
Due to European Union (EU) oil sanctions, tanker shipping companies need to redeploy their tankers by moving tankers between ship routes with the consideration of flag states of tankers, but the literature lacks quantitative methods for this problem. To fill this research gap, this paper studies an integrated problem of fleet deployment, fleet repositioning, round trip completion, and speed optimization with the consideration of flag states of tankers. The problem is formulated as a nonlinear integer programming model to minimize the total cost, including the fleet repositioning cost, the mismatch cost, and the fuel cost, during the planning period while satisfying the total crude oil transportation demand of each voyage and the minimum shipping frequency. Some linearization methods are used to transform the nonlinear model to a linear one which can be directly solved by Gurobi. The average solving time required for 17 computational instances is 4.5 minutes, which validates the effectiveness of the proposed model. Sensitivity analyses, including the influences of the unit fuel price, the total crude oil transportation demand, the mismatch cost of completing a round trip by a deployed tanker, and the repositioning cost for each deployed tanker, on operations decisions, are conducted to obtain managerial insights.
Citation: Yiwei Wu, Yao Lu, Shuaian Wang, Lu Zhen. New challenges in fleet deployment considering EU oil sanctions[J]. Electronic Research Archive, 2023, 31(8): 4507-4529. doi: 10.3934/era.2023230
[1] | Kexin Li, Hu Chen, Shusen Xie . Error estimate of L1-ADI scheme for two-dimensional multi-term time fractional diffusion equation. Networks and Heterogeneous Media, 2023, 18(4): 1454-1470. doi: 10.3934/nhm.2023064 |
[2] | Farman Ali Shah, Kamran, Dania Santina, Nabil Mlaiki, Salma Aljawi . Application of a hybrid pseudospectral method to a new two-dimensional multi-term mixed sub-diffusion and wave-diffusion equation of fractional order. Networks and Heterogeneous Media, 2024, 19(1): 44-85. doi: 10.3934/nhm.2024003 |
[3] | Feiyang Peng, Yanbin Tang . Inverse problem of determining diffusion matrix between different structures for time fractional diffusion equation. Networks and Heterogeneous Media, 2024, 19(1): 291-304. doi: 10.3934/nhm.2024013 |
[4] | Diandian Huang, Xin Huang, Tingting Qin, Yongtao Zhou . A transformed $ L1 $ Legendre-Galerkin spectral method for time fractional Fokker-Planck equations. Networks and Heterogeneous Media, 2023, 18(2): 799-812. doi: 10.3934/nhm.2023034 |
[5] | Patrick Henning, Mario Ohlberger . The heterogeneous multiscale finite element method for advection-diffusion problems with rapidly oscillating coefficients and large expected drift. Networks and Heterogeneous Media, 2010, 5(4): 711-744. doi: 10.3934/nhm.2010.5.711 |
[6] | Leqiang Zou, Yanzi Zhang . Efficient numerical schemes for variable-order mobile-immobile advection-dispersion equation. Networks and Heterogeneous Media, 2025, 20(2): 387-405. doi: 10.3934/nhm.2025018 |
[7] | Yinlin Ye, Hongtao Fan, Yajing Li, Ao Huang, Weiheng He . An artificial neural network approach for a class of time-fractional diffusion and diffusion-wave equations. Networks and Heterogeneous Media, 2023, 18(3): 1083-1104. doi: 10.3934/nhm.2023047 |
[8] | Caihong Gu, Yanbin Tang . Global solution to the Cauchy problem of fractional drift diffusion system with power-law nonlinearity. Networks and Heterogeneous Media, 2023, 18(1): 109-139. doi: 10.3934/nhm.2023005 |
[9] | Fermín S. V. Bazán, Luciano Bedin, Mansur I. Ismailov, Leonardo S. Borges . Inverse time-dependent source problem for the heat equation with a nonlocal Wentzell-Neumann boundary condition. Networks and Heterogeneous Media, 2023, 18(4): 1747-1771. doi: 10.3934/nhm.2023076 |
[10] | Panpan Xu, Yongbin Ge, Lin Zhang . High-order finite difference approximation of the Keller-Segel model with additional self- and cross-diffusion terms and a logistic source. Networks and Heterogeneous Media, 2023, 18(4): 1471-1492. doi: 10.3934/nhm.2023065 |
Due to European Union (EU) oil sanctions, tanker shipping companies need to redeploy their tankers by moving tankers between ship routes with the consideration of flag states of tankers, but the literature lacks quantitative methods for this problem. To fill this research gap, this paper studies an integrated problem of fleet deployment, fleet repositioning, round trip completion, and speed optimization with the consideration of flag states of tankers. The problem is formulated as a nonlinear integer programming model to minimize the total cost, including the fleet repositioning cost, the mismatch cost, and the fuel cost, during the planning period while satisfying the total crude oil transportation demand of each voyage and the minimum shipping frequency. Some linearization methods are used to transform the nonlinear model to a linear one which can be directly solved by Gurobi. The average solving time required for 17 computational instances is 4.5 minutes, which validates the effectiveness of the proposed model. Sensitivity analyses, including the influences of the unit fuel price, the total crude oil transportation demand, the mismatch cost of completing a round trip by a deployed tanker, and the repositioning cost for each deployed tanker, on operations decisions, are conducted to obtain managerial insights.
Let Ω be a bounded domain in Rd with sufficient smooth boundary ∂Ω. We consider the following initial boundary value problem (IBVP) for the anomalous diffusion model with multi-term time-fractional derivatives
{s∑j=1qj∂αj0+u(x,t)−(Lu)(x,t)=f(x)p(t),(x,t)∈Ω×I,u(x,0)=0,x∈Ω,u(x,t)=0,(x,t)∈∂Ω×I, | (1.1) |
where I=(0,T) with T>0 be fixed and ∂αj0+ is the Caputo fractional derivative defined by
∂αj0+u(x,t)=1Γ(1−αj)∫t0∂u(x,s)∂sds(t−s)αj,0<αj<1. |
For a fixed positive integer s, the orders α=(α1,...,αs) and the coefficients q=(q1,...,qs) are restricted in the admissible sets
B:={(α1,...,αs)∈Rs;¯α≥α1>α2>⋯>αs≥α_}, | (1.2) |
Q:={(q1,...,qs)∈Rs;q1=1,qj∈[q_,¯q],(j=2,...,s)}, | (1.3) |
with fixed 0<α_<¯α<1 and 0<q_<¯q.
−L is a symmetric uniformly elliptic operator defined on D(−L)=H2(Ω)∩H10(Ω) given by
Lu(x,t)=d∑i=1∂∂xi(d∑j=1aij(x)∂∂xju(x,t))+c(x)u(x,t),x∈Ω, |
in which the coefficients satisfy
aij=aji,1≤i,j≤d,aij∈C1(ˉΩ),μd∑i=1ξ2i≤d∑i,j=1aij(x)ξiξj,x∈ˉΩ,ξ=(ξ1,…,ξd)∈Rd,foraconstantμ>0,c(x)≤0,x∈ˉΩ,c(x)∈C(ˉΩ). |
If the number of fractional derivatives s, the orders α and its coefficients q, elliptic operator L and source functions p(t),f(x) are given appropriately, then IBVP Eq (1.1) is a direct problem. Here the spatial source term f(x) is unknown, so the inverse problem in the paper is to determine the spatial source term f(x) based on problem Eq (1.1) and an additional terminal data
u(x,T)=g(x),x∈Ω. | (1.4) |
Since the measurement is noise-contaminated inevitably, we denote the noisy measurement of g as gδ(x) satisfying
‖gδ(x)−g(x)‖≤δ. | (1.5) |
It is well known that the time-fractional diffusion equations (TFDEs) have a wide range of applications in physics, chemistry and other aspects [1,2,3,4,5]. The most representative is continuous time random walk problem in general non-Markovian processes. However, with the increasing demand on the accuracy of the problem, the single-time fractional diffusion equation gradually failed to meet the needs of the problem, so Schumer et al. [6] proposed using the multi-term time-fractional diffusion equation (MTFDE) to increase the accuracy of the model. MTFDE is not only a useful tool for describing the behavior of anomalous diffusion phenomena in highly heterogeneous aquifers and complex viscoelastic materials [7], but can also be applied indirectly in the numerical solution of distributed-order fractional differential equations [8].
There are many studies on the direct problem for IBVP Eq (1.1) in recent years such as some uniqueness and existence results [9], the maximum principle [10], and analytic solutions [11,12]. In terms of numerical work, there are also some papers on the numerical solutions by finite difference methods [13,14,15] and by finite element methods [16,17,18,19].
Due to the spectral method needs fewer grid points to obtain highly accurate solution. Therefore, the spectral method is more suitable for discrete MTFDE because of its huge computations. The study of the spectral method can be divided into two categories in MTFDE. On the one hand, the time fractional derivative is discreted by finite difference method and spectral method is applied for the space variable. Guo et al. [20] studied the numerical approximation of distributed-order time-space fractional reaction-diffusion equation. Jiang et al. [21] considered a Legendre spectral method on graded meshes for handling MTFDE with non-smooth solutions in two-dimensional case. Liu et al. [22] applied an alternating direction implicit Legendre spectral method to handle the multi-term time fractional Oldroyd-B fluid type diffusion equation in the two-dimensional case. On the other hand, the spectral method is applied both in space and in time. Zheng et al. [23] considered a high order numerical method for handling MTFDE. Zaky [24] applied a Legendre spectral tau method to handle MTFDE. However, we are interested not only in obtaining a numerical solution with high precision by using spectral method, but also in determining the spatial source term in an inverse problem of the MTFDE.
As far as we know, the theory as well as numerical methods of inverse source problems for single term (i.e, . s=1) case in Eq (1.1) are relatively abundant. Zhang et al. [25] testified a uniqueness result to inverse the spatial source term in one-dimensional case by using one-point Cauchy data and proposed an efficient numerical method. Wei et al. [26] studied to identify a spatial source term in a multi-dimensional time-fractional diffusion equation from boundary measured data. The uniqueness for the inverse source problem is proved by the Laplace transformation method. Yan et al. [27] studied to identify a spatial source term in a multi-dimensional time-fractional diffusion-wave equation from a part of noisy boundary data. The uniqueness of inverse spatial source term problem is proved by the Titchmarsh convolution theorem and the Duhamel principle. Sun et al. [28] devoted to recovering simultaneously the fractional order and the space-dependent source term from partial Cauchy's boundary data in a multi-dimensional time-fractional diffusion equation. Recently, Yeganeh et al. [29] came up with an interesting idea. They used a method based on a finite difference scheme in time and a local discontinuous Galerkin method in space to determine a spatial source term in a time-fractional diffusion equation. This has not been seen in previous studies.
For a multi-term case, however, research results on inverse source problem are relatively few at present. Jiang et al. [30] built a weak unique continuation property for time-fractional diffusion-advection equations, and they considered an inverse problem on determining identifying the spatial source term by interior measurements. Li et al. [31] considered an inverse problem of recovering time-dependent source term from the Cauchy data in a MTFDE, and they applied the conjugate gradient method to identify the approximate source term. Recently, Sun et al. [32] investigated an inverse the spatial source term in MTFDE with nohomogeneous boundary condition from partially disturbed boundary data. They proposed the Levenberg-Marquardt regularization method to compute an inverse source problem. In addition, simultaneous inversion of source term and other terms has been studied. For instance, Malik et al. [33] studied an inverse problem of identifying a time-dependent source term along with diffusion/temperature concentration from a non-local over-specified condition for a space-time fractional diffusion equation. Sun et al. [34] considered a nonlinear inverse problem for simultaneously recovering the potential function and the fractional orders in a MTFDE from the noisy boundary Cauchy data in the one-dimensional case. For other inverse source problems, we can refer to [35,36,37]. Nevertheless, to the best knowledge of the authors, no one has used the spectral method to determine a spatial source term in an inverse problem of MTFDE.
In this paper, we will focus on two aspect research on our proposed model Eq (1.1). One is the study on the direct problem. The theoretical analysis and the numerical scheme of the Galerkin spectral method are proposed to solve the IBVP Eq (1.1). On the other hand, we use the Galerkin spectral method to investigate an inverse spatial source term problem in a MTFDE from a noisy final data in a general bounded domain. In the propose method, multi-term Caputo fractional derivatives are discretized by the L1-formula and the Galerkin spectral method is applied for the space variable. At the same time, the comparison between the Galerkin spectral method and the finite difference method is added in this paper. Finally, we not only prove the validity of the Galerkin spectral method in the application of MTFDE, but also verify the superiority of the Galerkin spectral method in forward and inverse problems by comparing the numerical results with the finite difference method.
The remainder of this paper is organized as follows. Some preliminaries are presented in Section 2. The detailed convergence analysis of the presented method is shown in Section 3. Uniqueness and ill-posedness for the inverse problem are showed in Section 4. We present the Galerkin spectral method and the finite difference method algorithm in Section 5. Numerical results for four examples are investigated in Section 6. Finally, we give a conclusion in Section 7.
We firstly introduce some preliminaries as follows in this section.
Definition 2.1. The multinomial Mittag-Leffler function is defined by (see [9,38])
E(θ1,⋯,θs),θ0(z1,⋯,zs):=∞∑k=0∑k1+⋯+ks=k(k;k1,⋯,ks)∏sj=1zkjjΓ(θ0+∑sj=1θjkj), |
where θ0,θj∈R, and zj∈C (j=1,⋯,s), and (k;k1,⋯,ks) denotes the multinomial coefficient
(k;k1,⋯,ks):=k!k1!⋯ks!withk=s∑j=1kj, |
where kj(j=1,⋯,s) are non-negative integers.
For the convenience of the later, if the orders α=(α1,...,αs) and its coefficients q=(q1,...,qs) satisfy Eq (1.2) and Eq (1.3), then we adopt the abbreviation
E(n)α′,β(t):=E(α1,α1−α2,⋯,α1−αs),β(−λntα1,−q2tα1−α2,⋯,−qstα1−αs),t>0,n=1,2,…, |
where α′=(α1,α1−α2,⋯,α1−αs) and λn denotes the n-th eigenvalues of elliptic operator −L with the homogeneous Dirichlet boundary condition.
Lemma 2.2. ([9]) Let 0<αs<αs−1<⋯<α1<1. Then,
ddt{tα1E(n)α′,1+α1(t)}=tα1−1E(n)α′,α1(t),t>0. |
Lemma 2.3. ([9,39]) Let 0<αs<αs−1<⋯<α1<1. Then the function tα1−1E(n)α′,α1(t) is positive for t>0.
Lemma 2.4. ([40]) Let 0<αs<αs−1<⋯<α1<1. Then
|1−λntα1E(n)α′,α1+1(t)|≤s∑j=2M(1+qjtα1−αj)1+λntα1,t>0,n=1,2,…, |
where M ia a positive constant.
Proposition 2.5. Let 0<αs<αs−1<⋯<α1<1. Then we have E(n)α′,1+α1(t)>0.
Proof. By Lemma 2.2 and 2.3, we know that
ddt{tα1E(n)α′,1+α1(t)}=tα1−1E(n)α′,α1(t)>0. |
Hence it is obvious E(n)α′,1+α1(t)>0.
Proposition 2.6. For λn>0 and 0<αs<αs−1<⋯<α1<1, we have 0<1−λntα1E(n)α′,1+α1(t)<1 for t>0. Moreover, 1−λntα1E(n)α′,1+α1(t) is a strictly decreasing function on t>0.
Proof. By Lemma 2.2 and 2.3, we have
ddt{1−λntα1E(n)α′,1+α1(t)}=−λntα1−1E(n)α′,α1(t)<0. |
We notice that 1−λntα1E(n)α′,1+α1(t) is a continuous function on t. Hence, we have limt→0(1−λntα1E(n)α′,1+α1(t))=1. By Lemma 2.4 we know limt→∞(1−λntα1E(n)α′,1+α1(t))=0. The proof is completed.
Lemma 2.7. For λn>0 and 0<αs<αs−1<⋯<α1<1, such that
0≤E(n)α′,1+α1(T)≤1Tα1λn. |
Proof. By Proposition 2.6, we know 0<E(n)α′,1+α1(T)<1λnTα1.
Lemma 2.8. Let k be a positive integer, Δt>0 and limk→∞kΔt=T. We have the following properties from the sequence defined by
ωk=s∑j=1qjΔt−αjΓ(2−αj)(k1−αj−(k−1)1−αj), | (2.1) |
where αj and qj are defined in equation Eq (1.1). Here we denote ω−1k equivalent to 1ωk.
(1) ωk is a decreasing sequence with respect to k;
(2) ω1>⋯>ωk>0 for each k;
(3) ω−1k is an increasing sequence with respect to k;
(4) limk→∞k−α1ω−1k=Δtα1q1(1−α1)Γ(2−α1)+s∑j=2qjTα1−αj(1−αj)Γ(2−αj).
Proof. First, let Φ(x)=ωx be a continuous function with respect to x, According to dΦ(x)dx<0, we know Φ(x) is decreasing function, then we have ωk is decreasing the sequence. And we can direct to check that ω1>⋯>ωk>0 for each k. In addition, we can easy to derive ω−1k is increasing function. Further, we have
limk→∞k−α1ω−1k=limk→∞k−α1q1Δt−α1Γ(2−α1)(k1−α1−(k−1)1−α1)+s∑j=2qjΔt−αjΓ(2−αj)(k1−αj−(k−1)1−αj)=:limk→∞1Ψ1k+Ψ2k, |
where
Ψ1k=q1Δt−α1Γ(2−α1)(k1−α1−(k−1)1−α1)kα1,Ψ2k=s∑j=2qjΔt−αjΓ(2−αj)(k1−αj−(k−1)1−αj)kα1. |
First we have
limk→∞Ψ1k=limk→∞q1Δt−α1Γ(2−α1)(1−(1−1k)1−α1)k1−α1kα1=limk→∞q1Δt−α1Γ(2−α1)limk→∞(1−1+(1−α1)1k+o(1k))k=q1(1−α1)Γ(2−α1)Δt−α1, |
where we use the Taylor's formula of (1−1/x)1−α1 in the second equation. Similarly, we have
limk→∞Ψ2k=limk→∞s∑j=2qjΔt−αjΓ(2−αj)(k1−αj−(k−1)1−αj)kα1=limk→∞s∑j=2qjΔt−αjΓ(2−αj)(k1−αj−(k−1)1−αj)kαjk−αjΔt−α1Δtα1kα1=limk→∞s∑j=2qj1Γ(2−αj)(1−(1−1k)1−αj)k(kΔt)−αj(kΔt)α1Δt−α1=s∑j=2qjTα1−αj(1−αj)Γ(2−αj)Δt−α1. |
For all these reasons, we arrive at
limk→∞k−α1ω−1k=Δtα1q1(1−α1)Γ(2−α1)+s∑j=2qjTα1−αj(1−αj)Γ(2−αj). | (2.2) |
This proof is complete.
In this section, we discuss semi-discretize and full discretize schemes of the problem Eq (1.1) in the one-dimensional case. First, let tn:=nΔt,n=0,1,⋯,N, where Δt:=TN (at leat satisfying Δt<1) is the time step. We can denote un an approximation to u(x,tn), and in order to convenience we write p(tn),f(x),a(x),c(x) is equal to pn,f,a,c, where f(x),p(tn) are the source terms of Eq (1.1), and a(x),c(x) come from the definition of the symmetric uniformly elliptic operator L. Then we introduce the time-fractional derivative is approximated by the L1 formula [41].
s∑j=1qj∂αj0+u(x,tn)=n∑k=1ωk(u(x,tn−k+1)−u(x,tn−k))+rnΔt, |
where ωk=s∑j=1qjΔt−αjΓ(2−αj)(k1−αj−(k−1)1−αj) and rnΔt is the truncation error with the estimate
rnΔt≤cuΔt2−α1+⋯+cuΔt2−αs≤c1Δt2−α1. |
Here c1 is a constant depending on u,aj and T.
In this paper, we use H1-norm defined by
‖ν‖H1(Ω)=(‖ν‖2L2(Ω)+1ω1‖dνdx‖2L2(Ω))12. |
where ω1 is defined in Lemma 2.8.
In order to establish the complete semi-discrete problem, we define the error term rn by
rn:=1ω1[n∑j=1ωj(u(x,tn−j+1)−u(x,tn−j))−s∑j=1qj∂αj0+u(x,tn)]. | (3.1) |
Then we have
|rn|=1ω1|rnΔt|≤c2Δt2−α1, | (3.2) |
where c2 is a constant depending on u,aj and T.
Using the first term on right hand side of Eq (3.1) as an approximation of s∑j=1qj∂αj0+u(x,tn) leads to the following finite difference scheme to Eq (1.1)
n∑k=1ωk(un−k+1−un−k)−(a∂un∂x)x−cun=fpn. | (3.3) |
Then we have
un−1ω1(a∂un∂x)x−1ω1cun=n−1∑k=1ωk−ωk+1ω1un−k+ωnω1u0+1ω1fpn. | (3.4) |
Multiply both sides by ν∈H10(Ω) and integrate over Ω and by Green formula. We can find un∈H10(Ω), such that
(un,ν)+1ω1(a∂un∂x,∂ν∂x)−1ω1(cun,ν)=n−1∑k=1ωk−ωk+1ω1(un−k,ν)+ωnω1(u0,ν)+1ω1(fpn,ν). | (3.5) |
For convenience and without loss of generality, we consider the case aij(x)≡1,c(x)=0. Stability of the scheme Eq (3.5) is given in the following result.
Theorem 3.1. The semi-discretized problem Eq (3.5) is unconditionally stable in sense that for all Δt>0, holds
‖un‖H1(Ω)≤‖u0‖L2(Ω)+1ω1n∑k=1pk‖f‖L2(Ω). |
Proof. we prove this theorem using induction. When n = 1, scheme Eq (3.5) has
(u1,ν)+1ω1(∂u1∂x,∂ν∂x)=(u0,ν)+1ω1(1∑k=1p1f,ν). |
Taking ν=u1 and Schwarz inequality, we have
‖u1‖H1(Ω)≤‖u0‖L2(Ω)+1ω11∑k=1pk‖f‖L2(Ω). | (3.6) |
Now for the following inequality to hold
‖uj‖H1(Ω)≤‖u0‖L2(Ω)+1ω1j∑k=1pk‖f‖L2(Ω),j=1,2,⋯,n−1. | (3.7) |
We must prove that ‖un‖H1(Ω)≤‖u0‖L2(Ω)+1ω1∑nk=1pk‖f‖L2(Ω). Taking ν=un in Eq (3.5) and by using Eq (3.7), we have
‖un‖H1(Ω)≤n−1∑k=1ωk−ωk+1ω1‖un−k‖L2(Ω)+ωnω1‖u0‖L2(Ω)+1ω1‖f‖L2(Ω)pn≤[n−1∑k=1ωk−ωk+1ω1+ωnω1][‖u0‖L2(Ω)+1ω1n−1∑k=1pk‖f‖L2(Ω)]+1ω1pn‖f‖L2(Ω). | (3.8) |
Hence, we have ‖un‖H1(Ω)≤‖u0‖L2(Ω)+1ω1∑nk=1pk‖f‖L2(Ω).
Now, we give the convergence estimate between the exact solution and the solution of the semi-discretized problem.
Theorem 3.2. Let u(x,t) be the exact solution of Eq (1.1), {un}Nn=0 be the numerical solution of semi-discretized Eq (3.5), and u(x,t0)=u0. Then there holds the following error estimates
‖u(x,tn)−un‖H1(Ω)≤c2ω1Tα1Δt2−α1q1(1−α1)Γ(2−α1)+∑sj=2qjTα1−αj(1−αj)Γ(2−αj), |
where c2 is a constant depending on u,aj and T.
Proof. We will verify that the following estimate
‖u(x,tj)−uj‖H1(Ω)≤c2ω1ω−1jΔt2−α1,j=1,2,⋯,N. | (3.9) |
Here, we will prove it by the mathematical induction, let ˆen=u(x,tn)−un. For j=1, we have, by combining Eq (1.1), Eq (3.5), Eq (3.1), the error equation
(ˆe1,ν)+1ω1(∂ˆe1∂x,∂ν∂x)=(ˆe0,ν)+(r1,ν)ν∈H10(Ω). | (3.10) |
Taking ν=ˆe1, we have
‖u(x,t1)−u1‖H1(Ω)≤c2ω1ω−11Δt2−α1. |
Hence, Eq (3.9) is proven for the case j = 1. Now, Suppose the inequality Eq (3.9) holds for all j=1,2,⋯,n−1. Then we need to prove that it holds also for j=n.
Similar to j=1, we have ν∈H10(Ω)
(ˆen,ν)+1ω1(∂ˆen∂x,∂ν∂x)=n−1∑k=1ωk−ωk+1ω1(ˆen−k,ν)+ωnω1(ˆe0,ν)+(rn,ν). | (3.11) |
Taking ν=ˆen, and using Eq (3.9). We have
‖ˆen‖H1(Ω)≤n−1∑k=1ωk−ωk+1ω1‖ˆen−k‖L2(Ω)+ωnω1‖ˆe0‖L2(Ω)+‖rn‖L2(Ω)≤[n−1∑k=1ωk−ωk+1ω1+ωnω1]c2ω1ω−1nΔt2−α1. |
Then we obtain
‖ˆen‖H1(Ω)≤c2ω1ω−1nΔt2−α1. |
The estimate Eq (3.9) is proved. Notice that limk→∞kΔt=T is clearly true. Then, we have
‖u(x,tn)−un‖H1(Ω)≤c2ω1ω−1nΔt2−α1=c2ω1n−α1ω−1nΔt−α1Tα1Δt2−α1. | (3.12) |
Then by Eq (3.12) and Lemma 2.8, we deduce that for sufficently large n, the assertion of the theorem is valid.
First, we set
VM={ν∈H10(Ω)|ν∈PM(Ω)}, |
as the space of polynomials of degree ≤M with respect to x. Let P be the orthogonal projection operator from H10(Ω) into VM. Then for all ψ∈H10(Ω), we have Pψ∈VM. Further, we have ∀νM∈VM such that
(Pψ,νM)+1ω1(∂Pψ∂x,∂νM∂x)=(ψ,νM)+1ω1(∂ψ∂x,∂νM∂x). | (3.13) |
This the orthogonal projection operator satisfy the inequality [42]
‖ψ−Pψ‖H1(Ω)≤cM1−m‖ψ‖Hm(Ω), | (3.14) |
where ψ∈Hm(Ω)∩H10(Ω),m≥1.
Now, we consider the Galerkin scheme as follow: find unM∈VM, such that for all νM∈VM
(unM,νM)+1ω1(∂unM∂x,∂νM∂x)=n−1∑k=1ωk−ωk+1ω1(un−kM,νM)+ωnω1(u0M,νM)+pnω1(fM,νM). | (3.15) |
Theorem 3.3. Let u(x,t)∈H1((0,T),Hm(Ω)∩H10(Ω)),m>1 be the exact solution of Eq (1.1), {unM}Nn=0 be the numerical solution of full discretization Eq (3.15), and u0M=Pu0. Then there holds the following error estimates
‖u(x,tn)−unM‖H1(Ω)≤ω1Tα1(c2Δt2−α1+cM1−m‖u‖L∞(Hm))q1(1−α1)Γ(2−α1)+∑sj=2qjTα1−αj(1−αj)Γ(2−αj), |
where c2 is a constant depending on u,aj,T, and ‖u‖L∞(Hm):=supt∈(0,T)‖u(x,t)‖Hm(Ω).
Proof. From Eq (1.1), Eq (3.1) satisfy ∀ν∈H10(Ω),
(u(x,tn),ν)+1ω1(∂u(x,tn)∂x,∂ν∂x)=n−1∑k=1ωk−ωk+1ω1(u(x,tn−k),ν)+ωnω1(u(x,t0),ν)+(rn,ν)+pnω1(f,ν). | (3.16) |
By projecting u(x,tn) in Pu(x,tn)∈VM, applying Eq (3.13), we obtain for all νM∈VM
(Pu(x,tn),νM)+1ω1(∂Pu(x,tn)∂x,∂νM∂x)=n−1∑k=1ωk−ωk+1ω1(u(x,tn−k),νM)+ωnω1(u(x,t0),νM)+(rn,νM)+pnω1(f,νM). | (3.17) |
Let ˆϵnM=Pu(x,tn)−unM,ϵnM=u(x,tn)−unM by subtracting Eq (3.15) from Eq (3.17), we have
(ˆϵnM,νM)+1ω1(∂ˆϵnM∂x,∂νM∂x)=n−1∑k=1ωk−ωk+1ω1(ϵn−kM,νM)+ωnω1(ϵ0M,νM)+(rn,νM) | (3.18) |
Taking νM=ˆϵnM in above equation and using the triangular inequality ‖ϵnM‖H1(Ω)≤‖ˆϵnM‖H1(Ω)+‖u(x,tn)−Pu(x,tn)‖H1(Ω), we obtain
‖ϵnM‖H1(Ω)≤n−1∑k=1ωk−ωk+1ω1‖ϵn−kM‖H1(Ω)+‖rn‖H1(Ω)+‖u(x,tn)−Pu(x,tn)‖H1(Ω)≤n−1∑k=1ωk−ωk+1ω1‖ϵn−kM‖H1(Ω)+c2Δt2−α1+cM1−m‖u(x,tn)‖Hm(Ω). | (3.19) |
Here, we use the mathematical induction, by Eq (3.19), we can easy to verify when case of n = 1.
‖ϵ1M‖H1(Ω)≤ω1ω−11(c2Δt2−α1+cM1−m‖u(x,t1)‖Hm(Ω)) | (3.20) |
Suppose we have proven
‖ϵjM‖H1(Ω)≤ω1ω−1j(c2Δt2−α1+cM1−m‖u(x,tj)‖Hm(Ω))j=1,2,⋯,n−1. | (3.21) |
And then we need prove ‖ϵnM‖H1(Ω)≤ω1ω−1n(c2Δt2−α1+cM1−m‖u(x,tn)‖Hm(Ω)) By Eq (3.19), Eq (3.21) we have
‖ϵnM‖H1(Ω)≤[n−1∑k=1ωk−ωk+1ω1+ωnω1]ω1ω−1n[c2Δt2−α1+cM1−m‖u(x,tn)‖Hm(Ω)]. | (3.22) |
Finally, by limk→∞kΔt=T and the last equality have
‖u(x,tn)−unM‖H1(Ω)=ω1ω−1nn−α1Δt−α1Tα1(c2Δt2−α1+cM1−m‖u‖L∞(Hm)). | (3.23) |
Then by Eq (3.23) and Lemma 2.8, we deduce that for sufficently large n, the assertion of the theorem is valid.
Now we give error estimates for semi-discrete and full discrete problems in the following result.
Theorem 3.4. Let {un}Nn=0∈Hm(Ω)∩H10(Ω),m>1 is solution of semi-discrete problem Eq (3.5), {unM}Nn=0 is the solution of full discrete problem Eq (3.15), and u0M=Pu0. Then we have
‖un−unM‖H1(Ω)≤cω1Tα1M1−mmax1≤j≤n‖uj‖Hm(Ω)q1(1−α1)Γ(2−α1)+∑sj=2qjTα1−αj(1−αj)Γ(2−αj), |
Proof. According to the definition of P, for solution un of semi-discrete, we have
(Pun,νM)+1ω1(∂Pun∂x,∂νM∂x)=n−1∑k=1ωk−ωk+1ω1(un−k,νM)+ωnω1(u0,νM)+pnω1(f,νM). | (3.24) |
Let ˆenM=Pun−unM,enM=un−unM, by subtracting Eq (3.15) from Eq (3.24), we have
(ˆenM,νM)+1ω1(∂ˆenM∂x,∂νM∂x)=n−1∑k=1ωk−ωk+1ω1(en−kM,νM)+ωnω1(e0M,νM). | (3.25) |
Taking νM=ˆenM in above equation and using the triangular inequality ‖enM‖H1(Ω)≤‖ˆenM‖H1(Ω)+‖un−Pun‖H1(Ω), we obtain
‖enM‖H1(Ω)≤n−1∑k=1ωk−ωk+1ω1‖en−kM‖H1(Ω)+‖un−Pun‖H1(Ω)≤n−1∑k=1ωk−ωk+1ω1‖ϵn−kM‖H1(Ω)+cM1−m‖un‖Hm(Ω). | (3.26) |
Here, we use the mathematical induction similar to Theorem 3.3, and by limk→∞kΔt=T. We have follow result
‖un−unM‖H1(Ω)=ω1ω−1nn−α1Δt−α1Tα1cM1−mmax1≤j≤n‖uj‖Hm(Ω). | (3.27) |
Then by Eq (3.27) and Lemma 2.8, we deduce that for sufficently large n, the assertion of the theorem is valid.
In this section, we discuss the uniqueness of solution and the ill-posed analysis of the unknown source identification problem.
Denote the eigenvalues of the operator −L as λn and the corresponding eigenfunctions as φn∈H2(Ω)∩H10(Ω), then we have Lφn=−λnφn. Without loss of generality, suppose a family of eigenvalues 0<λ1≤λ2≤⋅⋅⋅≤λn≤⋅⋅⋅,limn→∞λn=+∞, then {φn}∞n=1 constituting an orthonormal basis in space L2(Ω).
Definition 4.1. ([43]) For any γ>0, define
D((−L)γ)={ψ∈L2(Ω);∞∑n=1λ2γn|(ψ,φn)|2<∞}, |
where (⋅,⋅) is the inner product in L2(Ω), and define its norm
‖ψ‖D((−L)γ)={∞∑n=1λ2γn|(ψ,φn)|2}12. |
Lemma 4.2. ([34]) For fixed α∈A,q∈Q, let f(x)∈Ld(0,T),p(t)∈D((−L)γ) with some d∈[1,∞] and γ∈[0,1]. Then Eq (1.1) exists a unique solution u(x,t) given by
u(x,t)=∞∑n=1fnQn(t)φn(x), | (4.1) |
where Qn(t)=∫t0p(s)(t−s)α1−1E(n)α′,α1(t−s)ds, and fn=(f,φn).
From Lemma 4.2, we know there exists a unique weak solution u∈L2((0,T);H2(Ω)∩H10(Ω)) for the direct problem Eq (1.1), if we know a source function f(x)p(t)∈L∞(0,T;L2(Ω)). And we know the formal solution for Eq (1.1) can be expressed by
u(x,t)=∞∑n=1fn∫t0p(s)(t−s)α1−1E(n)α′,α1(t−s)dsφn(x). | (4.2) |
Applying u(x,T)=g(x), we have
∞∑n=1gnφn(x)=g(x)=∞∑n=1fnQn(T)φn(x), | (4.3) |
where gn=(g,φn)andQn(T)=∫t0p(s)(T−s)α1−1E(n)α′,α1(T−s)ds.
Theorem 4.3. If p(t)∈C[0,T] satisfying p(t)≥p0>0 for all t∈[0,T], then the solution u(x,t),f(x) of problem Eq (1.1) is unique.
Proof. By Lemma 2.3, we have E(n)α′,α1(t)>0, for t>0. From Lemma 2.2 and Proposition 2.5, we know
Qn(T)≥p0∫T0(T−s)α1−1E(n)α′,α1(T−s)ds=p0Tα1E(n)α′,1+α1(T)>0. | (4.4) |
Hence, we know if g(x)=0, we have f(x)=0, and by Eq (4.2) we know u(x,t)=0. The proof is completed.
In the following, we show the inverse source problem Eq (1.1) is ill-posed. Without loss of generality, we take a final data gk(x)=φk(x)√λk in Eq (1.1) and then know ‖gk‖=1√λk→0,ask→∞. The corresponding source terms are fk(x)=φk(x)Qk(T)√λk, and we have ‖fk‖=1Qk(T)√λk. By Lemma 2.7, we have
Qk(T)≤‖p‖C[0,T]Tα1E(k)α′,1+α1(T)≤‖p‖C[0,T]λk. | (4.5) |
Hence ‖fk‖≥√λk‖q‖C[0,T]→∞, as k→∞. Then we know the inverse source problem Eq (1.1) is ill-posed.
For the sake of argument, we just talk about the one-dimensional case.
First, let LM(x) denotes the Legendre polynomial of degree M. ξj,j=1,2,⋯,M, are the Legendre-Gauss-Lobatto points, and these points satisfy (1−x2)L′M(x)=0. we consider the follow equation
{(unM,νM)+1ω1(a∂unM∂x,∂νM∂x)−1ω1(cunM,νM)=n−1∑k=1ωk−ωk+1ω1(un−kM,νM)+ωnω1(u0M,νM)+pnω1(fM,νM),(uNM,νM)=(gM,νM). | (5.1) |
We set
unM(x)=uM(x,nΔt)=M∑i=0δnihi(x), | (5.2) |
Here, hi is the Lagrangian polynomial defined in Ω i.e. hi∈VM,hi(ξj)=εij, with εij: the Krinecker-delta symbol. Since first equation in Eq (1.1) satisfies Dirichlet boundary condition, therefore, we have δn0=δnM=0. Take νM=hj(x),j=1,2,⋯,M−1, we can obtain
{(M−1∑i=1δnihi,hj)+1ω1(aM−1∑i=1δni∂hi∂x,∂hj∂x)−1ω1(cM−1∑i=1δnihi,hj)=n−1∑k=1ωk−ωk+1ω1(M−1∑i=1δn−kihi,hj)+ωnω1(M−1∑i=1δ0ihi,hj)+pnω1(fM,hj)(M−1∑i=1δNihi,hj)=(gM,hj). |
Denote
F=((fM,h1),⋯,(fM,hM−1))T,G=((gM,h1),⋯,(gM,hM−1))T, |
and set
δn=(δn1,⋯,δnM−1)T, |
By above equation, we have
{Kδn=1ω1pnF+n−1∑k=1ωk−ωk+1ω1ˆKδn−kˆKδN=G, | (5.3) |
where i,j=1,2,⋯,M−1, and
(K)ij=(hi,hj)+1ω1(a∂hi∂x,∂hj∂x)−1ω1(chi,hj),(ˆK)ij=(hi,hj). | (5.4) |
Here, we use the Legendre Gauss-type quadratures to approximate Eq (5.4), and by the first equation in Eq (5.3) and Eq (5.2), we can solve the forward problem.
For the inverse problem, by Eq (5.3), we have
{δ1=K−11ω1p1F=A1Fn=1δ2=K−1(1ω1p2F+(1−ω2ω1)ˆKδ1)=A2Fn=2⋮δN−1=AN−1Fn=N−1. | (5.5) |
For n=N, we have
{KδN=1ω1pNF+N−1∑k=1ωk−ωk+1ω1ˆKδN−kˆKδN=G, | (5.6) |
By Eq (5.5), Eq (5.6), we have
AF=G. | (5.7) |
And then by solving linear equation Eq (5.7), we can obtain F. Further, we recover fM as an approximation of the source term by using a suitable integration rule.
In order to prove the ill-posedness of equation Eq (5.7), an upper bound of ‖A−1‖2 in Eq (5.7) is given below.
Theorem 5.1. Let the orthogonal basis function {hj}M−1j=1 satisfy hj(x)∈H1(Ω). Then the inverse matrix of the coefficient matrix A in Eq (5.7) have
‖A−1‖2≤C(M−1)2max1≤j≤M−1‖hj‖2H1(Ω)min1≤j≤M−1‖hj‖2H1(Ω) | (5.8) |
Proof. From the first equation of Eq (5.6), we can get
δN=pNω1K−1F+N−1∑k=1ωk−ωk+1ω1K−1ˆKδN−k. | (5.9) |
Combining the second equation of Eq (5.6), we have
pNω1ˆKK−1F+N−1∑k=1ωk−ωk+1ω1ˆKK−1ˆKδN−k=G. | (5.10) |
Let k′=N−k(alsodenotek), we have
pNω1ˆKK−1F+N−1∑k=1ωN−k−ωN−k+1ω1ˆKK−1ˆKδk=G. | (5.11) |
On the other hand, by Eq (5.5) we have
δk=(pkω1K−1+k−1∑m=1ωm−ωm+1ω1K−1ˆKAk−m)F=:AkF,k=1,2,⋯,N−1. | (5.12) |
By substituting Eq (5.12) into Eq (5.11), the equation AF=G is obtained, where
A=pNω1ˆKK−1+N−1∑k=1ωN−k−ωN−k+1ω1ˆKK−1ˆKAk. | (5.13) |
Since ωk is non-negative and decreasing with respect to k, therefore we have
ωN−k−ωN−k+1ω1<1. | (5.14) |
The definition of Ak tells us that the second part of A is the higher order term of the first part. Therefore, we only need to estimate the matrix
A≈˜A:=pNω1ˆKK−1. | (5.15) |
Due to F≈˜A−1G, we only have to estimate the upper bound of ‖˜A−1‖2. According to Eq (5.4), ˆK is a diagonal matrix, and
(KˆK−1)ij=(hi,hj)‖hj‖2+1ω1‖hj‖2(a∂hi∂x,∂hj∂x)−1ω1‖hj‖2(chi,hj). | (5.16) |
Therefore, we have
‖˜A−1‖2=ω1pN‖KˆK−1‖2≤ω1pN‖KˆK−1‖F=ω1pN(M−1∑i,j=1(KˆK−1)2ij)12=ω1pN(M−1∑i,j=11‖hj‖4((hi,hj)‖hj‖2+1ω1(a∂hi∂x,∂hj∂x)−1ω1(chi,hj))2)12≤√3ω1min1≤j≤M−1‖hj‖2H1(Ω)pN(M−1∑i,j=1(hi,hj)2+1ω21(a∂hi∂x,∂hj∂x)2+1ω21(chi,hj)2)12≤C(M−1)2max1≤j≤M−1‖hj‖2H1(Ω)min1≤j≤M−1‖hj‖2H1(Ω), | (5.17) |
where C is dependent on a,c,M,α,qj.
Remark 1. It can be seen from Theorem 5.1 that ‖A−1‖2 is completely determined by the projection dimension M−1 of the spectral method and the maximum and minimum norm of the basis function hj(x). It can be seen from Eq (5.8) that as the projection dimension increases, the numerator increases with respect to j, while the denominator decreases with respect to j. Therefore, the projection dimension M−1 can be used as regularization parameter. When the appropriate M is selected, the minimum value of ‖A−1‖2 can be guaranteed, thus reducing the ill-posedness of the inverse problem.
Remark 2. Here we emphasize that the Galerkin spectral method is a projection method. In the projection method, as long as the appropriate dimension of the projection space is selected, the regularization effect can be effectively generated for the linear ill-posed problem, and it is no longer necessary to adopt other regularization techniques for the problem. This phenomenon is sometimes called self-regularization or regularization by projection. A series of descriptions and proofs of this phenomenon can be found in the literature [44].
In order to compare the finite difference method the and Galerkin spectral method in application of the multi-term time-fractional diffusion equation. We derive follow the scheme similar to reference [45].
In the finite difference algorithm, we can denote uni≈u(xi,tn), where xi=iΔx,i=1,...,C. and tn=nΔt,n=0,1,...,N.
The space has the following discrete form:
Lu(xi,tn)≈1(Δx)2(ai+12uni+1)−((ai+12+ai−12)uni+ai−12uni−1)+c(xi)uni, |
for i=1,...,C−1,n=1,...,N where ai+12=a(xi+12) with xi+12=(xi+xi+1)/2. In problem Eq (1.1), according to initial condition and boundary condition, we can get a numerical solution for forward problem Eq (1.1) from the finite difference scheme
n∑k=1ωk(un−k+1−un−k)=1(Δx)2(ai+12uni+1)−((ai+12+ai−12)uni+ai−12uni−1)+c(xi)uni+f(xi)p(tn). | (5.18) |
Denote Un=(un1,un2,...,unC−1)T,Y=(f(x1),f(x2),...,f(xC−1))T, then the scheme Eq (5.18) leads to the following iterative scheme
BU1=U0+1ω1p(t1)Y,BUn=c1Un−1+c2Un−2+...+cn−1U1+ωnω1U0+1ω1p(tn)Y, | (5.19) |
where cn=(ωn−ωn+1)/ω1 and B is a tridiagonal matrix given by Bii=ai+12+ai−12(Δx)2ω1+1−c(xi)ω1 for i=1,2,⋯,C−1 and Bi,i−1=−ai−12(Δx)2ω1 for i=2,3,⋯,C−1 and Bi,i+1=−ai+12(Δx)2ω1 for i=1,3,⋯,C−2.
Inverse source problem based on finite difference. Similar to Section 5.1, we can derive a linear equation.
ZY=D, | (5.20) |
where D=(g(x1),g(x2),...,g(xC−1))T, and Z is a matrix.
In this section, first, we verify the stability and validity of the proposed numerical methods. Without lose of generality, let the maximum time is T=1. The noisy data are generated by adding random perturbations, i.e,
gδ(x)=g(x)+εg(x)(2rand(size(g(x))−1), | (6.1) |
where ε is relative noise level and rand(⋅) generate random numbers uniformly distributed on [0,1]. The corresponding noise level is calculated by δ=‖g−gδ‖. To show the accuracy of numerical solution, we compute the approximate L2-norm error denoted by
e(f,ε)=‖f−fδ‖, | (6.2) |
and the approximate L2-norm relative error as
er(f,ε)=‖f−fδ‖/‖f‖, | (6.3) |
where fδ is term reconstructed and f is the exact solution.
In addition, for the convenience of writing, we will abbreviate the Galerkin spectral method as GSM and the finite difference method as FDM.
Example 1. In this example, we firstly consider a three-term time fractional diffusion equation with a exact solution. Let ΩT=(−1,1)×(0,T) and T=1,qj≡1. Take a source function p(t)=2Γ(3−α1)t2−α1+2Γ(3−α2)t2−α2+2Γ(3−α3)t2−α3+4π2t2, and f(x)=sin(2πx). Further more, we have exact analytical solution
u(x,t)=t2sin(2πx). | (6.4) |
In the first three graphs of Figure 1, namely (a), (b) and (c), we show the errors in L2-norm and L∞-norm for different time step in case of α1=(0.9,0.8,0.7),α2=(0.6,0.5,0.3), and α3=(0.3,0.2,0.1). Here fix the polynomial degree M=24. In the same case, the graphs (d), (e) and (f) from Figure 1 show the the errors in L2-norm and L∞-norm for different polynomial degree M. Here we also take time step Δt=1e−4. From Figure 1, we can find that the theoretical convergence accuracy (see Theorem 3.3) is in good agreement with the numerical results.
In Table 1 and Figure 2, we make a comparison with FDM in terms of the forward problem by using the scheme Eq (5.1). Clearly, we observe that the scheme Eq (5.1) has higher accuracy than FDM on the forward problem. As a further step, we choose Δt=1e−4 to obtain satisfactory results in time and accuracy.
timestep | approximation method | L2 error | L∞ error | run time |
Δt=1e−1 | GSM | 0.002121690 | 2.121690e-04 | 88.254s |
FDM | 0.010039748 | 0.001419834 | 1.341s | |
Δt=1e−2 | GSM | 4.382322e-05 | 4.382322e-06 | 90.043s |
FDM | 0.0085668512 | 0.001211535 | 10.076s | |
Δt=1e−3 | GSM | 8.535546e-07 | 8.535546e-08 | 90.622s |
FDM | 0.008536392 | 0.001207228 | 96.931s | |
Δt=1e−4 | GSM | 1.913459e-08 | 1.913459e-09 | 198.829s |
FDM | 0.008535798 | 0.001207144 | 1348.549s | |
Δt=1e−5 | GSM | 1.007804e-08 | 1.007804e-9 | 10834.238s |
FDM | 0.008535787 | 0.001207142 | 33733.606s |
On the inverse source problem aspect. In order to avoid the impact of 'inverse crime'. We take M=20,Δt=1e−4 to solve the direct problem by using the GSM Eq (5.1), and take M=20,Δt=1e−3 to solve the inverse source problem by the scheme Eq (5.7). The related results are shown in (e), (f) of Figure 3 and Table 2. For the inverse source problem based on FDM. We take C=100,Δt=5e−3. Numerical result for α2=(0.3,0.2,0.1) with various noise levels ε=5%,1%,0.5%,0.1% are shown in (c), (d) of Figure 3.
ϵ | α | er(f,ε) |
ε=5% | (0.3,0.2,0.1) | 0.082339 |
(0.9,0.8,0.7) | 0.074294 | |
(0.6,0.5,0.3) | 0.059221 | |
ε=1% | (0.3,0.2,0.1) | 0.030306 |
(0.9,0.6,0.3) | 0.034862 | |
(0.6,0.5,0.3) | 0.049156 | |
ε=0.5% | (0.3,0.2,0.1) | 0.014814 |
(0.9,0.8,0.7) | 0.043858 | |
(0.6,0.5,0.3) | 0.043187 | |
ε=0.1% | (0.3,0.2,0.1) | 0.013495 |
(0.9,0.8,0.7) | 0.010624 | |
(0.6,0.5,0.3) | 0.013953 |
Example 2. In this example, let ΩT=(0,1)×(0,T),s=3,qj≡1,a(x)=1,c(x)=0. Take a exact source function p(t)=1 and f(x)=x(x−0.4)(x−0.6)(x−0.8)(x−1). We first solve the direct problem by using the GSM Eq (5.1) to obtain the additional data g(x). Then we use the scheme Eq (5.7) to solve inverse source problem. Numerical result for α1=(0.9,0.8,0.7),α2=(0.3,0.2,0.1), and α3=(0.6,0.5,0.3), with various noise levels ε=1%,0.5%,0.1%,0.01% are presented in (e), (f) of Figure 4 and Table 3. For the inverse source problem based on FDM. We take C=100,Δt=5e−3. Numerical result for α2=(0.3,0.2,0.1) with various noise levels ε=1%,0.5%,0.1%,0.01% are shown in (c), (d) of Figure 4.
ε | α | er(f,ε) |
ε=1% | (0.3,0.2,0.1) | 0.085368 |
(0.9,0.8,0.7) | 0.092676 | |
(0.6,0.5,0.3) | 0.088179 | |
ε=0.5% | (0.3,0.2,0.1) | 0.076024 |
(0.9,0.8,0.7) | 0.082049 | |
(0.6,0.5,0.3) | 0.079423 | |
ε=0.1% | (0.3,0.2,0.1) | 0.073424 |
(0.9,0.8,0.7) | 0.0800324 | |
(0.6,0.5,0.3) | 0.077136 | |
ε=0.01% | (0.3,0.2,0.1) | 0.0652520 |
(0.9,0.8,0.7) | 0.066370 | |
(0.6,0.5,0.3) | 0.066352 |
Example 3. In this example, let ΩT=(0,1)×(0,T),s=3,qj≡1,a(x)=1,c(x)=0. We consider a continuous piecewise smooth function.
f(x)={2x,0≤x≤0.5,−2x+2,0.5≤x<1. | (6.5) |
We first solve the direct problem by using the GSM Eq (5.1) to obtain the additional data g(x). Then we use the scheme Eq (5.7) to solve inverse source problem. Numerical result for α1=(0.9,0.8,0.7),α2=(0.3,0.2,0.1), and α3=(0.6,0.5,0.3), with various noise levels ε=1%,0.5%,0.1%,0.01% are presented in (e), (f) of Figure 5 and Table 4. For the inverse source problem based on FDM. We take C=100,Δt=5e−3. Numerical result for α2=(0.3,0.2,0.1) with various noise levels ε=1%,0.5%,0.1%,0.01% are shown in (c), (d) of Figure 5.
ε | α | er(f,ε) |
ε=1% | (0.3,0.2,0.1) | 0.045909 |
(0.9,0.8,0.7) | 0.058139 | |
(0.6,0.5,0.3) | 0.058454 | |
ε=0.5% | (0.3,0.2,0.1) | 0.042321 |
(0.9,0.8,0.7) | 0.048615 | |
(0.6,0.5,0.3) | 0.047175 | |
ε=0.1% | (0.3,0.2,0.1) | 0.040261 |
(0.9,0.8,0.7) | 0.048302 | |
(0.6,0.5,0.3) | 0.046372 | |
ε=0.01% | (0.3,0.2,0.1) | 0.012787 |
(0.9,0.8,0.7) | 0.011516 | |
(0.6,0.5,0.3) | 0.011305 |
Example 4. Let ΩT=(0,1)×(0,T),s=3,qj≡1,a(x)=x2+1,c(x)=−1. Take a exact source function p(t)=1 and f(x)=e−xsin(7πx). We first solve the direct problem by using the GSM Eq (5.1) to obtain the additional data g(x). Then we use the scheme Eq (5.7) to solve inverse source problem. Numerical result for α1=(0.9,0.8,0.7),α2=(0.3,0.2,0.1), and α3=(0.6,0.5,0.3), with various noise levels ε=10%,5%,1%,0.1% are presented in (e), (f) of Figure 6 and Table 5. For the inverse source problem based on FDM. We take C=100,Δt=5e−3. Numerical result for α2=(0.3,0.2,0.1) with various noise levels ε=1%,0.5%,0.1%,0.01% are shown in (c), (d) of Figure. 6.
ε | α | er(f,ε) |
ε=10% | (0.3,0.2,0.1) | 0.100485 |
(0.9,0.8,0.7) | 0.111043 | |
(0.6,0.5,0.3) | 0.107902 | |
ε=5% | (0.3,0.2,0.1) | 0.093797 |
(0.9,0.8,0.7) | 0.068835 | |
(0.6,0.5,0.3) | 0.064510 | |
ε=1% | (0.3,0.2,0.1) | 0.072740 |
(0.9,0.8,0.7) | 0.073513 | |
(0.6,0.5,0.3) | 0.072786 | |
ε=0.1% | (0.3,0.2,0.1) | 0.034704 |
(0.9,0.8,0.7) | 0.037078 | |
(0.6,0.5,0.3) | 0.035328 |
By observing Figures 3–6, we can see that (a) denotes the graph of the numerical solution of the forward problem, namely the input data. (b) is the numerical approximation of the inverse source problem without noisy data. (c) and (d) are results of the inverse source problem based on the FDM with and without regularization method, and (e) and (f) are results of the inverse source problem based on the GSM under the same case.
From Tables 6–9, we show the error levels of two numerical reconstruction method with and without regularization method. We can find that the numerical results of the inverse problem based on FDM with regularization method are obviously better than those without regularization method. However, the numerical results of the inverse problem based on the GSM with and without regularization method do not show a big difference compared with the numerical results of the FDM. There may even be cases where regularization method is not required to get a better result. Hence, we can conclude that scheme Eq (5.7) itself has regularization function compared to the FDM in the inverse source problem. Next, we explain why scheme Eq (5.7) is not sensitive to noise level.
method | ε=5% | ε=1% | ε=0.5% | ε=0.1% |
GSM (no regularization) | 0.2501 | 0.0832 | 0.0290 | 0.0079 |
GSM (regularization) | 0.0823 | 0.0303 | 0.0134 | 0.0148 |
FDM (no regularization) | 4.3792 | 0.7871 | 0.4036 | 0.0965 |
FDM (regularization) | 0.0301 | 0.0052 | 0.0025 | 6.273e-4 |
method | ||||
GSM (no regularization) | 0.0944 | 0.0635 | 0.0119 | 0.0010 |
GSM (regularization) | 0.0853 | 0.0760 | 0.0734 | 0.0652 |
FDM (no regularization) | 2.6407 | 1.220 | 0.2478 | 0.027 |
FDM (regularization) | 0.2043 | 0.0520 | 0.0208 | 0.0164 |
method | ||||
GSM (no regularization) | 0.4327 | 0.2868 | 0.0365 | 0.0126 |
GSM (regularization) | 0.0459 | 0.0423 | 0.0402 | 0.0127 |
FDM (no regularization) | 11.808 | 5.0791 | 1.4387 | 0.1025 |
FDM (regularization) | 0.0353 | 0.0239 | 0.0116 | 0.0102 |
method | ||||
GSM (no regularization) | 0.2924 | 0.0878 | 0.0425 | 0.0233 |
GSM (regularization) | 0.1004 | 0.0937 | 0.0727 | 0.0347 |
FDM (no regularization) | 2.79904 | 1.1476 | 0.2951 | 0.1435 |
FDM (regularization) | 0.1435 | 0.0846 | 0.0181 | 0.0014 |
In Table 10, we show norm of matrices G, A−1 and A−1G for Example 1. Obviously, ‖A−1G‖2 is small and ‖A−1‖2 has a reasonable size. Therefore numerical solutions are not sensitive with respect to the perturbation in the initial data. But, In Table 11, The numerical format of FDM is sensitive to the perturbation in the initial datal. Therefore, GSM has better anti-interference than FDM. On the other hand, in Tables 12 and 13, We can find that although GSM has better anti-interference than FMD, it can not completely get rid of the regularization method when the unknown source has less regularity and the meased data has a high noise level.
ε | ‖G‖2 | ‖A−1‖2 | ‖A−1G‖2 |
0.05 | 0.356708 | 86.11457 | 0.369712 |
0.01 | 0.360401 | 86.11457 | 0.360933 |
0.005 | 0.360111 | 86.11457 | 0.360085 |
0.001 | 0.360341 | 86.11457 | 0.360345 |
0.0001 | 0.360348 | 86.11457 | 0.360348 |
ε | ‖D‖2 | ‖Z−1‖2 | ‖Z−1D‖2 |
0.05 | 7.0881 | 2.322e+02 | 27.8227 |
0.01 | 7.0743 | 2.322e+02 | 8.8667 |
0.005 | 7.0809 | 2.322e+02 | 7.5734 |
0.001 | 7.0804 | 2.322e+02 | 7.0929 |
0.0001 | 7.0796 | 2.322e+02 | 7.0712 |
ε | ‖G‖2 | ‖A−1‖2 | ‖A−1G‖2 |
0.01 | 0.013187 | 1.5104e+04 | 0.161897 |
0.005 | 0.013226 | 1.5104e+04 | 0.164711 |
0.001 | 0.013227 | 1.5104e+04 | 0.159407 |
0.0001 | 0.013228 | 1.5104e+04 | 0.159405 |
ε | ‖D‖2 | ‖Z−1‖2 | ‖Z−1D‖2 |
0.01 | 0.459280 | 3.9992e+04 | 76.739424 |
0.005 | 0.459857 | 3.9992e+04 | 27.761398 |
0.001 | 0.459380 | 3.9992e+04 | 7.957420 |
0.0001 | 0.459332 | 3.9992e+04 | 5.798087 |
In this paper, we first obtain a high accuracy numerical solution by using the GSM, and give the error estimates between exact solution and semi-discrete solution as well as full-discrete one, and compare with the FDM. It is indicate that our method has a better accuracy. Secondly, the GSM is extended to solve the inverse source problem. Moreover, we find that this method can effectively reduce the ill-posednes of inverse source problem compared with the traditional FDM. Thus the spectral method itself can play a regularization role. It should be mentioned that the estimates given in the paper are also valid in two and three dimensional cases. In the following work, we will continue to try to optimize the GSM numerical scheme so that it can better play the role of regularization method. For example, replacing the original basis functions with smooth periodic functions or equidistant trigonometric functions to avoid Runge phenomenon.
This work is supported by the NSF of China (grant no. 12201502), the Youth Science and Technology Fund of Gansu Province (grant no. 20JR10RA099), the Innovation Capacity Improvement Project for Colleges and Universities of Gansu Province (grant no. 2020B-088) and the Innovation star of Gansu Province (grant no. 2022CXZX-324).
The authors declare there is no conflict of interest.
[1] | Statista, Transport volume of crude oil in seaborne trade worldwide from 2010 to 2021, 2023. Available from: https://www.statista.com/statistics/264013/transport-volume-of-crude-oil-in-seaborne-trade/. |
[2] | Statista, Oil production worldwide from 1998 to 2021, 2023. Available from: https://www.statista.com/statistics/265229/global-oil-production-in-million-metric-tons/. |
[3] |
J. Qi, S. Wang, H. Psaraftis, Bi-level optimization model applications in managing air emissions from ships: a review, Commun. Transp. Res., 1 (2021), 100020. https://doi.org/10.1016/j.commtr.2021.100020 doi: 10.1016/j.commtr.2021.100020
![]() |
[4] |
R. Yan, S. Wang, L. Zhen, G. Laporte, Emerging approaches applied to maritime transport research: Past and future, Commun. Transp. Res., 1 (2021), 100011. https://doi.org/10.1016/j.commtr.2021.100011 doi: 10.1016/j.commtr.2021.100011
![]() |
[5] | U.S. Energy Information Administration (USEIA), Oil and petroleum products explained, 2022. Available from: https://www.eia.gov/energyexplained/oil-and-petroleum-products/where-our-oil-comes-from.php. |
[6] | Statista, Largest importers of Russian crude oil and petroleum motor fuels in the European Union and the United Kingdom in 2021, by country, 2023. Available from: https://www.statista.com/statistics/1295165/oil-import-value-from-russia-to-eu-countries/. |
[7] | European Council (EC), EU sanctions against Russia explained, 2023. Available from: https://www.consilium.europa.eu/en/policies/sanctions/restrictive-measures-against-russia-over-ukraine/sanctions-against-russia-explained. |
[8] | A. Almendral, Russia is amassing a shadow fleet of tankers to avoid EU oil sanctions, 2022. Available from: https://qz.com/russia-is-amassing-a-shadow-fleet-of-tankers-to-avoid-e-1849853809. |
[9] |
X. Bai, X. Zhang, K. X. Li, Y. Zhou, K. F. Yuen, Research topics and trends in the maritime transport: A structural topic model, Transp. Policy, 102 (2021), 11–24. https://doi.org/10.1016/j.tranpol.2020.12.013 doi: 10.1016/j.tranpol.2020.12.013
![]() |
[10] |
H. Zhao, Q. Meng, Y. Wang, Robust container slot allocation with uncertain demand for liner shipping services, Flexible Serv. Manuf. J., 34 (2022), 551–579. https://doi.org/10.1007/s10696-021-09420-z doi: 10.1007/s10696-021-09420-z
![]() |
[11] |
Q. Meng, S. Wang, H. Andersson, K. Thun, Containership routing and scheduling in liner shipping: overview and future research directions, Transp. Sci., 48 (2014), 265–280. https://doi.org/10.1287/trsc.2013.0461 doi: 10.1287/trsc.2013.0461
![]() |
[12] |
S. Wang, Q. Meng, Container liner fleet deployment: a systematic overview, Transp. Res. Part C Emerg. Technol., 77 (2017), 389–404. https://doi.org/10.1016/j.trc.2017.02.010 doi: 10.1016/j.trc.2017.02.010
![]() |
[13] |
A. Baykasoğlu, K. Subulan, A. S. Taşan, N. Dudaklı, A review of fleet planning problems in single and multimodal transportation systems, Transportmetrica A : Transport Sci., 15 (2019), 631–697. https://doi.org/10.1080/23249935.2018.1523249 doi: 10.1080/23249935.2018.1523249
![]() |
[14] |
M. Christiansen, E. Hellsten, D. Pisinger, D. Sacramento, C. Vilhelmsen, Liner shipping network design, Eur. J. Oper. Res., 286 (2020), 1–20. https://doi.org/10.1016/j.ejor.2019.09.057 doi: 10.1016/j.ejor.2019.09.057
![]() |
[15] |
M. A. Dulebenets, J. Pasha, O. F. Abioye, M. Kavoosi, Vessel scheduling in liner shipping: a critical literature review and future research needs, Flexible Serv. Manuf. J., 33 (2021), 43–106. https://doi.org/10.1007/s10696-019-09367-2 doi: 10.1007/s10696-019-09367-2
![]() |
[16] |
D. Kizilay, D. T. Eliiyi, A comprehensive review of quay crane scheduling, yard operations and integrations thereof in container terminals, Flexible Serv. Manuf. J., 33 (2021), 1–42. https://doi.org/10.1007/s10696-020-09385-5 doi: 10.1007/s10696-020-09385-5
![]() |
[17] |
Q. Meng, T. Wang, A chance constrained programming model for short-term liner ship fleet planning problems, Marit. Policy Manage., 37 (2010), 329–346. https://doi.org/10.1080/03088839.2010.486635 doi: 10.1080/03088839.2010.486635
![]() |
[18] |
M. Ng, D. Y. Lin, Fleet deployment in liner shipping with incomplete demand information, Transp. Res. Part E Logist. Transp. Rev., 116 (2018) 184–189. https://doi.org/10.1016/j.tre.2018.06.004 doi: 10.1016/j.tre.2018.06.004
![]() |
[19] |
S. Wang, Q. Meng, Liner ship fleet deployment with container transshipment operations, Transp. Res. Part E Logist. Transp. Rev., 48 (2012), 470–484. https://doi.org/10.1016/j.tre.2011.10.011 doi: 10.1016/j.tre.2011.10.011
![]() |
[20] |
Q. Meng, T. Wang, S. Wang, Short-term liner ship fleet planning with container transshipment and uncertain container shipment demand, Eur. J. Oper. Res., 223 (2012), 96–105. https://doi.org/10.1016/j.ejor.2012.06.025 doi: 10.1016/j.ejor.2012.06.025
![]() |
[21] |
T. Wang, Q. Meng, S. Wang, Z. Tan, Risk management in liner ship fleet deployment: a joint chance constrained programming model, Transp. Res. Part E Logist. Transp. Rev., 60 (2013), 1–12. https://doi.org/10.1016/j.tre.2013.09.001 doi: 10.1016/j.tre.2013.09.001
![]() |
[22] |
M. Ng, Distribution-free vessel deployment for liner shipping, Eur. J. Oper. Res., 238 (2014), 858–862. https://doi.org/10.1016/j.ejor.2014.04.019 doi: 10.1016/j.ejor.2014.04.019
![]() |
[23] |
M. Ng, Container vessel fleet deployment for liner shipping with stochastic dependencies in shipping demand, Transp. Res. Part B Methodol., 74 (2015), 79–87. https://doi.org/10.1016/j.trb.2015.01.004 doi: 10.1016/j.trb.2015.01.004
![]() |
[24] |
S. Wang, Z. Liu, X. Qu, Minimax regret model for liner shipping fleet deployment with uncertain demand, Transp. Res. Rec., 2549 (2016), 45–53. https://doi.org/10.3141/2549-06 doi: 10.3141/2549-06
![]() |
[25] |
Q. Meng, S. Wang, Optimal operating strategy for a long-haul liner service route, Eur. J. Oper. Res., 215 (2011), 105–114. https://doi.org/10.1016/j.ejor.2011.05.057 doi: 10.1016/j.ejor.2011.05.057
![]() |
[26] |
L. Zhen, Y. Hu, S. Wang, G. Laporte, Y. Wu, Fleet deployment and demand fulfillment for container shipping liners, Transp. Res. Part B Methodol., 120 (2019), 15–32. https://doi.org/10.1016/j.trb.2018.11.011 doi: 10.1016/j.trb.2018.11.011
![]() |
[27] |
L. Zhen, Y. Wu, S. Wang, G. Laporte, Green technology adoption for fleet deployment in a shipping network, Transp. Res. Part B Methodol., 139 (2020), 388–410. https://doi.org/10.1016/j.trb.2020.06.004 doi: 10.1016/j.trb.2020.06.004
![]() |
[28] |
C. F. Gao, Z. H. Hu, Speed optimization for container ship fleet deployment considering fuel consumption, Sustainability, 13 (2021), 5242. https://doi.org/10.3390/su13095242 doi: 10.3390/su13095242
![]() |
[29] |
J. Pasha, M. A. Dulebenets, A. M. Fathollahi-Fard, G. Tian, Y. Y. Lau, P. Singh, et al., An integrated optimization method for tactical-level planning in liner shipping with heterogeneous ship fleet and environmental considerations, Adv. Eng. Inf., 48 (2021), 101299. https://doi.org/10.1016/j.aei.2021.101299 doi: 10.1016/j.aei.2021.101299
![]() |
[30] |
X. Lai, L. Wu, K. Wang, F. Wang, Robust ship fleet deployment with shipping revenue management, Transp. Res. Part B Methodol., 161 (2022), 169–196. https://doi.org/10.1016/j.trb.2022.05.005 doi: 10.1016/j.trb.2022.05.005
![]() |
[31] |
K. Tierney, B. Áskelsdóttir, R. M. Jensen, D. Pisinger, Solving the liner shipping fleet repositioning problem with cargo flows, Transp. Sci., 49 (2015), 652–674. https://doi.org/10.1287/trsc.2013.0515 doi: 10.1287/trsc.2013.0515
![]() |
[32] |
K. Tierney, A. Coles, A. Coles, C. Kroer, A. Britt, R. Jensen, Automated planning for liner shipping fleet repositioning, in Proceedings of the International Conference on Automated Planning and Scheduling, 22 (2012), 279–287. https://doi.org/10.1609/icaps.v22i1.13500 doi: 10.1609/icaps.v22i1.13500
![]() |
[33] |
Y. F. Huang, J. K. Hu, B. Yang, Liner services network design and fleet deployment with empty container repositioning, Comput. Ind. Eng., 89 (2015), 116–124. https://doi.org/10.1016/j.cie.2015.01.021 doi: 10.1016/j.cie.2015.01.021
![]() |
[34] |
D. Müller, K. Tierney, Decision support and data visualization for liner shipping fleet repositioning, Inf. Technol. Manage., 18 (2017), 203–221. https://doi.org/10.1007/s10799-016-0259-3 doi: 10.1007/s10799-016-0259-3
![]() |
[35] |
D. Wetzel, K. Tierney, Integrating fleet deployment into liner shipping vessel repositioning, Transp. Res. Part E Logist. Transp. Rev., 143 (2020), 102101. https://doi.org/10.1016/j.tre.2020.102101 doi: 10.1016/j.tre.2020.102101
![]() |
[36] |
S. Kuhlemann, J. Ksciuk, K. Tierney, A. Koberstein, The stochastic liner shipping fleet repositioning problem with uncertain container demands and travel times, EURO J. Transp. Logist., 10 (2021), 100052. https://doi.org/10.1016/j.ejtl.2021.100052 doi: 10.1016/j.ejtl.2021.100052
![]() |
[37] |
X. Bai, L. Cheng, Ç. Iris, Data-driven financial and operational risk management: empirical evidence from the global tramp shipping industry, Transp. Res. Part E Logist. Transp. Rev., 158 (2022), 102617. https://doi.org/10.1016/j.tre.2022.102617 doi: 10.1016/j.tre.2022.102617
![]() |
[38] |
P. Balcombe, J. Brierley, C. Lewis, L. Skatvedt, J. Speirs, A. Hawkes, et al., How to decarbonise international shipping: options for fuels, technologies and policies, Energy Convers. Manag., 182 (2019), 72–88. https://doi.org/10.1016/j.enconman.2018.12.080 doi: 10.1016/j.enconman.2018.12.080
![]() |
[39] |
L. Zhang, L. Guan, D. Z. Long, H. Shen, H. Tang, Who is better off by selling extended warranties in the supply chain: the manufacturer, the retailer, or both?, Ann. Oper. Res., (2020), 1–27. https://doi.org/10.1007/s10479-020-03728-z doi: 10.1007/s10479-020-03728-z
![]() |
[40] |
L. Zhen, S. Wang, G. Laporte, Y. Hu, Integrated planning of ship deployment, service schedule and container routing, Comput. Oper. Res., 104 (2019), 304–318. https://doi.org/10.1016/j.cor.2018.12.022 doi: 10.1016/j.cor.2018.12.022
![]() |
[41] |
X. Xin, X. Wang, X. Tian, Z. Chen, K. Chen, Green scheduling model of shuttle tanker fleet considering carbon tax and variable speed factor, J. Clean. Prod., 234 (2019), 1134–1143. https://doi.org/10.1016/j.jclepro.2019.06.275 doi: 10.1016/j.jclepro.2019.06.275
![]() |
[42] |
B. D. Brouer, J. F. Alvarez, C. E. M. Plum, D. Pisinger, M. M. Sigurd, A base integer programming model and benchmark suite for liner-shipping network design, Transp. Sci., 48 (2013), 281–312. https://doi.org/10.1287/trsc.2013.0471 doi: 10.1287/trsc.2013.0471
![]() |
[43] | Ship & Bunker (S & B), World bunker prices, 2022. Available from: https://shipandbunker.com/prices/av/global/av-g20-global-20-ports-average. |
[44] |
Y. Wu, Y. Huang, H. Wang, L. Zhen, Joint planning of fleet deployment, ship refueling, and speed optimization for dual-fuel ships considering methane slip, J. Mar. Sci. Eng., 10 (2022), 1690. https://doi.org/10.3390/jmse10111690 doi: 10.3390/jmse10111690
![]() |
[45] | R. Greiner, Ship operating costs: current and future trends, 2017. Available from: http://greece.moorestephens.com/MediaLibsAndFiles/media/greeceweb.moorestephens.com/Documents/1-Richard-Greiner.pdf. |
[46] |
Y. Wu, Y. Huang, H. Wang, L. Zhen, Nonlinear programming for fleet deployment, voyage planning and speed optimization in sustainable liner shipping, Electron. Res. Arch., 31 (2023), 147–168. https://doi.org/10.3934/era.2023008 doi: 10.3934/era.2023008
![]() |
[47] |
S. Wang, Q. Meng, Robust schedule design for liner shipping services, Transp. Res. Part E Logist. Transp. Rev., 48 (2012), 1093–1106. https://doi.org/10.1016/j.tre.2012.04.007 doi: 10.1016/j.tre.2012.04.007
![]() |
[48] | N. Rasmussen, Recorded webinar: tanker shipping market overview & outlook Q1 2023: the stars align to create the strongest market in 15 years, 2023. Available from: https://www.bimco.org/news/market_analysis/2023/20230228-smoo-tanker. |
[49] | Moore Greece, Moore maritime index 2022, 2022. Available from: https://www.moore-greece.gr/el-gr/insights. |
[50] | D. Sheppard, C. Cook, Russia assembles 'shadow fleet' of tankers to help blunt oil sanctions, 2022. Available from: https://www.ft.com/content/cdef936b-852e-43d8-ae55-33bcbbb82eb6. |
[51] |
Ç. Iris, J. S. L. Lam, Optimal energy management and operations planning in seaports with smart grid while harnessing renewable energy under uncertainty, Omega, 103 (2021), 102445. https://doi.org/10.1016/j.omega.2021.102445 doi: 10.1016/j.omega.2021.102445
![]() |
[52] |
W. Wang, Y. Wu, Is uncertainty always bad for the performance of transportation systems?, Commun. Transp. Res, 1 (2021), 100021. https://doi.org/10.1016/j.commtr.2021.100021 doi: 10.1016/j.commtr.2021.100021
![]() |
[53] |
B. Liu, Z. C. Li, Y. Wang, A two-stage stochastic programming model for seaport berth and channel planning with uncertainties in ship arrival and handling times, Transp. Res. Part E Logist. Transp. Rev., 167 (2022), 102919. https://doi.org/10.1016/j.tre.2022.102919 doi: 10.1016/j.tre.2022.102919
![]() |
[54] |
M. Lashgari, A. A. Akbari, S. Nasersarraf, A new model for simultaneously optimizing ship route, sailing speed, and fuel consumption in a shipping problem under different price scenarios, Appl. Ocean Res., 113 (2021), 102725. https://doi.org/10.1016/j.apor.2021.102725 doi: 10.1016/j.apor.2021.102725
![]() |
[55] |
J. Zhang, D. Z. Long, R. Wang, C. Xie, Impact of penalty cost on customers' booking decisions, Prod. Oper. Manage., 30 (2021), 1603–1614. https://doi.org/10.1111/poms.13297 doi: 10.1111/poms.13297
![]() |
[56] |
Y. Wang, J. Sarkis, Emerging digitalisation technologies in freight transport and logistics: current trends and future directions, Transp. Res. Part E Logist. Transp. Rev., 148 (2021), 102291. https://doi.org/10.1016/j.tre.2021.102291 doi: 10.1016/j.tre.2021.102291
![]() |
[57] |
H. Yalcin, T. U. Daim, Logistics, supply chain management and technology research: an analysis on the axis of technology mining, Transp. Res. Part E Logist. Transp. Rev., 168 (2022), 102943. https://doi.org/10.1016/j.tre.2022.102943 doi: 10.1016/j.tre.2022.102943
![]() |
[58] |
Y. Li, S. E. Li, X. Jia, S. Zeng, Y. Wang, FPGA accelerated model predictive control for autonomous driving, J. Intell. Connected Veh., 5 (2022), 63–71. https://doi.org/10.1108/JICV-03-2021-0002 doi: 10.1108/JICV-03-2021-0002
![]() |
[59] |
N. Lyu, Y. Wang, C. Wu, L. Peng, A. F. Thomas, Using naturalistic driving data to identify driving style based on longitudinal driving operation conditions, J. Intell. Connected Veh., 5 (2022), 17–35. https://doi.org/10.1108/JICV-07-2021-0008 doi: 10.1108/JICV-07-2021-0008
![]() |
[60] |
L. A. H. Hassan, M. Hewitt, H. S. Mahmassani, Daily load planning under different autonomous truck deployment scenarios, Transp. Res. Part E Logist. Transp. Rev., 166 (2022), 102885. https://doi.org/10.1016/j.tre.2022.102885 doi: 10.1016/j.tre.2022.102885
![]() |
[61] |
Y. Yang, B. Jia, X. Y. Yan, J. Li, Z. Yang, Z. Gao, Identifying intercity freight trip ends of heavy trucks from GPS data, Transp. Res. Part E Logist. Transp. Rev., 157 (2022), 102590. https://doi.org/10.1016/j.tre.2021.102590 doi: 10.1016/j.tre.2021.102590
![]() |
[62] |
M. G. Demissie, L. Kattan, Estimation of truck origin-destination flows using GPS data, Transp. Res. Part E Logist. Transp. Rev., 159 (2022), 102621. https://doi.org/10.1016/j.tre.2022.102621 doi: 10.1016/j.tre.2022.102621
![]() |
[63] |
R. Yan, S. Wang, Integrating prediction with optimization: models and applications in transportation management, Multimodal Transp., 1 (2022), 100018. https://doi.org/10.1016/j.multra.2022.100018 doi: 10.1016/j.multra.2022.100018
![]() |
[64] |
S. Wang, X. Tian, R. Yan, Y. Liu, A deficiency of prescriptive analytics—no perfect predicted value or predicted distribution exists, Electron. Res. Arch., 30 (2022), 3586–3594. https://doi.org/10.3934/era.2022183 doi: 10.3934/era.2022183
![]() |
[65] |
B. Niu, Z. Mu, B. Cao, J. Gao, Should multinational firms implement blockchain to provide quality verification?, Transp. Res. Part E Logist. Transp. Rev., 145 (2021), 102121. https://doi.org/10.1016/j.tre.2020.102121 doi: 10.1016/j.tre.2020.102121
![]() |
[66] |
S. Liu, G. Hua, Y. Kang, T. E. Cheng, Y. Xu, What value does blockchain bring to the imported fresh food supply chain?, Transp. Res. Part E Logist. Transp. Rev., 165 (2022), 102859. https://doi.org/10.1016/j.tre.2022.102859 doi: 10.1016/j.tre.2022.102859
![]() |
[67] |
T. M. Choi, T. Siqin, Blockchain in logistics and production from Blockchain 1.0 to Blockchain 5.0: an intra-inter-organizational framework, Transp. Res. Part E Logist. Transp. Rev., 160 (2022), 102653. https://doi.org/10.1016/j.tre.2022.102653 doi: 10.1016/j.tre.2022.102653
![]() |
[68] |
W. Yi, S. Wu, L. Zhen, G. Chawynski, Bi-level programming subsidy design for promoting sustainable prefabricated product logistics, Cleaner Logist. Supply Chain, 2021 (2021), 100005. https://doi.org/10.1016/j.clscn.2021.100005 doi: 10.1016/j.clscn.2021.100005
![]() |
[69] |
W. Yi, L. Zhen, Y. Jin, Stackelberg game analysis of government subsidy on sustainable off-site construction and low-carbon logistics, Cleaner Logist. Supply Chain, 2021 (2021), 100013. https://doi.org/10.1016/j.clscn.2021.100013 doi: 10.1016/j.clscn.2021.100013
![]() |
[70] |
S. Wang, R. Yan, A global method from predictive to prescriptive analytics considering prediction error for "predict, then optimize" with an example of low-carbon logistics, Cleaner Logist. Supply Chain, 4 (2022), 100062. https://doi.org/10.1016/j.clscn.2022.100062 doi: 10.1016/j.clscn.2022.100062
![]() |
[71] |
S. Wang, R. Yan, "Predict, then optimize" with quantile regression: a global method from predictive to prescriptive analytics and applications to multimodal transportation, Multimodal Transp., 1 (2022), 100035. https://doi.org/10.1016/j.multra.2022.100035 doi: 10.1016/j.multra.2022.100035
![]() |
[72] |
D. Huang, S. Wang, A two-stage stochastic programming model of coordinated electric bus charging scheduling for a hybrid charging scheme, Multimodal Transp., 1 (2022), 100006. https://doi.org/10.1016/j.multra.2022.100006 doi: 10.1016/j.multra.2022.100006
![]() |
1. | Liangliang Sun, Zhaoqi Zhang, Exponential Tikhonov Regularization Method for an Inverse Source Problem in a Sub-diffusion Equation, 2024, -1, 1027-5487, 10.11650/tjm/240901 | |
2. | Liangliang Sun, Yuxin Wang, Maoli Chang, A Fractional-order Quasi-reversibility Method to a Backward Problem for the Multi-term Time-fractional Diffusion Equation, 2023, 27, 1027-5487, 10.11650/tjm/230801 | |
3. | A. Oulmelk, L. Afraites, A. Hadri, M.A. Zaky, A.S. Hendy, Alternating direction multiplier method to estimate an unknown source term in the time-fractional diffusion equation, 2024, 156, 08981221, 195, 10.1016/j.camwa.2023.12.027 | |
4. | Ivan Polansky, Kirill Loginov, Optimal Nonlinear Filtering of Information Impact Estimates in a Stochastic Model of Information Warfare, 2023, 22, 2713-3206, 745, 10.15622/ia.22.4.2 | |
5. | Liangliang Sun, Zhaoqi Zhang, Yunxin Wang, The quasi-reversibility method for recovering a source in a fractional evolution equation, 2025, 1311-0454, 10.1007/s13540-025-00370-z |
timestep | approximation method | L2 error | L∞ error | run time |
Δt=1e−1 | GSM | 0.002121690 | 2.121690e-04 | 88.254s |
FDM | 0.010039748 | 0.001419834 | 1.341s | |
Δt=1e−2 | GSM | 4.382322e-05 | 4.382322e-06 | 90.043s |
FDM | 0.0085668512 | 0.001211535 | 10.076s | |
Δt=1e−3 | GSM | 8.535546e-07 | 8.535546e-08 | 90.622s |
FDM | 0.008536392 | 0.001207228 | 96.931s | |
Δt=1e−4 | GSM | 1.913459e-08 | 1.913459e-09 | 198.829s |
FDM | 0.008535798 | 0.001207144 | 1348.549s | |
Δt=1e−5 | GSM | 1.007804e-08 | 1.007804e-9 | 10834.238s |
FDM | 0.008535787 | 0.001207142 | 33733.606s |
ϵ | α | er(f,ε) |
ε=5% | (0.3,0.2,0.1) | 0.082339 |
(0.9,0.8,0.7) | 0.074294 | |
(0.6,0.5,0.3) | 0.059221 | |
ε=1% | (0.3,0.2,0.1) | 0.030306 |
(0.9,0.6,0.3) | 0.034862 | |
(0.6,0.5,0.3) | 0.049156 | |
ε=0.5% | (0.3,0.2,0.1) | 0.014814 |
(0.9,0.8,0.7) | 0.043858 | |
(0.6,0.5,0.3) | 0.043187 | |
ε=0.1% | (0.3,0.2,0.1) | 0.013495 |
(0.9,0.8,0.7) | 0.010624 | |
(0.6,0.5,0.3) | 0.013953 |
ε | α | er(f,ε) |
ε=1% | (0.3,0.2,0.1) | 0.085368 |
(0.9,0.8,0.7) | 0.092676 | |
(0.6,0.5,0.3) | 0.088179 | |
ε=0.5% | (0.3,0.2,0.1) | 0.076024 |
(0.9,0.8,0.7) | 0.082049 | |
(0.6,0.5,0.3) | 0.079423 | |
ε=0.1% | (0.3,0.2,0.1) | 0.073424 |
(0.9,0.8,0.7) | 0.0800324 | |
(0.6,0.5,0.3) | 0.077136 | |
ε=0.01% | (0.3,0.2,0.1) | 0.0652520 |
(0.9,0.8,0.7) | 0.066370 | |
(0.6,0.5,0.3) | 0.066352 |
ε | α | er(f,ε) |
ε=1% | (0.3,0.2,0.1) | 0.045909 |
(0.9,0.8,0.7) | 0.058139 | |
(0.6,0.5,0.3) | 0.058454 | |
ε=0.5% | (0.3,0.2,0.1) | 0.042321 |
(0.9,0.8,0.7) | 0.048615 | |
(0.6,0.5,0.3) | 0.047175 | |
ε=0.1% | (0.3,0.2,0.1) | 0.040261 |
(0.9,0.8,0.7) | 0.048302 | |
(0.6,0.5,0.3) | 0.046372 | |
ε=0.01% | (0.3,0.2,0.1) | 0.012787 |
(0.9,0.8,0.7) | 0.011516 | |
(0.6,0.5,0.3) | 0.011305 |
ε | α | er(f,ε) |
ε=10% | (0.3,0.2,0.1) | 0.100485 |
(0.9,0.8,0.7) | 0.111043 | |
(0.6,0.5,0.3) | 0.107902 | |
ε=5% | (0.3,0.2,0.1) | 0.093797 |
(0.9,0.8,0.7) | 0.068835 | |
(0.6,0.5,0.3) | 0.064510 | |
ε=1% | (0.3,0.2,0.1) | 0.072740 |
(0.9,0.8,0.7) | 0.073513 | |
(0.6,0.5,0.3) | 0.072786 | |
ε=0.1% | (0.3,0.2,0.1) | 0.034704 |
(0.9,0.8,0.7) | 0.037078 | |
(0.6,0.5,0.3) | 0.035328 |
method | ε=5% | ε=1% | ε=0.5% | ε=0.1% |
GSM (no regularization) | 0.2501 | 0.0832 | 0.0290 | 0.0079 |
GSM (regularization) | 0.0823 | 0.0303 | 0.0134 | 0.0148 |
FDM (no regularization) | 4.3792 | 0.7871 | 0.4036 | 0.0965 |
FDM (regularization) | 0.0301 | 0.0052 | 0.0025 | 6.273e-4 |
method | ||||
GSM (no regularization) | 0.0944 | 0.0635 | 0.0119 | 0.0010 |
GSM (regularization) | 0.0853 | 0.0760 | 0.0734 | 0.0652 |
FDM (no regularization) | 2.6407 | 1.220 | 0.2478 | 0.027 |
FDM (regularization) | 0.2043 | 0.0520 | 0.0208 | 0.0164 |
method | ||||
GSM (no regularization) | 0.4327 | 0.2868 | 0.0365 | 0.0126 |
GSM (regularization) | 0.0459 | 0.0423 | 0.0402 | 0.0127 |
FDM (no regularization) | 11.808 | 5.0791 | 1.4387 | 0.1025 |
FDM (regularization) | 0.0353 | 0.0239 | 0.0116 | 0.0102 |
method | ||||
GSM (no regularization) | 0.2924 | 0.0878 | 0.0425 | 0.0233 |
GSM (regularization) | 0.1004 | 0.0937 | 0.0727 | 0.0347 |
FDM (no regularization) | 2.79904 | 1.1476 | 0.2951 | 0.1435 |
FDM (regularization) | 0.1435 | 0.0846 | 0.0181 | 0.0014 |
ε | ‖G‖2 | ‖A−1‖2 | ‖A−1G‖2 |
0.05 | 0.356708 | 86.11457 | 0.369712 |
0.01 | 0.360401 | 86.11457 | 0.360933 |
0.005 | 0.360111 | 86.11457 | 0.360085 |
0.001 | 0.360341 | 86.11457 | 0.360345 |
0.0001 | 0.360348 | 86.11457 | 0.360348 |
ε | ‖D‖2 | ‖Z−1‖2 | ‖Z−1D‖2 |
0.05 | 7.0881 | 2.322e+02 | 27.8227 |
0.01 | 7.0743 | 2.322e+02 | 8.8667 |
0.005 | 7.0809 | 2.322e+02 | 7.5734 |
0.001 | 7.0804 | 2.322e+02 | 7.0929 |
0.0001 | 7.0796 | 2.322e+02 | 7.0712 |
ε | ‖G‖2 | ‖A−1‖2 | ‖A−1G‖2 |
0.01 | 0.013187 | 1.5104e+04 | 0.161897 |
0.005 | 0.013226 | 1.5104e+04 | 0.164711 |
0.001 | 0.013227 | 1.5104e+04 | 0.159407 |
0.0001 | 0.013228 | 1.5104e+04 | 0.159405 |
ε | ‖D‖2 | ‖Z−1‖2 | ‖Z−1D‖2 |
0.01 | 0.459280 | 3.9992e+04 | 76.739424 |
0.005 | 0.459857 | 3.9992e+04 | 27.761398 |
0.001 | 0.459380 | 3.9992e+04 | 7.957420 |
0.0001 | 0.459332 | 3.9992e+04 | 5.798087 |
timestep | approximation method | L2 error | L∞ error | run time |
Δt=1e−1 | GSM | 0.002121690 | 2.121690e-04 | 88.254s |
FDM | 0.010039748 | 0.001419834 | 1.341s | |
Δt=1e−2 | GSM | 4.382322e-05 | 4.382322e-06 | 90.043s |
FDM | 0.0085668512 | 0.001211535 | 10.076s | |
Δt=1e−3 | GSM | 8.535546e-07 | 8.535546e-08 | 90.622s |
FDM | 0.008536392 | 0.001207228 | 96.931s | |
Δt=1e−4 | GSM | 1.913459e-08 | 1.913459e-09 | 198.829s |
FDM | 0.008535798 | 0.001207144 | 1348.549s | |
Δt=1e−5 | GSM | 1.007804e-08 | 1.007804e-9 | 10834.238s |
FDM | 0.008535787 | 0.001207142 | 33733.606s |
ϵ | α | er(f,ε) |
ε=5% | (0.3,0.2,0.1) | 0.082339 |
(0.9,0.8,0.7) | 0.074294 | |
(0.6,0.5,0.3) | 0.059221 | |
ε=1% | (0.3,0.2,0.1) | 0.030306 |
(0.9,0.6,0.3) | 0.034862 | |
(0.6,0.5,0.3) | 0.049156 | |
ε=0.5% | (0.3,0.2,0.1) | 0.014814 |
(0.9,0.8,0.7) | 0.043858 | |
(0.6,0.5,0.3) | 0.043187 | |
ε=0.1% | (0.3,0.2,0.1) | 0.013495 |
(0.9,0.8,0.7) | 0.010624 | |
(0.6,0.5,0.3) | 0.013953 |
ε | α | er(f,ε) |
ε=1% | (0.3,0.2,0.1) | 0.085368 |
(0.9,0.8,0.7) | 0.092676 | |
(0.6,0.5,0.3) | 0.088179 | |
ε=0.5% | (0.3,0.2,0.1) | 0.076024 |
(0.9,0.8,0.7) | 0.082049 | |
(0.6,0.5,0.3) | 0.079423 | |
ε=0.1% | (0.3,0.2,0.1) | 0.073424 |
(0.9,0.8,0.7) | 0.0800324 | |
(0.6,0.5,0.3) | 0.077136 | |
ε=0.01% | (0.3,0.2,0.1) | 0.0652520 |
(0.9,0.8,0.7) | 0.066370 | |
(0.6,0.5,0.3) | 0.066352 |
ε | α | er(f,ε) |
ε=1% | (0.3,0.2,0.1) | 0.045909 |
(0.9,0.8,0.7) | 0.058139 | |
(0.6,0.5,0.3) | 0.058454 | |
ε=0.5% | (0.3,0.2,0.1) | 0.042321 |
(0.9,0.8,0.7) | 0.048615 | |
(0.6,0.5,0.3) | 0.047175 | |
ε=0.1% | (0.3,0.2,0.1) | 0.040261 |
(0.9,0.8,0.7) | 0.048302 | |
(0.6,0.5,0.3) | 0.046372 | |
ε=0.01% | (0.3,0.2,0.1) | 0.012787 |
(0.9,0.8,0.7) | 0.011516 | |
(0.6,0.5,0.3) | 0.011305 |
ε | α | er(f,ε) |
ε=10% | (0.3,0.2,0.1) | 0.100485 |
(0.9,0.8,0.7) | 0.111043 | |
(0.6,0.5,0.3) | 0.107902 | |
ε=5% | (0.3,0.2,0.1) | 0.093797 |
(0.9,0.8,0.7) | 0.068835 | |
(0.6,0.5,0.3) | 0.064510 | |
ε=1% | (0.3,0.2,0.1) | 0.072740 |
(0.9,0.8,0.7) | 0.073513 | |
(0.6,0.5,0.3) | 0.072786 | |
ε=0.1% | (0.3,0.2,0.1) | 0.034704 |
(0.9,0.8,0.7) | 0.037078 | |
(0.6,0.5,0.3) | 0.035328 |
method | ε=5% | ε=1% | ε=0.5% | ε=0.1% |
GSM (no regularization) | 0.2501 | 0.0832 | 0.0290 | 0.0079 |
GSM (regularization) | 0.0823 | 0.0303 | 0.0134 | 0.0148 |
FDM (no regularization) | 4.3792 | 0.7871 | 0.4036 | 0.0965 |
FDM (regularization) | 0.0301 | 0.0052 | 0.0025 | 6.273e-4 |
method | ||||
GSM (no regularization) | 0.0944 | 0.0635 | 0.0119 | 0.0010 |
GSM (regularization) | 0.0853 | 0.0760 | 0.0734 | 0.0652 |
FDM (no regularization) | 2.6407 | 1.220 | 0.2478 | 0.027 |
FDM (regularization) | 0.2043 | 0.0520 | 0.0208 | 0.0164 |
method | ||||
GSM (no regularization) | 0.4327 | 0.2868 | 0.0365 | 0.0126 |
GSM (regularization) | 0.0459 | 0.0423 | 0.0402 | 0.0127 |
FDM (no regularization) | 11.808 | 5.0791 | 1.4387 | 0.1025 |
FDM (regularization) | 0.0353 | 0.0239 | 0.0116 | 0.0102 |
method | ||||
GSM (no regularization) | 0.2924 | 0.0878 | 0.0425 | 0.0233 |
GSM (regularization) | 0.1004 | 0.0937 | 0.0727 | 0.0347 |
FDM (no regularization) | 2.79904 | 1.1476 | 0.2951 | 0.1435 |
FDM (regularization) | 0.1435 | 0.0846 | 0.0181 | 0.0014 |
ε | ‖G‖2 | ‖A−1‖2 | ‖A−1G‖2 |
0.05 | 0.356708 | 86.11457 | 0.369712 |
0.01 | 0.360401 | 86.11457 | 0.360933 |
0.005 | 0.360111 | 86.11457 | 0.360085 |
0.001 | 0.360341 | 86.11457 | 0.360345 |
0.0001 | 0.360348 | 86.11457 | 0.360348 |
ε | ‖D‖2 | ‖Z−1‖2 | ‖Z−1D‖2 |
0.05 | 7.0881 | 2.322e+02 | 27.8227 |
0.01 | 7.0743 | 2.322e+02 | 8.8667 |
0.005 | 7.0809 | 2.322e+02 | 7.5734 |
0.001 | 7.0804 | 2.322e+02 | 7.0929 |
0.0001 | 7.0796 | 2.322e+02 | 7.0712 |
ε | ‖G‖2 | ‖A−1‖2 | ‖A−1G‖2 |
0.01 | 0.013187 | 1.5104e+04 | 0.161897 |
0.005 | 0.013226 | 1.5104e+04 | 0.164711 |
0.001 | 0.013227 | 1.5104e+04 | 0.159407 |
0.0001 | 0.013228 | 1.5104e+04 | 0.159405 |
ε | ‖D‖2 | ‖Z−1‖2 | ‖Z−1D‖2 |
0.01 | 0.459280 | 3.9992e+04 | 76.739424 |
0.005 | 0.459857 | 3.9992e+04 | 27.761398 |
0.001 | 0.459380 | 3.9992e+04 | 7.957420 |
0.0001 | 0.459332 | 3.9992e+04 | 5.798087 |