Processing math: 58%
Research article Special Issues

Solvability for some fourth order two-point boundary value problems

  • Some fourth-order two-point boundary value problems are considered in this paper. Firstly, the Green's function is obtained by the use of the Laplace transform. Secondly, the first eigenvalue is given by using Ritz method. Then, by the use of the properties of self-adjoint operators and the fixed point index theory, the existence of positive solutions is obtained. Finally, an example is given to illustrate the main results.

    Citation: Zhanbing Bai, Wen Lian, Yongfang Wei, Sujing Sun. Solvability for some fourth order two-point boundary value problems[J]. AIMS Mathematics, 2020, 5(5): 4983-4994. doi: 10.3934/math.2020319

    Related Papers:

    [1] Pakeeza Ashraf, Ghulam Mustafa, Husna A. Khan, Dumitru Baleanu, Abdul Ghaffar, Kottakkaran Sooppy Nisar . A shape-preserving variant of Lane-Riesenfeld algorithm. AIMS Mathematics, 2021, 6(3): 2152-2170. doi: 10.3934/math.2021131
    [2] Syed Ahmad Aidil Adha Said Mad Zain, Md Yushalify Misro . A novel technique on flexibility and adjustability of generalized fractional Bézier surface patch. AIMS Mathematics, 2023, 8(1): 550-589. doi: 10.3934/math.2023026
    [3] Qianghua Luo, Jieyan Wang . On the density of shapes in three-dimensional affine subdivision. AIMS Mathematics, 2020, 5(5): 5381-5388. doi: 10.3934/math.2020345
    [4] Salwa Syazwani Mahzir, Md Yushalify Misro, Kenjiro T. Miura . Preserving monotone or convex data using quintic trigonometric Bézier curves. AIMS Mathematics, 2024, 9(3): 5971-5994. doi: 10.3934/math.2024292
    [5] Qiaoping Li, Sanyang Liu . Predefined-time vector-polynomial-based synchronization among a group of chaotic systems and its application in secure information transmission. AIMS Mathematics, 2021, 6(10): 11005-11028. doi: 10.3934/math.2021639
    [6] Noor Adilla Harim, Samsul Ariffin Abdul Karim, Mahmod Othman, Azizan Saaban, Abdul Ghaffar, Kottakkaran Sooppy Nisar, Dumitru Baleanu . Positivity preserving interpolation by using rational quartic spline. AIMS Mathematics, 2020, 5(4): 3762-3782. doi: 10.3934/math.2020244
    [7] Beatriz Campos, Alicia Cordero, Juan R. Torregrosa, Pura Vindel . Dynamical analysis of an iterative method with memory on a family of third-degree polynomials. AIMS Mathematics, 2022, 7(4): 6445-6466. doi: 10.3934/math.2022359
    [8] Xiaomeng Zhu, Yangjiang Wei . Few-weight quaternary codes via simplicial complexes. AIMS Mathematics, 2021, 6(5): 5124-5132. doi: 10.3934/math.2021303
    [9] Abdul Majeed, Muhammad Abbas, Amna Abdul Sittar, Md Yushalify Misro, Mohsin Kamran . Airplane designing using Quadratic Trigonometric B-spline with shape parameters. AIMS Mathematics, 2021, 6(7): 7669-7683. doi: 10.3934/math.2021445
    [10] Abbarapu Ashok, Nadiminti Nagamani . Adaptive estimation: Fuzzy data-driven gamma distribution via Bayesian and maximum likelihood approaches. AIMS Mathematics, 2025, 10(1): 438-459. doi: 10.3934/math.2025021
  • Some fourth-order two-point boundary value problems are considered in this paper. Firstly, the Green's function is obtained by the use of the Laplace transform. Secondly, the first eigenvalue is given by using Ritz method. Then, by the use of the properties of self-adjoint operators and the fixed point index theory, the existence of positive solutions is obtained. Finally, an example is given to illustrate the main results.


    Subdivision schemes (SS) can precisely characterize smooth curves and surfaces from the given set of control points through iterative refinement. The most significant, influential, and extensively used technique of Computer Aided Geometric Design is the SS. The popularity of SSs is due to their effectiveness and simplicity. They play an important role in computer graphics due to their wide range of applications in several fields, including computer animation and the design of curves or surfaces. They are also essential for preserving the shape of data, geometric objects, and images in image processing. Recently, Liu et al. [1] reviewed the theory and applications of refinement schemes, which shows that refinement curves and surfaces are widely used in geometric modeling.

    SSs can be broadly classified into two primary categories: approximating and interpolating. Approximating schemes generate new control points during the refinement process, collectively shaping the limit curve without necessarily passing through the original control points. This approach often yields smoother curves with higher continuity orders. Interpolating schemes, on the other hand, ensure that the limit curve passes through the original control points. This provides more precise shape control and is commonly employed in engineering applications. One can achieve higher smoothness by using approximating schemes with smaller support, but interpolating schemes do not meet the requirement for smoothness [2]. The arity of an SS is the number of points inserted at a refinement level, say k+1, between two consecutive points from level k. The arity of a scheme directly affects the smoothness of the limit curves or surfaces. Higher arity schemes generally offer higher smoothness compared to lower arity schemes, making them essential for applications requiring fine geometric detailing. In [3], it has been proved that the large support and higher arity schemes may outperform the small support and lower arity schemes. Consequent to this, the research communities are interested in introducing higher arity schemes (i.e., quaternary) which give better results and less computational cost.

    Initial work on the subdivision was started by De Rham [4] when he presented a corner-cutting algorithm for curve modeling. Chaikin [5] was the second one who presented another corner cutting SS. They [6] defined a symmetric iterative interpolation process. Dyn [7] provides a foundational perspective on how Laurent polynomials can be applied to analyze subdivision schemes. The work by Dyn and Levin [8] on subdivision schemes has been highly influential in both theoretical research and practical applications in computer graphics and geometric design. The interpolating 4-point C2 ternary stationary subdivision scheme developed by Hassan et al. [9] and represents a significant advancement in subdivision methods, particularly for applications that demand high smoothness and accuracy in curve interpolation.

    The paper by Hongchan et al. [10] contributes a powerful tool to the field of geometric modeling, particularly in Computer Aided Design/Computer Aided Manufacturing applications. By combining the flexibility of ternary subdivision with adjustable control parameters, the authors provide a subdivision scheme that balances high smoothness with user-defined shape control. Mustafa et al. [11] presented a significant contribution to subdivision scheme theory by introducing an n-ary interpolating subdivision scheme with odd-point masks.

    Ghaffar et al. [12] makes a valuable contribution to subdivision scheme theory by presenting a flexible 4-point a-ary approximating scheme. This generalization allows designers to adjust the level of smoothness and computational demand, making the scheme adaptable to various applications in graphics and geometric modeling. Ashraf et al. [13] presented a significant advancement in subdivision schemes by introducing a nonstationary four-point ternary interpolating scheme that emphasizes shape preservation. The shape-preserving variant of the Lane-Riesenfeld algorithm introduced by Ashraf et al. [14] enhances the traditional algorithm by ensuring that specific geometric features are maintained throughout the refinement process. Finally, Zouaoui et al. [15] contributed to the field of subdivision schemes by introducing novel n-point ternary schemes that mitigate the Gibbs phenomenon, leading to smoother and more accurate curve approximations near sharp features.

    Mustafa and Khan [16] pioneered the exploration of a 4-point quaternary SS characterized by a single shape parameter, resulting in C3 limit curves. Ko [17] examined the convergence and regularity properties of a quaternary approximating SS by using the Laurent polynomials technique. An algorithm to introduce 3n-point quaternary approximation SS was developed by Bari et al. [18]. Using shape parameters, Pervez [19] proposed a 3-point approximation approach that shows continuity from C0 to C3. A generalized formula for 5-point approximating SS of any arity was created by Hussain et al. [20]. An algorithm for developing a novel 7-point quaternary approximation SS using shape parameters was developed by Nawaz et al. [21]. Yao et al. [22] showed interest in fractal and convexity analysis of a 4-point quaternary SS.

    Based on the literature review, we observe that a vast body of research has been dedicated to binary and ternary SSs. However, quaternary SSs have remained less explored. There is a room to define a family of quaternary approximating SSs showing diverse characteristics to meet the different requirements of end users. The introduction of a new family of quaternary SSs is fundamental because it provides an opportunity to improve the smoothness of the resulting curves without significantly increasing the computational complexity. High-arity schemes, such as quaternary schemes, strike a balance between smoothness and computational efficiency, making them particularly advantageous in applications where both are critical. The motivation behind introducing a new family of quaternary SSs stems from the need for increased smoothness and flexibility in designing curves. The development of such schemes with free shape parameters allows for adjustable smoothness and enhanced control over the generated geometry. Additionally, these schemes are crucial for eliminating undesirable features such as the Gibbs phenomenon, which causes oscillations near discontinuities in the limit function. Addressing this phenomenon is essential for improving the visual quality and accuracy of the generated curves in practical applications.

    In this study, we develop an explicit formula for building a family of quaternary approximating SSs. The formulae involve three parameters, in which one parameter plays the role of the shape control parameter and the rest of the two parameters identifies the different members of the proposed family and smoothness level of limit curves. The remainder of the paper is organized as follows: Section 2 provided basic concepts and preliminaries. In Section 3, we present the explicit formulae to create a family of m-point quaternary approximating SSs. The smoothness analysis of the proposed family of schemes is given in Section 4. In Section 5, polynomial generation and reproduction property of the proposed schemes is discussed. Section 6 presents theoretical and graphical analysis of the Gibbs phenomenon of the proposed family. A comparative analysis of the proposed schemes is presented in Section 7, followed by the conclusion in Section 8.

    A quaternary subdivision scheme δ can be defined in the term of mask consisting of a finite set of nonzero coefficients c={ci:iZ}, as follows

    qk+1i=jZci4jqkj,  iZ, jZ. (2.1)

    The number of points added between two successive control points from level k to k+1 indicates the arity of the SS. When 4 points are put in this instance, it is referred to as quaternary. An SS is said to be uniformly convergent, if for any initial data q0={q0i:iZ}, there exists a continuous function q, such that, for any closed interval IR, it satisfies convergent.

    limksupi4kI|qkiq(4ki)|=0.

    The limit function q is denoted by q=δq0. A symbol also called the Laurent polynomial of the mask c={ci:iZ}, of the scheme (2.1) is defined as C(z)=iZcizi. The Laurent polynomial of the convergent quaternary subdivision scheme satisfies the following conditions

    C(1)=4,C(e2ipπ4)=0,P=1,2,3.

    Definition 2.1. [23] Let g be a punctually discontinuous function and its sampling gh be defined by gih=g(ih). The Gibbs phenomenon in the refinement scheme deals with the convergence of (δgh) toward g when h goes to 0. It can be delimited by two properties:

    P1. Away from the discontinuity, the convergence is rather slow, and for any point x,

    |g(x)(δgh)(x)|=O(h).

    P2. There is an overstepped, close to discontinuity, that does not reduce with the reduction of h. Thus, maxxR|g(x)(δgh)(x)| does not tend to zero with h.

    Theorem 2.1. [24] Let g be any function defined by

    g(x)=g(x),gCn(],φ]),  xφ,g(x)=g+(x),g+Cn(],φ]),  xφ,

    with n2, 0φh, and g(φ)>g+(φ). Let δc be a univariate stationary refinement scheme with;

    ξ[k]t(i)={τic4τ+t[k],if i<0,0,if   i=0,τic4τ+t[k],if i>0,

    where c[k] defined as c(z)[k]=jZcj4i and 0t<4k. Then, if ξ[k]t(i)0 i,k, and if h is sufficiently small, we have the following two conditions:

    C1. If |x|max{|M12|,|M+N2+1|}h, then

    |g(x)(δcgh)|=O(hn),

    n2.

    C2. If |x|max{|M12|,|M+N2+1|}h, there exists βh=O(h) such that:

    g1,hβhg+(h)βh(Hc)(x)g(0)+βh=g0,h+βh.

    In this section, we present a new family of m-point QRS, known as (δα,θ,m) with a shape control parameter α. The family of the Laurent polynomials of the scheme δα,θ,m is defined as

    Cα,θ,m(z)=1zm(1+z+z2+z34)θ+1(4α(1+z4)+(z+z3)+2(14α)z2), (3.1)

    where θ=0,1,2,, and m=2,3,4,, identify the different subfamilies of δα,θ,m. Specifically, the parameter θ governs both the smoothness of the scheme and the number of points m in the subdivision rules. The value of m depends upon θ by the relation

    m=θ+32. (3.2)

    The relation (3.2) suggests that as θ increases, the smoothness of the scheme improves and m grows stepwise. The ceiling function a returns the largest integer greater than or equal to a. In this case, it ensures that m remains an integer, as the number of points in a refinement scheme cannot be fractional. By varying values of θ in (3.2), we get corresponding values of m to construct the subfamilies of δα,θ,m. Table 1 shows the set of values for m depending on θ.

    Table 1.  Set of values for m depending on θ.
    θ 0 1 2 3 4
    m 2 3 4 5 6

     | Show Table
    DownLoad: CSV

    A subfamily of 2-point schemes δα,0,2 can be derived by substituting θ=0 and m=2 in (3.1), which results in the following Laurent polynomial:

    Cα,0,2(z)=αz5+(14+α)z4+(34α)z3+(1α)z2+(1α)z+(34α)+(14+α)z1+αz2. (3.3)

    The Laurent polynomial (3.3) defines the refinement scheme δα,0,2, which is given by

    {qk+14i=(1α)qki+αqki+1,qk+14i+1=(34α)qki+(14+α)qki+1,qk+14i+2=(14+α)qki+(34α)qki+1,qk+14i+3=αqki+(1α)qki+1. (3.4)

    Remark 3.1. δ78,0,2 coincides with the scheme proposed in [25].

    By setting θ=1 and m=3 in (3.1), we generate a sub-family of 3-point schemes δα,1,3. The Laurent polynomial of δα,1,3 is as follows:

    Cα,1,3(z)=14αz7+(116+12α)z6+(14+14α)z5+12z4+(3412α)z3+(78α)z2+(3412α)z+12+(14+14α)z1+(116+12α)z2+14αz3. (3.5)

    The refinement scheme δα,1,3 corresponding to the Laurent polynomial (3.5) is given by

    {qk+14i=12qki+12qki+1,qk+14i+1=(14+14α)qki+(3412α)qki+1+14qki+2,qk+14i+2=(116+12α)qki+(78α)qki+1+(116+12α)qki+2,qk+14i+3=14qki+(3412α)qki+1+(14+14α)qki+2. (3.6)

    By substituting θ=2 and m=4 in (3.1), we establish a subfamily of 4-point schemes δα,2,4, which leads to the Laurent polynomial

    Cα,2,4(z)=116αz9+(164+316α)z8+(564+14α)z7+(1364+14α)z6+(2564+116α)z5+(1932516α)z4+(233212α)z3+(233212α)z2+(1932516α)z+(2564+116α)+(1364+14α)z1+(564+14α)z2+(164+316α)z3+116αz4. (3.7)

    The refinement scheme δα,2,4 linked with the Laurent polynomial (3.7) is described below

    {qk+14i=(1364+14α)qki+(233212α)qki+1+(564+14α)qki+2,qk+14i+1=(564+14α)qki+(233212α)qki+1+(1364+14α)qki+2,qk+14i+2=(164+316α)qki+(1932516α)qki+1+(2564+116α)qki+2+116αqki+3,qk+14i+3=116αqki+(2564+116α)qki+1+(1932516α)qki+2+(164+316α)qki+3. (3.8)

    By setting θ=3 and m=5 in (3.1), we drive a subfamily of 5-point schemes δα,3,5, which results in the following Laurent polynomial:

    Cα,3,5(z)=164αz11+(1256+116α)z10+(3128+18α)z9+(19256+316α)z8+(1164+316α)z7+(81256+116α)z6+(6112818α)z5+(155256516α)z4+(21321316α)z3+(155256516α)z2+(6112818α)z+(81256+116α)+(1164+316α)z1+(19256+316α)z2+(3128+18α)z3+(1256+116α)z4+164αz5. (3.9)

    The refinement scheme δα,3,5 corresponding to the Laurent polynomial (3.9) is given by

    {qk+14i=(19256+316α)qki+(155256516α)qki+1+(81256+116α)qki+2+(1256+116α)qki+3,qk+14i+1=(3128+18α)qki+(6112818α)qki+1+(6112818α)qki+2+(3128+18α)qki+3,qk+14i+2=(1256+116α)qki+(81256+116α)qki+1+(155256516α)qki+2+(19256+316α)qki+3,qk+14i+3=164αqki+(1164+316α)qki+1+(21321316α)qki+2+(1164+316α)qki+3+164αqki+4. (3.10)

    Remark 3.2. δ1116,3,5 coincides with the scheme proposed in [26], when μ=1120.

    By proceeding with the same process for further values of θ and its corresponding exponent m>5, we can obtain new subfamilies of δα,θ,m.

    The fundamental criteria for selecting an optimal refinement scheme are its convergence, smoothness, and support width of the limit function. Here, we focus on the investigation of the convergence and smoothness of δα,θ,m, with a specific emphasis on its alignment with the given conditions.

    For a given refinement scheme δc, let δc1 be the associated refinement scheme for the divided differences of the primary points, ensuring that it satisfies

    Dqk+1=δc1Dqk,

    where qk=δkcq0 and (Dqk)i=4k(qki+1qki). The symbol associated with the difference scheme δc1 is given by

    C1(z)=4z31+z+z2+z3C(z),

    where C(z) is the symbol associated with the scheme δc. Now, we recall some celebrated results for evaluating the convergence and smoothness of a refinement scheme.

    Theorem 4.1. [16] Let δc and δc1 be the refinement schemes with the symbols C(z) and C1(z), respectively. Then, the scheme δc is uniformly convergent (i.e., C0) if, and only if, there exist an integer s>0 such that (14δa1)s<1.

    Furthermore, to evaluate smoothness of the scheme δc, we have the following result:

    Theorem 4.2. [16] Let δc and δc1 be the refinement schemes with the symbols C(z) and C1(z) respectively, such that

    C(z)=(1+z+z2+z34z3)nC1(z).

    If the scheme δc1 is contractive, then the scheme δc is Cn for any initial data.

    Now, we are ready to present the main results of this section for the convergence and smoothness of the subfamilies of the scheme δα,θ,m.

    Theorem 4.3. The subfamilies of δα,θ,m presented in (3.4), (3.6), (3.8), and (3.10), converge when α(14,12), (74,94), (138,198), and (5716,7116), respectively.

    Proof. The family of Laurent polynomials of the scheme δα,θ,m given in (3.1) can be expressed as

    Cα,θ,m(z)=(1+z+z2+z34z3)dα,θ,m(z),

    where

    dα,θ,m(z)=z3m(1+z+z2+z34)θ(4α(1+z4)+(z+z3)+2(14α), (4.1)

    is the Laurent polynomial of the first-order divided difference of the scheme δα,θ,m.

    Case-Ⅰ: For the convergence of the subfamily δα,0,2, we use θ=0 and m=2 in (4.1) and have

    dα,0,2(z)=4αz5+z4+(28α)z3+z2+4αz.

    Thus, the mask of the scheme δdα,0,2, which is related to the Laurent polynomial dα,0,2(z), is {4α,1,(28α),1,4α}, since it can be easily verified that for α(14,12),

    14δdα,0,2=14max{2|4α|,|1|,|28α|}<1.

    Thus, the subfamily δα,0,2 converges when α(14,12).

    Case-Ⅱ: For the convergence of the subfamily δα,1,3, we use θ=1 and m=3 in (4.1) and have

    dα,1,3(z)=αz9+(14+α)z8+(34α)z7+(1α)z6+(1α)z5+(34α)z4+(14+α)z3+αz2.

    Thus, the mask of the scheme δdα,1,3, which is related to the Laurent polynomial dα,1,3(z), is

    {α,(14+α),(34α),(1α),(1α),(34α),(14+α),α}.

    It can be easily verified that for α(74,94),

    14δdα,1,3=14max{|α|+|(1α)|,|(14+α)|+|(34α)|}<1.

    Thus, the subfamily δα,1,3 converges when α(74,94).

    Case-Ⅲ: For the convergence of the subfamily δα,2,4, we use θ=2 and m=4 in (4.1) and have

    dα,2,4(z)={14αz9+(116+12α)z8+(14+14α)z7+12z6+(3412α)z5+(78α)z4+(3412α)z3+12z2+(14+14α)z+(116+12α)+14αz1}.

    Thus, the mask of the scheme δdα,2,4 corresponding to the Laurent polynomial dα,2,4(z), is

    {14α,(116+12α),(14+14α),12,(3412α),(78α),(3412α),12,(14+14α),(116+12α),14α}.

    It is evident that for α(74,94)

    14δdα,2,4=14max{|14α|+|(3412α)|+|(14+14α)|,|(116+12α)|+|(78α)|+|(116+12α)|,1}<1.

    Thus, the subfamily δα,1,3 converges when α(74,94).

    Case-Ⅳ: For the convergence of the subfamily δα,3,5, we use θ=3 and m=5 in (4.1) and have

    dα,3,5(z)=116αz11+(164+316α)z10+(564+14α)z9+(1364+14α)z8+(2564+116α)z7+(1932516α)z6+(233212α)z5+(233212α)z4+(1932516α)z3+(2564+116α)z2+(1364+14α)z+(564+14α)+(164+316α)z1+116αz2.

    Thus, the mask of the scheme δα,3,5, which is related to the Laurent polynomial dα,3,5(z), is

    {116α,(164+316α),(564+14α),(1364+14α),(2564+116α),(1932516α),(233212α),(233212α),(1932516α),(2564+116α),(1364+14α),(564+14α),(164+316α),116α}.

    It is clear that for α(5716,7116),

    14δdα,3,5=14max{|116α|+|2564+116α|+|1932516α|+|164+316α|,|1364+14α|+|233212α|+|564+14α|}<1.

    Thus, the subfamily δα,3,5 converges when α(5716,7116).

    The smoothness of a refinement scheme depends upon its continuity. The following result shows that the family of schemes δα,θ,m maintains a level of Cθ continuity.

    Theorem 4.4. The family of schemes δα,θ,m has smoothness Cθ α(14,12).

    Proof. The family of the Laurent polynomials (3.1) can be expressed as

    Cα,θ,m(z)=(1+z+z2+z34z3)θdα,θ,m(z),

    where

    dα,θ,m(z)=4z3θ+3m{α+14z+(122α)z2+14z3+αz4}. (4.2)

    Thus, the mask of the scheme δdα,θ,m corresponding to the Laurent polynomial dα,θ,m(z) is {4α,1,(28α),1,4α}. It can be easily verified that for α(14,12),

    14δdα,θ,m14max{2|4α|,|1|,|28α|}<1.

    Thus, the δα,θ,m is Cθ when α(14,12).

    Hölder regularity is an extension of the notion of continuity which gives more information for subdivision schemes like these, rather than just quoting the number of derivatives that converge. A function φ:RR is defined to be regular of order τ+α (for τN0 and 0<α1) if it is τ times continuously differentiable and φτ is Lipschitz of order α, i.e.,

    |φ(τ)(v+h)φ(τ)(v)|c|h|α,

    for all v and h in R and some constant c.

    Continuity of a subdivision curve is defined by just saying that if the nth derivative of a curve exists everywhere in an interval and it is continuous, then the curve is said to be Cn continuous in that interval. However, the Hölder regularity of a subdivision curve is a measure of how many derivatives are continuous, and of how continuous the highest continuous derivative is. Therefore, Hölder regularity is essential to determine the overall smoothness characteristics of the schemes. According to Riouls method [27], the Hölder regularity of the δα,θ,m can be computed as follows:

    Theorem 4.5. The Hölder regularity of the family of the schemes δα,θ,m is

    Rθ={θlog4(122α), if14<α<18,θlog4(2α), if    18<α<12,θ+1,  ifα=18.

    Proof. Hölder regularity is the extended continuity of a refinement scheme. Using the Rioul's approach [27], the δα,θ,m has Hölder regularity Rθ=θ+ψG, for all G1, where ψG is determined by

    4GψG=(14δdα,θ,m)G.

    The proof of the Theorem 4.4, indicates that

    14δdα,θ,m={122α,  if 14<α<18,2α, if     18<α<12,14,   if α=18.

    For G=1, we have

    η={log4(122α),  if 14<α<18,log4(2α),  if     18<α<12,1,   if α=18.

    Hence, the Hölder regularity of the scheme δα,θ,m is

    Rθ={θlog4(122α),  if 14<α<18,θlog4(2α),  if     18<α<12,θ+1,   if α=18.

    The support of a subdivision scheme represents the area of the limit curve affected by the displacement of a single control point from its initial place. The support of a refinement scheme reflects the effect of local control on its limiting curves. For the sake of computations, we only discuss the support of the first family member δα,0,2 in detail. The support of the rest of the family members can be easily calculated on the same principles.

    Lemma 4.1. When we apply the δα,0,2 scheme to the initial data,

    q0i={1,i=0,0,i0. (4.3)

    Following the initial subdivision step, the nonzero points are q14, q13, , q12, q13.

    Lemma 4.2. Applying the δα,0,2 scheme to the initial data as in (4.3) and then following the second refinement step, the nonzero points are q220, q219, , q214, q215.

    Lemma 4.3. When we apply the δα,0,2 scheme with the initial data as in (4.3), after the third subdivision step, the points with nonzero values are q384, q383, , q362, q363.

    We choose not to include the support derivation due to its obviousness.

    Theorem 4.6. The support of δα,0,2 is 73, which implies that it vanishes outside the interval [76,76].

    Proof. By using the result of Lemmas 4.1, 4.2, and 4.3, we prove the above result. Consider a set

    Gk={j4k:jZ},

    so that

    ϑ(j4k)=qkj,jZ.

    Using Lemma 4.1, we can deduce that if we apply the δα,0,2 scheme on the initial data, the position of the first nonzero point on the left after the initial subdivision step is

    q14=ϑ(44),

    and the last nonzero point on the right is

    q13=ϑ(34).

    Based on Lemma 4.2, it follows that when we use the δα,0,2 scheme for the initial data, the position of the first nonzero point on the left after second subdivision step is as follows

    q220=q24(1+4)=ϑ(4(1+4)42),

    and the last nonzero point on the right is

    q215=q23(1+4)=ϑ(3(1+4)42).

    Similarly, from Lemma 4.3, if we apply δα,0,2 scheme to the initial data, the position of the first nonzero point on the left after the third subdivision step is

    q384=q34(1+4+42)=ϑ(4(1+4+42)43),

    and the last nonzero point on the right is

    q363=q33(1+4+42)=ϑ(3(1+4+42)43).

    Continuing this procedure, the position of the first nonzero point on the left after the k-th subdivision step is

    qk4(1+4++4k1)=ϑ(4(1+4++4k1)4k),

    and the last nonzero point on the right is

    qk3(1+4++4k1)=ϑ(3(1+4++4k1)4k).

    The difference between the nonzero points on the left and right after the k-th subdivision step is

    l=[3(1+4++4k1)4k4(1+4++4k1)4k]=[3(1+4++4k1)4k+4(1+4++4k1)4k]=[(3+4)(1+4++4k14k)]=[74(1+14+142++14k1)].

    Since 14<1, the sum of the geometric sequence allows us to determine the accumulated extent on each side. Consequently, we deduce that as we approach the limit, the complete impact of the initial non-zero vertex will progressively spread further along.

    74(k1j=014j)=74(1114)=73.

    Hence, the support width is 73, which implies that it vanishes outside the interval [76,76].

    Figure 1 shows basic limit curves generated by δ18,θ,m for θ=0,,4 and m=2,,6, respectively.

    Figure 1.  Basic limit curves generated by δα,θ,m at α=18.

    In Table 2, we summarize the continuity and support of the δα,θ,m schemes.

    Table 2.  Continuity and support of δα,θ,m.
    Scheme Continuity Support
    δα,1,3 C1 when α(14,12) 10/3
    δα,2,4 C2 when α(14,12) 13/3
    δα,3,5 C3 when α(14,12) 16/3
    δα,4,6 C4 when α(14,12) 19/3

     | Show Table
    DownLoad: CSV

    The generation and the reproduction of polynomials are two significant features of a refinement scheme. The generation degree is the highest degree of polynomials that a refinement scheme can produce during its iterative process and the reproduction degree is the highest degree of polynomials that a refinement scheme can precisely reproduce. Let us recall some basic results regarding polynomial generation and reproduction.

    Definition 5.1. [28] Let p0={p(n):nZ} where pΠd with dN0. We say that a stationary subdivision scheme δ reproduces polynomials in d, if δ is convergent and p=δp0. Also, the subdivision scheme δ is said to be d-generating if δp0d.

    Definition 5.2. [29] For a refinement scheme δc, we denote by τ=C(1)4, the corresponding parametric shift and attach the data qkn for nN,kN to the parameter values.

    xkn=xk0+n4kwithxk0=xk10τ4k. (5.1)

    Theorem 5.1. [30] A convergent subdivision scheme δ with any arity r2 reproduces polynomials of degree d1, with respect to the parametrization in (5.1) if, and only if,

    jZjkcmj+i=(τim)k, i=0,1,,m1, for k=1,2,,d, (5.2)

    where τ=C(1)r.

    Theorem 5.2. [31] A convergent subdivision scheme that reproduces polynomial Pn has an approximation order of n+1.

    In the case of a QRS (where m=4), (5.2) takes the form as

    {jZjkc4j=(τ4)k,jZjkc4j+1=(τ14)k,jZjkc4j+2=(τ24)k,jZjkc4j+3=(τ34)k, (5.3)

    for k=1,2,,d, and τ=Cα,θ,m(1)4. Now we are ready to present the main results of this section.

    Theorem 5.3. The family of δα,θ,m schemes generates polynomials up to degree θ.

    Proof. The family of Laurent polynomials (3.1), can be expressed as

    Cα,θ,m(z)=(1+z+z2+z3)(θ+1)dα,θ,m(z),

    where

    dα,θ,m(z)=α+14z+(122α)z2+14z3+αz44θzm.

    Since dα,θ,m(1)=14θ, the family of δα,θ,m schemes generates polynomials up to degree θ.

    Theorem 5.4. The subfamily δα,0,2 reproduces a linear polynomial when α=18.

    Proof. From (3.3), the Laurent polynomial of the scheme δα,0,2 is given by

    Cα,0,2(z)=5j=2cjzj=αz5+(14+α)z4+(34α)z3+(1α)z2+(1α)z+(34α)+(14+α)z1+αz2. (5.4)

    Differentiating (5.4) and then evaluating at z=1 leads us to Cα,0,2(1)=6 and τ=32. By simplifying (5.3) for τ=32, we get the system as given below:

    {(1)kc4=(38)k,(1)kc5=(18)k,(1)kc2=(18)k,(1)kc1=(38)k. (5.5)

    Since (5.5) is verified for k=1, the scheme δα,0,2 reproduces the linear polynomials.

    Corollary 5.1. The subfamily δα,0,2 has approximation order 2.

    Theorem 5.5. The subfamily δα,1,3 reproduces linear polynomial α(74,94).

    Proof. From (3.3), the Laurent polynomial of the scheme δα,1,3 is given by

    Cα,1,3(z)=7j=3cjzj=14αz7+(116+12α)z6+(14+14α)z5+12z4+(3412α)z3+(78α)z2+(3412α)z+12+(14+14α)z1+(116+12α)z2+14αz3. (5.6)

    Differentiating (5.6) and then evaluating at z=1 leads us to cα,1,3(1)=8 and, thus, τ=4. By simplifying (5.3) for τ=4, we get the system as given below:

    {c4=(12)k,(1)kc3+c5=(14)k,(1)kc2+c6=0,(1)kc1+c7=(14)k. (5.7)

    Since (5.7) is verified only for k=1, α(74,94), thus the scheme δα,1,3 reproduces the linear polynomials.

    Corollary 5.2. The subfamily δα,1,3 has approximation order 2, α(74,94).

    Theorem 5.6. The subfamily δα,2,4 reproduces linear polynomial α(138,198).

    Proof. From (3.7), the Laurent polynomial of the scheme δα,2,4 is given by

    Cα,2,4(z)=9j=4cjzj=116αz9+(164+316α)z8+(564+14α)z7+(1364+14α)z6+(2564+116α)z5+(1932516α)z4+(233212α)z3+(233212α)z2+(1932516α)z+(2564+116α)+(1364+14α)z1+(564+14α)z2+(164+316α)z3+116αz4. (5.8)

    Differentiating (5.8) and then evaluating at z=1 leads us to Cα,2,4(1)=10 and τ=52. By simplifying (5.3) for τ=52, we get the system as given below

    {c4+(2)kc8=(58)k,(1)kc3+c5+(2)kc9=(38)k,(1)kc2+c6+(2)kc10=(18)k,(1)kc1+c7=(18)k. (5.9)

    Since (5.9) is verified for k=1, α(74,94), thus the scheme δα,2,4 reproduces the linear polynomials.

    Corollary 5.3. The subfamily of the schemes δα,2,4 has approximation order 2, α(74,94).

    Theorem 5.7. The subfamily of the schemes δα,3,5 reproduces linear polynomial α(138,198).

    Proof. From (3.7), the Laurent polynomial of the scheme δα,3,5 is given by

    Cα,3,5(z)=11j=5cjzj=164αz11+(1256+116α)z10+(3128+18α)z9+(19256+316α)z8+(1164+316α)z7+(81256+116α)z6+(6112818α)z5+(155256516α)z4+(21321316α)z3+(155256516α)z2+(6112818α)z+(81256+116α)+(1164+316α)z1+(19256+316α)z2+(3128+18α)z3+(1256+116α)z4+164αz5. (5.10)

    Differentiating (5.10) and then evaluating at z=1 leads us to Cα,2,4(1)=14 and τ=72. By simplifying (5.3) for τ=72, we get the system as given below:

    {(1)kc4+c4+(2)kc8=(34)k,(1)kc3+c5+(2)kc9=(12)k,(1)kc2+c6+(2)kc10=(14)k,(2)kc5+(1)kc1+c7+(2)kc11=0. (5.11)

    Since (5.11) is verified for k=1, α(74,94), thus the scheme δα,3,5 reproduces the linear polynomials.

    Corollary 5.4. The subfamily δα,3,5 has approximation order 2, α(74,94).

    Similarly, by using the same process, we get the polynomial reproduction degree and approximation order of the rest of the family members as given in Table 3.

    Table 3.  Polynomial generation/reproduction and Approximation order of δα,θ,m.
    Scheme Degree of PG Degree of PR AO
    δα,1,3 1 1 when α(74,94) 2
    δα,2,4 2 1 when α=0 2
    δα,3,5 3 3 when α=1116 4
    δα,4,6 4 3 when α=2732 4

     | Show Table
    DownLoad: CSV

    For better understanding, we display the graphical representation of the polynomial reproduction property.

    Example 5.1. In this example, we use a linear polynomial f(x) to obtain the initial control points

    f(x)=2x+1,x(0,18). (5.12)

    We evaluate the property of polynomial reproduction. The graphical representation in Figure 2ae illustrates the behavior of δα,θ,m with α=18.

    Figure 2.  The limit functions obtained by using a linear polynomial. The results shown in (a)(e) are obtained by δα,θ,m, for α=1/8.

    Example 5.2. In this example, we use a cubic polynomial g(x) to obtain the initial control points

    g(x)=x3,x(0,6). (5.13)

    We evaluate the property of polynomial reproduction. The graphical representation in Figure 3a, c and Figure 3b, d illustrates the behavior of δα,θ,m for θ=3, α=1116 and θ=4, α=2732 respectively.

    Figure 3.  The limit functions obtained by the scheme δα,θ,m, employing the cubic polynomial specified in (5.13), for the values of α=27/32.

    This section focuses on the analysis of the Gibbs phenomenon in the curves generated by the scheme δα,θ,m. The Gibbs phenomenon refers to a mathematical phenomenon that occurs when attempting to approximate a sharp jump or discontinuity in a function using a Fourier series, leading to persistent overshoot or oscillations near the discontinuity. Eliminating these oscillations is crucial for improving accuracy, visual quality, and overall performance of a subdivision scheme. To address this, we evaluate the characteristics of the masks in these subdivision schemes by applying appropriate criteria (as given in [24]), including partial sums of the nonnegative masks, to determine whether Gibbs oscillations occur near discontinuities. Recently, a family of 7-point binary subdivision schemes derived in [32] similarly addresses the Gibbs phenomenon. The transition from a binary to a quaternary framework allows our family of m-point schemes to encompass a wider variety of subdivision behaviors. This generalization demonstrates that the same principles for avoiding the Gibbs phenomenon apply effectively across different types of schemes, including both binary and quaternary settings.

    Theorem 6.1. The subfamily δα,0,2 does not produce Gibbs oscillations close to the discontinuity for α[0,).

    Proof. By Theorem 2.1, a stationary refinement scheme avoids the Gibbs phenomenon occurring near a discontinuity if

    ξ[k]t(i)0 i,k, (6.1)

    where

    ξ[k]t(i)={τic[k]4τ+t,if i<0,0,    if i=0,τic[k]4τ+t,if i>0, (6.2)

    and, 0t<4k.

    The Laurent polynomial of δα,0,2 is

    Cα,θ,m(z)=5j=2cjzj. (6.3)

    Without loss of generality, we focus on the case where k=1, as the coefficients of the subdivision scheme do not depend on k, simplifying the analysis without affecting the generality of the results. Therefore, by setting k=1 and substituting c[1]j=cj for j=2,1,,5, in (6.2), we obtain

    ξ[1]t(i)={τic[1]4τ+t,if i<0,0,  if i=0,τic[1]4τ+t,if i>0, (6.4)

    where 0t4. Thus, for t=0, we get

    ξ[1]0(i)={τic[1]4τ,if i<0,0,     if i=0,τic[1]4τ,if i>0. (6.5)

    By substituting i=1,0,1 in (6.5), we have

    ξ[1]0(1),ξ[1]0(0),ξ[1]0(1)0α[0.25,). (6.6)

    Similarly for t=1, (6.4) becomes

    ξ[1]1(i)={τic[1]4τ+1,if i<0,0,     if i=0,τic[1]4τ+1,if i>0. (6.7)

    By taking i=1,0,1 in (6.7), we get

    ξ[1]1(1),ξ[1]1(0),ξ[1]1(1)0α[0,). (6.8)

    Similarly for t=2, (6.4) becomes

    ξ[1]2(i)={τic[1]4τ+2,if i<0,0,     if i=0,τic[1]4τ+2,if i>0. (6.9)

    By taking i = -1, 0, 1 in (6.9), we get

    \begin{equation} \xi_{2}^{[1]}(-1), \xi_{2}^{[1]}(0), {\xi_{2}^{[1]}}(1)\geq 0 \quad \forall \quad \alpha\in [ 0, \infty). \end{equation} (6.10)

    Finally for t = 3 , (6.4) takes the form

    \begin{equation} {\xi_{3}^{[1]}}(i) = \begin{cases} \sum\nolimits_{\tau \leq i}{c_{4\tau+3}^{[1]}}, \quad {\text{if}} \ i < 0, \\ 0, \quad\quad\quad\quad \ \ \ \ \ {\text{if}} \ i = 0, \\ \sum\nolimits_{\tau \geq i}{c_{4\tau+3}^{[1]}}, \quad {\text{if}}\ i > 0. \end{cases} \end{equation} (6.11)

    By taking i = -1, 0, 1 in (6.11), we get

    \begin{equation} \xi_{3}^{[1]}(-1), \xi_{3}^{[1]}(0), {\xi_{3}^{[1]}}(1)\geq 0 \quad \forall \quad \alpha\in [-0.25, \infty). \end{equation} (6.12)

    By combining (6.6), (6.8), (6.10), and (6.12), we conclude that the subfamily of the schemes \delta_{_{\alpha, 0, 2}} does not exhibit the Gibbs phenomenon \forall \alpha\in[0, \infty) .

    Similarly, by using same the process to find the interval where Gibbs phenomenon does not appear, we get the following results of other {\delta_{_{\alpha, \theta, m}}} schemes given in Table 4.

    Table 4.  Absence of Gibbs phenomenon for some value of \alpha .
    Scheme Range for absence of Gibbs phenomenon
    {\delta_{_{\alpha, 1, 3}}} \alpha\in [0, \infty)
    {\delta_{_{\alpha, 2, 4}}} \alpha\in \left[0, \frac{39}{8}\right]
    {\delta_{_{\alpha, 3, 5}}} \alpha\in \left[0, \frac{39}{8}\right]
    {\delta_{_{\alpha, 4, 6}}} \alpha\in \left[0, \frac{751}{132}\right]

     | Show Table
    DownLoad: CSV

    We present some figures which graphically demonstrate the smoothness of the proposed schemes. These figures are created by applying the proposed schemes to different open and closed polygons. We offer numerical illustrations of continuous functions. We also provide some numerical examples of discontinuous functions after eliminating the Gibbs phenomenon for some particular choice of parameter.

    Example 6.1 In this example, we derive the initial control points by utilizing a continuous and discontinuous function f(x) and g(x) , respectively,

    \begin{eqnarray} f(x) = x^{2}\sin(x), \quad x \in (-10, 10), \end{eqnarray} (6.13)

    and

    \begin{equation} g(x) = \begin{cases} \tan(x), \quad \text{ if } x < -\frac{\pi}{2}, \\ \tan(x), \quad \ \text{ if } -\frac{\pi}{2} < x < \frac{\pi}{2}, \\ \tan(x), \quad \text{ if } x > \frac{\pi}{2}. \end{cases} \end{equation} (6.14)

    In Figure 4, the black dotted lines depict the original control polygon, while the black solid circles represent the initial control points. The solid red lines illustrate the behavior of the proposed SS when \alpha = \frac{1}{8} . Figure 4a visualizes the C^{0} limit curves produced by \delta_{\frac{1}{8}, 0, 2} . Figure 4b exhibits the C^{1} limit curves generated by \delta_{\frac{1}{8}, 1, 3} . Figure 4c displays the C^{2} limit curves resulting from \delta_{\frac{1}{8}, 2, 4} . Figure 4d showcases the C^{3} limit curves produced by \delta_{\frac{1}{8}, 3, 5} . Lastly, Figure 4e demonstrates the C^{4} limit curves created by \delta_{\frac{1}{8}, 4, 6} . Figure 4fj provides a comprehensive overview of the behavior of \delta_{\frac{1}{8}, \theta, m} for \theta = 0, \ldots, 4 and m = 2, \dots, 6 , respectively. The observed results indicate that the limit function does not exhibit Gibbs oscillations near the discontinuity. This is an important finding, as it suggests that the function maintains stability and smoothness even in the presence of discontinuities.

    Figure 4.  The limit functions obtained by the scheme {\delta_{_{\alpha, \theta, m}}} , using the continuous function (left) given in (6.13) and discontinuous function (right) described in (6.14), for specific value of \alpha = 1/8 .

    Example 6.2. In this example, we give a comparison of the behavior of the scheme {\delta_{_{\alpha, 0, 2}}} to the Gibbs phenomenon for different values of \alpha . For this, we consider the initial data from a discontinuous function f(x)

    \begin{equation} f(x) = \begin{cases} \sin(\pi x), \quad \quad\text{ if } 0\leq x\leq0.5, \\ -\sin(\pi x), \quad \ \text{ if } 0.5 < x < 1. \end{cases} \end{equation} (6.15)

    In Figure 5, the black dotted lines depict the original control polygon, while the black solid circles represent the initial control points. The solid blue lines illustrate the behavior of the scheme {\delta_{_{\alpha, 0, 2}}} . Figure 5a shows the limit curve produced by {\delta_{_{\alpha, 0, 2}}} at \alpha = -\frac{1}{5} and the Figure 5b exhibits the limit curve generated by {\delta_{_{\alpha, 0, 2}}} at \alpha = \frac{3}{7} . As seen in Figure 5a, the scheme {\delta_{_{\alpha, 0, 2}}} fails to avoid the Gibbs phenomenon when the value of \alpha a does not satisfy the constraints outlined in Theorem 6.1.

    Figure 5.  Gibbs phenomenon: The limit curves obtained by the scheme {\delta_{_{\alpha, 0, 2}}} , using the discontinuous function given in (6.15), at different values of \alpha .

    In this section, we deal with the visual performance of the proposed schemes {\delta_{_{\alpha, 0, 2}}} , {\delta_{_{\alpha, 1, 3}}} , {\delta_{_{\alpha, 2, 4}}} , {\delta_{_{\alpha, 3, 5}}} , and {\delta_{_{\alpha, 4, 6}}} . The proposed schemes offer higher continuity C^{\theta} and create smooth limit curves. Hence, it provides great flexibility for the designers to create smooth curves according to their requirements. We present some figures which graphically demonstrate the smoothness of the proposed schemes. These figures are created by applying the proposed schemes to different closed polygons.

    Example 7.1. In this example, we showcase the approximating behavior of {\delta_{_{\alpha, 0, 2}}} on a closed control polygon for various \alpha values. Figure 6a illustrates this behavior for \alpha = \frac{3}{32} . Figure 6bd corresponds to \alpha = \frac{1}{4} , \frac{5}{16} , and \frac{19}{64} , respectively.

    Figure 6.  Behavior of limit curves generated by {\delta_{_{\alpha, 0, 2}}} for the different values of \alpha . The dotted line represents the original closed polygon and the solid circles represent the initial control points.

    Example 7.2. In this example, we present the approximating behavior of {\delta_{_{\alpha, 1, 3}}} on a closed control polygon for different values of \alpha . Figure 7a illustrates the behavior of {\delta_{_{\alpha, 1, 3}}} when \alpha = \frac{1}{6} . Figure 7bd corresponds to \alpha = \frac{1}{4} , \frac{1}{8} , and \frac{1}{12} , respectively.

    Figure 7.  Behavior of limit curves generated by {\delta_{_{\alpha, 1, 3}}} for the different values of \alpha . The dotted line represents the original closed polygon and the solid circles represent the initial control points.

    Example 7.3. In this example, we express the approximating behavior of {\delta_{_{\alpha, 2, 4}}} on an open polygon for different values of \alpha . Figure 8a depicts the behavior of {\delta_{_{\alpha, 2, 4}}} when \alpha = \frac{1}{8} . Figure 8bd illustrates the behaviors of {\delta_{_{\alpha, 2, 4}}} for \alpha = \frac{5}{16} , \frac{13}{32} , and \frac{19}{64} , respectively.

    Figure 8.  Behavior of limit curves generated by {\delta_{_{\alpha, 2, 4}}} for the different values of \alpha . The dotted line represents the original closed polygon and the solid circles represent the initial control points.

    Example 7.4. In this example, we present the approximating behavior of {\delta_{_{\alpha, 3, 5}}} on a closed control polygon for different values of \alpha . Figure 9a depicts the behavior of {\delta_{_{\alpha, 3, 5}}} when \alpha = \frac{1}{8} . Figure 9bd illustrates the behavior of {\delta_{_{\alpha, 3, 5}}} for \alpha = \frac{5}{16} , \frac{13}{32} , and -\frac{5}{32} , respectively.

    Figure 9.  Behavior of limit curves generated by {\delta_{_{\alpha, 3, 5}}} for the different values of \alpha . The dotted line represents the original closed polygon and the solid circles represent the initial control points.

    Example 7.5. In this example, we examine the approximating behavior of {\delta_{_{\alpha, 4, 6}}} on a closed control polygon across various values of \alpha . Figure 10a illustrates the behavior of {\delta_{_{\alpha, 4, 6}}} when \alpha = \frac{1}{8} . Figure 10bd represents the behaviors of {\delta_{_{\alpha, 4, 6}}} for \alpha = \frac{5}{16} , \frac{13}{32} , and -\frac{5}{32} , respectively.

    Figure 10.  Behavior of limit curves generated by {\delta_{_{\alpha, 4, 6}}} for the different values of \alpha . The dotted line represents the original closed polygon and the solid circles represent the initial control points.

    In this section, we provide a comparative analysis of our proposed schemes and discuss that the proposed schemes coincide with existing schemes in Table 5.

    Table 5.  Comparison of {\delta_{_{\alpha,\theta,m}}}, where AO stands for approximation order.
    m -point Scheme Continuity Support AO Coincide with
    2 {\delta_{_{\alpha, 0, 2}}} C^{0} 7/3 2 scheme [25]
    3 {\delta_{_{\alpha, 1, 3}}} C^{1} 10/3 2
    4 {\delta_{_{\alpha, 2, 4}}} C^{2} 13/3 2
    5 {\delta_{_{\alpha, 3, 5}}} C^{3} 16/3 4 scheme [26]
    6 {\delta_{_{\alpha, 4, 6}}} C^{4} 19/3 4 scheme [20]
    \vdots \vdots \vdots
    m {\delta_{_{\alpha, \theta, m}}} C^{\theta}

     | Show Table
    DownLoad: CSV

    Figure 11 illustrates the comparison of limit curves produced by {\delta_{_{\alpha, \theta, m}}} for different values of \alpha .

    Figure 11.  Comparison of limit curves generated by {\delta_{_{\alpha, \theta, m}}} for the different values of \alpha . (a) : \alpha = \frac{13}{32} (blue), \frac{1}{8} (red), -\frac{1}{16} (purple), and -\frac{5}{32} \ (green) , (b) : \alpha = \frac{13}{32} (brown), \frac{1}{8} (navy blue), -\frac{1}{16} (red), and -\frac{5}{32} \ (black) , (c) : \alpha = \frac{13}{32} (purple), \frac{1}{8} (red), -\frac{1}{16} (navy blue), -\frac{5}{32} \ (brown), and -\frac{6}{25} (blue) . (d) - (f) illustrate the magnification factor. The dotted line represents the original closed polygon and the solid circles represent the initial control points.

    In this paper, we have introduced a family of m-point quaternary approximating subdivision schemes that offer flexibility and enhanced control through the use of a shape control parameter and two additional parameters determining smoothness. Our analysis has demonstrated the versatility of these schemes in generating smooth curves, with the ability to adjust the smoothness and shape of the limit curves by varying the parameters. The study thoroughly examined the polynomial generation and reproduction capabilities of the proposed schemes, establishing their readiness in practical applications.

    Furthermore, we addressed the Gibbs phenomenon, both theoretically and graphically, showcasing the ability of our schemes to minimize unwanted oscillations near discontinuities. A comparative study with existing schemes has confirmed the effectiveness of the proposed approach, particularly in terms of improving smoothness and control. These findings suggest that our family of m-point quaternary subdivision schemes is well-suited for applications in computer graphics and geometric modeling, where smoothness and flexibility are critical.

    Reem K. Alhefthi1: Formal analysis, Software, funding acquisition; Pakeeza Ashraf: Validation, Methodology, Writing–review & editing; Ayesha Abid: Resources, Writing–review & editing; Shahram Rezapour, Abdul Ghaffar: Software, Writing–review & editing; Mustafa Inc: Writing– review & editing, supervision. All authors have read and agreed to the published version of the manuscript.

    The authors would like to extend their sincere appreciation to the Researchers Supporting Project number (RSPD2024R802), King Saud University, Riyadh, Saudi Arabia.

    All authors declare no conflicts of interest in this paper.



    [1] Z. Bai, The method of lower and upper solutions for a bending of an elastic beam equation, J. Math. Anal. Appl., 248 (2000), 195-202. doi: 10.1006/jmaa.2000.6887
    [2] G. Bonanno, B. Bella, D. O'Regan, Non-trivial solutions for nonlinear fourth-order elastic beam equations, Comput. Math. Appl., 62 (2011), 1862-1869. doi: 10.1016/j.camwa.2011.06.029
    [3] Y. Li, Positive solutions of fourth-order boundary value problems with two parameters, J. Math. Anal. Appl., 281 (2003), 477-484. doi: 10.1016/S0022-247X(03)00131-8
    [4] R. Ma, J. Zhang, S. Fu, The method of lower and upper solutions for fourth-order two-point boundary value problems, J. Math. Anal. Appl., 215 (1997), 415-422. doi: 10.1006/jmaa.1997.5639
    [5] Y. Wei, Q. Song, Z. Bai, Existence and iterative method for some fourth order nonlinear boundary value problems, Appl. Math. Lett., 87 (2019), 101-107. doi: 10.1016/j.aml.2018.07.032
    [6] Q. Yao, The positive solution of singular beam equation with simple support at both ends, Adv. Math. China, 5 (2009), 590-598.
    [7] Q. Yao, Existence and multiplicity of positive solutions to a class of elastic beam equations, J. Shandong Univ., 5 (2004), 64-67. (in Chinese)
    [8] Q. Yao, Y. Li, Existence theorem for a class of nonlinear elastic beam equations, J. South China Univ. Tech., 37 (2006), 124-127. (in Chinese)
    [9] D. Zhao, H. Wang, J. Wang, Existence of three positive solutions for a class of singular beam equations with corner angles and bending moments, Acta. Math. Appl. Sinica, 34 (2011), 813-821. (in Chinese)
    [10] Z. Bai, Z. Du, S. Zhang, Iterative method for a class of fourth-order p-Laplacian beam equation, J. Appl. Anal. Comput., 9 (2019), 1443-1453.
    [11] F. Zhu, L. Liu, Y. Wu, Positive solutions for systems of a nonlinear fourth-order singular semipositone boundary value problems, Comput. Math. Appl., 15 (2010), 448-457.
    [12] R. Agarwal, Y. Chow, Iterative methods for a fourth order boundary value problem, J. Comput. Appl. Math., 10 (1984), 203-217. doi: 10.1016/0377-0427(84)90058-X
    [13] R. Ma, X. Wu, Existence of multiple positive solutions for a class of fourth-order two-point boundary value problems, Acta Math. Sci., 22A (2002), 244-249. (in Chinese)
    [14] X. Wu, R. Ma, Existence of multiple positive solutions for a class of fourth-order two-point boundary value problems, Acta Anal. Funct. Appl., 2 (2000), 342-348. (in Chinese)
    [15] J. Caballero, J. Harjani, K. Sadarangani, Uniqueness of positive solutions for a class of fourth-order boundary value problems, Abstr. Appl. Anal., 2011 (2011), 1-13.
    [16] D. Guo, V. Lakshmikantham, Nonlinear Problems in Abstract Cones, New York, Academic Press, 1988.
  • Reader Comments
  • © 2020 the Author(s), licensee AIMS Press. This is an open access article distributed under the terms of the Creative Commons Attribution License (http://creativecommons.org/licenses/by/4.0)
通讯作者: 陈斌, bchen63@163.com
  • 1. 

    沈阳化工大学材料科学与工程学院 沈阳 110142

  1. 本站搜索
  2. 百度学术搜索
  3. 万方数据库搜索
  4. CNKI搜索

Metrics

Article views(4569) PDF downloads(388) Cited by(6)

Other Articles By Authors

/

DownLoad:  Full-Size Img  PowerPoint
Return
Return

Catalog