Normal Criterion Concerning Shared Values

نویسندگان

  • Wei Chen
  • Yingying Zhang
  • Jiwen Zeng
  • Honggen Tian
چکیده

We study normal criterion of meromorphic functions shared values, we obtain the following. Let F be a family of meromorphic functions in a domain D, such that function f ∈ F has zeros of multiplicity at least 2, there exists nonzero complex numbers bf , cf depending on f satisfying i bf/cf is a constant; ii min{σ 0, bf , σ 0, cf , σ bf , cf ≥ m} for some m > 0; iii 1/ck−1 f f ′ k z f z / b f/c k−1 f or 1/ck−1 f f ′ k z f z b f /ck−1 f ⇒ f z bf , then F is normal. These results improve some earlier previous results.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

The value distribution of f + a(f ) and normal families of meromorphic functions

In this paper, we obtain a normal criterion of meromorphic functions concerning shared values. Let D be a domain in C and F be a family of meromorphic functions in D. Let k, n,m ∈ N, n ≥ mk+m+1, and a, b two finite complex numbers with a 6= 0. Suppose that every f ∈ F has all its zeros of multiplicity at least k+ 1 . If f + a(f ) and g + a(g)share the value b IM for every pair of functions (f, ...

متن کامل

Normal families of meromorphic functions sharing values or functions

* Correspondence: jiangyunbo@ss. buaa.edu.cn School of Mathematics and Systems Science and LMIB, Beihang University, Beijing, 100191, People’s Republic of China Abstract In this paper, we investigate the normal families of meromorphic functions concerning shared values and shared analytic functions and prove some normal criteria that generalize or extend some results obtained by Q. C. Zhang, Y....

متن کامل

Construction of a Shared Secret Key Using Continuous Variables ( Full Text Report )

Motivated by recent advances in quantum cryptography with continuous variables, we study the problem of extracting a shared digital secret key from two correlated real values. Alice has access to a real value XA, and Bob to another value XB such that the mutual information I(XA;XB) is nonzero. They wish to convert their values into a shared secret digital information while leaking as little inf...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:
  • J. Applied Mathematics

دوره 2012  شماره 

صفحات  -

تاریخ انتشار 2012