Accepted Manuscript Piecewise shooting reproducing kernel method for linear singularly perturbed boundary value problems F.Z. Geng, Z.Q. Tang PII: DOI: Reference:
S0893-9659(16)30176-8 http://dx.doi.org/10.1016/j.aml.2016.06.009 AML 5029
To appear in:
Applied Mathematics Letters
Received date: 9 May 2016 Revised date: 10 June 2016 Accepted date: 10 June 2016 Please cite this article as: F.Z. Geng, Z.Q. Tang, Piecewise shooting reproducing kernel method for linear singularly perturbed boundary value problems, Appl. Math. Lett. (2016), http://dx.doi.org/10.1016/j.aml.2016.06.009 This is a PDF file of an unedited manuscript that has been accepted for publication. As a service to our customers we are providing this early version of the manuscript. The manuscript will undergo copyediting, typesetting, and review of the resulting proof before it is published in its final form. Please note that during the production process errors may be discovered which could affect the content, and all legal disclaimers that apply to the journal pertain.
*Manuscript Click here to view linked References
Piecewise shooting reproducing kernel method for linear singularly perturbed boundary value problems F.Z. Geng ∗ Z.Q. Tang Department of Mathematics, Changshu Institute of Technology, Changshu, Jiangsu 215500, China.
Abstract In this letter, a new numerical method is proposed for solving second order linear singularly perturbed boundary value problems with left layers. Firstly a piecewise reproducing kernel method is proposed for second order linear singularly perturbed initial value problems. By combining the method and the shooting method, an effective numerical method is then proposed for solving second order linear singularly perturbed boundary value problems. Two numerical examples are used to show the effectiveness of the present method. Keywords: Reproducing kernel method; singularly perturbed problems; boundary value problems; shooting method
1
Introduction Consider a class of linear singular perturbation problems of the form εu′′ (x) + a(x)u′ (x) + b(x)u(x) = g(x), 0 < x < 1, u(0) = α0 , u(1) = α1 ,
(1.1)
where 0 < ε ≪ 1, a(x), b(x) and g(x) are assumed to be sufficiently smooth, and such that (1.1) has a unique solution.
Furthermore, we assume that a(x) ≥ α > 0, α is constant. The above assumption implies that the boundary layer of
the solution to (1.1) will be in the neighborhood of x = 0.
Based on the reproducing kernel theory, a method called the reproducing kernel method (RKM) was developed by Cui, Geng et al. [1,2]. The method has been widely applied to many fields[3-25]. However, the direct application of the RKM to the singularly perturbed problems can not produce accurate numerical solution due to the character of boundary layers. Recently, based on the proposed RKM, some effective numerical methods has been proposed for solving singularly perturbed turning point problems having twin boundary layers, singularly perturbed turning point problems with an interior layer and singularly perturbed delay initial and boundary value problems[20-25]. The rest of the paper is organized as follows. In the next Section, the numerical method for solving (1.1) is introduced. The piecewise reproducing kernel method is proposed for second order linear singularly perturbed initial ∗ Corresponding
author
E-mail:
[email protected](F.Geng);
[email protected](Z.Q. Tang).
1
2
F.Z. Geng
value problems in Section 3. The numerical examples are provided in Section 4. Section 5 ends this paper with a brief conclusion.
2
Method for singularly perturbed boundary value problem (1.1) Due to the existence of boundary layers, we hope to solve (1.1) by using the RKM in a piecewise fashion. However,
it is difficult to solve (1.1)directly in this way. Since it is possible to solve singularly perturbed initial value problems by piecewise reproducing kernel method, by the idea of shooting method, one natural way to attack (1.1) is to solve the related singularly perturbed initial value problem with a guess as to the appropriate initial value. Consider the following two singularly perturbed initial value problem related to (1.1) εv ′′ (x) + a(x)v ′ (x) + b(x)v(x) = g(x), 0 < x < 1, v(0) = α , v ′ (0) = z . 0
and
(2.1)
1
εw′′ (x) + a(x)w′ (x) + b(x)w(x) = g(x), 0 < x < 1, w(0) = α , w′ (0) = z . 0
(2.2)
2
Suppose we have solved (2.1) and (2.2) and obtained their solutions v(x), w(x) respectively. Now we form a linear combination of v(x) and w(x) : u(x) = λv(x) + (1 − λ)w(x),
(2.3)
where λ is a parameter to be determined. Clearly, u(x) solves equation (1.1) and meets the first of two boundary conditions, that is, u(0) = α0 . Selecting λ so that u(1) = α1 , we have u(1) = λv(1) + (1 − λ)w(1) = α1 and λ=
α1 − w(1) . v(1) − w(1)
(2.4)
Theorem 2.1. If problem (1.1) has a solution, then either v(x) itself is a solution or v(1) − w(1) 6= 0 (u(x) is a solution).
Proof. Let y0 (x), y1 (x) and y2 (x) be solutions of the following initial value problems, respectively εy ′′ (x) + a(x)y ′ (x) + b(x)y (x) = g(x), 0 < x < 1, 0 0 0 y (0) = α , y ′ (0) = 0, 0
0
εy ′′ (x) + a(x)y ′ (x) + b(x)y (x) = 0, 0 < x < 1, 1 1 1 y (0) = 1, y ′ (0) = 0, 1
(2.5)
0
1
(2.6)
3
F.Z. Geng
and εy ′′ (x) + a(x)y ′ (x) + b(x)y (x) = 0, 0 < x < 1, 2 2 2 y (0) = 0, y ′ (0) = 1, 2
(2.7)
2
It is easy to see that the general solution of equation (1.1) is
y0 (x) + c1 y1 (x) + c2 y2 (x),
(2.8)
where c1 and c2 are arbitrary constants. Naturally, the functions v(x) and w(x) in (2.1) and (2.2) respectively are given by v(x) = y0 (x) + z1 y2 (x), w(x) = y0 (x) + z2 y2 (x),
(2.9)
in which z1 and z2 are arbitrary constants. Under the assumption that equation (1.1) has a solution, c1 and c2 exist such that y0 (0) + c1 y1 (0) + c2 y2 (0) = α0
(2.10)
y0 (1) + c1 y1 (1) + c2 y2 (1) = α1 .
(2.11)
and
From (2.10), we get c1 = 0, and (2.11) reduces to y0 (1) + c2 y2 (1) = α1 .
(2.12)
If v(1) − w(1) 6= 0, then the function u(x) in (2.3) is the solution of (1.1). If v(1) − w(1) = 0, then equation (2.9) yields y2 (1) = 0. From (2.12), it follows that y0 (1) = α1 , that is, v(1) = α1 , therefore, v(x) is a solution of (1.1).
Denote by V (x) and W (x) the approximate solutions of (2.1) and (2.2) respectively. We will obtain them by using the piecewise reproducing kernel method which will be introduced in the next section. Furthermore, we can obtain the approximate solution of singularly perturbed boundary value problem (1.1) by U (x) = λV (x) + (1 − λ)W (x),
(2.13)
where λ=
α1 − W (1) . V (1) − W (1)
(2.14)
4
F.Z. Geng
3
Piecewise reproducing kernel method for second order singularly perturbed initial value problems In this section, we illustrate the piecewise reproducing kernel method for singularly perturbed initial value problems
by solving (2.1). Firstly, we introduce the usual reproducing kernel space W n [a, b], (n ≥ 3) with the reproducing kernel
in the form of piecewise polynomial.
Definition 3.1. W n [a, b] = {u(x) | u(n−1) (x) is an absolutely continuous real value function, u(n) (x) ∈ L2 [a, b], u(a) = 0, u′ (a) = 0}. The inner product and norm in this space are defined as (u, v)n =
n−1 X
u (a)v (a) + (i)
(i)
k u kn =
b
u(n) (x)v (n) (x)dx
a
i=0
and
Z
p (u, u)n , u, v ∈ W n [a, b].
Theorem 3.1. W n [a, b] is a reproducing kernel space and its reproducing kernel is k (x, y), y ≤ x, 1 k(x, y) = k (y, x), y > x. 1
(3.1)
1 Especially for n = 3, k1 (x, y) = − 120 (a−y)2 (6a3 −3a2 (5x+y +10)+2a(5x2 +5x(y +6)−y 2 )−10x2 (y +3)+5xy 2 −y 3 ).
For the proof, please refer to [1,2]. Now we solve second order singularly perturbed initial value problem (2.1) by using the RKM in a piecewise fashion. We first divide [0, 1] into M subintervals [xj , xj+1 ], j = 0, 1, · · ·, M − 1, with x0 = 0 and xM = 1. Denote by hi the
length of the ith subinterval, i.e. hi = |xi − xi−1 |. Then we get the approximate solutions on every interval [xi−1 , xi ] by using the RKM.
On subinterval [x0 , x1 ], (2.1) is reduced to εu′′ (x) + a(x)u′ (x) + b(x)u(x) = g(x), x ∈ [x0 , x1 ], u(0) = α , u′ (0) = z . 0
(3.2)
1
Solving (2.2) by the RKM and taking N + 1 equidistant nodes on interval [t0 , t1 ], we obtain the approximate solution v1,N (x) of (2.1) on [x0 , x1 ]. Becausev1,N (x) and its derivative converge uniformly to the exact solution of (3.1) and its derivative, v1,N (t) can provide an effective approximate value of u(x1 ), u′ (x1 ). On subinterval [x1 , x2 ], the approximate form of (2.1) is εu′′ (x) + a(x)u′ (x) + b(x)u(x) = g(x), x ∈ [x , x ], 1 2 u(x ) = v (x ), u′ (x ) = v ′ (x ). 1
1,N
1
1
1,N
1
(3.3)
5
F.Z. Geng
We can also obtain the approximate solution v2,N (t) of (2.1) on the second subinterval [x1 , x2 ] by using the RKM. In the same manner, on subinterval [xi , xi+1 ](i ≥ 2), (2.1) is approximated by εu′′ (x) + a(x)u′ (x) + b(x)u(x) = g(x), x ∈ [x , x ], 1 2 u(x ) = v (x ), u′ (x ) = v ′ (x ). i
i,N
i
i
i,N
(3.4)
i
It is easy to obtain the approximate solution vi+1,N (t) of (2.1) on the subinterval [xi , xi+1 ] by using the RKM. After obtaining the approximate solutions of all subintervals [xi−1 , xi ], i = 1, 2, . . . , M , these solutions are combined to obtain the approximate solution V (x) of (2.1) on the entire interval [0, 1]. Clearly, V (x) is continuously differentiable on [0, 1]. Similarly, we can obtain the approximate solution W (x) of (2.2).
4
Error analysis
Theorem 4.1. If V (x), W (x) are obtained by using the RKM in space W 4 , then there exists a positive constant d such that k V (x) − v(x) k∞ = max |v(x) − V (x)| ≤ d h2 , k W (x) − w(x) k∞ = max |w(x) − W (x)| ≤ d h2 , x∈[0,1]
where d is a positive constant and h =
x∈[0,1]
max{ hN1 , hN2 , . . . , hNM
}.
Proof. For the proof, please refer to [4]. Theorem 4.2. If U (x) are obtained by using the RKM in space W 4 , then the error between approximate solution U (x) and exact solution u(x) satisfies k U (x) − u(x) k∞ ≤ d h2 . Proof. From (2.4) and (2.14), one obtains α1 −W (1) V (1)−W (1) | (1)]+W (1)v(1)−w(1)V (1) | | α1 [V (1)−v(1)+w(1)−W [v(1)−w(1)][V (1)−W (1)] (1)v(1)−W (1)V (1)+W (1)V (1)−w(1)V (1) | | α1 [V (1)−v(1)+w(1)−W (1)]+W [v(1)−w(1)][V (1)−W (1)] |α1 |(|V (1)−v(1)|+|w(1)−W (1)|)+|W (1)||v(1)−V (1)|+|W (1)−w(1)||V (1)| . |[v(1)−w(1)][V (1)−W (1)]|
α1 −w(1) |λ − λ| = | v(1)−w(1) −
=
= ≤
(4.1)
Applying Theorem 4.1 to (4.1), there exists a positive constant d2 such that |λ − λ| ≤ d2 h2 .
(4.2)
From (2.3) and (2.13), it follows that k U (x) − u(x) k∞
=k λV (x) − λv(x) + (1 − λ)W (x) − (1 − λ)w(x) k∞
=k λV (x) − λV (x) + λV (x) − λv(x) + (1 − λ)W (x) − (1 − λ)w(x)+ (1 − λ)w(x) − (1 − λ)w(x) k∞
≤k (λ − λ)V (x) k∞ + k λ(V (x) − v(x)) k∞ + k (1 − λ)(W (x) − w(x)) k∞ + k (λ − λ)w(x) k∞ .
(4.3)
6
F.Z. Geng
Combination of theorem 4.1 and (4.2) yields k U (x) − u(x) k∞ ≤ d3 h2 , where d3 is a positive constant.
5
Numerical examples
Example 4.1 Consider the following singular perturbation problem from fluid dynamics for fluid of small viscosity [20,26] εu′′ (x) + u′ (x) = 1 + 2x, 0 ≤ x < 1, u(0) = 0, u(1) = 1. −x ε
) It is easy to see that its exact solution is u(x) = x(x + 1 − 2ε) + (2ε−1)(1−e . Using the present method, taking 1 1−e− ε 0.2ε, i ≤ 100, M = 200, N = 80. The numerical results using the present method (PM) are compared hi = 1−20ε , i > 100, 100
with [20,26] in Tables 1 and 2 for ε = 10−3 , 10−4 . The absolute error between the approximate solution and exact
solution for ε = 10−6 is shown in Figure 1.
Table 1: Numerical results of Example 4.1 for ε = 10−3 . Nodes
Exact solution
u(x) [26]
u(x)[20]
Present method
0.000
0.000000
0.000000
0.000000
0.000000
0.001
-0.629857
-0.631119
-0.629684
-0.629852
0.010
-0.987874
-0.989854
-0.987496
-0.987875
0.030
-0.967160
-0.969100
-0.966866
-0.967160
0.100
-0.888200
-0.890000
-0.887957
-0.888200
0.300
-0.608600
-0.610000
-0.608408
-0.608600
0.500
-0.249000
-0.250000
-0.248848
-0.249000
0.700
0.190600
0.190000
0.190706
0.190600
0.900
0.710200
0.709999
0.710243
0.710200
1.000
1.000000
1.000000
1.000000
1.000000
Example 4.2 Consider the following singular perturbation problem[26] εu′′ (x) + (1 − x )u′ (x) − 1 u(x) = 0, 0 ≤ x < 1, 2 2 u(0) = 0, u(1) = 1.
It is easy to see that its exact solution is u(x) =
1 1 2−x − 2 e
2 x− x − ε4
0.2ε, i ≤ 100, . Using the present method, taking hi = 1−20ε , i > 100, 100
7
F.Z. Geng
Table 2: Numerical results of Example 4.1 for ε = 10−4 . Nodes
Exact solution
u(x) [26]
u(x)[20]
Present method
0.0000
0.000000
0.000000
0.000000
0.000000
0.0001
-0.631894
-0.632020
-0.633487
-0.631888
0.0010
-0.998753
-0.998953
-0.997079
-0.998754
0.0030
-0.996791
-0.996991
-0.995239
-0.996792
0.1000
-0.889820
-0.890000
-0.888582
-0.889820
0.3000
-0.609860
-0.610000
-0.608887
-0.889820
0.5000
-0.249900
-0.250000
-0.249165
-0.249900
0.7000
0.190060
0.190000
0.190538
0.190060
0.9000
0.710019
0.709999
0.710201
0.710019
1.0000
1.000000
1.000000
1.000000
1.000000
M = 200, N = 80. The numerical results using the present method (PM) are compared with [26] in Table 3 for ε = 10−3 . The absolute error between the approximate solution and exact solution for ε = 10−6 is shown in Figure 2. Table 3: Numerical results of Example 4.1 for ε = 10−3 .
5
Nodes
Exact solution
u(x) [26]
Present method
0.000
0.000000
0.000000
0.000000
0.001
0.3163104
0.3162644
0.3163075
0.010
0.5024899
0.5024893
0.5024898
0.020
0.5050505
0.5050505
0.5050505
0.100
0.5263158
0.5263158
0.5263158
0.300
0.5882353
0.5882353
0.5882353
0.500
0.6666667
0.6666667
0.6666667
0.700
0.7692308
0.7692308
0.7692308
0.900
0.9090909
0.9090909
0.9090909
1.000
1.000000
1.000000
1.000000
Conclusion In this paper, combining the shooting method and piecewise RKM, a new effective method is proposed for solving
singularly perturbed boundary value problems. The comparison of numerical results show that the present method can produce good approximations. Acknowledgments The work was supported by the National Natural Science Foundation of China (No.11201041, No. 11026200), the Special Funds of the National Natural Science Foundation of China (No. 11141003) and Qing Lan Project of Jiangsu
F.Z. Geng
8
Province.
References [1] F.Z. Geng, M.G. Cui, Solving a nonlinear system of second order boundary value problems, J. Math. Anal. Appl. 327(2007)1167-1181. [2] M.G. Cui, Y.Z. Lin, Nonlinear Numerical Analysis in Reproducing Kernel Space, Nova Science Pub Inc, 2009. [3] F.Z. Geng, A numerical algorithm for nonlinear multi-point boundary value problems, J. Comput. Appl. Math. 236 (2012) 1789-1794. [4] X.Y. Li, B.Y. Wu, Error estimation for the reproducing kernel method to solve linear boundary value problems, J. Comput. Appl. Math. 243 (2013) 10-15. [5] X.Y. Li, B.Y. Wu, A continuous method for nonlocal functional differential equations with delayed or advanced arguments, J. Math. Anal. Appl. 409 (2014) 485-493. [6] X.Y. Li, B.Y. Wu, A numerical method for solving distributed order diffusion equations, Appl. Math. Lett. 53(2016)92-99. [7] W.Y. Wang, M. Yamamoto, B. Han, Numerical method in reproducing kernel space for an inverse source problem for the fractional diffusion equation, Inverse Problems 29(2013) 1-15. [8] W.Y. Wang, B. Han, M. Yamamoto, Inverse heat problem of determining time-dependent source parameter in reproducing kernel space, Nonlin. Ana. Real World Appl. 14 (2013) 875-887. [9] Y. Wang, L. Su, X. Cao, X. Li, Using reproducing kernel for solving a class of singularly perturbed problems, Comput. Math. Appl. 61 (2011) 421-430. [10] W. Jiang, Y.Z. Lin, Representation of exact solution for the time-fractional telegraph equation in the reproducing kernel space, Commun. Nonlinear Sci. Numer. Simulat. 16 (2011) 3639-3645. [11] B.B. Guo, W. Jiang, T. Tian, Numerical Application for Volterra’s Population Growth Model with Fractional Order by the Modified Reproducing Kernel Method, J. Comput. Complex. Appl., 1 (2015),1-9. [12] M. Inc, A. Akg¨ ul, Numerical solution of seventh-order boundary value problems by a novel method, Abstr. Appl. Anal. 2014(2014)1-9. [13] M. Mohammadi, R. Mokhtari, Solving the generalized regularized long wave equation on the basis of a reproducing kernel space, J. Comput. Appl. Math. 235(2011) 4003-4014. [14] O.A. Arqub, M. Al-Smadi, N. Shawagfeh, Solving Fredholm integroCdifferentialequations using reproducing kernel Hilbert space method, Appl. Math. Comput. 219 (2013)8938-8948. [15] O. Abu Arqub, Adaptation of reproducing kernel algorithm for solving fuzzy Fredholm–Volterra integrodifferential equations, Neural Computing and Applications (2015) DOI: 10.1007/s00521-0152110-x.
F.Z. Geng
9
[16] O. Abu Arqub, M. AL-Smadi, S. Momani, T. Hayat, Numerical solutions of fuzzy differential equations using reproducing kernel Hilbert space method, Soft Computing (2015). DOI: 10.1007/s00500-0151707-4. [17] S. Abbasbandy, B. Azarnavid, M.S. Alhuthali, A shooting reproducing kernel Hilbert space method for multiple solutions of nonlinear boundary value problems, J. Comput. Appl. Math. 279 (2015) 293-305. [18] R. Ketabchi, R. Mokhtari, E. Babolian, Some error estimates for solving Volterra integral equations by using the reproducing kernel method, J. Comput. Appl. Math. 273 (2015) 245-250. [19] M. Ghasemi, M. Fardi, R.K. Ghaziani, Numerical solution of nonlinear delay differential equations of fractional order in reproducing kernel Hilbert space, Appl. Math. Comput. 268 (2015) 815-831. [20] F.Z. Geng, M.G. Cui, A novel method for solving a class of singularly perturbed boundary value problems based on reproducing kernel method, Appl. Math. Comput. 218 (2011) 4211-4215. [21] F.Z. Geng, S.P. Qian, S. Li, A numerical method for singularly perturbed turning point problems with an interior layer, J. Comput. Appl. Math. 255 (2013) 97C105. [22] F.Z. Geng, S.P. Qian, Reproducing kernel method for singularly perturbed turning point problems having twin boundary layers, Appl. Math. Lett. 26 (2013) 998-1004. [23] F.Z. Geng, S.P. Qian, Piecewise reproducing kernel method for singularly perturbed delay initial value problems, Appl. Math. Lett. 37 (2014) 67-71. [24] F.Z. Geng, S.P. Qian, Modified reproducing kernel method for singularly perturbed boundary value problems with a delay, Appl. Math. Model. 39 (2015) 5592-5597. [25] F.Z. Geng, S.P. Qian, A Numerical Method for Solving Fractional Singularly Perturbed Initial Value Problems Based on the Reproducing Kernel Method, J. Comput. Complex. Appl., 1 (2015)89-94. [26] M. Kumar, H.K. Mishra, P. Singh, A boundary value approach for a class of linear singularly perturbed boundary value problems, Adv. Eng. Softw. 40 (2009) 298-304.
F.Z. Geng
List of figure captions Figure 1: Absolute errors for ε = 10−5 for Example 4.1 (The left: [0, 20ε]; the right: [20ε, 1]). Figure 1: Absolute errors for ε = 10−6 for Example 4.2 (The left: [0, 20ε]; the right: [20ε, 1]).
10
11
F.Z. Geng
5. ´ 10-6
1. ´ 10-6
4. ´ 10-6
8. ´ 10-7
3. ´ 10-6
6. ´ 10-7
2. ´ 10-6
4. ´ 10-7
1. ´ 10-6
2. ´ 10-7
0.00005
0.00010
0.00015
0.00020
0.2
0.4
0.6
0.8
1.0
Figure 1: Absolute errors for ε = 10−5 for Example 4.1 (The left: [0, 20ε]; the right: [20ε, 1])
5. ´ 10-8 2.5 ´ 10-6
4. ´ 10-8
2. ´ 10-6 3. ´ 10-8 1.5 ´ 10-6 2. ´ 10-8 1. ´ 10-6 1. ´ 10-8
5. ´ 10-7
5. ´ 10-6
0.00001
0.000015
0.00002
0.2
0.4
0.6
0.8
Figure 2: Absolute errors for ε = 10−6 for Example 4.2 (The left: [0, 20ε]; the right: [20ε, 1])
1.0