Inmathematics, aniterated function is a function that is obtained bycomposing another function with itself two or several times. The process of repeatedly applying the same function is callediteration. In this process, starting from some initial object, the result of applying a given function is fed again into the function as input, and this process is repeated.
For example, on the image on the right:
Iterated functions are studied incomputer science,fractals,dynamical systems, mathematics andrenormalization group physics.
The formal definition of an iterated function on asetX follows.
LetX be a set andf:X →X be afunction.
Definingfn as then-th iterate off, wheren is a non-negative integer, by:and
whereidX is theidentity function onX and(fg)(x) =f (g(x)) denotesfunction composition. This notation has been traced to andJohn Frederick William Herschel in 1813.[1][2][3][4] Herschel creditedHans Heinrich Bürmann for it, but without giving a specific reference to the work of Bürmann, which remains undiscovered.[5]
Because the notationfn may refer to both iteration (composition) of the functionf orexponentiation of the functionf (the latter is commonly used intrigonometry), some mathematicians[citation needed] choose to use∘ to denote the compositional meaning, writingf∘n(x) for then-th iterate of the functionf(x), as in, for example,f∘3(x) meaningf(f(f(x))). For the same purpose,f[n](x) was used byBenjamin Peirce[6][4][nb 1] whereasAlfred Pringsheim andJules Molk suggestednf(x) instead.[7][4][nb 2]
In general, the following identity holds for all non-negative integersm andn,
This is structurally identical to the property ofexponentiation thataman =am +n.
In general, for arbitrary general (negative, non-integer, etc.) indicesm andn, this relation is called thetranslation functional equation, cf.Schröder's equation andAbel equation. On a logarithmic scale, this reduces to thenesting property ofChebyshev polynomials,Tm(Tn(x)) =Tm n(x), sinceTn(x) = cos(n arccos(x)).
The relation(fm)n(x) = (fn)m(x) =fmn(x) also holds, analogous to the property of exponentiation that(am)n = (an)m =amn.
The sequence of functionsfn is called aPicard sequence,[8][9] named afterCharles Émile Picard.
For a givenx inX, thesequence of valuesfn(x) is called theorbit ofx.
Iffn (x) =fn+m (x) for some integerm > 0, the orbit is called aperiodic orbit. The smallest such value ofm for a givenx is called theperiod of the orbit. The pointx itself is called aperiodic point. Thecycle detection problem in computer science is thealgorithmic problem of finding the first periodic point in an orbit, and the period of the orbit.
Ifx = f(x) for somex inX (that is, the period of the orbit ofx is1), thenx is called afixed point of the iterated sequence. The set of fixed points is often denoted asFix(f). There exist a number offixed-point theorems that guarantee the existence of fixed points in various situations, including theBanach fixed point theorem and theBrouwer fixed point theorem.
There are several techniques forconvergence acceleration of the sequences produced byfixed point iteration.[10] For example, theAitken method applied to an iterated fixed point is known asSteffensen's method, and produces quadratic convergence.
Upon iteration, one may find that there are sets that shrink and converge towards a single point. In such a case, the point that is converged to is known as anattractive fixed point. Conversely, iteration may give the appearance of points diverging away from a single point; this would be the case for anunstable fixed point.[11]
When the points of the orbit converge to one or more limits, the set ofaccumulation points of the orbit is known as thelimit set or theω-limit set.
The ideas of attraction and repulsion generalize similarly; one may categorize iterates intostable sets andunstable sets, according to the behavior of smallneighborhoods under iteration. Also seeinfinite compositions of analytic functions.
Other limiting behaviors are possible; for example,wandering points are points that move away, and never come back even close to where they started.
If one considers the evolution of a density distribution, rather than that of individual point dynamics, then the limiting behavior is given by theinvariant measure. It can be visualized as the behavior of a point-cloud or dust-cloud under repeated iteration. The invariant measure is an eigenstate of the Ruelle-Frobenius-Perron operator ortransfer operator, corresponding to an eigenvalue of 1. Smaller eigenvalues correspond to unstable, decaying states.
In general, because repeated iteration corresponds to a shift, the transfer operator, and its adjoint, theKoopman operator can both be interpreted asshift operators action on ashift space. The theory ofsubshifts of finite type provides general insight into many iterated functions, especially those leading to chaos.
The notionf1/n must be used with care when the equationgn(x) =f(x) has multiple solutions, which is normally the case, as inBabbage's equation of the functional roots of the identity map. For example, forn = 2 andf(x) = 4x − 6, bothg(x) = 6 − 2x andg(x) = 2x − 2 are solutions; so the expressionf 1/2(x) does not denote a unique function, just as numbers have multiple algebraic roots. A trivial root off can always be obtained iff's domain can be extended sufficiently, cf. picture. The roots chosen are normally the ones belonging to the orbit under study.
Fractional iteration of a function can be defined: for instance, ahalf iterate of a functionf is a functiong such thatg(g(x)) =f(x).[12] This functiong(x) can be written using the index notation asf 1/2(x) . Similarly,f 1/3(x) is the function defined such thatf1/3(f1/3(f1/3(x))) =f(x), whilef2/3(x) may be defined as equal tof 1/3(f1/3(x)), and so forth, all based on the principle, mentioned earlier, thatfm ○fn =fm +n. This idea can be generalized so that the iteration countn becomes acontinuous parameter, a sort of continuous "time" of a continuousorbit.[13][14]
In such cases, one refers to the system as aflow (cf. section onconjugacy below.)
If a function is bijective (and so possesses an inverse function), then negative iterates correspond to function inverses and their compositions. For example,f −1(x) is the normal inverse off, whilef −2(x) is the inverse composed with itself, i.e.f −2(x) =f −1(f −1(x)). Fractional negative iterates are defined analogously to fractional positive ones; for example,f −1/2(x) is defined such thatf −1/2(f −1/2(x)) =f −1(x), or, equivalently, such thatf −1/2(f 1/2(x)) =f 0(x) =x.
One of several methods of finding a series formula for fractional iteration, making use of a fixed point, is as follows.[15]
This can be carried on indefinitely, although inefficiently, as the latter terms become increasingly complicated. A more systematic procedure is outlined in the following section onConjugacy.
For example, settingf(x) =Cx +D gives the fixed pointa =D/(1 −C), so the above formula terminates to justwhich is trivial to check.
Find the value of where this is donen times (and possibly the interpolated values whenn is not an integer). We havef(x) =√2x. A fixed point isa =f(2) = 2.
So setx = 1 andfn (1) expanded around the fixed point value of 2 is then an infinite series,which, taking just the first three terms, is correct to the first decimal place whenn is positive. Also seeTetration:fn(1) =n√2. Using the other fixed pointa =f(4) = 4 causes the series to diverge.
Forn = −1, the series computes the inverse function2+lnx/ln 2.
With the functionf(x) =xb, expand around the fixed point 1 to get the serieswhich is simply the Taylor series ofx(bn ) expanded around 1.
Iff andg are two iterated functions, and there exists ahomeomorphismh such thatg =h−1 ○f ○h, thenf andg are said to betopologically conjugate.
Clearly, topological conjugacy is preserved under iteration, asgn = h−1 ○ fn ○h. Thus, if one can solve for one iterated function system, one also has solutions for all topologically conjugate systems. For example, thetent map is topologically conjugate to thelogistic map. As a special case, takingf(x) =x + 1, one has the iteration ofg(x) =h−1(h(x) + 1) as
Making the substitutionx =h−1(y) =ϕ(y) yields
Even in the absence of a strict homeomorphism, near a fixed point, here taken to be atx = 0,f(0) = 0, one may often solve[16]Schröder's equation for a function Ψ, which makesf(x) locally conjugate to a mere dilation,g(x) =f '(0)x, that is
Thus, its iteration orbit, or flow, under suitable provisions (e.g.,f '(0) ≠ 1), amounts to the conjugate of the orbit of the monomial,
wheren in this expression serves as a plain exponent:functional iteration has been reduced to multiplication! Here, however, the exponentn no longer needs be integer or positive, and is a continuous "time" of evolution for the full orbit:[17] themonoid of the Picard sequence (cf.transformation semigroup) has generalized to a fullcontinuous group.[18]
This method (perturbative determination of the principaleigenfunction Ψ, cf.Carleman matrix) is equivalent to the algorithm of the preceding section, albeit, in practice, more powerful and systematic.
If the function is linear and can be described by astochastic matrix, that is, a matrix whose rows or columns sum to one, then the iterated system is known as aMarkov chain.
There aremany chaotic maps. Well-known iterated functions include theMandelbrot set anditerated function systems.
Ernst Schröder,[20] in 1870, worked out special cases of thelogistic map, such as the chaotic casef(x) = 4x(1 −x), so thatΨ(x) = arcsin(√x)2, hencefn(x) = sin(2n arcsin(√x))2.
A nonchaotic case Schröder also illustrated with his method,f(x) = 2x(1 −x), yieldedΨ(x) = −1/2 ln(1 − 2x), and hencefn(x) = −1/2((1 − 2x)2n − 1).
Iff is theaction of a group element on a set, then the iterated function corresponds to afree group.
Most functions do not have explicit generalclosed-form expressions for then-th iterate. The table below lists some[20] that do. Note that all these expressions are valid even for non-integer and negativen, as well as non-negative integern.
(see note) | where: |
(see note) | where: |
(fractional linear transformation)[21] | where: |
(genericAbel equation) | |
(Chebyshev polynomial for integerm) |
Note: these two special cases ofax2 +bx +c are the only cases that have a closed-form solution. Choosingb = 2 = –a andb = 4 = –a, respectively, further reduces them to the nonchaotic and chaotic logistic cases discussed prior to the table.
Some of these examples are related among themselves by simple conjugacies.
Iterated functions can be studied with theArtin–Mazur zeta function and withtransfer operators.
Incomputer science, iterated functions occur as a special case ofrecursive functions, which in turn anchor the study of such broad topics aslambda calculus, or narrower ones, such as thedenotational semantics of computer programs.
Two importantfunctionals can be defined in terms of iterated functions. These aresummation:
and the equivalent product:
Thefunctional derivative of an iterated function is given by the recursive formula:
Iterated functions crop up in the series expansion of combined functions, such asg(f(x)).
Given theiteration velocity, orbeta function (physics),
for thenth iterate of the functionf, we have[22]
For example, for rigid advection, iff(x) =x +t, thenv(x) =t. Consequently,g(x +t) = exp(t ∂/∂x)g(x), action by a plainshift operator.
Conversely, one may specifyf(x) given an arbitraryv(x), through the genericAbel equation discussed above,
where
This is evident by noting that
For continuous iteration indext, then, now written as a subscript, this amounts to Lie's celebrated exponential realization of a continuous group,
The initial flow velocityv suffices to determine the entire flow, given this exponential realization which automatically provides the general solution to thetranslation functional equation,[23]
[…] §473.Iterated logarithms […] We note here the symbolism used byPringsheim andMolk in their jointEncyclopédie article: "2logb a = logb (logb a), …,k+1logb a = logb (klogb a)."[a] […] §533.John Herschel's notation for inverse functions, sin−1 x, tan−1 x, etc., was published by him in thePhilosophical Transactions of London, for the year 1813. He says (p. 10): "This notation cos.−1 e must not be understood to signify 1/cos. e, but what is usually written thus, arc (cos.=e)." He admits that some authors use cos.m A for (cos. A)m, but he justifies his own notation by pointing out that sinced2 x, Δ3 x, Σ2 x meandd x, ΔΔΔ x, ΣΣ x, we ought to write sin.2 x for sin. sin. x, log.3 x for log. log. log. x. Just as we writed−n V=∫n V, we may write similarly sin.−1 x=arc (sin.=x), log.−1 x.=cx. Some years later Herschel explained that in 1813 he usedfn(x),f−n(x), sin.−1 x, etc., "as he then supposed for the first time. The work of a German Analyst,Burmann, has, however, within these few months come to his knowledge, in which the same is explained at a considerably earlier date. He[Burmann], however, does not seem to have noticed the convenience of applying this idea to the inverse functions tan−1, etc., nor does he appear at all aware of the inverse calculus of functions to which it gives rise." Herschel adds, "The symmetry of this notation and above all the new and most extensive views it opens of the nature of analytical operations seem to authorize its universal adoption."[b] […] §535.Persistence of rival notations for inverse function.— […] The use of Herschel's notation underwent a slight change inBenjamin Peirce's books, to remove the chief objection to them; Peirce wrote: "cos[−1] x," "log[−1] x."[c] […] §537.Powers of trigonometric functions.—Three principal notations have been used to denote, say, the square of sin x, namely, (sin x)2, sin x2, sin2 x. The prevailing notation at present is sin2 x, though the first is least likely to be misinterpreted. In the case of sin2 x two interpretations suggest themselves; first, sin x ⋅ sin x; second,[d] sin (sin x). As functions of the last type do not ordinarily present themselves, the danger of misinterpretation is very much less than in case of log2 x, where log x ⋅ log x and log (log x) are of frequent occurrence in analysis. […] The notation sinn x for (sin x)n has been widely used and is now the prevailing one. […](xviii+367+1 pages including 1 addenda page) (NB. ISBN and link for reprint of 2nd edition by Cosimo, Inc., New York, USA, 2013.)
{{cite book}}
: CS1 maint: location missing publisher (link){{cite book}}
: CS1 maint: multiple names: authors list (link)