Loading [MathJax]/jax/output/SVG/jax.js
Research article

On the boundedness stepsizes-coefficients of A-BDF methods

  • Received: 04 June 2021 Accepted: 20 October 2021 Published: 28 October 2021
  • MSC : Primary: 58F15, 58F17; Secondary: 53C35

  • Physical constraints must be taken into account in solving partial differential equations (PDEs) in modeling physical phenomenon time evolution of chemical or biological species. In other words, numerical schemes ought to be devised in a way that numerical results may have the same qualitative properties as those of the theoretical results. Methods with monotonicity preserving property possess a qualitative feature that renders them practically proper for solving hyperbolic systems. The need for monotonicity signifies the essential boundedness properties necessary for the numerical methods. That said, for many linear multistep methods (LMMs), the monotonicity demands are violated. Therefore, it cannot be concluded that the total variations of those methods are bounded. This paper investigates monotonicity, especially emphasizing the stepsize restrictions for boundedness of A-BDF methods as a subclass of LMMs. A-stable methods can often be effectively used for stiff ODEs, but may prove inefficient in hyperbolic equations with stiff source terms. Numerical experiments show that if we apply the A-BDF method to Sod's problem, the numerical solution for the density is sharp without spurious oscillations. Also, application of the A-BDF method to the discontinuous diffusion problem is free of temporal oscillations and negative values near the discontinuous points while the SSP RK2 method does not have such properties.

    Citation: Dumitru Baleanu, Mohammad Mehdizadeh Khalsaraei, Ali Shokri, Kamal Kaveh. On the boundedness stepsizes-coefficients of A-BDF methods[J]. AIMS Mathematics, 2022, 7(2): 1562-1579. doi: 10.3934/math.2022091

    Related Papers:

    [1] Haiping Ren, Xue Hu . Estimation for inverse Weibull distribution under progressive type-Ⅱ censoring scheme. AIMS Mathematics, 2023, 8(10): 22808-22829. doi: 10.3934/math.20231162
    [2] Yahia Abdel-Aty, Mohamed Kayid, Ghadah Alomani . Generalized Bayesian inference study based on type-Ⅱ censored data from the class of exponential models. AIMS Mathematics, 2024, 9(11): 31868-31881. doi: 10.3934/math.20241531
    [3] Peihua Jiang, Xilong Yang . Reliability inference and remaining useful life prediction for the doubly accelerated degradation model based on Wiener process. AIMS Mathematics, 2023, 8(3): 7560-7583. doi: 10.3934/math.2023379
    [4] Young Eun Jeon, Suk-Bok Kang, Jung-In Seo . Pivotal-based inference for a Pareto distribution under the adaptive progressive Type-II censoring scheme. AIMS Mathematics, 2024, 9(3): 6041-6059. doi: 10.3934/math.2024295
    [5] Mazen Nassar, Refah Alotaibi, Ahmed Elshahhat . Reliability analysis at usual operating settings for Weibull Constant-stress model with improved adaptive Type-Ⅱ progressively censored samples. AIMS Mathematics, 2024, 9(7): 16931-16965. doi: 10.3934/math.2024823
    [6] Refah Alotaibi, Mazen Nassar, Zareen A. Khan, Ahmed Elshahhat . Statistical analysis of stress–strength in a newly inverted Chen model from adaptive progressive type-Ⅱ censoring and modelling on light-emitting diodes and pump motors. AIMS Mathematics, 2024, 9(12): 34311-34355. doi: 10.3934/math.20241635
    [7] Bing Long, Zaifu Jiang . Estimation and prediction for two-parameter Pareto distribution based on progressively double Type-II hybrid censored data. AIMS Mathematics, 2023, 8(7): 15332-15351. doi: 10.3934/math.2023784
    [8] Tahani A. Abushal . Parametric inference of Akash distribution for Type-Ⅱ censoring with analyzing of relief times of patients. AIMS Mathematics, 2021, 6(10): 10789-10801. doi: 10.3934/math.2021627
    [9] Ahmed R. El-Saeed, Ahmed T. Ramadan, Najwan Alsadat, Hanan Alohali, Ahlam H. Tolba . Analysis of progressive Type-Ⅱ censoring schemes for generalized power unit half-logistic geometric distribution. AIMS Mathematics, 2023, 8(12): 30846-30874. doi: 10.3934/math.20231577
    [10] M. Nagy, H. M. Barakat, M. A. Alawady, I. A. Husseiny, A. F. Alrasheedi, T. S. Taher, A. H. Mansi, M. O. Mohamed . Inference and other aspects for qWeibull distribution via generalized order statistics with applications to medical datasets. AIMS Mathematics, 2024, 9(4): 8311-8338. doi: 10.3934/math.2024404
  • Physical constraints must be taken into account in solving partial differential equations (PDEs) in modeling physical phenomenon time evolution of chemical or biological species. In other words, numerical schemes ought to be devised in a way that numerical results may have the same qualitative properties as those of the theoretical results. Methods with monotonicity preserving property possess a qualitative feature that renders them practically proper for solving hyperbolic systems. The need for monotonicity signifies the essential boundedness properties necessary for the numerical methods. That said, for many linear multistep methods (LMMs), the monotonicity demands are violated. Therefore, it cannot be concluded that the total variations of those methods are bounded. This paper investigates monotonicity, especially emphasizing the stepsize restrictions for boundedness of A-BDF methods as a subclass of LMMs. A-stable methods can often be effectively used for stiff ODEs, but may prove inefficient in hyperbolic equations with stiff source terms. Numerical experiments show that if we apply the A-BDF method to Sod's problem, the numerical solution for the density is sharp without spurious oscillations. Also, application of the A-BDF method to the discontinuous diffusion problem is free of temporal oscillations and negative values near the discontinuous points while the SSP RK2 method does not have such properties.



    From an ecological and financial perspective, toxicants have emerged as a major threat to terrestrial and aquatic environments. With increasing demand, industries are cranking out a flood of toxic chemicals. Toxic chemicals and substances, such as cadmium, arsenic, copper, lead, etc., are often dumped into lakes, rivers and oceans, where they can have a devastating effect on aquatic life [1]. Toxic oil, metals and synthetic organic chemicals are common contaminants of river, lake, and sea water [2]. A significant loss of biodiversity occurs in ecosystems where toxic contaminants are present [3]. Fish, birds and mammals that eat contaminated marine life can be exposed to the toxins themselves. Therefore, many species have become extinct, and many more are on the verge of extinction, due to the unchecked release of toxic substances into the environment. There are numerous species in the ocean that produce toxins, and these toxins, if released into the environment, can have serious consequences for the development of other organisms. For example, the grazing pressure of zooplankton can be greatly reduced by phytoplankton that are naturally toxic. Therefore, research into the effects of toxic substances on ecological communities is becoming increasingly significant from both an environmental and a conservationist point of view.

    The mathematical modeling of the impact of toxicants on a population was a newly established area in the early 1980s [4,5,6]. In order to effectively estimate the qualitative impact of toxic substances on species, mathematical models are a great tool to use. Das et al. [7] investigated a predator-prey fishery model with harvesting and the effects of toxicants which are released by some other species. Chakraborty and Das [8] studied a two-zooplankton one-phytoplankton system in the presence of toxicity. Ang and Safuan [9] discussed an intraguild fishery model in which predators are thought to become infected through their prey, while fish are thought to be infected directly by an anthropogenic toxicant in the environment. Juneja and Agnihotri [10] addressed the issue of two competing fish species, each of which releases a harmful chemical for the other.

    It is noted that in biological populations, delay plays an important role. In the last few years, theoretical and mathematical ecologists have paid a lot of attention to research on differential equations with time delays [11,12,13,14,15]. Even so, studying the effects of time delay on the dynamics of a system can be very complicated. For example, it can cause the system to lose its stability and lead to periodic solutions and chaotic behavior. Pal and Mahapatra [16] studied the combined effect of a toxicant and delay on the dynamical behaviors of a delayed two-species competitive system with imprecise biological parameters. Pal et al. [17] took into account two fish species that are in competition with one another, each of which releases a toxin that is poisonous to the other and each of which obeys the law of logistic growth. Meanwhile, in reality, species are spatially heterogeneous, so individuals seek out low population densities where they have a better chance of survival. As a result, the reaction-diffusion predator-prey model with toxic effects has been considered by some researchers. Zhang and Zhao [18] investigated a diffusive predator-prey model with toxins, and their research results show that toxic substances have a great impact on the dynamics of the model. Zhu et al. [19] investigated a delayed diffusive predator-prey model affected by a toxic substance. However, we find that the research results about the delayed diffusive predator-prey model with toxic substances are rare.

    Motivated by these pioneer works, we hypothesize that prey produce toxins for predators, and that this process is not instantaneous but rather follows a discrete time lag that can be thought of as the species' maturation period. Toxic substances released by prey into the environment have a half-life of τ, which we introduce here. We consider a diffusive predator-prey model as follows

    {ut=d1Δu+ru(1uK)αuva+u2,(x,t)Ω×(0,+),vt=d2Δv+βuva+u2dvγu(tτ)v2,(x,t)Ω×(0,+),u(x,t)=u0(x,t),v(x,t)=v0(x,t),x¯Ω,t[τ,0],u(t,x)n=v(t,x)n=0,t>0,xΩ, (1.1)

    where u(x,t), v(x,t) denote the density of the prey and the predator, respectively. r is the birth rate of prey. ua+u2 is the Holling type-Ⅳ function. α is the maximum predator per capita consumption rate of u due to v. β is the conversion of the biomass constant. The parameter d is the death rate of predator. γv2 is the functional response of the u population to the density of the v population.

    To explore the dynamics of system (1.1), we first do the non-dimensionalization described below

    ˉt=rt,ˉu=uK,ˉv=αvK2r,ˉa=aK2,ˉβ=βKr,ˉd=dr,ˉγ=γK3α,ˉd1=d1r,ˉd2=d2r,ˉτ=rτ.

    Thus, system (1.1) is simplified (by removing the bars) to be

    {ut=d1Δu+u(1u)uva+u2,(x,t)Ω×(0,+),vt=d2Δv+βuva+u2dvγu(tτ)v2,(x,t)Ω×(0,+),u(x,t)=u0(x,t),v(x,t)=v0(x,t),x¯Ω,t[τ,0],u(t,x)n=v(t,x)n=0,t>0,xΩ. (1.2)

    In this study, we will study the dynamics of system (1.2), such as the existence of the solutions, local/global stability of the equilibria, and Hopf bifurcation induced by delay. In addition, we will also discuss the existence and non-existence of non-constant positive solutions of the following elliptic system

    {d1Δu=u(1u)uva+u2,xΩ,d2Δv=βuva+u2dvγuv2,xΩ,un=vn=0,xΩ. (1.3)

    The structure of this paper is as follows. In Section 2, the existence of solutions and the persistence of system (1.2) are studied. In Section 3, the stability of the equilibria, Turing bifurcation, and Hopf bifurcation induced by delay are discussed. In Section 4, the global stability of the equilibria are investigated by using the Lyapunov functional method. In Section 5, the non-existence and existence of the non-constant steady state are studied. In Section 6, theoretical results are verified through numerical simulations. Finally, a brief conclusion is given in Section 7.

    Theorem 2.1. Assume that u0(x,t)0, v0(x,t)0, and u0(x,t)0, v0(x,t)0. There is a unique solution (u(x,t),v(x,t))>(0,0), (t>0,xˉΩ) of system (1.2), and

    limsupmaxt+xˉΩu(x,t)1,Ωv(x,t)dxeK(m+r)m|Ω|. (2.1)

    Additionally,

    ||u(,t)||C(ˉΩ)K1,||v(,t)||C(ˉΩ)K2, (2.2)

    where u(x,t)C(¯Ω)=maxx¯Ω,t[τ,0]u(x,t), v(x,t)C(¯Ω)=maxx¯Ωv(x,t), K1=max{1,maxˉΩ,t[τ,0]u0(x,t)} and K2 depends upon β, a, d, γ, u0(x,t), v0(x,t) and Ω.

    Proof. We consider the following auxiliary system

    {ut=d1Δu+u(1u)uva+u2,vt=d2Δv+v(βuad),un=vn=0,u(x,0)=u0(x),v(x,0)=v0(x). (2.3)

    Obviously, (u_(x,t),v_(x,t))=(0,0) and (ˉu(x,t),ˉv(x,t))=(˜u(t),˜v(t)) are the lower and upper solutions of system (2.3), respectively, where (˜u(t),˜v(t)) is the unique solution of

    {dudt=u(1u)uva+u2,dvdt=v(βuad),u(0)=ˉu0,v(0)=ˉv0, (2.4)

    where ˉu0=max¯Ωu0(x), ˉv0=max¯Ωv0(x). As a result, according to Theorem 8.3.3 in [20], we obtain that system (1.2) has a unique globally defined solution which satisfies 0u(x,t)˜u(t),0v(x,t)˜v(t). By the strong maximum principle, we have that u(x,t),v(x,t)>0 (t>0,xˉΩ).

    Evidently, from the first equation of system (2.4) we have that limt+u(t)1, which implies limsupmaxt+xˉΩu(x,t)1. Therefore, ||u(,t)||C(ˉΩ)K1 for all t0.

    For v(x,t), we let U(t)=Ωu(x,t)dx and V(t)=Ωv(x,t)dx; then,

    dUdt=Ωutdx=d1ΩΔudx+Ω[u(1u)uva+u2]dx=Ω[u(1u)uva+u2]dx, (2.5)
    dVdt=Ωvtdx=d2ΩΔvdx+Ω(v(βua+u2dγuv))dx=Ωv(βua+u2dγu(tτ)v)dx. (2.6)

    Multiplying Eq (2.5) by β, and then addin it to Eq (2.6), we have

    (βU+V)t=dV+βΩ(u(1u)dxγΩu(tτ)v2dxd(βU+V)+(1+dβ)U.

    ||u(,t)||C(ˉΩ)K1, so we have that U(t)K1|Ω|. Thus,

    (βU+V)td(βU+V)+M2,t>0, (2.7)

    where M2=(1+dβ)|Ω|. Integrating the inequality (2.7), we obtain

    Ωv(x,t)dx=V(t)<βU(t)+V(t)(βU(0)+V(0))edt+M2d(1edt). (2.8)

    This means that ||v(,t)||L1(Ω)β||u0()||L1(Ω)+||v0()||L1(Ω)+M2d. According to Theorem 3.1 [21], there is an M3 such that ||v(,t)||L(Ω)M3. Therefore, there exists a K2 such that ||v(,t)||C(¯Ω)K2.

    Theorem 2.2. If 1K2a>0 and β(1K2a)γK2(a+K1)dγK2>0, then system (1.2) has the persistence property.

    Proof. From system (1.2), we obtain

    ut=d1Δu+u(1uva+u2)d1Δu+u(1uK2a). (2.9)

    For small enough ε>0, it holds that 1K2aε>0. Therefore, there is a t1 such that

    u(x,t)1K2aε:=c_1,t>t1. (2.10)

    The second equation of system (1.2) is then solved using the upper and lower bounds of u, yielding

    vt=d2Δv+βuva+u2dvγu(tτ)v2,d2Δv+v(βc_1a+K21dγK2v), (2.11)

    for t>t1+τ. Then there exists t2>t1+τ such that for any t>t2,

    v(x,t)βc_1γK2(a+K1)dγK2:=c_2. (2.12)

    From (2.10) and (2.12), we can easily obtain that

    liminfmaxt+xˉΩu(.,t)c_1,liminfmaxt+xˉΩv(.,t)c_2. (2.13)

    They are evidence that the system (1.2) is persistent. Regardless of the diffusion coefficients, this indicates that, from a biological point of view, a predator and its prey will always coexist within the habitable domain at any given time and in any given location.

    Obviously, model (1.2) has a trivial equilibrium E0=(0,0) and a predator-free equilibrium E1=(1,0), and the interior equilibrium must simultaneously meet the two non-trivial prey and predator nullcline conditions below:

    Φ(u,v)=1uva+u2=0, (3.1)
    Ψ(u,v)=βua+u2dγuv=0. (3.2)

    From (3.2), we obtain that v=(u2+a)(u1), and substituting this into (3.1), we have

    γu6+(γ)u5+(2aγ)u4+(2aγ)u3+(a2γd)u2+(βa2γ)uad=0. (3.3)

    Obviously, Eq (3.3) has at least a positive root. Therefore, system (1.2) has at least an interior equilibrium E=(u,v). To illustrate this, isoclines (3.1) and (3.2) are shown in Figure 1. Figure 1(a) shows that isoclines (3.1) and (3.2) intersect uniquely in the interior of the positive quadrant, i.e., system (1.2) has a unique interior equilibrium, and Figure 1(b) shows that isoclines (3.1) and (3.2) intersect two times in the interior of the positive quadrant, i.e., the system has two equilibria.

    Figure 1.  Intersection of isoclines (3.1) and (3.2). The parameters are set as follows: (a) a=10, β=0.6, d=0.02, γ=0.05; (b) a=0.2, β=0.1, d=0.1, γ=0.02.

    In order to study the stability of the equilibria. First, we define the real-valued Sobolev space

    X={(u,v)T:u,vL2(Ω)},<u,v>=<u1,v1>L2+<u2,v2>L2.

    Then (X,<,>) is a Hilbert space. In C([τ,0],X), system (1.2) can be thought of as a functional differential equation in abstract form.

    Let U(t)=(u(,t),v(,t))T. Thus, we linearize system (1.2) around a constant solution E=(u,v); we get

    ˙U=DΔU(t)+L(Ut), (3.4)

    where D=diag(d1,d2),

    dom(dΔ)={(u,v)T:u,vW2,2(Ω),un=vn=0},

    and Ut=col(u(x,t),v(x,t))Cτ and L:C([τ,0]X is given by

    L(φ)=(a11a12a21a22)φ(0)+(00b0)φ(1) (3.5)

    with φ=(φ1,φ2)TC([τ,0] and

    a11=2u2v(a+u2)2u,a12=uu2+a,a21=βv(au2)(a+u2)2,a22=γuv,b=γv2.

    Therefore, the characteristic equation of system (3.4) is

    λyDΔyL(eλy)=0,ydom(Δ),y0. (3.6)

    We know that with the corresponding eigenfunctions ψn(x) the problem

    {Δψ=λψ,xΩ,ψn=0,xΩ,

    has eigenvalues 0=μ0<μ1μ2μnμn+1. Substituting

    y=n=0ψn(x)(y1ny2n)

    into Eq (3.4), we have

    (a11d1μna12a21beλτa22d2μn)(y1ny2n)=λ(y1ny2n),n{0,1,2,}:=N0.

    Hence, Eq (3.6) equals

    Wn(λ,β,τ)=λ2+Anλ+Bn+Ceλτ=0, (3.7)

    where

    An=(d1+d2)μn+a22a11,Bn=d1d2μ2n+(d1a22d2a11)μn+(a12a21a11a22),C=a12b. (3.8)

    For the extinct equilibrium E0=(0,0), J(0,0)=(100d). When n=0, the eigenvalue λ=1>0, therefore, E0 is a saddle point, which is always unstable.

    For the predator free equilibrium E1=(1,0), J(1,0)=(11a+10βa+1d). Therefore, if βa+1d<0, then E1 is stable.

    In what follows, we first discuss the stability of the interior equilibrium of system (1.2) with τ=0. When τ=0, the characteristic equation (3.7) becomes

    λ2+Anλ+Bn+C=0. (3.9)

    Theorem 3.1. Assume that the conditions

    a22a11>0, (3.10)
    a12a21a11a22a12b>0 (3.11)

    hold; then, the following results are true:

    (i) If d1a22d2a11>0, then the interior equilibrium is locally asymptotically stable.

    (ii) If d1a22d2a11<0 and Δ1<0, then the interior equilibrium is locally asymptotically stable, where

    Δ1=(d1a22+d2a11)24d1d2(a12a21a12b).

    (iii) If d1a22d2a11<0 and Δ1>0, but there is no nN0 such that μn(μ,μ+), then the interior equilibrium is asymptotically stable, where

    μ±=d2a11d1a22±Δ12d1d2.

    Proof. Obviously, if a22a11>0, then AnA0>0 for nN0. a12a21a11a22a12b>0 holds, so B0+C=hb3(b2b3b1)>0.

    (ⅰ) If d1a22d2a11>0, then Bn+CB0+C, which implies that all roots of the characteristic equation (3.9) have negative real parts. Therefore, the interior equilibrium is locally asymptotically stable.

    (ⅱ) d1a22d2a11<0 and Δ1<0 hold, which implies that the equation

    h(y)=d1d2y2+(d1a22d2a11)y+(a12a21a11a22)a12b>0

    for any y0. That is Bn+C>0 for any μn. Similar to the discussion in (i), we have that the interior equilibrium is locally asymptotically stable.

    (ⅲ) There is no nN0 such that μn(μ,μ+). So, Bn+C>0 for any μn. Consequently, we have the results.

    Theorem 3.2. Suppose that the conditions (3.10) and (3.11) hold, and assume further that

    d2d1>2a2b1a1b2+(2a2b1a1b2)2a21b22a21 (3.12)

    hold, then the Turing bifurcation occurs.

    Proof. The condition (3.10) is satisfied, so E of the ODE model corresponding to model (1.2) is locally asymptotically stable.

    The condition (3.10) holds, so An<0. Therefore, when E of model (1.2) is unstable i.e., Eq (3.9) has at least one positive real root i.e., Bn+C=0 has two true roots, one positive and one negative. Note that

    Bn+C=d1d2μ2n+(d1a22d2a11)μn+(a12a21a11a22)a12b. (3.13)

    It is easy to see that Bn+C reaches its minimal value at μn=μmin=d2a11d1a222d1d2 with d1a22d2a11<0.

    It implies that

    a211d22d212(2a12b2a12a21a11a22)d2d1+a222>0. (3.14)

    Hence, Dn is negative when Eq (3.14) is met, and it applies for μ close to μmin. By Eq (3.14), we obtain

    d2d1>2a12b2a12a21a11a22+(a12ba12a21)2a11a22(a12ba12a21)a211, (3.15)

    which completes the proof.

    Let λ=±iω (ω>0) be a pure imaginary pair of eigenvalues of Eq (3.7). Thus, ω satisfies

    ω2iAnω+Bn+C(cos(ωτ)isin(ωτ)=0. (3.16)

    Therefore, we have

    {ω2+Bn=Ccos(ωτ),Anω=Csin(ωτ). (3.17)

    From the above equation, we obtain

    ω4+(A2n2Bn)ω2+B2nC2=0. (3.18)

    From Eq (3.8), we know that if the condition (3.11) holds, then BnC>Bn+C>0. Therefore, B2nC2>0. We discuss the existence of roots of Eq (3.18) in two cases.

    Case Ⅰ. Suppose that

    A2n2Bn<0,Δn=(A2n2Bn)24(B2nC2)>0. (3.19)

    Thus, Eq (3.18) has two positive real roots ω±(n)=(A2n2Bn)±Δn2. Substituting ω±(n) into Eq (3.17), we have

    τ±j(n)=1ω±(n)[arccos(ω±2(n)BnC)+2jπ],jN. (3.20)

    Case Ⅱ. Suppose that either of the following two conditions are met

    (i)Δn<0;(ii)Δn0,A2n2Bn0. (3.21)

    So, Eq (3.18) does not have a positive real root.

    We summarize the above discussions, and we have the following theorem.

    Theorem 3.3. Assume that the conditions (3.10) and (3.11) hold and the following is true:

    (i) When

    A2n2Bn<0,Δn=(A2n2Bn)24(B2nC2)>0,

    Eq (3.18) has two positive real roots ω±(n); then, Eq (3.7) has a pair of pure imaginary roots ±iω±(n), when τ=τ±j(n).

    (ii) If either Δn<0 or Δn0,P1n0; then, Eq (3.7) has no pure imaginary roots.

    Lemma 3.1. Let λ(τ)=ξ(τ)±iη(τ) be the root of Eq (3.7) satisfying α(τ±j(n))=0,ξ(τ±j(n))=ω±(n)). Then the following transversality conditions are satisfied:

    d(Reλ(τ))dτ|τ=τ±j(n)=±ΔnA23n. (3.22)

    Proof. When both sides of Eq (3.7) are differentiated with regard to λ, the result is

    2λ+AnC(τ+λdτ1dλ)eλτ=0.

    Therefore,

    [dλdτ]1=(2λ+C)eλτλCτλ.

    Combining with (3.17), we get

    Re([dλdτ]1)λ=±iω±(n)=[2ω2+A2n2BnC2]λ=±iω±(n)=±ΔnC2.

    Denote

    Γ={nN0|A2n2Bn<0,Δn=(A2n2Bn)24(B2nC2)>0}.

    For a given nΓ, it is seen that τ+j(n) grows with respect to j. As a result, we can deduce that τ+0(n)=minjN0τ+j(n) for some fixed n. We define

    τ=minnΓ{τ+0(n)}. (3.23)

    Theorem 3.4. Assume that the conditions (3.10) and (3.11) hold; we have the following results

    (i) If either of the following two conditions are met

    (a)Δn<0;(b)Δn0,A2n2Bn0, (3.24)

    then the interior equilibrium E is locally asymptotically stable for τ0;

    (ii) If A2n2Bn>0 and Δn>0, then the interior equilibrium E is locally asymptotically stable when τ[0,τ) and system (1.2) experiences a Hopf bifurcation at E. In addition, before it becomes unstable, the interior equilibrium E will go through k changes from stable to unstable and back to stable.

    Theorem 4.1. Suppose that βK1a<d and E1=(1,0) is globally asymptotically stable.

    Proof. Define a Lyapunov functional as follows

    V(t)=βΩu1u1udξdx+Ωvdx. (4.1)

    Differentiating V(t) with respect to t, we have

    dVdt=βΩu1u(d1Δu+u(1u)uva+u2)+Ω(d2Δv+βuva+u2dvγu(tτ)v2)dx=βd1Ωu1uΔudx+βΩ(u1)((1u)va+u2)+d2ΩΔvdx+Ωv(βua+u2dγu(tτ)v)dx=βΩ(u1)2dx+Ω(βua+u2dγu(tτ)v)dxβΩ(uu)2dxβΩ(u1)2dx+Ω(βK1ad)vdxβΩ(uu)2dx.

    βa<d, so dVdt0, and dVdt=0 if and only if (u,v)=(1,0). We conclude that E1=(1,0) is globally asymptotically stable.

    Theorem 4.2. Assume that the conditions

    aβa+u2aβv(u+K1)a(a+u2)2βuK12a(a+u2)>0,γc_1γv2βuk12a(a+u2)>0,γv21>0 (4.2)

    hold. Then the unique interior equilibrium E=(u,v) is globally asymptotically stable.

    Proof. Define a Lyapunov function as follows

    W(t)=aβa+u2I1(t)+I2(t)+I3(t),

    where

    I1(t)=Ωuuξuξdξdx,I2(t)=Ωvvξvξdξdx,I3(t)=Ωttτ(u(ξ)u)2dξdx.

    Thus, we have

    dI1(t)dt=d1ΩuuuΔudx+Ω(uu)(1uva+u2d)dx=d1uΩ(uu)2dx+Ω(uu)((uu)(va+u2va+u2))dx=d1uΩ(uu)2dxΩ(uu)2dxΩ(uu)(a(vv)+u2vu2v(a+u2)(a+u2))dx=d1uΩ(uu)2dxΩ(1+v(u+u)(a+u2)(a+u2))(uu)2dxΩ1a+u2(uu)(vv)dx,dI2(t)dt=d2ΩvvvΔudx+Ω(vv)(βua+u2dγu(tτ)v)dx=d2vΩ(vv)2dx+Ω(vv)βu(a+u2)βu(a+u2)(a+u2)(a+u2)dxγΩ(vv)(u(tτ)vuv)dx=d2uΩ(vv)2dx+Ω(aββuu)(uu)(vv)(a+u2)(a+u2)dxγΩu(tτ)(vv)2γvΩ(vv)(u(tτ)u)dxd2uΩ(vv)2dx+Ω(aββuu)(uu)(vv)(a+u2)(a+u2)dxγΩu(tτ)(vv)2+γv2Ω(vv)2dx+Ω(u(tτ)u)2dx,dI3(t)dt=Ω(uu)2dxΩ(u(tτ)u)2dx.

    Note that

    dWdt=dI1(t)dt+dI2(t)dt+dI3(t)dt.

    Therefore, we obtain

    dW(t)dtaβud1a+u2Ω(uu)2dxd2vΩ(vv)2dxΩ(aβa+u2aβv(u+u)(a+u2)(a+u2)2βuu2(a+u2)(a+u2))(uu)2dxΩ(γu(tτ)γv2βuu2(a+u2)(a+u2))(vv)2dx(γv21)Ω(u(tτ)u)2dx.

    From Eq (4.2), we know that dWdt0, and dWdt=0 if and only if (u,v)=(u,v). Therefore, the interior equilibrium E is globally asymptotically stable.

    In this section, we investigate the existence and non-existence of non-constant positive solutions of system (1.3). First, we will give a priori upper and lower bounds for the positive solutions of system (1.3).

    Lemma 5.1 (Harnack inequality). [22] Assume that c(x)C(ˉΩ) and ϕC2(Ω)C1(ˉΩ) is a positive solution to

    Δϕ+c(x)ϕ,xΩ,ϕn=0,xΩ.

    Then there exists a positive constant C=C(c) such that

    maxˉΩϕCminˉΩϕ.

    Theorem 5.1 (Upper bound). Any positive solution (u,v) of system (1.3) satisfies

    0<max¯Ωu(x)1,0<max¯Ωv(x)β(d2+dd1)dd2.

    Proof. By the strong maximum principle, we know that if there is a x0ˉΩ such that v(x0)=0, then v(x)0 and u satisfies

    {d1Δu=u(1u),xΩ,un=vn=0,xΩ. (5.1)

    From the well known result, u0 or u1. Hence, if (u,v) is not (0,0) or (1,0), then u(x)>0 and v(x)>0 for xˉΩ.

    From the maximum principle, we easily obtained that u(x)1 in Ω. Multiplying the first equation of Eq (1.3) by β and adding it to the second equation of Eq (1.3), we have

    (βd1Δu+d2Δv)=βu(1u)+dβd1ud2dd2(βd1u+d2v)γuv2β+dβd1d2dd2(βd1u+d2v). (5.2)

    Then from the maximum principle,

    βd1u+d2vd2β+dβd1d,

    which leads to

    vβ(d2+dd1)dd2.

    Theorem 5.2 (Lower bound). There exists a positive constant C_ depending on d1, d2, a, β, d and γ, such that any positive solution (u(x),v(x)) of Eq (1.3) satisfies

    u(x),v(x)C_,xˉΩ. (5.3)

    Proof.

    u(x),v(x)¯C:=max{1,β(d2+dd1)dd2}. (5.4)

    Let

    c1(x):=1u(x)v(x)a+u2(x)andc2(x):=βu(x)a+u2(x)dγu(x)v(x). (5.5)

    Then

    |c1(x)|2+¯Ca,|c2(x)|d+¯Ca+γ¯C2.

    A positive constant C can be derived from Lemma 5.1 in such a way that

    supˉΩu(x)CinfˉΩu(x),supˉΩv(x)CinfˉΩv(x).

    Therefore, it must now show that there is some c>0 such that

    supˉΩu(x)c,supˉΩv(x)c. (5.6)

    On the other hand, suppose that the outcome is incorrect. Then there exists a series of affirmative solutions (un(x),vn(x)) such that

    sup¯Ωun0orsup¯Ωvn0asn+. (5.7)

    By standard elliptic regularity, we obtain that there exists a subsequence of {(un,vn)}, which is again denoted by {(un,vn)}, such that {(un,vn)}(u,v) in C2(ˉΩ) as n+. Noting that u1, since Eq (5.7) holds, u0 or v0. So, we have the following:

    (ⅰ) u0, v0; or u0, v0;

    (ⅱ) u0, v0.

    Moreover, we get the following two integral equations:

    {Ωun(1un)unvna+u2n)dx=0,Ωvn(d+βuna+u2nγuv2)dx=0. (5.8)

    (ⅰ) Case: u0, so we have

    d+βuna+u2nγuv2d<0,n,

    and vn>0. But, we integrate the equation of vn; then, we have

    Ωvn(γ+βunb+un)dx=0. (5.9)

    This is a contradiction.

    (ⅱ) u0 and v0, so u satisfies Eq (5.1). So, u1, and for a large n, we have

    d+βuna+u2nγuv2d+βa+1>ε>0.

    Thus, the second equation of Eq (5.9) does not hold, which is a contradiction. So, supˉΩu(x)>0, supˉΩv(x)>0, and consequently Eq (5.3) holds.

    Theorem 5.3. There is a large constant d for which there is no non-constant positive solution to the problem (1.3) if d1,d2d.

    Proof. Suppose that (u(x),v(x)) is a non-constant positive solution of system (1.3). Denote

    ¯u=|Ω|1Ωu(x)dx0,¯v=|Ω|1Ωv(x)dx0.

    Then

    Ω(u¯u)dx=0,Ω(v¯v)dx=0. (5.10)

    Multiplying the first equation in Eq (1.3) by uˉu and applying system (1.3), we get

    Ωd1|(uˉu)|2dx=Ω(u¯u)u(1uuva+u2)dx=Ω(uˉu)2dxΩ(uˉu)uva+u2dx=Ω(uˉu)2dxΩv(uˉu)2a+u2dxΩvˉu(u¯u)a+u2dx=Ω(uˉu)2dxΩv(uˉu)2a+u2dxΩ(u¯u)(v¯ua+u2ˉvˉua+ˉu2)dx=Ω(uˉu)2dxΩv(uˉu)2a+u2dxΩˉua+u2(uˉu)(vˉv)dx+Ωˉuˉv(ˉu+u)(a+u2)(a+ˉu2)(uˉu)2dx(ˉC2a+2ˉC3a2C_a+ˉC21)Ω(uˉu)2dx+ˉC2aΩ(vˉv)2dx. (5.11)

    Multiplying the second equation in system (1.3) by vˉv and applying Theorem 5.1, we get

    d2Ω|(v¯v)|2dx=δΩ(v¯v)v(βua+u2dγuv)dx=dΩ(v¯v)2dx+Ω(v¯v)βuva+u2dxΩγuv2(vˉv)dx=dΩ(v¯v)2dx+βΩaˉv(uˉu)(vˉv)(a+u2)(a+ˉu2)dx+βΩˉv(vˉv)uˉu2ˉuu2(a+u2)(a+ˉu2)dxγΩv(vˉv)(u(vˉv)+uˉv)dxβˉC(a+ˉC2)2a2Ω(uˉu)2dx+(βˉC(a+ˉC2)2a2d)Ω(vˉv)2dxγΩuv(vˉv)2dxγˉvv(uˉu)(vˉv)dxγΩˉvˉu(vˉv)2dx(βˉC(a+ˉC2)2a2+γˉC22)Ω(uˉu)2dx+(βˉC(a+ˉC2)2a2d+βˉCa3γC_22)Ω(vˉv)2dx. (5.12)

    From Eqs (5.11) and (5.12), we get

    Ωd1|(uˉu)|2dx+d2Ω|(v¯v)|2dx(βˉC(a+ˉC2)2a2+γˉC22+ˉC2a+2ˉC3a2C_a+ˉC21)Ω(uˉu)2dx+(βˉC(a+ˉC2)2a2d+βˉCa3γC_22+ˉC2a)Ω(vˉv)2dx. (5.13)

    By the Poincarˊe inequality, we have

    Ωd1|(NˉN)|2dx+d2Ω|(u¯u)|2dx1μ1(AΩ(uˉu)2dx+BΩ(vˉv)2dx, (5.14)

    where

    A=βˉC(a+ˉC2)2a2+γˉC22+ˉC2a+2ˉC3a2C_a+ˉC21,B=βˉC(a+ˉC2)2a2d+βˉCa3γC_22+ˉC2a.

    These equations mean that if

    min{d1,d2}>1μ1max{A,B}

    then

    (uˉu)=(vˉv)=0,

    and (u,v) must be a constant solution.

    For simplicity, denote

    b1=a21b,Fu(u)=(a11a12b1a22).

    By the maximum principle and the standard elliptic regularity, the embedding theorems, and the assumption that ΩC2+α, we obtain that (u,v)C2×C2 for the elliptic system (1.3). Therefore, there is a positive constant M1, such that uC1M1 and vC1M1. So, there exists a sufficiently large positive constant M such that d1Δuu(1uva+u2)+Mu and d2Δvβuva+u2+dv+γuv2+Mv are monotonically increasing functions with respect to u and v.

    Define A:[C1(¯Ω)]2[C1(¯Ω)]2 by

    A(u)((Md1Δ)1[f1(u,v)+Mu](Md2Δ)1[f2(u,v)+Mv]),

    where f1(u,v)=u(1uva+u2) and f2(u,v)=βuva+u2dvγuv2.

    It is worth noting that solving system (1.3) equates to finding positive solutions to the equation (MIA)u=0. We investigate the eigenvalue of the following problem using index theory.

    (MIAu(u))Ψ=λΨ,Ψ0, (5.15)

    where Ψ=(ψ1,ψ2)T and u=(u,v).

    The following lemma is used to calculate the index of (MIA,u).

    Lemma 5.2. [23] Assume that (MIAu(u))0. Then index(MIA,u)=(1)σ,σ=λ>0mλ, where mλ is the multiplicity of λ.

    By direct calculation, Eq (5.15) can be written as

    {(λ+M)d1Δψ1+(λa11)ψ1+a12ψ2=0,xΩ,(λ+M)d2Δψ2b1ψ1+(λ+a22)ψ2=0,xΩ,ψ1n=ψ2n=0,xΩ. (5.16)

    Notice that Eq (5.16) has a non-trivial solution if and only if Qn(λ;d1,d2)=0 for some λ0 and n0, where

    Qn(λ;d1,d2)det(λ+Md1μna11d1μn+1a12d1μn+1b1d2μn+1λ+Md2μn+a22d2μn+1).

    Then, λ is an eigenvalue of Eqs (5.15) and (5.16) if and only if λ is a positive root of the characteristic equation Qn(λ;d1, d2)=0 for n0.

    Lemma 5.3. (i) When n=0, Q0(λ,d1,d2)=0 may have no positive root, or exactly one positive root with a multiplicity of two, or two positive roots with a multiplicity of one.

    (ii) If d1>a11Mμ1:=ˆd1, then Qn(λ,d1,d2)=0 has no positive root for n1.

    Proof. (ⅰ) It is easily obtained that Q0(λ,d1,d2)=λ2trace(Fu(u))λ+det(Fu(u)). Obviously, the result holds.

    (ⅱ) It is clear that for n1,

    Qn(λ,d1,d2)=λ2+(Md2μn+a12d2μn+1+Md1μna11d1μn+1)λ+Md2μn+a12d2μn+1Md1μna11d1μn+1+b1a12(d2μn+1)(d1μn+1).

    Since a12>0, b1<0 and a22>0, then the polynomial Qn(λ,d1,d2)>0. So, if d2 is big enough, the desired result is reached.

    Lemma 5.4. Suppose that

    βv(au2)(a+u2)2γv22γu2v2a+u2<0 (5.17)

    holds; then, the following is true:

    (i) The quadratic equation M2d1d2μ2n+(a22Md1a11Md2)μn+b1a12a11a22=0 has two roots. One is positive, say μ1, and the other is negative.

    (ii) For some n11, suppose that μ1(μn1,μn1+1). Then, there is a ˆd1:=ˆd1(Γ,d1,d2) such that the characteristic equation Qn(λ,d1,d2)=0 has a unique positive root for 1nn1 and has no positive root for n1+1n provided that d1ˆd1.

    Proof. (ⅰ) The condition (5.17) holds; then, b1a12a11a22<0, which implies that the result is true.

    (ⅱ) Obviously, according to the definitions of n1, Qn(λ,d1,d2)=0 has a unique root with a multiplicity of one for 1bn1, and it has no positive root for nn1+1 if d1ˆd1.

    Theorem 5.4. Assume that μ1(μn1,μn1+1) for some n11, and that nk=1nk is even. Thus, there is a ˆd1 such that for any d1>ˆd1, system (1.3) has at least one non-constant positive solution.

    Proof. Assume, on the other hand, that the assertion is false for some d1>ˆd1.

    At(u)((MI(d1+t(d1d1))Δ)1[f1(u,v)+Mu](MI(d2+t(d2d2))Δ)1[f2(u,v)+Mv]),

    where d1 and d2 are constants that are positive and will be found out later.

    Consider the problem

    At(u)=uinΩ,un=0onΩ. (5.18)

    Its positive solution is contained in

    Λ:={u[C1(ˉΩ)]2:C_u,v<¯C}.

    By the homotopy invariance of the Leray-Schauder degree,

    deg(IA0,Λ,0)=deg(IA1,Λ,0). (5.19)

    Notice that u is a non-constant positive solution of Eq (1.3) if and only if it is such a solution of (5.18) for t=1. And for any t[0,1], u is a constant solution of Eq (5.18).

    Since we assumed that there are no non-constant positive solutions of system (1.3), At(u)=u has only the constant solution u in Λ. By Lemmas 5.3 and 5.4, we can obtain

    lλk={0or2,ifn=0,1,if1nn1,0,ifnn1+1.

    Thus, σ=k1k=1nk+1(or3)=anoddnumber. So that

    deg(IA1,Λ,0)=index(A1,u)=1.A=βˉC(a+ˉC2)2a2+γˉC22+ˉC2a+2ˉC3a2C_a+ˉC21,B=βˉC(a+ˉC2)2a2d+βˉCa3γC_22+ˉC2a. (5.20)

    Let us take

    d1=1μ1(βˉC(a+ˉC2)2a2+γˉC22+ˉC2a+2ˉC3a2C_a+ˉC21),d2=max{1μ1(βˉC(a+ˉC2)2a2d+βˉCa3γC_22+ˉC2a),ˆd2}+1,

    where ˆd1 and ˆd2 are defined in Lemma 5.3. By Theorem 5.3, A0(u)=u has only the positive constant solution u. In addition, by investigating the existence of positive roots λk of Qk(λ,D0, DI,DP)=0, we get

    deg(IA0,Λ,0)=index(A0,u)=1, (5.21)

    since Lemma 5.3 gives σ=lλ0=0or2. Therefore, Eqs (5.19) and (5.20) contradict Eq (5.21). This completes the proof.

    In this section, we use numerical simulations of a few different scenarios to illustrate our theoretical findings.

    We choose the parameters a=1, β=0.96, d=0.01, γ=0.3, d1=0.2, d2=2 and Ω=(0,π). By a direct calculation, we get that system (1.2) has a unique equilibrium E=(0.0151,0.9852), and Eq (3.18) has two positive roots: ω1=0.1336 and ω2=0.1018. According to Eq (3.20), we obtain the critical values of τ

    τj1=28.1499,75.1690,122.1881,169.2072,,

    and

    τj2=57.2235,118.9519,180.6803,242.4087,.

    In addition, from Eq (3.1), we obtain

    dReλ(τ)dτ|τ=τ(j)1,λ=iω1>0,dReλ(τ)dτ|τ=τ(j)2,λ=iω2<0.

    When τ=τj1, a pair of eigenvalues crosses the imaginary axis from left to right. Figure 2 shows the delay time histories for different locations. When τ[0,τ11)(τ12,τ21)(τ22,τ31), the equilibrium of system (1.2) is asymptotically stable, but it becomes unstable when τ(τ11,τ12)(τ21,τ22)(τ31,+). In other words, the delay τ causes the system (1.2) to exhibit the phenomenon of multiple switching events, in which the state of system (1.2) alternates between stable and unstable and vice versa, and the equilibrium E is ultimately unstable.

    Figure 2.  Bifurcation diagrams showing stability losses and gains: (a) Maximum and minimum of prey u; (b) maximum and minimum of prey v.

    If we keep the other parameters unchanged, only changing the value of γ to 0.1, we find that the positive equilibrium E is locally stable for all τ0 (see Figure 3).

    Figure 3.  The positive equilibrium E is locally asymptotically stable with τ=100.

    We apply the parameters a=0.3, β=0.3, d=0.2, γ=0.3, d1=0.002, d2=4 and Ω=(0,60) By some calculations, we obtain that system (1.2) has a unique positive equilibrium E=(0.2824,0.2725). According to Theorem 3.1, by perturbing the initial value at the equilibrium E, we find that Turing bifurcation occurs (see Figure 4). Figure 4 shows that system (1.2) has a stable non-constant steady state. But, if we increase the value of τ to 12, we find that the stable non-constant steady state disappears, and that the system has a period solution (see Figure 5). However, if we further increase the value of τ to 81, we find that the system has chaotic behavior (see Figure 6); the bifurcation diagrams of system (1.2) are shown in Figure 7.

    Figure 4.  Turing bifurcation occurs with the initial conditions u0(x,t)=0.2824+0.003cos(2x), v0(x,t)=0.2725+0.004cos(2x).
    Figure 5.  System (1.2) has a stable periodic solution with τ=12.
    Figure 6.  System (1.2) has chaotic behavior with τ=81.
    Figure 7.  Bifurcation diagrams of system (1.2) for τ[70,100].

    The focus of this paper is on analyzing the effects of the toxins on a delayed diffusive predator-prey model. Overall, the paper provides a thorough analysis of the dynamic behavior of the system, considering various steady states and their stability. The incorporation of a delay in the model allows for an exploration of the effects of time lags in the predator-prey interaction, which adds realism to the study. The findings are interesting and reasonable.

    Our system's dynamics were investigated in detail at and near all feasible steady states. We demonstrated that the system is persistent under specific conditions, where both the prey and the predator can survive. Conditions for the Turing bifurcation and global stability of the system at all equilibria are derived and presented. With respect to the delay τ, we found that the system displays a Hopf bifurcation near its interior equilibrium. Non-constant steady states were also discussed, along with the conditions under which they do and do not exist.

    The theoretical findings are then illustrated by means of some numerical simulations. These results demonstrate that the system (1.2) displays spatial patterns and that a delay can lead to Hopf bifurcation and chaos. The findings might be useful for future qualitative research into a similar natural system.

    The authors declare they have not used Artificial Intelligence (AI) tools in the creation of this article.

    This work was supported by the National Social Science Fund Youth Project of China (Grant No. 21CJY040).

    The authors declare that they have no conflicts of interest.



    [1] F. A. Aliev, V. B. Larin, N. Velieva, K. Gasimova, S. Faradjova, Algorithm for solving the systems of the generalized Sylvester-transpose matrix equations using LMI, TWMS J. Pure Appl. Math., 10 (2019), 239–245.
    [2] A. F. Aliev, N. A. Aliev, M. M. Mutallimov, A. A. Namazov, Algorithm for solving the identification problem for determining the fractional-order derivative of an oscillatory system, Appl. Comput. Math., 19 (2020), 415–442.
    [3] A. Ashyralyev, D. Agirseven, R. P. Agarwal, Stability estimates for delay parabolic differential and difference equations, Appl. Comput. Math., 19 (2020), 175–204.
    [4] A. Ashyralyev, A. S. Erdogan, S. N. Tekalan, An investigation on finite difference method for the first order partial differential equation with the nonlocal boundary condition, Appl. Comput. Math., 18 (2019), 247–260.
    [5] P. Assari, M. Dehghan, The numerical solution of nonlinear weakly singular fredholm integral equations based on the dual-chebyshev wavelets, Appl. Comput. Math., 19 (2020), 3–19.
    [6] M. E. Aydin, A. Erdur, M. Ergut, Affine factorable surfaces in isotropic spaces, TWMS J. Pure Appl. Math., 19 (2020), 72–88.
    [7] J. C. Butcher, Numerical methods for ordinary differential equations, Wiley, 2003. doi: 10.1002/0470868279.
    [8] W. Chen, W. X. Wu, Z. D. Teng, Complete dynamics in a nonlocal dispersal two-strain siv epidemic model with vaccinations and latent delays, Appl. Comput. Math., 19 (2020), 360–391.
    [9] C. Huang, Strong stability preserving hybrid methods, Appl. Numer. Math., 59 (2009), 891–904. doi: 10.1016/j.apnum.2008.03.030. doi: 10.1016/j.apnum.2008.03.030
    [10] Y. Cui, M. Wisla, Monotonicity properties and solvability of dominated best approximation problem in Orlicz spaces equipped with s-norms, RACSAM 115, 198 (2021). doi: 10.1007/s13398-021-01139-8. doi: 10.1007/s13398-021-01139-8
    [11] J. E. Golanbar, N. Aliev, M. Jahanshahi, Transportation of a BVP including generalized cauchyriemann equation to fredholm integral equation, TWMS J. Pure Appl. Math., 11 (2020), 30–42.
    [12] A. Erem, I. Bayramoglu, Bivariate general random threshold models and exceedance statistics, TWMS J. Pure Appl. Math., 11 (2020), 189–203.
    [13] C. Fredebul, A-BDF: A generalization of the backward differentiation formula, SIAM J. Numer. Anal., 35 (1998), 1917–1938. doi: 10.1137/S0036142996306217. doi: 10.1137/S0036142996306217
    [14] S. Gottlieb, Z. J. Grant, J. Hu, R. Shu, High order strong stability preserving multi-derivative implicit and IMEX Runge-Kutta methods with asymptotic preserving properties, 2021. Available from: https://arXiv.org/abs/2102.11939.
    [15] T. Gadjiev, S. Aliev, S. Galandarova, A priori estimates for solutions to Dirichlet boundary value problems for polyharmonic equations in generalized Morrey spaces, TWMS J. Pure Appl. Math., 9 (2018), 231–242.
    [16] A. Golbabai, O. Nikan, M. Molavi-Arabshahi, Numerical approximation of time fractional advection-dispersion model arising from solute transport in rivers, TWMS J. Pure Appl. Math., 10 (2019), 117–131.
    [17] S. Gottlieb, D. I. Ketcheson, C. W. Shu, High order strong stability preserving time discretizations, J. Sci. Comput., 38 (2009), 251–289. doi: 10.1007/s10915-008-9239-z. doi: 10.1007/s10915-008-9239-z
    [18] Y. Hadjimichael, D. I. Ketcheson, Strong-stability-preserving additive linear multistep methods, Math. Comp., 87 (2018), 2295–2320. doi: 10.1090/mcom/3296. doi: 10.1090/mcom/3296
    [19] Y. Hadjimichael, D. I. Ketcheson, L. Loczi, A. Nemeth, Strong stability preserving explicit linear multistep methods with variable step size, SIAM J. Numer. Anal., 54 (2016), 2799–2832. doi: 10.1137/15M101717X. doi: 10.1137/15M101717X
    [20] E. Hairer, S. P. Norsett, G. Wanner, Solving ordinary differential equations i: Nonstiff problems, 2 Eds., Berlin: Springer, 1993. doi: 10.1007/978-3-540-78862-1.
    [21] A. Harten, High resolution schemes for hyperbolic conservation laws, J. Comput. Phys., 49 (1983), 357–393. doi: 10.1016/0021-9991(83)90136-5. doi: 10.1016/0021-9991(83)90136-5
    [22] J. Huang, C. W. Shu, Bound-preserving modified exponential Runge-Kutta discontinuous Galerkin methods for scalar hyperbolic equations with stiff source terms, J. Comput. Phys., 361 (2018), 111–135. doi: 10.1016/j.jcp.2018.01.051. doi: 10.1016/j.jcp.2018.01.051
    [23] J. Huang, C. W. Shu, A second-order asymptotic-preserving and positivity-preserving discontinuous Galerkin scheme for the Kerr-Debye model, Math. Models Methods Appl. Sci., 27 (2017), 549–579. doi: 10.1142/S0218202517500099. doi: 10.1142/S0218202517500099
    [24] W. Hundsdorfer, S. J. Ruuth, On monotonicity and boundedness properties of linear multistep methods, Math. Comp., 75 (2006), 655–672. doi: 10.1090/S0025-5718-05-01794-1. doi: 10.1090/S0025-5718-05-01794-1
    [25] W. Hundsdorfer, A. Mozartova, M. N. Spijker, Stepsize restrictions for boundedness and monotonicity of multistep methods, J. Sci. Comput., 50 (2012), 265–286. doi:10.1007/s10915-011-9487-1. doi: 10.1007/s10915-011-9487-1
    [26] W. Hundsdorfer, J. G. Verwer, Numerical solution of time-dependent advection-diffusion-reaction equation, Springer Series in Computational Mathematics, Vol. 33, Berlin: Springer, 2003. doi: 10.1007/978-3-662-09017-6.
    [27] N. S. Iskenderov, S. I. Allahverdiyeva, An inverse boundary value problem for the boussinesq-love equation with nonlocal integral condition, TWMS J. Pure Appl. Math., 11 (2020), 226–237.
    [28] I. S. Jabbarov, G. K. Hasanova, Estimation of areas on some surfaces defined by the system of equations, TWMS J. Pure Appl. Math., 11 (2020), 89–99.
    [29] S. Khan, S. A. Wani, M. Riyasat, Study of generalized legendre-appell polynomials via fractional operators, TWMS J. Pure Appl. Math., 11 (2020), 144–156.
    [30] F. Khodadosti, J. Farzi, M. M. Khalsaraei, Monotonicity-preserving splitting schemes for solving balance laws, Iran. J. Numer. Anal. Optim., 11 (2021), 73–94. doi: 10.22067/IJNAO.2021.11328.0. doi: 10.22067/IJNAO.2021.11328.0
    [31] F. Khodadosti, J. Farzi, M. M. Khalsaraei, Monotonicity-preserving laxwendroff scheme for solving scalar hyperbolic conservation laws, Bull. Iran. Math. Soc., 2021. doi: 10.1007/s41980-020-00524-0. doi: 10.1007/s41980-020-00524-0
    [32] B. Koren, A robust upwind discretization for advection, diffusion and source terms, In: C. B. Vreugdenhil, B. Koren, Numerical methods for advection-difusion problems, Notes on Numerical Fluid Mechanics, Vieweg, Braunschweig, 45 (1993), 117–138.
    [33] [10.1016/0010-4655(74)90093-9] J. D. Lambert, Computational method in ordinary differential equation, John Wiley, 1972. doi: 10.1016/0010-4655(74)90093-9.
    [34] B. Lees, L. Taggi, Site-monotonicity properties for reflection positive measures with applications to quantum spin systems, J. Stat. Phys., 183 (2021), 38. doi:10.1007/s10955-021-02778-2. doi: 10.1007/s10955-021-02778-2
    [35] H. W. J. Lenferink, Contractivity preserving explicit linear multistep methods, Numer. Math., 55 (1989), 213–223. doi: 10.1007/BF01406515. doi: 10.1007/BF01406515
    [36] R. J. LeVeque, Finite volume methods for hyperbolic problems, Cambridge University Press, 2002. doi: 10.1017/CBO9780511791253.
    [37] N. I. Mahmudov, I. T. Huseynov, N. A. Aliev, F. A. Aliev, Analytical approach to a class of bagley-torvik equations, TWMS J. Pure Appl. Math., 11 (2020), 238–258.
    [38] M. M. Khalsaraei, An improvement on the positivity results for 2-stage explicit Runge-Kutta methods, J. Comput. Appl. Math., 235 (2010) 137–143. doi: 10.1016/j.cam.2010.05.020. doi: 10.1016/j.cam.2010.05.020
    [39] M. M. Khalsaraei, F. Khodadosti, 2-stage explicit total variation diminishing preserving Runge-Kutta methods, Comput. Methods Differ. Equ., 1 (2013), 30–38.
    [40] M. M. Khalsaraei, F. Khodadoosti, A new total variation diminishing implicit nonstandard finite difference scheme for conservation laws, Comput. Methods Differ. Equ., 2 (2014), 91–98.
    [41] M. M. Khalsaraei, A. Shokri, A new explicit singularly P-stable four-step method for the numerical solution of second order IVPs, Iranian J. Math. Chem., 11 (2020), 17–31. doi:10.22052/IJMC.2020.207671.1472. doi: 10.22052/IJMC.2020.207671.1472
    [42] M. M. Khalsaraei, A. Shokri, The new classes of high order implicit six-step P-stable multiderivative methods for the numerical solution of Schrödinger equation, Appl. Comput. Math., 19 (2020), 59–86.
    [43] M. M. Khalsaraei, A. Shokri, M. Molayi, The new high approximation of stiff systems of first ordinary IVPs arising from chemical reactions by k-step L-stable hybrid methods, Iranian J. Math. Chem., 10 (2019), 181–193. doi:10.22052/IJMC.2018.111016.1335. doi: 10.22052/IJMC.2018.111016.1335
    [44] N. Moshtaghi, A. Saadatmandi, Numerical solution for diffusion equations with distributed-order in time based on Sinc-Legendre collocation method, Appl. Comput. Math., 19 (2020), 317–355.
    [45] S. Noeiaghdam, D. Sidorov, V. Sizikov, N. Sidorov, Control of accuracy of Taylor-Collocation method to solve the weakly regular Volterra integral equations of the first kind by using the Cestac method, Appl. Comput. Math., 19 (2020), 87–105.
    [46] Z. Odibat, Fractional power series solutions of fractional differential equations by using generalized Taylor series, Appl. Comput. Math., 19 (2020), 47–58.
    [47] C. W. Shu, Total-variation-diminishing time discretizations, SIAM J. Sci. Stat. Comput., 9 (1988), 1073–1084. doi: 10.1137/0909073. doi: 10.1137/0909073
    [48] C. W. Shu, Essentially non-oscillatory and weighted essentially non-oscillatory schemes for hyperbolic conservation laws, In: A. Quarteroni, Advanced numerical approximation of nonlinear Hyperbolic equations, Berlin: Springer, 1998. doi: 10.1007/BFb0096355.
    [49] C. W. Shu, S. Osher, Efficient implementation of essetially non-oscillatory shock-capturing schemes, J. Comput. Phys., 77 (1988), 439–471. doi: 10.1016/0021-9991(88)90177-5. doi: 10.1016/0021-9991(88)90177-5
    [50] M. N. Spijker, Stepsize conditions for general monotonicity in numerical initial value problems, SIAM J. Numer. Anal., 45 (2007), 1226–1245. doi: 10.1137/060661739. doi: 10.1137/060661739
    [51] M. N. Spijker, The existence of stepsize-coefficients for boundedness of linear multistep methods, Appl. Numer. Math., 63 (2013), 45–57. doi:10.1016/j.apnum.2012.09.005. doi: 10.1016/j.apnum.2012.09.005
    [52] S. H. Strogatz, Nonlinear dynamics and chaos: With aoolications in physics, biology, chemistry and engineering, CRC Press, 2015. doi: 10.1201/9780429492563.
    [53] Z. Sun, C. W. Shu, Strong stability of explicit runge-kutta time discretizations, SIAM J. Numer. Anal., 57 (2019), 1158–1182. doi: 10.1137/18M122892X. doi: 10.1137/18M122892X
    [54] N. H. Sweilam, A. M. Nagy, A. A. El-Sayed, Sinc-chebyshev collocation method for time-fractional order telegraph equation, Appl. Comput. Math., 19 (2020), 162–174.
    [55] B. Yeager, E. Kubatko, D.Wood, Time step restrictions for strong-stability-preserving multistep rungekutta discontinuous galerkin methods, J. Sci. Comput., 89 (2021), 29. doi: 10.1007/s10915-021-01635-4. doi: 10.1007/s10915-021-01635-4
  • Reader Comments
  • © 2022 the Author(s), licensee AIMS Press. This is an open access article distributed under the terms of the Creative Commons Attribution License (http://creativecommons.org/licenses/by/4.0)
通讯作者: 陈斌, bchen63@163.com
  • 1. 

    沈阳化工大学材料科学与工程学院 沈阳 110142

  1. 本站搜索
  2. 百度学术搜索
  3. 万方数据库搜索
  4. CNKI搜索

Metrics

Article views(2628) PDF downloads(177) Cited by(1)

Figures and Tables

Figures(11)  /  Tables(3)

/

DownLoad:  Full-Size Img  PowerPoint
Return
Return

Catalog