Mathematical and Computational Approaches in Advancing Modern Science and Engineering
Mathematical and Computational Approaches in Advancing Modern Science and Engineering
Mathematical and Computational Approaches in Advancing Modern Science and Engineering
Bélair · Ian A. Frigaard
Herb Kunze · Roman Makarov
Roderick Melnik · Raymond J. Spiteri Editors
Mathematical
and Computational
Approaches
in Advancing
Modern Science
and Engineering
Mathematical and Computational Approaches in
Advancing Modern Science and Engineering
Jacques Bélair • Ian A. Frigaard • Herb Kunze
Roman Makarov • Roderick Melnik
Raymond J. Spiteri
Editors
Mathematical and
Computational Approaches
in Advancing Modern
Science and Engineering
123
Editors
Jacques Bélair Ian A. Frigaard
Department of Mathematics and Statistics Department of Mathematics
University of Montreal University of British Columbia
Montreal, QC Vancouver, BC
Canada Canada
Mathematics Subject Classification (2010): 00A69, 00A71, 00A79, 92-XX, 35Qxx, 81T80, 97M10,
47N60, 49-xx, 91Axx, 62Pxx, 97Pxx, 70-xx
This book consists of five parts covering a wide range of topics in applied
mathematics, modeling, and computational science (AMMCS). It resulted from two
highly successful meetings held jointly in Waterloo (Canada) on the main campus
of Wilfrid Laurier University. It is the oldest university in the Cambridge-Kitchener-
Waterloo-Guelph area, a beautiful part of Canada, just west of the city of Toronto.
The main campus of the university is located in a comfortable driving distance
from some of North America’s most spectacular tourist destinations, including the
Niagara Escarpment, a UNESCO World Biosphere Reserve. Over the years, this uni-
versity has become a traditional venue for the International Conference on Applied
Mathematics, Modeling and Computational Science, and in 2015 it was held jointly
with the annual meeting of the Canadian Applied and Industrial Mathematics
(CAIMS) from June 7–12, 2015. The AMMCS interdisciplinary conference series
runs biannually. Focusing on recent advances in applied mathematics, modeling,
and computational science, the 2015 AMMCS-CAIMS Congress drew some of the
top scientists, mathematicians, engineers, and industrialists from all over the world
and was a true celebration of interdisciplinary research and collaboration involving
mathematical, statistical, and computational sciences within a larger international
community.
The book clearly demonstrates the importance of interdisciplinary interactions
between mathematicians, scientists, engineers, and representatives from other dis-
ciplines. It is a valuable source of the methods, ideas, and tools of mathematical
modeling, computational science, and applied mathematics developed for a variety
of disciplines, including natural and social sciences, medicine, engineering, and
technology. Original results are presented here on both fundamental and applied
levels, with an ample number of examples emphasizing the interdisciplinary nature
and universality of mathematical modeling.
The book contains 70 articles, arranged according to the following topics
represented by five parts:
• Theory and Applications of Mathematical Models in Physical and Chemical
Sciences
v
vi Preface
Fig. 1 Participants of the 2015 International AMMCS-CAIMS Congress, Canada (Photo taken by
Tomasz Adamski on the Waterloo Campus at Wilfrid Laurier University)
Fig. 2 Members of the local organizing committee and student volunteers (Photo taken by Dr.
Shyam Badu on the Waterloo Campus at Wilfrid Laurier University)
also grateful to the editorial team at Springer, in particular Martin Peters and Ruth
Allewelt, whose continuous support during the entire process was at the highest
professional level.
We believe that the book will be a valuable addition to the libraries, as well
as to private collections of university researchers and industrialists, scientists and
engineers, graduate students, and all of those who are interested in the recent
progress in mathematical modeling and mathematical, computational, and statistical
methods applied in interdisciplinary settings.
ix
x Contents
Index . . . . . . . . .. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. . . . . . . . . . . . . . . . . . . . 799
Part I
Theory and Applications of Mathematical
Models in Physical and Chemical Sciences
Compressibility Coefficients in Nonlinear
Transport Models in Unconventional Gas
Reservoirs
1 Introduction
Unconventional gas reservoirs include tight gas, coalbed methane, and shale gas.
Shale gas is distributed over large areas and is found in discrete largely unconnected
gas pockets. Different methods are applied to induce fractures inside the rocks to
release the gas, such as hydraulic fracturing, but this is very expensive. Hence,
an initial guess is required before drilling. Reservoir simulations can be crucial in
assisting this process for economical recovery. This requires accurate determination
of fluid and rock properties, and a realistic transport model, [2, 5, 11, 15].
Unconventional gas reservoirs are characterized by extremely low permeability,
in the nano- to micro-Darcy range, and low porosity, in the 4 %–15 % range. The
gas extraction process is very complex and involves new technologies, and takes
a lot of time, money and human resources, [18]. The science and technology of
tight gas transport and extraction is still in its infancy, and field data urgently
required especially from shale gas reservoirs in order to test the newly emerging
theories.
Reservoir simulations typically solve model transport equations in the form of
advection-diffusion partial differential equations (PDE). Some of the latest models
are highly non-linear, where the apparent diffusivity D. p/ and the apparent velocity
U. p; px/ are strongly non-linear functions of the pressure and its derivative, [7]. D
and U involve compressibility factors of various physical parameters,
@ ln 1 @
D D : (1)
@p @p
Various flow regimes occur in the gas transport process through tight shale rock
formations [10]. They are classified by a Knudsen number, see Table 1 and [17, 19],
which is the ratio of mean free path of gas molecules
q () to the radius (R) of the
flow channels, Kn D =R. is given by [13], D 2Rg T , where is gas density,
T is temperature, Rqg is universal gas constant, and is gas viscosity. R is given by,
p
[4, 6], R D 2 2 K , where is the tortuosity and is the porosity of porous
media and K is intrinsic permeability. Several recent works have focused transport
on the so-called four flow regimes, Table 1.
Nonlinear Transport Models in Unconventional Gas Reservoirs 5
D 1 C a .1 /; (4)
Ka D Kf .Kn / (5)
where A and B are empirical constants and bSF in Eq. 6 is the slip factor.
6 I. Ali et al.
Some of the gas adheres (clings) to pore surfaces due to the diffusion of gas
molecules. Cui [9] and Civan [7] developed a formula for estimating the amount of
adsorbed gas based on Langmuir isotherms and is given by
s Mg s Mg qL p
qD qa D ; (8)
Vstd Vstd pL C p
where s (kg/m3 ) denotes the material density of the porous sample, q (kg/m3) is
the mass of gas adsorbed per solid volume, qa (std m3 /kg) is the standard volume
of gas adsorbed per solid mass, qL (std m3 /kg) is the Langmuir gas volume, Vstd
(std m3 /kmol) is the molar volume of gas at standard temperature (273.15 K) and
pressure (101,325 Pa), p (Pa) is the gas pressure, pL (Pa) is the Langmuir gas
pressure, and Mg (kg/kmol) is the molecular weight of gas.
Gas density (kg/m3 ) is given by the real-gas equation of state,
Mg p
D (9)
ZRg T
where Z (dimensionless) is the real gas deviation factor [12] and it can be found by
using the correlation developed by Mahmoud [14] and it is given by
where pc is the critical pressure and tc is the critical temperature, and pr D p=pc and
tr D t=tc are the reduced pressure and temperature respectively.
Mahmoud [14] also gave correlations for determining the gas viscosity,
3 Mathematical Formulation
The ultra low permeability and the occurrence of various flow regimes are key
features of unconventional gas reservoirs (UGR). The PDE’s that are used to
describe transport process in conventional gas reservoirs (CGR) are based on
Darcy’s law u D .K=/dp=dx and continuity equation .u/x D 0, where K, ,
and are constants, but such models do not produce satisfactory results in UGRs.
Civan [7] has proposed a transport model for gas flow through tight porous media
which incorporates all flow regimes that occur in the reservoirs. Civan’s model is a
non-linear advection-diffusion PDE for the pressure field p.x; t/, which is given by,
@p @p @2 p
C U. p; px / D D. p/ 2 : (15)
@t @x @x
Ka
DD f1 . p/ C .1 /q2 . p/g1 ; (16)
@p
U D 3 . p/D : (17)
@x
1 . p/ D . p/ C . p/; (18)
2 . p/ D q . p/ . p/; (19)
1
The steady state solution for the pressure field is obtained by solving, (see [1, 7]),
@p @2 p
La D ; 0 x L; (21)
@x @x2
where
@p
La D . p/ C K . p/ C f . p/ . p/ ; (22)
@x
N cal
X 2
p pmeas
Relative Error D i i
: (23)
iD1
pcal
i
Pressure [kPa]
160 160
120 120
205 kPa
Relative Error
160
120 −5
10
Fig. 1 Pressure, p against the distance along the core sample, x, from numerical solutions of the
Steady State Model, Eqs. (21), (22), for different inlet pressures, Pin , as indicated by color. Solids
lines are from the simulations, and symbols are data from Pong et al. [16]. (a) Darcy’s law, Case 1
in Table 2, with compressibility factors, D 0. (b) Civan’s model with constant compressibility
factors, D Const, for some parameters, see [7]. (c) Case 16 in Table 2 (new model) with pressure
dependent parameters and non-constant compressibility factors, . p/. (d) Relative errors for the
16 cases in Table 2
10 I. Ali et al.
It is important to determine how much the results and predicted rock properties
change due to small changes in model parameters. A sensitivity analysis was carried
out by adjusting one model parameter at a time by factors of 2 and 1=2, starting
with Case 16 as the base case – One-at-a-Time (OAT) methodology. Sensitivity is
measured by monitoring the changes in the model output.
Figure 2 shows sensitivity to selected parameters: (a) pc (critical pressure), (b)
T (temperature), (c) a (constant in the tortuosity model), (d) a (constant in the
porosity model). Except for the temperature, Fig. 2b, all results show significant
sensitivity to changes in the selected parameter especially at higher inlet pressures.
Figure 3 illustrates the sensitivity of the calculated permeability, and porosity
against the pressure, for different combinations of ˛KC , ˇKC , and
KC , Eq. (2).
Nonlinear Transport Models in Unconventional Gas Reservoirs 11
a 300 b 300
135 kPa 135 kPa
170 kPa 170 kPa
250 250
205 kPa 205 kPa
240 kPa 240 kPa
p, [kPa]
p, [kPa]
150 150
100 100
0 0.5 1 1.5 2 2.5 3 0 0.5 1 1.5 2 2.5 3
−3 −3
x, [m] x 10 x, [m] x 10
c 300 d 300
135 kPa 135 kPa
170 kPa 170 kPa
250 250
205 kPa 205 kPa
240 kPa 240 kPa
p, [kPa]
p, [kPa]
150 150
100 100
0 0.5 1 1.5 2 2.5 3 0 0.5 1 1.5 2 2.5 3
−3 −3
x, [m] x 10 x, [m] x 10
Fig. 2 OAT sensitivity analysis of the new model. Symbols are the data from Pong et al. [16] (see
Fig. 2 for details). Sensitivity to the following parameters: (a) Critical pressure pc , (b) Temperature
T, (c) Tortuosity parameter a in Eq. (3), (d) porosity parameter a in Eq. (4). Red lines are the
Base Case parameter values in Table 3. Blue lines: the specific parameter is divided by 2. Green
lines: the specific parameter is multiplied by 2
0
10 0.25
1
6 1
−5 0.20
10 5
3
4
0.15
K, [m ]
2
−10
10
φ
5
7 0.10 2
10
−15 2
6
4 0.05
3 7
−20
10 0
100 150 200 250 300 100 150 200 250 300
p, [kPa] p, [kPa]
Fig. 3 Permeability (K), and porosity (), against the pressure p, based upon the parameter values
in Table 3. Seven cases for each parameter, shown in Table 4, are considered and are indicated
on the plots. (Case 1 is the Base Case, shown as black dashed line.) (a) permeability curves are
obtained using data from columns 2 to 4 of Table 4. (b) Porosity curves are obtained using data
from columns 5 to 7
12 I. Ali et al.
6 Summary
Acknowledgements The authors would like to acknowledge the support provided by King
Abdulaziz City for Science and Technology (KACST) through the Science Technology Unit at
King Fahd University of Petroleum and Minerals (KFUPM) for funding this work through project
No. 14-OIL280-04.
References
1. Ali, I., Malik, N.A., Chanane, B.: Time-fractional nonlinear gas transport equation in tight
porous media: an application in unconventional gas reservoirs. In: 2014 International Con-
ference on Fractional Differentiation and Its Applications (ICFDA), Catania, pp. 1–6. IEEE
(2014)
2. Aziz, K., Settari, A.: Petroleum Reservoir Simulation, vol. 476. Applied Science Publishers,
London (1979)
3. Beskok, A., Karniadakis, G.E.: Report: a model for flows in channels, pipes, and ducts at micro
and nano scales. Microsc. Thermophys. Eng. 3(1), 43–77 (1999)
4. Carman, P.C., Carman, P.C.: Flow of Gases Through Porous Media. Butterworths Scientific
Publications, London (1956)
5. Chen, Z.: Reservoir Simulation: Mathematical Techniques in Oil Recovery. CBMS-NSF
Regional Conference Series in Applied Mathematics, vol. 77. SIAM, Philadelphia (2007)
6. Civan, F.: Effective correlation of apparent gas permeability in tight porous media. Transp.
Porous Media 82(2), 375–384 (2010)
7. Civan, F., Rai, C.S., Sondergeld, C.H.: Shale-gas permeability and diffusivity inferred by
improved formulation of relevant retention and transport mechanisms. Transp. Porous Media
86(3), 925–944 (2011)
8. Civan, F., et al.: Improved permeability equation from the bundle-of-leaky-capillary-tubes
model. In: SPE Production Operations Symposium, Oklahoma City. Society of Petroleum
Engineers (2005)
9. Cui, X., Bustin, A., Bustin, R.M.: Measurements of gas permeability and diffusivity of tight
reservoir rocks: different approaches and their applications. Geofluids 9(3), 208–223 (2009)
10. Cussler, E.L.: Diffusion: Mass Transfer in Fluid Systems. Cambridge University Press,
Cambridge/New York (2009)
11. Darishchev, A., Rouvroy, P., Lemouzy, P.: On simulation of flow in tight and shale gas
reservoirs. In: 2013 SPE Middle East Unconventional Gas Conference & Exhibition, Muscat
(2013)
12. Kumar, N.: Compressibility factors for natural and sour reservoir gases by correlations and
cubic equations of state. M.Sc. Thesis, Texas Tech University (2004)
13. Loeb, L.B.: The Kinetic Theory of Gases. Courier Dover Publications (2004)
Nonlinear Transport Models in Unconventional Gas Reservoirs 13
14. Mahmoud, M.: Development of a new correlation of gas compressibility factor (z-factor) for
high pressure gas reservoirs. J. Energy Resour. Technol. 136(1), 012903 (2014)
15. Peaceman, D.W.: Fundamentals of Numerical Reservoir Simulation. Elsevier, New York
(1977)
16. Pong, K.C., Ho, C.M., Liu, J., Tai, Y.C.: Non-linear pressure distribution in uniform microchan-
nels. ASME public. FED 197, 51–51 (1994)
17. Rathakrishnan, E.: Gas Dynamics. PHI Learning, New Delhi (2013)
18. Wang, Z., Krupnick, A.: A retrospective review of shale gas development in the United States.
What led to the boom? Pub. Resources, Washington (2013)
19. Ziarani, A.S., Aguilera, R.: Knudsen’s permeability correction for tight porous media. Transp.
Porous Media 91(1), 239–260 (2012)
Solutions of Time-Fractional Diffusion Equation
with Reflecting and Absorbing Boundary
Conditions Using Matlab
Abstract The main objective of this work is to develop Matlab programs for
solving the time-fractional diffusion equation (TFDE) with reflecting and absorbing
boundary conditions on finite and infinite domains. Essentially, there are three
major codes, one for finding the exact solution of the TFDE and other two are
for finding the numerical solution of the TFDE. The code for finding the exact
solutions is based on the fundamental solution of the TFDE, whereas the codes
for finding the numerical solutions are based on the explicit and the implicit finite
difference schemes, respectively. Finally, we illustrate the effectiveness of the codes
by applying them to TFDEs with sharp initial data and for various reflecting and
absorbing boundary conditions both on finite and infinite domains. The results show
the difference of solutions between the standard diffusion equation and the time-
fractional diffusion equation.
1 Introduction
Many physical processes evolve in spaces that are heterogeneous in nature, such as,
crowded system, protein diffusion within cells, anomalous diffusion through porous
media, see [3, 4, 6, 17]. Mathematical models, based on standard calculus, have
failed to describe such intricate processes whereas mathematical models, based on
fractional calculus techniques, have proven their effectiveness in explaining such
complex processes, [1, 2, 5, 10, 15].
Time-fractional diffusion equation have been derived in the framework of Con-
tinuous Time Random Walk (CTRW) model. It is based on the idea of considering
the transport processes as the flow of particles in the form of packets and then
assigning a probability of locating a packet at position x at time t. Law of Total
Probability is used to determine probability P.x; t/. Luchko has derived the time-
fractional diffusion equation by using these concept, see the details in [8, 9]. The
Consider the time fractional diffusion equation, in Caputo form, over the whole real
line with given initial data,
@˛ @2
u.x; t/ D u.x; t/; 0<˛1 (2)
@t˛ @x2
where k.jxj; / D p 1 jxj1=2 k1=2 .jxj/ is modified Bessel function of second kind
2
[16]. Furthermore, Eq. (6) can be expressed as
Z 1
uQ .x; p/ D Q ˛ .jx yj; p/f .y/dy;
G (7)
1
Q ˛ .jxj; s/ D 1
Œ1 s=˛
Œ1=2 s=˛
G p 22s=˛ jxj2s=˛1 : (9)
˛
Œ1 s
Taking the inverse Mellin transform and using Fox function, we obtain
2=˛
˛ 1 1 20 jxj .1; 1/
G .jxj; t/ D p jxj H12 : (10)
˛ 22=˛ t .1=2; 1=˛/; .1; 1=˛/
If the initial data is given as delta potential, that is, u.x; 0/ D ı.x/, then the
solution (11) becomes
2=˛
1 1 20 jxj .1; 1/
u.x; t/ D p jxj H12 : (12)
˛ 22=˛ t .1=2; 1=˛/; .1; 1=˛/
For more details, readers are referred to Wyss [18] and Schneider & Wyss [14].
18 I Ali et al.
3 Numerical Solutions
X
m
.1 /
umC1
j D um
j C S !k mk
uj1 2ujmk C ujC1
mk
; (13)
kD0
where
.1 / .1 / k2C .1 /
!0 D 1; !k D !k1 : (14)
k
X
m
.1 / mk
C S !k uj1 2ujmk C ujC1
mk
: (15)
kD1
The above scheme (15) is unconditionally stable, see Theorem 2.1 in [12]. For more
technical details, readers are referred to [7, 12].
boundary.
Time-Fractional Diffusion Equations 19
X
m
.1 / mk
umC1
0 0 C 2S
D um !k u1 u0mk : (16)
kD0
X
m
.1 / mk
.1 C 2S /um
0 2S u1 D u0
m m1
C 2S !k u1 u0mk : (17)
kD1
4 Matlab Codes
The following Matlab code is used for the computation of the exact solution (12).
The following Matlab code is used for the computation of the numerical solutions
which is based on the explicit finite difference scheme (13). The code can be easily
modified for various initial and boundary conditions.
20 I Ali et al.
The following Matlab code is used for the computation of the numerical solutions
which is based on the implicit finite difference scheme (15). The code can be easily
modified for various initial and boundary conditions.
5 Numerical Experiments
In this section, we provide several examples which are solved by using above Matlab
codes on an Intel Core-i7 machine. The computation time is given for each problem.
Example 1 Consider the TFDE
@u 1 @2 u
D K 0 Dt ; (18)
@t @x2
on the domain x > 0 and t > 0 with the initial data is taken as a delta function at
x D 1. Absorbing and reflecting boundary conditions are taken (one by one) at left
boundary x D 0, where as u.x; t/ ! 0 as x ! 1. Exact solution is given by
where W.x; t/ is the solution of TFDE (18) over the whole real line with decaying
boundary conditions when jxj becomes large. In series form, u.x; t/ is expressed as
1
1 X .1/n .x x0 / n=2 .x C x0 / n=2
u.x; t/ D ˙
4K t nD0 nŠ
.1 .1 C n/=2/ K t K t
(20)
Note the minus sign is taken in the case of absorbing BC and plus sign is taken in the
case of reflecting BC. Figure 1 shows the numerical solutions at times t D 0:1; 1; 5.
The data used for numerical computation is
t D 0:001, T D 5, D 0:5, S D
0:33; and the computational time is 9:91 s.
22 I Ali et al.
Fig. 1 Solutions of time fractional diffusion equation 18 with absorbing and reflecting boundary
conditions at the left boundary. Initial condition is taken as delta function at x D 1, where D 0:5.
(a) Absorbing boundary condition. (b) Reflecting boundary condition
Fig. 2 Solutions of time fractional diffusion equation 18 with absorbing boundary conditions at
left and right boundaries. Initial condition is taken as delta function at x D 0. Cusp shape is the
distinct feature of the curve in the case D 0:5. (a) Standard diffusion D 1:0. (b) Anomalous
diffusion D 0:5
Example 2 Consider the TFDE (18) on a box 1 x 1 and t > 0 with absorbing
boundaries at x D 1 and 1. Initial data is given by delta function at x D 0. Exact
solution of the problem is given by
1
X
u.x; t/ D ŒW.x C 4n; t/ W.4n x C 2; t/ : (21)
nD1
Figure 2 shows the numerical solutions at times t D 0:05; 0:1 for D 1 and
at times t D 0:006; 0:1 for D 0:5. The data used for numerical computation is
Time-Fractional Diffusion Equations 23
Fig. 3 Solutions of time fractional diffusion equation 18 with reflecting boundary conditions at
left and right boundaries. Initial condition is taken as delta function at x D 0. Cusp shape is the
distinct feature of the curve in the case D 0:5. (a) Standard diffusion D 1:0. (b) Anomalous
diffusion D 0:5
x D 0:1, T D 0:1, D 1:0, S D 0:49; and the computational time is 9:5 s. In the
case of D 0:5, we choose S D 0:33, and the computational time is 14:71 s.
Example 3 We solve TFDE (18) on a box 1 < x < 1 and t > 0 with reflecting
boundaries at x D 1 and 1. Initial data is given by delta function at x D 0. Exact
solution of the problem is given by
1
X
u.x; t/ D ŒW.x C 4n; t/ C W.4n x C 2; t/ : (22)
nD1
Figure 3 shows the numerical solutions at times t D 0:05; 0:1; 0:2 for D 1 and
at times t D 0:006; 0:1; 0:2 for D 0:5. The data used for numerical computation is
x D 0:01, T D 0:2, D 1:0, S D 0:49; and the computational time is 50:12ṡ. In
the case of D 0:5, we choose S D 0:33,
x D 0:1, and the computational time
is 99:97 s.
6 Conclusions
work of Wyss [18] and Schneider & Wyss [14], whereas the code for finding the
numerical solution is based on the work of Yuste & Acedo (explicit case) [19] and
Langlands & Henry (implicit case) [7].
We have given several examples that illustrate the effectiveness of the codes.
Essentially, numerical solution are found both on finite and infinite domains
with absorbing and reflecting boundary conditions. Initial conditions are taken
as nonsmooth functions (delta functions) and it is observed that in the case of
anomalous diffusion the cusp shape remains in the solutions compared to standard
diffusion where the solution smooths up as time increases.
Acknowledgements The author would like to acknowledge the support provided by King
Abdulaziz City for Science and Technology (KACST) through the Science Technology Unit at
King Fahd University of Petroleum and Minerals (KFUPM) for funding this work through project
No. 14-OIL280-04.
References
1. Ali, I., Malik, N.A.: Hilfer fractional advection–diffusion equations with power-law initial
condition; a numerical study using variational iteration method. Comput. Math. Appl. 68(10),
1161–1179 (2014)
2. Ali, I., Malik, N.A., Chanane, B.: Time-fractional nonlinear gas transport equation in tight
porous media: an application in unconventional gas reservoirs. In: 2014 International Con-
ference on Fractional Differentiation and Its Applications (ICFDA), Catania, pp. 1–6. IEEE
(2014)
3. Chen, W., Sun, H., Zhang, X., Korošak, D.: Anomalous diffusion modeling by fractal and
fractional derivatives. Comput. Math. Appl. 59(5), 1754–1758 (2010)
4. Fedotov, S., Iomin, A.: Migration and proliferation dichotomy in tumor-cell invasion. Phys.
Rev. Lett. 98(11), 118,101 (2007)
5. Jeon, J., Tejedor, V., Burov, S., Barkai, E., Selhuber-Unkel, C., Berg-Sørensen, K., Oddershede,
L., Metzler, R.: In vivo anomalous diffusion and weak ergodicity breaking of lipid granules.
Phys. Rev. Lett. 106(4), 048,103 (2011)
6. Koch, D., Brady, J.: Anomalous diffusion in heterogeneous porous media. Phys. Fluids (1958–
1988) 31(5), 965–973 (1988)
7. Langlands, T., Henry, B.: The accuracy and stability of an implicit solution method for the
fractional diffusion equation. J. Comput. Phys. 205(2), 719–736 (2005)
8. Luchko, Y.: Anomalous diffusion: models, their analysis, and interpretation. Adv. Appl. Anal.
115–145 (2012)
9. Luchko, Y., Punzi, A.: Modeling anomalous heat transport in geothermal reservoirs via
fractional diffusion equations. GEM Int. J. Geomath. 1(2), 257–276 (2011)
10. Malik, N., Ali, I., Chanane, B.: Numerical solutions of non-linear fractional transport
models in unconventional hydrocarbon reservoirs using variational iteration method. In: 5th
International Conference on Porous Media and Their Applications in Science (Engineering
and Industry, Eds, ECI Symposium Series, Volume) (Hawaii, 2014). http://dc.engconfintl.org/
porous_media_V/43
11. Metzler, R., Klafter, J.: The random walk’s guide to anomalous diffusion: a fractional dynamics
approach. Phys. Rep. 339(1), 1–77 (2000)
12. Murio, D.A.: Implicit finite difference approximation for time fractional diffusion equations.
Comput. Math. Appl. 56(4), 1138–1145 (2008)
Time-Fractional Diffusion Equations 25
13. Podlubny, I.: Fractional Differential Equations: An Introduction to Fractional Derivatives, Frac-
tional Differential Equations, to Methods of Their Solution and Some of Their Applications,
vol. 198. Academic, New York (1998)
14. Schneider, W., Wyss, W.: Fractional diffusion and wave equations. J. Math. Phys. 30(1), 134–
144 (1989)
15. Tabei, S., Burov, S., Kim, H., Kuznetsov, A., Huynh, T., Jureller, J., Philipson, L., Dinner, A.,
Scherer, N.: Intracellular transport of insulin granules is a subordinated random walk. Proc.
Natl. Acad. Sci. 110(13), 4911–4916 (2013)
16. Watson, G.N.: A Treatise on the Theory of Bessel Functions. Cambridge University Press,
Cambridge/New York (1995)
17. Weiss, M., Elsner, M., Kartberg, F., Nilsson, T.: Anomalous subdiffusion is a measure for
cytoplasmic crowding in living cells. Biophys. J. 87(5), 3518–3524 (2004)
18. Wyss, W.: The fractional diffusion equation. J. Math. Phys. 27(11), 2782–2785 (1986)
19. Yuste, S., Acedo, L.: An explicit finite difference method and a new von Neumann-type
stability analysis for fractional diffusion equations. SIAM J. Numer. Anal. 42(5), 1862–1874
(2005)
20. Yuste, S.B., Quintana-Murillo, J.: A finite difference method with non-uniform timesteps for
fractional diffusion equations. Comput. Phys. Commun. 183(12), 2594–2600 (2012)
Homoclinic Structure for a Generalized
Davey-Stewartson System
Abstract In this study, we analyze the homoclinic structure for the generalized
Davey-Stewartson system with periodic boundary conditions. This system involves
three coupled nonlinear equations and describes (2 C 1) dimensional wave prop-
agation in a bulk medium composed of an elastic material with coupled stresses.
We first provide linearized stability analysis of the plane wave solutions of the
generalized Davey-Stewartson system. Then, give an analytic description of the
characteristics of homoclinic orbits near the fixed point by finding soliton type
solutions. These solutions are derived via Hirota’s bilinear method. We also show
that two of these solutions form a pair of symmetric homoclinic orbits and all these
symmetric homoclinic orbit pairs construct the homoclinic tubes.
1 Introduction
Homoclinic orbits are important for the study of chaos in deterministic nonlinear
dynamics. In a neighborhood of such an orbit, an extended knowledge of geometric
structures lead one to a better understanding of chaotic dynamics. The homoclinic
structure of nonlinear Schrodinger (NLS) equation is considered by Ablowitz and
Herbst in [1]. They have shown how this structure associated with the cubic NLS
equation may be obtained from the N-soliton solutions of the defocusing NLS
equation. We follow a similar approach and first observe that the fixed point in
the GDS system is hyperbolic. Then, we analyze the homoclinic structure for the
generalized Davey-Stewartson (GDS) equations.
Q 2A C k2
iAQ C pAQ C rAQ D qjAj .3 Q 1; C 1 Q2; /A;
Q
2!
.c2g c21 /Q 1; c22 Q 1; .c21 c22 /Q 2; D 3 k2 .jAj
Q 2 / ;
.c2g c22 /Q 2; c21 Q2; .c21 c22 /Q 1; D 1 k2 .jAj
Q 2 / ; (1)
where and are spatial coordinates and is time; AQ is the complex amplitude of the
short transverse wave mode, and Q1 and Q2 are long longitudinal and long transverse
wave modes, respectively. The coefficients that appear in (1) can be given as follows
C 2
c21 D ; c22 D ; cg D c22 .k C 8m2 k3 /=!;
0 0
B A C 2B
1 D c21 2c22 C ; 3 D c21 C ;
0 20
1 2 c2 k6 32
pD .cg c22 24m2 c22 k2 /; r D 2 .1 C 8m2 k2 /; q D ;
2! 2! !D1 .2k; 2!/
A simple algebra shows that the coefficients p, q and r are all positive. In terms of
dimensionless variables, AQ D u; Q1 D '1 ; Q2 D '2 ; and
such that c21 c2g < 0 if k > kc and c21 c2g > 0 if k < kc because c21 > c22 . (The
case where k D kc corresponds to long-wave short-wave resonance since the phase
speed of longitudinal wave, c1 , is equal to the group speed of the transverse wave,
cg .) Thus, depending on the wave number k chosen, the coefficients of the second
and third equations of the GDS system may change their sign. For example, the
respective sign of .m1 ; m2 ; / is .; ; C/ if k > kc and is .C; C; / if k < kc .
Now the GDS system will be classified according to the values of parameters. In
fact, since ı > 0 the first equation is always elliptic. The classification of the last
two coupled equations of (4) is based on eigenvalues of the coefficient matrix of a
first order linear system with four equations equivalent to the second-order linear
system, (4)2 and (4)3 . Therefore, system (4) can be classified as elliptic-elliptic-
elliptic, elliptic-elliptic-hyperbolic, and elliptic-hyperbolic -hyperbolic according to
the respective sign of .m1 ; m2 ; /: .C; C; C/, .C; C; /, and .; ; C/ [3]. The
descriptions given above lead that m1 , m2 and cannot be positive at the same time.
Thus, the last two cases correspond to physical cases.
In this section, the GDS system (4) is considered with the following boundary
The starting point for developing homoclinic-type solutions is to find a suitable fixed
2
point. In this case, for .u; '1 ; '2 /, the fixed point will be chosen as .a eijaj t ; 0; 0/,
where a is any complex number.
Next, we investigate the stability of fixed point by considering small perturba-
tions of the form,
2
u D a eijaj t .1 ".x; y; t//; '1;x D '1" .x; y; t/; '2;y D '2" .x; y; t/: (9)
Substituting (9) into (4) and keeping linear terms leads one to
Assuming the following form of solutions for the linearized system we obtain
For the proper choice of the parameters we see that the fixed point is hyperbolic.
Homoclinic structure of the GDS system will be studied in this section. One of the
two physical cases, i.e. the respective sign of .m1 ; m2 ; / is .C; C; / with m1 > m2 ,
will be given in detail, since they have similar approach and result.
Homoclinic Structure for a Generalized Davey-Stewartson System 31
In order to write the GDS system in Hirota bilinear form we need to make the
following restrictions on the parameter values
.1 ım1 /
m2 D m1 n; D 1 n; bD : (13)
ı1
We have to note that under these conditions imposed on the parameters generalized
Davey-Stewartson equations are isomorphic to that of the standard integrable
Davey-Stewartson equations.
Since we are interested in a homoclinic orbit of the fixed point, the following
substitutions will be made for (4)
.iD t C ıD 2x C D 2y C a2 /G F D ˇG F;
2ˇ
.D 2x C m1 D 2y /F F 2a2 jGj2 D F F: (15)
Now, Eqs. (15) are assumed to possess the following solution functions:
ıp21 C p22 C i˝
b1 D b2 D b4 ; ˇ D a2
ıp21 C p22 i˝
.ıp21 C p22 C i˝/3 2 ıp21 C p22 2 2
b3 D b ; b5 D Œ1 C . / b4 ;
˝ 2 .ıp21 C p22 i˝/ 4 ˝
2a2 .m1 1/
˝˙ D ˙jıp21 C p22 jŒ 11=2 : (17)
.ı 1/. p21 C m1 p22 /
Here the result obtained for ˝ coincides with the result in the linearized stability
analysis. At this step, p1 and p2 will be chosen as
s s
.m1 1/ .m1 1/
p1 D a sin ; p2 D a sin ; (18)
.ı 1/ .ı 1/m1
32 C. Babaoglu and I. Hacinliyan
where 0 is a constant. Then, we get the following solutions for the GDS
system (4) as
4 Conclusions
We will conclude by discussing the homoclinic structure of the GDS system (4).
The solutions (19) have the characteristics of a homoclinic orbit having spatially
periodic fixed points with periods p1 D 2m=L1 and p2 D 2m=L2 . The solution
C C 2
.uC ; '1;x ; '2;y / leaves the ring of fixed points .a eia t ; 0; 0/ as t ! 1
2
and returns to the ring .a eia t b2 ; 0; 0/ as t ! 1. On the other hand,
2
the solution .u ; '1;x ; '2;y / leaves the ring of fixed points .a eia t ; 0; 0/ as
2
t ! 1 and returns to the ring .a eia t b2C ; 0; 0/ as t ! 1. Moreover,
C C
phase shift is seen between the solutions .uC ; '1;x ; '2;y / and .u ; '1;x ; '2;y /.
C C C C
Besides, while .uC ; '1;x ; '2;y /.x0 ; y0 ; t/ forms homoclinic orbit .uC ; '1;x ; '2;y /.x0 C
2m=p1 ; y0 C 2m=p2 ; t/ forms homoclinic orbit as well and this result also
C C
holds for .u ; '1;x ; '2;y /. Finally, we can say that the solutions .uC ; '1;x ; '2;y /
and .u ; '1;x ; '2;y / form a pair of symmetric homoclinic orbits and all of these
orbit pairs construct homoclinic tubes. As an illustration of the dynamical behavior
separated by the homoclinic orbits, the amplitude C D juC j for D 10 and
D ju j for D 10 are shown in Fig. 1.
Homoclinic Structure for a Generalized Davey-Stewartson System 33
Fig. 1 The solution of (4) for (a) ı D 0:5, D =3, D 0:5, D 1, a D 1, m1 D 1:75,
m2 D 0:25 and n D 1:5 for (b) ı D 1:5, D =3, D 0:1, D 1, a D 1, m1 D 1:2, m2 D 0:1
and n D 1:1
References
1. Ablowitz, M.J., Herbst, B.M.: On homoclinic structure and numerically induced chaos for the
nonlinear Schrodinger equation. SIAM J. Appl. Math. 50, 339–351 (1990)
2. Babaoglu, C., Erbay, S.: Two-dimensional wave packets in an elastic solid with couple stresses.
Int. J. Non-Linear Mech. 39, 941–949 (2004)
3. Babaoglu, C., Eden, A., Erbay, S.: Global existence and nonexistence results for a generalized
Davey-Stewartson system. J. Phys. A Math. Gen. 37, 11531–11546 (2004)
Numerical Simulations of the Dynamics
of Vortex Rossby Waves on a Beta-Plane
L.J. Campbell
1 Introduction
by the dominant system-scale processes such as surface friction and boundary layer
effects [15, 21].
Vortex Rossby wave mean-flow interactions take place primarily in the vicinity
of the critical radius where the mean angular velocity of the vortex is equal to
the phase speed of the waves. This suggests that vortex Rossby wave critical layer
theory could be helpful in advancing our understanding of the mechanisms by which
these waves could contribute to the development of secondary eyewalls in tropical
cyclones. The theory for the analogous problem of barotropic planetary Rossby
waves in a rectangular domain on a beta-plane is well-developed and that problem
has been studied extensively using analytical and numerical methods, e.g. [2, 4–
6, 22–24]. Recent analytical investigations with Nikitina [16–18] of the barotropic
vortex Rossby wave configuration indicate several qualitative similarities between
the two problems.
Nikitina and Campbell [17] presented analytical solutions for a configuration
involving a cyclonic vortex with angular velocity ˝.r/
N on a horizontal plane defined
in terms of polar coordinates r and . The f -plane approximation was made in
this preliminary investigation, i.e., the Coriolis parameter was approximated by a
constant. A wave of the form cos .k !t/ was forced at a fixed radius r D r1
representing the location of the primary eyewall and the linearized barotropic
vorticity equation was solved to determine the amplitude of the forced wave as
a function of the radial variable r and time t. For a special quadratic profile of
˝.r/,
N exact analytical solutions were obtained in terms of hypergeometric functions
for waves with steady amplitude and these solutions were then used to find late-
time asymptotic solutions for waves with time-dependent amplitude, first in the
outer region away from the critical radius and then in the inner region in the
vicinity of the critical radius. The solutions obtained show that the wave amplitude
is greatly attenuated at the critical radius as the wave propagates outwards from
the eyewall. This can be interpreted as wave absorption by the mean flow. In the
limit of infinite time, the time-dependent solution in the outer region approaches
the corresponding steady solution, but the inner solution grows with time. These
conclusions are consistent with the situation that is attained in the case of forced
planetary Rossby waves in a rectangular domain on a ˇ-plane where the Coriolis
parameter is considered to be a linear function of latitude.
Nikitina and Campbell [18] extended the investigation of [17] to include the
nonlinear terms in the governing equations, as well as the terms arising from the
latitudinal gradient of the Coriolis parameter which give the so-called ˇ-effect.
The wave amplitude was then considered as an expansion in powers of two small
parameters representing nonlinearity and the ˇ-effect with the leading-order terms
in the expansion being given by the outer and inner solutions derived in [17]. It was
found that nonlinearity gives rise to higher wavenumbers in multiples of the forced
wavenumber k, a zero wavenumber component which represents a divergence of
momentum flux into the mean flow, and an inward displacement of the instantaneous
critical radius. The variation of the Coriolis force gives rise to wave modes with
wavenumbers .k ˙1/. In the case where the forced wavenumber k D 1, the variation
Numerical Simulations of the Dynamics of Vortex Rossby Waves on a Beta-Plane 37
of the Coriolis force thus introduces an additional zero wavenumber component and
hence contributes to the evolution of the mean flow.
The model employed by Nikitina and Campbell [17, 18] is highly idealized
considering that it is two-dimensional and does not take into account effects
such as diabatic heating and boundary layer friction which form the basis of the
conventional theory of tropical cyclone secondary eyewall generation. But on the
other hand, the simplicity of the model allowed us to examine Rossby wave mean-
flow interaction mechanisms in isolation of other effects and the analytical solutions
obtained gave us some insight into the temporal evolution of the solution. The
main features of the solutions, namely the critical layer absorption of the waves,
the development of concentric rings of high wave activity and the changes in the
location of these rings with time, are consistent with the hypothesis that vortex
Rossby waves contribute to the secondary eyewall replacement cycle. However, the
weakly-nonlinear analysis of [18] is valid only for finite time since the higher-order
terms in the perturbation expansion for the solution grow with time. Multiple-time-
scale asymptotic analyses would be needed to continue the analytical investigation
to later time and to higher orders in the expansion parameters. In analogy with the
classical rectangular configuration [22, 24], it can be anticipated that there would be
wave reflection at the critical radius at late time, possibly leading to eventual wave
breaking and instabilities.
The purpose of the current investigation is to use numerical methods to further
elucidate the critical layer behaviour of forced vortex Rossby waves propagating
outwards in a cyclonic vortex and investigate the effects of the critical layer
interaction on the evolution of the mean vortex. The model used is described in
Sect. 2 and some preliminary numerical results are presented in Sect. 3.
The numerical simulations presented here make use of a two-dimensional model for
barotropic vortex Rossby waves in a cyclonic vortex on a ˇ-plane, a horizontal plane
on which the Coriolis parameter is approximated by a linear function of latitude.
The flow is described in terms of a streamfunction and is represented by the
nondimensional barotropic vorticity equation (see, e.g., [9]). This can be written in
polar coordinates r and as [17]
1 1 ˇ
r 2 t r 2 r C r r 2 sin C ˇr cos D 0; (1)
r r r
where the subscripts denote partial differentiation with respect to r and . The non-
dimensional parameter ˇ is the latitudinal gradient of the Coriolis parameter f . The
corresponding dimensional quantity is [9]
2˝Earth
ˇ D cos 0 ; (2)
REarth
38 L.J. Campbell
where 0 is the latitude of the centre of the vortex, ˝Earth 7 105 s1 is the
angular velocity of the Earth’s rotation, and REarth 6:3106 km is the radius of the
Earth. Near the equator where 0 is close to zero, ˇ is close to 2.2 1011 m1 s1 .
For a typical tropical cyclonic vortex radius L of about 2 3 105 m, and a typical
tangential wind speed U of about 30-100 ms1 , ˇ D L2 ˇ =U
102 and can
thus be considered as a small parameter in the nondimensional problem. The limit
of ˇ ! 0 gives the f -plane approximation, in which the Coriolis parameter is
approximated by a constant.
The vortex wave is represented as a small-amplitude perturbation to the basic
flow of the cyclonic vortex. The streamfunction N .r/, the angular velocity ˝.r/
N and
the azimuthal component v.r/
N of the velocity of the basic flow are related by
v.r/
N D N 0 .r/; v.r/
N D r˝.r/;
N (3)
where the prime denotes differentiation with respect to r. The total streamfunction
is written as
where the parameter " is the ratio of the dimensional magnitude of the perturbation
to that of the basic flow. Observations of the asymmetric spiral bands that are
described as vortex Rossby waves in hurricanes indicate small deviations from
circular symmetry. For example, analyses [7, 19] of Doppler wind and Omega
dropwindsonde data from Hurricane Gloria (1985) show that within 500 km of the
hurricane centre, the asymmetric components of the tangential wind corresponding
to azimuthal wavenumbers 1, 2, 3 and 4 are much smaller than the symmetric
tangential wind. This would suggest that " can be considered as a small parameter
in the nondimensional problem and thus justifies the use of linear [14, 17] and
weakly-nonlinear analyses [18] as a means to provide insight into a fully nonlinear
configuration that can only be examined numerically.
Substituting (4) into (1) gives a nonlinear equation for the perturbation
@ vN @ 1 d vN
C r2 vN 0
C
@t r @ r dr r
ˇ ˇ " 2 2
sin C ˇ r cos C vN cos D . rr r r /: (5)
r " r
Fig. 1 Configuration: the waves are forced by a sinusoidal boundary condition at r D r1 and
propagate outwards [17]
–
Ω
Ω0
ω/k
–
Ω=Ω0 exp(–αr2)
–
Ω=Ω0 (1–αr2)
r1 rc √2rc r
Fig. 2 The mean flow angular velocity profiles used in the numerical simulations and the intervals
in which the analytical solutions obtained in [17, 18] are valid
3 Results
The results presented here are for the quadratic profile shown in Fig. 2. The waves
are forced at r D r1 D 2 with a frequency of ! D 1 and a wavenumber of k D 2
or k D 1. The nonlinear parameter is set to " D 0:05 and the gradient of planetary
vorticity is ˇ D 0 or ˇ D 0:05. In each case, the nondimensional parameters ˛ and
˝0 are chosen so that the critical radius is at r D rc D 12.
Three configurations are examined here: ˇ D 0, k D 2 ( f -plane); ˇ D 0:05,
k D 2 (ˇ-plane); ˇ D 0:05, k D 1 (ˇ-plane). In each case, contour plots of
the perturbation streamfunction and the perturbation vorticity and a graph of the
Fourier or wavenumber spectrum of the perturbation streamfunction are presented
at nondimensional time t D 100. The perturbation streamfunction is written as
1
X
.r; ; t/ D .r; ; t/ei (6)
D1
Fig. 3 Nonlinear numerical simulations on an f -plane with k D 2: (a) Wave streamfunction; (b)
Wave vorticity
|φ |
κ
Fig. 4 Nonlinear numerical simulations on an f -plane with k D 2: Fourier spectrum of the
streamfunction amplitude at r D rc D 12
ΔΩ
Fig. 5 Nonlinear numerical simulations on an f -plane with k D 2: change in the mean flow as a
function of time at r D rc D 12
Fig. 6 Nonlinear numerical simulations on a ˇ-plane with k D 2: (a) Wave streamfunction; (b)
Wave vorticity
|φ |
κ
Fig. 7 Nonlinear numerical simulations on an ˇ-plane with k D 2: Fourier spectrum of the
streamfunction amplitude at r D rc D 12
ΔΩ
Fig. 8 Nonlinear numerical simulations on a ˇ-plane with k D 2: change inthe mean flow as a
function of time at r D rc D 12
Figures 9, 10, and 11 show results obtained with ˇ D 0:05 and k D 1. With
this smaller value of k D 1, the wave amplitude decreases less rapidly with radial
distance from the centre followed by a more rapid attenuation at the critical radius.
This is seen in Fig. 9a, b. From Fig. 10 it is also seen that the ˇ-effect generates
modes corresponding to D ˙.k 1/; ˙.k C 1/ D 0; ˙2; : : :, which coincide
44 L.J. Campbell
Fig. 9 Nonlinear numerical simulations on a ˇ-plane with k D 1: (a) Wave streamfunction; (b)
Wave vorticity
|φ |
κ
Fig. 10 Nonlinear numerical simulations on an ˇ-plane with k D 1: Fourier spectrum of the
streamfunction amplitude at r D rc D 12
with the modes generated by the effect of nonlinearity to produce terms with greater
magnitude than those shown in Fig. 7. Figure 11 shows that the mean flow evolution
takes the form of oscillations with an amplitude that increases slowly with time.
Numerical Simulations of the Dynamics of Vortex Rossby Waves on a Beta-Plane 45
ΔΩ
Fig. 11 Nonlinear numerical simulations on a ˇ-plane with k D 1: change in the mean flow as a
function of time at r D rc D 12
4 Concluding Remarks
Numerical methods were used to investigate vortex Rossby wave mean-flow inter-
actions in a barotropic model of a tropical cyclone. Consistent with the analytical
solutions presented in [17, 18], it was found that nonlinearity gives rise to higher
wavenumbers, momentum flux divergence into the mean flow and an (initial) inward
displacement of the critical radius. The ring of high vorticity around the critical
radius resembles a developing secondary wall. The variation of the Coriolis force
gives rise to wave modes with wavenumbers ˙.k ˙ 1/ and affects the mean flow
if k D 1. In each case, the dominant contributions to the vortex perturbation come
from the zero wavenumber and low wavenumber components, at least within the
time frame shown. This is consistent with observations of Hurricane Gloria (1998)
[7] analyzed and discussed by Shapiro and Montgomery [19].
These numerical results are preliminary; further numerical experimentation and
analyses are needed. Ultimately, vertical variation, diabatic heating and other effects
need to be included for a more realistic representation, but the observations from
the results obtained with this simplified barotropic configuration can be used as a
starting point for further studies.
Acknowledgements The author would like to thank Dr. L. Nikitina for drawing the schematic
diagrams shown in Figs. 1 and 2 and the anonymous reviewer for helpful comments.
46 L.J. Campbell
References
Dmitriy Chebanov
1 Introduction
D. Chebanov ()
City University of New York – LaGCC, Long Island City, NY, USA
e-mail: [email protected]
a generic approach for establishing the existence of such motions under no initial
assumption regarding the mass distribution in the bodies.
We present a new particular solution of the problem described above that is
analogous to the solution of the Euler and Poisson equations found by Hess [10].
We describe the structure of the new solution, establish conditions for its existence,
prove compatibility of these conditions, and, in the case when the conditions are
fulfilled, reduce the equations of motion to quadratures. Then, we explore some
aspects of the geometry of the chain’s motion described by the new solution.
In this section, we recall the terminology and notations of [8] complementing them
with the ones needed for the purpose of this contribution.
We consider a mechanical system S consisting of n heavy rigid bodies B1 ; B2 ; : : : ;
Bn . The bodies Bi and BiC1 .i D 1; 2; : : : ; n 1/ are coupled by an ideal spherical
joint at a common point OiC1 so that the system S constitutes a chain of rigid bodies.
One of the chain’s end links, B1 , is absolutely fixed at one of its points O1 .¤ O2 /.
It is assumed that the line li .i D 1; 2; : : : ; n 1/ connecting the attachment points
Oi and OiC1 of the body Bi passes through its center of mass Ci . For the body Bn ,
ln denotes the line passing through the body’s attachment point On and its center of
mass Cn . If the position of the points Ci and OiC1 relative to Oi are determined by
the vectors ci and si , respectively, then, due to the above assumptions, ci D ci ei and
si D si ei , where ei is a unit vector directed along li .
While studying the motion of system S, it is convenient to deal with mass
characteristics of so-called augmented body Bi instead of mass characteristics of Bi .
Let us denote the mass of Bi by mi . By definition, the body Bi consists of the body Bi
Pn
and the point mass mi D mj which is rigidly attached to Bi at point OiC1 . Since
jDiC1
it has been assumed that the points Oi ; Ci , and OiC1 lie on li .i D 1; 2; : : : ; n1/, this
definition implies that the mass center Ci of body Bi lies on li as well. It also follows
from the definition of an augmented body that the absolute angular velocities of
bodies Bi and Bi are equal, while the first-order mass momentum ai and the tensor
of inertia Ii of Bi at Oi can be expressed as
The vector equations of motion for the system S under consideration can be
written as follows [5, 13]:
X
i1
X
n
.Ii !i / C ai sj ei !j ej C si aj ei !j ej C ai gei D 0;
jD1 jDiC1
(3)
where !i is the absolute angular velocity of body Bi , is the upward vertical unit
vector, and the dot denotes absolute derivative.
Let ˙ D fO1 ; 1 2 3 g be a Cartesian reference frame whose vectors are fixed
.i/ .i/ .i/
in inertial space so that 3 D . Let also ė i D fOi ; eQ 1 eQ 2 eQ 3 g be an orthonormal
moving frame whose axes are the principal axes xof yBi at Oi . Then,x the inertia matrix
e
Ii of Bi in this frame takes the form e Ii D diag eI i ;e
I i ;e
I zi , where e I i ;e
I i , and e
y
I zi are the
principal moments of inertia of Bi at Oi .
In the rest of the chapter, we study a case when, for every i, the center of mass of
Bi belongs to one of its principal planes. In this case, without loss of generality, we
.i/ .i/
assume that Ci is located in the plane formed by the vectors eQ 1 and eQ 3 , implying
.i/ .i/ .i/
that ei D .exi ; 0; ezi / in the principal axes frame, and choose ˙i D fOi ; e1 e2 e3 g to
be a so-called “special” frame [11, 12] whose base vectors are given by
.i/
.i/ ei ei eQ 3
.i/ .i/ eQ ei
e3 D ei ; e2 D ˇ 3 ˇ D eQ 2.i/ ; .i/ .i/
e1 D e2 e3
.i/
D ˇ ˇ ;
ˇ .i/ ˇ ˇ .i/ ˇ
ˇei eQ 3 ˇ ˇei eQ 3 ˇ
i.e., the special frame ˙i can be obtained from the principal axes frame ė i by
.i/
rotating the latter about its second axis. Hence, e2 is a unit vector of a principal axis
of Bi at Oi and the rotation matrix Ri describing the above frame transformation is
given by
0 1
ezi 0 exi
Ri D @ 0 1 0 A :
exi 0 ezi
Then, in the special frame, ei D .0; 0; 1/ and the inertia tensor Ii can be represented
as
0 2 2 x 1 0 1
I xi ezi C e
e I zi exi 0 eIi e I zi exi ezi Iix 0 Iixz
B C @
Ii D Rie
Ii RTi D @ 0 ey
Ii 0 A D 0 Ii 0 A :
y
x 2 2
Ii e
e I zi exi ezi 0 e I xi exi C e I zi ezi Ii 0 Iiz
xz
In order to determine the position of body Bi with respect to the reference frame,
we use Euler angles i ; i ; and 'i , where i .0 i < / is the angle of nutation,
50 D. Chebanov
i .0 i < 2/ is the angle of precession, and 'i .0 'i < 2/ is the angle
of proper rotation. The motion of system S is a superposition of the motion of its
skeleton O1 O2 : : : On Cn , that is composed of the segments of axes li bounded by the
corresponding attachment points, and the pure rotation of each body about li . The
former motion is completely determined by all angles i ; i , while the rotation of Bi
about li is described by the angle 'i .
We will say that system S performs similar motions if it moves so that its skeleton
belongs to a vertical plane ˘ rotating about the vertical axis defined by in
accordance with a non-stationary law .t/ while the skeleton’s segments change
their position with respect to ˘ identically in time, i.e., all the bodies move
similarly. For such motions, it is fulfilled that
where .t/ and .t/ are functions of time to be determined, ıi 2 f1; 0; 1g, and
i D 1; 2; : : : ; n.
The similar motions (4) were first discovered in [14, 18] for a chain of n heavy
Lagrange tops. Below we follow the strategy for analyzing the problem on similar
motions suggested in [8].
Projecting equations (3) onto the axes of the corresponding body-fixed frames
and substituting (4) into the equations so obtained yields the following overde-
termined system of 3n second-order differential equations with respect to n C 2
unknowns .t/; .t/, and 'i .t/:
h i
y
Jix pP i C Iixz rPi C Iiz Ji qi ri C Iixz pi qi ai g C Hi .cos /R sin cos 'i D 0;
h i
Ji qP i C Jix Iiz pi ri C Iixz ri2 p2i C ai g C Hi .cos /R sin sin 'i D 0;
y
y
Iixz pP i C Iiz rPi C Ii Iix pi qi Iixz qi ri D 0; (5)
where pi D P cos 'i C P sin sin 'i ; qi D P sin 'i C P sin cos 'i ; ri D 'Pi C
P cos ;
Let us assume that each body Bi is a Hess top [10], i.e. a rigid body whose center of
mass lies on the perpendicular to the circular cross-section of the gyration ellipsoid.
In the principal axes frame ė i , the condition on the mass parameters of a Hess top
Bi is given by
x 2 x y 2 z x y
ei e Ii eIi e Ii e
I zi D ezi e Ii e
Ii : (8)
Below we construct a solution of (5) that, as the Hess solution [10] of the Euler and
Poisson equations, is characterized by the invariant relation
Proposition 1 If the conditions (9) and (16) are fulfilled, the system of equations (3)
has a class of exact solutions with properties (4).
Indeed, we infer from the previous discussion that, under the assumptions of this
proposition, the system (5) is compatible. To find the dependence of the variables
; , and 'i on time, one can proceed as follows. From the first equation in (14), we
find
Z cos s y
J i C Hi Hi 2
t D t0 C y d: (17)
cos 0 .hi 2ai g/ .1 2 / ki2 =Ji
Thus, cos can be obtained as the inverse of the hyperelliptic integral (17), in the
form of an hyperelliptic function. Let cos D F.t t0 /. We can get .t/ by solving
the last equation for . Then, we find .t/ from (14):
Z t
ki d
.t/ D 0 C y :
Ji t0 1 F 2 . t0 /
Finally, we observe that, for each i, the relation (10) can be transformed, by virtue
of (14), (17), into a Ricatti equation with respect to the variable ui .t/ D tan.'i .t/=2/:
.1/ .2/ .3/ .1/ .2/
uP i D i .t/ i .t/ u2i i .t/ui i .t/ i .t/; (18)
where
s
.hi 2ai gF.t t0 // .1 F 2 .t t0 // ki2 =Ji
y
.1/ I xz
i .t/ D iz y ;
2Ii Ji C Hi Hi F 2 .t t0 / .1 F 2 .t t0 //
.1/ .2/
R i Pi .t/wP i C Pi .t/wi D 0;
w (19)
On the Problem of Similar Motions of a Chain of Coupled Heavy Rigid Bodies 53
where
.1/
P i P i
.2/
2
2
.1/ .3/ .2/ .2/ .1/
Pi .t/ D .1/ .2/
i ; Pi .t/ D i i :
i i
Given a solution wi .t/ of (19), one can find 'i .t/ from
n h
io
.2/ .1/
'i .t/ D 2 tan1 wP i .t/= i .t/ i .t/ wi .t/ :
In this section we show that there exist physically meaningful values of the
multibody chain parameters making the conditions (9), (16) compatible in the case
when si ¤ 0 and ai ¤ 0: For the sake of brevity, we consider a simplest case of
a two-body system assuming that 2 D 1 C in (4). Then, due to (2), (6), (7),
"12 D 1; 12 D 2; J1 D I1 C m2 s21 C L1 ; J2 D I2 C L2 ; L1 D L2 D a2 s1 ; H1 D
y y y y
H2 D 2a2 s1 , the conditions (9) are equivalent to (8), and the conditions (16) become
y y
J2 D J1 ; a2 D a1 ; h2 D h1 ; k2 D k1 : (20)
Taking into account (1) and (6), we observe that the relations (8), (20) form an
j 2
algebraic system of 6 equations with respect to 19 parameters e
j
I i .> 0/; ei . exi C
z 2 yc yc
ei D 1/; Ii .> 0/; mi .> 0/; ci ; hi ; ki .i D 1; 2I j D x; z/; s1 . Here Ii is the central
.i/
moment of inertia of body Bi with respect to the axis defined by vector eQ 2 , and
hence
Ii D e
I i D Ii C mi c2i :
y y yc
(21)
In the rest of this section we solve the following problem: if the parameters defining
the mass distribution in the bodies are known, find possible ways for coupling the
bodies as well as the initial conditions of their motion.
From the second equation in (20), we obtain that
m1
c2 D c1 C s1 : (22)
m2
54 D. Chebanov
Substituting the expression for c2 into the first equation in (20) and solving the
equation so obtained for s1 yields
yc yc
I1 I2 m2 m1
s1 D C c1 : (23)
2m1 c1 2m2
In order to satisfy the system of relations (9), (16), one can now select the
parameters of system S as follows. Assuming that the masses mi and parameter c1
have been chosen arbitrarily, the inertia moments e I xi ;e
yc
I zi ; Ii and parameters exi ; ezi can
be selected to comply with (8). Then, the values for s1 and c2 can be found from (23)
and (24), respectively. Finally, the values of hi and ki are to be determined to make
the last two relations in (20) true. Knowing the values of the integration constants,
one can obtain the initial conditions of motion, using (4) and (14).
As follows from the above analysis, in the case under consideration, there is a
unique way of coupling the tops B1 and B2 that guarantees the existence of the
yc yc
motion of interest. If c1 > 0; m2 > m1 ; and I1 I2 , then s1 > 0 and c2 > 0, i.e.
the conditions (9), (16) can
q be satisfied by positive values of c1 ; c2 ; and s1 . Moreover,
1
yc yc
s1 > c1 , when 0 < c1 < m1 m2 .m1 C m2 / 1 I1 I2 .
Thus, we have proven that it is possible to select physically meaningful values of
parameters characterizing the chain of rigid bodies under consideration so that the
conditions (9), (16) are fulfilled. This completes our proof of the existence of the
similar motions for the chain S of Hess tops.
The class of particular solutions of equations (3) that is constructed in the previous
sections of this chapter describes a relatively complex motion of system S; therefore,
a complete analysis of geometry of the system’s motion in this case is a quite
complicated problem. Since the motion of S is a superposition of the motion of its
skeleton O1 O2 : : : On Cn and the pure rotation of each body about li , then, in order
to understand how the system moves, one can study the rotational motion of each
of the above components of its motion and then put them together to get a complete
picture. In this section, we give some properties of the skeleton’s motion.
As was noted before, the skeleton’s motion is completely determined by the
angles i ; i . For the similar motions (4), however, it is sufficient to analyze the
rotation of any of the skeleton’s segments Oi OiC1 about Oi in order to get an
understanding of the nature of the skeleton’s motion. Once such an analysis is
On the Problem of Similar Motions of a Chain of Coupled Heavy Rigid Bodies 55
complete, one can get a clear idea of how the plane ˘ rotates about the vertical line
through O1 as well as how the barycentric axes li move relative to ˘ . A general
description of the motion of any segment can be obtained from the properties
of differential equations (14) without integration, employing the methods that are
usually used for studying the rotation of the symmetry axis of a symmetric top about
a fixed point [17]. In what follows, we analyze the rotation of O1 O2 about O1 .
y
Equations (14) can be somewhat simplified by taking D cos ; a D ai g=Ji ; h D
y y y
hi =Ji ; H D Hi =Ji ; and k D ki =Ji . Then, the equations become
2 .h 2a / 1 2 k2 2af1 . / k
P D 2
D ; P D : (25)
1 C H H f2 . / 1 2
We leave it to the reader to verify that, due to (6), (7), (16), (21), f2 . / ¤ 0 at
any moment of time, i.e. there are no singularities in the right-hand side of the first
equation in (25) and thus .t/P is a bounded function of time.
The polynomial f1 . / in (25) is negative for D 1; 1, and C1, and positive
for D C1. Since D cos and for real motion is real, there should be two real
roots, 2 and 3 , of f1 . / between 1 and C1, and a third root, 1 , is greater than
C1. The former can be achieved, for example, by requiring h > k2 . We therefore
conclude that oscillates between the values 2 and 3 .
From the second equation in (25), we observe that P has same sign as k at
any moment of time. Hence, when k ¤ 0, the angle of precession monotonically
increases/decreases over time implying that, while the system S performs the similar
motions, the plane ˘ always rotates in the same direction.
Let us consider a unit sphere drawn at O1 as a center. The l1 -axis intersects the
unit sphere in a point P. As the body B1 moves, this point describes a curve C on
the sphere. Let 2 and 3 be the angles corresponding to 2 and 3 , respectively.
If two cones are constructed so that the apex of each cone is at O1 and the cones’
generating angles are 2 and 3 , respectively, these two cones intersect the sphere
in two circles, C2 and C3 . Since 3 < 2 , then 3 > 2 and therefore the circle C2
lies above the circle C3 . The curve C lies on the sphere between these two circles,
touching the first one and then the other.
Let O1 X; O1 Y, and O1 Z be the coordinate axes of ˙ and let O1 x; O1 y, and O1 z
be the coordinate axes of ˙1 . Following [17], we represent the position of the point
P on the unit sphere by the arc vector ZP D and the angle XZP, which is the
longitude, , of the pole of the xy-plane. Then, P D P and
p
d k f2 . /
D p ; (26)
d .1 2 / 2af1 . /
Let ˛ be the angle which the curve C makes with the arc vector ZP. Using the
results of [17] and (26), we derive that
p
d d k f2 . /
tan ˛ D sin D 1 2 D p : (27)
d d 2af1 . /
As follows from (26) and (27), tan ˛ is infinite only when is equal to 2 or 3 and
therefore the curve C is tangent to the circle C2 or C3 whenever takes on one of
these values. A typical curve C is shown in Fig. 1. By analogy with [3], one can
show that the time it takes for P to reach C2 starting from C3 is equal to the time it
takes to get back from C3 to C2 .
Thus, while chain S of Hess tops rotates about O1 so that its bodies move similar
to each other, the plane ˘ rotates about the vertical line through O1 in the same
direction and the barycentric axis of each body moves along a spherical curve C
oscillating between C2 and C3 .
Acknowledgements Support for this project was provided by a PSC-CUNY Award, jointly
funded by The Professional Staff Congress and The City University of New York (Award # 67306-
00 45).
References
1. Bolgrabskaya, I., Lesina, M., Chebanov, D.: Dynamics of Systems of Coupled Rigid Bodies.
Naukova Dumka, Kyiv (2012)
2. Borisov, A., Mamaev, I.: Dynamics of a Rigid Body. Hamiltonian Methods, Integrability,
Chaos. Institute of Computer Science, Moscow/Izhevsk (2005)
3. Bukhgolts, N.: An Elementary Course in Theoretical Mechanics, vol. 2. Nauka, Moscow
(1969)
On the Problem of Similar Motions of a Chain of Coupled Heavy Rigid Bodies 57
1 Introduction
a1 D .m1 C m2 /b D m1 c1 C m2 s; a 2 D m2 c 2 ; (1)
I1 D J1 C m2 s2 ı s ˝ s ; I2 D J2 ; (2)
.k/
inertia of Gk and e3 jj lk . We also assume that, in the corresponding moving frame,
.1/ .k/ .k/
Ik D diagfIk; Ik ; Ikz g; Jk D diagfJk ; Jk ; Jkz g; s D se3 ; ak D ak e3 , and k D k e3 .
We determine the position of gyrostat Gk with respect to the reference frame by
Bryan-Krylov angles ˛k ; ˇk ; and k [11, 18]. The equations of motion of system S
in terms of the Bryan-Krylov angles can be written in the form [3]
The motion of a gyrostat is a permanent rotation if, while the gyrostat is in motion,
its angular velocity vector is constant. This vector defines an axis of permanent
rotation which is fixed in both an inertial space and the gyrostat’s carrier. When the
permanent axis is a vertical line, the gyrostat permanently rotates about a vertical
axis.
In this contribution we investigate a problem of the stability of the state of motion
of system S with the following property: G1 permanently rotates about its dynamic
symmetry axis coinciding with the vertical axis passing through O1 , whereas G2 is
62 D. Chebanov et al.
.2/
at rest so that e3 jj. One can check that equations (3) have a particular solution
that describes the motion of interest; the angular velocity ! can be chosen
in (4)
.2/
arbitrarily. Below we discuss a case when the parameters c1 ; s, and c2 D c2 e3
are negative. In this case, a1 < 0 and a2 < 0.
The solution (4) is a special case of a more general solution (˛k 0; ˇk
0; k D !k t; !k D const) of equations (3) that describes permanent rotations
of system S about a vertical axis. The necessary conditions for stability of such
rotations have been recently established in [3]. For the motion of interest, these
conditions assume the form
2
22 1 3 > 0; 12 22 1 3 21 1 5 42 4 C 323 > 0; (5)
3
2
1 5 42 4 C 323 27 1 3 5 C 22 3 4 1 24 22 5 33 > 0;
where 1 D I1 I2 a22 s2 ; 2 D .I1 2 C I2 w/ =4; 3 D w2 I1 d2 I2 d1 C 2"a22 s2
=6; 4 D .wd2 C 2 d1 / =4; 5 D d1 d2 "2 a22 s2 ; w D I1z ! C 1 ; dk D 2"a2s C
ak g C 3" Ik Ikz :
While analyzing the conditions (5) in the rest of the contribution, we aim
to establish the existence of the following stabilization effect. Suppose that the
parameters of G2 are selected so that, if G2 is decoupled from the chain S and
then coupled to an immovable base at point O2 , its equilibrium position would be
unstable. (Using Lyapunov’s
indirect
method,
it is possible to show that this is the
case when 22 C 4J2 m2 c2 g C 3" J2 J2z < 0 or, by virtue of (1),
22 C 4I2 a2 g C 3" I2 I2z < 0: (6)
Special cases of (6) are given in [1, 13, 14].) We seek to justify that the parameters
of G1 can be chosen so that, when both gyrostats form chain S, the motion of S
described by (4) is stable, i.e., the permanent rotation of G1 stabilizes G2 .
j > 0; j D 1; 2; 3; (8)
where
3 D 6 x6 C 5 x5 C 4 x4 C 3 x3 C 2 x2 C 1 x C 0 :
Since 3 is p negative and relatively small and 0 < 2 < 1, the expression
p
1 23 2 I1 =I2 is positive for all possible values of the parameters it contains
and its second term is negligible. Moreover, 4 provides an upper bound for the
left-hand side in (9). Hence, requiring
4 < 2 (10)
60
Λ(x) Λ(x)
60
40 40
20
20
x* x
–5 –4 –3 x * –2 –1 0 1 2 :
x* x*
–4 –3 –2 –1 0 x 1
–20
–40 –20
–60
–40
Fig. 1 The graphs of 1 .x/ (dashed), 2 .x/ (dotted), 3 .x/ (dash-dotted), and the interval
Œx ; x : Left: 1 D 2; 2 D 0:6; 3 D 0:01; 4 D 1:9; x D 3:6608; x D 2:4547. Right:
1 D 1; 2 D 0:5; 3 D 0:01; 4 D 1:9; x D 3:4564; x D 1:8527
On Stabilization of an Unbalanced Lagrange Gyrostat 65
3 1
Λ(x ) Λ(x )
2
0.5
1
x* x
0
–1.4 –1.2 x –1.0 –0.8 –0.6
x x *
*
–2 –1 x* 0
–0.5
–1
2 –1
Fig. 2 The graphs of 1 .x/ (dashed), 2 .x/ (dotted), 3 .x/ (dash-dotted), and the interval
Œx ; x D Œ1:0816; 0:6153 for 1 D 0:1; 2 D 0:9; 3 D 0:01, and 4 D 1:35. Left:
zoom on 2 x 1. Right: zoom on 1:5 x 0:4
We have also observed that, for a fixed 4 , there are some values k such that
only the values k satisfying 0 < 1 < 1 and 2 < 2 < 1 belong to D ; moreover,
k depends on both 4 and i .i; k D 1; 2; i ¤ k/. Numerical estimates for k as
well as for the interval Œx ; x of the fulfillment of (8) are given in Table 1. When
4 is close to its upper bound (10), there is a relatively wide range of values for 1
and 2 in D . As 4 starts getting smaller, this range narrows down significantly at a
high rate. In particular, we have observed that in this case 1 tends to drop its value
significantly for the same 2 .
Thus, it is possible to select the dimensionless parameters x and 1 through 4
to achieve the desired stabilization effect. Once the mass characteristics and the
gyrostatic moment of G2 are given, and the dimensionless parameters are chosen to
comply with (8), the distance s, the angular velocity, mass parameters, and gyrostatic
moment of G1 can be determined from (7). A similar analysis can be conducted to
justify that it is possible to stabilize an unstable equilibrium position of G1 by a
permanent rotation of G2 .
66 D. Chebanov et al.
5 Conclusion
Acknowledgements Support for this project was provided by a PSC-CUNY Award, jointly
funded by The Professional Staff Congress and The City University of New York (Award # 68091-
00 46). The work of the second and third authors was supported by the NASA New York Space
Grant CCPP Program.
Appendix
6 D 42 4;
5 D 24 1 22 1 C 32 C 1 42 C 92 1 C 32 2 .21 2 3 C 2/ ;
4 D 82 32 .22 1/ C 1 .1 82 C 4/ C 1 44 2 1222 33 C 31 2 32
C4022 32 81 2 3 C 1222 3 192 32 C 12 191 2 82 3
C121 C 32 C 1 42 2722 34 C 3622 33 C 361 2 32 222 32
4012 3 C 3622 3 122 32 812 121 2 2722 402 3
C321 C 362 8;
3 D 24 12 C 1 212 2 22 32 44 C 6423 33 C 81 22 32 4022 33
C212 2 3 40122 3 C 71 2 32 C 822 32 C 13 C 712 2 C 241 2 3
C72 32 912 C 71 2 C 22 3 91 C 1 42 C 4823 34 C 61 22 33
1602333 1822 34 C 312 2 32 381 22 32 C 4823 32 C 1302233
212 2 3 C 130122 3 261 2 32 3822 32 413 C 712 2
181 22 921 2 3 C 622 3 C 72 32 C 2012 261 2 22 3 C 201
C32 4 ;
2 D 12 46 2 1212 22 3 C 401 22 32 C 1222 33 C 313 2 812 2 3
On Stabilization of an Unbalanced Lagrange Gyrostat 67
191 2 32 C 13 C 3812 2 81 2 3 C 32 32 C 1212 C 1 44
C 25624 34 641 23 33 3202334 6612 22 32 320123 32
C761 22 33 6423 33 222 34 413 2 3 C 7612 22 3 C 4012 2 32
C696122 32 C 762233 C 14 C 4013 2 212 22 10812 2 3 C 761 22 3
19212 32 6622 32 413 19212 2 10812 3 C 40232 C 10212
C401 2 42 3 41 C 1 42 C 4 6424 35 241 23 34 12824 34
7223 35 612 22 33 561 23 33 C 361 22 34 C 6424 33 C 15223 34
C13 2 32 C 4012 22 32 C 1521 23 32 C 521 22 33 562333 1222 34
C613 2 3 1412 22 3 4912 2 32 721 23 3 1921 22 32 2423 32
1422 33 14 1513 2 1212 22 C 26122 3 C 521 22 3 C 311 2 32
C4022 32 C 1213 C 3112 2 C 361 22 C 261 2 3 622 3 152 32
2212 491 2 C 62 3 C 121 C 2 1 ;
1 D 24 913 2 C 212 2 3 C 91 2 32 413 412 44 C 4812 23 32
160123 33 C 4823 34 C 613 22 3 3812 22 32 C 1301 22 33 1822 34
C314 2 1813 22 213 2 3 C 1301222 3 C 712 2 32 381 22 32
C622 33 414 2613 2 9212 2 3 261 2 32 C 2013 C 712 2 C 32 32
21 2 3 C 2012 41 42 C 4 812 23 33 321 23 34 C 823 35 C 213 22 32
3212 23 32 212 22 33 C 96123 33 C 201 22 34 3223 34 131 2 32
213 22 3 313 2 32 C 812 23 3 C 5412 22 32 321 23 32 921 22 33
C823 33 C 2022 34 314 2 C 2013 22 413 2 3 9212 22 3 1312 2 32
C541 22 32 222 33 C 414 1313 2 C 201222 C 7212 2 3 21 22 3
C222 32 413 1312 2 41 2 3 32 32 412 31 2 C 41 ;
0 D 413 46 C 2714 22 C 3613 22 3 212 22 32 C 36122 33 2722 34
C3614 2 40132 3 1212 2 32 814 1213 2 4012 2 3
C361 2 32 C 3213 812 44 C 2561224 33 5121 24 34 C 2562435
961323 32 22412 23 33 C 608123 34 28823 35 2414 22 3
2881323 3 C 1601322 32 C 60812 23 32 5612 22 33 2241 23 33
481 22 34 9623 34 C 415 2 C 14414 22 C 2414 2 3 C 20813 22 3
60132 32 76812 22 32 C 2081 22 33 C 14422 34 415 196142
68 D. Chebanov et al.
4813 22 C 10413 2 3 5612 22 3 C 12412 2 32 C 1601 22 32 2422 33
C4814 C 12413 2 C 104122 3 19612 32 8813 6012 2
C241 2 3 C 42 32 C 4812 41 42 C 2561224 34 5121 24 35
C2562436 12813 23 33 5121224 33 1281223 34 C 10241 24 34
C5121 23 35 5122435 2562336 C 1614 22 32 1281323 32
C12813 22 33 C 2561224 32 C 115212 23 33 1281222 34 5121 24 33
1536123 34 C 2562434 C 51223 35 C 12814 22 3 1614 2 32
C51213 23 3 6413 22 32 15361223 32 6401222 33 C 11521 23 33
C5121 22 34 1282334 1615 2 12814 22 128142 3 25613 23
6401322 3 C 19213 2 32 C 51212 23 3 C 16321222 32 1281 23 32
640122 33 12823 33 1282234 C 1615 C 192142 C 51213 22
C12813 2 3 6401222 3 35212 2 32 641 22 32 C 12822 33 6414
352132 12812 22 C 12812 2 3 C 1281 22 3 C 1921 2 32 C 1622 32
C9613 C 19212 2 12812 3 162 32 6412 161 2 C 161:
References
1. Beletsky, V.: The Motion of a Satellite About Its Centre of Mass in a Gravitational Field.
Moscow University Press, Moscow (1975)
2. Chebanov, D.: Precessional motions of a chain of coupled gyrostats in a central Newtonian
field. In: Proceedings of the ASME 2014 International Design and Engineering Technical
Conferences (DETC2014), Buffalo (2014). Paper DETC2014-35590
3. Chebanov, D., Salas, J.: On permanent rotations of a system of two coupled gyrostats in a
central Newtonian force field. In: Proceedings of the ASME 2015 International Design and
Engineering Technical Conferences (DETC2015), Boston (2015). Paper DETC2015-47434
4. Gluhovsky, A.: Modeling turbulence by systems of coupled gyrostats. In: Fitzmaurice, N.,
Gurarie, D., McCaughan, F., Woyczynski, W. (eds.) Nonlinear Waves and Weak Turbulence.
Progress in Nonlinear Differential Equations and Their Applications, vol. 11, pp. 179–197.
Birkhäuser, Boston (1993)
5. Gluhovsky, A.: Energy-conserving and Hamiltonian low-order models in geophysical fluid
dynamics. Nonlinear Proc. Geoph. 13(2), 125–133 (2006)
6. Haken, H.: Analogy between higher instabilities in fluids and lasers. Phys. Lett. A 53(1), 77–78
(1975)
7. Hemati, N.: Strange attractors in brushless DC motors. IEEE Trans. Circuits Syst. I Fundam.
Theory Appl. 41(1), 40–45 (1994)
8. Hughes, P.: Spacecraft Attitude Dynamics. Wiley, New York (1986)
9. Lesina, M.: Stabilization of an unbalanced Lagrange gyroscope at rest. Mekh. Tverd. Tela 11,
88–92 (1979)
10. Li, Q., Wang, H.: Has Chaos implied by macrovariable equations been justified? Phys. Rev. E
58, 1191–1194 (1998)
On Stabilization of an Unbalanced Lagrange Gyrostat 69
Manana Chumburidze
1 Introduction
M. Chumburidze ()
Ak.Tsereteli State University, Kutaisi, Georgia
e-mail: [email protected]
T
@u3 @u3
@x2 ; @x1 ; rotu D @u @u1
@x1 @x2 :
2
ˇ ˇ
ˇ kıjk k3x4 ˇ
ˇ
Q.q/ .@x; n.x// D ˇ ˇ ; q D 0; 3
kı4k Œ.ı0q C ı3q / C .ı1q C ı3q / @n k1x4 ˇ
@
Approximate Solution of Some Boundary Value Problems 73
where N.x/ D .n; 0/; n D .n1 ; n2 /; T.@x; n.x// D kTjk .@x; n.x//k3x3 is the matrix of
stress operator on the plain of couple-stress elasticity:
@ @ @
Tjk .@x; n.x// D nj .x/ C . ˛/nk .x/ . C ˛/ıkj ; j; k D 1; 2
@xk @xj @nx
2
X
Tjk .@x; n.x// D 2˛ jkp np .x/; j D 1; 2; k D 3
pD1
@
Tjk .@x; n.x// D . C ˇ/ıkj ; j D 3; k D 1; 3
@nx
where
.1/ @2
Lij .@x/ D ıij . C ˛/
2 C . C ˛/ ; i; j D 1; 2
@xi @xj
2
X
.2/ .3/ @
Lij .@x/ D Lij .@x/ D 2˛ ijp .x/; i D 1; 2j D 3I j D 1; 2; i D 3
pD1
@xp
The matrices L.@x; / and b L.@x; / we use in technical point of view efficiently
solving the system of partial differential equations of CPTE in Green-Lindsay
formulation. In next section we will solve the matrix equations (2).
In our investigations the fundamental [16] and singular solutions together with basic
potentials becomes an useful tool for the development of approximate methods
solution of stationary problems.
Let us construct the matrix of fundamental solutions [4, 16] of the operator (2):
where I is the 4 4 dimensional unit matrix. According to (2) and (3) we have:
4
Y
detL.@x; / D . C 2/. C ˛/. C ˇ/ .
C k2 /'.x; / D 0 (5)
kD1
4
X .1/
'.x; / D ak H0 .k jxj/ (6)
kD1
.1/
where H0 .k jxj/ is Hankel Function of the first kind (the zero order) [18], jxj D
q
x21 C x22 ; k .k D 1; 4/ are parameters of thermo-elasticity [4, 16], '.x; / is
unknown scalar, ak .k D 1; 4/ are constants, they are sought in such manner that
partial derivatives of the eight order of function '.x; / has an isolated singularity
of the kind lnjxj. If the matrix of fundamental solutions of the operator L.@x; / we
denote as b̊ .x; / by a direct check we can make sure that: b̊ .x; / D ˚ T .x; /:
Let us construct the basic potentials:
Z
V.x; '/ D ˚.y x; /'.y/dy l
l
Z
.1/
M .x; '/ D P.q/ .@y; n/ b̊ .y x; /T '.y/dy l
Œb
l
Approximate Solution of Some Boundary Value Problems 75
Z
M .2/ .x; '/ D Q.q/ .@y; n/ b̊ .y x; /T '.y/dy l
Œb
l
Z
U.x; '/ D ˚.y x; /'.y/dy
˝
where l 2 L2 .˛/ ; ˛ > 0; V.x; '/ is the single-layer potential, M .1/ .x; '/; M .2/ .x; '/
are the mixed-type potentials, U.x; '/ is the volume potential. Conjugated operators
b
P.q/ ; b
Q.q/ can be obtained from corresponding operators P.q/ ; Q.q/ replacing and
.
3 Approximate Solutions
The existence and uniqueness of this solution has been proved in [4].
Solution of the Problem P.q/ .ı/ will be found by the formula:
Z Z
1
U.x/ D ˚.y x; /H.y/dy C Œb
Q.q/ .@y; n/˚ T .y x; /T '.y/dy l (7)
2 ˝ l
where '.y/ is solution of the singular integral equations of normal type with zero
(total) index:
Z
'.z/ C P.q/ .@z; n/Œb
Q.q/ .@y; n/˚ T .y z; /T '.y/dy l D F .1/ .z/
l
Z
1
P.q/ .@z; n/˚.y z; /H.y/dy (8)
2 ˝
76 M. Chumburidze
Equation (8) is the singular integral equations with a Cauchy kernel [10] of
normal type, which have an index equal to zero (total) and in this case the Fredholm
theorems hold [4, 5, 15].
Let us represent solutions in the following form:
Z
1
U.x; / D GTP.q/ .x; yI ; ˝/H.y/dy C
2 ˝
Z
C Œb
Q.q/ .@y; n/GTP.q/ .x; yI ; ˝/T F .1/ .y/dy l (9)
l
where GP.q/ .x; yI ; ˝/ is the tensor of Green of Problem P.q/ .ı/ [4, 16].
Analogically we will get:
Z
1
U.x; / D GT .x; yI ; ˝/H.y/dy C
2 ˝ Q.q/
Z
C Œb P.q/ .@y; n/GTQ.q/ .x; yI ; ˝/T F .2/ .y/dy l (10)
l
where
X
N X
k Z
.1/ j Œ
jC3 1
U .x/ D
N
Xk ak ˚ ej .y x 4 ; i / ˚.y x; /H.y/dy
kD1 jD1
2 ˝
Approximate Solution of Some Boundary Value Problems 77
where
k1
ek D k 4
4
X
k
j
' k .y/ D ak j
.y/; k D 1; 1; y 2 @˝ (11)
jD1
j
where ak are coefficients of the orthonormalization.
According to (3), we have:
X
k
jC3
ak P.q/ .@y; n/˚ ej .y xŒ 4
j
' k .y/ D /; k D 1; 1; y 2 @˝ (12)
jD1
Let us consider that U.x/ be the direct solution of the Problem P.q/ .ı/
(existences this solutions are proved [4]). Let us consider the vector:
Z
1
V.x/ D U.x/ ˚.y x; /H.y/dy
2 ˝
Obviously V.x/ is the regular solution of the following boundary value problem:
8x 2 ˝ W L.@x; /V.x; / D 0; x 2 ˝
8z 2 @˝ W P.q/ .@z; n.z//V.z/ D X .1/ .z/ (13)
where
Z
1
X .1/ .z/ D F .1/ .z/ P.q/ .@z; n/˚.y z; /H.y/dy
2 ˝
X
n
.1/
X .1/.y/ Xk ' .k/ .y/; y 2 @˝
kD1
78 M. Chumburidze
where
Z
.1/
Xk D X .1/ .y/' .k/.y/dl
@˝
X
N
.1/
X
N
.1/
X
k X
N X
k
.1/ j jC3
Xk ' .k/ .y/ D Xk ak ˚ ej .y xŒ 4
j
V N .x/ D Xk ak j
.y/ D ; i /
kD1 kD1 jD1 kD1 jD1
8x 2 ˝ W L.@x; /V N .x; / D 0; x 2 ˝
P .1/
8z 2 @˝ W P.q/ .@z; n.z//V N .z/ D NkD1 Xk ' .k/ .z/ (14)
Hence, from the formulas (15) and (16) and according to the assumptions of
Green tensor [4] and applying the Cauchy-Bunyakovski inequality [9], we have:
Analogically we can show that approximate solution of Problem Q.q/ .ı/ has
following form:
X
N X
k Z
.2/ j Œ
jC3 1
U .x/ D
N
Xk bk ˚ ej .y x 4 ; i / ˚.y x; /H.y/dy
kD1 jD1
2 ˝
Approximate Solution of Some Boundary Value Problems 79
where
Z
.2/
Xk D X .2/ .y/! .k/ .y/dl;
@˝
Z
1
X .2/ .z/ D F .2/ .z/ Q.q/ .@z; n/˚.y z; /H.y/dy
2 ˝
X
k
! .k/ .y/ D
j
bk j .y/;
jD1
jC3
j .y/ D Q.q/ .@y; n/˚ ej .y xŒ 4 /
4 Conclusion
References
1. Bachman, G., Narici, L.: Fourier and Wavelet Analysis. Universitext. Springer, Berlin/New
York (2000)
2. Bonetto, F., Lebowitz, J.L., Rey-Bellet, L.: Fourier’s Law: A Challenge to Theorists. Mathe-
matical Physics. Imperial College Press, London (2000)
3. Burchuladze, T., Gegelia, T.: Development of the Potential Method in Elasticity Theory.
Mecniereba, Tbilisi (1985)
4. Chumburidze, M.: Non-classical Models of the Some Theory of Boundary Value Problems.
LAP LAMBERT Academic Publishing, Saarbrucken (2014)
5. Chumburidze, M., Lekveishvili, D.: Effective Solution of Boundary Value Problems of the
Theory of Thermopiezoelasticity for a Half-Plane. American Institute of Physics (2013).
doi:10.1063/1.485476
6. Chumburidze, M. Lekveishvili, D.: Approximate solution of some mixed boundary value
problems of the generalized theory of couple-stress thermo-elasticity. Int. J. Math. Comput.
Nat. Phys. Eng. (2014). WASET. http://waset.org/Publication/9998377
80 M. Chumburidze
7. Chumburidze, M., Lekveishvili, D., Khurcia, Z.: Solutions Of boundary-value problems of the
generalized theory of couple-stress thermo-diffusion. J. Math. Syst. Sci. 3(7), 365–370 (2013).
David Publishing, New York
8. Constanda, C.: Generalized Fourier Series. Mathematical Methods for Elastic Plates. Springer,
London (2014)
9. Dragomir, S.: A survey on Cauchy–Bunyakovsky–Schwarz type discrete inequalities. J.
Inequal. Pure Appl. Math. (JIPAM) 4(3), 222–226 (2003)
10. Eshkuvatov, Z., Long, N.: Approximate solution of singular integral equations of the first kind
with Cauchy kernel. Appl. Math. Lett. (2009). doi:10.1016/j.aml.2008.08.001
11. Ezzat, M., Zakaria, M.: Generalized thermoelasticity with temperature dependent modulus of
elasticity under three theories. J. Appl. Math. Comput. 14, 193–212 (2004)
12. Gelashvili, D.: To Ward the Theory of Dynamic Problems of Couple-Stress Thermodiffusion
of Deformable Solid Micropolar Elastic Bodies. North-Holland, Amsterdam (1979)
13. Gilbarg, D., Trudinger, N.: Elliptic Partial Differential Equations of Second Order. Springer,
Berlin (2001)
14. Green, E., Lindsay, K.A.: Thermoelasticity. J. Elast. 2, 1–7 (1972)
15. Hakl, R., Zamora, M.: Fredholm-type theorem for boundary value problems for systems of
nonlinear functional differential equations. Bound. Value Probl. 2014(1), 113 (2014). Springer
16. Kupradze, V. et al.: Three-Dimensional Problems of the Mathematical Theory of Elasticity and
Thermo Elasticity. North-Holland, Amsterdam-New York (1983)
17. Lord, H., Shulman, Y.: A generalized dynamical theory of thermoelasticity. J. Mech. Phys.
Solids 15, 299–309 (1967)
18. Orlando, F.: Hankel Functions. Mathematical Methods for Physicists, 3rd edn. Academic,
Orlando (1985)
19. Qing, H., Fanghua, L.: Elliptic Partial Differential Equations. Courant Institute of Mathemati-
cal Science, New York (1997)
20. Rezazadeh, G., Vahdat, A.: Thermoelastic damping in a micro-beam resonator using modified
couple stress theory. Acta Mechanica 223(6), 1137–1152 (2012). Springer
21. Sherief, H., Hamza, F., Saleh, H.: The theory of generalized thermoelastic diffusion. Int. J. Eng
5, 591–608 (2004). Elsevier
22. Tripathi, J., Kedar, G., Deshmukh, K.: Dynamic problem of generalized thermoelasticity for a
semi-infinite cylinder with heat sources. J. Thermoelast. 2(1), 01–08 (2014)
23. Youssef, HM.: Theory of two-temperature-generalized thermoelasticity. J. Appl. Math. IMA
71(3), 383–390 (2006)
Symmetry-Breaking Bifurcations in Laser
Systems with All-to-All Coupling
Juancho A. Collera
1 Introduction
Semiconductor lasers are highly sensitive to optical feedback that even a small
amount of optical feedback is enough to produce chaotic instabilities [7, 8]. In 1980,
Lang and Kobayashi [9] examined the influences of external optical feedback on
semiconductor laser properties. A single mode laser was examined where a portion
of the laser output is reflected back to the laser cavity from an external mirror. The
dimensionless form of the Lang-Kobayashi (LK) rate equations derived in [2] are
given by the following system of differential equations
where E.t/ is the complex electric field, N.t/ is the excess carrier number,
and the fixed delay time represents the external cavity roundtrip time of the
feedback light. The parameters ˛, , ˝, T and P correspond to the linewidth
enhancement factor, feedback strength, angular frequency of the solitary laser,
electron decay rate, and pump parameter, respectively. System (1) was shown to
correctly describe the dominant effects observed experimentally, see for example
[10–12].
In 2006, Erzgraber et al. [4] studied a model of two mutually delay-coupled
semiconductor lasers in a face-to-face configuration. The two lasers are coupled
through their optical field, and the finite propagation time of the light from one laser
to the other constitute the time delay. A special case with zero detuning given by the
following LK-type rate equations
where Cp is called the coupling phase parameter, was shown to have great
importance as this case organizes the dynamics for small non-zero detuning. Notice
that (2) is in fact an extension of the LK equations in (1) into the case of two
mutually delay-coupled semiconductor lasers.
In this paper, we consider a system of n semiconductor lasers with all-to-
all coupling. The lasers are coupled through their optical fields with time delay
arising from the finite propagation time of the light from one laser to another. This
generalizes the one-laser case in (1) and the zero-detuning two delay-coupled lasers
case in (2). As a consequence of the coupling structure, the resulting system of delay
differential equations (DDEs) is equivariant under a symmetry group. Symmetric
systems are known to give rise to eigenvalues with higher multiplicity [6] and this
makes numerical bifurcation analysis of such systems harder to implement. Our
results include employing a group-theoretic approach from [6] to overcome this
problem. This method not only locates steady-state and Hopf bifurcations correctly
but also identifies symmetry-breaking (SB) bifurcations where branches of new
solutions emerge.
The paper is organized as follows. In Sect. 2, we introduce our model, its
symmetry properties and basic solutions. Then, in Sect. 3 we show how to find
symmetric solutions and use numerical continuation to find branches of solutions
and their stability. In Sect. 4, we give our main result which is a method of finding
and classifying steady-state and Hopf bifurcations. We also look at the symmetry
group of bifurcating branches of solutions from SB bifurcations. Then, lastly we
give our conclusions.
Symmetry-Breaking Bifurcations in Laser Systems with All-to-All Coupling 83
We now consider the n-laser system with all-to-all coupling as described by the
following LK rate equations, for j D 1; : : : ; n,
X
n
EP j .t/ D .1 C i˛/Nj .t/Ej .t/ C eiCp Ek .t /;
kD1; k¤j
(3)
T NP j .t/ D P Nj .t/ .1 C 2Nj .t//jEj .t/j2 :
To determine the symmetry group of system (3), we first define the action of the
permutation group Sn and the circle group S1 to the state variables .Ej .t/; Nj .t//,
j D 1; : : : ; n, as follows:
.Ej .t/; Nj .t// D .E1 . j/ ; N1 . j/ /; and # .Ej .t/; Nj .t// D .Ej ei# ; Nj /;
where 2 Sn and # 2 S1 . Notice that the action of Sn permutes the position of the
lasers, while S1 acts only on the optical fields Ej .t/ for all j. Moreover, observe that
if .Ej .t/; Nj .t// is a solution to (3) for all j, then .Ej .t/; Nj .t// and # .Ej .t/; Nj .t//
are also solutions to (3) for all j. Hence, system (3) is equivariant under the group
Sn S1 .
Basic solutions to (3), called compound laser modes (CLMs), are of the form
Ej .t/ D Rj ei!tCij and Nj .t/ D Nj for j D 1; : : : ; n, where !, Rj > 0, j , and Nj are
all real-valued for all j, and with 1 D 0. We refer to CLMs with Rj D R, j D 0,
and Nj D N for all j, as the fully symmetric CLMs and are given by
for j D 1; : : : ; n. These fully symmetric CLMs are fixed by elements .; 0/ of Sn S1
for all 2 Sn . We use the symbol S0n to denote this symmetry group of CLMs in (4).
Note that this subgroup S0n of Sn S1 is isomorphic to Sn and is generated by all
elements of the form .; 0/ where 2 Sn . We call such symmetry group of CLMs
as isotropy subgroup [5].
3 Symmetric CLMs
In this section, we provide a method of finding symmetric CLMs, that is, CLMs
fixed by an isotropy subgroup of Sn S1 . In particular, we use the case when the
isotropy subgroup is S0n to find the fully symmetric CLMs in (4).
84 J.A. Collera
Substituting the ansatz in (4) to system (3) and then following a similar
computation in [4], we obtain the following transcendental equation in !
p
! C .n 1/ 1 C ˛ 2 sin.Cp C ! C tan1 ˛/ D 0: (5)
Once a value for ! is found by solving (5), we can thenp compute for corresponding
values of N D !=.˛ C tan.Cp C ! // and R D .P N/=.1 C 2N/. Fully
symmetric CLMs in (4) are obtained using these values of R, !, and N. It is
worth noting that the isotropy subgroup of the CLMs that we seek provides
relations amongst Rj , Nj , and j , and this to some extent simplifies the form of the
transcendental equation, such as in (5), which is key in finding symmetric CLMs.
A branch of CLMs can be obtained through numerical continuation by varying
a single parameter. We use DDE-Biftool [3] to obtain such branch of solutions. We
employ the same technique as in [4] to follow a CLM as an equilibrium in DDE-
Biftool. We choose to vary the coupling phase parameter Cp for two reasons. First,
because system (3) has a 2-translational symmetry in Cp , and secondly, because
the coupling phase can be changed accurately in experiments [1].
Example 1 Consider system (3) with n D 4, and parameters ˛ D 2:5, T D 392,
P D 0:3, D 20, D 0:1, and Cp D 10. Solving for ! in (5) gives 11 CLMs which
are shown in the left panel of Fig. 1 as dots. By following any of these CLMs in
DDE-Biftool, a branch of fully symmetric CLMs is obtained which is the ellipse in
the left panel of Fig. 1. The stability of this branch is also determined using DDE-
Biftool. The right panel of Fig. 1 shows the stable and unstable parts of the branch
in dashed line and solid line, respectively.
0.2 0.2
N 0 N 0
−0.2 −0.2
ω ω
Fig. 1 (Left) A branch of fully symmetric CLMs obtained in DDE-Biftool by varying the coupling
phase parameter Cp . (Right) Stable part of the branch is shown in dashed line while unstable part
of the branch is shown in solid line. Regular steady-state and Hopf bifurcations are marked with
(˘) and (ı), respectively. For SB bifurcations, we use (4) and () to marked pitchfork and SB
Hopf bifurcations, respectively
Symmetry-Breaking Bifurcations in Laser Systems with All-to-All Coupling 85
4 Symmetry-Breaking Bifurcations
We now give our main result which is a method of finding and classifying steady-
state and Hopf bifurcations.
We first determine the linearized system corresponding to (3) around the fully
symmetric CLM (4). We follow a similar computation done in [13] for the one-laser
model in (1). In polar form, the LK rate equations in (3) are given by
X
n
RP j .t/ D Nj .t/Rj .t/ C Rk .t / cos Cp C 'k .t / 'j .t/ ,
kD1; k¤j
X
n
Rk .t /
'Pj .t/ D ˛Nj .t/ C sin Cp C 'k .t / 'j .t/ , (6)
Rj .t/
kD1; k¤j
1 h ˇ ˇ2 i
NP j .t/ D P Nj .t/ .1 C 2Nj .t// ˇRj .t/ˇ ;
T
T
for j D 1; : : : ; n. If we let Xj .t/ D Rj .t/; 'j .t/; Nj .t/ and Yj .t/ D Xj .t /, then (6)
can be written in the form XP j .t/ D f .Xj .t/; Y1 .t/; : : : ; Yj1 .t/; YjC1 .t/; : : : ; Yn .t//; for
j D 1; : : : ; n. Now, let X.t/ D ŒX1 .t/; : : : ; Xn .t/T and Y.t/ D ŒY1 .t/; : : : ; Yn .t/T so
that the full system can be written as X.t/ P D F.X.t/; Y.t//. The fully symmetric
CLM in (4) written in polar form is given by X D ŒX1 .t/; : : : ; Xn .t/T where
Xj .t/ D ŒR; !t; NT for all j. To obtain the linear variational equation around X , we
first compute for A WD dXj .t/ f .Xj / and B WD dYj .t/ f .Xj /. Now, let M1 be the block-
diagonal matrix with the block A on the main diagonal and the block 0 elsewhere,
and let M2 be the block matrix with the block 0 on the main diagonal and the block
B on all off main diagonal entries. Then, the Jacobian matrix evaluated at X is
dF.X / D ŒM1 j M2 . The linear variational equation around the fully symmetric
CLM is given by X.t/ P D M1 X.t/ C M2 X.t /, and its corresponding characteristic
equation is det
./ D 0 where
./ D In M1 e M2 . Notice that if we let
A WD I3 A and B WD e B, then
2 3
A B B
6B A B7
6 7
L WD
./ D 6 : : : 7
4 :: : : :: 5
B B A
2
We now use an method from [6] to examine the eigenvalues o of L. Let D e n i
k 2k .n1/k T
3
and define Vk D v; v; v; : : : ; v j v 2 R , for k D 0; 1; 2; : : : ; n 1.
˚
Observe that V0 D Œv; v; v; : : : ; v j v 2 R3 and the action of L on V0 is given
T
2 1
n
X
n1 X sin.k k=n/
D .1/ C
jk k
2 cos.2kj=n/ D .1/k C 1
jD1 jD1
sin.k=n/
by pairing up conjugates, and then using the Dirichlet kernel identity. Now, since
sin.k k=n/ D .1/kC1 sin.k=n/ and sin.k=n/ ¤ 0 for 1 k n 1, we get
P n1 jk
jD1 D 1. This is essentially the same for the case when n is odd. Therefore,
the eigenvalues of LjVk , for k D 1; 2; : : : ; n1, are those of AB. This means that the
problem of solving the characteristic equation det
./ D 0, reduces to solving the
equations det.A C .n 1/B/ D 0 and det.A B/ D 0. Furthermore, the eigenvalues
of L from A C .n 1/B are simple while those from A B are of multiplicity n 1.
Also, notice that the symmetry group S0n acts trivially on V0 while its action on Vk ,
for k D 1; 2; : : : ; n 1, is non-trivial. This means that SB bifurcations are obtained
from block AB while bifurcations from block AC.n1/B are regular bifurcations.
We now illustrate the above technique in finding ordinary and SB bifurcations.
Example 2 Continuing from Example 1, we first look for SB bifurcations. Pitchfork
bifurcations along the branch of fully symmetric CLMs are found by looking at the
intersections of the curves det.A B/jD0 D 0 and (5), while SB Hopf bifurcations
are found by finding the intersections of the curves det.A B/jDiˇ D 0 with ˇ >
0, and (5). Two pitchfork bifurcations and two SB Hopf bifurcations were found
and are shown in the right panel of Fig. 1 with markers (4) and (), respectively.
Similarly, we can get the regular bifurcations from the block A C 3B. Saddle-node
bifurcations are obtained from the intersections of the curves det.A C 3B/jD0 D
0 and (5), while regular Hopf bifurcations were found by intersecting the curves
det.A C 3B/jDiˇ D 0 with ˇ > 0, and (5). Two saddle-node bifurcations and six
regular Hopf bifurcations were obtained and are shown in the right panel of Fig. 1
using markers (˘) and (ı), respectively.
Identification of SB bifurcations is important because they give rise to new
branches of solutions. We now examine the symmetry group of branches of
solutions that emerge from the SB bifurcations obtained in Example 2. To do this,
Symmetry-Breaking Bifurcations in Laser Systems with All-to-All Coupling 87
0.67
Re(E1(t))
0.66
0.2 0 0.25 0.5 0.75 1
0.67
Re(E2(t))
0.66
N 0 0 0.25 0.5 0.75 1
0.67
Re(E3(t))
0.66
−0.2 1 0.25 0.5 0.75 1
0.67
Re(E4(t))
0.66
−0.8 −0.4 0 0.4 0.8
ω
0 0.25 0.5 0.75 1
t
Fig. 2 (Left) A new branch of CLMs shown in dotted curve emanates from the pitchfork
bifurcations (4) and has symmetry group S03 . (Right) Time-series plots showing that a branch
of periodic solutions emerging from the SB Hopf bifurcations (ı) has spatio-temporal symmetry
Z2 .; /
5 Conclusion
along the branch of fully symmetric CLMs as illustrated in Example 2. The action
of the symmetry group decomposes the physical space into invariant subspaces.
This, in turn, gives us a means to identify symmetry-breaking bifurcations where
new branches of solutions emerge.
References
1. Agrawal, G.P., Dutta, N.K.: Long-Wavelength Semiconductor Lasers. Van Nostrand Reinhold,
New York (1986)
2. Alsing, P.M., Kovanis, V., Gavrielides, A., Erneux, T.: Lang and Kobayashi phase equation.
Phys. Rev. A 53, 4429–4434 (1996)
3. Engelborghs, K., Luzyanina, T., Samaey, G.: DDE-BIFTOOL v. 2.00: A MATLAB package
for bifurcation analysis of delay differential equations. Technical report TW-330. Department
of Computer Science, K.U. Leuven, Leuven (2001)
4. Erzgraber, H., Krauskopf, B., Lenstra, D.: Compound laser modes of mutually delay-coupled
lasers. SIAM J. Appl. Dyn. Syst. 5, 30–65 (2006)
5. Golubitsky, M., Stewart, I.: The Symmetry Perspective: From Equilibrium to Chaos in Phase
Space and Physical Space. Birkhauser Verlag, Basel (2002)
6. Golubitsky, M., Stewart, I., Schaeffer, D.G.: Singularities and Groups in Bifurcation Theory,
vol. II. Springer, New York (1988)
7. Gray, G.R., Ryan, A.T., Agrawal, G.P., Gage, E.C.: Control of optical-feedback-induced laser
intensity noise in optical data recording. Opt. Eng. 32, 739–745 (1993)
8. Gray, G.R., Ryan, A.T., Agrawal, G.P., Gage, E.C.: Optical-feedback-induced chaos and its
control in semiconductor lasers. In: SPIE’s 1993 International Symposium on Optics, Imaging,
and Instrumentation, San Diego, pp. 45–57. International Society for Optics and Photonics
(1993)
9. Lang, R., Kobayashi, K.: External optical feedback effects on semiconductor injection laser
properties. IEEE J. Quantum Electron 16, 347–355 (1980)
10. Mork, J., Tromborg, B., Mark, J.: Chaos in semiconductor lasers with optical feedback: theory
and experiment. IEEE J. Quantum Electron 28, 93–108 (1992)
11. Sano, T.: Antimode dynamics and chaotic itinerancy in the coherence collapse of semiconduc-
tor lasers with optical feedback. Phys. Rev. A 50, 2719–2726 (1994)
12. van Tartwijk, G.H.M., Levine, A.M., Lenstra, D.: Sisyphus effect in semiconductor lasers with
optical feedback. IEEE J. Select. Top. Quantum Electron. 1, 466–472 (1995)
13. Verduyn Lunel, S.M., Krauskopf, B.: The mathematics of delay equations with an application
to the Lang-Kobayashi equation. In: Krauskopf, B., Lenstra, D. (eds.) Fundamental Issues
of Nonlinear Laser Dynamics. AIP Conference Proceedings, vol. 548. American Institute of
Physics, New York (2000)
Effect of Jet Impingement on Nano-aerosol Soot
Formation in a Paraffin-Oil Flame
M. Darbandi ()
Department of Aerospace Engineering, Center of Excellence in Aerospace Systems, Institute
for Nanoscience and Nanotechnology, Sharif University of Technology, Tehran, P. O. Box
11365-8639, Iran
e-mail: [email protected]
M. Ghafourizadeh
Department of Aerospace Engineering, Center of Excellence in Aerospace Systems, Sharif
University of Technology, Tehran, P. O. Box 11365-8639, Iran
M. Ashrafizaadeh
Department of Mechanical Engineering, Isfahan University of Technology, Isfahan, P. O. Box
84156-83111, Iran
e-mail: [email protected]
1 Introduction
There are several types of flame holders to maintain the combustion process inside
a burner. Combustion can be stabilized using (1) an external energy supply such
as heated plate, torch, highly reactive chemicals, lasers, electric arcs, chemical
additives, (2) bluff bodies such as V-gutters, cylinders, spheres, flat plates, (3) steps
such as rearward facing steps, forward facing steps, side dumps, cavities, (4) flow
instabilities such as swirls, cyclones, (5) jets such as reverse flow jets, opposed jets,
and fuel jet blockages [1]. The choice of flame holding method depends on the
burner size, weight, pressure loss, flammability limits, material temperature, and
structural limitations. Most of these methods stabilize flames through establishing
recirculation zones which carry high-temperature products upstream to separate
flow region for igniting the incoming flows. Among the above mentioned methods,
the opposed jet, i.e. an impinging jet, is an interesting flame-holding method
regarding the limitations. So, a deep understanding on the behavior of impinging
jets would help to keep a stable combustion in combustors burning reactants and
forming products.
Many researchers have studied the formation of CO and CO2 pollutants in
combustion processes while nano-particulate soot, incorporated with hazardous
aromatics, i.e. C6 H6 , needs special attention and considerations. Even a low
emission of these pollutants can cause serious health problems, i.e. different organs
cancer. On the other hand, C6 H6 has been widely used as an important component
of gasoline to enhance the octane number of fuels. So, this aromatic compound
requires to be understood very well due to vast applications in engines as well as its
carcinogenicity.
Literature shows aerosol modeling of soot formation in laminar flames has
been studied in last decades [2, 3]. Few researchers also studied soot formation in
turbulent flames fueled by simple hydrocarbons [4, 5]. There is a lack of resources
studying the formation of nano-particulate soot aerosol in turbulent flames burning
common fuels such as paraffin-oil, gasoline, jet fuel, or diesel. Brooks and Moss
[4] proposed soot acetylene-inception model and showed that soot formation in
simple fuels is limited by inception rate of particles from single-ring aromatics
formed from acetylene. However, soot formation in practical fuels, which have
higher amounts of carbon atoms as well as aromatics compounds, is limited by
growth rate of aromatics. In this regard, Hall et al. [6] proposed a soot model,
i.e. soot PAH-inception model, with inception rate based on two and three-ringed
aromatics formed from single-ring aromatic species, i.e. C6 H6 and C6 H5 radical.
Back to our past publications, we have already simulated the nano-aerosol soot
formation in turbulent non-premixed flames fed with methane [7, 8], ethylene
[9, 10], and propane [11, 12]. In this paper, we use and extend our previous studies
and simulate the nano-aerosol soot formation in a turbulent non-premixed flame
burning paraffin-oil as its fuel. In this regard, we employ a two-equation soot
model to solve for the soot mass fraction and the number density considering
Effect of Jet Impingement on Nano-aerosol Soot Formation in a Paraffin-Oil Flame 91
the soot formation and its oxidation based on PAHs and OH agents, respectively.
We utilize a steady flamelet model as our combustion model considering a large-
detailed kinetic reaction mechanism with 2613 reversible chemical reactions and
121 chemical species. We use a two-equation - turbulence model with round-jet
corrections and take into account the turbulence-chemistry interaction using some
presumed-shape PDFs. We also take into account the radiation heat transfer of the
soot and gases assuming an optically-thin flame and calculate their radiations locally
only by emissions. To evaluate our numerical solution, we simulate a benchmark
turbulent paraffin-oil non-premixed flame inside a burner and compare the obtained
results with those of experiment as well as another numerical study. The obtained
results indicate our numerical simulation can predict soot volume fraction, mixture
fraction, and temperature distributions of the flame. Then, we embed a micro-scale
injector at burner wall, split incoming air-flow between primary- and secondary-air
streams and inject the secondary-air into burner via the micro-scale injector and
compare the results. We also study mass-flow-rate effect of the micro-scale injector
on nano-aerosol soot formation, the emissions of CO, CO2 , and C6 H6 from turbulent
non-premixed paraffin-oil flame inside burner.
In the cylindrical coordinates, i.e. r, z, the fluid flow conservation laws consisting of
continuity, r-momentum, and z-momentum are given by
u
r .V/ C D0 (1)
r
@p u e @u
r .Vu/ D C r .e r u/ e 2 C (2)
@r r r @r
@p e @v
r .Vv/ D C r .e r v/ C g (3)
@z r @r
The radial and axial components of the velocity vector are u and v, respectively. The
mixture density, velocity vector, pressure, and effective viscosity are represented by
, V, p, and e , respectively. The transport equations for turbulence quantities, i.e.
turbulence kinetic energy and its dissipation rate , are given by
e e @
r .V/ D r r C C G (4)
r @r
e e @
r .V/ D r r C C .c1 G c2 / (5)
r @r
92 M. Darbandi et al.
In a confined jet, the turbulence model constants for Eqs. (4) and (5) are taken from
Ref. [13]. To model combustion in a turbulent diffusion flame, we use the steady
flamelet model. In this study, we choose a detailed kinetic scheme, i.e., 121 chemical
species and 2613 chemical reactions, to perform our simulations. The transport
equations for the first two moments of mixture fraction, i.e., f and f 002 , are given by
e e @f
r .Vf / D r rf C (6)
f f r @r
e 002 e @f 002
r Vf 002 D r rf C C cg e .r f /2 c f 002 (7)
f f r @r
The radiation source term in the energy conservation law, can be determined locally
only by emission assuming an opticallyP thin flame. Finally, the density is obtained
from the equation of state as p D RT nmD1 Ym =Wm where m counts the number
of chemical species in the mixture from 1 to n total number of species. The
temperature, gas constant, mass fraction, and molecular weight are represented by
T, R, Y, and W, respectively.
3 Computational Method
arrangement and implement finite element shape functions and physical influence
upwind scheme PIS for the diffusion and convection terms, respectively. Using PIS
scheme we also handle the pressure-velocity coupling effectively.
the measured data. It can be attributed to (1) the relatively simple models used in our
calculations, e.g., the turbulence model, the radiation model, and the soot model, (2)
the assumptions made to simplify the problem, e.g., the gas-phase nucleation and
the free-molecular-regime coagulation assumptions used in soot modeling, and the
optically-thin flame assumption used in calculating the radiative heat transfer rate,
which took into account only the most radiating species. Evidently, the use of more
sophisticated radiation and soot models would help to overcome such shortcomings
and predict the soot characteristics and flame structure more accurately, which is
beyond the scope of this paper.
Effect of Jet Impingement on Nano-aerosol Soot Formation in a Paraffin-Oil Flame 95
Fig. 2 The current axial and radial distributions of mixture fraction, temperature, and soot volume
fraction in the flame and comparison with the experimental data [15] and numerical solution [16];
(a) r D 0, (b) r D 0, (c) r D 0, (d) z D 0:3 m, (e) z D 0:3 m, and (f) z D 0:3 m
In this section, we study the effect of mico-jet impingement on the reactive flow
behavior and the resulting emissions of CO, CO2 , C6 H6 species and soot nano-
aerosol using the current developed numerical method. We first study the effect of
mico-jet impingement on the above parameters comparing with the benchmark test
case. So, we embed a micro-scale injector at the burner wall, split the incoming air-
flow between the primary- and secondary-air streams and inject the primary air into
the burner via the embedded micro-scale injector. The dimension of micro-scale
injector is 100 m embedded at a height of z D 0:1 m above the fuel nozzle exit.
We inject a mass flow rate of 2.7 g/s of the total incoming-air via the micro-scale
injector while the rest of incoming air would enter the burner as primary-air. The
other parameters, i.e. the geometry and boundary conditions (BCs), are similar to
the benchmark test case.
Figure 3 shows the effect of mico-jet impingement on the distributions of stream
function, temperature, OH and C6 H6 mass fractions in the turbulent paraffin-oil
flame. In each subfigure, the left part depicts the distributions for benchmark
test case, i.e., without any mico-jet impingement, while the right part depicts the
distribution for the burner incorporated with the mico-jet impingement, which
96 M. Darbandi et al.
Fig. 3 The effect of mico-jet impingement on the distributions of (a) stream function (kg/s), (b)
temperature (K), (c) OH mass fraction, and (d) C6 H6 mass fraction in the turbulent paraffin-oil
flame
injects a mass flow rate of 2.7 g/s via the embedded injector inserted at the
burner wall. As seen, the mico-jet impingement causes two recirculation zones
upstream and downstream of the micro-injector, which affect the flame envelop.
The upstream recirculation, which is due to the injected air micro-jet, would cause
the entrance of fresh air to the flame and this results in a well mixing of that
with the gaseous high-temperature products. The downstream recirculation, which
is due to the injected air micro-jet, would cause the return of high-temperature
products at regions downstream of the burner, which is eventually mixed with
the low-temperature gaseous reactants, i.e. the exhaust gas recirculation EGR.
Such enhancement in mixing performance due to the appeared recirculation zones,
which are formed upstream and downstream of the micro-impinging jet, would
result in high-temperature combustion products at the burner outlet and a boost
up in the combustion efficiency. The mixing enhancement also leads to a uniform
temperature of exhaust gases at the burner outlet. So, the mico-jet impingement
improves the combustion efficiency via enhancing the existing mixing. As seen, the
mico-jet impingement also results in a compact distribution of OH mass fraction
near the fuel injector exit. There are several definitions for the flame length. In
the numerical simulations, this parameter is defined as the location of maximum
OH concentration, the stoichiometric line, or the location of maximum temperature
gradient. Considering the aforementioned definition, it is observed that the mico-jet
impingement reduces the flame length and results in a compact flame. The compact
flame together with the resulting EGR phenomenon would cause the by-products to
be fully-burnt at the regions near the fuel-injector exit. So, C6 H6 species would be
Effect of Jet Impingement on Nano-aerosol Soot Formation in a Paraffin-Oil Flame 97
Fig. 4 The effect of mico-jet impingement on the distributions of (a) CO mass fraction, (b) CO2
mass fraction, (c) soot volume fraction, and (d) soot particles diameter (m) in the turbulent paraffin-
oil flame
formed within the burner at regions near fuel-injector exit and so their emissions
would be reduced at the outlet, i.e., a very low concentrations release into the
surrounding ambient.
As seen in Fig. 4, the EGR, due to the appeared two recirculation zones of micro-
impinging-jet, would cause the rebrurn of combustion by-products, i.e. the CO, and
the combustion products, i.e. CO2 , at the regions near the fuel-injector exit. So, the
mico-jet impingement would reduce the emission of CO at the outlet. As seen, the
appeared recirculation zones of micro-impinging-jet would result in a well mixing
of combustion products with the unburnt reactants, which in turn results in a uniform
distribution of combustion products, i.e. the CO2 , within the burner and at the outlet.
As seen also, the nano-aerosol soot formation within the burner is reduced as a result
of EGR, i.e. due to the appearance of two recirculation zones. The soot depletion
within the burner would result in low concentrations of the soot in the exhaust gases
released into the surrounding atmosphere.
Now, we summarize, compare, and study the effect of different values of micro-
impinging-jet mass flow rate on the exhaust-gases temperature and the emissions
of CO, CO2 , C6 H6 , and the soot nano-aerosol released from the current turbulent
paraffin-oil flame. In this regard, we consider different values of micro-impinging-
jet mass flow rate, i.e. 1.8, 2.7, 3.2, and 3.6 g/s. The other parameters, i.e. the
geometry and BCs, are similar to the benchmark test case. As observed in Table 1,
the emissions of CO, C6 H6 , and the soot nano-aerosol would decrease as the micro-
impinging-jet mass flow rate increases. It is also observed that the exhaust-gases
temperature would increase as the micro-impinging-jet mass flow rate increases.
98 M. Darbandi et al.
6 Conclusion
Acknowledgements The authors would like to thank the financial support received from the
Deputy of Research and Technology in Sharif University of Technology. Their financial support
and help are greatly acknowledged.
Effect of Jet Impingement on Nano-aerosol Soot Formation in a Paraffin-Oil Flame 99
References
1. Civilian, D.L.D.: Numerical analysis of two and three dimensional recessed flame holders for
scramjet applications. PhD thesis, Air University, Air Force Institute of Technology (1996)
2. Leung, K.M., Lindstedt, R.P., Jones, W.P.: A simplified reaction mechanism for soot formation
in nonpremixed flames. Combust. Flame 87, 289–305 (1991)
3. Kennedy, I.M., Yam, C., Rapp, D.C.: Modeling and measurements of soot and species in a
laminar diffusion flame. Combust. Flame 107, 368–382 (1996)
4. Brookes, S.J., Moss, J.B.: Predictions of soot and thermal radiation properties in confined
turbulent jet diffusion flames. Combust. Flame 116, 486–503 (1999)
5. Kronenburg, A., Bilger, R.W., Kent, J.H.: Modeling soot formation in turbulent methane-air jet
diffusion flames. Combust. Flame 121, 24–40 (2000)
6. Hall, R.J., Smooke, M.D., Colket, M.B.: Predictions of soot dynamics in opposed jet diffusion
flames, chapter 8. In: Sawyer, R.F., Dryer, F.L. (eds.) Physical and Chemical Aspects of
Combustion: A Tribute to Irvin Glassman. Combustion Science and Technology Book Series,
vol. 189, pp. 189–230. Gordon and Breach, Amsterdam (1997)
7. Darbandi, M., Ghafourizadeh, M., Schneider, G.E.: Aerosol modeling of soot nanoparticles
in a turbulent diffusion flame using an extended detailed kinetic scheme. In: 52nd Aerospace
Sciences Meeting, National Harbor. AIAA 2014-0580 (2014)
8. Darbandi, M., Ghafourizadeh, M., Jafari, S.: Simulation of soot nanoparticles formation and
oxidation in a turbulent nonpremixed methane-air flame at elevated pressure. In: 13th IEEE
International Conference on Nanotechnology, Beijing, pp. 608–613. IEEE-NANO 2013-0382
(2013)
9. Darbandi, M., Ghafourizadeh, M., Schneider, G.E.: Extending a numerical procedure to
simulate the micro/nanoscale soot formation in ethylene-air turbulent flame using acetylene-
route nucleation. In: 11th AIAA/ASME Joint Thermophysics and Heat Transfer Conference,
Atlanta. AIAA 2014-2385 (2014)
10. Darbandi, M., Ghafourizadeh, M., Schneider, G.E.: Numerical study on surface oxidation of
carbonaceous nano- and micro-particles in a heavily sooting ethylene turbulent jet flame. In:
53rd AIAA Aerospace Sciences Meeting, Kissimmee. AIAA 2015-2084 (2015)
11. Darbandi, M., Ghafourizadeh, M., Schneider, G.E.: Prediction of soot nano/micro particles
emission (smoke pollution) in a turbulent propane nonpremixed flame. In: The CSME
International Congress, Toronto (2014)
12. Darbandi, M., Ghafourizadeh, M., Schneider, G.E.: Two-phase flow simulation of nano- and
micro-particulate soot in an air-preheated nonpremixed turbulent propane flame. In: 22nd
Annual Conference of the CFD Society of Canada, Toronto (2014)
13. Kent, J.H., Honnery, D.: Soot and mixture fraction in turbulent diffusion flames. Combust. Sci.
Technol. 54, 383–397 (1987)
14. Sozer, E., Hassan, E.A., Yun, S., Thakur, S., Wright, J., Ihme, M., Shyy, W.: Turbulence-
chemistry interaction and heat transfer modeling of H2 /O2 gaseous injector flows. In: 48th
AIAA Aerospace Sciences Meeting, Orlando. AIAA 2010-1525 (2010)
15. Young, K.J., Stewart, C.D., Moss, J.B.: Soot formation in turbulent nonpremixed kerosine-air
flames burning at elevated pressure: experimental measurement. Proc. Combust. Inst. 25(1),
609–617 (1994)
16. Wen, Z., Yun, S., Thomson, M.J., Lightstone, M.F.: Modeling soot formation in turbulent
kerosene/air jet diffusion flames. Combust. Flame 135, 323–340 (2003)
Normalization of Eigenvectors and Certain
Properties of Parameter Matrices Associated
with The Inverse Problem for Vibrating Systems
1 Introduction
M qR C DPq C Kq D 0; (1)
where M; D; K are called the mass matrix, damping matrix and stiffness matrix,
respectively. For a physical stably vibrating system, M and K are strictly positive
definite (M > 0; K > 0) while D is negative definite (D 0). All these matrices are
assumed to be of dimension n. It is well known [9] that solving (1) is equivalent to
solving the eigenvalue problem
L./x D 0; (2)
L./ D 2 M C D C K: (3)
Solutions .; x/ of (2) appear in conjugate pairs and for vibrating beams or pipes,
has a non-positive real part: <./ 0 and a nonzero imaginary part: =./ ¤ 0.
Hence, it suffices to consider the case =./ > 0. Let 1 ; 2 ; ; n be eigenvalues
and x1 ; x2 ; ; xn be their corresponding eigenvectors. Following the notation in [8],
we let
The inverse problem for (1) is one of identifying the real matrices M > 0; K >
0 and D 0 from a specified pair .; Xc /. There is a great deal of interest and
vast literature devoted to this inverse problem for vibrating beams and other related
vibrating systems including system monitoring and fault detection, inverse Sturm-
Liouville problems, applied physics, and signal processing. The reader is referred to
[1–3, 9, 10, 12] and the references therein.
The well posedness of the inverse problem requires that the matrix Xc be specially
normalized [8] in the sense that there is a complex diagonal matrix such that the
normalized matrix
XQ c WD Xc (5)
satisfies
XQ R XQ TR D XQ I XQ TI ; (6)
where XQ R D <.XQc / and XQ I D =.XQc /. To the best of our knowledge, no formula has
been given for finding a normalization matrix except through solving case by case
a quadratic system of equations involving the elements of , see, e.g. [4–6, 8]. In this
work we give an explicit formula for , which turns out to be also a characterization
of such normalization matrices. This is done in Sect. 3 in which we also give an
illustrative example of an actual vibrating beam problem.
Furthermore, it follows from the polar decomposition of XQ c that its real and
imaginary parts are related by
XQ I D XQ R ;
Eigenvector Normalization of Vibrating Systems 103
XQ c D XQ R .I i/: (7)
This result is then used to show that a certain matrix Q associated with the so
called Jordan triples is invertible, which eliminates the need to check this condition
from Algorithm 1 in [8]. Other properties of and a certain matrix polynomial
defined in terms of it are discussed in Sect. 4, where we characterize the invertibility
of this polynomial in terms of the given parameter . This has direct consequence
on the identification of positive definite M; K. We also provide an example to show
that the identification of a D 0, may not be possible to in general.
In Sect. 2, we collect some facts about discretized vibrating systems which we
will need in this paper.
2 Preliminaries
where
X
QD (11)
XJ
104 M. El-Gebeily and Y. Khulief
X eRT D X
eR X eIT ;
eI X (12)
e
for some real orthogonal matrix .
3 Eigenvector Normalization
D Xc1 XN c (14)
" #
0 2
T
Xc
Xc X c D0
2 0 XcT
Eigenvector Normalization of Vibrating Systems 105
Multiplying on the left and right by Xc1 and XcT , respectively, and putting WD
Xc1 XN c
we get
0 2 T
I D0 (15)
2 0 I
T
0 2
Clearly, the kernel of the operator 2 W Cn ! C2n is f0g. Furthermore,
0 I
the operator I W C2n ! Cn has rank n, and therefore, its kernel also has rank n:
T
0 2
For (15) to hold, the operator 2 must map onto the kernel of the
0 I
operator I : The latter is spanned by the columns of : Therefore, there
I
exists an n n change of base matrix A such that
0 2 T
D A:
2 0 I I
2 D A;
2 D A T :
Since 1 D ,
N we may rewrite the above equations as
2 D A D A
N T: (16)
Furthermore, since the matrices in the last two equalities of (16) must be diagonal
matrices and is invertible, we conclude that AN D AT .
The only if part of the proof can be done by reversing the above steps.
Proposition 1 suggests the following algorithm to find a normalization matrix . The
steps parallel the three parts of the proposition.
Algorithm 1 To compute a normalization diagonal matrix :
1. Perform column reduction operations on to reduce it to a lower triangular
form. (This fixes the upper triangular part of A and, by Proposition 1-2, the lower
triangular part. At this point, the matrix A is actually diagonal.)
2. Ensure that the diagonal part of A is purely imaginary so that Proposition 1-2 is
satisfied.
3. Calculate from Proposition 1-3.
106 M. El-Gebeily and Y. Khulief
Since column reduction operations are not unique, we expect that the normalization
matrix is not unique. The following example shows that this is the case. It also
explores an alternative approach for finding that works in special situations.
Example 1 The coefficients of a finite element discretization of a vibrating beam
(see [7], Chapter 8) are given by
2 3
:0929 0 0161 :0967
6 0 1:4881 :0967 :558 7
MD6 4 :0161 :0967 :0464 :1637 5 ;
7
which happens to be a diagonal matrix. In this rather simple case, (12) simplifies to
R D I .I C / .I /1 :
Eigenvector Normalization of Vibrating Systems 107
4 Consequences of Normalization
From now on, we will assume that Xc is properly normalized so that (12) is satisfied.
It was shown in [8] that, to determine a mass matrix M > 0, it is necessary that
C T > 0; (17)
where is a real orthogonal matrix satisfying (13). In this section, we will discuss
some consequences of this condition. Let 1 ; 2 ; ; n be an orthonormal system
of eigenvectors of T corresponding to its eigenvalues ei'1 ; ei'2 ; ; ei'n with
'1 ; '2 ; ; 'n < . Define the matrices
˘ D diag ei'1 ; ei'2 ; ; ei'n and ˚ D Œ1 ; 2 ; ; n : (18)
Equations (19), (20) and (21) determine a symmetric system whose eigenvalues and
eigenvectors are and Xc , respectively. We shall see later (see Lemma 2 below)
that (17) ensures the invertibility of Q. This will require a characterization of the
eigenvalues of the matrix T , which will be given in Lemma 1.
108 M. El-Gebeily and Y. Khulief
D .I C/ .I C C/1 (22)
C T D .I C/ .I C C/1 C .I C/1 .I C C/ :
1 iı 1 C iı
C
1 C iı 1 iı
1 2ı 2
> 0;
1 C ı2
which implies 3. If 3. holds, then for any y 2 Cn , we may write y D ˚˛ for some
˛ 2 Cn . Then
y C T y D ˛ ˚ C T ˚˛ D 2˛ < .˘ / ˛ > 0;
Put
D i .I i/1 .I C i/ : (24)
D :
i iI .I i/1 .I C i/ 0
C
where B D
1=2
1=2 and where
we made use of the fact that
D
1 .
1
Therefore, we have to show that I B B is invertible. If not, then, invoking the
spectral mapping theorem, we have, for some ı 2 .B/ D ./,
ı = .ı/
0D1 D 2i ;
ı ı
which contradicts the assumption that W > 0.
Next, we investigate the invertibility of the matrices M; D; K as identified
from (21), (22) and (23). For r 2 Z, let r ; Ur ; Wr be as defined in (9) and let
110 M. El-Gebeily and Y. Khulief
Then
0 r I i T
Pr ./ D I C i I i
r 0 I C i T
straightforward
T to see that its orthogonal complement is spanned by the columns of
i
: Therefore, (25) holds if and only if there exists an invertible matrix B such
I
that
T
0 r I i
D B:
r 0 i
T I
r D B:
Eigenvector Normalization of Vibrating Systems 111
Under our assumptions on U and W, P1 ./; P1 ./ are always invertible. This, in
turn is equivalent [8] to the positive definiteness of M; K. However,the following
example shows that P2 ./ may be indefinite if U is not strictly negative definite.
Example 2 Let
20 10
UD ;W D :
00 02
Then
2 3 0 4 0
D Ci :
0 4 0 0
The eigenvalues of the first type are e˙i and by Lemma 1, is admissible only if
2 .0; =2/. The eigenvalues of the second kind are 1; 1 and thus, they do not
correspond to an admissible . For the first kind, we calculate
8 cos 7=2 cos 2 C 7=2 4 sin 7=2 sin 2
P2 ./ D
4 sin 7=2 sin 2 7=2 cos 2 7=2
p
which has eigenvalues 1;2 D 4 cos 1=2 162 98 cos 2: It can be shown
that 1 < 0; 2 > 0 for all 2 .0; =2/. Therefore, P2 ./ is non-definite for any
admissible :
References
1. Bai, Z.J.: Constructing the physical parameters of a damped vibrating system from eigendata.
Linear Algebra Appl. 428(2–3), 625–656 (2008)
2. Chu, M.T.: Inverse eigenvalue problems. SIAM Rev. 40, 1–39 (1998)
3. Chu, M.T., Golub, G.H.: Inverse Eigenvalue Problems: Theory, Algorithms, and Applications.
Oxford University Press, Oxford (2005)
4. De Angelis, M., Imbimbo, M.: A procedure to identify the modal and physical parameters of a
classically damped system under seismic motions. Advances in Acoustics and Vibration, Hin-
dawi Publishing Corporation, Article ID 975125, 11 pages (2012). doi:10.1155/2012/975125
112 M. El-Gebeily and Y. Khulief
5. Friswell, M.I., Prells, U.: A measure of non-proportional damping. Mech. Syst. Sig. Process
14(2), 125–137 (2000)
6. Garvey, S.D., Penny, J.E.T.: The relationship between the real and imaginary parts of complex
modes. J. Sound Vib. 212(1), 64–72 (1998)
7. Kwon, Y.W., Bang, H.: The Finite Element Method Using Matlab. CRC Press, Boca Raton
(1997)
8. Lancaster, P., Prells, U.: Inverse problems for damped vibrating systems. J. Sound Vib. 283,
891–914 (2005)
9. Lancaster, P., Tismenetsky, M.: The Theory of Matrices. Academic, Orlando, Academic Press,
New York (1985)
10. Lancaster, P., Zaballa, I.: On the inverse symmetric quadratic eigenvalue problem. SIAM J.
Matrix Anal. Appl. 35(1), 254–278 (2014)
11. Reddy, J.N., Wang, C.M.: Dynamics of fluid-conveying beams, CORE Report No. 2004-03,
Centre for Offshore Research and Engineering, National University of Singapore (2004)
12. Xu, S.F.: An Introduction to Inverse Algebraic Eigenvalue Problems. Peking University
Press/Friedr. Vieweg & Sohn, Beijing/Braunschweig/Wiesbaden (1998)
Computational Aspects of Solving Inverse
Problems for Elliptic PDEs on Perforated
Domains Using the Collage Method
1 Introduction
In this paper, we are interested in the parameter estimation inverse problem for
elliptic PDEs. One physical setting for such problem is the estimation of the thermal
diffusivity in a lamina based on (perhaps noisy) observational data of its equilibrium
temperature. Indeed, the examples in the final section of the paper include images
that can be thought of as isotherm plots in a lamina. In Sect. 2, we present the
Collage Method approach for solving such inverse problems. In the past [5], we have
established that the Collage Method compares favourably with established methods,
such a Tikhonov regularization [9]. The complication in the current work is that we
wish to consider such an inverse problem on a perforated domain.
A perforated domain (or porous medium) is a material characterized by a
partitioning of the total volume into a solid portion often called the “matrix” and
a pore space usually referred to as “holes.” Mathematically speaking, these holes
can be either materials different from that of the matrix or real physical holes. When
H. Kunze ()
Department of Mathematics and Statistics, University of Guelph, Guelph, ON, Canada
e-mail: [email protected]
D. La Torre
Department of Economics, Management, and Quantitative Methods, University of Milan, Milan,
Italy
Department of Applied Mathematics and Sciences, Khalifa University, Abu Dhabi, UAE
e-mail: [email protected]
formulating differential equations over porous media, the term “porous” implies that
the state equation is written in the matrix only while boundary conditions should be
imposed on the whole boundary of the matrix, including the boundary of the holes.
Solving differential equations over a perforated domain is typically a complicated
task because the size and distribution of the holes within the material play an
important role in its characterization. Simulations conducted over a perforated
domain that includes a large number of matrix-hole interfaces present numerical
challenges since a very fine discretization mesh and a large computation time
are required. The direct problem is of great interest in various areas of science,
engineering, and industry (see, for example, [2] and [3] for discussion of real-
world problems). One way to treat these (perhaps idealized) problems with rigorous
mathematics is called homogenization (see [3] and [8]), which takes advantage of
the multiscale nature of the perforated domain.
The inverse problem over a perforated domain inherits all of these challenges.
In this paper, we seek to avoid the complications of working with the inverse
problem solution machinery on the perforated domain. In Sect. 3, we present several
theoretical results that connect the problem on the perforated domain with the same
problem on the corresponding unperforated (solid) domain. To frame the situation,
we set up the two types of problems here.
Let ˝ 2 R2 be compact and convex and ˝B be collection of circular m holes
[iD1 B.xj ; "j /, where xj 2 ˝, the radii "j > 0, and the holes B.xj ; "j / are non-
m
overlapping and strictly inside ˝. We let " D maxj "j , the maximum hole radius.
Let ˝" denote the closure of ˝ n ˝B . Then, we consider the problem .P" / on the
perforated domain
r .K .x; y/ru.x; y// D f .x; y/ in ˝"
(P" )
u.x; y/ D 0 on @˝"
where .v/ and a.u; v/ are linear and bilinear maps, respectively, both defined on
a Hilbert space H. We denote by h; i the inner product in H, kuk2 D hu; ui and
d.u; v/ D ku vk, for all u; v 2 H.
The inverse problem of interest may now be viewed as follows: Suppose that we
have an observed solution u and a given (restricted) family of bounded, coercive
bilinear functionals a .u; v/, 2 , and a family of bounded linear functionals .
Then, by the Lax-Milgram theorem, for each 2 there exists a unique u 2 H
such that .v/ D a .u ; v/ for all v 2 H. We would like to determine if there
exists a value of the parameter such that u D u or, more realistically, such that
ku uk is small enough. The following theorem is useful for the solution of this
problem.
Theorem 1 (Generalized Collage Theorem [6]) For all 2 , suppose that
a .u; v/ W H H ! R is a family of bilinear forms and W H ! R is
a family of bounded linear functionals. Let u denote the solution of the equation
a .u; v/ D .v/ for all v 2 H, as guaranteed by the Lax-Milgram theorem. Then,
given a target element u 2 H,
1
ku u k F .u/; (2)
m
where
ˇ ˇ
F .u/ D sup ˇa .u; v/ .v/ˇ (3)
v2H; kvkD1
solution that can be approximated with a suitable discrete and quadratic program,
derived from the application of the Generalized Collage Theorem and the use of an
orthonormal basis in the Hilbert space H [6].
3 Theoretical Results
We introduce the Sobolev spaces H D H01 .˝/ and H" D H01 .˝" /. Since any
function in H" can be extended to be zero over the holes, it is trivial to prove that H"
can be embedded in H. We let ˘" u be the projection of u 2 H onto H" ; it follows
that
find u 2 H" such that a" .u; v/ D " .v/; 8v 2 H" (P" )
and
In the results that follow, we assume that the continuous and bilinear forms a" and
a are uniformly coercive and bounded with respect to and ", namely there exists
two positive constants m and M such that for all 2
8
ˆ
ˆ a .u; u/ mkuk2 8u 2 H"
ˆ "
ˆ
< a .u; v/ Mkukkvk 8u; v 2 H"
"
(H1)
ˆ a .u; u/ mkuk2
ˆ 8u 2 H
ˆ
:̂
a .u; v/ Mkukkvk 8u; v 2 H
Computational Aspects of Solving Inverse Problems on Perforated Domains 117
We also assume that the linear functionals " and are uniformly bounded with
respect to and ", namely there exists a positive constant such that
(
" .u/ kuk 8u 2 H"
(H2)
.u/ kuk 8u 2 H
Under the hypotheses (H1) and (H2), (P" ) and (P) have unique solutions u" and u ,
respectively, for each 2 and for each fixed choices of "j , j D 1; : : : ; m.
We now state three results relating (P" ) and (P), first presented with proofs in [4].
Proposition 1 The following estimate holds:
F .u/ M
k˘" u u" kH" C ku ˘" ukH (6)
m m
Proposition 2 There exists a constant C, that does not depend on ", such that the
following estimate holds:
4 Examples
Table 1 Results for the inverse problem in Example 1. Due to the normalization of 0 , the true
values are .1 ; 2 ; 3 / D .8; 3; 1/
ı (%) 1 2 3
0 7.1935 2.9783 1.2431
1 7.1586 3.0466 1.2573
3 7.0737 3.1945 1.2934
where ˝B is the union of the nine holes. We solve the diffusion problem numerically
and sample the solution u" at 49 uniformly-distributed points strictly inside ˝. The
level curves of the solution are illustrated in Fig. 1. If a sample point lies inside a
hole, we obtain no information at the point.
Now, beginning with the observational data points, we consider the inverse
problem of estimating K and f . To this end, we define K .x; y/ D 0 C 1 x2 C 2 y2 .
Using the data values and f .x; y/ D 4x2 C y2 , we seek to estimate the values of i
in K .x; y/ by applying the generalized collage theorem to solve the related inverse
problem on ˝ with no holes.
The results for various cases, with relative noise of ı% added, are presented in
Table 1. The results worsen as noise is added, but remain reasonably good.
1
Example 2 For " 2 f0:1; 0:025; 0:01g, define N" D 10" and
[
N"
1 1
˝B D B" i "; j " ;
i;jD1
2 2
Computational Aspects of Solving Inverse Problems on Perforated Domains 119
a domain with N"2 uniformly-distributed holes all of radius ". Choosing K.x; y/ D
Ktrue .x; y/ D 9 C 3x C 2y, we consider the steady-state diffusion problem
8
< r .K.x; y/ru.x; y// D 2x2 C y2 ; in ˝" ;
u.x; y/ D 0; on @˝; (9)
: @u
@n
.x; y/ D 0; on @˝ B :
For each fixed value of ", we solve the diffusion problem numerically and sample
the solution at 49 uniformly-distributed points strictly inside ˝, obtaining no
information at the point if it lies in a hole. Using the data values, with relative noise
of ı% added, we use the generalized collage theorem to solve the related inverse
problem, knowing f .x; y/ D 2x2 C y2 and seeking a diffusivity function of the form
K.x; y/ D 0 C 1 x C 2 y.
The level curves of each solution are illustrated in Fig. 2. When the hole is too
large, as in the N D 1 case, the estimates are very poor. In this case, the hole needs
to be incorporated into the macroscopic-scale model, as it can’t be considered part
of the smaller-scale model. In the other cases of the table, the estimates are good.
We see that as the size of the holes decreases (even while the number increases),
the solution to the inverse problem produces better estimates of the parameters. As
the noise increases, the results worsen but remain good (Table 2).
Fig. 2 Level curves of solutions in Example 2, with " D 0:1, 0:025, and 0:01
Acknowledgements H. Kunze thanks the Natural Sciences and Engineering Research Council for
supporting this research.
References
1 Introduction
There has been much interests in the problem of dynamic feedback controller,
which is modeled by coupled partial differential equations (PDEs) or interconnected
PDEs. This kind of problems are quite challenging, yet have became attractive to
researchers these days. Control design and stability analysis for such systems have
become active over the past 5 years, see [8, 9] and the references therein. In [9],
an interconnected system of Schrödinger equation and heat equation is carefully
studied, which replaces the static feedback by dynamic feedback governed by a
heat equation. It shows the exponential stability of the system and the Gevery class
property of the semigroup. The boundary and internal stabilizations for Schrödinger
equation are considered in [6], where the stability of the systems is achieved by
using multiplier techniques. Two kinds of boundary controllers for Schrödinger
equation are concerned in [2], which shows that a simple proportional collocated
boundary controller can exponentially stabilize the system but the decay rate cannot
be prescribed, while the backstepping method can ensure it to have arbitrary decay
rate.
It is also known that viscoelastic materials have been widely used in engineering
and lots of researchers have put much efforts to analyze the dynamic behavior of
vibration for elastic structures with viscoelasticity over the past several decades.
Kelvin-Voigt (K-V) damping is one of those most commonly used viscoelastic
model, due to its easy and huge applications in modern technology. And there has
been an abundance of literature on the study of elastic system with viscoelastic
damping. In [3, 4], it is shown that local K-V damping can ensure the exponential
stability of both a string and an Euler-Bernoulli beam system when the material
parameter is smooth enough at the interface. However, if the smooth condition
cannot be satisfied, the string system is non-exponentially stable even if the material
parameter is a constant. Passive control of a wave equation with internal K-V
damping is studied in [1]. Results there reveal that the spectrum of the system
operator consists of point spectrum and continuous spectrum, due to the fact that the
resolvent of the system operator for a viscoelastic system is not compact anymore.
In this paper, we present a dynamic input/output feedback controller, which feeds
the K-V damped wave equation and Schrödinger equation into each other through
the boundary. The coupled Schrödinger-wave system (as shown in Fig. 1) is written
as follows:
8
ˆ
ˆ yt .x; t/ C iyxx .x; t/ D 0; 0 < x < 1; t > 0;
ˆ
ˆ
ˆ
ˆ ztt .x; t/ zxx .x; t/ ˛zxxt .x; t/ D 0; 1 < x < 2; t > 0;
ˆ
ˆ
ˆ
< y.0; t/ D z.2; t/ D 0; t 0;
y.1; t/ D kzt .1; t/; t 0; (1)
ˆ
ˆ
ˆ
ˆ ˛z .1; t/ C z .1; t/ D iky .1; t/; t 0;
ˆ
ˆ
xt x x
ˆ
ˆ y.x; 0/ D y0 .x/; 0 < x < 1;
:̂
z.x; 0/ D z0 .x/; zt .x; 0/ D z1 .x/; 1 < x < 2;
y0 (x) y(x, t)
Schrödinger equation
yt (x, t) + iyxx (x, t) = 0
y(1, t) = kzt (1, t)
kzt (1, t) −ikyx (1, t)
Fig. 1 Block diagram for the dynamic boundary feedback of the coupled system
Stabilization of Coupled Schrödinger-Wave System 123
Accordingly, the initial conditions for system (3) are w.x; 0/ D w0 .x/; u.x; 0/ D
u0 .x/; ut .x; 0/ D u1 .x/; 0 < x < 1.
The energy function for (3) is given by
Z 1
1
E.t/ D jw.x; t/j2 C jux .x; t/j2 C jut .x; t/j2 dx: (4)
2 0
In this paper, we analyze the spectrum of (3) in which the system operator has
no compact resolvent. We first set up the system operator and show it generates a
C0 -semigroup of contractions, and the system is well-posed. By detailed spectral
analysis, we obtain that the residual spectrum is empty and the continuous spectrum
contains only one negative point. Moreover, all the eigenvalues of the system lie in
the open left half plane. Therefore, this controller design moves the eigenvalues of
the Schrödinger and wave equations into the second quadrant. It follows that the
C0 -semigroup generated by the system operator achieves asymptotic stability.
We consider system (3) in the energy space H D L2 .0; 1/ HE1 .0; 1/ L2 .0; 1/,
where HE1 .0; 1/ D fg 2 H 1 .0; 1/jg.1/ D 0g. The norm in H is induced by the inner
product
Z 1 h i
hX1 ; X2 i D f1 .x/f2 .x/ C g01 .x/g02 .x/ C h1 .x/h2 .x/ dx; (5)
0
124 L. Lu and J.-M. Wang
we have
( 00
f .x/ D if1 .x/; h.x/ D g1 .x/; .g0 .x/ C ˛h0 .x//0 D h1 .x/;
f .1/ D g.1/ D 0; f .0/ D kh.0/; g0 .0/ C ˛h0 .0/ D ikf 0 .0/; g1 .1/ D 0;
(9)
and the solution of (9) is given by
8 Z x Z 1
ˆ
ˆ 0
ˆ
ˆ f .x/ D f .0/.x 1/ i .1 x/f1 ./d i .1 /f1 ./d;
ˆ
ˆ 0
ˆ
ˆ Z 1
x
Z x
ˆ
ˆ
ˆ
< g.x/ D ik.x 1/f 0 .0/ ˛g1 .x/ .1 /h1 ./d C .x 1/ h1 ./d;
x 0
ˆ
ˆ
ˆ
ˆ h.x/ D g1 .x/
ˆ
ˆ
ˆ
ˆ Z 1
ˆ
ˆ 0
:̂ f .0/ D i .1 /f1 ./d kg1 .0/:
0
(10)
Stabilization of Coupled Schrödinger-Wave System 125
and
Z 1
RehA X; Xi D ˛ jh0 j2 dx 0: (12)
0
3 Spectral Analysis
In this section, we consider the eigenvalue problem of (3). Let A X D X, where
0 ¤ X D . f ; g; h/ 2 D.A /, then f ; g; h satisfy:
8 00
ˆ
ˆ f .x/ if .x/ D 0;
ˆ
ˆ
ˆ
ˆ
ˆ
ˆ h.x/ D g.x/;
<
.1 C ˛/g00 .x/ 2 g.x/ D 0; (13)
ˆ
ˆ
ˆ
ˆ
ˆ
ˆ f .1/ D g.1/ D 0; f .0/ D kh.0/;
ˆ
:̂ 0
˛h .0/ C g0 .0/ D ikf 0 .0/:
126 L. Lu and J.-M. Wang
1
Let p./ D 1 C ˛, when p./ ¤ 0 i.e. ¤ , (13) changes to
˛
8 00
ˆ
ˆ f .x/ D if .x/;
ˆ
ˆ
ˆ
ˆ 2 2
ˆ 00
< g .x/ D g.x/ D g.x/;
1 C ˛ p./ (14)
ˆ
ˆ
ˆ
ˆ f .1/ D g.1/ D 0; f .0/ D kg.0/;
ˆ
ˆ
:̂
.1 C ˛/g0 .0/ D p./g0 .0/ D ikf 0 .0/:
We can get
p p q q
2 2
ix p./ x p./ x
f .x/ D a1 e ix
C b1 e ; g.x/ D c1 e C d1 e ; (15)
where a1 ; b1 , c1 and d1 are constants. Substituting these into the boundary conditions
of (14), we have
8 p p
ˆ
ˆ a1 e i C b1 e i D 0;
ˆ
ˆ
ˆ
ˆ q q
ˆ
< 2 2
c1 e p./ C d1 e p./ D 0;
(16)
ˆ
ˆ a1 C b1 D k.c1 C d1 /;
ˆ
ˆ
ˆ
ˆ q
:̂ p./ 2 .c d / D ikpi.a b /:
p./ 1 1 1 1
Then (14) has the nontrivial solution if and only if the characteristic equation
det
./ D 0, where
2 p p 3
e i
e i
0 0
6 q q 7
6 2 2 7
6 0 0 e e p./ 7
6 7
p./
./ D 6 7: (17)
6 1 1 k k 7
6 7
4 p p q q 5
2 2
ik i ik i p./ p./ p./ p./
Lemma 1 Let A be defined by (6). Then for each 2 p .A /, we have Re < 0.
Proof By Theorem 1, since A is dissipative, we have for each 2 .A /, Re 0.
So we only need to show there is not any eigenvalue on the imaginary axis. Let
D ˙i2 2 p .A / with 2 RC and X D . f ; g; h/ 2 D.A / be its associated
eigenfunction of A . Then by (12), we have
Z 1
RehA X; Xi D ˛ jh0 j2 dx D 0:
0
Stabilization of Coupled Schrödinger-Wave System 127
(ii) When jj ! 1, there are two families of eigenvalues given by:
" #
2 ln2 r
1n D .n C /j ln rj C .n C / i C O.n1 /; (20)
2 2 4
' 2 ˛ 2 1 h ' i
3n D ˛.n C / C ln r C ˛.n C / ln r i C O.n1 /:
2 4 ˛ 2
(21)
128 L. Lu and J.-M. Wang
8 p
ˆ 2˛k2
< arctan ˛k4 ; ˛ k4 > 0;
D 2; p
˛ D k4 ; (23)
:̂ 2˛k2
arctan k4 ˛ ; ˛ k4 < 0;
and
8 p
ˆ 2˛k2
< arctan k4 ˛ ; k4 ˛ > 0;
' D 2; p
˛ D k4 ; (24)
:̂ 2˛k 2
4
arctan ˛k 4 ; k ˛ < 0:
Moreover,
Proof Due to
q space limitation, we give the outline of the proof here. From (17), and
2
let s./ WD p./ 2 C, a direct computation gives,
h p p ih p i
det
./ D e i es./ e i es./ p./s./ C ik2 i
h p p ih p i
C e i es./ e i es./ p./s./ ik2 i : (26)
Proposition 2 Let A be defined by (6). Then its adjoint operator A has the
following form:
8
ˆ
ˆ A . f ; g; h/ D .if 00 ; h; .g0 ˛h0 /0 /; 8 . f ; g; h/ 2 D.A /;
ˆ
ˆ 8 ˇ 0 9
ˆ
< ˇ g ˛h0 2 H 1 .0; 1/;
ˆ
ˆ ˇ >
>
< ˇ =
ˆ
ˆ D.A
/ D . f ; g; h/ 2 H ; A
. f ; g; h/ 2 H ˇ f .1/ D 0; f .0/ D kh.0/; :
ˆ
ˆ ˆ ˇ >
:̂ :̂ ˇ >
ˇ g0 .0/ ˛h0 .0/ D ikf 0 .0/ ;
(27)
˚ 1S
Proposition 3 Let A is defined by (6). Then .A / D ˛ p .A /.
˚
Proposition 4 Let A be defined by (6). Then r .A / D ;, and c .A / D ˛1 .
˚ S
Proof From Propositions 1 and 3, we have ˛1 … p .A / and ˛1 p .A / D
.A /. The desired results will be got if ˛1 … r .A /. Now we suppose ˛1 2
r .A /, then ˛1 2 p .A /. By A X D ˛1 X, where X D . f ; g; h/ 2 D.A /, we
get
8
ˆ 00 i
ˆ
ˆ f .x/ ˛ f .x/ D 0
ˆ
ˆ
ˆ
ˆ
ˆ
ˆ 1
ˆ
ˆ h.x/ D g.x/
ˆ
ˆ ˛
<
1 (28)
ˆ
ˆ .g0 .x/ ˛h0 .x//0 D h.x/
ˆ
ˆ ˛
ˆ
ˆ
ˆ
ˆ f .1/ D g.1/ D 0; f .0/ D kh.0/;
ˆ
ˆ
ˆ
ˆ 0
:̂ ˛h .0/ g0 .0/ D ikf 0 .0/:
From the second and third equation of (28), we get g.x/ D h.x/ D 0. Then f .x/
satisfy
8
< f 00 .x/ i f .x/ D 0;
˛ (29)
:
f .0/ D f 0 .0/ D f .1/ D 0:
lim jjT.t/xjj D 0:
t!1
5 Conclusions
In this paper, we use a wave equation with K-V damping to be a dynamic feedback
controller for a Schrödinger equation. We give the asymptotic expression of the
eigenvalues, and also the exact composition of the spectrum of the system operator.
At last, the asymptotic stability of the system was achieved.
Acknowledgements This work was supported by the National Natural Science Foundation of
China.
References
1. Guo, B.Z., Wang, J.M., Zhang, G.D.: Spectral analysis of a wave equation with Kelvin-Voigt
damping. Z. Angew. Math. Mech. 90(4), 323–342 (2010)
2. Krstic, M., Guo, B.Z., Smyshlyaev, A.: Boundary controllers and observers for the linearized
Schrödinger equation. SIAM J. Control Optim. 49(4), 1479–1497 (2011)
Stabilization of Coupled Schrödinger-Wave System 131
3. Liu, K., Liu, Z.: Exponential decay of energy of the Euler-Bernoulli beam with locally
distributed Kelvin-Voigt damping. SIAM J. Control Optim. 36, 1086–1098 (1998)
4. Liu, K., Liu, Z.: Exponential decay of energy of vibrating strings with local viscoelasticity.
Zeitschrift für angewandte Mathematik und Physik ZAMP 53, 265–280 (2002)
5. Luo, Z.H., Guo, B.Z., Morgul, O.: Stability and Stabilization of Infinite Dimensional Systems
with Applications. Communications and Control Engineering Series. Springer, London (1999)
6. Machtyngier, E.: Exact controllability for the Schrödinger equation. SIAM J. Control Optim.
32, 24–34 (1994)
7. Pazy, A.: Semigroups of Linear Operators and Applications to Partial Differential Equations.
Springer, New York (1983)
8. Wang, J.M., Krstic, M.: Stability of an interconnected system of Euler-Bernoulli beam and heat
equation with boundary coupling. ESAIM: Control, Optim. Calc. Var. 21(4), 1029–1052 (2015)
9. Wang, J.M., Ren, B., Krstic, M.: Stabilization and Gevrey regularity of a Schrödinger equation
in boundary feedback with a heat equation. IEEE Trans. Autom. Control 57, 179–185 (2012)
Molecular-Dynamics Simulations Using Spatial
Decomposition and Task-Based Parallelism
1 Introduction
decomposition method works best when the particles are evenly distributed between
sub-volumes, as in homogeneous systems. If the system is inhomogeneous, load
balancing problems occur and the parallel efficiency is reduced.
The cell-task method [7–9] is made to work well for inhomogeneous systems,
wherein the work load would not be evenly balanced with the spatial decomposition
method. This method works in a similar manner to the spatial decomposition
method, in that it splits the system into sub-volumes; although for this method
these sub-volumes are the width of the interaction range (Verlet-radius), and there is
typically thousands of these sub-volumes. Each of these sub-volumes are scheduled
to run on a processor core in an order wherein no two of the sub-volumes currently
being simulated interact with the same particles, in order to remove the requirement
of cache blocking. This method, unlike spatial decomposition, does not require the
use of message passing, since the design is for a shared-memory system.
The hybrid method discussed in this article utilizes both of these methods, by
first dividing the simulation into large sub-volumes for distribution to separate
processors, as in the spatial decomposition method. After this point, the cell-task
method is used to create many smaller sub-volumes of the system for dynamic
scheduling across the processor cores. Communication between the larger sub-
volumes is still required for particles near the border with the other subsections.
The primary rationale for the implementation of the hybrid method is that it
extends the range of the cell-task method to more than one compute node. However,
even on a single node, the hybrid approach can be advantageous. While the cell-task
method is more efficient for inhomogeneous systems, the situations is less clear
for homogeneous systems where spatial decomposition works well. In this case,
the situation depends on system details since the overhead of the task management
in the cell-task method competes with the communication overhead of the spatial
decomposition method. Further, the spatial decomposition approach may have a
slight advantage through a more localized memory access pattern. In this situation,
a hybrid approach can lead to performance enhancements as it allows to interpolate
between the cell-task method and spatial decomposition.
This work focuses on the performance of the hybrid model on a single compute
node. In Sect. 3, results from a series of benchmark simulations on two test machines
are presented. The results show that the hybrid method enables performance gains
compared to the pure spatial decomposition or cell-task approaches.
2 Benchmark Procedures
The parallelization methods are tested using a system with multi-core processors
and a separate system with an Intel Xeon Phi co-processor. The multi-core compute
nodes contain two Intel Xeon E5-2680 processors, each with eight cores using the
AVX instruction set architecture. The Intel Xeon Phi co-processors utilized are the
5110P model, with 60 physical cores, using hardware based threading for a total
MD Simulations Using Spatial Decomposition and Task-Based Parallelism 135
of 240 threads (details on the Xeon Phi many-core architecture can be found in
Ref. [4]).
For the purposes of this work, the measurement being utilized is the parallel
speedup factor. This represents the number of times faster than the baseline run the
current run is, and is measure as the baseline time divided by the current run time.
On both systems, a variety of combinations of threads and MPI ranks are used, in
order to gauge and compare performances. Speedups are measured against baseline
runs using a single MPI rank and a single thread. In addition to the simulations
using the hybrid method, all MPI runs were carried out using a single thread per
MPI rank, and all threaded runs on the multi-core system using a single MPI rank.
On the Xeon Phi, all threaded runs were based upon a recompiled version of the
code without the MPI overhead, including its baseline run, as the speedups on this
system are affected by the MPI overhead; conversely, this overhead does not effect
the speedups on the multi-core system. On the multi-core systems, tests were then
done using one, two, four, eight and sixteen MPI ranks, and varying numbers of
threads to the total number of cores available per system. On the Xeon Phi co-
processor, tests employed one, two, four, eight, sixteen, thirty, sixty, one-hundred
twenty, and two-hundred forty MPI ranks, with varying numbers of threads.
All simulation runs, including the baseline, used vectorized implementations of
the potentials [9] for better performance. All tests were run for 1000 time steps (2
femtoseconds per step), with the Verlet-lists (neighbour-lists) regenerated every 10
time steps. Each set of tests were run five times, taking the average time of each, in
order to more accurately measure the time required to perform the simulation on a
given system.
A number of simulation systems are used to ensure results extend beyond a single
system. A bulk copper system with approximately 4.5-million particles, Cu (bulk),
is used for its homogeneity, which works well with spatial decomposition. A porous
copper system with two-million particles, Cu (porous), is used as it highlights
the advantages of the cell-task method. Both these systems use the tight-binding
potential [2], which has moderate force calculations. Additionally, an iron system
with four-million particles, Fe (bulk), using the Mendelev potential [5] is included,
as it has more complex force calculations and is less sensitive to memory access.
Lastly, a liquid silver system with four-million particles, Ag (liquid), using the
Lennard-Jones potential [1] is used due to its fast force calculations which makes it
highly sensitive to memory access speed.
3 Results
As an example for all model systems, Fig. 1 shows the Cu (bulk) system’s speedups
using different numbers of processor cores on the multi-core system. For the hybrid
method, only the data obtained with two MPI ranks is shown. The speedups with
four and eight ranks are nearly identical to those obtained with two ranks and have
been omitted to avoid crowding of the figure.
136 C.M. Mangiardi and R. Meyer
16
Threaded
MPI
Hybrid (2 MPI ranks)
12
Speedup S(p)
0
0 4 8 12 16
Processing Cores p
Fig. 1 Parallel speedups S in simulations of the Cu (bulk) system on the multi-core system as a
function of the number of processing cores used p. The dashed line indicates the ideal speedup
S.p/ D p
The best speedup factors, together with the number of ranks or threads where they
were obtained, are shown in Table 1 for all test systems on the multi-core machine.
Data is shown for spatial decomposition method (MPI), the cell-task approach
(threaded) and the hybrid method utilizing the optimal combination of ranks and
threads.
Figure 2 shows the Cu (bulk) system’s speedups on the Intel Xeon Phi system. To
avoid cluttering, only data for the cases of eight and thirty MPI ranks are shown for
the hybrid method. The best results for the hybrid method were attained using thirty
ranks, however, as seen with the eight ranks, the behaviour of the speedups are not
monotonous, but instead are dependent upon the combination of ranks and threads.
The best speedup factors with the corresponding numbers of ranks and threads are
summarized for all test systems in Table 2.
From Fig. 1 and Table 1 it can be seen that when utilizing the tight-binding
potentials on the multi-core system, the hybrid method produces better speedups
than either the spatial decomposition or cell-task methods alone. For the homo-
MD Simulations Using Spatial Decomposition and Task-Based Parallelism 137
120
Threaded
MPI
Hybrid (8 MPI ranks)
Hybrid (30 MPI ranks)
90
Speedup S(p)
60
30
0
0 60 120 180 240
Processing Cores p
Fig. 2 Parallel speedups S in simulations of the Cu (bulk) system on the Intel Xeon Phi system as
a function of the number of processing cores used p
geneous system, the spatial decomposition method works well, allowing particles
to be evenly divided amongst the different cores. The task-based method similarly
works well, but shows a slower performance then the other two methods for this
test system. This is in contrast to previous results [7, 8] where the performance of
spatial decomposition and the cell-task method was very similar for homogeneous
systems. A likely reason for this discrepancy is the larger size of the test systems in
this work. Since the generation of the task schedule for the cell-task method does not
parallelize well, and the number of tasks grows with the system size, larger systems
might shift the balance towards spatial decomposition.
As shown by Fig. 2 and Table 2, the behaviour is different on the Xeon Phi co-
processor where the cell-task method and the hybrid approach outperform spatial
decomposition for the Cu (bulk) system. This is in agreement with the design of this
architecture which favours threaded programs and is not optimal for large numbers
of MPI ranks [4].
When utilizing the Cu (porous) system, the speedups of the hybrid method are
more noticeable as compared to the spatial decomposition method. Due to the
138 C.M. Mangiardi and R. Meyer
system being inhomogeneous, the spatial decomposition method does not evenly
divide the system’s particles amongst the processor cores. This allows for both
the threaded and hybrid approaches to significantly outperform this method. When
utilizing the Intel Xeon Phi, the system is divided into 240 areas with the spatial
decomposition method, resulting in a large portion of the co-processor cores being
idle, waiting on other cores to finish their work. This is significantly alleviated by
the hybrid method, which divides the system into less areas, and uses the task-
based approach to reduce the number of idle cores. The cell-task method, however,
outperforms the hybrid method on the Xeon Phi, as it does not split the system
into any areas, which allows it to better allocate cores to reduce the effects of the
inhomogeneity.
For the Fe (bulk) system both the hybrid and cell-task methods outperform the
spatial decomposition method. Despite the spatial decomposition method having a
smaller portion the system to work on for each area, as compared to the hybrid
method, the overhead associated with MPI and the inter-process communication
counteracts the speed improvements attained calculating the forces. This effect is
reduced significantly in the hybrid method, as it is uses less MPI ranks therefore
reducing the overhead of the spatial decomposition method. Further, the cell-task
method has larger speedups compared to the other methods for this system. This is
most likely due to the higher complexity of the force calculations for the Mendelev
potential. With more time spent per force calculation, the impact of limiting factors
like memory access time is reduced.
The Ag (liquid) system performs significantly slower using the hybrid method
compared to the other methods on the multi-core system. Due to this being a
liquid system, particles are able to more freely move about the system, and as a
result, there is a high amount of inter-process communication required. Further,
the overhead of creating the schedule utilizing less threads further degrades the
performance of the hybrid method. The Lennard-Jones potential is also simpler than
other potentials, reducing the amount of time spent in the calculations of forces, and
instead emphasizes other sections of the program, such as the Verlet-list generation,
scheduler, and inter-process communication. On the Xeon Phi system, however, the
hybrid method performs significantly better than the other two methods on the Ag
(liquid) system. The different behaviour of this test system on the two machines is
not fully understood and requires more studying.
4 Conclusions
The results of the benchmark simulations shown in the previous section demonstrate
that the hybrid method utilizing both spatial decomposition and task-based paral-
lelism, is able to provide better performance on molecular-dynamics simulations
than either method alone. The hybrid method takes advantage of each method’s
benefits, whilst minimizing their drawbacks.
MD Simulations Using Spatial Decomposition and Task-Based Parallelism 139
For homogeneous systems spatial decomposition works very well and often
delivers, in particular on multi-core systems, a better performance than the cell-
task method. The Intel Xeon Phi hardware and system software, however, favours
threaded programming and is not designed to work optimally with 240 MPI
ranks. For simulations of homogeneous systems, the hybrid model provides the
means to optimize the performance by reducing the number of threads and MPI
communications.
By its design, the cell-task method outperforms spatial decomposition for
inhomogeneous systems since it avoids the load balancing problems that occur
with the spatial decomposition method when the number of particles varies between
domains. In principle, the hybrid method suffers from the same issue, however since
the hybrid methods operates with larger domains, inhomogeneities may average
out. By reducing the task management overhead of the cell-task method, the hybrid
approach can therefore in certain cases still improve the total performance.
An advantage of the hybrid parallelization method described in this work is that
it makes the simulation program adaptable. By choosing the combination of MPI
ranks and threads, the speed of the simulation can be optimized for the specific type
of the simulated system and the computer system on which the simulation is run.
Overall, the performance gains of the hybrid method are much more pronounced
on the Xeon Phi co-processor than they are on the multi-core system. This
emphasizes that novel many-core architectures require the development of new
algorithms to maximize the performance.
Acknowledgements This work has been made possible by generous allocation of computer time
on computer systems managed by Calcul Québec, the Shared Hierarchical Academic Research
Network (SHARCNET) and Compute/Calcul Canada. Financial support by Laurentian University
and the Natural Sciences and Engineering Research Council of Canada (NSERC) is gratefully
acknowledged.
References
1. Allen, M.P., Tildesley, D.J.: Computer Simulations of Liquids. Clarendon, Oxford (1987)
2. Cleri, F., Rosato, V.: Tight-binding potentials for transition metals and alloys. Phys. Rev. B
48(1), 22–33 (1993)
3. Frenkel, D., Smit, B.: Understanding Molecular Simulation. Academic, San Diego (2002)
4. Jeffers, J., Reinders, J.: Intel Xeon Phi Coprocessor High Performance Programming. Morgan
Kaufman, New York (2013)
5. Mendelev, M.I., Han, S., Srolovitz, D.J., Ackland, G.J., Sun, D.Y., Asta, M.: Development
of new interatomic potentials appropriate for crystalline and liquid iron. Philos. Mag. 83(35),
3977–3994 (2003)
6. Message Passing Interface Forum: http://www.mpi-forum.org/ (2016)
7. Meyer, R.: Efficient parallelization of short-range molecular dynamics simulations on many-
core systems. Phys. Rev. E 88(5), 053,309 (2013)
8. Meyer, R.: Efficient parallelization of molecular dynamics simulations with short-ranged
forces. J. Phys.: Conf. Ser. 540(1), 012,006 (2014)
140 C.M. Mangiardi and R. Meyer
1 Introduction
In variational data assimilation, the analysis state minimizes the cost function
O. Pannekoucke ()
CERFACS/CNRS URA 1875, Toulouse, France
CNRM/GAME, Météo-France/CNRS UMR 3589, Toulouse, France
INPT-ENM, Toulouse, France
e-mail: [email protected]
E. Emili
CERFACS/CNRS URA 1875, Toulouse, France
O. Thual
CERFACS/CNRS URA 1875, Toulouse, France
Université de Toulouse; INPT, CNRS; IMFT; F-31400 Toulouse, France
is the background state (the true state), R D EŒ"o "oT denotes the covariance matrix
of the observational error "o D Y o HX t , and H is the observation operator
(assumed linear here) that maps the model state to observation locations. For large
dimensional problems, like meteorological applications, the covariance matrix B
cannot be explicitly represented and is often modelled.
Preliminary works have shown that it is possible to estimate and to use
the correlation length-scale, to produce a coordinate change that facilitates the
modelling of the anisotropic covariance matrix B. The approach, developed in [1],
relies on the local metric tensor gx defined from the Taylor expansion of a correlation
function .x; x C ıx/ D 1 12 jjıxjj2gx C O.jıxj3 /, with jjxjj2E D xT Ex (this
formalism can be extended in the particular case where the gradient of is not
zero at x D y). This local definition for gx serves to define a metric field g over a
domain (thereafter the two notations Gx and G.x/ are used to denote the value of a
quantity G at point x). In particular, isotropic correlation functions in Rn takes the
form iso .u1 ; u2 / D iso .jju1 u2 jjRn /, where jj jjRn denotes the Euclidian norm
and where .u1 ; u2 / are two points in Rn . Considering a Riemannian manifold M
embedded in Rn and denoting by ! the metric induced by the Euclidian metric of
Rn , then the restriction of iso to the manifold defines correlation functions on M
[2]. The local behavior of these functions is given by .x; x C ıx/ D iso jjıxjj!x .
Then, the local metric tensor gx of at point x is often expressed in terms of the
Riemannian metric !x as gx D L12 !x , where Lh is the constant length-scale, as
h
r2
2L2h
encountered for, e.g. iso .r/ D e . By analogy with correlation modelling on the
sphere, we say that the correlation functions on M are isotropic.
As an example of Riemann manifold, we can consider the sphere of radius
a, parametrized thanks to the longitude/co-latitude coordinate system x D .; /
and equipped with the natural metric ! defined from the square arc-length ds2 D
!ij dxi dxj (in Einstein’s summation convention) with ds2 D a2 .sin /2 d 2 C a2 d 2 .
The local metric tensor is a very attractive quantity. It can be diagnosed from
ensemble estimation [3], associated with a filtering step to damp spurious sampling
noise [4]. This local metric is often associated with the local diffusion tensor x [5],
defined by ij D 12 gij where gij denotes the inverse tensor of g, i.e. gij gjl D ıil where
ıij denotes the Kronecker symbol.
In data assimilation it is usual to find anisotropic correlation functions which
require sophisticated covariance models, e.g. the wavelets formulation [6], the
recursive filter formulation [7] the diffusion equation formulation [8, 9] or the
coordinate change of isotropic correlations [10]. This coordinate change is a tricky
way to reduce the numerical cost or facilitate the parallelization of the algorithm
[1]: ones the computation of the isotropizing coordinate change has been done,
anisotropic correlations simply result from low cost interpolations between the two
coordinate systems where efficient algorithms exist. For example a locally isotropic
correlation field can be efficiently obtained by alternate applications of diffusion
equation method, parallelized in the space dimension. Thereafter the application of
the coordinate change consists in introducing a coordinate change, able to transform
Modelling of Local Length-Scale Dynamics and Isotropizing Deformations:. . . 143
isotropic correlation into the desired anisotropic correlation. The coordinate change
can be estimated from ensemble method, e.g. [11] has proposed a procedure that
relies on the wavelet estimation of the gradient of the deformation [12]. Legrand
and Michel [13] illustrated the feasibility of the isotropization procedure for real
data, and the potential for data assimilation. Until now, the general framework that
leads to a local isotropy for the curved spaces has not been addressed.
In [1] the coordinate change is obtained from the local metric tensor g.x/: it
consists in finding a differential map x.Qx/ that transforms a coordinate system xQ ,
where the local metric tensor gQ .Qx/ is isotropic, into a coordinate system, where the
local metric g.x/ is the anisotropic diagnosed one, and respecting the chain rule
xi C
jki @xQ˛ xj @xQ˛ xk D 0; (3)
In this section we describe the theoretical background for constructing the isotropiz-
ing coordinate transform. This relies on Riemannian geometry [14, 15] and in
particular on the properties of harmonic maps [16].
gQ xi C
jki @xQ˛ xj @xQˇ xk gQ ˛ˇ D 0; (4)
Lagrange of the energy E for variation of the differential map x.Qx/ [14]. Note that
EŒx.Qx/; gQ ; g is a quadratic functional but since it is not convex in x it may have
multiple critical points.
! xi C
jki @xQ˛ xj @xQˇ xk ! ˛ˇ D 0; (5)
this can also be directly obtained from Eq. (4) when replacing gQ by L2 ! in 2D. In
the particular case where !ij D ıij , Eq. (5) leads to Eq. (3) as previously found in
[1].
The unknown metric gQ can be explicitly deduced from the solution x.Qx/ of Eq. (5)
thanks to the metric change Eq. (2) that reads gQ D x g, and then provides the length-
1
1
1=2
scale field L.Qx/ D 2 Trace x gxQ !xQ .
We are now able to describe the isotropizing procedure.
146 O. Pannekoucke et al.
The two step isotropizing procedure, detailed in Algorithm 1, is similar to the one
described in [1], using a finite difference scheme for spatial derivative, a forward
Euler time scheme, and a spline bi-cubic interpolation. First it consists in computing
the inverse isotropization transformation, obtained by solving Eq. (5). For that
purpose the pseudo-time diffusion scheme (the heat flow) [16]
@ xi D
! xi C
jki @xQ˛ xj @xQˇ xk ! ˛ˇ ; (6)
can be employed to find the stationary state, solution of Eq. (5), where the initial
condition is the identity map id.Qx/ D xQ . This defines a family of differential
map x indexed by 2 Œ0; 1/, continuously dependent of . For diffeomorphic
compact manifold without boundary, if the algorithm converges toward a stationary
differential solution, then this solution is an harmonic map, and this harmonic map
is continuously obtained from the initial condition as the limit lim !1 x [22].
Note that the dynamics Eq. (6) is the gradient flow associated with the energy. As
/
a consequence, the tendency must be non-positive, dE.x d 0, so that the energy
EŒx .Qx/; !; g is minimized along the path x .
5: # Step 1: Pseudo-diffusion
6: xi1 .Qx/ D xQi
7: for q from 1 to q1 do
8: for i from 1 to d do
9: jki .Qx/ D
jki Œx1 .Qx/ (Spline interpolation)
xi2 .Qx/ D xi1 .Qx/ C d
! xi1 C jki @Qx˛ x1 @Qxˇ xk1 ! ˛ˇ .Qx/
j
10:
11: end for
12: xi1 .Qx/ D xi2 .Qx/
13: end for
14: x.Qx/ D x1 .Qx/
3 Numerical Experiments
with ˛ D 0:2 and R D 1000 km, such that the resolution at x D .0:5; 0:5/ is
isotropic with ds 12 km, the length of the domain along x for y Dp0:5 is equal to
R D 1000 km, while the length for y D 0 or for y D 1 is equal to R ˛ 447 km.
The length along y does not depends on the position x and is equal to R.
A deformation D.x/ D x C d.x/ is constructed as follows. First, a wind field
u0 .x/ D k r is introduced, where is a stream function, and it is normalized
so that u D .u; v/ D .u0 =max.ju0 j/; v0 =max.jv0 j//. Then, for each position x, the
geodesic curve x .t/ is computed, starting at x with the velocity Px .0/ D u.x/dt
where dt D 0:05 is a magnitude factor. Denoting by V.t/ the velocity Px .t/,
148 O. Pannekoucke et al.
Fig. 1 Stream function (shading) and displacement field resulting from the geodesic time
integration with initial velocity deduced from the stream current. The arrows indicate the direction
and the intensity of the associated displacement
and where ˝jki are the Christoffel symbols of the second kind associated with the
metric field !. The displacement field is then defined as d.x/ D x .1/ x.
The stream function used for numerical experiment is shown in Fig. 1, with the
displacement field deduced from the velocity field.
Fig. 2 The initial locally isotropic metric, represented on a regular coordinate system (a), is
deformed under the action of the deformation D leading to anisotropic metric field (b). Then,
the anisotropic metric field represented within the natural coordinate system (c) is diagnosed and
ı
employed in the isotropizing process which provides the isotropizing deformation D (correspond-
ı
ing theoretically to D1 ). The action of D on the anisotropic metric field is the nearly locally
isotropic metric field (d). The coordinate systems are reproduced in gray
4 Conclusion
Acknowledgements OP would like thanks Joseph Tapia, Jean-Pierre Otal and Marina Ville, John
Harlim, Tyrus Berry and Dimitrios Giannakis for interesting discussions ; This work was supported
by the French LEFE INSU program and the MACC2 project within the FP7 E.U. reasearch
program.
References
1. Pannekoucke, O., Emili, E., Thual, O.: Modeling of local length-scale dynamics and isotropiz-
ing deformations. Q. J. R. Meteorol. Soc. 140, 1387 (2014)
2. Gaspari, G., Cohn, S.: Construction of correlation functions in two and three dimensions. Q. J.
R. Meteorol. Soc. 125, 723 (1999)
3. Pannekoucke, O., Berre, L., Desroziers, G.: Background error correlation length-scale esti-
mates and their sampling statistics. Q. J. R. Meteorol. Soc. 134, 497 (2008)
4. Raynaud, L., Pannekoucke, O.: Sampling properties and spatial filtering of ensemble
background-error lengthscales. Q. J. R. Meteorol. Soc. 139, 784 (2013)
5. Pannekoucke, O., Massart, S.: Estimation of the local diffusion tensor and normalization for
heterogeneous correlation modelling using a diffusion equation. Q. J. R. Meteorol. Soc. 134,
1425 (2008)
6. Fisher, M.: Background error covariance modeling. In: ECMWF (ed.) Proceedings. ECMWF
Seminar on Recent Developments in Data Assimilation for Atmosphere and Ocean, pp. 45–63
(2003)
Modelling of Local Length-Scale Dynamics and Isotropizing Deformations:. . . 151
7. Purser, R., Wu, W.S., Parrish, D., Roberts, N.: Numerical aspects of the application of recursive
filters to variational statistical analysis. Part I: Spatially homogeneous and isotropic Gaussian
covariances. Mon. Weather Rev. 131, 1524 (2003)
8. Weaver, A., Courtier, P.: Correlation modelling on the sphere using a generalized diffusion
equation (Tech. Memo. ECMWF, num. 306). Q. J. R. Meteorol. Soc. 127, 1815 (2001)
9. Weaver, A.T., Mirouze, I.: On the diffusion equation and its application to isotropic and
anisotropic correlation modelling in variational assimilation. Q. J. R. Meteorol. Soc. 139(670),
242 (2013)
10. Desroziers, G.: A coordinate change for data assimilation in spherical geometry of frontal
structures. Mon. Weather Rev. 125, 3030 (1997)
11. Michel, Y.: Estimating deformations of random processes for correlation modelling in a limited
area model. Q. J. R. Meteorol. Soc. 139, 534 (2013)
12. Clerc, M., Mallat, S.: The texture gradient equation for recovering shape from texture. IEEE
Trans. Pattern Anal. Mach. Intell. 24, 536 (2002)
13. Legrand, R., Michel, Y.: Modelling background error correlations with spatial deformations: a
case study. Tellus 66, 23984 (2014)
14. Jost, J.: Riemannian Geometry and Geometric Analysis. Springer, Berlin (2005)
15. Nakahara, M.: Geometry, Topology and Physics, 2nd edn. Taylor & Francis, New York (2003)
16. Eells, J., Sampson, J.H.: Harmonic mappings of Riemannian manifolds. Am. J. Math. 86, 109
(1964)
17. Eells, J., Lemaire, L.: A report on harmonic maps. Bull. Lond. Math. Soc. 10, 1 (1978)
18. Courtier, P., Andersson, E., Heckley, W., Pailleux, J., Vasiljević, D., Hamrud, M.,
Hollingsworth, A., Rabier, F., Fisher, M.: The ECMWF implementation of three-dimensional
variational assimilation (3D-Var). I: formulation. Q. J. R. Meteorol. Soc. 124, 1783 (1998)
19. Derber, J., Bouttier, F.: A reformulation of the background error covariance in the ECMWF
global data assimilation system. Tellus A 51, 195 (1999)
20. Massart, S., Piacentini, A., Pannekoucke, O.: Importance of using ensemble estimated back-
ground error covariances for the quality of atmospheric ozone analyses. Q. J. R. Meteorol. Soc.
138, 889 (2012)
21. Pannekoucke, O.: Heterogeneous correlation modeling based on the wavelet diagonal assump-
tion and on the diffusion operator. Mon. Weather Rev. 137, 2995 (2009)
22. Jost, J.: Harmonic mapping between Riemannian manifolds. In: Proceedings of the Centre for
Mathematical Analysis, Australian National University (1983)
Post-Newtonian Gravitation
Erik I. Verriest
1 Introduction
A post-Newtonian (pN) gravitation (see [7]) is developed, with the main assumption
that gravity cannot act instantaneously at a distance, but has an interaction speed
that is limited by the speed of light, otherwise one would violate relativity [4].
Section 2 establishes the formulas for the retarded potentials in analogy to the
Liénard-Wiechert potentials in electromagnetic theory. From it, the retarded field,
which determines the motion, is obtained by the gradient of the potential in Sect. 3.
This results in a functional differential equation (FDE) with state dependent delay
(See [3]). In particular, interesting new phenomena (entrainment, dynamic friction,
orbital speeds) emerge from this pN theory. In Sect. 4 we discuss the dynamics for
two masses flying apart in a rectilinear way, a (1-D) toy model for a supernova. The
main problem is the implicit relation between state and delay occurring in the FDE
describing the motion. We discuss several cases where the Lagrange’s inversion
technique [5] can be applied to render such a relation explicit [6].
Let at time t0 the mass distribution be represented by the scalar function .r0 ; t0 /,
the density field. This assumption requires already a notion of simultaneity and
therefore cannot be consistent with the theory of relativity. We postulate that this
density field generates a gravitational field, which assumes at a fixed position,
r, and time t the value due to the superposition of the fields of all infinitesimal
contributions. However the contribution from r0 must have traveled a (straight
line) distance jr r0 j, which takes a propagation time .r0 / D jr r0 j=c. Hence
only the past value, .r0 ; t .r0 //, contributes to the field at r at time t. Again,
general relativity implies the warping of space and time, and hence geodesics (along
which signals propagate) are not straight lines in general. The following will be
approximately valid for weak fields and small speeds relative to c, the speed of
light.
Assumption Given the time varying mass density .r0 ; t0 /, the gravitational poten-
tial at a fixed point r and time t is given by the linear superposition
Z
.r0 ; t .r0 //
.r; t/ D G dV.r0 /; (1)
R3 jr r0 j
where G is the gravitational constant, and V.r0 / denotes the volume element at
position r0 . This equation is coupled with an implicit delay-state relation
c .r0 / D jr r0 j: (2)
where tb D t .r0 / is the retarded time satisfying (2). We evaluate this integral by
first principles. First, a Dirac delta peaks where its argument equals zero. However,
this information is not sufficient to describe this behavior in its entirety. The rate at
which the zero is approached is also required. To figure this out, let first r00 be the
Post-Newtonian Gravitation 155
1
ı.r00 C r0 rp .t .r00 C rQ 0 /// D ı.Qr0 /: (4)
j det ŒI C rP p .t .r00 //rr0 .r00 /j
Using the identity detŒI C pq D detŒI C qp, and substituting (4) in (3), yields:
Z
ı.Qr0 /
.r; t/ D G dV.r0 /:
R3 jr r0 j j det.1 C rr .r00 /Prp .t .r00 ///j
.r rp .tb //>
crr0 D ŒI ;
jr rp .tb /j
so that finally
G
.r; t/ D ˇ ˇ: (5)
ˇ .rrp .tb //> rP p .tb / ˇ
jr rp .tb /j ˇ1 cjrr p .tb /j
ˇ
This result could also have been obtained using the standard trick to derive
the Liénard-Wiechert potentials in some physics texts, by reducing the three
dimensional Dirac to a one-dimensional time Dirac (see [5]).
G 1
F.r; t/ D ˇ ˇ rr jr rp .tb /j C
ˇ .rrp .tb //> rP p .tb / ˇ jr rp .tb /j2
ˇ1 cjrrp .tb /j ˇ
ˇ ˇ
G 1 ˇ .r rp .tb //> rP p .tb / ˇˇ
ˇ ˇ rˇ
r ˇ 1 : (6)
jr rp .tb /j ˇ .rrp .tb //> rPp .tb / ˇ2 cjr rp .tb /j ˇ
ˇ1 cjrrp .tb /j ˇ
From rr jr r0 j2 D 2jr r0 j rr jr r0 j and noting that the left hand side is equal to
it follows that
.r r0 />
rr jr r0 j D :
jr r0 j
Note that the gradient with respect to a column vector is represented by a row vector.
Similarly, if jv0 j < c
ˇ ˇ
ˇ .r r0 /> v0 ˇˇ .r r0 /> v0 v> r r0
ˇ
rr ˇ1 D rr 1 D 0
rr :
cjr r0 j ˇ cjr r0 j c jr r0 j
Also,
r r0 1 .r r0 /.r r0 />
rr D I :
jr r0 j jr r0 j jr r0 j2
The matrix between the square brackets is a projection operator (projection onto the
plane perpendicular to the vector r r0 ). Putting this all together, the gravitational
field due to a moving mass is
.r rp .tb //> G
F.r; t/ D ˇ ˇC (7)
jr rp .tb /j3 ˇˇ1 .rrp .tb //> rP p .tb / ˇ
ˇ
cjrrp .tb /j
G 1 rP p .tb /> .r rp .tb //.r rp .tb //>
C ˇ ˇ I :
jr rp .tb /j2 ˇ .rrp .tb //> rPp .tb / ˇ2 c jr rp .tb /j2
ˇ1 cjrrp .tb /j ˇ
If the gravitating mass moves in such a way that rP p is parallel to .r rp .tb //, then
the second term in (7) is zero and the field is directed along r rp .tb /. Aligning the
x-axis with this direction, force, position and velocities can be expressed in the x-
coordinate. In particular, the x-component of the force acting on a unit mass particle
at x is
It should also be observed that a naive generalization to Newton’s law in the form
Introducing rbp D rp .tb /C .tb /Prp .tb /, which is the expected position of the particle in
motion at time t, if the velocity of the mass were fixed at the constant vp .s/ D rP p .tb /
for tb .t/ D t .tb / s t, it follows that
ˇ ˇ
ˇ > ˇ
ˇ1 .r rp .tb // rP p .tb / ˇ D ˇ 1
ˇ j1> .r rbp /j;
ˇ jr rp .tb /j c ˇ ˇr rp .tb /ˇ rrp
.rr .t //>
where 1rrp D jrrpp .tb b /j denotes the unit vector in the direction of rrp . Relativity
imposes jPrp j < c, which with the Cauchy-Schwarz inequality reduces (9) to
G >
rr .r; t/ D ˇ ˇ2 .r rbp / : (10)
ˇ > ˇ
jr rp .tb /j ˇ1rrp .r rbp /ˇ
Thus the gravitational force exerted by a particle in motion is directed towards the
predicted position based on a uniform motion given the delayed information (i.e.
delayed position and velocity).
158 E.I. Verriest
v0 x(t − τ ) x(t)
d cτ
x
For a particle moving with uniform velocity, rbp .t/ is the position of the particle at
time t, rbp .t/ D rp .t/. Without loss of generality, we fix r, the observation point, at
the origin, and let the particle move along a line parallel to the x-axis, at a distance d
with uniform velocity v0 . For notational simplicity, the x-coordinate at t D 0 is taken
to be zero. From the geometry of the problem (See Fig. 1): a quadratic equation for
results: .c2 v02 / 2 C 2v02 t .v02 t2 C d 2 / D 0: The field magnitude follows
Let the origin coincide with the observation point, r, and consider an infinitely long
straight line mass moving along its axis, parallel to the x-axis, at a distance d with
uniform velocity v0 . Thus the field at the origin due to a gravitational current is
studied. Consider first a mass-element at p position .x0 ; d/ at time t D 0. From the
geometry
p of the problem (Fig. 1): c .t/ D .x0 C v0 .t .t///2 C d2 : Letting
D
2 2
.x0 C v0 tb / C d ; the x-component of the field at the origin at time 0 due this
Post-Newtonian Gravitation 159
Fig. 2 Field at the origin due to particle with uniform motion. The symmetric curve corresponds
to the Newtonian case (c D 1)
where tb is the backward time for t D 0, i.e., tb D .0/: Likewise, the y-component
d v0 d 1
Fy .x0 ; v0 / D
2 : (13)
v0 .x0 Cv0 tb / c
3 1C c
4 1 C v0 .x0 Cv0 tb /
c
Integrating over x0 from 1 to 1 gives the total gravitational force of the mass
current. The Figs. 3 and 4 show for d D 1 respectively the x and y components of
the field at the origin as function of ˇ D v=c. In the static case (v0 D 0) this is
Z 1
Gd 2G
Fx .0/ D 0; Fy .0/ D dx D 2 :
1 .x2 C d2 /3=2 d
This static field is directed perpendicular to the current direction, and points towards
the linear mass. With v0 ¤ 0 it is augmented by a velocity dependent term. For the
160 E.I. Verriest
parallel (to the current) component, this additive term behaves linearly near v D 0,
and quadratically for the component directed towards the current line. The effect
of the current is to entrain the surrounding mass. The large scale structure of the
universe is made up of large filaments of galaxy superclusters that may be modelled
as gravitational currents.
Remark One may be tempted to approximate r.t / by its truncated Taylor
expansion in terms of the instantaneous delay. It was found that such a naive use
of Taylor expansions can not yield solutions that are consistent in the Newtonian
limit.
Post-Newtonian Gravitation 161
cτ
m m
O
(t) (t − τ ) r(t)
Fig. 5 Gravitational Fission
162 E.I. Verriest
at r.t/ due to the particle moving towards the left leads to the the coupled set
Gm
rR .t/ D
(14)
rP.t .t//
1C c c2 2 .t/
The explicit form of .t/ can be obtained from c .t/ D r.t/ C r.t .t// about a
point r.t0 / D r0 , .t0 / D 0 , by Lagrange inversion [2] provided that r is analytic,
and jPrj < c at time t D t0 , where it holds that c 0 D r0 C r.t0 0 /;
1
X .c.t t0 / C r0 r.t//i
.t/ D .t t0 C 0 / i : (16)
i1
iŠ
Fig. 6 Position r.t/ as function of t for sub-escape with D 1 (r0 D 1; v0 D 1). The curves
correspond to the Newtonian case (marginal escape), and first and second order perturbations
(which return eventually to r0 )
rR1 D r1 2 rP0 (21)
2r03 4r0
g
rR2 D 3 4 r12 C 2 3 .r1 rP0 C r2 / 2 rP1 (22)
4r0 r0 4r0
::
:
The solutions of order 0 (Newtonian case), and uppto order 1 and 2 are shown in
Fig. 6 for D 4, r0 D 1 and v0 D vesc jNewton D 2=r0 , the escape velocity in
the Newtonian case. In pN theory v0 D vesc jNewton is insufficient for escape. For
D 1, r0 D 1 and v0 D 1, the post-Newtonian escape velocity was computed
p found that for small 1=c the
(up to second order for several values of c and it was
adjusted quantity r vesc2.c/ is close to vesc .1/ D 2. This led to the conjecture:
vesc .1/
1C
c2
integrated form gives rise to the consideration of gravitational currents and their
ensuing entrainment. This led to the emergence of dynamic friction. Finally we
discussed the escape velocity for splitting masses (fission). Lack of space did not
allow the discussion of the Kepler problem in pN theory. As expected, stable orbits
exist, which is not the case had one considered the naive generalization (delayed
Newton’s law) of the gravitational field mentioned in Sect. 3. It should also be
pointed out that naive Taylor expansions lead to results that are inconsistent in the
Newtonian limit.
References
Abstract Cutaneous melanoma is the most commonly diagnosed cancer and its
incidence is on the rise worldwide. Early detection and differentiation of a malignant
melanoma from benign cutaneous lesions provides an excellent chance for treating
the disease. Thermography is a non-invasive tool that can be used to detect
and monitor skin lesions. We model heat transfer in a skin region containing a
lesion. The model which is governed by the Pennes equation uses the steady state
temperature at the skin surface to determine whether there is an underlying lesion.
Numerical simulations from the model ascertain whether the lesion is malignant or
benign.
1 Introduction
The skin is the largest organ in the body and has the most exposure to the external
environment. Thus, it is prone to lesions attributed to both internal and external
factors. Skin lesions begin when alterations in cellular metabolism allow cells to
grow without restriction. Skin lesions do constitute the majority of all cancers
and their incidence is on the rise [1]. The majority of skin lesions are benign and
harmless. Melanoma is a malignant skin cancer that can easily undergo metastasis
and consequently lead to death if not detected early. Melanoma accounts for the
most cancer deaths in the United States compared to other cancers [2].
One of the many tools for diagnosing skin cancers is thermography [3]. The
procedure is based on established observations that the temperature of the skin
directly above a tumor is significantly higher than the one in the absence of a tumor.
Thermography uses an infrared camera to map the temperature distribution over the
desired skin surface. The FDA in the United States approved thermography as an
adjunct tool for diagnosing breast cancers in 1982 [4]. Technological advances in the
past decades have improved thermographic imaging so that temperature differences
of about 0:025 ıC can be detected [5].
2 Mathematical Model
We present a model of heat transfer in prevascular skin tumors. We assume that the
tumors are spheroids and in the interest of simplicity, we shall present the model
as a spatially two-dimensional model. We consider a two-dimensional cross section
of the skin tissue, containing a circular shaped tumor as depicted in Fig. 1. The
temperature of the cross-sectional domain is given by T.x; y/, where the x coordinate
is the horizontal direction and y is the depth. The two dimensional cut is placed in
the .x; y/-plane so that the y D 0 level corresponds to the bottom layer of the skin,
and y D d corresponds to the surface. The origin is located so that a x a,
with the center of the tumor at .0; d=2/. The radius of the tumor is R.
The equations governing heat flow in each portion of the entire region are derived
from the Pennes equation [19]:
@T
Nc D r .KrT/ C mb cb .TA T/ C S; (1)
@t
where is the tissue’s density, cN is the tissue’s specific heat, K is the tissue’s thermal
conductivity, mb is the mass flow rate of blood, cb is the blood’s specific heat, TA is
the arterial blood temperature, and S is the metabolic heat generation rate.
A Quantitative Model of Cutaneous Melanoma Diagnosis Using Thermography 169
y=d
necrotic
x = −a x=a
core
y=0
We note that at steady state, the time derivative is zero. Therefore the equation
describing the temperature T.x; y/ in the healthy region is given by
Sh mb cb .TA Th /
Th D ;
Kh Kh
where Sh is the metabolic heat generation rate of the healthy tissue and Kh is its
thermal conductivity.
For the viable tumor region, we remark that the tumor has no vasculature and
therefore the perfusion term in equation (1) vanishes. Consequently, at steady state,
the equation describing the temperature Tt .x; y/ of the viable region of the tumor is
given by
St
Tt D ;
Kt
where St is the metabolic heat generation rate of the tumor and Kt is its thermal
conductivity.
Finally, we note that the necrotic core is comprised of dead cells and generates
no heat. This portion is simply described by the Laplace equation
Tc D 0.
The boundary conditions of the various parts of the entire domain are listed
below. The outer boundary conditions of the healthy region are provided by items
(i)(iii). Items (iv)(v) provide inner boundary conditions for the healthy region
and outer boundary conditions for the viable tumor region, and item (vi) provides
the boundary conditions between the viable region and the necrotic core.
(i) At the bottom layer, y D 0, Th .x; 0/ D Tb isˇ the temperature of the body.
hˇ
(ii) At the skin surface, y D d. Hence, K @T @y ˇ
D .Th Ta /, where Ta is the
yDd
ambient temperature and is the surface heat transfer coefficient.
170 E. Agyingi et al.
Sh mb cb .TA Th /
Th D Th00 .y/ D
Kh Kh
and therefore,
mb cb Th Sh mb cb TA
Th00 .y/ D ;
Kh Kh Kh
where y is the tissue depth, Th .0/ D Tb , and Th0 .d/ D .Th Ta /=Kh . The
solution of this equation is given by
Th .y/ D Tb C cosh.! y/
.Ta Tb / K! sinh.! d/ cosh.! d/
C sinh.! y/
sinh.! d/ C Kh ! cosh.! d/
q
where D Tb mbScb TA and ! D mKbhcb .
(iv) We assume that the temperature is continuous across the interface of the
healthy tissue and the viable region of the tumor, i.e. Th .x; y/ D Tt .x; y/ when
x2 C .y d=2/2 D R2 .
(v) The heat flux is continuous across the interface of the healthy tissue and the
viable region of the tumor, i.e. Kt rTt D Kh rTh when x2 C .y d=2/2 D R2 .
(vi) On the interface between the viable region of the tumor and the necrotic core,
we assume continuous temperature and flux as well.
In this section, we present numerical simulations of the model presented above. The
results are for a single tumor and multiple tumors for a given skin cross section. The
calculations were performed using a MATLAB finite element solver. All thermo-
physical parameter values used were chosen within the range of published data. We
set Sh D 0:009 W/cm3 , Kh D Kt D 0:0042 W/((cm)ı C), D 0:0005 W/((cm2 )ı C),
mb D 0:0005 g/(ml s) and cb D 4:2 J/gı C. We also set the arterial blood temperature
TA D 37 ı C and the body temperature, at the level y D 0, to be Tb D 37 ıC. Other
parameters used were chosen to investigate the behavior of the model.
The first results presented in Fig. 2 are for a single tumor of radius 1 mm and
center located at .0; 0:25/. Figure 2a provides a contour map and temperature
distribution over the entire domain. As expected, we observe that heat diffuses away
from the tumor towards the cooler surrounding region. In Fig. 2b we examine the
A Quantitative Model of Cutaneous Melanoma Diagnosis Using Thermography 171
a b 36.85
m = 0.001
b
m = 0.0005
b
36.8 mb= 0.00025
mb= 0.0
36.75
36.7
Temperature(T)
36.65
36.6
36.55
36.5
36.45
−1 −0.8 −0.6 −0.4 −0.2 0 0.2 0.4 0.6 0.8 1
Axial Distance (x)
Fig. 2 Numerical simulations of one tumor with radius R D 1 mm and St D 20Sh . The plot in
(a) is the temperature distribution over the cross section and (b) is the skin surface temperature for
different perfusion rates (mb )
steady state temperature at the skin surface for different perfusion rates. We note that
the results in Fig. 2b are almost identical even when the perfusion rate was double
(mb D 0:001) or neglected (mb D 0:0). This suggests that the effect of perfusion is
negligible for prevascular tumors, that is, very small tumors that are close to the skin
surface. This may be attributed to the fact that there are no large blood vessels in
the skin region. The average temperature increase at the skin surface, caused by the
presence of the tumor, was observed to be about 0:33 ı C, which is a very significant
number that can be easily detected using an infrared camera.
Next, we consider two tumors of the same radii 1 mm, with centers located at
.0:4; 0:25/ and .0:0; 0:25/. We investigate two cases; firstly, the tumors have the
same St values, and secondly, one of the values is altered. The results are given in
Fig. 3. Figure 3a represents a 3D steady state temperature profile for tumors with
the same metabolic heat generating rates St D 20Sh . In Fig. 3b the metabolic heat
generating rate of the right tumor was reduced to St D 10Sh. Figure 3c gives the
steady state temperature at the skin surface for the two cases. The results affirm that
a tumor with a higher metabolic heat generating rate will produce more heat and
consequently a better temperature profile at the skin surface.
The next results as presented in Fig. 4 are for two tumors with the same metabolic
heat generating rates (St D 20Sh ) and different radii. The tumor on the left has a
radius of 1 mm with center located at .0:4; 0:25/, while the tumor on the right has
a radius of 0:75 mm with center located at .0:4; 0:25/. A 3D steady state temperature
profile for tumors is given in Fig. 4a and the steady state temperature at the skin
surface is given in Fig. 4b. Here we see that a bigger tumor will produce more heat
compared to a smaller tumor having the same metabolic heat generating rate.
Finally, Fig. 5 illustrates two tumors with different metabolic heat generating
rates and different radii. The bigger tumor (i.e. left tumor) with radius 1 mm and
center located at .0:4; 0:25/ was given a smaller metabolic heat generating rate
St D 5Sh . The smaller tumor (i.e. right tumor) with radius 0:75 mm and center
located at .0:4; 0:25/ was given a higher metabolic heat generating rate St D 20Sh .
Figure 5a shows a 3D steady state temperature profile for tumors over the entire
172 E. Agyingi et al.
37.2
37.2
37.1
37.2 37.1 37.2
37 37 37
37
Temperature(T)
Temperature(T)
36.8 36.8
36.9 36.9
36.6 36.6
36.8 36.8
36.4 36.4
36.7 36.7
0.5 0.5
0.4 1 0.4 1
36.6 36.6
0.3 0.5 0.3 0.5
0.2 0 y 0.2 0
y
0.1 −0.5 x 36.5 0.1 −0.5 x 36.5
0 −1 0 −1
36.75
36.7
Temperature(T)
36.65
36.6
36.55
36.5
36.45
−1 −0.8 −0.6 −0.4 −0.2 0 0.2 0.4 0.6 0.8 1
Axial distance (x)
(c)
Fig. 3 Numerical simulation of two tumors of the same radii. The results in (a) for the same St ,
(b) for different St and (c) the temperature profile at the skin surface for cases I and II
b 36.85
37.2 36.8
a
Temperature(T)
37 37 36.7
36.8 36.9 36.65
36.6 36.8 36.6
36.4
36.7 36.55
0.5
0.4 1 36.6 36.5
0.3 0.5
y 0.2 0
0.1 −0.5 36.5 36.45
−1 x −1 −0.8 −0.6 −0.4 −0.2 0 0.2 0.4 0.6 0.8 1
0
Axial Distance (x)
Fig. 4 Numerical simulations of two tumors with same St D 20Sh and different radii. The plot in
(a) is a 3D temperature distribution over the cross section and (b) is the skin surface temperature
domain, while Fig. 5b provides the steady state temperature at the skin surface. The
results show that a smaller tumor with a high metabolic heat generating rate will
A Quantitative Model of Cutaneous Melanoma Diagnosis Using Thermography 173
36.7
a 37.1
b
37.2 37
36.65
37
36.9
36.8
36.6
Temperature(T)
36.6
36.8
36.4
36.55
36.2 36.7
0.5
0.4
36.5
36.6
0.3 1
0.2 0.5
0
0.1 36.5
−0.5 36.45
y −1 −0.8 −0.6 −0.4 −0.2 0 0.2 0.4 0.6 0.8 1
0 −1 Axial Distance (x)
x
Fig. 5 Numerical simulations of two tumors with different St and different radii. The plot in (a) is
a 3D temperature distribution over the cross section and (b) is the skin surface temperature
produce more heat compared to a bigger tumor with a low metabolic heat generating
rate.
An analysis of how the results of a variant of the model for breast tumors depend
on the underlying parameters was carried out in [17]. Among others, different
values of the depth of the tumor, the ambient temperature, and the internal body
temperature were investigated. A similar analysis yields analogous results for the
current model for melanomas.
There are several directions in which the model presented in this paper can be
extended. The case of multiple tumors can be investigated by considering different
size tumors at multiple, randomly chosen locations. This would give a better
understanding of possible heat signatures. The case of non-spherical tumors can
be explored as well. However, this requires a slight modification of the current
numerical methods. Another aspect of interest is how the sizes of the blood vessels
in the neighborhood of the tumor modify the temperature profile of the tumor at the
skin surface.
The extension of the model from the 2-dimensional domain to 3 dimensions
is under way. The numerical methods have to be adjusted to deal with the added
dimension, but the extended model might discover some new phenomena not
present in the 2-dimensional investigations.
The inverse problem requires a different approach to the model. One possible
extension of our investigation is to set up an optimization problem to identify the
location and size of the tumors for given heat signatures.
174 E. Agyingi et al.
4 Conclusion
References
1. Stern, R.S.: Prevalence of a history of skin cancer in 2007: results of an incidence-based model.
Arch. Dermatol. 146, 279–282 (2010)
2. American Cancer Society: Cancer Facts & Figures. http://www.cancer.org/acs/groups/content/
@editorial/documents/document/acspc-044552.pdf (2015)
3. Estee, L., Psaty, B.A., Allan, C., Halpern, M.D.: Current and emerging technologies in
melanoma diagnosis: the state of the art. Clin. Dermatol. 27, 35–45 (2009)
4. Arora, N., Martins, D., Ruggerio, D., Tousimis, E., Swistel, A.J., Osborne, M.P., Simmons,
R.M.: Effectiveness of a noninvasive digital infrared thermal imaging system in the detection
of breast cancer. Am. J. Surg. 196, 523–526 (2008)
5. Bronzino, J.D.: Medical Devices and Systems. CRC/Taylor & Francis, Boca Raton (2006)
6. González, F.J.: Thermal simulation of breast tumors. Revista Mexicana de Fisica, 53, 323–326
(2007)
7. González, F.J.: Non-invasive estimation of the metabolic heat production of breast tumors using
digital infrared imaging. QIRT J. 8, 139–148 (2011)
8. Lin, Q.Y., Yang, H.Q., Xie, S.S., Wang, Y.H., Ye, Z., Chen, S.Q.: Detecting early breast tumour
by finite element thermal analysis. J. Med. Eng. Technol. 33, 274–280 (2009)
9. Sudharsan, N.M., Ng, E.Y.K., Teh, S.L.: Surface temperature distribution of a breast with and
without tumour. Comput. Methods Biomech. Biomed. Eng. 2, 187–199 (1999)
10. Agnelli, J.P., Barrea, A.A., Turner, C.V.: Tumor location and parameter estimation by
thermography. Math. Comput. Model.: Int. J. 53, 1527–1534 (2011)
11. Mital, M., Scott, E.P.: Thermal detection of embedded tumors using infrared imaging. J.
Biomech. Eng. 129, 33–39 (2007)
12. Paruch, M., Majchrzak, E.: Identification of tumor region parameters using evolutionary
algorithm and multiple reciprocity boundary element method. Eng. Appl. Artif. Int. 20, 647–
655 (2007)
13. Deng, Z., Liu, J.: Mathematical modeling of temperature mapping over skin surface and its
implementation in thermal disease diagnostics. Comput. Biol. Med. 34, 495–521 (2004)
14. Pirtini Cetingül, M., Herman, C.: A heat transfer model of skin tissue for the detection of
lesions: sensitivity analysis. Phys. Med. Biol. 55, 5933–5951 (2010)
15. Pirtini Cetingül, M., Herman, C.: Quantification of the thermal signature of a melanoma lesion.
Int. J. Therm. Sci. 50, 421–431 (2011)
A Quantitative Model of Cutaneous Melanoma Diagnosis Using Thermography 175
16. Bhowmik, A., Repaka, R., Mishra, S.C.: Thermographic evaluation of early melanoma within
the vascularized skin using combined non-Newtonian blood flow and bioheat models. Comput.
Biol. Med. 53, 206–219 (2014)
17. Agyingi, E., Wiandt, T., Maggelakis, S.: Thermal detection of a prevascular tumor embedded
in breast tissue. Math. Biosci. Eng. 12, 907–915 (2015)
18. Maggelakis, S.A., Savakis, A.E.: Heat transfer in tissue containing a prevascular tumor. Appl.
Math. Lett. 8, 7–10 (1995)
19. Pennes, H.H.: Analysis of tissue and arterial blood temperatures in the resting forearm. J. Appl.
Physiol. 1, 93–122 (1948)
Time-Dependent Casual Encounters Games
and HIV Spread
Abstract In Tully et al. (Math Biosci Eng AIMS, 2015, to submitted) the authors
model and investigate casual sexual encounters between two members of a pop-
ulation with two possible HIV states: positive and negative, using a Nash game
framework in which players try to maximize their expected payoff resulting out of
a possible encounter. Each player knows their own HIV status, but do not know the
HIV status of a potential partner. They do however have a personal assessment of the
risk that the potential partner may be HIV positive. Last but not least, each player
has a ranked list of preferences of potential types of sexual outcomes: unprotected,
protected, or no sexual outcome. In Tully et al. (Math Biosci Eng AIMS, 2015, to
submitted), the game model is studied via 1- and 2-dimensional sensitivity analyses
on parameters such as the utility values of unprotected sex of an HIV negative
individual with an HIV positive, and values of personal risk (of encountering an
HIV positive partner) perception.
In this work, we introduce time as a variable which affects players’ risk
perceptions, and thus their strategies. Given that HIV transmission happens when
an HIV positive player has a non-zero probability (strategy) of having unprotected
sex with a HIV negative player, we are also able to keep track of the time evolution
of the overall fraction of HIV positive individuals in the population, as reflected
as an outcome of repeated casual encounters. We model a continuous time dynamic
game (as in Cojocaru et al. (J Optim Theory Appl 127(3):549–563, 2005)) where we
compute the stable strategies of each player based on a dynamical system defined
on a set of functions. We observe that with change in choices the HIV prevalence in
the population increases.
1 Introduction
In 1982, 600 cases were reported by CDC, out of which 75 % were identified as
homosexual or bisexual males. Therefore, the early name given to these symptoms
was ‘GRID’ (gay related immune deficiency). In late 1982, it was changed to AIDS
by CDC after determining the fact that this disease is not exclusive only to the gay
population. About 1500 lives were claimed by this disease in 1984 [5]. A poll in
1985 indicated that nearly half of Canadians were concerned about getting infected
by this disease [9].
HIV is a unique virus among others as it incorporates its own DNA into the
host’s cellular DNA. The virus also contains a protein that takes over the host cell’s
reproduction ability; is then using it as an aid for self replication. This virus impacts
the immune system resulting in life threatening infections. It can be transferred
through blood, semen,vaginal fluid or breast milk [12].
Nearly 15,000 cases of HIV were discovered in United States in 1985, whereas in
Africa the estimated number was approximately half a million. The latest research
proved that HIV first appeared in humans in central Africa. First evidence of the
evolution of HIV emerged in 1985, when scientists found a virus in Macaque
monkeys that was closely related to HIV virus [11, 12].
HIV was classified as a pandemic by the World Health Organization (WHO).
According to estimates by WHO and UNAIDS, 35 million people were living with
HIV globally at the end of 2013. In the same year, 2.1 million people became newly
infected, and 1.5 million died of AIDS-related causes. Although medical treatments
have reduced the annual rate of HIV, the drop in new HIV infections is still not
significant. The primary mode of transmission, for this disease, is sexual encounters
in many countries. For instance, 80 % of the cases in the United States are due to
unprotected sexual encounters [13].
According to [11], the spread of HIV infection is largely influenced by people’s
way of thinking about their sexual encounters. Transmission of HIV in a population
may increase if the individuals have unprotected sex. To better understand the spread
of HIV, population models have been used. These models are helpful in observing
the change in infected populations caused by different parameters. Usually, the
concept of probability is used to understand the process of decision-making in
relation to unprotected sex. Game theory is an important mathematical tool that
has been extensively used to describe the decision-making of individuals in certain
non cooperative situations. Different classes for the games are being used to model
individual’s decision depending upon for example: linear payoff with zero or non-
zero sum game as in a 2-player game; or non-linear payoff as in a multi-player
game [11].
In this paper, we are interested in studying a model of two players engaged
in finding a casual sexual partner. The game here is dynamic, i.e., we consider
time-dependency of equilibrium(Nash) strategies under time evolution of utilities
and player’s risk assessment. The main purpose is to investigate the influence
of different parameters involved in the game upon the infected population over
a certain period of time. This paper has following structure: Sect. 2 describes
briefly the one-shot 2-player game; Sect. 3 presents the dynamic game using the
frame work of evolutionary variational inequalities; Sect. 4 discusses the results
Time-Dependent Casual Encounters Games and HIV Spread 179
of the computational work along with the analysis of parameters. We close with
conclusions and a few ideas for future work.
Tully et al. [11] described a casual sexual encounter between two individuals as a
game. The status of the two players are known only to themselves, while players
are aged 15 years and above. Players are denoted by P1 and P2 whose HIV status is
positive and negative respectively. We denote by C the proportion of HIV positives
(HIVC ) in total population, and by the proportion of HIV negatives (HIV ) in
the total population with the condition that C C D 1.
The authors [11] used game models to find Nash equilibrium probabilities of
having unprotected sex (US) in casual encounters. The probabilities of unprotected
sex US for the two players are denoted by:
where xi represents the probability of Pi having US with an HIV individual and xiC
represents the probability of Pi having US with an HIVC individual. The expected
utility for Pi ; i 2 f1; 2g, when interacting with HIV and HIVC individuals, is given
by:
i
E D Œxi U.US; C; / C .1 xi /U.notUS; C; /
i
EC D ŒxiC U.US; C; C/ C .1 xiC /U.notUS; C; C/
where i 2 f1; 2g
By the term notUS means either the players have protected sex or no sex at all.
Therefore, the overall expected utility for Pi ; i 2 f1; 2g is given by:
b D ˇ bself
C .1 ˇ /C
self
bC D ˇC bC C .1 ˇC /C : (1)
180 S. Athar and M.G. Cojocaru
self
The parameters bC and bself represent the personal belief of player P1 , respectively
P2 about the level of HIV infection in the population. Their values are between 0
and 1, with 1 representing the belief that everyone else in the population is infected.
The parameters ˇ and ˇC represent the weight a player places upon personal
assumptions of HIV prevalences. Their values range again between 0 and 1. With
these in mind, C is defined as:
where C .0/ is the initial fraction of HIVC in the population. By initial we mean
here: before the encounter, where as .0/ represents the initial fraction of HIV in
the population. We let D 0:02 be the transmission rate of HIV in the population
[2].
Both players want to optimize their expected payoffs subject to constraints
defined as follows: for each i 2 f1; 2g,Pi solves the optimization problem,
(
max Ei WD Ei .x1 ; x2 /
s.t xi 2 Ki WD Œ0; 12 \ fxi C xiC D 1g
Definition 1 Assume each player is rational and wants to maximize their payoff.
Then the Nash equilibrium is a vector
x 2 K WD K1 K2 which satisfies the inequalities: For all i
fi .xi ; xi / fi .xi ; xi /, 8xi 2 Ki where xi D .x1 ; : : :; xi1 ; xiC1 ; : : :; x2 /.
The authors used variational analysis to find the Nash equilibria for the above game
as in Definition 1.
Definition 2 Given a set K Rn , closed, convex, non-empty and given F W K !
Rn is a function, the variational inequality(VI) problem is to find a vector x 2 K
such that
hF.x /; y x i 0; 8y 2 K (2)
hF.x /; x x i 0 8x 2 K (3)
where F.x/ D .rx1 u1 .x/; : : ::: rxn un .x// and rxi ui .x/ D . @u@x1 .x/
1
; @u@x2 .x/
2
: : ::
@un .x/
@xN
/
Time-Dependent Casual Encounters Games and HIV Spread 181
The variational inequality problem has at least one solution if the constraint set K
is closed, bounded and convex and F W K ! Rn is continuous. In other words, K
is a compact and convex set then solutions for variational inequality problems exist.
Further, solution may be unique if the function F is strictly monotone on K [8].
In our case we have: F.x1 ; x2 / D . 5 Ei .x1 ; x2 // D . 5x1 E1 ; 5x2 E2 /.
Here, K is closed, bounded and convex and F.x1 ; x2 /, being linear, is continuous;
therefore, the existence of solution for the problem is proved. However, F.x1 ; x2 / is
not strictly monotone, therefore the strategy applied here, by the authors, is to look
at the Nash points .x1 ; x2 / 2 K as critical points of a set of differential equations
driven by the vector field F and constraint set K:
dx
D PTK .x. // .F.x. ///I x.0/ D .x1 .0/; x1C .0/; x2 .0/; x2C .0// 2 K D K1 K2
d
(4)
We develop a base case for our further investigations. The parameters of the model
are set in such a way that we can compute the Nash equilibrium vector for an ideal
situation. Ideal situation is developed to restrict the players to their own groups, i.e.,
P1 interacts with HIV and P2 interacts with HIVC player. We solve VI problem
attached to the game, using the following values in the Table 1 for the parameters
involved. The utilities for US and notUS are also given in the following Table 1.
We start with uniformly distributed initial conditions and find the unique Nash
equilibrium for the 2-player game.The value for this equilibrium is (0,1,1,0). This
shows that the two players are careful regarding the choice of their partner for casual
encounters.
The strategies of the two players are plotted to see the evolution towards the
equilibrium point when different initial values have been considered. The plot in
Fig. 1 shows the strategy of P1 and P2 , when selecting their partners for a casual sex
encounter.
Fig. 1 Phase portrait for the strategy selections of P1 and P2 ; when P1 being HIVC interact with
HIV , whereas P2 interact with HIVC . We started with 150 uniformly distributed initial conditions
to solve (4) using Matlab
where
du.t; /
D PTK.x/ .u.t; /; F.u.t; ///
d
That is the point x 2 K such that PTK.x/ .u.t/; F.u.t/// 0, and the converse also
holds.
If we choose H D L2 .Œ0; T; R4 / then the solution of EVI in Definition 3 and the
critical points of the equation in (2) are the same.
The important point in (2) is the difference between the two times, t; . The time
Œ0; T represents the time interval the game is considered to be played over. As t
varies over the interval [0,T], we can obtain one or more curves representing how
Nash strategies of both players may change. The time is the simulated time of
evolving from an initial point of the differential equation (2) towards one of the Nash
equilibria on this curve(s). For the computational purpose, a sequence of partition
ftn0 ; tn1 ; : : ::; tnN g 2 Œ0; T is defined such that
Then for each tnj , we solve the time dependent variational inequality:
where
K.tnj / D fxi .tnj / 2 L2 .Œ0; T; R4 / W 0 xiC .tnj /; xi .tnj / 1; xiC .tnj / C xi .tnj / D
1; i 2 f1; 2g a.e in Œ0; Tg.
184 S. Athar and M.G. Cojocaru
We use the same values for the parameters in the base case as in the one-shot game.
The only difference in this base case is that both the strategies and C are time
dependent. The parameters used for the base case are described in Table 1. We run
this case for T D 10 periods, and reach the same equilibrium point as in the one-shot
game. No change in the value of C .t/ is observed (Fig. 2).
We vary US.; C/ & US.C; / as a function of time, whereas the other parameters
are kept constant. The change in choices about having US over the given period
of time can be considered the result of emotional decision-making and/or the
level of information (Fig. 3). Gutnik et al. in [7] discussed the role of emotions
in decision-making. The role was considered as negative hindrance in the rational
decision-making. According to new research, people use analytic and experimental
systems to understand and assess the factors of risk. However, the emotions are
the most common factor that works in the experimental system. These emotions
depend on past experiences or the perceived risks [7]. The players can change their
preferences over the given period under the influence of emotion. These decisions
under emotional circumstances perhaps occur due to lack of adequate knowledge or
due to the “heat of moment” (Table 2).
Fig. 3 3-D plots shows the change in HIV prevalence, when the US.; C/ and US.C; / are
made time dependent. Upper left shows the change in US.; C/ and US.C; / are linear function
of time; upper right shows US.; C/ and US.C; / are quadratic function of time. Lower left
shows US.; C/ and US.C; / are quadratic function as well but in different formation and lower
right shows US.; C/ and US.C; / are cubic function of time. The increase is much higher in
linear case, US.; C/ and US.C; / are linear function of time, as compared to the case when
these choices are quadratic or cubic function of time
186 S. Athar and M.G. Cojocaru
The time is taken as 10 periods and Matlab is used for simulations. We observe an
increase in HIV prevalence from 5 % to 32 % when US.C; / is linear function of
time; whereas the increase is 24 % when US.C; / in quadratic in time. The impact
of US.C; / on increase in HIV prevalence is perhaps due to change in preferences
of player 1(HIVC) over the time.
References
1. Barbagallo, A., Cojocaru, M.-G.: Dynamic vaccination games and variational inequalities on
time-dependent sets. J. Biol. Dyn. 4(6), 539–558 (2010)
2. Basar, T., Olsder, G.J.: Dynamic Noncooperative Game Theory, vol. 200. SIAM, Philadelphia,
(1995)
3. Cojocaru, M.-G., Greenhalgh, S.: Dynamic games and hybrid dynamical systems. Optim. Eng.
Appl. Var. Inequal. Issue 13(3), 505–517 (2011)
4. Cojocaru, M., Daniele, P., Nagurney, A.: Projected dynamical systems, evolutionary variational
inequalities, applications, and a computational procedure. In: Pareto Optimality, Game Theory
and Equilibria, pp. 387–406. Springer, New York (2008)
5. Engel, J.: The Epidemic: A History of AIDS. HarperCollins, New York (2009)
6. Grmek, M.D.: History of AIDS: Emergence and Origin of a Modern Pandemic. Princeton
University Press, Princeton, NJ (1993)
Time-Dependent Casual Encounters Games and HIV Spread 187
1 Introduction
Aquaponic agriculture systems have been growing in popularity due to their robust
economic and ecological benefits. Both hydroponics and aquaculture have proven
to have a detrimental effect on the environment. Some studies have suggested that
aquaponics has a 75 % smaller carbon footprint when compared to traditional farm-
ing methods [7] and is able to satisfy human demand long-term [3]. Importantly,
aquaponics achieves all of these benefits while maintaining economic viability for
farmers. The lower cost of resources and lower spatial requirements has led to
suggestions that aquaponic agriculture may be a viable solution in densely populated
urban regions such as Pakistan and India [3].
The basic aquaponic system consists of two main components: one for fish
and one for plants. The system relies heavily on food input as many studies have
demonstrated that factors like protein content of food and feeding frequency have
the largest effect on the efficiency of the system. These factors highly contribute
to fish growth and are also directly related to the amount of fish waste in the
environment [6].
Organic nitrogen in fish waste naturally converts to ammonia through biological
degradation [4]. Ammonia is highly toxic to fish, and is an inefficient nutrient source
for plants [6]. In order for ammonia to be used as fertilizer for the plants, it must
go through a natural microbial process called the Nitrogen Cycle, which causes it to
convert into nitrate. Nitrate is a nutrient rich food source for plants [4] and studies
have shown that plants’ uptake efficiency of nitrates ranges from 86 % to 98 %.
Whatever concentration of nitrate is left in the water is not harmful to the fish, so
the water can be recirculated for fish use [6].
The overarching goal of the model is to capture the symbiotic relationship between
the fish and the macrophytes. However, as evidenced by background research on
aquaponic agriculture, the aerobic microbial process which converts ammonia to
nitrate needs to be considered. The assumpions made are as follows:
i. The aquaponic ecosystem is a closed environment.
ii. The fish population increases at some natural survival rate . Deaths
Births
/, hindered
by a carrying capacity due to the limited tank space.
iii. There is additional fish decay due to increased ammonia presence in the water
until it reaches a critical ammonia level where no fish survive. This can be
reasonably modelled using a linear constant of . Toxic Ammonia
Ammonia Level /.
iv. Ammonia is present in the system exclusively due to fish waste and hence
grows at a rate proportional to the fish population. It decays due to its
conversion to nitrate.
Aquaponic Ecosystems Using ODEs 191
v. Nitrate grows at a rate proporational to the level of ammonia, and decays due
to plant uptake.
vi. Plants grow at a constant rate hindered by a carrying capacity indicative of the
limited surface area of the system.
vii. Modelling the concentrations of ammonia and nitrate in the system will capture
any other relationships between other variables in the nitrogen cycle.
viii. The system is well mixed so the nitrogen cycle occurs naturally and plants
have even access to nitrate.
The proposed model is below, with variables F, A, N, and P representing the
population of fish, ammonia (in mg), nitrate (in mg) and population of plants
respectively:
PF D a1 1 F FP A F (1)
KF KA
AP D a2 F a3 A (2)
NP D a4 A a5 NP (3)
P
PP D a6 1 PN (4)
KP
where ai 0 8i are growth and decay rates, and KF ; KA ; KP > 0 are the carrying
capacities of fish, ammonia, and plants respectively.
Equation (1) models the evolution of the fish population, using assumptions ii and
iii. Equation (2) models the evolution of the ammonia concentration in the system
using assumption iv. Equation (3) captures the growth rate of nitrate concentration
as it relates to the conversion from ammonia and the decay rate due to plant uptake
using assumption v. The final equation (4) captures the growth rate of the plants
using assumption vi.
Our aquaponic environment model (1), (2), (3) and (4) consists of four equations
with nine unknown parameters. The Jacobian matrix of this model is as follows:
2 a1 FP
3
KF Ca1 1 KF P KA KF 0 a1 1 KF F
6 7
F A A F
a3 0 0
Df .F; A; N; P/ D 4 a2
0 a 5 (5)
a4
5P
a5 N
a6 NP
0 0 a6 P 1 KP a6 N 1 KP K
P P P
192 C. Bobak and H. Kunze
The system (1) (2), (3) and (4) has three equilibria:
fF D 0; A D 0; N D 0; P D Pg (6)
fF D 0; A D 0; N D N; P D 0g (7)
a1 a3 KF KA KP a1 a2 KF KA KP
FD ;AD ;
a1 a3 KP KA C a2 KF a1 a3 KA KP C a2 KF
a1 a2 a4 KF KA
ND ; P D KP (8)
a5 .a1 a3 KA KP C a2 KF /
of which the third, in equation (8), since it represents all variables surviving in the
environment. We focus on it in the next section.
We analyzed the stability of the nontrivial equilibrium in equation (8) using the
research literature to provide estimates for the nine parameters: a1 D 0:0124, a2 D
0:1, a3 D 0:94, a4 D 3:6, a5 D 0:92, a6 D 0:056, KF D 250, KP D 300 and
KA D 20 [1–4, 6]. The values selected for our carrying capacities were based on an
arbitrary initial tank size of 10L, however, this can easily be scaled up or down to
accomodate systems of various sizes. Other initial values were fF.0/ D 10; A.0/ D
0; N.0/ D 0; P.0/ D 0:5g, where P.0/ D 0:5 was used to represent plants which
had not yet reached maturity in the system. Substituting the estimated parameter
values in the Jacobian gives:
2 3
2:77 9:31 0 0:59
6 0:1 0:98 0 0 7
A D 6
4 0
7 (9)
3:6 276 0:2285
0 0 0 0:014
Notably, the real parts of (10) and (13) are negative, and values (11) and (12)
are negative, thus an asymptotically stable equilibrium is achieved in this case.
Aquaponic Ecosystems Using ODEs 193
Because (10) and (13) are complex, some spiralling behaviour is present in the
system.
Note that 32 is very close to 0, so the stability status of this equilibrium
point may be sensitive to the parameter values chosen. Some experimentation was
done within ranges of realistic values for the estimated parameters. In every case,
all eigenvalues have negative real parts suggesting with some generality that the
equilibrium case where all four variables are present in the system is asymptotically
stable. We discuss sensitivity in general in the next section.
Substituting these values into the non-trivial equilibrium and subsequent solution
given in the previous section provides the following equilibrium points:
Fig. 1 The population and concentration dynamics of the model over time (a) The solid line
represents the fish population and the dotted line represents the plant population (b) The solid
line represents the nitrate population and the dotted line represents the ammonia population
194 C. Bobak and H. Kunze
growth dependence on fish. Nitrate also shows an interesting trend; as the system
is being established, nitrate experiences a brief spike. However, once the plant
growth reaches a level which requires significant nitrate sustenance, this spike
reverses and the nitrate concentration levels off. These curves appear to loosely
represent expected trends based on the aquaponics literature, suggesting the model
is reasonably capturing aquaponic behaviour.
5 Sensitivity Analysis
A sensitivity analysis for the parameters of this model was performed with the goals
of identifying any unexpected behaviour, guiding any data collection efforts, and
most importantly, to give an indication of the importance of accurately estimating
the parameter values.
A software toolbox in Matlab was used to perform sensitivity analysis of
biological models. SensSB is freely available for academic purposes, and combines
a variety of local and global sensitivity methods, both using relative and absolute
measures to achieve many of these goals [8, 9].
While locally analysing the sensitivity of parameters is a useful exercise, it has
an inherent reliance on the initial numerical estimation of the parameter. Global
methods, which test the effect of a parameter while other parameters are varied
simultaneously, help avoid this stipulation [9]. Since the initial estimation of the
variables from the literature are considered weak points of the model, global
sensitivity measures were analysed.
SensSB analyses global sensitivity through three main methods, all of which
are discussed in the software documentation (see [9]). In this study, Derivative
Based Global Sensitivity Measures (DBGSM), which were introduced in 2009 [5],
were selected to optimize accuracy with minimal loss of computational efficiency
[9]. DBGSM uses Monte Carlo sampling methods to average local derivatives to a
measure M N ij which averages sensitivity measures Sij over the parameter space.
% change in Parameters
Sij D (15)
% change in Variables
Z
N ij D
M Sij dp (16)
Hnp
Fig. 2 (a) shows the global absolute sensitivity of each of the estimated parameters while (b)
shows the global relative sensitivity by variable. Note parameters 1–6 are a1 through a6 , parameter
7 is the carrying capacity KF , parameter 8 is the carrying capacity KA , and parameter 9 is the
carrying capacity KP
capacity of fish. This suggests that some more care should be taken in estimating
values for these parameters, particularly a2 and a3 , which do not have reliable values
in the literature.
Using values from the previous simulation, both a2 and a3 were varied (individ-
ually and consecutively) between values of 0 and 100 without loss of stability in the
coexistence equilibrium. However, exploring data from an established environment
may help clear potential biases associated with this parameter estimation.
7 Conclusion
References
Abstract A new measure of robust stability for linear ordinary impulsive dif-
ferential equations with periodic structure is introduced, based on the impulse
extension concept. This new stability measure reflects the sensitivity of the model to
uncertainty in what we see as the fundamental hypothesis of impulsive models: that
the impulse effect occurs quicky enough that its duration can be entirely neglected.
The measure, that we call the time-scale tolerance, E t , has the property that, if the
vector of durations of impulse effect, a, satisfies jjajj < E t , then both the impulsive
model and a family of continuous impulse extension equations (a specific functional
differential equation) to which it is related, will all be asymptotically stable.
We review linear impulse extension equations, state theorems that describe the
convergence of their solutions to the associated impulsive solutions, and introduce
all the machinery necessary in the development of the time-scale tolerance, stating
theoretical results on its existence and how it can be computed in practice. We
conclude with two illustrative examples and a discussion of the limitations of the
techniques presented, as well as elaborate on the ways they can be improved.
1 Introuction
to be a good “fit” to the associated continuous models have yet to be seen in the
literature.
In these proceedings, we introduce a quantity that we call the time-scale
tolerance, denote E t , for a linear, periodic impulsive differential equation that is
asymptotically stable. This quantity has the property, that, if the vector of durations
of impulse effect, a, satisfies jjajj < E t , then both the impulsive model and a
family of continuous impulse extension equations (a specific functional differential
equation) to which it is related, will all be asymptotically stable.
We review linear impulse extension equations, which were first introduced in [2–
4], state theorems that describe the convergence of their solutions to the associated
impulsive solutions, and introduce all the machinery necessary in the development
of the time-scale tolerance, stating theoretical results on its existence and how it
can be computed in practice. We conclude with two illustrative examples and a
discussion of the limitations of the present techniques, and how they can be extended
to accomodate a larger class of problems.
To begin, we introduce some notation that will be present throughout this chapter.
If x D fxk W k 2 Zg is a real-valued sequence, we denote
xk D xkC1 xk . The
kth element of a real-valued sequence x will always be denoted xk , and we may
abuse notation and identify the sequence x with the symbol xk . Indexed families of
sequences, such as, fx j W j 2 Ug, will always have their index appear in the exponent.
j
In this context, xk denotes the kth element of sequence j from the family U. Finally,
our sequences will usually be bi-infinite; that is, indexed by the integers. The symbol
jj jj will denote a (fixed) Euclidean norm, whenever there is no ambiguity, and if A
is a set, its closure will be denoted A.
Consider a linear, impulsive differential equation with impulses at fixed times
dx
D A.t/x C g.t/; t ¤ k
dt (1)
x D Bk x C hk ; t D k :
S
S D S.a/ j2Z Sj . The set of all step sequences will be denoted S , and is
defined by
S WD fa W Z ! R ; ak 2 .0; k /g:
• The pair .'kB ; 'kh /, with sequences of functions 'kB W R RC ! Rnn and 'kh W
R RC ! Rn , is a family of impulse extension for (1) if for all a 2 S and all
k 2 Z, the functions 'kB .; ak / and 'kh .; ak / are integrable on Sk .a/ and satisfy the
equalities
Z Z
'kB .t; ak /dt D Bk ; 'kh .t; ak /dt D hk : (2)
Sk .a/ Sk .a/
• Given a step sequence a 2 S and a family of impulse extensions ' D .'kB ; 'kh /
for (1), the impulse extension equation associated to (1) and induced by .'; a/ is
the (functional) differential equation
dx A.t/x C g.t/; t … S.a/;
D (3)
dt A.t/x C g.t/ C 'kB .t; ak /x. k / C 'kh .t; ak /; t 2 Sk .a/:
Definition 2 Let a family of impulse extensions, ' D .'kB ; 'kh /, and a step sequence
a 2 S be given. A function y W I ! Rn defined on an interval I R is a classical
solution of the impulse extension equation (3) induced by .'; a/, if y is continuous,
the sets I \ Sk .a/ are either empty or contain k , and y satisfies the differential
equation (3) almost everywhere on I. Given an initial condition
x.t0 / D x0 ; (4)
with .t0 ; x0 / 2 RRn , the function y.t/ is a solution of the initial-value problem (3)–
(4) if, in addition, y.t0 / D x0 .
Remark 1 Definitions 1 and 2 can be readily modified to accomodate nonlinear
ordinary impulsive differential equations; see Church and Smith? [4] and Church
[2].
Definition 3 The predictable set of the impulse extension equation (3) induced by
.'; a/ is
( Z ! )
t
P D R n t 2 S.a/ W det I C X 1 .s; k /'kB .s; ak /ds D 0 ;
max k f k tg
Theorem 1 Suppose det.I C Bk / ¤ 0 for all k 2 Z, and let ' D .'kB ; 'kh / be
a given family of impulse extensions for (1). There exists a positive sequence of
real numbers k , depending only on A.t/ and sequence of impulse times k , with
the following property. Suppose, for 2 fB; hg and each k 2 Z, there exists wk W
Œ k ; kC1 Œ0;
k / ! R that is continuous and vanishing at . k ; 0/, for which
1 1
'k .t; s/ k D O wk .t; s/ s (5)
s e k 1
holds, where we have assumed t0 D 0 for ease of presentation (other cases follow
by similar reasoning, by results from [4]), and
Z minft; k Cak g
La .tI k / D I C X 1 .sI k /'kB .s; ak /ds:
k
It can be shown that the right-hand side of the upper bound converges to zero
as a ! 0 pointwise, as jjajj1 ! 0 (see the proof of Theorem 3.5.5. from
A New Measure of Robust Stablity for Linear Ordinary Impulsive Differential. . . 201
[2] for the main idea; condition (5) is needed). A similar inequality holds for
jjxp .tI a/ xp .tI 0/jj, where xp .tI 0/ is the solution of (1) satisfying xp .t0 I 0/ D 0,
and the convergence result holds for that piece of the solution as well. For uniform
convergence, it suffices to consider N to be a finite union of closed intervals with
xn # x 2 N ) x … f k g.
The hypotheses of Theorem 1 are simplified if the equations (1) and (3) are
periodic.
Definition 4 The linear impulsive differential equation (1) is T-periodic with c
impulses per period if A.t C T/ D A.t/ and g.t C T/ D g.t/ for all t 2 R, and
kCc D k C T, BkCc D Bk and hkCc D hk for all k 2 Z. The step sequence a 2 S is
c-periodic, and we write a 2 Sc , if akCc D ak for all k 2 Z. The family of impulse
extensions ' D .'kB ; 'kh / is .T; c/-periodic if 'kCc .t C T; s/ D 'k .t; s/ for all t 2 R,
all k 2 Z, all s 2 .0;
k / and 2 fB; hg.
Corollary 1 Suppose the impulsive differential equation (1) is T-periodic with c
impulses per period. Let ' D .'kB ; 'kh / be a .T; c/-periodic family of impulse
extensions for (1). Suppose det.I C Bk / ¤ 0 for k D 0; : : : ; c 1: Let the
impulsive differential equation (1) have a fundamental matrix X.t/ with Floquet
decomposition X.t/ D P.t/et satisfying X. 0 / D I. The conclusions of Theorem 1
hold for step sequences a 2 Sc , with k jjjj.
The proof of the above corollary is omitted, since it is simple to prove using
Theorem 1. For periodic impulse extension equations, we have an asymptotic
Floquet theorem. A proof is available in [2], where it is listed as Theorem 3.6.16.
Theorem 2 Suppose the impulsive differential equation (1) is T-periodic with c
impulses per period. Let ' D .'kB ; 'kh / be a .T; c/-periodic family of impulse
extensions for (1). Let det.I C Bk / ¤ 0 for k D 0; : : : ; c 1. Then, under the
hypotheses of Corollary 1 on the asymptotic criterion (5), there exists ı > 0 such
that, if a 2 Sc satisfies jjajj < ı, any solution x.t/ of the homogeneous impulse
extension equation induced by .'; a/,
dx A.t/x; t … S.a/
D (6)
dt A.t/x C 'kB .t; ak /x. k /; t 2 Sk .a/:
The stability of the periodic linear impulse extension equation induced by some
.'; a/ is determined by the spectrum of a , just as with ordinary and impulsive
differential equations. The main difference is that stability (and uniform stability)
only holds for initial conditions in particular subsets of the predictable set, P, and
such restrictions are in fact, optimal. For details, see [4].
dx
D A.t/x; t ¤ k
dt (8)
x D Bk x; t D k :
and impulse extension equations for (8), induced by .'; a/ D .' B ; a/, with a 2 Sc ,
dx A.t/x; t … S.a/
D (9)
dt A.t/x C 'kB .t; ak /x. k /; t 2 Sk .a/:
From here onward, M0 will denote the monodromy matrix for (8) satisfying
M0 D X. 0 CT; 0 /, where X.t; s/ is the Cauchy matrix for (8). We assume M0 < 1
from here onward. We will comment in Sect. 3.3 on what can be done if M0 1.
Definition 5 Consider a periodic homogeneous impulsive differential equation, (8).
Let D fk g be a c-element sequence of positive real numbers and w D fwk g be
a c-element sequence of functions wk W Œ k ; kC1 Sc ! RC that are continuous
and vanishing at . k ; 0/ and such that wk .; a/ is integrable on Sk .a/. A family of
periodic impulse extensions, ' D f'k g, is uniformly exponentially .; w/-regulated
in the mean or simply .; w/-regulated if the inequality
ˇˇ ˇˇ
ˇˇ ˇˇ
ˇˇ'k .s; a/ 1 Bk ˇˇ wk .s; a/ (10)
ˇˇ ak ˇˇ ek ak 1
and M.'; a/ denotes the monodromy matrix of the impulse extension equation
for (8) induced by .'; a/.
Definition 7 Suppose (8) is asymptotically stable. Let R be an exponential regula-
tor. The R-stable set, denoted E s .R/, is defined as follows.
˚
E s .R/ D a 2 Sc W 8' 2 .; w/, M.'; a/ < 1 (12)
with k .s; a/ D 'k .s; a/ a1k Bk . Taking norms, each of the k terms can be bounded
by inequality (10), and the upper bound is independent on the explicit choice of ',
depending only on the regulator R . With the choice of given in the theorem, each
204 K.E.M. Church
jjM.'; a/ M0 jj n.a/
2. Let h > 0 denote the unique solution of the equation h M0 D 1. The inequality
which demonstrates the set inclusion. As for the inequality, that the supremum term
is bounded by E t .R/ is obvious from the set inclusion. That Ebt .R/ is achieved at
some a for which n.a/ D h can be seen by noticing that, as n is continuous and
increasing, the set Ebs .R/ is star convex with basepoint 0. Consequently, maximizing
the radius of a ball in the positive orthant within this set is equivalent to minimizing
the distance to the boundary, and the latter is is precisely the level set n.a/ D h.
Corollary 2 Denote X.t/ D X.tI 0 /. If c D 1, the following inequality holds for
all ' 2 R D .; w/.
Z
w0 .s; a/
jjM.'; a/ M0 jj jjX. 1 /jj jjX 1 .s/jj ds
S0 .a/ e a0 1
ˇˇ Z ˇˇ
ˇˇ 1 ˇˇ
C ˇˇˇˇ .X .s/ I/dsB0 ˇˇˇˇ :
1
(14)
a
0 S0 .a/
A New Measure of Robust Stablity for Linear Ordinary Impulsive Differential. . . 205
Proof (Outline)
Z
1 1
M.'; a/ M0 D X. 1 / I C X 1 .s/ '.s; a/ B0 C B0 ds
S0 .a/ a0 a0
X. 1 /ŒI C B0 :
Re-arranging the above, taking norms and using inequality (10) provides the result.
If c ¤ 1, a similar estimate to the above holds. However, it is rather cumbersome,
and the associated proof is a notationally difficult inductive argument. It is omitted
for brevity.
x0 D x; t ¤ kT
(15)
x D bx; t D kT;
with parameters > 0, b > 0 and T > 0. Assume M0 D .1 b/e T < 1; so that the
1
trivial solution is asymptotically stable. We choose w.t; a/ D c Ta p for parameters
c and p > 0. The bound on the right-hand side of (14), denote nQ .a/, itself has an
upper bound:
e T
a 1p T 1 e a
nQ .a/ n.a; p/ WD c Ce b 1 ;
T a
for each finite p > 0. Solving the equation n.a ;1/ M0 D 1 for a and applying
Theorem 4, the following theorem is proven.
Theorem 5 Consider the impulsive system (15). Define u WD 1b e T 1 c . If
M0 WD .1 b/e T < 1 and c < .1 M0 /e T , then, for all a > 0 satisfying the
inequality
1 1 1 1
a< W e
u WD a ;
u u
206 K.E.M. Church
1
we have M.'; a/ < 1, for all ' 2 .; w/, with w.t; a/ D c Ta p , for any p > 0,
where W is the principal branch of the Lambert W function, or product logarithm
function (i.e. the inverse of the map x 7! xex ).
3.3 Limitations
There are two main limitations of the techniques described in these proceedings.
First and foremost, only linear systems are treated. The time-scale tolerance can
indeed be defined for nonlinear systems of impulsive differential equations in more
abstract settings, although the definitions must all be localized around periodic orbits
or other stable objects. Some of our current research concerns these problems.
A New Measure of Robust Stablity for Linear Ordinary Impulsive Differential. . . 207
Fig. 1 Conservative approximations, Ebs , of the R-stable sets for two uniform exponential regula-
tors. Arrows indicate the associated lower bounds for time-scale tolerances
Second, we treated only impulsive systems that are asymptotically stable. These
techniques generally fail in the presence of a center subspace; see Example 3.5.6
of [2]. However, a similar approach does work if there is an unstable subspace. For
example, if M0 > 1, one might want to know conditions on a 2 Sc under which
M.'; a/ > 1; for all ' 2 R, with R some suitable set of impulse extensions. If, for
some continuous function n satisfying n.0/ D 0, we have jjM.'; a/ M0 jj n.a/
for all ' 2 R, one can verify the string of inequalities
˚
inf M.'; a/ inf M W jjM M0 jj sup jjM.'; a/ M0 jj
'2R '2R
References
1. Bainov, D.D., Simeonov, P.S.: Impulsive Differential Equations: Periodic Solutions and Appli-
cations. Longman Scientific & Technical, Burnt Mill (1993)
2. Church, K.: Applications of impulsive differential equations to the control of malaria outbreaks
and introduction to impulse extension equations: a general framework to study the validity of
ordinary differential equation models with discontinuities in state. M.Sc Thesis, University of
Ottawa (2014)
3. Church, K.E.M., Smith?, R.J.: Analysis of piecewise-continuous extensions of periodic linear
impulsive differential equations with fixed, strictly inhomogeneous impulses. Dyn. Contin.
Discret. Impuls. Syst. Ser. B: Appl. Algorithms 21, 101–119 (2014)
4. Church, K.E.M., Smith?, R.J.: Existence and uniqueness of solutions of general impulse
extension equations with specification to linear equations. Dyn. Contin. Discret. Impuls. Syst.
Ser. B: Appl. Algorithms 22, 163–197 (2015)
5. Lashmikantham, V., Bainov, D.D., Simeonov, P.S.: Theory of Impulsive Differential Equations.
World Scientific Publishing, Singapore (1989)
6. Samoilenko, A.M., Perestyuk, N.A.: Impulsive Differential Equations. World Scientific Publish-
ing, Singapore (1995)
Coupled Lattice Boltzmann Modeling
of Bidomain Type Models in Cardiac
Electrophysiology
1 Introduction
of the heart in the myocardium with the bidomain system, derived from Ohm’s
law. This biophysical model of electrical cardiac activity links electrophysiological
cell models, at small scales, and myocardial tissue mechanics, metabolism and
blood flow at large scales. In mathematical viewpoint, bidomain system leads us
to compute intracellular and extracellular electrical potentials i and e with taking
into account the cellular membrane dynamics U. This is a system of non-linear
partial differential equations (PDEs) coupled with ordinary differential equations
(ODEs). The PDEs describe the propagation of the electrical potentials and ODEs
describe the electrochemical processes. During last years a lot of studies about
bidomain models have led to results about well-posedness, existence and uniqueness
of solutions (see e.g., [2, 3] and the references therein), and several numerical
methods based on methods as finite difference method or finite element method
are used to solve these models (see e.g., [8] and the references therein). In this
paper, we propose a modified Lattice Boltzmann Method (LBM) which is simple
to implement, effective, accurate and well suited to bidomain systems which is a
coupled nonlinear parabolic/elliptic PDEs. LBM is based on microscopic models
and mesoscopic kinetic equations. Indeed, traditional numerical methods as finite
difference method or finite element method directly solve governing equations
for deriving macroscopic variable, whereas LBM is based on the particle (the
discrete) distribution function and numerical solving the continuous Boltzmann
transport equation. Then the macroscopic variables of the bidomain system can be
recovered from the discrete equations through the multi-scaling Chapman-Enskog
expansion procedure. LBM was originated from Boltzmann’s kinetic theory of
gases (1970s), and attracts more and more attentions for simulating complex fluid
flows since 1990s. More recently, LBM has been extended successfully to simulate
different types of parabolic reaction-diffusion equation as Keller-Segel chemotaxis
model [10] and monodomain model in cardiac electrophysiology [4], or Poisson
equation [5].
This paper is organized as follows: in Sect. 2 we recall briefly the derivation
of the bidomain model. In Sect. 3 we present and describe the modified LBM
method. In Sect. 4, the validity of this method is demonstrated by comparing
the numerical solution to the exact solution of bidomain model with a classical
FitzHugh-Nagumo model (FHN), and convergence of solution is established. Some
interesting numerical simulations to analyze the influence of some parameters on
electrical wave propagation, including the bidomain model with a modified FHN
model, are also carried out in this section. This paper is ended by a conclusion and
some further works.
open, bounded, and connected subset of Rd , d 3 and during a time interval .0; T/)
div.K i ri / D Im fis ; div.K e re / D Im fes ; (1)
where i and e are the intracellular and extracellular potentials, respectively; K i .x/
and K e .x/ are the conductivity tensors describing the anisotropic intracellular and
extracellular conductive media; fis .x; t/ and fes .x; t/ are the respective externally
applied current sources. The transmembrane current density is described by Im and
is given by the following expression:
@
Im D .cm C I ion /; (2)
@t
where is the transmembrane potential, which is defined as D i e , is the
ratio of the membrane surface area to the volume occupied by the tissue, cm term is
the transmembrane capacitance time unit area. The tissue is assumed to be passive,
so the capacitance cm can be assumed to be not a function of the state variables.
The nonlinear operator I ion .x; tI ; U/ describes the sum of transmembrane ionic
currents across the cell membrane with U the electrophysiological ionic state
variables (which describe e.g., the dynamics of ion-channel and ion concentrations
in different cellular compartments). These variables satisfy the following ODE (with
H a nonlinear operator)
@U
D H.x; tI ; U/: (3)
@t
From (1), (2) and (3), the bidomain model can be formulated in terms of the state
variables , e and U as follows (in Q D ˝ .0; T/)
@
.cm C I ion .:I ; U// div.K i r/ D div.K i re / C fis ;
@t
div..K e C K i /re / D div.K i r/ C . fes C fis /; (4)
@U
D H.:I ; U/:
@t
The operators I ion and H which describe electrophysiological behavior of the
system have usually the following form (affine functions with respect to U)
I ion .:I ; U/ D I1 .:I / C I2 .:I /U; H.:I ; U/ D H0 .:I / C .:/U: (5)
Such problems have compatibility conditions determining whether there are any
solutions to the PDEs. This is easily found by integrating the second equation of (4)
212 S. Corre and A. Belmiloudi
over the domain and using the divergence theorem with the boundary conditions (6)
(a.e. in (0, T)). Then (for compatibility reasons), we require the following condition
Z Z
.i C e /d
C . fes C fis /dx D 0: (8)
˝
Under some hypotheses for the data and parameters of the system and some regular-
ity of operators I ion and H, system (4) with (6)–(7) and under the conditions (8)–(9)
is a well-posed problem (for more details see [2]).
In this section, a numerical method is presented for the bidomain system (4) in two
space dimensions. For this, we introduce a coupled modified LBM for solving the
coupled system of nonlinear parabolic and elliptic equations (i.e. the first and the
second equations of (4)). Then we treat the ODE satisfied by ionic state by applying
Gronwall Lemma to obtain an integral formulation, and by using a quadrature rule
to approximate the obtained integral. In the sequel, without loss of generality, we
assume cm D 1 and D 1. Moreover we assume K i D Ki Id , K e D Ke Id , with Id
identity matrix and Ki , Ke constants.
Remark 1 The developed LBM method has been constructed to take into account
the case in which K i D K i .; e / and K e D K e .; e /. In order to simplify
the presentation, we have assumed in this paper that these operators are constant
matrices.
In this first part, we develop and describe the modified LBM to solve the following
system (which corresponds to two first parts of (4))
@
div.Ki r. C e // D F.:I ; e /;
@t (10)
div.Ki r C .Ki C Ke /re / D G.:I ; e /;
For each particle on the lattice, we associate the discrete distribution functions hi
eq
and hi (in the mesoscopic level), and the discrete operator Hi of H for i D 0; : : : ; 8.
Then, the form of the Lattice Boltzmann Equation (LBE) with an external force by
introducing BGK approximations can be written as follows
1
eq
hi .x C ei
t; t C
t/ D hi .x; t/
hi .x; t/ hi .x; t/
t2 @
C
tHi .x; t/ C H .x; t/:
2 @t i
(13)
The key steps in LBM, which is directly derived from LBE (13), are the collision
and streaming processes (shown on Fig. 2) which are given by
1
eq
t2 @
i .x; t/ D hi .x; t/ hi .x; t/hi .x; t/ C
tHi .x; t/C 2 @t Hi .x; t/;
hcol (14)
hi .x C ei
t; t C
t/ D hcol
i .x; t/: (15)
From Chapman-Enskog expansion analysis, the above LBM can recover to the
eq
reaction-diffusion equation (11) if we take hi D wi ˚, Hi D wi H and the initial
eq
distribution at t D 0: hi .x; 0/ D hi .x; 0/. This analysis is based on the following
properties:
8
X 8
X
eq
hi .x; t/ D hi .x; t/ D ˚.x; t/.macroscopic variable/;
iD0 iD0
X8 8
X 8
X
eq
Hi .x; t/ D H.x; t/; ei hi .x; t/ D 0; ei Hi .x; t/ D 0; (16)
iD0 iD0 iD0
X8 X8
eq c2 c2
ei ei hi .x; t/ D ˚.x; t/Id ; ei ei Hi .x; t/ D H.x; t/Id :
iD0
3 iD0
3
LBM for Bidomain Type Models 215
To introduce our modified LBM, we have to take into account the coupled terms
which link reaction-diffusion equation and elliptic equation in the system (10). As
in [10], in order to take into account this coupling, we introduce two correction terms
Si D wi .1 .Ki r/ C 2 .Ki re // and Sie D wi 1e .Ki r/ C 2e ..Ki C Ke /re / ,
where the functions 1 ; 2 ; 1e and 2e are determined by Chapman-Enskog expan-
sions. Then, we can solve the reaction-diffusion equation with a first LBE where the
distribution function f leads to recover . We construct exactly the same LBM than
developed in Sect. 3.1.1. So we choose fi D wi , Fi D wi F and D c3K 1
eq
2
t C 2 to
i
satisfy previous properties (16). Finally, we add the corrector term Si as follows
1 eq
fi .x C ei
t; t C
t/ D fi .x; t/ fi .x; t/ fi .x; t/ C
tFi .x; t/
t2 @
C Fi .x; t/ C
tSi .x; t/: (17)
2 @t
P
8
Hence, the macroscopic variable , defined as: fi .x; t/ D .x; t/:
iD0
For the elliptic equation, the LBM developed is based on the LBM employed in
[5]. The first step is to introduce a new time variable r as lim Qe .x; rI t/ D e .x; t/.
r!1
Then, the equilibrium distribution function is defined as
eq wi Qe .x; rI t/ for i ¤ 0;
gi .x; r/ D
.w0 1/Qe .x; rI t/ for i D 0
P
8
eq 1
P
8
eq
and we can deduce that gi .x; r/ D 0; 1w0
gi .x; r/ D Qe .x; rI t/: Finally, as for
iD0 iD1
previous LBE (17), we add the corrector term Sie and we obtain the following LBE
(to recover e )
1 eq
gi .x C ei
r; r C
rI t/ D gi .x; rI t/ gi .x; rI t/ gi .x; rI t/
e
C
tGi .x; rI t/ C
tSie .x; rI t/: (18)
8
1 X
Hence, the macroscopic variable Qe , defined as: gi .x; rI t/ D Qe .x; rI t/:
1 w0 iD0
216 S. Corre and A. Belmiloudi
Now, we present briefly the method to solve ODE satisfy by ionic state U, with
initial condition U.x; 0/ D U0 .x/. According to (4) and the form of H given in (5)
by H.x; tI ; U/ D H0 .x; tI / C U.x; t/, with assumed to be a constant, and by
using Gronwall Lemma we can deduce:
Z
tC
t
t t
U.x; t C
t/ D U.x; t/e Ce H0 .x; sI .s//es ds:
t
t
U.:; t C
t/ D U.:; t/e
t C H0 .:; t C
tI .t C
t//e
t CH0 .:; tI .t// :
2
(19)
Finally, after non-dimentionalization, mesh definition and initialization of initial
conditions, parameters and data, the proposed algorithm to solve the bidomain
system can be summarized as follows
1. Initialization: tD0.
2. LBE according to time t by using (17) to compute .x; t C
t/.
3. Trapezoidal method by using (19) to compute U.x; t C
t/.
4. Loop on new time variable r:
a. LBE according to time r by using (18) to compute Qe .x; r C
rI t C
t/ an
approximation of e .x; t C
t/ .
b. If convergence criteria is not reached, set r D r C
r and go back to 4a.
5. Set e .x; t C
t/ WD Qe .x; rI t C
t/.
6. If t ¤ T, set t WD t C
t and go back to 2.
To validate the capacity of our modified coupled LBM to deal with 2D bidomain
systems, several situations are numerically simulated. In the first study, we consider
the bidomain system with homogeneous Neumann boundary conditions and with a
classical FitzHugh-Nagumo model (FHN), in which non linear operators are defined
as
In this first analysis, we investigate the accuracy and spatial convergence rate
of the proposed modified LBM for which we postulate that the error estimates
of the method is of order 2 in space and of order 1 in time (for sufficiently
regular solution). We perform a convergence study on cartesian grid, by taking
˛1 D 1, ˛2 D 1, ˇ1 D 1, Ki D 1 and Ke D 1, and by setting ˇ2 .x; y; t/ D
sol .x; y; t/ C 2et cos..x C y//: The initial conditions are .x; 0/ D 0; e .x; 0/ D
0; U.x; 0/ D cos..x C y// and we choose I , Ii and Ie to close the problem
according to solution and compatibility conditions. The exact solution is given by:
sol .x; y; t/ D tx2 .x 1/2 y2 .y 1/2 ; esol .x; y; t/ D t.cos.x/ C cos.y//; and
U sol .x; y; t/ D et cos..x C y//. To study the convergence, we have constructed
a sequence of meshes with decreasing spatial step
x between 1=30 and 1=200 and
t D
x2 . We just care about relative error on and U at t D 0:5 and t D 1
(see Table 1). Indeed, the chosen convergence criteria (for the iterative method to
Table 1 Relation between relative error and lattice spacing for and U
t = 0.5
x Err ErrU t=1
x Err ErrU
1=30 0.1914 0.0005 1=30 1.7618 0.0009
1=50 0.0389 0.0002 1=50 0.4559 0.0003
1=70 0.0116 7.97e5 1=70 0.1654 0.0001
1=100 0.0050 4.48e5 1=100 0.0790 7.92e5
1=150 0.0016 1.99e5 1=150 0.0284 3.52e5
1=200 0.0007 1.12e5 1=200 0.0138 1.99e5
218 S. Corre and A. Belmiloudi
approach e ) involves a constant error because this criteria is not defined in function
of lattice size cell. We present on Fig. 3 (at t D 0:5 and t D 1) the convergence
curves, log.Error/ versus
x, for and U. We observe that the slope of error
curves for passes approximately from 3 to 2:5 and the slope of error curves for
U is approximately equal to 2. This shows that our numerical error estimates are
agree with the postulated error estimates, and indicate the good performance of our
proposed method.
This second computations have been made to test performance of our method
by analyzing the influence of some parameters on electrical wave propagation
according to FHN models: a classical model (20) and a modified model (21). Here,
we take
x D 1=50 and
t D
x2 .
LBM for Bidomain Type Models 219
In this first application, we consider the classical FHN model (20) with fixed ˇ1 D
0:5 and ˇ2 D 1 and we study the effect of parameters ˛1 and ˛2 . We assume Ki D
Ke D 1 and we consider the following initial conditions .x; y; 0/ D 1:28791 C
sin.x/; e .x; y; 0/ D 0; U.x; y; 0/ D 0:5758:
The parameters ˛1 and ˛2 control the dynamic between transmembrane potential
and the ionic state U. In order to study the propagation of an electrical wave
through the cardiac tissue, we analyze the relaxation time of . In Table 2, we
observe that ˛2 has negligible impact on this relaxation time. Conversely, Fig. 4 and
Table 2 show that tiny ˛1 value leads to near-infinite slope values when potential
peaks and relaxes.
60
4 −10
40
−20
3 20
−30
2 0
ρ(x, y, 1)
ρe (x, y, 1)
U (x, y, 1)
−40
−20 −50
1
−40 −60
0
−60 −70
−1 −80
−80
1 0 1
1 1
0.5 0 0.5
0.5
0.5 0.5
0.5
y 0 0 x 1 1 y 0 0 x
y x
In this final application, we consider the modified FHN model (21) which is known
to be more adapted than the classical model (20) because of a product between
and U. We assume Ki D 1:75 and Ke D 7 and we consider the following initial
conditions: .x; y; 0/ D 85 C 100.1 sin.xy//; e .x; y; 0/ D 0; U.x; y; 0/ D 0:
Figure 5 shows a color visualization of the simulation for , e and U at final time
t D T. The analyze we have done before is still valid.
Remark 3 It is known that the action potential duration (APD) and conduction
velocity (CV) could be significantly affected by variation in the values of FHN
parameters. So, it will be interesting to perform comparison of the APD and CV for
the various FHM ionic-type models (and others) coupling the bidomain model, but
also to understand how sensitive APD and CV are to variability in these parameters.
be shown in a forthcoming paper for more general coupled models with realistic
complex geometries. It would be interesting to use this developed method with
observations coming from experimental data and a more complete description of
the biophysical model of electrical cardiac activity. In order to get even closer to a
more realistic calculation, it is necessary to study in the future this method coupled
with optimization technique and robust control problems by using the approach
developed in [1].
Acknowledgements The authors are grateful to the referee for many constructive comments and
suggestions which have improved the presentation of this manuscript.
References
1. Belmiloudi, A.: Stabilization, Optimal and Robust Control. Theory and Applications in
Biological and Physical Sciences. Springer, London (2008)
2. Belmiloudi, A.: Robust control problem of uncertain bidomain models in cardiac electrophisi-
ology. J. Coupled Syst. Multiscale Dyn. 19, 332–350 (2013)
3. Bourgault, Y., et al.: Existence and uniqueness of the solution for the bidomain model used in
cardiac electrophysiology. Nonlinear Anal-Real 10, 458–482 (2009)
4. Campos, J.O., et al.: Lattice Boltzmann method for parallel simulations of cardiac electrophys-
iology using GPUs. J. Comput. Appl. Math. 295, 70–82 (2016)
5. Chai, Z., Shi, B.C.: Novel Boltzmann model for the Poisson equation. Appl. Math. Model. 32,
2050–2058 (2008)
6. Fan, Z., et al.: Adapted unstructured LBM for flow simulation on curved surfaces. In: ACM
SIGGRAPH, Los Angeles, pp. 245–254 (2005)
7. Huang, J., et al.: A fully implicit method for lattice Boltzmann equations. SIAM J. Sci. Comput.
37(5), Special Section, S291–S313 (2015)
8. Sharomi, O., Spiteri, R.: Convergence order vs. parallelism in the numerical simulation of the
bidomain equations. J. Phys.: Conf. Ser. 385, 1–6 (2012)
9. Valero-Lara, P., Jansson, J.: A non-uniform Staggered Cartesian grid approach for Lattice-
Boltzmann method. Procedia Comput. Sci. 51, 296–305 (2015)
10. Yang, X., et al.: Coupled lattice Boltzmann method for generalized Keller-Segel chemotaxis
model. Comput. Math. Appl. 12, 1653–1670 (2014)
Dynamics and Bifurcations in Low-Dimensional
Models of Intracranial Pressure
1 Introduction
2 Physiological Considerations
rate is negligible [1]. The absorption of CSF back into the bloodstream, and hence,
its removal from the intracranial compartment, is the primary natural mechanism for
lowering the intracranial pressure. As a result, abnormally high intracranial pressure
is sometimes caused by high resistances to resorption.
In addition to the brain naturally regulating pressure via the volume of CSF,
the brain also contains autoregulatory mechanisms to control the flow of blood
in the cerebral arteries. In order to ensure a constant artery-to-vein difference in
oxygen concentration, the brain automatically regulates the cerebral blood flow
(CBF) in a process known as cerebral autoregulation. As oxygen consumption,
blood pressure, and blood viscosity change, the cerebral arteries dilate or constrict
to regulate the flow of blood to the brain. The volume of the cerebral arteries, the
compression of the brain tissue, and the volume of CSF within the skull are all
controlled by ICP. The linked mechanisms of feedback and control through all of
these processes have the potential to create instability in the steady-state behavior
of the ICP, most notably in the case of Lundberg A waves. This pathological
phenomenon is characterized by long, sustained increases in the ICP. The ICP, which
is normally approximately constant, increases dramatically in oscillations with
periods of approximately 5–20 min, and amplitudes of about 50–100 mmHg [5].
3 Ursino-Lodi Model
The Ursino-Lodi mathematical model [6] includes both the ventricular CSF and the
cerebral vasculature. The model is made of five compartments: one compartment
for the ventricular CSF and four compartments for the blood in the cerebral arteries,
capillaries, veins, and venous sinus, respectively. In addition, the model provides
a relationship between pressures and volumes of cerebral blood and the pressure
and volume of the ventricular CSF. Lastly, the model includes equations which
dynamically control the flow of cerebral blood, which account for the effects of
cerebral autoregulation. By modeling the effect of cerebral autoregulation, the
Ursino-Lodi model has the capability to predict the oscillatory Lundberg A Waves.
Applying the mass conservation principle to the ventricular component yields
dPic dVa Pc Pic Pic Pvs
Cic D C C Ii ; (1)
dt dt Rf Ro
where Cic is the intracranial “compliance”, Va is the blood volume in the cerebral
arteries and arterioles, Pc ; Pic ; and Pvs are the capillary, intracranial, and venous
sinus pressures, respectively, Rf and Ro are the resistances to CSF formation and,
respectively, CSF outflow, and Ii is the rate of externally injected of extracted CSF
volume. As in [4], the nonlinear compliance term Cic is assumed to be related to Pic
by the following formula:
1
Cic D ; (2)
kE Pic
226 D. Evans et al.
where Ra and Rpv denote the resistances of the arterial-arteriolar and respectively
venular vessels. The approximation made in Eq. (3) is based on the assumption that
the CSF production rate is much less than the cerebral blood flow rate.
By assuming a linear blood volume-pressure relationship Va D Ca .Pa Pic /,
where Ca denotes the arterial-arteriolar compliance, the following equation can be
obtained through differentiation:
dVa dPa dPic dCa
D Ca C .Pa Pic /: (4)
dt dt dt dt
Lastly, the model is completed by assuming that the cerebral autoregulation modifies
the compliance Ca as follows:
dCa 1
D .Ca C .Gx//; (6)
dt
where is a time constant, G is the maximum autoregulation gain, and
with k D
Ca =4.
Pa Pc
By definition, the cerebral blood flow q is q D and thus the normalized
Ra
deviation of q from its normal value qn is:
q qn
xD : (8)
qn
The parameter
Ca represents the maximum allowed change in the arterial com-
pliance Ca from its basal value Can . Furthermore, it depends on whether the
arterial-arteriolar vessels are contracting (x > 0) or dilating (x < 0) as follows:
Ca1 ; if x < 0
Ca D (9)
Ca2 ; if x > 0 :
Dynamics and Bifurcations in Low-Dimensional Models of Intracranial Pressure 227
By assuming that the arteries are circular cylinders of radius r and the blood is
a viscous Newtonian fluid, the Hagen-Poiseuille equation which states that the
arterial resistance is inversely proportional to r4 can be used to obtain the following
expression for Ra :
2
kR Can
Ra D 2
: (10)
Va
The system of non-linear ordinary differential equations (5) and (6) is the Ursino-
Lodi model written in terms of the state variables Pic and Ca .
The clinically measured ICP is a pulsatile periodic waveform which has a period
equal to one heartbeat. However, the Lundberg A waves happen on a time scale
that is much longer than one heartbeat, so in order to observe them we replace
the heartbeat with an averaged pressure over one period which greatly simplifies
the analysis without loss of applicability. Notably, it ensures that the system of
differential equations we work with remains autonomous. The parameters of the
Ursino-Lodi model are the variables that are treated as constants with respect to
time. A point in the parameter space representing basal parameters accompanies the
model, which is presented as Table 1. In our numerical simulations, all parameters
are set to these values unless otherwise indicated. Variations from these parameters
will be represented as unitless normalized values with respect to the values given in
Table 1.
The equilibrium points in the model are found at locations where PP ic D CP a D
0, where the dot operator indicates the time derivative. Given positive real input
parameters, this system has consistently two equilibrium points in the domain of
Pic 0, Ca 0. These two equilibria are marked with stars in Fig. 2b. What we
will refer to as the “primary” equilibrium point in this work is marked “SN” here, for
stable node, and what we refer to as the “secondary” equilibrium point is marked
“SP” here, for saddle point, which we will discuss shortly. Although the primary
equilibrium point is a stable node for the values of Table 1, we will soon discuss
how deviations from these can change its stability.
Nevertheless, we treat both equilibria equally when employing the following
techniques. By slowly varying the initial state of the system by one model parameter
(here, either Ro , kE , or G), we obtain a locus of points that correspond to the steady
state value of the system. Using the basal case as an initial guess, we use a root-
solver (the MATLAB built-in function fzero) to track the equilibrium values of
Pic and Ca as a function of three of the model parameters: Ro , kE , and G, for
both equilibrium points. Because there is more than one root for the equilibrium
state, we kept each solution branch separate by, upon increase of the bifurcation
parameter, using the previous solution as the subsequent initial guess for the root-
solver. Figures 1 and 2a show how the locations of both equilibria vary as a function
of both Ro and G. We found that varying the intracranial elastance, kE , does not
affect the equilibrium values predicted by the model for either equilibrium point.
In addition, the location of the secondary equilibrium point does not change as a
function of Ro .
We would like to describe how the stability of these equilibria change with
respect to the model parameters. We therefore linearize the system of equations (5)
and (6) about the equilibria to obtain the linear system xP D Jx. Here, x D
Œ.Pic Pic /; .Ca Ca /T is the perturbation from the equilibrium value, .Pic ; Ca /,
and J is the Jacobian matrix of the two-dimensional vector field defined by the right
hand sides of Eqs. (5) and (6). Then, the eigenstructure of J determines the stability
of the equilibrium point [7].
Confirming what was previously inferred from the phase portrait, the primary
equilibrium point is a stable node, having two negative real eigenvalues in the basal
condition. Since there are no other stable equilibria in the domain, the basin of
attraction is the entire domain Pic > 0, Ca > 0. In addition, we find that the
secondary equilibrium point always occurs at a value of Pic D 0 regardless of other
input parameters. The eigenvalues of the linearized system near this equilibrium are
real with opposite signs. Therefore, this equilibrium can be classified as a saddle
point.
It is clinically valid that the primary equilibrium is a stable node in the basal
condition. That is, given an initial state (Pic , Ca ), the system will autonomously
regulate itself to one steady-state value. However, as previously alluded to, there
will be instances where the system no longer converges to a constant steady-state
value, but instead converges to a stable limit cycle in the phase space, representing
Dynamics and Bifurcations in Low-Dimensional Models of Intracranial Pressure 229
0.35
40
0.3
30
0.25
ic
20
0.2
10 0.15
0 0.1
0 5 10 15 20 25 0 5 10 15 20 25
Ro (normalized) R (normalized)
o
31 0.22
30 0.21
ic
29 0.2
28 0.19
27 0.18
0 1 2 3 4 5 6 7 0 1 2 3 4 5 6 7
G (normalized) G (normalized)
0.135
Intracranial Pressure: P
0.134 60
0.133 50
0.132 40
0.131 30
0.13 20
0.129 10
0.128 0
0 1 2 3 4 5 6 7 0 0.1 0.2 0.3 0.4 0.5 0.6
G (normalized) Arterial Compliance: Ca
Fig. 2 (a) Location of Ca on the secondary equilibrium point as a function of G (P ic is unaffected).
(b) Phase portrait of the system in the basal condition as per Table 1. Here, the primary equilibrium
point is a stable node (SN), while the secondary equilibrium point is a saddle point (SP)
230 D. Evans et al.
(a) (b)
0.15
0.04
0.1
0.02
0.05
0
0
−0.02
λ
λ
−0.04 −0.05
−0.06 Real λ1
−0.1 Real λ1
Imag λ1 Imag λ1
−0.08 Real λ2 −0.15 Real λ2
Imag λ2 Imag λ2
−0.1 −0.2
0 5 10 15 20 25 1 2 3 4 5 6
Ro (normalized) kE
(c) (d) 1
0.25
Real λ1
0.2 Imag λ1 0
Real λ2
Imag λ2
0.15 −1
Real λ1
0.1 Imag λ1
−2
λ
Real λ2
λ
0.05 Imag λ2
−3
0
−4
−0.05
−0.1 −5
0 1 2 3 4 5 6 7 0 1 2 3 4 5 6 7
G (normalized) G (normalized)
Fig. 3 Eigenvalue plots of equilibrium solution branches, showing changes in stability with
parameter variations. The Hopf bifurcation points are marked with stars. (a) Primary equilibrium:
versus Ro . Hopf bifurcation occurs at Ro 9:793, and reverse Hopf bifurcation occurs at
Ro 17:430. (b) Primary equilibrium: versus kE (with increased Ro D 8) Hopf bifurcation
occurs at kE 2:615. (c) Primary equilibrium: versus G (with increased Ro D 8 and kE D 2:1).
Hopf bifurcation occurs at G 2:072. (d) Secondary equilibrium: versus G. The imaginary
parts are not visible in the plot because they are nearly coincident with the real part of 1 , which
takes very small positive values
Dynamics and Bifurcations in Low-Dimensional Models of Intracranial Pressure 231
(a) 90 Equilibria
(b) 110
Equilibria
Trajectories Trajectories
80 100
90
ic
ic
70
Intracranial Pressure: P
Intracranial Pressure: P
80
60
70
50 60
40 50
40
30
30
UN
20
20
10 10
0 0
0 0.1 0.2 0.3 0.4 0.5 0.6 0 0.1 0.2 0.3 0.4 0.5 0.6
Arterial Compliance: Ca Arterial Compliance: C
a
Fig. 4 Phase portraits exhibiting limit cycles, where the primary equilibrium is an unstable node
(UN), and the secondary equilibrium is a saddle point (SP). (a) Normalized kE D 2:1, Ro D 10,
and G D 4. (b) Normalized kE D 8 and Ro D 8
232 D. Evans et al.
Through the use of numerical simulations, we have shown how varying the
parameters G, kE , and Ro in the Ursino-Lodi model changes the value of the
equilibrium intracranial pressure and arterial compliance. We have also shown how
varying these parameters can force the primary equilibrium to undergo a Hopf
bifurcation, creating a stable limit cycle around the now unstable equilibrium point.
In addition to confirming the claims made by Ursino and Lodi, we have also shown
the existence of a reverse Hopf bifurcation at very high levels of Ro To the authors’
knowledge, no interesting bifurcation phenomena is witnessed by varying the model
parameters not mentioned here, hence their exclusion from the work. We intend to
use the work presented here when developing new models of intracranial pressure
dynamics, to offer additional insight on the stability structure of the steady-state
solutions.
References
1. Cutler, R.W.P., Page, L., Galicich, J., Watters, G.V.: Formation and absorption of cerebrospinal
fluid in man. Brain 91(4), 707–720 (1968)
2. Goldsmith, W.: The state of head injury biomechanics: past, present, and future: part 1. Crit.
Rev. Biomed. Eng. 29(5&6), 441–600 (2001)
3. Kyriacou, S.K., Mohamed, A., Miller, K., Neff, S.: Brain mechanics for neurosurgery: modeling
issues. Biomech. Model. Mechanobiol. 1(2), 151–164 (2002)
4. Marmarou, A., Shulman, K., Rosende, R.M.: A nonlinear analysis of the cerebrospinal fluid
system and intracranial pressure dynamics. J. Neurosurg. 48(3), 332–344 (1978)
5. Suarez, J.I.: Critical Care Neurology and Neurosurgery. Springer, New York (2004)
6. Ursino, M., Lodi, C.A.: A simple mathematical model of the interaction between intracranial
pressure and cerebral hemodynamics. J. Appl. Physiol. 82(4), 1256–1269 (1997)
7. Verhulst, F.: Nonlinear Differential Equations and Dynamical Systems, 2nd edn. Springer,
New York (1996)
8. Wakeland, W., Goldstein, B.: A review of physiological simulation models of intracranial
pressure dynamics. Comput. Biol. Med. 38(9), 1024–1041 (2008)
Persistent Homology for Analyzing
Environmental Lake Monitoring Data
Abstract Topological data analysis (TDA) is a new method for analyzing large,
high-dimensional, heterogeneous, and noisy data that are characteristic of modern
scientific and engineering applications. One major tool in TDA is persistent homol-
ogy, wherein a filtration of a simplicial complex is generated from point clouds
and subsequently analyzed for topological features. Betti numbers are computed
across varying spatial resolutions, based on a proximity parameter R, where the n-th
Betti number equals the rank of the n-th homology group. In this paper, persistent
homology is applied to lake environmental monitoring data collected from a sonde
sensor attached to a commercial cruise vessel, and to weather station observations.
A modified form of the witness complex described by de Silva is used in an attempt
to eliminate the need for persistence and thus to reduce computation time. From
preliminary results, witness complexes are very promising in capturing the shape
of the data and for detecting patterns. It is therefore proposed that TDA, combined
with standard statistical techniques and interactive visualizations, enable insights
into observations collected from environmental monitoring sensors.
1 Introduction
emphasizing the global aspects of the data and shape recognition in point clouds
of high dimensions. Specifically, homology provides the basis for computing
simplicial complexes (a mesh that represents a space in specific ways), in which
the topology and geometry of the point clouds are separated [10]. Topological
methods for data analysis were described in the seminal paper by Carlsson [1] and
subsequently expanded. They are useful in studying connectivity information, such
as the classification of loops and high-dimensional surfaces that may implicitly exist
in the data. Unlike geometric methods, TDA is not sensitive to properties such as
curvature, and, because the focus is on the global structure of the data, numerical
values of distance functions are less important. These features allow researchers to
study complex data where there is an unclear or incomplete idea of what specific
metrics are to be extracted [1]. TDA has been applied to a variety of scientific
problems, most notably in biomedicine, including the organization of genomic data
from many different sources in the study of breast cancer [6], and for computer-
aided diagnosis of pulmonary embolism [7]. TDA is also used for business and
social analysis [4].
Analytics and advanced computational methods are increasingly important in
environmental data analysis [2, 5]. New institutes and research initiatives focus
exclusively on this topic (e.g. the Institute for Environmental Analytics at the
University of Reading – www.the-iea.org). In the current paper, we adapt TDA
to the analysis of environmental sensor data. Specifically, we modify the witness
complex filtration described by de Silva [8] to eliminate the need for persistence,
and consequently, to reduce computation time. We analyze a large number of data
vectors in R6 representing various properties (e.g. time, temperature, air pressure,
etc.) collected from sensors attached to a commercial cruise vessel, with the
goal of obtaining insights into the complex physical phenomena characterizing
dynamic lake conditions. In another example, data from weather station sensors
are analyzed. After normalization of a Euclidean distance matrix for these vectors,
a mesh or triangulation is constructed which accurately represents the topology
of this data set. Although the data cannot be characterized as “big data” (very
large and heterogeneous data sets that generally cannot be processed or analyzed
using standard computational or statistical techniques), the readings are sufficiently
numerous and high-dimensional that constructing such a mesh on the full set of
points would be prohibitively costly. We must therefore choose a subset that is
representative of the full set and retains its topology. The resulting analyses are
expected to complement visual and statistical methods to enrich insights and to
facilitate discovery of various lake phenomena. The next section describes the TDA
algorithm as well as our adaptations, followed by a preliminary investigation of
applying TDA to environmental lake monitoring data.
Persistent Homology for Analyzing Environmental Lake Monitoring Data 235
2 Algorithm
Given a set X of N data points, we need to choose a subset of those points consisting
of n landmarks that accurately represents the shape of the point cloud. More
complex shapes may require more landmarks for accurate representation, whereas a
circle could be represented by only four points. Since the remaining N n points will
act as witnesses, it is important not to select too large a proportion of the original N.
Ideally, N should be quite large, so that a large number of landmarks can be selected.
In practice, the ratio N=n should range from 30 to 100, depending on the size of the
original data.
236 B.A. Fraser et al.
Example 2.1 Take three vertices of an equilateral triangle, as well as the three
midpoints of its edges, as landmarks. Consider the three witnesses which lie just
outside the central triangle formed by the midpoints (Fig. 1). These are weak
witnesses to its edges, but none of them is a weak witness to the triangle itself;
they are weak witnesses to the outer triangles corresponding to their colour.
We may wish to include a simplex, such as the triangle in the preceding example,
in the case where all of its subsimplices are included. This motivates the following
definition of a witness complex that will be employed, where witnesses are used
to determine the 1-skeleton, or neighbourhood graph of edges, and then the higher
dimensional simplices will be added by Vietoris-Rips expansion [11].
Persistent Homology for Analyzing Environmental Lake Monitoring Data 237
Two witness complex filtrations are described below. The first is from De Silva
[8], the second is the proposed adaptation of this construction. A filtration of a
witness complex is a nested sequence of increasing subsets of a simplicial complex.
There are three inputs: a parameter v that determines how many landmarks can
be witnessed simultaneously by a single point, the distance matrices between data
points, and a value R which ranges across an interval and creates the filtration.
Take D to be the n N Euclidean distance matrix (on the n landmarks and N full
data set). Take E to be the n n distance matrix between landmarks, and E0 to be
the n jPj distance matrix (between the n landmarks and jPj potential witnesses).
Both witness complexes have the n landmarks as their 0-simplices.
For W.DI R; v/ (De Silva, [8]), R 2 Œ0; 1/, and for W .E; E0 I R; v/, R 2
Œ0; 1:
• if v D 0, then for i D 1; 2; : : : ; N define mi D 0 and for i D 1; 2; : : : ; jPj
define ni D 0
• if v > 0, then for i D 1; 2; : : : ; N define mi to be the v-th smallest entry
of the i-th column of D, and for i D 1; 2; : : : ; jPj define ni to be the v-th
smallest entry of the i-th column of E0
– the edge D Œab belongs to W.DI R; v/ iff there exists a witness i 2
f1; 2; : : : ; Ng such that max.D.a; i/; D.b; i// R C mi
– the edge D Œab belongs to W .E; E0 I R; v/ iff there exists a witness
i 2 f1; 2; : : : ; jPjg such that max.E0 .a; i/; E0 .b; i// ni and E.a; b/ R
• the p simplex D Œa0 a1 : : : ap belongs to the witness complex iff all of its
edges also belong to the witness complex
Example 2.2 The reason for splitting the distance matrix D into E and E0 in our
construction is that landmarks should not act as witnesses. Consider a point cloud
where nearly all the vectors are tightly clustered, and there are a few widely spaced
outliers (Fig. 2). All of these widely spaced outliers are likely to be chosen as
landmarks by minmax, and if they can act as witnesses to each other, they can all be
connected to each other by edges, resulting in a complex which does not accurately
represent the data’s shape. But if landmarks and witnesses are mutually exclusive,
then the problem of outlier selection will be mitigated (albeit, each outlier selected
as a landmark will still affect b0 ).
238 B.A. Fraser et al.
Fig. 2 An example of a
witness complex W.DI 0; 2/
where outliers were selected
as landmarks (red), and then
acted as witnesses to each
other. Features
unrepresentative of the data
are found
as such, they are not joined by edges, and the Betti number b1 is found to be 1 rather
than 0, as it should be. As such, it is necessary to increment R by at least a small
amount to fill the hole.
This issue may have been avoided by choosing v D 3. In fact, with data of
dimension d, choosing v D d C 1 generally suffices. Witness complexes are used to
reduce the number of cells: in 3 dimensions, a clique on 10 vertices is superfluous.
However, a clique on 4 vertices is not. We can recover an accurate Betti profile of
our data by increasing v slightly and still keep the number of cells relatively low.
And by eliminating the need for persistence (since homology need be computed
only once), more landmarks can be selected.
Finally, it remains to be explained why the parameter R should be used to create
a filtration at all, if persistence is not used. The answer is that outliers can still be a
problem, and W may not actually be correct.
Example 2.4 Take as our data set a large number of points from 23 of a circle,
and two additional points which are very near to each other from the center of
the missing arc – these are the outliers. Minmax selects one of these outliers as
a landmark, as well as some evenly distributed ones along the 23 arc. An ideal
simplicial complex should only connect the landmarks along the 23 arc, but with
v D 3, the other outlier which was not taken as a landmark witnesses the two ends
of that arc and connects them, completing the circle (Fig. 4).
Clearly, this problem could have been avoided by taking the finished complex to
be at some R < 1, as the edges in the 23 arc would have been formed by R 0:1,
but the green edges needed R 0:3. In general, the more landmarks that are taken,
the closer they will be to each other, and the complex should be complete at a lower
value of R. Any edges which emerge at higher values are more likely to be artifacts
of outliers being witnessed, as in the above example. Therefore, we propose that
the filtration be calculated normally, but when the rate of edge addition (relative to
240 B.A. Fraser et al.
the increase in R) begins to fall off dramatically, that the complex be considered
complete and its Betti profile found.
3 Application
The proposed methods are applied to three types of data. The first is an artificially
generated sphere point cloud, to mirror the experiments in [8]. The second is lake
monitoring data, and the last are vectors of various observed weather properties.
The first artificial data set consists of N D 3200 points chosen uniformly from
the surface of S2 . Using minmax selection, 64 landmarks were chosen. Both
W .E; E0 I 1; 3/ and W .E; E0 I 1; 4/ (Fig. 5) recovered the correct Betti profile
.b0 ; b1 ; b2 / D .1; 0; 1/ in each of 100 trials.
Then 12,500 points were chosen uniformly from within S2 having four interior
spherical voids, ranging in diameter from 0.2 to 0.5. Again, using minmax, 125
landmarks were chosen. W .E; E0 I 1; 3/ (Fig. 5) recovered the correct Betti profile
.b0 ; b1 ; b2 / D .1; 0; 4/ in each of 10 trials.
Persistent Homology for Analyzing Environmental Lake Monitoring Data 241
Fig. 5 Simplicial complexes constructed on points taken from S2 (left) and D2 with 4 spherical
voids in it (right)
The TDA approach developed in this paper was applied to lake monitoring
data to complement existing statistical and visualization analysis tools [9] (see
visual.nipissingu.ca/Commanda2). Data were collected from Lake Nipissing (46ı
160 1200 N 79ı 470 2400 W) via a sonde sensor attached to a commercial cruise
vessel (the Chief Commanda II). The vectors are in six dimensions: temperature
(ı C), specific conductivity ( s/cm), dissolved oxygen concentration (mg/L), pH,
chlorophyll RFU (relative fluorescence units), and total algae RFU. A 3-dimensional
witness complex W .E; E0 I R; 4/ was constructed on a subseet of 36 landmarks of
216 data vectors from Sept. 4, 2011.
Betti profiles of .5; 1; 0/ or .5; 0; 1/ were found, but are considered to be
unreliable due to the random nature of landmark selection. Removing various
dimensions can simplify locating the source of the feature by constructing the same
complex on the same data set, minus one of its coordinates. For instance, eliminating
chlorophyll RFU made the detection of these features rarer, so we expect it is a
contributing factor, while eliminating total algae RFU resulted in these features
being detected more frequently. Consequently, the total algae property appears to
be irrelevant, as it interferes with the topological feature.
In this case, reducing the coordinates to specific conductivity, pH, and chloro-
phyll RFU resulted in reliably reproducible 3-dimensional holes appearing in the
witness complex W .E; E0 I 1; 4/ (Fig. 6a). Further research is needed to understand
these results, and to determine whether these features indicate some interaction
between these properties of the lake.
242 B.A. Fraser et al.
Fig. 6 (a) Reliably detected 3-dim hole on dimension-reduced lake data; (b) b1 increasing by 2 at
R D 0:76 in weather data, a result of outliers
TDA was applied to data collected from a Nipissing University weather sta-
tion to complement existing web-based analysis and interactive visualizations
(geovisage.nipissingu.ca). Six-dimensional weather data (photosynthetically active
radiation (PAR) (mol/J), rainfall (mm), relative humidity (%), soil moisture (%),
soil temperature (ı C), and wind speed (m/s)) for Temiskaming Shores, Ontario
(approximately 47ı 310 N 79ı 410 W) were sampled at 5-min intervals, resulting
in 8640 vectors for the month of April, 2013. A 2-complex W .E; E0 I 1; 3/ was
constructed on a subset of 86 landmarks, and during every such trial there were
edges added for large values of R, some even at R > 0:9. These edge additions
resulted in an increase of the found value of b1 . This is an instance of outliers
affecting the result (Fig. 6b), as the majority of the complex was already complete
by R D 0:35, and the Betti profile found at that point is considered more accurate.
Another strategy for isolating features is to build the complex on different time
scales. For instance, a Betti profile of .b0 ; b1 / D .1; 5/ was most often found for the
month of April. It may be helpful to perform the same analysis on individual weeks,
or days, to determine whether the appearance of certain features can be related to
weather events, such as a thunderstorm, at those particular times.
4 Conclusions
This paper presents an improvement to the persistent homology paradigm for TDA
that adapts and builds on the work of de Silva. By employing witness complexes,
and with less dependence upon persistence, we are better able to represent the shape
of complex data, with improved computational efficiency. Based on its success with
artificial data sets and preliminary results from real environmental data, we propose
Persistent Homology for Analyzing Environmental Lake Monitoring Data 243
References
1. Carlsson, G.: Topology and data. Bull. Am. Math. Soc. 46, 255–308 (2009)
2. Dutta, R., Li, C., Smith, D., Das, A., Aryal, J.: Big data architecture for environmental
analytics. In: Denzer, R., Argent, R.M., Schimak, G., Hr̆ebíc̆ek, J. (eds.) Environmental
Software Systems. Infrastructures, Services and Applications, vol. 448, pp. 578–588. Springer
International Publishing, Cham (2015)
3. Holzinger, A.: Extravaganza tutorial on hot ideas for interactive knowledge discovery and data
mining in biomedical informatics. In: Ślȩzak, D., Tan, A.-H., Peters, J.F., Schwabe, L. (eds.)
Brain Informatics and Health. LNCS, vol. 8609, pp. 502–515. Springer, Heidelberg (2014)
4. Lum, P.Y., Singh, G., Lehman, A., Ishkanov, T., Vejdemo-Johansson, M., Alagappan, M.,
Carlsson, J., Carlsson, G.: Extracting insights from the shape of complex data using topology.
Nature 3 (2013). doi:10.1038/srep01236
5. Namieśnik, J., Wardencki, W.: Monitoring and analytics of atmospheric air pollution. Pol. J.
Environ. Stud. 11(3), 211–216 (2002)
6. Nicolau, M., Levine, A.J., Carlsson, G.: Topology based data analysis identifies a subgroup of
breast cancers with a unique mutational profile and excellent survival. Proc. Natl. Acad. Sci.
108(17), 7265–7270 (2011)
7. Rucco, M., Falsetti, L., Herman, D., Petrossian, T., Merelli, E., Nitti, C., Salvi, A.: Using
Topological Data Analysis for diagnosis pulmonary embolism. http://arxiv.org/abs/1409.5020
[physics.med-ph]
8. de Silva, V., Carlsson, G.: Topological estimation using witness complexes. In: Proceedings
of the Symposium on Point-Based Graphics, pp. 157–166. Eurographics Association, Aire-la-
Ville (2004)
9. Wachowiak, M.P., Wachowiak-Smolikova, R., Dobbs, B.T., Abbott, J., Walters, D.: Interactive
web-based visualization for lake monitoring in community-based participatory research.
Environ. Pollut. 4(2), 42–54 (2015)
10. Zomorodian, A.: Computational topology. In: Algorithms and Theory of Computation Hand-
book. Applied Algorithms and Data Structures Series, p. 3. Chapman & Hall/CRC, Boca Raton
(2010)
11. Zomorodian, A.: Fast construction of the Vietoris-Rips complex. Comput. Graph. 34, 263–271
(2010)
Estimating Escherichia coli Contamination
Spread in Ground Beef Production Using
a Discrete Probability Model
1 Introduction
P.M. Kitanov
University of Ottawa, Ottawa, ON, K1N 6N5, Canada,
e-mail: [email protected]
A.R. Willms ()
University of Guelph, Guelph, ON, N1G 2W1, Canada,
e-mail: [email protected]
2 The Model
Consider a large ground beef production facility. The ground beef is produced in
batches of several tonnes each. The input to these batches are several raw sources,
typically a “lean” fresh source and a “fat” fresh source, but also often a frozen source
and other sources such as BLBT (Boneless Lean Beef Trimmings). The batch is
well-mixed, so that if any contamination is present on any of the raw source material
that is input into the batch, the entire batch is deemed to be contaminated.
Estimating E. coli Spread in Beef Production 247
Let ps be the number of pieces, each of mass as contributed by each carcass in raw
source s. Let Cs be the total number of carcasses in the raw source, then the total
248 P.M. Kitanov and A.R. Willms
number of pieces in the raw source is Ns D Cs ps . Since we are assuming the raw
source material is ordered, we assign piece position numbers 1 to Ns for this source.
The total mass in the raw source is Ms D Cs ps as .
The pieces from each carcass are distributed throughout this raw source in some
manner, the same for each carcass. Here we consider a piece-wise linear distribution
function that is even around its centre:
8 C
ˆ .jnjLi1 /Hi C.Li jnj/Hi1
ˆ
< Li Li1 if Li1 < jnj < Li , 1 i K;
C
F.n/ D H CH (1)
ˆ 2
i i
if jnj D Li , 0 1 K;
:̂
0 if jnj > LK :
X
K
C
.Li Li1 /.Hi C Hi1 / D 1:
iD1
This class of functions includes the uniform distribution, obtained with K D 1, and
H0˙ D H1 D 2L1 1 . If the parameters are chosen such that Hi D HiC , 1 i K, then
the function F is continuous. Each raw source s may have a different distribution
function Fs , and thus a different set of parameters K, L, and H. We assume that the
distribution centres, c of each carcass are uniformly spread through the source:
1 Ns Ms
c D c ps ; c 2 Z; 1 c Cs D D : (2)
2 ps ps as
Here c is the carcass number and the discrete probability density function for carcass
c in this raw source is Fs .n c /. The expected fraction of a carcass c present in
any set of piece positions R
f1; 2; : : : ; Ns g is
X
Qsc .R/ D Fs .n c /: (3)
n2R
Let msb be the mass input from source s to batch b, and let Msb be the mass input
from source s to batches prior to batch b (both assumed to be multiples of as ). Let nsb
and Nsb be the number of pieces from source s input to batch b and input to batches
prior to b, respectively, that is, msb D nsb as and Msb D Nsb as . The sequential piece
positions in raw source s that are input to batch b are then the integers in the interval
For source s, denote the probability of carcass c being absent from the set Bsb as
Asc .Bsb /. Modelling the selection of pieces as being independent of the other pieces
that have already been selected from this carcass and other carcasses, this absence
probability is
The last term is present because it is included in both the previous terms but should
only be counted once.
Given that batch h is the hot batch and assuming the contamination is due to
a hot carcass in raw source s, then the probability that a particular carcass c from
source s is the hot carcass is a uniform probability depending on the total number of
carcasses, Csh from source s input to h:
1 ps
Prob.c from s is hot/ D : (6)
Csh nsh
The right hand expression in (6) is an upper bound on the probability since the
number of distinct carcasses present, Csh , will likely be more than nsh =ps , especially
if the spread of each carcass is large. A reasonable estimate for Csh might be to
include all carcasses c whose expected number of pieces in batch h is at least one,
that is Qsc .Bsh / 1=ps.
The contamination in batch h may be due to any of the raw sources that were
input for this batch and these raw sources may have varying degrees of relative
susceptibility to being contaminated. For example, the susceptibility factor, gs , for
raw source number s, might be near zero if the source is frozen material, and might
be one if the source is fresh material from the plant. Let fs be the fraction of fat in
250 P.M. Kitanov and A.R. Willms
raw source s. The probability that raw source s is the origin of the contamination in
batch h is the weighted fraction of the input mass, the weights being the product of
the susceptibility factors and the fat fractions:
gs fs msh
Prob.s is hot/ D PS : (7)
kD1 gk fk mkh
The probability that batch j is also contaminated given that batch h is contami-
nated is then found by summing over all raw sources:
Prob. j hot j h/ D
X
S X
Cs
Prob.s is hot/ Prob.c from s is hot/ Prob.c from s in h & j/: (8)
sD1 cD1
This expression can be evaluated using (4), (5), (6), and (7).
One aspect that has not been accounted for is the possibility that one carcass
may be present in more than one raw source. This could occur, for example, in a
production facility where one fresh lean bin is filled and removed from the trimming
line while a particular carcass has only partially been trimmed. In this case pieces
from one carcass will occur at the “top” of one raw source bin and the “bottom”
of the next, thus potentially spreading the contamination over a much wider area, if
this happens to be the hot carcass. The model could be modified to account for this
possibility if desired, but would require information about the order and means of
filling of the various raw sources.
3 Example
To illustrate the above model we present one example. These data are fictitious
but based on typical values one might encounter in a large ground beef production
facility. In this example, there are a total of S D 7 sources (three frozen lean, two
fresh lean, and two fresh fat), and a total of B D 14 one-tonne batches of ground
beef are produced. Relevant information for the sources is provided in Table 1. The
uniform distribution for F (K D 1, H0˙ D H1 D 1=.2L1/) was used for all raw
sources in this example. The mass from each source used in each batch is provided
in Table 2.
Using the above model, and letting each batch be the hot batch in turn,
probabilities of contamination for each batch were computed. The probability
that a particular carcass c in source s is the hot carcass, Prob.c from s is hot/,
was computed using the suggestion following (6), that is, counting the number
of carcasses in source s that are present in batch h as all those carcasses c with
Estimating E. coli Spread in Beef Production 251
Table 2 Source input mass, msb , (kg) and total fat percentage for each batch
Source
Frozen lean Fresh lean Fresh fat
Batch I II III IV V VI VII Fat %
1 312 136 552 25
2 384 52 564 25
3 114 404 260 222 25
4 262 239 231 268 25
5 201 205 89 293 212 25
6 320 180 292 100 108 15
7 407 105 284 204 15
8 390 456 154 15
9 300 205 325 170 15
10 209 211 543 37 10
11 293 132 536 39 10
12 318 94 540 48 10
13 479 454 67 10
14 701 226 73 10
Qsc .Bsh / 1=ps. Complete results are given in Table 3 and a selection of these are
plotted in Fig. 1.
The likelihood of other batches being contaminated is highly dependent on the
source input. In the example, if one of the early batches is the hot batch, then
the likelihood of contamination is only nonzero for batches near the hot batch.
Conversely, if one of the last batches is the hot batch, then a larger number of
other batches have a nonzero probability of being contaminated. This is due to
the source configuration shown in Tables 1 and 2. Since the contamination is most
likely to be carried in the fatty sources (VI and VII) followed by the lean fresh
source (IV and V), the distribution of these sources across the batches is a primary
contributor to the contamination probability distribution. The other factor we found
to be very important was the values of L1s . If these spread indicators were small,
then the contamination was much more confined to nearby batches to the hot batch.
252 P.M. Kitanov and A.R. Willms
Table 3 Probability of contamination for each batch in percent. Each column corresponds to a
different hot batch
Hot batch
Batch 1 2 3 4 5 6 7 8 9 10 11 12 13 14
1 99 47 6 0 0 0 0 0 0 0 0 0 0 0
2 62 99 34 13 0 0 0 0 0 0 0 0 0 0
3 5 46 100 65 35 3 0 0 0 0 0 0 0 0
4 0 21 79 100 72 47 19 0 0 0 0 0 0 0
5 0 0 38 66 100 81 47 18 2 0 0 0 0 0
6 0 0 3 34 63 98 69 34 12 0 0 0 0 0
7 0 0 0 12 24 48 100 66 32 6 6 5 2 0
8 0 0 0 0 11 24 66 100 60 24 14 15 15 13
9 0 0 0 0 1 8 37 66 100 63 34 26 29 30
10 0 0 0 0 0 0 17 39 72 100 66 30 32 34
11 0 0 0 0 0 0 13 28 49 60 100 62 35 38
12 0 0 0 0 0 0 8 23 39 20 50 100 64 43
13 0 0 0 0 0 0 3 18 34 17 21 57 100 74
14 0 0 0 0 0 0 0 12 28 14 18 27 67 100
100
80
Probability %
60
40
20
0
2 5 8 11 14
Batch
Fig. 1 Probability of contamination for each batch given that a fixed batch is contaminated (hot).
The five separate curves correspond to batches 2,5,8,11, and 14 being the hot batch
The overall result then, is the obvious observation that if one wishes to restrict
contamination, then one should restrict the spread of each carcass within the raw
source, and restrict the spread of the raw source across batches. In other words, try
to make it so that one carcass is only present in one batch.
Estimating E. coli Spread in Beef Production 253
4 Conclusion
We believe that the proposed model may help to reduce economic losses in the beef
industry. To our knowledge, this is a novel method for estimating of the probability
of E. coli contamination in the production of ground beef. Due to the necessarily
cautious food safety regulations, in order for this model to be adopted by regulatory
agencies, it would need to be further refined to account for plant-specific processes,
and its predictions thoroughly tested.
Most of the input to the model is easily obtained from production records, or
easily estimated (such as the average size of pieces). The most difficult input values
to estimate are the spread parameters, K, L, and H ˙ , however, some knowledge
of these values could be obtained either through detailed observations of the plant
processes or by using genetic sampling experiments in the raw sources as well as
the final ground beef product. A useful next step would be to use some type of
innocuous surrogate for E. coli that could be applied to pieces from a particular
carcass and then identified in the final product batches. This would allow for better
determination of carcass spread within a raw source and would provide data for
direct validation of the model.
Further development of the model, allowing for each carcass to have different
size pieces, and allowing for carcasses to be present in more than one raw source, is
currently being completed [13]. This extended work also incorporates genetic typing
data from a production facility to help inform the choice of carcass distribution
function.
Acknowledgements The second author was supported by a grant from the Applied Livestock
Genomics Program of Genome Alberta.
References
1. Aslam, M., Greer, G.G., Nattress, F.M., Gill, C.O., McMullen, L.M.: Genotypic analysis of
Escherichia coli recovered from product and equipment at a beef-packing plant. J. Appl.
Microbiol. 97, 78–86 (2004)
2. Aslam, M., Nattress, F.M., Greer, G.G., Yost, C., Gill, C.O., McMullen, L.: Origin of
contamination and genetic diversity of Eschericia coli in beef cattle. Appl. Environ. Microbiol.
69(5), 2794–2799 (2003)
3. Bell, R.G.: Distribution and sources of microbial contamination on beef carcasses. J. Appl.
Microbiol. 82, 292–300 (1997)
4. Cassin, M.H., Lammerding, A.M., Todd, E.C.D., Ross, W., McColl, R.S.: Quantitative risk
assessment for Escherichia coli O157:H7 in ground beef hamburgers. Int. J. Food Microbiol.
41(1), 21–44 (1998)
5. Duffy, G., Butler, F., Cummins, E., O’Brien, S., Nally, P., Carney, E., Henchion, M.,
Mahone, D., Cowan, C.: E. coli O157:H7 in beef burgers produced in the Republic of Ireland:
a quantitative microbial risk assessment. Tech. rep., Ashtown Food Research Centre, Teagasc,
Dublin (2006)
254 P.M. Kitanov and A.R. Willms
6. Duffy, G., Cummins, E., Nally, P., O’Brien, S., Butler, F.: A review of quantitative microbial
risk assessment in the management of Escherichia coli O157:H7 on beef. Meat Sci. 74(1),
76–88 (2006)
7. Ebel, E., Schlosser, W., Kause, J., Orloski, K., Roberts, T., Narrod, C., Malcolm, S.,
Coleman, M., Powell, M.: Draft risk assessment of the public health impact of Escherichia
coli O157:H7 in ground beef. J. Food Prot. 67(9), 1991–1999 (2004)
8. Scallan, E., Hoekstra, R.M., Angulo, F.J., Tauxe, R.V., Widdowson, M.A., Roy, S.L.,
Jones, J.L., Griffin, P.M.: Foodborne illness acquired in the United States – major pathogens.
Emerg. Infect. Dis. 17(1), 7–15 (2011)
9. Signorini, M., Tarabla, H.: Quantitative risk assessment for verocytotoxigenic Escherichia coli
in ground beef hamburgers in Argentina. Int. J. Food Microbiol. 132(2–3), 153–161 (2009)
10. Smith, B.A., Fazil, A., Lammerding, A.M.: A risk assessment model for Escherichia coli
O157:H7 in ground beef and beef cuts in canada: evaluating the effects of interventions. Food
Control 29, 364–381 (2013)
11. Tuttle, J., Gomez, T., Doyle, M.P., Wells, J.G., Zhao, T., Tauxe, R.V., Griffin, P.M.: Lessons
from a large outbreak of Escherichia coli O157:H7 infections: insights into the infectious dose
and method of widespread contamination of hamburger patties. Epidemiol. Infect. 122(2), 185–
192 (1999)
12. Wang, X., Gautam, R., Pinedo, P.J., Allen, L.J.S., Ivanek, R.: A stochastic model for
transmission, extinction and outbreak of Escherichia coli O157:H7 in cattle as affected by
ambient temperature and cleaning practices. J. Math. Biol. (2013). doi:10.1007/s00285-013-
0707-1
13. Willms, A.R., Kitanov, P.M.: Probability of Escherichia coli contamination spread in ground
beef production (2016, submitted)
14. Yang, X., Badoni, M., Youssef, M.K., Gill, C.O.: Enhanced control of microbiological
contamination of product at a large beef packing plant. J. Food Prot. 75(1), 144–149 (2012)
15. Zhang, X.S., Chase-Topping, M.E., McKendrick, I.J., Savill, N.J., Woolhouse, M.E.J.: Spread
of Escherichia coli O157:H7 infection among Scottish cattle farms: Stochastic models and
model selection. Epidemics 2, 11–20 (2010)
The Impact of Movement on Disease Dynamics
in a Multi-city Compartmental Model Including
Residency Patch
Diána Knipl
Abstract The impact of population dispersal between two cities on the spread of a
disease is investigated analytically. A general SIRS model is presented that tracks
the place of residence of individuals, allowing for different movement rates of local
residents and visitors in a city. Provided the basic reproduction number is greater
than one, we demonstrate in our model that increasing the travel volumes of some
infected groups may result in the extinction of a disease, even though the disease
cannot be eliminated in each city when the cities are isolated.
1 Introduction
The spatial spread of infectious diseases has been observed many times in history.
Most recent examples include the 2002–2003 SARS epidemic in Asia and the global
spread of the 2009 pandemic influenza A(H1N1). The Middle East Respiratory
Syndrome coronavirus (MERS-CoV) outbreak emerged in 2012, and West Africa is
currently witnessing the extensive Ebola virus (EBOV) outbreak, that pose a global
threat. There is an increasing interest in the mathematical modelling literature for
the spread of epidemics between discrete geographical locations (patches, or cities).
Such metapopulation models incorporate single or multiple species occupying
multiple spatial patches that are connected by movement dependent or independent
of disease status. Such models have been discussed for an array of infectious
diseases including measles and influenza, by Arino and coauthors [2–5], Sattenspiel
D. Knipl ()
Agent-Based Modelling Laboratory, 331 Lumbers, York University, 4700 Keele St., Toronto, ON,
M3J 1P3, Canada
MTA–SZTE Analysis and Stochastic Research Group, University of Szeged, Aradi vértanúk
tere 1, Szeged, H-6720, Hungary
Current Institution: Department of Mathematics, University College London, Gower Street,
London, WC1E 6BT, UK
e-mail: [email protected]; [email protected]; [email protected]
and coauthors [14, 15], Wang and coauthors [9, 13, 19, 20]. The work of Arino [1],
and Arino and van den Driessche [6] provide a thorough review of the literature.
When considering intervention strategies for epidemic models, our attention is
focused on the basic reproduction number R 0 , which is the expected number of
secondary cases generated by a typical infected host introduced into a susceptible
population. This quantity serves as a threshold parameter for disease elimination; if
R 0 < 1 then the disease dies out when a small number of infected individuals is
introduced whereas if R 0 > 1 then the disease can persist in the population. The
above mentioned works illustrate that in metapopulation models R 0 often arises
as a complicated formula of the model parameters. Such models include multiple
infected classes, and individuals’ movement makes it challenging to compute the
number of new infections generated by an infected case, and to understand the
dependence of R 0 on the movement rates. To calculate R 0 in metapopulation
models, the next-generation method is used (see Diekmann et al. [7]).
The models in [4, 5, 14, 15] include residency patch, that is, these models keep
track of the patch of origin of an individual as well as where an individual is
at a given time (either as resident, or as visitor). There are many reasons why
individuals should be distinguished in an epidemic model by their residential
statuses; visitors and local residents may have very different contact rates and
mixing patterns, but more significantly, these groups are different in their travel rates
because in reality, a large part of outbound travels from a city are return trips. In the
above works, the basic reproduction number was calculated and its dependence on
the movement rates was studied numerically. Some complicated behavior of R 0
in these parameters was highlighted in [1, 2, 4]: numerical simulations suggest
that when the infection is present in same patches but absent in others without
movement, then travel with small rates can allow for disease persistence in the
metapopulation although higher travel rates can drive the disease to extinction.
In this work we present a demographic SIRS epidemic metapopulation model
in two cities, and analytically investigate the impact of individuals’ movement
between the two cities on the disease dynamics. In each city we distinguish residents
from visitors, and consider the general situation when individuals with different
disease statuses and residential statuses have different movement rates. In our
analysis we utilize the concept of the target reproduction number, developed by
Shuai et al. in [16, 17]. This quantity measures the effort required to eliminate
infectious diseases, when an intervention strategy is targeted at single entries
or sets of such entries of a next-generation matrix. Focusing on the control of
infected individuals’ movement between the two cities—an intervention strategy
often applied in pandemic situations—we give conditions and describe how the
travel rate of a specific group or some of these groups should be changed to prevent
an outbreak.
The Impact of Movement in an Epidemic Model with Residency Patch 257
2 Model Formulation
For the recruitment term j into the susceptible resident population we assume that
j is a function of the populations Njr and Nkv (k ¤ j), that is, the populations with
origin in city j. We denote by mSm Im Rm
kj , mkj , and mkj the travel rate of susceptible,
infected, and recovered individuals, respectively, with residential status m in city
j travelling to city k. Based on the assumptions formulated above, we obtain the
following system of differential equations for the disease transmission in city j:
dSrj Sr I r Sr I v
dt D j .Njr ; Nkv / ˇjrr N r CN
j j
v ˇj
rv j j r r r Sr r Sv v
N r CN v dj Sj C j Rj mkj Sj C mjk Sk ;
j j j j
dIjr Sr I r Sr I v Iv v
dt D ˇjrr N r CN
j j
v C ˇj
rv
N r CN v .j C dj /Ij mkj Ij C mjk Ik ;
j j r Ir r
j j j j
dRrj Rv v
dt D j Ijr .jr C dj /Rrj mRr
kj Rj C mjk Rk ;
r
dSvj Sv I r Sv I v
dt
D ˇjvr N r CN
j j vv j j
v ˇj
N r CN v
dk Sjv C jv Rvj mSv v
kj Sj C mjk Sk ;
Sr r
j j j j
dIjv Sv I r Svj Ijv
dt
D ˇjvr N r CN
j j vv
v C ˇj
Njr CNjv
.j C dk /Ijv mIv v
kj Ij C mjk Ik ;
Ir r
j j
dRvj
dt D j Ijv .jv C dk /Rrj mRv v
kj Rj C mjk Rk :
Rr r
(1)
258 D. Knipl
Standard arguments from the theory of differential equations guarantee that the
system (1) is well posed. The function forming the right hand side of the system
is Lipschitz continuous, which implies the existence of a unique solution. The
derivative of each system variable is nonnegative when the variable is zero, hence
solutions remain nonnegative for nonnegative initial data. For the dynamics of the
total population with origin in city j, we obtain the equation
dNjo
D j .Njr ; Nkv / dj .Njr C Nkv /; k ¤ j:
dt
If j .Njr ; Nkv / D dj .Njr C Nkv / then the population with origin in j is constant. For
constant recruitment term j it is easy to derive that NO oj D j =dj gives the unique
equilibrium of Njo . With fixed N1o and N2o it is obvious from nonnegativity that the
solutions of the system (1) are bounded. The model is at an equilibrium if the time
derivatives in the system (1) are zero. At a disease-free equilibrium it holds that
I1r D I1v D I2r D I2v D 0 that implies Rr1 D Rv1 D Rr2 D Rv2 D 0. Thus at a DFE S1r ,
S1v , S2r , S2v satisfy
Hence if N1o and N2o are fixed then using that 1 D d1 N1o and 2 D d2 N2o , it follows
that
r 1
S1 d1 C mSr21 mSv
12 d1 N1o
D ;
S2v mSr
21 d1 C mSv12 0
r 1
S2 d2 C mSr12 mSv
21 d2 N2o
D :
S1v mSr
12 d2 C mSv21 0
For the stability of the DFE in the full model (1) we linearize the subsystem of (1)
that consists of the equations for I1r , I1v , I2r , and I2v —the infected subsystem—about
The Impact of Movement in an Epidemic Model with Residency Patch 259
J D B G M:
2 ˇ1rr N1r ˇ1rv N1r
3
N1r CN1v N1r CN1v 0 0 2 Ir 3
6 7 m21 0 0 mIv 12
6 ˇ1vr N1v ˇ1vv N1v 7
6 0 0 7 6 0 mIv Ir
0 7
N1r CN1v N1r CN1v 6 21 m12 7;
BD6 ˇ2rv N2r 7 ; M D 4
6 0 0
ˇ2rr N2r
7 0 m21 m12
Iv Ir
0 5
4 N2r CN2v N2r CN2v 5
0 0
ˇ2vr N2v ˇ2vv N2v mIr
21 0 0 mIv
12
N2r CN2v N2r CN2v
3 Main Results
Using the definition of G and the transmission matrix F0 , we introduce the quantities
where R mj denotes the expected number of new cases in city j when a single infected
individual with residential status m who doesn’t travel is introduced into city j.
Consider the matrices F1 D B M C diag.mIr 21 ; m21 ; m12 ; m12 / and V1 D
Iv Ir Iv
A standard result for nonnegative matrices (see, e.g., [12, Theorem 1.1]) says that
the dominant eigenvalue of a nonnegative matrix is bounded below and above by
the minimum and maximum of its column sums. We look at the column sums of K1
to give upper and lower bounds on the dominant eigenvalue. The column sum in the
ˇ1rr N1r Cˇ1vr N1v CmIr
21
first column is .mIr v , and using basic calculus we derive that
21 Cg1 /.N1 CN1 /
r r
ˇ1rr N1r Cˇ1vr N1v CmIr ˇ1rr N1r Cˇ1vr N1v ˇ1rr N1r Cˇ1vr N1v
1< .mIr v
21
gr1 .N1r CN1v / if .N1r CN1v / gr1 > 0 , R r1 > 1;
21 Cg1 /.N1 CN1 /
r r
ˇ1rr N1r Cˇ1vr N1v ˇ1rr N1r Cˇ1vr N1v CmIr ˇ1rr N1r Cˇ1vr N1v
gr1 .N1r CN1v /
.mIr v
21
<1 if .N1r CN1v /
gr1 < 0 , R r1 < 1:
21 Cg1 /.N1 CN1 /
r r
The Impact of Movement in an Epidemic Model with Residency Patch 261
Similar results follow for the second, third, and fourth columns. Thus if R r1 > 1,
R v1 > 1, R r2 > 1, and R v2 > 1 hold then all column sums are greater than 1 for any
mIr Iv Ir Iv
21 , m21 , m12 , and m12 , that implies by Proposition 2 that the dominant eigenvalue
of K1 is greater than 1 and the DFE is unstable. On the other hand, if the above
inequalities are reversed then the column sums are less than 1 for any movement
rates and the DFE is stable by .K1 / < 1. t
u
Next, we investigate some cases when changing the movement rates of some
groups can stabilize the DFE. We construct the matrix K2 WD F2 V21 , where F2 is
formed as we let ŒF2 1;1 D ŒF1 1;1 gr1 and ŒF2 i;j D ŒF1 i;j if .i; j/ ¤ .1; 1/, and
v v
V2 D diag.mIr21 ; g1 C rrmIv ; gr2 C mIr
12 ; g2 C m12 /. V2 is a non-singular M-matrix and
Iv
21
ˇ N r
F2 is nonnegative if N r1CN1v > gr1 . This condition is equivalent to when the number of
1 1
new infections amongst residents of city 1 is less than 1, when an infected resident
who doesn’t travel is introduced into city 1. The alternative NGM is computed as
2 3
ˇ1rr N1r gr1 ˇ1rv N1r mIv
v v v 0 12
v
6 mIr 7
r Ir
.N
21 1 CN 1 / m21 .mIv
21 Cg r
1 /.N1 CN1 / .mIv
12 Cg2 /
6 ˇ1vr N1v ˇ1vv N1v mIr 7
6 v v v
12
0 7
K2 D F2 V2 D 6
1 7;
Ir r
m21 .N1 CN1 / .mIv r
21 Cg1 /.N1 CN1 / .mIr
12 Cg2 /
r
6 mIv rr r
ˇ2 N2 ˇ2rv N2r 7
6 0 21
v 7
4 .mIv
21 Cg1 /
v
.mIr r r v
12 Cg2vr/.Nv2 CN2 / .m12 Cg2 /.N2 CN2 / 5
Iv v
vv v
r
ˇ2 N2 ˇ2 N2
1 0 .mIr r r v
.mIv v r v
12 Cg2 /.N2 CN2 / 12 Cg2 /.N2 CN2 /
which is irreducible. Denote by L2 the matrix that is formed by replacing ŒK2 1;1 and
ŒK2 2;1 in K2 by 0. Observe that K2 converges to L2 as mIr
21 goes to infinity. We show
that the disease can be eliminated by controlling only the travel rate of the residents
of a single city.
ˇ1rr N1r
Theorem 2 Assume that R 0 > 1, that is, the DFE is unstable. If N1r CN1v
> gr1 and
ˇ N
rr r
.L2 / < 1 then increasing mIr
21 can stabilize the DFE. In particular, if N r1CN1v > gr1
1 1
and R v1 < 1, R r2 < 1, and R v2 < 1, then increasing mIr
21 can stabilize the DFE.
Proof We utilize some terminology and results from [16, 17]. Let S D
f.1; 1/; .2; 1/g, and define the 4 4 matrix K2S as ŒK2S i;j D ŒK2 i;j if .i; j/ 2 S and 0
S
otherwise. Note that S identifies the set of elements in K2 that depend on mIr 21 , and K2
Ir
contains elements of K2 that are subject to change when m21 is targeted. Following
the terminology of [16] it is thus meaningful to refer to S as the target set and to K2S
as the target matrix. Note that L2 D K2 K2S , hence the condition .L2 / < 1 implies
that .K2 K2S / < 1, that is, the controllability condition holds and it is possible to
stabilize the DFE by controlling only the elements in S [16].
We compute T S D .K2S .I K2 C K2S /1 /, the number referred to as the target
reproduction number in [16]. Here I denotes the 4 4 identity matrix. Let .mIr 21 / D
c
m21 T S , where we denote by .m21 / the controlled travel rate of infected residents
Ir Ir c
of city 1 travelling to city 2. It follows from Corollary 1 and [16, Theorem 2.1] by
R 0 > 1 that .mIr 21 / > m21 . The matrix K2 , constructed as we replace m21 in K2 by
c Ir c Ir
262 D. Knipl
.mIr
21 / , satisfies .K2 / D 1 by [16, Theorem 2.2], which means that the disease can
c c
v L2 D 1 v;
From the fourth inequality and v4 D v1 it follows that v3 > v4 , which together with
the third inequality implies v2 > v3 > v4 , but v1 > v2 by the second inequality, a
contradiction to v1 D v4 . The proof is complete. t
u
To reveal the impact of visitors’ travel, a result analogous to Theorem 2 can be
formulated. The proof of the following theorem follows by similar arguments to
those in Theorem 2.
ˇ1vv N1v
Theorem 3 Assume that R 0 > 1, that is, the DFE is unstable. If N1r CN1v
> gv1 , and
R r1 < 1, R r2 < 1, and R v2 < 1, then increasing mIv
21 can stabilize the DFE.
Lastly, we give conditions under which controlling outbound travel from one
city is sufficient for disease elimination. Consider two matrices F3 and V3 , defined
as ŒF3 1;1 D ŒF1 1;1 gr1 , ŒF3 2;2 D ŒF1 2;2 gv1 , and ŒF3 i;j D ŒF1 i;j otherwise, and
v
V3 D diag.mIr 21 ; m 21 ; g2 C m12 ; g2rrCr m12 /. V3 is a non-singular M-matrix and F3 is
Iv r Ir Iv
vv v
ˇ N ˇ N
nonnegative if N r1CN1v > gv1 and N r1CN1v > gr1 . The following theorem concerns about
1 1 1 1
whether changing the movement rates of the current population of one city can lead
to disease eradication.
ˇ1rr N1r
Theorem 4 Assume that R 0 > 1, that is, the DFE is unstable. If N1r CN1v > g1 and
r
ˇ1vv N1v
> gv1 but R r2 < 1 and R v2 < 1, then increasing mIr
N1r CN1v 21 and mIv
21 can stabilize
the DFE.
Proof The proof is similar to the proof of Theorem 2. We compute the alternative
NGM
2 3
ˇ1rr N1r gr1 ˇ1rv N1r mIv
v v 0 12
v
6 21 1 vr 1 v
mIr
.N r
CN / mIr
21 m Iv r
21 .N1 CN1 / .mIv
12 Cg2 / 7
6 ˇ1vv N1v gv1 mIr 7
6 mIr ˇ.N1 rNCN 1
12
0 7
K3 D F3 V31 D6 6 21 1
v
1/ mIv r
21 .N1 CN1 /
v
mIv
21 .mIr
12rrCg
r
2/ 7;
ˇ2 N2r ˇ2rv N2r 7
6 0 1 .m12 Cg2 /.N2 CN2v / v v 7
4 Ir r r
.m12 Cg2 /.N2 CN2 / 5
Iv r
ˇ2vr N2v vv v
ˇ2 N2
1 0 .mIr r r v
.mIv v r v
12 Cg2 /.N2 CN2 / 12 Cg2 /.N2 CN2 /
The Impact of Movement in an Epidemic Model with Residency Patch 263
which is irreducible, and define the target set U by identifying the entries of K3 that
depend on mIr 21 and/or m21 . We let U D f.1; 1/; .1; 2/; .2; 1/; .2; 2/g, and define the
Iv
4 4 target matrix K3 as ŒK3U i;j D ŒK3 i;j if .i; j/ 2 U and 0 otherwise. Note that
U
.K3 / > 1 holds by R 0 > 1. However, the result in [12, Theorem 1.1] on the upper
bound of the dominant eigenvalue implies that .K3 K3U / 1.
Assume that .K3 K3U / D 1, that is, 1 is an eigenvalue of K3 K3U . Then there
is a left eigenvector v D Œv1 ; v2 ; v3 ; v4 such that
v .K3 K3U / D 1 v
so v4 > v3 and v3 > v4 hold by the third and fourth inequalities, a contradiction. We
showed that .K3 K3U / < 1, which means that there is a potential to control mIr 21 and
mIv
21 in a way such that the dominant eigenvalue of the controlled matrix drops below
1 (by decreasing targeted entries of K3 to values close to 0). This condition also
allows us to compute the target reproduction number T U D .K3U .I K3 CK3U /1 /.
By [16, Theorem 2.2], the controlled matrix K3c satisfies .K3c / D 1 where K3c is
formed by replacing ŒK3 i;j by ŒK3 i;j =T U if .i; j/ 2 U, that is achieved by replacing
21 by .m21 / D m21 T U , and m21 by .m21 / D m21 T U . Note that T U > 1 by [16,
mIr Ir c Ir Iv Iv c Ir
Theorem 2.2], which means that the disease can be eradicated by increasing mIr 21 and
mIv
21 . t
u
In the case of transmission coefficients equal for all populations present in a city,
recovery rates equal for all populations and death rates equal for all populations,
R r1 and R v1 reduce to ˇ1 =. C d/, and R r2 and R v2 reduce to ˇ2 =. C d/. Note
that these quantities give the expected number of secondary infections generated by
a single infected case in city 1 and city 2, respectively, in the absence of movement
between the cities. Hence the local reproduction numbers in city 1 and city 2 can be
defined as we consider our model without dispersal:
ˇ1 ˇ2
R loc
1 D ; R loc
2 D :
Cd Cd
4 Discussion
References
1. Arino, J.: Diseases in metapopulations. In: Modeling and Dynamics of Infectious Diseases.
Series in Contemporary Applied Mathematics, vol. 11, pp. 65–123. Higher Education Press,
Beijing (2009)
2. Arino, J., Davis, J.R., Hartley, D., Jordan, R., Miller, J.M., van den Driessche, P.: A multi-
species epidemic model with spatial dynamics. Math. Med. Biol. 22(2), 129–142 (2005)
3. Arino, J., Jordan, R., van den Driessche, P.: Quarantine in a multi-species epidemic model with
spatial dynamics. Math. Biosci. 206(1), 46–60 (2007)
4. Arino, J., van den Driessche, P.: A multi-city epidemic model. Math. Popul. Stud. 10(3), 175–
193 (2003)
5. Arino, J., van den Driessche, P.: The basic reproduction number in a multi-city compartmental
epidemic model. In: Positive Systems, pp. 135–142 Springer, Berlin/Heidelberg (2003)
6. Arino, J., van den Driessche, P.: Disease spread in metapopulations. In: Nonlinear Dynamics
and Evolution Equations, vol. 48, pp. 1–13. American Mathematical Society, Providence
(2006)
7. Diekmann, O., Heesterbeek, J.A.P., Metz, J.A.J.: On the definition and computation of the basic
reproduction ratio R0 in models for infectious diseases in heterogeneous populations. J. Math.
Biol. 28, 365–382 (1990)
The Impact of Movement in an Epidemic Model with Residency Patch 265
8. Fiedler, M.: Special Matrices and Their Applications in Numerical Mathematics. Martinus
Nijhoff Publishers, Dodrecht (1986)
9. Jin, Y., Wang, W.: The effect of population dispersal on the spread of a disease. J. Math. Anal.
Appl. 308(1), 343–364 (2005)
10. Knipl, D.: A new approach for designing disease intervention strategies in metapopulation
models. J. Biol. Dyn. 10(1), 71–94 (2016). http://dx.doi.org/10.1080/17513758.2015.1107140
11. Knipl, D.H., Röst, G., Wu, J.: Epidemic spread and variation of peak times in connected regions
due to travel related infections—dynamics of an anti-gravity type delay differential model.
SIAM J. Appl. Dyn. Syst. 12(4), 1722–1762 (2013)
12. Minc, H.: Nonnegative Matrices. Wiley Interscience, New York (1988)
13. Ruan, S., Wang, W., Levin, S.A.: The effect of global travel on the spread of SARS. Math.
Biosci. Eng. 3(1), 205 (2006)
14. Sattenspiel, L., Dietz, K.: A structured epidemic model incorporating geographic mobility
among regions. Math. Biosci. 128(1), 71–91 (1995)
15. Sattenspiel, L., Herring, D.A.: Simulating the effect of quarantine on the spread of the 1918–19
flu in central Canada. Bull. Math. Biol. 65(1), 1–26 (2003)
16. Shuai, Z., Heesterbeek, J.A.P., van den Driessche, P.: Extending the type reproduction number
to infectious disease control targeting contacts between types. J. Math. Biol. 67(5), 1067–1082
(2013)
17. Shuai, Z., Heesterbeek, J.A.P., van den Driessche, P.: Erratum to: extending the type repro-
duction number to infectious disease control targeting contacts between types. J. Math. Biol.
71(1), 1–3 (2015)
18. Van den Driessche, P., Watmough, J.: Reproduction numbers and sub-threshold endemic
equilibria for compartmental models of disease transmission. Math. Biosci. 180(1), 29–48
(2002)
19. Wang, W., Mulone, G.: Threshold of disease transmission in a patch environment. J. Math.
Anal. Appl. 285(1), 321–335 (2003)
20. Wang, W., Zhao, X.Q.: An epidemic model in a patchy environment. Math. Biosci. 190(1),
97–112 (2004)
A Chemostat Model with Wall Attachment:
The Effect of Biofilm Detachment Rates
on Predicted Reactor Performance
1 Introduction
Bacterial biofilms are layers on immersed surfaces that form wherever environ-
mental conditions sustain microbial growth. They play an important role in several
environmental engineering applications, most notably in wastewater treatment [12],
where several technologies have been designed based on biofilm properties. An
important part of the biofilm life cycle is detachment, or dispersal, the transfer of
biomass from the biofilm into the aqueous phase [3, 10]. Several triggers for this
phenomenon have been identified, including external factors, such as shear forces, or
internal factors, such as weakening of the EPS matrix and quorum sensing signaling
mechanisms [11, 13]. Several attempts to incorporate detachment into mesoscale
mathematical models of biofilms have been suggested in the literature, both in the
traditional 1D Wanner-Gujer biofilm model and its simplification, e.g. [2, 8, 11, 16],
and in two- and three-dimensional biofilm models, e.g. [4–6, 18].
It is clear that the mesoscopic description of biofilm detachment strongly affects
the mesoscopic biofilm structure predicted by these models. What is less clear is
to which extent the mesoscopic description of biofilm detachment affects global
parameters that assess reactor performance. For the setting of biofilms in a porous
A. Masic
EAWAG, Überlandstrasse 133, 8600 Dübendorf, Switzerland
e-mail: [email protected]
H.J. Eberl ()
University of Guelph, 50 Stone Rd E, Guelph, ON N1G2W1, Canada
e-mail: [email protected]
medium, a partial answer was given in [1], where a multi-scale model was obtained
by upscaling a Wanner-Gujer type biofilm model with four different detachment
criteria to the reactor scale; it was found that the particular choice of the mesoscopic
detachment rate does not affect the macroscopic description. Here we are interested
in the question whether for a continuous stirred tank reactor (CSTR) with wall
attached and suspended growth the particular description of biofilm detachment
affects the effluent substrate concentration predicted by the model. Models of this
type arise in the modeling of wastewater treatment processes where both biofilms
and nonsessile bacteria are present and contribute to the substrate degradation
process. In the focus of our interest is the case where the reactor per se is designed
as a biofilm reactor, in which suspended biomass occurs as a side effect through the
exchange of biomass between biofilm and aqueous phase.
2 Mathematical Model
We cast a simple model for a continuous stirred tank reactor with suspended and
wall attached growth in terms of the dependent variables substrate concentration
S [gm3 ], suspended biomass u [g] and biofilm thickness [m]. Following [9], it
reads
Here, D [d1 ] is the dilution rate, Sin [gm3 ] the inflow substrate concentration,
[-] the yield coefficient, ku [d1 ] the cell death rate for suspended bacteria, and ˛
[d1 ] is the rate at which suspended bacteria attach to the biofilm, V [m3 ] is the
reactor volume and A [m2 ] the colonizable surface area. The biomass density in the
biofilm is [gm3 ].
In (3), the function v D v.z; t/ [md1 ] denotes the growth induced velocity of the
biomass at a location z in the biofilm. Due to the incompressibility assumption that
the biomass density is constant across the biofilm, biofilm expansion is essentially
equivalent to biomass growth. Velocity v is obtained as the integral of the biomass
production rate
Z z
v.z; t/ D . .C.// k /d; (4)
0
The substrate dependent bacterial growth rates are defined via Monod kinet-
ics, i.e.
max
u S max
C.z/
u .S/ D ; .C.z// D ; (5)
Ku C S K C C.z/
where max
u ;
max
[d1 ] are the maximum specific growth rates, Ku ; K [gm3 ] the
half-saturation concentrations and C.z/ [gm3 ] denotes the substrate concentration
in the biofilm at thickness z [m] from the substratum. It is obtained as the solution
of the two-point boundary value problem
Dc C00 .z/ D .C.z//; C0 .0/ D 0; C./ D S: (6)
Here Dc [m2 d1 ] is the diffusion coefficient. The boundary condition at the
substratum, z D 0, describes that substrate does not leave the reactor through the
walls, while the boundary condition at z D implies that external mass transfer
resistance at the biofilm/water interface is neglected. In (6) we used that substrate
diffusion is a much faster process than biofilm growth, i.e. that (6) can be considered
in a quasi-steady state.
In (1), the sink J [gd1 ] denotes the substrate flux from the aqueous phase into
the biofilm, i.e.
dC
J.S; / D ADc ./: (7)
dz
d./ D E1 ; (8)
leading to a quadratic sink term in (3); E1 [d1 m1 ] is the erosion or detachment
parameter. This traditional detachment model was the only one used in [9]. Another
detachment rate function that is found in the literature is to assume a constant rate, i.e
d./ D E2 ; (9)
which leads to a first order sink term with erosion parameter E2 [d1 ].
It is often assumed that the detachment rate depends also on the hydraulic
conditions in the reactor, which determine shear forces acting on the biofilm.
Therefore, one can correlate E1;2 with D, see below in Sect. 3.
We assume all model parameters to be positive.
270 A. Mašić and H.J. Eberl
First we formally re-write our model as an ordinary initial value problem. Note
that integrating (6) once and using the boundary conditions gives
Z
dC
./ D .C.z//dz: (10)
dz Dc 0
We define
( R
Dc 0 .C.z//dz; >0
j.; S/ WD (11)
0 D 0:
Note that C.z/ is indirectly a function of S due to the boundary condition in (6),
therefore also j is a function of S. Then (1), (2), (3), (4), (5), (6), and (7) becomes
1 uu .S/
SP D D.Sin S/ C ADc j.; S/ (12)
V
uP D u.u .S/ D ku / C Ad./ ˛u (13)
Dc ˛u
P D j.; S/ k C d./: (14)
A
S @j S
.0; S/ ; (15)
K C S @ K
max
where D
Dc and K is the half-saturation coefficient from (5).
Proposition 1 The initial value problem of (12), (13) and (14) with non-negative
initial data possesses a unique non-negative solution for all t > 0. There is no time
interval .t1 ; t2 /, 0 < t1 < t2 , over which a non-trivial solution exists with either
u 0 or 0.
Proof (sketch) The function j.; S/, and thus the system (12), (13) and (14) is well-
defined. The tangent criterion of [15] in the usual way can be used to confirm the
positive invariance of the non-negative cone. In the non-negative cone the system
satisfies a Lipschitz condition, which implies existence and uniqueness. An upper
estimate for the solutions can be constructed by the differential inequality techniques
Biofilm Detachment in a Chemostat with Wall Attachment 271
from a linear combination of the model equations, more specifically, an upper bound
can be derived for VS.t/ C u.t/ C A.t/ which then, using non-negativity, implies
upper estimates on each of S.t/; u.t/; .t/. The last statement in the assertion follows
directly from (13) and (14). t
u
Proposition 2 The washout equilibrium .Sin ; 0; 0/ always exists. It is unstable if
at least one of u .Sin / D ku ˛ and Dc @ @j
.0; Sin / d.0/ k is positive;
if both expressions are
negative then the washoutequilibrium is stable if
WD
@j
u .Sin / D ku ˛ Dc @ .0; Sin / d.0/ k ˛d.0/ > 0 and unstable if
the inequality is reversed.
Proof It is easily verified that the trivial equilibrium E0 D .Sin ; 0; 0/ always exists.
To determine the stability of the equilibrium we calculate the Jacobian J.Sin ; 0; 0/
of the right hand side of (12), (13) and (14). Using Lemma 1(a),(b) we find
0 1
uV
.S / c @j
in
V @ .0; S /
AD in
D
B C
J.Sin ; 0; 0/ D @ 0 u .Sin / D ku ˛ Ad.0/ A (16)
˛ Dc @j
0 A @ .0; S in
/ d.0/ k
We distinguish now between three cases: (i) if j22 > 0; j33 > 0 then the trace of this
sub-matrix is positive, hence at least one eigenvalue has positive real part and the
equilibrium is unstable. (ii) if j22 < 0; j33 > 0 or vice versa, then the sub-matrix has a
negative determinant and hence one positive and one negative eigenvalue, implying
instability. (iii) if j22 < 0; j33 < 0 then the trace of the sub-matrix is negative and its
determinant is obtained as
Dc @j
D u .S / D ku ˛
in
.0; S / d.0/ k ˛d.0/;
in
(18)
@
(but not necessary) for stability of the washout equilibrium, whereas the inequality
max
S
in
.u .Sin / D ku ˛/. K
d.0/ k / < ˛d.0/ is sufficient for its instability.
Remark 2 For detachment rate functions with d.0/ D 0, such as (8), the above
analysis simplifies. The eigenvalues of J.Sin ; 0; 0/ are then its diagonal elements and
case (iii) above will always be stable. The stability results for cases (i), (ii) are the
same but follow immediately from the sign of the diagonal entries. This implies that
the answer to the question whether a biofilm can be established in the CSTR with
wall attached and suspended growth can depend on the detachment criterion used
in the modeling study. Whereas in models with d.0/ D 0 the specific detachment
rate coefficient does not affect the outcome, it does so in detachment models with
d.0/ > 0. This is also consistent with the results of the upscaling study of [1] for
porous medium systems.
Non-trivial steady states, in which both wall attached and suspended biomass are
present are much more difficult to analyse, even in the algebraically much simpler
Freter model, in which no substrate gradients in the wall depositions are accounted
for [7, 14]. Therefore, we do not expect any insightful results in pursuing this line
of investigation and turn to a numerical study instead.
3 Simulation Results
Typical simulation results are shown in Fig. 1, using the parameters in Table 1.
In one case the bulk substrate concentration Sin is chosen low enough so that the
bacteria cannot be sustained; in the other case it is high enough such that both a
biofilm and a suspended population attain a positive equilibrium value. The vast
majority of biomass in the system is sessile. These simulations were conducted with
the detachment rate function (8).
In Fig. 2 we show for both detachment rate function (8) and (9) the steady state
values for ; u; S for different detachment parameters E1 and E2 , which have been
correlated with the dilution rate. Motivated by [11] we chose the relationship as
0:58
D
EQ i D Ei ; (19)
D0
where by D0 we denote a reference dilution rate such that for D D D0 this flow rate
dependent criterion is equivalent to a detachment with a given rate constant Ei and
for D > D0 we have EQ i > Ei , while for D < D0 we have EQ i < Ei . Note that an
increased dilution rate implies a more plentiful substrate supply.
The main observation is that the choice of detachment rate function and erosion
constant does not have an effect on the substrate concentration in outflow, i.e. the
substrate removal performance of the reactor: For smaller dilution rates D < 50, the
effluent substrate concentration increases almost linearly with D, for larger D > 50,
Biofilm Detachment in a Chemostat with Wall Attachment 273
−6
x 10
1
Aρλ
0.1 u
0.8
0.6
0.0999 0.4
0.2
0.0998 0
0 5 10 15 20 25 0 5 10 15 20 25
t (days) t (days)
10
Aρλ
0.08 u
substrate concentration in reactor (g/m )
3
8
suspended and biofilm biomass (g)
0.06
6
0.04
4
0.02
2
0 0
0 5 10 15 0 5 10 15
t (days) t (days)
Fig. 1 A typical simulation of model (12), (13) and (14). Case 1 (top): The washout equilibrium
is stable, case 2 (bottom): the washout equilibrium is unstable. In both simulations the detachment
criterion (8) was used
274 A. Mašić and H.J. Eberl
the increase becomes sublinear. The results obtained for different base dilution
rates D0 , hence different detachment rates Ei , appear indistinguishable for each
detachment criterion (8) and (9). Also comparing the results between the simulation
experiments for (8) and (9), respectively, shows that for both detachment criteria the
same values of S are found.
The biofilm thickness, however, depends strongly on the detachment rate func-
tion, and so does the suspended biomass density and by extension the amount of
biomass in the effluent of the reactor.
An explanation for this phenomenon is that in a thick enough biofilm, as is typical
for many biofilm based wastewater treatment applications, only a small part of the
biofilm is active whereas a major part does not contribute to reactor performance
due to substrate limitations in the inner layers of the film. An increased detachment
force decreases the biofilm thickness but as long as it remains above the thickness
of the active layer this does not have an effect on performance. If the detachment is
strong enough such that the resulting biofilm becomes too thin, this statement does
not hold anymore.
4 Conclusion
−3
x 10
25 0.015 1
D =1
0
D =10
0
D0=40
D0=100
20
E=1000
0.01
substrate in reactor (g/m3)
0.5
10
0.005
D =1 D0=1
5 0
D0=10 D =10
0
D0=40 D0=40
D0=100 D =100
0
E=1000 E=1000
0 0 0
0 20 40 60 80 100 0 20 40 60 80 100 0 20 40 60 80 100
D (1/day) D (1/day) D (1/day)
× 10 -3
25 0.008
D 0=1
D 0=10
D 0=40
20 D 0=100 2
E=0.05
substrate in reactor (g/m3)
15
0.004
10 1
D 0=1 D 0=1
5 D 0=10 D 0=10
D 0=40 D 0=40
D 0=100 D 0=100
E=0.05 E=0.05
0 0 0
0 20 40 60 80 100 0 20 40 60 80 100 0 20 40 60 80 100
D (1/day) D (1/day) D (1/day)
Fig. 2 Steady states attained in dependence of dilution rate D. Top: detachment criterion (8),
reprinted from [9] with permission; bottom: detachment criterion (9)
obtained. In our simulations we show that in such situations with well developed,
sufficiently thick biofilms the particular choice of a mesoscopic detachment rate
function does not quantitatively affect macroscopic reactor performance as mea-
sured in terms of effluent substrate concentration, but it does affect the predicted
biofilm thickness.
276 A. Mašić and H.J. Eberl
Acknowledgements HJE was supported by NSERC Canada through the Discovery Grant Pro-
gram and through the Canada Research Chairs Program.
References
1. Abbas, F., Eberl, H.J.: Investigation of the role of mesoscale detachment rate expressions in a
macroscale model of a porous medium biofilm Reactor, Int. J. Biomath. Biostat. 2, 123–143
(2013)
2. Abbas, F., Sudarsan, R., Eberl, H.J.: Longtime behaviour of one-dimensional biofilm models
with shear dependent detachment rates. Math. Biosci. Eng. 9, 215–239 (2012)
3. Bester, E., Edwards, E.A., Wolfaardt, G.M.: Planktonic cell yield is linked to biofilm
development. Can. J. Microbiol. 55, 1195–1206 (2009)
4. Duddu, R., Chopp, D.L., Moran, B: A two-dimensional continuum model of biofilm growth
incorporating fluid flow and shear stress based detachment. Biotechnol. Bioeng. 103, 92–104
(2008)
5. Emerenini, B.O., Hense, B.A., Kuttler, C., Eberl, H.J.: A mathematical model of quorum
sensing induced biofilm detachment. PLoS ONE 10(7), e0132385 (2015)
6. Hunt, S.M., Hamilton, M.A., Sears, J.T., Harkin, G., Reno, J: A computer investigation of
chemically mediated detachment in bacterial biofilms. J. Microbiol. 149, 1155–1163 (2003)
7. Jones, D., Kojouharov, H.V., Le, D., Smith, H.L.: The Freter model: a simple model of biofilm
formation. Math. Biol. 47, 137–152 (2003)
8. Kommendal, R., Bakke, R.: Modeling Pseudomonas aeruginosa biofilm detachment. HIT
Working Paper no 3/2003 (2003)
9. Masic, A., Eberl, H.J.: Persistence in a single species CSTR model with suspended flocs and
wall attached biofilms. Bull. Math. Biol. 74, 1001–1024 (2012)
10. Morgenroth, E.: Detachment: an often-overlooked phenomenon in biofilm research and
modeling. In: Wuertz, S., et al. (eds.) Biofilms in Wastewater Treatment, pp 246–290. IWA
Publishing, London (2003)
11. Rittmann, B.E.: The effect of shear stress on biofilm loss rate. Biotechnol. Bioeng. 24, 501–506
(1982)
12. Rittmann, B.E, McCarty, P.L.: Environmental Biotechnology. McGraw-Hill, Boston (2001)
13. Solano, C., Echeverz, M., Lasa, I.: Biofilm dispersion and quorum sensing. Curr. Opin.
Microbiol. 18, 96–104 (2014)
14. Stemmons, E.D., Smith, H.L.: Competition in a chemostat with wall attachment. SIAM J. Appl.
Math. 61, 567–595 (2000)
15. Walter, W.: Gewöhnliche Differentialgleichungen, 7th edn. Springer-Verlag, Berlin (2000)
16. Wanner, O., Gujer, W.: A multispecies biofilm model. Biotechnol. Bioeng. 28, 314–328 (1986)
17. Wanner, O., Eberl, H., Morgenroth, E., Noguera, D.R., Picioreanu, C., Rittmann, B., van
Loosdrecht, M.: Mathematical modeling of biofilms. Scientific and Technical Report No.18.
IWA Publishing, London (2006)
18. Xavier, J.B., Picioreanu, C., van Loosdrecht, M.C.M: A general description of detachment for
multidimensional modeling of biofilms. Biotechnol. Bioeng. 91, 651–669 (2005)
Application of CFD Modelling to the Restoration
of Eutrophic Lakes
1 Introduction
2 Computational Model
The model domain is a cylinder (Fig. 1a) with a height h D 40 cm, and a diameter
FG D 50 cm. The top of the cylinder is open to air. The bottom has a circular hole
at the middle. This hole has a diameter D D 6 cm. Through this hole (inlet), air
bubbles of a given diameter are injected into the otherwise stagnant water contained
in the cylinder. This model domain is used because experimental results are available
to allow a direct comparison. For efficient computation of water and air bubble
motions, we consider three geometric configurations of computational domain: (1)
Computational domain A: a simple 2D plane cutting through the centreline of the
cylinder (Fig. 1c); (2) Computational domain B: an axis-symmetrical domain cutting
through the centreline (Fig. 1b); (3) Computational domain C: a 10ı wedge of the
cylinder (Fig. 1d). Domains A and B are covered by quadrilateral mesh generated
using a cell size of 1 mm. The mesh contains 401,802 and 199,562 computing nodes,
respectively. Domain C is covered by quadrilateral mesh created using a cell size of
5 mm. The total computing nodes are 33,580.
Fig. 1 A diagram of the model cylinder containing water. Water and air-bubble motions are
induced by the injection of air bubbles
280 A. Najafi-Nejad-Nasser et al.
The turbulent motions of the liquid phase (water) and gas phase (air bubble) were
simulated with the Euler-Euler method using ANSYS Fluent. The motions are
described using separate momentum equations. The two phases are related through
a momentum exchange term. The interphase momentum transfer is due to interfacial
forces acting and interactions between water and air bubbles (such as lift force and
drag force) [3, 4, 23]. Hence, a proper solution for the bubble columns dependents on
the correct modelling of interphase forces and turbulence models. In this paper, we
compare the performance of different interphase force models and two turbulence
closure models (the k- model and the SST k-! model). All the simulations use
unsteady formulation. Phase Coupled SIMPLE (PC-SIMPLE) algorithm is used for
pressure velocity coupling. This algorithm is an extension of the SIMPLE algorithm
to multiphase problems. The velocity solutions are obtained in a segregated fashion,
and coupled by the liquid and gas phases [4].
At time t D 0, imposed initial conditions are as follows: The free water surface is
located at the equilibrium position. The volume fraction of water ˛w is equal to one
below the free surface (for x2 D h). Water is stagnant or the velocity components
u1 and u2 are zero in the entire computational domain. Kinematic and dynamic
conditions are imposed at the boundaries of the computational domains (Fig. 1),
including
(1) Inlet (at the bottom of the cylinder)
(2) Outlet (on the top of the cylinder)
(3) Solid side walls of the cylinder
(4) Axis , OM in Fig. 1b (Runs 2–10, listed in Table 2)
(5) Symmetry (for 3D simulation, Run 11)
At the inlet (D=2 < x1 < D=2 and x2 = 0, Fig. 1), air bubbles of a given
diameter d (d < D) enter the domain continuously during the simulation time period
T. The direction of the entering velocity is upward, and the magnitude is uo (or u2 D
uo ; u1 D 0). At the inlet, the volume fraction of water ˛w is taken as zero.
At the outlet (at x2 D h, Fig. 1), fluids are exposed to the atmosphere.
Accordingly, the pressure equals to the atmospheric pressure. The volume fraction
of water ˛w is set to zero.
At the solid walls, no-slip condition is applied for computational domains A,
B, and C. For the three cases, the wall distance of the first cell from the walls is
yC D 0:33, yC D 0:45, and yC D 0:81, respectively. Thus, no-slip condition is
valid. This condition means that both the tangential and normal components of the
fluid velocity are set to zero.
Application of CFD Modelling to the Restoration of Eutrophic Lakes 281
2.4 Simulations
Model parameters and their values used in simulations are summarised in Table 1. A
total of 11 runs (Runs 1–11, Table 2) were carried out using the Eulerian approach.
Runs 1–6 and Runs 10–11 differ from each other in the choice of turbulence
dispersion force and lift force; these runs use the k- model for turbulence closure.
Runs 7–9 use the SSTk-! model.
The time period of all the simulations was t = 10.7 s. This is long enough since it
is more than two times of the advection time scale.
All the 11 runs produced finite volume solutions to the RANS equations. The
results are presented and discussed in the next section, along with comparisons with
available experimental data.
Under given conditions (Tables 1 and 2), Runs 1–11 produce water velocities.
As an example, velocity vectors and corresponding flow streamlines at a state of
equilibrium for Run 3 are plotted in Figs. 2 and 3, respectively. A strong jet is
seen to occur in the central region (Fig. 2), as a direct response to bubble injection.
Water motions are visible in the entire domain. The jet flow entrains water from both
Table 2 Solution domain, water-bubble interaction method, and turbulence closure model
Run 1 2 3 4 5 6 7 8 9 10 11
Domain A B B B B B B B B B C
Drag SNa SN SN SN SN SN SN SN SN SN SN
Lift (–) (–) La L Ta T (–) T T T (–)
Dispersion (–) (–) LDBa Sa Ba LDB (–) LDB S S (–)
Closure k k k k k k SST SST SST k k
a
SST SSTk !, SN Schiller-Nauman, L Legendre, LDB Lopez-de-Bertodano, S Simonin, T
Tomiyama, B Burns et al. [4]
282 A. Najafi-Nejad-Nasser et al.
sides in the lower water column and creates eddies (Fig. 3). These eddies produce
diverging flows from the centre in the upper water column. Water flow converges to
compensate the upward motion at the centre. These flow features are realistic. Also,
there are upward and downward motions on both the left and right sides of the water
body. These flow patterns would enhance renewal of bottom water with oxygenated
surface water.
For Run 3 (Fig. 2), the maximum velocity has a magnitude of nearly 5.6 times of
the initial velocity, uo , of bubbles entering the water column. The maximum velocity
has a magnitude of 5.4uo for Run 5, being the lowest among Runs 1–11. For the
other runs, the maximum velocity has a magnitude ranging from 5.5uo (for Run 4)
to 8.5uo (for Run 7).
Application of CFD Modelling to the Restoration of Eutrophic Lakes 283
a b c
uw (m/s)
0 0 0
Fig. 4 Water velocity .uw / distribution with radial distance, r. (a) z D 0.05 (m). (b) z D 0.1 (m).
(c) z D 0.2 (m)
284 A. Najafi-Nejad-Nasser et al.
a b c
1 1 1
ua (m/s)
0 0 0
0 0.1 0.2 r (m) 0 0.1 0.2 r (m) 0 0.1 0.2
r (m)
Run8 EXP Run11
Fig. 5 Distribution of air velocity .ua / with radial distance, r. (a) z D 0.05 (m). (b) z D 0.1 (m).
(c) z D 0.2 (m)
Table 3 Relative errors of computed air velocity (ua ), and average of water turbulent kinetic
energy (K)
Run 1 2 3 4 5 6 7 8 9 10 11
ua (%) 35:3 23:6 19:6 20:1 19:8 17:8 25:9 14:4 20:1 16:2 12:0
K(J/kg) 0:019 0:007 0:006 0:006 0:006 0:006 0:005 0:004 0:004 0:006 0:002
a b c
0.04
K (J/kg)
0.01 0.02
0.02
0.005 0.01
0 0 0
0 0.1 0.2 r (m) 0 0.1 0.2 r (m) 0 0.1 0.2
r (m) Run8 Run11
Fig. 6 Distribution of water turbulent kinetic energy .K/ with r. (a) z D 0.05 (m). (b) z D 0.1 (m).
(c) z D 0.2 (m)
a b c
0.3
VF3 (m/s)
0.2 0.2
0.2
0.1 0.1
0.1
0 0 0
0 0.05 r (m) 0 0.05 r (m) 0 0.05
r (m)
Run8 EXP Run11
Fig. 7 Distribution of air volume fraction, VFa , with radial distance r. (a) z D 0.05 (m). (b) z D 0.1
(m). (c) z D 0.2 (m)
A strong lake stratifications known to prohibit fluid motions and mixing in the
vertical. However, the consideration of density stratification effects is beyond the
scope of this paper.
4 Conclusions
This paper discusses artificial circulation in lakes, induced by injecting air bubbles,
for the control of eutrophication. We have simulated artificial circulation using CFD
modelling techniques, and reached the following conclusions: (1) The injection
triggers turbulent motions of water and bubbles, which feature a strong upward
flow above the injection location and energetic turbulent eddies on both sides of
the upward flow. (2) These large scale eddies enhance renewal of bottom water with
oxygenated surface water, which helps improve the dissolved oxygen level in the
lower water column. (3) Air bubbles entering the water column produce turbulent
kinetic energy; this source of energy will maintain small scale eddy motions in the
lake water, with beneficial mixing effects. (4) The dissolved oxygen level in the lake
water is improved as a direct response to air bubbles entering the water column. (5)
From the computational perspective, a 2D axisymmetric computational domain is
recommended for two reasons: (a) it offers high computational efficiency, relative to
a 3D domain; and (b) it appears to be sufficient to capture measured characteristics
of air and water velocities. (6) Model predictions of water velocity, air velocity, air
volume fraction agree well with experimental data. The best agreement is obtained
with the use of the Schiller-Nauman model for drag, the Tomiyama model for lift,
the Lopez-de-Bertodano model for turbulent dispersion, and the k model for
turbulence closure.
286 A. Najafi-Nejad-Nasser et al.
Acknowledgements This study received financial support through Discovery Grants held by S.S.
Li and C.N. Mulligan
References
1. Anagbo, P.E., Brimacombe, J.K.: Plume characteristics and liquid circulation in gas injection
through a porous plug. Metall. Trans. B 21B, 637–648 (1990)
2. Ansari, A.A., Gill, S.S., Lanza, G.R., Rast, W.: Eutrophication: Causes, Consequences and
Control. Springer, Dordrecht/Heidelberg/London/New York (2011)
3. Azzopardi, B., Zhao, D., Yan, Y., Morvan, H., Mudde, R.F., Lo, S.: Hydrodynamics of Gas-
liquid Reactors: Normal Operation and Upset Conditions. Wiley. Chichester, United Kingdom,
(2011)
4. ANSYS: Fluent 6.3 User’s Guide (2006)
5. Dai, L., Pan, G.: The effects of red soil in removing P from water column and reducing P
release from sediment in Lake Taihu. Water Sci. Technol. 65(5), 1052–1058 (2014)
6. Environment Canada: Canadian guidance framework for the management of P in freshwater
systems. Ecosyst. Health: Sci.-Based Solut. 1–8, 1–114 (2004)
7. Hjarne, J., Chernoray, V., Larsson, J., Lofdahl, L.: Numerical validations of secondary flows
and loss development downstream of a highly loaded low pressure turbine outlet guide Vane
cascade. ASME Turbo Expo 2007, 723–733 (2007)
8. Imteaz, M.A., Asaeda, T.: Artificial mixing of lake water by bubble plume and effects of
bubbling operations on algal bloom. Water Res. 34(6),1919–1929 (2000)
9. Kim, S.H., Kim, J.Y., Park, H., Park, N.S.: Effects of bubble size and diffusing area on
destrafication efficiency in bubble plumes of two-layer stratification. ASCE J. Hydraul. Eng.
136, 106–115 (2010)
10. Matsui, S., Ide, S., Ando, M.: Lake reservoirs: reflecting waters of sustainable use. Water Sci.
Technol. 32(7),221–224 (1955)
11. Penn, M.R., Auer, M.T., Doerr, S.M., Driscoll, C.T., Brooks, C.M., Effler, S.W.: Seasonality
in P release rates from the sediments of a hypereutrophic lake under a matrix Of Ph and redox
conditions. Can. J. Fish. Aquat. Sci. 57, 1033–104 (2000)
12. Phillips, G., Bramwell, A., Pitt, J., Stansfield, J., Perrow, M.: Practical application of 25 Years’
research into the management of shallow lakes. Hydrobiologia 395/396 61–76 (1999)
13. Qunhe, W., Renduo, Z., Shan, H., Hengjun, Z.: Effects of bacteria on nitrogen and P release
from river sediment. Environ. Sci. 20, 404–412 (2008)
14. Reddy, K.R., Q’connor, G.A., Schelske, C.L.: P Biogeochemistry of Subtropical Ecosystems,
1st edn., p. 101. CRC Press, Boca Raton (1999)
15. Rensen, J., Roig, V.: Experimental study of the unsteady structure of a confined bubble plume.
Int. J. Multiph. Flow 27, 1431–1449 (2001)
16. Sahoo, G.B., Luketina, D.: Modeling of bubble plume design and oxygen transfer for reservoir
restoration. Water Res. 37, 393–401 (2003)
17. Schauser, I., Chorus, I.: Assessment of internal and external lake restoration measures for two
Berlin lakes. Lake Reserv. Manag. 23, 366–376 (2007)
18. Schuler, M., Zehnder, F., Weigand, B., von Wolfersdorf, J., Neumann, S.O.: The effect of
turning vanes on pressure loss and heat transfer of a Ribbed rectangular two-pass internal
cooling channel. ASME J. Turbomach. 133(2), 0211017–(1–10) (2011)
19. Sharpley, A.N., Chapra, S.C., Wedepohl, R., Sims, J.T., Daniel, T.C., Reddy, K.R.: Managing
agricultural P for protecting of surface waters: issues and options. J. Environ. Qual. 23(3),
437–451 (1994)
20. Sondergaard, M., Jensen, J.P., Jappesen, E.: Role of sediment and internal loading of P in
shallow lakes. Hydrobiologia 506–509, 135–145 (2003)
Application of CFD Modelling to the Restoration of Eutrophic Lakes 287
21. Van Der Molen, D.T., Boers, P.C.M.: Eutrophication Control in the Netherlands. Hydrobiologia
136, 403–409 (1999)
22. Wang, X., Naji, H., Mezrhab, A.: Computational investigation of different models when
predicting airflow in an enclosure. ASME Press. Vessels Piping Div. Conf. 4, 179–188 (2008)
23. Yeoh, G.H., Tu, J.: Computational Techniques for Multiphase Flows: basics and applications.
Elsevier, Butterworth-Heinmann, United Kingdom, (2009)
24. Yum, K., Kim, S.H., Park, H.: Effects of plume spacing and flowrate on destrafication efficiency
of air diffusers. Water Res. 42, 3249–3262 (2008)
On the Co-infection of Malaria
and Schistosomiasis
Abstract Mathematical models for co-infection of diseases (that is, the simulta-
neous infection of an individual by multiple diseases) are sorely lacking in the
literature. Here we present a mathematical model for the co-infection of malaria and
schistosomiasis. We derive reproduction numbers for malaria and schistosomiasis
independently, then combine these to determine the effects of disease interactions.
Sensitivity indices show that malaria infection may be associated with an increased
rate of schistosomiasis infection. However, schistosomiasis infection is not asso-
ciated with an increased rate of malaria infection. Therefore, whenever there is
co-infection of malaria and schistosomiasis in the community, our model suggests
that control measures for each disease should be administered concurrently for
effective control.
1 Introduction
K.O. Okosun
Department of Mathematics, Vaal University of Technology, Vanderbijlpark, South Africa
e-mail: [email protected]
R. Smith? ()
University of Ottawa, Ottawa, ON, Canada
e-mail: [email protected]
2 Model Formulation
Our model subdivides the total human population, denoted by Nh , into subpop-
ulations of susceptible humans Sh , individuals infected only with malaria Im ,
individuals infected with only schistosomiasis Isc , individuals infected with both
malaria and schistosomiasis Cms , individuals who have recovered from malaria Rm
and individuals who have recovered from schistosomiasis Rs . The total mosquito
vector population, denoted by Nv , is subdivided into susceptible mosquitoes Sv and
mosquitoes infected with malaria Iv . Similarly, the total snail vector population,
denoted by Nsv , is subdivided into susceptible snails Ssv and snails infected with
schistosomiasis Isv . Thus Nh D Sh C Im C Is C Cms C Rs C Rm , Nv D Sv C Iv and
Nsv D Ssv C Isv :
The model is given by the following system of ordinary differential equations.
Sv0 D v ˇ2 Sv v Sv
Iv0 D ˇ2 Sv v Iv
0
(1)
Ssv D s 2 Ssv sv Ssv
0
Isv D 2 Ssv sv Isv ;
Birth rates for humans, mosquitoes and snails are, respectively, h , v and
sv , while the corresponding mortality rates are h , v and sv . Here is the
schistosomiasis-related death rate and is the malaria-related death rate. The
immunity-waning rates for malaria and schistosomiasis are ˛ and " respectively,
while the recovery rates from malaria, schistosomiasis and co-infection are , !
and ı respectively. The term ı accounts for the portion of co-infected individuals
who recover from malaria, while .1 /ı accounts for co-infected individuals
who recover from schistosomiasis; thus (satisfying 0 1) represents the
likelihood of individuals to recover from malaria first. Note that all parameters
might in practice vary with time; however, we shall take variations in our critical
parameters into account with a sensitivity analysis.
R msc D maxfR sc ; R 0m g ;
where
s
v ˇh ˇv h
R 0m D
h 2v . C C h /
s
s s h
R sc D :
h .m C ! C h /2sv
292 K.O. Okosun and R. Smith?
Note that the reproduction number produced by the next-generation method pro-
duces a threshold quantity and not necessarily the average number of secondary
infections [9]. We thus have the following theorem.
Theorem 1 The disease-free equilibrium E 0 is locally asymptotically stable when-
ever R msc < 1 and unstable otherwise.
D1 R 20m
h D ;
D2 D3 R 20m
where
D1 D h 2v . C / ; D2 D v ˇh ˇv ; D3 D h 2v :
D4 R 2sc
h D ; (4)
D5 D6 R 2sc
where
We next derive the sensitivity of Rsc in (2) (i.e., when expressed in terms of R0m )
to each of the 13 different parameters. However, the expression for the sensitivity
indices for some of the parameters are complex, so we evaluate the sensitivity
indices of these parameters at the baseline parameter values as given in Table 1.
Since the effect of immunity in the control of re-infection is not entirely known
[6], we have assumed the schistosomiasis immunity waning rate. Due to a lack of
data in the literature, assumptions were made for the recovery rate of co-infected
individuals, ı, recovery rate of schistosomiasis-infected individuals, !, and the rate
of recovery from malaria for co-infected individuals, .
@Rsc
Rsc D 0:5 : (6)
@ Rsc
The detailed sensitivity indices of Rsc resulting from the evaluation of the other
parameters of the model are shown in Table 2.
Table 2 shows the parameters, arranged from the most sensitive to the least.
For R0m < 1, the most sensitive parameters are the snail mortality rate, the
mosquito mortality rate, the transmissibility of schistosomiasis to snails and the
snail birth rate (sv , v , s and s , respectively). Since Rsvsc D 1, increasing
(or decreasing) the snail mortality rate sv by 10 % decreases (or increases) Rsc by
10 %; similarly, increasing (or decreasing) the mosquito mortality rate, v , by 10 %
increases (or decreases) Rsc by 5:6 %. In the same way, increasing (or decreasing)
the transmissibility of schistosomiasis to snails, s , increases (or decreases) Rsc
by 5 %. As the malaria parameters ˇh , ˇv and v increase/decrease by 10 %, the
reproduction number of schistosomiasis, Rsc , decreases by 2:8 % in all three cases.
For R0m > 1, the most sensitive parameters are the snail mortality rate, the rate
of a snail getting infected with schistosomiasis, the snail birth rate, the human birth
rate, malaria-induced death and recovery from schistosomiasis (sv , s , s , h , ,
!, respectively). Since Rssc D 0:5, increasing (or decreasing) by 10 % increases (or
decreases) Rsc by 5 %; similarly, increasing (or decreasing) the recovery rate, !, by
10 % increases (or decreases) Rsc by 2:6 %. Also, as the malaria parameters ˇh , ˇv
and v increase/decrease by 10 %, the reproduction number of schistosomiasis, Rsc ,
decreases by only 0:3 % in all three cases.
On the Co-infection of Malaria and Schistosomiasis 295
It is clear that Rsc is sensitive to changes in R0m . That is, the sensitivity of Rsc to
parameter variations depends on R0m ; whenever, R0m < 1, Rsc is less sensitive to the
malaria parameters.
Similar to the previous subsection, we derive the sensitivity of R0m in (5) (i.e. when
expressed in terms of Rsc ) to each of the different parameters. The sensitivity index
of R0m with respect to ˇh , for example, is
@R0m ˇh
ˇRh0m D 0:5 : (7)
@ˇh R0m
The detailed sensitivity indices of R0m resulting from the evaluation to the other
parameters of the model are shown in Table 3. It is clearly seen from Table 3
that the malaria reproduction number, R0m , is not sensitive to any variation in the
schistosomiasis reproduction number Rsc .
4 Numerical Simulations
Table 1 lists the parameter descriptions and values used in the numerical simulation
of the co-infection model.
296 K.O. Okosun and R. Smith?
3 = 0.4 70
= 0.2
= 0.1
Malaria Infected Individuals
2.5
60
Co Infected Individuals
2
= 0.3 50
1.5
40
= 0.2
1
30
0.5
20
0
0 20 40 60 80 100 0 20 40 60 80 100
Time (days) Time (days)
4
x 10
(c) 2 (d) 600
h
= 0.234
1.8
h
= 0.234
500
Schistosomiasis Infected Individuals
1.6
1.4 = 0.134
Co Infected Individuals
h
= 0.134 400
h
1.2
1
300
= 0.034
h
0.8
0.6 200
0.4 = 0.034
h
100
0.2
0 20 40 60 80 100 0 20 40 60 80 100
Time (days) Time (days)
Fig. 1 Simulations of the malaria–schistosomiasis model showing the effect of varying transmis-
sion rates
Figure 1a,b shows the effect of varying the schistosomiasis transmission param-
eter on the number of individuals infected with malaria, Im , and the number of
co-infected individuals, Cms . This illustrates that effective control of schistosomiasis
would enhance the control of malaria. Conversely, Fig. 1c,d shows the effect of
varying the malaria transmission parameter ˇh on the number of individuals infected
with schistosomiasis, Isc , and the number of co-infected individuals. This illustrates
that effective control of malaria would enhance control of co-infection but have only
minimal effect on schistosomiasis prevalence.
Figure 2 shows the effect of varying the death rate of mosquitoes v (for exam-
ple, through spraying) on the number of individuals infected with schistosomiasis
and the number of co-infected individuals. As the mosquitoes are controlled, the
number of individuals infected with malaria falls dramatically, as does the number
of co-infected individuals, while the number of schistosomiasis-infected individuals
only decreases slightly.
On the Co-infection of Malaria and Schistosomiasis 297
4 90
μv = 0.07
80
Malaria Infected Individuals
3.5
Co Infected Individuals
70
3
60
2.5 μv = 0.09
μv =0.07
50
2
40
1.5 μ =0.09
v
30
μ = 0.143
1 v
μ =0.143
v 20
0.5
10
0
0 20 40 60 80 100 0 20 40 60 80 100
Time (days) Time (days)
10000
μ =0.07
v
Schistosomiasis Infected Individuals
9000
8000
7000
μ =0.143
v
6000
5000
4000
3000
2000
1000
0 20 40 60 80 100
Time (days)
Fig. 2 Simulations of the malaria–schistosomiasis model showing the effect of varying the
mosquito death rate
5 Concluding Remarks
In this paper, we formulated and analysed a deterministic model for the transmission
of malaria–schistosomiasis co-infection. We derived basic reproduction numbers for
each infection and determined the sensitivity of each reproduction number to all
parameters. Our analysis shows that malaria infection may be associated with an
increased rate of schistosomiasis infection. However, in our model, schistosomiasis
infection is not associated with an increased rate of malaria infection. Therefore,
whenever there is co-infection of malaria and schistosomiasis in the community,
our model suggests that control measures for both diseases should be administered
concurrently for effective control.
References
1. Anderson, R.M., May, R.M.: Infectious Diseases of Humans: Dynamics and Control. Oxford
University Press, Oxford (1991)
2. Blayneh, K.W., Cao, Y., Kwon, H.D.: Optimal control of vector-borne diseases: treatment and
prevention. Discret. Contin. Dyn. Syst. Ser B 11(3), 587–611 (2009)
3. Chiyaka, E.T., Magombedze, G., Mutimbu, L.: Modelling within host parasite dynamics of
schistosomiasis. Comput. Math Methods Med. 11(3), 255–280 (2010)
4. Doumbo, S., Tran, T.M., Sangala, J., Li, S., Doumtabe, D., et al.: Co-infection of long-term
carriers of plasmodium falciparum with schistosoma haematobium enhances protection from
febrile malaria: a prospective cohort study in Mali. PLoS Negl. Trop. Dis. 8(9), e3154 (2014)
5. Feng, Z., Li, C.-C., Milner, F.A.: Schistosomiasis models with two migrating human groups.
Math. Comput. Model. 41(11–12), 1213–1230 (2005)
6. Fulford, A.J.C., Butterworth, A.E., Dunne, D.W., Strurrock, R.F., Ouma, J.H.: Some mathemat-
ical and statistical issues in assessing the evidence for acquired immunity to schistosomiasis.
In: Isham, V., Medley, G. (eds.) Models for Infectious Human Diseases, pp. 139–159.
Cambridge University Press, Cambridge (1996)
7. Hotez, P.J., Molyneux, D.H., Fenwick, A., Ottesen, E., Ehrlich, S.S., et al.: Incorporating a
rapid-impact package for neglected tropical diseases with programs for HIV/AIDS, tuberculo-
sis, and malaria. PLoS Med. 3, e102 (2006)
8. Kealey, A., Smith?, R.J.: Neglected tropical diseases: infection, modelling and control.
J. Health Care Poor Underserv. 21, 53–69 (2010)
9. Li, J., Blakeley, D., Smith?, R.J.: The Failure of R0 . Comput. Math Methods Med. 2011, Article
ID 527610 (2011)
10. Mushayabasa, S., Bhunu, C.P.: Modeling Schistosomiasis and HIV/AIDS co-dynamics. Com-
put. Math. Methods Med. 2011, Article ID 846174 (2011)
11. Okosun, K.O., Makinde, O.D.: A co-infection model of malaria and cholera diseases with
optimal control. Math. Biosci. 258, 19–32 (2014)
12. Ross, R.: The Prevention of Malaria, 2nd edn. Murray, London (1911)
13. Salgame, P., Yap, G.S., Gause, W.C.: Effect of helminth-induced immunity on infections with
microbial pathogens. Nat. Immunol. 14, 1118–1126 (2013)
14. Semenya, A.A., Sullivan, J.S., Barnwell, J.W., Secor, W.E.: Schistosoma mansoni Infection
impairs antimalaria treatment and immune responses of rhesus macaques infected with
mosquito-borne plasmodium coatneyi. Infect. Immun. 80(11), 3821–3827 (2012)
15. Spear, R.C., Hubbard, A., Liang, S., Seto, E.: Disease transmission models for public health
decision making: toward an approach for designing intervention strategies for Schistosomiasis
japonica. Environ. Health Perspect. 10(9), 907–915 (2002)
16. Smith?, R.J., Hove-Musekwa, S.D.: Determining effective spraying periods to control malaria
via indoor residual spraying in sub-saharan Africa. Hindawi Publishing Corporation. J. Appl.
Math. Dec. Sci. 2008, Article ID 745463, 19p (2008)
17. van den Driessche, P., Watmough, J.: Reproduction numbers and sub-threshold endemic
equilibria for compartmental models of disease transmission. Math. Biosci. 180, 29–48 (2002)
18. Yapi, R.B., HRurlimann, E., Houngbedji, C.A., Ndri, P.B., SiluKe, K.D., et al.: Infection and co-
infection with helminths and plasmodium among school children in Côte d’Ivoire: results from
a national cross-sectional survey. PLoS Negl. Trop. Dis. 8(6), e2913 (2014)
A Discrete-Continuous Modeling Framework
to Study the Role of Swarming in a
Honeybee-Varroa destrutor-Virus System
1 Introduction
main symptom of swarming is the preparation of brood cups and queen rearing.
The causes of swarming could be (i) large colony size, (ii) high proportion of
young worker bees, (iii) reduced queen pheromone due to overcrowding, and (iv)
abundance of pollen and nectar leading to overcrowding. There is a common cause
behind all the symptoms i.e., overcrowding in the colony.
When a swarm issues, the parasites present in the parent colony are divided
among the parent colony and the new colony formed after swarming [3]. This
may reduce the disease infestation in the parent colony. We investigate the effect
of swarming on the colony infested with a parasite Varroa destructor and Acute
Bee Paralysis Virus. Varroa destructor is an ectoparasitic mite that not only feeds
on the bees but also carries and transmits fatal viruses in the colony. The mite feeds
on bees’ haemolymph by piercing their inter-segmental membrane and transmits the
virus while feeding on them. When a virus carrying mite feeds on an infected bee,
it releases the virus into the bee’s haemolymph. Thus, the uninfected bee becomes
infected and mite becomes virus free. When a virus free mite feeds on an infected
bee, it begins to carry virus. There are 20 bee viruses known so far, out of which
at least 14 viruses are reported to be associated with mites [5, 9]. These viruses
have different routes of transmission and different levels of virulence. One of the
most common virus is the Acute Bee Paralysis Virus. It has also been implicated
in colony losses [4, 5, 15]. The bees infected by this virus are unable to fly, loose
their body hair and tremble uncontrollably. Unlike the Deformed Wing Virus, where
brood infested with the virus develop into an adult sick bee, the brood infected with
ABPV does not survive to the adult stage and dies immediately.
There have been several SIR-type mathematical models developed for honeybee-
varroa mite-virus systems [2, 11–13]. There have also been models on some
aspects of swarming such as the use of bee dance, design of nest selection and
decision-making processes [1, 8, 10]. However, none of these models studied the
combined effect of swarming and the varroa-virus infestation in a honeybee colony.
In this paper, we provide a general framework of difference-differential equations
to investigate how swarming affects the fate of the honeybee colony infested with
varroa mites and virus. We also use numerical simulations to study (i) swarming
due to overcrowding (ii) swarming after a fixed time interval mimicking the natural
death cycle of a queen bee. We vary the proportion of healthy bees leaving the
parent colony and observe its effect on the dynamics of the colony. We numerically
calculate a critical value of the proportion of mites leaving the parent colony below
which the parent colony dies off and above which it survives.
2 Model Equations
dm y x
D ˇ1 .M m/ ˇ2 m (1)
dt xCy xCy
Swarming in a Honeybee Colony 301
dx x
D g.x/h.m/ ˇ3 m d1 x 1 Mx (2)
dt xCy
dy x
D ˇ3 m d2 y 2 My (3)
dt xCy
dM M
D rM 1 (4)
dt ˛.x C y/
The parameters are assumed to be non-negative. Because the size of the bee
colony and the life span of bees vary drastically with seasons, the parameters are
assumed to be seasonally varying. In particular, we assume the parameters to be
periodic functions of time with a period T; in practice T D 1 year.
The parameter in (2) is the maximum birth rate, specified as the number of
worker bees emerging as adults per day.
The function g.x/ expresses that a sufficiently large number of healthy worker
bees is required to care for the brood. We think of g.x/ as a switch function. If x
falls below a critical value, which may seasonally depend on time, essential work
in the maintenance of the brood cannot be carried out anymore and no new bees are
born. If x is above this value, the birth of bees is not hampered. Thus g.0; / D 0,
dg.0/
dx 0, limx!1 g.x/ D 1. A convenient formulation of such switch like behavior
is given by the sigmoidal Hill function
xn
g.x/ D (5)
K n C xn
where the parameter K is the size of the bee colony at which the birth rate is half
of the maximum possible rate and the integer exponent n > 1. If K D 0 is chosen,
then the bee birth terms of the original model of [13] is recovered. Then the brood is
always reared at maximum capacity, independent of the actual bee population size,
because g.x/ 1.
The function h.m/ in (2) indicates that the birth rate is affected by the presence
of mites that carry the virus. This is in particular important for viruses like ABPV
that kill infected pupae before they develop into bees. The function h.m/ is assumed
to decrease as m increases, h.0/ D 1, dm dh
.m/ < 0 and limm!1 h.m/ D 0; [13]
suggests that this is an exponential function h.m/ emk , where k is non-negative.
We will use this expression in the computer simulations later on.
The parameter ˇ1 in (1) is the rate at which mites that do not carry the virus
acquire it. The rate at which infected mites lose their virus to an uninfected host
is ˇ2 . The rate at which uninfected bees become infected is ˇ3 , in bees per virus
carrying mite and time.
Finally, d1 and d2 are the death rates for uninfected and infected honeybees. We
can assume that infected bees live shorter than healthy bees, thus d2 > d1 .
Equation (4) is a logistic growth model for varroa mites. By r we denote the
maximum mite birth rate. The carrying capacity for the mites changes with the host
population site, x C y, and is characterized by the parameter ˛ which indicates how
302 V. Ratti et al.
many mites can be sustained per bee on average. The parameters 1;2 in Eqs. (2)
and (3) represent the mortality rates of bees due to mites feeding on them.
Here ti are the discrete times at which events take place and t0 < : : : < ti < tiC1 .
Also, z 2 R4 , t 2 RC ; i 2 N, X 2 R4 and f 2 K where
We assume that the infected bees do not leave the parent colony, because the
disease progresses rapidly and sick bees are unable to fly. We also assume that
the percentage of total mites and virus carrying mites leaving the parent colony
is the same. Thus, two new parameters a and b are introduced. The parameter a
is the percentage of mites staying in the parent colony and the parameter b is the
percentage of uninfected bees staying in the parent colony after the swarm leaves.
Swarming in a Honeybee Colony 303
4 Computer Simulations
In the simulation experiments, we study the process of swarming taking place due to
overcrowding in the hive and due to events like queen supercedure. We investigate
how these two causes of swarming affect the strength and survival of the parent
colony infested with mites and virus. In the case where swarming takes place due to
overcrowding in the hive, discrete interventions take place when
Table 1 Seasonal averages of model parameters, derived from the data presented in the literature
[6, 7, 11, 13]. The parameters included here are kept constant for all simulations; the values of the
parameters that are varied are given in the text
Parameter Spring Summer Autumn Winter Source
ˇ1 0.1593 0.1460 0.1489 0.04226 [13]
ˇ2 0.04959 0.03721 0.04750 0.008460 [13]
ˇ3 0.1984 0.1460 0.1900 0.03384 [13]
d1 0.02272 0.04 0.02272 0.005263 [13]
d2 0.2 0.2 0.2 0.005300 [13]
500 1500 500 0 [13]
k 0.000075 0.00003125 0.000075 N/A [13]
K 8000 12,000 8000 6000 [11]
r 0.0165 0.0165 0.0045 0.0045 [6, 7]
1 D 2 107 107 107 107 [11]
304 V. Ratti et al.
4
(a) x 10
4 (b) 3 x 10 Virus carrying mites(m)
3.5
Virus carrying mites(m) Uninfected bees(x)
Uninfected bees(x) 2.5 Total mites(M)
3
Infected bees (y)
2.5 Total mites(M) 2
Population
Population
2 1.5
1.5
1
1
0.5
0.5
0 0
0 500 1000 1500 2000 2500 3000 0 1000 2000 3000 4000 5000 6000 7000 8000
Time (days) Time (days)
Fig. 1 (a) Bee-mite-virus system in the absence of swarming. (b) Bee-mite-virus system in the
presence of swarming due to overcrowding. Threshold bee population at which swarming takes
place is 31,342 and we assume a1 D 0:65; b1 D 0:5
4
(a) 2
x 10
0.5
0
0.5 0.6 0.7 0.8 0.9 1
Percentage of the bees leaving the parent colony
(b)3 x 10 4 (c) x 10
4
3
Virus carrying mites(m) Virus carrying mites(m)
Uninfected bees(x) Uninfected bees(x)
2.5 Total mites(M) 2.5 Total mites(M)
2 2
Population
Population
1.5 1.5
1 1
0.5 0.5
0 0
0 1000 2000 3000 4000 5000 6000 7000 8000 0 1000 2000 3000 4000 5000 6000 7000 8000
Time (days) Time (days)
(d)3 x 10 4
2 2
Population
Population
1.5 1.5
1 1
0.5 0.5
0 0
0 1000 2000 3000 4000 5000 6000 7000 8000 0 1000 2000 3000 4000 5000 6000 7000 8000
Time (days) Time (days)
Fig. 2 Swarming due to overcrowding: (a) Effect of the percentage of the healthy bees leaving the
parent colony on the average healthy bee population of the (i) disease free colony, (ii) mite infested
colony with a1 D 0:05, and (iii) mite infested colony with a1 D 0:7. (b) The colony fights off
the virus when b1 D 0:5 and a1 D 0:65. (c) The colony dies off after 7000 days when b1 D 0:6,
a1 D 0:65. (d) The colony dies off after 6600 days when a1 D 0:64, b1 D 0:5. (e) The colony
fights off the virus and survives as a properly working colony when a1 D 0:65, b1 D 0:5
colony (a1 D 0:7). We vary the percentage of healthy bees leaving the parent colony
over 50–100 % which covers the range (50–70 %) given by [3, 14] i.e., we vary b1
from 0.5 to 1. In the case of the disease free colony, the average population starts
from 19,000 and decreases gradually as the parameter b1 increases. The average
population suddenly drops down when b1 D 0:87. In the case of the mite infested
colony with a1 D 0:05, the average bee population starts at a lower level (i.e., at
18,000) than in the disease free case and decreases to 11,000 bees as b1 increases
followed by a sudden drop to 0 when b1 D 0:87. When a1 D 0:7, the average bee
population starts at 18,500 which is between the initial average population in the
disease free case and the case when a1 D 0:05. The critical value for the percentage
of bees leaving the parent colony is the same in all three cases. Figure 2b, c show
the effect of the percentage of uninfected bees leaving the parent colony (b1 ) on the
306 V. Ratti et al.
dynamics of the colony; we fix the parameter a1 D 0:65. In Fig. 2b, the colony fights
of the virus and survives as a properly working colony when b1 D 0:5. In Fig. 2c,
the colony dies off after 7000 days when b1 D 0:6. Figure 2d, e show how the
colony, that otherwise dies off due to virus, survives as a properly working colony if
the percentage of mites leaving the parent colony is above a threshold value; we fix
the parameter b1 D 0:5. In Fig. 2d, the colony dies off due to virus after 6600 days
when a1 D 0:64. Figure 2e shows that when a1 D 0:65, the colony fights off the
virus and works as a properly working colony.
Simulation Experiment II: In this simulation experiment, we assume that swarm-
ing occurs at fixed time intervals of 2 years mimicking the natural death cycle of
the queen bee. We assume that the swarm leaves the colony every 2 years in the
mid of May [14]. We use the value of the parameter ˛ to be [0.1 0.1 0.1 0.1] for
the spring, summer, fall and winter. In Fig. 3a, we compare a disease free colony, a
mite infested colony with a1 D 0:05, and, a mite infested colony with a1 D 0:7. We
investigate the effect of the percentage of bees leaving with the swarm (b1 ) on the
average population of the parent colony. The parameter b1 is varied from 0.5 to 1.
In case of the disease free colony, the average bee population starts from 21,000 and
remains constant when the parameter b1 is varied from 50 % to 76 % and suddenly
drops down to 0 when b1 reaches 0:77. In case of the mite infested colony with
a1 D 0:05, the average bee population starts below the disease free population and
remains constant until the parameter b1 reaches 0:75 when it suddenly drops down
to 0. In case of the mite infested colony where a1 D 0:7, the average bee population
starts at the same level as in case of a1 D 0:05 and remains constant until a1 reaches
0:76 and then it suddenly drops down to 0. It is interesting to note that the threshold
value for the parameter b1 is the maximum in case of the disease free colony which
is followed by the mite infested case with a1 D 0:7 which in turn is followed by the
mite infested case with a1 D 0:05.
Figure 3b, c show the effect of the percentage of uninfected bees leaving the
parent colony (b1 ) on the survival of the colony. The parameter a1 is fixed to be 0.7.
In Fig. 3b, the colony fights off the virus and survives as a properly working colony
when b1 D 0:76. In Fig. 3c, the colony dies off after 1000 days when b1 D 0:77.
Figure 3d, e show how the colony, that otherwise dies off due to virus, survives
as a properly working colony if the parameter a1 is above a threshold value. The
parameter b1 is fixed to be 0.5. In Fig. 3d, the colony dies off due to virus after
6000 days when a1 D 0:91. Figure 3e shows that when a1 D 0:92, the colony fights
off the virus and survives as a properly working colony.
4
x 10
(a) 2.5
1.5
0.5
0
0.5 0.6 0.7 0.8 0.9 1
Percentage of the bees leaving the parent colony
(b) 3.5 x 10 4
(c) 3.5 x 10 4
Population
2 2
1.5 1.5
1 1
0.5 0.5
0 0
0 1000 2000 3000 4000 5000 6000 7000 8000 0 500 1000 1500 2000 2500 3000
Time (days) Time (days)
(d) 3.5
x 10
4
Population
2
2
1.5
1.5
1 1
0.5 0.5
0 0
0 1000 2000 3000 4000 5000 6000 7000 8000 0 1000 2000 3000 4000 5000 6000 7000 8000
Time (days) Time (days)
Fig. 3 When swarming takes place every 2 years: (a) Effect of the percentage of the healthy bees
leaving the parent colony on the average healthy bee population of the colony that is (i) disease
free, (ii) mite infested with a1 D 0:05, and (iii) mite infested with a1 D 0:7. (b) The colony
fights off the virus when b1 D 0:76 and a1 D 0:7. (c) The colony dies off after 1000 days when
b1 D 0:77 and a1 D 0:7. (d) The colony dies off after 6000 days when a1 D 0:91 and b1 D 0:5.
(e) The colony fights off the virus and survives as a properly working colony when a1 D 0:92 and
b1 D 0:5
to queen failure i.e., when discrete events occur at times that are a priori fixed (ii)
due to overcrowding i.e., when occurrence of discrete events depend on the state
of the system.
• In case of a disease free colony and a mite-infested colony, a critical value of
the percentage of bees leaving the colony plays an important role. The colony
survives only if the percentage of bees is below this critical value.
• In case of a colony infested with mites and virus, in addition to the percentage of
the bees leaving the colony, the percentage of virus carrying mites and virus free
mites leaving the colony during swarming also has a huge impact on the survival
of the parent colony. Particularly, a colony, that otherwise dies off due to virus,
can survive if the percentage of mites leaving the parent colony is above a critical
value.
308 V. Ratti et al.
• The critical value of the percentage of bees leaving the colony is lower in case
of swarming due to overcrowding as compared to the case where swarming
takes place after fixed intervals. This difference could be due to the fact that
swarming due to overcrowding takes place every year, however, swarming after
fixed intervals is basically every 2 years. The parent colony is able to tolerate
greater loss of bees because it gets longer time to establish itself before the next
swarming event takes place.
References
1. Britton, N.F., Franks, N.R., Pratt, S. C., Seeley, T.D.: Deciding on a new home: how do
honeybees agree? Proc. R. Soc. Biol. Sci. 269(1498), 1383–1388 (2002)
2. Eberl, H.J., Frederick, M.R., Kevan, P.G.: The importance of brood maintenance terms in
simple models of the honeybee – Varroa destructor – acute bee paralysis virus complex.
Electron. J. Differ. Equ. Conf. Ser. 19, 85–98 (2010)
3. Fries, I., Hansen, H., Imdorf, A., Rosenkranz, P.: Swarming in honey bees (Apis mellifera) and
Varroa destructor population development in Sweden. Apidologie 34, 389–397 (2003)
4. Genersch, E., von der Ohe, W., Kaatz, H., Schroeder, A., Otten, C.,́ Büchler, R., Berg, S.,
Ritter, W., Mühlen, W., Gisder, S., Meixner, M., Liebig, G., Rosenkranz, P.: The German bee
monitoring project: a long term study to understand periodically high winter losses of honey
bee colonies. Apidologie 41, 332–352 (2010)
5. Kevan, P.G., Hannan, M., Ostiguy, N., Guzman-Novoa, E.: A summary of the varroa-virus
disease complex in honey bees. Am. Bee J. 146(8), 694–697 (2006)
6. Martin, S.: A population dynamic model of the mite varroa jacobsoni. Ecol. Model. 109, 267–
281 (1998)
7. Martin, S.J.: Varroa destructor reproduction during the winter in apis mellifera colonies in UK.
Exp. Appl. Acarol. 25(4), 321–325 (2001)
8. Myerscough, M.R.: Dancing for a decision: a matrix model for nest-site choice by honey- bees.
Proc. R. Soc. Lond. B: Biol. Sci. 270(1515), 577–582 (2003)
9. Ostiguy, N.: Honey bee viruses: transmission routes and interactions with varroa mites. In: 11
Congreso Internacional De Actualizacion Apicola, vol. 9 al 11De Junio De 2004. Memorias.,
p. 47 (2004)
10. Passino, K.M., Seeley, T.D.: Modeling and analysis of nest-site selection by honeybee swarms:
the speed and accuracy trade-off. Behav. Ecol. Sociobiol. 59(3), 427–442 (2006)
11. Ratti, V., Kevan, P.G., Eberl, H.J.: A mathematical model for population dynamics in honeybee
colonies infested with varroa destructor and the acute bee paralysis virus. Can. Appl. Math. Q.
21(1), 63–93 (2013)
12. Ratti, V., Kevan, P.G., Eberl, H.J.: A mathematical model for population dynamics in honeybee
colonies infested with varroa destructor and the acute bee paralysis virus with seasonal effects.
Bull. Math. Biol. 77(8), 1493–1520 (2015)
13. Sumpter, D.J., Martin, S.J.: The dynamics of virus epidemics in varroa-infested honey bee
colonies. J. Anim. Ecol. 73(1), 51–63 (2004)
14. Winston, M.L.: The biology of the honey bee. Harvard University Press, Cambridge (1991)
15. ZKBS (Zentralkommittee für biologiche Sicherheit des Bundesamts für Verbraucherschutz
und Lebensmittelsicherheit); Empfehlung Az.: 45242.0087 - 45242.0094, 2012, (in German:
Central Committee for Biological Safety of the Federal Agency for Consumer Protection and
Food Safety, Recommendation 45242.0087-45242.0094, 2012)
To a Predictive Model of Pathogen Die-off in Soil
Following Manure Application
1 Background
of temperature [7, 8, 14], soil and manure type [18], manure application methods
[2], manure storage [9], intervention strategies [5] and genetic factors [11, 15]. A
nice overview of studies conducted on survival of pathogens is given in [17]. A
recent study [6] presented results from a meta regression on a large number of
potential influencing factors and concluded that the three most important factors
affecting pathogen die-off rates were temperature, water and soil types, and whether
or not the study was conducted in the lab or in the field. Temperature and soil
moisture are environmental factors that are relatively easy to record and predict and,
as such, are of use in a predictive model. The third factor is of particular interest
as the waiting times required by the regulations are based on data obtained under
laboratory conditions.
Data obtained from laboratory studies are subject to highly consistent and
controlled environmental conditions and thus do not necessarily accurately reflect
the wide fluctuations seen in field conditions. The fixed waiting times required by
the regulations may either over- or under-estimate the time required to obtain safe
levels of pathogen reduction. It is, therefore, of value to model pathogen die-off
in local climatic conditions. Obtaining data in field conditions, however, brings its
own set of challenges and concerns. The aim of this study is to develop a predictive
model of pathogen die-off and answer questions arising from the study of pathogen
die-off in soil. Given measurements of pathogen levels in soil and some knowledge
of future environmental conditions, can future pathogen levels be predicted? Can
field derived data provide scientific information that can lead to informed policy
development which allows for sustainable food production while guarding against
food contamination?
2 Experiment
A field study was conducted in 2011–2012 by a team led by Dr. Ann Huber from the
Soil Resource Group and Dr. Keith Warriner from the Department of Food Science
at the University of Guelph. The project was funded by the Food Safety Research
Program facilitated by the Ontario Ministry of Agriculture, Food and Rural Affairs
(OMAFRA). A detailed description of the experimental procedure is available in
[10] and illustrations and photographs of the experiment are presented in Fig. 1.
Trials were conducted at a farm northwest of Belwood, Ontario at two sites,
one with Perth Loam soil and the other with Hillsburg Fine Sandy Loam soil. The
two sites were adjacent to each other and thus subject to the same environmental
conditions. Manure (either dairy or swine) was spiked with either E.coli O157,
Salmonella or Listeria, mixed with the soil, and placed in sentinel vials (see
Fig. 1). These vials, which have a membrane impermeable to the contaminant, allow
the monitoring of pathogen populations in a confined environment and provide a
mechanism for separating the environmental effect on pathogen die-off from the
effect due to transport, such as run-off and movement through the soil profile.
The sentinel vials were buried either directly under the surface or at a depth of
To a Predictive Model of Pathogen Die-off in Soil Following Manure Application 311
Fig. 1 Illustrations and photographs of the experimental procedure (Images reproduced with
permission of Dr. Huber at the Soil Resource Group). Top: Introducing the inoculated sentinel
vials into the test plot at different depths. Middle: Assembly of the sentinel vials into which the
pathogen inoculated manure amended soil will be introduced. Bottom: Methodology to be applied
in the study
312 A. Skelton and A.R. Willms
Table 1 A typical data set. Data collected for over the September 22, 2011 to June 6, 2012 trial,
using dairy manure, in sandy soil, at the surface, measuring levels of E.coli O157. To determine
the data values for model fitting, we take the bacterial count, divide by the dilution, scale by the
sample weight and take the logarithm of the answer to determine the log bacterial count per 10 g
of soil
Sample weights (g) Bacterial counts
Date Sample 1 Sample 2 Sample 3 Sample 1 Sample 2 Sample 3 Dilution
Sep 22/11 10:000 10:000 10:000 1 1 1 0:001
Sep 25/11 10:063 10:019 10:253 75 73 101 0:01
Oct 3/11 10:247 10:154 10:057 1 4 3 0:001
Oct 13/11 10:297 10:024 10:054 7 5 11 0:01
Oct 19/11 10:328 10:035 10:264 1 2 65 0:1
Nov 10/11 10:254 10:106 10:012 3 0 3 0:1
Nov 25/11 10:107 10:057 10:028 1 2 0 0:1
Mar 27/12 10:039 10:041 10:048 0 0 0 0:1
May 1/12 10:059 10:005 10:140 0 0 0 0:1
May 17/12 10:152 10:128 10:020 0 0 0 0:1
Jun 7/12 9:999 10:002 10:006 0 0 0 0:1
To a Predictive Model of Pathogen Die-off in Soil Following Manure Application 313
30 0.55
Average Daily Air Temperature
0.5
20
0.45
% Soil Moisture
0.4
10
0.35
0.3
0
0.25
−10 0.2
0 50 100 150 200 250 300 350 400 0 50 100 150 200 250 300 350 400
Days since June 10, 2011 Days since June 10, 2011
Fig. 2 Environmental data collected. Recordings from the weather station for average daily air
temperature and soil moisture over the course of the three trials. Missing data were interpolated
from records kept by nearby weather stations
are then scaled by the relative weight of the sample so if, for example, the sample
weight was 10:107 g, we would multiply the count by 10=10:107 to obtain a scaled
count. The data with which we will fit our model will be given as a log count of
bacteria per 10 g of soil.
Environmental data were collected by a weather station installed at the site. The
average daily air temperature and percentage of soil moisture are shown in Fig. 2.
There were two periods of missing environmental data. The first was due to strong
winds knocking over the weather station, and the second was due to a raccoon
consuming the power supply. In both cases, it was possible to obtain replacement
weather data spatially averaged between nearby weather stations using data made
freely available by Environment Canada.
We now fit our experimental data using an ordinary differential equation model.
Let x D x.t/ denote the logarithm of the bacteria count per 10 g of soil, and T D
T.t/; M D M.t/ denote the average daily air temperature (degrees Celsius) and soil
moisture (%) linearly interpolated between adjacent data points from the data shown
in Fig. 2.
Pathogen die-off plots typically follow a characteristic logistic curve [2, 3, 7,
11, 14, 18], so we set up a logistic differential equation in which the rate constant
is dependent on both temperature and soil moisture. It is common to discuss
pathogen die-off in terms of numbers of log reductions, so an empirical model of
pathogen die-off in which the dependent variable is given on a logarithmic scale is
appropriate. Using a quadratic dependence on temperature and linear dependence
on soil moisture, we obtain the following ordinary differential equation
where the four rate constants k1 ; k2 ; k3 ; k4 , the two shape constants B; C (the
baseline and maximum values, respectively, which will depend on the trial, soil type,
manure type and sample depth) and the initial condition x.t0 /, where t0 denotes the
start of the particular trial of interest and B < x.t0 / < C, will be obtained from
finding the best model fit to the data. The initial condition must be estimated due
to the use of lab bacteria in field trials. When the lab bacteria are exposed to field
conditions, a subset of the bacteria will experience shock due to the sudden change
in environmental conditions and enter a viable but nonculturable (VBNC) state.
Bacteria in a VBNC state cannot be cultured on growth media [13], but are still
viable and potentially dangerous, and thus must be accounted for in our analysis.
This phenomenon can be seen in the data in Table 1. The first row of data, obtained
at the end of the first day of the trial, has an average of 1000 bacteria per 10 g of
soil. This observed value is significantly less than the number of bacteria that were
originally placed in the spiked soil. The second row of data, obtained 3 days later,
has an average of 8406 bacteria per 10 g of soil. This discrepancy reflects the number
of bacteria that entered a VBNC state initially, but had recovered after 3 days in
the field. In our analysis, we ignore the initial data value and instead estimate the
number of bacteria present at the start of the experiment (Table 2).
Owing to the fact that some of the data points are censored due to detection
thresholds, we will be required to use the Expectation-Maximization (EM) algo-
rithm to fit our model to the data. The EM algorithm first sets all censored data to
exactly half of the appropriate detection threshold (in our case, to either 5, 50, 500,
or 5000 bacteria). The following steps are then repeated until convergence: a least
squares procedure is used to find the best model fit given the current data values
and then the censored data points are adjusted to fit the current parameter set. The
mathematical details of the EM algorithm can be found in [4, 12] and the algorithm
as applied to censored data at multiple detection thresholds can be found in [1].
Table 2 Best Fit Parameters for the plots shown in Fig. 3. Details of the four trials are as follows.
(a) Dairy manure, loam soil, surface, E.Coli, (b) Dairy manure, sand soil, surface, E.Coli, (c) Dairy
manure, sand soil, depth, Salmonella, (d) Swine manure, loam soil, depth, Listeria
Parameter Figure 3a Figure 3b Figure 3c Figure 3d
k1 5:15 104 3:46 103 1:62 103 7:48 106
k2 6:51 105 3:87 104 4:39 104 4:53 103
k3 2:00 105 2:89 105 1:21 104 1:85 104
k4 1:60 104 2:33 104 9:95 104 3:17 103
B 0:79 0:39 0:92 1:37
C 9:71 5:25 6:56 6:32
x.0/ 4:46 4:22 4:18 4:80
To a Predictive Model of Pathogen Die-off in Soil Following Manure Application 315
To find the best fit parameter set, we will be required to search in a seven-
dimensional parameter space. Very little a priori information is available as to the
values of many of the parameters. It is therefore useful to reduce the size of the
parameter space we will be required to search. We used the method presented
in [16] to reduce the size of the search space and improve the speed of the
minimization steps of the EM algorithm. This method uses interval analysis and
linear multistep discretizations to remove boxes of parameter space that are deemed
to be inconsistent with the data. The method is able to quickly remove large regions
of parameter space to allow traditional minimization techniques to work more
effectively.
Results for representative data sets are presented in Fig. 3. We were, in general,
able to obtain good fits to our experimental data. In plots (a) and (d), we can see
that there is an expected initial rapid decrease in the bacterial count, followed by
a slower die-off (and in fact a small growth in the case of Listeria) over the winter
season, followed by another period of more rapid die-off during the spring months.
Plots (b) and (c) illustrate the difficulties faced in modelling these data sets. The
only viable data exists before the winter freeze, making any dynamics during or
after the winter break difficult to model. This lack of information in many data sets
has made calibrating a model to the data very difficult. It has, however, directly led
to improved experimental design and data collection in a follow-up trial.
This paper presents the first step in a process by which we hope to develop a
predictive model for pathogen die-off in soil following manure application. We fit
an ordinary differential equation model to field derived data. Our model was able
to reasonably describe the pathogen die-off using soil moisture and air temperature,
both commonly available environmental data. To establish a predictive, rather than
descriptive, model, we will require additional winter and long-term data with which
we can calibrate our model and then use for testing of predictive capabilities. Such
data is currently being collected and analysis of the data is ongoing and will be
reported elsewhere.
−2
100 150 200 250 300 350 400
Days since June 10, 2011
(c) 5
4
Bacteria Log count
0
100 150 200 250 300 350 400
Days since June 10, 2011
(d) 5
Bacteria Log count
1
100 150 200 250 300 350 400
Days since June 10, 2011
To a Predictive Model of Pathogen Die-off in Soil Following Manure Application 317
References
1. Banks, H.T., Davidian, M., Hu, S., Kepler, G.M., Rosenberg, E.S.: Modelling HIV immune
response and validation with clinical data. J. Biol. Dyn. 2(4), 357–385 (2008)
2. Bech, T., Dalsgaard, A., Jacobsen, O.S., Jacobsen, C.S.: Leaching of Salmonella enterica in
clay columns comparing two manure application methods. Ground Water 49(1), 32–42 (2011)
3. Coroller, L., Leguerinel, I., Mettler, E., Savy, N., Mafart, P.: General model, based on two
mixed Weibull distributions of bacterial resistance, for describing various shapes of inactivation
curves. Appl. Environ. Microbiol. 72(10), 6493–6502 (2006)
4. Dempster, A.P., Laird, N.M., Rubin, D.B.: Maximum likelihood from incomplete data via the
EM algorithm. J. R. Stat. Soc.: Ser. B 39, 1–38 (1977)
5. Franz, E., Semenov, A.V., van Bruggen, A.H.C.: Modelling the contamination of lettuce with
Escherichia coli O157:H7 from manure-amended soil and the effect of intervention strategies.
J. Appl. Microbiol. 105, 1569–1584 (2008)
6. Franz, E., Schijven, J., de Roda Husman, A.M., Blaak, H.: Meta-regression analysis of
commensal and pathogenic Escherichia coli survival in soil and water. Environ. Sci. Technol.
48, 6763–6771 (2014)
7. Fremaux, B., Prigent-Combaret, C., Delignette-Muller, M.L., Mallen, B., Dothal, M., Gleizal,
A., Vernozy-Rozand, C.: Persistence of Shiga toxin-producing Escherichia coli O26 in various
manure-amended soil types. J. Appl. Microbiol. 104, 296–304 (2008)
8. Holley, R.A., Arrus, K.M., Ominski, K.H., Tenuta, M., Blank, G.: Salmonella survival in
manure-treated soils during simulated seasonal temperature exposure. J. Environ. Q. 35, 1170–
1180 (2006)
9. Huber, A.: Survival of pathogens during storage of livestock manures. OMAFRA Final Report.
SR9182 (2009)
10. Huber, A., Warriner, K.: Pathogen die-off rates following manure application under Ontario
field conditions – relationship to pre-harvest wait times. OMAFRA Final Report. SF6088
(2012)
11. Ma, J., Ibekwe, A.M., Yi, X., Wang, H., Yamazaki, A., Crowley, D.E., Yang, C.-H.: Persistence
of Escherichia coli O157:H7 and its mutants in soils. PLoS ONE 6(8), 1–9 (2011)
12. McLachlan, G.J., Krishnan, T.: The EM Algorithm and Extensions. Wiley, New York (1997)
13. Oliver, J.D.: The viable but nonculturable state in bacteria. J. Microbiol. 43(S), 93–100 (2005)
14. Ongeng, D., Muyanja, C., Ryckeboer, J., Springael, D., Geeraerd, A.H.: Kinetic model-based
prediction of the persistence of Salmonella enterica serovar Typhimurium under tropical
agricultural field conditions. J. Appl. Microbiol. 110, 995–1006 (2011)
15. Saint-Ruf, C., Garfa-Traore, M., Collin, V., Cordier, C., Franceschi, C., Matica, I.: Massive
diversification in aging colonies of Escherichia coli. J. Bacteriol. 196(17), 3059–3073 (2014)
16. Skelton, A., Willms, A.R.: Parameter range reduction in ordinary differential equation models.
J. Sci. Comput. 62(2), 517–531 (2015)
17. van Elsas, J.D., Semenov, A.V., Costa, R., Trevors, J.T.: Survival of Escherichia coli in the
environment: fundamental and public health aspects. ISME J. 5, 173–183 (2011)
18. You, Y., Rankin, S.C., Aceto, H.W., Benson, C.E., Toth, J.D., Dou, Z.: Survival of Salmonella
enterica Serovar newport in manure and manure-amended soils. Appl. Environ. Microbiol.
72(9), 5777–5783 (2006)
Mathematical Modeling of VEGF Binding,
Production, and Release in Angiogenesis
Nicoleta Tarfulea
Abstract This paper presents a new mathematical model for the transduction
of the extracellular vascular endothelial growth factor (VEGF) signal into the
intracellular VEGF signal. It is based on a signal transduction pathway that accounts
for VEGF binding, production, and release. The resulting mathematical model
for the evolution of the chemical species concentrations is analyzed analytically
and numerically to address qualitative aspects (including positivity, stability and
robustness with respect to variations of the secretion rate parameter). Various
secretion rate functions are investigated as well.
1 Introduction
N. Tarfulea ()
Purdue University Calumet, 2200 169th Street, Hammond, IN, 46323, USA
e-mail: [email protected]
cell will cause death of approximate 500 tumor cells; (iii) ECs are relatively stable
and will not mutate easily into drug resistant variants [50].
The existing mathematical models in the literature [35] have been able to repro-
duce some characteristics of angiogenesis. These include continuous approaches
[2–5, 10–12, 24, 27, 28, 31, 38–40, 44, 52–54], random walk models [2, 6, 13, 22,
38, 39, 46, 47, 51], and cell-based formulations [7–9, 25, 30, 33, 36, 43, 50]. Reviews
of such models can be found in [35, 37, 42]. However, it has been discovered that the
activated ECs secrete detectable amounts of VEGF [16, 45]. Thus, in this paper we
will develop a new mathematical model that account for VEGF binding, production,
and release.
The dynamic interaction between angiogenic factors, the uPA-plasmin system, and
the presumed activation of matrix-degrading metalloproteinases during angiogene-
sis is shown in Fig. 1. It can be described as follows [50]: (1) hypoxic tumor cells
secrete VEGF; (2) VEGF is sequestered in the ECM by binding to ECM heparin
binding sites; (3) VEGF binds to VEGFR (VEGF receptor) on EC cell (VEGFR-
2 is considered the main signaling receptor in ECs); (4) inactive uPA (urokinase
plasminogen activator) pro-uPA, binds to specific cell surface receptor uPAR;
(5) plasminogen (pgn) binds to pgnR; (6) uPAR-bound uPA reacts with bound-
plasminogen to generate Plasmin; (7) uPAR occupied by uPA forms complexes with
PAI-1 (plasminogen activator inhibitor); (8) Plasmin degrades ECM; (9) Plasmin
mobilizes VEGF from ECM reservoir; (10) Plasmin induces the activation of LTGF-
(1) (3)
Cell Endothelial cell
receptors
VEGF
(2)
pro−MMPs
pgnR uPAR
(9)
Plasmin pgn uPA pro−uPAR
(5) (4)
(6) (14) (15)
(10)
ECM
(13) MMPs
(8)
LTGF−β TGF− β PAIs
(12)
(16)
(17) TIMPs
Matrix degradation
ˇ (latent type beta transforming growth factor) from ECM; (11) Plasmin can convert
LTGF-ˇ into TGF-ˇ (type beta transforming growth factor); (12) active TGF-ˇ
induces synthesis of PAI-1; (13) PAI-1 blocks the conversion of plasminogen into
Plasmin; (14) Plasmin, uPA activate some pro-MMPs (matrix metalloproteinase);
(15) some MMPs can activate other MMPs; (16) all MMPs are inhibited by TIMPs
(tissue inhibitor of MMP enzyme) by binding to pro-MMPs or MMPs; (17) MMPs
degrades ECM. The signal transduction part incorporates known biology more
completely than any other model [35] and involves 18 variables and 14 biochemical
reactions. Using the law of mass action, these lead to a system of ten differential
equations and auxiliary algebraic equations for the time evolution of the intracellular
species.
R Y*
Vi
Y
322 N. Tarfulea
fluid that could bind the ligands, such as secreted ECM, are included. Also, we
assume that receptor concentration is uniform over the cell surface (with no receptor
clusters being formed). The detailed biochemical reactions in this mechanism are as
follows.
k1
Ve C R ! Ve R (1)
k1
k2
Ve R C Y ! Ve RY (2)
k2
k3
Ve RY Y + Ve R (3)
k4
Y C S !
Y S (4)
k4
k5
Y S Vi + Y (5)
Mathematical Modeling of VEGF Binding, Production, and Release in Angiogenesis 323
k6
Y Y (6)
bsr
Vi Ve (7)
dy1
V0 D N Ac k1 y3 N Ac k1 y1 y2 C N Vc sr.y8 / N Vc h1 y1 (8)
dt
dy2
D k1 y3 k1 y1 y2 C s l2 y2 (9)
dt
dy3
D k1 y1 y2 k1 y3 k2 y3 z C .k2 C k3 /y4 l3 y3 (10)
dt
dy4
D k2 y3 z .k2 C k3 /y4 l4 y4 (11)
dt
dy5
D k4 y5 y6 C .k4 C k5 /y7 C k3 y4 k6 y5 (12)
dt
dy6
D k4 y5 y6 C k4 y7 (13)
dt
dy7
D k4 y5 y6 .k4 C k5 /y7 (14)
dt
dy8
Vc D Ac k5 y7 Vc sr.y8 / Vc h2 y8 : (15)
dt
Here s is the insertion rate of surface species into endothelial cell membrane and
l2 , l3 , and l4 represent the internalization rates of surface receptors and complexes.
Their values are listed in Table 2. We introduce the secretion function sr.y8 / which
occurs in the secretion step (7). First, we consider it to be a linear function of the
intracellular VEGF (Vi ) of the form sr.y8 / D bsry8 : This does not affect the validity
of our model since the true secretion rate function is not known. Also, we consider
the case where bsr is piecewise and periodic function. Moreover, the secretion
function can be easily modified and the model amended as new experimental data
becomes available.
324 N. Tarfulea
du4 du7
to the algebraic system of equations D 0 and D 0. By replacing u4 and
d d
u7 and by dropping the O./ terms, after some simplifications, we obtain a system
of differential equations for the species concentrations. In case A, the variables are
u1 ; u3 ; u5 ; u6 , and u8 . In addition, in Case B we have u2 . Having investigated the
dynamics of species concentrations in the described cases, several observations can
be made. The analysis in each case was made using the same set of parameters and
initial conditions. The reduced system in Case A agrees with the full system only on
short time, however we see that the reduced system in Case B and the full system
agree on both short and long time period.
After VEGF is been secreted and released into nearby tissues by the hypoxic tumor,
it binds to endothelial cell receptors, process that activates a series of relay proteins
which in turn transmit a signal that starts a series of cascades inside the cell. So far
the mechanism was reduced to four primary species for the intracellular dynamics.
Next, we make the biologically realistic assumption that the substrate is not only
consumed, but also produced during the entire process Thus, we can consider that
the rate of change of substrate concentration is approximately zero. Moreover, we
investigate Case A and Case B too. A similar analysis as well as a comparison
between the two systems is performed and we obtain that Case B agrees with the
full system on both short and long time period. Thus, we consider the following
system to represent the governing equations for the intracellular dynamics.
du1
D N1 ˛1 u3 N1 u1 u2 C ˇ1 u8 ˇ2 u1 (16)
d
du2
D ˛1 u3 u1 u2 C ı1 ı2 u2 (17)
d
du3
D u1 u2 .˛1 C ı3 /u3 (18)
d
du5
D ˛4 ˛2 2 .1 .1 C ˛3 u6 /u5 /u3 ˛5 u5 (19)
d
du8 N 1
D ˛3 u5 u6 .ˇ1 C ˇ3 /u8 ; (20)
d 2
We performed a stability and bifurcation analysis for the above system considering
it to be on the form
du
D f .u; p/; u.0/ D u0 (21)
dt
4 Conclusions
References
1. Adams, R.H., Alitalo, K.: Molecular regulation of angiogenesis and lymphangiogenesis. Nat.
Rev. Mol. Cell Biol. 8, 464–478 (2007)
2. Anderson, A.R.A., Chaplain, M.A.J.: Continuous and discrete mathematical models of tumor-
induced angiogenesis. Bull. Math. Biol. 60, 857–900 (1998)
3. Anderson, A.R.A., Chaplain, M.A.J.: A mathematical model for capillary network formation
in the absence of endothelial cell proliferation. Appl. Math. Lett. 11, 109–114 (1998)
4. Arakelyan, L., Vainstein, V., Agur, Z.: A computer algorithm describing the process of vessel
formation and maturation, and its use for predicting the effects of anti-angiogenic and anti-
maturation therapy on vascular tumor growth. Angiogenesis 5, 203–214 (2002)
5. Balding, D., McElwain, D.L.S.: A mathematical model of tumor-induced capillary growth. J.
Theor. Biol. 114, 53–73 (1985)
6. Bartha, K., Rieger, H.: Vascular network remodeling via vessel cooption, regression and growth
in tumors. J. Theor. Biol. 21, 903–918 (2006)
7. Bauer, A., Jackson, T., Jiang, Y.: A cell-based model exhibiting branching and anastomosis
during tumor-induced angiogenesis. Biophys. J. 92, 3105–3121 (2007)
8. Bentley, K., Gerhardt, H., Bates, P.A.: Agent-based simulation of notch-mediated tip cell
selection in angiogenic sprout initialisation. J. Theor. Biol. 250, 25–36 (2008)
9. Bentley, K., Mariggi, G., Gerhardt, H., Bates, P.A.: Tipping the balance: robustness of tip cell
selection, migration and fusion in angiogenesis. PLoS Comput. Biol. 5, e1000549 (2009)
10. Billy, F., Ribba, B., Saut, O., et al.: A pharmacologically based multiscale mathematical model
of angiogenesis and its use in investigating the efficacy of a new cancer treatment strategy. J.
Theor. Biol. 260, 545–562 (2009)
11. Byrne, H.M., Chaplain, M.A.J.: Mathematical models for tumour angiogenesis: numerical
simulations and nonlinear wave solutions. Bull. Math. Biol. 57, 461–486 (1995)
12. Byrne, H.M., Chaplain, M.A.J.: Explicit solutions of a simplified model of capillary sprout
growth during tumor angiogenesis. Appl. Math. Lett. 9, 69–74 (1996)
13. Capasso, V., Morale, D.: Stochastic modelling of tumour-induced angiogenesis. J. Math. Biol.
58, 219–233 (2009)
14. Claesson-Welsh, L.: Signal transduction by vascular endothelial growth factor receptors.
Biochem. Soc. Trans. 31, part 1 (2003)
15. Delgado, M., Morales-Rodrigo, C., SuÃarez, ˛ A.: Anti-angiogenic therapy based on the binding
to receptors. DCDS-A 32(11), 3871–3894 (2012)
16. Di Talia, S., Gamba, A., Lamberti, F., Serini, G.: Role of repulsive factors in vascularization
dynamics. Phys. Rev. E 73, 041917:1–11 (2006)
328 N. Tarfulea
17. Folkman, J.: The vascularization of tumors. In: Cancer Biology: Readings from Scientific
American, pp. 115–124. Freeman, New York (1996)
18. Folkman, J. What is evidence that tumors are angiogenesis dependent? J. Natl. Cancer Inst. 82,
4–6 (1990)
19. Folkman, J.: Clinical applications of research on angiogenesis. N. Engl. J. Med. 333, 1757–
1763 (1995)
20. Folkman, F.: Fighting cancer by attaching its blood supply. Sci. Am. 275, 150–154 (1996)
21. Gabhann, F.M., Popel, A.S.: Model of competitive binding of vascular endothelial growth
factor and placental growth factor to VEGF receptors on endothelial cells. Am. J. Physiol.
Heart Circ. Physiol. 286, H153–H164 (2004)
22. Goede, V., Schmidt, T., Kimmina, S., Kozian, D., Augustin, H.G.: Analysis of blood vessel
maturation processes during cyclic ovarian angiogenesis. Lab. Invest. 78, 1385 (1998)
23. Hegen, A., Koidl, S., Weindel, K., et al.: Expression of angiopoietin-2 in endothelial cells is
controlled by positive and negative regulatory promoter elements. Arterioscler. Thromb. Vasc.
Biol. 24, 1803–1809 (2004)
24. Holmes, M.J., Sleeman, D.: A mathematical model of tumour angiogenesis incorporating
cellular traction and viscoelastic effects. J. Theor. Biol. 202, 95–112, 2000
25. Jackson, T.L., Zheng, X.: A cell-based model of endothelial cell elongation, proliferation and
maturation during corneal angiogenesis. Bull. Math. Biol. 72, 830–868 (2010)
26. Jekunen, A., Kairemo, K.: Inhibition of angiogenesis at endothelial cell level. Microsc. Res.
Tech. 60, 85–97 (2003)
27. Levine, H.A., Nilsen-Hamilton, M.: Angiogenesis – a biochemial/mathematical perspective.
In: Friedman, A. (ed.) Tutorials in Mathematical Biosciences III, chapter 2. Springer (2006)
28. Levine, H.A., Pamuk, S., Sleeman, B.D., Nilsen-Hamilton, M.: Mathematical modeling of
capillary formation and development in tumor angiogenesis: penetration into the stroma. Bull.
Math. Biol. 63, 801–863 (2001)
29. Lignet, F., Benzekry, S., Wilson, S., Billy, F., Saut, O., Tod, M., You, B., Berkane, A.A.,
Kassour, S., Wei, M.X., Grenier, E., Ribba, B.: Theoretical investigation of the efficacy of
antiangiogenic drugs combined to chemotherapy in xenografted mice. J. Theor. Biol. 320, 86–
99 (2013)
30. Liu, G., Qutub, A.A., Vempati, P., Mac Gabhann, F., Popel, A.: Module-based multiscale
simulation of angiogenesis in skeletal muscle. Theor. Biol. Med. Model. 8, 6 (2011)
31. Manoussaki, D.: A mechanochemical model of angiogenesis and vasculogenesis. ESAIM:
Math. Model. Numer. Anal. 37, 581–599 (2003)
32. Matsushita, K., Yamakuchi, M., Morrell, C.N., et al.: Vascular endothelial growth factor
regulation of Weibel-Palade-body exocytosis. Blood 105, 207 (2005)
33. Milde, F., Bergdorf, M., Koumoutsakos, P.: A hybrid model for three-dimensional simulations
of sprouting angiogenesis. Biophys. J. 95, 3146–3160 (2008)
34. Murray, J.D.: Mathematical Biology, 3rd edn. Springer-Verlag, Berlin/Heidelberg/New York
(2004)
35. Othmer, H.G., Mantzaris, N., Webb, S.: Mathematical modeling of tumor-induced angiogene-
sis. J. Math. Biol. 49(2), 111–187 (2004)
36. Peirce, S.M., Van Gieson, E.J., Skalak, T.C.: Multicellular simulation predicts microvascular
patterning and in silico tissue assembly. FASEB J. 18, 731–733 (2004)
37. Peirce, S.M.: Computational and mathematical modeling of angiogenesis. Microcirculation 15,
739–751 (2008)
38. Plank, M.J., Sleeman, B.D.: A reinforced random walk model of tumor angiogenesis and anti-
angiogenesis strategies. IMA J. Math. Med. Biol. 20, 135–181 (2003)
39. Plank, M.J., Sleeman, B.D.: Lattice and non-lattice models of tumour angiogenesis. Bull. Math.
Biol. 66, 1785–1819 (2004)
Mathematical Modeling of VEGF Binding, Production, and Release in Angiogenesis 329
40. Plank, M.J., Sleeman, B.D., Jones, P.F.: A mathematical model of tumour angiogenesis,
regulated by vascular endothelial growth factor and the angiopoietins. J. Theor. Biol. 229,
435–454 (2004)
41. Poleszczuk, J., Bodnar, M., Forys, U.: New approach to modeling of antiangiogenic treatment
on the basis of Hahnfeldt et al. model. MBE 8(2), 591–603 (2011)
42. Qutub, A.A., Mac Gabhann, F., Karagiannis, E.D., Vempat, P., Popel, A.: Multiscale models of
angiogenesis. IEEE Eng. Med. Biol. Mag. 28, 14–31 (2009)
43. Qutub, A.A., Popel, A.: Elongation, proliferation & migration differentiate endothelial cell
phenotypes and determine capillary sprouting. BMC Syst. Biol. 3, 13 (2009)
44. Schugart, R.C., Friedman, A., Zhao, R., Sen, C.K.: Wound angiogenesis as a function of tissue
oxygen tension: a mathematical model. PNAS 105, 2628–2633 (2008)
45. Serini, G., Ambrosi, D., Giraudo, E., Gamba, A., Preziosi, L., Bussolino, F.: Modeling the early
stages of vascular network assembly. EMBO J. 8, 1771–1779 (2003)
46. Stokes, C.L., Lauffenburger, D.A.: Analysis of the roles of microvessel endothelial cell random
mobility and chemotaxis in angiogenesis. J. Theor. Biol. 152, 377–403 (1991)
47. Sun, S., Wheeler, M.F., Obeyesekere, M., Patrick, C.: A deterministic model of growth factor-
induced angiogenesis. Bull. Math. Biol. 67, 313–337 (2005)
48. Tang, Y., Othmer, H.G.: A G-protein-based model for cAMP dynamics in Dictyostelium
discoideum. Math. Biosci. 120, 25–76 (1994)
49. Tang, Y., Othmer, H.G.: Excitation, oscillations and wave propagation in a G-protein-based
model of signal transduction in Dictyostelium discoideum. Philos. Trans. R. Soc. 349, 179–195
(1996)
50. Tarfulea, N.: Mathematical Modeling of Signal Transduction and Cell Motility in Tumor
Angiogenesis. University of Minnesota Ph.D. thesis, ProQuest (2006)
51. Tong, S., Yuan, F.: Numerical simulations of angiogenesis in the cornea. Microvasc. Res. 61,
14–27 (2001)
52. Travasso, R.D.M., Corvera Poir, E., Castro, M., et al.: Tumor angiogenesis and vascular
patterning: a mathematical model. PLoS ONE 6, e19989 (2011)
53. Xue, C., Friedman, A., Sen, C.K.: A mathematical model of ischemic cutaneous wounds.
PNAS 106, 16782–16787 (2009)
54. Zheng, X., Koh, G.Y., Jackson, T.: A continuous model of angiogenesis: initiation, extension,
and maturation of new blood vessels modulated by vascular endothelial growth factor,
angiopoietins, platelet-derived growth factor-B, and pericytes. DCDS-B 18, 1109–1154 (2013)
A Mathematical Model of Cytokine Dynamics
During a Cytokine Storm
1 Introduction
Overly robust cytokine responses are responsible for a broad array of very chal-
lenging and often fatal clinical conditions. These include infectious diseases such
as influenza [16], severe acute respiratory syndrome (SARS) [11], bacteria-induced
toxic shock syndrome [20] and sepsis [9], as well as multiple sclerosis [13], graft-
versus-host disease [7] and sometime adverse effects of therapies [22]. Cytokines
are released by cells to coordinate an immune response to help protect against
foreign and/or dangerous matter. They are produced in response to infection and
inflammation [5]. There are five major classifications of cytokines; interferons
(IFN), interleukins (IL), chemokines, colony-stimulating factors (CSF), and tumour
necrosis factors (TNF) [23]. Together they function in order to stimulate a response
that will control cellular stress as well as minimize the amount of damage to a
particular cell or group of cells [5].
Although the goal of each cytokine is to ultimately protect the host against
dangerous insults, it is not uncommon for this process to become unbalanced.
For reasons unknown, positive feedback loops can become up-regulated during an
immune response involving complex interaction between cytokines and immune
cells. The fine balance that is typical of healthy individuals is lost and gives rise to a
cascade which is termed a cytokine storm. The dynamics of cytokines during normal
immune responses and even more so during storms are highly complex and little
is known about specific interactions [5, 27]. Cytokine storms not only have very
negative effects on the immune response, they often have life threatening effects
including a decrease in blood pressure, increase in heart rate and can often lead to
death of the host [27].
As more biological data is collected, the immense complexities of the immune
system is becoming increasingly apparent [26]. It is clear that mathematical mod-
elling has become an essential tool to complement experimental techniques both in
vitro and in vivo. Combining these approaches can result in major advancements in
both the understanding of cancer and immune system dynamics including cytokine
interactions, with the potential to identify strategies to control toxic cytokine storms
[26].
Previous mathematical models include at most two cytokines and do not focus
the research on the interactions and function of the cytokines. Typical cytokines
included in models are IL-2, IL-10, IL-12 and TNF. Unfortunately, even the models
that contain cytokines do not investigate the specific interactions that we are
interested in. These models exclude many of the cytokines that are of greatest
interest to us [6, 12, 15, 19].
Since our focus is to model only the dynamics of cytokines, we turn to ordinary
differential equation (ODE) models to provide a good framework for exploring
interactions between different cytokine populations. To keep the model relatively
simple, we ignore the effects of effector cells (activated immune cells) due to the
complexities it brings to the model. To date, the only model that is of a similar
nature is produced by [27] called Dynamics of a Cytokine Storm. In this paper, the
interactions of nine cytokines were modelled using data from a human clinical trial
where six volunteers took part in a study that accidentally led them to undergo the
effects of a cytokine storm [27]. This model was primarily constructed to look at the
effects of the antibody responsible for the cytokine storm using a linear ODE model
where parameter estimation determined coupling parameters between cytokines.
The coupling parameters identified which cytokine was responsible for enhancing
or inhibiting each other cytokine as well as self-regulation [27].
In this paper, we determine how cytokines interact with one another based on a
set of time series data provided by Dr. Byram Bridle and his lab members Dr. Scott
Walsh and Alexandra Rasiuk at the Ontario Veterinary College (OVC). Following
administration of a highly attenuated virus to mice with leukocytes lacking the
type I IFN receptor, a deadly cytokine storm developed leading to death in only
24 h. Down-regulation of anti-viral IFN signaling is a common mechanism used
by viruses during infection, including those associated with cytokine storms (e.g.
influenza virus [14], SARS-coronavirus [3] and Ebola virus [2]). Thus, a natural
A Mathematical Model of Cytokine Dynamics During a Cytokine Storm 333
question arises: what are the specific dynamics of cytokines with respect to both
initiating and exacerbating a cytokine storm when type I interferon signalling is
impaired?
2 Mathematical Model
Most biological systems are innately non-linear and thus a non-linear ODE model
is essential to obtain the proper dynamics [26]. The model we use is given by:
Mi
xP i D i xi C for i; j D 1; 2; : : : ; 13: (1)
1 C eyi
The first and most common assumption throughout the literature is that the
concentration of a particular cytokine, xi , continues to decrease linearly when there
is no outside stimulus [10, 17]. Since cytokines are secreted by other cells it makes
sense that in the absence of these producers, the number of cytokines will rapidly
decline at a rate i (>0) [10, 17, 25]. The second assumption is that the rate of
production of cytokines is dependent on interactions with other cytokines and is
sigmoidal in shape of the form
Mi
;
1 C eyi
where Mi (>0) is the maximum production rate. The interaction with other
cytokines, yi , determines the slope of the function, and thus how much of a cytokine
is produced, potentially offsetting some or all of the decay [10, 17, 25]. The
interaction factor yi is given by
X
n
yi D ˛0;i C ˛i;j xj C Si ; (2)
jD1
meaning that yi is composed of effects from the presence of other cytokines, ˛i;j ;
effects from components for which there is no data, ˛0;i ; and the stimulus, Si , by the
virus. The stimulus is of the form
Si D bet= ;
where there is an initial dose of the drug, b, which decays exponentially with
characteristic time .
334 M. Waito et al.
3 Data
Data was collected and provided by Dr. Byram Bridle, Dr. Scott Walsh and
Alexandra Rasiuk who study the role of type I IFN signalling in the regulation
of cytokine responses at the OVC. Chimeric mice were made by lethal irradiation
of the bone marrow of C57BL/6 mice (Charles River Laboratories) followed by
reconstitution with bone marrow from either wild-type or type I IFN receptor
(IFNAR)-knockout donors (the latter provided by Laurel Lenz, University of
Colorado School of Medicine). These mouse-based experiments were approved
by the institutional Animal Care Committee and complied with the standard of
the Canadian Council of Animal Care. These mice were infected intravenously
with recombinant Vesicular Stomatitis Virus with a deletion of methionine at
position 51 of the matrix protein (VSV
m51) [21]. The matrix protein of VSV
suppresses antiviral type I IFN responses. Therefore, this mutant virus renders the
already attenuated laboratory strain of VSV even safer and it is being developed
as an oncolytic virus for the treatment of cancers via intravenous infusion [24].
Surprisingly, mice lacking the IFNAR on their leukocytes experienced a profound
cytokine storm, ultimately leading to death in only 24 h. The resulting time series
data provided concentrations of 13 different cytokines in plasma, measured using a
multiplex array (BioRad).
Concentrations of 13 cytokines were recorded at times 0, 2.5, 5, 10 and
24 h for both the wild-type mice and mice lacking the IFNAR on 20% of their
leukocytes. Raw data was then normalized to account for the vast variability in the
concentrations. This was done by dividing the concentration at each time point by
the sum of the concentrations across all time points for a particular cytokine. In order
to produce an accurate fit to the model it was essential to group cytokines to reduce
the number of parameters. Grouping was based on the inflammatory classification
of each cytokine as well as similarity of cytokine profile. The time at which the peak
concentration occurred was recorded along with either the pro- or anti-inflammatory
classification. Groupings can be seen in Table 1. Parameter estimation techniques,
specifically fmincon in MATLAB, were used to fit the model to the data. The cost
function is the typical least squares function with a normalization matrix to offset
discrepancies between groups.
4 Results
0.4
0.3 0.3 0.6
Concentration
Concentration
Concentration
Concentration
0.3
0.2 0.2 0.4
0.2
0 0 0 0
0 5 10 15 20 25 0 5 10 15 20 25 0 5 10 15 20 25 0 5 10 15 20 25
Time (hours) Time (hours) Time (hours) Time (hours)
Concentration
Concentration
0 0
0 5 10 15 20 25 0 5 10 15 20 25 0 5 10 15 20 25
Time (hours) Time (hours) Time (hours)
Fig. 1 Model results from parameter estimation of IFNAR-knockout mice. Dots represent raw
time series data, lines show the model prediction
336 M. Waito et al.
GROUP
3
GROUP CYTOKINES
GROUP GROUP
1 IL-13, IL-5
2 4
2 MIP- , TNF- , IL-12
5 IL-6
6 MIP-1
GROUP GROUP
7 5 7 Rantes
GROUP
6
Fig. 2 Largest three interactions for each cytokine group of IFNAR-knockout mice are repre-
sented with a line. Solid lines with an arrow indicate enhancing effects while dotted lines with a
‘T’ indicate inhibitory effects
[18, 23]. Model results for Group 2 show that it is an integral part of six significant
interactions and has multiple two-way paths, one with Group 5 and another with
Group 7. All three interactions that affect Group 2 are enhancing, indicating that as
the storm progresses, the amount of cytokine will continue to rise. TNF-˛, along
with IL-1ˇ (found in Group 3), are considered early-response cytokines, occurring
soon after an immune response is triggered. It is known biologically that TNF-˛
promotes the generation of IL-1ˇ [23]. Although the results are not shown for the
wild-type case, the model results indicate that in fact Group 2 does enhance Group
3. In the case of IFNAR-knockout mice however, Group 2 inhibits Group 3 (the
relatively small interaction is not shown in Fig. 2). This difference begins to shed
light on why a storm occurred in mice lacking IFNAR on leukocytes.
Another central group is Group 4 which is made up of two anti-inflammatory
cytokines, IL-4 and IL-10, with the latter being a very prominent inhibitor. IL-10 is
often produced once a cytokine storm has begun in an attempt to return the balance
that has been lost, termed immunoparalysis. Although overproduction can often
allow the host to survive the cytokine storm longer, it is not likely it will survive long
term [8, 18, 23]. Model results for Group 4 show that there are six interactions that
are significant as well as two primarily enhancing two-way interactions with Groups
3 and 5. The three interactions that affect Group 4 are all enhancing, meaning that
the amount of Group 4 will likely increase as the storm continues. Biologically it is
known that IL-10 plays a role in the down regulation of both TNF-˛ (Group 2) and
IL-1ˇ (Group 3) [18]. Referring to Fig. 2, the model verifies that in fact Group 4
does inhibit Group 2, however Group 4 enhances Group 3. This could be due to the
grouping of cytokines, since Group 2 contains MIP-1ˇ and IL-12 as well. On the
A Mathematical Model of Cytokine Dynamics During a Cytokine Storm 337
contrary, in the wild-type case, Group 4 inhibits Group 3 while it enhances Group
2.
A well-studied cytokine that is known to be a key component of a cytokine storm
is IL-6, Group 5, which has both pro- and anti-inflammatory properties and is a
central cytokine used to assess cytokine responses in the host [23]. Figure 2 displays
the importance of this group with the eight interactions and two primarily enhancing
two-way paths. It is known biologically that the production of IL-6 is stimulated by
TNF-˛ and IL-1ˇ [23]. Results from the model using wild-type data verify that
indeed both Groups 2 and 3 enhance Group 5, however the interaction between
Group 3 and 5 is relatively small. IFNAR-knockout results shown in Fig. 2 imply
that Groups 2 and 3 inhibit Group 5 and that those interactions are significant. Again,
this can provide some insight into how a storm was able to occur.
Group 6, MIP-1˛, is required for a typical inflammatory response to viruses [4].
It is a pro-inflammatory chemokine that inhibits proliferation of hematopoietic stem
cells in vitro and in vivo [4]. Model results for MIP-1˛ show that six interactions
are significant as well as a two-way interaction with Group 3. The three interactions
that affect MIP-1˛ are both inhibiting and enhancing whereas in the wild-type case
the interactions are purely enhancing, causing an increase in the amount of MIP-1˛
as the storm continues.
It has been noted that the fine balance of pro- and anti-inflammatory mechanisms
is critical in maintaining stability, and if these mechanisms become unbalanced,
the outcome may contribute to a cytokine storm [23]. Groups 1 and 4 are anti-
inflammatory cytokines, while the remainder act primarily as pro-inflammatory
cytokines. For wild-type populations, of the three most significant groups (2, 4, and
6), the anti-inflammatory cytokines are being inhibited, while the pro-inflammatory
cytokines are being enhanced. This balance in this system becomes lost in mice
lacking the IFNAR on their leukocytes, as shown in Fig. 2. Instead of the anti-
inflammatory cytokines (Group 4) being inhibited, they are instead enhanced.
Immediately it becomes apparent that the fine balance that is typical of healthy
individuals has become unstable.
Future work including sensitivity analysis of cytokine groupings could provide
further information on the significance of the groupings and individual cytokines.
In conclusion, cytokines belonging to Groups 2, 4, 5 and 6, particularly TNF-˛,
IL-10, IL-6 and MIP-1ˇ, have the largest effects on the dynamics of this particular
cytokine storm. Changes introduced into the system by knocking out IFNAR cause
key interactions to swap from enhancing to inhibiting and vice versa. It is possible
that reducing the alterations in the effects of Groups 2, 4, 5 and 6 could lead to the
reduction in severity and possibly even the entire storm.
Acknowledgements This research was supported in part by the Government of Ontario and the
University of Guelph.
338 M. Waito et al.
References
1. Bellomo, N., Li, N.K., Maini, P.K.: On the foundations of cancer modelling: selected topics,
speculations, and perspectives. World Sci. 18(4), 593–646 (2008)
2. Chang, T.-H., Kubota, T., Matsuoka, M., Jones, S., Bradfute, S.B., Bray, M., Ozato, K.:
Ebola zaire virus blocks type i interferon production by exploiting the host sumo modification
machinery. PLoS Pathog. 5(6), e1000493 (2009)
3. Chen, X., Yang, X., Zheng, Y., Yang, Y., Xing, Y., Chen, Z.: Sars coronavirus papain-like
protease inhibits the type i interferon signaling pathway through interaction with the sting-
traf3-tbk1 complex. Protein Cell 5(5), 369–381 (2014)
4. Cook, D.N.: The role of mip-1˛ in inflammation and hematopoiesis. J. Leucoc. Biol. 59(1),
61–66 (1996)
5. Dranoff, G.: Cytokines in cancer pathogenesis and cancer therapy. Nature 4(1), 11–22 (2004)
6. Eftimie, R., Bramson, J.L., Earn, D.J.D.: Interactions between the immune system and cancer:
a brief review of non-spatial mathematical models. Bull. Math. Biol. 73(1), 2–32 (2011)
7. Ferrara, J.L.: Cytokine dysregulation as a mechanism of graft versus host disease. Curr. Opin.
Immunol. 5(5), 794–799 (1993)
8. Frazier, W.J., Hall, M.W.: Immunoparalysis and adverse outcomes from critical illness. Pediatr.
Clin. N. Am. 55(3), 647–668 (2008)
9. Harrison, C.: Sepsis: calming the cytokine storm. Nat. Rev. Drug Discov. 9(5), 360–361 (2005)
10. Hone, A., van den Berg, H.: Mathematical analysis of artificial immune system dynamics and
performance. In: Flower, D., Timmis, J. (eds.) In Silico Immunology, pp. 351–374. Springer,
New York (2007)
11. Huang, J., Wu, S., Barrera, J., Matthews, K., Pan, D.: The Hippo signaling pathway coordi-
nately regulates cell proliferation and apoptosis by inactivating Yorkie, the drosophila homolog
of YAP. Cell 122(3), 421–434 (2005)
12. Kirschner, D., Panetta, J.C.: Modeling immunotherapy of the tumor-immune interaction. J.
Math. Biol. 37, 235–252 (1998)
13. Link, H.: The cytokine storm in multiple sclerosis. Mult. Scler. 4(1), 12–15 (1998)
14. Medina, R.A., Garcia-Sastre, A.: Influenza a virus: new research developments. Nat. Rev.
Microbiol. 9, 590–603 (2011)
15. Müller, J., Tjardes, T.: Modeling the cytokine network in vitro and in vivo. J. Theor. Med. 5(2),
93–110 (2003)
16. Pothlichet, J., Meunier, I., Davis, B.K., Ting, J.P.-Y., Skamene, E., von Messling, V.,
Vidal, S.M.: Type I IFN triggers RIG-I/TLR3/NLRP3-dependent inflammasome activation in
influenza A virus infected cells. PLoS Pathog. 9(4), e1003256 (2013)
17. Read, M., Timmis, J., Andrews, P.S.: Empirical investigation of an artificial cytokine network.
In: Bentley, P.J., Lee, D., Jung, S. (eds.) Artifical Immune Systems, pp. 340–351. Springer,
Berlin/Heidelberg (2008)
18. Reis, E.A.G., Hagan, J.E., Ribeiro, G.S., Teixeira-Carvalho, A., Martins-Filho, O.A., Mont-
gomery, R.R., Shaw, A.C., Ko, A.I., Reis, M.G.: Cytokine response signatures in disease
progression and development of severe clinical outcomes for leptospirosis. PLoS Negl. Trop.
Dis. 7(9), e2457 (2013)
19. Rodríguez-Pérez, D., Sotolongo-Grau, O., Riquelme, R.E., Sotolongo-Costa, O., Antonio
Santos Miranda, J., Antoranz, J.C.: Assessment of cancer immunotherapy outcome in terms
of the immune response time features. Math. Med. Biol. 25, 287–300 (2008)
20. Silversides, J.A., Lappin, E., Ferguson, A.J.: Staphylococcal toxic shock syndrome: mecha-
nisms and management. Curr. Infect. Dis. Rep. 12(5), 392–400 (2010)
21. Stojdl, D.F., Lichty, B.D., tenOever, B.R., Paterson, J.M., Power, A.T., Knowles, S., Marius, R.,
Reynard, J., Poliquin, L., Atkins, H., Brown, E.G., Durbin, R.K., Durbin, J.E., Hiscott, J., Bell,
J.C.: Vsv strains with defects in their ability to shutdown innate immunity are potent systemic
anti-cancer agents. Cancer Cell 4(4), 263–275 (2003)
A Mathematical Model of Cytokine Dynamics During a Cytokine Storm 339
22. Suntharalingam, G., Perry, M.R., Ward, S., Brett, S.J., Castello-Cortes, A., Brunner, M.D.,
Panoskaltsis, N.: Cytokine storm in a phase 1 trial of the anti-cd28 monoclonal antibody
tgn1412. N. Engl. J. Med. 355(10), 1018–1028 (2006)
23. Tisoncik, J.R., Korth, M.J., Simmons, C.P., Farrar, J., Martin, T.R., Katze, M.G.: Into the eye
of the cytokine storm. Microbiol. Mol. Biol. Rev. 76(1), 16–32 (2012)
24. Wollmann, G., Rogulin, V., Simon, I., Rose, J.K., van den Pol, A.N.: Some attenuate variants of
vesicular stomatitis virus show enhanced oncolytic activity against human glioblastoma cells
relative to normal brain cells. J. Virol. 84(3), 1563–1573 (2010)
25. Wu, J.T., Kirn, D.H., Wein, L.M.: Analysis of a three-way race between tumor growth, a
replication-competent virus and an immune response. Bull. Math. Biol. 66, 605–625 (2004)
26. Yates, A., Chan, C.C.W., Callard, R.E., George, A.J.T., Stark, J.: An approach to modelling in
immunology. Brief. Bioinform. 2(3), 245–257 (2001)
27. Yiu, H.H., Graham, A.L., Stengel, R.F.: Dynamics of a cytokine storm. PLOS One 7(10),
e45027 (2012)
Examining the Role of Social Feedbacks
and Misperception in a Model of Fish-Borne
Pollution Illness
1 Introduction
2 Model
Note that the form of the abatement function f .X/ is important. It should be
monotone increasing in X, and have a social concern threshold xM above which
there is complete abatement: i.e. whenever X xM , then f .X/ D 1 and E.t/ D 0.
Table 1 gives a summary of the model variables and parameters, including the values
selected in [20] to simulate the historic pollution epidemic in Minamata. In these
simulations, f is chosen to be a nonlinear function with xM D 0:4,
With the appropriate choice of initial conditions, we can constrain the solutions
of (1) to an invariant region ˝ in the non-negative orthant of the FBIPX state space,
( )
.F; B; I; P; X/ W F; X 2 Œ0; 1; B 0;
˝ WD 1Cs
1
(3)
I 2 0; 1CbCs ; P 2 0; 1CbCs
Existence and Stability Conditions This equilibrium cannot occur in ˝ unless the
following three inequality conditions hold: the social concern is below the threshold
needed to abate the emissions,
h
0 < xM (5)
ˇ.1 C b C s/
and the returns from the harvest exceed the cost of fishing,
"F .1 f .X //
c < H.1 bP / 1 : (7)
r
Using these same inequalities, it is shown in [20] that when the nontrivial
equilibrium exists in ˝ it is locally attractive there.
Convergence of Solutions to the Pollution Epidemic Equilibrium Even if a pollution
epidemic equilibrium exists and is locally attractive in ˝, it will not necessarily
Social Feedbacks in a Model of Fish-Borne Pollution Illness 345
be reached. The existence and local stability conditions alone are not enough to
guarantee convergence to steady-state, since the system (1) is highly coupled and
nonlinear. The convergence behaviour of this system is sensitive to the relative
growth rates of each variable, particularly those that affect the viability of the fishery.
Solutions converge to the pollution epidemic equilibrium if the injuries P.t/ and
social concern X.t/ grow fast enough that the fish catch F.t/B.t/ attains its steady-
state. Whereas when they grow too slowly, the fish catch F.t/B.t/ will collapse.
These observations are illustrated in the following schematic:
Due to the nonlinearity of the system, we are not able to characterize the
convergence behaviour more precisely in terms of the model parameters, as we
were in (5), (6) and (7). However, there are insights to be gained from writing each
variable in terms of its associated integral equation, evaluated up to some time T:
ZT
P.T/ D P.t0 / C "I H F.t/ B.t/ .1 f .X.t/// Œ1 .1 C b C s/ P.t/ dt
t0
ZT
X.T/ D X.t0 / C X.t/ .1 X.t// Œh P.t/ ˇ X.t/ dt
t0
ZT ZT
F.T/ D F.t0 / C r F.t/ .1 F.t// H F.t/ B.t/ dt "F F.t/ .1 f .X.t/// dt
t0 t0
ZT
B.T/ D B.t0 / C .1 b P.t//H F.t/ B.t/ c B.t/ dt
t0
Observe that these integral equations depend on the initial conditions and the
parameter values "I and , whereas the inequalities (5), (6) and (7) do not. We see
that the fishery is sensitive to the time evolution of P.t/ and X.t/, because P.t/
affects both the demand for fish 1 bP.t/ and the demand for abatement X.t/, while
X.t/ affects the emissions. In general, during the time that P.t/ and X.t/ are small,
both the number of boats and the level of emissions are high. If the fish population
is driven below the break-even cost required for the boats, the fish catch collapses
and an epidemic is averted.
346 M. Yodzis et al.
3 Analysis
In [20] our model is applied to simulate the pollution epidemic that occurred from
1949 to 1968 in Minamata, Japan. Given that some of the datasets from Minamata
are incomplete or sampled at irregular time intervals, the simulations are meant to
agree qualitatively with the available data, and to identify a set of baseline parameter
values that are physically plausible. These baseline values displayed in Table 1. The
simulations run from 1945 to 1976.
We are interested in examining how the social feedbacks, driven by the parame-
ters s, b and h, affect the resulting steady-state. The system (1) has nine equilibria
that we class into four types: (I) No fish catch, no emissions; (II) Fish catch, no
emissions; (III) No fish catch, emissions; (IV) Fish catch and emissions. Type IV is
a nontrivial equilibrium, a pollution epidemic steady-state.
Figure 1 depicts the steady-states of the system solved in s-b parameter space,
with all other parameters held at their baseline values. We numerically solve F, B
and X for large time t D 1;000;000 to approximate the steady-state, and then plot it
in s-b space coloured according to its equilibrium type.
We are also able to test our theoretical expectations against the numerical results.
In Fig. 1, the hatched region demarcates where there is potential for a pollution
epidemic according to the inequalities (5), (6) and (7). We find that this region
overlaps exactly with the numerically solved steady-state region in dark grey, which
indicates that a pollution epidemic has occurred.
As the parameter plane in Fig. 1 shows us, an epidemic does not occur unless
the stigma s is sufficiently large. It is very important to recognize how unlikely
the conditions for a pollution epidemic (type-IV) equilibrium are without social
stigma/misperception.
Fig. 1 Changing values for the social feedbacks s (stigma) and b (boycott) yield alternative
qualitative outcomes. The parameter plane shows the dynamical outcomes defined by the
equilibrium-types I, II, III, and IV that result for various values of s and b. The hatched region
signifies where a potential epidemic is possible, and the solid point represents the baseline values
used in the simulation of Minamata; s D 600, b D 100
Social Feedbacks in a Model of Fish-Borne Pollution Illness 347
h
D xM (8)
ˇ.1 C b/
h HMx
< (10)
ˇ c
Varying each of these parameters individually while holding the others at their
baseline values from Table 1, we find that the potential for a pollution epidemic
exists for some b if either the health concern is decreased to 0 < h < 3:2, the boat
costs are decreased to 0 < c < 0:00112, or the fish harvesting rate is increased to
H > 218:75. Note that in the ratio h=ˇ, it suffices to consider changing h only. As
the numerical results in Fig. 2 show, the time evolution of the solutions is sensitive
to the collapse of the fishery, and they do not necessarily converge to the pollution
epidemic equilibrium.
When the health concern is decreased to h D 3 a pollution epidemic becomes
possible for 0:25 < b < 0:55. However, as Fig. 2a demonstrates, small values of h
and b make the social response to the pollution negligible. The fish catch collapses
before the injuries grow large enough to trigger any abatement, and a pollution
epidemic is averted.
Decreasing the boat costs to c D 0:001, a pollution epidemic becomes possible
for values of b > 624. The numerical results in Fig. 2b indicate that the pollution
epidemic occurs. However, is this plausible? The accompanying plot in Fig. 2b
suggests that this operating cost for the boats is unrealistically low. The boats grow
to an unrealistically high level and push the fish population toward zero. For the
short time-scale we are interested in, the potential for a pollution epidemic is averted
by the decline of the fish catch to near-zero levels. If we solve numerically over a
very large time scale as t ! 1, it turns out that the fish and boats exhibit damped
oscillations, and the injuries grow.
348 M. Yodzis et al.
Fig. 2 We seek the conditions for which a pollution epidemic is possible with no stigma. The
panels depict the s-b parameter planes that result when (a) h D 3, (b) c D 0:001 and (c) H D 220.
Each is coloured according to the legend in Fig. 1. The solid dot in each plane represents the values
of s and b used to generate each of the plots below, which show the time evolution of the fish (in
dark grey) and boats (in light grey)
Another option is to increase the harvest rate to H D 220 with b > 624. However,
as the plots in Fig. 2c show, this unsustainable harvest pressure causes the fish catch
to collapse before the variables are able to reach a pollution epidemic steady-state.
To examine the effects of the parameters r and "F on the occurrence of a pollution
epidemic, we return to the inequalities (5), (6) and (7). Allowing r, "F and b to
be free while holding s D 0 and all other parameters at baseline, we find that
the inequalities are satisfied when r > 0 and "F < 0. However, negative values
for the pollution mortality rate of fish violate our parameter requirements and are
biologically implausible.
Instead, we explore the case "F D 0 so that the fish do not die from pollution,
while freeing r and another parameter, h. Holding s D 0 and all other parameters
at baseline, we find that the inequalities (5), (6) and (7) are satisfied if r > 0, 0 <
h < 3:2, and 0 < b < 1. Figure 3a shows that an epidemic does occur for the values
r D 1, h D 1 and b D 0:9. To determine whether this is realistic, we look to the time
series plots in Figs. 3b–e. The emissions and fish catch coexist and the injuries grow
steadily. Since s D 0, all of these injuries are fully perceived. However, the growth
of the social concern X and the reduction of fish-eating bP remain negligible,
because the social feedbacks h and b are very small. Assuming that the nature of the
pollution injuries is serious, like those experienced from methylmercury-poisoning
in Minamata, this situation of full perception without response is socially unrealistic.
Social Feedbacks in a Model of Fish-Borne Pollution Illness 349
Fig. 3 We seek the conditions for which a pollution epidemic is possible with no stigma. Panel
(a) depicts the s-b parameter plane that results when "F D 0 and h D 1. The plane is coloured
according to the legend in Fig. 1, and the black point gives the values s D 0 and b D 1 used to
generate the accompanying time series plots: (b) emissions, (c) social concern, (d) fish (in dark
grey), boats (in light grey), (e) perceived and actual injuries
medical attention [4, 18], it is not clear that these insights have been readily taken
up in epidemiological models. Risk perception and behavioural strategies to avoid
infectious disease are more widely modelled [14], and some agent-based models
explicitly distinguish between injured and perceived injured [15]. Social learning
models are increasingly used in mathematical epidemiology to study vaccine scares
[3], and in ecology to study resource management and conservation [2, 11, 16].
Up to now, these methods have not been widely applied to understand pollution
illnesses, in spite of the fact that pollution is intimately bound to social activity.
We have worked to incorporate these insights into our model, and the feedbacks
involving stigma and fish-eating boycott represent a break from existing approaches.
References
1. Almeida, P., Stearns, L.B.: Political opportunities and local grassroots environmental move-
ments: the case of minamata. Soc. Probl. 45(1), 37–60 (1998)
2. Barlow, L.-A., Cecile, J., Bauch, C.T.. Anand, M.: Modelling interactions between forest pest
invasions and human decisions regarding firewood transport restrictions. PLoS ONE 9(4),
e90511 (2014)
3. Bauch, C.T., Bhattacharyya, S.: Evolutionary game theory and social learning can determine
how vaccine scares unfold. PLoS Comput. Biol. 8(4), 1–12 (2012)
4. Des Jarlais, D.C., et al.: Effects of toxicants on populations: a qualitative approach ii. First
order kinetics. Am. J. Public Health 96(3), 561–567 (2006)
5. George, T.S.: Minamata: Pollution and the Struggle for Democracy in Postwar Japan. Number
194 in Harvard East Asian Monographs. Harvard University Asia Center, Cambridge/London
(2001)
6. Grandjean, P., et al.: Adverse effects of methylmercury: environmental health research
implications. Environ. Health Perspect. 118(8), 1137–1145 (2010)
7. Harada, M.: Sachie, T., George, T.S. (English Trans.) (2004). Minamata Disease. Patients
Alliance, Tokyo, (1972)
8. Harada, M.: Smith, A. (English Trans.). Minamta disease: a medical report. In: Smith, E.,
Smith, A. (eds.) Minamata, pp. 180–192. Holt, Rinehart and Winston, New York (1975)
9. Harada, M.: Minamata disease: methylmercury poisoning in Japan caused by environmental
pollution. Crit. Rev. Toxicol. 25(1), 1–24 (1995)
10. Hofbauer, J., Sigmund, K.: 8.1. Imitation dynamics. In: Evolutionary Games and Population
Dynamics, pp. 86–86. Cambridge University Press, Cambridge (1998)
11. Innes, C., et al.: The impact of human-environmental interactions on the stability of forest-
grassland mosaic ecosystems. Nat. Sci. Rep. 3(2689), 1–10 (2013)
12. Levin, S., Clark, W.C.: Toward a science of sustainability. In: Center for International Develop-
ment Working Papers 196. John F. Kennedy School of Government, Harvard University (2010)
13. Liu, J., et al.: Coupled human and natural systems. AMBIO: J. Hum. Environ. – BioOne 36(8),
639–649 (2007)
14. Perisic, A., Bauch, C.: Social contact networks and disease eradicability under voluntary
vaccination. PLoS Comput. Biol. 5(2), 1–8 (2009)
15. Poletti, P.: Risk perception and effectiveness of uncoordinated behavioral responses in an
emerging epidemic. Math. Biosci. 238, 80–89 (2012)
16. Satake, A., et al.: Synchronized deforestation induced by social learning under uncertainty of
forest-use value. Ecol. Econ. 63(2), 452–462 (2007)
17. Smith, E., Smith, A.: Minamata. Holt, Rinehart and Winston, New York (1975)
Social Feedbacks in a Model of Fish-Borne Pollution Illness 351
18. Van Brakel, W.H.: Measuring health-related stigma – a literature review. Psychol. Health Med.
11(3), 307–334 (2007)
19. Van Rooij, B.: The people vs. pollution: understanding citizen action against pollution in China.
J. Contemp. China 19(63), 56–77 (2010)
20. Yodzis, M., Bauch, C.T., Anand, M.: Coupling fishery dynamics, human health and social
learning in a model of fish-borne pollution exposure. Sustain. Sci. 11, 179–192 (2016)
Part III
Computational Engineering
and Mathematical Foundation,
Numerical Methods and Algorithms
Stability Properties of Switched Singular
Systems Subject to Impulsive Effects
Abstract This paper addresses impulsive switched singular systems with nonlinear
perturbation term. The main theme is to establish exponential stability of the
systems where the impulses are of fixed time type and treated as perturbation.
We first establish the exponential stability of a single-mode impulsive systems
using the Lyapunov method. We have observed that if the underlying continuous
system is stable and the impulses are applied slowly, then it is guaranteed that
the impulsive system maintains the stability property. Later, a switched system
with impulsive effects is considered. The method of multiple Lyapunov function
and average dwell time switching signal are used. We have noticed that if all
subsystems are exponentially stable and the average dwell time is sufficiently large,
then the impulsive switched system is exponentially stable. Numerical examples
with simulations are given to illustrate the effectiveness of the proposed theoretical
results.
1 Introduction
and epidemic disease models including pulse vaccination. The theory of impulsive
system is well presented and more application can be found in [1, 2, 11, 14, 16].
When applying the impulsive effects to the singular system, the resulting system
is called impulsive singular system. Many singular systems exhibit impulsive and
switching behaviors, which are characterized by switches of states and abrupt
changes at switching time; that is, the systems switch with impulse effects [1, 2,
11, 13].
The objective of the paper is to establish the exponential stability of a nonlinear
impulsive switched singular system. The nonlinearity is linearly bounded, and both
the impulsive effects and switching are applied to the system at fixed times. Using
the method of Lyapunov function for impulsive singular system, some sufficient
conditions are given to establish the stability property. On the other hand, multiple
Lyapunov function and the average dwell-time approach are used to determine some
sufficient conditions for impulsive switched singular system.
The rest of the paper is organized as follows: In Sect. 2, the problem formulation
and some background are given. In Sect. 3, we state and prove the main results.
Numerical examples are presented in Sect. 4 to clarify the proposed approach.
Finally, a conclusion of these results is given in Sect. 5.
2 Problem Formulation
Denote by Rn the n-dimensional Euclidean space with the norm k k, Rnxn the set of
all nxn square matrices and N the set of natural numbers. If A 2 Rnxn , denote by min
and max the
p minimum and maximum eigenvalues of A; respectively, and its norm
is kAk D max .AT A/; where the superscript T represents the matrix transpose. If
A is a positive definite matrix, then we write A > 0.
Consider the impulsive switched singular systems of the form
where x 2 Rn is the system state variable, and A .t/ ; Bk ; E 2 Rnxn are system
coefficient matrices with E being singular with rank.E/ D r < n, the matrix
pairs .E; A .t/ / being regular, and Bk being constant matrices. The switching signal
W Œt0 ; 1/ ! S is a piecewise constant function taking values in a finite compact
set S D f1; 2; : : : ; Ng for some N 2 N. ftk g1kD1 are the impulsive times that form an
increasing sequence satisfying tk1 < tk and limk!1 tk D 1.
x D x.tC / x.t /
where x.t / (and x.tC /) is the state just before (and just after) the impulsive action
with x.tC / D lims!tC x.s/. The solution x is assumed to be left-continuous, i.e.,
x.tk / D x.tk /. For i 2 S , gi .t; x/ W RC Rn ! Rn is piecewise continuous vector-
Stability of Singular Impulsive Systems 357
3 Main Results
In this section, exponential stability of system (1) and (2) are discussed.
Theorem 4 Assume that system (2) is impulse free, the eigenvalues of the matrix
pair .E; A/ have negative real parts, the singular matrix E and the matrix I C Bk for
I 2 Rnxn identity matrix are commutative, and kg.t; x/k kExk for < 2kXk
min .Y/
AT XE C ET XA D ET YE (4)
for any Y > 0. Then, the trivial solution of the nonlinear singular impulsive system
(2) is exponentially stable if the following inequality holds:
Thus, using (7), (8), and kg.t; x/k kEx.t/k in (6) lead to
P min .Y/ 2kXk kEx.t/k2 $.t/;
$.t/ t 2 .tk1 ; tk ;
C
$.t/ $.tk1 /e .ttk1 / ; t 2 .tk1 ; tk : (9)
Stability of Singular Impulsive Systems 359
At t D tkC ; we have
Then, it follows from the standard decomposition form that system (2) is equiva-
lent to
xP 1 D A1 x1 C Q1 g.t; x/ (13)
0 D x2 C Q2 g.t; x/ (14)
We need to show that x2 is also exponentially stable. It follows from (14) and
kg.t; x/k kEx.t/k that
This means x2 is exponentially stable. From (16) and (17), the trivial solution of (2)
is exponentially stable. This completes the proof.
Remark 1 The validity of the matrix equation (4) guarantees that the Lyapunov
function is decreasing for all t 6D tk . While the inequality in (5) is made to ensure that
the impulses are applied slowly in order to maintain the stability of the impulsive
system in (2).
Theorem 5 For any i 2 S , assume that system (1) is impulse free, the eigenvalues
of the matrix pairs .E; Ai / have negative real parts, and kgi .t; x/k i kExk for i <
min .Yi /
2kXi k positive constant where Xi > 0 satisfying Ai Xi E C E Xi Ai D E Yi E for
T T T
any Yi > 0. Then, the trivial solution of (1) is exponentially stable if the following
assumptions hold:
(i) For any i; j 2 S there exists ˛k > 1 such that
.I C Bk /T ET Xj E.I C Bk / ˛k ET Xi E: (18)
t t0
N.t; t0 / N0 C
Ta
where N.t; t0 / represents the number of switchings in .t; t0 /, and N0 and Ta are
the chatter bound and average dwell time to be defined, respectively.
Proof Let x .t/ D x.t; t0 ; x0 / be the solution of the system (1). Define
as a Lyapunov function candidate for ith subsystem. Then, derivative of $i along the
trajectory of (1) is given by
C
$i .t/ $i .tk1 /ei .ttk1 / ; t 2 .tk1 ; tk : (20)
$i .t/ ˛1 ˛2 : : : ˛i1 $1 .t0C /e1 .t1 t0 / e2 .t2 t1 / : : : ei .ttk / ; t t0 :
ln ˛
Applying (ii) with N0 D ln ˛ , where is an arbitrary constant, and Ta D ,
. > / leads to
.tt /
$i .t/ $1 .t0C /e 0
;
4 Numerical Example
We also get D 0:1112, D 0:000001 and ˛k D 84:5806, and from (5) tk tk1
39:91. The simulation result is shown in Fig. 1, where tk tk1 D 40:
Example
2 Consider the impulsive switched
singular system given by (1) where
x1 .t/ 40
xD , .t/ 2 S D f1; 2g, E D with rank.E/ D 1, Bk D 0:1I and
x2 .t/ 20
2 1 1 1
T
A1 D ; g1 .t; x/ D 15 tanh.x1 .t// 15 tanh.x2 .t// ;
1 2
4 1 T
A2 D ; g2 .t; x/ D 12 tanh.x1 .t// 1
2
tanh.x2 .t// :
1 4
Stability of Singular Impulsive Systems 363
x1(t)
0
–2
0 20 40 60 80 100 120
t
2
x2(t)
–2
0 20 40 60 80 100 120
t
2
x3(t)
–2
0 20 40 60 80 100 120
t
2
x4(t)
–2
0 20 40 60 80 100 120
t
6
5
4
3
x1(t)
1
0
–1
0 5 10 15 20 25
t
6
5
4
3
x2(t)
1
0
–1
0 5 10 15 20 25
t
5 Conclusion
A nonlinear impulsive singular system has been studied. In Sect. 3.1, the exponential
stability has been established for the impulsive system when we have used the
Lyapunov method. It has been noticed that if the continuous system is stable
and the time between every successive impulses is sufficiently large, then the
impulsive system is also exponentially stable. In Sect. 3.2, we have addressed the
impulsive switched system and developed new sufficient condition to guarantee the
exponential stability using multiple Lyapunov function method and average dwell
time switching signal to organize the jumps among the subsystems. It has been
noticed that when all subsystems are stable, if the average dwell time is sufficiently
large, then the entire system is also exponentially stable.
References
1. Bainov, D.D.: Systems with Impulse Effect: Stability, Theory, and Applications. Ellis Hor-
wood, Chichester/Halsted Press, New York, Toronto (1989)
2. Bainov, D.D., Simeonov, P.S.: Impulsive Differential Equations: Periodic Solutions and
Applications. Longman Scientific & Technical, Harlow/Wiley, New York/Burnt Mill, Harlow
(1993)
3. Brenan, K.E., Campbell, S.L., Petzold, L.R.: Numerical Solution of Initial-Value Problems in
Differential-Algebraic Equations. North-Holland, New York (1989)
Stability of Singular Impulsive Systems 365
4. Campbell, S.L.: Singular Systems of Differential Equations. Pitman Advanced Pub. Program,
San Francisco (1980)
5. Campbell, S.L.: Singular Systems of Differential Equations II. Pitman, San Francisco (1982)
6. Dai, L.: Singular Control Systems. Springer-Verlag, Berlin (1989)
7. Duan, G.: Analysis and Design of Descriptor Linear Systems. Springer, New York (2010).
8. Feng, G., Cao, J.: Stability analysis of impulsive switched singular systems. IET Control
Theory Appl. 9(6), 863–870 (2015)
9. Hill, D.J., Mareels, I.M.Y.: Stability theory for differential/algebraic systems with application
to power systems. IEEE Trans. Circuits Syst. 37(11), 1416–1423 (1990)
10. Khalil, H.K.: Nonlinear Systems. Prentice Hall, Upper Saddle River (2002)
11. Lakshmikantham, V.: Theory of Impulsive Differential Equations. World Scientific, Singapore
(1989)
12. Lewis, F.: A survey of linear singular systems. Circuits Syst. Signal Process 5(1), 3–36 (1986)
13. Li, Z.: Switched and Impulsive Systems: Analysis, Design, and Applications. Springer,
Berlin/New York (2005)
14. Sun, J.T., Zhang, Y.P.: Stability analysis of impulsive control systems. IEE Proc. Control
Theory Appl. 150(4), 331–334 (2003)
15. Wang, C.J.: Controllability and observability of linear time varying singular systems. IEEE
Trans. Autom. Control 44(10), 1901–1905 (1999)
16. Yang, T.: Impulsive control. IEEE Trans. Autom. Control 44(5), 1081–1083 (1999)
17. Yao, J., Guan, Z.H., Chen, G., Ho, D.W.C.: Stability, robust stabilization and control of
singular-impulsive systems via switching control. Syst. Control Lett. 55(11), 879–886 (2006)
Input-to-State Stability and H1 Performance
for Stochastic Control Systems with Piecewise
Constant Arguments
1 Introduction
can also be a special type of functional differential equations, where the state history
is given at certain individual points, rather than intervals.
The theory of EPCA is well discussed in [8, 22]. Further properties and
applications of these equations were considered in many other works; readers may
refer to [2, 5, 7, 14, 15, 21, 23].
The notion of ISS deals with the response of asymptotically stable systems to
bounded, small input or disturbance regardless of the magnitude of system initial
state. During the last two decays, ISS has become a central foundation of modern
nonlinear feedback and design. It has been now playing a key role in systems with
recursive design and co-prime factorizations, and a connection between the input-
output (or external) stability and state (or internal) stability. For more properties,
applications, and implications of the ISS, readers may consult [13] and [16–20].
In this paper, stochastic EPCA (or SEPCA) is studied. As stated earlier, the
system will be viewed as a switched system. The main objective is to establish
the problem of input-to-state stabilization and H1 performance. To analyze these
results, the Lyapunov function method and Razumikhin condition are used. We also
present exponential stability as a special case of the aforementioned results. Finally,
to enhance the findings of this paper, some numerical examples and simulations
are presented. We believe that these results will have a great contribution to many
research fields in sciences and engineering, particularly in the fields of modern
nonlinear control design and recursive system design and in dynamical systems
subject to external disturbances.
The paper is organized as follows: In Sect. 2, the system is described, and
some notations and definitions that will be used in the sequel are given. The main
contributions of the paper are presented in Sect. 3, and a conclusion is given in
Sect. 4.
n 2
iD1 xi for every x 2 R , R
n nm
Euclidean space and its norm kxk D the set
of all n m real matrices, and ˝ a sample space. Let C .Œa; b; D/ be the space of
continuous functions mapping Œa; b, with a < b for any a; b 2 RC , into D, for
some open set D
Rn , and C 1;2 .RC Rn I RC / be the space of all functions V.t; x/
defined on RC Rn such that they are continuously differentiable once in t and
twice in x. For instance, if V.t; x/ 2 C 1;2 .RC Rn I RC /, then we have
@V
@V @V
@2 V
Vt D ; Vx D ; ; ; Vxx D :
@t @x1 @xn @xi @xj nn
where x 2 Rn is the system state, and for all t t0 , the function .t/ is a piecewise
constant function taking values in the set % D fk g1 kD0 . So that one may redefine this
function as follows: for a non-negative integer k, W Œtk ; tkC1 / ! %. This piecewise
constant function represents the switching signal of the system which has the roles
of switching between the values of system state argument x. Accordingly, one may
define system (2) as follows: for all t 2 Œtk ; tkC1 /,
dx.t/ D f t; x.t/; x.k / dt C g t; x.t/; x.k / dW.t/; x.t0 / D x0 ; (3)
or, equivalently,
Z Z
t t
x.t/ D x0 C f s; x.s/; x.k / ds C g s; x.s/; x.k / dW.s/; (4)
t0 t0
where the first integral is a Riemann integral almost surely (a.s.), and the second one
is an Itô integral satisfying
hZ t i
E g s; x.s/; x.k / dW.s/ D 0; and
t0
Z t 2 Z t 2
E g s; x.s/; x.k / dW.s/ D Eg s; x.s/; x.k / ds:
t0 t0
The following definitions and assumption will be needed throughout this paper.
Definition 1 For any ˛; ˇ 2 R, an Rn -valued stochastic process x W .˛; ˇ/ ! R is
said to be a solution of (2) (or (3)) if the following hold:
1. x.t/ is continuous and F t -adapted for all t 2 .˛; ˇ/;
2. f .t; x.t/; x.k // 2 L ad .˝; L1 .˛; ˇ// and g.t; x.t/; x.k // 2 L ad .˝; L2 .˛; ˇ//;
3. the stochastic integral equation (4) holds (a.s.).
370 M.S. Alwan and X. Liu
Suppose that V 2 C 1;2 .RC Rn I R/. Then, for any t t0 , V.t; x.t// is an Itô
stochastic process satisfying
Z t Z t
V.t; x.t// D V.t0 ; x.t0 // C L V.s; x.s//f .s; x.s//ds C Vx .s; x.s// .s; x.s//dW.s/;
t0 t0
(a.s.), where
1
L V.t; x.t// D Vt .t; x.t// C Vx .t; x.t//f .t; x.t// C trŒ T .t; x.t//Vxx .t; x.t//.t; x.t//
2
is the infinitesimal operator acting on the process V.t; x.t// with Vt .t; x.t//,
Vx .t; x.t//, and Vxx .t; x.t// being the partial differentials of the process V.t; x.t//
with respect to t, x, and twice with respect to x, respectively.
Having defined SEPCA, we consider the following uncertain control SEPCA
dx.t/ D .A C
A/x.t/ C Bu.t/ C Gw.t/ C f .x / dt C g.x / dW.t/; (5a)
x.t0 / D x0 ; (5c)
where x 2 Rn is the system state, u 2 Rp is the control input of the form Kx,
where K 2 Rpn is a control gain matrix, R 1w 2 R 2is a disturbance ninput, whichnm
q
is
2
assumed to be in L2 Œ0; 1/ (i.e., kwk2 D 0 kw.t/k dt < 1), f 2 R and g 2 R
represent lumped uncertainties, z 2 Rr is the controlled measured output, A, B,
G, C, and F are constant matrices that describe the nominal system, and
A./ is
real-valued matrix, which is piecewise continuous function representing parameter
uncertainties. We also assume that f .0/ D 0 2 Rn and g.0/ D 0 2 Rnm to ensure
that the system admits a trivial solution. A symmetric matrix P is said to be positive
definite if the scalar xT Px > 0 for all nonzero x 2 Rn and xT Px D 0 for x D 0.
Definition 2 A function a 2 C .RC I RC / is said to belong to class K if a.0/ D 0
and it is strictly increasing [12]; it said to belong to class K 1 if a 2 K and it is
convex; it said to belong to class K 2 if a 2 K and it is concave.
Definition 3 For any t0 2 RC , t t0 , and x0 2 Rn , let x.t/ D x.t; t0 ; x0 / be a
solution of uncertain SEPCA (5). Then, the system is said to be robustly globally
input-to-state stable (ISS) in the m.s. if there exist functions ˇ 2 KL and 2 K
ISS and H1 for Stochastic Control EPCA 371
for any solution x.t/ D x.t; t0 ; x0 / of (5), and any x0 2 Rn with EŒkx0 k2 < 1.
Particularly, if ˇ.s; t/ D set , for some positive , then the system is said to be
input-to-state exponentially stable in the m.s.
Definition 4 Given a constant N > 0, uncertain SEPCA (5) is said to be input-to-
state stabilizable with an H1 -norm bound N if there exists a state feedback law
u.t/ D Kx.t/;
where K D 12 "BT P for some a constant " > 0 and positive-definite matrix P, such
that, for any admissible parameter uncertainty
A./, the corresponding closed-
loop system is uniformly asymptotically (or exponentially) ISS in the (m.s.) and
the controlled output z satisfies
hZ 1 i
kzk2E WD E kz.t/k2 dt N 2 kwk22 C m0 ;
0
3 Main Results
Theorem 1 For all t 2 Œtk ; tkC1 /, let the controller gain K and disturbance level
N > 0 be given. Assume that Assumption A holds, and there exist positive constants
"1 ; "2 , and a positive-definite matrix P such that the following inequality
T
1
A C BK P C P A C BK C P "1 DDT C I C N 2 GGT P C qN P
"2
1 T
C H H C "2 qN kUk2 I C CcT Cc C ˛P < 0 (6)
"1
1 adk
tkC1 tk ln (8)
˛N bdkC1
holds, where ˛N > 0 and dk is a constant satisfying dkC1 < dk < 1 and limk!1 dk D
0. Then, system (5) is m.s. robustly globally exponentially input-to-state stabilized
by the feedback control u D Kx with an H1 -norm bound N > 0.
Proof For all t 2 Œtk ; tkC1 /, let x.t/ D x.t; t0 ; x0 / be the solution of (5) and define
V.x/ D xT Px as Lyapunov function candidate. Then,
which implies the desired result. Where qN D q=min .P/ > 1, with q > 1.
By the facts that 2xT P.
A/x xT "1 PDDT P C "11 H T H x, we get
1
L V.x/ xT .A C BK/T P C P.A C BK/ x C xT "1 PDDT P C H T H x
"1
1 1
C xT "2 qN kUk2 I C P2 x C qN xT Px C "3 xT PGGT Px C wT w; (a.s.):
"2 "3
Making use of inequality (6) with "3 D N 2 , we get, for all t 2 Œtk ; tkC1 /,
1 T
L V.x/ .˛ /xT Px xT Px C w w
"3
D ˛V.x/;
N ˛N D ˛ ; (a.s.);
ISS and H1 for Stochastic Control EPCA 373
q
provided that V.x/ 1"3 kwk2 or kxk a1"3 kwk, for some positive constant <
˛. Applying the Itô formula to process V.x/ and taking the mathematical expectation
give DC m.t/ ˛m.t/,
N which implies that
s
˛.tt
N k/
1
m.t/ m.tk /e ; whenever kxk kwk;
a"3
where m.t/ D EŒV.x.t//; 8t 2 Œtk ; tkC1 /. By the dwell-time condition (8), we get
where we have used the fact bkxk2 xT Px akxk2 . Since limk!1 q dk D 0, the
limit of x.tkC1 / will eventually converge to the limit set of radius a1"3 kwk in the
m.s.; that is the solution x is robustly globally input-to-state stabilized in the m.s.
To prove the upper bound on the output magnitude kzk, we introduce the
performance function
Z 1
JDE .zT z N 2 wT w/dt:
t0
It follows that
Z Z
1 1
JDE zT z N 2 wT w dt C E dV.x/dt EŒV.x.1// C EŒV.x0 /
t0 t0
Z h
Z
1 T 1 1
E zT z N 2 wT w dt C E
xT A C BK P C P A C BK C P "1 DDT C I P
t0 t0 "2
1 i
C qN "2 kUk2 I C H T H C qN P N 2 PGGT P C N 2 PGGT P x C 2xT PGw dt C EŒV.x0 /
"1
Z 1
T 1
DE xT A C BK P C P A C BK C P "1 DDT C I C N 2 GGT P
t0 "2
1
C qN "2 kUk2 I C H T H C qN P C CcT Cc x dt
"1
Z 1
T
E w N 2 GT Px N 2 w N 2 GT Px dt C EŒV.x0 /:
t0
By the theorem assumption in (6) and strict negativeness of the second term, we get
Remarks
1. The conditions on f and g mean that the system perturbations are bounded by
linear growth bounds.
374 M.S. Alwan and X. Liu
" #
x1 0
g.x / D ; "1 D 1; "2 D 0:1; N D 0:1; ˛ D 2; qN D 2; and D 0:6386:
0 x2
2.5
2
E||x||2 & β(||w||)
1.5
0.5
0
0 2 4 6 8 10 12 14 16
t
2.5
1.5
E[||(x,y)T||2]
0.5
0
0 1 2 3 4 5 6 7
t
0:0009 0:0002
and the control gain matrix is K D . The simulation results of
0:0204 0:2308
EŒkx.t/k2 (above) and ˇ.kw.t/k/ D a1"3 sin2 .t/ (below) is shown in Fig. 1, where
D 1:3, "3 D N 2 D 1=0:01, and, by the dwell-time condition in (8), we have
chosen tkC1 tk D 1, where dk D 1=2k , and k D tk , for all k D 0; 1; . If
w.t/ 0, x.t/ 0 is exponentially stable in the m.s., as shown in Fig. 2.
376 M.S. Alwan and X. Liu
4 Conclusions
In this paper, we have considered a control system with uncertain SEPCA, which
has been viewed as a switched system. The focus was on establishing input-to-state
stabilization and H1 performance, where the method of Lyapunov function and
Razumikhin techniques have been used to write some sufficient conditions.
Acknowledgements This research was financially supported by Natural Sciences and Engineer-
ing Research Council of Canada (NSERC).
References
21. Ozturk, I., Bozkurt, F.: Stability analysis of a population model with piecewise constant
arguments. Nonlinear Anal.: Real World Appl. 12, 1532–1545 (2011)
19. Sontag, E.D.: Comments on integral variants of ISS. Syst. Control Lett. 34, 93–100 (1998)
16. Sontag, E.D.: Smooth stabilization implies coprime factorization. IEEE Trans. Autom. Control
34(4), 435–443 (1989)
18. Sontag, E.D., Wang, Y.: New characterization of input-to-state stability property. IEEE Trans.
Autom. Control 34(41) 1283–1294 (1996)
17. Sontag, E.D., Wang, Y.: On characterization of input-to-state stability property. Syst. Control
Lett. 24, 351–359 (1995)
20. Teel, A.R., Moreau, L., Nešic, D.: A unified framework for input-to-state stability in systems
with two time scales. IEEE Trans. Autom. Control 48(9), 1526–1544 (2003)
22. Wiener, J.: Generalized Solutions of Functional Differential Equations. World Scientific,
Singapore (1993)
23. Wu, Z.-G., Park, J.H., Su, H., Chu, J.: Stochastic stability analysis of piecewise homogeneous
Markovian jump neural networks with mixed time-delays. JFI 349, 2136–2150 (2012)
Switched Singularly Perturbed Systems
with Reliable Controllers
Abstract This paper addresses the problem of exponential stability for a class
of switched control singularly perturbed systems (SCSPS) not only when all the
control actuators are operational, but also when some of them experience failures.
Multiple Lyapunov functions and average dwell-time switching signal approach
are used to establish the stability criteria for the proposed systems. In this paper,
we assume that a full access to all the system modes is available, though the
mode-dependent, slow-state feedback controllers experience faulty actuators of an
outage type. In the stability analysis, the system under study is viewed as an
interconnected system that has been decomposed into isolated, lower order, slow and
fast subsystems, and the interconnection between them. It has been observed that if
the degree of stability of each isolated mode is greater than the interconnection
between them, the interconnected mode is exponentially stable, and, then, the full
order SCSPS is also exponentially stable for all admissible switching signals with
average dwell-time. A numerical example with simulations is introduced to illustrate
the validity of the proposed theoretical results.
1 Introduction
max .P/jjxjj2 are true. If x 2 Rn , then jjxjj refers to the Euclidean vector norm
of x. Consider the following system
where x 2 Rm ; z 2 Rn are the system slow and fast states respectively, u 2 Rl is the
control input of the form u D Kx for some control gain K 2 Rlm , W Œt0 ; 1/ !
S D f1; 2; ; Ng is a piecewise constant function known as the switching signal
(or law). For each i 2 S ; A11i 2 Rmm ; A12i 2 Rmn ; A21i 2 Rnm ; A22i 2
Rnn ; are known real constant matrices with A22i is a nonsingular Hurwitz matrix,
B1i 2 Rml ; B2i 2 Rnl ; and 0 < "i 1. Setting "i D 0 implies that z D hi .x/ D
A122i ŒA21i x C B2i u: Plug z into (1a) gives the slow reduced subsystem xPs D A0i xs C
B0i u where A0i D A11i A12i A1 1
22i A21i , and B0i D B1i A12i A22i B2i . Choose u D Kxs
such that .A0i ; B0i / is stabilizable.
For simplicity of notation, we use x instead of xs to refer to the slow reduced
system.
Definition 1 The trivial solution of system (1) is said to be globally exponentially
stable (g.e.s.) if there exist positive constants L and such that
for all x.t/ and z.t/, the solutions of system (1), and any x0 2 Rm ; z0 2 Rn .
Definition 2 An n n matrix M D Œmij with mij 0, for all i 6D j, is said to be an
M-matrix if all its leading successive principle minors are positive, i.e.,
2 3
m11 m12 m1k
6m21 m22 m2k 7
det 6
4
7 > 0; k D 1; 2; ; n:
5
mk1 mk2 mkk
Theorem 1 The trivial solution of system (1) is g.e.s. if ADTC holds, and the
following assumptions hold
(i) ReŒ.A22i / < 0, and .A0i ; B0i / is stabilizable;
(ii) there exist positive constants aji ; j D 1; ; 6 such that
where hi .x/ D A1 22i .A21i C B2i Ki /x, P2i is the solution of the Lyapunov equa-
tion AT22i P2i CP2i A22i D Iin ; where Iin is an identity matrix, R 1i D A1 22i .A21i C
B2i Ki /ŒA11i C B1i Ki A12i A122i .A 21i C B K
2i i /; and R 2i D 2P A 1
2i 22i .A21i C
B2i Ki /A12i ;
(iii) there exist a positive constant "i such that AN i is an M-matrix where
" max .Ni / a3i
#
max .P1i / min .P2i /
AN i D a4i a6i .1a5i "i / ;
min .P1i / min .P2i / "i max .P2i /
where Ni D Qi C .a1i C a2i /I C M T Pi C Pi M T such that M D A12i A1 22i .A21i C
B2i Ki / and .A0i C B0i Ki /T P1i C P1i .A0i C B0i Ki / D Qi for a given Ki .
Proof Let Vi .x/ D xT P1i x and Wi ..z hi .x//.t// D .z hi .x//T P2i .z hi .x// be
Lyapunov function candidates for the slow and the fast subsystem, respectively.
Then,
1
WP i ..z hi .x//.t// D .z hi .x//T .z hi .x// 2.z hi .x//T P2i hP i .x/
"i
1
.a5i /.z hi .x//T .z hi .x// C .z hi .x//T R 2i .z hi .x//
"i
C a4i xT x
a4i h a .1 a5i "i / i
6i
Vi .x/ C Wi ..z hi .x//.t//:
min .P1i / min .P2i / "i max .P2i /
(8)
Then, we have
" max .Ni / a3i
#
max .P1i / min .P2i /
AN i D :
a4i a6i
min .P1i / min .P2i /
".1a 5i "i /
i max .P2i /
Then there exists i D max .AN i / > 0 such that for t 2 Œtk1 ; tk /;
Vi .x/ Vi .x.tk1 // C Wi .z hi .x//.tk1 / ei .ttk1 / ;
and
Wi .z hi .x//.t/ Vi .x.tk1 // C Wi .z hi .x//.tk1 / ei .ttk1 / ;
If the system switches among its modes, one may get for all t t0 ,
Vi .x.t// 2e1 .t1 t0 / 2e2 .t2 t1 / 2ek1 .tk1 tk2 /
h i
V1 .x.t0 // C W1 .z h1 .x//.t0 / ek .ttk1 / :
384 M.S. Alwan et al.
where D 2. Applying the ADTC with N0 D ln , is an arbitrary constant,
ln
a D . /
with > leads to
h i
Vi .x.t// V1 .x.t0 // C W1 .z h1 .x//.t0 / e.tt0 /
and
h i
Wi .z hi .x//.t/ V1 .x.t0 // C W1 .z h1 .x//.t0 / e.tt0 /
To analyze the reliable stabilization with respect to actuator failures, for any i 2 S ,
consider the decomposition of the control matrix Bi D Bi˙ C Bi˙N ; where ˙ the
set of actuators that are susceptible to failure, and ˙N
f1; 2; : : : ; lg ˙ the
set of actuators which are robust to failures and essential to stabilize the given
system, moreover, the matrices Bi˙ ; Bi˙N are the control matrices associated with
˙; ˙N respectively, and are generated by zeroing out the columns corresponding
to ˙N and ˙, respectively. The pair .Ai ; Bi˙N / is assumed to be stabilizable. For a
fixed i, let
˙ corresponds to some of the actuators that experience failure,
and assume that the output of faulty actuators is zero. Then, the decomposition
becomes Bi D Bi CBiN ; where Bi and BiN have the same definition of Bi˙ and Bi˙N ,
respectively. Since the control input u is applied to the system through the normal
actuators, the closed-loop system becomes
Theorem 2 The trivial solution of system (9) is g.e.s. if ADTC and the following
assumptions hold for any i 2 S
(i) ReŒ.A22i / < 0, and AT11i P1i C P1i A11i C ˇi P1i A12i A1 T
22i B2˙N i B1˙N i
B1˙N i B1˙N P1i C ˛i I D 0;
T
i
(ii) there exist positive constants aji ; j D 1; ; 6 such that
where hi˙N .x/ D A1 22i .A21i C B2˙N i Ki˙N /x, P2i is the solution of A22i P2i C
T
1 1
P2i A22i D Iin , R 1i Ṅ D A22i .A21i C B2˙N i Ki˙N /ŒA11i C B1i Ki A12i A22i .A21i C
B2˙N i Ki˙N / where Ki˙N D 12 ˇi BT0i˙N Pi˙N , and R 2˙N i D 2P2i A1 22i .A21i C
1 1 T 1
ˇ B B .A12i A22i / P1i /A12i 2 ˇi B2˙N i B1˙N P1i ;
T
2 i 2˙N i 2˙N i
T
i
(iii) there exist a positive constant "i such that AN i˙N is an M-matrix where
" max .N #
i Ṅ / a3i
max .P1i / min .P2i /
AN i˙N D a4i "i .a5i Ca6i /1 :
min .P1i / "i max .P2i /
Proof Let Vi .x/ D xT P1i x and Wi .z h˙N i .x//.t/ D .z h˙N i .x//T P2i .z h˙N i .x//
be Lyapunov function candidates. Then, we have
VP i .x/ xT .˛i C a1i C a2i /Ix C a3i .z hi˙N .x//T .z hi˙N .x//
˛i C a1i C a2i a3i
Vi .x/ C Wi .z h˙N i .x//.t/ (14)
max .P1i / min .P2i /
We also have
1
WP i .z h˙N i .x//.t/ D .z hi˙N .x//T .z hi˙N .x// 2.z hi˙N .x//T P2i hP i˙N .x/
"i
1
.a5i /.z hi˙N .x//T .z hi˙N .x// C a4i xT x
"i
C .z hi˙N .x//T R 2˙N i .z hi˙N .x//
a4i h " .a C a / 1 i
i 5i 6i
Vi .x/ C Wi ..z hi˙N .x//.t//;
min .P1i / "i max .P2i /
(15)
386 M.S. Alwan et al.
1 1
where R 2˙N i D 2P2i A1 1 T
22i .A21i 2 ˇi B2˙N i B1˙N i P1i C 2 ˇi B2˙N i B2˙N i .A12i A22i / P1i /A12i .
T T
Combining (14) and (15), we get the M-matrix AN i˙N with
" max .N #
i Ṅ / a3i
max .P1i / min .P2i /
AN i˙N D a4i "i .a5i Ca6i /1 :
min .P1i / "i max .P2i /
4 Numerical Example
"1 D 0:01; ˇ1 D 0:5; a11 D 0:1; a21 D 0:15; a31 D 0:02; a41 D 0:01; a51 D
70; Q1 D 4I;
"2 D 0:02; ˇ2 D 0:25; a12 D 0:3; a22 D 0:2; a32 D 0:2; a42 D 0:02; a52 D
30; and Q2 D I:
0:1025 0:0274
Case 1. When all actuators are operational, we have P11 D ;
0:0274 0:0615
0:1697 0:0616 1:5 1 0:5 0:5
P12 D ; P21 D ; P21 D ; and K1 D
0:0616 0:1322 1 1:75 0:5 1
0:0217 0:0031 0:1638 0:0869
; K2 D : Thus, the matrices A0i C B0i Ki
0:0840 0:0238 0:1449 0:0842
(i D 1; 2) are Hurwitz and a D ˛ln D 1:8330.
Case 2. When there are failures in the first actuator of B1i , and the second actuator
of B2i for both modes, i.e.,
0 0:5 30 05 20
B1˙N 1 D ; B2˙N 1 D ; B1˙N 2 D ; B2˙N 2 D ;
0 0:15 10 01 10
Switched Singularly Perturbed Systems with Reliable Controllers 387
a4 b 3.5
3.5
3
3
2.5
2.5
2
||x||&||z||
||x||&||z||
2
1.5
1.5
1
1
0.5
0.5
0 0
0 0.5 1 1.5 2 2.5 3 0 1 2 3 4 5 6 7 8 9
t t
Fig. 1 Singularly perturbed switched system. (a) Operational actuators. (b) Faulty actuators
0:0993 0:0257 0:2828 0:1570
we have P11 D ; P12 D ; P21 and P22
0:0257 0:0606 0:1570 0:2145
0:1024 0:0278
are the same as for the normal case, and K1 D ; K2 D
0:0134 0:0055
0:1355 0:0991
: Thus, the matrices A0i C B0i Ki (i D 1; 2) are Hurwitz and
0:1964 0:1249
a D ˛ln D 4:1498.
Figure 1a,b show the simulation results of jjxjj (top) and jjzjj (bottom) for the normal
and the faulty cases respectively.
5 Conclusion
This paper has established new sufficient conditions that guaranteed the global
exponential stability of SCSPS. The output of the faulty actuators has been treated
as an outage. So that, as a future work, one may consider nonzero output which
can be viewed as an external disturbance to the system. We have shown that, using
ADTC with multiple Lyapunov functions, the full order switched system has been
exponentially stabilized by u D Ki x where in the faulty case, KiN D 12 ˇi BT0iN PiN .
A numerical example has been introduced to clarify the proposed results.
Acknowledgements This work was partially supported by NSERC Canada. The third author
acknowledges the sponsorship of King Abdulaziz University, Saudi Arabia.
388 M.S. Alwan et al.
References
1. Alwan, M.S., Liu, X.Z.: Stability of singularly perturbed switched systems with time delay and
impulsive effects. Nonlinear Anal. 17, 4297–4308 (2009)
2. Alwan, M.S., Liu, X.Z., Ingalls, B.: Exponential stability of singularly perturbed switched
systems with time delay. Nonlinear Anal.: Hybrid Syst. 2(3), 913–921 (2008)
3. Branicky, M.S.: Multiple Lyapunov functions and other analysis tools for switched hybrid
systems. IEEE Trans. Autom. Control 43(4), 475–482 (1998)
4. Cheng, X.M, Gui, W.H., Gan, Z.J.: Robust reliable control for a class of time-varying uncertain
impulsive systems. J. Cent. S. Univ. Technol. 12(1), 199–202 (2005)
5. Hespanha, J.P., Morse, A.S.: Stability of switched systems with average dwell-time. In:
Proceedings of the 38th IEEE Conference on Decision and Control, vol. 3, Phoenix, pp. 2655–
2660 (1999)
6. Kang, K.-I., Park, K.-S., Lim, J.-T.: Exponential stability of singularly perturbed systems with
time delay and uncertainties. Int. J. Syst. Sci. 46(1), 170–178 (2015)
7. Khalil, H.K.: Nonlinear Systems, 3rd edn. Prentice-Hall, Upper Saddle River (2002)
8. Kokotovic, P.V., Khalil, H.K., O’Reilly, J.: Singular Perturbation Methods in Control: Analysis
and Design. Academic, London (1986)
9. Liberzon, D.: Switching in Systems and Control. Birkhäuser, Boston (2003)
10. Liberzon, D., Morse, A.S.: Basic Problems is Stability and Design of Switched Systems. IEEE
Control Syst. Mag. 19(5), 59–70 (1999)
11. Liu, X., Shen, X., Zhang, Y.: Exponential stability of singularly perturbed systems with time
delay. Appl. Anal. 82(2), 117–130 (2003)
12. Morse, S.: Supervisory control of families of linear set-point controllers, part 1: exact matching.
IEEE Trans. Autom. Control 41(10), 1413–1431 (1996)
13. Seo, C.J., Kim, B.K.: Robust and reliable H1 control for linear systems with parameter
uncertainty and actuator failure. Automatica 32(3), 465–467 (1996)
14. Shorten, R., Wirth, F., Mason, O., Wulff, K., King, C.: Stability criteria for switched and hybrid
systems. SIAM Rev. 49(4), 545–592 (2007)
15. Veillette, R.J.: Reliable state feedback and reliable observers. In: Proceedings of the 31st
Conference on Decision and Control, Tucson, pp. 2898–2903 (1992)
16. Veillette, R.J., Medanic, J.V., Perkins, W.R.: Design of reliable control systems. IEEE Trans.
Autom. Control 37(3), 290–304 (1992)
17. Zhai, G., Hu, B., Yasuda, K., Michel, A.N.: Stability analysis of switched systems with stable
and unstable subsystems: an average dwell time approach. Proc. Am. Control Conf. 1(6), 200–
204 (2000)
Application of an Optimized SLW Model in CFD
Simulation of a Furnace
1 Introduction
The fully coupled computational fluid dynamic (CFD) simulation is widely used for
design and optimization proposes in different industrial furnaces, boilers, and fire-
heaters. Radiation is the most important part of heat transfer in such combustion
devices. The process of turbulent combustion and heat transfer strongly depend on
each other and the small influence of thermal radiation may be magnified by the
non-linear processes of turbulent combustion. Moreover, radiation can affect flame
temperature and species concentration calculations. The inclusion of radiative heat
transfer reduces the size of flame region, where the maximum temperatures occur.
Therefore, the effects of thermal radiation should take into account even in case of
non-luminous flames [1–3]. This requires the solution of radiative transfer equation
(RTE), which determines the variation of radiation intensity in spatial and angular
space. However, accurate solution of RTE in combustion fields is a very complicated
task. It is mainly because of non-gray behavior of combustion gases. The absorption
coefficient of non-gray gases, which appears in RTE, varies very rapidly and
strongly with the wave number. Cumber and Fairweather [4] recommended that
non-gray radiation models should be used for accurate simulations of combustion
processes.
Among different non-gray radiation models, the spectral line-based weighted-
sum-of-gray-gases (SLW) model has been the subject of many researches in the last
two decades [5]. The SLW is categorized in the modern class of global models. The
global models can be considered as improved versions of the weighted-sum-of-gray-
gases (WSGG) model, which benefit form definition of absorption-line-black-body-
distribution-function (ALBDF) to obtain the radiation parameters. Goutiere, et al.
[6] evaluated different radiation models to calculate the radiative heat transfer in two
dimensional enclosures. They showed that the SLW model can accurately predict the
radiation heat transfer in their test cases. Similar investigations were also conducted
by Coelho [7] in three-dimensional enclosures. He also confirmed the accuracy of
SLW model. Johansson, et al. [8] evaluated WSGG and SLW models in several 1D
tests mimic the conditions in oxy-fired boilers. Their results showed that the SLW
model usually yields more accurate predictions than the WSGG model. Recently,
Modest [9] reviewed historical development of nongray models. He proposed to
include global models in simulations of complicated combustion systems. However,
one should consider the computational cost of global models, such as the SLW
model, before applying it in CFD simulations. The classic SLW model approximates
the non-gray gases by sum-up of 10–20 gray gases. Therefore, it requires 10–20
RTEs solution for these gray gases, which could be very time consuming in real
scale problems. It is well known that reducing the number of SLW’s gray gases and
therefore reducing the computational cost of RTEs solution is not readily possible,
because it could introduce some errors in the predicted results [5].
In this work, we conduct a CFD simulation for turbulent reacting flow in a
laboratory scaled gas fired furnace. We apply an optimized SLW model for efficient
calculation of radiation heat transfer. The optimized SLW model approximates
non-gray combustion gas mixture by sum-up of only 3 gray gases plus 1 clear
gas. However, the accuracy of the optimized SLW model is preserved through the
use of an optimization procedure. This would make the optimized SLW model
computationally more efficient than the classic non-optimized SLW model.
Application of an Optimized SLW Model in CFD Simulation of a Furnace 391
The mass and momentum governing equations for a turbulent flow can be expressed
as
r .V/ D 0 (1)
in which, is the density, V is the velocity vector, p is the pressure, and N is the
stress tensor. Here, we use the -" model along with the standard wall functions
[10], which is commonly accepted for turbulence modeling in industrial applications
such as furnaces and boilers [11, 12].
The governing equation for turbulent energy transport is given by
keff
r .VH/ D r . r H/ C SH (3)
cp
in which, H is enthalpy. The viscous heating terms are neglected here. The effective
thermal conductivity is given by keff D k C .cp t /=Prt , with Prt D 0:85. k, cp ,
t are thermal conductivity coefficient, specific heat at constant pressure, and fluid
viscosity coefficient, respectively. SH also represents source term due to radiation
heat transfer.
Here, we use the mixture fraction theory for combustion modeling. The mixture
fraction is defined as f D .Yi Yi;o /=.Yi;f Yi;o /, in which Yi is the mass fraction of
species i. The subscripts f and o also refer to fuel and oxidizer at inlet streams.
In this theory, a transport equation is solved for each of mean mixture fraction
and mixture fraction variance. One advantage of using mixture fraction theory
for turbulent non-premixed combustion modeling is that, under the assumption of
chemical equilibrium, instantaneous values of species concentration, density, and
temperature can uniquely relate to mixture fraction via 'i D 'i . fi ; Hi /. However,
only averaged values of these scalars, i.e. ', f , and H are predicted in turbulent
flow modeling. The relationship between the averaged values and the instantaneous
values can be achieved through the use of presumed ˇ-shaped probability density
function (PDF)[13].
Here, we perform the chemical equilibrium calculations by means of Gibbs’ free
energy minimization. We assume there are 20 species and radicals in the equilibrium
mixture including CH4 , C2 H6 , C3 H8 , C4 H10 , CO2 , N2 , O2 , H2 O, CO, H2 , OH, O,
392 M. Darbandi et al.
Radiation effects are taken into account in the CFD simulation of combustion
processes via addition of radiation source term in the right hand side of energy
transport equation, i.e., Eq. (3). In the SLW model, this source term is given by
X
J Z
SH D j .4aj Ib Ij d˝/ (4)
jD1 4
The calculation of above source term requires the solution of j RTE s as follows:
dIj
D j .aj Ib Ij / (5)
ds
in which, I is the radiation intensity, j is the absorption coefficient, and aj is
the emissivity weighting factor. j is related to the absorption cross section as
described by j D NCj . To achieve Cj , the entire range of absorption cross
section between Cmax and Cmin is divided into J logarithmically spaced intervals.
The interval borders named as supplemental absorption cross section q are obtained
.j=J/
using CQ j D Cmin .Cmax =Cmin / , where Cj is defined as Cj D CQ j CQ jC1 . The
emissivity weighting factor aj is also calculated by employing the ALBDF definition
as follows:
Z
1
F.C ; Tg ; Tb ; Y/ D Ib .Tb ; /d (6)
Ib .Tb / fWC .Tg ;Y/Cg
Using the above definition, aj is written as aj D F.CQ jC1 / F.CQ j /. To obtain the
values of ALBDFs, here we use the tabulated values, which are presented by Pearson
and Webb [15] for H2 O, CO2 , and CO gases based on the recent HITEMP2010
spectroscopic database [16].
As outlined in the previous sections, the SLW model is involved with J C 1 RTEs
solutions selections. About J D 10 20 gray gases are usually required to achieve
the required accuracy in the SLW model. However, 10–20 RTEs solutions may need
much computational efforts in real scale combustion application problems. This is
Application of an Optimized SLW Model in CFD Simulation of a Furnace 393
a disadvantage, which makes the use of classic SLW model prohibitive in CFD
simulations. On the other hand, choosing a value of J bellow 10 may deteriorate the
accuracy of SLW model [5]. Here, we propose the use of optimized SLW model
to reduce the number of gray gases. Instead of logarithmic discretization in the
classic non-optimized SLW model, we benefit from the optimization procedure to
obtain gray gas parameters aj and j in the optimized SLW model. The optimization
procedure minimizes the difference between the calculated values of total emissivity
based on only three gray gases parameters and the true values of total emissivity
over the path lengths Li . Mathematically, it is required to minimize the following
objective function:
X
error D Œ"optimized SLW .Li / "true .Li /2 (7)
i
where the values of total emissivity, based on the three gray gases parameters, are
calculated from
X
JD3
"optimized SLW .Li / D aj .1 ej Li / (8)
jD1
and the true values of total emissivity "true can be obtained using the detail spectro-
scopic data in the HITEMP2010 database and taking the following integration:
Z
1
"true .Li / D Ib .1 e Li /d (9)
Ib
The path lengths used in Eqs. (7), (8) and (9) should cover a range of typical lengths
consistent with the problem in hand. Here, we use a typical range from 0.01 to 10
times of the characteristic length of the problem including about 10 path lengths in
each decade. The minimization of the objective function in Eq. (7) is in fact a non-
linear curve-fit problem, in which the values of aj and j parameters are obtained for
each of the three gray gases as of the results. We use the trust region algorithm for
solving this problem. In this way, we can accurately approximate the non-gray gases
mixture by sum-up of only 3 gray and 1 clear gases. In the optimization procedure,
the true values of " are first calculated over a range of distances L typical of problem
under investigation. Then, the optimized parameters aj and j for each of 3 gray
gases are directly achieved using the least square curve fit to these " data.
We use the finite-volume method to treat the flow governing equations and to
derive the sets of linear algebraic equations. In this method, the solution domain is
discretized to a number of control volumes. The governing equations are integrated
394 M. Darbandi et al.
over the entire faces of each control volume. We also use the finite-volume method
to derive a conservative statement for the RTE. For this purpose, each octant of the
angular space 4 is discretized into N N' non-overlapping control angles ˝l . In
this work, we use the SIMPLE algorithm to solve the flow governing equations.
Details of the employed finite volume method for the flow and RTE governing
equations and the SIMPLE algorithm are given in our previous works [17, 18].
4 Problem Description
We consider a laboratory scale furnace with available measured data in this study
[19]. The furnace is a circumferentially symmetric 300 kW BERL combustor, with
properly insulated octagonal cross section, conical hood and cylindrical exhaust
duct. It is equipped with a vertically fired burner in the bottom. The burner has 24
radial fuel injection holes and a bluff center body. Natural gas is radially introduced
through these holes. Air is introduced through an annular inlet equipped with a
proper swirler. Therefore, a non-premixed turbulent swirl stabilized flame forms in
the furnace. We model this problem as axisymmetric by appropriate adjustment with
the real 3D furnace. Figure 1 presents a schematic of the furnace and a close up of
burner’s head along with main dimensions.
The natural gas is assumed to be composed of 96.5 % CH4 , 1.7 % C2 H6 , 0.1 %
C3 H8 , 0.1 % C4 H10 , 0.3 % CO2 , and 1.3 % N2 . Fuel jet is considered to have a
mean radial velocity of v D 157:77 m/s at fuel inlet boundary. Air stream is
also considered to have a mean axial velocity of u D 31:35 m/s and a mean
swirl velocity of w D 20:97 m/s. The fuel and air inlet temperatures are 312 and
Fig. 1 Geometry of the furnace and close-up of the burner, Sayre et al. [19]
Application of an Optimized SLW Model in CFD Simulation of a Furnace 395
308 K, respectively. The temperature of the bottom wall, side wall, conical wall,
and exhaust duct wall are set to be constant at 1100, 1220, 1305, and 1370 K,
respectively. All walls are treated to be diffuse with an internal emissivity of 0.5.
The gauge pressure is also set to be zero at the furnace outlet.
Here we solve the problem using both the optimized and non-optimized SLW
models. In the non-optimized SLW model, j D 20 gray gases are used. In this
section, we first provide the results, which are achieved using the optimized SLW
model and compare them with the available measured data of furnace. Then we
further compare the achieved radiative quantities of the optimized SLW model with
those of the non-optimized SLW model. We obtain our results using a non-uniform
structured grid of about 10,000 control volumes and N N' D 4 4 control angles.
Figure 2 gives qualitative representations of the achieved flame and using the
optimized SLW model. Figure 2a displays the temperature contour, Fig. 2b and c
displays the H2 O and CO2 mole fraction contours, and Fig. 2d displays the CO mole
fraction contour. All the presented contours in Fig. 2 have important role in radiation
calculations.
Figure 3 presents radial temperature profiles in different axial locations of the
furnace. We compare the results of optimized SLW model with the available
measured data of Sayre, et al. [19]. It seems that our results present a thinner flame
than the measured data. This may be partially because of the axisymmetric modeling
of a three-dimensional furnace. Also the sharp gradients of temperature variations
in our results can be partially due to ignoring the finite rate of reactions in our
equilibrium chemistry calculations. Moving downstream in the furnace, these are
better agreement between our predictions and the measured data.
Figure 4 compares the results of the optimized and non-optimized SLW models
with each other. Figure 4a presents the contours of radiation source term. For a better
comparison, we limit the range of depicted source term. Comparison in this figure
reveals that the results of optimized SLW model are in complete agreement with
those of the non-optimized SLW model. Figure 4b displays the variation of incident
radiation heat flux along the furnace walls and the variation of temperature along
the furnace centerline. Again, there are complete agreement between the results
of optimized and non-optimized SLW models. These comparisons reveal that the
optimized SLW model can provide the same accuracy as it is provided by the non-
optimized SLW model.
Table 1 compares the number of equations and the required CPU times for
1 iteration of coupled CFD solution using different SLW models. The optimized
SLW model only needs 4 RTEs to be solved, while the non-optimized SLW model
needs 21 RTE solutions. This would indicate a great computational advantage for
the optimized SLW model. Here, all the computations are conducted on a laptop
equipped with an Intel CORE i5 CPU and 4 GB RAM. As is seen in Table 1,
396 M. Darbandi et al.
0.6 Temperature (K): 400 600 800 1000 1200 1400 1600 1800
r (m) 0.4
0.2
0
0 0.5 1 x (m) 1.5 2 2.5 3
(a) Temperature Contour
0.8
mole fraction H2O (%): 1 3 5 7 9 11 13 15 17
0.6
r (m)
0.4
0.2
0
0 0.5 1 1.5 2 2.5 3
x (m)
(b) H2O mole fraction Contour
0.8
0.6 mole fraction CO2 (%): 0.5 1.5 2.5 3.5 4.5 5.5 6.5 7.5 8.5
r (m)
0.4
0.2
0
0 0.5 1 1.5 2 2.5 3
x (m)
(c) CO2 mole fraction Contour
0.6
mole fraction CO (%): 0.2 0.6 1 1.4 1.8 2.2 2.6
r (m)
0.4
0.2
0
Fig. 2 Contours of a: temperature and b: H2 O, c: CO2 , and d: CO mole fractions in the furnace
each solution iteration only lasts 0.8 s with the optimized SLW model. However, the
required time for each solution iteration is 4.1 s with the non-optimized SLW model.
In other words, using the optimized SLW model makes over 80 % reductions in
the required computational time in comparison with using the non-optimized SLW
model. This is where both models provide the same level of accuracy, see Fig. 4.
Application of an Optimized SLW Model in CFD Simulation of a Furnace 397
0.5
0.4
x = 27 mm
x = 109 mm
x = 177 mm
x = 343 mm
x = 432 mm
0.3
r (m)
0.2
0.1
0
1000
2000
1000
2000
1000
2000
1000
2000
1000
2000
T (K)
Fig. 3 Radial temperature profiles at different axial distances in furnace and comparison with the
measured data of Sayre, et al. [19]
–0.2
non-optimized SLW
–0.4
–0.6
1800
200
1500
100
0 0.5 1.5 1 2 2.5
x (m)
(b) variations of incident radiation heat flux along
the furnace wall and temperature along the furnace
centerline
Fig. 4 Comparison between the results of optimized and non-optimized SLW models, a: contours
of radiation source term, b: variations of incident radiation heat flux along the furnace wall and
temperature along the furnace centerline
398 M. Darbandi et al.
Table 1 Number of equations and required CPU times for each coupled CFD solution iteration
using different SLW models
Model Number of RTEs CPU time (s)
Optimized SLW 4 0.8
Non-optimized SLW 21 4.1
6 Conclusion
In this work we introduced the optimized SLW model, which used only 3 gray gases
plus 1 clear gas to approximate the radiation in non-gray gas mixtures. Therefore, it
reduces the number of radiative transfer equatous to only 4 RTEs solution. This is
while the classic non-optimized SLW model requires about 10–20 RTEs solution to
support the same accuracy. We applied both the optimized and non-optimized SLW
models in the CFD simulation of turbulent reacting flow in a furnace. The achieved
results were in good agreements with available measured data in furnace. We further
compared the results of optimized SLW model with those of non-optimized SLW
model. The comparisons demonstrated that the accuracy of the optimized SLW
model was as good as the non-optimized SLW model. This is while the use of
optimized SLW model required 80 % less computational time. This improvement is
of great value for intensive CFD simulations. Therefore, we suggest the optimized
SLW model for radiation heat transfer calculation in CFD simulation of combustion
processes.
Acknowledgements The authors would like to thank the research deputy of Sharif University of
Technology for the financial support received during this research work.
References
1. Keramida, E.P., Liakos, H.H., Founti, M.A., Boudouvis, A.G., Markatos, N.C.: Radiative heat
transfer in natural gas-fired furnaces. IJHMT 43(10), 1801–1809 (2000)
2. Xu, X., Chen, Y., Wang, H.: Detailed numerical simulation of thermal radiation influence in
Sandia flame D. IJHMT 49(13), 2347–2355 (2006)
3. Kontogeorgos, D.A., Keramida, E.P., Founti, M.A.: Assessment of simplified thermal radiation
models for engineering calculations in natural gas-fired furnace. IJHMT 50(25), 5260–5268
(2007)
4. Cumber, P.S., Fairweather, M.: Evaluation of flame emission models combined with the
discrete transfer method for combustion system simulation. IJHMT 48(25), 5221–5239 (2005)
5. Denison, M.K., Webb, B.W.: A spectral line-based weighted-sum-of-gray-gases model for
arbitrary RTE solvers. J. Heat Transf. 115(4), 1004–1012 (1993)
6. Goutiere, V., Liu, F., Charrette, A.: An assessment of real-gas modelling in 2D enclosures.
JQSRT 64(3), 299–326 (2000)
7. Coelho, P.J.: Numerical simulation of radiative heat transfer from non-gray gases in three-
dimensional enclosures. JQSRT 74(3), 307–328 (2002)
8. Johansson, R., Andersson, K., Leckner, B., Thunman, H.: Models for gaseous radiative heat
transfer applied to oxy-fuel conditions in boilers. IJHMT 53(1), 220–230 (2010)
Application of an Optimized SLW Model in CFD Simulation of a Furnace 399
9. Modest, M.F.: The treatment of nongray properties in radiative heat transfer: from past to
present. J. Heat Transf. 135(6), 061801 (2013)
10. Launder, B.E., Spalding, D.B.: The numerical computation of turbulent flows. Comput.
Methods Appl. Mech. Eng. 3(2), 269–289 (1974)
11. Belosevic, S., Sijercic, M., Oka, S., Tucakovic, D.: Three-dimensional modeling of utility
boiler pulverized coal tangentially fired furnace. IJHMT 49(19), 3371–3378 (2006)
12. Crnomarkovic, N., Sijercic, M., Belosevic, S., Tucakovic, D., Zivanovic, T.: Numerical
investigation of processes in the lignite-fired furnace when simple gray gas and weighted sum
of gray gases models are used. IJHMT 56(1), 197–205 (2013)
13. Cumber, P.S., Onokpe, O.: Turbulent radiation interaction in jet flames: sensitivity to the PDF.
IJHMT 57(1), 250–264 (2013)
14. Kuo, K.K.: Principles of Combustion. Wiley, Hoboken (2005)
15. Pearson, J.T., Webb, B.W., Solovjov, V.P., Ma, J.: Updated correlation of the absorption line
blackbody distribution function for H2O based on the HITEMP2010 database. JQSRT 128:10–
17 (2013)
16. Rothman, L.S., Gordon, I.E., Barber, R.J., Dothe, H., Gamache, R.R., Goldman, A., Tennyson,
J.: HITEMP, the high-temperature molecular spectroscopic database. JQSRT 111(15), 2139–
2150 (2010)
17. Darbandi, M., Abrar, B., Schneider, G.E.: Solving combined natural convection-radiation
in participating media considering the compressibility effects. In: Proceeding of the 52nd
Aerospace Sciences Meeting, AIAA, Maryland (2014)
18. Darbandi, M., Abrar, B.: A compressible approach to solve combined natural convection-
radiation heat transfer in participating media. Numer. Heat Transf. B 66(5), 446–469 (2014)
19. Sayre, A., Lallemant, N.D.J., Weber, R.: Scaling Characteristics of Aerodynamics and Low-
NOx Properties of Industrial Natural Gas Burners, The SCALING 400 Study, Part IV: The 300
kW BERL Test Results. International Flame Research Foundation (1994)
Numerical Investigation on Periodic Simulation
of Flow Through Ducted Axial Fan
Abstract In this paper, the flow through an axial fan is suitably simulated
considering relatively low mesh sizes and benefiting from the periodic boundary
condition. The current periodic boundary condition implementation has major
differences with the past classical ones, which were routinely used in literature.
In this regard, we first discuss the ambiguities behind the current periodic geometry
and the proposed mesh generation and possible boundary condition choices. Then,
proper remedies are proposed to resolve them. One remedy returns to the proper
choice of pitch ratio magnitude. After practicing various pitch ratio magnitudes, we
eventually arrive to an optimum one, which provides suitable numerical accuracy
despite using sufficiently low number of mesh elements. In order to validate the
achieved numerical solutions, they are compared with the experiments and other
available numerical results. The proposed approach can be also used in simulations
of other turbomachinary cases, where there are serious computer memory and
computational time limitations. For instance, using the current periodic boundary
condition approach, one can readily simulate very huge wind tunnels considering a
full 3D model of its fans, i.e., including its rotor and stator instead of considering
simple fan pressure jump or actuator disc models.
S. Sabzpoushan • M. Mohammadi
Department of Aerospace Engineering, Sharif University of Technology, Tehran, P.O. Box
11365-8639, Iran
e-mail: [email protected]; [email protected]
M. Darbandi ()
Department of Aerospace Engineering, Center of Excellence in Aerospace Systems,
Sharif University of Technology, Tehran, P.O. Box 11365-8639, Iran
e-mail: [email protected]
G.E. Schneider
Department of Mechanical and Mechatronics Engineering, University of Waterloo, Waterloo,
ON, N2L 3G1, Canada
1 Introduction
Fan has various applications in different industrial equipment, e.g., heat exchangers,
air conditioning systems, and wind tunnels. In case of applications with large
volume of air, the industries may have to consider using parallel fans. However,
this may lead to a difficulty that the flow at upstream and/or downstream of fans
may not perform axisymmetric pattern. In such cases, one may not simply apply
the periodic boundary condition at the boundaries of a slice of flow passage. It is
because if one wishes to simulate such a flow field, this would cause pitch ratio at
the interfaces between the moving rotor domain and the stationary ducts domains,
which in turn will cause critical regions at such interfaces. We should be careful on
two key points at these interfaces. First, one should know that the face mesh at these
interfaces must be as similar as possible to avoid missing data from one zone to the
next one [1]. Second, there is an important constraint indicating that the pitch ratio
cannot be further up than a certain limit [2]. As a rule of thumb, the pitch ratio must
not exceed the upper limit of about 10 if one expects an almost reliable simulation
[3]. Literature shows that there have been several efforts to simulate axial fans
assuming both full rotor disc consideration and periodic blade boundary condition
implementation. Fidalgo [1] simulated a three-dimensional unsteady flow through a
full-annulus rotor disc with distortion in its inlet total pressure. Additionally, Denton
[2] raised some limitations in turbomachinary CFD indicating that if the engineers
do not care those limitations, they may not get solutions with sufficient accuracies.
He specially focused on specific geometries such as the tip clearance and leading
edge shapes. Cevik [4] performed a simulation on the full geometry of an axial fan
with a diameter of 3.13 m placed in a duct with 12.5 m length. Using the k-epsilon
turbulence model, the total number of mesh elements were about 2,500,000. There
are some other publications, which use the true periodic boundary condition. For
example, Le Roax [5] simulated the rotor disc and its upstream/downstream ducts
completely and all together using the periodic boundary condition.
At this stage, we need to clarify the “pitch ratio” importance in axial fan
modelling by introducing a simple example (see Fig. 1). Prior to any explanation,
we should mention that this simple example is so helpful to examine the validity
and reliability of current periodic simulation at next stage. This can be done for
more complicated cases by comparing its solution with the fan experimental data
and full blade rotor simulation results. As it is shown in Fig. 2(a), the target fan
has 12 blades located in a long duct. For this geometry, the pitch ratio is 360ı /360ı
D 1 at the interface of rotational and stationary zones. Now, suppose a periodic
domain in which, we consider only two blades of the fan with (2/12)360ı D 60ı
annulus slice cross section. This slice would interact with the full 360ı domains
at its downstream and upstream zones. For this geometry, the pitch ratio becomes
360ı/60ı D 6. In this article, we focus on mass flow rate and flow uniformity rather
than other parameters. In case of using parallel set of fans, interactions between the
inflow and outflow streams would also become important.
Numerical Investigation on Periodic Simulation of : : : 403
Fig. 1 Two types of rotor disc geometry. (a) Full rotor disc. (b) Sliced rotor disc
(a) (b)
Fig. 2 The fan and its rotor blade geometries. (a) The assembled fan. (b) The result of rotor blade
CMM
The length of rotor blade shown in Fig. 2 is 0.5 m from root to tip and the diameter
of its casing is 2 m. The maximum allowable rotational speed is about 900 rpm. In
order to eliminate the swirl of flow through the rotor, a stator has been embedded
downstream of the rotor, if this swirl can have considerable effects. Fortunately, in
case of using periodic rotor disc, the flow passage in sliced rotor domain does not
need to be coincident with the streamlines. It is because any amount of air exiting
from one of the two periodic sides, would enter from the other side.
Before applying the current approach in complicated geometries with complex
conditions, it is better to examine it in a simple geometry test case. Figure 3 presents
this simple test case, which is constructed based on a complex wind tunnel air driver
geometry. According to the standards related to the methods of fan testing [4, 6, 7],
the minimum lengths for the upstream and downstream ducts of an axial fan are
assumed to be 10D and 5D respectively, where D is fan casing diameter. We should
satisfy these recommended minimum standard values to let the flow become fully
developed before passing through the rotor and also at the end of downstream duct.
404 S. Sabzpoushan et al.
Fig. 3 The fan between forward and aft ducts in a simple test geometry
Figure 4 shows rotor and stator blade sections accompanied with the generated
mesh. The boundary layer mesh and mesh concentration have been used wherever
needed. The boundary layer mesh is controlled suitably to achieve a maximum
thickness of about 10 cm.
Evidently, it is unavoidable facing with some limitations in mesh generation. The
sources can be due to the geometric constrains. For example, we are faced with very
tiny gap at the blade tip clearance, which has considerable effects on the achieved
fan performance; especially the fan noise generation [8, 9]. This tiny gap makes it so
difficult to connect the boundary layers generated on the upper and lower surfaces
to the blade tip. However, there are two possible approaches to resolve this problem.
One is to reduce the number of layers at the blade’s tip and casing. The other one is
to ignore the layer’s growth rate and to compress them. This sometimes requires to
change the first layer height. The first approach needs a sudden detraction of layers,
which is harmful for the numerical solution, especially for capturing the separation
Numerical Investigation on Periodic Simulation of : : : 405
Fig. 4 Two sample sections of mesh distributions around the rotor blade and the stator vane.
(a) Rotor blade leading edge. (b) Stator vane
Fig. 5 The mesh cluster between the rotor blade tip and its casing
and tip vortices. Hence, the second approach is chosen, see Fig. 5. Controlling y+ in
the range of 1–100, we can employ k-! SST turbulence model. As another concern,
it is important for the surface mesh on the blade to preserve the real shape of leading
edge [5, 10]. Finally, Fig. 6 enforces this point that the surface mesh on both sides
of an interface with any pitch ratio must be as similar as possible.
If we choose a slice of rotor disc (and that of the stator disc if it exists) instead
of the entire rotor and stator discs, the number of elements (and consequently the
required computer memory) will decrease considerably. This needs to apply suitable
periodic conditions. After performing some mesh independency efforts, we achieved
to a grid resolution of approximately 600,000 elements. This is where the entire
rotor disc solution domain needed about 1,700,000 elements to result in mesh-
independent solution. Such mesh studies were conducted based on monitoring both
406 S. Sabzpoushan et al.
Fig. 6 Similar mesh generations at the stationary and rotational domains’ interface
0.510
0.500
0.490
0.480
Y (m)
0.450
0.440
0.430
0.0 20.0 40.0 60.0 80.0
X-velocity (m/s)
Fig. 7 The mesh refinement study via monitoring the boundary layer velocity profile in three
different grid resolutions
the mass flow rate magnitude and the boundary layer velocity profile. Figure 7 shows
the results of mesh refinement study for the sliced rotor considering the boundary
layer velocity profile inside the duct wall. This figure also verifies our estimation on
the boundary layer thickness which is about 6 cm, whereas the boundary layer mesh
had been generated with a total thickness of 10 cm.
Here, we would like to mention some points on the chosen boundary conditions.
The boundary conditions at the inlet and outlet sections of the duct are not fixed by
neither mass flow rate, nor velocity magnitude and direction. So, the solution can be
gradually converged during the numerical procedure. We determine the turbulence
intensity of 1 % at the inlet section and the static temperature of 298 K at this
boundary. Determining the total pressure at the inlet and the average static pressure
Numerical Investigation on Periodic Simulation of : : : 407
at the outlet could be other possible choices as the boundary conditions. These
two alternative choices require more flow parameters and constraints to be defined
at these boundaries and hence lower the problem generality [11]. The interface
connections are chosen in a manner to enforce equal area-weighted average of
normal velocities at both sides of the interface. To achieve more similarity with the
real conditions, the rotor casing (shroud) is forced to have a counter-rotating RPM
relative to the rotational domain in order to be motionless in stationary reference
frame [10, 12, 13]. The ambient pressure is equal to the value reported in standard
atmosphere table for Tehran altitude, which is about 87,000 Pa.
70
65
60
55
50
45 Full rotor disc simulation
40
0 0.2 0.4 0.6 0.8 1
Pitch ratio (rotating-to-stationary)
Fig. 8 Effect of pitch ratio on the calculated mass flow rate through the axial fan
408 S. Sabzpoushan et al.
(a) (b)
Fig. 9 Tangential velocity contours, indicating the swirl strength. (a) Just at the downstream of
rotor. (b) right after the stator
and non-swirling flow at the upstream of the rotor (see streamlines in Fig. 10) also
imply that the current periodic simulation performed reliably.
To provide more qualitative validations, one can check the pressure change over
the fan. The current calculations showed that the area-weighted average of static
pressure (gauge) over two sections somewhere at middle lengths of upstream and
downstream ducts would be about 156 and 23 Pa, respectively. This value is about
180 Pa at inlet and 2 Pa at outlet. They indicate that the static head of fan would be
approximately 180 Pa. Figure 11 shows the static pressure contours at two sections
just before and after the rotor disc. According to available fan performance curves,
this is exactly what we expect for the static head of such a fan with a relatively low
incidence angle (about 17ı ) of rotor blades.
Figures 12 and 13 show two important detected phenomena, which support
the current periodic boundary condition approach in axial fan simulation. The
first one is small vortices, which can potentially cause flow to separate from the
blade surface. The second one is the flow leakage from the blade pressure side
to its suction side through the gap at tip clearance. It is also known as downwash
phenomenon.
5 Conclusion
(a)
(b)
Fig. 10 The streamlines inside the duct at a rotor speed of 900 rpm (a) without stator (b) with
stator
simulate a full-geometry fan in such applications is more than 11 times the number
of elements required using the proposed periodic approach. Indeed, this reduction
in the number of elements is so essential in many real industrial applications. For
example, it is important when one wishes to simulate the set of several combined
fans, e.g., a set of four parallel fans, utilized in a huge air supply ventilation system.
410 S. Sabzpoushan et al.
Z
a Pressure
Contour 4
–266.91
b Pressure
Contour 5
363.20
Z
–275.37 326.86
–283.84 290.52
–292.30
–300.77 X Y 254.18 X Y
–309.24 217.84
–317.70 181.50
–326.17 145.16
–334.63 108.82
–343.10
–351.56 72.48
–360.03 36.14
–368.49 0.20
–376.96 36.54
–385.43 72.88
–393.89 109.22
–402.36
–410.82 145.56
–419.29 181.89
[Pa] [Pa]
Fig. 11 Contours of gauge static pressure. (a) Just before passing the rotor. (b) Just after passing
the rotor
Fig. 12 Demonstration of small vortices appearing close to the rotor blade face
27
47
66
86
31
.1
.0
.9
.8
8
Flow direction
Fig. 13 Demonstration of flow leakage from the high pressure side to the low pressure side
through the tip clearance gap
Numerical Investigation on Periodic Simulation of : : : 411
Acknowledgements The authors would like to greatly thank the financial supports received from
the Deputy of Research and Technology of Sharif University of Technology (SUT).
References
1. Fidalgo, J.: A Study of Fan-Distortion Interaction with the NASA Rotor-67 Transonic Stage.
In: ASME Turbo Expo, June 2010, Glasgow (2010)
2. Denton, J.D.: Some Limitations of Turbomachinery CFD. In: ASME Turbo Expo, June 2010,
Glasgow (2010)
3. Bhasker, C.: Simulation of three dimensional flows in industrial components using CFD
techniques. In: Minin, I. (ed.) Computational Fluid Dynamics Technologies and Applications.
InTech (2011). ISBN:978-953-307-169-5, doi:10.5772/19909
4. Cevik, F.: Design of an axial flow fan for a vertical wind tunnel for paratroopers. Master thesis,
Mechanical Engineering Department, Middle East Technical University (2010)
5. le Roux, F.N.: The CFD simulation of an axial flow fan. Master thesis, Department of
Mechanical and Mechatronic Engineering, University of Stellenbosch (2010)
6. AMCA 210: Laboratory Methods of Testing Fans for Aerodynamic Performance Rating. Air
Movement and Control Association International, Inc., Arlington Heights, IL (1999)
7. Cory, W.B.: Fans and Ventilation: A Practical Guide. Elsevier-Roles Ltd, Amsterdam (2005)
8. Srinivas, G., Srinivasa Rao., P.: Numerical simulation of axial flow fan using Gambit and
Fluent. IJRET 3(3), 586–590 (2014)
9. Raj, S.A., Pandian, P.P.: Effect of tip injection on an axial flow fan under distorted inflow.
IJASER 3(1), 302–309 (2014)
10. Dwivedi, D., Dandotiya, D.S.: CFD analysis of axial flow fans with skewed blades. IJETAE
3(10), 741–752 (2013)
11. Augustyn, O.P.H.: Experimental and numerical analysis of axial flow fans. Master thesis,
Stellenbosch University (2013)
12. Raj, A.S., Pandian, P.P.: Numerical simulation of static inflow distortion on an axial flow fan.
IJMERR 3(2), 20–25 (2014)
13. Sarmiento, A.L.E., Gamboa, Y.F.Q., Oliveira, W., Camacho, R.G.R.: Performance analysis
through computational fluid dynamics of axial rotor with symmetric blades used in tunnel
ventilation. HIDRO and HYDRO, PCH NOTICIAS and SHP NEWS 60(1), 22–25 (2014)
Numerical Analysis of Turbulent Convective
Heat Transfer in a Rotor-Stator Configuration
Abstract This paper presents the numerical analysis of convective heat transfer
of a rotor-stator configuration, which is typically found in hydro-generators. The
Reynolds Averaged Navier Stokes (RANS) turbulence models based on the eddy-
viscosity approximation were employed. Different steady and unsteady multiple
frames of reference models were used to deal with the flow interaction in the
rotor-stator system. The fluid flow and heat transfer analysis were performed using
conjugate heat transfer methodology, in which the governing equations for the fluid
dynamics, heat conduction with additional constraints on the fluid-solid interface
were simultaneously solved. The computed convective heat transfer coefficient was
compared against available experimental data to assess the suitability of turbulence
models.
1 Introduction
used for thermal analysis. However, those correlations were originally established
for simple configurations, and might not be applicable or insufficiently accurate for
the case of complex geometries.
Prediction of convective heat transfer coefficient in hydro-generators is crucially
important but not a trivial task due to the complexity of flow dynamics in the
machine. The flow field in the rotor-stator system exhibits a number of phenomena
which are challenging for numerical modelling such as rotation, turbulence and
unsteady nature.
With respect to methodology, Lumped-Parameter Thermal Network (LPTN),
Finite Element Analysis(FEA) and Computational Fluid Dynamics(CFD) are the
most common approaches for thermal analysis of electrical machines [2]. Although
the analytical LPTN and FEA have advantage of being very fast and efficient, these
approaches require the knowledge of CHTCs in prior to the computation, which are
challenging to obtain and therefore not always available. These methods are beyond
the scope of the current research that focuses mainly on CFD application.
Pickering et al. [11] are considered as the first authors who applied CFD to
predict the temperature in the solid of electrical machines. The numerical analysis
of an air-cooled, 4-pole generator case concluded that CFD showed to be a potential
tool for thermal analysis of electrical machines. However, because of limited
computing resources at the time, only simulations with a coarse mesh near the
pole surface could be performed. Depraz et al. [3] studied the cooling system of a
large hydro-generator using the three-dimensional flow simulation. The comparison
between the numerical results by CFD and traditional two-dimensional network
based flow calculation showed a good agreement. Li [7] employed the conjugate
heat transfer (CHT) methodology to predict the temperature distribution in the solid
pole of the large hydro-generators. The CHT calculations used a coarse mesh on
the wall surface for wall-functions utilization. However, the comparison with the
experimental data was not carried out in his work. Recently Toriano et al. [12]
proposed a hybrid method combining the numerical and experimental techniques to
evaluate the heat transfer coefficient on the pole-face of a scaled rotating prototype.
Although numerous factors might affect the heat transfer prediction by conjugate
heat transfer approach, the aim of the current study is limited to investigate the
sensitivity of implemented numerical parameters on the prediction of fluid flow
and heat transfer in the rotor-stator system. In particular the influence of turbulence
models and steady-state Multiple Frames of Reference models are analyzed.
Because of the limited access on the real generator for experimental measurement,
a scaled prototype was built. Since it is not realizable from the computational
perspective to perform simulations of the entire scaled rotating model with an
Numerical Analysis of Turbulent Convective Heat Transfer in a Rotor-Stator. . . 415
adequately fine grid; calculations were carried out in two steps. First, the simulation
with the full scaled model (Fig. 1) has been computed with a coarse 86 M hexahedral
cells grid using the standard k turbulence model. This calculation was then used
to generate the conditions at the inlet boundary for the following second step of
the calculation. The second configuration was compromised to only one section of
10 degree single-pole in (r; ) plane which allowed to perform with a finer mesh
up to 1.6 M hexahedra cells (Fig. 2). The extensive parametric analysis will be
performed on this simplifed 2-D configuration using various turbulence and multiple
frame of reference models.
416 D.-D. Dang and X.-T. Pham
The governing equations for incompressible steady state flow [4] are expressed in
the Cartesian tensor notation for a rotating coordinate system as follows.
Continuity equations:
@
.Ui / D 0I (1)
@xi
The two last terms in momentum equations were added to account for the Cori-
olis and centrifugal forces in the rotating frame of reference. These contributions
however are eliminated in the stationary frame of reference.
Energy equation:
@ @ @T @
Uj htot D f uj h C Ui ij ui uj C SE ; (3)
@xj @xj @xj @xj
where the specific total enthalpy for ideal gas is given by:
P U2 1
htotal D Cp T C C i C u2i (4)
2 2
The heat conduction equation in the solid has the same form as the energy
equation for fluid Eq. 3, except that the velocity components are set to be zero, and
the solid thermal conductivity s was substituted.
On the fluid-solid interface, additional constraints need to be added to ensure the
equilibrium of heat flux and the temperature continuity through the two mediums.
Tsolid D Tfluid
@T @T
s jsolid D f jfluid (5)
@n @n
The presence of Reynolds stresses ui uj in Eqs. 2–3 means that the derived
equations are not closed, which necessitates additional equations for closure. The
turbulent stresses and turbulent heat flux are obtained using the effective viscosity
approximation:
2 @Ui @Uj
ui uj D kıij t C (6)
3 @xj @xi
t @h
uj h D (7)
Prt @xj
The turbulent eddy-viscosity t in Eqs. (6) and (7) is calculated by the turbulence
models. Several turbulence model bases on the eddy viscosity approximation are
implemented to calculate the flow dynamics and heat transfer. Standard k
(SKE) [6] model was developed for high-Re flow and has been widely used in
industrial simulation because it compromises between the robustness and accuracy.
However, SKE was consistently found inappropriate for the low-Re flows or flows
with separation and reattachment of boundary layer. To improve the prediction, the
418 D.-D. Dang and X.-T. Pham
Shear Stress Transport (SST) model [8] was also implemented. Menter [9] presented
several test cases to show that the SST k ! predicts flows with separation in the
presence of adverse pressure gradients more accurately than the SKE model.
Boundary layer modelling Modelling of the near-wall region is of major impor-
tance for CFD simulations, especially for the cases in which the prediction of the
flow quantities on the wall (skin friction, convective heat transfer) is important.
In principle, low-Reynolds number (LRN) and wall-functions are two common
approaches for the near-wall modelling. The LRN model refers to an approach that
resolves the entire boundary layer using a very fine mesh in the near wall regions.
The grids used for the low-Re number model require typically a dimensionless wall
distance of the wall-adjacent cell about unity, i.e. yC < 1. The grid for the low-Re
number is shown in Fig. 3 (right), in which the wall-space of the first cell was set
as 6.103 mm. Because of high computational cost associated with LRN model, the
wall-functions are often used instead. The idea behind the wall-functions approach
is to place the first computational node into the logarithmic layer and employ a
semi-empirical dimensionless profile to obtain the wall shear stress. The advantage
of this approach is that the boundary layer can be resolved with an adequately small
number of grid points. The wall functions approach requires the yC value of the first
node between 30 and 300, i.e., 30 < yC < 300. In the present CFD code, the LRN
and wall-functions models are employed for the !base and based turbulence
models, respectively.
Rotor-stator interaction The fluid flows in a rotor-stator system having non-
axisymmetric components are always unsteady, which is a challenge for CFD
simulations [10]. In an effort to make the rotor-stator analysis practical with limited
computing resource, several steady-state Multiple Frames of Reference (MFR)
models have been developed. In these models, an interface is defined between
rotating and stationary components in a manner so that the steady-state calculations
in each frame are supported while maintaining as much interaction between the
components as possible [5]. There are two steady-state interface techniques are
available in the present CFD code. The first model is called Mixing Plane, where the
upstream flow velocity profile is first averages circumferentially before transferring
to the downstream region. In this context, any non-uniformity in the circumferential
direction will not be preserved in the next region. The second type of steady-state
interface is called Frozen Rotor, where the flow profile variation is now preserved
across the interface, however, the relative position between the rotor and stator is
fixed in time and space. Also, the transient sliding interface is also available to model
the unsteady flow due to the relative motion between the rotating and stationary
components. In this model, the flow field variation is fully taken into account.
The boundary conditions for the configuration illustrated in Fig. 2 are defined
as follows. The fluid velocity at the inlet boundary was set to be uniform, and
normal to the inlet surface. The average value of the inlet profile was derived from
the 3D simulation on the coarse grid with SKE turbulence model. For the case
with rotational speed 50 rpm, Uinlet D 2:10 m/s. The inlet temperature was set to
298 K (25 ı C). For all wall boundaries, no-slip conditions with zero velocity were
assumed. The circumferential periodicity feature of the geometry was specified in
the numerical model by defining rotational periodic interfaces. On the rotor-stator
interface, the general grid interface (GGI) was defined, which allows performing
calculations of non-conforming meshes in a conservative manner. The governing
equations presented in Sect. 2 were solved by CFD code ANSYS CFX-15.0.
Considering the recommendation of ASME V&V numerical accuracy guideline [1],
all equations were solved using second-order accuracy schemes.
Convergence was judged by examining the residual levels as well as by moni-
toring the relevant variables at critical locations. The used criterion requires that the
maximum residual of all equations dropped at least by the order of 104 and the
variables of interest at considered locations keeps constant at the steady-state value.
The flow and turbulence structure in the inter-pole duct calculated using mixing-
plane model with the SST k ! is illustrated in Fig. 4. The flow structure observed
are typical for the flow in the duct with forward facing-step, in which flow with
uniform velocity at the inlet develops in upstream region until it impinges on the
step; a circulation bubble is formed in the step corner due to the adverse pressure
420 D.-D. Dang and X.-T. Pham
Fig. 4 Velocity contour (left) and turbulent kinetic energy contour (right) predicted by mixing-
plane
Fig. 5 Normalized radial velocity in the inter-pole duct predicted by different MFR models
gradient caused by step blockage. The boundary layer separates over the step and
reattaches to the pole surface thereafter. Due to the system rotation the flow structure
is asymmetric in the inter-pole duct; the Coriolis force have the effect of shrinking
the recirculation size on the leading edge and enlarging the bubble size on the
trailing edge.
The steady state models frozen rotor and mixing-plane was employed for an
inherently unsteady flow in rotor-stator interaction, which is necessary to verify. The
calculated result using these models are compared with the time-averaged transient
simulation as reference result. Figure 5 shows the normalized radial velocity in the
Numerical Analysis of Turbulent Convective Heat Transfer in a Rotor-Stator. . . 421
Fig. 6 Average heat transfer coefficient on the pole-face computed by different turbulence models
duct at r D 1.12 m for different MFR models. It is observed that the mixing-plane
model shows a better agreement with the time-average transient model meanwhile
the result computed by FR model significantly varies depending the relative position
of rotor and stator. This results implies that the circumferential flow variation that
each passages rotates during a full revolution is small at the rotor-stator interface.
Since the simulation using mixing-plane model requires less computational effort
than transient simulations, this model will be employed for the further parametric
analysis.
Figure 6 reports the comparision of average CHTC on the pole face predicted
by different turbulence models closure, including the standard k (SKE), the Re-
Normalisation Group k (RNG), the standard k ! (SKO) and SST k ! (SST)
models. The averaged value is calculated by Eq. 8.
R
qw dA
hD R A (8)
A Tw Tref dA
where the Tref is the reference temperature, which is fluid temeprature at 5 mm away
from the pole face for both numerical and experimental approach. The experimental
data is extracted from Toriano et al. [12]. It can be seen that all turbulence models
predict higher CHTC in comparison with experimental data. The results calculated
by SST k ! shows the best agreement with the experiments, the relative error is
calculated as 11 %.
In Fig. 7, the dimensionless temperature T profiles are compared for different
positions at the pole-face along lines normal to the surface, as functions of y ,
422 D.-D. Dang and X.-T. Pham
Fig. 7 Profiles of dimensionless temperature T as functions of y along lines normal to the pole
face
defined by:
1=4
C k1=2 .Tw T/ Cp
T D (9)
qw
1=4
C k1=2 y
y D (10)
According to Eq. 9, the higher T values results in a lower wall heat flux in
case of the same level of predicted turbulence kinetic energy(TKE). However, the
TKE predicted by wall-functions approach are found much higher than the low-
Re number model. The example of the TKE profiles at two positions 2ı and 3ı
are illustrated in Fig. 8. Overall, this results in the significant over-estimation of
the CHTC by the wall function, as showed in Fig. 6. The maximum discrepancy
between the CHTC predicted by wall-functions and experimental data is up to 50 %.
Numerical Analysis of Turbulent Convective Heat Transfer in a Rotor-Stator. . . 423
Fig. 8 Normalized turbulence kinetic energy in the air-gap predicted by different turbulence
models
5 Conclusion
Acknowledgements The support of the Natural Sciences and Engineering Research Council
of Canada(NSERC) and Fonds de recherche du Quebec Nature et technologies(FRQNT) are
gratefully acknowledged. We are also grateful for the funding and computing infrastructure
provided by Institut de recherche d’Hydro-Quebec(IREQ).
424 D.-D. Dang and X.-T. Pham
References
1. ASME Standard for verification and validation in computational fluid dynamics and heat
transfer.: ASME V&V 20-2009, American Society of Mechanical Engineers (2009)
2. Boglietti, A., Cavagnino, A., et al.: Evolution and modern approaches for thermal analysis of
electrical machines. IEEE Trans. Ind. Electron. 56(3), 872–882 (2009)
3. Depraz, R., Zickermann, R., Schwery, A., Avellan, F.: CFD validation and air cooling design
methodology for large hydro generator. In: Proceedings of 17th International Conference on
Electrical Machines ICEM, Crete Island, Greece (2006)
4. Ferziger, J.H., Peric, M.: Computational Methods for Fluid Dynamics. Springer, Berlin/Hei-
delberg (2001)
5. Galpin, P., Broberg, R., Hutchinson, B.: Three-dimensional Navier-Stokes predictions of steady
state rotor-stator interaction with pitch change. In: Proceedings of 3rd Annual Conference of
the CFD Society of Canada, Banff, Alberta (1995)
6. Launder, B.E., Spalding, D.B.: The numerical computation of turbulent flows. Comput.
Methods Appl. Mech. Eng. 3(2), 269–289 (1974)
7. Li W, Guan C, Chen Y (2014) Influence of rotation on rotor fluid and temperature distribution
in a large air-cooled hydrogenerator. IEEE Trans. Energy Convers. 28, 117–24
8. Menter, F.R.: Improved Two-Equation k-omega Turbulence Models for Aerodynamic Flows.
NASA TM-103975 (1992)
9. Menter, F.R., Kuntz, M., Langtry, R.: Ten years of industrial experience with the SST
turbulence model. Turbul. Heat Mass Transf. 4, 625–32 (2003)
10. Moradnia, P., Chernoray, V., Nilsson, H.: Experimental assessment of a fully predictive CFD
approach, for flow of cooling air in an electric generator. Appl. Energy 124, 223–30 (2014)
11. Pickering, S.J., Lampard, D., Shanel, M.: Modelling ventilation and cooling of the rotors
of salient pole machines. In: IEEE International Electric Machines and Drives Conference,
Cambridge, MA, pp. 806–808 (2001)
12. Torriano, F., Lancial, N. et al.: Heat transfer coefficient distribution on the pole face of a
hydrogenerator scale model. Appl. Therm. Eng. 70(1), 153–162 (2014)
Determining Sparse Jacobian Matrices Using
Two-Sided Compression: An Algorithm
and Lower Bounds
Abstract We study the determination of large and sparse derivative matrices using
row and column compression. This sparse matrix determination problem has rich
combinatorial structure which must be exploited to effectively solve any reasonably
sized problem. We present a new algorithm for computing a two-sided compression
of a sparse matrix. We give new lower bounds on the number of matrix-vector
products needed to determine the matrix. The effectiveness of our algorithm is
demonstrated by numerical testing on a set of practical test instances drawn from
the literature.
1 Introduction
A S
a11 a16 0 0
a21 a23 a24 a25
a31 a33 0 0
=
a42 0 a44 0
a51 0 0 a55
a62 a66 0 0
Given the specification of the sparsity pattern for matrix A, obtain matrices S 2 f0; 1gnp
and W 2 f0; 1gmq such that matrix A is directly determined and p C q is minimum.
A group of columns satisfying the property that no two of them contain nonzero
entries in the same row position is called structurally orthogonal. The observation
that a group of structurally orthogonal columns can be approximated with only
one extra function evaluation was reported first in a seminal paper by Curtis,
Powell, and Reid [3]. Their row compression algorithm1 was further analyzed by
Coleman and Moré [1] who gave the first graph coloring interpretation of the
compression problem. The classical arrow-head matrix example demonstrates that
one-sided compression (i.e., either column or row) may not yield full exploitation of
sparsity [9]. Hossain and Steihaug [9], and Coleman and Verma [2] independently
proposed techniques for two-sided compression (i.e., combined row and column
compression) for the sparse Jacobian determination problem. Unfortunately, sparse
Jacobian determination using compressions (one-sided or two-sided) is NP-hard [2]
implying that exact methods are impractical except for small problem instances.
Greedy heuristics complete direct cover (CDC) by Hossain and Steihaug [9] and
minimum nonzero count ordering (MNCO) by Coleman and Verma [2] produce
matrices S and W by considering the matrix rows and columns in specified orders.
Recently, Juedes and Jones [11] proposed an approximation algorithm for minimum
2
star bi-coloring (ASBC) with an approximation guarantee of O.n 3 / of the optimal.
An easy to compute “good” lower bound on the number of groups allows one to
measure the effectiveness of such algorithms. For row compression (of A or A> ) a
satisfactory lower bound on the number of matrix-vector products (or AD passes)
is given by max .A/ D maxi i where i denotes the number of nonzero entries in
nnz.A/
row i. For two-sided compressions, [8] proposed the expression d maxfm;ng e where
nnz.A/ denotes the number of nonzero entries in matrix A. The bound is derived
using a consistency argument in solving the system of linear equations defined by
the products B D JS and C D W > J. Juedes and Jones [11] derive the same bound
using a graph theoretic argument. In this paper we propose a new and more effective
lower bound which generalizes the above lower bound. We propose a new heuristic
algorithm for two-sided compression of sparse Jacobian matrices. We demonstrate
the effectiveness of our lower bound and algorithm by extensive computational
experiments on a standard set of test instances. The remainder of the paper is
organized as follows. In Sect. 2, we derive the new lower bound on the number
of matrix-vector products which is followed by the description of the new two-sided
compression algorithm. Section 3 contains results of numerical experiments from
the lower bound computation and the two-sided compression algorithm on a set
of test matrices. Test results indicate that the new lower bound is superior to the
existing one. On many of the test matrices, our algorithm produced better results.
The paper is concluded in Sect. 4 with comments on future research.
1
A row compression is a one-sided compression where only seed matrix S is defined.
428 D.R. Gaur et al.
2 Two-Sided Compression
As discussed in Sect. 1 the example in Fig. 2 can be determined using 4 MVPs using
either row or column compression with one-sided compression. This is also the
minimum possible since the maximum number of nonzero entries in any row of A
or A> , max .A/ D max .A> /, is 4. However, a closer examination of Fig. 2 reveals
that the last two columns of the compressed matrix B are quite sparse – only two
of the entries are nonzero. In other words, there are available sparsity which are not
exploited by one-sided compressions. On the other hand, with the following two-
sided compression
0 1 0 1
1 0 1
B1 0C B1C
B C B C
B C B C
B0 1C B0C
SDB C; WDB C
B0 1C B0C
B C B C
@0 1A @0A
0 1 0
such that all the nonzero entries are determined uniquely. A lower bound on the
number of MVPs for one-sided compressions is given by the easily evaluated
expression minfmax .A/; max .A> /g which has been found to be a good approxima-
tion to the chromatic number of graphs associated with the matrices on an extensive
set of test instances [1]. On the other hand, only a handful of published literature
consider two-sided compressions. The Ph.D. dissertation [9] derived the bound
nnz.A/
LB2S D d maxfm;ng e on the number of MVPs in a two-sided compression which
is also independently derived and analyzed experimentally in [11]. In this paper we
generalize this lower bound and show that the new lower bound is always at least as
good and in many test instances it yields better result.
Determining Sparse Jacobian: Algorithm and Lower Bound 429
Following [9] the bound LB2S can be derived intuitively in the following way.
Consider a two-sided compression S 2 f0; 1gnp ; W 2 f0; 1gmq . With an MVP
of type As; s 2 f0; 1gn , at most m nonzero entries can be uniquely determined.
Similarly, with an MVP of type w> A; w 2 f0; 1gm, at most n nonzero entries can
be uniquely determined. If there are nnz.A/ nonzero entries in matrix A, then its
follows that
nnz.A/
nnz.A/ pm C qn maxfm; ng. p C q/ implying . p C q/:
maxfm; ng
We then apply the formula LB2S on each leading submatrix of permuted matrix
PAQ. The largest LB2S value is our lower bound LB2SX on the number of MVPs to
determine matrix A. Thus,
LB2SX D maxfLB2Si g
i
430 D.R. Gaur et al.
and
nnzi .PAQ/
LB2Si D ;
i
where nnzi .:/; i D 1; : : : ; minfm; ng denotes the number of nonzero entries in the
i-th leading submatrix of the argument.
The above discussion can be summarized in the following lemma.
Lemma 1 A lower bound on the number of matrix-vector products to directly
determine A 2 <mn is given by
LB2SX D maxfLB2Si g
i
with
nnzi .PAQ/
LB2Si D ;
i
where nnzi .:/; i D 1; : : : ; minfm; ng denotes the number of nonzero entries in the
i-th leading submatrix of the argument and P and Q are permutation matrices. If
m D n, then we have
nnz.A/
LB2SX LB2S D :
maxfm; ng
The heuristic algorithm that we outline here is inspired by the Recursive Largest
First (RLF) coloring heuristic due to [12]. The main idea of our compression
algorithm is to group columns and rows such that for each nonzero aij ,
1. there is a column group k containing column j such that there is no column j0 ¤ j
also in group k for which aij0 ¤ 0, or
2. there is a row group l containing row i such that there is no row i0 ¤ i also in
group l for which ai0 j ¤ 0
This condition is termed as direct cover condition in [8] and the nonzero aij meeting
this is said to be directly covered or simply covered, for brevity. The complete
direct cover (CDC) algorithm of [9] groups the columns and rows while respecting
the cover condition until all the nonzero entries are covered. The resulting column
groups and row groups define the matrices S and W such that the Jacobian matrix is
directly determined. The columns and rows are assigned to groups according to the
number of nonzero entries that are yet to be covered: higher the number of entries
earlier they are grouped. In our algorithm 2SIDEDCOMPRESSION, as depicted in
Determining Sparse Jacobian: Algorithm and Lower Bound 431
Fig. 3, we too take into account the number of entries that are yet to be covered in
forming the groups. First, we introduce terminology that will enable us to describe
the algorithm. Given a sparse matrix A let I D f1; : : : ; mg and J D f1; : : : ; ng denote
the set of row indices and the set of column indices, respectively. For row index i
and I
I define,
˚
fbdnI .i/ D i0 ji0 2 I and there is an index j 2 J for which aij ¤ 0;
ai0 j ¤ 0 are not covered :
3 Numerical Experiments
Table 1 Lower bound on the number of MVPs in two-sided compression of sparse Jacobian
Matrix m n max .A/ max .A> / LB2S LB2SX
abb313 313 176 6 26 5 6
arc130 130 130 2 12 10 16
bp0 822 822 266 20 4 7
bp200 822 822 283 21 5 7
bp400 822 822 295 21 5 7
bp800 822 822 304 21 6 8
bp1000 822 822 308 21 6 8
eris1176 1176 1176 99 99 16 80
lund_a 147 147 21 21 17 18
lund_b 147 147 21 21 17 18
str_0 363 363 34 34 7 17
str_200 363 363 30 26 9 17
str_400 363 363 33 34 9 18
will_57 57 57 11 11 5 6
Determining Sparse Jacobian: Algorithm and Lower Bound 433
4 Conclusion
In this paper we have considered the problem of sparse Jacobian matrix determina-
tion with two-sided compressions. The new lower bound on the number of MVPs
434 D.R. Gaur et al.
generalizes the lower bound of [9, 11]. The results from numerical experiments on
a standard set of test instances provide strong evidence that the proposed lower
bound is superior to that of [9, 11]. The new lower bound is easy to compute,
never smaller than the bound proposed in [9, 11], and strictly larger on about
50 % of the test instances. The Heuristic algorithm 2 SIDEDCOMPRESSION saves,
on average, 13 % MVPs compared with the ASBC algorithm and, on average it is
within approximately 1:5 times the optimal.
There are a number of possible extensions to this research that we plan to pursue
in future. In our lower bound calculation we use the simple strategy of reordering of
rows and columns according to the nonzero density. More sophisticated ordering
techniques can be considered here. For example, lining up the nonzero entries
together in rows and columns may reveal the dense submatrices which can be
identified more easily. This will yield the added benefit of utilizing data locality
to improve cache memory performance in a computer implementation. Also, the
current computer implementation of the compression algorithm can be improved by
employing more advanced data structures for manipulating sparse matrices.
References
1. Coleman, T.F., Moré, J.J.: Estimation of sparse Jacobian matrices and graph coloring problems.
SIAM J. Numer. Anal. 20(1), 187–209 (1983)
2. Coleman, T.F., Verma, A.: The efficient computation of sparse Jacobian matrices using
automatic differentiation. SIAM J. Sci. Comput. 19(4), 1210–1233 (1998)
3. Curtis, A.R., Powell, M.J.D., Reid, J.K.: On the estimation of sparse Jacobian matrices. IMA
J. Appl. Math. 13(1), 117–119 (1974)
4. Garey, M.R., Johnson, D.S.: Computers and Intractability: A Guide to the Theory of NP-
Completeness. Freeman, San Francisco (1979)
5. Golub, G.H., Van Loan, C.F.: Matrix Computations, 3rd edn. Johns Hopkins University Press,
Baltimore (1996)
6. Griewank, A., Toint, Ph.L.: On the unconstrained optimization of partially separable objective
functions. In: Powell, M.J.D. (ed.), Nonlinear Optimization, pp. 301–312. Academic, London
(1982)
7. Griewank, A., Walther, A.: Evaluating Derivatives: Principles and Techniques of Algorithmic
Differentiation, 2nd edn. Society for Industrial and Applied Mathematics, Philadelphia (2008)
8. Hossain, A.K.M.S.: On the computation of sparse Jacobian matrices and newton steps. Ph.D.
Dissertation, Department of Informatics, University of Bergen (1998)
9. Hossain, A.K.M.S., Steihaug, T.: Computing a sparse Jacobian matrix by rows and columns.
Optim. Methods Softw. 10, 33–48 (1998)
10. Hossain, S., Steihaug, T.: Graph models and their efficient implementation for sparse Jacobian
matrix determination. Discret. Appl. Math. 161(2), 1747–1754 (2013)
11. Juedes, D., Jones, J.: Coloring Jacobians revisited: a new algorithm for star and acyclic
bicoloring. Optim. Methods Softw. 27, 295–309 (2012)
12. Leighton, F.T.: A graph coloring algorithm for large scheduling problems. J. Res. Natl. Bur.
Stand. 84, 489–505 (1979)
An h-Adaptive Implementation
of the Discontinuous Galerkin Method
for Nonlinear Hyperbolic Conservation Laws
on Unstructured Meshes for Graphics
Processing Units
1 Introduction
are overlay one another. An error indicator first flags elements that do not satisfy
some criterion. These elements are then clustered into groups based on spatial
proximity and other criteria. Then, additional rotated rectangular grids with finer
mesh spacing are created and overlay these groups. This is done multiple times
until an error tolerance is reached, creating a series of embedded grids After an
appropriate number of timesteps, the mesh hierarchy is redetermined through a
process called ‘regridding’. Since Berger [1, 2], a simplified approach has been
applied to GPUs in [3, 10] for the shallow water equations. Other approaches include
block and cell-based refinement strategies.
In block-based refinement, cells are grouped into blocks of a predefined size. If
any elements in a group are flagged for refinement, then all elements in that group
are refined and replaced by a number of refined blocks. This allows connectivity
information to be stored with respect to blocks in a quadtree data structure for 2D
and octree for 3D [9, 11]. Block-based implementations have been discussed in [14].
In cell-based refinement, elements are refined individually rather than in groups
which maintains high-resolution locality. This strategy can be implemented both on
structured and unstructured meshes, though many cell-based approaches to date deal
with Cartesian grids [7]. A trade off of refinement locality is that more connectivity
information is required than in block-based refinement. This is because data must
be stored on the level of elements, rather than blocks. A quadtree and octree data
structure can be used again to represent parent-child relationships for determining
mesh connectivity [5, 13]. The advantage of this strategy is that irregular boundaries
can be dealt with very easily through cut-cells, higher order elements or curved
boundary conditions.
GPUs are useful tools in scientific computing applications. The compute capacity
of NVIDIA GPUs is quite impressive; single and double precision arithmetic
throughput can exceed 1 TFLOP/s depending on the model. When this is considered
in conjunction with the price of such devices, GPUs are an attractive scientific
computing platform.
We now focus on the main subject of this work: an efficient cell-based h-
adaptive DG-GPU algorithm in NVIDIA’s CUDA C on unstructured triangular
meshes for nonlinear hyperbolic conservation laws. We begin with the derivation
of a DG method for these partial differential equations (PDEs). We then outline
the implementation details and present a computed example, examining the solver’s
performance characteristics.
u.x; 0/ D u0 .x/;
along with appropriate boundary conditions are applied. The DG method is a high-
order method without an extensive stencil that can successfully capture shocks
and discontinuities in the numerical solution of conservation laws. As opposed to
the standard finite element method, continuity at the interface between adjacent
elements is not imposed.
This method can be formulated by first dividing
S the domain ˝ into an unstruc-
tured mesh of N triangles such that ˝ D NiD1 ˝i . We note that nonconforming
tessellations are permitted. In our implementation, the difference in refinement level
between adjacent cells must not exceed 1, see Fig. 1.
We define Sp .˝i / to be the space of polynomials of degree at most p on ˝i .
Additionally, fevj gjD1::Np is a set of orthonormal basis functions for Sp .˝i /, where Np
represents the number of basis functions.
The weak form of the conservation law is obtained by multiplying Eq. (1) by a
test function evj 2 Sp .˝i / and integrating on an element ˝i . After integrating by
parts, we obtain
Z Z Z
ut e
vj d˝i F.u/rxy e
vj d˝i C vj F.u/ ndl D 0;
e (2)
˝i ˝i @˝i
e7 e7
e13 e3
Ω2 Ω4 Ω2
e1
e10 e8 e2 e2
Ω5 e4
Ω1
e6 e12 e11
Ω0 Ω3
e5 e0 e9
(x2,1 , y2,1 )
Fig. 1 Examples of admissible meshes: (left) two element mesh (right) ˝5 is refined yielding a
five element mesh
438 A. Giuliani and L. Krivodonova
where .xi;z ; yi;z /zD1;2;3 are the three original vertices of element ˝i in physical space
and .r; s/ are the transformed coordinates in the computational space. The Jacobian
of the transformation is denoted by Ji and we require that det Ji be positive, i.e.
that the vertices be ordered counter-clockwise. Vertex ordering also defines the
side numbers q D 1; 2 : : : Nisides of each cell, where Nisides is the number of sides
an element has; for example si;q refers to the qth side of ˝i beginning clockwise
from .xi;1 ; yi;1 /. In the refined mesh of Fig. 1, s2;4 is edge e11 with the indicated
.x2;1 ; y2;1 /.
Additionally, we map each edge of the mesh ek , i.e. si;q , to the canonical interval
Ic D Œ1; 1 with the transformation
1
x x x .1 /
D k;1 k;2 2
1 ; (4)
y yk;1 yk;2 2 .1 C /
where is the transformed coordinate in the computational space and .xk;z ; yk;z /zD1;2
are the two original vertices of ek . The determinant of the Jacobian of (4) is
q
1
li;q D .xk;1 xk;2 /2 C .yk;1 yk;2 /2 :
2
As for other Galerkin methods, the solution on element ˝i is approximated by
PNp
a linear combination of the basis functions e vj , i.e. Ui D jD1 ci;j v
ej with ci;j D
1 2 M |
Œci;j ; ci;j ; : : : ; ci;j ; : : : ; ci;j , the modal degrees of freedom. Finally, we separate the
m
second term in (2) into line integrals along the edges of the element. It follows that
equation (2) becomes
Z
d 1
ci;j D F.Ui / .Ji1 rrs vj / det Ji d˝c
dt det Ji ˝c
XZ
Nisides
vj;q F.Ui / ni;q li;q d ; (5)
qD1 I0
where vj and vj;q are values of the basis functions mapped from the physical
element ˝i to the canonical element ˝c and from side si;q to the canonical side
I0 , respectively. Finally, ni;q is the outward facing normal of si;q . The right-hand
side of equation (5) is composed of two terms: a volume and surface integral.
As continuity between elements is not imposed, the solution Ui is multivalued in
the surface integral. We therefore introduce a numerical flux F.Ui ; Uk / to allow
information to be exchanged between adjacent cells ˝i and ˝k . We can evaluate
these terms exactly for a linear flux and approximately for a nonlinear flux with
h-Adaptivity for the DG Method on Unstructured Meshes for GPUs 439
Z
d 1
ci;j D F.Ui / .Ji1 rrs vj / det Ji d˝c
dt det Ji ˝c
XZ
Nisides
vj;q F.Ui ; Ukq / ni;q li;q d : (6)
qD1 Ic
Because equation (6) is a system of ordinary differential equations (ODEs) for the
degrees of freedom ci;j , it can be solved in time with a standard ODE solver, e.g.
Runge-Kutta (RK) method.
As the volume and surface integral contributions can be computed independently
of one another, the method is predisposed to applications on highly parallel
GPU architectures [6]. Developing algorithms for this computing platform is an
active area of research. An efficient h-adaptive, block-based structured mesh DG-
GPU implementation has been presented in [3, 10]. Cell-based h-adaptivity on
unstructured meshes in the context of GPUs can be more difficult due to the
inevitable irregularity of memory accesses and operations both in time stepping and
mesh adaptivity operations. We will now describe the implementation details of our
efficient h-adaptive DG-GPU algorithm in NVIDIA’s CUDA C; this implementation
consists of a time stepping and mesh adaptation module.
With the time stepping module, we calculate the right-hand side of (6), without mesh
modification. Every n regular timesteps, the adaptive module is executed which
refines and coarsens select elements. The time stepping aspects of the solver are
outlined in more detail in [6]. This module consists of three compute kernels that
efficiently evaluate the right-hand side of (6) for a standard RK ODE time integrator.
The first kernel, eval_volume, launches one thread per element ˝i ; each thread
evaluates the volume integral terms for its allocated element. Likewise, the second
kernel, eval_surface, launches one thread per edge ek ; each thread evaluates
the surface integral terms for its allocated edge. Finally, eval_rhs launches one
thread per element and appropriately sums the volume and surface terms over the
mesh. An essential aspect of these final two kernels is the use of connectivity data
on the GPU.
DOF storage In order fully utilize the compute capacity of the GPU, the modal
DOFs must be stored in a specific fashion. See [6] for further information.
Connectivity We store connectivity information in GPU DRAM memory. We store
simple pointers in linear arrays as integers, which encode the element and edge IDs
˝i and ek , respectively. The bidirectional pointers are displayed in Fig. 2. Elements
440 A. Giuliani and L. Krivodonova
e0
Ω0 e1
e7
e2
e13 e3 Ω1 e3
Ω4 Ω2 e4
e1
e2 Ω2 e6 Boundary
e7
Ω1
e4 e6 e12 e11 Ω3 e9
Ω0 Ω3 e11
e0 e9
Ω4 e12
e13
point to their edges and edges point to their two elements; note that ghost cells
enforce boundary conditions. Due to the nonconforming nature of our meshes, each
element requires Nisides pointers to its respective edges, see ˝2 in Fig. 2 (N2sides D
4 ¤ 3).
4 Mesh Adaptation
e0
e1
Ω0
e2 e3
Ω1 e5 e4
Ω5
e7 e9
Ω3
e8 e11
Ω2
Ω4 e10 e12
e13
Fig. 3 Tree data stored for the two sequence of meshes in Fig. 1. Elements and edges highlighted
in blue are active in the current mesh
1 Ωi 0
0
-1
-1 -1
-1
Fig. 4 (Left) initial configuration around ˝i along with the values of aflag for each element,
(right) mesh after refinement and smoothing; dotted line indicates the elements added
Refinement and coarsening After aflag is smoothed, the elements and edges
may now be refined and coarsened. We implement refinement and coarsening
kernels which modify the element and edge trees. Solution coefficients are rede-
termined using an L2 projection and geometric data is adapted accordingly. The
final step in the mesh adaptivity algorithm is redetermining the mesh connectivity
detailed in Sect. 3. This is done in part with the element and edge trees presented in
Sect. 4.
Memory management In refining and coarsening the mesh, we will naturally have
to add or remove data from lists, e.g. the modal degrees of freedom C. A naive
solution would be to simply replace the undesired element by a null placeholder.
Unfortunately, this would lead to ‘holes’ in our arrays which is not an efficient use
of memory and further would limit the effectiveness of coalesced memory accesses.
We must therefore not only remove elements from arrays but also shift those that
remain so that the reduced array is dense.
On GPUs, this problem does not have a simple solution. Indeed, parallelizing
this operation, called a ‘reduction’, while avoiding race conditions must be done
with great care. There are application programming interfaces (APIs) that have this
task optimized; we use CUDPP in our implementation [4]. The details of a reduction
are not presented here for brevity, an involved examination of this issue can be found
in [8].
5 Computed Example
d
u C rxy Œ2yu; 2xu D 0; (7)
dt
This is called the rotating hill test problem, whereby a Gaussian pulse is advected
around the origin; the exact solution is expressed as
This problem would benefit from h-adaptivity as much of the variation in the
solution is spatially concentrated in a small, moving region of the domain.
h-Adaptivity for the DG Method on Unstructured Meshes for GPUs 443
We apply our adaptive code to this problem and advance the solution until a final
time of T D 1, i.e. one full rotation around the origin. The DG spatial discretization
uses the upwind numerical flux and is integrated in time with an RK time integrator
of appropriate order. The adaptive routines are executed every 100 regular timesteps,
allowing an element to be refined a maximum of 3 times. The initial mesh was
composed of 1080 elements; if uniformly refined three times, it would comprise
69,120 elements. The numerical solution and final adaptive mesh are plotted in
Fig. 5 for p D 1. In Table 1, we present the computed L2 error of the final solution
for both the adaptive and uniformly refined meshes. The advantage of h-adaptivity is
apparent as only a fraction of the computational work is required to achieve an error
comparable to that of a uniformly refined mesh. In all simulations, the refinement
and coarsening subroutines comprise at most
2 % of the total runtime.
Table 1 L2 error for p D 1; 2; 3 of the h-adaptive solution, and uniformly refined solution
p Average number of elements Adaptive mesh L2 error Uniformly refined mesh L2 error
1 18,195 4.684E-4 4.453E-4
2 24,906 4.373E-6 4.226E-6
3 34,785 4.514E-8 4.274E-8
6 Conclusion
Acknowledgements This research was supported in part by the Natural Sciences and Engineering
Research Council of Canada (NSERC) grant 341373-07 and the NSERC CGS-M grant.
References
1. Berger, M.: Adaptive mesh refinement for hyperbolic partial differential equations. Ph.D.
thesis, Stanford University (1982)
2. Berger, M.J., Oliger, J.: Adaptive mesh refinement for hyperbolic partial differential equations.
J. Comput. Phys. 53(3), 484–512 (1984)
3. Brodtkorb, A.R., Sætra, M.L., Altinakar, M.: Efficient shallow water simulations on GPUs:
implementation, visualization, verification, and validation. Comput. Fluids 55, 1–12 (2012)
4. CUDA Data Parallel Primitives Library. http://cudpp.github.io/. CUDPP 2.2
5. Flaherty, J.E., Loy, R.M., Shephard, M.S., Szymanski, B.K., Teresco, J.D., Ziantz, L.H.:
Adaptive local refinement with octree load balancing for the parallel solution of three-
dimensional conservation laws. J. Parallel Distrib. Comput. 47(2), 139–152 (1997)
6. Fuhry, M., Giuliani, A., Krivodonova, L.: Discontinuous Galerkin methods on graphics
processing units for nonlinear hyperbolic conservation laws. Int. J. Numer. Methods Fluids
76(12), 982–1003 (2014)
7. Gao, X.: A parallel solution-adaptive method for turbulent non-premixed combusting flows.
Ph.D. thesis, University of Toronto (2008)
8. Harris, M., Sengupta, S., Owens, J.D.: Parallel prefix sum (scan) with CUDA. In: Nguyen, H.,
NVIDIA Corporation (eds.) GPU Gems 3. Addison-Wesley, Upper Saddle River (2008)
9. Ivan, L., Sterck, H.D., Northrup, S.A., and Groth, C.: Multi-dimensional finite-volume scheme
for hyperbolic conservation laws on three-dimensional solution-adaptive cubed-sphere grids.
J. Comput. Phys. 255(0), 205–227 (2013)
10. Sætra, M.L., Brodtkorb, A.R., Lie, K.-A.: Efficient GPU-implementation of adaptive
mesh refinement for the shallow-water equations. J. Sci. Comput. 63(1), 23–48 (2014).
doi:10.1007/s10915-014-9883-4. ISSN:1573-7691
11. Susanto, A.: High-order finite-volume schemes for magnetohydrodynamics. Ph.D. thesis,
University of Waterloo (2014)
h-Adaptivity for the DG Method on Unstructured Meshes for GPUs 445
12. Wang, Z.: Adaptive High-order Methods in Computational Fluid Dynamics. Advances in
Computational Fluid Dynamics. World Scientific, Singapore/Hackensack (2011)
13. Zeeuw, D.L.D.: A quadtree-based adaptively-refined cartesian-grid algorithm for solution of
the Euler equations. Ph.D. thesis, The University of Michigan, Ann Arbor (1993)
14. Zhang, J.Z.: Parallel anisotropic block-based adaptive mesh refinement finite-volume scheme.
Ph.D. thesis, University of Toronto (2011)
Extending BACOLI to Solve the Monodomain
Model
1 Introduction
ut .x; t/ D f .t; x; u.x; t/; ux .x; t/; uxx .x; t//; a x b; t0 t tf ; (1a)
where u.x; t/ 2 RMu is the unknown vector function, subject to separated boundary
conditions of the form
Ba .t; u.a; t/; ux .a; t// D 0; Bb .t; u.b; t/; ux .b; t// D 0; t0 t tf ; (1b)
E. Mirshekari
Department of Mathematics and Statistics, University of Saskatchewan, Saskatoon, SK, Canada
e-mail: [email protected]
R.J. Spiteri ()
Department of Computer Science, University of Saskatchewan, Saskatoon, SK, Canada
e-mail: [email protected]
BACOLI is one of only a few software packages to feature adaptive error control
in both space and time [18]. The software package is designed to produce an
approximate solution such that the error is estimated to be less than a user-supplied
tolerance [9]. Adaptive error control increases both the efficiency as well as the
reliability of the simulation.
The monodomain model is a multi-scale mathematical model for the evolution
of the electrical potential in myocardial tissue that relates the propagation of ionic
currents at the tissue scale with their generation at the cellular scale. Because of
their global nature, the mathematical models of the propagation at the tissue level
depend on spatial derivatives. On the other hand, because of their local nature, the
models of a single cell do not.
The monodomain model can be written as
@v
Cm C Iion .s; v; t/ D r .i rv/;
@t 1C
(2a)
@s
D f .s; v; t/;
@t
with boundary condition
O i rv/ D 0;
n:. (2b)
2 Review of BACOLI
This section describes some basic concepts behind the BACOLI software package,
including its structure and the modifications to extend it to solve multi-scale systems
like the monodomain model.
BACOLI uses the following discretization strategy. Consider the interval Œa; b
divided into Nx subintervals Œxi1 ; xi , where i D 1; 2; : : : ; Nx ; with a partition
of the form
X
D
s.x/ D Bj;M .x/aj ;
jD1
where Bj;M .x/ is B-spline j of degree M, D is the number of the B-spline basis
functions, and the coefficients aj are the unknown coefficients that are defined
according to the choice of method, e.g., collocation . There are different types of
knots mentioned in [7]. The type that is considered in BACOLI is open uniform,
defined as
8
ˆ
<Xk D X1 ;
ˆ if k M C 1;
X Xk D constant; M C 1 k < D C 1;
ˆ kC1
:̂X D X ; k D C 1;
k DCMC1
With the choice of open uniform knots, the associated B-splines have two
properties at the left boundary:
The exact solution of (1), u.x; t/, is approximated by a linear combination of these
B-spline functions as
X
D
U.x; t/ D Bj;M .x/yj .t/;
jD1
d
U.l ; t/ D f .t; l ; U.l ; t/; Ux .l ; t/; U xx .l ; t//; (3)
dt
X
jf
U.l ; t/ D Bj;M .l /yj .t/: (4)
jDj0
X
jf
Bj;M .m /y0j .t/ D f .t; m ; U.m ; t/; Ux .m ; t/; U xx .m ; t//; (5)
jDj0
boundary conditions directly. For simplicity, on the spatial interval Œ0; 1, at the left
boundary,
U.0; t/ D B1;M .0/y1 .t/; Ux .0; t/ D B01;M .0/y1 .t/ C B02;M .0/y2 .t/:
U.1; t/ D BD;M .1/yD .t/; Ux .1; t/ D B0D;M .1/yD .t/ C B0D1;M .0/yD1 .t/:
Coupling the ODEs in (5) with the discretized boundary conditions gives an index-1
initial-value system of DAEs of the form
X
jf
Bj;M .l /y0j .t/ D f .t; l ; U.l ; t/; Ux .l ; t/; Uxx .l ; t//; (6)
jDj0
The BACOLI software package has been extended to solve system of equations
given by
ut .x; t/ D f .t; x; v.x; t/; u.x; t/; ux .x; t/; uxx .x; t//;
vt .x; t/ D g.t; x; v.x; t/; u.x; t//;
a x b; t t0 ;
Ba .t; v.a; t/; u.a; t/; ux .a; t// D 0; Bb .t; v.b; t/; u.b; t/; ux .b; t// D 0;
where u.x; t/ and v.x; t/ are the unknown scalar and vector functions of sizes 1 and
Mv , respectively. Full details on the modifications and a detailed list and description
of the modified subroutines may be found in [12].
3 Electrophysiology Background
The heart can be modelled as an electric dipole with separated positive and negative
charges that create an electrical field. The body behaves like a conductor when it
is exposed to such an electrical field. In each heart cycle, an electrical current runs
through the body. This electrical current causes an electrical potential at each point
of the body, giving rise to a time-varying potential difference throughout the body.
The potential variations during a heart cycle represent the electrical activation of
the heart muscle cells. The electrocardiogram (ECG) is a time-dependent reading
of specific potential differences with respect to a reference potential [14]. Figure 1
represents recorded variations of the transmembrane potential as a function of time
for the cell model of Bondarenko et al. [3, 4]. A control volume is a fixed region
considered in space in order to study the energies or fluids that pass its boundary [8].
Continuum modelling of a tissue is a method of modelling based on the concept of
the control volume, in which specific sample points are considered that relate to
a quantity that is the average of its neighbouring cells. In continuum modelling,
instead of considering individual cells, only those sample points are considered.
The monodomain model is a continuum-based, multi-scale mathematical model
for the electrical activity in heart tissue [14]. The standard formulation of this
model is (2). In this paper, the constants , i , and Cm are taken to be 1400 cm1 ,
Extending BACOLI to Solve the Monodomain Model 453
20
Transmembrane potential (mV)
0
–20
–40
–60
–80
–100
0 10 20 30 40 50 60 70
Time (ms)
Fig. 1 Transmembrane potential as a function of time steps for the cell model of Bondarenko
et al. [3, 4]
1:75 mS/cm, and 1 F/cm2 , respectively, as per the default values from the Chaste
software package (see below).
4 Numerical Results
This section presents the numerical results of solving the monodomain equation
coupled with the Luo–Rudy I cell model [10] and the epicardial variant of the 2006
cell model of ten Tusscher and Panfilov [15]. BACOLI accepts two tolerances, a
relative and an absolute tolerance.
The boundary conditions for both cases are insulating boundary conditions on a
domain chosen as Œ0; 1
vx .0; t/ D 0; vx .1; t/ D 0:
In order to measure the errors of the numerical solution obtained with the
extended BACOLI software package, a reference solution is generated with
Chaste, a powerful, widely used, and well-respected software package for heart
simulation. This software applies a semi-implicit method [19] to the monodomain
model (2a), and the cell models (which reduce to ordinary differential equations at
each discrete point in space) are solved with Heun’s method. The reference solution
is generated by comparing increasingly accurate solutions for which the time step is
halved and the number of spatial mesh points is doubled. The process of generating
these increasingly accurate solutions continues until a desired number of matching
digits are obtained. In our numerical experiments, the comparison is made at 21
equally spaced time steps in the temporal domain and 101 equally spaced spatial
points.
454 E. Mirshekari and R.J. Spiteri
In order to measure the accuracy and efficiency of any numerical method, one
can compute an average of the error at Nt points in the temporal domain t 2 Œt0 ; tf
and at Nx points in the spatial domain, i.e., the average is over N D Nt Nx space-time
points. After generating the reference solution for all N points, the mixed root mean
square (MRMS) [11] error is computed as
v
u N
u1 X vO i vi 2
eMRMS Dt ;
N iD1 1 C jvO i j
where vO i and vi , respectively, denote the reference solution and the numerical
solution for the voltage at space-time point i.
The Luo–Rudy I cell model consists of 8 variables and simulates the action potential
of a guinea pig ventricular cell [10]. The initial values are taken from [16]. Table 1
shows some accuracy results. The first column contains the spatial points for the
output. The second column represents the reference solution generated by Chaste.
This reference solution has 4 matching digits and MRMS error 4:86 104 %
between two consecutive phases. The third column represents the solution generated
with the extended BACOLI at tolerance 1 108 and SCI spatial error estimate. The
results are reported at the time tf D 5 ms. The matching digits are 7 at x D 0:0 and
6 elsewhere.
For the extended BACOLI software package, the absolute and relative tolerances
are 1:25 102 , and the number of collocation points is 3. These tolerances are
roughly the largest that gives a numerical solution with MRMS error of about
5 %. Because it is possible to achieve MRMS error of about 5 % with relatively
large tolerances, it is most efficient for the extended BACOLI to use a relatively
small number of collocation points. The initial mesh is set to have 4 uniform
subintervals in order to minimize any bias in the extended BACOLI software
package determining a suitable mesh. The resulting numerical solution has MRMS
error 4:15 %, and that for Chaste is almost the same. The results show that with
the extended BACOLI software package it takes 0:18 s and with Chaste it takes
0:50 s. Therefore, in this case there is a speed-up of a factor of around three in
the extended BACOLI software package. Such a saving becomes significant when
such simulations are run many times sequentially as may be required for parameter
or other types of optimization; for example, running the Luo–Rudy I model a
million times consecutively with the extended BACOLI software package would
theoretically save about 320; 000 s or 3:7 days on a six-day run.
The epicardial variant of the model of ten Tusscher and Panfilov [15] consists of
19 variables and simulates the human ventricle [15]. The initial values are taken
from [17]. Table 2 shows some accuracy results. The first column contains the
spatial points for the output. The second column represents the reference solution
generated by Chaste. This reference solution has 3 matching digits and MRMS
error 3:92 103 % between two consecutive phases. The third column represents
the solution generated with the extended BACOLI at tolerance 1 108 and SCI
spatial error estimate. The results are reported at the time tf D 5 ms. The matching
digits vary between 3 and 6.
For the extended BACOLI software package, the absolute and relative tolerances
are 1 102 , and the number of collocation points is 3. These tolerances are roughly
the largest that gives a numerical solution with MRMS error of about 5 %. For
consistency with the previous experiment, the initial mesh size is taken to be uniform
with 4 subintervals. The resulting numerical solution has MRMS error 4:53 % and
that for Chaste is 5:60 %. The results show that with the extended BACOLI
software package it takes 1:16 s and with Chaste it takes 2:58 s. Therefore, in this
case there is a speed-up of a factor of around two in the extended BACOLI software
package.
5 Conclusions
References
1. Arsenault, T., Muir, P.H., Smith, T.: Superconvergent interpolants for efficient spatial error
estimation in 1D PDE collocation solvers. Can. Appl. Math. Q. 17(3), 409–431 (2009)
2. Arsenault, T., Smith, T., Muir, P.H., Pew, J.: Asymptotically correct interpolation-based spatial
error estimation for 1D PDE solvers. Can. Appl. Math. Q. 20(3), 307–328 (2012)
3. Auckland Bioengineering Institute.: The CellML project. http://www.cellml.org/
4. Bondarenko, V.E., Szigeti, G.P., Bett, G.C.L., Kim, S.J., Rasmusson, R.L.: Computer model
of action potential of mouse ventricular myocytes. Am. J. Physiol.-Heart C. 287(3), H1378–
H1403 (2004)
5. de Boor, C.: A Practical Guide to Splines. Springer, New York (1978)
6. de Boor, C., The MathWorks Inc.: Spline Toolbox User’s Guide. The MathWorks, Inc., Natick
(1999)
7. Dodgson, N.: B-splines. http://www.cl.cam.ac.uk/teaching/2000/AGraphHCI/SMEG/node4.
html (Aug 2013)
8. Engineers Edge LLC.: Control volume – fluid flow. http://www.engineersedge.com/fluid_flow/
control_volume.htm (Feb 2014)
9. Holder, D., Huo, L., Martin, C.F.: The Control of Error in Numerical Methods. Springer, New
York (2007)
10. Luo, C., Rudy, Y.: A model of ventricular cardiac action potential. Circ. Res. 68(6), 1501–1526
(1991)
11. Marsh, M.E., Torabi Ziaratgahi, S., Spiteri, R.J.: The secrets to the success of the Rush – Larsen
method and its generalizations. IEEE Trans. Bio-Med. Eng. 59(9), 2506–2515 (2012)
12. Mirshekari, E.: Extending BACOLI to solve multi-scale problems. Master’s thesis, Department
of Mathematics and Statistics, University of Saskatchewan (2014)
13. Petzold, L.R.: A description of DASSL: a differential/algebraic system solver. Technical report,
Sandia National Labs., Livermore (1982)
14. Sundnes, J., Lines, G.T., Cai, X., Nielsen, B.F., Mardal, K.A., Tveito, A.: Computing the
Electrical Activity in the Heart. Springer, Berlin (2006)
15. ten Tusscher, K.H.W.J., Panfilov, A.V.: Alternans and spiral breakup in a human ventricular
tissue model. Am. J. Physiol. Heart Circ. Physiol. 291(3), 1088–1100 (2006)
Extending BACOLI to Solve the Monodomain Model 457
16. The CellML Project.: A model of the ventricular cardiac action potential. http://models.cellml.
org/exposure/2d2ce7737b42a4f72d6bf8b67f6eb5a2/luo_rudy_1991.cellml/@@cellml_
codegen/F77 (Feb 2014)
17. The CellML Project: Alternans and spiral breakup in a human ventricular tissue model
(epicardial model). http://models.cellml.org/exposure/a7179d94365ff0c9c0e6eb7c6a787d3d/
ten_tusscher_model_2006_IK1Ko_epi_units.cellml/@@cellml_codegen/F77 (Apr 2014)
18. Wang, R., Keast, P., Muir, P.H.: A high-order global spatially adaptive collocation method for
1-D parabolic PDEs. Appl. Numer. Math. 50(2), 239–260 (2004)
19. Whiteley, J.P.: An efficient numerical technique for the solution of the monodomain and
bidomain equations. IEEE Trans. Bio-Med. Eng. 53(11), 2139–2147 (2006)
An Analysis of the Reliability of Error Control
B-Spline Gaussian Collocation PDE Software
1 Introduction/Background
B-spline Gaussian collocation software for the numerical solution of PDEs has been
widely used for several decades. Although there has been some development of
software of this type for 2D PDEs, see, e.g., [9] and references within, software
for the 1D case is at a more advanced state, and it is this case that we focus on in
this paper. (However, since the approach for the 2D case considered in [9] builds
on the numerical algorithms used in the 1D case, the questions we consider in this
paper will be relevant for the 2D case.) A characterizing feature of such software
is the representation of the numerical solution as a linear combination of known
B-spline [4] basis functions (piecewise polynomials of a given degree p) in space
within unknown time-dependent coefficients. The B-spline basis is chosen to have
X
NC
U.x; t/ D yi .t/Bi .x/; (1)
iD1
where yi .t/ is the time-dependent coefficient of the i-th B-spline basis function,
Bi .x/, and NC D NINT.p 1/ C 2. The B-spline coefficients are determined by
solving collocation conditions, obtained by requiring the approximate solution to
exactly satisfy the PDEs at the images of the Gauss points of a given order on
each subinterval of the spatial mesh, and additional equations that depend on the
boundary conditions. Assuming a system of PDEs of the form
ut .x; t/ D f t; x; u.x; t/; ux .x; t/; uxx .x; t/ ; a x b; t t0 ; (2)
where Uj .x; t/ is the jth component of U.x; t/, U N j .x; t/ is the jth component of
N
U.x; t/, ATOLj and RTOLj are absolute and relative tolerances corresponding to the
jth component of the solution, and the number of PDEs is NPDE. At the end of each
time step, t, the collocation solution, U.x; t/ was accepted if
Otherwise, the time step was rejected and BACOL computed a second set of spatial
error estimates of the form,
v
uNPDE Z 2
uX xi
Uj .x; t/ U
N j .x; t/
OEi .t/ D t dx; i D 1; : : : ; NINT;
jD1 xi1 ATOLj C RTOLj jUj .x; t/j
(8)
which were then used within an adaptive mesh refinement (AMR) process for
which the goal was to determine a spatial mesh for the current time such that
the estimated spatial errors were (i) approximately equidistributed over the mesh
subintervals and (ii) less than the user tolerance [20]. BACOL was shown to have
superior performance compared to a number of comparable packages, especially for
problems with sharp moving layers and higher accuracy requirements [19].
In BACOL, the spatial error estimate is used to control the error in U.x; t/, the
approximate solution returned by the code. We refer to this as Standard (ST) error
control. A minor modification of BACOL would allow it to return U.x; N t/ and in
this case, the computation of the returned solution would be controlled based on an
error estimate for a collocation solution that is of one lower order. We refer to this as
Local Extrapolation (LE) error control; see, e.g., [7], in the context of Runge-Kutta
formula pairs for the numerical integration of ODEs.
The most recent update to this family of solvers is a modification of BACOL
known as BACOLI [12]. The key feature of BACOLI is the avoidance of the com-
N t/, which represented a substantial cost within BACOL. BACOLI
putation of U.x;
instead computes only one collocation solution and one low cost interpolant that is
used in the computation of the spatial error estimate. There are two options available
462 P. Muir and J. Pew
for the interpolant. One involves a superconvergent interpolant (SCI) [1] which is
based on the presence of certain points within the spatial domain where U.x; t/ is
of at least one order of accuracy higher. The SCI is of the same order of accuracy
N t/ and leads to a spatial error estimate for U.x; t/, similar to the situation in
as U.x;
BACOL. This option therefore provides ST error control. The other option involves
a lower order interpolant (LOI) [2], of one order of accuracy lower than U.x; t/. The
LOI is based on interpolation of U.x; t/ at certain points such that the interpolation
error of the LOI agrees asymptotically with the error of a collocation solution of one
order lower than U.x; t/. This option therefore provides LE error control. BACOLI
has been shown to be about twice as fast as BACOL [12].
When considering the effectiveness of a numerical software package, the most
common analysis involves work-precision (i.e., work-accuracy) diagrams that show
the relationship between the CPU time and the accuracy. A number of such studies
involving BACOL and BACOLI have been performed; see, e.g., [12, 19]. However,
an equally important measure of the quality of a software package is its reliability ,
and a key component of this measure involves assessing the relationship between the
tolerance requested and the accuracy achieved. This depends on the quality of the
error estimates and the algorithms that adapt the computation to attempt to control
the error estimates with respect to the user-specified tolerances.
The purpose of this paper is to present an experimental analysis of the reliability
of the error control PDE solvers BACOL and BACOLI on a standard test problem
chosen from the literature. (Additional results of this type for several other test
problems are reported in [11] and some preliminary results of this type for BACOL
were reported in [17].) In particular, we are interested in how the choice of the
degree, p, of the B-spline basis and the choice of error control mode (ST or LE)
impact on the reliability of the solvers. We also examine the effectiveness of the
interpolation-based spatial error estimates provided by the SCI and LOI schemes.
2 Numerical Results
In this section we present numerical results for four code combinations identified in
the previous section:
• BACOL with ST error control : BAC/ST
• BACOL with LE error control : BAC/LE
• BACOLI with the SCI scheme/ST error control : SCI/ST
• BACOLI with the LOI scheme/LE error control : LOI/LE
We consider the One Layer Burgers Equation (OLBE) with D 104 :
The solution has a sharp layer region around x D 0:25 when t D 0. As t goes from
0 to 1, the layer moves to the right and is located around x D 0:75 when t D 1. A
plot of the solution for D 104 is given in [12].
We apply each of the four code combinations identified above to the OLBE
with D 104 , for a range of kcol values (recall that the degree of the piecewise
polynomials in space is p D kcol C 1) and for 91 tolerance values (with ATOL1 D
RTOL1 ) uniformly distributed from 101 to 1010 . For each experiment, we report
the L2 -norm of the error at the final time, Tout D 1. Additional results, including
results for other test problems, are given in [11].
In this subsection, we consider, for the LOI/LE code, the relationship between the
error and the tolerance, for kcol D 3; 5; 7; 9. We provide plots of the tolerance vs.
the error and plots of the tolerance vs. the error tolerance ratio (ETR), i.e., the error
divided by the tolerance. See Figs. 1, 2, 3, and 4. In Fig. 1a, we see that there is good
correlation between the requested tolerance and the achieved accuracy; the points
are clustered around the reference line corresponding to equal values of the tolerance
and error. In Fig. 1b, considering the horizontal reference line corresponding to an
ETR value of 1, we see that the ETR values vary over the range of 91 tolerance
values, with some errors greater than the tolerance and some less than the tolerance.
The other horizontal line represents the average of the ETR values. This figure also
Fig. 1 (a) Tolerance vs. Error, LOI/LE, kcol D 3, (b) Tolerance vs. ETR, LOI/LE, kcol D 3
464 P. Muir and J. Pew
Fig. 2 (a) Tolerance vs. Error, LOI/LE, kcol D 5, (b) Tolerance vs. ETR, LOI/LE, kcol D 5
Fig. 3 (a) Tolerance vs. Error, LOI/LE, kcol D 7, (b) Tolerance vs. ETR, LOI/LE, kcol D 7
Fig. 4 (a) Tolerance vs. Error, LOI/LE, kcol D 9, (b) Tolerance vs. ETR, LOI/LE, kcol D 9
Reliability of Error Control B-Spline Gaussian Collocation Software 465
shows that maximum ETR is 5.99, the minimum is 0.08, and that on average the
error is 1.86 times the tolerance. Figures 2, 3, and 4, give similar results for the
kcol D 5; 7; 9 cases, and show maximum, minimum, and average ETR values of
{3.35, 0.15, 1.13}, {3.78, 0.01, 1.03}, and {5.72, 0.01, 0.90}, respectively. Similar
results are reported in [11] for the other code combinations and test problems.
In this subsection we consider the BAC/ST and BAC/LE codes for the kcol D 5
case. From the results for these codes we can assess the effect that the error control
mode has on reliability since this is the only difference between these codes. From
Figs. 5 and 6 we can see that the two codes appear to have quite similar performance.
For the BAC/ST code, the maximum, minimum, and average ETR values are 4.49,
0.28, and 1.79, while for the BAC/LE code, the corresponding values are 4.49,
Fig. 5 (a) Tolerance vs. Error, BAC/ST, kcol D 5, (b) Tolerance vs. ETR, BAC/ST, kcol D 5
Fig. 6 (a) Tolerance vs. Error, BAC/LE, kcol D 5, (b) Tolerance vs. ETR, BAC/LE, kcol D 5
466 P. Muir and J. Pew
Fig. 7 (a) Tolerance vs. Error, SCI/ST, kcol D 5, (b) Tolerance vs. ETR, SCI/ST, kcol D 5
0.18, and 2.01. Similar results are reported in [11] for the other kcol values and
test problems.
In this section we compare BAC/ST with SCI/ST and BAC/LE with LOI/LE, for
kcol D 5. This will allow us to assess the effectiveness of the interpolation-
based error estimation schemes. The plots for the SCI/ST code are given in Fig. 7.
A comparison of Figs. 5 and 7 show that the BAC/ST and SCI/ST codes have
comparable reliability, while a comparison of Figs. 6 and 2 show that the BAC/LE
and LOI/LE codes also have comparable reliability. From Fig. 7b, we see that for
the SCI/ST code the maximum ETR is 6.85, the minimum ETR is 0.10, and the
average is 1.63. Generally similar results for the other kcol values and test problems
are reported in [11]. (The only exception, as documented in [12] and [11], is for the
SCI/ST, kcol D 3 case, where issues associated with the quality of its error estimates
have been observed.)
3 Discussion/Conclusions/Future Work
Several conclusions can be drawn from the results presented in the previous
section:
• The codes considered in this paper appear to be reliable; the error is generally
well correlated with the requested tolerance. We see that in almost all cases
the error is within the correct order of magnitude of the requested tolerance.
Furthermore the error is, on average, a small multiple of the requested tolerance.
This suggests that the error estimates computed by the codes are generally of
Reliability of Error Control B-Spline Gaussian Collocation Software 467
good quality and that the new SCI and LOI error estimation schemes are of
comparable quality to the original error estimation scheme employed by BACOL.
• The relationship between the error and tolerance for each of the two versions of
BACOL that employ different error control modes (ST vs. LE) is quite similar.
This suggests that the choice of error control mode does not have a strong impact
on the reliability of the solver.
• The degree p of the B-spline basis as specified by the choice of kcol (p D kcolC1)
does appear to have an impact on the reliability. A comparison of the results for
the kcol D 3; 5; 7, and 9 cases shows that as kcol is increased, the reliability
of the codes tends to increase; that is, the error is, on average, almost equal to
the tolerance for higher kcol values. For the kcol D 9 case, the error is often
significantly less than the tolerance. (Of course, while it is desirable for the error
to be about the same size as or even slightly less than the tolerance, if the error is
too much less than the tolerance this can lead to inefficiency in the computation.)
While the entire family of software packages discussed in this paper leave kcol
as a parameter that must be chosen by the user, it is in fact not clear how to
make an appropriate choice of this parameter for a given problem. The correlation
between higher kcol values and improved reliability that can be seen from the
results presented in this paper, as well as earlier results investigating the relationship
between the choice of kcol, the tolerance, and the efficiency of the solvers [12], will
provide a basis for further analysis that will allow us to develop a new release of
BACOLI in which the code itself will choose kcol appropriately to improve the
efficiency and reliability of the computation.
Since BACOL and BACOLI employ DASSL to compute the time-dependent B-
spline coefficients, the overall reliability of the computations performed by these
codes is dependent on the reliability of DASSL. An example of the relationship
between the tolerance and the error for DASSL can be seen in Figure 1 of [16];
it shows generally good correlation between the error and the tolerance, but with
variations in the ETR of approximately one order of magnitude in either direction,
similar to those reported here for BACOL and BACOLI.
Furthermore, for DASSL and the codes considered in this paper, the relationship
between the tolerance and the error is not particularly smooth. That is, while the
correlation between a given tolerance and the corresponding error is generally good
(i.e., the error is, on average, within a small multiple of the tolerance), a small
change in the tolerance does not necessarily lead to a similar small change in the
error. This is related to what is referred to as the “conditioning” or “stability” of
the software [16]. The papers [14, 15], and [13] describe how control theoretic
techniques can be employed within ODE or DAE software to provide an improved
condition number for the software. We plan to introduce these type of techniques
into the BACOL and BACOLI packages.
Finally, as mentioned earlier, since the approach for the 2D case considered in
[9] builds on the 1D case, we expect the results of this paper to be relevant for the
numerical treatment of 2D PDEs.
468 P. Muir and J. Pew
References
1. Arsenault, T., Smith, T., Muir, P.H.: Superconvergent interpolants for efficient spatial error
estimation in 1D PDE collocation solvers. Can. Appl. Math. Q. 17, 409–431 (2009)
2. Arsenault, T., Smith, T., Muir, P.H., Pew, J.: Asymptotically correct interpolation-based spatial
error estimation for 1D PDE solvers. Can. Appl. Math. Q. 20, 307–328 (2012)
3. Brenan, K.E., Campbell, S.L., Petzold, L.R.: Numerical Solution of Initial-Value Problems
in Differential-Algebraic Equations. Society for Industrial and Applied Mathematics (SIAM),
Philadelphia (1989)
4. de Boor, C.: A Practical Guide to Splines. Volume 27 of Applied Mathematical Sciences.
Springer, New York (1978)
5. Díaz, J.C., Fairweather, G., Keast, P.: Algorithm 603. COLROW and ARCECO: FORTRAN
packages for solving certain almost block diagonal linear systems by modified alternate row
and column elimination. ACM Trans. Math. Softw. 9(3), 376–380 (1983)
6. Gear, C.W.: Numerical Initial Value Problems in Ordinary Differential Equations. Prentice-
Hall, Englewood Cliffs (1971)
7. Hairer, E., Nørsett, S.P., Wanner, G.: Solving Ordinary Differential Equations. I. Volume 8 of
Springer Series in Computational Mathematics, 2nd edn. Springer, Berlin (1993)
8. Keast, P., Muir, P.H.: Algorithm 688: EPDCOL: a more efficient PDECOL code. ACM Trans.
Math. Softw. 17(2), 153–166 (1991)
9. Li, Z., Muir, P.H.: B-spline Gaussian collocation software for two-dimensional parabolic PDEs.
Adv. Appl. Math. Mech. 5, 528–547 (2013)
10. Madsen, N.K., Sincovec, R.F.: Algorithm 540: PDECOL, general collocation software for
partial differential equations. ACM Trans. Math. Softw. 5(3), 326–351 (1979)
11. Muir, P.H., Pew, J.: Tolerance vs. error results for a class of error control B-spline Gaussian
collocation PDE solvers. Saint Mary’s University, Department of Mathematics and Computing
Science Technical Report Series. http://cs.smu.ca/tech_reports (2015)
12. Pew, J., Li, Z., Muir, P.H.: A computational study of the efficiency of collocation software for
1D parabolic PDEs with interpolation-based spatial error estimation. Saint Mary’s University,
Dept. of Mathematics and Computing Science Technical Report Series. http://cs.smu.ca/tech_
reports (2013)
13. Pulverer, G., Söderlind, G., Weinmüller, E.: Automatic grid control in adaptive BVP solvers.
Numer. Algorithms 56(1), 61–92 (2011)
14. Söderlind, G.: Digital filters in adaptive time-stepping. ACM Trans. Math. Softw. 29(1), 1–26
(2003)
15. Söderlind, G., Wang, L.: Adaptive time-stepping and computational stability. J. Comput. Appl.
Math. 185(2), 225–243 (2006)
16. Söderlind, G., Wang, L.: Evaluating numerical ODE/DAE methods, algorithms and software.
J. Comput. Appl. Math. 185(2), 244–260 (2006)
17. Wang, R.: High order adaptive collocation software for 1-D parabolic PDEs. Ph.D. thesis,
Dalhousie University (2002)
18. Wang, R., Keast, P., Muir, P.H.: BACOL: B-spline Adaptive COLlocation software for 1D
parabolic PDEs. ACM Trans. Math. Softw. 30(4), 454–470 (2004)
19. Wang, R., Keast, P., Muir, P.H.: A comparison of adaptive software for 1D parabolic PDEs. J.
Comput. Appl. Math. 169(1), 127–150 (2004)
20. Wang, R., Keast, P., Muir, P.H.: A high-order global spatially adaptive collocation method for
1-D parabolic PDEs. Appl. Numer. Math. 50(2), 239–260 (2004)
On the Simulation of Porous Media Flow Using
a New Meshless Lattice Boltzmann Method
1 Introduction
Since the beginning of the development of the lattice Boltzmann method (LBM),
a great number of studies have been conducted to extend the capabilities of the
standard lattice Boltzmann method to handle nonuniform and unstructured grids
[1–6]. A major trend in these studies is to apply some standard numerical tech-
niques, such as the finite difference (FD), the finite volume (FV), and the finite
element (FE) methods, for the discretization of the Boltzmann equation. However,
for geometrically complex problems, such as flows in porous media, where the time
and computational requirements of creating good quality meshes are significant, the
idea of developing a meshless lattice Boltzmann solver naturally arises.
In this study, we implement our newly proposed meshless lattice Boltzmann
method [7] for the simulation of nearly incompressible flows in porous media.
In our formulation, we split the collision and the advection equations following
the standard lattice Boltzmann method [8]. The collision equation is the same as
for the standard LBM, however, the advection equation is discretized using the
2 Formulation
The discrete Boltzmann equation (DBE) with the BGK collision approximation is
@fi @fi 1 eq
C ci;˛ D . fi fi /; i D 1; : : : ; nQ ; (1)
@t @x˛
c0 D 0 ;
ci D cos.i 1/ ex C sin.i 1/ ey ; i D 1; 3; 5; 7 ;
4 4
p
ci D 2Œcos.i 1/ ex C sin.i 1/ ey ; i D 2; 4; 6; 8 ;
4 4
(2)
eq
and fi is the equilibrium distribution, that is
!
eq ci;˛ u˛ .ci;˛ u˛ /2 u2˛
fi D ti 1C C : (3)
c2s 2c4s 2c2s
As usual, we break Eq. (1) into two steps, namely the collision step:
1 eq
fQi D fi . fi fi /; (4)
and the advection step:
@fi @fi
C ci;˛ D 0: (5)
@t @x˛
On the Simulation of Porous Media Flow Using a New Meshless Lattice. . . 471
We discreatize Eq. (5) in time using the Lax-Wendroff scheme, which reads
where ıt is the time step size and the superscript n is the time step number.
In order to apply the meshless local Petrov-Galerkin scheme to discretize Eq. (6)
in space, first, the local weak form of Eq. (6) on the control volume ˝I of point I is
derived by taking its inner product with a local test function WI over ˝I , and using
integration by parts, so that we obtain
Z Z Z
@fin ıt2 @WI @fin
WI finC1 d˝ D WI fin d˝ ıtWI ci;˛ C ci;˛ ci;ˇ d˝
˝I ˝I ˝I @x˛ 2 @xˇ @x˛
2 Z
ıt @fin
C WI ci;˛ ci;ˇ nˇ d
; (7)
2
I @x˛
where
I is the boundary of the control volume ˝I and nˇ is the unit outward normal
vector of
I . Equation (7) is the local weak form of Eq. (6).
In the next step, the field variable fi is to be expressed in terms of nodal values
fi;J by a local interpolation scheme, that is
X
Ns
fi .x; t/ D J .x/fi;J .t/ D ˚ T .x/fs .t/; (8)
JD1
where RT .x/ D fR1 .x/ R2 .x/ : : : RNs .x/g is the transpose of the vector of radial
basis functions (RBF), pT .x/ D f1 x y : : : pm .x/g is the transpose of the vector of
T
monomial basis functions, m is the number of monomial basis functions, Q̊ .x/ D
f˚ .x/ Ns C1 .x/ : : : Ns Cm .x/g is the transpose of the extended vector of the shape
T
functions, and G is a symmetric matrix defined in Ref. [9]. Substituting Eq. (8) in
472 S.H. Musavi and M. Ashrafizaadeh
NI h Z
X i NI h Z
X
WI J d˝ fi;J
nC1
D WI J d˝
JD1 ˝I JD1 ˝I
Z
ıt2 @WI @J
ıtWI C ci;ˇ ci;˛ d˝
˝I 2 @xˇ @x˛
Z i
ıt2 @J
C WI ci;˛ ci;ˇ nˇ d
fi;Jn
; (10)
2
I @x˛
where NI is the number of nodal points involved in the interpolation of the field
variable on the inner and the boundary points of the control volume ˝I . By
introducing the mass matrix as
Z
MIJ D WI J d˝; (11)
˝I
X
NI X
NI
nC1
MIJ fi;J D ŒMIJ C Ki;IJ fi;J
n
: (13)
JD1 JD1
To complete the discretization process, the integrals of equations (11) and (12) are
to be evaluated numerically. The Gauss quadrature scheme is employed for this
purpose. We have
X
NG
MIJ D k WI .xk /J .xk /jJ˝I j; (14)
kD1
On the Simulation of Porous Media Flow Using a New Meshless Lattice. . . 473
and
X
ıt2 @WI ˇˇ
@J ˇˇ ˝I
NG
Ki;IJ D k ıtWI .xk / C ci;ˇ ˇ ci;˛ ˇ jJ j
kD1
2 @xˇ xk @x˛ xk
@ ˇ
b
ıt2 X
NG
Jˇ
C k WI .xk / ci;˛ ˇ .ci;ˇ nˇ /jJ
I j; (15)
2 kD1 @x˛ xk
where k is the Gauss weighting factor for the Gauss quadrature point xk , J˝I and
J
I are the mapping Jacobian matrices for the domain and the boundary integrations,
respectively, and NG and NGb are the number of Gauss points used for the domain
and the boundary integrations, respectively.
Now, Eq. (13) becomes the fully discretized equation for the nodal point I.
Writing this equation for all of the nodal points in the computational domain
(I D 1; : : : ; N), and assembling the resulting equations in a global system of
equations, we can write
MfnC1
i D ŒM C Ki fni ; i D 1; : : : ; nQ ; (16)
where M, K, and fi are the global mass matrix, stiffness matrix, and particle
distribution vector, respectively. Equation (16) is a system of N equations with N
unknowns which should be solved separately for each direction i after imposing the
boundary conditions.
The advection equation of the particle distributions is a hyperbolic equation,
which requires boundary conditions for the incoming particles at the boundary
(ci;ˇ nˇ < 0). In this study, we impose boundary conditions using the bounce-back
scheme of non-equilibrium distributions, i.e.
eq eq
fi fi D fi fi ; (17)
where fi is the outgoing particle distribution along the opposite direction of the
incoming distribution fi . Substituting the equilibrium distribution of Eq. (3) in the
above equation, we obtain
where b and ub;˛ are the macroscopic density and velocity at the boundary. If fi
in Eq. (18) is considered to be the post-collision (pre-streaming) distribution, then
Eq. (18) becomes an explicit essential boundary condition for the discretized system
of Eq. (16).
The coefficient matrix in Eq. (16) is a sparse matrix which can be efficiently
solved using sparse iterative solvers such as BiCGStab. However, the explicit nature
of the standard lattice Boltzmann method, and the diagonally dominant character
of the mass matrix, motivated us to find rational ways of diagonalizing the mass
474 S.H. Musavi and M. Ashrafizaadeh
matrix, and thus save much of the computational time. In this study, we use row-sum
lumping, in which the sum of the elements of each row of the mass matrix is used as
the diagonal element. As a result, our meshless lattice Boltzmann method becomes
an explicit solver for the fluid flow problems. The maximum value for the time
step leading to a stable solution is determined using the Courant number, CFL D
max fjci jg ıt=ıxmin , where ıxmin is the minimum point spacing in the domain. For a
stable solution the CFL number should be smaller than 1.0.
3 Results
The first test case considered in this study is the pressure driven fully developed flow
between two parallel plates. In solving this test case using the proposed method,
we consider a square computational domain in the xy plane and discretize it using
9 9, 17 17, 23 23, and 65 65 uniform point distributions. The constant
pressure boundary condition is imposed in the inlet and outlet and the no-slip and
the impermeability boundary conditions are imposed at the walls. For each point
distribution, time iterations continue until a steady state is reached. The result of our
method for the velocity distribution is depicted and compared with the analytical
solution in Fig. 1.
0.8
0.6
U
0.4 Presentstudy
Analyticalsolution
0.2
0
0 0.2 0.4 0.6 0.8 1
Y
Fig. 1 The velocity distributions for the Poiseuille flow; line: analytical solution, symbols: present
study
On the Simulation of Porous Media Flow Using a New Meshless Lattice. . . 475
0
10
10-1
E 10-2
10-3
-4
10
10 -2 10 -1 10 0
h
Fig. 2 Numerical convergence of the meshless Lattice Boltzmann method in L2 error norm with
respect to the point spacing for the Poiseuille flow
PNe !1=2
ID1 .UaI UnI /2
ED PNe 2
; (19)
ID1 UaI
where UaI and UnI are the analytical and numerical solutions of the velocity at
point I, respectively, and Ne is the fixed number of points used for the error
analysis. For this test case, a 10 10 uniform point distribution is used for the error
analysis. The variation of the above error norm with respect to the point spacing
h is sketched in the logarithmic diagram of Fig. 2. The rate of the convergence of
our numerical method, computed by the linear regression of the data in Fig. 2, is
R D 2:15.
One of the most common applications of the standard lattice Boltzmann method is
the simulation of the flow in porous media. In order to illustrate the ability of the
present meshless lattice Boltzmann method to deal with complex geometries, we
476 S.H. Musavi and M. Ashrafizaadeh
vDp
Re D ; (20)
where and are the density and viscosity of the fluid, v is the superficial flow
velocity, and Dp is a representative grain size for the porous media, which is usually
chosen to be the average grain diameter. Experimental studies have illustrated that
the flow regimes with low Reynolds numbers (typically less than 10) are Darcian,
meaning that the superficial velocity-pressure gradient relation obeys the Darcy’s
law
k
v D rp; (21)
Fig. 3 Domain and a typical point distribution for the flow in a porous medium
On the Simulation of Porous Media Flow Using a New Meshless Lattice. . . 477
set so that the Reynolds number of the flow is low and the flow remains in the
Darcian regime.
The domain is discretized using arbitrary sets of nodal points as shown in Fig. 3.
First, to investigate the convergence of the numerical method with respect to the
domain discretization, we discretize the domain with 2601, 7364, 25284, and 90043
arbitrary distributed nodal points and compute the superficial velocity for each case.
The results are depicted in Fig. 4. As shown in this figure, the difference between
the cases with 25284 and 90043 points is less than 1 % and therefore we use the case
with 25284 points in all the following simulations. However, as observed from the
figure, the standard LBM requires 640000 grid points for the accurate simulation of
the flow. It means that the required number of points in our method is about 1/25th
of that of the standard LBM.
Next, to obtain the permeability of the medium, we compute the superficial
velocity for different pressure gradients and perform the linear interpolation of the
results as is depicted in Fig. 5. From this figure, the permeability is obtained as
k D 1:53 105 m2 D 1:55 107 Darcy.
The pressure and velocity magnitude distributions of the porous medium flow
are depicted in Figs. 6 and 7, respectively, for the dimensionless pressure gradient
of 0.1.
0.0014
Standard LBM
Meshless LBM
0.0012
Superficial velocity
0.0008
Meshless LBM
25284 nodal points
0.0006
0.0004 3 4 5 6
10 10 10 10
Number of points
Fig. 4 The superficial velocity versus the number of nodal points used in the meshless LBM
478 S.H. Musavi and M. Ashrafizaadeh
0.002
0.0016
Superficial velocity
0.0012
0.0008
0.0004
0
0 0.02 0.04 0.06 0.08 0.1 0.12
Pressure gradient
Fig. 5 The superficial velocity with respect to the pressure gradient for the flow in the porous
medium
0.8 0.09
0.08
0.07
0.06
0.05
0.04
0.6
0.03
0.02
y
0.01
0.4
0.2
0
0 0.2 0.4 0.6 0.8 1
x
vel
0.8 0.02
0.018
0.016
0.014
0.012
0.01
0.6
0.008
0.006
y
0.004
0.002
0
0.4
0.2
0
0 0.2 0.4 0.6 0.8 1
x
Fig. 7 Velocity magnitude distribution for the flow in the porous medium
4 Conclusions
A new meshless lattice Boltzmann method (MLLBM) has been developed for the
simulation of the nearly incompressible fluid flows. The main advantage of our
method with respect to the previous extensions of the lattice Boltzmann method
is to eliminate the need for any meshes. A feature that shows its superiority over the
standard lattice Boltzmann method in complex geometries, such as porous media.
Two test cases have been considered in this study. First, the Poiseuille flow has
been solved and compared with the analytical solution, showing the second order of
accuracy of our method. Next, the flow in a porous medium has been simulated to
illustrate the capability of the method in dealing with domains with a very complex
geometry. Although the results presented in this study are for two-dimensional
cases, the extension for three-dimensional problems is straightforward and remains
for our future works. However, our preliminary 3D developments show that the time
and memory saving for the meshless LBM method should be even higher than that
of the 2D model.
480 S.H. Musavi and M. Ashrafizaadeh
References
1. Bardow, A., Karlin, I.V., Gusev, A.A.: General characteristic-based algorithm for off-lattice
Boltzmann simulations. EPL (Europhys. Lett.) 75(3), 434 (2006)
2. Patil, D.V., Lakshmisha, K.N.: Finite volume TVD formulation of lattice Boltzmann simulation
on unstructured mesh. J. Comput. Phys. 228(14), 5262–5279 (2009)
3. Li, Y., LeBoeuf, E.J., Basu, P.K.: Least-squares finite-element scheme for the lattice Boltzmann
method on an unstructured mesh. Phys. Rev. E 72(4), 046711 (2005)
4. Shi, X., Lin, J., Yu, Z.: Discontinuous Galerkin spectral element lattice Boltzmann method on
triangular element. Int. J. Numer. Methods Fluids 42(11), 1249–1261 (2003)
5. Düster, A., Demkowicz, L., Rank, E.: High-order finite elements applied to the discrete
Boltzmann equation. Int. J. Numer. Methods Eng. 67(8), 1094–1121 (2006)
6. Min, M., Lee, T.: A spectral-element discontinuous Galerkin lattice Boltzmann method for
nearly incompressible flows. J. Comput. Phys. 230(1), 245–259 (2011)
7. Musavi, S.H., Ashrafizaadeh, M.: Meshless lattice Boltzmann method for the simulation of fluid
flows. Phys. Rev. E 91(2), 023310 (2015)
8. Wolf-Gladrow, D.A.: Lattice-Gas Cellular Automata and Lattice Boltzmann Models: An
Introduction, vol. 1725. Springer, Berlin (2000)
9. Liu, G.R., Gu, Y.T.: An Introduction to Meshfree Methods and Their Programming. Springer
Science and Business Media, Dordrecht/New York (2005)
A Comparison Between Two
and Three-Dimensional Simulations
of Finite Amplitude Sound Waves in a Trumpet
1 Introduction
on the shank of the trumpet mouthpiece, and applied Fourier analysis to the data
to reconstruct the waveform as a sum of 30 cosine waves. This experimental data
obtained at the mouthpiece was then used as a boundary condition on the pressure
for our simulations. The musical notes recorded and then simulated were the Bb3 and
Bb4 played at forte. A half-inch microphone was also placed outside the trumpet on
the central axis about 17 cm away from the bell. We compared our simulation results
with the pressure measurements obtained from this microphone outside the bell.
For all simulations, we assumed that the initial flow was at rest and related
pressure and velocity through the 1D expression derived from linear acoustic theory.
Since there is little return from the reflections at the bell, at least for the higher
frequencies, the plane wave velocity expression is a reasonable approximation. For
the boundary conditions, we prescribed reflecting boundary conditions on the inner
and outer walls of the trumpet mesh (excluding the mouthpiece). Since we modelled
a trumpet in a box, we used pass-through boundary conditions on the computational
domain.
Several numerical simulations have been carried out to determine if the model
considered is adequate. Some such computational experiments are discussed in
[5]. We have discovered that considering the proper geometry of brass musical
instruments is critical to simulate wave propagation with any accuracy. We have
also investigated the importance of the bell geometry. One of the most significant
properties of the bell is how it influences the reflections of the sound pressure waves.
The location at which the harmonic waves reflect in the bell is dependent on their
frequency. For higher frequency waves, a larger portion of the energy will be lost or
be completely transmitted from the bell [1].
In the literature, it is common for the trumpet flare to be approximated by several
different functions or combination of functions, e.g., exponential functions, hyper-
bolic functions, etc. However, we were uncertain if such geometric descriptions
would be sufficient to accurately model wave propagation through the trumpet bell.
If the propagating sound pressure waves are particularly sensitive to the bell’s
curvature, simulations may produce exaggerated discrepancies if the bell shape
is poorly approximated. Simulations performed in 2D should be relevant for the
frequency components that are transmitted from the bell. Therefore, to reduce run
time, we first examined our problem by neglecting the third spatial dimension and
focused on the flare shape.
The first mesh, which will be called mesh 1, represented a 2D trumpet where
the bell was approximated by an elliptic function. To improve this approximation,
bell measurements were taken at several locations along the flare, which was then
interpolated by the obtained set of points and cubic splines. The measurements were
484 J. Resch et al.
done at the university’s machine shop by sampling the diameter of the bore near
expansion, 1.02 m from the mouthpiece. This flare shape was used to construct a
2D trumpet mesh called mesh 2. To obtain more precise points to approximate the
trumpet shape, a photo of the trumpet flare was taken. The grabit software from
Math Works Inc. was used to accurately trace out the shape of the trumpet bell. This
third bell shape was used to create a 2D mesh which we will call mesh 3. Since this
representation of the bell was most accurate, it was further used to extend mesh 3
into a full 3D mesh. This 3D mesh will be referred to as mesh 4. The total number
of cells is 8190, 8467, 8038 and 14,362 for mesh 1, mesh 2, mesh 3 and mesh 4,
respectively. The meshes consist of triangular or tetrahedral elements with adaptive
sizes to accurately resolve the geometric features of the trumpet. More details of
the mesh construction can be found in [5]. The computational domain and a sample
mesh are shown in Fig. 2.
Once these flare shapes were obtained, simulations were carried out on the
meshes of a trumpet that is 1.48 m in total length. The diameter of the bore is
constant except near the end of the instrument where it slowly increases and then
flares rapidly to give the bell shape. This expansion for all meshes begins 1.02 m
from the mouthpiece end. In [5], we justified that the bends of the instrument do not
Fig. 2 Mesh 3: Two-dimensional computational domain and trumpet mesh constructed by tracing
out the shape of the bell in Matlab
A Comparison Between 2D and 3D Simulations of Finite Amplitude Waves in. . . 485
Fig. 3 Initial and reflected wave of simulated pressure pulse through mesh 1, mesh 2, mesh 3 and
mesh 4
Table 1 The number of cells, and the frequency components that are mostly confined to the
instrument or transmitted from the bell are summarized for each mesh
Mesh name Cell count Reflected freq. (Hz) Transmitted freq. (Hz)
Mesh 1 8190 600 800
Mesh 2 8467 600 1000
Mesh 3 8038 400 1000
Mesh 4 14;362 900 1200
Further simulations were then carried out using the measured Bb3 and Bb4 pressure
waveforms. In particular, we solved the full 2D and 3D sets of compressible Euler
equations with the initial and boundary conditions mentioned above on the meshes.
Each note was initialized with 30 harmonics.
The frequency spectra of the 2D simulation results for the Bb3 and Bb4 notes
outside of the trumpet bell can be seen in Figs. 5 and 6, respectively. Figures 5
and 6 also depict the frequency spectra of the experimental data. A comparison
of the numerical and experimental data shows that the numerical amplitude is
approximately 19C dB off, where 14 dB are expected since the third spatial
dimension is neglected (see analysis in [5]). However, we are not certain why we
obtained an additional decibel difference of roughly 4C dB. As we will discuss in
the next section, a possible explanation is that the subtleties of the bore geometry
near the mouthpiece were not considered. Energy losses were also neglected and
some conjecture that this could make a difference of several decibels (up to 6 dB)
[4]. Nonetheless, to easily compare the harmonic distribution of the experimental
and 2D numerical data presented in Figs. 5 and 6, we shifted the experimental data
by the decibel difference stated in the plots.
488 J. Resch et al.
We can see in Figs. 5 and 6 that the performed simulations on mesh 1, i.e., the
2D trumpet mesh where the bell is approximated by an elliptic function, gives the
poorest results in shape and amplitude. The 2D simulation results carried out on
mesh 2 and mesh 3 however show improvement in both aspects, i.e., in amplitude
and harmonic distribution. In particular, the spectral data aligns relatively well
with the shifted experimental curve, with the exception of the lowest frequency
components. The first three harmonics for the Bb3 and the fundamental frequency
for the Bb4 deviate most from the experimental data. However, we postulate that the
lowest frequencies are mostly confined within the instrument and consequentially,
are greatly influenced by the reflections that take place near the bell. We also
predicted that we would observe some amplitude differences and harmonic distri-
bution discrepancies from examining the pulse results. We further hypothesized that
the experimental and numerical data will better match (specifically for the lowest
harmonic components of the notes) if the equivalent simulations were carried out in
3D, i.e., on mesh 4.
A Comparison Between 2D and 3D Simulations of Finite Amplitude Waves in. . . 489
The frequency spectra of the measured Bb3 and Bb4 pressure waveforms outside
the trumpet bell are plotted in Figs. 7 and 8, respectively. The result of solving
the full 3D system on mesh 4 is also plotted for the Bb3 and Bb4 notes in Figs. 7
and 8, respectively. Overall, we see that the 3D simulations show greater similarity
to experimental data. There are however still some discrepancies, particularly in
the amplitude of the 3D solution curves. The Bb3 and Bb4 notes are overestimated by
approximately 10 dB. For comparative purposes, we again shifted the experimental
curves by the amplitude difference. When this shift is considered, the shape of the
experimental data and numerical solutions are in better agreement compared to the
results in Figs. 5 and 6. More specifically, the resulting lower frequency components
for both simulated notes demonstrate that the bell reflections are more accurately
modelled when the third spatial dimension is considered. In the next section, we
conjecture on possible sources for the 10 dB difference obtained in our 3D numerical
simulations.
490 J. Resch et al.
Neglecting subtleties of the geometry near the mouthpiece of the trumpet may be
an explanation for the observed amplitude discrepancies in our simulation results.
In reality, the tube of the trumpet near the mouthpiece does not maintain constant
radius. The radius of the trumpet bore from the mouthpiece slowly increases for
approximately 22 cm. The tubing then remains roughly at a constant radius until the
bore begins to widen at 102 cm from the mouthpiece. Furthermore, the geometry
of the trumpet mouthpiece itself is also quite complex and varies in shape and
dynamics for each unique mouthpiece model. We tried to avoid some of these
potential effects by measuring the sound pressure waveforms at the shank of the
mouthpiece. However, the mouthpiece throat’s radius is approximately 0.4 the
shank’s radius; and the radius of the trumpet bore at 20 cm from the shank is
approximately 1.42 the shank’s radius. It is thus possible that neglecting these
geometric attributes of the trumpet may cause an overestimation in the simulated
amplitude.
We are currently investigating how the geometry of the bore between the
mouthpiece and the first bend of the trumpet influences the wave propagation being
modelled. We speculate that in addition to the geometric shape of the tube near
A Comparison Between 2D and 3D Simulations of Finite Amplitude Waves in. . . 491
the mouthpiece, the rate at which the radius increases may be important to consider.
Just as the rapid flare of the trumpet influences the wave propagation, specifically the
harmonic reflections, we hypothesize that the increase in radius at the mouthpiece
may have a similar effect. We are also currently studying the influence of such
reflections near the mouthpiece.
5 Conclusion
Fig. 9 Numerical and experimental results for the Bb3 and Bb4
492 J. Resch et al.
References
1. Benade, A.H.: Fundamentals of Musical Acoustics. Dover Publications, New York (1900)
2. Flaherty, J.E., Krivodonova, L., Remacle, J.F., Shephard, M.S.: Some aspects of discontinuous
Galerkin methods for hyperbolic conservation laws. J. Finite Elem. Anal. Des. 38, 889–908
(2002)
3. Hirschberg, A.J., Gilbert, J., Msallam, R., Wijnands, A.P.J.: Shock waves in trombones. J.
Acoust. Soc. Am. 99, 1754–1758 (1995)
4. Kausel, W., Moore, T.: Influence of wall vibrations on the sound of brass wind instruments. J.
Acoust. Soc. Am. 128, 3161–3174 (2010)
5. Resch, J., Krivodonova, L., Vanderkooy, J.: A two-dimensional study of finite amplitude sound
waves in a trumpet using the discontinuous Galerkin method. J. Comput. Acous. (2012).
doi:10.1142/S0218396X14500076
A Dual-Rotor Horizontal Axis Wind Turbine
In-House Code (DR_HAWT)
Abstract This paper describes the DR_HAWT (Dual-Rotor Horizontal Axis Wind
Turbine) in-house code developed by the present authors, the National Renew-
able Energy Laboratory (NREL) Phase VI validation test case, and a dual-rotor
configuration simulation. DR_HAWT uses a combination of the Blade Element
Momentum theory (BEM) and the vortex filament method to accurately predict
the aerodynamic performance of horizontal axis wind turbines for a single or dual-
rotor configuration. Using two-dimensional (2D) airfoil coefficients obtained from
XFOIL, the aerodynamic power prediction produced by DR_HAWT resulted in an
average error of less than 20 % when compared to the NREL Phase VI experiment.
Upon correcting the 2D wind tunnel aerodynamic coefficient data for 3D flow
effects, good agreement was obtained with the exception of the deep-stall region.
In addition, a dual-rotor test case consisting of a combination of a half-scaled and
full-sized NREL Phase VI rotor, is presented. The dual-rotor configuration resulted
in a 16 % average increase in power generation as compared to the full-sized rotor
alone.
1 Introduction
With recent advancements in wind energy technology, and the increase in oil prices,
wind energy is now considered to be a favourable green-energy alternative [1]. In an
attempt to maximize energy extraction while minimizing costs, a Contra-Rotating
Dual-Rotor Horizontal Axis Wind Turbine configuration has been proposed. It is
hypothesized that by having both an upwind rotor and a downwind rotor, more
power can be produced on a single wind turbine tower.
2 Methodology
The well documented BEM theory [1] is a combination of Blade Element theory and
the Momentum theory. The wind turbine blade is discretized into elements along the
blade span, where geometric data are known. At a specified Reynolds number (Re),
velocity and angle of attack (AOA), the coefficient of lift and drag (CL and CD ,
respectively) can be obtained from look-up tables for each specific airfoil. Using
the aerodynamic coefficients, the tangential and normal forces acting on the blade
elements can be determined. These forces can then be integrated along the span of
the blade to determine the rotor torque, thrust and power.
The wake of the wind turbine is commonly accounted for in the BEM method
by induction factors. Due to the extraction of energy from the wind flow, these
Dual-Rotor Horizontal Axis Wind Turbine Code (DR_HAWT) 495
induction factors decrease the velocity of the flow in the axial and tangential
direction by means of a semi-empirical model. The BEM method, combined
with various other correction factors such as Prandtl’s tip loss factor, provides
an adequate aerodynamic prediction of single rotor configuration of HAWT [1].
However, for a dual-rotor configuration, where the influence of the upwind and
downwind rotor wake is an intrinsic aspect of the aerodynamic performance
prediction, a better means of representing the wake is necessary.
the lift and drag coefficients are linearly interpolated from look-up tables consisting
of experimental or numerical airfoil aerodynamic data.
Based on the Lifting Line Theory, each blade element is associated with a bound
vortex filament of strength,
B . This strength can be expressed using the Kutta-
Joukowski theorem as follows:
1
B D CL cjVrel j (1)
2
The bound vortex strength is a function of the CL , the chord length (c) and the
magnitude of the relative velocity. Since the relative velocity takes into account the
induced velocity, a predictor-corrector method is employed for which the bound
vortex strength is predicted based on the previous time step induced velocities.
The predicted strength is then used to correct the induced velocities which in turn
corrects the bound vortex strength. This process is repeated until the differences
between the predicted and corrected values are below 1 103 . Once the bound
vorticity and the induced velocities have been corrected, the strength of the vortices
that constitute the wake can be computed.
Figure 3 illustrates the representation of blade elements with the wake which is
made up of vortex filaments. For a time step NT, the bound vortex strength of an
element i is written as
NT i
. As the blade rotates, vortices are shed in the form of
spanwise and trailing vortex filaments parallel to the span and chord of the blade
respectively. The strength of these vortex filaments are calculated based on Kelvin’s
Theorem for which any change in the bound vortex strength over time must be
accompanied by an equal and opposite vortex strength in the wake. This forms the
spanwise vortices (bold lines) whereas the trailing vortices (thin lines) result from
the spanwise variation in bound vortex strength. The tip vortex is assumed to have
the same magnitude and opposite direction as the bound vortex closest to the tip.
Each vortex filament in the wake convects with a local velocity. As the vortex
filament first leaves the blade, its initial velocity is assumed to be equal to the sum
of the induced velocities at the blade element end and the oncoming freestream
Dual-Rotor Horizontal Axis Wind Turbine Code (DR_HAWT) 497
velocity. In order to calculate the distance travelled by any vortex filament in the
wake for a given time step, a second order Adams-Bashforth explicit integration
formula is used. Knowing the strength and position of the shed vortices, the induced
velocity at any point can be calculated using the Biot-Savart Law given by:
Z
r dl
Vind D (2)
4 l jrj3
where r is the position vector from the point of interest in the fluid domain to the
incremental length (dl) along the vortex filament. The total perturbation velocity
induced by all the vortex filaments represents the effect of the wake on the blades.
In order to calculate the torque, thrust and power generated by the blades, the normal
and tangential forces are integrated along the span of the blade by assuming linear
variation along each element [1]. Finally, the aerodynamic power produced by the
wind turbine is the product of the rotational velocity and the total torque of the rotor.
This study uses the 2D (non-rotating) airfoil coefficient data (CL and CD ) obtained
either by using experimental wind tunnel data, acquired from Ref. [4] or XFOIL
which numerically calculates the lift and drag coefficients for a given airfoil profile
based on pressure distributions obtained using a panel-method [5]. For comparison
purposes, the same numeric values of Reynolds numbers are used in both cases
for the aerodynamic coefficient input files. In addition, the experimental data was
corrected to obtain a better understanding of 3D flow effects due to rotation.
In an attempt to model these 3D effects, several numerical correction factors
have been formulated by the likes of Du and Selig [6], Snel et al. [7], Bak et al. [8],
Lindenburg [9], and more. These various models all simply correct the 2D CL and
498 K. Lee Slew et al.
where f is the correction factor which in all cases is a function of at least the chord
to radial (c=r) location ratio.
CL and
CD is the difference between the 2D CL and
CD wind tunnel data and the 2D CL and CD if hypothetically the flow remained
attached at all AOA. Some 3D correction formulations, such as that of Du and
Selig, have empirical correction factors which are built into f . The fine tuning of
the 3D corrections is only viable when experimental 3D data, like the data obtained
from the NREL experiment, is available. Obtaining a suitable universal empirical
correction factor for the 3D corrections should be performed by simulating several
different experiments.
The 3D correction factors of Snel et al. and Du and Selig were implemented in
DR_HAWT for AOA up to 30ı , at which point the corrected values linearly decay
to the 2D value at 55ı as per Ref. [10]. Figure 4 illustrates an example of the Snel
et al. 3D corrections applied to the CL of the S809 airfoil at a Reynolds number
of 6:5 105 . It should be noted that the Snel et al. correction only corrects the CL
whereas Du and Selig corrects both the CL and CD .
Fig. 4 CL curves obtained by XFOIL, 2D wind tunnel data and 3D corrections (Snel et al.) for a
given Reynolds number
Dual-Rotor Horizontal Axis Wind Turbine Code (DR_HAWT) 499
error below 20 % when compared with the experimental data, which is within
the measurement error bars [11]. With the 2D wind tunnel data, however, large
differences in excess of 100 % were obtained in the stall region (10–25 m/s).
The large variation in aerodynamic power curves indicate that the input aero-
dynamic coefficient is an influencing factor in the output results produced by
DR_HAWT. As seen in Fig. 5, this mainly affects the outcome in the stall region
(10–25 m/s) where separation and 3D flow effects are present on the blade.
Due to the rotational nature of the wind turbine, the flow over the wind turbine
blade is not 2D but it is in fact 3D which has been found to delay stall. The pressure
gradient due to rotation of the blade invokes flow in the radial direction which alters
the boundary layer, hence resulting in higher lift and lower drag values. For this
reason, wind turbines generally will obtain higher power values than predicted when
using 2D wind tunnel airfoil data alone [10]. Although closer to the experimentally
obtained aerodynamic power, particularly in the pre-stall (below 7 m/s) and stall
regimes (7–15 m/s), the 3D corrections still do not produce favourable results when
deep-stall is prominent (above 15 m/s). According to Vermeer et al., the use of 3D
corrections at high wind velocity is questionable [12].
No matter if XFOIL, 2D wind tunnel or 3D corrected aerodynamic coefficient
data is used for the simulations, an over prediction in power up to 7 m/s wind
speeds can be observed. The consistency in power values obtained by the various
simulations is due to the fact that the majority of the blade is in the linear, pre-
stall, region of the lift and drag coefficient curves. As illustrated in Fig. 4, this
linear region does not vary substantially between the different methods of obtaining
the aerodynamic airfoil data since the flow is attached. DR_HAWT was found to
consistently over predict the tangential force compared to experimental values [11].
Under the assumption that the CL and CD are not contributing factors in the pre-
stall region, this discrepancy must result from an inaccuracy in the method used
to determine the AOA. The challenge of predicting the AOA was also identified
by Lindenburg [10], Sant et al. [13] and Jonkman [14] suggesting that further
investigation into the methods used by DR_HAWT is required.
4 Dual-Rotor Configuration
In order to examine the effects of adding a second rotor to the HAWT, a half-
sized, geometrically scaled NREL Phase VI rotor and an unmodified NREL UAE
Phase VI rotor were simulated in the upwind and downwind positions, respectively.
The upwind rotor had a rotational velocity twice that of the unmodified rotor in
order to maintain similar tip speeds. The rotors were separated coaxially by half the
diameter of the unmodified rotor. The contra-rotating dual-rotor configuration was
simulated using XFOIL 2D data for wind speeds ranging from 5 to 25 m/s. As can
be seen in Fig. 6, the addition of the upwind rotor resulted in an average increase
in power of 16 % over the single rotor configuration. The power generated by the
dual-rotor configuration is lower than that of the combined individual single rotors
Dual-Rotor Horizontal Axis Wind Turbine Code (DR_HAWT) 501
by approximately 6 %. This is as expected since the presence of the wake from one
rotor onto another is typically detrimental to their performance. A visualization of
the dual-rotor configuration post-processed in ParaView [15] can be seen in Fig. 7.
Fig. 7 Wake visualization of a dual-rotor configuration where the dots represent the end points of
a vortex filament
502 K. Lee Slew et al.
5 Conclusion
An in-house code, named DR_HAWT was created by the present authors for the
aerodynamic performance prediction of a single or dual-rotor HAWT configuration.
Converged values of aerodynamic loads are obtained within approximately 60 min.
DR_HAWT was validated against the NREL UAE Phase VI experiment with
relatively good agreement. Power predicted by DR_HAWT using numerically
obtained data from XFOIL, fell within the experimental error bars and had an overall
error of less than 20 %. This adequate aerodynamic performance prediction and fast
computational run times facilitate parametric studies of a single or dual-rotor HAWT
configuration.
Further analyses revealed that the input lift and drag coefficient data have a large
influence on the predicted aerodynamic forces. 3D flow effects were found to have
a profound significance particularly in the stall region. 3D corrections formulated
by Snel et al. and Du and Selig were applied to 2D coefficient data and found to
show improvement with the exception of the deep stall region (above 15 m/s). A
contra-rotating dual-rotor HAWT configuration based on the NREL Phase VI rotor,
was found to produce 16 % more power than the single NREL Phase VI rotor alone,
demonstrating the potential benefits of a dual-rotor wind turbine configuration.
Acknowledgements The authors would like to thank NSERC (National Sciences and Engineering
Research Council of Canada) and OCE (Ontario Centres of Excellence) for the financial support
as well as Scott Schreck of the National Renewable Energy Laboratory for providing experimental
data for validation purposes.
References
10. Lindenburg, C.: Investigation into Rotor Blade Aerodynamics: Analysis of the Stationary
Measurements on the UAE Phase-VI Rotor in the NASA-Ames Wind Tunnel. Energy research
Centre of the Netherlands, Petten (2003)
11. Schreck, S.: Sequence S Data. National Renewable Energy Laboratory via Private Communi-
cations, Golden (2015)
12. Vermeer, L., Sørensen, J., Crespo, A.: Wind Turbine Wake Aerodynamics. Prog. Aerosp. Sci.
39, 467–510 (2003)
13. Sant, T., van Kuik, G., van Bussel, G.: Estimating the Unsteady Angle of Attack from Blade
Pressure Measurements on the NREL Phase VI Rotor in Yaw using a Free Wake Vortex Model.
In: 44th AIAA Aerospace Sciences Meeting and Exhibition, Reno (2006)
14. Jonkman, J.: Modeling of the UAE Wind Turbine for Refinement of FAST_AD. National
Renewable Energy Laboratory, Golden (2003)
15. Ayachit, U.: The ParaView Guide: A Parallel Visualization Application. Kitware, Inc., Clifton
Park, NY (2015)
Numerical Study of the Installed Controlled
Diffusion Airfoil at Transitional Reynolds
Number
Hao Wu, Paul Laffay, Alexandre Idier, Prateek Jaiswal, Marlène Sanjosé,
and Stéphane Moreau
1 Introduction
methods have become an important complementary part aside from the experimental
methods. In practice however, simplified flow configurations are often employed
in simulations whereas most trailing-edge aeroacoustics experiments have been
conducted in open-jet wind-tunnel facilities, where the airfoil is immersed in a jet
downstream of the nozzle exit. It has been seen that the proximity of the airfoil
to the jet nozzle exit and the limited jet width relative to the airfoil thickness
and chord length can cause the airfoil loading and flow characteristics to deviate
significantly from those measured in free air and hence, alter the radiated noise
field [3]. Installation effects thus take place for different jet configurations and
require simulations to model it.
As aerodynamics has direct influence on aeroacoustics, the present work aims at
presenting and quantifying the installation effects as well as studying the influence
of different turbulent models on such flow case simulation. Experimental and
numerical setups are firstly introduced with associated technical methods. Results
on a systematic CFD study, based on Reynolds-Averaged Navier-Stokes (RANS)
are then presented and are compared with flows data over the Controlled Diffusion
(CD) airfoil (a cambered airfoil originally developed at Valeo Motors and Actuators)
installed in the anechoic wind tunnels of Ecole Centrale Lyon (ECL) and of
Université de Sherbrooke (UdS). The evaluation of different turbulence models and
installation effects observed in simulations will be discussed. The results give a
synthesis of the previous RANS study and provide guidance for the appropriate
initial field needed in future direct numerical simulation (DNS) studies [4, 5].
2 Experimental Setup
All the measurements were done in an open-jet anechoic wind tunnel shown in
Fig. 1a. The airfoil mock-up (Fig. 1b) is held between two side plates in a 30
30 cm2 test section, to keep the flow two-dimensional. This setup is very similar to
that used in [3, 6] at ECL, of which, the jet nozzle dimension is 50 25 cm2 . The
self-noise is the noise radiated by the turbulent eddies coming from the turbulent
boundary layer. The setup should be free of any additional noise source that would
make the self-noise. In particular, very low turbulence intensity is achieved by a
very high convergent ratio of about 1:25. The measured turbulence intensity is 0.3–
0.4 %. The wind tunnel is also acoustically treated to achieve low background noise.
According to the above mentioned criteria, it becomes clear that open-jet anechoic
wind tunnel is best suited for the study of airfoil self-noise [7]. The hot wire and
PIV measurements have been performed in the wake and pressure sensor probes on
the airfoil to detect airfoil loading, as described below.
Numerical Study of CD Airfoil at Transitional Re Number 507
Fig. 1 (a) Front view of the CD airfoil in the anechoic wind tunnel and (b) Close side-view
The mean wall pressure on the CD airfoil was measured using a Baratron capaci-
tance manometer which is connected to a pin hole on the surface of the airfoil using
a capillary tube. There are in total 21 probes, 18 of them are placed in streamwise
direction and rest 3 in spanwise direction. All the streamwise probes are placed at
the mockup mid-span as shown in Fig. 1b.
The streamwise velocity in the wake was obtained using a TSI 1210-T1.5 single
hot-wire probe The length of the probe is 1.27 mm and a diameter of 3:8 m. The
displacement of the hot wire in the wake was realized using a Superior Electric
M062-FD03 Slo-Syn Stepping Motor. The minimum displacement of the hot wire
(the highest spatial resolution) in the near wake was 0.05 mm. The hot-wire probe
is connected to a Constant Temperature Anemometer System IFA 300. The data
acquisition was achieved using a National Instrument BNC 2090 system controlled
with Labview at the sampling frequency of 20 kHz. The relative measurement error
was calculated taking into account parameters listed in [8]. It was found to equal to
2.215 %.
Planar PIV (Particle Image Velocimetry) measurements have been performed
using a single LaVision sCMOS 5.5 megapixel camera with a pixel pitch of 6.5 m
and a Evergreen 70 mj ND:YAG laser [9]. The laser-sheet thickness was measured
to be about 2 mm. 700 images in double frame were recorded using sCMOS
camera fitted with Nikon 50 mm lens at an acquisition rate of 15 Hz. The image
508 H. Wu et al.
magnification was about 0.07. The particle image diameter and depth of field were
adjusted using lens aperture [9], chosen to be 11 for the current experiments.
This is done so that particle image diameter is greater than 2 pixels (calculated
by neglecting any lens aberrations). At this image diameter under sampling of
particle image which can cause peak locking can be avoided [10]. The depth of field
calculated was about 60 mm, which is much larger than the measured laser sheet
thickness so all the particles can be assumed in focus. Time between frames was
selected based on many considerations like minimization of loss-of-pair due out of
plane motion, truncation error due to constant velocity assumption of the particle
between the two frames and minimization of relative error on the displacement
estimate[11]. Finally it must be remembered that the dynamic velocity range of
PIV increases with time separation between the two frames [12]. Taking all these
considerations into effect, time between two frames was chosen to be about 45 s.
The free stream displacement particle between the two frames was measured to
be roughly about 7.5 pixels in the object plane. Taking the smallest resolvable
displacement fluctuation to be 0.1 pixel, the dynamic velocity range was calculated
to be about 75 [9]. The seeding density during the experiments was kept at about
0.055 ppp to ensure a more that 10 particles were present for the final interrogation
domain for a better signal-to-noise ratio in cross correlation [13]. The parameters
used for PIV measurements are summarized below in Table 1. All the results were
processed using DAVIS 8 software. To improve the accuracy in peak fitting and
sub-pixel accuracy, normalized cross correlation option in DAVIS 8 was selected
for the calculation of cross correlation. The final interrogation window size was
kept at 16 16 pixel with a 50 % overlap. An adaptive window shape was selected
for image cross correlation to take into account the effect of shear in the near
wake. The error analysis in PIV is a topic of active research and depends upon
many factors. In absence of detailed error analysis the value of error was chosen
to be equal to 0.1 pixel which corresponds to a typical error in measurement of
displacement in PIV [9]. On the other hand typical error on pulse separation has
an order of magnitude in nanoseconds while time between frames is in the order
3 Numerical Setup
The flow conditions for CD airfoil are a freestream velocity U0 of 16 m/s measured
at the wind tunnel nozzle exit away from the airfoil. The Mach number is 0.05 and
the Reynolds number is 1:5 105 based on the airfoil chord length c D 0:1356 m.
The flow is therefore turbulent or transitional. To model the turbulence in RANS
simulations, 4 turbulence models are tested: k (standard and with low Reynolds
number correction), k! SST, and tr k kl !. As the RANS results will
serve as the initialization field for future DNS study, the transitional model tr
k kl w is chosen for its capacity to capture transition process in the simulation.
Air is supposed to be an incompressible perfect gas. The geometric angle of attack
with respect to the wind tunnel axis is 8ı . To evaluate the airfoil loading and the
installation effects, the pressure coefficient Cp and the friction coefficient Cf are
introduced as shown respectively in Eq. (1),
Ps P0 n
Cp D 1 2
and Cf D 1 2
(1)
2 0 U0
2 0 U0
where Ps stands for the static pressure, n for the local wall-shear stress and all
the parameters with the sub-index 0 correspond to the reference values in this flow
case. The values of the results shown afterwards in the section Results are non-
dimensionalized based on c and U0 .
To introduce the installation effects, the simulation domain includes the complete
nozzle geometry to assess the effect of the interaction between the jet shear layer
and the airfoil (Fig. 2). A 2D domain which represents the mid-section of the
Experimental Setup is generated by Centaur. Hybrid grids with a total 69,000 cells
are employed to get a balance between simulation accuracy and computational cost
according to what was reported in previous simulations [3] Quadrilaterals are used
to refine the grid close to the walls in order to capture the boundary layer around
the airfoil and the shear layer effect of the wind tunnel exit as shown in Fig. 2b,
c. The dimensionless wall-normal grid spacing in wall units
yC is smaller than
1 over most of the chord length on both pressure and suction sides. The mesh for
510 H. Wu et al.
Fig. 2 Hybrid mesh (a); Zoom view of airfoil trainling-edge and nozzle exit (b) (c)
ECL installation is generated using the same methodology as in Fig. 2. The RANS
simulations are performed using ANSYS FLUENT-15. The pressure-based solver
provides two types of pressure-velocity coupling algorithms: either in a segregated
manner (SIMPLE) or in a coupled manner (Coupled). The results demonstrate
no difference in the wake velocity profiles or loading of the airfoil. The Coupled
scheme takes 2
3 times longer than SIMPLE. In the present paper, calculations
presented are performed using the SIMPLE scheme only.
4 Results
All models are able to establish a converged wake zone except for the tr k kl !
model as shown in Fig. 3. Even from the established field obtained with the k!SST
model that can be seen as a reference from previous studies[3], the scaled residuals
of the tr k kl ! model oscillate around much higher levels, two orders of
magnitude higher than other models. With regards to turbulence, the k over-
predicts the turbulence kinetic energy (TKE) (Fig. 3). By using damping functions,
the k model with low Reynolds-number correction has been implemented in
ANSYS Fluent and shows better behaviour than the standard k model. Yet it
Numerical Study of CD Airfoil at Transitional Re Number 511
still over-predicts the turbulence over the whole profile. The k! SST model only
sees the transition process to turbulence close to the trailing edge. The tr k
kl ! has unphysical boundary-layer development at the TE which is caused by
high numerical instabilities. To make a fair comparison, the simulations for tr
k kl ! have then been conducted in a URANS (Unsteady Reynolds Averaged
Navier-Stokes) mode and then averaged to get a steady solution.
-Cp 0
k-ε
k-ε Low-Re
kω-SST
tr-k-kl-ω (RANS)
tr-k-kl-ω (URANS)
exp
-1
-1 -0.8 -0.6 -0.4 -0.2 0
x/c
Fig. 4 Comparison of mean wall-pressure coefficient
boundary layer that have been identified as the precursors to transition [14]. As the
numerical transitional process at UdS appears around TE, this model has shown its
advantage on capturing such fluctuations compared with other tested models. The
unsteadiness appearing in the tr k kl ! RANS simulation at the TE can be
potentially verified in the future by measurements of wall-pressure fluctuations.
The wake velocity profile is a consequence of the transition process on the airfoil.
Here the velocity magnitude from different models are compared with both hot-wire
and PIV measurements in Fig. 5. Simulation results tend to over-predict the velocity
deficit at all measuring positions but are consistent with their respective production
of turbulence. Some of the discrepancies can be attributed to the isotropic hypothesis
on calculating the turbulence kinetic energy made in the RANS simulation. The k
with low Reynolds number correction model improves the result from the standard
k model by nearly 10 %. Yet, the k!SST model shows better overall comparison
with the experimental data.
In summary, for RANS simulations of such a flow case, the tr k kl !
model must be run in an unsteady mode and its mean solution is similar to that
of the k! SST model with an airfoil loading even slightly better compared
with experiment. The k! SST model provides the best overall prediction among
the tested models considering its reasonable computational time. It is thus used
as a reference model for future comparisons. By using damping functions, the
Numerical Study of CD Airfoil at Transitional Re Number 513
(a) k-ε
(b) (c)
k-ε Low-Re
kω-SST
0.1 tr-k-kl-ω (RANS) 0
tr-k-kl-ω (URANS)
HW
PIV
0
-0.1
-0.1 -0.2
0.5 1 0.5 1 0.5 1
0.1 0
-0.1
-0.1 -0.2
0 0.02 0.04 0.06 0.08 0 0.01 0.02 0.03 0.04 0.05 0 0.005 0.01 0.015 0.02 0.025 0.03
2
2 2
k/U0 k/U0 k/U0
Fig. 5 Wake velocity and TKE profiles. (a) x=c D 0:07. (b) x=c D 0:22. (c) x=c D 0:44
As firstly mentioned by Moreau et al. [3], installation effects are significant between
an isolated airfoil case and one that is installed in an open-jet wind tunnel. In this
paper, the effects of nozzle jet width is specifically investigated by comparing results
in two different setups at ECL and UdS respectively.
The loading of the airfoil is changed as can be seen from the wall pressure
coefficient in Fig. 7. This is mostly caused by a different transition process. At
ECL, a separation bubble turns the laminar boundary layer into a turbulent one
at the leading edge, which is hardly the case in the UdS set-up for which, the
transition process is less severe. Indeed Fig. 6 shows that the friction coefficient
Cf is barely negative in the UdeS case and the laminar recirculation bubble is hardly
formed. Because of the more limited nozzle jet width at UdS, the boundary layer
514 H. Wu et al.
0.2
RANS-UdS
RANS-ECL
Leading-edge area
0.15 0.03
0.02
0.1
Cf 0.01
0
0.05
-0.01
-1 -0.95 -0.9
Fig. 6 Mean friction coefficient: global and zoom in the leading-edge area
2
RANS-UdS
RANS-ECL
Exp-UdS
Exp-ECL
1
-Cp
-1
-1 -0.8 -0.6 -0.4 -0.2 0
x/c
Fig. 7 Mean wall pressure coefficient
at the leading edge develops in a different way as a consequence of the larger flow
confinement. Besides, there is a difference of 15 % on Cp at the TE in Fig. 7 between
the experimental data and the simulation results at UdS as no flow separation is
captured in this simulation. Consequently, the RANS simulations have a hard time
predicting the transition process correctly, and the flow separation either at the
leading edge (laminar recirculation bubble) or at the TE (driven by the adverse
pressure gradient).
Numerical Study of CD Airfoil at Transitional Re Number 515
5 Conclusion
RANS simulations have yielded the transitional flow around a CD airfoil installed
in anechoic wind tunnels for future TE noise study. The results have been system-
atically compared with experimental data. Different turbulence models have been
tested to compare their capacity to capture transitional process. The k! SST
model has a better global behaviour considering the reasonable computational cost
and is thus considered as the reference model for future RANS simulations. The
transitional model trkkl! slightly improves the airfoil mean loading according
to the averaged URANS data. Installation effects for the two setups with different jet
nozzle size have been studied for flow with same inlet condition. In the larger nozzle
case, a laminar recirculation bubble that triggers the boundary layer development
on the suction side is observed while in the other case not. RANS simulations show
limitations in predicting the laminar transition process and flow separations under
adverse pressure gradient.
References
1. Brooks, T.F., Hodgson, T.H.: Trailing edge noise prediction from measured surface pressures.
J. Sound Vib. 78(1), 69–117 (1981)
2. Fink, M.R.: Experimental evaluation of theories for trailing edge and incidence fluctuation
noise. AIAA J. 13(11), 1472–1477 (1975)
3. Moreau, S., Henner, M., Iaccarino, G., Wang, M., Roger, M.: Analysis of flow conditions in
freejet experiments for studying airfoil self-noise. AIAA J. 41(10), 1895–1905 (2003)
4. Wang, M., Moreau, S., Iaccarino, G., Roger, M.: LES prediction of wall-pressure fluctuations
and noise of a low-speed airfoil. Int. J. Aeroacou. 8(3), 177–197 (2009)
5. Winkler, J., Sandberg, R.D., Moreau, S.: Direct numerical simulation of the self-noise radiated
by an airfoil in a narrow stream. In: 18th CEAS/AIAA Aeroacoustics Conference, Colorado
Springs, pp. 2012–2059 (2012)
6. Neal, D.R.: The effects of rotation on the flow field over a controlled-diffusion airfoil. Ph.D.
thesis, Michigan State University (2010)
7. Vathylakis, A., Kim, J.H., Chong, T.P.: Design of a low-noise aeroacoustic wind tunnel facility
at Brunel University. In: 20th AIAA/CEAS Aeroacoustic Conference and Exhibit, Atlanta
(2014)
8. Jorgenson, F.: How to Measure Turbulence with Hot Wire Anemometers. Dantec Dynamics,
Skovlunde (2004)
9. Raffel, M., Willert, C.E., Kompenhans, J.: Particle Image Velocimetry: A Practical Guide.
Springer, Heidelberg/New York (2013)
10. Westerweel, J.: Fundamentals of digital particle image velocimetry. Meas. Sci. Technol. 8(12),
1379 (1997)
11. Adrian, R.J., Westerweel, J.: Particle Image Velocimetry, Number 30. Cambridge University
Press, Cambridge/New York (2011)
12. Adrian, R.J.: Dynamic ranges of velocity and spatial resolution of particle image velocimetry.
Meas. Sci. Technol. 8(12), 1393 (1997)
13. Keane, R.D., Adrian, R.J.: Optimization of particle image velocimeters. I. Double pulsed
systems. Meas. Sci. Technol. 1(11), 1202 (1990)
14. Walters, D.K., Cokljat, D.: A three-equation eddy-viscosity model for Reynolds-averaged
Navier–Stokes simulations of transitional flow. J. Fluids Eng. 130(12), 121401 (2008)
Part IV
Mathematics and Computation in Finance,
Economics, and Social Sciences
Financial Markets in the Context of the General
Theory of Optional Processes
1 Introduction
The assumption that the stochastic basis ˝; F ; F D .F t /t0 ; P satisfy the usual
conditions, where F is complete and right-continuous, is a foundation concept in
the theory of stochastic processes. Stochastic processes that are adapted to this basis
form a large class of processes known as semimartingales whose paths are right-
continuous with left limits (RCLL). This theory has been instrumental in generating
many important results in mathematical finance and in the theory of stochastic
processes. It is difficult to conceive of a theory of stochastic processes without the
usual conditions and RCLL processes.
However, it turns out that it is not difficult to give some examples of stochastic
basis without the usual conditions. In 1975 Dellacherie [4] started to study the theory
of stochastic processes without the assumption of the usual conditions, termed
“unusual conditions”.
Further developments of this theory were carried on by Lepingle [12], Horowitz
[8], Lenglart [11], and mostly by Galtchouk [6, 7].
We believe that the theory optional processes will offer a natural foundation
and a versatile set of tools for modeling financial markets. We can mention here
few research problems that were not treated with the methods of the calculus of
optional processes but possibly should be. The first one, is a recent development
in mathematical finance specially in pricing of derivative contracts and hedging
under transaction costs (see [2] for details) that hints to the needed application of the
calculus of optional processes to price derivatives and hedge under transaction costs.
Furthermore, in models [1] with stochastic dividends paid at random times, there is
an opportunity to treat these problems in the context of optional semimartingale
theory in a natural way. Duffie [5] presented a new approach to modeling term
structures of bonds and contingent claims that are subject to default risk. Perhaps
Duffie’s method could be studied with the methods of optional calculus. The aim of
this paper is to present the theory of optional processes on unusual stochastic basis,
develop new results and bring its methods to mathematical finance. The paper is
organized as follows. Section 2 presents foundation material on optional processes.
Section 3 introduces stochastic exponentials and logarithms. Section 4 describes
optional semimartingale model of a financial market and two methods for finding
local martingale deflators for these markets. Section 5 presents examples of optional
semimartingale markets. Finally, we give some concluding remarks.
2 Foundation
Suppose we are given ˝; F ; F D .F t /t0 ; P , t 2 Œ0; 1/, where F t 2 F; F s
F t ; s t, a complete probability space. It is complete because F contains
all P null sets. But this space is unusual because the family F is not assumed
to be complete, right or left continuous. On this space, we introduce O.F/ and
P.F/ the -algebras of optional and predictable processes, respectively (see [7]).
A random process X D .Xt /, t 2 Œ0; 1/, is said to be optional if it is O.F/-
measurable. In general, optional processes have right and left limits but are not
necessarily continuous. For an optional process we can define the following: (a)
X D .Xt /t0 , a left continuous version of the process X and XC D .XtC /t0 ,
the right continuous version of X; (b) The jump processes 4X D .4Xt /t0 and
4Xt D Xt Xt and (c) 4C X D .4C Xt /t0 , 4C Xt D XtC Xt . A random
process .Xt /; t 2 Œ0; 1/, is predictable if X 2 P.F/ and strongly predictable if
X 2 P.F/ and XC 2 O.F/. We denote by P s .F/ the set of strongly predictable
processes. An optional semimartingale X D .Xt /t0 is an optional process that
can be decomposed to an optional local martingale M 2 M loc and an optional
finite variation processes A 2 V , i.e. X D X0 C M C A, [7]. A semimartingale
X is called special if the above decomposition exists but with A being a strongly
predictable process (A 2 A loc the set of locally integrable finite variation processes
[7]). Let S denote the set of optional semimartingales and S p the set of special
optional semimartingales. If X 2 S p then the semimartingale decomposition
is unique. Using the decomposition optional martingales and of finite variation
processes we can decompose a semimartingale further to X D X0 C X r C X g D
X0 C .Ar C M r / C .Ag C M g / where Ar and Ag are right and left continuous finite
Financial Markets in the context of The General Theory of Optional Processes 521
where Yt is again an optional semimartingale ' 2 P.F/; and 2 O.F/, such that
2 1=2 1=2 Rt
' ŒX r ; X r 2 A loc and 2 ˇ ŒX g ; X g 2 A loc . The integral 0C 's dXsr
is our usual
R t stochastic integral with respect to RCLL semimartingale however the
g
integral 0 s dXsC is Galchuk stochastic integral [7] with respect to left-continuous
semimartingale.
Two useful properties of stochastic exponentials are the inverse and product
formulas. The inverse of stochastic exponential is E 1 .h/ D E .h /, such that,
X .4hs /2 X .4C hs /2
ht D ht hhc ; hc it :
0<st
1 C 4hs 0s<t 1 C 4C hs
It is important to note that the process Y need not be positive for L og.Y/ to exist,
in accordance with the fact that the stochastic exponential E .X/ may take negative
values.
Proof
The assumptions that Y and Y don’t vanish implies that: Sn D
inf t W jYt j 1n " 1, hence 1=Y is locally bounded; likewise, Tn D
inf t W jYt j 1n " 1, hence 1=Y is also locally bounded. Therefore, the stochastic
integral in (2) makes sense. Let YQ D Y=Y0 then YQ 0
D 1. By equation
(2) we have
1 1
that X D .1=Y/ ı Y. Therefore, 1 C Y ı X D 1 C Y ı YQ ı Y D 1 C Y YQ ı YQ D Y,
Q Q Q Q Q Q Q
i.e. YQ D E .X/. Furthermore,
X D
Y=Y ¤ 1 and
C X D
C Y=Y ¤ 1. To
obtain uniqueness let XQ be any other semimartingale satisfying Y D E .X/. Q Since
QY D Y=Y0 then YQ D E .X/. Q Therefore YQ D 1 C YQ ı XQ and Y D Y0 C YQ ı X.Q But since
Q
X0 D 0 we have XQ D YYQ ı XQ D Y1Q ı .Y Y0 / D Y1Q ı Y D X and we obtain uniqueness.
To deduce equation (3) we apply Gal’chuk-Ito’s lemma (see [7]) for the optional
semimartingale log jYj. But the log function explodes at 0. To circumvent this
problem consider for each n the C2 functions fn .x/ D log jxj on R such that
jxj 1=n. Consequently for all n, t < Tn and t < Sn we get log jYt j D log jY0 j C Y1 ı
P
P
C Ys
Yt 2Y1 2 ı hY c ; Y c it C 0<st
log jYs j
Y
Ys
s
C 0s<t
C
log jYs j Ys
.
This result together with equation (2) yields equation (3) for t < Tn and t < Sn .
Since, Tn " 1 and Sn " 1 we obtain equation (3) everywhere.
Now, we present some of the properties of stochastic logarithms.
Lemma 1 (a) If X is a semimartingale satisfying
X ¤ 1 and
C X ¤ 1 then
L og.E .X// D X X0 . (b) If Y is a semimartingale such that Y and Y do not
vanish, then E .L og.Y// D Y=Y0 . (c) For any two optional semimartingales X and
Z we get L og .XZ/ D L ogX C L ogZ C ŒL ogX; L ogZ;
the following identities:
L og X1 D 1 L og .X/ X; X1 :
1 1 1
definition the stochastic logarithm, L og DXı D 1 ı X X; X1 D
X X X
1 L og .X/ X; X1 :
Yt D t C t Rt : (4)
Yt D Y0 C ı Rt . (5)
change the ratio process to some optional local martingales. A special subset of these
martingale deflators can transform RLL optional semimartingales to RCLL local
martingale. This special subset of transforms can be useful in cases where markets
only allow for predictable trading strategies. We will illustrate this procedure in
example Sect. 5.
As in Melnikov et al. [13] for RCLL We suppose that the dynamics of securities
in our market follows the stochastic exponential, Xt D X0 E t .H/ and xt D x0 E t .h/
where x0 and X0 are F 0 -measurable random variables. h D .ht /t0 and H D .Ht /t0
are optional semimartingales admitting the representations, ht D h0 C at C mt and
Ht D H0 C At C Mt with respect to (w.r.t) P. a D .at /t0 and A D .At /t0 are
locally bounded variation processes and predictable. m D .mt /t0 and M D .Mt /t0
are optional local martingales. A local martingale deflator is a strictly positive
supermartingale multiplier used in mathematical finance to transform the value
process of a portfolio to a supermartingale (i.e. a local martingale). Here we will
develop methods for finding local martingale deflators. We can write R as,
Xt
Rt D D R0 E .H/t E 1 .h/t D R0 E .Ht /E .ht / D R0 E . .ht ; Ht //; (6)
xt
t D .ht ; Ht / D Ht ht ŒH; h t D Ht ht C hhc ; hc H c it C J d C J g ;
X 4hs.4hs 4Hs / X 4 C h s 4 C h s 4 C Hs
d
J D ; J Dg
:
0<st
1 C 4hs 0s<t
1 C 4C hs
Proof Suppose Zt D E .N/t 2 M loc , Zt > 0 for all t such that ZR 2 M loc thenZR D
R0 E .N/E . .h; H// D R0 E . .h; H; N//, where .h; H; N/ D Nt C Ht ht C
g
hhc ; hc H c it C Jtd C Jt C ŒN; H ŒN; h C ŒN; J d C ŒN; J g , hence,
g
.h; H; N/ D Nt C Ht ht C hhc ; hc H c it C Jtd C Jt
X X
C hN c ; H c it C 4Ns 4Hs C 4C Ns 4C Hs
0<st 0s<t
Financial Markets in the context of The General Theory of Optional Processes 525
X X
hN c ; hc it 4Ns 4hs 4C Ns 4C hs
0<st 0s<t
X 4hs .4hs 4Hs /
C 4Ns
0<st
1 C 4hs
X 4 C h s 4 C h s 4 C Hs
C
C 4 Ns :
0s<t
1 C 4C hs
1:
Corollary 1 Suppose that R and R don’t vanish then L og.ZR/ 2 M loc , ZR 2
M loc .
5 Illustrative Examples
constants. W is diffusion term and L and LN are Poisson with constant intensity and
respectively. Let F t be the natural filtration that is neither right or left continuous.
Here the bond is modeled by a left continuous process for which we have assumed
that its jumps don’t necessarily avoid the jumps of the asset (see also [5] for bonds
that can experience defaults). We believe our model gives a better description of a
portfolio of stocks and bonds than models that assume RCLL processes on usual
probability space.
Given x and X the ratio process is Rt D Xx00 E .Ht ht ŒH; h t /. We want to find
Z D E .N/ such that ZR is a local martingale. In Sect. 4 we showed that associated
with the product ZR D Xx00 E . .h; H; N// is the process .h; H; N/. To compute a
g
reasonable form for .h; H; N/ we suppose that Nt D &Wt C cLdt C Lt an optional
local martingale for which Z an optional local martingale deflator, hence
g g
.h; H; N/ D & Wt C cLdt C Lt C t C Wt C aLdt rt C bLt
˝ g c g c g c c ˛
C rt C bLt & Wt C cLdt C Lt ; rt C bLt t C Wt C aLdt
X 2 X b .b / 4C Lgs 2
C ac 4Lds C g
0<st 0s<t
1 C b4C Ls
g
D . r C & / t C .& C / Wt C .c C a/ Ldt C . b/ Lt C acLt
Financial Markets in the context of The General Theory of Optional Processes 527
g g g
C .b / Lt C b . b/ Lt ; Lt
D . r C & / t C .& C / Wt C .c C a/ Ldt C acLt C b . b/ LN t :
6 Conclusion
to find local martingale deflators for this market. The second examples demostrates
a method for finding a subset of local martingale deflators that transforms a ladlag
semimartingale to cadlag local optional martingale.
References
1. Albrecher, H., Bauerle, N., Thonhauser, S.: Optimal dividend-payout in random discrete time.
Stat. Risk Model. Appl. Financ. Insur. 28(3), 251–276 (2011)
2. Czichowsky, C., Schachermayer, W.: Duality theory for portfolio optimisation under transac-
tion costs. arXiv:1408.5989 [q-fin.MF] (2014)
3. Davis, M.H., Panas, V.G., Zariphopoulou, T.: European option pricing with transaction costs.
SIAM J. Control Optim. 31(2), 470–493 (1993)
4. Dellacherie, C.: Deux remarques sur la separabilite optionelle. Sem. Probabilites XI Univ.
Strasbourg, Lecture Notes in Mathematics, vol. 581, pp. 47–50. Springer, Berlin (1977)
5. Duffie, D., Singleton, K.J.: Modeling term structures of defaultable bonds. Rev. Financ. stud.
12(4), 687–720 (1999)
6. Gal’chuk, L.I.: Optional martingales. Matem. Sb. 4(8), 483–521 (1980)
7. Gal’chuk, L.I.: Stochastic integrals with respect to optional semimartingales and random
measures. Theory Probab. Appl. XXIX(1), 93–108 (1985)
8. Horowitz, J.: Optional supermartingales and the Andersen-Jessen theorem. Z. Wahrschein-
lichkeitstheorie und Verw Gebiete. 43(3), 263–272 (1978)
9. Karatzas, I., Zitkovic, G.: Optimal consumption from investment and random endowment in
incomplete semimartingale markets. Ann. Probab. 31(4), 1821–1858 (2003)
10. Kramkov, D.O.: Optional decomposition of supermartingales and hedging contingent claims
in incomplete security markets. Probab. Theory Relat. Fields 105, 459–479 (1994)
11. Lenglart, E.: Tribus de Meyer et théorie des processus. Lecture Notes in Mathematics, vol. 784,
pp. 500–546. Springer, Berlin/New York (1980)
12. Lepingle, D.: Sur la représentation des sa uts des martingales. Lectures Notes on Mathematics,
vol. 581, pp. 418–434. Springer, Berlin/New York (1977)
13. Melnikov, A.V., Volkov, S.N., Nechaev M.L.: Mathematics of Financial Obligations. Trans-
lations of Mathematical Monographs, vol. 212. American Mathematical Society, Providence
(2002)
14. Mostovyi, O.: Optimal investment with intermediate consumption and random endowment.
Math. Financ. (2014). Published on-line
15. Mostovyi, O.: Necessary and sufficient conditions in the problem of optimal investment with
intermediate consumption. Financ. Stoch. 19(1), 135–159 (2015)
16. Wenshen, X., Ling, Z., Zhin, W.: An option pricing problem with the underlying stock paying
dividend. Appl. Math. JCU 12(B), 447–454 (1997)
17. Zitkovic, G.: Utility maximization with a stochastic clock and an unbounded random endow-
ment. Ann. Appl. Probab. 15(1B), 748–777 (2005)
A Sufficient Condition for Continuous-Time
Finite Skip-Free Markov Chains to Have Real
Eigenvalues
1 Introduction
In what follows, we assume that X is conservative (i.e. the equality in (1) holds) and
G. j; j/ < 1 for j 2 E. We refer the interested readers to Asmussen [1], Norris [8]
for a general reference in continuous-time Markov chains.
The spectrum of a skip-free Markov chain plays an important role in the study of
upward hitting time as well as the fastest strong stationary time, see e.g. Diaconis
and Fill [3] and Fill [4]. It is shown in Fill [4] that if the eigenvalues of G are all
real and non-negative, then the law of the upward hitting time can be interpreted
as a convolution of exponential random variables with parameters given by the
aforementioned eigenvalues. However, it is not known under which condition(s)
do a skip-free Markov chain admit real and non-negative spectrum. We aim to fill
in this gap in the literature by providing a sufficient condition. The main idea is to
develop a similarity transformation of G with its so-called Siegmund dual GO which
is the generator of a birth-and-death process.
The rest of the paper is organized as follow. We review Siegmund duality and
the concept of stochastic monotonicity in Sect. 2. They serve as important tools for
our main result, which is presented in Sect. 3. Finally, we provide a sample path
illustration in Sect. 4.
Siegmund duality of Markov processes was first introduced by Siegmund [9], which
was further developed and applied by Diaconis and Fill [3], Huillet and Martinez [5],
Jansen and Kurt [6].
Definition 1 (Siegmund kernel) The Siegmund kernel HS D .HS .i; j//i;j2E is
defined to be
HS .i; j/ WD 1fijg ;
Definition 2 (Siegmund dual) We say that GO is the Siegmund dual (or HS -dual) of
G if GO is an infinitesimal generator such that
X X
G.h; k/ G.i; k/ ; 0 l < h i: (3)
kl kl
3 Main Result
O a/ for
where 0 is a column vector of zero, and h is a column vector storing G.i;
i 2 Œ0; a 1. Since GO is a similarity transformation of G, they share the same
eigenvalues. In addition, we observe from (6) that the eigenvalues of G are 0 and
that of GO BD . Now, for i 2 Œ0; a 1, let
BD .0/ D c > 0 ;
GO BD .0; 1/ : : : GO BD .i 1; i/
BD .i/ D BD .0/ ;
GO BD .i; i 1/ : : : GO BD .1; 0/
then BD .i/GO BD .i; j/ D BD . j/GO BD . j; i/ on Enfag, where both sides are non-zero
only when ji jj 1. Define on Enfag
1=2 1=2
If D is a diagonal matrix with D BD .i; i/ D BD .i/, then A D D BD GO BD D BD .
Since GO BD is reversible, A is symmetric, and the spectral theorem for symmetric
matrices tells us that A has real eigenvalues. As a result, GO BD has real eigenvalues,
and hence G has real eigenvalues.
We will now show that G has distinct and non-positive eigenvalues. Since GO is
the infinitesimal generator of a finite Markov chain, GO is uniformizable. Let b WD
O i/ < 1. Then PO WD I C 1 GO is a stochastic matrix of a discrete time
maxi2E G.i; b
upward skip-free Markov chain with a being the unique absorbing state. By the
result of Kent and Longford [7, Sec. 4 Lemma 1], PO has distinct eigenvalues, which
implies GO has distinct eigenvalues as well. If G has a positive eigenvalue , then
1 C b > 1 is an eigenvalue for P, O which is not possible since a stochastic matrix
has eigenvalues less than or equal to 1. Therefore, all the eigenvalues of G are non-
positive. t
u
Condition 1 and 2 are by no means necessary for G to admit a real spectrum. This
can be illustrated with the following example:
Example 1 (Condition 1 and 2 are not necessary)
0 1
0:3 0:3 0 0
B 0:4 0:7 0:3 0 C
GDB
@ 0:5
C
0:3 0:85 0:05 A
0:1 0:2 0:4 0:7
has eigenvalues 0; 0:63; 0:89; 1:04, and does not satisfy condition 1 (since
O 1/ D G.1; 0/ G.2; 0/ D 0:1 < 0) and 2 (since G.0;
G.0; O 2/ D G.2; 0/
G.3; 0/ D 0:4 > 0). Therefore, condition 1 and 2 are not necessary for real, distinct
and non-positive eigenvalues. t
u
We recall the notion of strong pathwise duality for Markov processes. Relying
on the fact that Siegmund duality is a strong pathwise duality, we demonstrate
Proposition 1 from a sample path perspective in Fig. 2.
Definition 4 (strong pathwise duality) Let .Xt /t0 and .Yt /t0 be two continuous-
time Markov chains on finite state spaces E and F respectively, and H W E F ! R
be a measurable and bounded function. Suppose that for every T > 0 there are
families of processes f.Xsx /s2Œ0;T gx2E and f.Ysy /s2Œ0;T gy2F , defined on a common
probability space .˝; F ; P/, such that the following holds:
1. For all x 2 E and y 2 F, the finite dimensional distributions of .Xsx /s2Œ0;T under
P (resp. .Ysy /s2Œ0;T under P) agree with that of .Xt /t2Œ0;T under Px (resp. .Yt /t2Œ0;T
under Py ).
534 M.C.H. Choi and P. Patie
Then .Xt /t0 and .Yt /t0 are said to be strongly pathwise dual with respect to H.
Theorem 1 (Siegmund duality is strong pathwise duality (Clifford and Sudbury
[2])) Let .Xt / and .Yt / be two continuous-time Markov chains on a finite state space
E, which are dual with respect to the Siegmund kernel HS .i; j/ D 1fijg . Then they
are strongly pathwise dual.
We now discuss a procedure to simulate .Xtx / with generator G and its Siegmund
y
dual .Yt / with generator GO over the time frame Œ0; T. We summarize the procedure
in Clifford and Sudbury [2] as follows: since the state space E is finite, both
y
.Xtx / and .Yt / are uniformizable. Suppose that X0x D x. Let us write c D
maxfmaxi G.i; i/; maxi G.i; O i/g > 0. Then the inter-arrival time (or holding time)
.ti /niD1 with t0 D 0 of the transition of .Xtx / is independent and exponentially
distributed with mean c1 , and the transition follows that of the discrete time
embedded Markov chain with transition matrix P D I C Gc , which is driven by
n i.i.d. .Ui /niD1 uniformly distributed numbers on .0; 1/.
y
To simulate .Yt /, we reverse in both jump directions and jump time of that of
y y
.Xtx /. Precisely, suppose that Y0 D y. The holding time of .Yt / is .T tnk /nkD0 ,
O
and its transition is governed by the transition matrix PO D I C Gc driven by .Vi /niD1 ,
y y
where Vi D 1 UnC1i . Let YQ t WD YTt . The above procedure is summarized into
Algorithm 1:
To illustrate Algorithm 1, we use it to simulate a continuous time birth and death
processes .Xt3 / on E D f0; : : : ; 7g with birth rate and death rate both equal to 0:5
for all states apart from 0 and 7, where we have an absorbing boundary at 0,and a
reflecting boundary at 7 with G.7; 6/ D 0:5. The sample paths are plotted in Fig. 1.
0
0 5 10 15 20
time t
Fig. 1 Sample paths of birth-death .Xt3 / with an absorbing boundary at 0, G.i; i C 1/ D G.i; i
1/ D 0:5, .YQ4t / and .YQ5t / with T D 20, a D 7
This figure should be compared with Jansen and Kurt [6, Fig. 1 Sec. 4.1]. We can
3
observe that strong pathwise duality (cf. Definition 4) holds, that is, X20 y if and
y
only if YQ 0 3.
Next, to demonstrate our main result Proposition 1, we apply Algorithm 1 to
simulate an upward skip-free process .Xt4 / with generator G in (7). It can be checked
that G fulfills condition .1/ and .2/ in Proposition 1. Strong pathwise duality holds
4
y if and only if YQ0 4. In essence, while .Xt4 / is upward
y
in Fig. 2, that is, X20
skip-free, its Siegmund dual can be considered as a birth-and-death process before
it gets absorbed to state 7.
0 1
0 0 0 0 0 0 0 0
B 0:3 0:5 0:2 0 0 0 0 0 C
B C
B 0:1 0:25 0:65 0:3 0 0 0 0 C
B C
B C
B 0:1 0:2 0:4 1:1 0:4 0 0 0 C
GDB C (7)
B 0:1 0:2 0:3 0:35 1:45 0:5 0 0 C
B C
B 0:1 0:2 0:3 0:3 0:6 2:1 0:6 0 C
B C
@ 0:1 0:2 0:3 0:3 0:5 1:0 3:1 0:7 A
0:1 0:2 0:3 0:3 0:5 0:7 1:0 3:1
536 M.C.H. Choi and P. Patie
0
0 5 10 15 20
time t
Fig. 2 Sample paths of .Xt4 / with G given by (7), .YQ1t / and .YQ2t / with T D 20, a D 7
Acknowledgements The authors would like to thank an anonymous referee for insightful
suggestions which improved an earlier version of the paper.
References
Abstract In this study, the well-known market disequilibrium model with excess
supply and demand is investigated to determine if it exhibits changes in the structure
and the number of equilibrium states for specific choices of parameter values. We
propose to examine the effects of changing separately each price functions and
unit transaction cost functions. We study the bifurcation problem (i.e., qualitative
change in equilibrium states) as a parametrized variational inequality problem (VI).
We conduct our analysis based on modeling the markets via a projected dynamical
system (PDS), which is a type of constraint ordinary differential equations whose
critical points are the market equilibrium states of the economic model. Numerical
simulation for two examples is carried out to see if and when the behavior of these
market steady states exhibits any qualitative change.
1 Introduction
The market equilibrium models considered in this work are spatial price equilibrium
and market disequilibrium models [11, 14]. The extensive work on the spatial
price equilibrium induced various improvements in both the formulation and the
computation of this problem. In the formulation, it evolved from the formulation of
linear complementarity [1], to the formulation via variational inequality theory as
in [8]; then to PDS models as in [12]. In the computation, numerical methods and
approximation algorithms are utilized to exploit the solutions at different settings
and configurations [1, 12]. It also extended to a market disequilibrium case where the
prices have been regulated [16]. The initial market disequilibrium problem appeared
in [16]. Nagurney et al. [14] have introduced a new market equilibrium model with
excess supply and demand, which extended from the spatial price equilibrium model
presented in [11]. In this paper, we examine the possible structural changes of the
behavior of the market equilibrium and disequilibrium problems under a parameter
variation. Two frameworks are combined: the theory of PDS, and the theory of
evolutionary variational inequality problems (EVI) (see for example [2, 5, 7] and
the references therein). The rest of the paper is organized as follows: in Sect. 2, we
give a brief review of both market equilibrium and disequilibrium models; moreover,
their variational inequalities forms and corresponding adjustment dynamics are also
presented. Section 3 provides a study of bifurcation questions using the concept
of EVI problem. Numerical simulations for two market equilibrium examples are
presented in Sect. 4. The paper is concluded with a discussion and some suggestions
for future work.
We assume the reader is familiar with the definitions of a convex cone, and those
of the tangent and normal cone to a closed convex nonempty set (see for instance
[3]).
Note that in [11] the equilibrium market is given as above with ui D 0 and vj D 0.
Furthermore in [14], it is assumed that each supply price at the supply market is
regulated by a fixed minimum supply price i , called the price floor at supply market
i. The fixed maximum demand price at demand market j is denoted by Nj , called the
price ceiling at demand market j. The supply price floors and the demand price
Bifurcations in the Solution Structure of Market Equilibrium Problems 539
The conditions in (2) are known as equilibrium conditions [11]. The conditions (3)
are presented in detail in [14]. It is also considered that the supply price at any supply
market i depends on the supplies at all the markets, that is D .s/. Similarly, the
demand price at any demand market j depends on the demands at all the markets,
that is D .d/. In the same context, the unit transaction cost associated with the
pair .i; j/ depends on the commodity shipments from i to j, that is c D c.Q/, where
all ; and c are smooth functions. The vectors O D 2 Rm and O D 2 Rn
are also provided, where O D .Q; O u/ and O D .Q;O v/: The vector QO 2 Rmn
Q
consists of m vectors fO i g and each these vectors contains n components fO i g and
the vector QO 2 Rmn consists of m vectors fQOj g, where each vector has n components
fO1 ; O2 : : : :; On g.
The pattern .Q ; u ; v / satisfies the conditions (2) and (3) governing the disequi-
librium market problem if and only if it satisfies the VI problem
QO ; u / C c.Q / .Q
..Q QO ; v //:.Q Q / C ..Q
O ; u / /:.u u /C
O ; v //:.v v / 0 ; 8.Q; u; v/ 2 K and K D Rmn
.N .Q C RC RC :
m n
(4)
Remark: note that in [11] the market equilibrium model without the excess supply
and demand is formulated as a VI as follows:
hF.Q /; Q Q i 0 8 Q 2 K 1 ; K 1 D Rmn
C: (5)
540 F. Etbaigha and M. Cojocaru
Thus, according to [12], it is known that the adjustment to spatial price equilibrium
states in a VI problem can be obtained by studying the nonsmooth dynamical
system:
dQ.t/
D PTKQ.t/ .F.Q.t///; Q.0/ 2 K 1 ; K 1 D Rmn
C; (6)
dt
For simplicity, we will write .Q; u; v/ instead of .Q.t/; u.t/; v.t//. F W K 7! Rmn
Rm Rn is defined by F.Q; u; v/ D .A.Q; u; v/; G.Q; u/; D.Q; v//; and A W K 7!
Rmn , G W Rmn m m mn n
C RC 7! R and D W RC RC 7! R are defined by: Aij D
n
QO i .Q; u/ C cij .Q/ QOj .Q; v/; Gi D O i .Q; u/ i ; Dj D Nj Oj .Q; v/. Let the vector
x D .Q; u; v/ 2 K, and F.x/ D F.Q; u; v/ then (7) can be written in the form,
3 Bifurcations in MESD
Bifurcation theory for nonsmooth dynamical systems has not been studied as
extensively as smooth dynamical systems (see for instance [15] and the references
therein). However, the works in [9] and [10] give results for the existence of bifurca-
tions in discontinuous Filippov systems and VI. The nonconventional bifurcations
of fixed points and periodic solutions in Filippov systems have been addressed in
[10]. In [9], it was shown that if V is the Hilbert space, B W V R ! V and K is
closed convex subset of V then the VI of the form
Let us assume that an MESD is formulated as in Sect. 2, such that its solution(s) are
given by equilibrium points of the dynamical system (7). Let 2 R and consider
the system:
d.Q; u; v/
D PTK.Q;u;v/ .F.Q; u; v; //; K D Rmn
C RC RC ;
m n
(10)
dt
for some interval of values of 2 Œa; b. From (11), using the definition of a normal
cone, we have to:
According to the EVI theory, all the functions will be in Hilbert space
L2 .Œa; b; RnCmCnm /, then F W Œa; b K ! L2 .Œa; b; RnCmCnm / and the feasible set
K can be written as
dx.; /
D PTKx.; / .F.x.; /; //; (15)
d
where the time represents the time evolution to the equilibrium x.; :/. This
formulation is employed to solve the problem in (13).
542 F. Etbaigha and M. Cojocaru
4 Examples
4.1 Example 1
We consider the example of a market equilibrium problem with two supply and two
demand markets which has a unique equilibrium as shown in [11]. In order to detect
if the change on the cost functions impacts the equilibrium, we modify the example
and introduce in the cost function. At D 0 the equilibrium is still unique
.0:8; 2:96; 0; 0/ since the vector field F is still strictly monotone. Additionally, the
variables are adjusted to be dependent where 2 Œa; b.
The supply price functions are defined by W R2 ! L2 .Œa; b; R2 /,
1 .s.// D 5s1 ./ C s2 ./ C 2, 2 .s.// D s1 ./ C 2s2 ./ C 3;
the demand price functions are defined by W R2 ! L2 .Œa; b; R2 /,
1 .d.// D 2d1 ./ d2 ./ C 28:75, 2 .d.// D d1 ./ 4d2 ./ C 41;
and the unit transaction costs are defined by c W Œa; b K ! L2 .Œa; b; R4 /,
Bifurcations in the Solution Structure of Market Equilibrium Problems 543
c11 .Q; / D Q11 ./ C .0:5 C /Q12 ./ C 1, c12 .Q; / D .2 C /Q12 ./ C
Q22 ./ C 1:5, c21 .Q; / D .3 /Q21 ./ C 2Q11 ./ C 25, c22 .Q; / D .2
/Q22 ./ C Q12 ./ C 30. The feasible set is K D fQ 2 L2 .Œa; b; R4 /j0 Q./
5; a:e in Œa; bg.
We consider a vector field F defined as F W Œa; b K ! L2 .Œa; b; R4 / where
F11 .Q./; / D 1 .s.// C c11 .Q./; / 1 .d.//
D 8Q11 ./ C .6:5 C /Q12 ./ C 3Q21 ./ C 2Q22 ./ 25:75.
F12 .Q./; / D 1 .s.// C c12 .Q./; / 2 .d.//
D 6Q11 ./ C .11 C /Q12 ./ C 2Q21 C 6Q22 ./ 37:5.
F21 .Q./; / D 2 .s.// C c21 .Q./; / 1 .d.//
D 5Q11 ./ C 2Q12 ./ C .7 /Q21 ./ C 3Q22 ./ 0:75.
F22 .Q./; / D 2 .s.// C c22 .Q./; / 2 .d.//
D 2Q11 ./ C 6Q12 ./ C 3Q21 ./ C .8 /Q22 ./ 8.
Our EVI problem is given by hF.Q ./; /; Q./ Q ./i 0; 8Q./ 2 K; and
the associated PDS can be written as in (15).
We examine the effect of changing in the cost functions considering 2 Œ0; 8
to ensure that the costs are always nonnegative. We obtain the equilibrium at each
value of by the method in [5] implemented in Matlab. For 0 < 8, for any
arbitrary initial condition, the system shows just one equilibrium corresponding to
each value of . At D 8, the shipments converge to three boundary equilibria,
which means that F is non-strictmonotonic. The numerical simulations of the system
at D 8 are presented in the Figs. 1 and 2. Shipments at supply market 1 are
4.5
3.5
2.5
1.5
0.5
Fig. 1 Values of .Q11 ; Q12 ; Q21 ; Q22 / at equilibrium are presented as a heatmap. The heatmap
shows three equilibrium patterns, the equilibria are color-coded such that each repeated pattern is
represented by the same color
544 F. Etbaigha and M. Cojocaru
a 5
4.5
3.5
3
22
2.5
Q
1.5
0.5
0
0 0.5 1 1.5 2 2.5 3 3.5 4 4.5 5
Q21
b 5
4.5
3.5
3
Q12
2.5
1.5
0.5
0
0 0.5 1 1.5 2 2.5 3 3.5 4 4.5 5
Q
11
Fig. 2 Phase portraits for D 8, both figures show trajectories starting from 40 initial conditions
(equilibria shown by square markers). There are three distinct equilibrium points
balanced at: .Q11 ; Q12 / 2 f.0; 1:44/; .1:97; 0/; .0; 1:97/g, and shipments at supply
market 2 are balanced at: .Q21 ; Q22 / 2 f.5; 0/; .0; 5/; .0; 0/g as shown in Fig. 2.
As a result of the change in the number of equilibria, D 8 is a bifurcation
value.
Bifurcations in the Solution Structure of Market Equilibrium Problems 545
4.2 Example 2
Here we modify the above example to paramterize the supply and demand price
functions. The example is extended to the case of excess supply and excess demand.
Furthermore is introduced into both price functions. Without introducing
the system shows one equilibrium .1:6; 2:8; 0; 0; 0; 0; 0; 0/ since F is still strictly
monotone. The supply price functions are defined by
1 .s./; / D .5C/s1 ./Cs2 ./C12, 2 .s./; / D .1C/s1 ./C2s2 ./C30.
The demand price functions are defined by
1 .d./; / D 2d1 ./ .1 /d2 ./ C 45,
2 .d./; / D .1 /d1 ./ 4d2 ./ C 55:
The unit transaction cost functions are as in the Example 1 with D 0.
The feasible set is K D fx 2 L2 .Œa; b; R8 /j0 x./ 5; a:e in Œa; bg, where
x./ D .Q11 ./; Q12 ./; Q21 ./; Q22 ./; u1 ./; u2 ./; v1 ./; v2 .//. We consider
the supply price floors at the markets are 1 D 10 and 2 D 15 and the demand
price ceilings are N1 D 45 and N2 D 55. Then the vector field F is defined as
F W Œa; b K ! L2 .Œa; b; R8 /; for simplicity we assume Q./ D .x1 ; x2 ; x3 ; x4 /.
Then F11 .Q./; u./; v./; / D .8 C /x1 C .6:5 C /x2 C .5 C /u1 C 3x3 C .2
/x4 C 2v1 C u2 C .1 /v2 32.
F12 .Q./; u./; v./; / D .6 C /x1 C .11 C /x2 C .5 C /u1 C 6x4 C 4v2 C
u2 C .1 /v1 C .2 /x3 41:5.
F21 .Q./; u./; v./; / D .5 C /x1 C .1 C /u1 C .4 C /x2 C .3 /x4 C 2v1 C
.1 /v2 C 7x3 C 2u2 .
F22 .Q./; u./; v./; / D 2x1 C .5 C /x2 C .3 /x3 C .1 /v1 C 4v2 C 6x4 C
.1 C /u1 C 2u2 15,
.1 1 ; 2 2 / D ..5 C /x1 C .5 C /x2 C .5 C /u1 C x3 C x4 C u2 C 2; .1 C
/x1 C .1 C /x2 C .1 C /u1 C 2x2 C 2x4 C 2u2 C 15/
.N1 1 ; N2 2 / D .2x1 C 2x3 C 2v1 C .1 /x2 C .1 /x4 C .1 /v2 ; .1
/x1 C.1 /x3 C.1 /v1 C4x2 C4x4 Cv2 /. Then the EVI problem can be written
as hF.Q ./; u ./; v ./; /; .Q./; u./; v.// .Q ./; u ./; v .//i 0.
We set 2 Œ7; 8 to ensure the prices are nonnegative. The experiments is
carried out as discussed in Example 1. For each value of there exist only one
equilibrium except for the value of D 6 at which two equilibria occur. Then at
D 6, F is non-strictmonotonic, and D 6 is a bifurcation value. Figure 3
shows the two equilibria. Shipments at supply market 1 .Q11 ; Q12 / 2 f.0; 5/; .5; 0/g
and shipments at supply market 2 .Q21 ; Q22 / 2 f.0; 0:83/; .0; 2:4/g are shown in
546 F. Etbaigha and M. Cojocaru
4.5
3.5
2.5
1.5
0.5
Fig. 3 The heatmap shows the equilibrium pattern .Q11 ; Q12 ; Q21 ; Q22 ; u1 ; u2 ; v1 ; v2 /. Each value
is represented by singular color, the number of equilibria in this case two which is indicated by
switch in color
(a) 5 (b) 4
4.5 3.5
4
3
3.5
2.5
Q 22
3
Q12
2.5 2
2 1.5
1.5
1
1
0.5 0.5
0 0
0 0.5 1 1.5 2 2.5 3 3.5 4 4.5 5 0 0.5 1 1.5 2 2.5 3 3.5
Q11 Q21
Fig. 4 Phase portraits for D 6 show the convergence of the shipments at each market. (a)
.Q11 ; Q12 / convergence. (b) .Q21 ; Q22 / convergence
Fig. 4. The excess supply and demand at market 1 .u1 ; v1 / 2 f.0; 0/; .4:9; 0/g and
the excess supply and demand at market 2 .u2 ; v2 / 2 f.4:18; 0/; .5; 0/g are presented
in Fig. 5.
Bifurcations in the Solution Structure of Market Equilibrium Problems 547
(a) 5 (b) 5
4.5 4.5
4 4
3.5 3.5
3 3
v1
v2
2.5 2.5
2 2
1.5 1.5
1 1
0.5 0.5
0 0
0 0.5 1 1.5 2 2.5 3 3.5 4 4.5 5 0 0.5 1 1.5 2 2.5 3 3.5 4 4.5 5
u1 u2
Fig. 5 Phase portraits for D 6 show the convergence of the excess supply and excess demand
at each market. (a) .u1 ; v1 / convergence. (b) .u2 ; v2 / convergence
5 Conclusion
In this study we considered the bifurcation problem for the market equilibrium
model as an EVI problem. Furthermore, we studied the impact of changing the
supply price, demand price and the cost functions on the market equilibrium states.
With both the cost functions and price functions, the effect of the variations of
the parameter is seen on the number of equilibria occurring at specific values.
The equilibrium states were obtained using trajectories of the associated projected
dynamics. The empirical results on two examples showed that bifurcations occur
in such systems. Further investigation is required to extend the applicability of the
proposed method to other equilibrium models. Moreover, additional future work
is to study the usage of nonlinear parameter dependencies to explore existence of
bifurcations in the solution structure of market equilibrium problems.
References
1. Asmuth, R., Eaves, B.C., Peterson, E.L.: Computing economic equilibria on affine networks
with lemke’s algorithm. Math. Oper. Res. 4(3), 209–214 (1979)
2. Barbagallo, A., Mauro, P.: Evolutionary variational formulation for oligopolistic market
equilibrium problems with production excesses. J. Optim. Theory Appl. 155(1), 288–314
(2012)
3. Cojocaru, M.-G.: Monotonicity and existence of periodic orbits for projected dynamical
systems on hilbert spaces. Proc. Am. Math. Soc. 134(3), 793–804 (2006)
4. Cojocaru, M.-G.: Double-layer dynamics theory and human migration after catastrophic
events. In: Cojocaru, M.-G. (ed.) Nonlinear Analysis with Applications in Economics, Energy
and Transportation, pp. 65–86. Bergamo University Press, Bergamo (2007)
5. Cojocaru, M.-G., Daniele, P., Nagurney, A.: Projected dynamical systems and evolutionary
variational inequalities via hilbert spaces with applications1. J. Optim. Theory Appl. 127(3),
549–563 (2005)
548 F. Etbaigha and M. Cojocaru
6. Cojocaru, M.-G., Jonker, L.: Existence of solutions to projected differential equations in hilbert
spaces. Proc. Am. Math. Soc. 132(1), 183–193 (2004)
7. Daniele, P.: Dynamic Networks and Evolutionary Variational Inequalities. Edward Elgar
Publishing, Cheltenham/Northampton (2006)
8. Florian, M., Los, M.: A new look at static spatial price equilibrium models. Reg. Sci. Urban
Econ. 12(4), 579–597 (1982)
9. Le, V.K., Schmitt, K.: Global Bifurcation in Variational Inequalities: Applications to Obstacle
and Unilateral Problems, vol. 123. Springer Science & Business Media, Berlin (1997)
10. Leine, R., Van Campen, D., Van de Vrande, B.: Bifurcations in nonlinear discontinuous
systems. Nonlinear Dyn. 23(2), 105–164 (2000)
11. Nagurney, A.: Network Economics: A Variational Inequality Approach, vol. 10. Springer
Science & Business Media, Berlin (1998)
12. Nagurney, A., Takayama, T., Zhang, D.: Massively parallel computation of spatial price
equilibrium problems as dynamical systems. J. Econ. Dyn. Control 19(1), 3–37 (1995)
13. Nagurney, A., Zhang, D.: Projected Dynamical Systems and Variational Inequalities with
Applications, vol. 2. Springer Science & Business Media, Berlin (2012)
14. Nagurney, A., Zhao, L.: Disequilibrium and variational inequalities. J. Comput. Appl. Math.
33(2), 181–198 (1990)
15. Perko, L.: Differential Equations and Dynamical Systems, vol. 7. Springer Science & Business
Media, Berlin (2013)
16. Thore, S.: Spatial disequilibrium. J. Reg. Sci. 26(4), 661–675 (1986)
Pricing Options with Hybrid Stochastic
Volatility Models
Abstract We introduce a hybrid stochastic volatility model where the asset price
process follows the Heston model and interest rates are governed by a two-factor
stochastic model. Two cases are considered. First, it is assumed that interest rates
and asset prices are uncorrelated. The characteristic function method is used to
derive semi-analytical pricing formulae for plain vanilla options. In the second case
we introduce a correlation between the asset price process and the short rate process
and use Monte Carlo simulations for pricing options. To reduce the stochastic error,
we implement the control variate method where an estimator of the option value
for the uncorrelated case is used as a control variate. The options are priced with a
varying correlation coefficient. We observe that the control variate method allows
us to speed up Monte Carlo computations by a factor with the magnitude of several
hundreds. The efficiency of the method is higher for smaller values of the correlation
coefficient. We then study the impact a correlation between the two processes has on
option prices. It has been noticed that the call option price is an increasing function
of the correlation coefficient.
1 Introduction
In 1973, Fischer Black, Myron Scholes and Robert Merton [2] introduced a
technique for finding a closed-form solution for the price of a plain European option.
The price, V D V.t; S/, of a European-style option is a function of time t and asset
price S (at time t) that satisfies the partial differential equation
@V 1 @2 V @V
C 2 S2 2 C rS rV D 0 (1)
@t 2 @S @S
subject to the terminal condition V.T; S/ D f .S/, where r is the risk-free interest
rate, is the volatility of the stock, and f .S/ is the payoff at maturity T. Here we
assume no dividend on the stock. The solution to (1) is given by the discounted
expectation of the terminal payoff:
where Q is the risk-neutral probability measure with the bank account Bt D ert taken
as a numeraire.
The Black–Scholes–Merton formula (2) assumes that the price of an underlying
asset such as a stock, fSt gt0 , follows geometric Brownian motion (under the risk-
neutral measure Q):
The main drawback of this model is that the volatility of the underlying risky
asset is assumed to be constant. This assumption does not fit many factors observed
on financial markets such as volatility smiles and skews. Option pricing theory has
evolved since 1973. Other models that take into account many market phenomena
have been developed. Examples of such models include models with stochastic
volatility and stochastic interest rates. In this paper, we consider a hybrid model
that combines a stochastic volatility model for asset prices with a stochastic short
rate process (see [1, 8, 14] and references wherein). In particular, we develop a
modification of the Heston model [9] with stochastic interest rates that are governed
by a two-factor model (see [4]). We consider a two-factor modification of the
Vasicek model [15] but other models such the Hull–White model [10] and the Cox–
Ingersoll–Ross (CIR) model [5] can also be used.
To specify the hybrid model, we combine two systems of stochastic differential
equations. The first one defines the price of a risky asset and its volatility. The second
system defines the short rate process. As a result, we obtain a four-factor stochastic
volatility model named here as the Heston–Vasicek model. This hybrid model fits
in the class of affine diffusion processes (see [6]) for which a closed-form solution
of the characteristic function exists. However, the derivation of the characteristic
function for a hybrid multi-factor model with a full matrix of correlations is a
challenging problem. In this paper we study a simpler approach. First, we assume
that the stock price process and the interest rate process are uncorrelated. Fourier
techniques are used to obtain no-arbitrage prices of European-style options. Second,
we introduce a correlation between asset prices and interest rates and use the Monte
Carlo method to simulate the coupled system of SDEs and to price options. To
reduce the stochastic error, we use the control variate method (see, e.g., [7]), where
an estimator of the option value for the uncorrelated case is used as a control variate.
The rest of this paper is organised as follows. In Sect. 2, we formulate the hybrid
model and obtain characteristic functions for the uncorrelated case. A correlation
between the asset price and interest rate processes is then introduced and options are
priced using the Monte Carlo method. In Sect. 3, we discuss and analyse numerical
results, and our conclusions are drawn in Sect. 4.
Pricing Options with Hybrid Stochastic Volatility Models 551
where Wts , Wt , Wtr , Wtu are standard Brownian motions such that dWts dWt D s dt
and dWtr dWtu D ru dt. The two-factor Vasicek model (5)–(6) can be written as a
two-factor Gaussian model (the equivalence is proved in [4]):
aN D a; bN D b;
p
1 D 2 C 2 C 2xy ; 2 D .a b/;
xy C
ru D p :
2 C2 C2xy
First, we assume that W x and W y are not correlated with W s and W . Thus, the
correlation matrix for the four Brownian motions is given by
2 3
1 s 0 0
6s 1 0 07
6 7: (10)
40 0 1 xy 5
0 0 xy 1
552 G. Jones and R. Makarov
The option pricing formula for a standard European call takes the following form:
h RT i
Q
C.t; S/ D Et;r;S e t ru du .ST K/C : (11)
Q
Here, the expectation Et;r;S Œ computed under the risk-neutral measure Q is
conditional on frt D r; St D Sg. The discounting factor cannot be pulled out since
it is stochastic, so the mathematical expectation is computed as follows:
h RT i
Q
C.t; S/ D Et;r;S e t ru du .ST K/C
h RT i
Q
D Et;r;S e t ru du .ST K/ fST >Kg (12)
h RT i h RT i
Q
D Et;r;S e t ru du ST fST >Kg Et;r;S
Q
e t ru du K fST >Kg :
To calculate the conditional expectations in the r.h.s. of (12), we apply the change
of numeraire technique. The first expectation can be simplified by using the asset
price as a numeraire and the second expectation can be simplified by using the zero-
coupon bond as a numeraire. So, we have
Q1 BT =Bt RtT ru du
C.t; S/ D Et;r;S e ST fST >Kg
ST =St
RT
BT =Bt
Q2
Et;r;S e t ru du K fST >Kg
Z.T; T/=Z.t; T/
(13)
Q1 Q2
D SEt;S fST >Kg KZ.t; T/Et;S fST >Kg
where fXtH gt0 is the log-price process for the Heston model with interest r D 0.
Integrating both sides gives us the following:
Z T Z T Z T
dXs D rs ds C dXsH H) XT D RT C XTH ;
t t t
RT
where RT D t ru du. Then, we have the characteristic functions fHVj ./, j D 1; 2 of
the hybrid model as follows:
where we used the fact that RT and XTH are independent. Therefore, the new
characteristic functions admit the following form:
where fVj is the characteristic function for the Vasicek model and fj is the character-
istic function for the Heston model (under Qj ).
The functions fj , j D 1; 2 are already known [9, 13, 16] so we only need to
determine the characteristic functions of the integrated short rate process, RT , under
EMMs Q1 and Q2 , respectively,
If the short rate rt is a Gaussian process, then the integrated process Rt is Gaussian
2 z2
as well. Hence, we can use the identity EŒeiZ D eiz 2 for a normal random
variable Z with mean z and variance z2 . The probability distribution of the short
rate process does not change under the EMM Q1 . Therefore, Eqs. (7) and (8) can be
used to find the mean and the variance of RT under Q1 :
r0 aT r0 eaT T
R D EŒRT D e C 2C 2
C ;
a a a a a
2 2 1 3
VR D Var.RT / D T C eaT e2aT
a a 2a 2a
2 2 1 3
C T C ebT e2bT
b b 2b 2b
2xy eaT 1 ebT 1 e.aCb/T 1
C TC C :
ab a b aCb
554 G. Jones and R. Makarov
Therefore, the mean and variance of RT under the EMM Q2 are, respectively,
where
Z
T
2 T2 s T 2
xint D E x.s/ds D .1 eaT / .1 ebT / ;
0 a 2 b 2
Z T
2 T 2 s T 2
yint DE y.s/ds D .1 ebT / .1 eaT / ;
0 b 2 a 2
Z T
r0 r0 eaT T
int D .s/ds D eaT C 2 C 2
C :
0 a a a a a
Substituting these into Eq. (16) gives us the new characteristic function fV2 . The
price of the call option under the new model is as follows:
and Z.t; T/ is the price of a zero-coupon bond. The integral in (20) can be evaluated
numerically using a quadrature rule or the fast Fourier transform (FFT) method
[13, 16]. Note that the price of the put option can be calculated using the put-call
parity. Clearly, we are able to derived the pricing formula for European options in
closed form (19)–(20) due to the assumption that the asset price process and the
short rate process are uncorrelated.
Pricing Options with Hybrid Stochastic Volatility Models 555
One can easily show that this matrix is positive definite for all s ; xy ; O 2 .1; 1/.
The Cholesky decomposition method can then be applied to generate correlated
normal random variables. These correlated random variables are used in Monte
Carlo simulations of the hybrid model.
As is seen from (21), the correlation coefficients Corr.W s ; W y /, Corr.W ; W x /,
Corr.W ; W y / cannot approach 1 or 1 as jj
O ! 1 since xy ; s 2 .1; 1/. So, the
selection of two processes between which the correlation is introduced affects the
range for the correlation coefficient between another pair.
We would like to calibrate the model using historical data and then use the
parameters obtained for option pricing. First, the two-factor Gaussian model is
calibrated using yield rates obtained from the US treasury website (see [3, 4]). The
parameters obtained for the short rate model are as follows:
Using these parameters, the Heston model has been calibrated using the least square
method [13]. The historical prices of options on SPDR S&P 500 ETF (SPY) for
June 10, 2010 were used with different strike prices and different maturities (option
prices were obtained from the BloombergTM database). The initial asset value is
S0 D 108:88. The least squares method is used to minimize the difference between
market prices and model prices of options. This method minimizes the sum of the
squared errors (the market price minus the model price) made in every iteration. To
achieve the best possible results, the same routine has been run multiple times with
different starting points to get an optimal solution. The parameters that provide the
best fit to market prices are
Monte Carlo estimate of the option price Confidence interval for the option price
10.7 11.5
MC estimate
10.6 Exact value 11
Option price
Option price
10.5 10.5
10.4 10
10.3 9.5
0 1 2 3 4 5 6 7 8 9 10 0 1 2 3 4 5 6 7 8 9 10
M (the number of simulations) x 105 M (the number of simulations) x 105
Fig. 1 Monte Carlo simulations for the at-the-money call option with strike price K D 108:88
Substituting these values into the option pricing formula (19), we can calculate no-
arbitrage prices of call options for the uncorrelated case.
To verify the pricing formula (19), the exact option prices were compared
with prices obtained using Monte Carlo simulations. The Monte Carlo prices
are approaching the respective exact price in all our tests. For example, Fig. 1
demonstrates the convergence of Monte Carlo prices for the at-the-money call
option (with K D S0 ).
To construct Monte Carlo estimates for option prices, the Euler method (see,
e.g., [12]) is used. Discrete-time approximations of sample paths, .XO i ; O i ; xO i ; yO i /
.Xi
t ; i
t ; xi
t ; yi
t / with i D 0; 1; : : : ; n 1 and
t D Tn , are generated using the
following scheme:
p p
XO iC1 XO i C
t .Ori 0:5maxf0; O i g/ C maxf0; O i g
tzs ;
p p
O iC1 O i C
t.v O i / C maxf0; O i g
tz ;
p
xO iC1 xO i aOxi
t C
tzx ;
p
yO iC1 yO i bOyi
t C
tzy ;
a.iC1/
t
rOiC1 xO iC1 C yO iC1 C r0 ea.iC1/
t e :
a
Monte Carlo simulations usually have a large stochastic error associated with
them. To reduce the variance of our Monte Carlo estimator of the option value we
use the control variate method. The uncorrelated case (for which the option pricing
formula is available in closed form) is used to construct the control variate. The
same i.i.d. normal samples are used to calculate the estimates for both correlated
and uncorrelated cases.
In Table 1 we examine how the option prices vary with . O As O approaches 0,
the option price gets closer to the analytical price calculated for O D 0. We find
that the option price increases as O increases for at-the-money (K D 108:88), in-
the-money (K 2 f100; 106g), and out-of-the-money (K 2 f110; 115g) options. The
reasoning behind this is that as interest rates go up, the return on stocks increases
thereby increasing the value of a call option. We can say the call option price
and the interest rates are positively correlated. Therefore, increasing the correlation
coefficient between the interest rates and log-price processes increases the price of
a call option as is seen from our simulations.
The ratio of the standard deviations is calculated (the standard deviation of the
crude estimator over the standard deviation of the controlled estimator). This gives
us the factor by which the control variate method improves the crude Monte Carlo
method. This ratio ranges from 238 to 3846 depending on the values of O and K.
As is seen from Table 1 and Fig. 2, the control variate method gives a significant
improvement over the standard estimator when the correlation coefficient is close to
zero.
4 Conclusion
Fig. 2 The impact of the correlation coefficient O on the performance of the control variate
methods
References
1. Ahlip, R., Rutkowski, M.: Pricing of foreign exchange options under the Heston stochastic
volatility model and CIR interest rates. Quant. Financ. 13(6), 955–966 (2013)
2. Black, F., Scholes, M.: The pricing of options and corporate liabilities. J. Pol. Econ. 81(3),
637–654 (1973)
3. Blanchard, A.: The two-factor Hull-White model: pricing and calibration of interest rates
derivatives. Accessed 28 Mar 2014
4. Brigo, D., Mercurio, F.: Interest Rate Models-Theory and Practice: With Smile, Inflation and
Credit. Springer, Berlin/New York (2007)
5. Cox, J.C., Ingersoll, J.E., Ross, S.A.: A theory of the term structure of interest rates.
Econometrica 53(2), 385–407 (1985)
6. Duffie, D., Pan, J.: Transform analysis and asset pricing for affine jump-diffusions. Economet-
rica 68(6), 1343–1376 (2000)
7. Glynn, P.W., Szechtman, R.: Some new perspectives on the method of control variates. In:
Monte Carlo and Quasi-Monte Carlo methods, 2000 (Hong Kong), pp. 27–49. Springer, Berlin
(2002)
8. Grzelak, L.A., Oosterlee, C.W.: On the Heston model with stochastic interest rates. SIAM J.
Financ. Math. 2(1), 255–286 (2011)
9. Heston, S.L.: A closed-form solution for options with stochastic volatility with applications to
bond and currency options. Rev. Financ. Stud. 6(2), 327–343 (1993)
10. Hull, J., White, A.: Pricing interest-rate-derivative securities. Rev. Financ. Stud. 3(4), 573–592
(1990)
11. Kienitz, J., Kammeyer, H.: An implementation of the Hybrid-Heston-Hull-White model.
Available at SSRN 1399389 (2009)
12. Kloeden, P.E., Platen, E.: Numerical Solution of Stochastic Differential Equations. Volume 23
of Applications of Mathematics (New York). Springer, Berlin (1992)
13. Rouah, F.D.: The Heston Model and Its Extensions in Matlab and C. Wiley, Hoboken (2013)
14. Van Haastrecht, A., Lord, R., Pelsser, A., Schrager, D.: Pricing long-maturity equity and FX
derivatives with stochastic interest rates and stochastic volatility. Insur.: Math. Econ. 45(3),
436–448 (2009)
560 G. Jones and R. Makarov
15. Vasicek, O.: An equilibrium characterization of the term structure [reprint of J. Financ.
Econ. 5(2), 177–188 (1977)]. In: Financial Risk Measurement and Management. Volume
267 of International Library of Critical Writings in Economics, pp. 724–735. Edward Elgar,
Cheltenham (2012)
16. Zhu, J.: Applications of Fourier Transform to Smile Modeling, 2nd edn. Springer Finance.
Springer, Berlin (2010) Theory and implementation
Delay Stochastic Models in Finance
Anatoliy Swishchuk
A security is a tradable financial asset of any kind, e.g., stock. A stock is a portion
of ownership in a corporation. If S.t/ is a value of stock at time t; then S.t /
is a delayed stock price. Volatility is a measure for variation of price of a financial
instrument (stock, etc.) over time. If V.t/ is the volatility at time t; then V.t / is
a delayed volatility.
One of the main problems in finance is pricing of volatility and variance (square
of volatility) swaps. A forward contract or simply a forward is a contract between
two parties to buy or sell an asset at a specified future time at a price agreed upon
today. Volatility swaps are defined as forward contracts on future realized stock
volatility. Variance swaps are similar contracts on variance, the square of the future
volatility.
A. Swishchuk ()
University of Calgary, 2500 University Drive NW, Calgary, AB, T2N 1N4, Canada
e-mail: [email protected]
Volatility swaps allow investors to profit from the risks of an increase or decrease
in future volatility of an index of securities or to hedge against these risks. If you
think current volatility is low, for the right price you might want to take a position
that profits if volatility increases.
Payoff of variance swap is defined as
N.VR Kvar /;
where VR is the realized stock variance (quoted in annual terms) over the life of the
contract, Kvar is the strike price, N is the notional amount,
Z
1 T
VR WD Vs ds:
T 0
where r is the risk-free discount rate corresponding to the expiration date T; and EQ
denotes the risk-neutral expectation.
Payoff of volatility swap is defined as
p
N. VR Kvol /;
p
where VR is the realized stock volatility (quoted in annual terms) over the life of
the contract, and
s
p Z
1 T
VR WD Vs ds:
T 0
where a.t; S.t// is a drift coefficient, V.t; S.t// is a diffusion coefficient, b.t; S.t// is
a jump size coefficient, and W.t/ and L.t/ is a Brownian motion and a jump process
(e.g., Lévy process, see [12]) (independent or correlated).
Delay Stochastic Models in Finance 563
There are many papers (see, e.g., [1, 4, 5, 7, 8, 10, 11, 13]) in finance that consider
a a.t; S.t //; V V.t; S.t // or both parameters t and S depending on delay
: In this paper, we will focus on volatility or variance models with delay in finance.
The volatility process V.t; S.t// in (1) is an important concept in financial
modeling. This process can be stochastic or deterministic. In quantitative finance,
we consider the volatility process V.t; S.t// to be stochastic as it allows to fit the
observed market prices under consideration, as well as to model the risk linked with
the future evolution of the volatility, which deterministic model cannot.
If V.t; S.t// is the volatility at time t; then we consider some models for the
change of V.t/ at time t; dV.t/:
dV.t; S.t// D c.t; V.t; S.t///dt C d.t; V.t; S.t///dW.t/ C e.t; V.t; S.t///dL.t/
D “drift” C “noise” C “random jumps”: (2)
Significance of path-dependency (a.k.a. delay) may be seen from the Fig. 1 below:
the price of variance swap crucially depends on delay, where we used S&P60
Canada Index as our real data (vertical line stands for delivery price, and two plane
lines stand for jump intensity (left) and for delay (right)).
1. Continuous-time GARCH model for Stochastic Volatility with Delay (see [9]).
We assume in this paper the following model for volatility V.t; S.t//:
Z p 2
dV.t; S.t// ˛ t
D C V.s; S.s//dW.s/ .˛ C /V.t; S.t//:
dt t
Here, all the parameters ˛; ; ; are positive constants and 0 < ˛ C < 1:
All the parameters of this model were inherited from its discrete-time
analogue:
˛ 2
Vn D C ln .Sn1 =Sn1l / C .1 ˛ /Vn1 ; lD ;
l
which, in the special case l D 1, is a well-known GARCH(1,1) model for
stochastic volatility without conditional mean of log-return (see [2, 3]). Here,
Sn is a stock price at time n:
We used this model to find the prices of variance and volatility swaps (see
[14]).
2. Multi-Factor Stochastic Volatility with Delay (see [15]).
564 A. Swishchuk
−4
x 10
5
Delivery Price
1 1
20
15
0.5 10
5
0
Jump Intensity Delay
Fig. 1 Dependence of delivery price on delay and jump intensity (S&P60 Canada Index)
:̂
dt =t D dt C ˇdW1 .t/;
where W.t/ is a Brownian motion, N.t/ is a Poisson process with intensity and
yt is the jump size at time t. We assume that EŒ yt D A.t/, EŒ ys yt D C.s; t/; s < t
and EŒ y2t D B.t/ D C.t; t/, where A.t/; B.t/; C.s; t/ are all deterministic
functions. We calculated the price of variance swap in this case.
4. Lévy-based Stochastic Volatility with Delay (see [17]). The stochastic volatility
in this paper satisfies the following Lévy-driven equation:
hR p i2
dV.t;S.t// ˛ t
dt
D C t V.u; S.u/dL.u/ .˛ C /V.t; S.t//
Classical Heston model (see [6]) is one of the most popular stochastic volatility
models in the industry as semi-closed formulas for vanilla option prices are
available, few (five) parameters need to be calibrated, and it accounts for the mean-
reverting feature of the volatility. In this section we will focus on newly developed
so-called delayed Heston model that significantly improve classical Heston model
with respect to the market volatility surface fitting by 44 %. In this model, we take
into account not only current state of volatility at time t but also its past history over
some interval Œt ; t; where > 0 is a constant and is called the delay. In this way,
our model incorporates path-dependent history for volatility. We will show how to
model and price variance and volatility swaps (forward contracts on variance and
volatility) for the delayed Heston model and how to hedge volatility swaps using
variance swaps (see [18]).
The main points of this section are motivation, advantage and goal:
• Motivation: to include past history (a.k.a. delay) of the variance (over some
delayed time interval Œt ; t);
• Advantage: Improvement of the Volatility Surface Fitting (44 % reduction of the
calibration error) compare with Classical Heston model;
• Goal: to price and hedge volatility swaps.
We consider in a first approach adjusting the Heston drift by a deterministic
function of time so that the expected value of the variance under our new delayed
Heston model is equal to the one under ‘delayed vol’. Our approach can therefore be
566 A. Swishchuk
seen as a variance 1st moment correction of the Heston model, in order to account
for the delay. It is important to note that our model is a generalization of the classical
Heston model (the latter corresponding to the zero delay case D 0 of our model).
We performed numerical tests to validate our approach. With recent market data
(Sept. 30th 2011, underlying EURUSD), we performed the model calibration on the
whole market vanilla option price surface (14 maturities from 1M to 10Y, 5 strikes
ATM, 25 Delta Call/Put, 10 Delta Call/Put). The results show a significant (44 %)
reduction of the average absolute calibration error compared to the Heston model
(i.e. average of the absolute differences between market and model prices).
Further, we consider variance and volatility swaps hedging and pricing in our
delayed Heston framework. These contracts are widely used in the financial industry
and therefore it is relevant to know their price processes (how much they worth at
each time t) and how we can hedge a position on them, i.e. theoretically cancel the
risk inherent to holding one unit of them.
Using the fact that every continuous local martingale can be represented as a
time-changed Brownian motion, as well as the Brockhaus and Long approximation
(that allows to approximate the expected value of the square-root of an almost
surely non negative random variable using a 2nd order Taylor expansion approach),
we were able to derive closed formulas for variance and volatility swaps price
processes. In addition, as variance swaps are relatively liquid instruments in the
market (i.e. they can be easily bought and sold), we considered the question of
hedging a position on a volatility swap using variance swaps in our framework.
We are able to derive a closed formula for the dynamic hedge ratio, i.e. the
number of units of variance swaps to hold at each time in order to hedge a position
on a volatility swap.
In the following subsections we give a list of main steps in pricing of variance
and volatility swaps and hedging of volatility swaps for delayed Heston model.
As we mentioned before, our main motivation is to take into account past history of
the varinace in its diffusion (over some delayed time interval Œt ; t).
The Heston model is one of the most popular stochastic volatility models in the
industry, as semi-closed formulas for vanilla option prices are available, few (five)
parameters need to be calibrated, and it accounts for the mean-reverting feature of
the volatility:
p
dSt D rSt dt C Vt St dWtQ
p
dVt D Œ. 2 Vt /dt C ı Vt dWtQ ;
We would like to take into account not only its current state (as it is the case in
the Heston model) but also its past history over some interval Œt ; t; where is
a positive constant and is called the delay. Namely, at each time t; the immediate
future volatility at time t C will not only depend on its value at time t but also on
all its history over Œt ; t: Namely, at each time t, the immediate future volatility
at time t C will not only depend on its value at time t but also on all its history
over Œt ; t: We would like to mention that the non-Markovian continuous-time
GARCH model (see [14])
Z t p
dVt 1
D . 2 Vt / C ˛ . Vs dZsQ . r/ /2 Vt
dt t
is not suitable in this case, as there is no closed-form solution available for this
model. Therefore, we proposed the following Markovian delayed Heston model for
variance (see [18]):
2
p Q
dVt D Œ. Vt / 2C 1.t/dt
R t CQ ı Vt dWt Q (3)
.t/ WD ˛ . r/ C t E .Vs /ds E .Vt / :
We can notice that the classical Heston model and ‘delayed variance’ in (3) are
very similar in the sense that the expected values of the variances are the same –
when we make the delay tends to 0 in ‘delayed variance’. As mentioned before, the
Heston framework is very convenient for practitioners, and therefore it is naturally
tempting to adjust the Heston dynamics in order to incorporate – in some way – the
delay introduced in ‘delayed variance’. We note, that lim !0 supt2RC j .t/j D 0:
We show in this section how to calculate the variance and volatility swaps.
RT
Consider the realized variance: VR WD T1 0 Vs ds; where Vt is defined in (3), and
suppose that
p
Kvar D EQ ŒVR ; Kvol D EQ Œ VR :
To calculate Kvar we need only EQ ŒVR ; but for calculating Kvol we need more,
due to Brockhaus and Long approximation:
p p VarŒZ
EŒ Z EŒZ ; (4)
8EŒZ3=2
namely, VarŒVR :
568 A. Swishchuk
we get closed formula for Variance Swap and Volatility Swap fair strikes. Formula
(5) for the variance is the time-change representation for the variance in the delayed
Heston model and our main object in finding the variance and volatility swaps.
The parameter 2 in (5) can be interpreted as the delayed-adjusted long-range
variance. We note, that 2 ! 2 as ! 0:
The parameter in (5) can be interpreted as the delayed-adjusted mean-reverting
speed. We note, that ! as ! 0:
1
RT
Xt .T/ D EtQ Œq
It
T
C T t Vs ds WD g.t; It ; Vt /
1
RT
Yt .T/ D EtQ Œ It
T C T t Vs ds WD h.t; It ; Vt /
We compute the infinitesimal variations of these processes (using the fact that
Xt .T/ and Yt .T/ are martingales):
@g p
dXt .T/ D @V ı Vt dWtQ ;
@h p
t
dYt .T/ D @Vt ı Vt dWtQ ; (6)
@h @g p
d˘t D r˘t dt C er.Tt/ Œ @V t
C ˇt @V t
ı Vt dWtQ ;
Delay Stochastic Models in Finance 569
0.19
0.18
Naive Kvol
Kvol
0.17
0.16
0.15
0.14
0.13
0 1 2 3 4 5 6 7 8 9 10
T (year)
@h @Yt .T/
@Vt @V
ˇt D @g
t
D @X .T/ (7)
t
@Vt @Vt
-hedge ratio.
We take the parameters that have been calibrated in above-mentioned section
(vanilla options on September 30th 2011 for underlying EURUSD, maturities from
1M to 10Y, strikes ATM, 25D Put/Call, 10D Put/Call), namely, they are:
.v0 ; ; 2 ; ı; c; ˛; / D .0:0343; 3:9037; 108; 0:808;
p 0:5057; 71:35; 0:7821/:
We plot below the naive Volatility Swap strike Kvar and the adjusted Volatility
p
Swap strike Kvar Var .V R/
Q
3 along the maturity dimension, see Fig. 2, as well as the
2
8Kvar
VarQ .VR /
convexity adjustment 3 ; see Fig. 3, respectively. Also, we plot initial hedge
2
8Kvar
ratio ˇ0 .T/ with respect to the formula (7) with t D 0; see Fig. 4.
0.025
Convexity Adjustment
0.02
0.015
0.01
0.005
0
0 1 2 3 4 5 6 7 8 9 10
T (years)
–2.4
–2.6
Initial Hedge Ratio
–2.8
–3
–3.2
–3.4
–3.6
–3.8
0 1 2 3 4 5 6 7 8 9 10
T (years)
current value at time t; but also values over some time interval Œt ; t; where
is a positive constant and is called the delay. In this way, we incorporated path-
dependent history of the security (asset or volatility) under consideration. In this
paper we mainly focused on newly developed so-called delayed Heston model that
significantly improve classical Heston model with respect to the market volatility
surface fitting by 44 %. Review of some other delay stochastic models in finance
has been given as well.
Delay Stochastic Models in Finance 571
There are some very interesting open problems arising from the delay stochastic
models in finance. One of them is modeling and pricing of covariance and
correlation swaps in the case of two underlying assets with delayed Heston model
for variances. Another problem is a comparison of volatility swap or other volatility
derivatives pricing for delayed Heston model and Levy-based stochastic volatility
model Levy-based stochastic volatility model. Also, there are some financial models
that contain fractional Brownian motion as an uncertainty. It would be good to
compare our delay stochastic models with fractional models. We shall leave all these
problems for our future research papers.
References
1. Arriojas, M., Hu, Y., Mohammed, S-E.A., Pap, G.: A delayed Black and Scholes formula.
Stoch. Anal. Appl. 25, 471–492 (2007)
2. Bollerslev, T.: Generalized autoregressive conditional heteroskedasicity. J. Econom. 31, 307–
327 (1986)
3. Bollerslev, T., Chou, R., Kroner, K.: ARCH modeling in finance: a review of the theory and
empirical evidence. J. Econom. 52, 5–59 (1992)
4. Dokuchaev, N.: Modelling possibility of short-term forecasting of market parameters. Ann.
Econ. Finance 16(1), 43–161 (2015)
5. Dibeh, G., Harmanani, H.M.: A stochastic chartist fundamentalist model with time delays.
Comput. Econ. 40(2), 105–113 (2012)
6. Heston, S.: A closed-form solution for options with stochastic volatility with applications to
bond and currency options. Rev. Financ. Stud. 6(2), (1993), 327–343
7. Ivanov, A., Kazmerchuk, Yu., Swishchuk, A.: Theory, stochastic stability and applications of
stochastic differential delay equations. A survey of recent results. Differ. Equ. Dyn. Syst. 11
(1–2), 55–115 (2003)
8. Kazmerchuk, Y.I., Swishchuk, A.V., Wu, J.H.: Black-Scholes Formula Revisited: Security
Markets with Delayed Response, Bachelier Finance Society 2nd World Congress, Crete (2002)
9. Kazmerchuk, Y., Swishchuk, A., Wu, J.-H.: A continuous-time GARCH model for stochastic
volatility with delay. Can. Appl. Math. Q. 13(2), 123–148 (2005)
10. Kazmerchuk, Yu., Swishchuk, A., Wu, J.-H.: The pricing of options for security markets with
delayed response. Math. Comput. Simul. 75, 69–79 (2006)
11. Li, J.-C., Mei, D.-C.: The influences of delay time on the stability of a market model with
stochastic volatility. Physica A: Stat. Mech. Appl. 392(4), 763–772 (2013)
12. Sato, K.-I.: Lévy Processes and Infinitely Divisible Distributions. Cambridge University Press,
Cambridge (1999)
13. Stoica, G.: A stochastic delay financial model. Proc. Am. Math. Soc. 133(6) 1837–1841 (2004)
14. Swishchuk, A.: Modeling and pricing of variance swaps for stochastic volatilities with delay.
WILMOTT Mag. (19), 63–73 (Sept. 2005)
15. Swishchuk, A.: Modeling and pricing of variance swaps for multi-factor stochastic volatilities
with delay. Can. Appl. Math. Q. 14(4), 439–467 (2006)
16. Swishchuk, A., Li, X.: Pricing of variance and volatility swaps for stochastic volatilities with
delay and jumps. Int. J. Stoch. Anal. 27 (2011). http://dx.doi.org/10.1155/2011/435145
17. Swishchuk, A., Malenfant, K.: Variance swaps for local Levy based stochastic volatility with
delay. Int. Rev. Appl. Financ. Issues Econ. 3(2), 432–441 (2011)
18. Swishchuk, A., Vadori, N.: Smiling for the delayed volatility swaps. Wilmott Mag (November
2014)
Semi-parametric Time Series Modelling
with Autocopulas
1 Introduction
In this study, autocopulas are used to characterise the joint distribution between
successive observations of a scalar Markov chain. A copula joins a multivariate
distribution to its marginals, and its existence is guaranteed by Sklar’s theorem
[8]. In particular, a Markov chain of first order with any given univariate margin
can be constructed from a bivariate copula. A theoretical framework for the use
of copulas for simulating time series was given by [3], who presented necessary
and sufficient conditions for a copula-based time series to be a Markov process,
but not necessarily a stationary one. They presented theorems specifying when
time series generated using time varying marginal distributions and copulas are
Markov processes. Joe [4] proposed a class of parametric stationary Markov
models based on parametric copulas and parametric marginal distributions. Chen
and Fan [2] studied the estimation of semiparametric stationary Markov models,
This work was supported by MITACS, Direct Energy and by an NSERC Discovery Grant.
A. Ware () • I. Asadzadeh
University of Calgary, 2500 University Drive NW, Calgary, AB T2N 1N4, Canada
e-mail: [email protected]; [email protected]
2 The Data
The motivation for this project came from the desire to develop a parsimonious
model that could help to capture so-called load-following (or swing) risk. This is
one of the main sources of financial uncertainty for an energy retailer, and arises
from the combination of retail customer consumption (volume) uncertainty and
price uncertainty. Both volume (V) and price (P) are driven to a large extent by
weather. In particular, average daily temperature is one of the main drivers of daily
natural gas consumption in various North American markets: this in turn drives
market prices through a supply and demand process.
Some of the load-following risk exposure can be hedged using gas forwards and
temperature derivatives. A significant part of the risk exposure that cannot be easily
hedged and is linked to the daily product between the weather deviation from normal
(žF) and the daily price deviation from the expected value of the ex-ante forward
price. To make this more specific, let P denote the last-traded forward monthly
index price, and V the expected monthly average volume. Cash flows for the retailer
depend on the product PV, and the uncertainty in this quantity can be written
.P C P/.V C V/ PV D P V C V P C P V:
We can capture the first-order dependence between volume and weather deviations
by writing
V D ˇ
W C , where represents higher-order dependence on
W
as well as exogenous risk factors; modelling these other contributions was beyond
the scope of this study. Forward instruments in weather and natural gas markets
Semi-parametric Time Series Modelling with Autocopulas 575
Fig. 1 Product of weather and gas price deviations (
P
W) in Algonquin over 2003–2014.
Spikes correspond to combinations of high weather deviation from normal and high spot price
deviation from next forward month
can then be used to hedge risks corresponding to the terms P
V and V
P. It can
be seen that the term
P
W is an important component of unhedged risk in these
cashflows. One approach to modelling this component would be to develop separate
models for weather and natural gas prices (both daily and forward prices). However,
because of the desire for parsimony, we instead seek a model that allows us to study
the time-series Xt D .
P
W/t , in order to estimate the range and probabilities of
possible outcomes at the level of a complex portfolio of retail load obligations.
Here we focus on Algonquin Citygate gas prices and the Boston Logan station
for weather data. The data cover the period 1 January 2003–31 June 2014 on a
daily basis, and are shown in Fig. 1. The most dramatic feature of the graph is the
presence of intermittent clusters of spikes, during which the gas prices rise from
their approximate average daily value and at the same time temperature rises or
falls drastically. These mostly occur during winter, although large deviations also
occur at other times of the year. It is also clear that the marginal densities of these
observations will not be well-represented by normal distributions.
3 The Model
Here we introduce the simulation model in more detail, providing a brief review
of copulas, and the normal inverse Gaussian distribution, which we use for the
marginal densities.
576 A. Ware and I. Asadzadeh
@C
FXt jXt1 .x/ D Ft1 .Xt1 /; Ft .x/ : (1)
@u
We will discuss issues related to calibration and simulation below.
Autocopula models include many familiar time series as special cases. For
example, it is straightforward to show that an AR(1) process, yt D ˛yt1 CˇC.t/,
can be modelled using theautocopula framework using the marginal distribution
yˇ=.1˛/
F1 .y/ D ˚ p (where ˚ denotes the standard normal CDF) and a
2 =.1˛ 2 /
2 1˛
Gaussian copula with mean D ˇ=.1 ˛/ and covariance 1˛2 .
˛1
Part of the motivation for the use of autocopulas in time series modelling is
that, while correlation coefficients measure the general strength of dependence, they
provide no information about how the strength of dependence may change across
1
For more discussion on the theory of copulas and specific examples, see [5].
Semi-parametric Time Series Modelling with Autocopulas 577
the distribution. For instance, in the dataset we consider here there is evidence of
tail dependence, whereby correlation is higher near the tails of the distribution. We
can quantify this using the following definition ([4], Section 2.1.10).
Definition 2 (Upper and Lower Tail Dependence) If a bivariate copula C is
such that limu!1 C.u; u/=.1 u/ D U exists, where C.u; u/ D 1 C.1; u/
C.u; 1/ C C.u; u/, then C has upper tail dependence if U 2 .0; 1 and no upper tail
dependence if U D 0. Similarly, if limu!0 C.u; u/=.u/ D L exists, C has lower
tail dependence if L 2 .0; 1 and no lower tail dependence if L D 0
In Fig. 2 we show estimates of the quantities C.u; u/=.u/ and C.u; u/=.1 u/,
where here we use the order statistics of the time series Xt D .
P
W/t to generate
a preliminary empirical proxy for the copula function C. It is clear from the figure
that neither set of values tends towards zero in the limit u ! 0 or u ! 1, and we
conclude that the data exhibit nonzero tail dependence.
As noted above, the marginal densities for our time series will not be normal.
We found that the normal inverse Gaussian (NIG) distribution provided a more
satisfactory fit. More information about this distribution and its applications can
be found in [1]. Here we review its definition and properties.
˛
.˛ ˇy/2
fIG .yI ˛; ˇ/ D p y3=2 exp ; for y > 0:
2ˇ 2ˇy
578 A. Ware and I. Asadzadeh
XjY D y
N. C ˇy; y/ and Y
IG.ı; 2 /;
p
with WD ˛ 2 ˇ 2 , 0 jˇj < ˛ and ı > 0. We then write X
NIG.˛; ˇ; ; ı/.
Denoting by K1 the modified Bessel function of the second kind, the density is given
by
ı˛ exp ı C ˇ.x / p
fNIG .xI ˛; ˇ; ; ı/ D p K1 ˛ ı 2 C .x /2 :
ı 2 C .x /2
There is a one-to-one map between the parameters of the NIG distribution and the
mean, variance, skewness and kurtosis of the data. We first use moment matching to
determine initial estimates for the parameters, which we use as starting values for
a MLE search method. The corresponding fit to the data is shown in Fig. 3, where
the best fitting normal density is also shown. It can be seen that the NIG fit is quite
good. However, it is evident from Fig. 1 that the time series is strongly seasonal.
We seek to capture this seasonality through the marginal densities by making one of
the parameters of the NIG model time-dependent. This was achieved by assuming
the parameter to be constant in each month, and maximizing the resulting joint
likelihood across the entire data set. Of the four possible choices, ı gave the greatest
improvement to the AIC and BIC, as shown in Table 1. The estimated values of ı
are shown in Fig. 4, and the seasonal pattern that is evident in the original data is
evident again here.
Fig. 3 Histogram of observed data (
P
W), with fitted normal distribution and NIG distribution.
The estimated NIG parameters are: ˛ D 0:0980, ˇ D 0:0131, D 0:0122 and ı D 2:3799
Fig. 4 Calibrated monthly values of ı from the combined NIG likelihood, ˛ D 0:0293, ˇ D
0:0205, and D 0:0323
Fig. 5 Calibrated monthly values of ı, together with an example of a simulated path, as well as
a colour contour plot of the quantiles from a large number of simulated paths. Seasonal mean
and variance in (2) are linear combination of a constant and sin 2nt and cos 2nt for increasing
n. The estimated parameters are as follows: a D 0:31, b D .0:93; 0:30; 0:09; 0:22; 0:12,
0:032; 0:01; 0:03; 0:01/, and D .0:15; 0:09; 0:01/
As can be seen in Fig. 4, the value of ı tends to be higher in winter and lower in
summer. The time series of values appears to be mean reverting with seasonal mean
and variance.
p We model the time series using a seasonal mean reverting process for
t D ı t :
where the zt are independent standard normal samples. The mean and variance are
estimated using periodic functions with periods from 1 year down to 3 months.
Simulated and estimated values of ıt are shown in Fig. 5. Twenty thousand paths
580 A. Ware and I. Asadzadeh
were simulated using (2), and for each month the set of values was used to determine
quantiles, which were then used to create the coloured patches shown in the figure.
The darker patches correspond to quantiles nearer to the centre of the distribution,
and the lighter patches to quantiles nearer the extremes.
Once we have values of ıt , we can obtain the time varying cumulative distribution
function and time varying density function. The NIG cumulative distribution
function does not have a closed form solution, so we can compute the CDF using
Gaussian quadrature to evaluate the following integral.
Z xt
F.xt I ˛; ˇ; ; ı/ D fNIG .Xt I ˛; ˇ; ; ıt /dXt (3)
1
In next section we explain the procedure to calculate the empirical autocopulas and
simulate cash flows.
Having estimated the time-dependent NIG densities, we use these to produce a time
series of values Vt D Ft .Xt / 2 Œ0; 1. If the marginal densities were exact, these
would be uniformly distributed on Œ0; 1. In practice, they will only be approximately
uniform, and we generate an additional empirical marginal density and an empirical
(auto)copula to capture the joint density of .Vt ; Vt1 /.
The empirical autocopula C is estimated by first estimating an empirical joint
density for .Vt ; Vt1 / in the form of a strictly increasing continuous function ˚.; /
that is piecewise bilinear. The domain Œ0; 12 is partitioned into rectangles containing
approximately similar numbers of samples .Vt1 ; Vt /, and taking ˚ to be the
cumulative integral of the sum of indicator functions for these rectangles, scaled by
the number of samples in each rectangle. ˚ is then used to create strictly increasing
piecewise linear marginal densities ˚1 and ˚2 . The inverses of these densities
are therefore also piecewise linear, and when composed with ˚ they generate a
piecewise bilinear copula function C.u1 ; u2 / D ˚ ˚11 .u1 /; ˚21 .u2 / .
This process is illustrated in Fig. 6. In Fig. 6a we plot the pairs of transformed
values ˚1 .Vt1 /; ˚2 .Vt / , together with the outlines of rectangles used to generate
the piecewise bilinear function C. As mentioned, these rectangles contain roughly
equal numbers of points; constructing the empirical autocopula in this way ensures
that it is strictly increasing, and well-suited to enable the computations involved
in time series simulation (see below) to be carried out efficiently. The resulting
empirical autocopula C is shown in Fig. 6b. This function is binlinear on each of the
rectangles shown in Fig. 6a, but is less regular than it looks. The corresponding joint
2C
density, @u@1 @u2
.u1 ; u2 /, is shown in Fig. 6c. It can be seen that the density is higher
near .0; 0/ and near .1; 1/, which is consistent with the tail dependency observed
earlier.
Semi-parametric Time Series Modelling with Autocopulas 581
Fig. 6 Generation of the empirical autocopula. (a) Scatter plot of ˚1 .Vt1 / against ˚2 .Vt /. Each
rectangle contains about 100 points (note that rectangles with around 25 points were used in the
simulation). (b) Empirical autocopula C.u1 ; u2 / defined to be bilinear on each of the rectangles
shown in (a). (c) The empirical density @2 C=@u1 @u2 , which is constant on each of the rectangles
shown in (a)
Armed with the time-dependent NIG densities Ft ./, the empirical marginal densi-
ties FV;i ./ and the empirical autocopula C.; /, we can generate simulated values xt
as follows.
1. Given an initial value x0 , generate v0 D F0 .x0 /.
2. For t D 0; 1; : : : , given vt , generate vtC1 :
a. Set u1 D ˚1 .vt /.
b. Given u1 , create the piecewise linear function C.u/ WD C.u1 ; u/=u1 .
c. Set u2 D C1 .U/, where U is an independent uniform random draw.
d. Set vtC1 D ˚21 .u2 /.
3. For each t > 0, set xt D Ft1 .vt /.
Here we have used the fact (already alluded to in (1)) that, if U1 and U2 are uniform
random variables whose joint distribution is the copula C.u1 ; u2 /, then, for u1 > 0,
the cumulative density function for U2 , conditional on U1 D u1 , is
@C C.u1 ; u2 /
PŒU2 < u2 jU1 D u1 D .u1 ; u2 / D :
@u2 u1
The proof of this can be found in, for example, [3]. The fact that C is a piecewise
bilinear function means that C will be piecewise linear. Moreover, the construction
of the empirical copula as described in Sect. 3.3 ensures that it is an increasing
function with a limited number of corners. Its inverse can then be constructed
readily, and will also be an increasing piecewise linear function with a limited
number of corners, and so can be evaluated with little computational effort. Indeed,
in practice the computation of the final step in the above algorithm, the inversion
of the time-dependent NIG densities, took more time than the copula-related
computations.
582 A. Ware and I. Asadzadeh
4 Results
Fig. 7 One example of simulated daily values of
P
W, together with the 99th percentiles of
collected monthly values from around 700 simulations
Fig. 8 Estimated values of the quantities C.u; u/=.u/ and C.u; u/=.1 u/ for the original
observations of
P
W. Also shown are error bars corresponding to the 5th and 95th percentiles
of the values obtained from around 700 simulations
Semi-parametric Time Series Modelling with Autocopulas 583
References
1. Barndorff-Nielsen, O.E., Mikosch, T., Resnick, S.I.: Lévy Processes: Theory and Applications.
Springer Science & Business Media, New York (2001)
2. Chen, X., Fan, Y.: Estimation of copula-based semiparametric time series models. J. Econom.
130(2), 307–335 (2006)
3. Darsow, W.F., Nguyen, B., Olsen, E.T., et al.: Copulas and Markov processes. Ill. J. Math. 36(4),
600–642 (1992)
4. Joe, H.: Multivariate Models and Multivariate Dependence Concepts. CRC Press/Taylor &
Francis Group, Boca Raton/London, New York (1997)
5. Nelsen, R.B.: An Introduction to Copulas, 2nd edn. Springer Science & Business Media,
New York (2007)
6. Patton, A.J.: Copula–based models for financial time series. In: Handbook of Financial Time
Series, pp. 767–785. Springer, Berlin/Heidelberg (2009)
7. Rakonczai, P., Márkus, L., Zempléni, A.: Autocopulas: investigating the interdependence struc-
ture of stationary time series. Methodol. Comput. Appl. Probab. 14(1), 149–167 (2012)
8. Sklar, M.: Fonctions de répartition à n dimensions et leurs marges. Université Paris 8, (1959)
Optimal Robust Designs of Step-Stress
Accelerated Life Testing Experiments
for Proportional Hazards Models
1 Introduction
Failure data are needed in order to quantify the life characteristics of a product.
However, under normal design conditions such failure life data are very difficult
to obtain for a product with high reliability within a reasonable time period. To
overcome this problem, accelerate life testing (ALT) has been well-developed to
shorten the lifetime of a product and quickly obtain failures.
In general, test units in accelerated life testing experiments are subjected to
higher than normal design level of stresses. The use of such accelerating stresses for
a particular material is established by engineering practice. In an ALT experiment,
both censoring and time-dependent loading plan are often used. In this paper,
we consider time-censoring and time-dependent step-stress loading plan. Time-
censoring occurs when the experiment stops at a predefined censoring time.
In time-dependent step-stress ALT, all test units are subjected to stress levels
increasing by steps: first, all test units are subjected to a lower stress level for a
specified length of time, then the stress level increases and the test continues for all
unfailed test units, and so on.
To avoid invalid estimation, the range of stress levels should be restricted
in a stress loading plan. The failure data obtained at accelerated conditions are
extrapolated to estimate the characteristic of life distribution at normal design
conditions.
In the literature of designing a step-stress ALT experiment, most work has been
done for the cases when a simple step-stress plan is adopted, when the model is
fully parametric, or when model assumed is exactly correct. To mention a few:
Miller and Nelson [9] have first presented Q-optimal designs for simple step-stress
tests with complete data from an exponential distribution. Their designs minimize
the asymptotic variance (AVAR) of the maximum likelihood estimator (MLE) of
the mean life at a normal design stress. Bai et al. [2] have extended the theory of
Miller and Nelson [9] to censored data. They have constructed the optimal simple
step-stress ALT with time-censoring. Bai and Kim [1] have presented an optimal
simple step-stress ALT for a Weibull distribution under time-censoring. The optimal
low stress level and stress change time are obtained by minimizing the AVAR of
the MLE of a specified percentile at normal design stress. Fard and Li [5] have
also presented a step-stress ALT for a Weibull distribution under time-censoring;
however, their optimal stress-changing time is obtained by minimizing the AVAR of
the MLE for reliability instead. Recent work on optimal designs for step-stress ALT
has been reviewed by Hunt and Xu [6]. They have adopted a generalized Khamis-
Higgins model for the effect of changing stress levels and also assumed that the
lifetime of a test unit follows a Weibull distribution; however, their designs are also
optimal when both the shape and scale parameters are considered being functions of
the stress levels. The resulting optimal design chooses the stress-changing time in
order to minimize AVAR of the MLE of reliability at the normal design stress level
and at a pre-specified time.
Ma and Meeker [8] have extended the results of Bai and Kim [1] to provide
a general method for multiple step-stress ALTs for a log location-scale family
of distributions. They have presented an approach to calculate the large-sample
approximate variance of the MLE, computed from step-stress ALT data, for a
quantile of the failure time distribution at normal design conditions. Jiao [7] has
first developed the simple step-stress ALT plan when a PH model is utilized for
reliability prediction. Their optimal stress level is obtained by minimizing the
variance of the MLE of hazard rate at the normal design stress level and over a
pre-specified time period. Elsayed and Zhang [3] have presented an optimal simple
step-stress ALT plan based on a PH model to obtain the most accurate reliability
function estimates at normal design stress. They have also formulated a nonlinear
programming problem to minimize AVAR of the hazard rate estimator over a
prespecified time period at normal design stress.
The general theory for the asymptotic distribution of MLEs under model
misspecification has been derived by White [11]. He has examined the consequences
and detection of model misspecification when the maximum likelihood technique
is used for estimation. The proposed quasi-MLE converges to a well-defined
Optimal Robust Design of ALT 587
limit. In addition, the properties of their quasi-MLE and the information matrix
have been exploited to yield several useful tests when model misspecification is
suspected. Pascual [10] has presented the methodology for deriving the asymptotic
distribution of MLEs of model parameters with constant stress ALT when the stress-
life relationship is misspecified. When possible departures from an assumed ALT
model are suspected, his ALT plans can provide protection against potential bias
without much loss in efficiency. However, the methodology developed there can be
used to derive robust designs only for constant stress ALTs.
In a complete general setting, robust designs for one-point extrapolation which
is the case for ALT have been discussed in Wiens and Xu [12], for least squares
estimation of a mean response. As Fang and Wiens [4] pointed out, “Extrapolation
to regions outside of that in which observations are taken is, of course, an inherently
risky procedure and is made even more so by an over-reliance on stringent model
assumptions.” The classical optimal designs minimize the variance alone. However,
when the fitted models are incorrect, the estimation is biased. A robust design should
be obtained in an optimal way so that even when the fitted model was not exactly
correct, the designs can still be relatively efficient with a small bias.
The present paper extends previous work to construct optimal robust ALT
designs by taking into account multiple step-stress, semi-parametric model assump-
tion, and possible imprecision in the assumed model. Due to the nature of the
prediction made from ALT experimental data, attained under the stress levels
higher than the normal design condition, extrapolation is encountered. For possible
imprecision in an assumed PH model, the method of construction for robust designs
becomes significantly important. Therefore, we consider the situation where a PH
model with a simple linear baseline hazard function is fitted; however, the true
baseline hazard function is a quadratic function. Optimal robust designs will be
obtained in order to protect against possible departure from the assumed model with
a minimum loss of efficiency. We propose a two-stage design procedure, in Sect. 4,
where the optimal stress-changing times are derived by minimizing the asymptotic
squared bias (ABIAS2 ) at the first stage and then minimizing the AVAR at the second
stage.
The Cox’s proportional hazards (PH) model is one of the most important means
for predicting the lifetime of a product. This model provides a flexible method for
identifying the effects of the covariates on failure rate. A PH model with a covariate
(applied or transformed stress) independent of time is generally expressed as
where 0 .t/ is the baseline hazard rate function at the time of t, s is a stress level
used in an ALT test, and is a unknown parameter.
It is assumed that the true model is Model (1) with a quadratic baseline hazard
function, denoted by MT , i.e., Model (1) with 0 .t/ D 0 C 1 t C 2 t2 and D
˛. However, the fitting model is Model (1) with a linear baseline hazard function,
denoted by MF , i.e., Model (1) with 0 .t/ D 0 C 1 t and D ˇ.
The maximum likelihood method has been used for estimating the model
parameters. Define D Œ0 ; 1 ; 2 ; ˛T and D Œ0 ; 1 ; ˇT . Let ` .I / be the
log-likelihood function under MT , and ` .I / be the log-likelihood function under
MF , both with the same design, . The expected log-likelihood ratio under MT over
MF is
X
n1
1
` .I / D n1 ˇs1 ln .0 C 1 ti / 0 ti C ti2 exp .ˇs1 /
iD1
2
n2 h
X 1 i
n2 ˇs2 ln .0 C 1 xi / 0 xi C x2i exp .ˇs2 /
iD1
2
Optimal Robust Design of ALT 589
n3 h
X 1 i
n3 ˇs3 ln .0 C 1 yi / 0 yi C y2i exp .ˇs3 /
iD1
2
!
X3 h
1 i
C n ni 0 z C z2 exp .ˇs3 / : (4)
iD1
2
Xn1
@` .I / 1
D ti exp .ˇs1 /
@0 iD1
.0 C 1 ti /
n2
X
1
xi exp .ˇs2 /
iD1
.0 C 1 xi /
n3
X
1
yi exp .ˇs3 /
iD1
. 0 C 1 yi /
3
!
X
C n ni Œz exp .ˇs3 / ; (5)
iD1
Xn1
@` .I / ti ti2
D exp .ˇs1 /
@1 iD1
.0 C 1 ti / 2
n2
X
xi x2
i exp .ˇs2 /
iD1
.0 C 1 xi / 2
n3
X
yi y2
i exp .ˇs3 /
iD1
.0 C 1 yi / 2
3
! 2
X z
C n ni exp .ˇs3 / ; (6)
iD1
2
and
1 h
X 1 i
n
@` .I /
D n1 s1 C s1 0 ti C ti2 exp .ˇs1 /
@ˇ iD1
2
n2 h
X 1 i
n2 s2 C s2 0 xi C x2i exp .ˇs2 /
iD1
2
590 X. Xu and W.Y. Huang
n3 h
X 1 i
n3 s3 C s3 0 yi C y2i exp .ˇs3 /
iD1
2
!
X3 h
1 i
C n ni s3 0 z C z2 exp .ˇs3 / : (7)
iD1
2
T
Let D 0 ; 1 ; ˇ be the value of that minimizes (2), which is the
solutions of 0 ; 1 ; ˇ by setting all equations in (5), (6), and (7) equal to 0: Suppose
that the data are collected under design, , with sample size n: The experimenter
fits Model MF to the data by using MLE method. We adopt quasi-MLE approach
by taking ni ’s to be independent although they are p actually not. We let b denote
the quasi-MLE of . By Theorem 3.2 of White [11], n .b / is asymptotically
normal with mean 0 and covariance matrix C .I / which is defined as
where
2
@ ` .; /
A .I / D EMT (9)
@@T
and
@` .; / @` .; /
B .I / D EMT : (10)
@ @T
3 Optimality Criteria
We consider to estimate the hazard rate over a given time period at the normal design
stress level. We determine the optimal stress-changing times 1 and 2 in order to
minimize the ABIAS2 and AVAR of the MLE of a hazard function average over
a specific period of time, .0; T, under normal design stress level sD . For a given
design, the MLE estimator of the hazard rate at sD can be obtained by:
b
0 C b1 t/ exp b̌sD :
MF .tI sD / D .b (11)
Optimal Robust Design of ALT 591
b
MF .tI sD / jMT dt
0
Z 2
D
T
h
b i
EMT MF .tI sD / MT .tI sD / dt
0
Z T
2
0 C 1 t exp2 .ˇ sD / dt ; (12)
0 0 C 1 t C 2 t exp .˛sD /
1
Z T h iˇ h @b iT ˇˇ
@b
@b @b ˇ @b @b ˇ
D ˇ C WD ˇ dt. (13)
n @b 1 @b̌
0 @b b @b 1 @b̌
0 @b
0 D b D
In ALT practice, a certain number of failures under each test stress level is often
required. Such requirement is made to avoid that the stress changing times occur
too soon to provide a reasonable step-stress ALT having the same number of stress
levels as planned. Please see Elsayed and Zhang [3] for an example of simple step-
stress ALT. We also take such practical requirement into our design consideration.
These requirements on the minimum number of failures at each stress level are as
follows:
(a) The expected number of failures at stress level s1 has a minimum value MNF1 :
(b) The expected number of failures at stress level s2 has a minimum, called MNF2 :
(c) The expected number of failures at stress level s3 has a minimum, named MNF3 :
We have considered five scenarios of the constraints which are listed in Table 1.
At the first stage, the optimal 1 and 2 for our benchmark design can be
determined in order to minimize (12) under each constraint. We denote B Ck as
the optimal design obtained in benchmark under the given constraint Ck , where
k D 1; ; 5. At the second stage, we adopt the benchmark design parameters.
We set the derivatives in (5), (6), and (7) to be zero, and solve for 0 ; 1 ; ˇ. This
is a constrained nonlinear problem. We solve it in an iterative way. First, we fix ˇ
at 3800, and search for f f
0 and 1 in positive ranges of 0 and 1 within their
95 % confidence intervals in order to maximize the log-likelihood function. Then,
B
Ck can be obtained for B D Œf f
0 ; 1 ; 3800 by minimizing (12). Second, with
0 and 1 obtained from the first step, we update our estimate of ˇ to ˇ . By
T
iterating these two steps, we have D 0 ; 1 ; ˇ . Then, the robust design can
be obtained for . We iterate these two steps, until either 0 ; 1 or ˇ remains
unchanged or the difference between its values obtained from the current step and
that from the previous step is sufficiently small within a pre-specified range. Finally,
we can obtain the optimal 1 and 2 based on the most updated estimates for .
We denote R Ck as the robust design obtained for three-step-stress ALT under the
given constraint Ck , where k D 1; ; 5. We define the efficiency of R Ck relative to
B
Ck in terms of AVAR as
AVAR B Ck ; B
effk .R; B/ D : (18)
AVAR .R Ck ; /
Our resulting robust designs, R Ck , for both stages and their relative efficiencies are
presented in Table 2.
The example above indicates that our two-stage design procedure has provided
significant efficiency gains. The average efficiency of the optimal robust designs is
as 4.57 times as that of their corresponding benchmarks. The minimum gain is 65 %
for Scenario C5 . At a maximum, our resulting two-stage design for Scenario C4 can
be as 12.46 times efficient as its benchmark (Please see the value of effk .R; B/ in
the second last row of Table 2). Compared C1 to C5 , there only 10 required average
failures less, but in result, the efficiency gain has increased from 65 % to 107 %.
Among the five scenarios considered in the example, the optimal robust designs
obtained at the second stage for both C1 and C5 remains the same as their
corresponding benchmarks attained at the first stage. We note that when the
MNF3 is much lower than MNF1 , the constraint has limited the design space for
further minimizing the estimation variance at the second stage. For other scenarios,
the optimal robust designs obtained after two stages are far different from their
benchmarks. Both stress-changing times are much shorter for the optimal robust
designs than its benchmarks. Consequently, the testing stress levels are increased
more quickly and more failures are observed under higher stress levels, so that the
variability in resulting estimation shall be reduced.
In general, we would recommend that for designing a multiple step-stress ALT,
the experimenters should consider as less restriction on the total number of failures
as possible, at the same time, keep the number of expected failures at each stress
level as even as they can so that the estimation quality can be further improved.
594 X. Xu and W.Y. Huang
References
1. Bai, D.S., Kim, M.S.: Optimum simple step-stress accelerated life tests for Weibull distribution
and type-I censoring. Nav. Res. Logist. 40, 193–210 (1993)
2. Bai, D.S., Kim, M.S., Lee, S.H.: Optimum simple step-stress accelerated life tests with
censoring. IEEE Trans. Reliab. 38, 528–532 (1989)
3. Elsayed, E.A., Zhang, H.: Design of optimum simple step-stress accelerated life testing plans.
In: Proceedings of the 2nd International IE Conference, Riyadh, Kingdom of Soudi Arabia
(2005)
4. Fang, Z., Wiens, D.P.: Robust extrapolation designs and weights for biased regression models
with heteroscedastic errors. Can. J. Stat. 27, 751–770 (1999)
5. Fard, N., Li, C.: Optimal simple step stress accelerated life test design for reliability prediction.
J. Stat. Plan. Inference 139, 1799–1808 (2009)
6. Hunt, S., Xu, X.: Optimal design for accelerated life testing with simple step-stress plans. Int.
J. Performability Eng. 8, 575–579 (2012)
7. Jiao, L.: Optimal Allocations of Stress Levels and Test Units in Accelerated Life Tests. Rutgers
University, New Brunswick (2001)
8. Ma, H., Meeker, W.Q.: Optimum step-stress accelerated life test plans for log-location-scale
distributions. Nav. Res. Logist. 55, 551–562 (2008)
9. Miller, R., Nelson, W.: Optimum simple step-stress plans for accelerated life testing. IEEE
Trans. Reliab. 32, 59–65 (1983)
10. Pascual, F.G.: Accelerated life test plans robust to misspecification of the stress-life relation-
ship. Technometrics 48, 11–25 (2006)
11. White, H.: Maximum likelihood estimation of misspecified models. Econometrica 50, 1–25
(1982)
12. Wiens, D.P., Xu, X.: Robust designs for one-point extrapolation. J. Stat. Plan. Inference 138,
1339–1357 (2008)
Detecting Coalition Frauds
in Online-Advertising
Abstract Online advertising becomes to play a major role in the global advertising
industry. Meanwhile, since publishers have strong incentives to maximize the
number of views, clicks, and conversions on advertisements, the publisher fraud
is a severer problem for advertisers and worth the endeavor to detect and prevent
them. By reviewing the literature of the frauds in online advertising, the frauds
can be categorized as non-coalition attacks and coalition attacks in general. In this
paper, we attempt to mitigate the problem of coalition frauds by proposing a new
hybrid detecting approach that identifies the coalition frauds from both economic
and traffic perspectives. Moreover, we propose an algorithm to detect the coalition
frauds efficiently with an inductive style and greedy strategy.
1 Introduction
With accordance to a recent report [21], online advertisements in 2014 account for
nearly one-quarter of the global advertising spend. Figure 1 depicts the general
process of the online advertising. The Internet publisher, the advertiser, and the
ad intermediaries (i.e. ad exchangers) are the three key participants in the online
advertising setting. The publishers make money through hosting websites with
advertisements, and advertisers pay for having their ads displayed on publishers’
websites. Ad-exchangers such as Google’s DoubleClick [4] and Yahoo!’s Right-
Media [18] are involved as brokers who pair the publishers’ ad requests with the
most profitable advertiser bid for the request. Since publishers earn revenue based
on the number of views, clicks, and actions that are generated by the advertisement,
publishers have strong incentives to maximize those numbers. While publishers
can apply legitimate methods to attract more traffic to their websites, dishonest
publishers attempt to generate invalid traffic to make more money. In particular,
invalid (fraudulent) traffic is identified as impressions, clicks, or even actions that are
not the result of genuine user interest [1]. The publisher fraud is a severer problem
for advertiser and worth the endeavor to detect and prevent them.
Advertisers Publishers
Intermediaries
One of the challenges for detecting the online advertising frauds is to determine
characteristics that signal the potential of fraudulent traffics. Currently, neither
practical systems nor academic research offer a standard mechanism for the fraud
detection in online advertising. Moreover, although using data analysis techniques is
an evident option, existing solutions are far from mature and there are many research
gaps need to be tackled. Among various attacks in online advertising, coalition
frauds are a type of attacks that become more and more prevalent nowadays. Since
such attacks can be launched with lower cost while still difficult to be identified. In
this paper, we attempt to mitigate the problem of coalition frauds by proposing a
new detecting algorithm [7].
The paper is structured as follows. Section 2 reviews the related works of
frauds in online advertising. In Sect. 3, we propose a hybrid detection approach for
coalition frauds. We also discuss the effectiveness and efficiency of the proposed
approach. We conclude and discuss the future work in Sect. 4.
publishers can use various of different mechanisms to commit frauds. For example,
impression stuffing and keywords stuffing attacks inflate the number of impressions.
Fraudulent publishers put excessive numbers of banners on their pages to get a large
number of impressions for each page view. In particular, half a dozen or even more
of different ad banners could present on a single page [5]. Sometimes, those banners
are even stacked in front of each other, which make those back banners invisible.
Moreover, to drive higher traffic to the page than it deserves, fraudsters invisibly
use some high-value advertising keywords (e.g. in hidden HTML tags, or by text
with the same color as the backgrounds). Furthermore, the publisher can also inflate
the number of clicks with coercion attacks and force browser attacks. With coercion
attacks, the content of ads are made invisible or modified to something more relevant
to the user, and the users are instruct to perform clicks unknowingly on ads. The
fraudulent publisher inserts additional HTML code that force the browser to click
on the ads. With such client-side script, the users generate request implicitly and
click on the ads stealthily when they loading the webpages.
The classical way to detect publisher frauds is achieved by monitoring the perfor-
mance of advertisements on sites. In other words, fraudulent traffic are identified
as low quality traffic. However, such approach can be too aggressive that even
legitimate traffic can be discarded. In addition, the malicious intents of fraudsters
are not identified directly. Since the fraudsters can control the performance of
advertisements loaded on their sites, they can easily fool the detection tools by
mimicking validity metrics to avoid being detected.
To complement the classical traffic monitoring approach, more advanced tech-
niques are proposed and applied to identify the pattern of fraudulent behaviors.
More specifically, a classification of the fraudulent behaviours help to recognize
a more generic pattern of frauds. A related work with a detailed discussion on the
classification of online advertising frauds can be found in [14]. As aforementioned,
fraudulent publishers use machines and sites to deploy an attack. Regardless
of different attacking mechanisms (e.g. coercion, robots, etc.), the premise for
data analysis approaches to detect publisher frauds is to identify the correlations
between the attacking machines and the corresponding sites. There are two types of
relationships between fraudulent machines and sites. In an one-to-one relationship,
fraudsters only control their own machines and sites. On the other hand, in a many-
to-many relationship, a group of fraudsters share their resources to perform the
attacks. Consequently, the online advertising frauds can be categorized as two types:
the former type of attacks is called the non-coalition attack, while the latter type is
called the coalition attack.
With respect to the above classification, the key to identify fraudulent traffic
is to identify the association between fraudulent websites and machines. More
sophisticated attacks blur the strong correlation between the fraudulent sites and
598 Q. Zhang and W. Feng
In the literature, various countermeasures have been explored to mitigate the frauds
problem in online advertising. In [3], an alternative pricing model is proposed to
remove the incentive of fraud. However, the approach modifies current pricing
model, which requires a global effort and is not likely to happen in the near future.
Preventing and detection are two general measurements to mitigate fraudulent
problems. In the context of online advertising, it is important to terminate the
identified publishers from re-join the ad-networks. A typical preventing approach
is to create a block list which specifies the signals that indicate fraudulent activities.
By looking at different characteristics of HTTP requests (e.g. IP address, publisher
ID, Customers ID), a potential fraudulent traffic might be filtered based on the
maintained block list. One key challenge of the preventing approach is to determine
characteristics that signal the potential of fraudulent traffics. The signal is consid-
ered as confidential information for the companies that run the ad network.
Detection techniques found in both practice and academic research can be
generally categorized as positive and active detection. The active detection means
that additional interactions are conducted with the web and/or users to verify the
validity of the traffic. Y. Peng et al. [16] proposed an active detection technique,
which combats malicious scripts clickbots by creating and validating an impression-
click identifier. Another example of active detection is using bluff ads [6]. The
strategy of bluff ads is to serve some ads that are purposely uninviting, and test the
legitimacy of the individual click. However, the active detection is usually limited to
address a specific type of fraud, which leads to an arms race between the fraudulent
publishers and the detectors. On the other hand, passive detection mainly depends
on applying data analysis techniques to the aggregate number of traffic logs.
Data mining techniques can be used for both signature-based detection (e.g. [9]),
and anomaly-base detection (e.g. [19]). While signature-based detection works well
for known malicious patterns, anomaly-based detection is more effective to identify
Detecting Coalition Frauds in Online-Advertising 599
fraudsters with updated types of attacks. Related research about passive fraud
detection mainly focuses on developing different algorithms to recognize a specific
behaviour pattern of attacks. For example, the pattern of duplicate clicks within a
short period of time from the same visitor is recognized as one elementary attack.
Algorithms about finding duplicates in data streams such as [12, 19] are applied to
detect such an attack and its variation. Moreover, different features are proposed to
distinguish the fraudulent behaviour patterns from normal behaviours. In [19], the
number of users sharing the source IP is used as a metric to train the normal pattern
of behaviors. Attacks are detected as an anomalous deviation from the expected
publishers’ IP size distribution. Recent efforts [9, 10, 17] have also been done by
using classification algorithms based on multiple features to classify the valid and
invalid traffic. For the coalition attacks, few published work [8, 13, 15, 20] have
proposed algorithms to combat them. The techniques in [13, 15, 20] mainly based
on the similarity among sites to identify the coalitions,while [8] aims to identify the
coalitions from the economic incentive of attackers. We articulate the similarity-
based and the gain-based metrics in detail later and adopt both of them in our
detection technique. A summary of existing detection techniques in the literature
is given in Table 1.
In order to identify the coalition groups, we can consider the problem from the
economic perspective. In particular, there are two observations for the coalition
600 Q. Zhang and W. Feng
groups: (1) the coalition groups inherently have higher ROI (return of investment)
than normal, (2) the expect gain to each member increases while more fraudsters
are involved.
The ratio of gain and cost can be used as an estimator of ROI. Therefore, the
metric relates to the first observation can be expressed by
W.g/
GPR.g/ D GPR ; (1)
R.g/
where W.g/ is the gain derived by the members of the coalition g, R.g/ denotes the
amount of the resources of the coalition, and GPR is a predefined threshold of the
minimum GPR (Gain per Resource) for coalition groups.
A coalition has a high value of GPR, but not vice versa. In other words, a coalition
group with some normal publishers or visitors may still have a high value of GPR.
To capture the property of the second observation, we use the definition of GPR
group. Formally, we define g is a GPR-GPOUP iff 8.g j g0 g W GPR.g0 / <
GPR.g/ /, where g0 denotes any subgroup of g. Therefore, a coalition group can be
defined in terms of GPR as follows:
Definition 1 (gain-based) A group of publishers and visitors, denoted as g, is
called a coalition iff GPR.g/ GPR and g is GPR group. Moreover, a coalition
is a maximal coalition iff : 9.g00 j g g00 W g00 is a coalition /.
As another key character of coalition attacks, the traffic to an attacker’s sites are
from a relatively larger set of attacking machines that shared by many attackers. To
capture the correlations between publishers, we can measure the traffic similarity
among them. Several general similarity measurements can be applied in our context
to capture the similarity metric.
Since the number of repeat visitors is an important indicator for detecting frauds
in online advertising, we use a bag model to denote the visitors to a publisher. Unlike
sets, elements can be duplicated in bags. Let Bp1 and Bp2 denote the bags of visitors
to the publishers p1 and p2 , respectively. The pairs of sites p1 and p2 have similar
traffic iff
jBp1 u Bp2 j
Similarity. p1 ; p1 / D SIM ; (2)
jBp1 t Bp2 j
where u and t denote the intersection and union of bags. We use a pair .n; e/ to
represent an element in a bag, where n indicates how many times the e repeats in
the bag. The definitions of u and t are given as follows:
The lhs of the Equation (2) is a variant of Jaccard coefficient [2] capturing
the traffic similarity of Bp1 and Bp2 , and SIM on the rhs denotes the minimum
threshold of similarity for legitimate pairs of sites. Since two legitimate sites only
have negligible similarity, it is unlikely that every pair of sites in a random group is
similar. In other terms, the coalition attackers form a group that is pair-wise similar.
Formally, the definition of coalition groups with regard to the traffic similarity is
given as follows:
Definition 2 (similarity-based) A group of publishers g is a coalition group iff
8.p1 ; p2 j .p1 2 g/ ^ .p2 2 g/ ^ .p1 ¤ p2 / W Similarity.p1 ; p2 / SIM /
The aforementioned two approaches capture the key characters of coalition attacks
from different perspectives. The gain-based approach calculates the economic gain
of each group (see Definition 1), while the similarity based approach considers the
traffic similarity within each group (see Definition 2). The reader can refer to [8]
and [15] respectively for more details of these two approaches. However, a main
challenge for both approaches is to define the proper threshold (see Equations 1
and 2). For example, some legitimate popular sites may have equal or even greater
GPR than the coalition groups, and legitimate sites with similar traffic may be falsely
identified as fraudsters. Therefore, to increase the confidence for detecting coalition
attacks, it would be beneficial to consider the characters from both perspectives
and combine both measurements. While the GPR is a measurement for a group of
entities, the similarity is a measurement only for a pair of entities. In order to get
much more confidence on the signal of coalitions, we further give the definition of
coalitions as follows:
Definition 3 (hybrid) Let g denote a subset of all publishers, we say g is a coalition
group iff
With accordance to the above definition of coalition frauds, we have three strategies
to detect such coalitions. The first strategy is to detect the GPR groups that satisfy
the GPR properties and their GPR value are greater than GPR . Then we verify the
pair-wise similarity property for each identified group. The second strategy is to
calculate the similarity for all pairs and identify all pair-wised similar groups. For
each identified group, we further verify the GPR properties of the group and its
GPR value. The third strategy is to dynamically check the two properties while
identifying the coalition groups. Such strategy will be the most efficient way, which
is critical when dealing with big data. Common advanced analytics disciplines
such as statistical analysis, data mining, and predictive analytics all can be used
602 Q. Zhang and W. Feng
to deal with big data. Machine learning algorithms (e.g. neural network, decision
tree) is especially useful for the analysis of big data, since it can explore the
hidden characters with less reliance on human direction. On the other hand, the key
neck-bottle of using machine learning algorithms in our context is the demand of
first extracting related features for all potential groups, which is a computationally
expensive process. However, the adaption of the third strategy is not straightforward.
We should validate that the derived detection algorithm can correctly identify the
frauds corresponding to the definition given in the previous section.
Given a group of publishers and visitors g, let Gclick .g/ and Gsimilarity .g/ denote
the click graph and the similarity graph associated with g, respectively. Before
giving the detection algorithm, we first define two key properties used in the
algorithm as follows:
• GPR-Core property: g is a GPR group H)
8.g0 j Gclick .g0 / is a connected subgraph of Gclick .g/ W g’ is a GPR group /
• similar-clique property: g is a similar clique H)
8.g0 j Gsimilarity .g0 / is a subgraph of Gsimilarity .g/ W g’ is a similar clique /
With accordance to the definition of coalition frauds given in Definition 3, we
have the following proposition:
Proposition 1 A group g is a coalition group iff GPR.g/ GPR and g satisfies
both the CPR-Core property and the similar-clique property.
Due to the limit of space, we omit the proof of the proposition. Algorithm 1
depicts the pseudocode to detect coalition frauds with the hybrid approach. To
combine the aforementioned two criteria dynamically, we apply an inductive style
and greedy strategy in the algorithm, which can dramatically prune the search space
and improve the efficiency of the detection technique. It can be proved that the
GPR-Core and the similar-clique properties are anti-monotone. In other words, the
GPR-Core and the similar-clique properties (used in Line 5 and 6, respectively) hold
with the induction. Consequently, Proposition 1 indicates that the given algorithm
can correctly detect the coalition frauds in our context.
Another key challenge for both gain-based and similarity-based approaches is the
complexity of the algorithm. Given the set of all publishers as P and visitors as V, the
GPR approach require calculating the GPR for all potential subgroups of G, which
complexity is exponential to jPj C jVj. On the other hand, the similarity approach
requires to identify the pairwise similar group which is equivalent to discovering the
maximal cliques in the sites’ similarity graph. In general, finding maximal cliques
in a graph also has exponential complexity. The problem of detecting coalitions is
NP-hard in general. In practice, the problem of detection frauds in online advertising
usually involves processing large sets of data. To further improve the efficiency of
the detection algorithm, we adopt a MapReduce [11] computing model which can
facilitate the parallel, distributed computing on multiple clusters. The lines of 1, 2, 4,
5, 6 and 11 in the pseudocode of Algorithm 1 are implemented with the MapReduce
paradigm. However, the implementation of the algorithm is out the scope of this
paper.
a b c
V1 P1 2
P1 P1 V1 V1
V2 P2 V2 P2 2
P2 V4 V2
P3 V3 2
P3 V3 P3 V3
v4 denote the visitors. The case (a) is an example of coalition attacks that the three
publishers share the resources. The case (b) and case (c) are two examples that the
resources are not really shared by those publishers. However, the two latter cases
are easy to be mis-identified since they show similar traffic metrics as coalition
attacks. Table 2 shows the results of checking the three cases with different detection
techniques. To identify the coalition attack of case (a), the parameter GPR should
be at least 1, and the parameter SIM should be equal to or less than 13 . However,
the case (b) is falsely identified as coalition frauds with SIM D 13 , while the case
(c) is falsely identified with GPR D 1. But with the proposed hybrid approach,
we can avoid such positive false alarms while remaining the precision for detecting
coalition frauds.
In this paper, we adapt a hybrid approach to identify the coalition frauds from two
distinguish perspectives. To detect the coalition groups, we proposed an algorithm
with inductive styles and greedy strategy, and discuss the correctness and efficiency
of the algorithm. Finally, we evaluate the effectiveness of the proposed detection
technique by applying it to several trial cases.
As further work, we can apply the proposed technique to different data sets to
further evaluate the algorithm. Since there are no benchmark data sets for coalition
frauds in online advertising, we can generate synthetic data sets by simulating the
traffic of both normal and fraudulent traffics. We also can apply the algorithm to
industrial data sets and validate the performance of the algorithm by using third
party services that can label the traffic logs. Moreover, we can improve the precision
of our hybrid detection technique by exploring the coalition frauds problems from
more other perspectives and integrating them to our detection algorithm.
Acknowledgements The authors thank the referee for some helpful comments. The project was
supported by the Mathematics of Information Technology and Complex Systems (MITACS) of
Canada and the EQ Advertising Group Ltd.
Detecting Coalition Frauds in Online-Advertising 605
References
1 Introduction
Circle inversion was introduced in Apollonius of Pregas’ book, Plane Loci, and has
drawn interest in geometry. Mandelbrot introduced the early concepts of fractals in
the 1970s and, in The Fractal Geometry of Nature, Mandelbrot discusses successive
inversion with respect to a family of M circles. The literature applies the chaos game
to circle inversion maps [2, 4] to explore the graphical aspect, while casually stating
that there are contraction maps involved. As we will see in Sect. 2, a circle inversion
map is only contractive on part of its domain, making clear the need for care. In this
paper, we build the needed rigorous mathematical framework. In Sect. 2, we present
some background concepts on circle inversion maps. In Sect. 3, we establish some
contractivity results for a system of two circle inversion maps, which we extend in
Sect. 4 to a general system of non-touching circles. In Sect. 4, we also establish the
existence of a unique set attractor to the system of set-valued circle inversion maps.
Approximations of this fractal set can be drawn using the chaos game; we provide
an example in Sect. 5. We can use the already established content to now build a
2 Inversion in a Circle
Let C 2 R2 be a solid circle with centre o and boundary @C; then the following
property is true. e
jjri w.t/jj2 1
Ti .x/ D Ti .ari w.t/ C oi / D oi C e 2
.ari w.t// D oi C ri w.t/ (5)
e e e e jjari w.t/jj e e a e
e
Thus, we see clearly why Ti is called a circle inversion map: under the action of Ti ,
the radial scaling factor ai > 0 becomes a radial scaling factor of a1i .
Proof (i), (ii) and (iii) follow from Lemma 1. (iv), (v) and (vi) follow by iterating
Lemma 1 a second time.
Now, given two non-touching circles C1 and C2 in R2 with centres o1 and o2 ,
respectively, define .Ci /int , .Ci /ext , @Ci , Ti and projection maps ˘i . Let e e
Ro1 o2 .x; y/ D portion of the open line segment between o1 and o2 from x to y
ee e e e e e e
Ro1 o2 .oi ; bi / D Ro1 o2 .o1 ; o2 / \ Ci
ee e e ee e e
Ro1 o2 .b1 ; b2 / D Ro1 o2 .o1 ; o2 /nfRo1 o2 .oi ; bi /; i D 1; 2g
ee e e ee e e ee e e
Lemma 3 For i; j 2 1; 2 with i ¤ j, and the preceding set up, we have
i. Ti W Roi oj .oj ; bi / ! Roi oj .oi ; bi /
ii. Ti W Reee e ee e e
oi oj .oi ; bi / ! Roi oj .oj ; bi /
ee e e ee e e
Proof Both (i) and (ii) are easily proved using Lemmas 2(ii) and 2(i), respectively.
It is worth noting that in Lemma 3, the centres of the circles need to special
consideration.
Theorem 1 Let C1 and C2 be two circles in R2 with centres o1 , o2 , respectively.
Then there exists a c 2 Œ0; 1/ such that, e e
Proof Introduce the x-axis so that Ro1 o2 .o2 ; b2 / lies along it. This means that x1 , b1
and o1 correspond to numbers alongethe e e we think of T as mapping numbers
e x-axis; e e
1
e
to numbers on the axis. Since x1 > o1 ” T1 .x1 / > o1 , the circle inversion map
along our x-axis is
.b1 o1 /2
T1 .x1 / D o1 C
.x1 o1 /
Now,
0 .b1 o1 /2 0 .b1 o1 /2
T1 .x1 / D 2
H) T1 .x1 /
.x1 o1 / .b2 o1 /2
Returning to the vector notation, we have proved there exists a c 2 Œ0; 1/ such that,
We present the following result in R2 with the understanding that this may be a two
dimensional subspace of a higher dimensional setting. In this result we consider a
collection of non-touching circles in the plane.
Lemma 4 Given a circle C1 with centre o1 , radii r1 and inversion map T1 ,
e
1
d.T1 .x1 /; T1 .x2 // D d.x1 ; x2 /; 8x1 ; x2 2 R2 n fo1 g;
e e a1 a2 e e e e e
ˇ ˇ
ˇ 1 1 ˇ 1
ˇ
Dˇ r1 ˇˇ D r1 ja2 a1 j
a1 a2 a1 a2
1
D d.x1 ; x2 /
a1 a2 e e
Case 2: x1 ; x2 and o1 are not on the same radial ray. Once again the boundary @C1
canebe parametrized
e e as in (4). There exists t1 ; t2 2 Œ0; 2, t2 > t1 , without
loss of generality, such that
1
T1 .xj / D o1 C r1 w.tj /
e e aj e
1 1 2 2
d2 .T1 .x1 /; T1 .x2 // D 2 r12 C 2 r12 r cos.t2 t1 /
e e a1 a2 a1 a2 1
1
D d2 .x1 ; x2 /;
a21 a22 e e
which upon taking the square root gives the desired result.
We will use Lemma 4 and the following definition when establishing the
subsequent contractivity result.
Definition 3 Given a collection of non-touching circles Ci , i D 1; : : : ; N, with
centres oi and radii ri , for x D ai ri wi .t/ C oi 2 R2 , ai > 0, t 2 Œ0; 2, we define
e e e e
ai;min D min fai g > 1
x2Cj ;j¤i
e
corresponding to the radial scaling of the closest point to oi in all other circles Cj ,
j ¤ i. e
Circle Inversion Fractals 615
1 1
d.Ti .x1 /; Ti .x2 // D d.x1 ; x2 / 2 d.x1 ; x2 / D c d.x1 ; x2 /
e e a1 a2 e e ai;min e e e e
Ti W X ! X
by
(
Ti .x/ if x 2 Cj ; j ¤ i
T i .x/ D e e
e x if x 2 Ci
e e
Theorem 3 T i W X ! X satisfies
.i/ d.T i .x1 /; T i .x2 // c d.x1 ; x2 / for some c 2 Œ0; 1/; 8x1 2 Cj ; x2 2 Ck ; j; k ¤ i
e e e e e e
.ii/ d.T i .x1 /; T i .x2 // D d.x1 ; x2 / 8x1 ; x2 2 Ci
e e e e e e
.iii/ d.T i .x1 /; T i .x2 // c d.x1 ; x2 / for some c 2 Œ0; 1/; 8x1 2 Ci ; 8x2 2 Cj ; j ¤ i
e e e e e e
Proof (i) follows from Theorem 2, (ii) follows immediately since T i is the identity
map in this case. For (iii), with x1 2 Ci and x2 2 Cj , we have a2 > 1 > a1 0, and,
for values t1 ; t2 2 Œ0; 2, e e
d2 .x1 ; x2 / D ri2 a21 C a22 2a1 a2 cos.t2 t1 / ; (7)
e e
616 B. Boreland and H. Kunze
using (6), and with some expanding and factoring we are left with
r2
d2 .T i .x1 /; T i .x2 // D i2 a22 a21 C 1 2a1 a2 cos.t2 t1 / (8)
e e a2
The bracketed expression in (8) is less than or equal to the bracketed expression
in (7) provided that
f .y; z/ D y yz C z:
If we show that f .y; z/ 1 for y 2 Œ0; 1/ and z > 1, then (9) holds. We write
and we see that f .y; z/ > 1 for y < 1 and z > 1, proving the result. This means that
the statement in case (iii) of our theorem holds with c D a12 .
Now, using Theorem 3 we can prove the following contractivity result involving
compositions of (non-touching) circle inversion maps.
Theorem 4 For i ¤ j, T i ı T j : X ! X is contractive:
TO i .A/ D fT i .x/; 8x 2 Ag
e e
Circle Inversion Fractals 617
The Hausdorff distance between the non-empty compact sets A and B is defined
by
Let H .X/ denote the set of all non-empty compact subsets of X. It is well known
that .H .X/; dH / is complete.
Theorem 5 For i ¤ j,
1. TO i ı TO j W H .X/ ! H .X/
2. TO i ı TO j is contractive on .H .X/; dH /
Proof The first claim follows because T i ı T j W H .X/ ! H .X/. The proof relies
on the continuity of the map ([1], Lemma 2, page 80). By Theorem 4, we can denote
by cij the contractivity factor with respect to d of T i ı T j . For A; B 2 H .X/,
We reach our final theorem, which establishes the contractivity of the union of
the maps in Theorem 5.
618 B. Boreland and H. Kunze
O S
N
Theorem 6 For A 2 H .X/, define T.A/ D .TOi ı TO j /.A/. Then
i;jD1
i¤j
1. TO W H .X/ ! H .X/
2. TO is contractive on .H .X/; dH /
Proof The first claim follows from Theorem 5 because the union is finite. For the
second claim we have
0 1
B[N [
N
C
O
dH .T.A/; O
T.B// D dH B
@ . O ı TO /.A/;
T i j .TO i ı TO j /.B/C
A
i;jD1 i;jD1
i¤j i¤j
D c dH .A; B/
Finally, by Theorem 6 and Banach’s Fixed Point Theorem we can conclude that
O satisfying
there exists a unique fixed point A 2 H .X/, the set attractor of T,
O /DA
T.A
Following Sect. 3, we can use the Chaos Game to plot approximations of the set
attractor A of T. O Choose an initial point x 2 X. With equal probability select one
0
e
of the composition maps T i ı T j , i ¤ j. Apply the map to x0 to produce x1 2 X (in Ci ,
of course). Continue randomly selecting composition maps e to produceethe sequence
1
fxn gnD0 . If we start with a point on A , all points are on A . In practice, we stop after
e large number of iterations, dependent upon the resolution of the plot we are
some
producing.
An example of a fractal generated by a five-circle system is given in Fig. 1.
Circle Inversion Fractals 619
Fig. 1 Five circles used to generate a set attractor with 10,000 iterations of the chaos game
References
Andreas-Stephan Elsenhans
1 Introduction
Given a polynomial f with rational coefficients, one can ask for the Galois group
of the splitting field (viewed as an extension of the rationals). This is a classical
problem in algorithmic algebra. The first algorithm to solve it was described by van
der Waerden in his famous book on algebra [12]. Later, more practical algorithms
were given [2, Sec. 6.3].
A crucial point on the above question is the way one wants to present the
result. One could give the Galois group as an abstract group. But this would be
an incomplete answer, as this does not give the action on the splitting field. On the
other hand, describing the action on the splitting field would require to construct it.
And this would be impractically large in many cases.
A good compromise is to give complex or p-adic root approximations and the
action of the Galois group on them. This is the starting point of the Stauduhar
method [11]. The approach generalizes to any global field.
Several people implemented Galois group algorithms that used precomputed tables
with all the combinatorial data necessary for the computation. Most notable is the
implementation of K. Geißler that covered irreducible polynomials up to degree
23 [7].
The first degree independent implementation that could also handle reducible
polynomials was given by C. Fieker and J. Klüners [6]. However, this implementa-
tion ran out of memory or needed hours of CPU time with several polynomials of
degree 30.
Recently, the author worked on bottlenecks of this package. The aim of this
article is to give a summary of what is now possible.
2 Stauduhar’s Step
5. Intersect all the subgroups found that contain the Galois group.
6. Redo all the steps above with the intersection as starting group.
Remark 1 There are various problems that have to be solved to make the above
approach practical.
1. First, we need a good strategy to pick an initial group that is as small as possible.
One approach for this is the use of subfields [7, Chap. 5.1]. In case of a reducible
polynomial, one can compute the Galois group of each factor and take the direct
product as a starting group [6].
2. In magma, the computation of maximal subgroups is done using the Cannon-
Holt-algorithm [1].
3. How can we prove the rationality of .I/.r1 ; : : : ; rn / when we only work with
approximations of the roots? One way to do this is described in [7, Chap. 3.3].
This requires to work with p-adic precisions that are proportional to the index of
the subgroup. This is practical only when the index is small.
However, it is possible to work with a moderate p-adic precision and derive a
heuristic result that has to be proven later.
Let a monic polynomial f 2 ŒT be given and a prime p that does not divide its
discriminant. It is well known that the local Galois group of the p-adic splitting field
of f is a subgroup of the Galois group of the global splitting field.
The local Galois group is generated by the Frobenius element. When we take the
degrees of the irreducible factors of the reduction of f modulo p, we get the cycle
type of the Frobenius element.
Doing this for several primes, we derive some information about the Galois group
that can be used as follows:
1. If one gets sufficiently many different cycle types then one can prove that the
Galois group is the full symmetric group Sn . More precisely, in the case that
f 2 ŒT is irreducible, n is at least 8 and one has a cycle of prime length l with
n
2
< l < n 2, the alternating group is contained in the Galois group. If, in
addition, an odd permutation is detected then the Galois group is Sn .
2. Before we apply Stauduhar’s step to a subgroup, we can check that it contains all
the cycle types found.
624 A.-S. Elsenhans
A more sophisticated way to use the local Galois group is provided by the so called
short cosets [7, Chap. 5.2]. The idea behind them is that, when working with p-adic
root approximations, the Frobenius Frobp is known as an explicit permutation of the
roots.
Thus, a necessary condition for U to contain the Galois group is that it contains
the Frobenius permutation. We call the remaining coset representatives
the short cosets. They can be computed without listing all the representatives G==U
([7, Algorithmus 5.12], [4]).
In many cases, the number of short cosets is very small. A naive explanation for
this is the following:
1 /
Frobp 2 U ” Frob.
p 2U
1
Assuming the conjugates Frob. p
/
to be equidistributed in G, the probability to hit
1
U is ŒGWU . Thus, for large index subgroups this number is very small. Of course, this
is just a very coarse heuristic.
4 The Invariants
To make the Stauduhar method run, we need a relative invariant for each pair of
groups, the algorithm may run into. As there are 25,000 transitive permutation
groups in degree 24, it is not practical to store them in a database. We have to
compute them at run time. A more detailed description of the construction of the
invariants if given in [3, 5–7]. The main tool for this is the usage of block systems.
Definition 3 A partition B1 ; : : : ; Bk of f1; : : : ; ng is called a system of blocks for a
transitive subgroup G Sn if
Bi 2 fB1 ; : : : ; Bk g
for all 2 G.
Theorem 2 Let U be maximal in G Sn and B D fB1 ; : : : ; Bk g be a block system
for U with B1 D f1; : : : ; jg.
P P
1. If B if not a block system for G then B2B . i2B Xi /2 is a relative invariant.
2. If B is a block system of G, denote by 'B the action of G on the blocks.
Galois Groups 625
P P
• If 'B .U/ 6D 'B .G/ then I0 . i2B1 Xi ; : : : ; i2Bk Xi / is a relative invariant.
Here, I0 is a relative invariant for 'B .U/ P'B .G/.
• If StabU .B1 /jB1 ¤ StabG .B1 /jB1 then 2U== StabU .B1 / I0 .X1 ; ::; Xj / is a
relative invariant. Here, I0 is a relative invariant for StabU .B1 /jB1
StabG .B1 /jB1 .
A proof of this is given in [7, Satz 6.14, 6.16].
If these constructions do not apply then we have to do a deeper inspection of the
structure of the permutation groups. Here are a few examples:
Example 1
1. Consider the groups
H D f.1 ; : : : ; 10 / 2 A10 5367
3 j 1 10 D idg Ì S10 D T30
5407
A3 o S10 D T30 D G:
10
Y
I WD X3i2 C 3 X3i1 C 32 X3i :
iD1
5396 5421
2. The above example has the extension T30 T30 by adding the generator
D .1 2/.4 5/ .28 29/ to both groups.
A relative invariant is given by I C I . In invariant theory, this construction of
an invariant out of an invariant of a subgroup is known as the Reynolds operator.
3. Consider the groups
4831
G D T30 D .=2/15 Ì GL4 .2 / D S2 o GL4 .2 / S2 o A15
as a sum of 15 products.
Experiment 1 To get an overview of the complexity of the invariants that may be
used by our code, we use the database of transitive groups up to degree 30 [8] and
apply our invariant constructions to all the maximal subgroups. We use the notation
Tkn for the k-th group of degree n in the database. The construction of all these
invariants took about 1 h.
We use the cost function
Experiment 2 Using the database of polynomials [9], we can pick 1954 polynomi-
als in degree 16 and 1117 polynomials in degree 20. One for each transitive group
of degree 16 (resp. 20).
The total running time to get all the Galois groups for the degree 16 polynomials
is 1094 s. The time for all the degree 20 polynomials is 907 s. The slowest examples
are polynomials with large coefficients. They took 5 (resp. 13) s. This is explained
by the larger p-adic precision that has to be used.
A slow example with small coefficients is P455 WD x16 11x8 C 9. The Galois
group of this polynomial is T45516 . It takes 2.2 s to compute it. This is explained by
the fact that our method has to inspect 219 conjugacy classes of subgroups.
The computation was done on one core of an Intel i7-3770 processor running at
3.40 GHz.
The uses of heuristic p-adic precision and the short cosets result in an unproven
Galois group. The first proof algorithm was described in [7, Chap. 5.3]. Our new
proof algorithm is a slight variation.
The idea to confirm the results is that the Galois group predicts the factorizations
of resolvent polynomials. We can compute these resolvents and check that the
prediction is in fact correct. This proves that the Galois group is contained in the
stabilizer of the factorization pattern. These set stabilizers can be computed in
magma. This results in a subgroup of Sn that is proven to contain the Galois group.
We repeat this with several resolvent polynomials until we run into a contradiction
or confirm the heuristic result.
6 Conclusion
The Galois group package of magma (version 2.21) provides a degree independent
implementation of the Stauduhar method. It can compute the Galois group of a
rational degree 30 polynomial with moderate coefficient size in a few seconds on a
modern standard PC. The initial result is heuristic. But, a proof algorithm is available
as well.
References
1. Cannon, J., Holt, D.: Computing maximal subgroups of finite groups. J. Symb. Comput. 37,
589–609 (2004)
2. Cohen, H.: A Course in Computational Algebraic Number Theory. Springer, Berlin/New York
(1993)
628 A.-S. Elsenhans
3. Elsenhans, A.-S.: Invariants for the computation of intransitive and transitive Galois groups. J.
Symb. Comput. 47, 315–326 (2012)
4. Elsenhans, A.-S.: A note on short cosets. Exp. Math. 23, 411–413 (2014)
5. Elsenhans, A.-S.: Improved methods for the construction of relative invariants for permutation
groups (preprint, 2015)
6. Fieker, C., Klüners J.: Computation of Galois groups of rational polynomials. LMS J. Comput.
Math. 17, 141–158 (2014)
7. Geißler, K.: Berechnung von Galoisgruppen über Zahl- und Funktionenkörpern. Dissertation,
Berlin (2003)
8. Hulpke, A.: Constructing transitive permutation groups. J. Symb. Comput. 39(1), 1–30 (2005)
9. Klüners J., Malle G.: A database for field extensions of the rationals. LMS J. Comput. Math.
4, 182–196 (2001)
10. van Lint, J.H.: Introduction to Coding Theory. Springer, Berlin/New York (1992)
11. Stauduhar, R.P.: The determination of Galois groups. Math. Comput. 27, 981–996 (1973)
12. van der Waerden, B.L.: Algebra I. Springer, Berlin (1960)
Global Dynamics and Periodic Solutions
in a Singular Differential Delay Equation
1 Introduction
appear as mathematical models of various real world phenomena. They were first
mentioned, to the best of our knowledge, in paper [7] as exact reductions of
nonlinear boundary value problems for one-dimensional wave equations modelling
violin string oscillations. The very same idea of reduction was later used in paper
[4] describing complex oscillations in electrical circuits with tunnel diodes. Note
that in both papers the reduction is to the neutral type DDEs (1), when c ¤ 0.
This is a well known idea and approach that certain boundary value problems
for hyperbolic partial differential equations can be exactly reduced to differential
difference equations of various types [5]. The retarded type DDEs (1), when c D 0,
appear in numerous other applications, a partial list of which can be found e.g.
in [1, 3, 6]. This case is more studied compared with the neutral case of c ¤ 0.
Very few results are available in the latter case. This paper is an attempt to initiate
a comprehensive study of neutral differential delay equations (1) in one particular
approach as a singular perturbation problem.
When " D 0 Eq. (1) becomes a continuous time difference equation (DE) of the
form
The dynamics of the latter as t ! 1 are largely determined by the interval map f ,
or the equivalent scalar difference equation
mathematical results which ideas and proofs are only outlined here, due to their
length and complexity as well as to the space limitation of the proceedings. A full
scale paper with all the mathematical details and proofs included is a forthcoming
work.
2 Preliminaries
For arbitrary '.t/ 2 C1 .Œ1; 0; R/ WD X1 there exists unique solution x"' .t/
to Eq. (1) defined and continuous for all t 1. The solution is differentiable
everywhere for t 1 except at the integer values tk D k 2 N0 ; where it is
typically continuous only. The solution is formally obtained for t > 0 by successive
integration.
Let X0 WD C0 .Œ1; 0/; R/ be a set of continuous initial functions such that the
limit limt!0 .t/ exists. X0 can be viewed as a restriction of the standard space
of initial functions C.Œ1; 0; R/ when its elements are considered on the reduced
domain, the half open interval Œ1; 0/. Thus
For arbitrary 2 X0 there exists unique solution x .t/ to Eq. (2) defined for all
t 1. The solution is formally obtained for t 0 by successive iterations. The
solution is typically discontinuous at the integer values tk D k 2 N0 with a jump
discontinuity. In the case when the contiguity condition
holds, and f is continuous, the solution x .t/ is also continuous for all t 1.
We consider two distinct cases of the nonlinearity f in DDEs (1):
(H1) f is continuous and satisfies the negative feedback assumption
3 Main Results
For the differential delay equation (1) initial functions '1 ; '2 2 C1 .Œ1; 0; R/ D
X1 are compared in the standard uniform metric:
jj'1 '2 jjŒ1;0 D supfj'1 .t/ '2 .t/j C j'10 .t/ '20 .t/j; t 2 Œ1; 0g:
Given ' 2 X1 and 2 X0 we shall compare them on the initial interval Œ1; 0 as
follows:
Given two initial functions, ' 2 X1 and 2 X0 , which are close on the initial
interval Œ1; 0, we would like to estimate the closeness between their respective
solutions to Eqs. (1) and (2) on any finite interval Œ0; T. Since x"' .t/ is continuous
for all t 0, while x .t/ is typically discontinuous at tk D k 2 N0 , the closeness
in the uniform metric on the interval Œ0; T cannot happen. However, the closeness
takes place everywhere else, if the integer values tk D k are excluded on the interval
Œ0; T. For the purpose of such comparison we introduce the following notation
ŒT
[
JT WD Œ0; T n U .k/;
kD0
Global Dynamics and Periodic Solutions in a Singular Differential Delay Equation 633
The reasoning and major steps of the proof of Lemma 2 should be repeated and
applied now to the integral equation (4). We leave details to the reader. t
u
Lemma 3 Suppose that ' 2 X1 is given, and let x"' .t/ and x' .t/ be the correspond-
ing solutions to equations (1) and (2), respectively. Then for arbitrary > 0 and
> 0 there exists "0 > 0 such that for all 0 < " < "0 one has
Proof The proof follows ideas and repeats major steps of the proof of Lemma 3 of
paper [3] when one estimates the difference jx"' .t/ f .x.t 1//j for t 2 Œ0; 1. The
integral equation (4) is used in the new calculations.
634 A.F. Ivanov and Z.A. Dzalilov
By integration by parts the last term of Eq. (4) one arrives at the following integral
equation
t
x.t/ D Œx.0/ C cx.1/ expf g (5)
"
Z
1 t st
C Œ f .x.s 1// C cx.s 1/ expf g ds cx.t 1/:
" 0 "
the difference x"' .t/ x' .t/ D x"' .t/ f .'.t 1//; t 2 Œ0; 1, can be represented as
t
x"' .t/ f .'.t 1// D Œ'.0/ C c'.1/ f .'.t 1// c'.t 1/ expf g
"
Z
1 t st
C Œ f .'.s 1// f .'.t 1// expf g ds
" 0 "
Z
c t st
C Œ'.s 1/ '.t 1/ expf g ds:
" 0 "
The rest of the estimates can be done very similar to those in Lemma 3 of [3]. We
leave details to the reader. t
u
The proof of Theorem 1 now follows by induction and the triangle inequality
3.2 Periodicity
This subsection deals with the existence of periodic solutions to differential delay
equation (1). We consider the two cases of the nonlinearity f as described above by
the hypotheses (H1) and (H2).
We first introduce a notion of periodic solutions to difference equation (2)
associated with cycles of the corresponding map f .
Global Dynamics and Periodic Solutions in a Singular Differential Delay Equation 635
Theorem 2 Assume that (H1) is satisfied and f 0 .0/ < 1. There exists "0 > 0
such that for all 0 < " < "0 DDE (1) has a periodic solution x"p .t/ with the period
T D 2 C O."/ where O."/ ! 0C as " ! 0C . The periodic solution x"p .t/ converges
as " ! 0 to one of the square wave periodic solutions Sqwv.t; a1 ; a2 / of DE (2),
where fa1 ; a2 g is a cycle of period two of the map f .
Proof We outline main steps of the proof for the case c D 0, omitting the
intermediate details due to the space limitation.
Consider the set of initial functions
where the assumptions (i), (ii), and (iii) are specified as follows:
(i) ' is non-negative with '.1/ D 0; '.t/ > 0 8t 2 .1; 0, and ' is bounded
from above, '.t/ M 8t 2 Œ0; 1 and some M > 0;
(ii) ' has an exponential growth in a right neighborhood of t D 1 given by:
.tC1/˛
'.t/ l .t/ WD K 1 e " 8t 2 Œ1; 1 C ˇ;
X WD f 2 C.Œ1; 0; R/j 2 X g:
Likewise, there exists "20 > 0 such that for every 2 X and all 0 < " < "20 there
exists time t2 D t2 . / > 0 such that the corresponding solution x .t/ to DDE (1)
has the properties:
(c) the segment x .t2 C 1 C s/; s 2 Œ1; 0; of the solution belongs to X ;
(d) 0 < t2 P2 " for some P2 > 0.
Define a mapping F 2 on X with the values in X by the formula
For arbitrary ' 2 X and all 0 < " < minf"1 ; "2 g WD "0 define now the mapping
F as the composition of the above mappings F 1 and F 2 , F WD F 2 ı F 1 . F
maps the convex set X into itself. It is a compact map, for when c D 0 the DDE (1)
is a retarded type equation. Also the set F .X / is bounded due to the one-sided
boundedness of the function f . Therefore, by the Schauder fixed point theorem there
exists '0 2 X such that .F /.'0 / D '0 . Clearly, that the corresponding solution
x'0 .t/ is periodic. Its period is T D 2 C t1 C t2 2 C .P1 C P2 /". The convergence
x'0 .t/ ! Sqwv.t; a1 ; a2 /, where fa1 ; a2 g is a 2-cycle of the map f , can be proved
by using the continuous dependence on " (Theorem 1) and the fact that its period
T D 2 C O."/ is close to 2 for small " > 0. Details are omitted due to their length.
t
u
Global Dynamics and Periodic Solutions in a Singular Differential Delay Equation 637
Theorem 3 Assume that (H2) is satisfied, and let fa1 ; : : : ; aN g be the unique
globally attracting cycle of the map f . There exists "0 > 0 such that for all
0 < " < "0 DDE (1) has a periodic solution x"p .t/ with the period T D N C O."/,
where O."/ ! 0 as " ! 0. The periodic solution x"p .t/ converges as " ! 0 to the
square wave periodic solution Sqwv.t; a1 ; : : : ; aN / of DE (2).
Proof The idea of the proof is similar to that in the proof of Theorem 2. Associated
with the unique cycle of the map f we construct a sequence of convex bounded sets
Xk C.Œ1; 0; R/; k D 1; : : : ; N; and a sequence of compact maps F k such that
F k W Xk ! XkC1
.N C 1 WD 1/. The composition map F WD F N ı ı F 1 then
maps X1 into itself. By the Schauder fixed point theorem it has a fixed point '0 2 X1
there. The corresponding solution x"'0 .t/ to DDE (1) is periodic. Its properties and
the convergence to Sqwv.t; a1 ; : : : ; aN / as " ! 0 follow from the construction of
the sets Xk outlined below.
Let fa1 ; : : : ; ak ; akC1 ; : : : ; aN g be the globally attracting cycle of the map f with
f .ak / D akC1 ; k D 1; : : : ; N 1 and f .aN / D a1 . In order to be specific in the
definition of Xk we assume that akC1 > ak . Define now Xk as follows:
In the opposite case of akC1 < ak the inequalities in part (i) of the definition of Xk
will have to be reversed, as well as the starting point for ' to be moved to ak ı,
'.1/ D ak ı.
By using the integral equation (6) one can show that there exists "k0 > 0 such that
for all 0 < " < "k0 and every ' 2 Xk there exists time tk > 0 for its solution x"' .t/
such that the following holds:
(a) the segment x' .tk C 1 C s/; s 2 Œ1; 0; of the solution belongs to XkC1 ;
(b) 0 < tk Pk " for some Pk > 0.
638 A.F. Ivanov and Z.A. Dzalilov
The composite map F D F N ı ı F 1 has then a fixed point '0 2 X1 which
generates the periodic solution x"'0 .t/ to DDE (1) with the stated properties. t
u
The existence of periodic solutions in Theorem 2 is a well known fact due to Hadeler
and Tomiuk [1, 2, 6]. The existence itself only requires the instability of the trivial
solution x 0 and the one-sided boundedness of f . In the case of globally attracting
cycle of period two for the map f , fa1 ; a2 g, the square wave limiting shape of the
periodic solutions was derived by Mallet-Paret and Nussbaum [2, 3]. We prove the
asymptotic shape in the general case of the negative feedback assumption on f . The
questions of uniqueness and asymptotic stability of the periodic solutions remain
largely open problems. In fact, multiple periodic solutions and chaotic behaviors
are shown to exist in the case of globally attracting two-cycle [3]. Therefore, to
establish at least some sufficient conditions for the existence and stability of periodic
solutions for the neutral DDE (1) appears to be quite challenging mathematical
problem.
The theoretical results on periodic solutions of this paper can be proved for
the retarded DDEs (1) at this time. The principal reasons being that the Schauder
Fixed Point Theorem is used, with the essential requirements of the convexity and
boundedness of the sets X ; X ; Xk and of the compactness of the shift operators
F along the solutions of DDE (1) when c D 0. Though the estimates in the proofs
of the Theorems 2 and 3 seem to remain valid also in the case c ¤ 0 we are not
aware of the existence of appropriate fixed point theorems that can be applied in the
neutral case.
Conjecture 1 Theorems 2 and 3 remain valid for the case of neutral DDE (1), when
c ¤ 0.
Acknowledgements The first author would like to express his gratitude and appreciation for the
support and hospitality extended to him during his visit and stay at the CIAO of the Federation
University Australia, Ballarat, in December 2014–January 2015. This paper is a result of the
collaborative research work initiated during the visit.
Global Dynamics and Periodic Solutions in a Singular Differential Delay Equation 639
References
1. Erneux, T.: Applied Delay Differential Equations. Ser.: Surveys and Tutorials in the Applied
Mathematical Sciences, vol. 3, 204 pp. Springer, New York (2009)
2. Hale, J.K., Lunel, S.M.V.: Introduction to Functional Differential Equations. Springer Applied
Mathematical Sciences, vol. 99, 447 pp. Springer-Verlag, New York (1993)
3. Ivanov, A.F., Sharkovsky, A.N.: Oscillations in singularly perturbed delay equations. In: Jones,
C.K.R.T., Kirchgraber, U., Walther, H.O. (eds.) Dynamics Reported (New Series), vol. 1,
pp. 165–224. Springer, New York (1991)
4. Nagumo, J., Shimura, M.: Self-oscillation in a transmission line with a tunnel diode. Proc. IRE
49(8), 1281–1291 (1961)
5. Sharkovsy, A.N., Maistrenko, Yu.L., Romanenko, E.Yu.: Difference Equations and Their
Perturbations, vol. 250, 358 pp. Kluwer Academic Publishers, Dordrecht/Boston/London (1993)
6. Smith, H.: An Introduction to Delay Differential Equations with Applications to the Life
Sciences. Ser.: Texts in Applied Mathematics, vol. 57, 172 pp. Springer, New York/Dor-
drecht/Heidelberg/London (2011)
7. Witt, A.A.: On the theory of the violin string. Zhurn. Tech. Fiz. 6, 1459–1470 (1936, in Russian)
Localized Spot Patterns on the Sphere for
Reaction-Diffusion Systems: Theory and Open
Problems
1 Introduction
in the pattern. This analysis of [24] and [27] extends the previous studies of localized
spot patterns on 2-D planar domains for related RD systems (cf. [6, 11, 29]).
By using formal asymptotic methods on the RD system in the singularly
perturbed limit, it is possible to derive a differential algebraic ODE system char-
acterizing the dynamics of spot patterns. This new class of dynamically interacting
particle system has some common features with the well-known ODE system
characterizing the dynamics of Eulerian point vortices in fluid mechanics. In this
latter context, there has been an intense study of the dynamics and equilibria of
point vortices on the sphere over the past three decades (cf. [2, 3, 10, 18, 19, 23]).
Similar to the original asymptotic derivation of the limiting point vortex problem
in [3] starting with the Euler equations of fluid mechanics, the main result for spot
dynamics in [27] for the Brusselator and Schnakenberg model, and herein for the
Gray-Scott RD model, provides a reduced dynamical system for the time evolution
of the centres of the localized spots on the sphere.
Motivated by specific questions related to the development of biological patterns
on both stationary and time-evolving surfaces (cf. [5, 12, 17, 20, 21]), there have
been many numerical studies of RD patterns on the sphere and other compact
manifolds (cf. [1, 13, 14, 28] see also the references therein). Prior analytical
studies of RD pattern formation on the surface of the sphere, have focused on
using weakly nonlinear and equivariant bifurcation theory to derive normal form
equations characterizing the development of small amplitude spatial patterns that
bifurcate from a spatially uniform steady-state (cf. [4, 7, 16]). However, as a result
of the typical high degree of degeneracy of the eigenspace associated with spherical
harmonics of large mode number, these amplitude equations typically consist of a
rather large coupled set of nonlinear ODEs. The latter are known to have an intricate
subcritical bifurcation structure (cf. [4, 7, 16]). As a result, the preferred spatial
pattern that emerges from an interaction of these weakly nonlinear modes is difficult
to predict theoretically. This intrinsic difficulty is accentuated for RD systems where
there is a large diffusivity ratio, which effectively yields a large aspect ratio system
where center manifold analysis is of more limited use [25]. For such large aspect
ratio RD systems, there is typically a rather wide band of unstable modes [24, 27],
and so the prediction of pattern development based on the conventional paradigm of
using both a Turing and a weakly nonlinear analysis is not generally possible.
However, it is in this singular limit of a large diffusivity ratio that localized
spot patterns robustly appear from a transient process starting from small random
perturbations of a spatially uniform state [24]. A discussion of results and open
problems relating to the study of such “far-from equilibrium patterns” is the topic
of this short article. In particular, in certain cases the equilibria of this DAE
system for spot dynamics have a close relationship to the classical problem in
approximation theory of determining a set of elliptic Fekete points, which are the
globally minimizer of the discrete logarithmic energy for N points on the sphere.
Dynamics and Equilibria of Localized Spots on the Sphere 643
The outline of this brief article is as follows. In Sect. 2, we briefly present the
DAE system for the dynamics of spots for the Brusselator models as derived in
[27]. In Sect. 3 we discuss some results and open questions related to determining
equilibria for these DAE systems. New results for the equilibria of patterns with
either 9 or 10 spots are presented. In Sect. 4 we give a new result for the DAE
dynamics for spot patterns for the well-known Gray-Scott model. Finally, in Sect. 5
we list a few open problems related to deriving similar DAE dynamics for spot
interactions for more complicated models.
Under the assumption of a large diffusivity ratio and a small “fuel” supply, the
Brusselator model of [22] posed on the surface of the sphere, can be scaled into
the following system for u D u.x; t/ and the inhibitor v D v.x; t/ (cf. [24, 27]):
@u @v
D "2
S u C "2 E u C fu2 v ; D
S v C "2 u u2 v ; (1)
@t @t
for some O.1/ constants E > 0, > 0, and 0 < f < 1. We refer to E as the “fuel”
parameter. Here
S is the Laplace-Beltrami operator on the sphere.
Spatial patterns for which u concentrates as " ! 0 at a discrete set of points
x1 ; : : : ; xN on the sphere are called spot patterns. For " ! 0, we have u D O.1/
in the core of the spot, where jx xj j D O."/, and u
"2 E away from the spot
centers where jx xj j D O.1/. Then for " ! 0, the effect of the localized spots on
the inhibitor field v in (1) is to introduce a sum of Dirac-delta “forces” where the
strength of the “force” induced by the spot at xj is proportional to Sj (see [24] for
details). As such, v can be represented as a superposition of the well-known source
neutral Green’s function for the sphere. In this way, in [24] a quasi-equilibrium
spot pattern with frozen locations x1 ; : : : ; xN was constructed using the method of
matched asymptotic expansions by formulating a nonlinear algebraic system for the
spot locations x1 ; : : : ; xN and the spot strengths S1 ; : : : ; SN . The linear stability of
this quasi-equilibrium spot pattern to O.1/ time-scale perturbations was analyzed
in [24].
Provided that the quasi-equilibrium spot pattern is linearly stable, the slow
dynamics of the spot pattern on the long time scale D "2 t was derived in [27].
The collective coordinates characterizing this slow dynamics are the spot locations
x1 ; : : : ; xN and their corresponding spot source strengths S1 ; : : : ; SN , that both evolve
slowly on the long time-scale D "2 t. The slow dynamics derived in [27] is a
differential algebraic system of ODEs as given by the following result:
Principal Result 1 (Slow spot dynamics (cf. [27])) Let " ! 0. Provided that
there are no O.1/ time-scale instabilities of the quasi-equilibrium spot pattern, the
time-dependent spot locations, xj for j D 1; : : : ; N, on the surface of the sphere vary
644 A. Jamieson-Lane et al.
dxj 2 X Si xiN
D I Qj ; Q j xj xTj ; j D 1; : : : ; N ;
d A j .Sj / iD1
jxi xj j2
i¤j
(2a)
coupled to the constraints for S1 ; : : : ; SN in terms of x1 ; : : : ; xN given by the roots of
a nonlinear algebraic system involving the Green’s matrix G
h i 2E
N .S/ I .I E 0 /G S C .I E 0 /.S/ e D 0: (2b)
N
0
25
20 −5
15 −10
10
Aj −15
χ(Sj) 5
0 −20
−5
−25
1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9
Sj Sj
Fig. 1 Left panel: the function .Sj I f / in (2) for f D 0:4 (heavy solid), f D 0:5 (solid), f D 0:6
(dotted), and f D 0:7 (widely spaced dots). The spot self-replication threshold ˙2 . f / for Sj is
shown by the thin vertical lines in this figure. If Sj > ˙2 . f / the local spot profile is linearly unstable
to a peanut-splitting instability (cf. [24]). The threshold values are ˙2 .0:4/ 8:21, ˙2 .0:5/
5:96, ˙2 .0:6/ 4:41, and ˙2 .0:7/ 3:23. Right panel: the function A j .Sj / < 0 in (2) with the
same labels as in the left panel
Dynamics and Equilibria of Localized Spots on the Sphere 645
In this section we discuss some previous results obtained in [27] as well as some
new results for the equilibria of (2) that have large basins of attraction to initial
conditions. We consider patterns for small values of N which Sj D O.1/ as ! 0.
A few open problems are mentioned.
To determine the possible equilibrium spot configurations of (2) with large basins
of attraction for N 3 when E D O.1/, f , and are given, we performed numerical
simulations of (2) for both pre-specified and for randomly generated uniformly
distributed initial conditions for the spot locations on the surface of the sphere. To
generate N initial points that are uniformly distributed with respect to the surface
area we let h and h be uniformly distributed random variables in .0; 1/ and define
spherical coordinates D 2h and D cos1 .2h 1/. Newton’s method was
used to solve (2b) for the initial set of N points. If the Newton iterates failed to
converge, indicating that no quasi-equilibrium exists for the initial configuration
of spots, a new randomly generated initial configuration was generated. The DAE
dynamics (2a) was then implemented by using an adaptive time-step ODE solver
coupled to a Newton iteration scheme to compute the spot strengths.
In the simulations below we took f D 0:5 and " D 0:02. We remark that
whenever e D .1; : : : ; 1/T is an eigenvector of the Green’s matrix G , then the
constraint (2b) admits a solution where S D Sc e. For such an equal spot–source
strength pattern, the equilibrium spatial configuration of spots for (2) is independent
of E, f , and .
In our discussion below, we refer to a ring pattern as a collection of N equally-
spaced spots lying on an equator of the sphere. We refer to an .N 2/ C 2 pattern
as a spot pattern consisting of two antipodal spots with the remaining N 2 spots
equally-spaced on the equatorial mid-plane between the two polar spots.
The simulations of [27] of 50 randomly generated initial spot for N D 3; : : : ; 8
yielded the following results for equilibria of (2) with large basin of attractions:
• N D 3: three equally-spaced spots that lie on a plane through the center of the
sphere. (Common spot strength pattern.)
• N D 4: four spots centered at the vertices of a regular tetrahedron. (Common
spot strength pattern.)
• N D 5; 6; 7: an .N 2/ C 2 pattern consisting of a pair of antipodal spots, with
the remaining N 2 spots equally-spaced on the equatorial mid-plane between
the two polar spots. (Two different spot strengths for polar and mid-plane spots.)
• N D 8: a “twisted cuboidal” shape, consisting of two parallel rings of four
equally-spaced spots, with the rings symmetrically placed above and below an
equator. The spots are phase shifted by 45ı between each ring. The perpendicular
distance between the two planes is 1.12924 as compared to a minimum distance
of 1.1672 between neighboring spots on the same ring, so that the pattern does
not form a true cube. (Common spot strength pattern.)
646 A. Jamieson-Lane et al.
We remark that for the case N D 2 it was shown in Lemma 5 of [27] that any two
initial spots on the sphere will become antipodal in the long-time limit ! 1. This
was done by deriving a simple ODE for the angle ./ between the spot centers x1
and x2 at time , as measured from the center of the sphere, i.e. xT2 x1 D cos , and
establishing from this ODE that ! as ! 1 for any .0/.
In [27] the linear stability of ring configuration of spots was studied numerically.
The following conjecture was formulated in [27] based on numerical experiments.
• A ring pattern of N D 3 is orbitally stable, but is unstable if N 4.
• For N D 4; 5; 6; 7, an .N 2/ C 2 pattern is orbitally stable, but such a pattern is
unstable if N 8.
More specifically for N D 3, the numerical computations of [27] suggest that a
ring solution is orbitally stable to small random perturbations in the spot locations
in the sense that as time increases the perturbed spot locations become colinear on a
nearby (tilted) ring. For N 4, a similar small, but otherwise arbitrary, perturbation
of the spot locations on the ring leads to a breakup of the ring pattern. Similar an
.N 2/ C 2 pattern for N D 8 breaks up and forms a twisted cuboidal shape.
Open Problem: Establish analytically these results for the equilibria of spot
patterns for N D 3; : : : ; 8 using group theory methods for ODEs. Analyze the linear
stability of ring patterns by using an approach similar to that done in [2] for the
corresponding problem of the linear stability of Eulerian point vortices on a ring.
For larger values of N it becomes increasingly difficult to visualize the symme-
tries of the final equilibrium pattern that emerges under the DAE system (2) from
initial data. More specifically, it becomes increasingly challenging to find a rotation
matrix to put the pattern in a standard reference configuration. We now discuss two
new results for N D 9 and N D 10 not obtained in [27]. For even larger values of N
point-matching algorithms from computer science may be useful for classifying the
symmetries of the final pattern.
For N D 9 the equilibrium state of (2) with a large basin of attraction for initial
conditions is the pattern shown in the lower right subfigure of Fig. 2. Our simulations
with 50 random initial configurations have shown that the limiting pattern consists
of 3 parallel planes of 3 spots each. The spots on the equatorial plane and the other
two planes are phase-shifted 60ı (see the caption of Fig. 2 for details.)
For N D 10 the equilibrium state of (2) with a large basin of attraction for
initial conditions is the pattern shown in the lower right subfigure of Fig. 3. The
equilibrium pattern consists of two polar spots together with two parallel planes
with four equally-spaced spots on each plane. The relative phase-shift of the spots
on the two planes is 45ı (see the caption of Fig. 3 for details).
A classical problem of point configurations on the sphere is theP problem
P of find-
ing the global minimizer of the discrete logarithmic energy V i¤j log jxi
xj j on the sphere where jxj j D 1, which also has applications to minimizing
the mean first passage time for Brownian motion on the sphere (cf. [8]). Such
optimizing configurations are called elliptic Fekete point sets. By comparing our
results for equilibrium spot configurations with the optimal energies V of elliptic
Dynamics and Equilibria of Localized Spots on the Sphere 647
Fig. 2 The evolution of a 9-spot pattern at different time for the Brusselator (2) when f D 0:5,
E D 18, and D 0:02. (a) The initial state D 0. (b) D 1. (c) D 3. (d) The computed steady
state after a suitable rotation. The steady-state consists of 3 planes of 3 spots each. The spots on
the equatorial plane and the other two planes are phase-shifted 60ı . The distance d between the
equatorial plane and each of the other two planes is d 0:7014. The common value of the spot
strengths on the equatorial plane differs from that of the other 6 spots
Fekete point sets, as given in Table 1 of [26], we conclude that our equilibrium
spot configurations for N D 3; : : : ; 10 having a large basin of attraction are indeed
elliptic Fekete point sets. As a remark, if we were to set Sj D 1 in (2) and ignore
the constraint (2b), then it is readily seen upon introducing Lagrange multipliers
that local and global minima of the discrete energy V are stable equilibria of the
simplified DAE dynamics.
Open Problem: Explore computationally for N 10 whether there is a relation-
ship between elliptic Fekete point sets and equilibria of the full DAE dynamics (2)
that have large basins of attraction of initial conditions.
648 A. Jamieson-Lane et al.
Fig. 3 The evolution of a 10-spot pattern at different times for the Brusselator (2) when f D 0:5,
E D 22, and D 0:02. (a) The initial state D 0. (b) D 1. (c) D 3. (d) The computed steady
state after a suitable rotation. The steady-state consists of two polar spots together with two parallel
planes of 4 equidistantly spaced spots. The relative phase-shift of the spots on the two planes is
45ı . The distance d between the equator and either of the two planes is d 0:4234
In this section we give a new result for the slow dynamics of spots on the unit sphere
for the well-known Gray-Scott RD model (cf. [6]).
Although the analysis of spot dynamics for this problem follows the methodology
done in [27] for the Brusselator model, this new analysis requires the reduced-wave
Dynamics and Equilibria of Localized Spots on the Sphere 649
1
S G G D ı.x / ; (4a)
D
1
G.xI /
log jx j C R C o.1/ ; as x ! ; (4b)
2
for some R independent of . In terms of this Green’s function we can derive the
following result for the slow dynamics of a collection of spots for the GS model.
Principal Result 2 (Slow spot dynamics for the GS model) Let " ! 0, and
assume that B D O."=/, where D 1= log ". Then, provided that there are
no O.1/ time-scale instabilities of the quasi-equilibrium spot pattern, the time-
dependent spot locations, xj for j D 1; : : : ; N, on the surface of the sphere vary on
the slow time-scale D "2 t, and satisfy the dynamics for j D 1; : : : ; N,
dxj X N
D 2"2 j .Sj / I Q j Si rx G.xj I xi / ; Q j xj xTj ; (5a)
d iD1
i¤j
X
N
p
where D 1= log " and B B"1 D D O.1/.
In this system .Sj / and .Sj / depend on the core problem near the spot and are
specific to the GS model. Since the reduced-wave Green’s function and its regular
part R is not available in simple explicit form, and can only be written in terms of
the Legendre function (see [24]), it is more challenging to investigate the dynamics
and equilibria of spot patterns on the sphere for the GS model. This topic requires
further investigation.
There are several possible extensions of the methodology for deriving and analyzing
localized spot patterns for other scenarios.
We remark that explicit DAE dynamics for spot patterns is only possible when
the source-neutral Green’s function , satisfying
s G D j˝j1 ı.xx0 / is explicitly
available. Such a Green’s function is well-known for the sphere, and this fact is key
to deriving (2). However, recently in [9], this Green’s function has been provided
650 A. Jamieson-Lane et al.
analytically for a particular class of surfaces of revolution. For this class, DAE
dynamics on a manifold of varying curvature, and the possibility of pinning of
localized spot, can be analyzed.
The second possible extension of the modeling framework is to allow for spatial
heterogeneity in the fuel supply, so that E D E.x/. The corresponding outer solution
v will involve a sum ofR Dirac
distributions,
one near each spot, together with a term
vp of the form vp D ˝ E./ EN G.xI / d, where EN denotes the spatial average
of E over the sphere. In this way, it can be shown that the corresponding DAE
dynamics will yield a nonlocal system for the evolution of the spots.
Finally, a more intricate method to introduce spatial heterogeneity in (1) is
to consider spot patterns on the sphere for a model that couples passive bulk-
diffusion in the interior of the sphere to the Brusselator PDE on the surface. In
this context, the fuel supply E represents an exchange, or flux, between the surface-
bound concentrations and their bulk counterparts. This coupling should lead to rich
behavior in the DAE dynamics for spots on the sphere. This paradigm of studying
coupled surface-bulk models is becoming more prominent in scientific computation
and in applications (cf. [14, 15]).
Acknowledgements PHT thanks Lincoln College, Oxford and the Zilkha Trust for generous
funding. MJW gratefully acknowledges grant support from NSERC.
References
1. Barreira, R., Elliott, C.A., Madzvamuse, A.: The surface finite element method for pattern
formation on evolving biological surfaces. J. Math. Biol. 63, 1095–1109 (2011)
2. Boatto, S., Cabral, H.E.: Nonlinear stability of a latitudinal ring of point vortices on a non-
rotating sphere. SIAM J. Appl. Math. 64(1), 216–230 (2003)
3. Bogomolov, V.A.: Dynamics of vorticity at a sphere. Fluid Dyn. (USSR) 6, 863–870 (1977)
4. Callahan, T.K.: Turing patterns with O.3/ symmetry. Physica D 188(1), 65–91 (2004)
5. Chaplain, M.A.J, Ganesh, M., Graham, I.G.: Spatio-temporal pattern formation on spherical
surfaces: numerical simulation and application to solid tumour growth. J. Math. Biol. 42(5),
387–423 (2001)
6. Chen, W., Ward, M.J.: The stability and dynamics of localized spot patterns in the two-
dimensional Gray-Scott model. SIAM J. Appl. Dyn. Syst. 10(2), 582–666 (2011)
7. Chossat, P., Lauterbach, R., Melbourne, I.: Steady-sate bifurcation with O.3/ symmetry. Arch.
Rat. Mech. Anal. 113, 313–376 (1990)
8. Coombs, D., Straube, R., Ward, M.J.: Diffusion on a sphere with localized traps: mean first
passage time, eigenvalue asymptotics, and Fekete points. SIAM J. Appl. Math. 70(1), 302–332
(2009)
9. Dritschel, D.G., Boatto, S.: The motion of point vortices on closed surfaces. Proc. R. Soc. A
471, 20140890 (2015)
10. Kidambi, R., Newton, P.K.: Motion of three vortices on the sphere. Physica D 116(1–2), 143–
175 (1998)
11. Kolokolnikov, T., Ward, M.J., Wei, J.: Spot self-replication and dynamics for the Schnakenberg
model in a two-dimensional domain. J. Nonlinear Sci. 19(1), 1–56 (2009)
12. Kondo, S., Asai, R.: A reaction–diffusion wave on the skin of the marine angelfish Pomacan-
thus. Nature 376, 765–768 (1995)
Dynamics and Equilibria of Localized Spots on the Sphere 651
13. Landsberg, C., Voigt, V.: A multigrid finite element method for reaction-diffusion systems on
surfaces. Comput. Vis. Sci. 13, 177–185 (2010)
14. Macdonald, C.B., Merriman, B., Ruuth, S.J.: Simple computation of reaction-diffusion pro-
cesses on point clouds. Proc. Natl. Acad. Sci. U.S.A. 110(23), 9209–9214 (2013)
15. Madzvamuse, A., Chung, A.H.W., Venkataraman, V.: Stability analysis and simulations of
coupled bulk-surface reaction diffusion systems. Proc. R. Soc. A 471, 20140546 (2015)
16. Matthews, P.C.: Pattern formation on a sphere. Phys. Rev. E 67(3), 036206 (2003)
17. Nagata, W., Harrison, L.G., Wehner, S.: Reaction-diffusion models of growing plant tips:
Bifurcations on hemispheres. Bull. Math. Biol. 6(4), 571–607 (2003)
18. Newton, P.K.: The N-Vortex Problem: Analytical Techniques. Springer, New York (2001)
19. Newton, P.K., Sakajo, T.: Point vortex equilibria and optimal packings of circles on a sphere.
Proc. R. Soc. A 467, 1468–1490 (2011)
20. Painter, K.J.: Modelling of pigment patterns in fish. In: Maini, P.K., Othmer, H.G. (eds.)
Mathematical Models for Biological Pattern Formation. IMA Volumes in Mathematics and
Its Applications, vol. 121, pp. 58–82. Springer-Verlag, New York (2000)
21. Plaza, R.G., Sánchez-Garduño, F., Padilla, P., Barrio, R.A., Maini, P.K.: The effect of growth
and curvature on pattern formation. J. Dyn. Diff. Equ. 16(4), 1093–1121 (2004)
22. Prigogine, I., Lefever, R.: Symmetry breaking instabilities in dissipative systems II. J. Chem.
Phys. 48(4), 1695–1700 (1968)
23. Roberts, G.: Stability of relative equilibria in the planar n-vortex problem. SIAM J. Appl. Dyn.
Syst. 12(2), 1114–1134 (2013)
24. Rozada, I., Ruuth, S., Ward, M.J.: The stability of localized spot patterns for the Brusselator
on the sphere. SIAM J. Appl. Dyn. Syst. 13(1), 564–627 (2014),
25. Sewalt, L., Doelman, A., Meijer, H., Rottschafer, V., Zagarias, A.: Tracking pattern evolution
through extended center manifold reduction and singular perturbations. Physica D 298, 48–67
(2015)
26. Stortelder, W., de Swart, J., Pintér, J.: Finding elliptic Fekete point sets: two numerical solution
approaches. J. Comput. Appl. Math. 130(1–2), 205–216 (1998)
27. Trinh, P., Ward, M.J.: The dynamics of localized spot patterns for reaction-diffusion systems
on the sphere. Nonlinearity 29(3), 766–806 (2016)
28. Varea, C., Aragón, J.L., Barrio, R.A.: Turing patterns on a sphere. Phys. Rev. E. 60(4), 4588–
4592 (1999)
29. Wei, J., Winter, M.: Stationary multiple spots for reaction-diffusion systems. J. Math. Biol.
57(1), 53–89 (2008)
Continuous Dependence on Modeling in Banach
Space Using a Logarithmic Approximation
1 Introduction
Ill-posed problems have been the focus of considerable attention over the last few
decades. In this paper we focus on the abstract Cauchy problem
du
D Au ; 0t<T ; (1)
dt
u.0/ D
M. Fury ()
Penn State Abington, 1600 Woodland Road, Abington, PA 19001, USA
e-mail: [email protected]
B. Campbell Hetrick
Gettysburg College, 300 North Washington Street, Gettysburg, PA 17325, USA
e-mail: [email protected]
W. Huddell
Eastern University, 1300 Eagle Road, St. Davids, PA 19087, USA
e-mail: [email protected]
dv
D fˇ .A/v ; 0t<T ; (2)
dt
v.0/ D
1
fˇ .A/ D ln.ˇ C epTA / ; ˇ>0; p1: (3)
pT
Boussetila and Rebbani use this approximation in Hilbert space (see also [15] and
[8]); Huang [9] extends the results to Banach space. In both cases, the authors use
the quasi-reversibility method: they use the solution to a well-posed model problem
to approximate the initial value for the original problem, then solve the original
problem backward. They show that the final value of the solution obtained in this
manner depends continuously on the initial data. Our work differs in that we prove
directly continuous dependence on the model. Specifically, we show that
p
ku.t/ vˇ .t/k C. ˇ/1 T M T ;
t t
0t<T (4)
where u.t/ is an assumed solution of (1), vˇ .t/ is the solution of (2) using the
logarithmic function fˇ in (3), and C and M are constants independent of ˇ.
The problems above share the same initial data, but we note that in practice the
observed data may differ. Thus we are interested in the approximate problem (2)
with replaced by ı where ı > 0 yields a change in the initial data satisfying
k ı k ı. In this context, we directly obtain regularization results by applying
the estimate (4).
In Sect. 2, we introduce the functional calculus used for fˇ .A/ and prove several
auxiliary results. In Sect. 3, we use these results to prove continuous dependence
on modeling (Theorem 1). In Sect. 4, we prove regularization for the problem (1).
Finally, Sect. 5 demonstrates the theory of this paper applied to certain partial
differential equations. Below, B.X/ denotes the space of bounded linear operators on
X, and .A/ the resolvent set of A. Also, a classical solution u.t/ of (1) is a function
u W Œ0; T ! X such that u.t/ 2 Dom.A/ for 0 < t < T, u 2 CŒ0; T \ C1 .0; T/, and
u satisfies (1) in X.
Continuous Dependence Using a Logarithmic Approximation 655
2 Approximation
8ˇ 1
k Ax C fˇ .A/xk kS .2pT/xk
pT
1 1
h.s/ D .s ln.ˇ C epTs //e2pTs D ln.ˇepTs C 1/e2pTs :
pT pT
656 M. Fury et al.
t
u
In light of Lemma 1, for x 2 Dom.A/, define the operator gˇ .A/ in X by
Proof For s 0 and 0 < t T, define the function h.t; s/ D .ˇepTs C 1/t=pT .
1
Also, let sˇ D pT ln. pT
ˇt /. Then for 0 < t T and x 2 X,
Z 1
tgˇ .A/ @2
ke xk D k h.t; s/G.s; A/x dsk
0 @s2
Z 1 tpTˇe pTs
. pTt ˇepTs 1/
Dk G.s; A/x dsk
.ˇepTs C 1/ pT C2
t
0
Z sˇ tpTˇs epTs . pTt ˇepTs C 1/ Z 1 tpTˇs epTs . pTt ˇepTs 1/
t kxk ds C t kxk ds
0 .ˇepTs C 1/ pT C2 sˇ .ˇepTs C 1/ pT C2
Continuous Dependence Using a Logarithmic Approximation 657
!
2ˇepTsˇ .tsˇ C 1/ C 2 1
D t t kxk
.ˇepTsˇ C 1/ pT C1 .ˇ C 1/ pT
!
ln. pT
ˇt
/ 1 t pT
< 2kxk C 2kxk ln C1 :
ˇt
t t
. pTt C 1/ pT C1 . pTt C 1/ pT pT
then follows from the density of Ran.epTA / in X together with the fact that
pT C
pT ln. ˇt / ! 0 as t ! 0 .
t
t
u
Lemma 2 For sufficiently small ˇ > 0,
r
2 t
ketgˇ .A/ k p C1 for 0tT :
ˇ pT
p
Proof By Proposition 1 and the fact that x ln. 1x / x for x > 0, we have
s ! r
tgˇ .A/ 1 ˇt 2 t p 2
r
t
ke k2 C1 D p C ˇ p C1
ˇ pT ˇ pT ˇ pT
for 0 < t T. This estimate also holds for sufficiently small ˇ when t D 0 by (6).
where
is a complex contour contained within .A/, running from 1ei to 1ei
with 0 < < 2 . It may be shown that fC" g">0 is a strongly continuous holomorphic
semigroup on X generated by A2 .
658 M. Fury et al.
Lemma 3 Let " > 0 and let u.t/ be a classical solution of (1). Then
C" etfˇ .A/ D etgˇ .A/ C" u.t/ for all t 2 Œ0; T :
Proof The result follows from uniqueness of solutions to well-posed problems since
each item is a classical solution of (2) with initial data replaced by C" . t
u
We also require the following based on work of Agmon and Nirenberg [1].
Lemma 4 ([1, p. 148]) Let .z/ be a complex function which is bounded and
continuous on S D fz D C i j 2 Œ0; T; 2 Rg. For ˛ D t C ir 2 S,
define
Z Z
1 1 1
˚.˛/ D .z/ C dd :
S z˛ zN C 1 C ˛
N
Then ˚.˛/ is absolutely convergent, @˚.˛/ D .˛/ where @N denotes the Cauchy-
Riemann operator, and there exist constants K > 0 and L > T such that
Z ˇ ˇ
ˇ 1
1
1 ˇ
ˇ C ˇ d K 1 C ln L if ¤t:
ˇ zN C 1 C ˛ ˇ
1 z ˛ j tj
" .˛/ D eirA C" .u.t/ vˇ .t// D eirA C" .u.t/ etfˇ .A/ / :
Note, using the fact that Dom.AC" / D X (cf. [7, Propoisition 2.10]), we have
@ d d
" .˛/ D eirA C" u.t/ etfˇ .A/ D eirA C" .Au.t/ fˇ .A/etfˇ .A/ / ;
@t dt dt
@ @
" .˛/ D eirA C" .u.t/ etfˇ .A/ / D eirA .iA/C" .u.t/ etfˇ .A/ / :
@r @r
Therefore,
N " .˛/ D eirA C" .Au.t/ fˇ .A/etfˇ .A/ / eirA AC" .u.t/ etfˇ .A/ /
2 @
D eirA .A fˇ .A//C" etfˇ .A/ :
where x is in the dual space of X. We will show that the Three Lines Theorem may
be applied to w" . First for ˛ D t C ir 2 S, using standard properties of semigroups
660 M. Fury et al.
k" .˛/k JkC" u.t/ C" etfˇ .A/ k D JkC" u.t/ etgˇ .A/ C" u.t/k
Z t
tgˇ .A/ d sgˇ .A/
D Jk.I e /C" u.t/k D Jk .e C" u.t//dsk
0 ds
Z t Z t r
2 s 8ˇ
D Jk esgˇ .A/ gˇ .A/C" u.t/dsk J p C1 CM 0 ds (8)
0 0 ˇ pT pT
showing that " .˛/ is bounded on S. Next, for z D C i 2 S, by Lemma 4 and (7),
Z Z ˇ ˇ
1 1 T 0 p ˇˇ 1 1 ˇ
ˇ dd
k˚" .˛/k C ˇˇ C
1 0 z˛ zN C 1 C ˛ ˇ
Z p Z T
1 T 0p L e L
C ˇ K 1 C ln d D K ˇ 1 C ln d (9)
0 j tj 0 j tj
for 0 t T, where M.t/ D supr2R jw" .t C ir/j. Looking at the sides of the strip
S, we have from (9),
M.0/ D sup jw" .ir/j kx kk" .ir/k C kx kk˚" .ir/k
r2R
D kx kkeirA .u.0/ vˇ .0//k C kx kk˚" .ir/k D kx kk˚" .ir/k
p Z T
e L
K ˇkx k 1 C ln d :
0
M.T/ D sup jw" .T C ir/j kx kk" .T C ir/k C kx kk˚" .T C ir/k
r2R
Z T
L
kx k J 0 C e
K 1 C ln d
0 j tj
Continuous Dependence Using a Logarithmic Approximation 661
where C and M are constants independent of both ˇ and ". Again using (9),
kC" .u.t/ vˇ .t//k D k" .t/k k" .t/ ˚" .t/k C k˚" .t/k
p p Z T L
C. ˇ/1 T M T C e
t t
K ˇ 1 C ln d
0 j tj
p
C. ˇ/1 T M T
t t
for a possibly different value of C still independent of ˇ. Here the bound on the right
is independent of ", so we let " ! 0 to obtain
p t t
ku.t/ vˇ .t/k C. ˇ/1 T M T :
We prove regularization for problem (1) using our estimate from Theorem 1.
Definition 1 [10, Definition 3.1] A family fRˇ .t/ j ˇ > 0; t 2 Œ0; Tg
B.X/ is
called a family of regularizing operators for the problem (1) if for each solution u.t/
of (1) with initial data and for any ı > 0, there exists ˇ.ı/ > 0 such that
1. ˇ.ı/ ! 0 as ı ! 0 ,
2. ku.t/ Rˇ .t/ı k ! 0 as ı ! 0 for each t 2 Œ0; T whenever k ı k ı .
Theorem 2 Let A be the infinitesimal generator of a uniformly bounded holomor-
phic semigroup fS.z/ D ezA W p <z 0g on X and let fˇ .A/ be defined by (3). Then
tfˇ .A/
fRˇ .t/ WD e j 0 < ˇ < . 5 1/=2; t 2 Œ0; Tg is a family of regularizing
operators for problem (1).
Proof Let u.t/ be a classical solution of (1) satisfying kS1 .2pT/u.t/k M 0 for all
t 2 Œ0; T and let k ı k ı. Note that since fˇ .A/ 2 B.X/, etfˇ .A/ satisfies
3t 3t
ketfˇ .A/ k etkfˇ .A/k e pT ln ˇ D ˇ pT
p
for all t 2 Œ0; T, for 0 < ˇ < . 5 1/=2.
662 M. Fury et al.
p
First let t 2 Œ0; T/ and choose ˇ D ı 6 . Then ˇ ! 0 as ı ! 0 and from
Theorem 1,
p t t t
D C.ı 12 /1 T M T C ı 1 2T ! 0 as ı ! 0 :
p
In the case t D T, from (8) and (9) the estimate ku.T/ vˇ .T/k N ˇ can
easily be
p
obtained where N is a constant independent of ˇ. Then as above, still with
ˇ D ı6,
p 3 p p
ku.T/ Rˇ .T/ı k N ˇ C ˇ p ı D Nı 12 C ı ! 0 as ı ! 0 :
5 Example
For an example, we use that of deLaubenfels in [6]. Let T be the unit circle in
the complex plane and for 1 p 1, let H p .T/ be the set of all functions in
Lp .T/ that can be extended to a holomorphic function on the unit disc. Define A D
H 1 .T/ \ C.T/ and let A D i d d d
. Then iA D d is the generator of the familiar
translation group on A
ut D iu ; 0t<T ;
u.e ; 0/ D .e / :
i i
Œs
X
G.s; A/ D .s k/.k/g
O k
kD0
Continuous Dependence Using a Logarithmic Approximation 663
1
R
where gk .ei / D eik and .k/
O D 2 .ei /gk .ei /d. Defining the function
t
pTs pT
h.s/ D .ˇCe / and employing the functional calculus (5), we find for 2 A
Z 1
pT
t
Rˇ .t/ D h.A/ D ˇ C h00 .s/G.s; A/ds
0
Z Œs
t
1
tpTepTs epTs .t C pT/ X
D ˇ pT C 1 .s k/.k/g
O k ds :
pT.ˇ C epTs / kD0
t
0 .ˇ C epTs / PT C1
Acknowledgements The authors would like to thank Rhonda J. Hughes for her guidance and also
the 2015 AMMCS-CAIMS Congress.
References
1. Agmon, S., Nirenberg, L.: Properties of solutions of ordinary differential equations in Banach
space. Commun. Pure Appl. Math. 16, 121–151 (1963)
2. Ames, K.A.: On the comparison of solutions of related properly and improperly posed Cauchy
problems for first order operator equations. SIAM J. Math. Anal. 13, 594–606 (1982)
3. Ames, K.A., Hughes, R.J.: Structural stability for ill-posed problems in Banach space.
Semigroup Forum 70, 127–145 (2005)
4. Boussetila, N., Rebbani, F.: A modified quasi-reversibility method for a class of ill-posed
Cauchy problems. Georgian Math. J. 14, 627–642 (2007)
5. Campbell Hetrick, B.M., Hughes, R.J.: Continuous dependence results for inhomogeneous ill-
posed problems in Banach space. J. Math. Anal. Appl. 331, 342–357 (2007)
6. deLaubenfels, R.: Functional calculus for generators of uniformly bounded holomorphic
semigroups. Semigroup Forum 38, 91–103 (1989)
7. deLaubenfels, R.: Entire solutions of the abstract Cauchy problem. Semigroup Forum 42, 83–
105 (1991)
8. Fury, M.: Modified quasi-reversibility method for nonautonomous semilinear problems, Ninth
Mississippi state conference on differential equations and computational simulations. Electron.
J. Differ. Equ. Conf. 20, 99–121 (2013)
9. Huang, Y.: Modified quasi-reversibility method for final value problems in Banach spaces. J.
Math. Anal. Appl. 340, 757–769 (2008)
10. Huang, Y., Zheng, Q.: Regularization for a class of ill-posed Cauchy problems. Proc. Am.
Math. Soc. 133, 3005–3012 (2005)
11. Lattes, R., Lions J.L.: The Method of Quasi-Reversibility, Applications to Partial Differential
Equations. American Elsevier, New York (1969)
12. Miller, K.: Stabilized quasi-reversibility and other nearly-best-possible methods for non-well-
posed problems. In: Symposium on Non-Well-Posed Problems and Logarithmic Convexity.
Lecture Notes in Mathematics, vol. 316, pp. 161–176. Springer, Berlin (1973)
13. Showalter, R.E.: The final value problem for evolution equations. J. Math. Anal. Appl. 47,
563–572 (1974)
14. Trong, D.D., Tuan, N.H.: Regularization and error estimates for non homogeneous backward
heat problems. Electron. J. Differ. Equ. 4, 1–10 (2006)
15. Trong, D.D., Tuan, N.H.: Stabilized quasi-reversibility method for a class of nonlinear ill-
posed problems. Electron. J. Differ. Equ. 84, 1–12 (2008)
Solving Differential-Algebraic Equations
by Selecting Universal Dummy Derivatives
1 Introduction
where xj .t/, j D 1; : : : ; n are state variables and functions of some independent vari-
able t, usually considered to be time. Usually to solve such a problem differentials
of some of the equations are added to the system, these equations are called the
hidden constraints. A DAE has an associated index, mainly we are concerned with
the differential index, which is the minimum number of differentiations required
to obtain an ODE. Generally speaking the higher the index the more difficult
the numerical solution—there exist good solvers for index 1 systems and as such
we would like to reduce any DAE to an equivalent (same solution set) index 1
formulation. We are interested in reducing the index of our DAE via the Dummy
Derivative (henceforth DD method) method introduced in [4] by using the structural
analysis of the Signature Matrix method introduced in [2] (henceforth SA) to
identify the hidden constraints and otherwise inform the DD method more than is
possible than in the classical approach of DDs via the Pantelides algorithm [1]. The
DD method introduces a choice of derivatives of variables to be considered algebraic
so that our enlarged system containing the hidden constraints is made square. This
process is inherently local because it relies on the non-singularity of potentially
dynamic matrices. We show in Sect. 2 how to pick a global index 1 system for a
simple example, in Sect. 3 we demonstrate how this approach extends to any DAE
on which Pryce’s SA works and in Sect. 4 we present numerical results.
s x-
9 @@
f1 .t/ D x00 .t/ C .t/x.t/ D 0>
> @ y
=
00 @ ?
f2 .t/ D y .t/ C .t/y.t/ g D0 @~ (2)
>
>
2 2 2 ;
f3 .t/ D x .t/ C y .t/ L D0 Pendulum bob, mass=1
where g and L are gravitational acceleration and length of the rod respectively. The
problem’s signature matrix as specified by the Signature Matrix Method [2] is:
x y ci
f1 2 1 0ı ! 0
f 1 2ı 0 0
˙D 2
f3 0ı 0 1 2
dj 2 2 0
Note: there are two highest value transversals (henceforth HVTs) for the simple
pendulum, marked by and ı in the signature matrix above. The offsets c and d tell
us how many times to differentiate each equation and the associated derivative order
for the variables that will be found. We now proceed to carry out the DD algorithm
in [4] but note whilst the matrices we use are the same the numbering is changed
so as to line up with the SA notation. The DD algorithm proceeds in stages, using
matrices GŒ and H Œ for D 0; 1; : : : where GŒ0 is the n n system Jacobian
.c / .d /
J D @fi i =@xj j . Deleting appropriate rows of GŒ gives H Œ . Deleting appropriate
columns of H Œ to form a nonsingular matrix gives GŒC1 . This example illustrates
Solving DAEs by Selecting Universal Dummy Derivatives 667
the process; for space reasons we refer to [4] for details. We have an initial Jacobian
(with highest order equations and variables) and a secondary non-square Jacobian:
x00 y00 ci
f1 1 0 x! 0 00 00
Œ0 f2 0 1 y 0 Œ0 x y
G D 00 and H D f300 2x 2y 0 :
f3 2x 2y 0 2
dj 2 2 0
to the original DAE, where ˛ and ˇ are some parameters that will be chosen at
run time so the row using new equations (newly introduced equations of the form
Zi D 0) in GŒ1 is roughly orthogonal to the row using old equations (equations
part of the original DAE including hidden constraints) in GŒ1 and z1 is some new
variable to solve for. We would like the H Œ0 for our new DAE to be of the form:
00 00 0
x y z1
f3002x 2y 0 0
H Œ0 D
Z10˛ ˇ 0 1
so that it is now possible to pick x00 and y00 as DDs for all time and update ˛ and ˇ
along the solution to keep the resulting GŒ1 matrix well-conditioned. Note: checking
the condition number of the corresponding G matrix and using a Gram-Schmidt or
QR type procedure for ‘new’ rows if the matrix becomes ill conditioned would be a
reasonable way of updating ˛ and ˇ dynamically. Consider however the new DAEs
668 R. McKenzie and J.D. Pryce
x y z1 ci
f1 0 2 1 0ı 11 0
f2 B1 2ı 0 1C 0
˙ D f3 @ 0ı 0 1 1A 2
Z1 1 1 1 0 0
dj 2 2 0 0
where the block structure is highlighted, see [3]. Unfortunately we see that entries
in positions .4; 1/ and .4; 2/ are both structurally zero (meaning dj ci ¤ i;j ), so
won’t appear in H Œ0 , see [5]. There is a key inequality that comes from the SA for
finding the offsets c and d:
Noting this one can see that changing d4 D c4 (because entry .4; 4/ must be on
a HVT) to 1 will not affect the other offsets. Due to our choice of Z1 we see that
d4 D c4 D 1 makes the entries in positions .4; 1/ and .4; 2/ structurally non zero. If
we write down H Œ1 for this new system (i.e. the DAE using equations f1 ; f2 ; f3 and
Z1 ) we get:
0 0
Œ1 x y
H D f30 2x 2y I
again we add an equation to the system so that we can always choose the variables
that are DD candidates at this stage:
Z2 WD x C ıy z2 D 0: (5)
So that our new DAE’s signature matrix with canonical offsets is:
x y z1 z2 ci
f1 0 2 1 0ı 1 11 0
f2 B1 2ı 0 1 1C 0
B ı C
0 0
˙ D 3B
f 1 1 1C 2
@ A
Z1 1 1 1 0 1 0
Z2 0 0 1 1 0 0
dj 2 2 0 0 0
Now to have all necessary entries of H Œ0 and H Œ1 structurally non zero we need to
set c4 D d4 D 1 and c5 D d5 D 2. Note that adding these equations to the system
does not change the original solution of the DAE, because the equations we add
form a new block dependent on the original DAE’s (block 1 above) solution. If we
Solving DAEs by Selecting Universal Dummy Derivatives 669
We see that a valid choice is x00 , y00 and z002 —what we’re doing is adding DDs for all
variables in an old block that doesn’t contain an equation introduced at this stage
in the original system and ‘borrowing’ DDs from the new blocks that do use an
equation introduced at this stage in the original system. We’re forcing ourselves in
to a scheme that is unobtainable by performing a block decomposition of the new
DAE and doing DDs on each block. When proceeding to find H Œ1 we see that the
equation introduced for stage 1 is removed and we select x0 and y0 as DDs. Now note,
that since the second equation we introduced is almost the antiderivative of the first
we can condense both in to only one additional equation and finish with a DAE that
has the following signature matrix and valid offsets and now only selects x00 , x0 , y00
and y0 as DDs. The reason this is possible to do is perhaps not clear at first glance
(since whilst such a reduction is clearly structurally valid it may fail numerically).
Note that due to Griewank’s Lemma [2] our new DAE’s DD Jacobians GŒ1 and GŒ2
are equal, so if a set of parameters works for stage 1 it will also work for stage 2.
x y z2 ci
f1 0 2 1 0ı 11 0
f2 B1 2ı 0 1C 0
˙ D f3 @ 0ı 0 1 1A 2
Z2 0 0 1 0 2
dj 2 2 0 2
Before giving a general algorithm for adding such equations to the system we need
the following definition:
Definition 1 Let the m and n be the number of rows and columns in the DD
matrix H Œ1 respectively.
We have the following algorithm to find a static selection of states (Note: we only
suggest to carry out the algorithm below in practice if a static selection cannot
already be found.):
670 R. McKenzie and J.D. Pryce
Note: The final check at the end is not needed to keep a static selection of dummy
derivatives, but can reduce the size of the resulting index 1 problem, as seen in
Sect. 2. Note also line 15 where we introduce extra dummy derivatives for the new
variables—we need the new equations at some stage but we do not need them at
previous stages and will instead solve their block based DD system at those stages,
which by construction is always square. Let us consider the following example:
Example 2 Consider a problem with signature and initial H matrix:
x1 x2 x3 x4 x5 c i
f1 0 2 111 x000
1 x002 x003 x004 x005
f2 B 2 2 C0 f10 0 0 0 0 1
B C
f3 B 1 0 C2 f300 B 0 0 0C
˙D @ A and H Œ0 D @ A
f4 0 0 2 f400 0 0 0
f5 1 1 1 f50 0 0 0
dj 3 2 2 2 2
and S D 1. This makes sense: there are only two possible choices of GŒ1 . All
variables that appear in a GŒ1 are also in candidatelist, either we have
to the DAE and choose x001 , x03 , x04 and vv100 to be ‘Universal’ DDs, setting d7 D
c7 D 2.
Let us just confirm our choice of DDs is valid (given the potential need to update
our parameters to keep any structurally non singular G matrix numerically non
singular). Our enlarged system has signature matrix and initial H matrix:
x1 x2 x3 x4 x5 v1 vv1 ci
f1 0 2 1 11 x000
1 x002 x003 x004 x005 v10 vv100
f2 B 2 2 C0 f10 0 0 0 0 0 0 1
B C
f3 B 1 0 C2 f300 B 0 0 0 0 0 C
B C B C
0 0 f400 B 0 0 0 0 0 C
˙ D 4B C2
f
B C and H Œ0 D 0 B C:
f5 B 1 1 C1 f5 B 0 0 0 0 0 C
@ A @ A
Z1 2 1 1 1 1 0 1 Z10 ˛ ˇ ı 1 0
00
Z2 1 0 0 0 2 Z2 0 0 0 1
dj 3 2 2 2 2 1 2
672 R. McKenzie and J.D. Pryce
x01 x3 x4
f3 0!
GŒ2 D f4 0
Z2
Theorem 1 is why we consider all non empty columns in our candidatelist. We now
seek to justify our removal of equations in the last part of the algorithm above.
Theorem 3 If a scheme produced by the above algorithm yields equations that can
be removed the solution is the same as the scheme without removing those equations.
Proof Structurally it is clear that such removal still leaves us with the same potential
choice of DDs, since if such a removal is possible we will have (at least) structurally
identical equations at some stage , (at least one) of which is being treated as
its own block system until its new variable is needed to make a square G matrix.
Numerically if such a reduction is possible then the size of the candidatelist vector
must remain unchanged. Since we only remove equations in our DD stages we have
two possibilities, either the difference between the size of candidatelist and m has
stayed the same, or it has increased. If it has stayed the same then the proposed
removal of equations gives us the same structural matrix, and by Griewank’s Lemma
the same numerical matrix. If it has reduced we will be adding new equations
that are not the antiderivatives of equations previously introduced. In which case
we can still make our corresponding G matrix non-singular by varying only the
new parameters introduced at this stage, since we know the rows are linearly
independent.
Note: The above proof yields a necessary condition for introducing equations that
can be removed that could shorten our algorithm. If at some stage ci > 1 for
each i considered at that stage then at the next stage we must introduce equations
which are the ‘antiderivatives’ of the ones introduced at this stage. We could shorten
Algorithm 1 by introducing such a condition. Finally we have the following:
Theorem 4 The above algorithm provides an always static selection of DDs that
is always valid (provided one chooses suitable parameters throughout integration)
and has same solution as the original DAE.
Proof Theorems 1 and 3 give us that we have a valid DD scheme, hence all that
is left to prove is that such equation additions do not change the solution set. As
illustrated in above example the inclusion of additional equations in the described
manner is equivalent to adding more dependent blocks to the system, which will not
change the original block’s solution.
Note: ‘same solution’ in the above Theorem may be confusing on a first read since
the reformulated DAE is of a larger size. We mean that the value of any xi .t/ in the
original DAE is also the value of that same xi .t/ in the reformulated DAE.
674 R. McKenzie and J.D. Pryce
in MATLAB using ode45 (using variable step size with initial conditions x D 6,
y D 8, x0 D y0 D 0 and parameters L D 10 and G D 9:81) by reformulating
the problem as an ODE in z2 and z02 and switching parameters whenever the
angle between .x; y/ and .; ı/ becomes small. We compare the solution with one
produced by DAETS [6], an accurate order 30 Taylor series solution, see Fig. 1.
We briefly present some information on switching the system (changing and
ˇ), a full discussion is left to a future work. If we choose our switching condition the
angle between .; ı/ and .x; y/ being less that =4, i.e. trying to keep the G matrices
well conditioned then the change in energy from t D 0 to t D 100 grows to around
105 . If we instead switch after every time to step to a new .; ı/ orthogonal to .x; y/
this change is greatly reduced to around 1012 . One could also attempt to solve the
new ‘Universal’ DD system by coming up with a continuous choice of parameters
so that the G matrices are globally non-singular, however in general this will likely
be difficult to achieve so we do not present results for doing this with the simple
pendulum.
Solving DAEs by Selecting Universal Dummy Derivatives 675
−6
10
−8
10
−10
10
−12
10
−14
10 x
y
−16
10
0 50 100 150 200 250 300 350 400 450 500
Time
Fig. 1 Difference between the solution of the ‘Universal’ Dummy Derivative index 1 formulation
of the simple pendulum solved in MATLAB by reformulating to an ODE and using ode45 and
the solution to the original index 3 formulation solved via an order 30 Taylor Series method using
DAETS
5 Conclusion
References
4. Mattsson, S.E., Söderlind, G.: Index reduction in differential-algebraic equations using dummy
derivatives. SIAM J. Sci. Comput. 14(3), 677–692 (1993)
5. McKenzie, R., Pryce, J.D.: Structural analysis and dummy derivatives: some relations. In: Cojo-
caru, M.G. (ed.) Interdisciplinary Topics in Applied Mathematics, Modeling and Computational
Science, pp. 293–299. Springer, Cham (2015)
6. Nedialkov, N.S., Pryce, J.D.: DAETS User Guide. 2008–2009
On a Topological Obstruction in the Reach
Control Problem
Abstract This paper explores aspects of the Reach Control Problem (RCP) to drive
the states of an affine control system to a facet of a simplex without first exiting from
other facets. In analogy with the problem of nonlinear feedback stabilization, we
investigate a topological obstruction that arises in solving the RCP by continuous
state feedback. The problem is fully solved in this paper for the case of two and
three dimensions.
1 Problem Statement
This paper studies a topological obstruction that arises in solving the Reach Control
Problem (RCP) using continuous state feedback. We consider a simplex S WD
cofv0 ; : : : ; vn g with vertices fv0 ; : : : ; vn g and facets fF0 ; : : : ; Fn g. Each facet is
indexed according to the vertex it does not contain. Facet F0 is called the exit facet.
Let hj be the normal vector to facet Fj pointing outside S. Define I D f1; : : : ; ng. Let
I.x/
f0; 1; : : : ; ng be the minimal set of indices such that x 2 cofvi ; j i 2 I.x/g.
That is, x is in the interior of cofvi j i 2 I.x/g.
We consider the affine control system on S
xP D Ax C Bu C a ; (1)
A parallel study of the same problem was made in [10] (some preliminary work
appeared in [8]). The contributions of this paper significantly differ from [10]. This
paper primarily uses retraction theory to study the case of dim.OS / D n 1.
This leads to a simple solution in low dimensions of n. Studies of low-dimensional
systems are prevalent [1]. On the other hand, [10] uses homotopy theory to study the
case of dim.B/ D 2. While the conclusions of [10] could also potentially lead to a
solution in low dimensions of n, this situation is not explored in [10]. Furthermore,
the elegant cone condition for the topological obstruction developed in this paper,
B \ cone.OS / D 0, does not make an appearance at all in [10]; its place is taken by
a more involved result based on null-homotopic maps on a circle.
A supplement to this paper is found in [11] where we present supporting results
and a study of the case of an obstruction using affine feedback. The results of this
paper for the case of n D 2; 3, Theorems 3 and 4, could be obtained from [11].
However, while it is tempting to forgo more advanced topological methods in favour
of the brute force linear algebra arguments in [11], we insist on the importance of
the topological approach in order to have a hope of generalizing the results to higher
dimensions.
For each x 2 S, we define the cone
In other words, C.x/ is the set of all vectors y which, when attached at x, point into
S or through the exit facet F0 . (We note that if x 2 Int.S/, C.x/ D Rn .) In order
for the trajectory u .t; x0 / to not leave S through any facet except the exit facet, we
require [6]:
du
D Ax C Bu.x/ C a 2 C.x/ ; x2S: (3)
dt
In addition to this necessary condition, if u.x/ solves the RCP then there are no
closed-loop equilibria in S. The equilibria of an affine system can only lie in the
affine space O, and for all x 2 S \ O and u 2 Rm , Ax C Bu C a 2 B. Defining the
closed-loop vector field f .x/ D Ax C Bu.x/ C a, the previous statements suggest that
a necessary condition to solve the RCP by continuous state feedback is: there exists
a non-vanishing continuous map f .x/ on the set S \ O such that f .x/ 2 B \ C.x/.
Motivated by Brockett’s work [3], we will say that if such a function does not exist,
the system contains a topological obstruction.
Define OS D S \ O. We define cone.OS / D \x2OS C.x/. For the remainder
of the paper we assume that OS ¤ ;. We will also assume v0 … OS , as well as
1 dim.OS / n 1. The cases of dim.OS / D 0; n and v0 2 OS are trivial to
analyze. For the sake of completeness, this analysis was formally done in Lemma 9,
Lemma 10 and Corollary 11 of [11].
On a Topological Obstruction in the Reach Control Problem 679
2 Main Results
This section presents the main results on solving Problem 1. We show that if
dim.OS / D n 1, then it is possible to characterize the solution of Problem 1
in terms of a smaller polytope OS0 , and OS0 will be amenable to a complete analysis
of the problem in low dimensions. The main result is presented in Theorem 1. The
consequences of Theorem 1 to low dimensional systems are presented in Theorem 3.
Let us assume OS is .n 1/-dimensional. According to [7, 9], this means S is cut
by O into two parts: one part containing v0 and p 0 other vertices, and the other
containing the other n p 1 vertices of S. W.l.o.g. we assume fv0 ; v1 ; : : : ; vp g
are on one side of OS and fvpC1 ; : : : ; vn g are on the other side, where we assume
vertices of S on OS are in the set fvpC1 ; : : : ; vn g. The vertices of OS lie on those
edges of S connecting vi ’s which are on different sides of OS . Thus, we employ the
notation oij to denote a vertex of OS with I.oij / D fi; jg. If there are no vertices of S
on OS , then OS has .p C 1/.n p/ vertices [7], but if OS contains r vertices of S,
then OS has .p C 1/.n p/ pr vertices. At this point we introduce a mild abuse
of notation with the convention that if vj 2 OS , then oij D vj for all i D 0; : : : ; p.
Let us introduce the following notation. Let
We observe that since I.oij / D fi; jg, if x 2 fi1 ; i2 ; : : : ; ik jj1 ; j2 ; : : : ; jl g then I.x/
fi1 ; i2 ; : : : ; ik g [ fj1 ; j2 ; : : : ; jl g. Also observe that OS D f0; : : : ; pjp C 1; : : : ; ng.
Lemma 1 Let OS D f0; : : : ; pjpC1; : : : ; ng, A D fi1 ; : : : ; ik jj1 ; : : : ; jl g
OS , and
A0 D fi01 ; : : : ; i0k0 jj01 ; : : : ; j0l0 g
OS . Let L D fi1 ; : : : ; ik g \ fi01 ; : : : ; i0k0 g. Analogously,
let R D fj1 ; : : : ; jl g \ fj01 ; : : : ; j0l0 g. Then, A \ A0 D fLjRg.
Proof By definition every vertex of fLjRg is a vertex of A and of A0 , so fLjRg
A \ A0 . Conversely, suppose x 2 A \ A0 . Since x 2 A, I.x/
fi1 ; : : : ; ik ; j1 ; : : : ; jl g
and since x 2 A0 , I.x/
fi01 ; : : : ; i0k0 ; j01 ; : : : ; j0l0 g. Hence, I.x/
L [ R, where we
use the fact that fi1 ; : : : ; ik g \ fj01 ; : : : ; j0l0 g D ; and fi01 ; : : : ; i0k0 g \ fj1 ; : : : ; jl g D ;. It
follows x 2 fLjRg. t
u
Before getting to the crux of the problem, let us introduce the notions of a
homeomorphism and a retraction. Let X and XQ be topological spaces. X and XQ
are homeomorphic if there exists a continuous bijection h W X ! XQ which has
a continuous inverse. Furthermore, if A is a subspace of X , a continuous map
r W X ! A is a retraction if rjA id.
680 M. Ornik and M.E. Broucke
1
Really, this is done through another homeomorphism: this time, imagine, before flattening the
ball, choosing the part that needs to be flattened to be Sd1 nP .
682 M. Ornik and M.E. Broucke
Since .1; 0; 0/ and .0; 1; 0/ are linearly independent, y1 and y2 are linearly
independent as well.
Next, assume rank.H/ D 2. In other words, M D c1 h1 C c2 h2 for some c1 ; c2 2
R. Then, by taking s1 D s2 D 0, equation (5) reduces to Œh1 h2 T y D 0. By the rank-
nullity theorem, there exists y ¤ 0 satisfying this equation. Moreover, if w.l.o.g.
v0 D 0, then y 2 F1 \ F2 D cofv0 ; v3 g, and we can take y D v3 . We have shown
there exist linearly independent b11 ; b12 2 C.o1 / and there exists 0 ¤ b2 2 C.o2 /.
We claim at least one of the pairs fb11 ; b2 g and fb12 ; b2 g is linearly independent. For
otherwise there exist c1 ; c2 2 R such that b2 D c1 b11 D c2 b12 , implying b11 and
b12 are linearly independent, a contradiction. We conclude there exists a linearly
independent set fb1 ; b2 j bi 2 C.oi /g.
Next we assume neither o1 nor o2 lies in the interior of a facet. W.l.o.g. suppose
o1 2 F1 \ F2 and o2 2 F1 \ F3 . If either C.o1 / or C.o2 / contains two linearly
684 M. Ornik and M.E. Broucke
v0
o03
v3
o02
o13
v1 v2
o12
0
Fig. 1 The set OS for Example 1. The edge from o02 to o03 forms OS
v0 v0 v0
v3 v3 v3
v1 v2 v1 v2 v1 v2
Fig. 2 Three of the four possible configurations of set OS for n D 3 and dim OS D 2, with the
fourth one given in Fig. 1. The leftmost configuration is addressed by Theorem 2, while the other
two can be reduced using Theorem 1
B \ cone.OS / ¤ 0.
cone.OS / D fy 2 Rn j hj y 0 ; j D 1; 2; 3g :
3 Conclusion
This paper introduces a topological obstruction to solving the RCP via continuous
state feedback. The results show an interplay between linear algebra-based argu-
ments regarding the number of control inputs and purely topological arguments
regarding a cone condition on B. We show that for n D 2 and n D 3 these two
properties together fully characterize when a topological obstruction arises.
References
1. Bemporad, A., Morari, M., Dua, V., Pistikopulos, E.N.: The explicit linear quadratic regulator
for constrained systems. Automatica 38(1), 3–20 (2002)
2. Bredon, G.E.: Topology and Geometry. Springer, New York (1997)
3. Brockett, R.W.: Asymptotic stability and feedback stabilization. In: Brockett, R.W., Millman,
R.S., Sussmann, H.J. (eds.) Differential Geometric Control Theory, pp. 181–191. Birkhauser,
Boston (1983)
4. Broucke, M.E.: Reach control on simplices by continuous state feedback. SIAM J. Control
Optim. 48(5), 3482–3500 (2010)
5. Broucke, M.E., Ganness, M.: Reach control on simplices by piecewise affine feedback. SIAM
J. Control and Optim. 52(5), 3261–3286 (2014)
6. Habets, L.C.G.J.M., van Schuppen, J.H.:A control problem for affine dynamical systems on a
full-dimensional polytope. Automatica 40(1), 21–35 (2004)
7. Kettler, P.C.: Vertex and Path Attributes of the Generalized Hypercube with Simplex Cuts.
University of Oslo, Oslo (2008)
On a Topological Obstruction in the Reach Control Problem 687
1 Introduction
O. Pichugina ()
Department of Mathematics & Statistics, Brock University, St. Catharines, ON, Canada
e-mail: [email protected]
S. Yakovlev
Department of IT & Protection of Information, National University of Internal Affairs, Kharkov,
Ukraine
e-mail: [email protected]
© Springer International Publishing Switzerland 2016 689
J. Bélair et al. (eds.), Mathematical and Computational Approaches in Advancing
Modern Science and Engineering, DOI 10.1007/978-3-319-30379-6_62
690 O. Pichugina and S. Yakovlev
is not very precise since the continuous techniques are often used for solution of
subproblems in Branch & Bound, Branch & Cut and other combinatorial algorithms.
In [3] connection between continuous and combinatorial approaches to discrete
problems are discussed, and an overview of the continuous ones is given. The last
approaches are typically classified into continuous relaxation and reformulation
based. Among the relaxation techniques there are polyhedral and semi-definite
relaxations. For instance, the semi-definite programming is applicable to the UBQP
after reformulation of (1), (2) and (3) as a linear problem in Rnn over the cut
polytope. Since the analytic description of the polytope is unknown, its semi-definite
relaxation is used [2] and efforts of researchers are focused on strengthening this
basic relaxation [5].
The UBQP equivalent reformulations depend on ways how the discrete con-
straint (3) is rewritable as continuous one, e.g.:
– Way 1 [3]: xi C yi D 1; xi yi D 0; xi ; yi 0; i 2 Jn D f1; : : :; ng, transform the
UBQP into a constrained quadratic problem in R2n ;
– Way 2 [3, 4, 6]: replacement of (3) by (4) allows to consider the unconstrained
problem (5) instead of the UBQP.
The next two approaches utilizing (4) reduce the UBQP to concave or convex
problems and are based on the following property: if f .x/ satisfies (7), then
9min ; max ; min max such that ˚ 1;2 .x; / are concave 8 max and convex
8 min .
xi .1 xi / D 0; i 2 Jn : (4)
X
˚ l .x; / D f .x/ C .xi .1 xi //l ! min : (5)
i
0 x 1; (6)
f .x/ 2 C2 .Rn /; @2 f .x/=.@xi @xj / < 1; i; j: (7)
For example, concave methods [3] are applied to (1), (2) and (3) equivalent
reformulation (2), (5), (6) (l D 1) where is chosen to provide concavity of (5).
The smoothing methods [6] utilize (5), (6) (l D 2) in a penalty function; use the
boxing constraints (6) in forming barriers and providing convexity of the function
for a range of .
We continue study of the continuous approaches to binary optimization based
on nonlinear reformulations at the same space. For the purpose, we introduce the
concepts of an extension of a function from sets onto larger sets (see Sect. 2)
and a functional representation of discrete sets (see Sect. 2.3). The presented in
Sects. 2.2 and 2.3 methods operate with sets inscribed into a sphere and convex
extensions from the sets. Ways of constructing the extensions, in particular for (2),
are described in Sect. 2.1. The Branch and Bound Polyhedral-Spherical Method
(B&BPSM) for “two-layer sets”, combining branch and bound techniques with
polyhedral and spherical relaxations, is described and specified for the UBQP
Conltinuous Approaches to the Unconstrained Binary Quadratic Problems 691
2 Main Part
x 2 E Rn ; (8)
jEj D N < 1; (9)
E Sr .a/; (10)
2 2
Sr .a/ D fx 2 R W .x a/ D r g:
n
(11)
There is a number of combinatorial sets inscribed into a sphere, such as the binary
set Bn [6, 12], the permutation and polypermutation sets, some classes of the partial
permutations and combinations [8]. So, the class (1), (8), (9), and (10) includes all
unconstrained problems over these sets, in particular, the UBQP.
The set (9), (10) is vertex located, i.e. E coincides with the vertex set of the
corresponding polyhedron:
By (16), (17) is an extension of any f .x/ from Smin and 8E
Smin onto Rn .
Conltinuous Approaches to the Unconstrained Binary Quadratic Problems 693
Using Theorem 2 and taking D k in (13), we obtain that (17) is the CDE
of (7) 8 < min D K, where K can be estimated according to Remark 1.
In particular, (17) is a CDE of (2) from Bn onto Rn if < min , where the bound
min can be found exactly: min is the minimal eigenvalue of the matrix A.
Way 2 : The convex extensions can be formed specifically for a discrete set. For
instance, a convex extension of (2) from Bn onto Rn can be constructed as follows:
– the function (2) is represented as a sum of a convex linear form f1 .x/ and a
quadratic form f2 .x/:
X
n X
n X
n X
n X
n
f1 .x/ D ci xi ; f2 .x/ D aij xi xj D jaij j .˙xi xj /I
iD1 iD1 i j iD1 i j
– the convex extensions are formed for each nonconvex term jaii j x2i and ˙jaij j
xi xj using the property (4): 8i 2 Jn ; x2i D xi . For the both types of nonconvex
Bn
terms the convex extensions are formed as follows:
(a) if i D j and aii < 0, then the CDE of the component fii D x2i is Fii D xi ;
(b) if i ¤ j and aij
¤ 0, then the CDEFij of
the component fij D ˙xi xj is:
1
2 2 2 1
2
fij D ˙xi xj D 2 xi ˙ xj xi xj D 2 xi ˙ xj xi xj D Fij ;
Bn
– all these convex extensions are incorporated to the final CDE F.x/ of (2):
X
n X
n X X
F.x/ D f .x/ C D x2i D xi , where D D jaii j C jaij j:
iD1 iD1 aii <0 aij ¤0;i<j
The discrete problem (1), (8)–(10) is equivalent to the f .x/-optimization problem (1)
over intersection of a sphere (11) and a polyhedron (12), f .x/ ! min. It yields
P\Sr .a/
two types of continuous relaxations: Relaxation 1 – optimization over a polyhedron,
which is convex problem (15); Relaxation 2 – optimization over a sphere, which is
nonconvex problem (14).
The Polyhedral-Spherical Method (PSM) is the cutting-plane method where
cuttings of infeasible parts of a hypersphere are conducted by polyhedron facets.
In [9, 12] the approximating version of this method was presented and applied
to quadratic optimization over the permutation set and the binary set, respectively.
This version essentially uses: (a) the convex extensions of a quadratic function;
(b) simplicity of search of all stationary points of a convex quadratic function
on a sphere; (c) easiness of solving (15) over the hypercube (6). The search of
694 O. Pichugina and S. Yakovlev
x D argminf .x/ is restricted to facets cutting the stationary points. Then the
E
problem is reduced to search of these points and solving the subproblems of
type (14), (15) on these facets, etc. As a result, a series of optimization problems of
different dimensions with convex objective functions over sets inscribed into spheres
is solved.
In [7] the method is generalized for any sets inscribed into a sphere and is named
the Polyhedral-Spherical Method.
In [12] the exact version for (1), (2), and (3) is also presented, which utilizes the
decomposition of Bn into two subsets located on parallel facets of (6).
In this paper, we modify the exact method and generalize it, in the
Branch&Bound PSM (B&BPSM), to any “two-layer” combinatorial set, i.e. it
allows the decomposition: 8a; b W ax D b is a P-facet dim conv.fx 2 E W ax ¤
bg/ < dim P.
The B&BPSM Algorithm for two-layer sets
Step 1. The unconstrained convex problem (1) is solved, z D min
n
f .x/ D f .x /,
R
and x is projected onto E, y D PrE x . The initial upper zu and lower zl
estimated bounds are: zl D z ; zu D z.y / D zy .
Step 2. Depending on location of x we choose: Scheme 1 – solving the Relax-
ation 2 problems at each step – if x 2 P (xP D x ); Scheme 2 – solution of
Relaxation 1–2 problems at each iteration – if x … P.
Step 3. Initialization H D f;g, BH D Bf;g is the root of the search tree. The
candidate solution set B D Bf;g .
Step 4. Take the branch BH 2 B with the least lower bound and jHj < n. If the
0
choice is not unique, then among BH 2 fBh ; Bh g the branch Bh is examined first,
h0
B – next.
If for BH the relaxation problems were solved, go to Step 4.2, otherwise to Step
4.1:
Step 4.1. For BH solve the relaxation and projection problems on RnjHj -facet
depending on the scheme: (a) for Scheme 1 – xS;H ; yS;H , the bounds are zl;H D
x ; z D min.z ; zy /; (b) for Scheme 2 – x
zS;H ; xP;H ; yS;H ; yP;H , the bounds
u u S;H S;H
The B&BPSM for the UBQP. Step 4.2 becomes: ˘.xS;H / D fx W xi D bg. The rule
for cutting plane choice on Step 4.2 becomes: ˘.xS;H / D fx W xi D bg, ˘ 0 .xS;H / D
fx W xi D 1 bg where b 2 f0; 1g, i 2 Jn is chosen depending on which one of the
restrictions xi 0 or xi 1 is mostly violated at xS;H . Respectively, new branches
0
BfH;jHC1jg ; BfH;jHC1j g correspond to fixing the coordinate xi .
Example 1 Solve the following problem: f .x/ D 33:1 x21 C 23:7 x22 C 21:6 x23
11:4 x1 x2 C 38:8 x1 x3 15:6 x2 x3 52 x1 4 x2 39 x3 ! min; x 2 B3 :
Solution outline:
1. n D 3, f .x/ is convex, x D 12 A1 c D .0:51; 0:40; 0:59/, y D .1; 0; 1/. The
initial bounds are zl D z D 25:54; zu D zy D 2:5;
2. x is an interior point of the unit hypercube (xP D x , yP D y ). The results of
the relaxation Scheme 1: xS D .0:06; 0:51; 1:25/, yS D .0; 1; 1/. The bounds are
zl D zS D 21:30, zu D min.zu ; zSy / D min.2:50; 13:30/ D 13:30 (the record
occurs at xu D .0; 1; 1/).
3. H D f;g, the right cut for xS;H D xS is uniquely defined by x3 1. Respectively,
x3 is fixed and exploring of the search tree starts with the branch BfH;jHC1jg D
0 0
B1 W x3 D 1, the next one is BfH;jHC1j g D B1 W x3 D 0.
4. The reduction is conducted (H D f1g) and, at first, the Relaxation 2 problem on
the plane x3 D 1 is solved yielding xS1 D .0:09; 0:11; 1/, zl1 D zS1 x D 17:7.
yS1 D .0; 0; 1/, zS1 y D 17:4 > zu
; new record zu
D 17:4 occurs at xu D
.0; 0; 1/.
The right cut for xS1 is x1 0 yields two branches with H D fH; jH C 1jg D
0
f1; 2g, B12 W x1 D 0; x3 D 1 and B12 W x1 D 1; x3 D 1, with fixed x1 and the
0
lower bound zl12 D zl12 D zl1 D 17:7.
0 0 0 S10
5. The same is conducted for B1 : xS1 D .1:04; 0:04; 0:00/, zS1 x D 18:92; y D
0
.1; 0; 0/, zS1
y D 18:9. New record is zu
D 18:9 at x u
D .1; 0; 0/ and the
0 0 0
bound is zl1 D 18:92. The right xS1 -cut is x1 1 yields the branches B1 2 W
10 20 l10 2 l10 20
x1 D 1; x3 D 0 and B W x1 D 0; x3 D 0, with the lower bound z Dz D
0
zl1 D 18:9.
0 0 0
6. The least lower bound 18:92 corresponds to B1 2 and B1 2 , which are examined
0
consecutively. First, for H D f1 ; 2g Relaxation 2 is conducted. Since, jHj D n
0 0
1, B1 2 corresponds to 1-sphere, where, in addition to yS1 D .1; 0; 0/, it is enough
S10 0
to analyse another endpoint t D .1; 1; 0/ of the hypercube edge, zS1 t D 10:6.
l10 2 S10 S10 0 0
z D min.zy ; zt / D min.18:9; 10:6/ D 18:9. For H D f1 ; 2 g and B1 2 0 0
0 0 0 0 0 0 0 0
the result of Relaxation 2 is xS1 2 D .0; 0; 0/. Since zl1 2 D zS1 2 D 0 > zu , B1 2
is discarded.
7. No bud nodes with less lower bound than zu D 18:9 left. The examination of
the search tree is terminated. The solution is x D .1; 0; 0/, z D 18:9.
Illustration of the solution is shown in Figs. 1, 2, and 3.
696 O. Pichugina and S. Yakovlev
0.8
0.6
x2
B12’
0.4 B12
0.2
xS1
–0.2 0 0.2 0.4 0.6 0.8 1 1.2
x1
–0.2
yS1
0
Fig. 3 B1 exploration 1.2
1
tS1’2
0.8
x2
0.6
B1’2’
0.4 B1’2
0.2 S1’2’
X
xS1’
–0.2 0 0.2 0.4 0.6 0.8 1 1.2
x1 yS1’=XS1’2’
–0.2
X
m
2
˚.x; / D f .x/ C f i .x/ ! min: (20)
>0
iD1
X
m
2
˚.x; ; / D f .x/ C ..x a/2 r2 / C f i .x/ .; > 0/: (22)
iD1
The problem (22) can be solved for two increasing sequences, (21) and fj W j <
jC1 gj , in the way described below:
The FRPM Algorithm for (1), (8) based on (22).
Step 0. Set j D 0, 0 D 0, " > 0, the upper and lower bounds zl D 1, zu D 1;
Step 1. Solve (22) for (21), D j , and obtain fxjk gk ; xj D xjK . zl D max.zl ; zj /,
zu D min.zu ; f .PrE .xjk //;
k
Step 2. For (22), by Remark 1, find the lower bound 0j : 8 > 0j ˚.x; K ; /
is convex. Solve (22) for D K , 2 Mj D fj0 > 0 W j0 <
0
j0 C1 ; J 0 > 0j gj0 2JJ0 , the solutions are fxjK gj ; xK D xJ K . zl D max.zl ; zK /,
zu D min.zu ; f .PrE .xjK //;
j
Step 3. Set f .x/ D ˚.x; K ; J 0 /;
Step 4. Repeat Steps 1–3. The process terminates if zu zl < ".
Assuming that n > 3, we classify functional representations of discrete sets
depending on a number of functions in (18) as follows: (a) intersecting functional
representation if m D n implying that E is formed as an intersection of n surfaces;
(b) touching functional representation if m D 2, hence, E is the set of touching
points of two surfaces; (c) otherwise mixed functional representation.
Deriving functional representations of combinatorial sets is an interesting on its
own problem, because it provides better understanding the sets topological structure.
Among this class of problems finding the touching representations is a problem of
particular interest since it investigates extremal properties of the sets. Indeed, let
assume that a touching representation of E is known and the functions in (18) are
enumerated such that the surface S2 D f f2 .x/ D 0g is inscribed into S1 D f f1 .x/ D
0g. Then E is the set of local minimizers of f2 .x/ on the surface S1 .
Touching sets representations, especially differentiable ones, are useful in opti-
mization, e.g., they allows usage in the FRPM, instead of (22), the penalty function:
2
X 2
X 2
˚.x; ;
/ D f .x/ C i f i .x/ C i f i .x/ ; (23)
iD1 iD1
X
n X
n
f1 .x/ D .xi 0:5/2 D n=4; f2 .x/ D .xi 0:5/4 D n=16: (24)
iD1 iD1
We recommend for the UBQP utilizing (24) in the penalty function (23) of (1),
(2), and (3).
3 Conclusion
Two approaches, the B&BPSM and FRPM, to discrete optimization over sets
inscribed into a sphere are presented. For the UBQP they use analytic descriptions
of Bn as an intersection of a hypercube with a sphere and as a touching set; convex
extensions of quadratic functions. The approaches can be applied to other sets with
known analytic description of a convex hull, a circumscribed surface, a functional
representation, and to any function with known the global minimizer on the surface.
700 O. Pichugina and S. Yakovlev
References
1. Dahl, J.: Convex optimization in signal processing and communications. Ph.D. dissertation.
Department of Communication Technology, Aalborg University (2003)
2. Helmberg, C., Rendl, F.: Solving quadratic (0,1)-problems by semidefinite programs and
cutting planes. Math. Program. 82(3), 291–315 (1998)
3. Hillier, F.S., Appa, L., Pitsoulis, L., Williams, H.P., Pardalos, P.M., Prokopyev, O.A., Busygin,
S.: Continuous approaches for solving discrete optimization problems. In: Handbook on
Modelling for Discrete Optimization, pp. 1–39. Springer, New York (2006)
4. Kochenberger, G., Hao, J.-K., Glover, F., Lewis, M., Lu, Z., Wang, H., Wang, Y.: The
unconstrained binary quadratic programming problem: a survey. J. Comb. Optimiz. 1, 58–81
(2014)
5. Krislock, N., Malick, J., Roupin, F.: Improved semidefinite bounding procedure for solving
Max-Cut problems to optimality. Math. Program. 143(1–2), 61–86 (2014)
6. Murray, W., Ng, K.-M.: An algorithm for nonlinear optimization problems with binary
variables. Comput. Optimiz. Appl. 47(2), 257–288 (2008)
7. Pichugina, O., Yakovlev, S.: Polyhedral-spherical approach to solving some classes of com-
binatorial optimization problems. In: Proceedings of the 6th International School-Seminar on
Decision Theory, Uzhgorod, pp. 152–153 (2012)
8. Stoyan, Y.G., Yemets, O.: Theory and Methods of Euclidean Combinatorial Optimization.
ISSE, Kiev (1993)
9. Stoyan, Y.G., Yakovlev, S.V., Parshin, O.V.: Quadratic optimization on combinatorial sets in
Rn . Cybern. Syst. Anal. 27(4), 562–567 (1991)
10. Stoyan, Y., Yakovlev, S., Emets, O., Valuiskaya, O.: Construction of convex continuations for
functions defined on a hypersphere. Cybern. Syst. Anal. 34(2), 176–184 (1998)
11. Yakovlev, S.: The theory of convex continuations of functions at the vertices of convex
polygons. Comput. Math. Math. Phys. 34(7), 959–965 (1994)
12. Yakovlev, S., Grebennik, I.: Certain classes of optimization problems on set distributions and
their properties. Izvestiya Vysshikh Uchebnikh Zavedenii Mathematika 11, 74–86 (1991)
Fixed Point Techniques in Analog Systems
1 Introduction
Analog computation, as conceived by Kelvin [10], Bush [1], and Hartree [4], is
a form of experimental computation with physical systems called analog devices
or analog computers. Historically, data are represented by measurable physical
quantities, including lengths, shaft rotation, voltage, current, resistance, etc., and
the analog devices that process these representations are made from mechanical or
electromechanical or electronic components [5, 7, 9].
The main objects of our study are analog networks or analog systems, [6, 11–13],
whose main components are described as follows:
FM W C.T; A /k A ` ! C.T; A /:
In this way, we can think of analog networks as directed graphs where modules
are nodes and channels are edges (see Fig. 1). We will use analog systems to study
the time evolution problem (also called the Cauchy problem).
Definition 1 (Time evolution problem, [3]) For a given initial condition g 2 A
and an operator L W A ! A , the time evolution problem is given by the system
du
dt
D Lu; t 2 TI
(1)
u.0/ D g:
where we use the right hand side to define an operator Fg W C.T; A / ! C.T; A /,
which can be computed using an analog network with two modules. Introducing a
feedback to implement the equality, we obtain the analog system of Fig. 1.
We can informally define a specification of the analog network as a tuple of
streams describing the data on all channels which satisfy the equations given by the
modules. We can then observe the equivalence between the notions of (a) solutions
to the time evolution problem of Definition 1; (b) specifications of the analog system
of Fig. 1; and (c) fixed points of the operator Fg of Equation (2). Henceforth we will
focus on the last notion. Our goal is to provide sufficient conditions on Fg that ensure
existence and uniqueness of fixed points, as well as the existence of a constructive
method to obtain fixed points when they exist.
In Sect. 2 we introduce Fréchet spaces, which form the framework for our
problem at hand. In Sect. 3 we assume analyticity of g to prove local existence and
convergence of fixed points (Theorem 2). In Sect. 4 we first extend our results to
global existence and convergence (Theorem 3) and then extend our constructive
Fixed Point Techniques in Analog Systems 703
method for different choices of initial input (Theorem 5). Finally, we turn to
uniqueness of fixed points and prove it for certain operators (Theorem 6).
2 Fréchet Spaces
It turns out that the notion of interest is that of Fréchet space, which we now
briefly review (a detailed exposition can be found in [8, Ch. V]).
Definition 2 (Fréchet space [8]) A Fréchet space is a topological vector space
X whose topology is induced by a countable family of pseudonorms fk k˛ g˛2A .
Moreover,
• the family fk k˛ g˛2A separates points, that is,
• X is complete with respect to fk k˛ g˛2A , that is, for every sequence .xn / which is
Cauchy with respect to each pseudonorm k k˛ , there exists x 2 X such that .xn /
converges to x with respect to each pseudonorm k k˛ .
Example 1 The space A D C1 .R/ of infinitely differentiable functions in R is a
Fréchet space with the countable family of pseudonorms given by
ˇ k ˇ
ˇ@ f ˇ
k f kN;k ˇ
D sup ˇ k .x/ˇˇ ; (4)
NxN @x
for N; k 2 N.
704 D. Poças and J. Zucker
Example 2 The space C.T; A / of continuous streams is also a Fréchet space, with
the countable family of pseudonorms given by
ˇ k ˇ
ˇ@ u ˇ
kukM;N;k D sup sup ˇˇ k .t; x/ˇˇ ; (5)
0tM NxN @x
for M; N; k 2 N.
We can see that the family of pseudonorms in Example 2 is closely related
to the family in Example 1. In fact, this illustrates a useful property of Fréchet
spaces; in general, the space of continuous streams over a Fréchet space is itself a
Fréchet space. In other words, Fréchet spaces work well with the operation of taking
continuous streams.
Proposition 1 (New Fréchet spaces from old) If A is a Fréchet space with a
countable family of pseudonorms fk k˛ g˛2A , then so is C.T; A / with the countable
family of pseudonorms fk kM;˛ gM2N;˛2A , where
Even though Fréchet spaces, as they stand, are not necessarily normed spaces, we
can define a metric from the pseudonorms, under which these spaces are complete.
Proposition 2 Given a Fréchet space, we can define a complete metric from the
family of pseudonorms which induces the same topology.
For a proof, see [8, Ch. V], in particular Theorem V.5.
The usefulness of complete metric spaces is evident due to the following.
Theorem 1 (Banach fixed point theorem) Given a complete metric space .X; d/,
suppose that T W X ! X is a contracting operator in the sense that there exists
0 < 1 with
Then T has a unique fixed point x . Moreover, for all x0 2 X the sequence of
iterations xn WD T n .x0 / converges to x .
· T,X,x0 ,k
x
x0 − X x0 x0 + X
Observe that we are taking suprema on compact rectangles of the form Œ0; T
Œx0 X; x0 C X (see Fig. 2). The reason for taking suprema on compact rectangles
will be made clear shortly with Theorem 2 (local convergence theorem). We also
observe that, for each compact rectangle X0 D Œ0; TŒx0 X; x0 CX, we can define
the space of compact continuous streams C.Œ0; T; C1 .x0 X; x0 CX//. Clearly, any
function in C.T; A / can be mapped to a function in C.Œ0; T; C1 .x0 X; x0 C X//
via the restriction u 7! uX0 . Moreover, C.Œ0; T; C1 .x0 X; x0 C X// can be seen
to be a Fréchet space with the family of pseudonorms k kT;X;x0 ;k given by (6). Note
that x0 , X and T are fixed and the indexing is on k 2 N.
Finally, observe that the operator Fg W C.T; A / ! C.T; A / has a restriction
FgX0 to the space C.Œ0; T; C1 .x0 X; x0 C X//.
Our next step is to prove contraction inequalities, which play an important role
in fixed point techniques.
Lemma 1 (Contraction inequalities) Consider the Fréchet space C.T; A / with
pseudonorms kkT;X;x0 ;k given by (6). Let g 2 C1 .R/ and Fg W C.T; A / ! C.T; A /
be given by (3). Then, for any u; v 2 C.T; A /, any pseudonorm k kT;X;x0 ;k and any
m 2 N, we have the following bound:
.j˛jT/m
kFgm .u/ Fgm .v/kT;X;x0 ;k ku vkT;X;x0 ;kCm : (7)
mŠ
Proof By induction on m. t
u
Let us see how we can use these bounds in a proof.
Theorem 2 (Local Fréchet space convergence theorem) Consider the Fréchet
space C.T; A / with pseudonorms k kT;X;x0 ;k given by (6). Take an initial input
u0 2 C.T; A / and initial condition g 2 C1 .R/. Assume also that u0 D 0 and g is
analytic at x0 with some radius of convergence1 R. Let Fg W C.T; A / ! C.T; A /
be given by (3). Then, for any T; X 2 RC such that j˛jT C X < R, the sequence .um /
1
Or equivalently, that g has a holomorphic extension on a disk of the complex plane with center x0
and radius R; see Remark 1.
706 D. Poças and J. Zucker
1
X
g.x/ D aj .x x0 /j :
jD0
p 1
It also follows that lim supn!1 n jan j R
(see Footnote 1). Moreover, we have
the following bound, for any X < R:
ˇ ˇ
ˇ X1 ˇ X 1
ˇ . j C k/Š ˇ . j C k/Š
kgkX;x0 ;k D ˇˇ sup ajCk .x x0 /j ˇˇ jajCk jX j : (9)
ˇjxx0 j<X jD0 jŠ ˇ jD0 jŠ
Let T; X 2 RC such that j˛jT C X < R. We show that .um / is a Cauchy sequence
with respect to the pseudonorm k kT;X;x0 ;k . First observe that
1
X 1
X
kumC1 um kT;X;x0 ;k D kFgm .g/ Fgm .0/kT;X;x0 ;k
mD0 mD0
1
X
1 Tm
j˛jm kgkX;x0 ;kCm
mD0
mŠ
1 X
X 1
2 .k C m C j/Š
j˛jm T m X j jakCmCj j
mD0 jD0
mŠjŠ
1 X
X s
3 .k C s/Š
D j˛jm T m X sm jakCsj
sD0 mD0
mŠ.s m/Š
1
X
4 .k C s/Š
D .j˛jT C X/s jakCsj ;
sD0
sŠ
where (1) is justified by the Contraction Inequalities (Lemma 1), (2) by equation (9),
(3) by rearranging the sum and adding over diagonals s D m C j and (4) by taking
the binomial expansion of .j˛jT C X/s .
Fixed Point Techniques in Analog Systems 707
X
j1 1
X
kuj ui kT;X;x0 ;k kumC1 um kT;X;x0 ;k kumC1 um kT;X;x0 ;k ! 0:
i!1
mDi mDi
y t
C T×R
R
T
g(x + iy)
u(t, x)
· · · x · · · x
x0 − R x0 x0 + R x0 − X x0 x0 + X
Fig. 3 On the left: a function g.x C iy/ of type C ! C, defined in a disk, that coincides with g
at fy D 0; x0 R < x < x0 C Rg. On the right: a fixed point u.t; x/ of type T R ! R, defined
in a rectangle, that coincides with g at ft D 0; x0 X < x < x0 C Xg. The rectangle and disk
dimensions follow the relation j˛jT C X < R
708 D. Poças and J. Zucker
The motivation for this terminology is that, for p such a function u, the section
x 7! u.t; x/ is entire for all t, and the convergence j jaj .t/j ! 0 is uniform in t.
Theorem 4 Consider the Fréchet space C.T; A / with the family of pseudonorms
k kT;X;x0 ;k given by (6). Let also u0 2 C.T; A / be an initial input, and g 2 C1 .R/
be an initial condition. We assume in addition that u0 is uniformly entire and g D 0.
Let F0 W C.T; A / ! C.T; A / be given by
Z t
F0 .u/.t; x/ D ˛ @x u.s; x/ds: (10)
0
X
We show that kum kT;X;0;k is a convergent series for any pseudonorm kkT;X;x0 ;k
m
with x0 D 0. We have that (see proof of Theorem 2)
1
X 1
X
kum kT;X;0;k D kF0m .u0 / F0m .0/kT;X;0;k
mD0 mD0
X1
j˛jm T m
ku0 kT;X;0;kCm
mD0
mŠ
ˇ ˇ
1 ˇX ˇ
X j˛jm T m ˇ 1 .j C k C m/Š ˇ
D sup ˇˇ ajCkCm .t/xj ˇˇ
mD0
mŠ 0tT ˇ jD0 jŠ ˇ
jxjX
1 X
X 1
.j C k C m/Š
j˛jm T m X j kajCkCm kT
mD0 jD0
mŠjŠ
1 X
X s
.k C s/Š
D j˛jm T m X sm kakCs kT
sD0 mD0
mŠ.m s/Š
X1
.k C s/Š
D .j˛jT C X/s kakCs kT :
sD0
sŠ
p P
and s
kakCs kT ! 0 by assumption. Therefore kum kT;X;0;k is convergent, so that
s!1
kum kT;X;0;k ! 0 and thus um converges to 0, as we wanted to prove. t
u
m!1
In this paper we have seen how to study solutions to differential equations as outputs
of analog networks, and how to obtain them using fixed point techniques. The
example we have considered (L D ˛@x ) is a well-known problem whose solution
can be obtained analytically by taking a Fourier transform. However, the method
presented in this paper provides a different perspective which is suitable for analog
computability and the study of analog systems as in [6, 11–13], where Fréchet
spaces clearly provide a natural framework.
We intend to investigate this approach (fixed points in Fréchet spaces) in more
general settings. In fact, as a next step one can look at a more general operator
L W A ! A using higher-order derivatives, for example with bounds of the form
References
1. Bush, V.: The differential analyzer. A new machine for solving differential equations. J. Frankl.
Inst. 212(4), 447–488 (1931)
2. Egorov, Y.V., Shubin, M.A.: Foundations of the Classical Theory of Partial Differential
Equations. Springer-Verlag, Berlin (1998)
3. Hadamard, J.: Lectures on Cauchy’s Problem in Linear Partial Differential Equations. Dover,
New York (1952)
4. Hartree, D.R.: Calculating Instruments and Machines. Cambridge University Press, Cambridge
(1950)
5. Holst, P.A.: Svein Rosseland and the Oslo Analyzer. IEEE Ann. Hist. Comput. 18(4), 16–26
(1996)
6. James, N.D., Zucker, J.I.: A class of contracting stream operators. Comput. J. 56, 15–33 (2013)
7. Johansson, M.: Early analog computers in Sweden – with examples from Chalmers University
of Technology and the Swedish aerospace industry. IEEE Ann. Hist. Comput. 18(4), 27–33
(1996)
8. Reed, M., Simon, B.: Methods of Modern Mathematical Physics: Functional Analysis.
Academic Press Inc., San Diego (1980)
9. Small, J.S.: General-purpose electronic analog computing: 1945–1965. IEEE Ann. Hist.
Comput. 15(2), 8–18 (1993)
10. Thompson, W., Tait, P.G.: Treatise on Natural Philosophy, vol. 1, (Part I), 2nd edn. Cambridge
University Press, Cambridge (1880)
11. Tucker, J.V., Zucker, J.I.: Computability of analog networks. Theor. Comput. Sci. 371, 115–146
(2007)
12. Tucker, J.V., Zucker, J.I.: Continuity of operators on continuous and discrete time streams.
Theor. Comput. Sci. 412, 3378–3403 (2011)
13. Tucker, J.V., Zucker, J.I.: Computability of operators on continuous and discrete time streams.
Computability 3, 9–44 (2014)
A New Look at Dummy Derivatives
for Differential-Algebraic Equations
Abstract We show the dummy derivatives index reduction method for DAEs,
introduced in 1993 by Mattsson & Söderlind, is a particular case of the Pryce
˙-method solution scheme. We give a pictorial display of the underlying block
triangular form.
This approach gives a simple general method to cast the reduced system in semi-
explicit index 1 form, combining order reduction and index reduction in one process.
It also shows each DD scheme for a given DAE is uniquely described by an
integer “DDspec” vector ı.
The method is illustrated by an example.
We give various reasons why, contrary to common belief, converting further from
semi-explicit index 1 form to an explicit ODE, can be a good idea for numerical
solution.
1 Introduction
We give a brief summary, wherein terms in slanted font are defined more fully later.
The dummy derivatives (DDs) method for a differential-algebraic equation
(DAE), described as a way to reduce it to a (locally) equivalent DAE of index 1,
was introduced by Mattsson and Söderlind [2] (here, MS denotes this paper or its
authors).
MS use the Pantelides method [4] for structural analysis (SA) of the DAE; this
can be replaced by the Pryce signature matrix method (˙-method) [5] which can do
the same analysis more simply, and is more powerful in that Pantelides only applies
to DAEs of first order. Hence the DAEs to which DDs, as described by MS, can
be applied are precisely the SA-friendly DAEs: those for which SA (Pantelides or
Pryce) succeeds , by giving a nonsingular System Jacobian at some point.
The batches of derivatives formed by DDs are exactly those in stages of the ˙-
method’s standard solution scheme , but in reverse order, as proved in [3]. This paper
follows up this connection. Adapting notation in [5], we give a concise description
2 Basic Theory
where the xj .t/; j D 1; : : : ; n are state variables that are functions of an independent
variable t, usually regarded as time.
The classic differentiation index d is the largest number of times some equation
fi of the system must be differentiated w.r.t. t to produce an enlarged system of
equations, solvable as an algebraic system to give an equivalent ordinary differential
equation system (ODE) for the state variables xj .t/.
Example 1 To contrast the above with the DDs viewpoint below, consider the DAE
xP D y; yP D uR .t/: (3)
Then (3) has the same solution as (2) through any consistent point of (2). But (3) has
DOF D 2 so its general solution x D u.t/C˛ Cˇt; y D u P .t/Cˇ (with ˛; ˇ arbitrary
scalars) includes many beside the unique solution x D u.t/; y D uP .t/ of (2).
(DOF means the phrase “degrees of freedom”, DOF is the corresponding
number.)
Solving the ODE numerically as a proxy for the DAE results in progressive drift
from the DAE’s solution manifold, which in the above example, as a subset of the
ODE’s .t; x; y/ state space, is the set M D f .t; x; y/ 2 R3 j x D u.t/, y D uP .t/ g.
A New Look at Dummy Derivatives for Differential-Algebraic Equations 715
By contrast the DDs method gives a system genuinely equivalent to the original,
but with no extra DOF that cause numerical drift. It is not concerned with producing
an ODE in all the xj but, like the ˙-method, seeks merely the least number of
differentiations that allows us to find all the xj as functions of t. In Example 1 the
answer is clearly to differentiate A once and B not at all, and rearrange to get
which unlike (3) has no degrees of freedom, i.e. shows the unique solution. Strictly
by DD rules one obtains (4) via a DAE with three equations and variables, namely
0 D A D x u.t/; 0 D B D x0 y; 0 D AP D x0 uP .t/;
where the “genuine” derivative xP has been replaced by the dummy derivative x0 .
˙ -method summary The ˙-method finds the n n signature matrix ˙ D .ij /,
where ij is the order of the highest derivative of xj in fi , if xj occurs in fi , and 1
if not. A transversal is a set T of n matrix positions .i; j/, with just one in each
row and each column, P and we seek a highest-value transversal (HVT), such that the
number Val.T/ D .i;j/2T ij is maximised. We find corresponding dual variables,
the offsets, integer n-vectors c D .c1 ; : : : ; cn / and d D .d1 ; : : : ; dn / satisfying
By default we choose the canonical offsets, the unique elementwise smallest ones
having mini ci D 0. Then ci says how many times equation fi D 0 is to be
differentiated, and (5) fulfils the requirement stated in Sect. 2.2 of MS, that “the
differentiated problem is structurally nonsingular with respect to its highest-order
.d / .c /
derivatives”—i.e., xj j occurs in fi i for each .i; j/ in some transversal.
The ˙-method’s standard solution scheme (SSS) says: let kd D maxj dj and
kc D maxi ci , then
for k D kd ; kd C1; : : : do
Solve the mk equations: fi.kCci / D 0 for those i such that k C ci 0
.kCdj / (6)
for the nk unknowns: xj for those j such that k C dj 0,
using already known values from previous (with smaller k) stages.
is nonsingular
P at some
P consistent point. Then, the value Val.T/ of a HVT, which
also equals j dj i ci , is the number of degrees of freedom DOF of the DAE; also
.kCc / .kCd /
the mk nk Jacobian Jk D @fi i =@xj j of (6) is of full row rank; (8)
Ik D f .i; l/ j l D k C ci 0 g; Jk D f . j; l/ j l D k C dj 0 g: (9)
Write jXj for the number of elements in a finite set X. Then the sizes mk ; nk in (6)
are given by jIk j D mk and jJk j D nk .
Further define Ik to be the union of Il for all l k, and similarly I<k , Jk , J<k .
Then the SSS, equation (6), taken up to k D 0, can be written
Fig. 2 Ik , Jk , fIk and xJk for the pendulum, using offsets c D .0; 0; 2/ and d D .2; 2; 0/. For
example, J1 is the set f.1; 1/; .2; 1/g so that xJ1 D .x11 ; x21 /, which is the same as .Px; yP /
for k D kd ; kd C1; : : : ; 0 do
(10)
solve fIk .t; xJk / D 0, or equivalently fIk .t; xJ<k I xJk / D 0, for xJk .
The second form separates the “already known” t and xJ<k from the “to be
found” xJk .
For example, Fig. 2 tabulates Ik , Jk , fIk and xJk for the pendulum, taking x1 ; x2 ; x3
to mean x; y; and f1 ; f2 ; f3 to mean A; B; C, in the order given.
In the “vanilla” SSS, all components in xJk are on an equal footing. For numerical
solution, in those stages k < 0 where an underdetermined system is to be solved
because mk < nk , typically a trial xJk vector is projected on the manifold defined by
fIk D 0, using a Gauss-Newton method or similar, to obtain the accepted solution.
Example 3 For the pendulum, stage k D 2 consists in projecting a trial value of
xJ2 D .x10 ; x20 / D .x; y/ on the zero set of fI2 D . f30 / D .h/, i.e. on the circle
x2 C y2 D L2 in the x; y plane. Stage k D 1 consists in projecting a trial value
of xJ1 D .x11 ; x21 / D .Px; yP / on the zero set of fI1 D . f31 / D .h/,
P i.e. on the line
xPx C yPy D 0 in the xP ; yP plane defined by the previously found values of x and y.
In DDs, the components in xJk are not on an equal footing. The method as
.d /
presented in MS starts with the high-order derivatives xj j and works down, at each
stage selecting some derivatives to be dummy, which essentially means they are
found, as functions of others. For the pendulum, cf. [2, Sect. 4, Example 3], when
y ¤ 0 one can choose yR ; yP to be dummy derivatives y00 ; y0 , giving a reduced DAE
where everything is a function of x and xP ; when x ¤ 0 one can do the reverse.
From the ˙-method angle it is natural to go the opposite way, starting with the
low-order derivatives. DDs then becomes a particular way to perform the SSS, as
we now describe. It is proved in [6] that for a given DAE, the set of DD schemes
constructible by this “forward” method is identical with the set constructible by the
classical “reverse” method.
718 J.D. Pryce and R. McKenzie
For brevity let all the unknowns that are found by the SSS in stages k D kd W 0 be
.q/
called items. That is, an item is any xj with 0 q dj , j 2 1 W n. Equivalently, the
items are precisely the components of xJ0 .
The forward DDs method We assume henceforth that the functions fi are suffi-
ciently smooth for all needed uses of the Implicit Function Theorem (IFT). For each
stage k the mk nk system (10) is of full row rank by (8). Hence we can find subsets
Fk
Jk and Sk D Jk n Fk such that, denoting nk mk by DOFk
is nonsingular at the current consistent point. (Gk is the same as GŒ in MS, where
D 1 k.) Then by the IFT the mk items forming the vector xFk can locally be
found as functions of the remaining DOF k items, which form xSk .
DOF k is the number of DOF introduced at solution stage k. E.g, for the pendulum,
nk mk D 2 1 D 1 for k D 2 and k D 1. That is, one DOF is introduced at
each of these stages: an arbitrary position on the circle, and an arbitrary velocity.
The subvector xFk of xJk comprises the items found at this stage as functions of
the items in xSk . We call the latter state items. We call the sequence of Fk , which
defines all the found items, a solving scheme.
The state vector is the vector of all state items, that is
S
xS ; where S D kd k1 Sk : (12)
Since each vector xJk is the concatenation of xFk and xSk , the SSS in the form (10),
combined with the IFT used in a solving scheme, becomes
for k D kd ; kd C1; : : : ; 0 do
(14)
solve fIk .t; xS<k ; xF<k I xSk ; xFk / D 0 for xFk as a function of xSk and xF<k .
This set of equations has a block-triangular form (BTF) such that, by repeated use
of the IFT, and repeated substitution, one has
Theorem 1 Each found item can be expressed as a function of the state vector xS .
A New Look at Dummy Derivatives for Differential-Algebraic Equations 719
Proof We show this for the case kd D 2, from which the general proof is clear.
For kD2, xS<k and xF<k are empty vectors, so we find xF2 as a function of xS2 .
For k D 1, we find xF1 as a function of xS1 , xS2 and xF2 , which by substituting
xF2 becomes a function of xS1 . For k D 0, we find xF0 as a function of xS0 , xS1 ,
xS2 , xF1 and xF2 , which by substituting xF1 and xF2 becomes a function of
xS0 .
Since xS0 equals xS , of which xS1 and xS2 are subvectors, the result follows.
Numerically, this involves one root-finding at each k-stage, taking given input
values of xS and using the nonsingular matrices Gkd ; Gkd C1 ; : : : ; G0 D J in turn.
Not all solving schemes are useful in practice. As so far described, for the
pendulum one can choose state items y at stage 2 and xP at stage 1, which does
not lead to an implicit ODE. The extra rule needed to make a useful scheme is
Definition 1 A dummy derivative scheme (DD scheme) is a solving scheme for
which, if an item is a derivative of a found item, then it is also a found item. Equival-
ently, the projections FO k Df j j . j; l/ 2 Fk g, of Fk on the j component, increase
with k.
For instance, in the preceding paragraph, choosing y and xP as state items violates
this constraint, since x must be a found item while its derivative xP is not.
Some derivative of each xj is a found item, since stage k D 0 is an n n system
.d /
that solves for each leading derivative xj j . Hence there is a unique least integer
.ı /
ıj 2 0 W dj such that xj j is a found item. The vector ı D .ı1 ; : : : ; ın / is the DD-
specification vector, or DDspec, of a DD scheme. Then
.l/
– An xj with l < ıj is a state item.
.l/
– An item xj with l > ıj is necessarily a found item and the derivative of a found
item. It is a dummy derivative—this accords with the MS definition.
.ı /
– The remaining n items xj j are loop-closers if ıj > 0, as they create the relations
in the reduced DAE that make an ODE, and algebraic items if ıj D 0 (see below).
The total number of state items equals DOF, and there are ıj state items
P for each j.
Hence any DDspec vector satisfies 0 ı d (elementwise), and j ıj D DOF .
Not every ı with these properties defines a DD scheme. E.g., for the pendulum,
ı D .2; 0; 0/, .0; 2; 0/ and .1; 1; 0/ obey these constraints but only the first two
“work”.
Figure 3 shows the process pictorially. On the left is the general scheme for the
case kd D 2. Each set of equations fIk D 0 has its output (what is solved for) above
it, and downward lines from it to the previously computed data it uses as input. On
the right is the more detailed data for the particular case of Example 4 below. These
are created by MATLAB functions, in the second case using structural data produced
by DAESA’s function daeSA from the MATLAB code for the DAE in Example 4.
The diagram uses natural notation for derivatives, e.g. x02 (MATLAB graphics is
poor at dots) instead of the x21 notation used in Example 4.
720 J.D. Pryce and R. McKenzie
Fig. 3 DDs process picture. Left: general scheme, kd D 2. Right: specific picture for Example 4
Converting to First Order Implicit ODE How to reduce the result of DDs to
first order seems not well explained in the literature. Online Modelica tutorials
commonly order-reduce before SA and DDs: clumsy and giving a larger final system
than necessary. In fact this task fits almost trivially into DDs, in the following steps.
In Step 1, write down the SSS equations (6) up to stage 0—this is independent of
any DD scheme. We use xjl notation to show the itemsP count as unrelated variables.
P
There are DOF more variables than equations, ND.nC j dj / versus MD.nC i ci /.
In Step 2, make the system “square” by adding DOF new equations
xP jl D xj;.lC1/ ; (15)
one for each state variable xjl in xS , to say what its derivative “really is”. If xj;.lC1/ is
a state item, this implements order-reduction; otherwise it is a loop-closer.
A New Look at Dummy Derivatives for Differential-Algebraic Equations 721
In Step 3, rearrange the variables with the state vector xS followed by the found
vector xF , see (12) and (13), to get the result of DDs in the form
Function E is very simple: its components are all the xj;.lC1/ ’s of (15); it does not
really depend on t. Function F is actually fI0 . Write this as the concatenation of fIk
listed k D kd ; kd C1; : : : ; 0, and xF as the concatenation of xFk in the same order.
Then @F=@xF is block lower triangular with the nonsingular matrices Gk on its
block diagonal, so it is nonsingular. Hence the two equations (16) form a semi-
explicit index-1 DAE, see [1, p. 34]. From this easily follows:
Theorem 2 System (16) is SA-friendly with offsets ci all 0, so it is an implicit ODE.
Example 4 MS use the following linear, constant coefficient DAE [2, Example 1]:
MSEXAMPLE1 x1 x2 x3 x4 ci
A 20 32 xR 1 xR 2 xR 3 xP 4
0ı
0 D A D x1 Cx2 Cu1 .t/ AR2 1 1 0 03
0 D B D x1 Cx2 Cx3 Cu2 .t/ B6 0 0 0ı 7 2 R 1
˙D C 4 0 JD B6 1 1 0 7:
; 1 0ı 5 1 4 5
0 D CD x1 CPx3 Cx4 Cu3 .t/ CP 0 0 1 1
D 2ı 2 2 1 0
0 D DD 2Rx1 CRx2 CRx3 CPx4 Cu4 .t/ D 2 1 1 1
dj 2 2 2 1
The ui .t/ are given forcing functions. The two HVTs of ˙ are shown and ı . We
have c D .2; 2; 1; 0/ and d D .2; 2; 2; 1/, so J D @.A;R B;
R C;P D/[email protected] ; xR 2 ; xR 3 ; xP 4 /. It
is nonsingular, so SA succeeds and there are 2 DOF.
Step 1, using the xil notation, writes down M D 9 equations in N D 11 variables,
grouped here by stages k D 2; 1; 0:
0 D A D x10 Cx20 Cu1 .t/
(17)
0 D B D x10 Cx20 Cx30 Cu2 .t/
9
0 D AP D x11 Cx21 CPu1 .t/ =
0 D BP D x11 Cx21 Cx31 CPu2 .t/ (18)
;
0 D C D x10 Cx31 Cx40 Cu3 .t/
9
0 D AR D x12 Cx22 CRu1 .t/ >>
=
0 D BR D x12 Cx22 Cx32 CRu2 .t/
(19)
0 D CP D x11 Cx32 Cx41 CPu3 .t/ >>
;
0 D D D 2x12 Cx22 Cx32 Cx41 Cu4 .t/
There are two possible DDspecs, ı D .2; 0; 0; 0/ and .0; 2; 0; 0/. Following MS,
we choose the latter, so the state variables are x20 and x21 . Step 2 now defines two
equations; the upper one does order reduction and the lower is a loop-closer:
xP x
xP S D 20 D 21 D E.t; xS ; xF /: (20)
xP 21 x22
722 J.D. Pryce and R. McKenzie
Step 3 splits the variables into xS D .x20 I x21 /T and xF D .x10 ; x30 I x11 ; x31 ; x40 I
x12 ; x22 ; x32 ; x41 /T , where the semicolons group into stages k D 2; 1 for xS and
2; 1; 0 for xF . Then (17), (18), and (19) jointly define the equations
0 D F.t; xS ; xF /; (21)
This formulation was confirmed by giving it to the MATLAB implicit solver ode15i,
for certain ui .t/ and initial values, and comparing with the analytic solution.
Converting to explicit ODE Conceptually it is obvious from the nonsingularity of
@F=@xF in the DAE (16) that near a consistent point we can convert it to an explicit
ODE yP D f.t; y/—solve the second equation for xF and substitute in the first. It may
seem strange to do this numerically, in view of the impressive track record of codes
such as DASSL [1], for solving DAEs of the form G.t; z; zP / D 0.
But there are reasons for doing so. Some applications generate models with n in
the thousands and only a few DOF, and for which stiffness is not a problem. Then
it makes sense to convert to a small explicit ODE and solve by, say, a Runge–Kutta
code, using far less working memory than would a DAE code. The ESI-CyDesign
Modelica system does numerical solution this way, having found it more efficient
for their typical models. The Numerical Algorithms Group (NAG) Ltd have recently
put a reverse communication RK code into their library, for just such uses.
Also, ways to compute the Jacobians Gk for an SA-friendly DAE are well known,
while the full Jacobian of the DASSL-style formulation—in the example, the below-
diagonal blocks of (21)—is messier to find; but see the discussion in Sect. 5.
A New Look at Dummy Derivatives for Differential-Algebraic Equations 723
5 Discussion
References
1. Brenan, K.E., Campbell, S.L., Petzold, L.R.: Numerical Solution of Initial-Value Problems in
Differential-Algebraic Equations, 2nd edn. SIAM, Philadelphia (1996)
2. Mattsson, S.E., Söderlind, G.: Index reduction in differential-algebraic equations using dummy
derivatives. SIAM J. Sci. Comput. 14(3), 677–692 (1993)
3. McKenzie, R.: Structural analysis based dummy derivative selection for differential-algebraic
equations. Technical report, Cardiff University (2015). Submitted to BIT Numerical Analysis
4. Pantelides, C.C.: The consistent initialization of differential-algebraic systems. SIAM. J. Sci.
Stat. Comput. 9, 213–231 (1988)
5. Pryce, J.D.: A simple structural analysis method for DAEs. BIT Numer. Math. 41(2), 364–394
(2001)
6. Pryce, J.D.: A simple approach to Dummy Derivatives for DAEs. Technical report, Cardiff
University, July 2015. In preparation
New Master-Slave Synchronization
Criteria of Chaotic Lur’e Systems
with Time-Varying-Delay Feedback Control
Abstract This study focuses on the issue of designing a time-delay output feedback
controller for master-slave synchronization of chaotic Lur’e systems (CLSs). The
time delay is assumed to be a time-varying continuous function which is bounded
below and above by positive constants. By constructing an appropriate Lyapunov-
Krasovskii functional (LKF), a novel delay-dependent synchronization condition is
obtained. Besides, by employing a new free-matrix-based inequality (FMBI), the
desired controller gain matrix can be achieved by solving a set of linear matrix
inequalities (LMIs). Finally, one numerical example of Chua’s circle is given to
illustrate the effectiveness and advantages of the proposed results.
1 Introduction
During the past few decades, the chaotic synchronization problem has attracted
increasing attention due to its extensive applications in many fields including
secure communication, physical, chemical and ecological systems, human heartbeat
regulation, and so on [1–4]. As is well-known that many nonlinear systems can be
modeled precisely in the form of Lur’e systems, such as Chua’s circuit, network
systems and hyper chaotic attractors, which include a feedback connection of
a linear system and a nonlinear element satisfying the sector condition [5–7].
Therefore, master-slave synchronization for CLSs has been a focused research topic.
Recently, the synchronization problem of chaotic systems with time delay has
been intensively investigated due to the unavoidable signal propagation delay
frequently encountered in remote master-slave synchronization scheme [8–10].
Especially, many delay-independent and delay-dependent synchronization criteria
have been derived by constructing an appropriate LKF in [11]. Compared with the
results in [11], less conservative synchronization criteria were obtained and some
fairly simple algebraic conditions are derived for easier verification in [12]. Based
on Lyapunov method and LMIs approach, the authors in [13] further generalized
and improved the proposed results in [11, 12]. However, in order to obtain sufficient
conditions for master-slave synchronization, the authors in [11, 13] employed model
transformation, which leads to some conservatism for inducing additional terms.
Based on the free weighting matrix approach, a delay-dependent synchronization
condition is obtained in [14]. By using a delay-partition approach, several delay-
dependent synchronization criteria are derived in the form of LMIs in [15, 16]. By
constructing an appropriate LKF including the information of time-varying delay
range, new delay-range-dependent synchronization criteria for Lur’e systems are
established in [17]. Besides, it should be noted that only constant delay is considered
in [11–16, 18]. In practice, as everyone knows that the range of time-varying delay
non-zero lower bound is often encountered, and such systems are referred to as
interval delayed systems.
Motivated by the issues discussed above, the delay-dependent master-slave
synchronization problem of CLSs with time-varying-delay feedback control is
investigated in this paper. By taking full advantage of the information of time-
varying-delay range and nonlinear term of the error system, a less conservative
delay-dependent synchronization criterion is obtained. In addition, based on an
appropriate LKF combined with a new FMBI, an explicit expression of the desired
control law can be obtained in terms of LMIs. Finally, one numerical example of
Chua’s circle is presented to demonstrate the effectiveness and advantages of the
design methods.
Notation Notations used in this paper are fairly standard: Rn denotes the n-
dimensional Euclidean space, Rnm the set of all n m dimensional matrices;
I the identity matrix of appropriate dimensions, AT the matrix transposition of
the matrix A. By X > 0 (respectively X 0), for X 2 Rnn , we mean
that the matrix X is real symmetric positive definite (respectively, positive semi-
definite); diagfr1 ; r2 ; ; rn g denotes block diagonal matrix with diagonal elements
ri ; i D 1; ; n, the symbol represents the elements below the main diagonal of a
symmetric matrix, SymfMg is defined as SymfMg D 12 .M C MT /.
New Master-Slave Synchronization Criteria of Chaotic Lur’e Systems with. . . 727
2 Preliminaries
's .˛/ 2 KŒk ;ksC D f's .˛/ j 's .0/ D 0; ks ˛ 2 ˛'s .˛/ ksC ˛ 2 ; ˛ ¤ 0g (5)
s
Next, given the synchronization schemes (1), (2) and (3), the synchronization
error is defined as r.t/ D x.t/ y.t/, and we can get the following synchronization
error system:
where .Dr.t/; y.t// D '.Dr.t/ C Dy.t// '.Dy.t//. Let D D Œd1 ; ; dnd T with
ds 2 Rn .s D 1; 2; ; nd /. Under Assumption B, it is easy to obtain that s .dTs r; y/
satisfies the following condition
Remark 1 It should be noted that the set of slack variables in the above inequality
can provide great freedom in deriving less conservative stability conditions, which it
is possible to obtain a much sharper bound. It is easy to prove that some well-known
integral inequalities are special cases of this one in [19]. For example, if we let N1 D
ŒYT ; 0T , N2 D 0, Z1 D diagfX; 0g, Z2 D 0 and Z3 D 0, this integral inequality
1
can reduce to the integral inequality in [20]. And if we let N1 D ba ŒR; R; 0T ,
3 T 1 T 1 T 1
N2 D ba ŒR; R; 2R , Z1 D N1 R N1 , Z2 D N1 R N2 , Z3 D N2 R N2 , this
T
integral inequality also becomes the celebrated Wirtinger integral inequality [21].
3 Main Results
< 0; (9)
New Master-Slave Synchronization Criteria of Chaotic Lur’e Systems with. . . 729
where
where
Z t
V1 .rt / D r .t/Pr.t/ C
T
rT .s/R1 r.s/ds
thL
Z tdL Z t
C r .s/R2 r.s/ds C
T
rT .s/R3 r.s/ds; (11)
tdU td.t/
Z 0 Z t Z dL Z t
V2 .rt / D rP T .s/R4 rP .s/dsd C rP T .s/R5 rP .s/dsd; (12)
dL tC dU tC
X
nd Z dsT r.t/ X
nd Z dsT r.t/
V3 .rt / D 2 gs Œs ./ ks d C2 ls ŒksC s ./d;
sD1 0 sD1 0
(13)
Taking the derivative of V.xt / along the trajectory of the error system (6) yields:
1
R t
L
d.t//; rT .t dU /; dU d.t/ tdL r .s/ds, ˘2 D ŒI; I; 2I.
T
X
nd X
nd
P 3 .rt / D2
V P s .dT r.t// C 2
.gs ls /dsT r.t/ P s kC gs k /dT r.t/
dsT r.t/.l
s s s s
sD1 sD1
Next, for any scalars x and y, and arbitrary matrix N with appropriate dimensions,
we can obtain
From Eq. (7), for any positive diagonal matrix W D diagfw1 ; ; wnd g, it yields
that
X
nd
2 Œs .dTs r.t/; y.t// ks dTs r.t/ws Œs .dTs r.t/; y.t// ksC dTs r.t/
sD1
Combining Eqs. (14), (15), (16), (17), (18), (19), (20), and (21) yields
4 Numerical Example
Under the above conditions and D 0, the maximum upper bounds on the
allowable delays of h obtained from the above references [14, 16–18] and Theorem 1
are listed in Table 1. Thus, it is also to see that our result is more effective than the
recently reported ones.
In addition, set '.˛/ D 0:5.j˛C1jj˛1j/, h D 0:191, x.0/ D Œ0:2; 0:3; 0:2
and y.0/ D Œ0:5; 0:1; 0:6, the simulation results are shown in Figs. 1, 2, 3, 4, 5,
and 6 for the above gain matrix. The trajectories of the master-slave systems with
Table 1 Maximum allowed delays h and the best gain matrices K for D 0
Method [18] [14] [17] [16] Theorem 1
h 0.141 0.180 0.183 0.185 0.188
2 3 2 3 2 3 2 3 2 3
6:0229 3:9125 4:1455 4:0779 4:6512
6 7 6 7 6 7 6 7 6 7
K 4 1:3367 5 4 0:9545 5 4 0:9250 5 4 0:9087 5 4 0:5992 5
2:1264 3:8273 4:2596 4:3430 4:5177
0.4
0.2
x 2 (t)
−0.2
−0.4
4
2 3
2
0 1
0
x (t) −2 −1
3
−2 x (t)
−4 −3 1
0.4
0.2
y 2 (t)
−0.2
−0.4
4
2 3
2
0 1
y (t) 0
3 −2 −1
−2 y1(t)
−4 −3
4
x (t) x (t) x (t) y (t) y (t) y (t)
1 2 3 1 2 3
1
Amplitude
−1
−2
−3
0 1 2 3 4 5 6 7 8 9 10
t
Fig. 3 State trajectories of master-slave systems x.t/ and y.t/ with u.t/
u.t/ D 0 are shown in Figs. 1 and 2. Under the above gain matrix K, the responses
of the state x.t/ and y.t/, the error signal r.t/, outputs of subsystems p.t/ and q.t/
are represented in Figs. 3, 4, 5, and 6, respectively. Therefore, it is clear to show that
the synchronization error is tending asymptotically to zero.
734 K. Shi et al.
0.5
Amplitude
−0.5
−1
−1.5
−2
0 1 2 3 4 5 6 7 8 9 10
t
2
p(t)
1.5
0.5
Amplitude
−0.5
−1
−1.5
−2
−2.5
0 1 2 3 4 5 6 7 8 9 10
t
2
q(t)
1.5
0.5
0
Amplitude
−0.5
−1
−1.5
−2
−2.5
0 1 2 3 4 5 6 7 8 9 10
t
5 Conclusions
Acknowledgements This work was supported by National Basic Research Program of China
(2010CB732501), National Natural Science Foundation of China (61273015), The National
Defense Pre-Research Foundation of China (Grant No. 9140A27040213DZ02001), The Program
for New Century Excellent Talents in University (NCET-10-0097).
References
1. Liao, T.L., Tsai, S.H.: Adaptive synchronization of chaotic systems and its application to secure
communications. Chaos, Solitons Fractals 11, 1387–1396 (2000)
2. Lu, J.N., Wu, X.Q., LRu, J.H.: Synchronization of a unified chaotic system and the application
in secure communication. Phys. Lett. A 305, 365–370 (2002)
736 K. Shi et al.
3. Grzybowski, J.M.V., Rafikov, M., Balthazar, J.M.: Synchronization of the unified chaotic
system and application in secure communication. Commun. Nonlinear Sci. Numer. Simul. 14,
2793–2806 (2009)
4. Voss, H.: Anticipating chaotic synchronization. Phys. Rev. E 61, 5115–5119 (2000)
5. Mkaouar, H., Boubaker, O.: Chaos synchronization for master slave piecewise linear systems:
application to Chua’s circuit. Commun. Nonlinear Sci. Numer. Simul. 17, 1292–1302 (2012)
6. GKamez-GuzmKan, L., Cruz-HernKa ndez, C., LKopez-GutiKerrez, R.M., GarcKia-Guerrero, E.E.:
Synchronization of Chua’s circuits with multi-scroll attractors: application to communication.
Commun. Nonlinear Sci. Numer. Simul. 14, 2765–2775 (2009)
7. LRu, J.H., Murali, K., Sinha, S., Leung, H., Aziz-Alaoui, M.A.: Generating multi-scroll chaotic
attractors by thresholding. Phys. Lett. A 372, 3234–3239 (2008)
8. Stepp, N.: Anticipation in feedback-delayed manual tracking of a chaotic oscillator. Exp. Brain
Res. 198, 521–525 (2009)
9. Pyragas, K., Pyragas, T.: Extending anticipation horizon of chaos synchronization schemes
with time-delay coupling. Philos. Trans. R. Soc. A 368, 305–317 (2010)
10. Milton, J.G.: The delayed and noisy nervous system: implications for neural control. J. Neural
Eng. 8, 065005 (2011)
11. Yalcin, M.E., Suykens, J.A.K., Vandewalle, J.: Master-slave synchronization of Lur’e systems
with time-delay. Int. J. Bifurc. Chaos 11(6), 1707–1722 (2001)
12. Liao, X.X., Chen, G.R.: Chaos synchronization of general Lur’e systems via time-delay
feedback control. Int. J. Bifurc. Chaos 13(1), 207–213 (2003)
13. Cao, J.D., Li, H.X., Daniel, W.C.H.: Synchronization criteria of Lur’e systems with time-delay
feedback contro. Chaos, Solitons Fractals 23, 1285–1298 (2005)
14. He, Y., Wen, G.L., Wang, Q.G.: Delay-dependent synchronization criterion for Lur’e systems
with delay feedback control. Int. J. Bifurc. Chaos 16(10), 3087–3091 (2006)
15. Ding, K., Han, Q.L.: Master-slave synchronization criteria for horizontal platform systems
using time delay feedback control. J. Sound Vib. 330(11), 2419–2436 (2011)
16. Ge, C., Hua, C.C., Guan, X.P.: Master-slave synchronization criteria of Lur’e systems with
time-delay feedback control. Appl. Math. Comput. 244, 895–902 (2014)
17. Li, T., Yu, J.J., Wang, Z.: Delay-range-dependent synchronization criterion for Lur’e systems
with delay feedback control. Commun. Nonlinear Sci. Numer. Simul. 14(5), 1796–1803 (2009)
18. Han, Q.L.: New delay-dependent synchronization criteria for Lur’e systems using time delay
feedback control. Phys. Lett. A 360(4), 563–569 (2007)
19. Zeng, H.B., He, Y., Wu, M., She, J.H.: Stability of time-delay systems via Wirtinger-based
double integral inequality. IEEE Trans. Autom. Control. 60(10), 2768–2772 (2015)
20. Zhang, X.M., Wu, M., She, J.H., He, Y.: Delay-dependent stabilization of linear systems with
time-varying state and input delays. Automatica 41, 1405–1412 (2005)
21. Seuret, A., Gouaisbaut, F.: Wirtinger-based integral inequality: application to time-delay
systems. Automatica 49, 2860–2866 (2013)
Robust Synchronization of Distributed-Delay
Systems via Hybrid Control
Abstract Drive and response systems which exhibit time-delays and uncertainties
are synchronized using hybrid control. Classes of dwell-time satisfying switching
rules are identified under which synchronization can be achieved in a robust manner.
The theoretical results are established using multiple Lyapunov functions and
Halanay-like inequalities.
1 Introduction
2 Problem Formulation
Let RC denote the set of non-negative real numbers, let N denote the set of positive
integers, and let Rn denote the Euclidean space of n-dimensions (equipped with the
Euclidean norm k k). For a positive constant , denote PC D PC.Œ ; 0; Rn / to be
the space of piecewise continuous functions mapping Œ ; 0 to Rn , equipped with
the norm k k WD sup s0 k .s/k. Let max ./ and min ./ denote the maximum
and minimum eigenvalues of a symmetric matrix, respectively.
In the spirit of Guan et al. [14], consider the following drive system:
Z 0
xP .t/ D .A C A.t//x.t/
Q C .C C C.t//
Q x.t C s/ds C F.t; xt /; (1)
1
X
u2 .t; x; y/ WD .Eik C EQ ik .t//e.t/ı.t tk /;
kD1
E;i , H;i , G;i , E;i are known constant matrices of appropriate dimensions and
%H;i , %G;i , %E;i are time-dependent uncertainty matrices; ik 2 P WD f1; : : : ; mg for
each k 2 N, where m is a positive integer; I k WD Œtk1 ; tk / is called the switching or
hybrid interval, 1I k ./ is the indicator function, and ı./ is the generalized Dirac
delta function. Under this construction, u1 and u2 are switching and impulsive
controllers containing some uncertainties, respectively (see, e.g., [14] for a similar
hybrid control construction without time-delays or uncertainties present).
The error system can be written as the following hybrid system:
Z 0
eP .t/ D A .t/e.t/ C C .t/ e.t C s/ds C F.t; yt / F.t; xt /; t ¤ tk ;
there exists a unique solution of (3) by [26] and using the method of steps over the
hybrid moments [27].
Given the hybrid control matrices f.Hi ; HQ i ; Gi ; G
Q i ; Ei ; EQ i / W i 2 Pg, the goal of
this article is to design the hybrid time mode sequences (i.e., the set f.ik ; tk / W k 2
Ng) such that the drive and response systems achieve robust synchronization.
Consider the following notions of activation time and total number of switches.
Definition 2 Let t1 ; t2 2 R such that t2 t1 and let A P. Denote the total
R t2
activation time of the modes in A by TA .t1 ; t2 / WD t1 1A ..t//dt. Denote the total
number of switches to a mode in A by ˚A .t1 ; t2 / WD jftk W .tk / 2 A; t1 tk < t2 gj.
Zhu established the following Halanay-like lemma.
Lemma 1 ([18]) Let a; b > 0. Assume that u W Œt0 ; 1/ ! RC satisfies uP .t/
bkut k au.t/ for t t0 . If b a 0 then u.t/ kut0 k expŒ.b a/.t t0 /
for t t0 , while if b a < 0 then there exists a positive constant satisfying
C b exp. / a < 0 such that u.t/ kut0 k expŒ.t t0 / for t t0 :
For use in the main theorem, the following Halanay-like result is proved.
Proposition 1 Let ai ; bi ; di ; hi 0 for i D 1; : : : ; m. Assume that u W Œt0
; C1/ ! RC satisfies
(
uP .t/ b kut k a u.t/; t ¤ tk ; t t0 ;
(4)
u.t/ d u.t / C h kut k ; t D tk ; k D 1; 2; : : : ;
where
X X
.t0 ; t/ WD i Tfig .t0 ; t/ i TQ fig .t0 ; t/:
i2P u i2P s
Suppose the result holds for t 2 Œtk1 ; tk /, that is, u.t/ w.t/. We claim that u.t/
w.t/ for t 2 Œtk ; tkC1 /. If not, then there exists a time t 2 Œtk ; tkC1 / such that u.t / D
w.t /, u.t/ w.t/ for all t 2 Œtk ; t / and for any " > 0 there exists a time t" 2
.t ; t C "/ such that u.t" / > w.t" /. Suppose that ikC1 2 P s , then
and so
0 1
Yk
1
uP .t / ˇikC1 max ; 1 exp.ikC1 / ˛ikC1 kut0 k @ ıij A exp. .t0 ; t //:
i2P ıi jD1
and therefore,
0 1
Yk
1
uP .t / ˇikC1 max ; 1 ˛ikC1 kut0 k @ ıij A expŒ .t0 ; t /:
i2P ıi jD1
ˇi WD 2 max .P1 1
i .C C Gi / Pi .C C Gi // C 2 kPi k#2 max .Pi /
T
C "A;i
AT
A C "1 T T 1 T 1
H;i Pi H;i H;i Pi C "H;i
H;i
H;i C "C;i Pi C C Pi C "G;i Pi G;i G;i Pi /;
T
max .Pi / 1
i WD ; WD max i ; i WD ˇi max ; 1 ˛i ;
min .Pi / i2P i2P ıi
ıi WDmax .P1 T 1
i Œ.I C Ei / .Pi "E;i
E;i
T
E;i /1 .I C Ei / C "1
E;i E;i E;i /;
T
X
m X X
ln ıi C i i i .i / < 0: (6)
iD1 i2P u i2P s
R0
Proof Let Vi .e/ WD eT Pi e for i D 1; : : : ; m, and let eQ .t/ WD e.t C s/ds. The
time-derivative of Vi along the ith mode of (3) for t ¤ tk is given by
dVi
.e.t// D eT .t/Œ.A C A.t/ Q i .t//T Pi C Pi .A C A.t/
Q C Hi C H Q C Hi C H Q i .t//e.t/
dt
C 2eT .t/Pi .C C C.t/
Q C Gi C G Q i .t//Qe.t/C2eT .t/Pi ŒFi .t; yt / Fi .t; xt /:
By Assumption 1,
Z 0
2eT .t/Pi ŒF.t; yt / F.t; xt / 2ke.t/kkPi k #1 ke.t/k C #2 ke.t C s/kds :
VikC1 .e.tk // eT .tk /.I C Eik C EQ ik .tk //T Pik .I C Eik C EQ ik .tk //e.tk /
eT .tk /Œ.I C Eik /T .P1 1
i "E;ik
E;ik
E;ik / .I C Eik /e.tk /
T
R0
by Lemma 5. Then, using eT .tCs/Pi e.tCs/ds sup s0 eT .tCs/Pi e.tCs/
and the well-known fact that for any positive definite matrix P 2 Rnn , symmetric
matrix Q 2 Rnn , and x 2 Rn , min .P1 Q/xT Px xT Qx max .P1 Q/xT Px, it
follows that v.t/ WD V .e.t// satisfies the conditions of Proposition 1 with bi WD ˇi ,
ai WD ˛i , hi WD 0, di WD ıi .
To prove case (i), note that P .t0 ; t/ D k 1 for t 2 Œtk1 ; tk /, and tk tk1
implies that t t0 k for t 2 Œtk1 ; tk /. Equation (5) implies that
v.t/ kvt0 k exp .k 1/ ln ı C C T C .t0 ; t/ T .t0 ; t/ (7)
kvt0 k .1=ı/ exp .t t0 / ln.ı/= C C T C .t0 ; t/ T .t0 ; t/
kvt0 k .1=ı/ exp .t t0 / ln.ı/= C .C /T .t0 ; t/
kvt0 k .1=ı/ exp .ln.ı/= C C /.t t0 /=M
for some M > 0 since suptt0 f.t t0 /=T .t0 ; t/g is finite. Robust exponential
synchronization of the drive and response systems follows. Since tk tk1
implies that t t0 k for t 2 Œtk1 ; tk /, case (ii) is proved by similar arguments
used to show case (i).
To prove case (iii), RS is implied from Eq. (5) since, for t 2 Œtk1 ; tk /,
2 3
Xk1 X
v.t/ kvt0 k exp 4 ln ıij C i Tfig .t0 ; t/5
jD1 i2P u
kvt0 k exp Œln ıi1 C i1 C ln ıi2 C i2 C : : : C ln ıik1 C ik1 C ik :
That is, v.t/ c k where c WD kvt0 k = mini2P ıi . Case (iv) is proved similarly.
Beginning from Eq. (7), case (v) implies that, for t 2 Œtk1 ; tk /,
implying RS. For case (vi), Eq. (5) implies that, for j 2 N,
v.t0 C j!/
2 3
X
jm
X X
kvt0 k exp 4 ln ıi C i Tfig .t0 ; t0 C j!/ i TQ fig .t0 ; t0 C j!/5
iD1 i2P u i2P s
2 3
X
m X X
D kvt0 k exp 4j ln ıi C j i Tfig .t0 ; t0 C !/ j i TQ fig .t0 ; t0 C !/5
iD1 i2P u i2P s
2 0 13
Xm X X
kvt0 k exp 4j @ ln ıi C i i i .i /A5 :
iD1 i2P u i2P s
Since v.t/ is also bounded on any compact interval, the result follows.
3 Example
For 2 PC, let F. / D .0; 0:1 ln.cosh. 1 .0////. Let A;i D C;i D H;i D
G;i D E;i D I,
A;i D
C;i D
H;i D
G;i D
E;i D 0:01I, %A;i .t/ D %C;i .t/ D
%H;i .t/ D %G;i .t/ D %E;i .t/ D cos.5t/I. Suppose the initial conditions are given by
xt0 .s/ D .14; 20/ and y0 .s/ D .22; 33/ for s 0, and suppose that the
switching rule is periodic with 1 D 0:4, 2 D 0:4, 3 D 0:2, and 4 D 1 (i.e.,
! D 2).
746 P. Stechlinski and X. Liu
(a) (b)
400 100
x (t)
1 x1(t)
300
5 σ(t)
x2(t)
80 x2(t)
4
y1(t) (u=0)
y (t)
200 1 3
y2(t) (u=0)
y (t)
60 2 2
100 1
40 0
0 0 2 4
Time
−100 20
−200 0
−300
−20
−400
0 0.5 1 1.5 2 2.5 3 3.5 4 0 0.2 0.4 0.6 0.8 1 1.2 1.4 1.6 1.8 2
Time Time
Fig. 1 Simulations of drive system (1) and response system (2). (a) Trajectories without hybrid
control. (b) Trajectories with hybrid control
Choose
10 10 0:354 0:020 0:253 0:037
P1 D ; P2 D ; P3 D ; P4 D ;
01 01 0:020 0:204 0:037 0:374
4
X X X
ln ıi C i i i .i / D 5:485;
iD1 i2P u i2P s
which implies robust synchronization of the drive and response systems by Theo-
rem 1. See Fig. 1 for an illustration.
4 Conclusions
switching (vi)). The results found are robust to model uncertainties, nonlinear
perturbations, and impulsive perturbations. One possible future direction is to
consider the robust hybrid synchronization from an optimal control point of view.
Acknowledgements This research was financially supported by the Natural Sciences and Engi-
neering Research Council of Canada (NSERC).
References
1. Khadra, A., Liu, X., Shen, X.: Application of impulsive synchronization to communication
security. IEEE Trans. Circuits Syst. I: Fundam. Theory Appl. 50(3), 341 (2003)
2. Olfati-Saber, R., Murray, R.M.: Consensus problems in networks of agents with switching
topology and time-delays. IEEE Trans. Autom. Control 49(9), 1520 (2004)
3. Li, C., Liao, X., Yang, X., Huang, T.: Impulsive stabilization and synchronization of a class of
chaotic delay systems. J. Nonlinear Sci. 15(4), 043 (2005)
4. Li, P., Cao, J., Wang, Z.: Robust impulsive synchronization of coupled delayed neural networks
with uncertainties. Phys. A: Stat. Mech. Appl. 373, 261 (2007)
5. Lakshmikantham, V., Rao, M.R.M.: Theory of Integro-Differential Equations. Gordon and
Breach Science Publishers, Amsterdam (1995)
6. Burton, T.: Volterra Integral and Differential Equations. Elsevier B.V., Amsterdam (2005)
7. Liu, J., Liu, X., Xie, W.C.: Delay-dependent robust control for uncertain switched systems with
time-delay. Nonlinear Anal. Hybrid Syst. 2(1), 81 (2008)
8. Liberzon, D.: Switching in Systems and Control. Birkhauser, Boston (2003)
9. Davrazos, G., Koussoulas, N.T.: A review of stability results for switched and hybrid systems.
In: Proceedings of 9th Mediterranean Conference on Control and Automation, Dubrovnik
(2001)
10. Evans, R.J., Savkin, A.V.: Hybrid Dynamical Systems. Birkhauser, Boston (2002)
11. Shorten, R., Wirth, F., Mason, O., Wulff, K., King, C.: Stability criteria for switched and hybrid
systems. SIAM Rev. 49(4), 545 (2007)
12. Hespanha, J.P., Morse, A.S.: Stability of switched systems with average dwell-time. In:
Proceedings of the 38th IEEE Conference on Decision and Control, Phoenix, vol. 3, p. 2655
(1999)
13. Guan, Z.H., Hill, D., Shen, X.: On hybrid impulsive and switching systems and application to
nonlinear control. IEEE Trans. Autom. Control 50(7), 1058 (2005)
14. Guan, Z.H., Hill, D., Yao, J.: A hybrid impulsive and switching control strategy for synchro-
nization of nonlinear systems and application to Chua’s chaotic circuit. Int. J. Bifurc. Chaos
16(1), 229 (2006)
15. Alwan, M.S., Liu, X.: On stability of linear and weakly nonlinear switched systems with time
delay. Math. Comput. Model. 48(7–8), 1150(2008)
16. Zhang, Y., Liu, X., Shen, X.: Stability of switched systems with time delay. Nonlinear Anal.
Hybrid Syst. 1(1), 44 (2007)
17. Yang, C., Zhu, W.: Stability analysis of impulsive switched systems with time delays. Math.
Comput. Model. 50(7–8), 1188 (2009)
18. Zhu, W.: Stability analysis of switched impulsive systems with time delays. Nonlinear Anal.
Hybrid Syst. 4(3), 608 (2010)
19. Niamsup, P.: Stability of time-varying switched systems with time-varying delay. Nonlinear
Anal. Hybrid Syst. 3(4), 631 (2009)
20. Wang, X., Li, X.: A generalized Halanay inequality with impulse and delay. Adv. Dev. Technol.
Int. 1(2), 9 (2012)
748 P. Stechlinski and X. Liu
21. Wang, Y., Xie, L., de Souza, C.E.: Robust control of a class of uncertain nonlinear systems.
Syst. Control Lett. 19, 139 (1992)
22. de Souza, C.E., Li, X.: Delay-dependent robust H-infinity control of uncertain linear state-
delayed systems. Automatica 35, 1313 (1999)
23. Chen, W.H., Zheng, W.X.: Robust stability and H-infinity control of uncertain impulsive
systems with time-delay. Automatica 45, 109 (2009)
24. Xiang, Z., Chen, Q.: Robust reliable control for uncertain switched nonlinear systems with
time delay under asynchronous switching. Appl. Math. Comput. 216(3), 800 (2010)
25. Liu, X., Zhong, S., Ding, X.: Robust exponential stability of impulsive switched systems with
switching delays: a Razumikhin approach. Commun. Nonlinear Sci. Numer. Simul. 17, 1805
(2012)
26. Ballinger, G., Liu, X.: Existence and uniqueness results for impulsive delay differential
equations. Dyn. Contin. Discret. Impuls. Syst. 5(3), 579 (1999)
27. Liu, J., Liu, X., Xie, W.C.: Input-to-state stability of impulsive and switching hybrid systems
with time-delay. Automatica 47, 899 (2011)
28. Hien, L.V., Phat, V.N.: Exponential stabilization for a class of hybrid systems with mixed
delays in state and control. Nonlinear Anal. Hybrid Syst. 3(3), 259 (2009)
Regularization and Numerical Integration
of DAEs Based on the Signature Method
Andreas Steinbrecher
1 Introduction
A. Steinbrecher ()
Institute of Mathematics MA 4-5, TU Berlin, Straße des 17. Juni 136, 10623 Berlin, Germany
e-mail: [email protected]
be guaranteed that all (hidden) constraints are satisfied within the numerical solution
and instabilities or drift from the solution manifold are avoided.
In most modeling and simulation tools, the current state-of-the-art to regularize
DAEs is to use some kind of structural analysis based on the sparsity pattern of
the system, to obtain necessary information for a regularization. The advantage of
a structural analysis in comparison to classical algebraic regularizations is that fast
algorithms based on graph theory can be applied. Usually, the Pantelides algorithm
[9] in combination with the Dummy Derivative Method [6] is used. In this paper,
we present regularization approaches based on the Signature method (˙-method)
[10].
In Sect. 3, we discuss regularization techniques that are based on the information
provided by the ˙-method which is reviewed in Sect. 2. Two of the regular-
ization techniques yield overdetermined systems of DAEs. Then, in Sect. 4 we
shortly discuss the software package QUALIDAES for the numerical integration
of (overdetermined) quasi-linear DAEs. In Sect. 5 we illustrate the applicability of
QUALIDAES in combination with the three proposed regularized formulations.
The ˙-method, see [7, 8, 10] and also [11], can be applied to regular nonlinear
DAEs of arbitrary high order p of the form F.t; z; zP; : : : ; z. p/ / D 0. We denote by Fi
the ith component of the vector-valued function F and by zj the jth component of
the vector z. Then, the ˙-method consists of the following steps:
1. Building the signature matrix ˙ D Œij i;jD1;:::;n with
(
highest order of derivative of zj in Fi ,
ij D
1 if zj does not occur in Fi .
m
(x(t),y(t))
where the two possible HVTs are marked by light and dark gray boxes. The
corresponding ˙-Jacobian J and the reduced derivative array (3) takes the form
2 3
xP v
2 3 6 xR vP 7
1 0 1 0 0 6 7
6 P
y w 7
60 1 0 1 0 7 6 7
6 7 6 R
y wP 7
6 7 6 7
JD6 0 0 m 0 2x7 ; 0 D F .t; Z / D 6 mvP C 2x 7 (7)
6 7 6 7
40 0 0 m 2y5 6 mwP C 2y C mg 7
6 7
2x 2y 0 0 0 6 x2 C y2 `2 7
4 5
2xPx C 2yPy
2xRx C 2Px2 C 2yRy C 2Py2
with Z T D x xP xR y yP yR v vP w wP . Since det.J/ D 4m.x2 C y2 / D 4m`2 ¤ 0,
the ˙-Jacobian J is nonsingular at every consistent point, and the ˙-method
succeeds with S D maxi ci C 1 D 3. G
h i
C1
with ! T D !1T !nT and !jT WD !j ij !jdi 2 Rci if dj > ij or !j WD Œ 2
R0 if dj D ij as new algebraic variables. Note that dj D ij C ci by (2).
The obtained structurally extended formulation (8) is of increased size, not
unique, since it depends on the chosen HVT T , and in general it is only valid
locally in a neighborhood of a consistent point. Furthermore, it may lead to an
inappropriate regularization, if an inappropriate HVT T is used (see Example 2).
To choose a suitable HVT, i.e., one that is valid in a preferably large neighborhood
of a consistent
Q point, we define the (local) weighting coefficient for each HVT T
as T WD .i;j/2T jJij j and choose one with largest value T , i.e., we choose T
as an HVT of ˙ with T D maxT .T /. In [11] it is shown that the structurally
extended system (8) is (locally) a regular system of structural index S 1 if T
is chosen as described above. This formulation has locally the same set of solutions
for the original unknowns z as the original DAE (1). Due to the local validity, the
determination of a new regularized formulation during the (numerical) integration
may be necessary. In this case, the integration has to be interrupted and to be
restarted with the newly regularized model equations. Unfortunately, this leads to
an increase in simulation time and influences the obtained precision negatively.
This approach completely can be automated using automatic or symbolic
differentiation tools. Therefore, an analytical preprocessing is not necessary.
In the proposed method, the selection of variables for which derivatives are
replaced is directly prescribed by the HVT T and the offset vectors. Once the ˙-
method is done, this selection of variables is easy to achieve and requires no further
numerical computations. In contrast, in the Dummy Derivative Method, see [6]. As
a result, the two approaches might result in different regularized systems.
Example 2 The system (4) is regularPand of structural index S D 3. The reduced
derivative array (7) consists of M D ci C n D 9 equations in n D 5 unknowns.
754 A. Steinbrecher
For the HVT T D T1 marked by the light gray boxes in the signature matrix (6)
(assuming that T1 D 4x2 T2 D 4y2 ), we have to introduce new algebraic
variables as in the following table:
For the HVT T D T2 marked by the dark gray boxes in the signature matrix (6)
(assuming that T2 D 4y2 T1 D 4x2 ), we have to introduce new algebraic
variables as in the following table:
3 3 ; ;
.1/
4 2 z4 !41
5 4 ; ;
Regularization and Numerical Integration of DAEs Based on the Signature Method 755
Applying the ˙-method to (9) and (10), we obtain a structurally regular system
with structural index S D 1 as long as x ¤ 0 while (10) forms a structurally regular
system with structural index S D 1 as long as y ¤ 0. G
From this it is possible to extract the set of all hidden constraints in an algebraic way
which, in particular, can be done automatically within the numerical integration.
In combination with the original DAE (1) we obtain the algebraic derivative
array (ADA) formulation
F.t; z; zP/
0 D A .t; z; zP; !/ D (11)
F .t; z; !/
which forms an overdetermined DAE for z and ! and has the same set of solutions
for the original unknowns z as the original DAE (1). The obtained algebraic
756 A. Steinbrecher
Together with the original DAE (4), we get the algebraic derivative array formula-
tion (11) with F.t; z; zP/ given in (4) and F .t; z; !/ given in (12). This corresponds
to an overdetermined set of DAEs containing 14 equations for 11 unknowns. G
In the previous sections, we did obtain regularizations that increased in its size more
then necessary. Therefore, in the numerical integration more computational time is
needed than necessary.
As mentioned in Sect. 2 the reduced derivative array (3) allows the determination
of the set of (hidden) constraints
0 D H.t; z/
which forms the regularized overdetermined (OVD) formulation for z and which
has the same set of solutions as the original DAE (1). The obtained overdetermined
formulation is of increased number of equations for the same unknown variables as
in the original DAE. For more details see [12].
Example 4 For the simple pendulum, see Example 1, we get the set of (hidden)
constraints as
2 3
x2 C y2 `2
0 D H.t; z/ D 4 2xv C 2yw 5 (13)
v 2 Cw2 m2 .x2 C y2 /yg
The software package QUALIDAES (QUAsi LInear DAE Solver) is suited for the
numerical integration of (overdetermined) quasi-linear DAEs of the form
" # " #
E.z; t/ k.z; t/ differential part;
zP D
0 G.z; t/ algebraic constraints:
5 Numerical Results
QUALIDAES(ADA)
10 2
absolut error ERR=||numsol-refsol|| 2
QUALIDAES(StE)
DASSL(DI1)
10 0
10 -2
QUALIDAES(OVD)
RADAU5(GGL)
10 -4
10 -1 10 0 10 1
simulation time
Fig. 2 Efficiency (simulation time vs. absolute error for different prescribed tolerances)
Fig. 3 Mass-spring-chain
F Control
p m
3
Path
p m
2
p m
1
F Control
form. The numerical integration using DASSL is not successful at all due to the
stability properties of BDF methods, the occurring drift off effect by use of the DI1-
form, where the constraints on position level and on velocity level are lost, and the
large time domain I. Nevertheless, the maximally obtained precision is excellent for
QUALIDAES(OVD) and QUALIDAES(ADA). G
pP 1 D v1 ; (14a)
pP 2 D v2 ; (14b)
pP 3 D v3 ; (14c)
mvP 1 D c. p1 p2 / C F; (14d)
mvP 2 D c. p1 p2 / c. p2 p3 /; (14e)
mvP 3 D c. p2 p3 / C F; (14f)
0 D p2 sin.t/ (14g)
760 A. Steinbrecher
RADAU5(DI1)
10 -2
QUALIDAES(ADA)
10 -4
QUALIDAES(StE)
-6
10
QUALIDAES(OVD)
10 -1
simulation time
Fig. 4 Efficiency (simulation time vs. absolute error for different prescribed tolerances)
6 Summary
The aim of this article was to discuss several approaches for the regularization of
differential-algebraic equations that benefit numerical integration. For this purpose,
we have proposed three different regularization approaches which end in the
structurally extended formulation, the algebraic derivative array formulation, and
the regularized overdetermined formulation. All these regularization approaches
are based on the signature method, which was reviewed in Sect. 2, and two of
them require numerical integration methods suited for overdetermined differential-
algebraic equations. We also briefly introduced the software package QUALIDAES
and illustrated its efficiency for two examples.
Acknowledgements This work has been supported by the European Research Council through
Advanced Grant MODSIMCONMP.
References
1 Introduction
G. Tan ()
School of Computational Science and Engineering, McMaster University, 1280 Main Street West,
Hamilton, ON, L8S 4L8, Canada
e-mail: [email protected]
N.S. Nedialkov
Department of Computing and Software, McMaster University, 1280 Main Street West, Hamilton,
ON, L8S 4L8, Canada
e-mail: [email protected]
J.D. Pryce
School of Mathematics, Cardiff University, Senghennydd Road, Cardiff CF24 4AG, Wales, UK
e-mail: [email protected]
where the xj .t/; j D 1; : : : ; n are state variables that are functions of an independent
variable t, usually regarded as time.
Pryce’s structural analysis (SA), the ˙-method [10], determines for (1) its
structural index, number of degrees of freedom (DOF), variables and derivatives that
need initial values, and the constraints of the DAE. These SA results can help decide
how to apply an index reduction algorithm [3], perform a regularization process
[12], or design a solution scheme for a Taylor series method [5–7]. The ˙-method
is equivalent to Pantelides’s algorithm [9]: they both produce the same structural
index [10, Theorem 5.8], which is an upper bound for the differentiation index, and
often both indices are the same [10].
The ˙-method succeeds on many problems of practical interest, producing a
nonsingular System Jacobian. However, this SA can fail—hence Pantelides’s algo-
rithm can fail as well—on some simple, solvable DAEs, producing an identically
singular System Jacobian.
We investigate such SA’s failures and present two symbolic-numeric conversion
methods for fixing them. After each conversion, provided some conditions are
satisfied, the value of the signature matrix is guaranteed to decrease. We conjecture
that such a decrease should result in a better problem formulation of a DAE, so that
the SA may produce a nonsingular System Jacobian and hence succeed.
Section 2 summarizes the ˙-method. Section 3 describes SA’s failures. Section 4
presents our two conversion methods, each of which is illustrated with an example
therein. Section 5 presents concluding remarks.
This article is a succinct version of the technical report [13]; the reader is referred
to it for more detailed explanations and examples.
This SA method [10] constructs for a DAE (1) an n n signature matrix ˙, whose
.i; j/ entry ij is either an integer 0, the order of the highest derivative to which
variable xj occurs in equation fi , or 1 if xj does not occur in fi .
A highest-value transversal (HVT) of ˙ is a set T of n positions .i; j/ with one
position in each row and each column, such that the sum of the corresponding entries
is maximized. This sum is the value of ˙, written Val.˙/. If Val.˙/ is finite, then
the DAE is structurally well posed (SWP); otherwise it is structurally ill posed.
We assume henceforth the SWP case. Using the HVT, we find n equation and n
variable offsets c1 ; : : : ; cn and d1 ; : : : ; dn , respectively, which are integers satisfying
These offsets are valid but not unique. There exists an elementwise smallest solution
of (2) termed the canonical offsets [10].
Symbolic-Numeric Methods for Improving Structural Analysis of DAEs 765
0 D f1 D x00 C x x y ci x y
f1 "2 0ı # 0 f1 " 1 x#
0 D f2 D y00 C y g ˙ D f2 2 0 0
ı J D f2 1 y
ı
f3 0 0 2 f3 2x 2y
0 D f3 D x2 C y2 L2
dj 2 2 0
The state variables are x; y, and ; G is gravity and L > 0 is the length of the
pendulum. There are two HVTs of ˙, marked with and ı, respectively. A blank
in ˙ denotes 1, and a blank in J denotes 0.
Since det.J/ D 2.x2 C y2 / D 2L2 ¤ 0, the System Jacobian is nonsingular,
and the SA succeeds. The structural index is S D mini ci C 1 D 2 C 1 D 3 (because
minj dj D d3 D 0),Pwhich equals
P the differentiation index. The number of DOF is
DOF D Val.˙/ D d
j j c
i i D 4 2 D 2.
1
When we present a DAE example, we show its signature matrix ˙, canonical offsets ci and dj ,
and the associated System Jacobian J.
766 G. Tan et al.
We say that the ˙-method fails, if a DAE (1) has a finite Val.˙/ and an identically
singular J. In the failure case, the SA reports Val.˙/ as an “apparent” DOF but not
a meaningful one.
In this article, we focus on the case where such an identically singular J is
structurally nonsingular. That is, there exists a HVT T of ˙ such that Jij is
generically nonzero for all .i; j/ 2 T.
Example 2 We illustrate a failure case with the following DAE2 in [1, p. 23].
0 D f1 D x0 C ty0 g1 .t/ x y ci x y
f 1 1 0 f 1 t
˙D 1 JD 1
0 D f2 D x C ty g2 .t/ f2 0 0 1 f2 1 t
dj 1 1
0 D f 1 D y C z0 g1 .t/ y z ci y z
f 0 1 0 f 1 1
˙D 1 JD 1
0 D f2 D z g2 .t/ f2 0 1 f2 1
dj 0 1
For this resulting DAE, det.J/ D 1 ¤ 0, and the SA succeeds. After solving for y
and z, we can obtain x D z ty. This fix also gives Val.˙ / D 0 < 1 D Val.˙/.
The above two manipulations illustrate the two conversion methods presented in
Sect. 4, respectively.
2
In the original formulation, the driving functions are f1 ; f2 . Here they are renamed g1 ; g2 .
Symbolic-Numeric Methods for Improving Structural Analysis of DAEs 767
4 Conversion Methods
We present two conversion methods for systematically fixing SA’s failures. The first
method is based on replacing an existing equation by a linear combination of some
equations and derivatives of them. We call this method the linear combination (LC)
method and describe it in Sect. 4.1. The second method is based on substituting
newly introduced variables for some expressions and enlarging the system. We call
this method the expression substitution (ES) method and describe it in Sect. 4.2.
We only present the main features of these methods; the reader is referred to [13]
for more details and especially the proofs of Theorems 1 and 2 below.
Given a DAE (1), we assume it has a finite Val.˙/ and a System Jacobian J that is
identically singular but structurally nonsingular. We also assume the equations in (1)
are sufficiently differentiable, so that our methods fit into the ˙-method theory.
After a conversion, we obtain a system with signature matrix ˙ and System
Jacobian J. If Val.˙/ is finite and J is still identically singular, then we can
perform another conversion using either of the methods, provided the corresponding
conditions are satisfied. Suppose a sequence of conversions produces a solvable
DAE with Val.˙ / 0 and a generically nonsingular J. Given the fact that each
conversion reduces some Val.˙/ by at least one, the total number of conversions
does not exceed the value of the original signature matrix.
If the resulting system is structurally ill posed after a conversion, that is,
Val.˙ / D 1, then we say the original DAE is ill posed [13].
then Val.˙/ < Val.˙/, where ˙ is the signature matrix of the resulting DAE.
We call (5) the condition for applying the LC method.
Example 3 We illustrate this method with the following problem:
x1 x2 x3 x4 c i x1 x2 x3 x4
f1 2 1 0 30 f1 2 1 1 3
1 0 70 17
˙D 26 JD 26
f f 1
f3 4 0 0 51 f3 4 x2 x1 5
f4 0 0 0 0 0 f4 x2 x1
dj 1 1 0 0
x1 x2 x3 x4 c i x1 x2 x3 x4
f1 2 1 0 30 f1 2 1 1 3
1 0 70 17
˙D 26 JD 26
f f 1
f3 4 0 0 51 f3 4 x2 x1 5
f 4 0 0 1 f 4 1 1
dj 1 1 0 0
Symbolic-Numeric Methods for Improving Structural Analysis of DAEs 769
Now Val.˙ / D 0 < 1 D Val.˙/. The SA succeeds at all points where det.J/ D
x2 x1 ¤ 0.
From (4) and (6), we can recover the replaced equation fl by
P .c c/ ı
fl D f l i2Inflg ui fi i ul :
Provided ul ¤ 0 for all t in the interval of interest, it is not difficult to show that the
original DAE and the resulting one have the same solution (if there exists one); see
[13, § 5.3].
In each fi with i 2 M, we
vj .d c/ .cci /
substitute yj C xl l
vl (9)
. / ˚
for every xj ij with ij D dj ci and j 2 J n l :
Denote by f i the equations that result from these substitutions, and write f i D fi for
i … M. Using (8), we append to these f i ’s the equations
that prescribe the substitutions. Hence the resulting enlarged system consists of
˚
equations 0 D f 1 ; : : : ; f n and 0 D gj for all j 2 J n l
˚
in variables x1 ; : : : ; xn and yj for all j 2 J n l :
For any l 2 J, if we
• introduce .s 1/ new variables as defined in (8),
• perform substitutions in fi for all i 2 M by (9), and
• append the equations gj in (10),
then Val.˙/ < Val.˙/, where ˙ is the signature matrix of the resulting DAE.
We call (11) the conditions for applying the ES method.
Example 4 We illustrate the ES method with the artificially constructed DAE below.
0 00
0 D f1 D x1 C ex1 x2 x2 C h1 .t/ x1 x2 ci x1 x2
f 1 2 0 f ˛ ˛x2
˙ D f1 0 1 1
J D f1 1 x2
0 D f2 D x1 C x2 x02 C x22 C h2 .t/ 2 2
dj 1 2
0 00
Here h1 and h2 are given driving functions, and ˛ D ex1 x2 x2 . Obviously det.J/ D
0 and the SA fails.
Suppose we choose v D .x2 ; 1/T 2 ker.J/. Then (7) becomes
˚ ˚
J D 1; 2 ; s D jJj D 2; M D 1; 2 ; and c D max ci D 1 :
i2M
and append the equation 0 D g1 D y1 C x1 C x2 x02 . Then we substitute .y1 x2 x02 /0
for x01 in f1 to obtain f 1 , and substitute y1 x2 x02 for x1 in f2 to obtain f 2 . The resulting
DAE and its SA results are shown below.
0 02
0 D f 1 D x1 C ey1 Cx2 C h1 .t/ 2x1 x2 y1 3 ci
"
x1 x2 y1
#
f1 0 1 1 0 f1 1 2x02 ˇ ˇ
0 D f 2 D y1 C x22 C h2 .t/ ˙ D f2 4 0 0 5 1 J D f2 2x2 1
g1 0 1 0 0 g1 1 x2
0 D g1 D y1 C x1 C x2 x02 dj 0 1 1
Symbolic-Numeric Methods for Improving Structural Analysis of DAEs 771
0 02
Here ˇ D ey1 Cx2 . Now Val.˙/ D 1 < 2 D Val.˙/. The SA succeeds at all points
where det.J/ D 2ˇ.x2 C x02 / x2 ¤ 0.
From the steps of applying the ES method, we can “undo” the expression
substitutions to recover the original DAE. Similar to the LC method, the ES method
also guarantees that, provided vl ¤ 0 for all t in some interval of interest, the original
DAE and the resulting one have equivalent solutions (if any) in a natural sense; cf.
[13, § 6.3].
Our experience suggests that it is effective to attempt the LC method first, and
if its condition (5) is violated, then we try the ES method. Also, it is desirable to
choose an l 2 L [resp. l 2 J] in the LC [resp. ES] method, such that an ul [resp. vl ]
never becomes zero. For example, it can be a nonzero constant, x21 C 1, or 2 C cos x2 .
Such a choice of l guarantees that the resulting DAE is “equivalent” to the original
one—that is, they always have the same solution, if there exists one.
We show below that the LC method does not succeed on the DAE in Example 4
because the condition (5) is not satisfied.
T 0 00
Choose u D 1; ˛ 2 coker.J/, where ˛ D ex1 x2 x2 . Then (4) becomes
˚ ˚ ˚ ˚
ID i j ui 6 0 D 1; 2 ; c D min ci D 0; and L D i 2 I j ci D c D 1 :
i2I
x1 x2 ci
x1 x2
˙ D f1 1 2 0
J D f1 ˛ ˛x2
f2 0 1 1 f2 1 x2
dj 1 2
Here D x01 C x2 x002 C .x02 /2 C 2x2 x02 C h02 .t/. The SA fails still, since J is identically
singular. Now Val.˙ / D Val.˙/ D 2.
5 Conclusions
nonsingular System Jacobian. A conversion guarantees that both DAEs have (at
least locally) the same solution. The conditions for applying these methods can be
checked automatically, and the main result of a conversion is Val.˙ / < Val.˙/,
where ˙ is the signature matrix of the resulting DAE.
An implementation of these methods requires
(1) computing a symbolic form of a System Jacobian J,
(2) finding a vector in coker.J/ [respectively ker.J/],
(3) checking the LC condition (5) [respectively ES conditions (11)], and
(4) generating the equations for the resulting DAE.
These symbolic computations may seem expensive. However, for DAEs whose J
can be permuted into a block-triangular form [8, 11], we can locate the diagonal
blocks that are singular and then apply our methods to these blocks only, instead of
working on the whole DAE. This approach is presently under development.
We combine MATLAB’s Symbolic Math Toolbox [14] with our structural analysis
software DAESA [8, 11], and have built a prototype code that applies our conversion
methods automatically. We aim to incorporate them in a future version of DAESA.
With our prototype code, we have applied our methods on numerous DAEs. They
are either arbitrarily constructed to be “SA-failure cases” for our investigations, or
borrowed from the existing literature: Campbell and Griepentrog’s robot arm [2], the
transistor amplifier and the ring modulator [4], and the linear constant coefficient
DAE in [12]. Our conversion methods succeed in fixing all these solvable DAEs;
see [13] and especially Appendix B thereof. We believe that our assumptions and
conditions are reasonable for practical problems, and that these methods can help
make the ˙-method more reliable.
Finally, we conjecture that reducing Val.˙/ tends to give a better formulation of
a DAE from the SA’s perspective and then a nonsingular System Jacobian.
Acknowledgements The authors acknowledge with thanks the financial support for this research:
GT is supported in part by the Ontario Research Fund, Canada, NSN is supported in part by the
Natural Sciences and Engineering Research Council of Canada, and JDP is supported in part by
the Leverhulme Trust, the UK.
References
1. Brenan, K., Campbell, S., Petzold, L.: Numerical Solution of Initial-Value Problems in
Differential-Algebraic Equations, 2nd edn. SIAM, Philadelphia (1996)
2. Campbell, S.L., Griepentrog, E.: Solvability of general differential-algebraic equations. SIAM
J. Sci. Comput. 16(2), 257–270 (1995)
3. Mattsson, S.E., Söderlind, G.: Index reduction in differential-algebraic equations using dummy
derivatives. SIAM J. Sci. Comput. 14(3), 677–692 (1993)
4. Mazzia, F., Iavernaro, F.: Test set for initial value problem solvers. Technical report 40,
Department of Mathematics, University of Bari (2003). http://pitagora.dm.uniba.it/~testset/
5. Nedialkov, N.S., Pryce, J.D.: Solving differential-algebraic equations by Taylor series (I):
computing Taylor coefficients. BIT Numer. Math. 45(3), 561–591 (2005)
Symbolic-Numeric Methods for Improving Structural Analysis of DAEs 773
6. Nedialkov, N.S., Pryce, J.D.: Solving differential-algebraic equations by Taylor series (II):
computing the system Jacobian. BIT Numer. Math. 47(1), 121–135 (2007)
7. Nedialkov, N.S., Pryce, J.D.: Solving differential-algebraic equations by Taylor series (III): the
DAETS code. JNAIAM J. Numer. Anal. Ind. Appl. Math. 3, 61–80 (2008)
8. Nedialkov, N.S., Pryce, J.D., Tan, G.: Algorithm 948: DAESA—a Matlab tool for structural
analysis of differential-algebraic equations: software. ACM Trans. Math. Softw. 41(2), 12:1–
12:14 (2015). doi:10.1145/2700586
9. Pantelides, C.: The consistent initialization of differential-algebraic systems. SIAM. J. Sci.
Stat. Comput. 9, 213–231 (1988)
10. Pryce, J.D.: A simple structural analysis method for DAEs. BIT Numer. Math. 41(2), 364–394
(2001)
11. Pryce, J.D., Nedialkov, N.S., Tan, G.: DAESA—a Matlab tool for structural analysis of
differential-algebraic equations: theory. ACM Trans. Math. Softw. 41(2), 9:1–9:20 (2015).
doi:10.1145/2689664
12. Scholz, L., Steinbrecher, A.: A combined structural-algebraic approach for the regularization of
coupled systems of DAEs. Technical report 30, Reihe des Instituts für Mathematik Technische
Universität Berlin, Berlin (2013)
13. Tan, G., Nedialkov, N., Pryce, J.: Symbolic-numeric methods for improving structural analysis
of differential-algebraic equation systems. Technical report, Department of Computing and
Software, McMaster University, 1280 Main St. W., Hamilton, ON, L8S4L8, Canada (2015).
84pp. Download link:http://www.cas.mcmaster.ca/cas/0reports/CAS-15-07-NN.pdf
14. The MathWorks, Inc.: Matlab symbolic math toolbox (2015). https://www.mathworks.com/
help/symbolic/index.html
Pinning Stabilization of Cellular Neural
Networks with Time-Delay Via Delayed
Impulses
1 Introduction
Cellular neural networks (CNNs), introduced by Chua and Yang in [1, 2], have
attracted the attentions of several researchers in recent years. This is mainly due
to their broad applications in many areas, including image processing and pattern
recognition (see, e.g., [2, 3] ), data fusion [4], odor classification [5], and solving
partial differential equations [6].
In real-world applications, it is inevitable for the existence of time delay in
the processing and transmission of signals among units of CNNs. Hence, it is
practical to investigate CNNs with time-delay (DCNNs) (see, e.g., [7–12]). Stability
of DCNNs, as a prerequisite for their applications, has been studied extensively in
the past decades, and various control methods have been introduced to stabilize
DCNNs, such as intermittent control [9], sliding mode control [10], impulsive
control [11], and sampled-data control [12]. Among these control algorithms, the
impulsive control method has been proved to be an effective approach to stabilize
DCNNs. The control mechanism of this method is to control the unit states of
the CNN with small impulses, which are small samples of the state variables of
the CNN, at a sequence of discrete moments. Since the time delay in unavoidable
in sampling and transmission of the impulsive information is dynamical systems,
many control problems of dynamical systems have been investigated via delayed
impulses in recent years, such as stabilization of stochastic functional systems [13]
and synchronization of dynamical networks [14].
The regular impulsive control method to stabilize a CNN is to control each
unit of the network to tame the unit dynamics to approach a steady state (i.e.,
equilibrium point). However, a neural network is normally composed of a large
number of units, and it is expensive and infeasible to control all of them. Motivated
by this practical consideration, the idea of controlling a small portion of units,
named pinning control, was introduced in [15, 16], and many pinning impulsive
control algorithms have been reported for many control problems of dynamical
networks (see, e.g., [17–23]) It is worth noting that no time delay is considered
in these pinning impulsive controllers proposed in the above literatures. However,
it is natural and essential to consider the delay effects when processing the impulse
information in the controller.
Due to the cost effective advantage of impulsive control method and pinning
control strategy and the wide existence of time delay, it is practical to investigate
the pinning impulsive control approach that takes into account of delays. However,
to our best knowledge, no such result has been reported for stabilization of DCNNs.
Therefore, in this paper, we propose a novel pinning delayed-impulsive controller
for the DCNNs. The remainder of this paper is organized as follows. In Sect. 2,
we formulate the problem and introduce the pinning delayed-impulsive control
algorithm. In Sect. 3, a global exponential stability result of the impulsive DCNNs
is obtained. Then, in Sect. 4, a numerical example is considered to illustrate the
theoretical result. Finally, conclusions are stated in Sect. 5.
2 Preliminaries
Let N denote the set of positive integers, R the set of real numbers, RC the set of
nonnegative real numbers, and Rn the n-dimensional real space equipped with the
Euclidean norm. For a; b 2 R with a < b and S
Rn , we define
n ˇ
ˇ
PC .Œa; b; S/ D W Œa; b ! Sˇ .t/ D .tC /; for any t 2 Œa; b/I .t /
where .tC / and .t / denote the right and left limit of function at t, respec-
tively. For a given constant > 0, the linear space PC .Œ ; 0; Rn / is equipped
with the norm defined by jj jj D sups2Œ ;0 jj .s/jj, for 2 PC .Œ ; 0; Rn /.
Pinning Stabilization Via Delayed Impulses 777
3 Stabilization
1
(iv) q > 1 C2
> ecd , where d D supk2N ftkC1 tk g.
Then the trivial solution of system (3) is GES.
Lemma 1 is a direct consequence of Theorem 3.1 in [27]. Next, verifiable
conditions will be constructed for the GES of system (3) by utilizing a quadratic
Lyapunov function.
Pinning Stabilization Via Delayed Impulses 779
P
V.x/ D 2xT .t/Pxh.t/ i
D 2xT .t/ Cx.t/ C Af .x.t// C Bf .x.t 1 //
2cmin C 2jjAjjL V.x.t// C 2jjBjjLjjx.t/jjjjx.t 1 /jj
2cmin C 2jjAjjL C jjBjjL"1 V.x.t// C "jjBjjLV.x.t 1 //; (5)
where cmin D mini fci g and constant " > 0. It can be seen from (4) that there exists
a constant q > 0 such that
1
q> > ecN d ; (6)
p
where cN D 2 mini fci g C 2L.jjAjj C qjjBjj/. If V.x.t C s// < qV.x.t// for all
s 2 Œ ; 0, then we can obtain from (5) that
P
V.x/ 2cmin C 2jjAjjL C jjBjjL."1 C q"/ V.x.t//: (7)
i.e.,
X X X
n
2
.1 C /.1 C 1 / x2i .tk / C x2i .tk / N1 x2i .tk /:
i2Dlk i62Dlk iD1
X
n
C .1 C 1 /22 x2i .tk 2 /
iD1
l
r l 2
D minf1 C 2 g D 1 C j1 C 1 j C j2 j :
>0 n n
Based on the above discussion, we can conclude that all the conditions of
Lemma 1 are satisfied. Thus, the trivial solution of system (3) is GES. t
u
Pinning Stabilization Via Delayed Impulses 781
Remark 1 Parameter is related to impulsive control gains 1 , 2 and the ratio l=n.
It can be seen from (4) that, the fewer units are controlled at impulsive instants, the
more frequently the impulsive controllers need to be added to the network.
4 Numerical Simulations
and f .x/ D . f1 .x1 /; f2 .x2 //T with f1 ./ D f2 ./ D tanh./. The chaotic attractor of
CNN (1) is shown in Fig. 1.
We consider two types of impulsive controllers:
(1) l D 1, i.e., impulsive control one unit at each impulsive instant. Let tk
tk1 D 0:03, 2 D 1, 1 D 0:868, and 2 D 0:2, then (4) is satisfied.
Thus, Theorem 1 implies that the trivial solution of (3) is GES. See Fig. 2 for
numerical simulations.
(2) l D 2, i.e., impulsive control two units at each impulsive instant. Let tk tk1 D
0:08, and 2 , 1 , 2 are the same as those in the first scenario, then (4) is satisfied
and Theorem 1 implies that the trivial solution of (3) is GES. Numerical results
are shown in Fig. 3.
The initial data in Figs. 2 and 3 is chosen the same as that in Fig. 1, and the red
dot denotes the state x at initial time t D 0. The vertical (or horizontal) lines in
Fig. 2a represent the state jump of x2 (or x1 ) while the other state is unchanged.
Since both units are controlled in Fig. 3a, no vertical and horizontal lines can be
observed. It can be seen from Fig. 2 that different unit may be controlled at different
impulsive instants. This is consistent with our pinning algorithm of controlling the
unit which has the largest state deviation with the equilibrium. However, it is more
practical to control one specific unit at all impulsive instants. Next, we apply the
pinning impulsive controller to the first and second unit at all impulsive instants
respectively, and numerical results are shown in Fig. 4a, b. The impulsive control
782 K. Zhang et al.
1
x2
−1
−2
−3
−4
−5
−1 −0.8 −0.6 −0.4 −0.2 0 0.2 0.4 0.6 0.8 1
x1
Fig. 1 Chaotic behavior of CNN (1) with the parameters given in Example 1. The initial data for
this simulation is .s/ D Œ1; 1T for s 2 Œ 1 ; 0, and the red dot denotes the state x at the initial
time t D 0
−0.4
x
−0.6 −0.5
−0.8
−1
−1
−1.2 −1.5
−0.2 0 0.2 0.4 0.6 0.8 1 1.2 0 0.5 1 1.5 2 2.5 3 3.5 4 4.5 5
x1 t
Fig. 2 Impulsive control one unit of CDN (1) at each impulsive instant. (a) Phase portrait.
(b) State trajectories
gains 1 , 2 , and the impulsive sequence ftk g are chosen the same as those in Fig. 2.
Figure 4 implies that stabilization cannot be realized via this type of pinning strategy
with the given parameters, and more strict conditions may be required to guarantee
the stability which will be investigated in our future research.
Pinning Stabilization Via Delayed Impulses 783
(a) 0 (b) 1
x
−0.2
x12
0.5
−0.4
−0.6 0
x2
x
−0.8 −0.5
−1
−1
−1.2
−1.4 −1.5
0 0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9 1 0 0.5 1 1.5 2 2.5 3 3.5 4 4.5 5
x t
1
Fig. 3 Impulsive control both units of CDN (1) at each impulsive instant. (a) Phase portrait.
(b) State trajectories
(a) (b)
2.5 x
1.5 x
1 1
2 x x
2 2
1.5 1
1 0.5
0.5
0 0
x
−0.5
−1 −0.5
−1.5 −1
−2
−2.5 −1.5
0 5 10 15 20 25 30 35 40 45 50 0 5 10 15 20 25 30 35 40 45 50
t t
Fig. 4 Impulsive control one specific unit of CDN (1) through all the impulsive instants.
(a) Control the first unit. (b) Control the second unit
5 Conclusion
We have studied the stabilization problem of cellular neural networks with time-
delay. An impulsive controller that takes into account both the pinning control
algorithm and time delays has been proposed. Sufficient conditions for the global
exponential stability of cellular neural networks with time-delay and delayed
impulses have been derived by using a Razumikhin-type stability result. Our result
has shown that the delayed cellular neural networks can be exponentially stabilized
by pinning controlling a small portion of units at each impulsive instant. Numerical
simulations have been provided to demonstrate the effectiveness of our theoretical
result.
784 K. Zhang et al.
References
1. Chua, L.O., Yang, L.: Cellular neural networks: theory. IEEE Trans. Circuits Syst. 35(10),
1257–1272 (1988)
2. Chua, L.O., Yang, L.: Cellular neural networks: applications. IEEE Trans. Circuits Syst.
35(10), 1273–1290 (1988)
3. Jamrozik, W.: Cellular neural networks for welding arc thermograms segmentation. Infrared
Phys. Technol. 66, 18–28 (2014)
4. Chatziagorakis, P., Sirakoulis, G.Ch., Lygouras, J.N.: Design automation of cellular neural
networks for data fusion applications. Microprocess. Microsyst. 36(1), 33–44 (2012)
5. Ayhan, T., Yalçin, M.E.: An application of small-world cellular neural networks on odor
classification. Int. J. Bifurc. Chaos 22(01), 1250013 (12pp.) (2012)
6. Hadada, K., Piroozmanda, A.: Application of cellular neural network (CNN) method to the
nuclear reactor dynamics equations. Ann. Nucl. Energy 34(5), 406–416 (2007)
7. Civalleri, P.P., Gilli, M., Pandolfi, L.: On stability of cellular neural networks with delay. IEEE
Trans. Circuits Syst. I: Fundam. Theory Appl. 40(3), 157–165 (1993)
8. Mohamad, S., Gopalsamy, K.: Exponential stability of continuous-time and discrete-time
cellular neural networks with delays. Appl. Math. Comput. 135(1), 17–38 (2003)
9. Yu, J., Hu, C., Jiang, H., Teng, Z.: Exponential lag synchronization for delayed fuzzy cellular
neural networks via periodically intermittent control. Math. Comput. Simul. 82(5), 895–908
(2012)
10. Gan, Q., Xu, R., Yang, P.: Synchronization of non-identical chaotic delayed fuzzy cellular
neural networks based on sliding mode control. Commun. Nonlinear Sci. Numer. Simul. 17(1),
433–443 (2012)
11. Wang, Q., Liu, X.: Impulsive stabilization of cellular neural networks with time delay via
Lyapunov functionals. J. Nonlinear Sci. Appl. 1(2), 72–86 (2008)
12. Kalpana, M., Balasubramaniam, P.: Stochastic asymptotical synchronization of chaotic Marko-
vian jumping fuzzy cellular neural networks with mixed delays and the Wiener process based
on sampled-data control. Chin. Phys. B 22(7), 078401 (10pp.) (2013)
13. Cheng, P., Deng, F., Yao, F.: Exponential stability analysis of impulsive functional differential
equations with delayed impulses. Commun. Nonlinear Sci. Numer. Simul. 19(6), 2104–2114
(2014)
14. Zhang, W., Tang, Y., Miao, Q., Fang, J.: Synchronization of stochastic dynamical networks
under impulsive control with time delays. IEEE Trans. Neural Netw. Learn. Syst. 25(10), 1758–
1768 (2014)
15. Wang, X.F., Chen, G.: Pinning control of scale-free dynamical networks. Phys. A: Stat. Mech.
Appl. 310(3–4), 521–531 (2002)
16. Li, X., Wang, X.F., Chen, G.: Pinning a complex dynamical netwrok to its equilibrium. IEEE
Trans. Circuits Syst. I: Regul. Pap. 51(10), 2074–2087 (2004)
17. Lu, J., Kurths, J., Cao, J., Mahdavi, N., Huang, C.: Synchronization control for nonlinear
stochastic dynamical networks: pinning impulsive strategy. IEEE Trans. Neural Netw. Learn.
Syst. 23(2), 285–292 (2012)
18. Mahdavi, N., Menhaj, M.B., Kurths, J.: Pinning impulsive synchronization of complex
dynamical networks. Int. J. Bifurc. Chaos 22(10), 1250239 (14pp.) (2012)
19. Hu, A., Xu, Z.: Pinning a complex dynamical network via impulsive control. Phys. Lett. Sect.
A: Gen. Atom. Solid State Phys. 374(2), 186–190 (2009)
20. Zhou, J., Wu, Q., Xiang, L.: Pinning complex delayed dynamical networks by a single
impulsive controller. IEEE Trans. Circuits Syst. I: Regul. Pap. 58(12), 2882–2893 (2011)
21. Lu, J., Wang, Z., Cao, J.: Pinning impulsive stabilization of nonlinear dynamical networks with
time-varying delay. Int. J. Bifurc. Chaos 22(7), 1250176 (12pp.) (2012)
22. Yang, X., Cao, J., Yang, Z.: Synchronization of coupled reaction-diffusion neural networks
with time-varying delays via pinning-impulsive controller. SIAM J. Control Optim. 51(5),
3486–3510 (2013)
Pinning Stabilization Via Delayed Impulses 785
23. Zhang, K., Liu, X., Xie, W.C.: Impulsive control and synchronization of spatiotemporal chaos
in the Gray Scott model. In: Interdisciplinary Topics in Applied Mathematics, Modeling
and Computational Science. Springer Proceedings in Mathematics & Statistics, pp. 549–555.
Springer, Cham (2015)
24. Trivedi, A.R., Datta, S., Mukhopadhyay, S.: Application of Silicon-Germanium source Tunnel-
FET to enable ultralow power cellular neural network-based associative memory. IEEE Trans.
Electron Devices 61(11), 3707–3715 (2014)
25. Yildiz, N., Cesur, E., Kayaer, K., Tavsanoglu, V., Alpay, M.: Architecture of a fully pipelined
real-time cellular neural network emulator. IEEE Trans. Circuits Syst. I: Regul. Pap. 62(1),
130–138 (2015)
26. Lu, J., Kurths, J., Cao, J., Mahadavi, N., Huang, C.: Sychronization control for nonlinear
stochastic dynamical networks: pinning impulsive strategy. IEEE Trans. Netw. Learn. Syst.
23(2), 285–292 (2012)
27. Cheng, P., Deng, F., Yao, F.: Exponential stability analysis of impulsive stochastic functional
differential systems with delayed impulses. Commun. Nonlinear Sci. Numer. Simul. 19(6),
2104–2114 (2014)
Convergence Analysis of the Spectral Expansion
of Stable Related Semigroups
Abstract The purpose of this note is to carry out a convergence analysis of the
spectral representation, derived recently in Patie and Savov (Spectral expansions
of non-self-adjoint generalized Laguerre semigroups, submitted, 2015), of some
non-self-adjoint Markovian semigroups related to spectrally negative ˛-stable Lévy
processes conditioned to stay positive. More specifically, we start by performing an
error analysis for the spectral type series expansions. Moreover, these semigroups
are closely related to a class of invariant semigroups, whose speed of convergence to
equilibrium has been studied in Patie and Savov (Spectral expansions of non-self-
adjoint generalized Laguerre semigroups, submitted, 2015). Our second aim is to
carry out a numerical analysis on the convergence rate which is illustrated with two
examples.
1 Introduction
The class of Lévy stable and related processes have attracted much attention
over the past decades. In particular, this class of processes have been shown to
be an appropriate statistical description for a large number of phenomena. Such
applications include, e.g., the study of turbulence in physics [4], seismic series
and earthquakes in geography [6], risk process in financial mathematics [10], and
primary sequences of protein-like copolymers in biomedical science [3]. Therefore,
being able to explicitly represent the transition kernel and the solution to the Cauchy
problem associated to stable related semigroups has become a critical issue in
many areas. In our context, we consider a spectrally negative ˛-stable process
Z D .Zt /t0 , with ˛ 2 .1; 2/ . It means that Z is a process with stationary and
independent increments, having no positive jumps, and its law is characterized by
Y. Zhao ()
Cornell University ORIE Department, 288 Rhodes Hall, Cornell University, Ithaca, NY, USA
e-mail: [email protected]
P. Patie
Cornell University ORIE Department, 206 Rhodes Hall, Cornell University, Ithaca, NY, USA
e-mail: [email protected]
its characteristic exponent which takes the form, for t > 0; <.z/ > 0,
Z 0
˛ jyj˛1
ln EŒe D z t D
zZt
.ezy 1 zy/ dy
1
.˛/
where throughout
stands for the Gamma function. Next, let K 0 D .Kt0 /t0 be the
semigroup of the process Z killed upon entering the negative half-line. That is, for
f 2 Bb .RC /, the set of bounded Borelian functions on RC D Œ0; 1/, and for any
t; x > 0, Kt0 is defined by
where T0 D infft > 0I Zt < 0g. By [2, Section 3.2], p˛1 .x/ D x˛1 ; x > 0; is
an excessive function for K 0 , i.e. p˛1 0 on RC and for all t > 0, Kt0 p˛1 .x/
"
p˛1 .x/. Hence one may construct a semigroup K " D .Kt /t0 through Doob’s h-
transform as follows,
which turns out to be the Feller semigroup of the ˛-stable process conditioned to
stay positive, and will be referred to as ˛-SP+ throughout . It has been shown in [2]
that the infinitesimal generator of K " , denoted by L" , can be expressed in terms of
an Erdélyi-Kober type operator in the form, for a smooth function f ,
Z
d2 x
y˛1 f .y/ dy
L" f .x/ D x˛ D˛0C;1;1 f .x/ D x1˛ :
dx2 0 .x y/ ˛1
.2 ˛/
.˛z C ˛/
log EŒez1 D .z/ D : (1)
.˛z/
Convergence Analysis of the Spectral Expansion of Stable Related Semigroups 789
.˛nC˛/
.˛/nŠ
, which
yields that its Mellin transform is
Z 1
.˛s/
M .s/ D xs1 .x/dx D ; s 2 CC : (3)
0
.˛/
.s/
X1
.1/nC1 sin. n
˛ /
. ˛ C 1/ ˛n
n
.x/ D x ; (4)
nD0
.˛/nŠ
.˛ˇC˛ˇ/
where d˛;ˇ D
.˛ˇC1ˇ/ and
.˛ 1/ ˇC 1 C1 1
g˛;ˇ .y/ D 1
y ˛1 2 F1 .˛ˇ C˛ ˇ; ˛I ˛ˇ C˛ ˇ C1I y ˛1 /; (6)
ˇ C ˛1 C1
with 2 F1 the Gauss hypergeometric function. Then it is shown in [7, Theorem 1.1]
that L˛;ˇ is the generator of a non-self-adjoint contraction Markov semigroup G in
L2 .e˛;ˇ /, where
1 1
xˇC ˛1 1 ex ˛1
e˛;ˇ .x/ D ; x > 0; (7)
..˛ 1/ˇ C 1/
is its unique invariant measure. The motivation for studying this class of semigroups
is that while they share many similar properties with P, the expressions of their
spectral expansions are much simpler and easier to evaluate. In this paper, we will
also study the speed of convergence to equilibrium for G.
Theorem 1
(a) For any f 2 L2 ./, x > 0 and t > T˛ ;˛ , we have in L2 ./,
1
X
Pt f .x/ D ent h f ; V n i P n .x/; (10)
nD0
1
X ˝ ˛
Kt f .x/ D .t C 1/n f ı d.tC1/ ; V n P n .x/: (11)
nD0
X
m
.˛m C ˛/
Kt pm .x/ D xm C xmn tn : (12)
nD1
.˛.m n/ C ˛/nŠ
(b) There exists C > 0 and an integer k 0 such that for any f 2 L2 ./ and
t > T˛ ;˛ ,
s
.k/
k 1
kPt f f k C 2 2 kf f k : (13)
e2.tT˛ ;˛ / 1
.˛m C ˛/ t
kPt pm pm k e kpm epm ke ; (14)
.˛/.mŠ/2
which further yields (11) from (10). Moreover, by [9, Proposition 9.3], the Mellin
transform of W n is, for s 2 CC ,
.1/n
.s/ .1/n
.˛s/
M Wn .s/ D M .s/ D : (15)
.n C 1/
.s n/
.˛/
.n C 1/
.s n/
792 Y. Zhao and P. Patie
.1/n .t C 1/m
.˛m C ˛/
hpm ı dtC1 ; V n i D .t C 1/m M Wn .m C 1/ D ;
.˛/
.n C 1/
.m C 1 n/
which, since
has a pole at any negative integers, vanishes when n m C 1.
Then (11) becomes a finite series and easy algebra yields the representation (12).
For the speed of convergence, (13) comes from [9, Theorem 1.9(3c)]. Moreover, by
[9, Theorem 2.9], P intertwins with Q D .Qt /t0 , the classical Laguerre semigroup,
which is self-adjoint on L2 .e/ with invariant measure e.dx/. More specifically, there
exists a multiplicative kernel such that Pt f D Qt f for any f 2 L2 .e/, and we
.˛/.mŠ/2
have for all m 2 N, pm .x/ D Qm mŠ .k/ pm .x/ D
.˛m C ˛/ t
kPt pm pm k k1 pm e1 pm ke D e kpm epm ke
.˛/.mŠ/2
In this section, we first provide the plots of em .N/, the relative truncation error
of (12) up to N terms which is formally defined by
ˇP ˝ ˛ ˇ
ˇ m n
f ı d.tC1/ ; W n P n .x/ ˇˇ
ˇ nDNC1 .t C 1/
em .N/ D ˇ Pm ˝ ˛ ˇ;
ˇ nD0 .t C 1/
n f ı d
.tC1/ ; W n P n .x/ ˇ
for N running from 1 up to m 1 > 0. Figures 1, 2, and 3 depict the plots for
.m D 20; x D 1/; .m D 40; x D 1/; .m D 40; x D 5/, respectively. Each
plot consists of three experiments ˛ D 1:2; 1:5; 1:8., and in each figure, the left
panel plots log em .N/ with respect to N while the right panel plots em .N/. It can be
seen from the plots that em .N/ exhibits a super-exponential decay, and the relative
error becomes negligible within only a few terms. Comparing Fig. 1 with Fig. 2,
we observe that keeping the value of x constant, the convergence is slower for
larger m (for example, 6 terms are sufficient for a fairly good convergence when
m D 20, but not when m D 40), which is indeed expected since there are more
non-zero terms in the series summation (12) when m gets large. Comparing Fig. 2
with Fig. 3, we also observe that the rate of convergence among different values
of ˛’s depends on the value of x. When x D 1, ˛ D 1:2 converges the fastest
and ˛ D 1:8 converges the slowest. But when x D 5, ˛ D 1:5 converges the
fastest but ˛ D 1:2 becomes the slowest. Hence the relation of convergence rate
Convergence Analysis of the Spectral Expansion of Stable Related Semigroups 793
−10
2
loge(N)
−20
e(N)
1.5
−30
1
−40
0.5
−50
−60 0
0 2 4 6 8 10 12 14 16 18 20 0 2 4 6 8 10
30
−20
25
log e(N)
−40 e(N)
20
−60
15
−80
10
−100 5
−120 0
0 5 10 15 20 25 30 35 40 0 2 4 6 8 10
−20 2.5
log e(N)
−40 2
e(N)
−60 1.5
−80 1
−100 0.5
−120 0
0 5 10 15 20 25 30 35 40 0 2 4 6 8 10
−12
0.8
log (t)
−14
(t)
0.6
−16
0.4
−18
0.2
−20
−22 0
1 2 3 4 5 6 7 8 9 10 1 2 3 4 5 6
t t
(t)
−26 0.6
−28
0.4
−30
0.2
−32
−34 0
1 2 3 4 5 6 7 8 9 10 1 2 3 4 5 6
t t
The spectral expansion of G can be found in [7] and in this section, we only state
the speed of convergence to equilibrium as in the following theorem.
Theorem 2 Denoting T˛ D log.2˛1 1/, there exists a constant C˛ > 0 such
that for all f 2 L2 .e˛;ˇ / and t > T˛ ,
r
1
kGt f e˛;ˇ f ke˛;ˇ C˛ k f e˛;ˇ f ke˛;ˇ : (16)
e2.tT˛ / 1
..˛ 1/.m C ˇ/ C 1/ t
kGt pm e˛;ˇ pm ke˛;ˇ e kpm epm ke : (17)
mŠ
..˛ 1/ˇ C 1/
..˛1/.uCˇ1/C1/
..˛1/.uCˇ/C1/
, hence (16) follows from
[9, Theorem 1.9 (3b)]. Moreover, as in the previous case, G also intertwins with the
classical Laguerre semigroup Q via an intertwining kernel denoted by ˛;ˇ , i.e. we
have Gt ˛;ˇ f D ˛;ˇ Qt f for all f 2 L2 .e/. Furthermore, by [7, Proposition 3.2] and
its proof, we have for all m 2 N,
mŠ
..˛ 1/ˇ C 1/
˛;ˇ pm .x/ D pm .x/:
..˛ 1/.m C ˇ/ C 1/
..˛1/.mCˇ/C1/
Hence 1
˛;ˇ pm .x/ D mŠ
..˛1/ˇC1/ pm .x/ and by [9, Theorem 1.9(3a)], we have
..˛ 1/.m C ˇ/ C 1/ t
kGt pm e˛;ˇ pm ke˛;ˇ et k1 1
˛;ˇ pm e˛;ˇ pm ke D e kpm epm ke :
mŠ
..˛ 1/ˇ C 1/
32 5
log (t)
30 4
(t)
28 3
26 2
24 1
22 0
1 2 3 4 5 6 7 8 9 10 1 2 3 4 5 6
t t
Fig. 6 Invariance error plots for m D 20; .˛; ˇ/ D .1:2; 4/; .1:5; 1/; .1:8; 0/
86 2
84
(t)
1.5
82
1
80
0.5
78
76 0
1 2 3 4 5 6 7 8 9 10 1 2 3 4 5 6
t t
Fig. 7 Invariance error plots for m D 40; .˛; ˇ/ D .1:2; 4/; .1:5; 1/; .1:8; 0/
Acknowledgements The authors would like to thank an anonymous referee for insightful
suggestions which improved an earlier version of the paper.
References
1. Bertoin, J., Yor, M.: On the entire moments of self-similar Markov processes and exponential
functionals of Lévy processes. In: Annales de la faculté des sciences de Toulouse 6e série, tome
11, pp. 33–45 (2002)
2. Caballero, M.E., Chaumont, L.: Conditioned stable Lévy processes and the Lamperti represen-
tation. J. Appl. Probab. 43(4), 967–983 (2006)
3. Govorun, E.N., Ivanov, V.A., Khokhlov, A.R., Khalatur, P.G., Borovinsky, A.L., Grosberg,
A.Y.: Primary sequences of proteinlike copolymers: Lévy–flight-type long-range correlations.
Phys. Rev. E 64, 040903–040903-4 (2001)
4. Kolmogorov, A.N.: Dissipation of energy in isotropic turbulence. Dokl. Akad. Nauk SSSR 32,
19–21 (1941)
5. Lamperti, J.: Semi-stable Markov processes. I. In: z. Wahrscheinlichkeitstheorie verw. Geb. 22,
pp. 205–225. Springer (1972)
Convergence Analysis of the Spectral Expansion of Stable Related Semigroups 797
6. Posadas, A., Morales, J., Vidal, F., Sotolongo-Costa, O., Antoranz, J.C.: Continuous time
random walks and South Spain seismic series. J. Seismol. 6, 61–67 (2002)
7. Patie, P., Savov, M.: Cauchy problem of the non-self-adjoint Gauss-Laguerre semigroups and
uniform bounds of generalized Laguerre polynomials (2013, Submitted)
8. Patie, P., Simon, T.: Intertwining certain fractional operators. Potent. Anal. 36, 569–587 (2012)
9. Patie, P., Savov, M.: Spectral expansions of non-self-adjoint generalized Laguerre semigroups
(2015, Submitted)
10. Yang, H., Zhang, L.: Spectrally negative Lévy processes with applications in risk theory. Adv.
Appl. Prob. 33, 281–291 (2001)
Index
Derivative based global sensitivity measures, Error control, 460–462, 465, 467
194 Escape velocity, 163
Detailed chemical kinetic, 89, 93 Escherichia coli, 245
DGM, 481 ESI-CyDesign, 722
Differential algebraic system, 641, 643 Euler method, 556
Differential-algebraic equations (DAEs), 461, Euler-Bernouli, 101
763 Eulerian approach, 280
dummy derivatives, 750 Eutrophication, 277
dynamic state selection, 755 Evolutionary variational inequality problems,
hidden constraints, 749 541
numerical integration of
, 749 Exponential, 521
numerical integration of
with Exponential stability, 355, 368
QUALIDAES, 757 Extended BACOLI, 447, 448, 452–456
regularization of
, 749
structural index, 751
Differentiation index, 665 FDE, 153
Direct cover condition, 430 Feedback control, 725
Discontinuous Galerkin, 435 Fekete point sets, 641, 642, 646, 647
Discrete Boltzmann equation (DBE), 470 Finite difference scheme, 18
Discrete and continuous time difference explicit, 18
equations, 629 implicit, 18
Discrete logarithmic energy, 642, 646 Fishery, 342, 345, 347
Disease elimination, 256 Fitting model, 588
Disease intervention strategies, 256 Flame, 89–98
Dissipative, 125 Flow conditions, 5
Dual-Rotor, 493 Food-borne illness, 245
Dummy derivative, 665–667, 669, 719 Fortran, 493
scheme, 719 Forward contract, 561
universal, 667, 669, 674 Found vector, 718
Dummy derivatives Fourier spectrum, 40
for differential-algebraic equations, 750 Fox function, 17
regularization of differential-algebraic Fractals, 609
equations via
, 753 Fractional Brownian motion, 571
Dynamic feedback controller, 121 Fractional calculus, 15
Dynamic friction, 153, 161 Fréchet space, 703
Dynamic hedge ratio, 566 Free Vortex, 493
Dynamic models, 224 FRPM, 691
Dynamic state selection for differential- Fuel-injector, 89, 96, 97
algebraic equations, 755 Functional differential equation, 153
Functional representation of a discrete set, 689
Eigenvalues, 123
Electrophysiology, 447, 448 Galois group, 621
Elliptic PDEs, 113 Gas phase, 280
˙-method, 713 Gaussian collocation, 459–461
standard solution scheme, 715 Gaussian interest rate model, 551
system Jacobian, 713 Geography, 241
Entrainment, 153 Geometric configurations, 279
Environmental Monitoring, 233 Geometrically complex, 469
EPCA, 367 Geometry of similar motions of Hess tops, 54
EPDCOL, 460 Global relative sensitivity, 195
Epidemic model, 256 Globally exponentially stable, 778
Equilibrium, 291, 292 Global solution on a sphere, 692
Equivalent martingale measure, 552 GPR (Gain per Resource), 600
802 Index