Validating an A Priori Enclosure Using High-Order Taylor ... - CiteSeerX

6 downloads 0 Views 181KB Size Report
Abstract. We use Taylor series plus an enclosure of the remainder term to validate the existence of a unique solution for initial value problems in ordinary di ...
Validating an A Priori Enclosure Using High-Order Taylor Series George F. Corliss and Robert Rihm Abstract

We use Taylor series plus an enclosure of the remainder term to validate the existence of a unique solution for initial value problems in ordinary di erential equations and to compute a coarse enclosure of that solution. The signi cance of this result is its application to Lohner's AWA algorithm for validated solutions, not to the theory of ordinary di erential equations. By using high-order Taylor series in Lohner's Algorithm I, we are able to validate the solution over much longer time steps than is done in the current AWA code. For Lohner's enclosure by polynomials, the enclosures are expensive to compute, but it is easy to check for enclosure. For our enclosure by Taylor series, the enclosures are free because they are already being computed, but checking for enclosure requires 2  n polynomial root ndings. Work is continuing on an implementation that will allow direct computational comparisons of the e ectiveness of the two methods.

Keywords: ordinary di erential equations, Lohner's algorithm, validated computation, Taylor series, enclosure methods.

0 Introduction The AWA (Anfangswertaufgabe) program by Rudolf Lohner [4, 5, 6, 7, 8] computes an enclosure of the solution of an initial value problem (IVP) in ordinary di erential equations (ODE) u0 = f (u); u(t0 ) = u0; (1) where we only know an interval enclosure [u0] of the vector u0 in general. Without loss of generality, Lohner assumes the system is autonomous only to simplify the proofs. We assume that f is at least p ? 1 times continuously di erentiable in a domain D with [u0]  D  IR , p  2. Then there is a unique at least p times continuously di erentiable solution u(t) in a neighborhood of t0. AWA is a single-step method. At each integration time step, AWA applies two algorithms: n

Algorithm I: (Existence and enclosure) Find a step size h and a coarse enclosure interval [u ]  D such that for t 2 [t ] := [t ; t + h], the solution u(t) exists and satis es u(t) 2 [u ]. 0

0

0

0

0

2

George F. Corliss and Robert Rihm

Algorithm II: (Tightening) Compute a tight enclosure for u(t) at t = t := t + h. 1

0

Throughout this paper, we use the term \validation" to mean \prove existence of u(t) for some t and nd a coarse enclosure [u0]". The eciency of AWA has been limited by the Euler step size enforced by Algorithm I as used in the current program. We show that Taylor series plus an enclosure of the remainder term can be used not only in Algorithm II to tighten the enclosure, but also in Algorithm I for the validation step. The consequence of this result for AWA is that Algorithm I can validate the existence of the unique solution over time steps appropriate for high-order methods employed for tightening during Algorithm II. The basic idea of AWA is to enclose the Taylor coecients and the remainder term of the solution. It goes back to Moore who presented his method in 1965 (see [10, 11]). The Taylor coecients are computed using recurrence relations derived from the ODE: f (0) (u) := f (u); (u)0 := u;   ( ?1) ( ) (2) f (u) := @f@u  f (u) ; i = 1; 2; : : :; p ? 1 ; (u) := 1i f ( ?1) (u); i = 1; 2; : : :; p : The recurrences given by Equation (2) are not as intimidating as they might appear; this is just an expression of the computation of the Taylor coecients for the solution. They can be evaluated by using automatic di erentiation (see e.g. [12]). If we begin the recurrences given by Equation (2) with the initial value u0 and compute in exact arithmetic, we get the Taylor coecients (u0 ) for the solution expanded at t = t0 . If we begin the recurrences given by Equation (2) with an interval vector [u0] and compute in rounded interval arithmetic, then we get enclosures ([u0]) of the Taylor coecients for all solutions starting from u0 2 [u0]. We can also begin with a coarse interval [u0] and compute the interval vectors ([u0]) . Then (bt ? t0 ) ([u0]) contains the remainder of the p ? 1st degree Taylor polynomial of u(bt), if u(t) 2 [u0](t) for all t 2 [t0 ; bt]. We emphasize that the computation of these values does not pre-suppose the existence of a solution. We are just computing sequences of numbers. If we cannot compute any of these values, then we are not able to proceed with validation. However, if we know an a priori enclosure [u0] of the solution on [t0], then i

i

i

i

i

i

i

p

u(t) 2 u(t) 2

p

?1 X

p

i=0 p 1

(t ? t0) (u0 ) + (t ? t0 ) ([u0]) =: T (t; u0; [u0]) or

? X i=0

i

p

i

p

p

(t ? t0) ([u0]) + (t ? t0 ) ([u ]) = T (t; [u0]; [u ]), resp. i

i

p

0

p

p

0

(3)

Validating an A Priori Enclosure

3

for t 2 [t0], if only the interval polynomial T stays in [u0]. Moore as well as Lohner use (modi cations of) this formula to tighten an a priori enclosure [u0] (see e.g. [13]). p

1 Current AWA Approach Validation and the computation of a tight enclosure are separate, though related, issues. This paper addresses only the issue of validation, the role of Lohner's Algorithm I. The techniques of his Algorithm II for tightening the enclosure are discussed in [4, 5, 6, 7, 8]. Algorithm I uses the following theorem for validation.

Theorem 1 ([6]) Let [u ]  D be an interval vector satisfying ?  [u ] := u + [0; h]  f [u ]  [u ] : 0

1

Then for t 2 [t0 ] = [t0; t0 + h].

0

0

0

u(t) 2 [u1] (and hence u(t) 2 [u0])

It follows directly from

Theorem 2 Let [u](t) and [v](t)  D be interval vector valued functions, and let each p times continuously di erentiable function v(t) 2 [v](t) satisfy Zt

(v(t)) := u0 + f (v( )) d 2 [u](t)  [v](t)

(4)

t0

for t 2 [t0 ]. Then the solution u of Equation (1) satis es

u(t) 2 [u](t) for t 2 [t0 ].

Proof: If (4) holds and we start a Picard-Lindelof iteration u (t) = (u ?1)(t)) = u0 + (k )

Zt

(k

f (u( ?1) ( )) d ; k = 1; 2; : : : k

t0

with a p times di erentiable function u(0) (t) 2 [v](t), then every successor is again p times di erentiable and lies in [u](t). However, the sequence of Picard iterates should leave this interval function if the solution did so.

4

George F. Corliss and Robert Rihm

It seems strange to let v(t) be p times di erentiable. However, this assumption is used in the following section. AWA nds a step size h and an interval [u0] such that ?  ?  [u0]  [u1] := [u0] + [0; h]f [u0]   [u0] ; (5) for all t 2 [t0 ] := [t0; t0 + h], and hence validates that the solution of Equation (1) exists on [t0] and is contained in [u0]. Figure 1 shows the a priori bound [u0] = [0:2; 0:5] and ([u0 ]) for the logistic equation u0 = u(1 ? u), u(0) = 0:3, on the interval t 2 [0; 0:6]. In this gure, ([u0])  [u0] in the interval t 2 [0; 0:5]. If we tighten [u0] = [0:29; 0:5], then ([u0])  [u0] in the larger interval t 2 [0; 0:563]. 0.6

0.5

0.4

u 0.3

0.2

0.1

0

0

0.1

0.2

0.3

0.4

0.5

0.6

t

Figure 1. A priori bounds with [u0] = [0:2; 0:5].

2 Lohner's Enclosure of u(p) The allowable step size h for which validation can be done using Theorem 1 as described in Section 1 is limited to a step appropriate for Euler's method, no matter how high the order of the method used during Algorithm II to tighten the enclosure. Stetter showed in [14] that for the problem u0 = Au, A 2 IR  , the step size h obtained by applying Theorem 1 may be multiplied by the degree p of the Taylor n

n

Validating an A Priori Enclosure

5

polynomial used in Algorithm II. Algorithm II yields a validated tight enclosure for t = t0 + ph because p!([u0]) = A [u0] contains the p-th derivative u( ) (t) for all t 2 [t0; t0 + ph], even though [u0] does not enclose the solution on this enlarged interval, in general. Lohner [9] suggests using coarse enclosures for higher derivatives also in the general case. Actually, he uses Theorem 2 instead of Theorem 1 and a special kind of interval polynomials for [v](t) instead of a constant coarse enclosure as in the current AWA program. Lohner guesses an enclosure [v0 ] of u( ) (t)=p! satisfying p

p

p

p

[v](t) :=

?1 X

p

(t ? t0) (u0 ) + (t ? t0) [v0 ]  D: i

p

i

i=0

The Picard-Lindelof operator  reproduces the Taylor coecients of the exact solution. There is an interval vector [v1 ] such that each p times di erentiable function v(t) 2 [v](t) satis es (v(t)) 2 [u](t) :=

p?1 X

(t ? t0 ) (u0) + (t ? t0 ) [v1 ]: i

i

p

i=0

If [v1]  [v0 ] holds, then we also have [u](t) 2 [v](t), and according to Theorem 2, u(t) 2 [u](t). To obtain [v1 ], one has to compute an enclosure of the remainder coecient of the p ? 2nd degree Taylor polynomial of f (v(t)) for all p times di erentiable functions v(t) 2 [v](t). It also contains the remainder coecient of the p ? 1st degree Taylor polynomial of (v(t)). For computing or enclosing these coecients on a computer, one has to apply polynomial interval machine arithmetic given by Eiermann [3], which provides the enclosure of a xed number of Taylor coecients of standard operations and standard functions on interval polynomialsas well as the enclosure of the respective remainders. The advantage of this idea of Lohner over the validation strategy discussed in Section 1 is that validation is possible for step sizes appropriate for a method of local order p.

Example 1 The solution of the initial value problem u0 = ?u; u(0) = 1 satis es u(t) = e? 2 [0; 1] for t  0. However, the application of Theorem 1 for [u ] = [0; 1] requires a step size  1 since u + [0; h]f ([u ])  [u ] , 1 + [0; h](?[0; 1])  [0; 1] , 0  h  1: t

0

0

0

0

6

George F. Corliss and Robert Rihm

However, Lohner's approach yields validation for much longer steps. If we choose

p = 6 and [v0 ] = [0; 1], we get

3 2 t4 ? t5 + t6 [0; 1]; [v](t) = 1 ? t + t2 ? t6 + 24 120 720 2 3 t4 + t5 [1 ? h ; 1]; and f ([v](t)) = ?[v](t)  ?1 + t ? t2 + t6 ? 24 120 6 2 3 t4 ? t5 + t6 [1 ? h ; 1] [u](t) = ([v](t)) = 1 ? t + t2 ? t6 + 24 120 720 6 for t 2 [t0 ; t0 + h]. We have [1 ? h6 ; 1]  [v0 ] = [0; 1] , 0  h  6 : Of course, we could enclose the sixth Taylor coecient of f instead of the fth one to obtain h = 7. However, in general we only assume f to be p ? 1 times di erentiable.

In this example, the coecients of f (v(t)) can easily be calculated. However, there is no implementation of the method for the general case yet, although Lohner has described [9] such an implementation using the Eiermann operators for interval polynomial arithmetic.

3 Validated Enclosure Using Taylor Series The use of Taylor series for validation, as well as for tight enclosure, is suggested by pictures such as those in Figure 2, which shows Taylor series enclosures for the solution of the Lorenz system. 20

18

16

14

12

10

8

6

4

2

0

0.01

0.02

0.03 t

0.04

0.05

Validating an A Priori Enclosure

7

30

20

10

0 0

0.01

0.02

0.03

0.04

0.05

0.03

0.04

0.05

t

-10

40

30

20

10

0

0

0.01

0.02 t

Figure 2. Taylor Series Enclosures for the Solution of the Lorenz System. As already mentioned, AWA uses the recurrence relations (2) and the formula (3) for computing a tight enclosure in Algorithm II after having validated a coarse enclosure [u0] for a step size h in Algorithm I. It would cause no additional costs if the Taylor expansion (3) could also be used in Algorithm I. The following theorem shows that this can actually be done.

Theorem 3 Let u 2 int([u ])  D. Let 0

0

[u](t) :=

?1 X

p

(t ? t0) (u0 ) + (t ? t0 ) ([u0])  [u0] ; i

p

i

p

(6)

i=0

for t 2 [t0 ]. Then

u(t) 2 [u](t) for t 2 [t0] :

Proof: It follows from our assumptions that Equation (1) has a solution u in some neighborhood of the point (t ; u ), for every u 2 [u ]. We must prove that that neighborhood includes all of [t ]. If (6) holds, then u(t) 2 [u](t) as long as u(t) 2 [u ]. 0

0

0

0

0

0

8

George F. Corliss and Robert Rihm

Assume that u(t) leaves [u](t) =: [u(t); u(t)], and hence [u0] at bt 2 int([t0]). Without loss of generality, we assume u (bt) = u (bt) = sup[u0] , for some j 2 f1; : : :; ng. From u( ) (t) 2 p!([u0]) , it follows that j

p

j

j

p

u0 (t) 2

?2 X

p

(t ? t0) (u0 ) + (t ? t0 ) ?1 p([u0]) ; i

p

i

p

i=0

and hence u0 (t)  u0 (t) on [t0; bt]. Therefore, u (bt) = u (bt) implies u (t) = u (t) for all t 2 [t0 ; bt]. If u is constant, then we have u0 = u (bt) = sup[u0] , which contradicts the assumption u0 2 int([u0]). Otherwise, u (bt) is an isolated maximum of the p-th degree polynomial u . The same holds for u (t), since this function is at least p times continuously di erentiable in [t0]. Hence, u(t) cannot leave [u](t) at bt. j

j

j

j

j

j

j

j

j

j

This approach avoids complicated calculations and nevertheless takes the order p into account. With p = 6, we can validate the coarse enclosure [0; 1] in Example 1 for h = 2:1 , compared with h = 1 for a constant bound enclosure and h = 6 using Lohner's polynomial enclosure.

Example 2 We want to validate the solution u(t) = 1=t of the initial value problem u0 = ?u ; u(1) = 1 2

in the interval [u0] = [0; 2]. For the constant bound enclosure, we have

[u1] := 1 + [0; h](?[0; 2]2) = [1 ? 4h; 1]  [u0] , h  1=4 as the maximal step size we can reach by applying Theorem 1. However, the approach of this section for p = 2 yields a longer step:

p

[u](t) = 1 ? (t ? 1) + [0; 8](t ? 1)2  [0; 2] , h  1 +16 33  0:42 :

4 Implications for AWA Using the results of the previous section, AWA Algorithm I is

Task 1: Approximate solution. Compute Taylor coecients of an approximate solution

ub(t) :=

?1 X

p

(t ? t0) (u0 ) i

i

i=0

from recurrence relation (2). In practice, we must compute (u0) using rounded interval arithmetic to capture any round-o errors. The work of Task 1 is already being done in AWA Algorithm II. i

Validating an A Priori Enclosure

9

Task 2: Guess a step h. Use heuristics based on the radius of convergence [1] of the

truncated series for ub or on previous steps sizes. Task 3: Guess a constant enclosure [u0]. Bound the range of ub([t0 ; t0 + h]), and in ate it a little. Task 4: Compute the remainder terms ([u0]) , for i = 0; : : :; p from the recurrence relation (2). The work of Task 4 is already being done in AWA Algorithm II. Task 5: Compute stepsize for validation. The stepsize is the point nearest to t0 (and in [t0]) at which i

[u](t) :=

p?1 X

(t ? t0 ) (u0) + (t ? t0) ([u0]) i

p

i

p

i=0

leaves [u0]. This requires 2  n polynomial root ndings. For each polynomial root nding problem, it is sucient to compute only relatively coarse lower bounds for the smallest real root in the interval (t0 ; t0 + h], so a few iterations of a simpli ed interval Newton method should suce.

Remark. Variable order. We must compute ([u ]) , : : :, ([u ]) ? in order to compute ([u ]) . Hence, it is relatively inexpensive to compute the step size in Task 5 for each order  p. The order used for validation in Algorithm I can be di erent from the order 0

0

0

0

p

1

p

used for tightening in Algorithm II. The information is readily available to make both Algorithms I and II fully variable order. Remark. Iteration. If Task 5 nds that [u](t)  [u0] on [t0], then we can repeat Tasks 4 and 5 with a larger h or else with [u0] = [u]([t0]). Remark. Optimization. Given guesses for h from Task 2 and for [u0] from Task 3, we compute in Task 5 the largest step for which we can validate existence and containment. Numerical experiments have shown [2] that a carefully chosen [u0] allows step sizes 10 times as long as step sizes corresponding to [u0] given by reasonable heuristics. That suggests viewing Algorithm I as an optimization problem: Maximize step size h by varying guessed h and [u0] subject to [u](t) :=

?1 X

p

(t ? t0 ) (u0) + (t ? t0) ([u0])  [u0] i

i

p

p

i=0

Remark. E ectiveness. Either Lohner's enclosure by polynomials or our enclosure by Taylor series is signi cantly more expensive than Picard-Lindelof iteration of constant bounds currently used by AWA. However, AWA Algorithm II involves the solution of an ODE system of dimension n  n, so almost any e ort we expend in Algorithm I that allows AWA to take longer steps improves the overall eciency of AWA.

10

George F. Corliss and Robert Rihm

Remark. Which is better? For Lohner's enclosure by polynomials, the enclosures

are expensive to compute, but it is easy to check for enclosure. For our enclosure by Taylor series, the enclosures are free because they are already being computed, but checking for enclosure requires 2  n polynomial root ndings. Work is continuing on an implementation that will allow direct computational comparisons of the e ectiveness of the two methods.

Acknowledgments We thank the anonymous referee for helpful suggestions. The work of Corliss was supported in part by National Science Foundation Grant No. DMS{9413525 and in part by SUN Academic Equipment Grant No. EDUD{US{940208.

References [1] Y. F. Chang and G. Corliss, Solving Ordinary Di erential Equations Using Taylor Series, ACM Trans. Math. Software, 8(1982), 114{144. [2] G. Corliss, Validating an A Priori Enclosure Using High-Order Taylor Series, presented at SCAN '95, Wuppertal, 1995. [3] M. Ch. Eiermann, Adaptive Berechnung von Integraltransformationen mit Fehlerschranken, PhD thesis, Universitat Freiburg, 1989. [4] R. J. Lohner, Anfangswertaufgaben im IR mit kompakten Mengen fur Anfangswerte und Parameter, Diplomarbeit, Inst. f. Angew. Math., Universitat Karlsruhe, 1978. n

[5] R. J. Lohner, Enclosing the Solutions of Ordinary Initial and Boundary Value Problems, in Computer Arithmetic: Scienti c Computation and Programming Languages, E. W. Kaucher, U. Kulisch, and C. Ullrich, eds., Wiley-Teubner Series in Computer Science, Stuttgart, 1987, pp. 255{286. [6] R. J. Lohner, Einschlieung der Losung gewohnlicher Anfangs{ und Randwertaufgaben und Anwendungen, PhD thesis, Universitat Karlsruhe, 1988. [7] R. J. Lohner, Interval Arithmetic in Staggered Correction Format, in Scienti c Computing with Automatic Result Veri cation, E. Adams and U. Kulisch, eds., Academic Press, San Diego, 1993. [8] R. J. Lohner, On Step Size and Order Control in the Veri ed Solution of Ordinary Initial Value Problems, presented at SCAN '93, September 1993, Vienna.

Validating an A Priori Enclosure

11

[9] R. J. Lohner, Step Size and Order Control in the Veri ed Solution of IVP with ODE's, presented at the SciCADE '95 International Conference on Scienti c Computation and Di erential Equations, Stanford, Calif., March 28 { April 1, 1995. [10] R. E. Moore, The Automatic Analysis and Control of Error in Digital Computation Based on the Use of Interval Numbers, in Error in Digital Computation, Vol. I, L. B. Rall, ed., John Wiley and Sons, New York, 1965, pp. 61{130. [11] R. E. Moore, Interval Analysis, Prentice-Hall, Englewood Cli s, N.J., 1966. [12] L. B. Rall, Automatic Di erentiation: Techniques and Applications, vol. 120 of Lecture Notes in Computer Science, Springer Verlag, Berlin, 1981. [13] R. Rihm, Interval Methods for Initial Value Problems in ODEs, in Topics in Validated Computations, J. Herzberger, ed., Elsevier Science B.V., Amsterdam, 1994, pp. 173{207. [14] H. J. Stetter, Validated Solution of Initial Value Problems for ODE, in Computer Arithmetic and Self-Validating Numerical Methods Ch. Ullrich, ed., Academic Press, San Diego, 1990, pp. 171{186.

Addresses: G.F. Corliss, Marquette University, Department of Mathematics, Statistics, and

Computer Science, P.O. Box 1881 Milwaukee, Wisconsin 53201-1881, USA. [email protected] R. Rihm, Universitat Karlsruhe, Institut fur Angewandte Mathematik, 76128 Karlsruhe, Germany. [email protected]

Suggest Documents