Loading [MathJax]/jax/element/mml/optable/BasicLatin.js
Research article Special Issues

A Kato-type criterion for the inviscid limit of the nonhomogeneous NS equations with no-slip boundary condition

  • The objective of this paper is to examine the vanishing viscosity limit of the nonhomogeneous incompressible NS systerm, subject to the no-slip boundary condition. By adopting Kato's approach of constructing an artificial boundary layer [1], within a smooth and bounded domain designated as ΩR2, we derive a sufficient condition for the convergence to occur uniformly in time within the energy space L2(Ω).

    Citation: Shuai Xi. A Kato-type criterion for the inviscid limit of the nonhomogeneous NS equations with no-slip boundary condition[J]. Communications in Analysis and Mechanics, 2024, 16(4): 896-909. doi: 10.3934/cam.2024039

    Related Papers:

    [1] Yan Ling Fu, Wei Zhang . Some results on frames by pre-frame operators in Q-Hilbert spaces. AIMS Mathematics, 2023, 8(12): 28878-28896. doi: 10.3934/math.20231480
    [2] Gang Wang . Some properties of weaving K-frames in n-Hilbert space. AIMS Mathematics, 2024, 9(9): 25438-25456. doi: 10.3934/math.20241242
    [3] Sergio Verdú . Relative information spectra with applications to statistical inference. AIMS Mathematics, 2024, 9(12): 35038-35090. doi: 10.3934/math.20241668
    [4] Ligong Wang . Output statistics, equivocation, and state masking. AIMS Mathematics, 2025, 10(6): 13151-13165. doi: 10.3934/math.2025590
    [5] Cure Arenas Jaffeth, Ferrer Sotelo Kandy, Ferrer Villar Osmin . Functions of bounded (2,k)-variation in 2-normed spaces. AIMS Mathematics, 2024, 9(9): 24166-24183. doi: 10.3934/math.20241175
    [6] Chibueze C. Okeke, Abubakar Adamu, Ratthaprom Promkam, Pongsakorn Sunthrayuth . Two-step inertial method for solving split common null point problem with multiple output sets in Hilbert spaces. AIMS Mathematics, 2023, 8(9): 20201-20222. doi: 10.3934/math.20231030
    [7] Osmin Ferrer Villar, Jesús Domínguez Acosta, Edilberto Arroyo Ortiz . Frames associated with an operator in spaces with an indefinite metric. AIMS Mathematics, 2023, 8(7): 15712-15722. doi: 10.3934/math.2023802
    [8] Abdullah Ali H. Ahmadini, Amal S. Hassan, Ahmed N. Zaky, Shokrya S. Alshqaq . Bayesian inference of dynamic cumulative residual entropy from Pareto Ⅱ distribution with application to COVID-19. AIMS Mathematics, 2021, 6(3): 2196-2216. doi: 10.3934/math.2021133
    [9] Messaoud Bounkhel . V-Moreau envelope of nonconvex functions on smooth Banach spaces. AIMS Mathematics, 2024, 9(10): 28589-28610. doi: 10.3934/math.20241387
    [10] Jamilu Adamu, Kanikar Muangchoo, Abbas Ja'afaru Badakaya, Jewaidu Rilwan . On pursuit-evasion differential game problem in a Hilbert space. AIMS Mathematics, 2020, 5(6): 7467-7479. doi: 10.3934/math.2020478
  • The objective of this paper is to examine the vanishing viscosity limit of the nonhomogeneous incompressible NS systerm, subject to the no-slip boundary condition. By adopting Kato's approach of constructing an artificial boundary layer [1], within a smooth and bounded domain designated as ΩR2, we derive a sufficient condition for the convergence to occur uniformly in time within the energy space L2(Ω).



    In [13,14,15,16,19], it was proposed that insight into a probability distribution, μ, posed on a Hilbert space, H, could be obtained by finding a best fit Gaussian approximation, ν. This notion of best, or optimal, was with respect to the relative entropy, or Kullback-Leibler divergence:

    R(ν||μ)={Eν[logdνdμ],νμ,+,otherwise. (1.1)

    Having a Gaussian approximation provides qualitative insight into μ, as it provides a concrete notion of the mean and variance of the distribution. Additionally, this optimized distribution can be used in algorithms, such as random walk Metropolis, as a preconditioned proposal distribution to improve performance. Such a strategy can benefit a number of applications, including path space sampling for molecular dynamics and parameter estimation in statistical inverse problems.

    Observe that in the definition of R, (1.1), there is an asymmetry in the arguments. Were we to work with R(μ||ν), our optimal Gaussian would capture the first and second moments of μ, and in some applications this is desirable. However, for a multimodal problem (consider a distribution with two well separated modes), this would be inadequate; our form attempts to match individual modes of the distribution by a Gaussian. For a recent review of the R(ν||μ) problem, see [4], where it is remarked that this choice of arguments is likely to underestimate the dispersion of the distribution of interest, μ. The other ordering of arguments has been explored, in the finite dimensional case, in [2,3,10,18].

    To be of computational use, it is necessary to have an algorithm that will converge to this optimal distribution. In [15], this was accomplished by first expressing ν=N(m,C(p)), where m is the mean and p is a parameter inducing a well defined covariance operator, and then solving the problem,

    (m,p)argminR(N(m,C(p))||μ), (1.2)

    over an admissible set. The optimization step itself was done using the Robbins-Monro algorithm (RM), [17], by seeking a root of the first variation of the relative entropy. While the numerical results of [15] were satisfactory, being consistent with theoretical expectations, no rigorous justification for the application of RM to the examples was given.

    In this work, we emphasize the study and application of RM to potentially infinite dimensional problems. Indeed, following the framework of [15,16], we assume that μ is posed on the Borel σ-algebra of a separable Hilbert space (H,,,). For simplicity, we will leave the covariance operator C fixed, and only optimize over the mean, m. Even in this case, we are seeking mH, a potentially infinite-dimensional space.

    Given the objective function f:HH, assume that it has a root, x. In our application to relative entropy, f will be its first variation. Further, we assume that we can only observe a noisy version of f, F:H×χH, such that for all xH,

    f(x)=E[F(x,Z)]=χF(x,z)μZ(dz), (1.3)

    where μZ is the distribution associated with the random variable (r.v.) Z, taking values in the auxiliary space χ. The naive Robbins-Monro algorithm is given by

    Xn+1=Xnan+1F(Xn,Zn+1), (1.4)

    where ZnμZ, are independent and identically distributed (i.i.d.), and an>0 is a carefully chosen sequence. Subject to assumptions on f, F, and the distribution μZ, it is known that Xn will converge to x almost surely (a.s.), in finite dimensions, [5,6,17]. Often, one needs to assume that f grows at most linearly,

    f(x)c0+c1x, (1.5)

    in order to apply the results in the aforementioned papers. The analysis in the finite dimensional case has been refined tremendously over the years, including an analysis based on continuous dynamical systems. We refer the reader to the books [1,8,11] and references therein.

    As noted, much of the analysis requires the regression function f to have, at most, linear growth. Alternatively, an a priori assumption is sometimes made that the entire sequence generated by (1.4) stays in a bounded set. Both assumptions are limiting, though, in practice, one may find that the algorithms converge.

    One way of overcoming these assumptions, while still ensuring convergence, is to introduce trust regions that the sequence {Xn} is permitted to explore, along with a "truncation" which enforces the constraint. Such truncations distort (1.4) into

    Xn+1=Xnan+1F(Xn,Zn+1)+an+1Pn+1, (1.6)

    where Pn+1 is the projection keeping the sequence {Xn} within the trust region. Projection algorithms are also discussed in [1,8,11].

    We consider RM on a possibly infinite dimensional separable Hilbert space. This is of particular interest as, in the context of relative entropy optimization, we may be seeking a distribution in a Sobolev space associated with a PDE model. A general analysis of RM with truncations in Hilbert spaces can be found in [20]. The main purpose of this work is to adapt the analysis of [12] to the Hilbert space setting for two versions of the truncated problem. The motivation for this is that the analysis of [12] is quite straightforward, and it is instructive to see how it can be easily adapted to the infinite dimensional setting. The key modification in the proof is that results for Banach space valued martingales must be invoked. We also adapt the results to a version of the algorithm where there is prior knowledge on the location of the root. With these results in hand, we can then verify that the relative entropy minimization problem can be solved using RM.

    In some problems, one may have a priori information on the root. For instance, we may know that xU1, some open bounded set. In this version of the truncated algorithm, we have two open bounded sets, U0U1, and xU1. Let σ0=0 and X0U0 be given, then (1.6) can be formulated as

    ˜Xn+1=Xnan+1F(Xn,Zn+1) (1.7a)
    Xn+1={˜Xn+1˜Xn+1U1X(σn)0˜Xn+1U1 (1.7b)
    σn+1={σn˜Xn+1U1σn+1˜Xn+1U1 (1.7c)

    We interpret ˜Xn+1 as the proposed move, which is either accepted or rejected depending on whether or not it will remain in the trust region. If it is rejected, the algorithm restarts at X(σn)0U0. The restart points, {X(σn)0}, may be random, or it may be that X(σn)0=X0 is fixed. The essential property is that the algorithm will restart in the interior of the trust region, away from its boundary. The r.v. σn counts the number of times a truncation has occurred. Algorithm (1.7) can now be expressed as

    Xn+1=Xnan+1F(Xn,Zn+1)+Pn+1Pn+1={X(σn)0˜Xn+1}1˜Xn+1U1. (1.8)

    In the second version of truncated Robbins-Monro, define the sequence of open bounded sets, Un such that:

    U0U1U2,n=0Un=H. (1.9)

    Again, letting X0U0, σ0=0, the algorithm is

    ˜Xn+1=Xnan+1F(Xn,Zn+1) (1.10a)
    Xn+1={˜Xn+1˜Xn+1UσnX(σn)0˜Xn+1Uσn (1.10b)
    σn+1={σn˜Xn+1Uσnσn+1˜Xn+1Uσn (1.10c)

    A consequence of this formulation is that XnUσn for all n. As before, the restart points may be random or fixed, and they are in U0. This would appear superior to the fixed trust region algorithm, as it does not require knowledge of the sets. However, to guarantee convergence, global (in H) assumptions on the regression function are required; see Assumption 2 below. (1.10) can written with Pn+1 as

    Xn+1=Xnan+1F(Xn,Zn+1)+Pn+1Pn+1={X(σn)0˜Xn+1}1˜Xn+1Uσn (1.11)

    In Section 2, we state sufficient assumptions for which we are able to prove convergence in both the fixed and expanding trust region problems, and we also establish some preliminary results. In Section 3, we focus on the relative entropy minimization problem, and identify what assumptions must hold for convergence to be guaranteed. Examples are then presented in Section 4, and we conclude with remarks in Section 5.

    We first reformulate (1.8) and (1.15) in the more general form

    Xn+1=Xnan+1f(Xn)an+1δMn+1=˜Xn+1+an+1Pn+1, (2.1)

    where δMn+1, the noise term, is

    δMn+1=F(Xn,Zn+1)f(Xn)=F(Xn,Zn+1)E[F(Xn,Zn+1)Xn]. (2.2)

    A natural filtration for this problem is Fn=σ(X0,Z1,,Zn). Xn is Fn measurable and the noise term can be expressed in terms of the filtration as δMn+1=F(Xn,Zn+1)E[F(Xn,Zn+1)Fn].

    We now state our main assumptions:

    Assumption 1. f has a zero, x. In the case of the fixed trust region problem, there exist R0<R1 such that

    U0BR0(x)BR1(x)U1.

    In the case of the expanding trust region problem, the open sets are defined as Un=Brn(0) with

    0<r0<r1<r2<<rn. (2.3)

    These sets clearly satisfy (1.9).

    Assumption 2. For any 0<a<A, there exists δ>0:

    infaxxAxx,f(x)δ.

    In the case of the fixed truncation, this inequality is restricted to xU1. This is akin to a convexity condition on a functional F with f=DF.

    Assumption 3. xE[F(x,Z)2] is bounded on bounded sets, with the restriction to U1 in the case of fixed trust regions.

    Assumption 4. an>0, an=, and a2n<

    Theorem 2.1. Under the above assumptions, for the fixed trust region problem, Xnx a.s. and σn is a.s. finite.

    Theorem 2.2. Under the above assumptions, for the expanding trust region problem, Xnx a.s. and σn is a.s. finite.

    Note the distinction between the assumptions in the two algorithms. In the fixed truncation algorithm, Assumptions 2 and 3 need only hold in the set U1, while in the expanding truncation algorithm, they must hold in all of H. While this would seem to be a weaker condition, it requires identification of the sets U0 and U1 for which the assumptions hold. Such sets may not be readily identifiable, as we will see in our examples.

    We first need some additional information about f and the noise sequence δMn.

    Lemma 2.1. Under Assumption 3, f is bounded on U1, for the fixed trust region problem, and on arbitrary bounded sets, for the expanding trust region problem.

    Proof. Trivially,

    f(x)=E[F(x,Z)]E[F(x,Z)]E[F(x,Z)2],

    and the results follows from the assumption.

    Proposition 2.1. For the fixed trust region problem, let

    Mn=ni=1aiδMi.

    Alternatively, in the expanding trust region problem, for r>0, let

    Mn=ni=1aiδMi1Xi1xr.

    Under Assumptions 3 and 4, Mn is a martingale, converging in H, a.s.

    Proof. The following argument holds in both the fixed and expanding trust region problems, with appropriate modifications. We present the expanding trust region case. The proof is broken up into 3 steps:

    1. Relying on Theorem 6 of [7] for Banach space valued martingales, it will be sufficient to show that Mn is a martingale, uniformly bounded in L1(P).

    2. In the case of the expanding truncations,

    E[δMi1Xi1xr2]2E[F(Xi1,Zi)1Xi1xr2]+2E[f(Xi1)1Xi1xr2]2supxxrE[F(x,Z)2]+2supxxrf(x)2

    Since both of these terms are bounded, independently of i, by Assumption 3 and Lemma 1, this is finite.

    3. Next, since {δMi1Xi1xr} is a martingale difference sequence, we can use the above estimate to obtain the uniform L2(P) bound,

    E[Mn2]=ni=1a2iE[δMi1Xi1xr2]supiE[δMi1Xi1xr2]i=1a2i<

    Uniform boundedness in L2, gives boundedness in L1, and this implies a.s. convergence in H.

    In this section we prove results showing that only finitely many truncations will occur, in either the fixed or expanding trust region case. Recall that when a truncation occurs, the equivalent conditions hold: Pn+10; σn+1=σn+1; and ˜Xn+1U1 in the fixed trust region algorithm, while ˜Xn+1Uσn in the expanding trust region case.

    Lemma 2.2. In the fixed trust region algorithm, if Assumptions 1, 2, 3, and 4 hold, then the number of truncations is a.s. finite; a.s., there exists N, such that for all nN, σn=σN.

    Proof. We break the proof up into 7 steps:

    1. Pick ρ and ρ such that

    R0<ρ<ρ<R1 (2.4)

    Let ˉf=supf(x), with the supremum over U1; this bound exists by Lemma 1. Under Assumption 2, there exists δ>0 such that

    infR0/2xxR1xx,f(x)=δ. (2.5)

    Having fixed ρ, ρ, ˉf, and δ, take ϵ>0 such that:

    ϵ<min{ρR0,R1ρ2+ˉf,ρR0ˉf,R02,δ2ˉf,δˉf2,ρρ}. (2.6)

    Having fixed such an ϵ, by the assumptions of this lemma and Proposition 1, a.s., there exists nϵ such that for any n,mnϵ, both

    mk=nakδMkϵ,anϵ. (2.7)

    2. Define the auxiliary sequence

    Xn=Xnk=n+1akδMk. (2.8)

    Using (2.1), we can then write

    Xn+1=Xnan+1f(Xn)+an+1Pn+1. (2.9)

    By (2.7), for any nnϵ,

    XnXnϵ (2.10)

    3. We will show XnBρ(x) for all n large enough. The significance of this is that if nnϵ, and XnBρ(x), then no truncation occurs. Indeed, using (2.6)

    ˜Xn+1xXnx+XnXn+an+1ˉf+an+1δMn+1<ρ+ϵ+ϵˉf+ϵ<R1,˜Xn+1U1. (2.11)

    Consequently, Pn+1=0, Xn+1=˜Xn+1, and σn+1=σn. Thus, establishing XnBρ(x) will yield the result.

    4. Let

    N=inf{nnϵ˜Xn+1U1}+1 (2.12)

    This corresponds to the the first truncation after nϵ. If the above set is empty, for that realization, no truncations occur after nϵ, and we are done. In such a case, we may take N=nϵ in the statement of the lemma.

    5. We now prove by induction that in the case that (2.12) is finite, XnBρ(x) for all nN. First, note that XNBR0(x)Bρ(x). By (2.6) and (2.10),

    XNxXNx+XNXN<R0+ϵ<ρ,XNBρ(x).

    Next, assume XN,XN+1,,Xn are all in Bρ(x). Using (2.11), we have that PN+1==Pn+1=0 and σN==σn=σn+1. Therefore,

    Xn+1x2=Xnx22an+1Xnx,f(Xn)+a2n+1f(Xn)2Xnx22an+1Xnx,f(Xn)+an+1ϵˉf2 (2.13)

    We now consider two cases of (2.13) to conclude Xn+1x<ρ.

    6. In the first case, XnxR0. By Cauchy-Schwarz and (2.6)

    Xn+1x2<R20+2ϵR0ˉf+ϵ2ˉf2=(R0+ϵˉf)2<(ρ)2.

    In the second case, R0<Xnx<ρ. Dissecting the inner product term in (2.13) and using Assumption 2 and (2.10),

    Xnx,f(Xn)=Xnx,f(Xn)+XnXn,f(Xn)Xnx,f(Xn)ˉfϵ (2.14)

    Conditions (2.6) and (2.10) yield the following upper and lower bounds:

    XnxXnxXnXnR0ϵ>12R0,XnxXnx+XnXnρ+ϵ<ρ<R1.

    Therefore, (2.5) applies and Xnx,f(Xn)δ. Using this in (2.14), and condition (2.6),

    Xnx,f(Xn)δˉfϵ>12δ.

    Substituting this last estimate back into (2.13), and using (2.6),

    Xn+1x2<(ρ)2an+1(δϵˉf2)<(ρ)2.

    This completes the inductive step.

    7. Since the auxiliary sequence remains in Bρ(x) for all nN>nϵ, (2.11) ensures ˜Xn+1BR1(x), Pn+1=0, and σn+1=σN, a.s.

    To obtain a similar result for the expanding trust region problem, we first relate the finiteness of the number of truncations with the sequence persisting in a bounded set.

    Lemma 2.3. In the expanding trust region algorithm, if Assumptions 1, 3, and 4 hold, then the sequence remains in a set of the form BR(0) for some R>0 if and only if the number of truncations is finite, a.s.

    Proof. We break this proof into 4 steps:

    1. If the number of truncations is finite, then there exists N such that for all nN, σn=σN. Consequently, the proposed moves are always accepted, and XnUσn=UσN for all nN. Since XnUσnUσN for n<N, XnUσN for all n. By Assumption 3, BR(0)=BrσN(0)=UσN is the desired set.

    2. For the other direction, assume that there exists R>0 such that XnBR(0) for all n. Since the rn in (2.3) tend to infinity, there exists N1, such that R<R+1<rN1. Hence, for all nN1,

    BR(0)BR+1(0)Un (2.15)

    Let ˉf=supf(x), with the supremum over BR(0). Let ˜R be sufficiently large such that BR+1(0)B˜R(x). Lastly, using Proposition 1 and Assumption 4, a.s., there exists N2, such that for all nN2

    anδMn1Xnx˜R<12,an<12(1+ˉf) (2.16)

    Since XnBR(0)B˜R(x), the indicator function in (2.16) is always one, and anδMn<1/2.

    3. Next, let

    N=inf{n0σnmax{N1,N2}} (2.17)

    If the above set is empty, then σn<max{N1,N2} for all n, and the number of truncations is a.s. finite. In this case, the proof is complete.

    4. If the set in (2.17) is not empy, then N<. Take nN. As XnBR(0), and since nσnmax{N1,N2}, (2.16) applies. Therefore,

    ˜Xn+1Xn+˜Xn+1XnXn+an+1f(Xn)+an+1δMn+1<R+12+12<R+1. (2.18)

    Thus, ˜Xn+1BR+1(0)UN1, σnN1, and UN1Uσn. Therefore, ˜Xn+1Uσn. No truncation occurs, and σn=σn+1. Since this holds for all nN, σn=σN, and the number of truncations is a.s. finite.

    Next, we establish that, subject to an additional assumption, the sequence remains in a bounded set; the finiteness of the truncations is then a corollary.

    Lemma 2.4. In the expanding trust region algorithm, if Assumptions 1, 2, 3, and 4 hold, and for any r>0, there a.s. exists N<, such that for all nN,

    Pn+11Xnxr=0,

    then {Xn} remains in a bounded open set, a.s.

    Proof. We break this proof into 7 steps:

    1. We begin by setting some constants for the rest of the proof. Fix R>0 sufficiently large such that BR(x)U0. Next, let ˉf=supf(x) with the supremum taken over BR+2(x). Assumption 2 ensures there exists δ>0 such that

    infR/2xxR+2xx,f(x)=δ. (2.19)

    Having fixed R, ˉf, and δ, take ϵ>0 such that:

    ϵ<min{1,1ˉf,δ2ˉf,δˉf2,R2}. (2.20)

    By the assumptions of this lemma and Proposition 1 there exists, a.s., nϵN such that for all nnϵ,

    i=n+1aiδMi1Xi1xR+2ϵ, (2.21a)
    Pn+11XnxR+2=0, (2.21b)
    an+1ϵ (2.21c)

    2. Define the modified sequence for nnϵ as

    Xn=Xnk=n+1akδMk1Xk1xR+2,XnXnϵ. (2.22)

    Using (2.1), we have the iteration

    Xn+1=Xnan+1δMn+11Xnx>R+2an+1f(Xn)+an+1Pn+1. (2.23)

    3. Let

    N=inf{nnϵσn+1σn}+1, (2.24)

    the first time after nϵ that a truncation occurs.

    If the above set is empty, no truncations occur after nϵ. In this case, σn=σnϵnϵ< for all nnϵ. Therefore, for all nnϵ, XnUσnUσnϵ. Since UσnUσnϵ for all n<nϵ too, the proof is complete in this case.

    4. Now assume that N<. We will show that {Xn} remains in BR+1(x) for all nN. Were this to hold, then for nN,

    XnxXnx+i=n+1aiδMi1Xi1xR+2<R+1+ϵ<R+2, (2.25)

    having used (2.21) and (2.22). For n<N, XnUσnUσN=BrN(0). Therefore, for all n, XnB˜R(0) where ˜R=max{rN,x+R+2}.

    5. We prove XnBR+1(x) by induction. First, since ϵ<1 and XNU0BR(x),

    XNxXNXN+XNx<ϵ+R<R+1.

    Next, assume that XN,XN+1,,Xn are all in BR+1(x). By (2.25), XnBR+2(x). Since Pn+11XnxR+2=0, we conclude Pn+1=0. The modified iteration (2.23) simplifies to have

    Xn+1=Xnan+1f(Xn),

    and

    Xn+1x2=Xnx22an+1Xnx,f(Xn)+a2n+1f(Xn)2<Xnx22an+1Xnx,f(Xn)+an+1ϵˉf2. (2.26)

    We now consider two cases of (2.26). First, assume . Then (2.26) can immediately be bounded as

    where we have used condition (2.20) in the last inequality.

    Now consider the case . Using (2.20), the inner product in (2.26) can first be bounded from below:

    Next, using (2.20)

    Therefore, , so (2.19) ensures and

    Returning to (2.26), by (2.20),

    This completes the proof of the inductive step in this second case, completing the proof.

    Corollary 2.1. For the expanding trust region algorithm, if Assumptions 1, 2, 3, and 4 hold, then the number of truncations is a.s. finite.

    Proof. The proof is by contradiction. We break the proof into 4 steps:

    Assuming that there are infinitely many truncations, Lemma 3 implies that the sequence cannot remain in a bounded set. Then, continuing to assume that Assumptions 1, 2, 3, and 4 hold, the only way for the conclusion of Lemma 4 to fail is if the assumption on is false. Therefore, there exists and a set of positive measure on which a subsequence, . Hence , and . So truncations occur at these indices, and .

    Let with the supremum over the set and let satisfy

    (2.27)

    By our assumptions of the lemma and Proposition 1, there exists such that for all

    (2.28)

    Along the subsequence, for all ,

    (2.29)

    Furthermore, for :

    (2.30)

    where (2.27) has been used in the last inequality.

    By the definition of the , there exists an index such that . Let

    (2.31)

    This set is nonempty and since we have assumed there are infinitely many truncations. Let . Then and . But (2.30) then implies that , and no truncation will occur; , providing the desired the contradiction.

    Using the above results, we are able to prove Theorems 2.1 and 2.2. Since the proofs are quite similar, we present the more complicated expanding trust region case.

    Proof. We split this proof into 6 steps:

    First, by Corollary 1, only finitely many truncations occur. By Lemma 3, there exists such that for all . Consequently, there is an such that for all .

    Next, we fix constants. Let with the supremum taken over . Fix , and use Assumption 2 to determine such that

    (2.32)

    Take such that:

    (2.33)

    Having set , we again appeal to Assumption 4 and Proposition 1 to find such that for all :

    (2.34)

    Define the auxiliary sequence,

    (2.35)

    Since there are only finitely many truncations, there exists , such that for all , , as the truncations have ceased. Consequently, for ,

    (2.36)

    By (2.34) and (2.35), for , . Since may be arbitrarily small, it will be sufficient to prove .

    To obtain convergence of , we first examine . For ,

    (2.37)

    Now consider two cases of this expression. First, assume . In this case, using (2.33),

    (2.38)

    where is a constant depending only on and . For , using (2.33)

    (2.39)

    By (2.33),

    Since too, (2.32) and (2.39) yield the estimate

    Thus, in this regime, using (2.33),

    (2.40)

    where is a constant depending only on .

    Combining estimates (2.38) and (2.40), we can write for

    (2.41)

    We now show that i.o. The argument is by contradiction. Let be such that for all , . For such ,

    (2.42)

    Using Assumption 4 and taking , we obtain a contradiction.

    Finally, we prove convergence of . Since i.o., let

    (2.43)

    For , we can then define

    (2.44)

    For all such , , and .

    We claim that for ,

    First, if , this trivially holds in (2.41). Suppose now that . Then for , . Consequently,

    As ,

    Since may be arbitrarily small, we conclude that

    completing the proof.

    Recall from the introduction that our distribution of interest, , is posed on the Borel subsets of Hilbert space . We assume that , where is some reference Gaussian. Thus, we write

    (3.1)

    where , a Banach space, a subspace of , of full measure with respect to , a Gaussian on , assumed to be continuous. is the partition function ensuring we have a probability measure.

    Let , be another Gaussian, equivalent to , such that we can write

    (3.2)

    Assuming that , we can write

    (3.3)

    The assumption that implies that and are equivalent measures. As was proven in [16], if is a set of Gaussian measures, closed under weak convergence, such that at least one element of is absolutely continuous with respect to , then any minimizing sequence over will have a weak subsequential limit.

    If we assume, for this work, that , then, by the Cameron-Martin formula (see [9]),

    (3.4)

    Here, and are the inner product and norms of the Cameron-Martin Hilbert space, denoted ,

    (3.5)

    Convergence to the minimizer will be established in , and will be the relevant Hilbert space in our application of Theorems 2.1 and 2.2 to this problem.

    Letting and , we can then rewrite (3.3) as

    (3.6)

    The Euler-Lagrange equation associated with (3.6), and the second variation, are:

    (3.7)
    (3.8)

    In [15], it was suggested that rather than try to find a root of (3.7), the equation first be preconditioned by multiplying by ,

    (3.9)

    and a root of this mapping is sought, instead. Defining

    (3.10)
    (3.11)

    The Robbins-Monro formulation is then

    (3.12)

    with , i.i.d.

    We thus have

    Theorem 3.1. Assume:

    There exists such that .

    and exist for all .

    There exists , a local minimizer of , such that .

    The mapping

    (3.13)

    is bounded on bounded subsets of .

    There exists a convex neighborhood of and a constant , such that for all , for all ,

    (3.14)

    Then, choosing according to Assumption 4,

    If the subset can be taken to be all of , for the expanding truncation algorithm, a.s. in .

    If the subset is not all of , then, taking to be a bounded (in ) convex subset of , with , and any subset of such that there exist with

    for the fixed truncation algorithm, a.s. in .

    Proof. We split the proof into 2 steps:

    By the assumptions of the theorem, we clearly satisfy Assumptions 1 and 4. To satisfy Assumption 3, we observe that

    This is bounded on bounded subsets of .

    Per the convexity assumption, (3.14), implies Assumption 2, since, by the mean value theorem in function spaces,

    where is some intermediate point between and . This completes the proof.

    While condition (3.14) is sufficient to obtain convexity, other conditions are possible. For instance, suppose there is a convex open set containing and constant , such that for all ,

    (3.15)

    where is the principal eigenvalue of . Then this would also imply Assumption 2, since

    We mention (3.15) as there may be cases, shown below, for which the operator is obviously nonnegative.

    To apply the Robbins-Monro algorithm to the relative entropy minimization problem, the functional of interest must be examined. In this section we present a few examples, based on those presented in [15], and examine when the assumptions hold. The one outstanding assumption that we must make is that, a priori, is an equivalent measure to .

    Taking , the standard unit Gaussian, let be a smooth function such that

    (4.1)

    is a probability measure on . For these scalar cases, we use in place of . In the above framework,

    and .

    Consider the case that

    (4.2)

    In this case

    Since , all of our assumptions are satisfied and the expanding truncation algorithm will converge to the unique root at a.s. See Figure 1 for an example of the convergence at , , and always restarting at .

    Figure 1.  Robbins-Monro applied to a globally convex scalar problem associated with (4.2) with and expanding trust regions .

    We refer to this as a "globally convex'' problem since is globally convex about the minimizer.

    In contrast to the above problem, some mimizers are only "locally'' convex. Consider the case the double well potential

    (4.3)

    Now, the expressions for RM are

    In this case, vanishes at and , and changes sign from positive to negative when enters . We must therefore restrict to a fixed trust region if we want to ensure convergence to either of .

    We ran the problem at in two cases. In the first case, and the process always restarts at . This guarantees convergence since the second variation will be strictly postive. In the second case, , and the process always restarts at . Now, the second variation can change sign. The results of these two experiments appear in Figure 2. For some random number sequences the algorithm still converged to , even with the poor choice of trust region.

    Figure 2.  Robbins-Monro applied to the nonconvex scalar problem associated with (4.3). Figure (a) shows the result with a well chosen trust region, while (b) shows the outcome of a poorly chosen trust region.

    Take , with

    (4.4)

    equipped with Dirichlet boundary conditions on .* In this case the Cameron-Martin space , the standard Sobolev space equipped with the Dirichlet norm. Let us assume , taking values in .

    * This is the covariance of the standard unit Brownian bridge, .

    Consider the path space distribution on , induced by

    (4.5)

    where is a smooth function. We assume that is such that this probability distribution exists and that , our reference measure.

    We thus seek an valued function for our Gaussian approximation of , satisfying the boundary conditions

    (4.6)

    For simplicity, take , the linear interpolant between . As above, we work in the shifted coordinated .

    Given a path , by the Sobolev embedding, is continuous with its norm controlled by its norm. Also recall that for , in the case of ,

    (4.7)

    Letting be the ground state eigenvalue of ,

    The terms involving in the integrand can be controlled by the norm, which in turn is controlled by the norm, while the terms involving can be integrated according to (4.7). As a mapping applied to , this expression is bounded on bounded subsets of .

    Minimizers will satisfy the ODE

    (4.8)

    With regard to convexity about a minimizer, , if, for instance, were pointwise positive definite, then the problem would satisfy (3.15), ensuring convergence. Consider the quartic potential given by (4.2). In this case,

    (4.9)

    and

    Since , we are guaranteed convergence using expanding trust regions. Taking , and , this is illustrated in Figure 3, where we have also solved (4.8) by ODE methods for comparison. As trust regions, we take

    (4.10)
    Figure 3.  The mean paths computed for (4.9) at different resolutions, along with the truncation sequence.

    and we always restart at the zero solution Figure 3 also shows robustness to discretization; the number of truncations is relatively insensitive to .

    For many problems of interest, we do not have global convexity. Consider the double well potential (4.3), but in the case of paths,

    (4.11)

    Then,

    Here, we take , , and . We have plotted the numerically solved ODE in Figure 4. Also plotted is . Note that is not sign definite, becoming as small as . Since has , (3.15) cannot apply.

    Figure 4.  The numerically computed solution to (4.8) in the case of the double well, (4.11), , and the associated .

    Discretizing the Schrödinger operator

    (4.12)

    we numerically compute the eigenvalues. Plotted in Figure 5, we see that the minimal eigenvalue of is approximately . Therefore,

    (4.13)
    Figure 5.  The numerically computed spectrum for (4.12), associated with the shown in Figure 4. Also shown is the numerically computed spectrum for the path , which introduces negative eigenvalues.

    for all in some neighborhood of . For an appropriately selected fixed trust region, the algorithm will converge.

    However, we can show that the convexity condition is not global. Consider the path , which satisfies the boundary conditions. As shown in Figure 5, this path induces negative eigenvalues.

    Despite this, we are still observe convergence. Using the fixed trust region

    (4.14)

    we obtain the results in Figure 6. Again, the convergence is robust to discretization.

    Figure 6.  The mean paths computed for (4.11) at different resolutions, along with the truncation sequence.

    We have shown that the Robbins-Monro algorithm, with both fixed and expanding trust regions, can be applied to Hilbert space valued problems, adapting the finite dimensional proof of [12]. We have also constructed sufficient conditions for which the relative entropy minimization problem fits within this framework.

    One problem we did not address here was how to identify fixed trust regions. Indeed, that requires a tremendous amount of a priori information that is almost certainly not available. We interpret that result as a local convergence result that gives a theoretical basis for applying the algorithm. In practice, since the root is likely unknown, one might run some numerical experiments to identify a reasonable trust region, or just use expanding trust regions. The practitioner will find that the algorithm converges to a solution, though perhaps not the one originally envisioned. A more sophisticated analysis may address the convergence to a set of roots, while being agnostic as to which zero is found.

    Another problem we did not address was how to optimize not just the mean, but also the covariance in the Gaussian. As discussed in [15], it is necessary to parameterize the covariance in some way, which will be application specific. Thus, while the form of the first variation of relative entropy with respect to the mean, (3.7), is quite generic, the corresponding expression for the covariance will be specific to the covariance parameterization. Additional constraints are also necessary to guarantee that the parameters always induce a covariance operator. We leave such specialization as future work.

    This work was supported by US Department of Energy Award DE-SC0012733. This work was completed under US National Science Foundation Grant DMS-1818716. The authors would like to thank J. Lelong for helpful comments, along with anonymous reviewers whose reports significantly impacted our work.

    The authors declare that there is no conflicts of interest in this paper.



    [1] T. Kato, Remarks on the zero viscosity limit for nonstationary Navier-Stokes flows with boundary, Seminar on nonlinear partial differential equations, in Seminar on Nonlinear Partial Differential Equations (ed. S. S. Chern), Springer, New York, NY, (1984), 85–98. https://doi.org/10.1007/978-1-4612-1110-5_6
    [2] L. Prandtl, ber Flssigkeitsbewegungen bei sehr kleiner Reibung, In: "Verh. Int. Math. Kongr., Heidelberg 1904", Teubner, 1905.
    [3] R. Alexandre, Y. G. Wang, C. J. Xu, T. Yang, Well-posedness of the Prandtl equation in Sobolev spaces, J. Amer. Math. Soc., 28 (2015), 745–784. https://doi.org/10.1090/S0894-0347-2014-00813-4 doi: 10.1090/S0894-0347-2014-00813-4
    [4] R. E. Caflisch, M. Sammartino, Existence and singularities for the Prandtl boundary layer equation, Z. Angew. Math. Mech., 80 (2000), 733–744.
    [5] M. Cannone, M. C. Lombardo, M. Sammartino, Existence and uniqueness for the Prandtl equations, C. R. Acad. Sci. Paris Sr. I Math., 332 (2001), 277–282. https://doi.org/10.1016/S0764-4442(00)01798-5
    [6] M. C. Lombardo, M. Cannone, M. Sammartino, Well-posedness of the boundary layer equations, SIAM J. Math. Anal., 35 (2003), 987–1004. https://doi.org/10.1137/S0036141002412057 doi: 10.1137/S0036141002412057
    [7] N. Masmoudi, T. K. Wong, Local-in time existence and uniqueness of solutions to the Prandtl equation by energy methods, Comm. Pure Appl. Math., 68 (2015), 1683–1741. https://doi.org/10.1002/cpa.21595 doi: 10.1002/cpa.21595
    [8] O. A. Oleinik, V. N. Samokhin, Mathematical Models in Boundary Layer Theory, Applied Mathematics and Mathematical Computation, 15., Chapman & Hall/CRC, 1999.
    [9] M. Sammartino, R. E. Caflisch, Zero viscosity limit for analytic solutions of the Navier-Stokes equations on a half-space, Ⅰ. Existence for Euler and Prandtl equations, Comm. Math. Phys., 192 (1998), 433–461. https://doi.org/10.1007/s002200050304 doi: 10.1007/s002200050304
    [10] E. Weinan, B. Engquist, Blow up of solutions of the unsteady Prandtl equation, Comm. Pure Appl. Math., 50 (1997), 1287–1293.
    [11] Z. P. Xin, L. Zhang, On the global existence of solutions to the Prandtl system, Adv. Math., 181 (2004), 88–133. https://doi.org/10.1016/S0001-8708(03)00046-X doi: 10.1016/S0001-8708(03)00046-X
    [12] Y. Guo, T. T. Nguyen, Prandtl boundary layer expansions of steady Navier-Stokes flows over a moving plate, Ann. PDE, 3 (2017), 1–58. https://doi.org/10.1007/s40818-016-0020-6 doi: 10.1007/s40818-016-0020-6
    [13] C. J. Liu, Y. G. Wang, Stability of boundary layers for the nonisentropic nonhomogeneous circularly symmetric 2d flow, SIAM J. Math. Anal., 46 (2014), 256–309. https://doi.org/10.1137/130906507 doi: 10.1137/130906507
    [14] M. C. Lopes Filho, A. L. Mazzucato, H. J. Nussenzveig Lopes, M. Taylor, Vanishing viscosity limit and boundary layers for circularly symmetric 2d flows, Bull. Braz. Math. Soc. (N.S.), 39 (2008), 471–513. https://doi.org/10.1007/s00574-008-0001-9 doi: 10.1007/s00574-008-0001-9
    [15] Y. Maekawa, On the inviscid limit problem of the vorticity equations for viscous incompressible flows in the half plane, Comm. Pure Appl. Math., 67 (2014), 1045–1128. https://doi.org/10.1002/cpa.21516 doi: 10.1002/cpa.21516
    [16] M. Sammartin, R. E. Caflisch, Zero viscosity limit for analytic solutions of the Navier-Stokes equations on a half-space, Ⅱ. Construction of the NS solution, Comm. Math. Phys., 192 (1998), 463–491. https://doi.org/10.1007/s002200050305 doi: 10.1007/s002200050305
    [17] X. Wang, A Kato type theorem on zero viscoity limit of NS flows, Indiana Univ. Math. J., 50 (2001), 223–241. https://doi.org/10.1512/iumj.2001.50.2098 doi: 10.1512/iumj.2001.50.2098
    [18] J. P. Kelliher, On Kato's conditions for vanishing viscosity, Indiana Univ. Math. J., 56 (2007), 1711–1721. https://doi.org/10.1512/iumj.2007.56.3080 doi: 10.1512/iumj.2007.56.3080
    [19] Y. G. Wang, J. R. Yin, S.Y. Zhu, Vanishing viscosity limit for incompressible Navier-Stokes equations with Navier boundary conditions for small slip length, J. Math. Phy., 58 (2017), 101507. https://doi.org/10.1063/1.5004975 doi: 10.1063/1.5004975
    [20] S. A. Antontsev, A. V. Kazhikov, Mathematical Study of Flows of Nonhomogeneous Fluids, Novosibirsk State University, Novosibirsk, USSR, 1973.
    [21] R. Danchin, Density-dependent incompressible fluids in bounded domains, J. Math. Fluid Mech., 8 (2006), 333–381. https://doi.org/10.1007/s00021-004-0147-1 doi: 10.1007/s00021-004-0147-1
    [22] A. V. Kazhikov, Solvability of the initial-boundary value problem for the equations of the motion of an inhomogeneous viscous incompressible fluid, Dokl. Akad. Nauk., 216 (1974), 1008–1010.
    [23] O. Ladyzhenskaya, V. Solonnikov, Unique solvability of an initial-boundary value problem for viscous incompressible inhomogeneous fluids, J. Soviet Math., 9 (1978), 697–749. https://doi.org/10.1007/BF01085325 doi: 10.1007/BF01085325
    [24] H. Okamoto, On the equation of nonstationary stratified fluid motion: Uniqueness and existence of the solutions, J. Fac. Sci. Univ. Tokyo Sect. IA Math., 30 (1984), 615–643.
    [25] R. Salvi, The equations of viscous incompressible nonhomogeneous fluid: on the existence and regularity, J. Australian Math. Soc. Ser. B., 33 (1991), 94–110. https://doi.org/10.1017/S0334270000008651 doi: 10.1017/S0334270000008651
    [26] P. Braz e Silva, M. A. Rojas-Medar, E. J. Villamizar-Roa, Strong solutions for the nonhomogeneous Navier-Stokes equations in unbounded domains, Math. Methods Appl. Sci., 33 (2010), 358–372. https://doi.org/10.1002/mma.1178 doi: 10.1002/mma.1178
    [27] S. Itoh, A. Tani, Solvability of nonstationary problems for nonhomogeneous incompressible fluids and the convergence with vanishing viscosity, Tokyo J. Math., 22 (1999), 17–42. https://doi.org/10.3836/tjm/1270041610 doi: 10.3836/tjm/1270041610
    [28] L. C. F. Ferreira, G. Planas, E. J. Villamizar-Roa, On the Nonhomogeneous Navier-Stokes System with Navier Friction Boundary Conditions, SIAM J. Math. Anal., 45 (2013), 2576–2595. https://doi.org/10.1137/12089380X doi: 10.1137/12089380X
    [29] E. Feireisl, B. J. Jin, A. Novotný, Relative entropies, suitable weak solutions, and weak-strong uniqueness for the nonhomogeneous Navier-Stokes system, J. Math. Fluid Mech., 4 (2012), 717–730. https://doi.org/10.1007/s00021-011-0091-9 doi: 10.1007/s00021-011-0091-9
  • Reader Comments
  • © 2024 the Author(s), licensee AIMS Press. This is an open access article distributed under the terms of the Creative Commons Attribution License (http://creativecommons.org/licenses/by/4.0)
通讯作者: 陈斌, bchen63@163.com
  • 1. 

    沈阳化工大学材料科学与工程学院 沈阳 110142

  1. 本站搜索
  2. 百度学术搜索
  3. 万方数据库搜索
  4. CNKI搜索

Metrics

Article views(800) PDF downloads(51) Cited by(0)

Other Articles By Authors

/

DownLoad:  Full-Size Img  PowerPoint
Return
Return

Catalog