
In this paper, we present a novel computational approach (named ACA-BM-SBM) for the calculation of 2D acoustic sensitivity by combining the Burton-Miller-type singular boundary method (BM-SBM) with the adaptive cross-approximation (ACA) algorithm. The BM-SBM circumvents the source singularities of the fundamental solutions by introducing the origin intensity factors, and it eliminates the fictitious frequency problem in external acoustic fields by introducing the Burton-Miller formula. As a semi-analysis meshless method, the BM-SBM can accurately solve the external acoustic problem governed by the Helmholtz equation. Nevertheless, the computational inefficiency introduced by the dense coefficient matrix renders this method suboptimal, particularly for large-scale simulations. As the number of nodes increases, the computation time and store memory increase dramatically. ACA is a purely algebraic method based on hierarchical matrices which can be used to partition the coefficient matrix step by step. By employing ACA, the BM-SBM can be effectively accelerated, and this results in less computation time, as well as fewer memory requirements. Numerical experiments, including Dirichlet and Neumann boundary conditions, illustrate that the proposed approach is an accurate, efficient and fast numerical method for acoustic sensitivity analysis.
Citation: Liyuan Lan, Zhiyuan Zhou, Hanqing Liu, Xing Wei, Fajie Wang. An ACA-BM-SBM for 2D acoustic sensitivity analysis[J]. AIMS Mathematics, 2024, 9(1): 1939-1958. doi: 10.3934/math.2024096
[1] | Zuojun Ma . Pattern formation of a volume-filling chemotaxis model with a bistable source. AIMS Mathematics, 2024, 9(11): 30816-30837. doi: 10.3934/math.20241488 |
[2] | Rongjie Yu, Hengguo Yu, Min Zhao . Steady states and spatiotemporal dynamics of a diffusive predator-prey system with predator harvesting. AIMS Mathematics, 2024, 9(9): 24058-24088. doi: 10.3934/math.20241170 |
[3] | Wei Li, Qingkai Xu, Xingjian Wang, Chunrui Zhang . Dynamics analysis of spatiotemporal discrete predator-prey model based on coupled map lattices. AIMS Mathematics, 2025, 10(1): 1248-1299. doi: 10.3934/math.2025059 |
[4] | Xiao-Long Gao, Hao-Lu Zhang, Xiao-Yu Li . Research on pattern dynamics of a class of predator-prey model with interval biological coefficients for capture. AIMS Mathematics, 2024, 9(7): 18506-18527. doi: 10.3934/math.2024901 |
[5] | Teekam Singh, Ramu Dubey, Vishnu Narayan Mishra . Spatial dynamics of predator-prey system with hunting cooperation in predators and type I functional response. AIMS Mathematics, 2020, 5(1): 673-684. doi: 10.3934/math.2020045 |
[6] | Weiyu Li, Hongyan Wang . The instability of periodic solutions for a population model with cross-diffusion. AIMS Mathematics, 2023, 8(12): 29910-29924. doi: 10.3934/math.20231529 |
[7] | Xiaoyan Zhao, Liangru Yu, Xue-Zhi Li . Dynamics analysis of a predator-prey model incorporating fear effect in prey species. AIMS Mathematics, 2025, 10(5): 12464-12492. doi: 10.3934/math.2025563 |
[8] | Lingling Li, Xuechen Li . The spatiotemporal dynamics of a diffusive predator-prey model with double Allee effect. AIMS Mathematics, 2024, 9(10): 26902-26915. doi: 10.3934/math.20241309 |
[9] | Jing Zhang, Shengmao Fu . Hopf bifurcation and Turing pattern of a diffusive Rosenzweig-MacArthur model with fear factor. AIMS Mathematics, 2024, 9(11): 32514-32551. doi: 10.3934/math.20241558 |
[10] | Anna Sun, Ranchao Wu, Mengxin Chen . Turing-Hopf bifurcation analysis in a diffusive Gierer-Meinhardt model. AIMS Mathematics, 2021, 6(2): 1920-1942. doi: 10.3934/math.2021117 |
In this paper, we present a novel computational approach (named ACA-BM-SBM) for the calculation of 2D acoustic sensitivity by combining the Burton-Miller-type singular boundary method (BM-SBM) with the adaptive cross-approximation (ACA) algorithm. The BM-SBM circumvents the source singularities of the fundamental solutions by introducing the origin intensity factors, and it eliminates the fictitious frequency problem in external acoustic fields by introducing the Burton-Miller formula. As a semi-analysis meshless method, the BM-SBM can accurately solve the external acoustic problem governed by the Helmholtz equation. Nevertheless, the computational inefficiency introduced by the dense coefficient matrix renders this method suboptimal, particularly for large-scale simulations. As the number of nodes increases, the computation time and store memory increase dramatically. ACA is a purely algebraic method based on hierarchical matrices which can be used to partition the coefficient matrix step by step. By employing ACA, the BM-SBM can be effectively accelerated, and this results in less computation time, as well as fewer memory requirements. Numerical experiments, including Dirichlet and Neumann boundary conditions, illustrate that the proposed approach is an accurate, efficient and fast numerical method for acoustic sensitivity analysis.
Pattern formation has captivated scholars in recent decades as a way to better understand natural processes, and Turing's key work on reaction-diffusion systems gave rise to the concept of using it with reaction-diffusion systems [36]. Turing instability causes a variety of spatial structures to arise, including spots, spirals, squares, hexagons, combinations of spots and stripes, and so on [2,3,14,28]. Non-Turing patterns, such as traveling wave, periodic traveling wave, spatiotemporal chaos, and so on, can be detected using diffusion concepts [9,25]. Many of these patterns in the spatio-temporal expansion of interactive population systems, which include competing species and predator-prey systems, were discovered using reaction-diffusion equations [2,3,25].
Cross-diffusion is vital in the emergence of patterns in the disciplines of chemistry, biology, and ecology. In ecology, the concentration gradient of one species influences the flow of another; this phenomena is known as cross-diffusion in the perspective of the reaction-diffusion model, as detailed in [30,37]. Positive cross-diffusion distributes the respective components, whilst negative cross-diffusion causes them to accumulate locally.The influence of cross-diffusion on excitatory chemical systems has already been discussed extensively for Chemical self-replication according to the Templetor model [7], the chlorite-iodide-malonic acid-starch autocatalytic reaction system [35], the Fitzhugh-Nagumo type reaction kinetics [40], and Stokes equations [5]. Vanag and Epstein [37] investigated the effects of cross-diffusion in cognitive and various chemical systems in particular. Cross-diffusion terms can be used to characterize prey's tendency to avoid predators and also the predator population's weakening in the presence of high-density prey regions [18,19,22]. The predator-prey pursuit-evasion technique is another cross-diffusion paradigm wherein waves propagate via taxis described by nonlinear cross-diffusion parameters.
Super-diffusion may be seen all over the place in nature. The limiting output of Lˊevyflight is represented at the molecular level, with the jumping length dispersion containing infinite intervals during the relative motion of the individual particles. The particle conducts large hops at this moment. Surface diffusion, turbulence, animal and plasma motion, and other processes can all be affected by these phenomena. They might also have a big influence on pattern creation. The influence of the super diffusion implications on the several models, like the activator-inhibitor model [43], the Fitzhugh-Nagumo model [15], the Lengyel-Epstein model [23], and the complex fractional-order HIV diffusion model [16]] has lately been noted by many investigators. In a predator-prey model [24] and a three-species food chain model with harvesting [17], only a few outcomes have been reported around super-cross-diffusion. As stated in the introduction, we will investigate the Hopf bifurcation along with the Turing patterns described for the predator-prey system with in the self-super-cross diffusion in this research.
For decades, Turing instability [36] has piqued the curiosity of scientists as a frequent obstacle in the development of morphological patterns. In reaction-diffusion systems, mathematical analysis and numerical simulations have given a range of results on pattern formation. Song et al. [31] investigated the generation of Turing patterns via the Gierer-Meinhardt model in two spatial dimensions with a saturation term. They obtained the spotting, striping, cohabitation, and labyrinth patterns. The results showed the mechanism of morphogenetic processes in mesenchymal cells that have reached maturity. In both the supercritical and subcritical circumstances, the amplitude equations of the stationary pattern were found in the Turing domain.
Regarding the parameter values close to the Turing bifurcation curve [4,9,21], amplitude equation is critical in explaining the behavior of a reaction-diffusion system. The system's homogeneous steady state loses its stability due to tiny amplitude heterogeneous disturbances [25]. The system exhibits a critical slowdown at a bifurcation threshold, indicating that it takes a substantial amount of time to switch from a stable steady-state homogeneous condition to an inhomogeneous configuration [39].
As a result, multi-scale perturbation analysis may be used for deriving amplitude equations for the studying of the dynamics of active slow modes. The amplitude equations' stability analysis offers information on possible patterns that would occur near the boundary of Turing bifurcation when the amplitude equations are extracted out from the reaction-diffusion equations original system. This technique may also be used to learn about pattern selection and stability around the onset [41]. Zemskov et al. [40] investigated pattern formation in the Oregonator and Brusselator models involving cross-diffusion via WNA. Topaz and Catla [33] and Chen [6] employed this approach to explore patterns created around a Turing-Hopf bifurcation point, which occurs whenever the system seems unstable because both temporal and spatial disturbances are considered. The amplitude equations were established to analyze the production of spatial patterns utilizing WNA, such as rhomboid, squares and rolls, in an epithelial model theory for insect, mammal, and fish skin pattern generation. The approach was further modified for the spatial and temporal expansion of interactive population models, including the cross-diffusion augmented competitive model [12], the hyperbolic mortality model [42], Beddington-DeAngelis functional responsiveness in the predator-prey model [41], and also the herd behavior model [39].
Numerical simulations might be used to better understand the influence of diffusion, as a consequence of which represent intriguing phenomena like stationary, pulses, fronts, and periodic patterns, among others [7]. Cross-diffusion and self-diffusion are put into consideration in interactive population modeling including prey-predator models and competitive models [32], interesting spatiotemporal patterns emerge. Numerical simulations will be used to validate the analytical results.
The following is a breakdown of how this article is structured. The temporal and spatiotemporal predator-prey model will be introduced in the next section. We present the conditions that ensure that the Turing instability arises in Section 3 by examining the local equilibrium points' stability. In Section 4, we use WNA to find the amplitude equations, and in Section 5, we use numerical simulations to test the validity of the analytical findings. Finally, we present conclusions derived from our paper.
Differential equations are used in predation theory when it can be assumed that generations overlap and populations fluctuate continuously over time. For this method to be fair, the time scale must be set in accordance with the species being investigated. For the majority of mammals, variation should be represented on an annual basis, but for many planktonic creatures, a daily scale is necessary. In situations when the dynamics of a population cannot be approximated by continuous functions, difference equations may be preferable. The Lotka-Volterra model, from which the idea of predation evolved, contains a number of generally acknowledged flaws. In spite of this, differential equations have remained an essential tool in the following development of the theory, and this method penetrates a significant portion of contemporary ecological thought.
The fundamental model for predator-prey interaction may be expressed using nonlinear coupled ordinary differential equations [1,25]. Corresponding to Gause [10] for predator–prey interaction subject to nonnegative initial conditions is defined as:
dUdt=Uf(U)−Vg(U)dVdt=Bg(U)V−μV, | (2.1) |
where U≡U(t) and V≡V(t) are the density of prey and predator at time t, respectively. μ, supposed to be [1] constant, is the intrinsic mortality rate of predators and B(0<B<1) is the food conversion efficiency of the predator. Additionally, g(U) is the prey based functional response[11] and f(U) is the per capita rate to grow the prey (when the predation is absent). In this paper, we assume that f(U) follows logistic growth law and takes the form
f(U)=A(1−Ub), |
where b is the environmental carrying capacity for the prey population and A is the intrinsic density–independent growth rate. The notion of employing the prey dependent functional response was suggested by Feng and Kang [11] and Tian et al. [32] that is
g(U)=μUU+H, |
where "gamma(μ)" indicates the predator's attack rate and H denotes the half-saturating constant. Combining f(U) and g(U), hence the system (2.1) takes the form
dUdt=AU(1−Ub)−μUVU+HdVdt=BμUVU+H−μV, | (2.2) |
with regard to the initial conditions U(0),V(0)>0 for (U,V)≠(0,0). When (U,V)=(0,0). The system described above has been simplified to dUdt=dVdt=0.
˜t=At,˜V=μVbA and ˜U=Ub is taken for the non–dimensional time, predator and prey population density, respectively. For the sake of simplicity, we drop the over–bars to get the following non–dimensional model
dUdt=U(1−U)−UVU+hdVdt=C(UU+h)V−DV, | (2.3) |
where C=BμA, D=μA, and h=Hb are all positive parameters. The nonnegative solutions of
U(1−U)−UVU+h=β(U,V)=0C(UU+h)V−DV=γ(U,V)=0, | (2.4) |
are the steady state solutions of (2.3). Aside from the general solution (0,0) (complete extinction), (2.4) yields the predator-free steady state point (1,0) as well as the coexisting equilibrium point L(U∗=DhC−D,V∗=(1−U∗)(U∗+h)) in the first quadrant's interior.
The temporal model (2.3) fits the spatiotemporal model having self-super-cross-diffusion terms. It is necessary to understand how the pattern formation phenomenon takes place in a diffusive model that is anomalous. The unsustainably diffusive operator [13,29,38] is expressed by (using the Fourier transform) (−Δ)μ2 with the following definition:
F{−(−Δ)μ2}(ν)=−|ν|μFu(ν),ν∈Rn,μ>0. |
When 1<μ<2, the above operator is known as super-diffusion. The associated random walk's displacement moment develops slower (sub-diffusion) and faster (super-diffusion) than in regular diffusion. For μ=2, we have the Laplacian operator Δ as a special form of the above operator. Here, the predator-prey system is investigated on the basis of self-super-cross-diffusion in a bounded domain Ω⊂R2, with a smooth boundary ∂Ω, as follows:
∂U∂t−d1∇2U−d2∇μUV=U(1−U)−UVU+h,(x,y)∈Ω,t>0,∂V∂t−d3∇μUV=CUVU+h−DV,(x,y)∈Ω,t>0,∂U∂n=∂V∂n=0,(x,y)∈∂ΩU(x,y,0)>0,V(x,y,0)>0,(x,y)∈Ω, | (2.5) |
d1 is indeed the prey's diffusion coefficient, d2 is a coefficient of the cross diffusion that anticipates the movement of prey species based on predator population [19,26,38], and d3 is a coefficient of the cross diffusion in which the predator species movement is influenced by prey population. The unit normal vector along ∂Ω in outward direction is denoted by n. There is no flux via the boundary when the Neumann boundary conditions are homogeneous.
The alternative obtaining of the fractional operator ∇μ for (1<μ<2) can be done as follows:
∇μa=∂μ∂ξμ=∂μa∂|y|μ+∂μa∂|x|μ=−12cos(πμ/2)(RLDμ−∞,ya+RLDμy,+∞a)−12cos(πμ/2)(RLDμ−∞,xa+RLDμx,+∞a), |
where RLDμ−∞,y and RLDμy,+∞, , in respective order, as given below:
RLDμ−∞,ya=1Γ(2−μ)∂2∂y2∫y−∞(y−s)1−μa(s,x,t)ds,RLDμy,+∞a=1Γ(2−μ)∂2∂y2∫+∞y(s−y)1−μa(s,x,t)ds, |
with Γ(.) refers to the Gamma function.
Turing instability takes place as a stable homogeneous steady-state turns out to be unstable in the presence of tiny amplitude heterogeneous disturbances surrounding it [25,36]. With the cross-diffusion term d3, the equilibrium point in (2.5), which itself is stable like a solution of the problem (2.3) in the absence of the cross-diffusion term d3, becomes unstable. Suppose U(x,y,t) and V(x,y,t) denote the homogeneous steady states that satisfy these equations for (2.5). Suppose that under temporal perturbation for Turing instability, asymptotically, the homogeneous steady state is stable. This means that the requirements j11j22−j12j21>0 and j11+j22<0 are met. Linear stability analysis for the spatiotemporal model (2.5) at L(U∗,V∗) is used to identify the constraints of the Turing instability [25].
Theorem 3.1. System (2.3) has a single positive equilibrium L(U∗,V∗) if D≠C, and L is asymptotically locally stable.
Proof. The Jacobian J0 of the system (2.3) at the coexisting equilibrium point L(U∗,V∗), is given by
J0=(DC(1−h(C+D)C−D)−DCC−D−Dh0)≡(j11j12j21j22). | (3.1) |
Assume that h is the model's Hopf bifurcation parameter (2.3). By solving
j11+j22=0, | (3.2) |
we obtain
hH=C−DC+D. | (3.3) |
The equilibrium point L(U∗,V∗) that co-exists in relation with the parameter h is loses stability by Hopf bifurcation at h=hH and locally asymptotically stable for h>hH.
We perturb the system (2.3) around L(U∗,V∗) as
[U(x,y,t)V(x,y,t)]=[U∗V∗]exp(λt). | (3.4) |
The characteristic equation for the growth rate λ is as follows, where λ refers to the rate of perturbation growth. As a result of the replacement of (3.4) into (2.3), the growth rate's characteristic equation "(λ)" is as follows:
det(J1)=|j11−λj12j21j22−λ|=0. | (3.5) |
Hence
λ2−λj11−j12j21=0. | (3.6) |
Both j12j21 and j11 may be easily verified as negative. As a result, the two roots λ1,2 have their own negative real components. The completion of the proof is done accordingly.
In the following, the stability of L(U∗,V∗) is to be examined in system (2.5) with no cross–diffusion term d3, having the following,
∂U∂t−d1∇2U−d2∇μUV=U(1−U)−UVU+h,(x,y)∈Ω,t>0,∂V∂t=CUVU+h−DV,(x,y)∈Ω,t>0,∂U∂n=∂V∂n=0,(x,y)∈∂ΩU(x,y,0)>0,V(x,y,0)>0,(x,y)∈Ω. | (3.7) |
Theorem 3.2. Let's say the wave number vector is νν=(ν1,ν2), and the wave number is ν=|νν|. If D≠C, then L(U∗,V∗) of system (3.7) is asymptotically and locally stable without the cross-diffusion factor d3.
Proof. The system (3.7) is perturbed about L(U∗,V∗) as follows:
[U(x,y,t)V(x,y,t)]=[U∗V∗]exp(λt+i(ν1x+ν2y)), | (3.8) |
in which λ refers to the perturbation growth rate. By the substitution of (3.8) into (3.7), we get
det(J2)=|j11−λ−d1k2−d2|ν|μV∗j12−d2|ν|μU∗j21j22−λ|=0. | (3.9) |
The formulae for j11,j12,j21 and j22 may be discovered in (3.1). As a result, the characteristic equation becomes
λ2+λTν+hν=0, | (3.10) |
in which
Tν=−(j11−ν2d1−|ν|μ(d2V∗))hν=(j21d2U∗)|ν|μ−j12j21. |
Clearly, hν and Tν are both positive. As a result, the two roots λ1,2 have their own negative real components. The completion of the proof is done accordingly.
The perturbation all around homogeneous steady state L(U∗,V∗) for system (2.5) as
[U(x,y,t)V(x,y,t)]=[U∗V∗]exp(λt+i(ν1x+ν2y)). | (3.11) |
By the substitution of (3.11) into (2.5), we get
det(J3)=|j11−λ−d1k2−d2|ν|μV∗j12−d2|ν|μU∗j21−d3|ν|μV∗j22−λ−d3|ν|μU∗|=0. | (3.12) |
Hence, the characteristic equation is
λ2+λTν+hν=0, | (3.13) |
in which
Tν=−(j11−ν2d1−|ν|μ(d2V∗+d3U∗)),hν=(d1d3U∗)ν2|ν|μ+(j12d3V∗−j11d3U∗+j21d2U∗)|ν|μ−j12j21. |
Checking that Tν is positive is easy. Regarding d3 as the bifurcation parameter, we investigate the Turing bifurcation threshold for ν≡νT at d3=dT3 such that hTν=0. The hν-derivative is assessed in regard to νμ at ν=νT, and using dhνdνμ|ν=νT=0, one can obtain νT=√μ2+μ(j11d3U∗−j12d3V∗−j21d2U∗d1d3U∗). Through the substitution of the value of νT in hν it is possible to find the value of d3 such that hν<0 suggesting that the cross–diffusion term d3 alters an equilibrium point's stability in the way presented in Figure 1.
When j11+j22<0, j11j22−j12j21>0 and d3<dT3, the homogeneous steady state L(U∗,V∗) is stable in the presence of spatiotemporal or heterogeneous perturbation. When j11j22−j12j21>0, j11+j22<0 and d3>dT3, the homogeneous steady state L becomes unstable.
For the model parameters μ=1.5, h=0.45, D=0.8, d1=0.1, d2=0.1, C=2 and dT3>d3=1 the real component of the eigenvalue "λ" becomes negative (Figure 2). For heterogeneous disturbances, this implies the stability of a homogeneous stable state. When dT3<d3 is taken into account, the matching curves (black, pink, blue, green) in Figure 2 show that inside the interval of |νν|, where the system appears unstable to diversified perturbations and creates Turing patterns, the largest real fraction of the eigenvalue is positive. However, we have no way of knowing which Turing patterns were chosen. The stability of various forms of Turing patterns and also structural transformations among them will be interpreted using the amplitude equations of Turing patterns at inception d3=dT3.
The system's dynamics change very slowly near the Turing bifurcation threshold. The slow modes get implicated in this condition, and the amplitude equations [39,40,41] may be used to analyze pattern creation. We create amplitude equations and analyze the stability selection of various patterns by employing multiple-scale perturbation assessment such as labyrinthine, squares, spots, and mixes of stripes and spots. We take into consideration three pairs of active resonant modes (ννj,−ννj)(j=1,2,3) and making angles of 2π/3 with |ννj|=νT [39,41]. First, by putting the perturbations a=U−U∗ and b=V−V∗ about L(U∗,V∗), we may construct the linearized version of model (2.5) as follow:
∂∂t(ab)=L(ab)+12(βaaa2+2βabab+βbbb2γaaa2+2γabab+γbbb2)+(d2∇μabd3∇μab)+16(βaaaa3+3βaaba2b+3βabbab2+βbbbb3γaaaa3+3γaaba2b+3γabbab2+γbbbb3), | (4.1) |
in which L is the linear operator that is give as
L=(j11+d1∇2+d2∇μV∗j12+d2∇μU∗j21+d3∇μV∗j22+d3∇μU∗). | (4.2) |
The results of (2.5) can be expanded as follows (at the initiation of Turing instability):
(ab)=3∑j=1[Xjexp(iνj⋅r)+¯Xjexp(−iνj⋅r)], | (4.3) |
where Xj, −Xj are the relative amplitudes of the modes ννj, −ννj.
We alter the bifurcation parameter d3 with a,b,t as close to the Turing bifurcation threshold as possible by writing
a=ϵa1+ϵ2a2+ϵa3+⋅⋅⋅,b=ϵb1+ϵ2b2+ϵb3+⋅⋅⋅,t=t0+ϵt1+ϵ2t2+⋅⋅⋅,d3=dT3+ϵd(1)3+ϵ2d(2)3+⋅⋅⋅. | (4.4) |
This yields
L=LT+ϵ(00∇μV∗∇μU∗)d(1)3+ϵ2(00∇μV∗∇μU∗)d(2)3+⋅⋅⋅, | (4.5) |
where
LT=(j11+d1∇2+d2∇μV∗j12+d2∇μU∗j21+dT3∇μV∗j22+dT3∇μU∗). | (4.6) |
The amplitude, indicated by Xj(j=1,2,3), is treated as a variable which shows slow change with respect to time ∂Xj∂t=0 [39,41]. Thus,
∂Xj∂t=ϵ∂Xj∂t+ϵ2∂Xj∂t+O(ϵ3). | (4.7) |
To derive the amplitude equations: Substituting (4.4) into (4.1) and collecting the like power coefficients of "ϵ". The linear system at O(ϵ) is obtained as follows:
LT(a1b1)=0. | (4.8) |
Due to the fact that (a1,b1)t is the linear combination of the eigenvectors correlating to the eigenvalue 0, and LT is the system's linear operator at the Turing bifurcation threshold. After solving (4.8), one can get
(a1b1)=3∑j=1(N1)(Yjexpiνj⋅r+c.c), | (4.9) |
where N=(d3νμTU∗)j21−d3νμTV∗ and amplitude Yj of mode expiνj⋅r. At O(ϵ2), we obain
LT(a2b2)=∂∂t1(a1b1)−d(1)3(00V∗U∗)∇μ(a1b1)−(d2dT3)∇μ(a1b1)−12(βaaa21+2βaba1b1+βbbb21γaaa21+2γaba1b1+γbbb21)=(FxFy). | (4.10) |
The Fredholm solvability criterion stipulates that to assure the nontrivial solution existence (4.10), on the right side of Eq (4.10), the vector function ought to be orthogonal to the eigenvectors of the zero eigenvalue of LT+ (LT+ stands for adjoint of LT). The eigenvectors of the operator LT+ are (1M)expiνj⋅r+c.c.(j=1,2,3), in which M=j11−d1ν2T−d2νμTV∗dT3νμT−j12. The condition of orthogonality is (1,M)(FjxFjy)=0, in which Fjx and Fjy denote the coefficients of expiνj⋅r term, in respective order. For example, by the substitution of (4.9) into (4.10) and equation of the coefficient of expiν1⋅r, we get
(F1xF1y)=(N1)∂Y1∂t1−d(1)3(00V∗U∗)(−νμT)(N1)Y1−N(−νμT)(d2dT3)2¯Y2¯Y3−12(β1γ1)2¯Y2¯Y3, | (4.11) |
where
(β1γ1)=(βaaN2+2βabN+βbbγaaN2+2γabN+γbb). |
We obtain the following result when we use the solvability criterion.
(M+N)(∂Y1∂t1)=−νμTd(1)3M(V∗N+U∗)Y1+((β1+Mγ1)−(2NνμT)(d2+MdT3))¯Y2¯Y3. | (4.12) |
Taking the coefficients of expiν2⋅r and expiν3⋅r, we obtain the following relationships.
(M+N)(∂Y2∂t1)=−νμTd(1)3M(V∗N+U∗)Y2+((β1+Mγ1)−(2NνμT)(d2+MdT3))¯Y3¯Y1, | (4.13) |
(M+N)(∂Y3∂t1)=−νμTd(1)3M(V∗N+U∗)Y3+((β1+Mγ1)−(2NνμT)(d2+MdT3))¯Y1¯Y2. | (4.14) |
Equation (4.10) has the following solution:
(a2b2)=(κ0ℑ0)+3∑m=1((κmℑm)expiνm⋅r+(κmmℑmm)expi2νm⋅r)+(κ12ℑ12)expi(ν1−ν2)r+(κ23ℑ23)expi(ν2−ν3)r+(κ31ℑ31)expi(ν3−ν1)r+c.c.. | (4.15) |
The substitution of Eq (4.15) into Eq (4.10) and collection of the coefficients of exp2iνj⋅r gives
(j11−22ν2Td1−2μνμTd2V∗j12−2μνμTd2U∗j21−2μνμTd3V∗j22−2μνμTd3U∗)(κ11ℑ11)=−(d2dT3)(−2μνμT)NY21−12(β1γ1)Y21, | (4.16) |
that provides
(κ11ℑ11)=(j11−22ν2Td1−2μνμTd2V∗j12−2μνμTd2U∗j21−2μνμTd3V∗j22−2μνμTd3U∗)−1×(2μνμTd2N−β122μνμTdT3N−γ12)Y1≡(ξx1ξy1)Y21. | (4.17) |
The coefficients of components of (4.15) involving exp0, expiνm⋅r and expi(ν1−ν2)⋅r are calculated similarly and given as
(a0b0)=(j11j12j21j22)−1(νμTd2N−β12νμTdT3N−γ12)(|Y1|2+|Y2|2+|Y3|2)≡(ξx0ξy0)(|Y1|2+|Y2|2+|Y3|2), | (4.18) |
κm=Nℑnm=1,2,3, | (4.19) |
(κ12ℑ12)=(j11−(√3νT)2d1−(√3νT)μd2V∗j12−(√3νT)μd2U∗j21−(√3νT)μd3V∗j22−(√3νT)μd3U∗)−1×((√3νT)μd2V∗d2N−β12−(√3νT)μd2V∗dT3N−γ12)2Y1¯Y2≡(ξx2ξy2)2Y1¯Y2. | (4.20) |
The coefficients of the components of (4.15) corresponding to expi(ν2−ν3)⋅r and expi(ν3−ν1)⋅r are obtained by permuting the suffixes. At O(ϵ3), we obtain
LT(a3b3)=(GxGy), | (4.21) |
in which
(GxGy)=(∂a2∂t1+∂a1∂t2∂b2∂t1+∂b1∂t2)−d(1)3(00V∗U∗)∇μ(a2b2)−d(2)3(00V∗U∗)∇μ(a1b1)−(d2dT3)∇μ(a1b2+a2b1)−(0d(1)3)∇μ(a1b1)−12(βaa(a1a2)+2βab(a1b2+a2b1)+βbb(b1b2)γaa(a1a2)+2γab(a1b2+a2b1)+γbb(b1b2))−16(βaaaa31+3βaaba21b1+3βabba1b21+βbbbb31γaaaa31+3γaaba21b1+3γabba1b21+γbbbb31). | (4.22) |
The coefficients for expiν1⋅r can be found by collecting them from (4.22).
(G1xG1y)=(N(∂B1∂t1+∂Y1∂t2)∂B1∂t1+∂Y1∂t2)+d(1)3νμT(00V∗U∗)(NB1B1)+d(2)3νμT(00V∗U∗)×(NY1Y1)+νμT(d2dT3)((Nξy0+ξx0+Nξy1+ξx1)|Y1|2Y1+(Nξy0+ξX0+Nξy2+ξx2)(|Y2|2+|Y3|2)Y1+2N(¯Y2¯b3¯Y3¯N2))+2νμT(0d(1)3)¯Y2¯Y3−(((βaaN+βab)(ξx0+ξx1)+(βabN+βbb)(ξy0+ξy1))|Y1|2+((βaaN+βab)×(ξx0+ξx2)+(βabN+βbb)(ξy0+ξy2))(|Y2|2+|Y3|2)|Y1|+β1(¯Y2¯b3+¯Y3¯B2)((γaaN+γab)(ξx0+ξx1)+(γabN+γbb)(ξy0+ξy1))|Y1|2+((γaaN+γab)×(ξx0+ξx2)+(γabN+γbb)(ξy0+ξy2))(|Y2|2+|Y3|2)|Y1|+γ1(¯Y2¯b3+¯Y3¯B2))−((|Y1|2+|Y2|2+|Y3|2)(βaaaN3+3βaabN2+3βabbN+βbbb)(|Y1|2+|Y2|2+|Y3|2)(γaaaN3+3γaabN2+3γabbN+γbbb))Y1. | (4.23) |
In the case of O(ϵ2), the Fredholm solvability criterion is used, we have (1,M)(GjxGjy)=0. In simplified form, it gives
(M+N)(∂B1∂t1+∂Y1∂t2)=−νμTM(V∗N+U∗)(d(1)3B1+d(2)3Y1)+E1(¯Y2¯b3+¯Y3¯B2)+E2¯Y2Y3−(B1|Y1|2+B2(|Y2|2+|Y3|2))Y1, | (4.24) |
in which
β2=βaaaN3+3βaabN2+3βabbN+βbbb,γ2=γaaaN3+3γaabN2+3γabbN+γbbb,E1=(β1+Mγ1)−2NνμT(d2+MdT3),E2=2MNνμTd(1)3,B1=−(νμT(d2+MdT3)(Nξy0+ξx0+Nξy1+ξx1)+(βaaN+βab+M(γaaN+γab))×(ξx0+ξx1)+(βabN+βbb+M(γabN+γbb))(ξy0+ξy1)+(β2+Mγ2)),B2=−(νμT(d2+MdT3)(Nξy0+ξx0+Nξy2+ξx2)+(βaaN+βab+M(γaaN+γab))×(ξx0+ξx2)+(βabN+βbb+M(γabN+γbb))(ξy0+ξy2)+(β2+Mγ2)). |
The permutation of Y's subscript can be used to determine the other two equations. Xm=ϵYm+ϵ2bm+O(ϵ3) can be used to extend the amplitude Xm(m=1,2,3).
We can correlate the amplitude equation to X1 by using Xm expression and (4.7).
ℑ0∂X1∂t=ηX1+E3¯X2¯X3−(G1|X1|2+G2(|X2|2+|X3|2))X1, | (4.25) |
in which
η=d3−dT3dT3,ℑ0=M+NdT3νμTM(V∗N+U∗),E3=E1+μ¯E2dT3νμTM(V∗N+U∗),¯E2=−2MNνμTd(1)3,G1=B1dT3νμTM(V∗N+U∗),G2=B2dT3νμTM(V∗N+U∗). |
The other two equations may be obtained in a similar way by permuting the subscript of X:
ℑ0∂X2∂t=ηX2+E3¯X3¯X1−(G1|X2|2+G2(|X3|2+|X1|2))X2, | (4.26) |
ℑ0∂X3∂t=ηX3+E3¯X1¯X2−(G1|X3|2+G2(|X1|2+|X2|2))X3. | (4.27) |
Stability analysis of amplitude equation
There are two parts to the amplitude Eq (4.25): a mode fm=|Xm| and a phase Θm. By separating the imaginary and real components and putting Xm=fmexpiΘm into (4.25) the four real-valued differential equations that proceed are generated.
ℑ0∂Θ∂t=−E3f21f22+f22f23+f23f21f1f2f3sinΘ,ℑ0∂f1∂t=ηf1+E3f2f3cosΘ−G1f31−G2(f22+f23)f1,ℑ0∂f2∂t=ηf2+E3f3f1cosΘ−G1f32−G2(f23+f21)f2,ℑ0∂f3∂t=ηf3+E3f1f2cosΘ−G1f33−G2(f21+f22)f3, | (4.28) |
in which Θ1+Θ2+Θ3=Θ.
Properties
The solution of the dynamical system (4.28) is found as follows:
(1) f1=f2=f3=0 is the stationary state, which is stable for η<η2=0. As a consequence, for η>η2 we get a spatial pattern and for η<η2 we get a stable homogeneous steady state.
(2) The striped pattern produced by f1=√ηG1≠0, f2=f3=0 is stable for η>η3=E22G1(G2−G1)2 and instability occurs for η<η3.
(3) The mixed state is given by f1=|E2|G1−G2, f2=f3=√η+G1f12(G1+G2), is always unstable.
(4) Hexagon pattern represented by f1=f2=f3=|E2|±√E22+4(G1+2G2)η2(G1+2G2) exists when η>η1=−E224(G1+2G2). The solution ρ=|E2|+√E22+4(G1+2G2)η2(G1+2G2) is stable for η<η4=E222G1+G2(G2−G1)2, otherwise unstable.
Therefore, the amplitude equations show how distinct patterns emerge when different thresholds of η are achieved. At this point, we will look at the numerical simulation results and make a comparison with the underlying theory in Section 4.
For the purpose of demonstrating the theoretical analysis, a numerical simulation is presented. To verify our numerical approach with the space fractional reaction-diffusion model, we have used fractional exponential integrator methodology [8,20,27,34]. Furthermore, in our simulation, boundary constraints in the spatial domain are imposed to verify that Turing patterns are produced. All the simulations were run at N=60. The numerical graphs were made using the Matlab software. The 2019b version of the Matlab was used for the numerical simulation.
Existence of hexagonal patterns can be seen from (4) where C=3, D=1, h=0.45, μ=1.5, d3=6, d2=1 and d1=1 initially perturbed as a=0.1+0.4cos(y)sin(x), b=0.5+0.1cos(y)sin(x) with iterations (ⅰ) i = 50, (ⅱ) i = 60, (ⅲ) i = 70 and (ⅳ) i = 80 (see Figure 3).
Existence of big spots can be seen from (4) where C=8, D=2, h=0.45, μ=1.5, d3=10, d2=1 and d1=1 initially perturbed as a=0.1+0.5cos(y)cos(x), b=0.1+0.5cos(y2)sin(x2) with iterations (ⅰ) i = 60, (ⅱ) i = 100, (ⅲ) i = 120 and (ⅳ) i = 140 (refers to Figure 4).
Existence of small spots can be seen from (4) where C=2, D=0.8, h=0.45, μ=1.5, d3=4, d2=0.1 and d1=0.1 initially perturbed as a=0.5+0.1cos(y)cos(x), b=0.7+0.1cos(y)cos(x) with iterations (ⅰ) i = 100, (ⅱ) i = 110, (ⅲ) i = 200 and (ⅳ) i = 350 (refers to Figure 5).
Existence of square patterns can be seen from (4) where C=4, D=0.5, h=0.45, μ=1.5, d3=10, d2=1 and d1=1 initially perturbed as a=0.1+cos(y2)cos(x2), b=0.1+cos(y2)cos(x2) with iterations (ⅰ) i = 100, (ⅱ) i = 110, (ⅲ) i = 120 and (ⅳ) i = 140 (refers to Figure 6).
Existence of stripe patterns can be seen from (4) where C=6, D=2, h=0.45, μ=1.5, d3=2, d2=0.1 and d1=0.1 initially perturbed as a=0.1+0.1sin2(x), b=0.5+0.1cos2(x) with iterations (ⅰ) i = 64, (ⅱ) i = 128, (ⅲ) i = 256 and (ⅳ) i = 512 (refers to Figure 7).
Cross-diffusion plays a crucial role in determining and selecting patterns in the spatio-temporal extension of the model under consideration. In addition to random diffusion (known as self-diffusion) of both species, cross-diffusion components are introduced to account for the influence of the population density of one species on the movement of other species. Due to the effect of cross-diffusion factors, the homogeneous stable state of the self-diffusion model, which is stationary under heterogeneous perturbation, loses its stability and generates diverse patterns, such as big spot, mixture of spots and stripes, and labyrinthine. Cross-diffusion changes the big spot pattern created by the self-diffusion model into a homogeneous steady state or other patterns such as a mixture of big spot and stripes as well as labyrinthine. This clarifies both the stabilizing and destabilizing effects of the nonlinear cross-diffusion factors. In addition, when the self-diffusion coefficients are assumed to be equal, the homogeneous stable state of the self-diffusion model loses its stability and creates spatial patterns consisting of small spots, followed by a mixture of small spots and stripes, and finally labyrinthine. As a result of cross-diffusion, the prey and predator populations display an inverse connection, which is another significant finding in this instance.
Using amplitude equations, the impacts of super-cross diffusion on a system containing a self-diffusive term have been explored through our study. Until linear or nonlinear super-cross-diffusion terms are utilized in the systems, the self-diffusion approach does not yield significant Turing pattern whenever the prey dependent functional responses are addressed. By using the stability analysis, several criteria have been specified to assure the system's Turing instability. Under such conditions, the system will accommodate the Turing instabilities while producing the related specified configurations. Multiple-scale perturbation analysis has also been done all around Turing bifurcation boundary to obtain the amplitude equations used to analyze the stability of several Turing patterns. These findings are mathematically verified and appear to be in good order. Hexagons, huge spots, tiny spots, squares, and stripes are all produced with the inclusion of self and super-cross-diffusion terms.
This research received funding support from the NSRF via the Program Management Unit for Human Resources & Institutional Development, Research and Innovation, (grant number~B05F650018).
The authors declare that they have no conflicts of interest.
[1] |
H. Liu, F. Wang, A novel semi-analytical meshless method for the thickness optimization of porous material distributed on sound barriers, Appl. Math. Lett., 147 (2024), 108844. https://doi.org/10.1016/j.aml.2023.108844 doi: 10.1016/j.aml.2023.108844
![]() |
[2] |
L. Chen, C. Liu, W. Zhao, L. Liu, An isogeometric approach of two dimensional acoustic design sensitivity analysis and topology optimization analysis for absorbing material distribution, Comput. Meth. Appl. Mech. Eng., 336 (2018), 507–532. https://doi.org/10.1016/j.cma.2018.03.025 doi: 10.1016/j.cma.2018.03.025
![]() |
[3] |
D. Fritze, S. Marburg, H. J. Hardtke, FEM-BEM-coupling and structural-acoustic sensitivity analysis for shell geometries, Comput. Struct., 83 (2005), 143–154. https://doi.org/10.1016/j.compstruc.2004.05.019 doi: 10.1016/j.compstruc.2004.05.019
![]() |
[4] | N. H. Kim, J. Dong, K. K. Choi, N. Vlahopoulos, Z. D. Ma, M. Castanier, et al., Design sensitivity analysis for sequential structural-acoustic problems, J. Sound Vibr., 263 (2003), 569–591. https://doi.org/10.1016/S0022-460X(02)01067-2 |
[5] |
L. Magri, M. P. Juniper, Sensitivity analysis of a time-delayed thermo-acoustic system via an adjoint-based approach, J. Fluid Mech., 719 (2013), 183–202. https://doi.org/10.1017/jfm.2012.639 doi: 10.1017/jfm.2012.639
![]() |
[6] |
L. Chen, C. Zheng, H. Chen, FEM/wideband FMBEM coupling for structural-acoustic design sensitivity analysis, Comput. Meth. Appl. Mech. Eng., 276 (2014), 1–19. https://doi.org/10.1016/j.cma.2014.03.016 doi: 10.1016/j.cma.2014.03.016
![]() |
[7] |
T. Wang, R. Green, R. Guldiken, J. Wang, S. Mohapatra, S. S. Mohapatra, Finite element analysis for surface acoustic wave device characteristic properties and sensitivity, Sensors, 19 (2019), 1749. https://doi.org/10.3390/s19081749 doi: 10.3390/s19081749
![]() |
[8] |
T. Sun, P. Wang, G. Zhang, Y. Chai, Transient analyses of wave propagations in nonhomogeneous media employing the novel finite element method with the appropriate enrichment function, Comput. Math. Appl., 129 (2023), 90–112. https://doi.org/10.1016/j.camwa.2022.10.004 doi: 10.1016/j.camwa.2022.10.004
![]() |
[9] |
L. Chen, H. Lian, S. Natarajan, W. Zhao, X. Chen, S. Bordas, Multi-frequency acoustic topology optimization of sound-absorption materials with isogeometric boundary element methods accelerated by frequency-decoupling and model order reduction techniques, Comput. Meth. Appl. Mech. Eng., 395 (2022), 114997. https://doi.org/10.1016/j.cma.2022.114997 doi: 10.1016/j.cma.2022.114997
![]() |
[10] | L. Chen, H. Lian, Y. Xu, S. Li, Z. Liu, E. Atroshchenko, et al., Generalized isogeometric boundary element method for uncertainty analysis of time-harmonic wave propagation in infinite domains, Appl. Math. Model., 114 (2023), 360–378. https://doi.org/10.1016/j.apm.2022.09.030 |
[11] |
L. Chen, J. Zhao, H. Lian, B. Yu, E. Atroshchenko, P. Li, A BEM broadband topology optimization strategy based on Taylor expansion and SOAR method-Application to 2D acoustic scattering problems, Int. J. Numer. Methods Eng., 2023. https://doi.org/10.1002/nme.7345 doi: 10.1002/nme.7345
![]() |
[12] |
S. Zhao, Y. Gu, A localized Fourier collocation method for solving high-order partial differential equations, Appl. Math. Lett., 141 (2023), 108615. https://doi.org/10.1016/j.aml.2023.108615 doi: 10.1016/j.aml.2023.108615
![]() |
[13] |
L. Qiu, F. Wang, Y. Gu, Q. H. Qin, Modified space‐time radial basis function collocation method for long‐time simulation of transient heat conduction in 3D anisotropic composite materials, Int. J. Numer. Methods Eng., 124 (2023), 4639–4658. https://doi.org/10.1002/nme.7327 doi: 10.1002/nme.7327
![]() |
[14] |
L. Sun, Z. Fu, Z. Chen, A localized collocation solver based on fundamental solutions for 3D time harmonic elastic wave propagation analysis, Appl. Math. Comput., 439 (2023), 127600. https://doi.org/10.1016/j.amc.2022.127600 doi: 10.1016/j.amc.2022.127600
![]() |
[15] |
L. Qiu, X. Ma, Q. H. Qin, A novel meshfree method based on spatio-temporal homogenization functions for one-dimensional fourth-order fractional diffusion-wave equations, Appl. Math. Lett., 142 (2023), 108657. https://doi.org/10.1016/j.aml.2023.108657 doi: 10.1016/j.aml.2023.108657
![]() |
[16] |
B. Ju, W. Qu, Three-dimensional application of the meshless generalized finite difference method for solving the extended Fisher-Kolmogorov equation, Appl. Math. Lett., 136 (2023), 108458. https://doi.org/10.1016/j.aml.2022.108458 doi: 10.1016/j.aml.2022.108458
![]() |
[17] |
S. Jiang, Y. Gu, M. V. Golub, An efficient meshless method for bimaterial interface cracks in 2D thin-layered coating structures, Appl. Math. Lett., 131 (2022), 108080. https://doi.org/10.1016/j.aml.2022.108080 doi: 10.1016/j.aml.2022.108080
![]() |
[18] |
Y. Li, C. Liu, W. Li, Y. Chai, Numerical investigation of the element-free Galerkin method (EFGM) with appropriate temporal discretization techniques for transient wave propagation problems, Appl. Math. Comput., 442 (2023), 127755. https://doi.org/10.1016/j.amc.2022.127755 doi: 10.1016/j.amc.2022.127755
![]() |
[19] |
P. Bouillard, S. Suleaub, Element-Free Galerkin solutions for Helmholtz problems: fomulation and numerical assessment of the pollution effect, Comput. Meth. Appl. Mech. Eng., 162 (1998), 317–335. https://doi.org/10.1016/S0045-7825(97)00350-2 doi: 10.1016/S0045-7825(97)00350-2
![]() |
[20] | D. Soares Jr, An iterative time-domain algorithm for acoustic-elastodynamic coupled analysis considering meshless local Petrov-Galerkin formulations, Comput. Model. Eng. Sci., 54 (2009), 201–222. https://doi.org/10.3970/cmes.2009.054.201 |
[21] | M. Gorakifard, C. Salueña, I. Cuesta, E. Kian Far, The meshless local Petrov-Galerkin cumulant lattice Boltzmann method: Strengths and weaknesses in aeroacoustic analysis, Acta Mech., 233 (2022), 1467–1483. https://doi.org/10.1007/s00707-022-03177-8 |
[22] |
Y. Gu, J. Lin, C. M. Fan, Electroelastic analysis of two-dimensional piezoelectric structures by the localized method of fundamental solutions, Adv. Appl. Math. Mech., 15 (2023), 880–900. https://doi.org/10.4208/aamm.OA-2021-0223 doi: 10.4208/aamm.OA-2021-0223
![]() |
[23] |
M. H. Gfrerer, M. Schanz, A coupled FEM‐MFS method for the vibro‐acoustic simulation of laminated poro‐elastic shells, Int. J. Numer. Methods Eng., 121 (2020), 4235–4267. https://doi.org/10.1002/nme.6391 doi: 10.1002/nme.6391
![]() |
[24] |
F. Wang, Y. Gu, W. Qu, C. Zhang, Localized boundary knot method and its application to large-scale acoustic problems, Comput. Meth. Appl. Mech. Eng., 361 (2020), 112729. https://doi.org/10.1016/j.cma.2019.112729 doi: 10.1016/j.cma.2019.112729
![]() |
[25] |
Y. Hon, W. Chen, Boundary knot method for 2D and 3D Helmholtz and convection-diffusion problems under complicated geometry, Int. J. Numer. Methods Eng., 56 (2003), 1931–1948. https://doi.org/10.1002/nme.642 doi: 10.1002/nme.642
![]() |
[26] |
S. Cheng, F. Wang, G. Wu, C. Zhang, A semi-analytical and boundary-type meshless method with adjoint variable formulation for acoustic design sensitivity analysis, Appl. Math. Lett., 131 (2022), 108068. https://doi.org/10.1016/j.aml.2022.108068 doi: 10.1016/j.aml.2022.108068
![]() |
[27] |
X. Wei, W. Luo, 2.5 D singular boundary method for acoustic wave propagation, Appl. Math. Lett., 112 (2021), 106760. https://doi.org/10.1016/j.aml.2020.106760 doi: 10.1016/j.aml.2020.106760
![]() |
[28] | W. Chen, Singular boundary method: A novel, simple, meshfree, boundary collocation numerical method, Chinese J. Solid Mech., 30 (2009), 592–599. https://doi.org/10.19636/j.cnki.cjsm42-1250/o3.2009.06.011 |
[29] |
X. Wei, C. Rao, S. Chen, W. Luo, Numerical simulation of anti-plane wave propagation in heterogeneous media, Appl. Math. Lett., 135 (2023), 108436. https://doi.org/10.1016/j.aml.2022.108436 doi: 10.1016/j.aml.2022.108436
![]() |
[30] |
Z. J. Fu, W. Chen, Y. Gu, Burton-Miller-type singular boundary method for acoustic radiation and scattering, J. Sound Vibr., 333 (2014), 3776–3793. https://doi.org/10.1016/j.jsv.2014.04.025 doi: 10.1016/j.jsv.2014.04.025
![]() |
[31] | J. White, J. Phillips, T. Korsmeyer, Comparing precorrected-FFT and fast multipole algorithms for solving three-dimensional potential integral equations, In: Colorado conference on iterative methods, 1994. |
[32] |
Y. S. Smyrlis, A. Karageorghis, A matrix decomposition MFS algorithm for axisymmetric potential problems, Eng. Anal. Bound. Elem., 28 (2004), 463–474. https://doi.org/10.1016/S0955-7997(03)00100-0 doi: 10.1016/S0955-7997(03)00100-0
![]() |
[33] | J. Tausch, J. White, Wavelet-like bases for integral equations on surfaces with complex geometry, IMACS Ser. Comput. Appl. Math., 4 (1998), 251–256. |
[34] |
J. R. Phillips, J. K. White, A precorrected-FFT method for electrostatic analysis of complicated 3-D structures, IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., 16 (1997), 1059–1072. https://doi.org/10.1109/43.662670 doi: 10.1109/43.662670
![]() |
[35] | J. R. Phillips, Rapid solution of potential integral equations in complicated 3-dimensional geometries, Massachusetts Institute of Technology, 1997. |
[36] | L. Greengard, The rapid evaluation of potential fields in particle systems, Cambridge: MIT Press, 1988. https://doi.org/10.1016/0378-4754(88)90063-8 |
[37] |
W. Hackbusch, B. N. Khoromskij, A sparse H-matrix arithmetic: general complexity estimates, J. Comput. Appl. Math., 125 (2000), 479–501. https://doi.org/10.1016/S0377-0427(00)00486-6 doi: 10.1016/S0377-0427(00)00486-6
![]() |
[38] |
W. Hackbusch, B. N. Khoromskij, A sparse ℋ-matrix arithmetic. Part Ⅱ: Application to multi-dimensional problems, Computing, 64 (2000), 21–47. https://doi.org/10.1007/PL00021408 doi: 10.1007/PL00021408
![]() |
[39] |
M. Bebendorf, Approximation of boundary element matrices, Numer. Math., 86 (2000), 565–589. https://doi.org/10.1007/PL00005410 doi: 10.1007/PL00005410
![]() |
[40] |
M. Bebendorf, S. Rjasanow, Adaptive low-rank approximation of collocation matrices, Computing, 70 (2003), 1–24. https://doi.org/10.1007/s00607-002-1469-6 doi: 10.1007/s00607-002-1469-6
![]() |
[41] |
C. Zheng, T. Matsumoto, T. Takahashi, H. Chen, Explicit evaluation of hypersingular boundary integral equations for acoustic sensitivity analysis based on direct differentiation method, Eng. Anal. Bound. Elem., 35 (2011), 1225–1235. https://doi.org/10.1016/j.enganabound.2011.05.004 doi: 10.1016/j.enganabound.2011.05.004
![]() |
[42] |
J. Li, W. Chen, Z. Fu, L. Sun, Explicit empirical formula evaluating original intensity factors of singular boundary method for potential and Helmholtz problems, Eng. Anal. Bound. Elem., 73 (2016), 161–169. https://doi.org/10.1016/j.enganabound.2016.10.003 doi: 10.1016/j.enganabound.2016.10.003
![]() |
[43] |
S. Cheng, F. Wang, P. W. Li, W. Qu, Singular boundary method for 2D and 3D acoustic design sensitivity analysis, Comput. Math. Appl., 119 (2022), 371–386. https://doi.org/10.1016/j.camwa.2022.06.009 doi: 10.1016/j.camwa.2022.06.009
![]() |
[44] |
L. Godinho, D. Soares Jr, P. Santos, Efficient analysis of sound propagation in sonic crystals using an ACA-MFS approach, Eng. Anal. Bound. Elem., 69 (2016), 72–85. https://doi.org/10.1016/j.enganabound.2016.05.001 doi: 10.1016/j.enganabound.2016.05.001
![]() |
[45] | L. Godinho, P. Amado-Mendes, A. Pereira, D. Soares Jr, An efficient MFS formulation for the analysis of acoustic scattering by periodic structures, J. Theor. Comput. Acoust., 26 (2018), 1850003. https://doi.org/10.1142/S2591728518500032 |
[46] |
X. Wei, B. Chen, S. Chen, S. Yin, An ACA-SBM for some 2D steady-state heat conduction problems, Eng. Anal. Bound. Elem., 71 (2016), 101–111. https://doi.org/10.1016/j.enganabound.2016.07.012 doi: 10.1016/j.enganabound.2016.07.012
![]() |
1. | Rongjie Yu, Hengguo Yu, Min Zhao, Steady states and spatiotemporal dynamics of a diffusive predator-prey system with predator harvesting, 2024, 9, 2473-6988, 24058, 10.3934/math.20241170 | |
2. | Soo-Oh Yang, Jea-Hyun Park, Analysis for the hierarchical architecture of the heterogeneous FitzHugh-Nagumo network inducing synchronization, 2023, 8, 2473-6988, 22385, 10.3934/math.20231142 | |
3. | Vinoth Seralan, R. Vadivel, Dimplekumar Chalishajar, Nallappan Gunasekaran, Dynamical complexities and chaos control in a Ricker type predator-prey model with additive Allee effect, 2023, 8, 2473-6988, 22896, 10.3934/math.20231165 | |
4. | Mohammad Sharif Ullah, K. M. Ariful Kabir, Md. Abdul Hakim Khan, A non-singular fractional-order logistic growth model with multi-scaling effects to analyze and forecast population growth in Bangladesh, 2023, 13, 2045-2322, 10.1038/s41598-023-45773-1 |