Professional Documents
Culture Documents
1966
Recommended Citation
Wagner, William Michael, "On increment modification in finite difference methods for solving ordinary differential equations "
(1966). Retrospective Theses and Dissertations. 5343.
https://lib.dr.iastate.edu/rtd/5343
This Dissertation is brought to you for free and open access by the Iowa State University Capstones, Theses and Dissertations at Iowa State University
Digital Repository. It has been accepted for inclusion in Retrospective Theses and Dissertations by an authorized administrator of Iowa State University
Digital Repository. For more information, please contact digirep@iastate.edu.
This dissertation has been
microfilmed exactly as received 67-2101
WAGNER, William Michael, 1936-
ON INCREMENT MODIFICATION IN FINITE DIFFERENCE
METHODS FOR SOLVING ORDINARY DIFFERENTIAL
EQUATIONS.
Iowa State University of Science and Technology, Ph.D., 1966
Mathematics
Approved:
TABLE OP CONTENTS
CHAPTER I: INTRODUCTION 1
CHAPTER II: THE TRANSITIONAL EQUATIONS 12
CHAPTER III: THE TWO BACK-POINT CASE
CHAPTER IV; THE THREE BACK-POINT CASE 51
BIBLIOGRAPHY 68
ACKNOWLEDGEMENT 69
APPENDIX 70
1
CHAPTER 1; INTRODUCTION
(1-2) • ••+*oyk
.f-h [v(Xn+k.yn4.k)
' +bcf(%%'?%) '
(1.5) P(z)r-z^+a^_^z""^+...+h(b^z^+b^_^z^"^f...+b^)
numerical stability.
Once it is decided that the increment is to be mod
ified, the modification can be done in various ways. Cer
tainly the easiest way to increase an increment is to
double h and use every other back-point in the multi-step
procedure. However, as will be seen later, when a linear
multi-step method requiring n back-points is programmed
for a digital computer, it frequently is the case that only
the n current right-most points of the numerical solution
can be referenced. A second modification procedure, used
to halve an increment, is interpolation. If, as is quite
likely, a single-step method has been used to generate the
initial set of back-points required by a multi-step method,
the former could be reintroduced to affect the modification.
If increment modification is fairly infrequent, the relative
inefficiency of the single-step method would not be notice
able. However, if the opposite is true, the method present
ed in this paper, more in the line of multi-step methods,
would be an advantage. Also, if used in conjunction with a
digital computer of limited storage, the memory space occu
pied by the single-step method, once it performed its func _
tion of producing an initial set of back-points, could be
made available for general storage. Thus, in the case of
two or three back-points, a net gain in storage could be
realized if the method herein is utilized.
9
total of n-1 such pairs, each taking into account the unique
as indicated below.
H
^0
1
Mo 0
•^0
. ..
^^0 hbl ^0
... ®n-i
n n
(2.1) L jy(x)j = A ajy(x+Hjh)fh \ b^y (x+^^h).
0=0- .j = 0
(2.2a) t=(x-x)/h,
(2.2b) 0(t+!ii.)'^= 0,
fj
(2.2d) Ljy(x)
j = 0 i-0
n r
'J z - z l î l l E)i ^ V
j- 0 i = 0
(r+1)
+ _ïLli_ ^ (r+l)y^^*^^(^)
r
(2.2a) L[y(x)]
i=0 il
+b
j
i' = 0
14
where
r+1 n
h p p {
(2.2b) R^^^(x,x-jy)= (t+p.) a (t+^ )y
(r+i):Z__ ' ' j' I y ' y ^3
j =0
+(r+l)b ,
J J J
and where
(2.30)
tl
{2.3d) t°=
= 0, 1 = 0,-1,
and .
0
(2.2e)
rr
In view of {
/i-1
(2.2f) I ^,11 = l(i-i'), i=Ql,...j 0,...,1-1,
ki-i
(2.'^g) L
1= 0 .1=0*" f= i
fb UR (x,x;y).
r+l
i"=i^
(2.3h) L[yW] ^
i= 0 j= 0 r=o
(2.31) L[y(x)]
1*0 i'= 0 j= 0
^•R^^l(x,x;y).
n
(2.4a) ( aj ^j+ibjjcij ^ ), i = 0,l,...,
j =0
and
r , ^y(l)(x) 1 ,
(2.5) L[y(x)J = \ — h Si(t)+Rp^^(x,x;y).
i =0
17
(2.7b) L[y(^)] = Vi
(q+2)
J =0
^ €(x,x+^jh), j=0,...,n.
'3 ""j
account the new point generated by the k^^ pair, there are
i = 0,...,n-k,
(n-k)+(i-n+k)X, i=n-k+l,...,n.
n-k
(2.8a) LP[y(x);k^x] ÛC y(x+jJi)
j =0
n
(Xk^y [xf(n-k)h+(j-n+k)Xhj
j = n-k+1
20
/• ri—k n—1
(x+jh)+y ^^.y'^+(n-k)h+(G-n+k)X]r^
j =0 j = n-k+1
I
k =1,...,n-l,
and,
n-k
(2.8b) L°[y(x)jk,A] =y a^^y(x+jh)
j =0
.n
a^.y[x+(n-k)h-»-( J-n+k)XhJ
j = n-k+1
fH-k n
k =1,...,n-l.
(2.8c) — 0, k-l,...,n—1.
n-k n ,
(2.9a) Ç, ^ [(ri-k) + (j-n4.k)Xj
j= 0 j = n-k+1
n-k n-1
|(n-k)+(j-n4.k)Xj^ ,
0 = 0 j = n-k+1
k =1,...,n-l; 1=0,1,...,
and.
n-k n
(2.9b) a^j [(n-k) + ( j-n+k)A]
j- 0 j = n-k+1
n-k n
j= 0 j = n-k+1
With each of the 2(n-l) operators as given by Definition
2.4, a multi-step formula will be associated. It is assumed
that a multi-step method requiring n back-points is being
used to generate a numerical solution of (l.l), y being
the true solution, and, at the onset of increment modificat
ion, (X]^f) is the rightmost point of this solution. .
For each k, the set
22
(2.10) J ^ Q'
n-1 n-1
(2.10a) A
j* 0 j= 0
and
n-1 n-1
{2.10b) = V^jyN-n»o»k'-'^V5'N^k^^^''k3y'N-n-j4k'
j= 0 j=0
where
and
23
(2.10d) y' _ ,y )j
N-n+j+k N-n+j+k N-n*-j+k
k = l, j=0,
Note, the formulas imply a PECE type algorithm.
Definition 2.5. The Grder of a predictor or corrector
formula will be that of the associated operator.
In general it cannot be expected that the points of the
solution, y, of (l.l) satisfy the equations of (2.10) ex
actly or, conversely that points generated by these equa
tions coincide with points of the true solution, y, even
if it were the case that the points of the initial set of
back-points, B^, did. Thus, error is introduced at each
application of a formula of (2.10) and, since in the gen
eral case, it must be assumed that error is also in the
points of B^, each application will propagate a modifi
cation of inherited error. In order to examine these
errors, let
(2.11a) €^=y^-y(x^), i = 0,...,N+n-l,
n-1
n-1
J =0
and
n-1
(2.12b) «Nvk
J=0
n-1
N-n^k+j-y ^^-n+k*J^]
j =0
and
(2.14) h = Kh.
n-1
(2.15a) =^~^kj%-n4-k*-j
j=0
n
n-1
-1
+h
j^O
and
26
n-1
(2.15b) \j^N-nfk+jN-t-k
j= 0
n- 1
j =0
k — 1J...,n—1.
Definition 2.6. For the solution, j, of (l.l),
[y(x);h,x] and L°|^y(x);k,x] are known as the discretiza
tion or truncation errors of, respectively, the predictor
and corrector formulas as given by the equations of (2.10)
at X, k =-1,...,n-l.
Thus, the discretization error is the error introduced
upon applying one of the methods of (2.10). Substituting
^n4-k' as given by (2.15a), into (2.15b), yields the total
error after one cycle of the PECE algorithm has been com
pleted (Note, the error is established at the correction
phase of the PECE cycle, the subsequent evaluation of the
derivative does not affect the error of the current cycle
but does enter into the next n cycles.). Thus,
27
+L''[y(xn^I,);k,a]+hbi^L^[y;k,>v],
k - 1,...,n-l.
With X= 1 and the•coefficients of the equations of
(2.10) independent of k, (2.16) describes the error in the
dependent variable for the usual PECE algorithm of uniform
step-size. Because of the factor of h. present in the last
term of (2.16), it is not uncommon to find a predictor in
use that is of order one less than that of the associated
corrector. However, it is important to distinguish betv^een
the order of a method and the magnitude of its truncation
error. Depending upon the magnitude of h, e.g. )K|
roughly of magnitude l/h, the term of the error (2.l6)
associated with the predictor may dominate excessively.
Hamming (6, p. I98) adopts the attitude that jhj be kept
less than 0.4 and it is not uncommon to find multi-step
methods that are numerically stable for values of jhj
larger than this. Increment modification, and especially
reduction, can be expected to occur under relatively critical
conditions such as E leaving a region of stability and/or
28
n-1
(2.17) ^N+k -
N-n+k+j
j=0
k =1,...,n-l.
Definition 2.7. The truncation coefficient of the error
equation (2.17) will be defined to be the quantity
(2.20) G = m b , +G
k,n+2 k ^ k
rs/
where 0^^ does not depend upon b^. Thus, (2.18) can be
written
(2.22a)
the value, of (in terms of the other free para:-
maters), which minimizes the magnitude of the expected value
of the truncation coefficient is zero. If (2.22a) does not
A
hold, the value, b^^, of bj^ which minimizes the magnitude
of the expected value of the truncation coefficient is
Q
(2.22b) bicn= ^ , k=l,...,n-l.
vC,
'k,n+2^
^2
Also, if the variance,(r , of g exists, the value b^, of
2
b^ which minimizes the expected value of is zero if
(2.22a) holds, otherwise, it is
(2.220)
(2.23) J^^^^(h)g(h)dh.
( 2 . :2^) ^,n+2^knj
thus,
= 2
Since g is a density function with mean h and variance cr ,
the three integrals of (2.25) are one, zero, and o"^ respec
tively, i.e..
2
(2.26) E^Tj^y =
^kn
21
dEi T }
(2.27a) 1
2 db
kn
and
(..ar.) x!JliLi =.(vC.„«S)VC,L
db,
kn
which exist for all values of bj^^. The theorem follows by
dE^
equating 1^ ) to zero.
(2.29) u, >
^ " l&i_l,j i = 2,...,n; k = 1,...,n-l
(2.21) k = l,...,n-l,
7— A,
(2.22a) A= I j %j
\k =1 I
and
(2.32b)
V / —
v=2 / I 1
A,
V
k =1 ^k-vl '
where
n-1
(2.22c) f I Aj'=I,
j -sn
36
(2.33) €M^n_i(h)=4^Q(h)+vch*'^2.
(2.>Ja) = l^Xh,
1- X
and
(2.34b)
j -1,2,...«
In terms of 6^^, it can be shown that
Ô ^ j- i^(j-l-i)(n+2),, n+2 ^
)h cv.
^i=i 0
form J, i.e., if
(2.36) J=SAS-1
then (2.35) can be written
ji^(j-l-i)(n+2) Scvhn+2
/
Thus, the error at the j,th iteration is composed of two
parts, one due to the initially inherited error,and the
other due to generated truncation error generated at each
step in the modification process. Now it is shown in
Varga (8, p.l4) that if J_ = (d__(e)), 1 /r,s <n is a Jordan
iS 0
s< r.
j-s+r
(2.38) = < g ,r 4 s ^ min(n^,J+r)
(2.29c) |ibciUI!b(I(|cij,
II'MlIAI' f j ^ jQ >
i= jo»!
or
i-1
(2.42) ji^Jj-l-i)(n+2) (j-l-l)(n+2)
\Xl
i 0 1=0 1 - Jq.I
40
one.
Proof: From (2.^2) it is evident that A is a finite pro
duct of matrices A^, k-l,...,n-l, whose elements are given
by (2.29). Referring to (2.29), it is seen that the sum of
the elements of each of the latter rows of such a matrix is
one. However, this is also true for the first row because
under the condition 0^^= 0, as given by (2.9b),
n
(2.4^a) \ =0, k = l,...,n-l,
j= 0
n-1
(2.43b) ^ =
- j = 0
4l
1
' kc
1
1
will be said to be compatible if and only if the product, A,
of the as,sociated propagation matrices k=l,...,n-l as
given by (2.29), is such that its spectral radius is one, and
all eigenvalues of A of modulus one are simple.
In concluding this chapter, note that a generalization
f ( k) _ 1
of the matrix A^ as given in Definition 2.7 is Aj^(h)- ju^^(h)>
where, referring to (2.16),
(2.45)
1 1 0 0 U 1
0
0 1 1 1 1+ X
^1
—
0 10 2 (1+X)2
0 10 3 (1-X)^
and
1 1 0 0 a 1 0
0
0 1 1 1 1+X 1
b
0 1 0 2 b (1+^)2 l+X 2
0
0 1 0 3 (1+X)^
verified to be
1 •"!
(3.2) 1 0 -3 2 1 1 0 0
0 0 3 -2 0 1 1 1
0 .1 -2 1 0 1 0 2
0 0 -1 1 0 1 0 3
(5.5a) ;?(2X+3)
%
-(A->-1)^{2UI)
^0
and
(3.3b) ^0 '6XX^1)
^0
Oil 6)v(X+i)
^1
4- •
^0 h A(3A+2)
/l_ C\+i)(3X+i)
With
45
(2.4) m= 2-X(X-»-l)(2X+l),
(5.5a)
and
is
(2.6b) bg_, r.
m+f^ii
is
46
/w r.
(3.7b) bg=-
2 \
(mf Qh)f
a 0-
m+Qh/
^1 3-0
(3.8) A =
1 0
The characteristic equation of the propagation matrix is
readily seen to be
(3-9) JI -anU-an
-a;j|i-aQ =0.
(3.10) a^+a^ = l,
the roots of (3.9) are found to be one and -a^. Thus, the
spectral radius of the propagation matrix is one and the
roots of (3.9) are simple if and only if -Ka^r^l. It
follows from the equations of (2.2), that this condition
can be stated, in terms of the parameter b^, as
47
0 -27
12
9/8 1/2, 18 A- 2
and
9/2 26 b2
^1 ^1 b2
-7/4 -16
^0 ^0
-21 A = 2 ,
II
1—1
-15/4
• i
,
48
and '
1/2 A= 2
<^0 1 2b
d-l 0 -27
3/8 12
h
k 7/8 18
-9/16 -36
50
1/2 A= 2
5/^2 0 :)2/5 0
^0
^1 27/^2 1 -27/5 1
0 5/48 0 :^2/^
51
(4.1a) 1^=0,
and
(4.1b) 0, i = 0, k = 1,2.
(4.2a) 0 0
1 1 1 1
"k
1 0 2 2p
k
2
1 0 3
4 k
1 4 0 4 4p;
k
where
(4. 2 0 ) ^ = '
(4.2d)
(4.2e) ^=(l,q^,q^,q.^,q|^)',
(4.2f) Vj^=(1,0,0,0,0),
and
(4.2s) Wj^=(0,l,2<lj^,3<l2,4q^)',
where
52
(4.3b)
(4.5a) 12>?(X+2)^
-i2(X'«-i) (X^ + 2 X - 1 )
?! =
4X (X +l)(2X+5)
A(A+i)^(5X+i2)
^2 =
4X^(4X^*9X^4)
(4.50) 0
-12
'1 = 4
16
4
55
(4.5d) 2X(^-i)(A+*i)
-2MA+i)(2Afi)
4 2
XU'-i)
(4.5e) -48X(Xfl)(A+2)
48a(x<'l) (a+2)
2A(A+I)(2X+1)
~4X(A+2)(8X^5)
-2(Afi)(A4.2)(ioA4-:$)
56
(4.5f) -48y(X+l)(2A+l)
i|-8A(X+i)(2A+i)
7
12 A
-2A (A+1)(2X+1)(3\+10)
,4
-4X(2X+l)(5A-v8)
(4.7a)
and
where
57
k = 1,
(4.7c)
-2)s(4\ +11X+5)/(A+2), k=2;
k = l,
(4.7d) sjç=<
(A+i) /(2A+^) . k = 2;
and
A(A4-1)(A^-2)(15A+7)/:5 , k -1,
(4.7e) t^=\
. 2À (2Atl)(7À+15)/C\+2), k=2.
(4.8a) k = l,2.
and
(4.9) A = a10
"12 "11
0 0
(t.lO) P(^)=
+fi( ^io^22''^11^2l'''^12^20)"^^10^20 *
I
By Theorem 2.^5, one is a zero of P(jji). Maicing use of the
identity
P can be factored as
(4.13) ^ll'''^12^22'''^2l"^
t
59
Halving An Increment
-9/16 -1 15/2
^12
87/64 -5
MC
tl2_ 1/3
1
and
(4.l4b)
a "37/5 " " 27/5 " "-I92/5'
\l 21
Also,
(4.l4c)
=(-51/32)(1,1)+(V3)(«^g,a^^)+(lt5/l6)(0,b^^),
(4.15a) S
\2
(-153+128*10)^1 ^
870+(-153+128A^Q)h 4
870i(-152+128KQ)h
and
(4.15b) % _ = _
23 2
(-23+27% ) 2
l48+(-23+27A; )h + — P" •
l48t(-23+27%2Q)h
2
The values of b^^, k = 1,2, can be obtained by setting Ç - - 0
in (4.l4a) and (4.l4b) respectively.
In Table 4.1 is presented selected predictor-coeffic
ient sets. The relatively large numerical values of the
fifth order predictor for h =2 are a disadvantage of this
set if round-off error is not substantially smaller than
the discretization error. In Table 4.2 is presented two
coefficient sets of compatible correctors. Referring to
6l
A= 1/2 k= 1 k =2
0 -97/96 0 -109/80
62
A=1/2 k= 1 k= 2 k-l k =2 k =1 k =2
*
^0
1/16 0 1/8 -1/8 0 0
Doubling An Increment
ail
' 64 ' ' 0 -96
1
"12 ^12
-6:5 -1 - 96
! —
( 1 , 1 ) + (<X ,a ) +
0
1/3
1
10 10
i
-56
—
I
H
^6 4/3
4.1
ro
33 1/3 -46
^12
r
and
(4.l6b)
^22
1
64
(4.l6c)
= (-156)(ljl)+(4/3)(«io,aio)+(296)(0,b^2)
and
(4.l6d)
(r^g.Cgç.) = (-344)(l,l)t(27/8)(a2o,a2Q)+(58Q)(0.b22)
-117+aio
(4.17a) b.,^-
r .
l2224(-117+a^Q)hJ+
.=1 r/
^
222+(-117+Aio)h
and
-2752+27a
/I \ '^ 20
(4.17b) b^,= -
23 2
_ (-2752f27^g0) ^2
46404-(-2752+27a )h
20
4640+(-2752t27%2Q)h
X=2 k =1 k =2
* *
117 -26 2752/27 8
72 21 200/9 161/12
/^k2
0 -204 0 -217
67
A= 2 k =l k =2 k =l k =2 k =1 k =2
* *
^kO -32/27 1/3 1/3 0 0
a 12 0 55/32 0 0
kl
I
68
BIBLIOGRAPHY
ACKNOWLEDGEMENT
APPENDIX
(A.2) y=(l+x^)
This problem is mentioned in Hamming (6, p. 209) as one
whose solution is often troublesome to approximate by poly
nomials.
In generating the numerical solution, the known solution
was used to furnish the necessary initial back-points. In
the two examples, the initial increment was 1/^52 and l/64
respectively. The numerical solutions were generated by
alternately applying the two formulas which serve to double
an increment and then the two which halve. Thus, in the
first example, an increment of l/64 exists relative to the
doubling formulas and an increment of l/32 relative to the
halving formulas. Similarly in the second example, the
increments are l/^2 and l/l6 respectively.
Obviously,
(A.2) fy = -4x(ltx^)"^
71
(A.5) l/5î(Cj^5+hb^^
(1/5!)
(244/3)(11/15)(-217)h X-2, k=2;