Digits of rational power sequences

Ioannis Konstantoulas

Abstract

In this note we study the digits of \(\left(\frac{3}{2}\right)^n\xi\) for arbitrary \(\xi>0\) and show that in the dyadic decomposition of \([0,1]\) into \(2^n\) intervals, at least \(\frac{1}{2}\sqrt{n}\) distinct ones contain a limit point of the sequencce. Our methods are combinatorial and exploit the shift-and-add interpretation of the sequence.

1 Introduction

Let \(r_n(\xi) = \left(\frac{3}{2}\right)^n\xi\). The main result states:

Theorem 1. Let \(\xi >0\), \(N\) a natural number greater than \(5\) and \(f_n:= \{r_n(\xi)\}\). Consider the dyadic decomposition of \([0,1]\) up to depth \(N\): \[[0,1] = \bigcup_{i=0}^{N-1} [\frac{i}{2^{N}},\frac{i+1}{2^{N}}].\] At least \(\frac{1}{2}\sqrt{N}\) intervals in this decomposition contain a limit point of \((f_n)\).

We deduce this theorem from a combinatorial statement about words associated to digits of \(r_n\).

Definition 1. For \(l<r\) let \(w_n(l,r)\) denote the block of digits of \(r_n\xi\) starting \(|l|\) places from zero and ending \(|r|\) places away; the signs of \(l\) and \(r\) indicate sides.

We have (suppressing the dependence on \(\xi\)):

Proposition 2. For any window \(w_n(l,r)\) with \(l<r\), at least \(\frac{1}{2}\sqrt{r-l+1}\) of the \(2^{r-l+1}\) possible binary strings appear infinitely often as \(n\rightarrow\infty\).

2 Notation and toolbox

In this section we lay down some notation and describe the auxiliary concepts that will be used to study the sequence \(r_n(\xi)\). We begin with definitions related to binary words.

2.1 Word combinatorics

Definition 3. For \(\xi>0\) define \[r_n(\xi) := \left(\frac{3}{2}\right)^n\cdot \xi;\] in any discussion where \(\xi\) is fixed, we will suppress the dependence on \(\xi\) and simply write \(r_n\).

Definition 4. The digits in the binary expansion of \(r_n(\xi)\) will be labeled as \[r_n(\xi) = \sum_{k=m(n)}^{M(n)} d^n_k(\xi)\,2^k.\] As in the previous definition, we will normally suppress the dependence on \(\xi\).

The operation \(r_{n+1} = (1+1/2)r_n\) produces a carry through the addition \(d^n_k+d^n_{k+1}\). This carry is denoted by \(c^n_k\).

Using the notation we established, we see that the action of \(\frac{3}{2}\cdot\) on digits is \[\label{digit} d^{n+1}_k= d^n_k+d^n_{k+1} + c^n_{k-1} \pmod{2}\] where \(c^n_{k-1}\) is the carry that has come from the previous operation. Observe that the carry produced in this operation is \(1\) precisely when two or more of the three terms in [digit] are \(1\). This fact can be expressed using the relation \[\label{carry} c^n_k = d^n_kd^n_{k+1}+d^n_{k+1}c^n_{k-1}+c^n_{k-1}d^n_k\pmod{2}\] Together, [digit] and [carry] give us the digital evolution of \(r_n\): \[\begin{aligned} d^{n+1}_k &=& L(d^n_k,d^n_{k+1}, c^n_{k-1}) \pmod{2}\\ c^n_k &=& Q(d^n_k,d^n_{k+1}, c^n_{k-1})\pmod{2} \end{aligned}\] where \(L(x,y,z) = x+y+z\) and \(Q(x,y,z) = xy+yz+zx\).

The next concept is that of a window; all our work will take place in windows.

Definition 5. For any \(n\geq 0\) and \(l\leq r\) we define the time-\(n\) \((l,r)\)-window \(w_n(l,r)\) to be the binary string \(d^n_l\cdots d^n_r\). The \((l,r)\)-window of \(r_n(\xi)\), denoted \(w_*(l,r)\), is the sequence of strings \(\left(w_n(l,r)\right)_{n\geq 0}\). The strings corresponding to the left and right tails \[\sum_{k=0}^\infty d^n_{k_0\pm k}\, 2^{k_0\pm k}\] are denoted by \(w_n(\infty,k_0)\) and \(w_n(k_0,\infty)\) respectively.

The transition \(\tau\) in a fixed window.

We will need to refer to the action of multiplication by \((3/2)\) on a window and more generally on strings.

Definition 6. Define \[\tau(w_n(l,r)):=\frac{3}{2}\cdot w_n(l,r) := w_{n+1}(l,r);\] more generally, for a \(k\)-digit string \(s=d_k\cdots d_1\) and two binary digits \((d,c)\) define \(\tau(d,c)(s)\) to be the binary string \(s' = d_k'\cdots d_1'\) where \[d_i' = d_i+d_{i+1} +c_{i-1}\pmod{2}\quad \textrm{for }k\geq i\geq 1\] with \(d_{k+1}=d\) and \(c_0=c\). We will consider binary strings as abstract windows in this context. The \(j\)-th digit of a string \(s\) will be denoted naturally by \(s_j\) in the numbering illustrated above.

The most basic fact about the transition is the following lemma:

Lemma 7. Fix \(k\geq 2\). For any two \(k\)-digit strings \(s\) and \(s'\), there is at most one pair \((d,c)\) such that \(\tau(d,c)(s)=s'\).

Proof. Assume \(\tau(d,c)(s)=s'\); if \(c\) is switched, the least significant digit of the result of the operation changes and cannot agree with that of \(s'\) (since the string has at least two digits, the incoming \(d\) does not affect the least significant one); thus \(c\) cannot be switched. If \(d\) is switched, then since \(c\) is not, the most significant digit will change, again leading to a contradiction. ◻

The next lemma shows aperiodicity of string transitions in a given window of \(r_n(\xi)\):

Lemma 8. For any \(l< r\), the sequence \(w_n(l,r)\) is not eventually periodic.

Proof. Fix \(l<r\). Suppose that for \(n\geq n_0\), the sequence \(w_n(l,r)\) is periodic. By Lemma 7, the pairs \((d,c)_n\) involved in the transition \(\tau(d,c)_n(w_n(l,r))=w_{n+1}(l,r)\) are determined by the sequence, and since this is periodic, so is the sequence \((d,c)_n\). However, the \(d\)-part of the pair \((d,c)_n\) is precisely the most significant digit of \(w_n(l-1,r)\). Therefore the sequence \(w_n(l-1,r)\) is periodic, starting with \(n=n_0\). Continuing this way, we see that for \(n\geq n_0\), the sequence \(w_n(\infty, r)\) is periodic. This contradicts the fact that the position of the most significant digit \(M(n)\) of \(r_n\) is monotonically increasing. ◻

Finally, we need a small lemma on the behavior of the \(k\)-digit strings \(0\bar{1}\) and \(1\bar{0}\).

Lemma 9. Consider a sequence of pairs \((d_n,c_n)\) and denote by \([01^{k-1}]\) the string with \(k\) digits, the most significant equal to \(0\) and all others equal to \(1\). The sequence \(\tau(d_n,c_n)\bar{1}\) has at least \(\lfloor\frac{k}{2}\rfloor-1\) consecutive distinct elements. The same is true for the sequence \([10^{k-1}]\).

Proof. Applying \(\tau(d_n,c_n)[01^{k-1}]\) gives \([?01^{k-3}?]\) where the question marks are unknown and depend on \((d_n,c_n)\). Iterating this we get \[\tau(d_{n+l},c_{n+l})[01^{k-1}] = [?^l01^{k-2l-1}?^l]\] which evidently gives the required number of distinct elements. The same proof works for the other sequence. ◻

2.2 The digraphs \(G_n\)

In this section we give for the abstract window of length \(n\) a digraph \(G_n\) illustrating all possible string transitions under \(\tau\). We will use the word metric of these digraphs and some basic properties for our main combinatorial arguments. Figure 2 shows the underlying graph of \(G_7\).

The graph underlying \(G_7\).

Definition 10. Let \(G_n = (V_n,E_n)\) be the digraph with vertex set \(V_n\) equal to the set of all binary strings of length \(n\) (abstract windows) and such that there is a directed edge \((s,s')\) between two strings \(s\) and \(s'\) if there exists a pair \((d,c)\) such that \(s' = \tau(d,c)(s)\).

Now let us describe some properties of the \(G_n\) that we will need.

Lemma 11. The digraphs \(G_n\) have the following properties:

  1. They are \(4\)-biregular, i.e. each vertex has four out-edges and four in-edges and no multiple directed edges.

  2. There are exactly four vertices with loops.

  3. They are strongly connected, i.e. for any two vertices there is a directed path joining them.

Proof. Assume \(\tau(d,c)(s)=s'\) for two \(k\)-digit strings \(s,s'\). Then \(d,c\) are uniquely determined by this equation by lemma 7, showing that there are no multiple directed edges. From this we also conclude that if \(s\) is given, then different choices for \((d,c)\) lead to different \(s'\), i.e. the out-degree is four.

Now suppose \(s'\) is given. We will show there are precisely four distinct strings \(s\) such that \(\tau(d,c)(s)=s'\). Begin to construct \(s\) by choosing its first two digits \(s_2s_1\) in an arbitrary way. This allows four distinct choices which determine uniquely the rest of the data: for each of these choices there is a unique pair \((d,c)\) and a unique extension \(s_k\cdots s_2s_1\) such that \(\tau(d,c)(s)=s'\). To see this, look at the effect on digits: we need \[s'_1= s_1+s_2+c\] which holds for a unique \(c\); this also determines the carry \(c_1\) to be used in the next operation. The next equation reads \[s'_2=s_2+s_3+c_1\] which uniquely determines \(s_3\) and therefore also \(c_2\), and so on. At the last step we have \(s'_k = s_k+d+c_{k-1}\) which uniquely determines \(d\) (\(s_k\) and \(c_{k-1}\) had been determined at the previous step).

Next we show that precisely four vertices have loops in them. The tactic is the same as above: we want \(\tau(d,c)(s)=s\) for some \((d,c)\); we arbitrarily assign the first two digits of \(s\) and show that the rest of the digits, as well as \(d\) and \(c\), are uniquely determined. The equation gives \(s_1=s_1+s_2+c\) which determines \(c\) . Similarly, at each step we have \[s_j=s_j+s_{j+1} + c_{j-1};\] the carry has been determined by the previous operation, so \(s_{k+1}\) is also uniquely determined. At the final step we have \(s_k = s_k+d+c_{k-1}\) and this determines \(d\).

In order to show that the graphs \(G_k\) are strongly connected, we make use of the metric theory of \(\{r_n(\xi)\}\). We know that for almost every \(\xi>0\), the sequence of fractional parts of \((\frac{3}{2})^n\xi\) is uniformly distributed in \([0,1]\) . In particular, the limit points of the sequence are dense in \([0,1]\). This implies that the string sequence \(w_n(-1,-k)(\xi)\) will see all \(2^k\) possible strings since each string corresponds to one of the \(2^k\) boundaries of dyadic intervals in the canonical dyadic partition of \([0,1)\). Therefore, if we choose \(\xi\) such that the sequence has a dense set of limit points in \([0,1]\), for any \(k\) the string \(w_n(-1,-k)(\xi)\) takes on all \(2^k\) patterns. This sequence is a realization of a directed walk on \(G_k\) that captures all of the vertices, showing strong connectivity of \(G_k\). ◻

3 Lower bounds for patterns in a window

Now we turn to the proof of our main results. We fix arbitrary \(\xi>0\) and an arbitrary window sequence \(w_*:=w_*(l,r)\) with at least two digits, and let \(k=r-l\) be the size of the window. We need the following definitions:

Definition 12. A property of strings in \(w_*\) is said to be persistent if it is true infinitely often in the given sequence. Similarly, a specific binary pattern is persistent if it occurs infinitely often in \(w_*\). Since only finitely many patterns can occur in \(w_*\), eventually all such patterns are persistent.

Definition 13. The natural extension of a window \(w=w_n(l,r)\) is the window \(w_n(l-1,r+2)\) and we denote it \(w^e\). The \(n\)-th iterated extension is denoted \(w^{e(n)}\). The windows \(w_*(l-1,l-1)\) and \(w_*(r+1,r+2)\) together form the extension boundary or just boundary of \(w\). We call the first (single digit) window the front and the second (digital pair) the rear.

Definition 14. A persistent pattern in \(w_*\) is said to trap the boundary if for all large \(n\), the boundary digits are determined by the pattern. A persistent pattern is locked if for all large \(n\), whenever it appears in \(w_n\), \(w_{n+1}\) is uniquely determined. If a persistent pattern has at least two distinct persistent extensions in \(w^e\) we call it free, and if it has at least two persistent extensions in \(w^{e(n)}\) we call it free at spread \(n\).

Note that trapping means the pattern extends uniquely in the lateral direction; locking means the pattern has a unique vertical transition. The interplay between the two is crucial for us.

Lemma 15. For any given \(w_*\) there exists at least one unlocked persistent pattern.

Proof. If all persistent patterns were locked, the sequence \(w_*\) would be eventually periodic, contradicting Lemma 8. ◻

Observe that if a pattern traps the boundary into the digit patterns \(*\underline{\quad}00\) and \(*\underline{\quad}11\) then it is locked; in all four cases the pair \((d,c)\) is determined by the boundary, and thus the transition is determined by the pattern. On the other hand, a pattern can possibly trap a boundary pattern of the forms \(*\underline{\quad}01\) or \(*\underline{\quad}10\) but not be locked; in this latter case the pattern can be free due to the carry.

With these preliminaries, we can give a first uniform lower bound for the number of patterns in any window, and thus get our first quantitative density statement for limit points of \(r_n(\xi)\).

Proposition 16. For any \(k\geq 2\) the minimum number of distinct persistent strings in a window of size \(k\) is bounded below by \(\frac{1}{2}\sqrt{k}\).

Proof. Let \(p_k\) be the minimum number of persistent strings over all windows of size \(k\) (for a fixed \(\xi\); we will give a uniform lower bound for \(p_k\) over \(\xi\)). Start with an arbitrary window \(w_*\) of size \(k_0\geq 2\). We know \(w_*\) is not eventually periodic so \(p_2\geq 2\). Furthermore there exists an unlocked pattern in \(w_*\). If for all windows the pattern is free, then \(p_{k_0+3}\geq p_{k_0} +1\). Otherwise, for some \(w_*\) an unlocked pattern \(P\) must trap one of the boundary forms \(*\underline{\quad}01\) or \(*\underline{\quad}10\) by the remarks above.

Now extend the window one digit to the left and then start extending it by pairs of digits to the right only; at each step either the extended pattern becomes free or it keeps trapping the same form as before: it cannot end on a locked pattern because then the transition would be forced in the extended pattern, and thus also in the original (recall that \(P\) is unlocked but not free). It also cannot switch between the two possible forms because that would lead to a \(00\) or \(11\) pair; these forms determine uniquely the carry to the left and since the leftmost extended digit is also trapped, the enclosed string (and thus the original) has a unique transition contradicting unlockedness.

Thus we end up with the following situation: after \(l\) extensions, we get a pattern of the form \[*P0101\cdots 01 \mbox{ }\textrm{ or }\mbox{ }*P10\cdots 10.\] In both cases, after the transition we end up with a pattern that contains the pattern \(0\overline{1}^{2l-1}\) (i.e. there are at least \(2l-1\) digits equal to \(1\) followed by an inevitable leading \(0\)) or the pattern \(1\overline{0}^{2l-1}\). We claim that the leading zero/one persistently lies within the window \(w_*\), that is \(P\) does not always transit to the pattern \(\overline{1}^k\) or always to \(\overline{0}^k\). This is because \(P\) is unlocked in the first place, so it cannot determine uniquely the transition. To conclude, starting with an arbitrary window \(w_*\) of length \(k_0\) without a free pattern, we found \(l-1\) distinct persistent patterns (by lemma 9) in the extension \(*w_***\cdots**\) of length \(1+k_0+2l\).

Now suppose every string of length \(k_0\) has at least \(l_0>1\) distinct persistent strings. Applying the above to \(l=l_0+2\) we have shown that every string of length \(k_1=k_0+2l_0+5\) has at least \(l_1=l_0+1\) distinct persistent strings (either by at least one of the \(l_0\) strings freely extending to two distinct ones before we reach \(k_0+2l_0+5\), or by the trapped string argument), and we can iterate this procedure to show that \(k_n = k_{n-1}+2l_{n-1}+5\) length strings have at least \(l_n = l_{n-1}+1\) distinct strings. Setting \(k_0=2\), \(l_0=2\), and solving the congruence, we see that \(p_{(n+2)^2-2}\geq n+2\). To simplify, by monotonicity \(p_{(n+2)^2}\geq n+2\) so \(p_{n^2}\geq n\) for \(n\geq 2\). Further interpolating, we get the result. ◻

As a corollary of this proposition (applied to \(w_n(1,r)\) for arbitrary \(r\)) we get the infinitude of limit points in the quantitative manner claimed in Theorem 1.