California Institute of Technology Pasadena, California 1974 (Submitted March 13, 1974) 91109
Acknowledgements
a p p r e c i a t i o n t o t h e e n t i r e Department of Applied Mathematics, b o t h f a c u l t y and s t u d e n t s , f o r p r o v i d i n g an i n v i g o r a t i n g c l i m a t e i n which t o pursue t h i s work. The a u t h o r wishes t o thank M r s . J a n e t Smith and Mrs. Mary Beth Briggs f o r t h e i r e x p e r t t y p i n g of a d e t a i l e d and t e d i o u s manuscript.
ABSTRACT
shown t o be e q u i v a l e n t t o t h e d i s c r e t e boundary-value
scheme f o r b l o c k t r i d i a g o n a l m a t r i c e s i s d e r i v e d .
The t h e o r y
1 . Taylor Series 2. Quadrature 3. Gap Schemes 4. Other Schemes 5. Stability of Triangular Schemes 6. Asymptotic Error Expansions 7 . Increased Accuracy
Chapter 3 . Parallel Shooting
1. Parallel Shooting 2. Method of Complementary Functions 3. Method of Adjoints Chapter 4. Nonlinear Two-Point Boundary-Value Problems
1 . Finite Difference Schemes 2. Existence of Solutions 3. Newton's Method 4. Equivalence of Shooting and Implicit Schemes
Chapter 5. Block Tridiagonal Matrices
Chapter 6 .
Plane Couette
Introduction
form of t h e d i f f e r e n c e e q u a t i o n s ,
I n Chapter 1, t h e a p p l i c a t i o n of an a r b i t r a r y , c o n s i s t e n t
d i f f e r e n c e scheme t o a l i n e a r boundary-value problem i s t r e a t e d . t h e main theorem of t h i s c h a p t e r , Theorem 1.16, In
t h e s t a b i l i t y of t h e
a simple s h o o t i n g method i s , i n f a c t , a s p e c i f i c procedure f o r s o l v i n g t h e d i s c r e t e boundary-value problem. S p e c i a l emphasis i s placed on one-step d i f f e r e n c e schemes i n Chapter 2 , High o r d e r a c c u r a t e d i f f e r e n c e approximations are developed
schemes.
t h a t t h e s e methods a r e each a p a r t i c u l a r procedure f o r s o l v i n g t h e e q u a t i o n s d e r i v e d from approximating l i n e a r boundary-value problems. The Method of Complementary F u n c t i o n s i s examined i n d e t a i l a s an example of methods f o r s o l v i n g problems w i t h s e p a r a t e d boundary conditions. The Method of A d j o i n t s i s a l s o c o n s i d e r e d and i t i s shown
t h a t t h i s method i s n o t i n g e n e r a l e q u i v a l e n t t o t h e d i s c r e t e boundary-value problem, Nonlinear boundary-value problems a r e d e a l t w i t h i n Chapter 4. The d i f f e r e n c e schemes examined i n Chapter 2 a r e g e n e r a l i z e d t o be a p p l i c a b l e t o nonlinear d i f f e r e n t i a l equations. Following Keller [ 6
1,
Chapter 5 i s concerned w i t h t h e p r a c t i c a l problem of s o l v i n g t h e systems of a l g e b r a i c e q u a t i o n s a r i s i n g from t h e approximation of boundary-value problems w i t h s e p a r a t e d boundary c o n d i t i o n s . e q u a t i o n s a r e w r i t t e n i n b l o c k t r i d i a g o n a l form, M x = b. These
The s p e c i a l
The e q u a t i o n s
c o n s i d e r e d model p l a n e C o u e t t e flow.
nonlinear equations.
A c o n s i s t e n t e f f o r t i s made t o u s e o t o r e p r e s e n t z e r o o r
c o n s e c u t i v e l y throughout e a c h c h a p t e r .
1. E x i s t e n c e Theory
W e c o n s i d e r t h e system of n f i r s t - o r d e r , d i f f e r e n t i a l equations: linear ordinary
a r e n x n matrices.
Before
we p r e s e n t
) s t h e s o l u t i o n of fundamental m a t r i x ~ ( t a
X' ( t )
A ( t ) X(t) = o
X(O) = I. has a
Then f o r each f ( t )
c m [ o , l ] and
E
E",
problem ( l . l a , b )
unique s o l u t i o n y ( t )
Proof:
The s o l u t i o n t o t h e i n i t i a l - v a l u e problem
is i n general
r such t h a t y ( t )
This r e q u i r e s
Thus, ( l . l a , b ) nonsingular.
X(1) 1 i s
cm+'[o,l]
i s an o b s e r v a t i o n from t h e form
of d i f f e r e n t i a l e q u a t i o n ( 1 . l a ) .
2.
Numerical Methods
wewillemployanetofpoints It,}
on [ o , l ] a n d a n e t
f u n c t i o n {v,
1i=J d e f i n e d
on t h i s n e t .
Each v
where V i s an n ( J + l ) - v e c t o r , hi = ti
t h a t f o r each hi t h e r e e x i s t s a A
E [ E , ~ ]E , >
0,
such t h a t
T h i s c o n d i t i o n merely s t i p u l a t e s t h a t
s min h./max hi 5 1
1
o. Ilvill and f o r
1 IV 1 1
max
0SilJ
l l ~ l l= Ilvll
I IwI 1
I n t h e n = l c a s e , t h i s induced norm e q u a l s t h e maximum a b s o l u t e row sum, however t h i s r e s u l t does n o t g e n e r a l i z e t o n > 1. W e may e a s i l y produce t h e upper bound
I I"I I
where M
ij
i s a n n x n m a t r i x element of t h e b l o c k m a t r i x M.
An approximation t o t h e d i f f e r e n t i a l e q u a t i o n ( l . l a ) may
be w r i t t e n as
t o be
where zero.
y(t)
i s any s o l u t i o n of (1. l b )
Note t h a t
ro w i l l always b e
(1.5b),
w e a r e concerned w i t h y ( t ) a s o l u t i o n of ( l . l a , b )
and we d e f i n e
the
where
Bh is an n(J+l)
x n(J+l)
with ro = f3.
This example will be used throughout to illustrate various points of interest. Consistency. The difference approximation (1.5a) is said
where y ( t ) example.
is a solution of (l.la,b).
~uler'smethod provides an
I f y ( t )
cP [o,l], p
2, then
is linear i n h
.
A numerical scheme has an o r d e r of
Order of accuracy.
scheme (1.8) i s s a i d t o be s t a b l e i f f t h e r e e x i s t c o n s t a n t s
K
0
2 o, and H
> o, such t h a t
f o r a l l n e t s w i t h ho 5 H.
For t h e l i n e a r c a s e , t h i s c o n d i t i o n i s
0
e q u i v a l e n t t o showing t h a t a KO 2
- vill
4 0
as h
4 0
For convenience, we d e f i n e t h e n ( J + l ) - v e c t o r Y t o be
A s t a n d a r d r e s u l t may now b e s t a t e d ,
Lemma 1.10
L e t t h e boundary-value
problem ( l . l a , b )
have t h e e x a c t
solution y(t).
L e t t h e d i s c r e t e boundary-value
problem
be c o n s i s t e n t w i t h ( l . l a , b ) that is,
and s t a b l e .
Proof:
The d e f i n i t i o n of t h e t r u n c a t i o n e r r o r ~ [ y ( t ) ] combined w i t h
(1.5a, b ) g i v e s
By h y p o t h e s i s , t h e d i f f e r e n c e scheme i s s t a b l e , t h u s t h e r e e x i s t c o n s t a n t s KO 2
0,
H > o such t h a t
Hence,
l ly - 'I l
= .,i<J ly(ti)
max
vil
a s ho
For any p a r t i c u l a r scheme, we would l i k e t o be a b l e t o show t h a t t h e n e t f u n c t i o n approximates t h e e x a c t s o l u t i o n a t t h e n e t points: t h a t t h e method i s convergent. The t r u n c a t i o n e r r o r and
~ u l e r ' smethod i s convergent f o r t h e d i s c r e t e boundary-value problem, we need t o prove t h a t t h e m a t r i x Bh i n (1.9) h a s a n i n v e r s e w i t h uniformly bounded norm a s h scheme would be convergent.
+
o.
However, even i n t h i s s i m p l e c a s e , t h e
[ 5 ]h a s
~ ( 0 = ) B
b)
by E u l e r t s method, t h e f o l l o w i n g e q u a t i o n s r e s u l t
S i m i l a r l y , we d e f i n e t h e d i s c r e t e i n i t i a l - v a l u e m a t r i x w i t h any
Th
associated
(1.7) t o be
To form I
h '
w e r e p l a c e Bo,
i n t h e f i r s t block row of i 3h w i t h
1,0 respectively.
3.
i s s t a b l e and c o n s i s t e n t .
first.
It w i l l be u s e f u l t o prove s e v e r a l lemmas
Let 7
be t h e i n i t i a l - v a l u e m a t r i x
' I ,.
Then
where L is a (J+l)n
n+l matrix
and
6 is an (n+l)-vector
Proof: matrix
Bh.
The i d e n t i t y ro = 6 i s used h e r e .
'
has a s o l u t i o n
i f and o n l y i f
Proof:
a r e l i n e a r l y independent. matrix
Therefore, t h e r e e x i s t s a p x ( P - ~ )
L such
that
EP u n i q u e l y a s
Using t h i s r e p r e s e n t a t i o n i n (1.14),
and
The n e c e s s i t y f o l l o w s .
m
Note t h a t t h i s lemma r e d u c e s t h e s o l u t i o n of p simultaneous equations
t o s o l u t i o n of q e q u a t i o n s , q 5 p ,
Theorem 1.16
unique s o l u t i o n y ( t )
c [0,1].
Then t h e f o l l o w i n g a r e e q u i v a l e n t :
a ) The d i s c r e t e boundary-value problem i s s t a b l e , c o n s i s t e n t (and c o n v e r g e n t ) . b ) The a s s o c i a t e d i n i t i a l - v a l u e problem i s s t a b l e , c o n s i s t e n t (and c o n v e r g e n t ) . (b => a ) The F a c t o r i z a t i o n Lemma (1.12) s t a t e s t h a t f o r t h e
Proof:
The i n i t i a l - v a l u e problem i s s t a b l e by h y p o t h e s i s , t h e r e f o r e Ih i s n o n s i n g u l a r f o r a l l ho
5
H, say.
L e f t m u l t i p l y i n g (1.17) by
1 Ih
we obtain
Define Z and z by
IIzi -
x(ti)II
+-
as h
-+
I IzJ - x ( ~ ) I I
as
ho
-+
By v i r t u e of ( 1 , 1 8 ) , we may w r i t e (1.17) a s
v+
[z:,z]rw
- 51
= 0
.
st I f t h e ( n + l ) - - column of L i s t h e
=
k]
by J =
[e]
and t h e
# o, f o r
- 1
satisfies
W e r e c a l l t h a t Zo = I and t a k e A = 1, s o t h a t (1.21) i s e q u i v a l e n t t o
f o r the.
s o l u t i o n of t h e boundary-value problem ( l . l a , b ) .
E x i s t e n c e and
BIZJ).
W e write
+ BIX(l)]
must be non-singular.
It h a s a l r e a d y been shown t h a t
t h u s , by t h e Banach Lemma, B
+ B1Z J
i s non-singular
E
w i t h ho 5 H, provided H i s s o s m a l l t h a t f o r some p
It i s c l e a r t h a t t h e d i s c r e t e boundary-value problem i s s t a b l e s i n c e
and Z and z a r e s o l u t i o n s of d i s c r e t e i n i t i a l - v a l u e problems, which were assumed s t a b l e . ( a => b) The proof of t h i s p a r t i s e s s e n t i a l l y t h e same.
Th v
r = Bhv
L{NV
+ 61.
By h y p o t h e s i s , t h e d i s c r e t e boundary-value problem i s s t a b l e , t h u s
i s non-singular
and we may d e f i n e [ Z
! 21
by
and e x i s t s i f and o n l y i f
i s non-singular
f o r a l l n e t s with
5 H,
f o r H s u f f i c i e n t l y small.
Theorem 1 . 2 d e r i v e s t h e s o l u t i o n
of t h e boundary-value problem t o be
where r must s a t i s f y
2' ( t ) - A ( t )
BoX(o)
~ ( t = ) o
BIX(l)
I =
i s given by
By h y p o t h e s i s y ( t ) i s u n i q u e , t h u s t h e m a t r i x R i s n o n - s i n g u l a r ,
A
A
t h a t i s , X(o) i s n o n - s i n g u l a r .
W e n o t e t h a t Z a s d e f i n e d i n (1.24)
i s a c o n v e r g e n t approximation t o t h e e q u a t i o n s (1.26),
hence
and, a s b e f o r e , Z
5 H,
where
H i s s u f f i c i e n t l y small.
and t h e d i s c r e t e i n i t i a l - v a l u e problem h a s a s t a b l e s o l u t i o n .
m
W e r e c a l l t h a t t h e o r d e r of a c c u r a c y of a scheme i s determined by t h e l a r g e s t i n t e g e r p such t h a t
I l ~ [ ~ ( t1 )1 ]5
C o r o l l a r y 1.27. solution y(t)
E
K h :
for all h
5 H.
have a u n i q u e
1. L e t t h e d i s c r e t e
a p p r o x i m a t i o n s (1.5a,b) b e p-order
i n i t i a l - v a l u e problem a s s o c i a t e d w i t h (1.5a,b) b e s t a b l e . a l l n e t s w i t h ho 5 H ,
where V i s t h e n ( J + l ) - v e c t o r
s o l u t i o n of (1.5a,b)
and
i s a constant
independent of h o e
Proof.
W e w i l l examine a s y m p t o t i c
F u r t h e r , Theorem 1.16
Chapter I1
D i f f e r e n c e Schemes
They admit
151
h a s shown, p i e c e w i s e smooth
matrix equation
f o r s e p a r a t e d boundary c o n d i t i o n s a r e p a r t i c u l a r l y simple.
In t h i s
c a s e , t h e m a t r i x 8 may b e p u t i n t o a b l o c k t r i d i a g o n a l form which h p o s s e s s e s a s i m p l e LU-decomposition. One of two methods i s u s u a l l y employed t o g e n e r a t e d i f f e r e n c e approximations t o ( l o l a ) and e v a l u a t e t h e i r o r d e r of accuracy. The
t h e a p p l i c a t i o n of q u a d r a t u r e i s immediately obvious.
1.
t h e u s e of Taylor s e r i e s .
Applied t o ( l o l a ) t h e c e n t e r e d E u l e r scheme
where t
i-112
ti
-hi
2
E
I f we assume t h a t y ( t )
2nrfl [ o , l ] and l e t t R ( t i )
= ti-1l2,
t h e t r u n c a t i o n e r r o r i s shown t o be
, is
Here t h e c h o i c e of tR -
ti-1/2
i s i m p o r t a n t due t o t h e symmetry of
(2.2). (2.3b),
must b e i n v a r i a n t t o t h e r e f e r e n c e p o i n t t
tR
R.
I f we were t o u s e
and t h e l e a d i n g term i s
this
i-1/2
and t
5-1 r e s p e c t i v e l y .
i n each expansion a r e n o t t h e same. The centered-Euler scheme may b e g e n e r a l i z e d t o an a r b i t r a r i l y h i g h o r d e r by employing t h e e x a c t form of t h e t r u n c a t i o n e r r o r . 2 c o r p o r a t i n g t h e f i r s t term, O(hi), In-
of t h e t r u n c a t i o n e r r o r expansion
Act) and f ( t )
, we
must a l s o e v a l u a t e A")
(t)
, A(')
(t) ,) ' ( f
(t )
f ( l ) ( t ) and v a r i o u s products of t h e s e f u n c t i o n s . Since t h e f u n c t i o n s C(t) and g ( t ) w i l l continue t o appear, we need t o d e f i n e t h e s e q u a n t i t i e s i n more g e n e r a l i t y . The u s u a l
For s i m p l i c i t y , w e d e f i n e
Thus, Y ( 0 ) ( t ) = y ( t ) => Co = I, go =
0
Table 2.7
w i l l b e used t o d e f i n e a s i x t h -
where y ( t ) is t h e e x a c t s o l u t i o n t o ( l . l a , b ) .
t r a p e z o i d a l r u l e t o (2.9), the result is
I f we a p p l y t h e
This may b e e q u i v a l e n t l y w r i t t e n a s
u s i n g t h e f u n c t i o n s i n Table 2.7.
.
E
Lemma 2.11. d e f i n e d by
Let b ( t )
cdl[a,b].
Also l e t polynomials p i ( t )
be
wh.er e
5,
[arb].
Then
(-l)&l
(s) b(&')
( s ) ds
Proof:
Repeated i n t e g r a t i o n by p a r t s y i e l d s ( a ) immediately.
I n d u c t i o n on
v y i e l d s (b).
The i n d u c t i o n h y p o t h e s i s i s s t a r t e d by
(2.12a)
and, f o r m a l l y , i s
IP,-,(t)l
Ib-al
v-1
Thus,
Innumerable schemes p r e s e n t themselves by way of t h i s Lemma. The Euler-Maclarin s u m formula may b e d e r i v e d u s i n g polynomials
which look l i k e
Thus,
of a r b i t r a r i l y high o r d e r . manner i s
A f i f t h - o r d e r method d e f i n e d i n t h i s
One u n d e s i r a b l e a s p e c t of (2.13)
i s e v a l u a t i n g c 4 ( t ) and g ( t ) . 4 (t)
In
( t ) , A(') ( t )
f (3) ( t )
f C 2 )( t )
f (I) ( t )
these functions.
3.
Gap schemes
, A(')
(t)
f (2) ( t )
, and
f (I) ( t ) i n addition
, f (3) ( t )
and a l l lower o r d e r d e r i v a t i v e s .
S i n c e each new f u n c t i o n t o b e e v a l u a t e d i n c r e a s e s b o t h programming complexity and computation time, we want t o examine h i g h - o r d e r , s t e p methods w i t h a minimum of d e r i v a t i v e s r e q u i r e d . The centered-Euler scheme and t h e T r a p e z o i d a l Rule (2.10) possess another u s e f u l property. Each of t h e s e d i f f e r e n c e schemes
1 1
one-
is
For r e a s o n s t h a t w i l l become c l e a r , s e e S e c t i o n 6 on asymptotic e r r o r expansions, w e want t o p r e s e r v e this p r o p e r t y i n c o n s i d e r i n g higho r d e r methods. R e c a l l i n g Lemma 2.11, we have the r e s u l t
+ (-l)&l
b
P&l (s) b(&') a
V=m
( s ) ds.
v=n+l,. , ,2n
(1,
f("-')
(t)
, and
a l l lower-order d e r i v a t i v e s .
For i n s t a n c e , a f o u r t h - o r d e r method s o d e f i n e d r e q u i r e s e v a l u a t i n g ~("(t) and f(') ( t ) where a s t h e g e n e r a l i z e d centered-Euler scheme f(2)(t), etc.
needs ~ ( " ( t ) ,
Lenrma 2.14
L e t pZn(t) =
(t-a)
(t-b)
Define t h e sequence of
polynomials {py ( t ) 3, V
2 0,
such t h a t
Proof:
W e can r e p l a c e (.2.15a) w i t h
a ) of Lemma 2.11.
b. i n d u c t ion. c. d.
show t h a t p 2 r ( t ) ,
2 n,
i s an even f u n c t i o n about t
b+a 2 0,
b+a 2 0.
Without
thus
tZr=
BY
(t>
i s an even function.
Therefore, p
2v-1
( t ) i s an odd f u n c t i o n .
n
t l
Recalling t h e d e f i n i t i o n of P ( t ) ,
0.
Thus,
Define
8 k
m! 2n! (m-n) !
(2n-m) n! !
(hi)2n-m*
(-1)
(2n-k) ! 2n!(n-k)!
" I k!
Table 2.17
Fourth-order scheme:
Sixth-order scheme :
The m a t r i c e s C
b ( t ) = A(t)y(t)
f(t)
b ( t ) = H(t)
(b(t)
- H(t))
, b(')
(ti)
and b0(tiel).
I n this c a s e ,
, we
have
ff(t) may be i n t e g r a t e d e x a c t l y t o g e t
Since b ( t ) = J1\t),
t h i s formulation w i l l y i e l d a d i f f e r e n c e scheme
e x a c t l y t h e same a s (2.18) w i t h t h e t r u n c a t i o n e r r o r
4.
Other Schemes
W e a r e p a r t i c u l a r l y i n t e r e s t e d i n one-step
(2.5)
, and
(2.18)
, thus
only a
The i n t e g r a l e q u a t i o n
Note t h a t (2.20)
r e p r e s e n t s (J-k+l)n
s t a r t i n g " m-step d i f f e r e n c e schemes, m < k , u s u a l l y of lower o r d e r I n many c a s e s t h e " s t a r t i n g " scheme i s a one-s t e p scheme.
than (2.20).
Combining a l l of t h e s e e q u a t i o n s i n t o t h e form
t h e i n i t i a l - v a l u e matrix,
I1
Ih, i s lower t r i a n g u l a r .
I f t h e one-step
I f t h e methods a r e of o r d e r p and q
h(k) should b e r e l a t e d by
5.
S t a b i l i t y of T r i a n g u l a r D i f f e r e n c e Schemes
A l l of t h e methods
i n the form
ij
's is a n o r m a l i z a t i o n of t h e
f a m i l i e s of m a t r i c e s 1 of t h i s form. h
i n i t i a l - v a l u e problems i s well-developed provided t h a t a k-s t e p d i f f e r e n c e scheme i s used and a l l Mij scalar. can be w r i t t e n a s M. . I , M a 1J ij
W e a r e i n t e r e s t e d i n a r e s u l t which does n o t r e q u i r e t h e s e
two r e s t r i c t i o n s on I
Lemma ( 2 . 2 2 ) .
Dv, Nv,
V=0,1,
he
be a m a t r i x of t h e form of (2.21)
Let by
Ih
Define
L e t Do b e n o n s i n g u l a r and l e t
and
I IN1/ 1
= nl,
independent of J.
Further, l e t
0 d < 1. 0
Then
Proof : -
T h e matrix 1
is w r i tten as
or, equivalently
where
and
-1
I i s nonsingular f o r
J>Jo=-
, and
do
Since (Do
+ J-'D~)-'
+ J-hl)
i s block
+ J - ~ D ~ )(N -o ~ + Jmbl)
i s block n i l p o t e n t .
where
Combining Corollary 1.27 and Lemma (2.22) Theorem without proof, Theorem 2.24.
, we
s t a t e t h e following
L e t t h e l i n e a r boundary-value problem ( l . l a , b )
E C
have a
[O,l].
Also, l e t t h e d i f f e r e n c e scheme be
L e t Bh be of t h e form
52 ,
0
I I M I ~5 dl, ~ ~independent
of J.
Further, l e t
and
0 5 d
0
1. Then f o r h
< H, -
H s u f f i c i e n t l y small,
6.
i*
The
The t r u n c a t i o n e r r o r i s h e r e defined t o be
tR - timl'
= Lz(tR)
ctR)
cq[O,l] and f ( t )
cq~0,1~.
b e a s t a b l e , c o n s i s t e n t d i f f e r e n c e approximation t o (1. l a , b )
Further,
let t h e t r u n c a t i o n e r r o r be given by
where z ( t )
CP+l[O,l]
and tR= ti
+ O(hi)
=
Also l e t
F k ( ~ ( t ), f ( t ) ) z ( t ) E nets with h
cv [ 0 , l ] where v
midp-k,q-k} .
Then f o r a l l
< H ,H -
s u f f i c i e n t l y small,
1, i s defined by
Proof: -
, and
f(t) ,
i t can be shown t h a t
Immediately upon s u b s t i t u t i n g
i n t o t h e t r u n c a t i o n e r r o r expansion (2.28b), we g e t
and hence
By h y p o t h e s i s , t h e d i f f e r e n c e scheme i s s t a b l e , thus
O r equivalently,
f o r vi
- y ( t .)
1
E
i s termed t h e asymptotic
I n t h e following d i s c u s s i o n we assume t h a t
E
cm[O,l], A(t)
cm[O,l], and f ( t )
cm[O,l].
i'
t r u n c a t i o n e r r o r -ri[z(t)] F2k+l
= 0 , k=O,l,
....
The f u n c t i o n y l ( t )
is defined by
Assume t h a t y2k-l(t)
defined by
Z 0,
k=1,2
,...,v,
then y2vtl(t)
is
r-l
h)
V
+ d
" z a 3 r: t
. " ! g
&
*I4
(I]
g *d
U
(I]
3
rl
3 a
a,
(I]
-rl
r 3
h U
0 k
r l m
$ 8 *rl
U
It a
k
5
-
5 k
&
L
" 4
nonvanishing i n (2.32).
However,
tR) ]
1-
i t can b e seen t h a t
thus, y 2 ( t ) =
0.
Theorem (2.27)
Gap6 d i f f e r e n c e scheme
7.
I n c r e a s e d Accuracy
W e w i l l c o n s i d e r two methods of i n c r e a s i n g
(1.a , ) .
and
FOX'S
-t
o extrapolation
9 1)
of the d i s c r e t e problem on two d i f f e r e n t n e t s t o e l i m i n a t e s u c c e s s i v e e r r o r terms; t h e method of Deferred C o r r e c t i o n s uses a s o l u t i o n t o t h e d i s c r e t e problem t o approximate t h e f i r s t t r u n c a t i o n e r r o r term. To i l l u s t r a t e t h e method of Deferred C o r r e c t i o n s we look a t t h e centered-Euler method (uniform mesh)
[ I ]
rl '44
Q)
a
Q)
3
rl
0 0 k
h l
\
a
k
Q)
[ I ]
[ I ]
w
I
=rl
6
cd
Q)
rl
3
0
5
I
U
rl
U C)
dfd
rl *rl
U
0 E:
0 U
k k
N 1
a
n
a ,
k k
Q)
rl I
.9,
d
cd
u
I I rld
n rl
U
I-l
0
8
w
0 0
f-1 -rl
g d
3
3 U
rl 0
rlld
rn
8
h
Q)
cd k
cd
5 0
k
ur
CV
Q)
k 0
rn
disadvantages.
and thus we have to examine the solution outside the domain of interest. Also, the solution procedure for
VO
( 2 . 3 8 ) where the approximation to the first truncation error term is ( t ) included. Evaluation of higher-order derivatives of y delicate procedure and must be done with the utmost care. Richardson extrapolation avoids these particular problems. Once two aolutions are calculated, each on a different net, the power structure of the asymptotic error expansion is used to eliminate the leading error term at those points common to both nets. For example, is at best a
the sixth-order gap scheme has an asymptotic error expansion of the form
1 , then
i ( l ) Let t
J
Defh e
then
Chapter I11
P a r a l l e l Shooting
This c h a p t e r examines t h e r e l a t i o n s h i p between i m p l i c i t f i n i t e d i f f e r e n c e procedures and d i s c r e t e i n i t i a l - v a l u e t e c h n i q u e s . The proof of Theorem 1.16 y i e l d s t h e f o l l o w i n g r e s u l t : t h e boundary-value procedure I f both
and t h e i n i t i a l - v a l u e procedure
That i s , t h e
i s a c t u a l l y a method of s o l v i n g t h e e q u a t i o n s
s h o o t i n g t e c h n i q u e i s a l s o e q u i v a l e n t t o (3.1) and, t h u s , t o (3.2a,b,c). P a r a l l e l s h o o t i n g i n c l u d e s such procedures a s simple s h o o t i n g , Method of Complementary F u n c t i o n s , and t h e Godunov-Conte
1. P a r a l l e l Shooting
The boundary-value problem of i n t e r e s t i s
du dt
A(t)u
f (t) = o
[0,11
a) (3. 3 )
The simple s h o o t i n g method (Theorem 1.2) u s e s t h e s o l u t i o n of (n+l) i n i t i a l - v a l u e problems t o g e n e r a t e t h e s o l u t i o n of ( 3 . 3 a , b ) . p a r a l l e l shooting, t h e i n t e r v a l [ o , l ] i s divided i n t o s u b i n t e r v a l s , [Ty, Tv+l],
K
In
nonoverlappin~
and s e p a r a t e i n i t i a l - v a l u e problems a r e
s o l v e d on each s u b i n t e r v a l . by r e q u i r i n g c o n t i n u i t y a t Tv,
he s o l u t i o n of (3.3a,b) i s c o n s t r u c t e d
= 1,
...,K-1,and
s a t i s f a c t i o n of
t h e boundary c o n d i t i o n s (3.3b). D i s c r e t e p a r a l l e l s h o o t i n g methods mimic t h i s procedure. we p l a c e a n e t ( t y ~ f :on ~ each s u b i n t e r v a l [ Tv-l, 'fV]. O n this net,
a d i s c r e t e i n i t i a l - v a l u e problem i s s o l v e d w i t h i n i t i a l c o n d i t i o n s
V
Zo,
zo.
we r e q u i r e t h e n x n m a t r i x Z
be n o n s i n g u l a r .
This i n i t i a l - v a l u e
s o l u t i o n can be r e p r e s e n t e d a s
o r , e q u i v a l e n t l y we w r i t e
z V '1I zV 1 =
jrv].
I
Tvcl] backward by
v*
zV and 0
V
0
, zv
by (3.4),
t h e s o l u t i o n of any i n i t i a l - v a l u e
v J problem on t h e n e t { t i j i i 0
i s g i v e n by
Thus, t h e c o n t i n u i t y requirements f o r p a r a l l e l s h o o t i n g a r e
Combining ( 3 . 5 ) , solution,
(3.6),
t h e p a r a l l e l shooting
vPS,
i s g i v e n by
Stability.
For t h e purposes of t h i s d i s c u s s i o n , t h e
discrete
I n t h e p r o o f s t o f o l l o w , d e f i n e t h e nJv x n ( J +1) m a t r i x
The i n i t i a l - v a l u e m a t r i x I procedure is
associated with a p a r a l l e l
shoot in^
For convenience, we w i l l w r i t e t h i s m a t r i x a s
(K =
3)
i s t h e (SV+2,
Sv+l)
block
c1 [ o , l ] .
Then t h e
By hypothesis
v -1 I I I I(lh)
5 K,
= l,.,.,~ then ,
-K IK , 11-
111
a) =>
5 max
b ) Without l o s s of g e n e r a l i t y , w e w i l l consider
t h e c a s e i n which t h e i n t e r v a l [ o , l ] i s divided i n t o 3 s u b i n t e r v a l s ,
K
= 3.
The f i r s t s t e p i s t o show t h a t t h e m a t r i x
rh,defined below,
i s nonsingular,
M lo'
' '
By u s i n g t h e F a c t o r i z a t i o n Lemma (1.12),
where K
i s independent of ho.
1 2 3 L e t V , V ,V b e nJ1, n(J +I), nJ vectors respectively. 2 3-
Consider t h e n ( J + l ) e q u a t i o n s
Since
7h
i s n o n s i n g u l a r , f o r each
such t h a t
R e c a l l i n g (3.14), we f i n d t h a t
Thus,
T h i s argument i s v a l i d f o r any
= 1,
...,
K,
t h u s we have
I I (lh) I I
v -1
' K1
V =
1,
a . a ,
Before proceeding w i t h t h e theorem which w i l l t i e a l l t h r e e of t h e s e d i s c r e t e methods t o g e t h e r , i t i s convenient t o p r e s e n t two lemmas. Lemma 3.17. L e t C1,
C
b e nonsingular m x m matrices.
L e t C1 and
C2 be r e l a t e d by
Further, l e t i s nonsingular.
+ NL]
Proof.
By h y p o t h e s i s C1 i s n o n s i n g u l a r , t h e r e f o r e f o r each b
E?,
t h e r e e x i s t s a unique m-vector,
x, such t h a t
R e c a l l i n g (3.18), t h i s e q u a t i o n can b e r e w r i t t e n a s
o r equivalently a s
s t a t e s t h a t (3.19)
o n l y h a s s o l u t i o n s of
where
e x i s t s f o r every b , t h e
+ hZ)
must b e n o n s i n g u l a r .
Then
Proof.
V E
Suppose t h a t B~ i s s i n g u l a r , t h e n t h e r e i s a ~ ( J + K ) - v e c t o r
such t h a t
E
i'
i = SV+v,
= 1,
...,K-1,
1 [ v [1
= O.
Note t h a t f o r
t o form V
Thus,
and
by c o n t r a d i c t i o n , w e have 8 n o n s i n g u l a r . h
m
Now, w e s t a t e and prove t h e main theorem of t h i s Chapter, which
w i l l i n c l u d e Theorem 1.16.
Theorem 3.22.
c1[ o , l ]
Denote
Re i).
Theorem 1.16 proves that methods SV and IV uniquely To show that method PS uniquely
x
define approximations to y ( t ) .
nK
matrix in (3.9b) is nonsingular. Without loss of generality, we consider the case where 3n
x
K
= 3.
3n matrix P, defined by
) , Bh is nonsingular, hence by is nonsingular. From conclusion i E Lemma 3.20, 8 is nonsingular. Recall the n(J+l)-vector
h
r in
E Ih by
eq-uation (3.23)
where
and
1natrix,
< is
an ( n ~ + 1)-vector,
1 x n(J+K) m a t r i x .
R e c a l l i n g Lemma 3.17, w e n o t e
i s n o n s i n g u l a r , where
- NL)
R e ii).
Theorem 1.16 i s s u f f i c i e n t t o p r o v e t h a t
vBV =
that
t h e Reducing Lemma 0 . 1 3 ) s t a t e s
must s a t i s f y
Now, we have t h e r e l a t i o n s h i p
we n o t e t h a t
vBv =
vIV
Unfortunately, Theorem (3.22) contains no information on the numerical stability of any parallel shooting technique. To
say that a unique solution to the difference equations (3.9a,b,c) exists is not to say that it can be accurately approximated numerically. It is well-known that a simple shooting method may produce disastrous numerical solutions if the linearly independent solutions of (3.3a) grow at different rates. the problem For example, consider
c[o,l] and
, because
the matrix
[Bo + BIX(l)
+ e6o
60
1 l+e
l+e
-..]
be represented this matrix will
is nonsingular. However, if we try to invert this matrix numerically, on a machine with less than 85-bit accuracy, the computer will consider (Bo
+ BIX(l))
singular, because 1
+ eg60 will
methods which are equivalent in the sense of Theorem 3.22 may yield greatly different numerical solutions. 2. Method of Complementary Functions The Method of Complementary Functions (Goodman and Lance [ 3 ] ) is used to approximate the solution of (3.3a,b) when the boundary conditions are separated. can be written as That is, the boundary conditions (3.3b)
where Bo is a p qy p
n matrix of rank
In
+ q = n, and
B1
this section, we use the convention that a single matrix in parentheses, ( B , ) , has p rows and a single matrix in brackets, [B 1, has q rows. 1
(Do)qo =
(Bo)
s e t { ~ ~ } span z = ~t h e n u l l s p a c e of (Bo), t h e n
(qi,
?'lo) =
1 s i S q .
where t h e c o n s t a n t s cii,
i = . . q ,
a r e determined from
I n t h e i n t r o d u c t i o n t o t h i s c h a p t e r , i t was s t a t e d t h a t
t h e Method of Complementary Functions i s a s p e c i a l c a s e of p a r a l l e l shooting. clear. T h i s i s t h e b e s t p o i n t a t which t o make t h i s r e l a t i o n s h i p
P a r a l l e l s h o o t i n g n a t u r a l l y c o n t a i n s t h e c a s e of s i m p l e
shooting.
I n o r d e r t o c h a r a c t e r i z e y ( t ) by means of s i m p l e s h o o t i n g ,
s o l v e t h e n homogeneous i n i t i a l - v a l u e problems
-dx(t) - A ( t ) x ( t )
dt
f (t)
where C i s a n o n s i n g u l a r n x n n a t r i x and c i s an n - v e c t o r .
Now,
where t h e n-vector
i s determined by
(3.29a,b),
(3.30),
'li
0
0
L r
(3.33) as
where Z is a (J+l)n x q matrix with its ith column being z discrete approximation to y ( t ) is given by
The
where
(Go)
I [ol I
l o
I I I
I I I
Bo Zo
Po
and zo i s o r t h o g o n a l t o t h e n u l l - s p a c e of B
we want t o show t h a t
V?
Now,
c a l c u l a t e d v i a (3.37),
(3.35),
and (3.36)
i s a s o l u t i o n of t h e e q u a t i o n s
where
by
Th
Left-multiplying
T~~~ and
Recall (3.35) and (3.36) and compare with (3.30) and (3.40) to show that
3.
Method of A d i o i n t s
A good e x p l a n a t i o n of t h e
A(t)u = f ( t )
a)
The a d j o i n t d i f f e r e n t i a l e q u a t i o n i s
From (3.41),
(3.42),
t h e following r e l a t i o n s h i p i s derived
I n t e g r a t i n g t h i s expression, we o b t a i n
u (0) = e
n-p
-V
v'
v = p+l,
...,n ,
t h e e q u a t i o n (3.44) r e s u l t s i n a s e t of i = p+l,
( o r q ) e q u a t i o n s f o r t h e q u a n t i t i e s ui(o),
...,n.
of a single initial-value problem determines y ( t ) . If we use the sane discretization for (3.41a,bYc) and (3.42), (3.44), it is not in general true that the solution of the
?, is equal to vBV.
However, if we The
employ the centered-Euler scheme this equivalence does hold. discrete analogue to (3.44) is naturally
-*
MA
-*
0
0
it
v~ " J
i=l
i-I )
f(ti_
l ) = 0- (3.45)
2
and
vi-1)
ik
s i m i l a r t o (3.47) can be d e r i v e d f o r any number o f o t h e r d i f f e r e n c e schemes, b u t t h e summation which y i e l d e d (3.48) does n o t i n g e n e r a l show e q u i v a l e n c e .
Chapter IV
where u, f , b a r e n-vectors. i s o l a t e d s o l u t i o n s of ( 4 . l a , b ) .
i f t h e l i n e a r i z e d boundary-value problem
where y ( t ) i s a n i s o l a t e d s o l u t i o n of ( 4 . l a , b ) .
W e also define
S,,[g(t)l
Ix
E",
1 lx -
g(t)l
p},
1. F i n i t e D i f f e r e n c e Schemes
Each of t h e d i f f e r e n c e schemes d i s c u s s e d i n Chapter 2 can be modified t o make i t a p p l i c a b l e t o n o n l i n e a r d i f f e r e n t i a l e q u a t i o n s of t h e form ( 4 . l a ) . Thus, t h e centered-Euler scheme (2.2) becomes
I f equation (4.la)
is linear i n
is clearly
g e n e r a l form of t h e t r a p e z o i d a l r u l e i s shown t o be
Chapter 2. that
i t can be shown
where t h e c o n s t a n t s
a r e g i v e n by Table 2.17.
I n order t o derive
Using t h e d i f f e r e n t i a l e q u a t i o n
hi [ f (V t . ) f ( v i 9 t i ) 1 i' 1
+ f2(vi,ti)
fl(vi-l,ti-l)
f(vi-l'ti-l
T h i s i s a f o u r t h - o r d e r a c c u r a t e scheme i f y ( t )
c [o,l],
,v ) O J
o.
Employing
the trapezoidal rule, an approximation to the solution of (4.la,b) can be determined from the following set of n(J+l) equations:
where y ( t )
is a solution of (4.1a9b).
~(1))
(4.8a,b) by
= 0
(4.9)
V is
2.
E x i s t e n c e of S o l u t i o n s
Lermna 4.10,
have a n i s o l a t e d
solution, y(t).
where g , f3 a r e n-vectors,
and g ( t )
c [0,1].
Let t h e d i f f e r e n c e
scheme be c o n s i s t e n t and s t a b l e when a p p l i e d t o a l i n e a r two-point boundary-value problem w i t h a unique s o l u t i o n , z ( t ) j=(y,t) r [ y ( t ) ] x [ o , l l ] and b(x,y)
2
E E
c [o,l].
Let
P Then f o r a l l n e t s w i t h ho and
Sp[~(1)]Is P H, H s u f f i c i e n t l y s m a l l , L i s n o n s i n g u l a r
c1 [S [ Y ( o ) ]
where K Proof.
z (t)
E
i s independent of ho.
By h y p o t h e s i s , e q u a t i o n (4,12a,b) h a s a unique s o l u t i o n
c2 [o , I ] .
t o (4.12a,b),
t o , H > o such t h a t
Ilvll
f o r a l l nets with h
0
KO llrll
5
H.
This i s equivalent t o
Theorem 4.13.
L e t (4.la'b)
have a n i s o l a t e d s o l u t i o n y ( t )
cL[o,l].
q (V) be continuous f o r V
Po
[y(t)].
such t h a t
and
where
w i t h ho 5 EL@),
Il(p) s u f f i c i e n t l y s m a l l , t h e n ( ~ + l ) e q u a t i o n s
rl(v) =
have a unique s o l u t i o n W
S [y (t ) ]
Proof:
I f t h i s h a s a s o l u t i o n , $(W)
= W,
then
n(W)
= o.
The C o n t r a c t i n g
(o,l)
i)
ii)
1 IY - $(Y) I I
II1/'(v1)
Vl,
V2
(1 -
$(v2)II 5 Sp[y(t)l
xIIv~ -
v21[,
where
Re i i )
and immediately
By h y p o t h e s i s q (V) i s c o n t i n u o u s , t h u s
I IJ, (
-q
II
5 KoIK1p
I IL - rlV(Y) I I } I Iv1
- v21 I
By h y p o t h e s i s , p r o p e r t y ( 4 . 1 4 ) ,
and c o n d i t i o n i i ) i s s a t i s f i e d . that
S [ y ( t ) ] and t h e r e e x i s t s P
S [~(t)].
Proof.
It i s s u f f i c i e n t t o prove t h a t f o r any
> o, t h e r e e x i s t s
an H such t h a t
However, t h i s i s t h e c o n c l u s i o n of
r e p l a c i n g p.
rn
C o r o l l a r y 4.18. Let t h e h y p o t h e s i s of Theorem 4.13 hold. Let t h e d i f f e r e n c e scheme (4.8b) be pth o r d e r a c c u r a t e ,
Then, f o r a l l n e t s w i t h ho 5 H, li s u f f i c i e n t l y s m a l l ,
Proof.
S [y,t]
where
(0,1) and f i x e d .
By h y p o t h e s i s
and t h e r e f o r e
Theorem 4.13 s t a t e s t h a t W
S [y(t)] is a solution i f P
t h u s i t must be t r u e f o r
Hence,
property t h a t
however t h i s i s t h e c a s e f o r many common d i f f e r e n c e schemes. examples, t h e centered-Euler be examined. (4.3) and t h e Gap
As
Gap4.
P
Application
(4.12a, b) y i e l d s t h e f o l l o w i n g n(J+l) e q u a t i o n s
From (4.19a,b),
1J
w e can
of L.
Then
Similarly, N
0j
= Lo
,j
= l,...,J.
From 4 . 6 , i t can
Similarly,
N..
11
= Lii,
i = 1,
...,J.
Centered-Euler.
however L i s n o t e q u a l t o nV(y).
( 4 3 ) , t h e J a c o b i a n m a t r i x 17 (Y) h a s t h e f o l l o w i n g nonzero n x n
b l o c k components:
Thus, we have
Clearly f o r f ( u , t )
c [Sp[y(t)l
[ o , l ] l and y ( t )
1 c [o,l],
p r o p e r t y (4.14)
holds.
Note t h a t t h e q u a n t i t y
scheme t o s a t i s f y
3.
is
Theorem 4.23
be t h e n ( J + l ) - v e c t o r
Let
VO
b e such t h a t
VO
S [y(t) P
0
and
5 H,
[ IvO - w [ I
is sufficiently
small.
Then f o r a l l n e t s w i t h h
0
H s u f f i c i e n t l y s m a l l , and
f o r a l l p, o < p 5 po, p
s u f f i c i e n t l y small, t h e Newton i t e r a t i o n
Chapters 1 and 3 examined t h e e q u i v a l e n c e between s h o o t i n g methods and i m p l i c i t t e c h n i q u e s f o r l i n e a r boundary-value problems. I n t h e n e x t s e c t i o n , w e want t o d e f i n e a n o n l i n e a r s h o o t i n g procedure and s t u d y i t s r e l a t i o n s h i p t o t h e method d e s c r i b e d h e r e .
4.
i s d i s c r e t i z e d , s o l v e d , and t h e n t h e i n i t i a l c o n d i t i o n
x(o) = c i s
wiggled u n t i l t h e d i s c r e t e boundary c o n d i t i o n b ( c , u J ( c ) ) = o i s satisfied. For example, t h e f o l l o w i n g system of e q u a t i o n s r e s u l t i f we u s e ~ u l e r ' smethod t o approximate (4.24a):
However, t h e n x n m a t r i x
ac
'du
must be e v a l u a t e d a t each s t e p .
This
m a t r i x i s determined by s o l v i n g t h e v a r i a t i o n a l e q u a t i o n s
employed t o s o l v e t h e system of e q u a t i o n s
e x i s t s and converges.
It i s c l e a r t h a t i n each c a s e t h e method d e f i n e s a s o l u t i o n
of t h e same s e t of e q u a t i o n s :
a p p l i e s Newton's method t o e a c h of t h e
f o r m a l l y s e p a r a t e s t h e f i r s t n e q u a t i o n s from t h e remaining n J ,
u n t i l a n i n i t i a l v a l u e i s found such t h a t
where i n g e n e r a l
I IV ; II
0.
Theorem 4.34
Let t h e
s h o o t i n g Newton i t e r a t e s be {U
1,
S [ y ( t ) 1, and l e t t h e i m p l i c i t P
Newton i t e r a t e s b e {V
v 3,
Let ?(vv) = r
-v
, [[;'I
[ >
o.
Then
uV f vV.
Proof:
Define
r
V
= q(uV)
- q(vV)
following way
B y hypothesis, q
i s continuous on S [ y ( t ) ] , hence P
llrVll 5 Q
lluV - vVII
lo
V v (sU +
Immediately
from t h e above,
Thus,
1 luV - vV[I
> o ->
uV # vV.
This theorem s t a t e s t h a t t h e i t e r a t i o n sequences defined by i m p l i c t Newton and shooting Newton a r e not t h e same, even though t h e y a r e used t o s o l v e t h e same s e t of nonlinear equations.
Chapter V Block T r i d i a g o n a l M a t r i c e s
n (J+l) l i n e a r equations
%(vv) (vW1
- vV) + T,(vV)
g e n e r a t e d by ~ e w t o n ' s method,
More s p e c i f i c a l l y we a r e i n t e r e s t e d
i n m a t r i c e s which r e s u l t from t h e approximation of two-point boundary-value problems w i t h s e p a r a t e d boundary c o n d i t i o n s . i s , problems which may be w r i t t e n a s That
u' ( t ) = f (u,t)
bo(u(o)) = bl(u(l)) =
0
[0,1]
a)
b)
c)
+q
= n.
To i l l u s t r a t e t h e form t h a t t h e s e m a t r i c e s w i l l t a k e ,
where we have used the convention that a single matrix in parentheses, (B0), has p rows and a single matrix in brackets, [B1], has q rows. The matrix of (5.3) can be rewritten in block tridiagonal form
n matrix.
type have a very special zero structure: the first p rows of Bi and the last q rows of Ci are zero rows. The solution procedure of interest is a block LU decomposition:
I d e a l l y , w e would l i k ;
i f t h e matrix 8 is nonsingular. h
that clear.
m a t r i x and (Bo) = (1 o o o ) , t h e n
and A
is clearly singular.
N o m a t t e r how s m a l l h
becomes, t h i s
matrix w i l l remain s i n g u l a r .
interchanged w i t h t h e 2 x o
nd
row, t h e n o o
Ao-[!x!!]
A
0
Thus,
1. Block L U Decompostion
The block t r i d i a g o n a l m a t r i x M i s c o n s i d e r e d i n the f o l l o w i n g
generality ;
Bi,
C. i s a n n x n matrix.
1
matrix w i t h p / q z e r o s t r u c t u r e .
The s t r a i g h t f o r w a r d b l o c k decomposition i s
where t h e m a t r i c e s Li,
Di are d e f i n e d by
= W.,
and
Lemma 5.10.
Let M',
m a t r i c e s w i t h p / q zero s t r u c t u r e .
MO,
M by Ai,
Bi,
Ci and Ai,
0 0
Bi,
Ci r e s p e c t i v e l y .
be
nonsingular. of rows (p A
0
Then e i t h e r A
i s nonsingular o r by an i n t e r c h a n g e
MO
+ 1,..., p + n)
of
i s nonsingular.
Immediate because M
0
Proof. m = o. -
= Ao.
Let (S ) be t h e p x n m a t r i x composed of t h e f i r s t
With t h e s e d e f i n i t i o n s i n hand, t h e m a t r i x
can be
written a s
By h y p o t h e s i s
MO
is nonsingular ,
h a s r a n k n.
Thus, by i n t e r c h a n g i n g t h e a p p r o p r i a t e
0
i s nonsingular.
S i m i l a r rows.
MO
be n o n s i n g u l a r .
0
Then
by a n i n t e r c h a n g e s t r a t e g y among s i m i l a r rows of M
a matrix M
o 5 i 5 J, i s nonsingular.
Proof.
R e c a l l i n g Lemma 5.10,
among rows (p
+ l,...,p + n)
t h a t forms a n
MI
such t h a t
i s a block t r i d i a g o n a l m a t r i x
k Assume t h a t t h e r e e x i s t s a m a t r i x M w i t h
Mk
= F~ G~
and
ii) iii)
i+l ,o 5 i 5 k Each Di
- 1, i s n o n s i n g u l a r ,
and
Mk
s t r u c t u r e formed by a n i n t e r c h a n g e s t r a t e g y of s i m i l a r rows of M0
.
, ii),
and i i i ) i t i s s u f f i c i e n t t o show t h a t By h y p o t h e s i s M0 i s n o n s i n g u l a r , Define the n(J+l-k)
x n(J+l-k)
1 Since M has p r o p e r t i e s i )
from M thus
Mk must
m a t r i x H by
The Recalling
Mk
i s n o n s i n g u l a r i f and o n l y i f H i s n o n s i n g u l a r .
1,. . . , p
+ n)
where
i s nonsingular
+ p + 1,...,nk + p + n)
of M'.
.
m
Let
MO
Corollary 5.12.
where I
1
a)
i.s n o n s i n g u l a r
b) There e x i s t s a p e r m u t a t i o n m a t r i x P such t h a t
o 5 i 5 J, i s n o n s i n g u l a r .
Proof:
a ) => b ) . b) => a ) .
which a l l o w s s o l u t i o n v i a (5.6)
(5.8)
, and
(5.9)
The o n l y
comprising P.
Let M be a block t r i d i a g o n a l m a t r i x w i t h p / q z e r o
L e t M be n o n s i n g u l a r .
L e t r , V , W be n ( J + l ) v e c t o r s
d e f i n e d by
MV = r :
I,
Forward s u b s t i t u t i o n
A. B,
S t a r t i n g values:
Do
Ao, wo = r
I t e r a t i o n procedure (k = o , l ,
...,J-1)
of M i n o r d e r t o form
1.
I f t h e c u r r e n t D i s s i n g u l a r , i n t e r c h a n g e rows k (kn
+ p + l , . , , , k n + p + n)
Compute:
4c+l -
-1 Ck+l Dk
w = r k+l k+l
11. Back s u b s t i t u t i o n
A.
Lk+l wk
(k = J , J - ~ , . . . , o ) k
Compute v
via D
Wk
Bk+l Vk+l
Proof:
Thus f a r o n l y one method of decomposing t h e m a t r i x M has been considered: t o block m a t r i c e s , t h e n a t u r a l e x t e n s i o n of t h e u s u a l LU decomposition Consider a n LU decomposition where U r a t h e r
The g e n e r a l r e c u r s i o n r e l a t i o n s f o r Di,
Ui a r e
In the L U
i'
namely
i n t h e same l o c a t i o n s a s t h e o r i g i n a l m a t r i x M.
(5.14) i t i s c l e a r t h a t Ui i s i n g e n e r a l a f u l l n
n m a t r i x , and
2.
A S p l i t decomposition Another p o s s i b i l i t y i s t h e f a c t o r i z a t i o n
UL
That i s , i n t h e c a s e J = 2, we have
where U h a s a u n i t d i a g o n a l .
C o r o l l a r y 5.15.
m a t r i x w i t h p/q z e r o s t r u c t u r e ,
a) b)
i s nonsingular
i 5 J, i s nonsingular.
Proof,
b) ==> a) a ) => b )
where q
i , n (J+l)-i+l
Then
go =
QM'Q
i s a nonsingular t r i d i a g o n a l there
R e c a l l i n g C o r o l l a r y 5.11, that
P such
where
% i s a block t r i d i a g o n a l m a t r i x w i t h
q/p z e r o s t r u c t u r e .
Note t h a t QQ = I , t h e n w e have
where P =
QFQ, U
QE,
and L =
60.
Theorem 5.19.
Let
MO
a) b)
i s nonsingular.,
For each i n t e g e r s , o I s I J , t h e r e e x i s t s a
0
has a s p l i t f a c t o r i z a t i o n
where
o 2 i 5 J, is nonsingular.
Proof:
The o n l y element of F o r G
... , s ;
Di,
i = o,
i =s+l,.. . , J ; Di,
for the
m
Note t h a t t h i s s p l i t procedure i n c l u d e s t h e LU f a c t o r i z a t i o n (s = J ) and t h e UL f a c t o r i z a t i o n ( s = o ) a s s p e c i a l c a s e s . The g e n e r a l
J)
I.
1. Compute:
2.
Di
- Ai
- LiBi
I f D. i s s i n g u l a r
1
+ p + 1,...,ni + p + n )
to form
and new B
r 3.
i'
accordingly. i+l
w
i
Compute:
= r -Lw
i
i i-1
D - ~ Li+l 'i+l i
B. Backward ( i = J ,
...,s + l )
= *i
1. Compute:
2.
Di
'i+lci+l
If Di i s s i n g u l a r , i n t e r c h a n g e rows
(ni Di,
1,
...,n i - q - n )
C i
and new B ,
A i l
i-l
accordingly.
3.
Compute:
wi = r i
'i+lwi+1
C.
S p l i t point
1.
Compute:
Ds = As
LsBs
- us+l Cs+l
11.
Solution routine
A.
S p l i t point
1.
B.
Solve f o r vs:
Dsvs = w
Backward (i = s-1,
...,o )
Divi
= wi
1.
C.
Solve f o r vi:
Ei+lVi+l
Forward (i = s+l,
...,J )
Divi
= wi
,-
1. Solve f o r vi:
Ci~i-l
In some cases however it has been found that the split point
s = (5+1)/2 yields good numerical results when the s = o, s = J decompositions are unsuitable.
CY
Chapter VI
A Numerical Example:
P l a n e Couette Flow
I n t h i s c h a p t e r , e q u a t i o n s modeling p l a n e C o u e t t e f l o w a r e used a s a t e s t c a s e f o r some of t h e t h e o r y p r e s e n t e d p r e v i o u s l y . This p a r t i c u l a r example was chosen because f o r c e r t a i n s p e c i a l c a s e s t h e e x a c t s o l u t i o n i s known and can b e shown t o b e a n i s o l a t e d s o l u t i o n ( s e e Chapter 4 ) . The e q u a t i o n s a r e g i v e n i n F. K. Moore [
$1
a s a s i m i l a r i t y s o l u t i o n of t h e Navier-Stokes e q u a t i o n s d e s c r i b i n g t h e motion of a compressible, v i s c o u s f l u i d c o n t a i n e d between two p a r a l l e l surfaces. These w a l l s a r e i n r e l a t i v e motion and each i s
k e p t a t a c o n s t a n t temperature.
lvariable.
OW
Fig, 6.1
Solution
where
and
, it
can be shown
that the linearized problem has only the trivial solution, and thus, the solution ( 6 . 4 ) is isolated. 2. Numerical Procedure
n (6,2). equations i
Substituting @(T) = p
-1
in (6.2),
where
In order to use the Gap4 scheme, the vector f f must be evaluated. Y Let a = (a b c d l T , then
yields 4J+4 nonlinear equations which must be solved in order to evaluate V. ~ewton'smethod is employed to solve these equations.
N1(a)
af (a) aa ,
=
2 (a) N (a)=-. aa
T
(a b c d)
and
N (a)
where
4, 4 '
a r e understood t o s t a n d f o r $ ( c ) , $ ' ( c ) r e s p e c t i v e l y .
where t h e matrix, qV(vV), i s block t r i d i a g o n a l m a t r i x w i t h 2/2 zero structure. The s p l i t decomposition r o u t i n e (s=o) was used t o s o l v e
vV)
I n each c a s e considered,
vO, was
taken t o be
3.
Numerical r e s u l t s
3/2
.
~ ( 0 = )
1/2,
I n each c a s e , t e n uniformly spaced n e t p o i n t s (J=9) were placed on t h e i n t e r v a l [ o , l ] . e q u a t i o n s (6.5), ~ e w t o n ' smethod w a s used t o s o l v e t h e
when t h e r e s i d u a l ,
I lI1(vV)I I , was
acceptably small
The
(w*)
(O,1)
[~ll(v~)II
.-
Time ( s e c .)
. 1 1 D 00
2.51
1
2 3 (-191) 0
1
3.67
2 3 4
0
1
4.64
2 3 4
*Represents
d e t a i l e d i n s p e c t i o n of t h e numerical s o l u t i o n i s i n o r d e r . e x a c t s o l u t i o n f o r K = o, p(T)
= T
The
is
3/4
3/8
+ +
y ( t ) , vi2, a r e c o n s t a n t s
. , vil , and
t h e corresponding e r r o r s a r e L e t Ivi3
y3(ti)
= ei 3
y4(ti)
= ei4-
Table ( 6 - 9 )
thus
Appendix A
where
% are nxn
A t f i r s t glance,
seems t o be more g e n e r a l t h a n
However, we g i v e t h e theory
considered i n Chapter 1.
an i n d i c a t i o n h e r e t h a t t h e t h e o r y of Kreiss
[ 7 ] and
A s an approximation of ( A . l a ) , Kreiss c o n s i d e r s d i f f e r e n c e
schemes of t h e form
i = r,.. .,J-s
where D
+ is
?; (vi
v ~ - ~ ) ) .
The d i s c r e t e boundary c o n d i t i o n s a r e w r i t t e n
where D- vi = D+ vi-l. W e w i l l c o n s i d e r o n l y t h e c a s e i n which ( A . 2 ) i s "as compact a s possible", t h a t i s , r+s=n. With t h i s r e s t r i c t i o n , (A.2) and (A.3)
vi,
i = 0,
. . .,J .
For
t h i s c a s e , t h e d i f f e r e n c e e q u a t i o n (A.2) can b e w r i t t e n a s
L~ vi = A ( t i , h ) ~ + vi-r
+ 1
k=o
n-1
~ ~ k ( t+ ~ v,i-r h )= ~ F~ ~
i = r , . . .,J'S
where So (h)
(ti,h)
i s an m x m m a t r i x and r e p l a c e s t h e d i f f e r e n c e o p e r a t o r
Thus, a f i r s t - o r d e r
system of e q u a t i o n s e q u i v a l e n t t o (A.la,b)
is
dzn(t) dt
+ 1
k=o
n-1
q ( t ) z
k+l
(t) = F(t)
dzk (t)
dt
= z k+l ( t )
k = ~,...,n-1
(A.3)
can be
k k = 1, i'
...,n ,
by
i-r
k+l i-r
(A. 7a)
and
(A. 7b)
n-l
Thus, i f t h e d i f f e r e n c e scheme ( A . 4 ) i s c o n s i s t e n t , then c l e a r l y (A.7a), (A.6b), and (A.7b) form a c o n s i s t e n t approximation of Thus, w e have N e q u a t i o n s i n N unknowns t h e o n l y d i f f e r e n c e between (A. 7 a , b ) ,
(A05a,b,c).
(N = m(nJ
- $[n2 - n ] ) ) , and
k
...,J-k+l.
new equations. This can be formally done by expanding the range of i in (A.7a) from J-s to J+r-1 and the range of each i in (ADGb) from J-k to J-1, The only restriction we place on these new equations is that
w1
V, V being a solution of
,...,W"],
of the
difference approximations (~.9a,b,c) yields a stable solution, A . 3 ) . V, of (A.2) and ( In addition, the theory presented in
Chapter 1 provides a necessary condition for stability where no restrictions are placed on the form of the difference approximations.
he Numerical S o l u t i o n of L i n e a r Boundary-Value ~ r o b l e m s " , SIAM Review, Volume 8, No. 3, (1966), pp. 309-321.
"Numerical S o l u t i o n of Ordinary and P a r t i a l D i f f e r e n t i a l Equations", Addison-Wesley, London, 1962.
[2]
L. Fox,
[3]
T. R. Goodman and G. N. Lance, "The Numerical I n t e g r a t i o n of Two-Point Boundary-Value Problems", Mathematics of Computations, Volume 1 0 , (1956), pp. 82-86. E. I s a a c s o n and H. B. K e l l e r , "Analysis of Numerical Methodsv', John Wiley, New York, 1966.
H. B. K e l l e r , "Accurate D i f f e r e n c e Methods f o r L i n e a r Ordinary D i f f e r e n t i a l Systems S u b j e c t t o L i n e a r C o n s t r a i n t s " , SIAM J o u r n a l on Numerical A n a l y s i s , Volume 6, No. 1, (1969), pp. 8-30. H. B. K e l l e r , "Accurate D i f f e r e n c e Methods f o r Nonlinear TwoP o i n t Boundary Value Problems", t o appear.
[4]
[5]
[6]
(71
H. 0. Kreiss, " ~ i f f e r e n c eApproximations f o r Boundary and Eigenvalue Problems f o r Ordinary D i f f e r e n t i a l ~ q u a t i o n s " , Mathematics of Computation, Volume 26, No. 119, (1972), pp. 605-624. F. K. Moore, e d i t o r , " ~ h e o r yof Laminar ~ l o w s " , P r i n c e t o n U n i v e r s i t y P r e s s , P r i n c e t o n , 1964, pp. 171-175. V. P e r e y r a , " I t e r a t e d Deferred C o r r e c t i o n s f o r Nonlinear Boundary Value Problems", Numerische Mathematik, Volume 11, (1968), pp. 111-125.
[8]
[9]