j = 1 a j f s η j ( t ) = h ( t ) f ( s ) .
A particular case of it is the functional equation
f s t = t f ( s )
considered in [40], where its superstability has been investigated.

3. The Main Result

Let
L : = { f : S X : j = 1 a j f ( γ j ( t , s ) ) be convergent for every ( t , s ) T × S } .
In this section, we prove a superstability theorem for Equation (11), with f L and h : T K , g : S X . Clearly, (11) seems to be ‘only’ a small modification (pexiderization) of (12), where f on the right-hand side of Equation (12) has been replaced by another unknown function g. However, this new result allows one to obtain many new superstability outcomes for functional equations that are particular cases of (11), including the equations mentioned in the previous section. Some appropriate examples are provided in the next section.
We need the following hypothesis for the functions f L .
( B )
There exist L R + and M ( L ) N such that
j = M ( L ) + l a j f ( γ j ( t , s ) ) L , t , s S , l N .
We write
G : = { f L : hypothesis   ( B )   holds } .
It is easily seen that if the series j = 1 a j f ( γ j ( t , s ) ) is uniformly convergent in T × S , then ( B ) holds. This means that F G .
Now, we are in a position to prove the following generalization of Theorem 2 (i.e., of Theorem 1 in [48]).
Theorem 3.
Let h : T K be unbounded and δ > 0 be a real number. Let g : S X and f G be such that
sup ( t , s ) T × S j = 1 a j f ( γ j ( t , s ) ) h ( t ) g ( s ) δ .
Moreover, assume that there exist N N and ε l : S R for l N 0 , such that
j , k = 1 N + l a j a k [ f ( γ j ( t 2 , γ k ( t 1 , s ) ) ) f ( γ k ( t 1 , γ j ( t 2 , s ) ) ) ] ε l ( s ) , t 1 , t 2 T ,   s S ,   l N 0 .
Then, h and g satisfy the equation
j = 1 a j g ( γ j ( t , s ) ) = h ( t ) g 0 ( s ) ,
with some g 0 : S X (given by (36)), and
a μ + l g ( γ μ + l ( t , s ) ) = 0 , s S ,   t T ,   l N ,
where μ : = max { N , M ( L ) } .
Moreover, if f = g , then g 0 = g = f .
Proof. 
Since f G , hypothesis ( B ) holds, which means that there exist L : S ( 0 , ) and M ( L ) N , such that (25) is valid. Consequently, for each t T , s S , m N 0 ,
j = 1 M ( L ) + m a j f ( γ j ( t , s ) ) h ( t ) g ( s ) = j = 1 a j f ( γ j ( t , s ) ) h ( t ) g ( s ) j = M ( L ) + m + 1 a j f ( γ j ( t , s ) ) j = 1 a j f ( γ j ( t , s ) ) h ( t ) g ( s ) + j = M ( L ) + m + 1 a j f ( γ j ( t , s ) ) δ + L .
h is assumed to be unbounded; therefore, there exists a sequence ( t n : n N 0 ) in T such that h ( t n ) 0 for n N 0 and lim n | h ( t n ) | = . It is easily seen that (30), with t replaced by t n , yields
i = 1 M ( L ) + m a i h ( t n ) f ( γ i ( t n , s ) ) g ( s ) δ + L | h ( t n ) | , m , n N 0 ,   s S ,
whence
lim n i = 1 M ( L ) + m a i h ( t n ) f ( γ i ( t n , s ) ) g ( s ) = lim n i = 1 M ( L ) + m a i h ( t n ) f ( γ i ( t n , s ) ) g ( s ) lim n δ + L | h ( t n ) | = 0 , s S ,   m N 0 .
This means that
g ( s ) = lim n k = 1 M ( L ) + m a k h ( t n ) f ( γ k ( t n , s ) ) , s S ,   m N 0 .
Hence, for every t T , s S , m N 0 , we obtain
j = 1 M ( L ) + m a j g ( γ j ( t , s ) ) = j = 1 M ( L ) + m a j lim n 1 h ( t n ) k = 1 M ( L ) + m a k f γ k ( t n , γ j ( t , s ) ) = lim n 1 h ( t n ) k , j = 1 M ( L ) + m a k a j f γ k ( t n , γ j ( t , s ) ) .
Further, according to (27), for every r 1 , r 2 T , s S , l N 0 , we have
j , k = 1 N + l a k a j [ f ( γ j ( r 2 , γ k ( r 1 , s ) ) ) f ( γ k ( r 1 , γ j ( r 2 , s ) ) ) ] ε l ( s ) ,
whence
lim n 1 h ( t n ) j , k = 1 N + l a k a j [ f ( γ j ( r 2 , γ k ( r 1 , s ) ) ) lim n 1 h ( t n ) f ( γ k ( r 1 , γ j ( r 2 , s ) ) ) ] = lim n 1 | h ( t n ) | j , k = 1 N + l a k a j [ f ( γ j ( r 2 , γ k ( r 1 , s ) ) ) f ( γ k ( r 1 , γ j ( r 2 , s ) ) ) ] lim n ε l ( s ) | h ( t n ) | = 0 ,
and consequently,
lim n 1 h ( t n ) k , j = 1 N + l a k a j f ( γ j ( r 2 , γ k ( r 1 , s ) ) ) = lim n 1 h ( t n ) k , j = 1 N + l a k a j f ( γ k ( r 1 , γ j ( r 2 , s ) ) ) .
Therefore, by (32),
j = 1 μ + l a j g ( γ j ( t , s ) ) = lim n 1 h ( t n ) k , j = 1 μ + l a k a j f γ j ( t , γ k ( t n , s ) ) , t T ,   s S   , l N 0 ,
with μ : = max { N , M ( L ) } . This implies that
j = 1 μ + l a j g ( γ j ( t , s ) ) = k = 1 μ + l a k lim n 1 h ( t n ) j = 1 μ + l a j f γ j ( t , γ k ( t n , s ) ) = lim n 1 h ( t n ) k = 1 μ + l a k j = 1 μ + l a j f γ j ( t , γ k ( t n , s ) ) h ( t ) g ( γ k ( t n , s ) ) + lim n h ( t ) k = 1 μ + l a k h ( t n ) g ( γ k ( t n , s ) ) , t T ,   s S   , l N 0 .
Replacing s by γ k ( t n , s ) in (30) we obtain
j = 1 M ( L ) + l a j f ( γ j ( t , γ k ( t n , s ) ) ) h ( t ) g ( γ k ( t n , s ) ) δ + L , t T ,   s S ,   l , n N 0 ,   k N .
So, for every t T ,   s S ,   l N 0 ,   k N ,
lim n 1 | h ( t n ) | j = 1 M ( L ) + l a j f ( γ j ( t , γ k ( t n , s ) ) ) h ( t ) g ( γ k ( t n , s ) ) lim n δ + L | h ( t n ) | = 0 ,
whence
lim n 1 h ( t n ) j = 1 M ( L ) + l a j f ( γ j ( t , γ k ( t n , s ) ) ) h ( t ) g ( γ k ( t n , s ) ) = 0 .
Consequently, using (33) and (34), we have
j = 1 μ + l a j g ( γ j ( t , s ) ) = lim n h ( t ) k = 1 μ + l a k h ( t n ) g ( γ k ( t n , s ) ) , t T ,   s S ,   l N 0 ,
whence
j = 1 μ + l a j g ( γ j ( t , s ) ) = h ( t ) g 0 ( s ) , t T ,   s S ,   l N 0 ,
where
g 0 ( s ) : = lim n k = 1 μ + l a k h ( t n ) g ( γ k ( t n , s ) ) , s S ,   l N 0 .
Hence, letting l in (35), we obtain that g 0 and h satisfy Equation (28). Clearly, if f = g , then (31) and (36) imply that g 0 = g .
Finally, it is easily seen that (35) yields
a μ + l g ( γ μ + l ( t , s ) ) = j = 1 μ + l a j g ( γ j ( t , s ) ) j = 1 μ + l 1 a j g ( γ j ( t , s ) ) = h ( t ) g 0 ( s ) h ( t ) g 0 ( s ) = 0 , t T ,   s S ,   l N ,
which means that (29) holds. □
Theorem 3 yields the subsequent three corollaries.
Corollary 1.
Assume that X = K , c K , c 0 , S = T , f G , there exist N N and ε l : S R , for l N 0 , such that (27) holds, and
ρ : = sup s , t T | j = 1 a j f ( γ j ( t , s ) ) c f ( t ) f ( s ) | < .
Then, one of the following two conditions is valid.
(i) 
f is an unbounded solution to the equation
j = 1 a j f ( γ j ( t , s ) ) = c f ( t ) f ( s ) ,
and
a μ + l f ( γ μ + l ( t , s ) ) = 0 , s ,   t T ,   l N ,
with μ : = max { N , M ( L ) } .
(ii) 
f is bounded and, in the case α : = j = 1 | a j | < ,
| f ( t ) | α + α 2 + 4 | c | ρ 2 | c | , t T .
Proof. 
In view of Theorem 3 with g = f and h ( t ) = c f ( t ) for t T = S , it is enough to consider the case of bounded f. Write
ν : = sup { | f ( t ) | : t T } .
Then, there is a sequence ( t n : n N ) in T such that lim n | f ( t n ) | = ν , and (37) implies that, for each n N ,
| c | | f ( t n ) | 2 ρ + j = 1 | a j | | f ( γ j ( t n , t n ) ) | ρ + α ν .
Letting n , we have
| c | ν 2 α ν ρ 0 ,
whence ν must be smaller than the positive root of the equation | c | x 2 α x ρ = 0 , which means that
ν α + α 2 + 4 | c | ρ 2 | c | .
Remark 1.
If i = 1 a i = i = 1 | a i | < , then estimation (39) is optimal. In fact, it is easy to check that, for f defined by
f ( t ) = α + α 2 + 4 | c | ρ 2 c , t T ,
we have
ρ = | j = 1 a j f ( γ j ( t , s ) ) c f ( t ) f ( s ) | , s , t T .
Remark 2.
Estimation (39) with c = 1 is exactly the same as those obtained in [17,18] for the exponential functional equation (i.e., the special case of Equation (38) with c = 1 , a 1 = 1 , and a j = 0 for j > 1 ) and the d’Alembert Equation (3) (i.e., the special case of Equation (38) with c = 1 , a 1 = a 2 = 1 2 , and a j = 0 for j > 2 ). Therefore, in particular, Corollary 1 (ii) extends these estimations to the case of c 1 .
Corollary 2.
Let δ be a positive real number, M N , h : T K be unbounded, g : S X , and f : T X . Assume that there exists ε : S R , such that
j , k = 1 M a j a k [ f ( γ j ( t 2 , γ k ( t 1 , s ) ) ) f ( γ k ( t 1 , γ j ( t 2 , s ) ) ) ] ε ( s ) , t 1 ,   t 2 T ,   s S .
If
sup ( t , s ) T × S j = 1 M a j f ( γ j ( t , s ) ) h ( t ) g ( s ) δ ,
then h and g satisfy the equation
j = 1 M a j g ( γ j ( t , s ) ) = h ( t ) g 0 ( s ) ,
with some g 0 : S X . Moreover, if f = g , then g 0 = g = f .
Proof. 
Clearly, (41) is (26) with a j = 0 for j > M . Analogously, (25) holds with any L R + and M ( L ) = M , and (40) implies (27) with N = M . So, it is enough to use Theorem 3. □

4. Some Applications

Now, we show applications of the results from the previous section to some particular cases of functional Equation (11).
First, let us apply Corollary 2 to the equation
f ( F ( x , y ) ) = h ( x ) g ( y ) ,
for functions f , g : S X and h : T K , where F : T × S S is given and fulfills the condition
F ( t 2 , F ( t 1 , s ) ) = F ( t 1 , F ( t 2 , s ) ) , t 1 ,   t 2 T ,   s S ,
i.e., condition (15) with γ j = γ k = F . If S = T , then for functions F that are symmetric (i.e., F ( s , t ) = F ( t , s ) for s , t T ), equality (43) becomes the associativity condition
F ( t , F ( s , u ) ) = F ( F ( t , s ) , u ) , t ,   s ,   u T ,
and we refer to [55,56,57] for some information concerning functions fulfilling it.
According to Examples 1–3, Equation (42) can be a pexiderized version of the Reynolds functional Equation (20) (i.e., Equation (21)), the homogeneity Equation (23), Equation (24) and the exponential Equation (2). We have the following corollary.
Corollary 3.
Let h : T K be unbounded and δ be a positive real number. Assume that there is x 0 T , such that h ( x 0 ) = 1 and the mapping S y F ( x 0 , y ) S is surjective.
Then, f ,   g : S X satisfy the inequality
sup ( x , y ) T × S f ( F ( x , y ) ) h ( x ) g ( y ) δ ,
if and only if h and g fulfill the equation
g ( F ( x , y ) ) = h ( x ) g ( F ( x 0 , y ) ) ,
and
sup ( x , y ) T × S f ( F ( x , F ( x 0 , y ) ) ) g ( F ( x , y ) ) δ .
Proof. 
Clearly, (44) is (41) with M = 1 and γ 1 = F . Next, (43) is condition (15) (with γ j = γ k = F ). Hence (see Examples 1–3), we can use Corollary 2 to obtain that h and g fulfill the equation g ( F ( x , y ) ) = h ( x ) g 0 ( y ) , with some function g 0 : S X . It is easily seen that from the equation (with x = x 0 ) we obtain g 0 ( y ) = g ( F ( x 0 , y ) ) for y S , which implies Equation (45) and, consequently, (46).
Conversely, if h and g satisfy Equation (45), and (46) is valid, then
f ( F ( x , F ( x 0 , y ) ) ) h ( x ) g ( F ( x 0 , y ) ) = f ( F ( x , F ( x 0 , y ) ) ) g ( F ( x , y ) ) δ ,
for every x T , y S . Since the mapping S y F ( x 0 , y ) S is surjective, this yields (44). □
Taking T = S , X = K , and g = h in Corollary 3, we obtain the following result.
Corollary 4.
Let ( S , ) be an abelian group with neutral element e, σ : S S , σ ( e ) = e , δ be a positive real number, f ,   h : S K , h ( e ) = 1 , and
sup x , y S f ( σ ( x ) y ) h ( x ) h ( y ) δ .
Then, one of the following two conditions is valid.
(i) 
f and h are unbounded, h is a solution to the equation
h ( σ ( x ) y ) = h ( x ) h ( y ) ,
and
sup y S f ( y ) h ( y ) δ .
(ii) 
f and h are bounded.
In addition, for Equation (19) we can obtain the following result that is analogous to Corollary 3.
Corollary 5.
Let ( S , + ) be an abelian groupoid with the neutral element 0, σ : S S , T = S , h : S K be unbounded, h ( 0 ) = 2 , δ be a positive real number, and σ ( 0 ) = 0 . Then, f , g : S X satisfy the inequality
sup ( x , y ) S × S f ( x + y ) + f ( x + σ ( y ) ) h ( y ) g ( x ) δ ,
if and only if h and g satisfy the equation
g ( x + y ) + g ( x + σ ( y ) ) = h ( y ) g ( x ) ,
and
sup y S f ( y ) g ( y ) δ 2 .
Proof. 
First, assume that (47) holds. Then, by Corollary 2, h and g satisfy the functional equation g ( x + y ) + g ( x + σ ( y ) ) = h ( y ) g 0 ( x ) with some g 0 : S X . Clearly, the equation with y = 0 yields 2 g ( x ) = h ( 0 ) g 0 ( x ) for x S , which implies that Equation (48) is fulfilled. Consequently,
sup ( x , y ) S × S f ( x + y ) + f ( x + σ ( y ) ) g ( x + y ) g ( x + σ ( y ) ) δ ,
which (with y = 0 ) yields (49).
Now, assume that h and g satisfy Equation (48), and condition (49) is valid. Then,
f ( x + y ) + f ( x + σ ( y ) ) h ( y ) g ( x ) = f ( x + y ) + f ( x + σ ( y ) ) g ( x + y ) g ( x + σ ( y ) ) f ( x + y ) g ( x + y ) + f ( x + σ ( y ) ) g ( x + σ ( y ) ) δ
for every x ,   y S , which means that (47) holds. □
Analogously, we can obtain the subsequent similar result for the radical equation
a 1 f x n + y n n + a 2 f x n + σ ( y n ) n = h ( y ) g ( x )
with n N , n > 1 , a 1 ,   a 2 K , h : R K , f , g : R X , and σ : R R . We must assume here that n is odd or σ ( y ) 0 for every y R + . Note that (50) is a generalization of radical Equations (8)–(10).
Corollary 6.
Let n > 1 be an odd integer, σ : R R , σ ( 0 ) = 0 , h : R K be unbounded, h ( 0 ) 0 , and δ be a positive real number. If f , g : R X satisfy the inequality
sup x , y R a 1 f x n + y n n + a 2 f x n + σ ( y n ) n h ( y ) g ( x ) δ ,
then h and g satisfy the equation
a 1 g x n + y n n + a 2 g x n + σ ( y n ) n = h ( y ) g 0 ( x )
with some g 0 : R X and,
(i) 
in the case h ( 0 ) = a 1 + a 2 0 , we have g 0 = g and
sup x R f ( x ) g ( x ) δ | a 1 + a 2 | ;
(ii) 
in the case a 1 + a 2 = 0 , g 0 ( x ) 0 .
Moreover, if a 1 a 2 > 0 , then (52), with g 0 = g , and (53) imply (51).
Proof. 
First, assume that (51) holds. Then, by Corollary 2 (see Example 1), h and g satisfy Equation (52) with some g 0 : R X .
If h ( 0 ) = a 1 + a 2 0 , then (52) (with y = 0 ) yields g 0 = g , whence, by (51) and (52) (with y = 0 ), we obtain (53). If a 1 + a 2 = 0 , then analogously we get g 0 ( x ) 0 .
Now, assume that a 1 a 2 > 0 , h and g = g 0 satisfy Equation (52), and (53) is valid. Then, | a 1 | + | a 2 | = | a 1 + a 2 | , and consequently,
a 1 f x n + y n n + a 2 f x n + σ ( y n ) n h ( y ) g ( x ) = a 1 f x n + y n n + a 2 f x n + σ ( y n ) n a 1 g x n + y n n a 2 g x n + σ ( y n ) n | a 1 | f x n + y n n g x n + y n n + | a 2 | f x n + σ ( y n ) n g x n + σ ( y n ) n ( | a 1 | + | a 2 | ) δ | a 1 + a 2 | = | a 1 + a 1 | δ | a 1 + a 2 | = δ , x ,   y R ,
which means that (51) holds. □
In the cases of Equations (9) and (10) (when σ ( t ) = t for t R ), we obtain better results than in Corollary 6 (ii). That is, we have the following two corollaries.
Corollary 7.
Let n N be odd, n > 1 , h : R K be unbounded, and δ be a positive real number. Then the following two statements are valid.
(a) 
If h ( 0 ) 0 and f , g : R X satisfy the inequality
sup x , y R f x n + y n n f x n y n n h ( y ) g ( x ) δ ,
then g is a constant function and
sup y R f 2 n y f ( 0 ) h ( y ) g ( 0 ) δ .
(b) 
If f : R X satisfies the inequality
sup x , y R f x n + y n n f x n y n n h ( y ) f ( x ) δ ,
then it is a solution to the equation
f x n + y n n f x n y n n = h ( y ) f ( x ) .
Proof. 
First, assume that h ( 0 ) 0 and (54) holds. Then, by Corollary 2, h and g satisfy the equation
g x n + y n n g x n y n n = h ( y ) g 0 ( x )
with some g 0 : R X , whence (with y = 0 ) we obtain g 0 ( x ) 0 . Consequently, from the equation we deduce that g is constant. Now, (54) (with x = y ) yields (55).
If (56) holds, then Corollary 2 (with f = g ) implies that f satisfies Equation (57). □
Corollary 8.
Let n N be odd, n > 1 , h : R K be unbounded, and δ be a positive real number. Then the following two statements are valid.
(a) 
If h ( 0 ) 0 and ψ , g : R X satisfy the inequality
sup x , y R ψ y n + x n 2 n 2 ψ x n y n 2 n 2 h ( y ) g ( x ) δ ,
then g is a constant function and
sup y R ψ ( y ) 2 ψ ( 0 ) 2 h ( y ) g ( 0 ) δ .
(b) 
If ψ : R X satisfies the inequality
sup x , y R ψ y n + x n 2 n 2 ψ x n y n 2 n 2 h ( y ) ψ ( x ) δ ,
then it is a solution to the equation
ψ y n + x n 2 n 2 ψ x n y n 2 n 2 = h ( y ) ψ ( x ) .
Proof. 
Define f : R X by f ( t ) = ψ 2 1 / n t 2 for x R . Then, it is easily seen that (58) and (59) are just (54) and (56), respectively. Consequently, it is enough to use Corollary 7. □
We end this paper with an example of a somewhat surprising consequence of Corollary 5.
Corollary 9.
Let ( S , + ) be an abelian group, h : S K be unbounded, h ( 0 ) = 2 , and h ( x 0 ) 2 h ( 2 x 0 ) + 2 for some x 0 S . Then,
sup x , y S f ( x + y ) + f ( x y ) h ( y ) h ( x ) =
for every function f : S K .
Proof. 
Suppose that
sup x , y S f ( x + y ) + f ( x y ) h ( y ) h ( x ) < .
Then, by Corollary 5 (with S = T , X = K , σ ( y ) y and g = h ), h is a solution to the equation
h ( x + y ) + h ( x y ) = h ( y ) h ( x ) .
Taking x = y = x 0 in (60), we obtain h ( x 0 ) 2 = h ( 2 x 0 ) + 2 , which is a contradiction. □

5. Conclusions

The well-known problem of Ulam stability concerns the size of the difference between the solutions and approximate solutions to various equations. During the study of it, a particular phenomenon was discovered that is now called superstability, which means that every mapping, for which the difference between the left- and right-hand sides of an equation is bounded, must be either bounded or be a solution to the equation.
In this paper, we prove a superstability theorem for the pexiderized general functional Equation (11) with the unknown functions g : T X , h : S K and f : S X , under the assumption that the series j = 1 f ( γ j ( t , s ) ) is convergent for every ( s , t ) S × T . We present some examples showing that this outcome implies various new superstability results for pexiderized versions of several well-known equations, as well as for their radical versions (see, e.g., Corollaries 5 and 6, with a 1 = a 2 = 1 ).
One of our main assumptions is inequality (14), and there arises a natural question as to whether this condition can be weakened for instance in the following way:
j = 1 a j f ( γ j ( t , s ) ) h ( t ) f ( s ) η ( s ) , t T ,   s S ,
with fixed η : S R + (cf., e.g., [28,46,47]). Unfortunately, this does not seem to be possible, because we assume only a fairly weak condition on functions γ k , i.e., condition (13). However, this weak condition allows us to include a wider range of equations in our considerations.
Further research in this area will focus on the possibility of replacing inequality (14) (in the main result of this paper) with this weaker assumption (61). However, this will probably require a more restrictive condition than (14), thus narrowing the class of equations considered.
In some cases (see, e.g., Corollaries 3 and 5), our main result allows one to obtain fairly complete descriptions of functions satisfying the inequalities considered.
Moreover, our outcomes show that there is a significant symmetry between the results on the superstability of numerous functional equations with one unknown function and those concerning their pexiderizations or radical versions. For example, from Corollary 6 (with a 1 = a 2 = 1 ), we obtain the following result:
Corollary 10.
Let n > 1 be an odd integer, σ : R R , σ ( 0 ) = 0 , h : R K be unbounded, h ( 0 ) = 2 , and δ be a positive real number. Then, f , g : R X satisfy the inequality
sup x , y R f x n + y n n + f x n + σ ( y n ) n h ( y ) g ( x ) δ ,
if and only if h and g satisfy the equation
g x n + y n n + g x n + σ ( y n ) n = h ( y ) g ( x ) ,
and
sup x R f ( x ) g ( x ) δ 2 .
It is easily seen that Corollaries 10 and 5 have very symmetric forms. We also note that there is some symmetry between the results of J. Baker, J. Lawrence, and F. Zorzitto [17] and Corollaries 3 and 4.
Finally, let us mention that from Theorem 3 one can derive (in an analogous way) various similar results for some other equations (which are special cases of Equation (11)), in which analogous symmetries will appear.

Funding

This research received no external funding.

Data Availability Statement

No new data were created or analyzed in this study. Data sharing is not applicable to this article.

Conflicts of Interest

The author declares no conflicts of interest.

References

  1. Hyers, D.H. On the Stability of the Linear Functional Equation. Proc. Natl. Acad. Sci. USA 1941, 27, 222–224. [Google Scholar] [CrossRef]
  2. Hyers, D.H.; Ulam, S.M. On approximate isometries. Bull. Am. Math. Soc. 1945, 51, 288–292. [Google Scholar] [CrossRef]
  3. Bourgin, D.G. Approximate isometries. Bull. Am. Math. Soc. 1946, 52, 704–714. [Google Scholar] [CrossRef]
  4. Hyers, D.H.; Ulam, S.M. Approximate Isometries of the Space of Continuous Functions. Ann. Math. 1947, 48, 285. [Google Scholar] [CrossRef]
  5. Bourgin, D.G. Approximately isometric and multiplicative transformations on continuous function rings. Duke Math. J. 1949, 16, 385–397. [Google Scholar] [CrossRef]
  6. Bourgin, D.G. Classes of transformations and bordering transformations. Bull. Am. Math. Soc. 1951, 57, 223–237. [Google Scholar] [CrossRef]
  7. Hyers, D.H.; Ulam, S.M. Approximately convex functions. Proc. Amer. Math. Soc. 1952, 3, 821–828. [Google Scholar] [CrossRef]
  8. Aoki, T. On the Stability of the linear Transformation in Banach Spaces. J. Math. Soc. Jpn. 1950, 2, 64–66. [Google Scholar] [CrossRef]
  9. Rassias, T.M. On the stability of the linear mapping in Banach spaces. Proc. Am. Math. Soc. 1978, 72, 297–300. [Google Scholar] [CrossRef]
  10. Hyers, D.H.; Isac, G.; Rassias, T.M. Stability of Functional Equations in Several Variables; Birkhäuser: Boston, MA, USA, 1998. [Google Scholar]
  11. Czerwik, S. Functional Equations and Inequalities in Several Variables; World Scientific: London, UK, 2002. [Google Scholar]
  12. Jung, S.-M. Hyers-Ulam-Rassias Stability of Functional Equations in Nonlinear Analysis; Springer Nature: Dordrecht, The Netherlands, 2011. [Google Scholar]
  13. Tripathy, A.K. Hyers-Ulam Stability of Ordinary Differential Equations; CRC Press: Boca Raton, FL, USA, 2021. [Google Scholar]
  14. Brzdęk, J.; Popa, D.; Raşa, I.; Xu, B. Ulam Stability of Operaters; Academic Press: Cambridge, MA, USA, 2018. [Google Scholar]
  15. Hayes, W.; Jackson, K.R. A survey of shadowing methods for numerical solutions of ordinary differential equations. Appl. Numer. Math. 2005, 53, 299–321. [Google Scholar] [CrossRef]
  16. Palmer, K. Shadowing in Dynamical Systems.Theory and Applications; Kluwer Academic Presss: Dordrecht, The Netherlands, 2000. [Google Scholar]
  17. Baker, J.; Lawrence, J.; Zorzitto, F. The stability of the equation f(x + y) = f(x)f(y). Proc. Amer. Math. Soc. 1979, 74, 242–246. [Google Scholar] [CrossRef]
  18. Baker, J. The stability of the cosine equation. Proc. Amer. Math. Soc. 1980, 80, 411–416. [Google Scholar] [CrossRef]
  19. Badora, R.; Brzdęk, J.; Ciepliński, K. Applications of Banach limit in Ulam stability. Symmetry 2021, 13, 841. [Google Scholar] [CrossRef]
  20. Ger, R.; Šemrl, P. The stability of the exponential equation. Proc. Amer. Math. Soc. 1996, 124, 779–787. [Google Scholar] [CrossRef]
  21. Székelyhidi, L. On a theorem of Baker, Lawrence nad Zorzitto. Proc. Amer. Math. Soc. 1982, 84, 95–96. [Google Scholar] [CrossRef]
  22. Badora, R. Note on the superstability of the Cauchy functional equation. Publ. Math. Debr. 2000, 57, 421–424. [Google Scholar] [CrossRef]
  23. Cholewa, P.W. The stability of the sine equation. Proc. Amer. Math. Soc. 1983, 88, 631–634. [Google Scholar] [CrossRef]
  24. Szekelyhidi, L. The stability of the sine and cosine functional equations. Proc. Am. Math. Soc. 1990, 110, 109–115. [Google Scholar] [CrossRef]
  25. Tyrala, I. A characterization of the sine function by functional inequalities. Math. Inequalities Appl. 1998, 13–33. [Google Scholar] [CrossRef]
  26. Székelyhidi, L. An abstract superstability theorem. Abh. Math. Sem. Univ. Hambg. 1989, 59, 81–83. [Google Scholar] [CrossRef]
  27. Badora, R.; Chmieliński, J. Decomposition of mappings approximately inner product preserving. Nonlinear Anal. Theory Methods Appl. 2005, 62, 1015–1023. [Google Scholar] [CrossRef]
  28. Kim, G.H. The stability of d’Alembert and Jensen type functional equations. J. Math. Anal. Appl. 2007, 325, 237–248. [Google Scholar] [CrossRef]
  29. Kim, G.H. On the stability of mixed trigonometric functional equations. Banach J. Math. Anal. 2007, 1, 227–236. [Google Scholar] [CrossRef]
  30. Kim, G.H. On the stability of the generalized sine functional equations. Acta Math. Sin. Engl. Ser. 2009, 25, 29–38. [Google Scholar] [CrossRef]
  31. Batko, B. Stability of Dhombres’ equation. Bull. Aust. Math. Soc. 2004, 70, 499–505. [Google Scholar] [CrossRef]
  32. Chudziak, J. Stability of the generalized Gola̧b-Schinzel equation. Acta Math. Hungar. 2006, 113, 133–144. [Google Scholar] [CrossRef]
  33. Chudziak, J.; Tabor, J. On the stability of the Gola̧b-Schinzel functional equation. J. Math. Anal. Appl. 2005, 302, 196–200. [Google Scholar] [CrossRef]
  34. Förg-Rob, W.; Schwaiger, J. On the stability of some functional equations for generalized hyperbolic functions and for the generalized cosine equation. Results Math. 1994, 26, 274–280. [Google Scholar] [CrossRef]
  35. Jabłoński, W. Stability of homogeneity almost everywhere. Acta Math. Hung. 2007, 117, 219–229. [Google Scholar] [CrossRef]
  36. Tabor, J.; Tabor, J. Homogeneity is superstable. Publ. Math. Debrecen 1994, 45, 123–130. [Google Scholar] [CrossRef]
  37. Trif, T. On the superstability of certain functional equations. Demonstr. Math. 2002, 35, 813–820. [Google Scholar] [CrossRef]
  38. Tabor, J. Stability of the Cauchy type equation in Lp norms. Result. Math. 1997, 32, 145–158. [Google Scholar] [CrossRef]
  39. Székelyhidi, L. The stability of D’Alembert type functional equation. Acta Sci. Math. (Szeged) 1982, 44, 313–320. [Google Scholar]
  40. Jung, S.-M. On the superstability of the functional equation f(xy) = yf(x). Abh. Math. Sem. Univ. Hambg. 1997, 67, 315–322. [Google Scholar] [CrossRef]
  41. Stetkær, H. Functional Equations on Groups; World Scientific: Singapore, 2013. [Google Scholar]
  42. Wilson, W.H. On certain related functional equations. Bull. Am. Math. Soc. 1920, 26, 300–312. [Google Scholar] [CrossRef]
  43. Aczél, J. Lectures on Functional Equations and Their Applications; Academic Press: Cambridge, MA, USA, 1966. [Google Scholar]
  44. Aczél, J.; Dhombres, J. Functional Equations in Several Variables; Cambridge University Press: Cambridge, UK, 1989. [Google Scholar]
  45. Hwang, H.J.; Kim, G.H. Superstability of the p-power-radical functional equation related to sine function equation. Electron. Res. Arch. 2023, 31, 6347–6362. [Google Scholar] [CrossRef]
  46. Kim, G.H. Superstability of the p-radical functional equations related to Wilson’s and Kim’s equation. Int. J. Nonlinear Anal. Appl. 2021, 12, 571–582. [Google Scholar]
  47. Kim, G.H. On the superstability of the p-power-radical sine functional equation. Nonlinear Funct. Anal. Appl. 2023, 28, 801–812. [Google Scholar]
  48. Brzdęk, J.; Najdecki, A.; Xu, B. Two general theorems on superstability of functional equations. Aequationes Math. 2014, 89, 771–783. [Google Scholar] [CrossRef]
  49. de Place Friis, P.; Stetkær, H. On the cosine-sine functional equation on groups. Aequat. Math. 2002, 64, 145–164. [Google Scholar] [CrossRef]
  50. Sinopoulos, P. Functional equations on semigroups. Aequationes Math. 2000, 59, 255–261. [Google Scholar] [CrossRef]
  51. Brzdęk, J. On solutions of a generalization of the Reynolds functional equation. Demonstr. Math. 2008, 41, 859–868. [Google Scholar] [CrossRef]
  52. Dubreil-Jacotin, M.L. Propriétés algébriques des transformations de Reynolds. C.R. Acad. Sci. Paris 1953, 236, 1950–1951. [Google Scholar]
  53. Matras, Y. Sur l’équation fonctionnelle: f(x · f(y))=f(x) · f(y). Acad. Roy. Belg. Bull. Cl. Sci. 1969, 55, 731–751. [Google Scholar] [CrossRef]
  54. Najdecki, A. On Stability of a functional equation connected with the Reynolds operator. J. Inequalities Appl. 2007, 2007, 79816. [Google Scholar] [CrossRef]
  55. Bajger, M.; Brzdęk, J.; El-hady, E.-S.; Jabłońska, E. On the continuous cancellative semigroups on a ieal Interval and on a circle and some symmetry issues. Symmetry 2020, 12, 1974. [Google Scholar] [CrossRef]
  56. Krapež, A. Generalized associativity on rectangular quasigroups. In Functional Equations—Results and Advances; Kluver Academic Publishers: Dordrecht, The Netherlands, 2002; Volume 3, pp. 335–349. [Google Scholar]
  57. Maksa, G. The generalized associativity equation revisited. Rocznik Nauk.-Dydakt. Prace Mat. 2000, 17, 175–180. [Google Scholar]
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Brzdęk, J. Some Comments on the Superstability of a General Functional Equation. Symmetry 2024, 16, 1654. https://doi.org/10.3390/sym16121654

AMA Style

Brzdęk J. Some Comments on the Superstability of a General Functional Equation. Symmetry. 2024; 16(12):1654. https://doi.org/10.3390/sym16121654

Chicago/Turabian Style

Brzdęk, Janusz. 2024. "Some Comments on the Superstability of a General Functional Equation" Symmetry 16, no. 12: 1654. https://doi.org/10.3390/sym16121654

APA Style

Brzdęk, J. (2024). Some Comments on the Superstability of a General Functional Equation. Symmetry, 16(12), 1654. https://doi.org/10.3390/sym16121654

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop