This article is part of the series Proceedings of the International Congress in Honour of Professor Hari M. Srivastava.

Open Access Research

Compressed lattice sums arising from the Poisson equation

David H Bailey1 and Jonathan M Borwein2*

Author Affiliations

1 Lawrence Berkeley National Laboratory, Berkeley, CA, 94720, USA

2 Centre for Computer Assisted Research Mathematics and Its Applications (CARMA), University of Newcastle, Callaghan, NSW, 2308, Australia

For all author emails, please log on.

Boundary Value Problems 2013, 2013:75  doi:10.1186/1687-2770-2013-75


The electronic version of this article is the complete one and can be found online at: http://www.boundaryvalueproblems.com/content/2013/1/75


Received:4 December 2012
Accepted:15 March 2013
Published:5 April 2013

© 2013 Bailey and Borwein; licensee Springer

This is an Open Access article distributed under the terms of the Creative Commons Attribution License (http://creativecommons.org/licenses/by/2.0), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Abstract

Purpose

In recent years attention has been directed to the problem of solving the Poisson equation, either in engineering scenarios (computational) or in regard to crystal structure (theoretical).

Methods

In (Bailey et al. in J. Phys. A, Math. Theor. 46:115201, 2013, doi:10.1088/1751-8113/46/11/115201) we studied a class of lattice sums that amount to solutions of Poisson’s equation, utilizing some striking connections between these sums and Jacobi ϑ-function values, together with high-precision numerical computations and the PSLQ algorithm to find certain polynomials associated with these sums. We take a similar approach in this study.

Results

We were able to develop new closed forms for certain solutions and to extend such analysis to related lattice sums. We also alluded to results for the compressed sum

ϕ 2 ( x , y , d ) : = 1 π 2 m , n O cos ( π m x ) cos ( π n d y ) m 2 + d n 2 , (1)

where d > 0 , x, y are real numbers and O denotes the odd integers. In this paper we first survey the earlier work and then discuss the sum (1) more completely.

Conclusions

As in the previous study, we find some surprisingly simple closed-form evaluations of these sums. In particular, we find that in some cases these sums are given by 1 / π log A , where A is an algebraic number. These evaluations suggest that a deep theory interconnects all such summations.

PACS Codes: 02.30.Lt, 02.30.Mv, 02.30.Nw, 41.20.Cv.

MSC: 06B99, 35J05, 11Y40.

Keywords:
lattice sums; Poisson equation; experimental mathematics; high-precision computation

1 Background

In [1], we analyzed various generalized lattice sums [2], which have been studied for many years in the mathematical physics community, for example, in [2-4]. More recently interest was triggered by some intriguing research in image processing techniques [5]. These developments have underscored the need to better understand the underlying theory behind both lattice sums and the associated Poisson potential functions.

In recent times, attention was directed to the problem of solving the Poisson equation, either in engineering scenarios (computationally, say for image enhancement) or in regard to crystal structure (theoretically). In [1] we thus studied a class of lattice sums that amount to Poisson solutions, namely the n-dimensional forms

ϕ n ( r 1 , , r n ) = 1 π 2 m 1 , , m n odd e i π ( m 1 r 1 + + m n r n ) m 1 2 + + m n 2 .

By virtue of striking connections with Jacobi ϑ-function values, we were able to develop new closed forms for certain values of the coordinates r k and extend such analysis to similar lattice sums. A primary result was that for rationalx, y, the natural potential ϕ 2 ( x , y ) is 1 π log A whereAis an algebraic number. Various extensions and explicit evaluations were given. We also touched on results for the compressed sum

ϕ 2 ( x , y , d ) : = 1 π 2 m , n O 2 cos ( π m x ) cos ( π n d y ) m 2 + d n 2 . (2)

In this paper we discuss (2) in more detail. More detailed motivation can be found in [1,5].

Such work is made possible by number-theoretical analysis, symbolic computation and experimental mathematics, including extensive numerical computations using up to 25,000-digit arithmetic.

In Section 1.1, we describe, consistent with [5], the underlying equations along with ‘natural’ Madelung constants and relate them to the classical Madelung constants. In Section 1.2, we produce the solutions ϕ n which, especially with n = 2 , provide the central objects of our study. In Section 2.1, we describe rapid methods of evaluating ϕ n and add computational details in Section 2.2. In Section 3.1 we discuss closed forms for ϕ 2 ( x , y ) . In Section 3.2 we discuss closed forms for related sums in two dimensions. This leads to the introduction of theta function formalism in the next two subsections and allows us to resolve much else. In Sections 3.5 and 3.6 we are then able to evaluate compressed potential sums. Finally, we further discuss computational matters in Section 3.7.

1.1 Madelung-type sums

In a recent treatment of ‘natural’ Madelung constants [5], it is pointed out that the Poisson equation for an n-dimensional point-charge source,

2 Φ n ( r ) = δ ( r ) , (3)

gives rise to an electrostatic potential - we call it the bare-charge potential - of the form

Φ n ( r ) = Γ ( n / 2 1 ) 4 π n / 2 1 r n 2 = : C n r n 2 , if  n 2 , (4)

Φ 2 ( r ) = 1 2 π log r = : C 2 log r , (5)

where r : = | r | . Since this Poisson solution generally behaves as r 2 n , the previous work [5] defines a ‘natural’ Madelung constant N n as (here, m : = | m | )

N n : = C n m Z n ( 1 ) 1 m m n 2 , if  n 2 , N 2 : = C 2 m Z n ( 1 ) 1 m log m , (6)

where in cases such as this log sum one must infer an analytic continuation [5], as the literal sum is quite non-convergent. This N n coincides with the classical Madelung constant

M n : = m Z n ( 1 ) 1 m m (7)

only for n = 3 dimensions, in which case N 3 = 1 4 π M 3 . But in all other dimensions there is no obvious ℳ, N relation.

A method for gleaning information about N n is to contemplate the Poisson equation with a crystal charge source, modeled after NaCl (salt) in the sense of alternating lattice charges:

2 ϕ n ( r ) = m Z n ( 1 ) 1 m δ ( m r ) . (8)

Accordingly - based on the Poisson equation (3) - solutions ϕ n can be written in terms of the respective bare-charge functions Φ n as

ϕ n ( r ) = m Z n ( 1 ) 1 m Φ n ( r m ) . (9)

1.2 The crystal solutions ϕ n

In [5] it is argued that a solution to (8) is

ϕ n ( r ) = 1 π 2 m O n k = 1 n cos ( π m k r k ) m 2 , (10)

where O denotes the odd integers (including negative odds). These ϕ n do give the potential within the appropriate n-dimensional crystal, in that ϕ n vanishes on the surface of the cube [ 1 / 2 , 1 / 2 ] n , as is required via symmetry within an NaCl-type crystal of any dimension - thus we have solved the Poisson equation subject to Dirichlet boundary conditions.

To render this representation more explicit and efficient, we could write equivalently

ϕ n ( r ) = 2 n π 2 m 1 , , m n > 0 , odd cos ( π m 1 r 1 ) cos ( π m n r n ) m 1 2 + + m n 2 .

It is also useful that - due to the symmetry inherent in having odd summation indices - we can cavalierly replace the cosine product in (10) with a simple exponential:

ϕ n ( r ) = 1 π 2 m O n e i π m r m 2 . (11)

This follows from the simple observation that exp ( π i m k r k ) = ( cos ( π m k r k ) + i sin ( π m k r k ) ) , so when the latter product is expanded out, the appearance of even a single sin term is annihilating due to the bipolarity of every index m k .

We observe that the convergence of these conditionally convergent sums is by no means obvious, but that results such as [[2], Thm. 8.3 and Thm. 8.5] ensure that

ϕ n ( r , s ) : = 1 π 2 m O n k = 1 n cos ( π m k r k ) m 2 s , (12)

is convergent and analytic with abscissa σ 0 for ( n 1 ) / 4 σ 0 ( n 1 ) / 2 , where Re ( s ) = σ . For the central case herein, summing over increasing spheres is analytic in two dimensions for σ 0 23 / 73 < 1 / 2 and in three dimensions for σ 0 25 / 34 < 1 , but in general the best estimate we have is σ 0 n / 2 1 , so for n 5 , to avoid ambiguity, we work with the analytic continuation of (12) from the region of absolute convergence with σ > n / 2 . Indeed, all our transform methods are effectively doing just that.

2 Methods

2.1 Fast series for ϕ n

From previous work [5] we know a computational series

ϕ n ( r ) = 1 2 π R O n 1 sinh ( π R ( 1 / 2 | r 1 | ) ) k = 1 n 1 cos ( π R k r k + 1 ) R cosh ( π R / 2 ) (13)

suitable for any nonzero vector r [ 1 / 2 , 1 / 2 ] n . The previous work also gives an improvement in the case of n = 2 dimensions, namely the following form for which the logarithmic singularity at the origin has been siphoned off:

ϕ 2 ( x , y ) = 1 4 π log cosh ( π x ) + cos ( π y ) cosh ( π x ) cos ( π y ) 2 π m O + cosh ( π m x ) cos ( π m y ) m ( 1 + e π m ) . (14)

These series, (13) and (14) are valid, respectively, for r 1 , x [ 1 , 1 ] .

For clarification, we give here the ( n = 3 ) -dimensional case of the fast series:

ϕ 3 ( x , y , z ) = 2 π p , q > 0 , odd sinh ( π 2 p 2 + q 2 ( 1 2 | x | ) ) cos ( π p y ) cos ( π q z ) p 2 + q 2 cosh ( π 2 p 2 + q 2 ) . (15)

Though it may not be manifest in this asymmetrical-looking series, it turns out that for any dimension n the ϕ n ( r 1 , , r n ) is invariant under permutations and sign-flips. For example, ϕ 3 ( x , y , z ) = ϕ 3 ( y , z , x ) and so on. It thus behoves the implementor to consider x - which appears only in the first sum of (15) - to be the largest in magnitude of the three coordinates for optimal convergence. A good numerical test case is the exact evaluation ϕ 3 ( 1 / 6 , 1 / 6 , 1 / 6 ) = 3 4 π , which we have confirmed to 500 digits.

2.2 Computational techniques

In this study, we employ an experimental scheme similar to that used in [1], as well as in numerous other studies that have been performed. In particular, we compute the key expressions in this study to very high precision, then use the PSLQ algorithm in an attempt to recognize the computed numerical values in terms of relatively simple, closed-form expressions. Given an n-long input vector ( x i ) of real numbers, the PSLQ algorithm finds a nontrivial set of integer coefficients ( a i ) such that a 1 x 1 + a 2 x 2 + + a n x n = 0 if it exists (to within the tolerance of the numeric system being used).

Numerous experimental evaluations of minimal polynomials satisfied by exp ( 8 π ϕ 2 ( x , y ) ) (the case d = 1 ), and a detailed description of the underlying computational methodology employed to find these evaluations, are presented in [1]. A similar computational scheme was employed in this study to obtain minimal polynomials satisfied by exp ( 8 π d ϕ 2 ( x , d y , d ) ) . For instance, we recover, among a myriad of other evaluations,

ϕ 2 ( 1 3 , 1 3 , 9 ) = 1 24 π log ( 3 + 2 3 9 ) .

This computational scheme is as follows:

1. Given x, y and d, select a conjectured polynomial degree m and a precision level P. We typically set the numeric precision level P somewhat greater than m 2 digits.

2. Compute ϕ 2 ( x , y d , d ) to P-digit precision using formula (47). Evaluate the four theta functions indicated using the very rapidly convergent formulas given in [[6], p.52] or [7].

3. Generate the ( m + 1 ) -long vector ( 1 , α , α 2 , , α m ) , where α = exp ( 8 π d ϕ 2 ( x , y d , d ) ) . Note: we have found that without the eight here, the degree of the resulting polynomial would be eight times as high (but the larger polynomials were in fourth or eighth powers). Given the very rapidly escalating computational cost of higher degrees, many of the results in [1] and herein would not be feasible without this factor.

4. Apply the PSLQ algorithm (we employed the two-level multipair variant of PSLQ for d up to 19, and the three-level multipair variant for d 20 [8]) to find a nontrivial ( m + 1 ) -long integer vector A = ( a 0 , a 1 , a 2 , , a m ) such that a 0 + a 1 α + a 2 α 2 + + a m α m = 0 , if such a vector exists. PSLQ (or one of its variants) either finds a vector A, which then is the vector of coefficients of an integer polynomial satisfied by α (certified to the ‘epsilon’ of the numerical precision used), or else exhausts precision without finding a relation, in which case the algorithm nonetheless provides a lower bound on the Euclidean norm of the coefficients of any possible degree-m integer polynomial A satisfied by α.

5. If no numerically significant relation is found, try again with a larger value of m and correspondingly higher precision. If a relation is found, try with somewhat lower m, until the minimal m is found that produces a numerically significant relation vector A. Here ‘numerically significant’ means that the relation holds to at least 100 digits beyond the level of precision required to discover it. To obtain greater assurance that the polynomial produced by this process is in fact the minimal polynomial for α, use the polynomial factorization facilities in Mathematica or Maple to attempt to factor the resulting polynomial.

3 Results and discussion

3.1 Closed forms for the ϕ 2 potential

Provably we have the following results which were established by factorization of lattice sums after being empirically discovered by the methods described in the next few sections.

Theorem 1 ([1])

We have

ϕ 2 ( 1 / 3 , 1 / 3 ) = 1 8 π log ( 1 + 2 / 3 ) , (16)

ϕ 2 ( 1 / 4 , 1 / 4 ) = 1 4 π log ( 1 + 2 ) , (17)

ϕ 2 ( 1 / 3 , 0 ) = 1 8 π log ( 3 + 2 3 ) . (18)

Using the integer relation method PSLQ [9] to hunt for results of the form

exp ( π ϕ 2 ( x , y ) ) = ? α (19)

for α algebraic, we may obtain and further simplify many results as follows.

Conjecture 2 ([1])

We have discovered and subsequently proven

ϕ 2 ( 1 / 4 , 0 ) = ? 1 4 π log α , where   α + 1 / α 2 = 2 + 1 , ϕ 2 ( 1 / 5 , 1 / 5 ) = ? 1 8 π log ( 3 + 2 5 + 2 5 + 2 5 ) , ϕ 2 ( 1 / 6 , 1 / 6 ) = ? 1 4 π log γ , where   γ + 1 / γ 2 = 3 + 1 , ϕ 2 ( 1 / 3 , 1 / 6 ) = ? 1 4 π log τ , where   τ 1 / τ 2 = ( 2 3 3 ) 1 / 4 , ϕ 2 ( 1 / 8 , 1 / 8 ) = ? 1 4 π log ( 1 + 2 2 2 4 1 ) , ϕ 2 ( 1 / 10 , 1 / 10 ) = ? 1 4 π log μ , where   μ + 1 / μ 2 = 2 + 5 + 5 + 2 5 ,

where the notation = ? indicates that we originally only had experimental (extreme-precision numerical) evidence of an equality.

Such hunts are made entirely practicable by (14). Note that for general x and y we have ϕ 2 ( y , x ) = ϕ 2 ( x , y ) = ϕ 2 ( x , 1 y ) , so we can restrict searches to 1 / 2 > x y > 0 .

Remark 3 (Algebraicity)

In light of our current evidence, we conjectured that for x, y rational,

ϕ 2 ( x , y ) = ? log α π (20)

for α algebraic. Theorem 5 proved this conjecture. We note that Theorem 5 proves that all values should be algebraic but does not, a priori, establish the precise values we have found. This will be addressed in Section 3.4.

3.2 Madelung and ‘jellium’ crystals, and Jacobi ϑ-functions

We have studied

ϕ 2 ( x , y ) : = 1 π 2 a , b O cos ( π a x ) cos ( π b y ) a 2 + b 2 , (21)

as a ‘natural’ potential for n = 2 dimensions in the Madelung problem. There is another interesting series, namely

ψ 2 ( x , y ) : = 1 4 π 2 a , b Z cos ( 2 π a x ) cos ( 2 π b y ) a 2 + b 2 = 1 π 2 a , b E cos ( π a x ) cos ( π b y ) a 2 + b 2 , (22)

where E denotes the even integers.

Now it is explained and illustrated in [5] that this ψ 2 function is the ‘natural’ potential for a classical jellium crystal and relates to Wigner sums [2]. This involves a positive charge at every integer lattice point, in a bath - a jelly - of uniform negative charge density. As such, the ψ functions satisfy a Poisson equation but with different source term [5]. Note, importantly, that ψ 2 satisfies Neumann boundary conditions on the faces of the Delord cube - in contrast with the Dirichlet boundary conditions satisfied in the Madelung case.

Briefly, a fast series for ψ n has been worked out [5] as follows:

ψ n ( r ) = 1 12 + 1 2 r 1 2 1 2 | r 1 | + 2 n 3 π S Z + ( n 1 ) cosh ( π S ( 1 2 | r 1 | ) ) k = 1 n 1 cos ( 2 π S k r k + 1 ) S sinh ( π S ) , (23)

valid on the Delord n-cube, i.e., for r [ 1 / 2 , 1 / 2 ] n .

In the following, we shall also use the general form of the general Jacobi theta functions, defined as in [10] and [[6], Sec. 2.6]:

ϑ 1 ( z , q ) = 2 n = 0 ( 1 ) n q ( n + 1 / 2 ) 2 sin ( ( 2 n + 1 ) z ) , ϑ 2 ( z , q ) = 2 n = 0 q ( n + 1 / 2 ) 2 cos ( ( 2 n + 1 ) z ) , ϑ 3 ( z , q ) = 1 + 2 n = 0 q n 2 cos ( 2 n z ) , ϑ 4 ( z , q ) = 1 + 2 n = 0 ( 1 ) n q n 2 cos ( 2 n z ) . (24)

One useful relation is

ϑ 4 2 ( z , q ) ϑ 4 2 ( 0 , q ) = ϑ 3 2 ( z , q ) ϑ 3 2 ( 0 , q ) ϑ 2 2 ( z , q ) ϑ 2 2 ( 0 , q ) . (25)

3.3 Closed forms for ψ 2 and ϕ 2

Using the series (23) for high-precision numerics, it was discovered (see [[5], Appendix]) that previous lattice-sum literature had concealed a longtime typographical error for certain two-dimensional sums, and that a valid closed form for ψ 2 is actually

ψ 2 ( x , y ) = x 2 2 + 1 4 π log ( Γ ( 1 / 4 ) 8 π Γ ( 3 / 4 ) ) 1 2 π log | ϑ 1 ( π ( i x + y ) , e π ) | . (26)

In the Madelung case, it then became possible to cast ϕ 2 likewise in closed form, namely

ϕ 2 ( x , y ) = 1 4 π log | α ( z ) | , where  α ( z ) : = ϑ 2 2 ( z , q ) ϑ 4 2 ( z , q ) ϑ 1 2 ( z , q ) ϑ 3 2 ( z , q ) (27)

for q : = e π , z : = π 2 ( y + i x ) . (See [5] and [[1], Appendix II] for details.)

Theorem 4 ([1])

For z : = π 2 ( y + i x ) ,

ϕ 2 ( x , y ) = 1 2 π log | ϑ 2 ( z , q ) ϑ 4 ( z , q ) ϑ 1 ( z , q ) ϑ 3 ( z , q ) | = 1 4 π log | 1 λ ( z ) 2 1 1 / λ ( z ) 2 | (28)

and

ψ 2 ( x , y ) = 1 4 π log | 2 μ ( 2 z ) ( 2 λ ( 2 z ) 1 ) | , (29)

where

λ ( z ) : = ϑ 4 2 ( z , e π ) ϑ 3 2 ( z , e π ) = n = 1 ( 1 2 cos ( 2 z ) q 2 n 1 + q 4 n 2 ) 2 ( 1 + 2 cos ( 2 z ) q 2 n 1 + q 4 n 2 ) 2 (30)

and

μ ( z ) : = e π x 2 / 2 ϑ 3 2 ( z , e π ) ϑ 3 2 ( 0 , e π ) = q x 2 / 2 n = 1 ( 1 + 2 cos ( 2 z ) q 2 n 1 + q 4 n 2 ) 2 ( 1 + q 2 n 1 ) 4 (31)

with q : = e π .

We recall the general ϑ-transform giving for all z with Re t > 0

ϑ 3 k ( π z , e t π ) = 1 / t e π z 2 / t ϑ 3 + k ( i π z / t , e π / t ) (32)

for k = 1 , 0 , 1 (while ϑ 1 ( π z , e t π ) = 1 / t e π z 2 / t ϑ 1 ( i π z / t , e π / t ) ). In particular, with t = 1 we derive that

ϑ 3 k ( π ( i x + y ) , e π ) = e π z 2 ϑ 3 + k ( π ( i y x ) , e π ) , (33)

which directly relates | μ ( π ( y + i x ) ) | and | μ ( π ( x + i y ) ) | in (31). Let

κ ( z ) : = ϑ 2 2 ( z , e π ) ϑ 3 2 ( z , e π ) . (34)

Then

κ ( i x + y ) + λ ( i x + y ) = 2 (35)

or 1 2 κ ( i x + y ) = 2 λ ( i x + y ) 1 , and (32) then shows

λ ( i x + y ) = κ ( x + i y ) = 2 λ ( x + i y ) . (36)

Likewise (28) is unchanged on replacing λ by κ. Hence, it is equivalent to (20) to prove that for all z = π 2 ( y + i x ) with x, y rational λ ( z ) in (30) is algebraic.

Theorem 5 (Algebraic values of λ and μ, [1])

For all z = π 2 ( y + i x ) withx, yrational, the values of λ ( z ) and μ ( 2 z ) in (30) are algebraic. It follows that ϕ 2 ( x , y ) = 1 4 π log α withαalgebraic. Similarly, ψ 2 ( x , y ) = 1 4 π log β forβalgebraic.

This type of analysis also works for any singular value τ = d and q = exp ( 2 π i τ ) and so applies to sums with n 2 + d m 2 in the denominator, as we see in the next section.

3.4 Explicit equations for degree 2, 3 and 5

We illustrate the complexity of Ω m ( u , v ) , the algebraic polynomial linking the input and output as we move from u = z to v = m z , by first considering m = 2 and m = 3 .

Example 6 ( λ ( 2 z ) and λ ( 3 z ) )

As described in [1],

λ ( 2 z ) 1 / 2 = 2 3 / 4 ϑ 4 4 ( z , e π ) ϑ 1 4 ( z , e π ) ϑ 3 4 ( z , e π ) + ϑ 1 4 ( z , e π ) , (37)

and so letting τ ( z ) = ϑ 1 2 ( z , e π ) / ϑ 3 2 ( z , e π ) , we obtain

τ ( z ) = 2 λ ( z ) 1 , (38)

λ ( 2 z ) = 2 3 / 2 ( λ 2 ( z ) τ 2 ( z ) 1 + τ 2 ( z ) ) 2 . (39)

Iteration yields Ω 2 n . From this one may recursively compute λ ( z / 2 n ) from λ ( z ) and watch the tower of radicals grow. Correspondingly,

λ ( 3 z ) = 2 ( λ ( 2 z ) λ ( z ) τ ( 2 z ) τ ( z ) ) 2 ( 1 + τ ( 2 z ) τ ( z ) ) 2 λ ( z ) , (40)

where τ ( z ) , τ ( 2 z ) , λ ( 2 z ) are given by (38) and (39). After simplification, we obtain

λ ( 3 z ) = λ ( z ) ( λ 4 ( z ) 6 λ 2 ( z ) + 6 2 λ ( z ) 3 3 λ 4 ( z ) 6 2 λ 3 ( z ) + 6 λ 2 ( z ) 1 ) 2 . (41)

In addition, since we have an algebraic relation α = 1 λ / 2 1 1 / λ / 2 , this allows us computationally to prove the evaluation of ϕ 2 ( x / 2 , y / 2 ) and ϕ 2 ( x / 3 , y / 3 ) once ϕ 2 ( x , y ) is determined as it is for the cases of Theorem 1.

We may perform the same work inductively for d = 2 n + 1 using ( n + 1 ) z ± n z in the known addition formulas for ϑ k [1] to obtain Ω 5 and so on. The inductive step is

λ ( ( 2 n + 1 ) z ) = 2 λ ( z ) ( λ ( ( n + 1 ) z ) λ ( n z ) τ ( ( n + 1 ) z ) τ ( n z ) 1 + τ ( ( n + 1 ) z ) τ ( n z ) ) 2 . (42)

Example 7 (Empirical computation of Ω d )

Given z and u = λ ( z ) , v = λ ( d z ) , we compute u j v k for 0 j J , 0 k K up to degree J, K and look for a relation to precision D. This is a potential candidate for Ω d . If Ω d ( λ ( w ) , λ ( d w ) ) 0 at a precision significantly greater than D and for various choices of w, we can reliably determine Ω d in this way [1].

Example 8

We conclude this subsection by proving the following empirical evaluation:

ϕ 2 ( 1 / 5 , 2 / 5 ) = ? 1 4 π log 5 1 / 4 . (43)

Let w = π 10 ( 1 + 2 i ) so that

ϕ 2 ( 2 / 5 , 1 / 5 ) = log | α ( w ) | 4 π while  ϕ 2 ( 2 / 5 , 1 / 5 ) = log | α ( 2 w ) | 4 π

since ϕ 2 ( 2 / 5 , 4 / 5 ) = ϕ 2 ( 2 / 5 , 1 / 5 ) . We may - with help from a computer algebra system - solve for the stronger requirement that α ( 2 w ) = α ( w ) using Example 6. We obtain

α ( 2 w ) = 2 i 1 5

so that | α ( 2 w ) | = 5 1 / 4 and | α ( w ) | = 5 1 / 4 , as required. To convert this into a proof, we can make an a priori estimate of the degree and length of α ( w ) - using (39), (41) and (42) while λ ( 5 w ) = 1 - and then perform a high precision computation to show no other algebraic number could approximate the answer well enough. The underlying result we appeal to [[6], Exercise 8, p.356] is given next in Theorem 9.

In this particular case, we use P ( α ) = α 4 + 2 α 2 + 5 with = 8 , d = 4 and need to confirm that | P ( α ) | < 5 D / 4 L 3 8 D . A very generous estimate of L < 10 12 and D < 10 3 shows it is enough to check | P ( α ( w ) ) | 10 765 . This is very easy to confirm. Relaxing to L < 10 100 , D < 10 4 requires verifying | P ( α ( w ) ) | 10 7 , 584 . This takes only a little longer.

Recall that the length of a polynomial is the sum of the absolute value of the coefficients.

Theorem 9 (Determining a zero)

SupposePis an integral polynomial of degreeDand lengthL. Suppose thatαis algebraic of degreedand length. Then either P ( α ) = 0 or

| P ( α ) | max { 1 , | α | } D L d 1 D .

Example 10 ( λ ( 5 z ) )

Making explicit the recipe for λ ( 5 z ) , we eventually arrive at

λ ( 5 z ) = λ ( z ) ( λ 4 ( z ) 4 2 λ 3 ( z ) + 14 λ 2 ( z ) 10 2 λ ( z ) + 5 ) 2 ( 5 λ 4 ( z ) 10 2 λ 3 ( z ) + 14 λ 2 ( z ) 4 2 λ ( z ) + 1 ) 2 × ( λ 8 ( z ) + 4 2 λ 7 ( z ) 32 λ 6 ( z ) + 36 2 λ 5 ( z ) 34 λ 4 ( z ) + 4 2 λ 3 ( z ) + 8 λ 2 ( z ) 4 2 λ ( z ) + 1 ) 2 ( λ 8 ( z ) 4 2 λ 7 ( z ) + 8 λ 6 ( z ) + 4 2 λ 5 ( z ) 34 λ 4 ( z ) + 36 2 λ 3 ( z ) 32 λ 2 ( z ) + 4 2 λ ( z ) + 1 ) 2 . (44)

This shows how generous our estimates were in Example 8.

In similar fashion we can now computationally confirm all of the exact evaluations in Conjecture 2 and the like. For example, we know that | α ( π ( 1 / 3 + i / 3 ) ) | = | 1 / α ( π / 2 ( 2 / 3 + 2 i / 3 ) ) | . This solves to produce α ( π / 2 ( 1 / 3 + i / 3 ) ) 2 = 1 + 2 / 3 3 and establishes (16) of Theorem 1. Now Example 6 can be used to produce α ( π / 2 ( 1 / 6 + i / 6 ) ) is as given in Conjecture 2, and so on.

We now turn to our main focus.

3.5 ‘Compressed’ potentials

Yet another solution to the Poisson equation with crystal charge source, for d > 0 , is

ϕ 2 ( x , y , d ) : = 1 π 2 m , n O 2 cos ( π m x ) cos ( π n d y ) m 2 + d n 2 . (45)

This is the potential inside a crystal compressed by 1 / d on the y-axis, in the sense that the Delord-cube now becomes the cuboid { x , y } [ 1 / 2 , 1 / 2 ] × [ 1 / ( 2 d ) , 1 / ( 2 d ) ] . Indeed, ϕ 2 ( x , y , d ) vanishes on the faces of this 2-cuboid (rectangle) for d > 0 and integer. This is technically only a compression when d > 1 .

Along the same lines as the analysis of (13), we can posit a fast series

ϕ 2 ( x , y , d ) = 1 π d R O + sinh ( π R d ( 1 / 2 | x | ) ) cos ( π R d y ) R cosh ( π R d / 2 ) , (46)

valid on the Delord cuboid, i.e., x [ 1 / 2 , 1 / 2 ] , y [ 1 / ( 2 d ) , 1 / ( 2 d ) ] . Moreover, the log-accumulation technique of [[5], Appendix] applied as with Theorem 4 yields the following.

Theorem 11 (ϑ-representation for compressed potential)

We have

ϕ 2 ( x , y , d ) = 1 2 d π log | ϑ 2 ( z , q ) ϑ 4 ( z , q ) ϑ 1 ( z , q ) ϑ 3 ( z , q ) | , (47)

where q : = exp ( π d ) and z : = 1 2 π d ( y + i x ) .

This theorem is consistent with d = 1 in the sense ϕ 2 ( x , y , 1 ) = ϕ 2 ( x , y ) . In addition, for integers a , b 1 , we have

a 2 ϕ 2 ( a x , a y , b 2 a 2 ) : = 1 π 2 m a O , n b O cos ( π m x ) cos ( π n y ) m 2 + n 2 . (48)

We note that there are various trivial evaluations such as ϕ 2 ( x , 1 / 4 , 4 ) = 0 for all x. Moreover, for each positive rational d, there is an analogue of Theorem 5 in which 1 / 2 is replaced by the dth singular value k d [2,6]. Thence, k 2 = 2 1 , k 3 = ( 3 1 ) / 8 , and k 4 = ( 2 1 ) 2 . Precisely, we set

λ d ( z ) : = ϑ 4 2 ( z , exp ( π d ) ) ϑ 3 2 ( z , exp ( π d ) ) , κ d ( z ) : = ϑ 2 2 ( z , exp ( π d ) ) ϑ 3 2 ( z , exp ( π d ) ) , τ d ( z ) : = ϑ 1 2 ( z , exp ( π d ) ) ϑ 3 2 ( z , exp ( π d ) ) (49)

and have (where k d = 1 k d 2 )

k d λ d ( z ) + k d κ d ( z ) = 1 , k d λ d ( z ) k d κ d ( z ) = τ d ( z ) , (50)

(see [[6], Prop. 2.1]). We observe that (47) can be written for all x, y as

ϕ 2 ( x , y , d ) = 1 4 d π log | 1 k d λ d ( z ) 1 k d / λ d ( z ) | , (51)

on appealing to (49) and (50). Hence we may now study λ d exclusively.

Fix an integer m > 1 . The addition formulas for the ϑ’s as given in [[6], Section 2.6]

ϑ 3 ( z + w , q ) ϑ 3 ( z w , q ) ϑ 3 2 ( 0 , q ) = ϑ 3 2 ( z , q ) ϑ 3 2 ( w , q ) + ϑ 1 2 ( z , q ) ϑ 1 2 ( w , q ) , (52)

ϑ 4 ( z + w , q ) ϑ 4 ( z w , q ) ϑ 4 2 ( 0 , q ) = ϑ 4 2 ( z , q ) ϑ 4 2 ( w , q ) ϑ 1 2 ( z , q ) ϑ 1 2 ( w , q ) , (53)

ϑ 1 ( z + w , q ) ϑ 1 ( z w , q ) ϑ 2 ( 0 , q ) ϑ 3 ( 0 , q ) = ϑ 1 ( z , q ) ϑ 4 ( z , q ) ϑ 2 ( w , q ) ϑ 3 ( w , q ) + ϑ 1 ( w , q ) ϑ 4 ( w , q ) ϑ 2 ( z , q ) ϑ 3 ( z , q ) (54)

when replacing z by ( m 1 ) z and w by z, and appealing to (50), allow one recursively to write λ d ( m z ) algebraically in terms of λ d ( z ) . We first give the equation for λ d ( 2 z ) .

Example 12 ( λ d ( 2 z ) )

As for λ ( 2 z ) , which is the case d = 1 , we have analytically

τ d ( z ) = λ d ( z ) k d k d , (55)

λ d ( 2 z ) = k d 3 ( λ d 2 ( z ) τ d 2 ( z ) 1 + τ d 2 ( z ) ) 2 . (56)

This becomes

λ d ( 2 z ) = k d ( 1 + λ d 2 ( z ) 2 λ d ( z ) / k d 1 + λ d 2 ( z ) 2 λ d ( z ) k d ) 2 , (57)

and λ d ( 0 ) = k d .

We turn to λ d ( 3 z ) .

Example 13 ( λ d ( 3 z ) )

As for λ ( 3 z ) , which is the case d = 1 , we have

τ d ( z ) = λ d ( z ) k d k d , τ d ( 2 z ) = λ d ( 2 z ) k d k d , (58)

λ d ( 3 z ) = 1 k d 2 λ d ( z ) ( λ d ( z ) λ d ( 2 z ) τ d ( z ) τ d ( 2 z ) 1 + τ d ( z ) τ d ( 2 z ) ) 2 . (59)

In tandem with (57) this becomes

λ d ( 3 z ) = λ d ( 4 λ d 3 k d 6 λ d 3 k d + λ d 4 k d + 4 λ d k d 2 ) 2 ( 4 λ d 3 + k d 6 λ d 2 k d 3 λ d 4 k d + 4 λ d 3 k d 2 ) 2 (60)

since λ d ( 0 ) = k d .

This can also be determined by using the methods of Example 7 to obtain the algebraic equation linking u = λ d ( z ) and v = λ d ( 3 z ) and then carefully factoring the result - guided by results such as Example 10. It could also have been rigorously proven by the method used for corresponding formula with d = 1 in [1].

We next exhibit several sample compressed-sum evaluations, of which (62) is the most striking.

Theorem 14 (Some explicit compressed sums)

ϕ 2 ( 1 3 , 2 3 , 2 ) = 1 8 2 π log ( 9 6 2 ) , (61)
ϕ 2 ( 1 3 , 3 3 , 3 ) = 1 8 3 π log ( 1 3 ) , (62)
ϕ 2 ( 1 3 , 1 3 , 4 ) = 1 16 π log ( 3 ( 2 + 3 ) ( 2 3 ) 2 ) , (63)
ϕ 2 ( 1 4 , 1 4 , 9 ) = 1 48 π log ( 1 4 ( 3 + 5 3 4 2 ) ( 3 1 ) 3 ( 1 + 2 ) 2 ( 3 2 ) 2 ) . (64)

Proof Let us first sketch a proof of (62). This requires showing α = exp ( 8 π 3 ψ 2 ( 1 3 , 1 / 3 , d ) ) = 1 / 3 . Direct computer algebra using (51) shows that it suffices to prove that λ 3 ( z ) = 1 / 2 + 1 / 6 when z 3 : = π ( 1 / 2 + i 3 / 6 ) . Now (60) becomes

λ 3 ( 3 z ) = λ 3 ( 4 λ 3 3 k 3 6 λ 3 2 k 3 + λ 3 4 k 3 + 4 λ 3 k 3 2 ) 2 ( 4 λ 3 3 + k 3 6 λ 3 2 k 3 3 λ 3 4 k 3 + 4 λ 3 3 k 3 2 ) 2 . (65)

However, 3z is in the compressed lattice generated by 1, i / 3 and so

λ 3 ( 3 z ) { 0 , , k 3 = 3 + 1 2 2 , λ 3 ( i π 3 2 ) = 3 2 3 1 2 2 } .

From this, we may deduce that λ 3 ( z ) is a zero of the denominator of (65), whose only real root is 1 / 2 + 1 / 6 .

To prove (61), we similarly consider (51) and (60) with d = 2 so that k 2 = 2 1 and z 2 : = π ( 1 + i / 2 ) / 3 is in the compressed lattice. Indeed, λ 2 ( 3 z ) = 0 , and we now deduce that

λ 2 ( z ) = 2 + 2 2 + i 10 2 14 2 ,

and the result again follows.

To prove (63) requires an application of this method with d = 4 and x = 1 / 3 and y = 1 / 6 . We likewise may prove (64) (with d = 9 ). In this final case, x = 1 / 4 and y = 1 / 12 . In these cases, we need to appeal to both (59) and (60) at least once. □

In general, the polynomial for α = exp ( 8 π d ψ 2 ( x , y d , d ) ) with x, y rational can be calculated as we describe in the next section.

3.6 Further results for ϕ 2 ( a / c , b / c d , d )

As noted, we anticipated similarly algebraic evaluations for ϕ 2 ( a / c , b / c d , d ) for nonnegative integer values of a, b, c, d. And, as we will show in more examples in the next section, this is indeed true. All such results can, in principle, be rigorously established by the techniques of Example 7 and Example 8 or indeed Theorem 14, but we will not do this. We do however give the first few polynomials, P d , for exp ( 8 π ϕ 2 ( 1 / d , 1 / d , d ) ) , that is, with a = b = 1 , c = d .

Example 15 (Some explicit compressed polynomials for exp ( 8 π d ϕ 2 ( 1 / d , 1 / d , d ) ) )

We present here the polynomials P d when 3 d 9 .

Note that reversing the order of the variables leads to a more intractable computation since ϕ 2 ( 1 / d , 1 / d , d ) is not of the form covered by Theorem 11.

3.7 Computational results

Results that we have obtained for the special set of cases exp ( 8 π d ϕ 2 ( 1 / d , 1 / d , d ) ) , for integers d up to 40, are shown in Table 1. Our computations required up to 25,000-digit precision, and, for large degrees and correspondingly high precision levels, were rather expensive (over 20 processor-hours in some cases). We employed the ARPREC arbitrary precision software [11].

Table 1. PSLQ runs to recover minimal polynomials satisfied by exp ( 8 π d ϕ 2 ( 1 / d , 1 / d , d ) )

The degree m ( d ) of the minimal polynomial for exp ( 8 π d ϕ 2 ( 1 / d , 1 / d , d ) ) , the number of zeroes z ( d ) among the minimal polynomial coefficients, the numeric precision level P, the run time in seconds T, and the approximate base-10 logarithm M of the absolute value of the central coefficient are also shown in the table, together with the ratio ( log 10 M ) / m ( d ) .

We were not able to obtain relations for all cases d 40 . Evidently, the precision levels we employed in these cases ( d = 32 and d = 38 ) were still insufficient to recover the underlying relations; a method to obtain the result for d = 32 is described in Remark 16 - which works well because 32 = 4 × 8 . It is interesting that in this work, as opposed to the ϕ ( x , y ) constants we studied in [1], odd values and prime values of d generally yielded simpler relations than the even instances.

In the earlier study [1], we included Jason Kimberley’s observation that the degree m ( d ) of the minimal polynomial for exp ( 8 π ϕ 2 ( 1 / d , 1 / d ) ) appeared to be given for odd primes by m ( 4 k + 1 ) = ( 2 k ) ( 2 k ) and m ( 4 k + 3 ) = ( 2 k + 2 ) ( 2 k + 1 ) . If one sets m ( 2 ) = 1 / 2 , for notational convenience, then it appears that for any prime factorization of an integer greater than 2,

m ( i = 1 k p i e i ) = ? 4 k 1 i = 1 k p i 2 ( e i 1 ) m ( p i ) . (66)

Unfortunately, we have not yet been able to find a similar formula for the minimal polynomial degree in the compressed cases under study in Table 1. We are actively investigating this at the present time.

With regards to the run times listed in Table 1 (given to 0.01 second accuracy), it should be recognized that like all computer run times, particularly in a multicore or multiprocessor environment, they are only repeatable to two or three significant digits. They are listed here only to emphasize the extremely rapid increase in computational cost as the degree m and corresponding precision level P increase.

Remark 16 (A refined approach)

A referee has suggested making more more explicit the relations with elliptic functions. We had opted to limit the theory needed so as to better understand what experimental computation could produce for a wider audience.

(a) The basic quantity λ ( z ) , which appears in Theorem 4, can be written in terms of the Jacobian elliptic function d n ( z ) [10]. If z = π ( y + i x ) / 2 , and k = k 1 = 1 / 2 as above, then

λ ( z ) = k d n 2 ( y K + i x K ; k 2 ) .

Notice that K = K in this case. All multiplication formulas for λ are then essentially special cases of addition formulas for Jacobian elliptic functions. At least in outline this makes it clear that λ ( z ) is algebraic, since elliptic functions evaluated at rational multiples of the periods are always algebraic with respect to k. In [12] some closely related lattice sums (essentially linear combinations of some of the lattice sums being considered herein) are evaluated in part by such reasoning.

(b) Similarly, for fixed 0 < k < 1 , set

f ( x ) : = 1 c n ( x ; k 2 ) 1 + c n ( x ; k 2 ) , g ( u ) : = 4 u ( 1 + u ) 2 4 k 2 u ( 1 u 2 ) 2 .

Then, in terms of the elliptic function cn[6,10], we can write

ϕ 2 ( x , y , d ) = 1 4 π d log | f ( 2 i K d / d , k d ) | , (67)

and the corresponding duplication formula for f is f ( 2 x ) = g ( f ( x ) ) . Now the value of k 8 and the Landen transform [6] yield

k 32 = 1 1 ( 5 + 4 2 2 14 + 10 2 ) 2 1 + 1 ( 5 + 4 2 2 14 + 10 2 ) 2 ,

[[2], Appendix] which makes the minimal polynomial for k 32 easily expressible

x 8 1 , 800 x 7 12 , 772 x 6 63 , 800 x 5 105 , 402 x 4 63 , 800 x 3 12 , 772 x 2 1 , 800 x + 1 = 0 . (68)

Let θ 32 : = f ( 2 i K 32 / 32 , k 32 ) . Observe, much as in earlier examples, that g ( g ( g ( g ( θ 32 ) ) ) ) = 1 . We may now obtain an algebraic equation relating k 32 , θ 32 by computing g ( g ( g ( g ( u ) ) ) ) while reducing repeatedly using (68); finally, resolvant computations produce the equation for d = 32 that we failed to find in Table 1.

4 Conclusions

In this study, we have obtained some explicit closed-form evaluations of certain summations that arise as solutions of the Poisson equation, which in turn arises in numerous arenas ranging from engineering to studies of crystal structures. Many of these evaluations were first found experimentally by means of a process we have employed in other settings: computing the relevant expressions to high precision, then applying the PSLQ algorithm to recognize the resulting numerical values in closed form. In this case, we computed the constants exp ( 8 π d ϕ 2 ( 1 / d , 1 / d , d ) ) , for various integers d, to a numeric precision of up to 25,000 digits, then found the integer coefficients of a polynomial that is satisfied by the constant up to a tolerance corresponding to the precision level. We then demonstrated a theoretical framework whereby such experimentally discovered relations can, in many cases, be formally proven.

For further details of the computation of lattice sums and related theta functions the reader is referred to [13-22].

Competing interests

Neither author has any personal, financial or other competing interests relevant to the topics studied in this paper.

Authors’ contributions

Both authors participated in the research work. DHB performed many of the numerical computations; JMB did much of the theoretical work.

Acknowledgements

Dedicated to Professor Hari M Srivastava.

The authors thank many colleagues and the referees for fruitful discussions about lattice sums and theta functions. The first author supported in part by the Director, Office of Computational and Technology Research, Division of Mathematical, Information, and Computational Sciences of the U.S. Department of Energy, under contract number DE-AC02-05CH11231. The second author is supported in part by the Australian Research Council.

References

  1. Bailey, DH, Borwein, JM, Crandall, RE, Zucker, IJ: Lattice sums arising from the Poisson equation. J. Phys. A, Math. Theor.. 46, Article ID 115201. doi:10.1088/1751-8113/46/11/115201 (2013)

  2. Borwein, J, Glasser, L, McPhedran, R, Wan, J, Zucker, J: Lattice Sums: Then and Now. Encyclopedia of Mathematics and Its Applications, vol. 150. Cambridge University Press (August 2013, to appear). See also http://www.carma.newcastle.edu.au/jon/LatticeSums/index.html

  3. Kanemitsu, S, Tanigawa, Y, Tsukada, H, Yoshimoto, M: Crystal symmetry viewed as zeta symmetry. In: Aoki T, Kanemitsu S, Nakahara M, Ohno Y (eds.) Zeta Functions, Topology and Quantum Physics, pp. 91–130. Springer, New York (2005) (reprinted 2010)

  4. Kanemitsu, S, Tsukada, H: Crystal symmetry viewed as zeta symmetry II. In: Alladi K, Klauder JR, Rao CR (eds.) The Legacy of Alladi Ramakrishnan in the Mathematical Sciences, pp. 275–292. Springer, New York (2010)

  5. Crandall, R: The Poisson equation and ‘natural’ Madelung constants. Preprint (2012)

  6. Borwein, JM, Borwein, PB: Pi and the AGM, Wiley, New York (1987)

  7. Weisstein, E: Jacobi theta functions. MathWorld, available at http://mathworld.wolfram.com/JacobiThetaFunctions.html

  8. Bailey, DH, Broadhurst, DJ: Parallel integer relation detection: techniques and applications. Math. Comput.. 70(236), 1719–1736 (2000). Publisher Full Text OpenURL

  9. Borwein, JM, Bailey, DH: Mathematics by Experiment: Plausible Reasoning in the 21st Century, AK Peters, Wellesley (2004) 2nd expanded edn. (2008)

  10. Whittaker, ET, Watson, GN: A Course of Modern Analysis, Cambridge University Press, Cambridge (1946)

  11. Bailey, DH, Hida, Y, Li, XS, Thompson, B: ARPREC: An arbitrary precision computation package, Sept 2002, available at http://www.davidhbailey.com/dhbpapers/arprec.pdf. The ARPREC software itself is available at http://crd-legacy.lbl.gov/~dhbailey/mpdist

  12. Berndt, BC, Lamb, G, Rogers, M: Two-dimensional series evaluations via the elliptic functions of Ramanujan and Jacobi. Ramanujan J.. 29(1-3), 185–198 (2012). Publisher Full Text OpenURL

  13. Crandall, R: Unified algorithms for polylogarithms, L-functions, and zeta variants. Algorithmic Reflections: Selected Works, PSIpress, Portland (2011) (Also downloadable at http://www.psipress.com)

  14. Forrester, PJ, Glasser, ML: Some new lattice sums including an exact result for the electrostatic potential within the NaCl lattice. J. Phys. A. 15, 911–914 (1982). Publisher Full Text OpenURL

  15. Glasser, ML: The evaluation of lattice sums. III. Phase modulated sums. J. Math. Phys.. 15(188), 188–189 (1974)

  16. Glasser, ML, Zucker, IJ: Lattice sums. In: Eyring H (ed.) Perspectives in Theoretical Chemistry: Advances and Perspectives, pp. 67–139. Academic Press, New York (1980)

  17. Zucker, IJ: Exact values for some lattice sums in 2, 4, 6 and 8 dimensions. J. Phys. A. 7, 1568–1575 (1974). Publisher Full Text OpenURL

  18. Zucker, IJ: Functional equations for poly-dimensional zeta functions and the evaluation of Madelung constants. J. Phys. A. 9, 499–505 (1976). PubMed Abstract | Publisher Full Text OpenURL

  19. Zucker, IJ: Some infinite series of exponential and hyperbolic functions. SIAM J. Math. Anal.. 15(2), 406–413 (1984). Publisher Full Text OpenURL

  20. Zucker, IJ: A systematic way of converting infinite series into infinite products. J. Phys. A. 20, L13–L17 (1987). Publisher Full Text OpenURL

  21. Zucker, IJ: Further relations amongst infinite series and products: II. The evaluation of three-dimensional lattice sums. J. Phys. A. 23, 117–132 (1990). Publisher Full Text OpenURL

  22. Zucker, IJ, McPhedran, RC: Dirichlet L-series with real and complex characters and their application to solving double sums. Proc. R. Soc. Lond. A. 464, 1405–1422 (2008). Publisher Full Text OpenURL