Next Article in Journal
A Novel Empirical Interpolation Surrogate for Digital Twin Wave-Based Structural Health Monitoring with MATLAB Implementation
Previous Article in Journal
Bilinear Learning with Dual-Chain Feature Attention for Multimodal Rumor Detection
Previous Article in Special Issue
Constrained Underdiagonal Paths and Pattern Avoiding Permutations
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Symbolic Methods Applied to a Class of Identities Involving Appell Polynomials and Stirling Numbers

1
Department of Mathematics, Illinois Wesleyan University, Bloomington, IL 61702, USA
2
Dipartimento di Matematica, Politecnico di Milano, 20133 Milan, Italy
*
Author to whom correspondence should be addressed.
Mathematics 2025, 13(11), 1732; https://doi.org/10.3390/math13111732
Submission received: 9 April 2025 / Revised: 13 May 2025 / Accepted: 22 May 2025 / Published: 24 May 2025

Abstract

:
In this paper, we present two symbolic methods, in particular, the method starting from the source identity, umbra identity, for constructing identities of s-Appell polynomials related to Stirling numbers and binomial coefficients. We discuss some properties of s-Appell polynomial sequences related to Riordan arrays, Sheffer matrices, and their q analogs.

1. Introduction

In the early 17th century, Johann Faulhaber discovered some remarkable representations of sums of powers 1 m , 2 m , , and n m as polynomials in N = ( n 2 + n ) / 2 , and more generally, r-fold summations of powers as polynomials in n ( n + r ) . Rigorous proofs of these formulas were provided by Jacobi in 1834. In Knuth [1], the notions of r-reflective and anti-r-reflective functions are introduced and used to explain Faulhaber’s results. As an amusement, a 360-year-old riddle of Faulhaber is solved. Edwards [2] provides an analogue for matrix forms of the algorithm of Johann Faulhaber from 1631.
Faulhaber’s formula, named after Johann Faulhaber, expresses the sum of the k-th powers of the first n positive integers = 1 n k as a ( k + 1 ) -th degree polynomial function of n, the coefficients involving Bernoulli numbers B j , in the following form:
= 1 n k = 1 k + 1 = 0 k k + 1 B n k + 1 ,
where we use the Bernoulli number of the second kind B 1 = 1 / 2 . If we use the Bernoulli number of the first kind, B 1 = 1 / 2 , noting all Bernoulli numbers with an odd index k 3 are zero, then Formula (1) deduces the following identity:
= 1 n k = 1 k + 1 = 0 k ( 1 ) B k + 1 n k + 1 = 1 k + 1 B k + 1 ( n + 1 ) B k + 1 ( 1 ) ,
where B 1 = 1 / 2 . Shiue and one of the authors [3] applied Faulhaber’s formula for the study of the divisibility of sums of powers of integers.
We can recall that determining combinatorial identities is a very famous branch of combinatorics. In this paper, we present two symbolic methods, in particular, the method for constructing identities starting from source identities (umbra identities), some of which involve Bernoulli numbers and other famous numbers.
It is known that symbolic operations Δ (difference), E (displacement), and D (derivative) play an important role in the calculus of finite differences, as well as in certain topics of computational methods. For various classical results, see Jordan [4], Milne-Thomson [5], etc. Certainly, the theoretical basis of symbolic methods could be found within the theory of formal power series, inasmuch as all the symbolic expressions treated are expressible as power series in Δ , E, or D, and all the operations employed are just the same as those applied to formal power series. For some easily accessible references on formal series, we recommend Bourbaki [6], Comtet [7], Gould [8], Graham, Knuth, and Partashnik [9], and Wilf [10].
Throughout this paper, the theory of formal power series and differential operators will be utilized. R , C , N , N 0 , and Z denote, respectively, the sets of real numbers, complex numbers, natural numbers, natural numbers including 0, and integers. Generally, we will use A ( t ) ,   g ( t ) ,   f ( t ) ,   φ ( t ) ,   etc., to denote either the formal power series (fps) in K [ [ t ] ] , the ring of formal power series in the real field when K = R , the complex field when K = C , or the infinitely differentiable functions (members of C ) defined in R or C .
We will make use of the ordinary operators Δ (difference), D (differentiation), and E (shift operator), which are defined by the following relations:
E f ( t ) = f ( t + 1 ) , Δ f ( t ) = f ( t + 1 ) f ( t ) , D f ( t ) = d d t f ( t ) .
Powers of these operators are defined in the usual way when they are available. In particular, for any real number x, one may define E x f ( t ) = f ( t + x ) . Also, the number 1 is defined as an identity operator, i.e., 1 f ( t ) f ( t ) . Let f C [ t ] . Using Taylor’s theorem,
f ( n + x ) = k 0 D k f ( n ) x k k ! .
Setting x = 1 yields the following:
f ( n + 1 ) = k 0 D k k ! f ( n ) = e D f ( n ) ,
which implies Δ f ( n ) = ( e D 1 ) f ( n ) . Thus, we symbolically obtain the following:
E = 1 + Δ = e D , Δ = E 1 = e D 1 , and D = log ( 1 + Δ ) .
Note that E k f ( 0 ) = E k f ( t ) t = 0 = f ( k ) so that ( x E ) k f ( 0 ) = f ( k ) x k . This means that ( x E ) k with x as a parameter may be used to generate a general term of the series k = 0 f ( k ) x k . In this paper, we focus on summations and identities arising from the interrelations of a number of operators in common use in combinatorics, number theory, and discrete mathematics.
  • Example.
Let B n ( a ) ( t ) be the generalized Bernoulli polynomial defined by the following (see [11] (p. 93)):
t e t 1 a e x t = n = 0 B n ( a ) ( x ) n ! t n ,
where we enjoy the property
d d x B n ( a ) ( x ) = n B n 1 ( a ) ( x )
for a Z , and let B n ( a ) = B n ( a ) ( 0 ) . It is clear that B n ( 1 ) ( x ) = B n ( x ) and B n ( 1 ) ( 0 ) = B n , which are the classical Bernoulli polynomial and classical Bernoulli number, respectively. Substitute g ( x ) = B n ( a ) ( x ) into (36), as shown in Section 4, and note g ( k ) ( 0 ) = D x k B n ( a ) ( 0 ) = ( n ) k B n k ( a ) and g ( k ) ( x ) = ( n ) k B n k ( a ) ( x ) , where ( n ) k = n ( n 1 ) ( n k + 1 ) . Then, we have the following identity, combining generalized Bernoulli polynomials and numbers, the Stirling number of the second kind r k , and binomial coefficients together as follows:
k = 0 n n k B n k ( a ) k r t k = k = 0 r n k B n k ( a ) ( t ) k ! r k t k .
The particular case r = 0 provides the following well-known expression:
B n ( a ) ( t ) = k = 0 n n k B n k ( a ) t k .
The generalized Bernoulli polynomial sequence is an Appell polynomial sequence. In mathematics, an Appell polynomial sequence, named after Paul Émile Appell, is any polynomial sequence { p n ( x ) } n 0 satisfying the following identity:
d d x p n ( x ) = n p n 1 ( x ) ,
in which p 0 ( x ) is a non-zero constant.
Among the most notable Appell sequences besides the trivial example { x n } are Hermite polynomials, Bernoulli polynomials, and Euler polynomials. Every Appell sequence is a Sheffer sequence, but most Sheffer sequences are not Appell sequences. Appell sequences have a probabilistic interpretation as systems of moments.
In this paper, we discuss a generalization of Appell sequences, called an s-Appell sequence ( s 0 ) and denoted by { p n ( s ; x ) } n 0 , which is defined by the following:
p ( x ; t ) = n 0 p n ( s ; x ) t n n ! = g ( t ) e s x t ,
where g ( t ) = n 0 g n t n n ! is a given exponential series (cf. Munarini [12]). If g 0 0 , we have a proper sequence. So, p n ( s ; x ) is a polynomial of degree n and
p n ( s ; x ) = k = 0 n n k g n k s k x k .
When s = 1 , we obtain ordinary Appell polynomials p n ( x ) = p n ( 1 ; x ) (cf. Appell [13], Roman [11] (p. 86), and Roman and Rota [14]).
Recall that a Sheffer sequence is a polynomial sequence { p n ( x ) } n N defined by the formal exponential series:
n 0 p n ( x ) t n n ! = g ( t ) e x f ( t ) ,
where g ( t ) = n 0 g n t n n ! is an exponential series with g ( 0 ) = g 0 = 1 , and f ( t ) = n 0 f n is an exponential series with f ( 0 ) = f 0 = 0 and f ( 0 ) = f 1 0 . In particular, s n ( 0 ) = g n . Particularly, if f ( t ) = s t and s 0 , then p n ( x ) = p n ( s ; x ) . A Sheffer sequence { p n ( x ) } n N can be represented by its corresponding Riordan array, i.e., [ g ( t ) , f ( t ) ] . More formally, let us consider the set of formal power series rings F = K [ [ t ] ] , where K is the field R or C . The order of f ( t ) F and f ( t ) = k = 0 f k t k / k ! ( f k K ) is the minimum number r N , such that f r 0 , where N = { 0 , 1 , 2 } is a set of all natural numbers. We denote by F r the set of formal power series of order r. Let g ( t ) F 0 and f ( t ) F 1 ; the pair ( g , f ) defines the (proper) Riordan array   R = [ d n , k ] n , k N = [ g , f ] having
d n , k = t n n ! g ( t ) f ( t ) k k !
or, in other words, having g f k as the generating function of the kth column of [ g , f ] . Hence,
[ g , f ] : = ( g , g f , g f 2 , g f 3 , ) ,
where g, g f , g f 2 , and g f 3 are the generating functions of the 0th, 1st, 2nd, 3rd, ⋯ columns of the matrix [ g , f ] , respectively. With the matrix multiplication, the set of all exponential Riordan arrays R forms a group, called the Riordan group (see Shapiro, Sprugnoli, Barry, Cheon, He, Merlini, and Wang [15] (Ch. 6)).
From (6) and (7),
n 0 p n ( x ) t n n ! = g ( t ) e x f ( t ) = k 0 g ( t ) f ( t ) k k ! x k = k 0 n 0 d n , k x k t n n ! = n 0 k = 0 n d n , k x k t n n ! ,
which implies
p n ( x ) = k = 0 n d n , k x k ,
or equivalently,
p n , k = [ x k ] p n ( x ) = d n , k
for p n ( x ) = k = 0 n p n , k x k .
Let [ g ( t ) , f ( t ) ] = [ d n , k ] n , k b N be an exponential Riordan array, and let h ( t ) = k 0 h k t k / k ! be the generating function of the sequence ( h n ) n N . Then, we have the first fundamental theorem of Riordan arrays:
k = 0 n d n , k h k = t n n ! g ( t ) h ( f ( t ) ) ,
which can be abbreviated as follows:
[ g ( t ) , f ( t ) ] h ( t ) = g ( t ) ( h f ) ( t ) ,
or simplified to [ g , f ] h = g h ( f ) . Thus, we immediately see that the usual row-by-column product of two Riordan arrays is also a Riordan array:
[ g 1 , f 1 ] [ g 2 , f 2 ] = [ g 1 g 2 ( f 1 ) , f 2 ( f 1 ) ] .
The Riordan array I = [ 1 , t ] is the identity matrix because its entries are d n , k = [ t n / n ! ] t k / k ! = δ n , k .
Let [ g t , f ( t ) ] be a Riordan array. Then, its inverse is the following:
[ g t , f ( t ) ] 1 = 1 g ( f ¯ ( t ) ) , f ¯ ( t ) ,
where f ¯ ( t ) is the compositional inverse of f ( t ) , i.e., ( f f ¯ ) ( t ) = ( f ¯ f ) ( t ) = t . In this way, the set R of all proper Riordan arrays forms a group (see [16]) called the Riordan group. Hence, the set L of all Sheffer sequences forms a group with the product defined below called the Sheffer group. If p n ( x ) and q n ( x ) are the Sheffer sequences with Riordan matrices [ g 1 , f 1 ] = [ d n , k ] n , k N and [ g 2 , f 2 ] = [ c n , k ] n , k N , respectively, then the operation, called the product of { p n } n N and { q n } n N and denoted by p n ( x ) q n ( x ) , is defined by the following:
n 0 p n ( x ) q n ( x ) t n n ! = g 1 ( t ) g 2 ( f 1 ( t ) ) e x f 2 ( f 1 ( t ) ) .
Denote
[ g 1 ( t ) g 2 ( f 1 ( t ) ) , f 2 ( f 1 ( t ) ) ] = [ r n , k ] n , k N ,
where r n , k = = k n d n , c , k using (11). Thus,
g 1 ( t ) g 2 ( f 1 ( t ) ) e x f 2 ( f 1 ( t ) ) = n 0 r n ( x ) t n n ! ,
where r n ( x ) = k = 0 n r n , k x k . Compared to (13), we obtain the following:
r n ( x ) = p n ( x ) q n ( x )
for p n ( x ) = k = 0 n p n , k x k , q n ( x ) = k = 0 n q n , k x k , and r n ( x ) = k = 0 n r n , k x k . In addition, (14) holds if and only if r n , k = = k n d n , c , k , i.e., [ r n , k ] n , k N = [ d n , k ] n , k N [ c n , k ] n , k N , which establishes an isomorphism between the Riordan group and the Sheffer group (cf. Hsu, Shiue, and one of the authors [17]). Hence, we use { p n ( x ) } n N [ g ( t ) , f ( t ) ] to represent the isomorphism between { p n ( x ) } n N and [ g ( t ) , f ( t ) ] if n 0 p n ( x ) t n / n ! = g ( t ) e x f ( t ) .
An infinite lower triangular matrix [ d n , k ] n , k N is a Riordan array if and only if a unique sequence A = ( a 0 0 , a 1 , a 2 , ) exists such that for every n , k N ,
d n + 1 , k + 1 = c n + 1 c k c n c k + 1 a 0 d n , k + c n + 1 c k + 1 c n c k + 1 a 1 d n , k + 1 + + c n + 1 c n c n c k + 1 a n d n , n
= j 0 c n + 1 c k + j c n c k + 1 a j d n , k + j .
This is equivalent to
f ( t ) = t A ( f ( t ) ) or t = f ¯ ( t ) A ( t ) .
Here, A ( t ) is the generating function of the A-sequence. The first formula of (17) is also called the second fundamental theorem of Riordan arrays.
Moreover, there exists a unique sequence Z = ( z 0 , z 1 , z 2 , ) such that every element in column 0 can be expressed as a linear combination:
d n + 1 , 0 = c n + 1 c 0 c n c 0 z 0 d n , 0 + c n + 1 c 1 c n c 0 z 1 d n , 1 + + c n + 1 c n c n c 0 z n d n , n ,
= j 0 c n + 1 c j c n c 0 z j d n , j ,
or equivalently,
g ( t ) = 1 1 t Z ( f ( t ) ) ,
in which we always assume g ( 0 ) = g 0 = 1 , a usual hypothesis for proper Riordan arrays. From (20), we may obtain the following:
Z ( t ) = g ( f ¯ ( t ) ) 1 f ¯ ( t ) g ( f ¯ ( t ) ) .
A- and Z-sequence characterizations of Riordan arrays were introduced, developed, and/or studied in Merlini, Rogers, Sprugnoli, and Verri [18], Roger [19], Sprugnoli and one of the authors [20], Jean-Louis and Nkwanta [21], Luzón, Morón, Prieto-Martinez [22,23], and [24], as well as their references.
In the next section, we provide some properties of s-Appell sequences and construct their identities, including the umbral identity, using the resource identity (36). In Section 3, the umbral identity found in Section 2 is used to obtain a kind of identities related to Riordan and Sheffer-type matrices. The q-analogues of the above identities will also be presented.
s-Appell sequences form Sheffer sequences (cf. Sheffer [25], Roman [11], and Roman and Rota [14]).
Here is a list of six important subgroups of the Riordan group (see [15,16,26,27]). Six subgroups of the Sheffer group can be provided accordingly based on the isomorphism between the Sheffer group and the Riordan group (cf. [17]).
  • the s-Appell subgroup  { [ g ( t ) , s t ] : g F 0 } for s 0 .
  • the Lagrange (associated) subgroup  { [ 1 , f ( t ) ] : f F 1 ) } .
  • the k-Bell subgroup  { [ g ( t ) , t ( g ( t ) ) k ] : g F 0 } , where k is a fixed positive integer.
  • the hitting-time subgroup  { [ t f ( t ) / f ( t ) , f ( t ) ] : f F 1 } .
  • the derivative subgroup  { [ f ( t ) , f ( t ) ] : f F 1 } .
  • the checkerboard subgroup  { [ g ( t ) , f ( t ) ] : g F 0 ,   f F 1 } , where g is an even function, and f is an odd function.
The 1-Appell subgroup is referred to as the Appell subgroup, the 1-Bell subgroup is referred to as the Bell subgroup for short, and the ordinary Appell subgroup can be considered the 0-Bell subgroup if we allow k = 0 to be included in the definition of the k-Bell subgroup. From the isomorphism between the Sheffer group and the Riordan group, the set A * of all s-Appell polynomial sequences with s R and s 0 is a subgroup of the Sheffer group S , where the umbral composition of an s 1 -Appell polynomial sequence with an s 2 -Appell polynomial sequence is an s 1 s 2 -Appell polynomial sequence.

2. Main Identity

We start by obtaining a simple but fundamental identity, which can be considered the prototype of all other identities considered in this paper since they will be obtained by this “umbral identity” by the suitable application of an “umbral operator”. To obtain such an identity, consider the Euler operator ϑ t = t D t , where D t = d d t is the usual derivative with respect to t. For this operator, we have the following Grunert formula [28,29] (Formula (4.8)), [9] (p. 310):
ϑ t m = k = 0 m m k t k D t k .
Notice that by applying this formula, we can find the generating series of the powers n m [29] (Formula (4.10)):
k 0 k m t k = k = 0 m m k k ! t k ( 1 t ) k + 1 .
Theorem 1.
For every m , n N , we have the following identity:
k = 0 n n k k m x n k = k = 0 m n m k n k k ! ( x + 1 ) n k
or equivalently,
k = 0 n n k k m ( 1 ) n k x n k = k = 0 m n m k n k k ! ( 1 x ) n k ,
where m n = min { m , n } .
Proof. 
From formula (21), the exponential generating series of the first member of (23) is as follows:
e x t ϑ t m e t = k = 0 m m k t k e ( x + 1 ) t = n 0 k = 0 m m k n k k ! ( x + 1 ) n k t n n ! .
This establishes identity (23). Then, replacing x by x in (23), we obtain (24). □
Remark 1.
Identity (23) can also be obtained as the binomial transform of series (22). Indeed, if we apply the binomial matrix
1 1 x t , t 1 x t = n k x n k n , k 0
to both sides of series (22), then we have
k 0 k m t k ( 1 x t ) k + 1 = k = 0 m m k k ! t k ( 1 ( x + 1 ) t ) k + 1 .
Finally, taking the coefficients of t n on both sides, we have our identity.
Identity (23), in addition to the next theorem, allows us to determine numerous new identities, starting with a sequence and its binomial transform.
Theorem 2.
Let { A n } n 0 and { B n } n 0 be two sequences such that
k = 0 n n k A k = B n .
Then, for every m , n N , we have
k = 0 n n k k m A n k = k = 0 m m k n k k ! B n k .
Proof. 
Consider the linear isomorphism φ : R [ x ] R [ x ] defined on the canonical basis by φ ( x n ) = A n . Then, we have
φ ( ( x + 1 ) n ) = k = 0 n n k φ ( x k ) = k = 0 n n k A k = B n .
Finally, by applying φ to the umbral identity (23), we have identity (25). □
Remark 2.
Notice that Formula (25) (as well as Formula (23)) can be considered a closed form for the sum appearing on the left-hand side since the sum on the right-hand side has, at most, m terms (for m > 0 ), and m is constant. For the first few values of m, we have
k = 0 n n k k A n k = n B n 1 k = 0 n n k k 2 A n k = ( n 1 ) n B n 2 + n B n 1 k = 0 n n k k 3 A n k = ( n 2 ) ( n 1 ) n B n 3 + 3 ( n 1 ) n B n 2 + n B n 1 k = 0 n n k k 4 A n k = ( n 3 ) ( n 2 ) ( n 1 ) n B n 4 + 6 ( n 2 ) ( n 1 ) n B n 3 + 7 ( n 1 ) n B n 2 + n B n 1 .
This remark continues to be true for all other identities of this kind that we will consider in the rest of the paper.
  • Examples.
  • Consider the generalized Fibonacci numbers f n [ s ] , s N , s 1 [30]. They are defined by the following generating series:
    n 0 f n [ s ] t n = 1 1 t t 2 t s .
    In this case, we have the following binomial identity:
    k = 0 n n k f ( s + 1 ) k [ s ] = 2 n f s n [ s ] .
    So, by Theorem 2, we have
    k = 0 n n k k m f ( s + 1 ) ( n k ) [ s ] = k = 0 m n m k n k k ! 2 n k f s ( n k ) [ s ] .
  • For the Bell numbers b n = k = 0 n n k [9], we have the following binomial identities:
    k = 0 n n k b k = b n + 1 , k = 0 n n k 2 n k b k = b n + 2 b n + 1 .
    Hence, by Theorem 2, we have
    k = 0 n n k k m b n k = k = 0 m n m k n k k ! b n k + 1 , k = 0 n n k k m 2 k b n k = k = 0 m n m k n k k ! 2 k ( b n k + 2 b n k + 1 ) .
  • The generalized derangement numbers d n ( ν ) with ν N [31,32] have exponential generating series
    n 0 d n ( ν ) t n n ! = ν ! e t ( 1 t ) ν + 1
    and satisfy the binomial identities
    k = 0 n n k d k ( ν ) = ( ν + n ) ! , k = 0 n n k ( 1 ) n k ( ν + k ) ! = d n ( ν ) .
    Therefore, by Theorem 2, we have
    k = 0 n n k k m d n k ( s ) = k = 0 m n m k n k k ! ( s + n k ) ! k = 0 n n k k m ( 1 ) k ( s + n k ) ! = k = 0 m n m k n k k ! ( 1 ) k d n k ( s ) .
  • For the harmonic numbers H n = k = 0 n 1 k and the harmonic numbers of the second kind H n ( 2 ) = k = 0 n 1 k 2 , we have the following binomial identities [33,34]:
    k = 1 n n k ( 1 ) k 1 k = H n , k = 1 n n k ( 1 ) k 1 H k = 1 n n 1
    and
    k = 1 n n k ( 1 ) k 1 k H k = H n ( 2 ) , k = 1 n n k ( 1 ) k 1 H k ( 2 ) = H n n n 1 .
    Consequently, by Theorem 2, we have
    k = 0 n 1 n k k m ( 1 ) n k 1 n k = k = 0 m n m k n k k ! H n k k = 0 n n k k m ( 1 ) n k 1 H n k = k = 0 m n m k n k k ! n k m < n
    and
    k = 0 n 1 n k k m ( 1 ) n k 1 n k H n k = k = 0 m n m k n k k ! H n k ( 2 ) k = 0 n n k k m ( 1 ) n k 1 H n k ( 2 ) = k = 0 m n m k n k k ! n k H n k m < n .
    Similarly, for the skew harmonic numbers (or alternating harmonic numbers) H n = k = 0 n ( 1 ) k 1 k we have the following binomial identities:
    k = 0 n n k ( 1 ) k H k = 1 2 n n n 1 , k = 1 n n k ( 1 ) k k ( 1 2 k ) = H n .
    Then,
    k = 0 n n k k m ( 1 ) n k H n k = k = 0 m m k n k k ! 1 2 n k n k m < n k = 0 n 1 n k k m ( 1 ) n k n k ( 1 2 n k ) = k = 0 m m k n k k ! H n k .
  • Recall that the beta function is defined by the following:
    B ( p , q ) = 0 1 x p 1 ( 1 x ) q 1 d x
    for p , q > 0 . In particular, if p , q N , then
    B ( p + 1 , q + 1 ) = 1 p + q p 1 p + q + 1 .
    Now, if we multiply both sides of (24) by x s and we integrate from 0 to 1, we have
    k = 0 n n k k m ( 1 ) n k x s + n k = k = 0 m m k n k k ! B ( s + 1 , n k + 1 ) .
    That is,
    k = 0 n n k ( 1 ) n k k m s + n k + 1 = k = 0 m m k n k k ! s + n k s 1 s + n k + 1 .
    In particular, for s = 0 , we have
    k = 0 n n k ( 1 ) n k k m n k + 1 = k = 0 m m k n k k ! n k + 1 .

3. Appell Sequences

In this section, we will apply Theorem 2 in order to obtain a general formula involving an arbitrary s-Appell sequence. An s-Appell sequence ( s 0 ) is a polynomial sequence { a n ( x ) } n 0 with exponential generating series:
a ( x ; t ) = n 0 a n ( x ) t n n ! = g ( t ) e s x t ,
where g ( t ) = n 0 g n t n n ! is a given exponential series. If g 0 0 , we have a proper sequence. In particular, these polynomials can be written as follows:
a n ( x ) = k = 0 n n k g n k s k x k .
All these are equivalent to a n ( x ) = s n a n 1 ( x ) for all n N .
In the following examples, we recall some classical s-Appell sequences with their exponential generating series. All sequences are proper except the last one, which is provided by Genocchi polynomials.
  • Examples.
  • Ordinary powers x n : n 0 x n t n n ! = e x t .
  • Generalized Hermite polynomials H n ( ν ) ( x ) (cf. [35], (Vol. 2, p. 192)):
    n 0 H n ( ν ) ( x ) t n n ! = e 2 x t ν t 2 ( s = 2 ) .
    Generalized Hermite numbers: H n ( ν ) ( x ) = H n ( ν ) ( 0 ) .
  • Laguerre polynomials L n ( ν n ) ( x ) (cf. [35] (Vol.2, p.189, Formula(19))):
    n 0 L n ( ν n ) ( x ) t n n ! = ( 1 + t ) ν e x t ( s = 1 ) .
  • Generalized Rencontre polynomials D n ( ν ) ( x ) , ν N (cf. [31,36]):
    n 0 D n ( ν ) ( x ) t n n ! = ν ! e ( x 1 ) t ( 1 t ) ν + 1 .
    Generalized derangement numbers: d n ( ν ) = D n ( ν ) ( 0 ) .
  • Generalized Bernoulli polynomials B n ( ν ) ( x ) and generalized Euler polynomials E n ( ν ) ( x ) (cf. [11] (p. 93, p. 100) and [35] (Vol. 3, p. 252)):
    n 0 B n ( ν ) ( x ) t n n ! = t e t 1 ν e x t n 0 E n ( ν ) ( x ) t n n ! = 2 e t + 1 ν e x t .
    Generalized Bernoulli numbers: B n ( ν ) = B n ( ν ) ( 0 ) and E ˜ n ( ν ) = E n ( ν ) ( 0 ) . Generalized Euler numbers: E n ( ν ) = 2 n E n ( ν ) ( ν / 2 ) .
  • Genocchi polynomials G n ( x ) (cf. [37,38]):
    n 0 G n ( x ) t n n ! = 2 t e t + 1 e x t .
    Genocchi numbers: G n = G n ( 0 ) .
Now, we can prove our theorem on Appell polynomials.
Theorem 3.
For any s-Appell sequence { a n ( x ) } n N , s 0 , we have the following identity:
k = 0 n n k k m a n k ( x ) y k = k = 0 m n m k n k k ! a n k ( x + y / s ) y k .
In particular, for y = 1 , we have the following identity:
k = 0 n n k k m a n k ( x ) = k = 0 m n m k n k k ! a n k ( x + 1 / s ) .
Proof. 
Just notice that, by the exponential generating series (26), we have
e y t a ( x , t ) = g ( t ) e ( s x + y ) t = g ( t ) e s ( x + y / s ) t = a ( x + y / s ; t ) .
That is,
k = 0 n n k a k ( x ) y n k = a n ( x + y / s ) or k = 0 n n k a k ( x ) y k = a n ( x + y / s ) y n .
So, by applying Theorem 2 and simplifying it, we have identity (28). □
We also have the following result.
Theorem 4.
Let { a n ( x ) } n N be an Appell sequence with exponential generating series (26). Then, we have
k = 0 n n k k m g n k ( s x ) k = k = 0 m n m k n k k ! ( s x ) k a n k ( x ) .
Proof. 
From formula (27), we can write the following:
a n ( x ) = k = 0 n n k g k ( s x ) n k or k = 0 n n k g k ( s x ) k = ( s x ) n a n ( x ) .
Therefore, using Theorem 2, we have formula (30). □
  • Examples.
  • Using (28), we may obtain the following identities for the s-Appell sequences recalled in the initial examples:
    k = 0 n n k k m y k x n k = k = 0 m n k ! m k n k y k ( x + y ) n k , k = 0 n n k k m H n k ( v ) x y k = k = 0 m n k ! m k n k H n k ( v ) x + y 2 y k , k = 0 n n k k m L n k ( α n ) ( x ) y k = k = 0 m n k ! m k n k L n k ( α n ) ( x y ) y k , k = 0 n n k k m B n k ( a ) ( x ) y k = k = 0 m n k ! m k n k B n k ( a ) ( x + y ) y k , k = 0 n n k k m E n k ( a ) ( x ) y k = k = 0 m n k ! m k n k E n k ( a ) ( x + y ) y k , k = 0 n n k k m G n k ( x ) y k = k = 0 m n k ! m k n k G n k ( x + y ) y k .
    Some of these identities can be rewritten in a different way. Indeed, since B n ( x + 1 ) = B n ( x ) + n x n 1 , from (29) we obtain the following:
    k = 0 n n k k m B n k ( x ) = k = 0 m n m k n k k ! ( B n k ( x ) + ( n k ) x n k 1 ) .
    In particular, for x = 0 , we have the Bernoulli numbers B n = B n ( 0 ) , and the last identity becomes
    k = 0 n n k k m B n k = k = 0 m n m k n k k ! B n k + m n 1 n ! .
    Similarly, since E n ( x + 1 ) = 2 x n E n ( x ) , (29) implies
    k = 0 n n k k m E n k ( x ) = k = 0 m m k n k k ! ( 2 x n k E n k ( x ) ) .
    In particular, for x = 0 , we have E n ( 0 ) = ( 2 2 n + 2 ) B n + 1 n + 1 , which changes the last identity to the following:
    k = 0 n n k k m ( 1 2 n k + 1 ) B n k + 1 n k + 1 = m n n ! k = 0 m n m k n k k ! ( 1 2 n k + 1 ) B n k + 1 n k + 1 .
    Moreover, we have the Euler numbers E n = 2 n E n ( 1 / 2 ) . So, for x = 1 / 2 , we have the following identity:
    k = 0 n n k k m 2 k E n k = k = 0 m n m k n k k ! 2 k ( 2 E n k ) .
    Finally, since G n ( x + 1 ) = 2 n x n 1 G n ( x ) , (29) yields the following identity:
    k = 0 n n k k m G n k ( x ) = k = 0 m n m k n k k ! ( 2 ( n k ) x n k 1 G n k ( x ) ) .
    In particular, for x = 0 , we have G n ( 0 ) = ( 2 2 n + 1 ) B n , and the above identity becomes
    k = 0 n n k k m ( 1 2 n k ) B n k = m n 1 n ! k = 0 m n m k n k k ! ( 1 2 n k ) B n k .
  • Using Formula (30), we have the following:
    k = 0 n n k 2 k k m H n k ( ν ) x k = k = 0 m n m k n k 2 k k ! x k H n k ( ν ) ( x ) , k = 0 n n k ( 1 ) k k m ν n k ̲ x k = k = 0 m n m k n k ( 1 ) k k ! x k L n k ( ν n + k ) ( x ) , k = 0 n n k k m d n k ( ν ) x k = k = 0 m n m k n k k ! x k D n k ( ν ) ( x ) ,
    k = 0 n n k k m B n k ( ν ) x k = k = 0 m n m k n k k ! x k B n k ( ν ) ( x ) ,
    k = 0 n n k k m E ˜ n k ( ν ) x k = k = 0 m n m k n k k ! x k E n k ( ν ) ( x ) ,
    k = 0 n n k k m G n k x k = k = 0 m n m k n k k ! x k G n k ( x ) ,
    where ν k ̲ = ν ( ν 1 ) ( ν k + 1 ) is the falling factorial power.
    From these formulas we can deduce some other interesting identities. For instance, since B n ( 1 ) = ( 1 ) n B n , B n ( 1 / 2 ) = ( 1 2 n 1 1 ) B n , and B n ( 1 / 4 ) = 1 2 n ( 1 2 n 1 1 ) B n n 4 n E n 1 . Then, identity (31) for ν = 1 becomes the following:
    k = 0 n n k k m B n k = k = 0 m n m k n k k ! ( 1 ) n k B n k , k = 0 n n k k m 2 k B n k = k = 0 m n m k n k k ! 1 2 n 1 1 2 k B n k , k = 0 n n k k m 4 k B n k = k = 0 m n m k n k k ! 1 2 n 1 2 n 1 1 2 k B n k n k 4 n E n k 1 .
    We have the Euler number E n = 2 n E n ( 1 / 2 ) and the Springer numbers S n = ( 1 ) n / 2 4 n E n ( 1 / 4 ) [39]. Since E ˜ n = E n ( 0 ) = ( 2 2 n + 2 ) B n + 1 n + 1 , identity (32) becomes the following:
    k = 0 n n k k m 2 n k ( 2 2 n k + 2 ) B n k + 1 n k + 1 = k = 0 m n m k n k k ! E n k , k = 0 n n k k m 4 n k ( 2 2 n k + 2 ) B n k + 1 n k + 1 = k = 0 m n m k n k ( 1 ) n k 2 k ! S n k .

4. Remarks on the Case of Appell Sequences

Notice that Theorem 1, providing the main umbral identity (together with Theorem 2 for the binomial tranform), implies Theorem 3 in Appell sequences. Vice versa, Theorem 3 implies Theorem 1 because the powers x n form an Appell sequence. Therefore, Theorems 1 and 3 are equivalent. However, as we already remarked, the umbral identity in Theorem 1 is somewhat more fundamental since it can be considered the root of all other identities of the same nature. Furthermore, as we will see in the last Section 7, this approach can be easily extended in order to obtain a q-analogue of all these results.
Nonetheless, it is interesting to observe that Theorem 3 in Appell sequences can be proved with a different approach based on the following general theorem proven in [40], in order to constructing combinatorial identities in a symbolic way. Recall that the difference operator Δ is defined by Δ f ( x ) = f ( x + 1 ) f ( x ) .
Theorem 5.
(Ref. [40]) Let { f ( k ) } n N be a sequence of numbers (real or complex), and let g ( t ) and h ( t ) be infinitely differentiable functions on [ 0 , ) . Then, we have the following formal identities:
k = 0 f ( k ) g ( k ) ( 0 ) x k k ! = k = 0 Δ k f ( 0 ) g ( k ) ( x ) x k k ! ,
k = 0 h ( k ) g ( k ) ( 0 ) x k k ! = k = 0 1 k ! h ( k ) ( 0 ) A k ( x , g ( x ) ) ,
where A m ( x , g ( x ) ) is an extension of the Euler fraction in terms of g ( x ) , which is defined as follows:
A m ( x , g ( x ) ) = j = 0 m m j g ( j ) ( x ) x j ,
where g ( j ) ( x ) is the j-th derivative of g ( x ) .
At this point, as an immediate application of Theorem 5, we have the following formula.
Theorem 6.
Let g ( x ) be an infinitely differentiable function on [ 0 , ) , and let m N . Then, we have the following identity:
k 0 k m g ( k ) ( 0 ) x k k ! = k = 0 m m k g ( k ) ( x ) x k .
Proof. 
Substituting f ( x ) = x m into (33) and noting k j = Δ j x k x = 0 / j ! , we obtain (36). □
Now, we can obtain our different proof of the formula involving Appell sequences.
Alternative proof of Theorem 3. Given our s-Appell polynomials a n ( x ) , consider the function g ( x ) = a n ( y + x / s ) and place it into (36). Since
d k d x k a n ( y + x / s ) = n k ̲ a n k ( y + x / s ) ,
we have
k = 0 n n k k m a n k ( y ) x k = k = 0 m n m k n k k ! a n k ( y + x / s ) x k .
By exchanging x and y, we obtain the identities of the s-Appell polynomials (28).

5. Other Polynomial Sequences

The results obtained for Appell sequences can be extended to some other polynomial sequences depending on a parameter, as in the following cases.
Theorem 7.
Let { s n ( ν ) ( x ) } n 0 be a polynomial sequence with exponential generating series:
n 0 s n ( ν ) ( x ) t n n ! = e ν t F ( x ; t ) ,
where F ( x ; t ) = n 0 F n ( x ) t n n ! is a given exponential series. Then, for every m , n N , we have the following identities:
k = 0 n n k k m μ k s n k ( ν ) ( x ) = k = 0 m m k n k k ! μ k s n k ( μ + ν ) ( x )
and
k = 0 n n k k m ν k F n k ( x ) = k = 0 m m k n k k ! ν k s n k ( ν ) ( x ) .
Proof. 
Notice that polynomials s n ( ν ) ( x ) form an Appell sequence with respect to the parameter ν . Hence, using (34), we obtain identity (38). Furthermore, from series (37), we have
s n ( ν ) ( x ) = k = 0 n n k ν n k F k ( x ) or s n ( ν ) ( x ) ν n = k = 0 n n k F k ( x ) ν k ( ν 0 ) .
So, using Theorem 2, we obtain identity (39). □
Theorem 8.
Let { s n ( ν ) ( x ) } n 0 be a polynomial sequence with exponential generating series:
s ( ν ) ( x ; t ) = n 0 s n ( ν ) ( x ) t n n ! = e ν t g ( t ) e ( x + λ ν ) f ( t ) ,
where g ( t ) and f ( t ) are given exponential series. Then, for every m , n N , we have the following identities:
k = 0 n n k k m μ k s n k ( ν ) ( x ) = k = 0 m m k n k k ! μ k s n k ( μ + ν ) ( x λ μ ) .
Proof. 
First, from series (40), we have
n 0 k = 0 n n k μ n k s k ( ν ) ( x ) t n n ! = e μ t s ( ν ) ( x ; t ) = = e ( μ + ν ) t g ( t ) e ( x λ μ + λ ( μ + ν ) ) f ( t ) = s ( μ + ν ) ( x λ μ ; t ) ,
that is
k = 0 n n k μ k s k ( ν ) ( x ) = μ n s n ( μ + ν ) ( x λ μ ) .
Consequently, applying Theorem 2 and simplifying, we obtain identity (41). □
  • Examples.
  • The generalized exponential polynomials S n ( ν ) ( x ) [41,42] and generalized Fubini polynomials F n ( ν ) ( x ) have exponential generating series:
    n 0 S n ( ν ) ( x ) t n n ! = e ν t e x ( e t 1 ) and n 0 F n ( ν ) ( x ) t n n ! = e ν t 1 x ( e t 1 ) .
    So, we can apply Theorem 7, obtaining the following identities:
    k = 0 n n k k m μ k S n k ( ν ) ( x ) = k = 0 m n m k n k k ! μ k S n k ( μ + ν ) ( x ) k = 0 n n k k m μ k F n k ( ν ) ( x ) = k = 0 m n m k n k k ! μ k F n k ( μ + ν ) ( x ) ,
    and
    k = 0 n n k k m ν k S n k ( x ) = k = 0 m m k n k k ! ν k S n k ( ν ) ( x ) k = 0 n n k k m ν k F n k ( x ) = k = 0 m m k n k k ! ν k F n k ( ν ) ( x ) ,
    where S n ( x ) = S n ( 0 ) ( x ) and F n ( x ) = F n ( 0 ) ( x ) are the ordinary exponential and Fubini polynomials. In particular, for x = 1 , we obtain generalized Bell numbers b n ( ν ) and generalized Fubini numbers f n ( ν ) . Then, the above two identities become the following:
    k = 0 n n k k m ν k b n k = k = 0 m m k n k k ! ν k b n k ( ν ) k = 0 n n k k m ν k f n k = k = 0 m m k n k k ! ν k f n k ( ν ) .
  • The Tricomi continuants [43] are defined by the exponential generating series
    n 0 T n ( ν ) ( x ) t n n ! = e ν t ( 1 t ) x ν .
    This time, we use the case described in Theorem 8. So,
    k = 0 n n k k m μ k T n k ( ν ) ( x ) = k = 0 m m k n k k ! μ k T n k ( μ + ν ) ( x + μ ) .

6. Riordan and Sheffer-Type Matrices

One of the authors define Riordan-type matrices (or Riordan-type arrays) below, showing that the collocation of all Riordan-type matrices forms a semigroup called the Riordan semigroup, as presented in [44].
Let ( d n , k ) n , k N = ( g , f ) be a Riordan-type array, where g , f F 0 with g ( 0 ) 0 . Then, ( d ˜ n , k ) n , k N = ( g , t f ) is the Riordan array associated with the Riordan-type array, where g , f F 0 with g ( 0 ) 0 . If f 0 0 , ( g , t f ) is a proper Riordan array. Sheffer-type matrices can be defined similarly. In [44] (Theorem 5.2 ), it was shown that different kind of identities can be obtained using Riordan-type matrices based on the umbral identity. Namely, for a given Riordan matrix R = [ r n , k ] n , k 0 = ( g ( t ) , f ( t ) ) , we consider the associated Riordan-type matrices:
R = [ r n , k ] n , k 0 = ( g ( t ) , f ( t ) + 1 ) and R = [ r n , k ] n , k 0 = ( g ( t ) , f ( t ) 1 ) .
Then, for every m , n , s N , there exist the following identities:
k = 0 n n k r s , n k k m = k = 0 m m k n k k ! r s , n k ,
k = 0 n n k ( 1 ) n k r s , n k k m = k = 0 m m k n k ( 1 ) n k k ! r s , n k ,
where s n k . Formulas (42) and (43) can be proven by replacing x with f ( t ) and then multiplying both members by g ( t ) in the umbral identities (23) and (24). After equating the coefficients of t s on both sides of the resulting equations, we obtain the desired solution.
In addition to the example related to Fuss-Catalan numbers shown in [44], we now present more examples of this construction process and will extend the process to Riordan matrices and Sheffer-type matrices in this section.
  • Examples.
  • Consider the following Riordan matrices:
    R = 1 ( 1 t ) α + 1 , t 1 t = n + α n k n , k 0 R = 1 ( 1 t ) α + 1 , 1 1 t = n + α + k n n , k 0 .
    Then, identity (42) becomes the following:
    k = 0 n n k s + α s n + k k m = k = 0 m m k n k s + α + n k s k ! .
    In particular, for α = 0 and s = n , we have
    k = 0 n n k 2 k m = k = 0 m m k n k 2 n k n k k ! .
    Similarly, for α = s = n , we have
    k = 0 n n k 2 n k k m = k = 0 m m k n k 3 n k 2 n k k ! .
    Finally, for α = n and s = 2 n , we have
    k = 0 n n k 3 n n + k k m = k = 0 m m k n k 4 n k 3 n k k ! .
  • Let
    B ( t ) = n 0 2 n n t n = 1 1 4 t , C ( t ) = n 0 C n t n = 1 1 4 t 2 t
    be the generating series for the central binomial coefficients and the Catalan numbers, and consider the Riordan matrix and Riordan-type matrix, respectively:
    R = ( B ( t ) , C ( t ) 1 ) = 2 n n + k n , k 0 , R = ( B ( t ) , C ( t ) ) = 2 n + k n + k n , k 0 .
Then, identity (42) becomes the following:
k = 0 n n k 2 s s + n k k m = k = 0 m m k n k 2 s + n k s + n k k ! .
To avoid using a Riordan-type array in the construction, we establish the following theorem for Riordan matrices.
Theorem 9.
Given a Riordan matrix R = [ r n , k ] n , k 0 = ( g ( t ) , f ( t ) ) , consider the associated Riordan matrices:
R ^ = [ r ^ n , k ] n , k 0 = ( g ( t ) , t ( f ( t ) + 1 ) ) and R ^ = [ r ^ n , k ] n , k 0 = ( g ( t ) , t ( f ( t ) 1 ) ) ,
where both R ^ and R ^ are Riordan arrays. Then, for every m , n , s N , we have the following identities:
k = 0 n n k r s , n k k m = k = 0 m m k n k k ! r ^ s + n k , n k ,
k = 0 n n k ( 1 ) n k r s , n k k m = k = 0 m m k n k ( 1 ) n k k ! r ^ s + n k , n k ,
where s n k .
Proof. 
By replacing x with f ( t ) and then multiply both members by g ( t ) , we may rewrite (23) as follows:
k = 0 n n k k m g ( t ) f ( t ) n k = k = 0 m m k n k k ! 1 t n k g ( t ) ( t ( f ( t ) + 1 ) ) n k ,
and taking the coefficients of t s on both sides of the above equation, we may have
k = 0 n n k r s , n k k m = k = 0 m m k n k k ! r ^ s + n k , n k
for s + n k n k , i.e., s 0 , which is (44). In addition, s 0 implies that s n k because n k . Similarly, we can prove (45). □
  • Example.
Consider the following Riordan matrices:
R = 1 ( 1 t ) α + 1 , t 1 t = n + α n k n , k 0 R ^ = 1 ( 1 t ) α + 1 , t 1 t = n + α n k n , k 0 .
Then, identity (44) becomes the following:
k = 0 n n k s + α s n + k k m = k = 0 m m k n k s + α + n k s k ! .
In particular, for α = 0 and s = n , we have
k = 0 n n k 2 k m = k = 0 m m k n k 2 n k n k k ! .
Similarly, for α = s = n , we have
k = 0 n n k 2 n k k m = k = 0 m m k n k 3 n k 2 n k k ! .
Theorem 9 can be extended to Sheffer-type matrices. Here, Sheffer-type matrices are defined similar to Riordan-type matrices.
Theorem 10.
Given a Sheffer matrix S = [ s n , k ] n , k 0 = ( g ( t ) , f ( t ) ) , consider the associated Sheffer-type matrices:
S = [ s n , k ] n , k 0 = ( g ( t ) , f ( t ) + 1 ) , S = [ s n , k ] n , k 0 = ( g ( t ) , f ( t ) 1 ) .
Then, for every m , n , r N , we have the following identities:
k = 0 n k m k ! s r , n k = k = 0 m n m k s r , n k ,
k = 0 n ( 1 ) n k k m k ! s r , n k = k = 0 m n m k ( 1 ) n k s r , n k .
Proof. 
In umbral identities and (47), we replace x with f ( t ) and then multiply both members by g ( t ) . So, we have
k = 0 n k m k ! g ( t ) f ( t ) n k ( n k ) ! = k = 0 m n m k g ( t ) ( f ( t ) + 1 ) n k ( n k ) ! k = 0 n ( 1 ) n k k m k ! g ( t ) f ( t ) n k ( n k ) ! = k = 0 m n m k ( 1 ) n k g ( t ) ( f ( t ) 1 ) n k ( n k ) ! .
Now, by taking the coefficient of t r r ! in both members (and in both cases), we have identities (46) and (24). □
  • Examples.
  • Consider the following Sheffer matrices:
    S = 1 ( 1 t ) 2 ν , t 1 t = L n , k ( ν ) n , k 0 , S = 1 ( 1 t ) 2 ν , 1 1 t = ( ν + k ) n k ! n , k 0 ,
    where the coefficient L n , k ( ν ) is the generalized Lah number. Then, the umbral identity becomes the following:
    k = 0 n k m k ! L r , n k ( ν ) = k = 0 m n m k ( ν + n k ) r ( n k ) ! .
    In particular, for ν = 0 and ν = 1 , we have the following identities:
    k = 0 n r n k k m k ! = k = 0 m n m k ( n k ) r ( n k ) ! , k = 0 n r + 1 n k + 1 k m k ! = k = 0 m n m k ( n k + 1 ) r ( n k ) ! .
  • Consider the following Sheffer matrices:
    S = ( e ν t , e t ) = ( ν + k ) n k ! n , k 0 , S = ( e ν t , e t 1 ) = S n , k ( ν ) n , k 0 ,
    where the coefficients S n , k ( ν ) are the generalized Stirling numbers of the second kind. Then, identity (24) becomes the following:
    k = 0 n n k ( 1 ) n k k m ( ν + n k ) r = n ! k = 0 m n m k ( 1 ) n k S r , n k ( ν ) .
    In particular, for ν = 0 and ν = 1 , we have the following identities:
    k = 0 n n k ( 1 ) n k k m ( n k ) r = n ! k = 0 m n m k r n k ( 1 ) n k , k = 0 n n k ( 1 ) n k k m ( n k + 1 ) r = n ! k = 0 m n m k r + 1 n k + 1 ( 1 ) n k .

7. q-Analogues

In this section, we will show that it is possible to obtain a q-analogue of the umbral identity (23). First, however, we recall some basic definitions of q-calculus. For every n N , we have the q-natural number [ n ] q = 1 + q + q 2 + + q n 1 and the q-factorial number [ n ] q ! = [ n ] q [ n 1 ] q [ 2 ] q [ 1 ] q . Then, for every n , k N , the q-binomial coefficients (or Gaussian coefficients) are defined by
n k q = [ n ] q ! [ k ] q ! [ n k ] q ! for k = 0 , 1 , , n
and by 0 otherwise. The q-binomial inversion theorem says that for any two sequences { a n } n N and { b n } n N , we have
a n = k = 0 n n k q b k b n = k = 0 n n k q ( 1 ) n k q n k 2 a k .
A q-exponential generating series is a formal series of the following form:
f ( t ) = n 0 f n t n [ n ] q ! .
The q-exponential series is the following series:
E q ( t ) = n 0 t n [ n ] q ! .
q-Hermite polynomials are defined by the following:
H n ( q ; x ) = ( x q 1 ) n = k = 0 n n k q x k ,
and their q-exponential generating series is provided as follows:
H q ( x ; t ) = n 0 H n ( q ; x ) t n [ n ] q ! = E q ( t ) E q ( x ; t ) .
The q-derivative (Jackson’s derivative) D q of a q-exponential generating series f ( t ) = n 0 f n t n [ n ] q ! is defined [45,46] by the formula
D q f ( t ) = f ( q t ) f ( t ) ( q 1 ) t = n 0 f n + 1 t n [ n ] q ! .
In particular, for the exponential series we have D q m E q ( t ) = E q ( t ) .
The operator ϑ q is defined by ϑ q = t D q . Consequently, we have
ϑ q f ( t ) = n 0 [ n ] q f n t n [ n ] q ! ,
and more generally, for every m N ,
ϑ q m f ( t ) = n 0 [ n ] q m f n t n [ n ] q ! .
For this operator, we have the following q-analogue of the Grünert formula:
ϑ q m = k = 0 m m k q q k 2 t k D q k ,
where the coefficients m k q are the q-Stirling numbers of the second kind [47]. These coefficients are defined as the connection constants [48,49] between the ordinary powers x n and the q-falling factorial polynomials x q n ̲ = x ( x [ 1 ] q ) ( x [ 2 ] q ) ( x [ n 1 ] q ) :
x n = k = 0 n n k q x q k ̲ .
Equivalently, they are defined by the following recurrence:
n + 1 k + 1 q = n k q + [ k + 1 ] q n k + 1 q ,
with the initial values n 0 q = δ n , 0 and 0 k q = δ 0 , k .
They can also be expressed explicitly as follows:
n k q = 1 [ k ] q ! q k 2 i = 0 k k i q ( 1 ) i q i 2 [ k i ] q n .
Now, we can prove the q-analogue of the umbral identity (23).
Theorem 11.
For every m , n N , we have the following identity:
k = 0 n n k q [ k ] q m x n k = k = 0 m m k q n k q [ k ] q ! q k 2 ( x q 1 ) n k ,
where the ( x q 1 ) n = H n ( q ; x ) are the q-Hermite polynomials.
Proof. 
From Formulas (50) and (49) and series (48), the q-exponential generating series of the first member of (51) is as follows:
E q ( x ; t ) ϑ q m E q ( t ) = k = 0 m m k q q k 2 t k E q ( t ) E q ( x ; t ) , = k = 0 m m k q q k 2 t k H q ( x ; t ) ,
from which it is straightforward to obtain identity (51). □
  • Examples.
  • For x = 0 , identity (51) reduces to the formula
    [ n ] q m = k = 0 m m k q n k q [ k ] q ! q k 2 .
  • For x = 1 , identity (51) becomes the following:
    k = 0 n n k q [ k ] q m = k = 0 m m k q n k q [ k ] q ! q k 2 G n k ( q ) ,
    where G n ( q ) = k = 0 n n k q are the Galois numbers.
The q-umbral identity (51) implies the following theorem, which is a q-analogous of Theorem 2.
Theorem 12.
Let { A n ( q ) } n 0 and { B n ( q ) } n 0 be two sequences such that
B n ( q ) = k = 0 n n k q A k ( q ) .
Then, for every m , n N , we have
k = 0 n n k q [ k ] q m A n k ( q ) = k = 0 m m k q n k q [ k ] q ! q k 2 B n k ( q ) .
Proof. 
Consider the linear isomorphism φ : R [ q ] [ x ] R [ q ] [ x ] defined on the canonical basis by φ ( x n ) = B n ( q ) . Then, we have
φ ( ( x q 1 ) n ) = k = 0 n n k q φ ( x k ) = k = 0 n n k q A k ( q ) = B n ( q ) .
Finally, by applying φ to the umbral identity (51), we have identity (52). □
  • Examples.
  • The q-Pochhammer symbol ( x ; q ) n and the Gaussian polynomials g n ( q ; x ) are defined by the following:
    ( x ; q ) n = ( 1 x ) ( 1 q x ) ( 1 q 2 x ) ( 1 q n 1 x ) = k = 0 n n k q ( 1 ) k q k 2 x k , g n ( q ; x ) = ( x 1 ) ( x q ) ( x q 2 ) ( x q n 1 ) = k = 0 n n k q ( 1 ) n k q n k 2 x k .
    Hence, using the q-binomial inversion theorem, we have
    k = 0 n n k q ( 1 ) k q k 2 x k = ( x ; q ) n , k = 0 n n k q g k ( q ; x ) = x n ,
    and, consequently, by Theorem (12), we have
    k = 0 n n k q [ k ] q m ( 1 ) n k q n k 2 x n k = k = 0 m m k q n k q [ k ] q ! q k 2 ( x ; q ) n k , k = 0 n n k q [ k ] q m g n k ( q ; x ) = k = 0 m m k q n k q [ k ] q ! q k 2 x n k .
  • The q-derangement numbers [50,51,52,53] are defined by the following formula:
    d n ( q ) = k = 0 n n k q [ n k ] q ! ( 1 ) k q k 2 .
    Equivalently, we have
    k = 0 n n k q d k ( q ) = [ n ] q ! ,
    and so, by Theorem (12), we have
    k = 0 n n k q [ k ] q m d n k ( q ) = [ n ] q ! k = 0 m n m k q q k 2 .
    In particular, if we consider the q-Bell numbers [52,54] defined by
    b n ( q ) = k = 0 n n k q q k 2 ,
    then, from the above identity for m = n , we have
    k = 0 n n k q [ k ] q n d n k ( q ) = [ n ] q ! b n ( q ) .
    In this way, we have the q-Bell numbers expressed in terms of the q-derangement numbers. Notice that similar results have been obtained in [52], where the formulas involve the q-Stirling numbers of the first and second kind:
    k = 0 n n + 1 k + 1 q ( 1 ) k b k ( q ) = d n ( q ) , k = 0 n n + 1 k + 1 q ( 1 ) k d k ( q ) = b n ( q ) .
    Notice also that these q-Bell numbers satisfy [54] the ordinary binomial identity as follows:
    b n + 1 ( q ) = k = 0 n n k q k b k ( q ) .
    This means that in this case, we have to apply Theorem 2:
    k = 0 n n k k m q n k b n k ( q ) = k = 0 m m k n k k ! b n k + 1 ( q ) .
  • For q-harmonic numbers H n ( q ) and q-harmonic numbers of the second kind H ˜ n ( q ) , defined by
    H n ( q ) = k = 1 n 1 [ k ] q and H ˜ n ( q ) = k = 1 n q k [ k ] q ,
    we have the identities (see [34] and [55], respectively)
    k = 1 n n k q ( 1 ) k 1 q k 2 H k ( q ) = 1 [ k ] q k = 1 n n k q ( 1 ) k 1 [ k ] q q k + 1 2 = H ˜ n ( q ) .
    Hence, by Theorem (12), we have
    k = 0 n n k q [ k ] q m ( 1 ) n k 1 q n k 2 H n k ( q ) = k = 0 m m k q n k q [ k ] q ! [ n k ] q q k 2 m < n , k = 0 n 1 n k q ( 1 ) n k 1 [ n k ] q q n k + 1 2 [ k ] q m = k = 0 m m k q n k q [ k ] q ! q k 2 H ˜ n k ( q ) .
We conclude by extending Theorem 3 (for s = 1 ). Recall that a q-Appell sequence [56,57] is a polynomial sequence { a n ( x ) } n N , where a n ( x ) has degree n and D q a n ( x ) = [ n ] q a n 1 ( x ) for every n N . This is equivalent to asking that the sequence { a n ( x ) } n N has q-exponential generating series:
A ( x ; t ) = n 0 a n ( x ) t n [ n ] q ! = g ( t ) E q ( x t ) ,
where g ( t ) = n 0 g n t n [ n ] q ! is a q-exponential series with g 0 0 .
First of all, we have the following result.
Lemma 1.
For any q-Appell sequence { a n ( x ) } n N , we have the following binomial identity:
k = 0 n n k q a k ( x ) = a n ( x q 1 ) .
Proof. 
The q-exponential generating series of the left-hand side of (55) is as follows:
E q ( t ) A ( x ; t ) = g ( t ) E q ( t ) E q ( x t ) = g ( t ) H q ( x ; t ) = n 0 k = 0 n n k q g n k ( x q 1 ) k t n [ n ] q ! = n 0 a n ( x q 1 ) t n [ n ] q ! .
Hence, we have identity (55). □
Now, by applying Theorem 12 and Lemma 1, we have the following q-analogue of the theorem.
Theorem 13.
For any q-Appell sequence { a n ( x ) } n N , we have
k = 0 n n k q [ k ] q m a n k ( x ) = k = 0 m m k q n k q [ k ] q ! q k 2 a n k ( x q 1 ) .
Finally, we have the following q-analogue of Theorem 4.
Theorem 14.
Let { a n ( x ) } n N be a q-Appell sequence with q-exponential generating series (53). Then, we have
k = 0 n n k q [ k ] q m g n k x k = k = 0 m m k q n k q [ k ] q ! q k 2 x k a n k ( x ) .
Proof. 
From series (53), we know that the polynomials a n ( q ) can be written as follows:
a n ( x ) = k = 0 n n k q g n k x k = k = 0 n n k q g k x n k .
Hence, we have
k = 0 n n k q g k x k = x n a n ( x ) .
Then, applying Theorem 12 and simplifying, we obtain identity (56). □
  • Examples.
  • The Gaussian polynomials form a q-Appell sequence as follows:
    g n ( q ; x ) = k = 0 n n k q ( 1 ) n k q n k 2 x k .
    So, by Theorem 14, we have
    k = 0 n n k q ( 1 ) n k q n k 2 [ k ] q m x k = k = 0 m m k q n k q [ k ] q ! q k 2 x k g n k ( ν ) ( q ; x ) .
    In particular, for x = 1 and m = n , we have
    k = 0 n n k q ( 1 ) n k q n k 2 [ k ] q n = [ n ] q ! q n 2 .
  • The generalized q-Bernoulli numbers B n ( ν ) ( q ) and generalized q-Bernoulli polynomials B n ( ν ) ( q ; x ) are defined, respectively, by the q-exponential generating series [57,58]:
    B q ( ν ) ( t ) = n 0 B n ( ν ) ( q ) t n [ n ] q ! = t E q ( t ) 1 ν B q ( ν ) ( x ; t ) = n 0 B n ( ν ) ( q ; x ) t n [ n ] q ! = t E q ( t ) 1 ν E q ( x t ) .
    Then, using Theorem 14, we have
    k = 0 n n k q [ k ] q m B n k ( ν ) ( q ) x k = k = 0 m m k q n k q [ k ] q ! q k 2 x k B n k ( ν ) ( q ; x ) .

Author Contributions

Methodology, E.M.; investigation, T.-X.H.; All authors have read and agreed to the published version of the manuscript.

Funding

This research received no external funding.

Data Availability Statement

No new data were created or analyzed in this study.

Conflicts of Interest

The authors declare no conflicts of interest.

References

  1. Knuth, D.E. Johann Faulhaber and Sums of Powers. Math. Comput. 1993, 61, 277–294. [Google Scholar] [CrossRef]
  2. Edwards, A.W.F. A Quick Route to Sums of Powers. Amer. Math. Monthly 1986, 93, 451–455. [Google Scholar] [CrossRef]
  3. He, T.-X.; Shiue, P.J.-S. Divisibility of the sums of the power of consecutive integers. Notes Number Theory Discret. Math. 2024, 30, 557–574. [Google Scholar] [CrossRef]
  4. Jordan, C. Calculus of Finite Differences; Chelsea: Providence, RI, USA, 1965; Available online: https://www.amazon.com/Calculus-Finite-Differences-Charles-Jordan/dp/1470441004 (accessed on 9 April 2025).
  5. Milne-Thomson, L.M. The Calculus of Finite Differences; Macmillan Inc.: London, UK, 1933; Available online: https://archive.org/details/in.ernet.dli.2015.211803 (accessed on 9 April 2025).
  6. Bourbaki, N. Algèbre; Springer: Berlin/Heidelberg, Germany, 1959; Available online: https://link.springer.com/book/10.1007/978-3-540-35339-3 (accessed on 9 April 2025).
  7. Comtet, L. Advanced Combinatorics; Reidel: Dordrecht, The Netherlands, 1974. [Google Scholar]
  8. Gould, H.W. Combinatorial Identities. Morgantown, W. Va. 1972. Available online: https://www.semanticscholar.org/paper/Combinatorial-Identities%3A-A-Standardized-Set-of-500-Gould/2ecc76e757cd73c08017738406d3ef7866d23283 (accessed on 9 April 2025).
  9. Graham, R.L.; Knuth, D.E.; Partashnik, O. Concrete Mathematics; Addison-Wesley Publishing Company: Reading, MA, USA, 1994. [Google Scholar]
  10. Wilf, H.S. Generatingfunctionology; Academic Press: New York, NY, USA, 1990. [Google Scholar]
  11. Roman, S. The Umbral Calculus; Academic Press: New York, NY, USA, 1984. [Google Scholar]
  12. Munarini, E. Combinatorial identities for Appell polynomials. Appl. Anal. Discrete Math. 2018, 12, 362–388. [Google Scholar] [CrossRef]
  13. Appell, P. Sur une classe de polynômes. Ann. Sci. École Norm. Sup. 1880, 9, 119–144. [Google Scholar] [CrossRef]
  14. Roman, S.M.; Rota, G.-C. The umbral calculus. Adv. Math. 1978, 27, 95–188. [Google Scholar] [CrossRef]
  15. Shapiro, L.W.; Sprugnoli, R.; Barry, P.; Cheon, G.-S.; He, T.-X.; Merlini, D.; Wang, W. The Riordan Group and Applications; Springer: Berlin/Heidelberg, Germany, 2022. [Google Scholar]
  16. Shapiro, L.W.; Getu, S.; Woan, W.J.; Woodson, L. The Riordan group. Discrete Appl. Math. 1991, 34, 229–239. [Google Scholar] [CrossRef]
  17. He, T.-X.; Hsu, L.C.; Shiue, P.J.-S. The Sheffer group and the Riordan group. Discrete Appl. Math. 2007, 155, 1895–1909. [Google Scholar] [CrossRef]
  18. Merlini, D.; Rogers, D.G.; Sprugnoli, R.; Verri, M.C. On some alternative characterizations of Riordan matrices. Can. J. Math. 1997, 49, 301–320. [Google Scholar] [CrossRef]
  19. Rogers, D.G. Pascal triangles, Catalan numbers and renewal matrices. Discret. Math. 1978, 22, 301–310. [Google Scholar] [CrossRef]
  20. He, T.-X.; Sprugnoli, R. Sequence Characterization of Riordan Arrays. Discret. Math. 2009, 309, 3962–3974. [Google Scholar] [CrossRef]
  21. Jean-Louis, C.; Nkwanta, A. Some algebraic structure of the Riordan group. Linear Algebra Appl. 2013, 438, 2018–2035. [Google Scholar] [CrossRef]
  22. Luzón, A.; Morón, M.A.; Prieto-Martinez, L.F. A formula to construct all involutions in Riordan matrix groups. Linear Algebra Appl. 2017, 533, 397–417. [Google Scholar] [CrossRef]
  23. Luzón, A.; Morón, M.A.; Prieto-Martinez, L.F. The group generated by Riordan involutions. Rev. Mat. Complut. 2022, 35, 199–217. [Google Scholar] [CrossRef]
  24. He, T.-X. Matrix characterizations of Riordan matrices. Linear Algebra Appl. 2015, 465, 15–42. [Google Scholar] [CrossRef]
  25. Sheffer, I.M. Some properties of polynomial sets of type zero. Duke Math. J. 1939, 5, 590–622. [Google Scholar] [CrossRef]
  26. Barry, P. Riordan Arrays: A Primer; LOGIC Press: Kilcock, Ireland, 2016. [Google Scholar]
  27. Shapiro, L.W. Bijections and the Riordan group. Theoret. Comput. Sci. 2003, 307, 403–413. [Google Scholar] [CrossRef]
  28. Grunert, J.A. Über die Summirung der Reihen von der Form (0), A1φ(1)x, A2φ(2)x2,…, Anφ(n)xn,…, wo A eine beliebige constante Grösse, An eine beliebige und φ(n) eine ganze rationale algebraische Function der positiven ganzen Zahl n bezeichnet. J. Reine Angew. Math. 1843, 25, 240–279. [Google Scholar]
  29. Gould, H.W. Euler’s formula for nth differences of powers. Amer. Math. Monthly 1978, 85, 450–467. [Google Scholar] [CrossRef]
  30. Munarini, E. A combinatorial interpretation of the generalized Fibonacci numbers. Adv. Appl. Math. 1998, 19, 306–318. [Google Scholar] [CrossRef]
  31. Capparelli, S.; Ferrari, M.M.; Munarini, E.; Salvi, N.Z. A Generalization of the “problème des rencontres”. J. Integer Seq. 2018, 18, 1–26. [Google Scholar]
  32. Ferrari, M.M.; Munarini, E.; Zagaglia Salvi, N. Some combinatorial properties of the generalized derangement numbers. Riv. Math. Univ. Parma (N.S.) 2020, 11, 217–249. [Google Scholar]
  33. Boyadzhiev, K.N. Binomial transform of products. Ars Combin. 2016, 126, 415–434. [Google Scholar]
  34. Wang, X.; Chu, W. Harmonic number sums and q-analogues. Int. J. Comput. Math. Comput. Syst. Theory 2019, 4, 48–56. [Google Scholar] [CrossRef]
  35. Erdélyi, A.; Magnus, W.; Oberhettinger, F.; Tricomi, F. (Eds.) Higher Transcendental Functions; The Bateman Manuscript project; McGraw-Hill: New York, NY, USA, 1953–1955; Volume I–III, Available online: https://authors.library.caltech.edu/records/cnd32-h9x80 (accessed on 9 April 2025).
  36. Ferrari, M.M.; Munarini, E. Decomposition of some Hankel matrices generated by the generalized rencontres polynomials. Linear Algebra Appl. 2019, 567, 180–201. [Google Scholar] [CrossRef]
  37. Genocchi, A. Intorno all’espressione generale de’numeri Bernulliani. Nota. Ann. Sci. Mat. Fis. 1852, 3, 395–405. [Google Scholar]
  38. Horadam, A.F. Genocchi polynomials. In Proceedings of the Fourth International Conference on Fibonacci Numbers and Their Amplications; Kluwer: Dordrecht, The Netherlands, 1991; pp. 145–166. [Google Scholar]
  39. Springer, T.A. Remarks on a combinatorial problem. Nieuw Arch. Wisk. 1971, 19, 30–36. [Google Scholar]
  40. He, T.-X. Methods for the Summation of Series; CRC Press: Boca Raton, FL, USA, 2022. [Google Scholar]
  41. Toscano, L. Una classe di polinomi della matematica attuariale. Riv. Mat. Univ. Parma 1950, 1, 459–470. [Google Scholar]
  42. Toscano, L. Generalizzazioni dei polinomi di Laguerre e dei polinomi attuariali. Riv. Mat. Univ. Parma 1970, 11, 191–226. [Google Scholar]
  43. Munarini, E. Tricomi continuants. Mathematics 2024, 12, 401. [Google Scholar] [CrossRef]
  44. He, T.-X. The multiple Riordan group and the multiple Riordan semigroup. arXiv 2025, arXiv:2504.04049. [Google Scholar]
  45. Jackson, F.H. A basic-sine and cosine with symbolical solutions of certain differential equations. Proc. Edinburgh Math. Soc. 1904, 22, 28–39. [Google Scholar] [CrossRef]
  46. Jackson, F.H. On q-functions and a certain difference operator. Trans. R. Soc. Edin. 1908, 46, 253–281. [Google Scholar] [CrossRef]
  47. Ernst, T. q-Stirling numbers, an umbral approach. Adv. Dyn. Syst. Appl. 2008, 3, 251–282. [Google Scholar]
  48. Comtet, L. Nombres de Stirling généraux et fonctions symétriques. C. R. Acad. Sci. Paris Sér. A-B 1972, 275, A747–A750. [Google Scholar]
  49. D’Antona, O.M.; Munarini, E. A Combinatorial Interpretation of the Connection Constants for Persistent Sequences of Polynomials. Eur. J. Combin. 2005, 26, 1105–1118. [Google Scholar] [CrossRef]
  50. Wachs, M.L. On q-derangement numbers. Proc. Am. Math. Soc. 1989, 106, 273–278. [Google Scholar] [CrossRef]
  51. Chen, W.Y.C.; Rota, G.-C. q-analogs of the inclusion-exclusion principle and permutations with restricted position. Discrete Math. 1992, 104, 7–22. [Google Scholar] [CrossRef]
  52. Munarini, E. q-derangement identities. J. Integer Seq. 2020, 23, 8. [Google Scholar]
  53. Rota, G.-C. The number of partitions of a set. Amer. Math. Monthly 1964, 71, 498–504. [Google Scholar] [CrossRef]
  54. Wagner, C.G. Partition statistics and q-Bell numbers (q = −1). J. Integer. Seq. 2004, 7, 2–3. [Google Scholar]
  55. Van Hamme, L. Advanced problem 6407. Amer. Math. Mon. 1982, 40, 703–704. [Google Scholar]
  56. Al-Salam, W.A. q-Appell polynomials. Ann. Mat. Pura Appl. 1967, 77, 31–45. [Google Scholar] [CrossRef]
  57. Munarini, E. Two-parameter identities for q-Appell polynomials. J. Integer Seq. 2023, 26, 3. [Google Scholar]
  58. Al-Salam, W.A. q-Bernoulli numbers and polynomials. Math. Nachr. 1959, 17, 239–260. [Google Scholar] [CrossRef]
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

He, T.-X.; Munarini, E. Symbolic Methods Applied to a Class of Identities Involving Appell Polynomials and Stirling Numbers. Mathematics 2025, 13, 1732. https://doi.org/10.3390/math13111732

AMA Style

He T-X, Munarini E. Symbolic Methods Applied to a Class of Identities Involving Appell Polynomials and Stirling Numbers. Mathematics. 2025; 13(11):1732. https://doi.org/10.3390/math13111732

Chicago/Turabian Style

He, Tian-Xiao, and Emanuele Munarini. 2025. "Symbolic Methods Applied to a Class of Identities Involving Appell Polynomials and Stirling Numbers" Mathematics 13, no. 11: 1732. https://doi.org/10.3390/math13111732

APA Style

He, T.-X., & Munarini, E. (2025). Symbolic Methods Applied to a Class of Identities Involving Appell Polynomials and Stirling Numbers. Mathematics, 13(11), 1732. https://doi.org/10.3390/math13111732

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop