
Multi Stakeholders collaboration becomes imperative when a single agency such as the NNPC or the Oil Companies alone cannot adequately address a recurring menace such as oil pipeline disasters. Thus, agencies such as National Emergency Management Agency (NEMA), NOSDRA, FMHDSD, Fire Service, Oil Companies, Health and Security agencies, the Media and Academia, as well the Community must seek to promote cooperation in order to achieve successful oil pipeline disaster policy implementation. To achieve this goal efficiently and effectively, a framework for stakeholders* collaboration in the management and mitigation of oil pipeline disasters in Nigeria was developed in this study, following a logical path and adopting the use of interviews conducted among the main stakeholders and with industry experts. In a bid to achieve an un-biased opinion, questionnaires and document analysis of data obtained from secondary sources was carried out.
A framework for the mitigation of oil pipeline disasters before, during and after disaster occurrence was developed. The framework captures the relevant stakeholders as well as their roles in disaster mitigation.
Citation: Francis I. Johnson, Richard Laing, Bassam Bjeirmi, Marianthi Leon. Developing a framework for stakeholders collaboration in the management and mitigation of oil pipeline disasters in Nigeria[J]. AIMS Energy, 2022, 10(6): 1230-1260. doi: 10.3934/energy.2022058
[1] | Haixia Lu, Li Sun . Positive solutions to a semipositone superlinear elastic beam equation. AIMS Mathematics, 2021, 6(5): 4227-4237. doi: 10.3934/math.2021250 |
[2] | Mohammed Alkinidri, Rab Nawaz, Hani Alahmadi . Analytical and numerical investigation of beam-spring systems with varying stiffness: a comparison of consistent and lumped mass matrices considerations. AIMS Mathematics, 2024, 9(8): 20887-20904. doi: 10.3934/math.20241016 |
[3] | Jianan Qiao, Guolin Hou, Jincun Liu . Analytical solutions for the model of moderately thick plates by symplectic elasticity approach. AIMS Mathematics, 2023, 8(9): 20731-20754. doi: 10.3934/math.20231057 |
[4] | Ahmed M.A. El-Sayed, Eman M.A. Hamdallah, Hameda M. A. Alama . Multiple solutions of a Sturm-Liouville boundary value problem of nonlinear differential inclusion with nonlocal integral conditions. AIMS Mathematics, 2022, 7(6): 11150-11164. doi: 10.3934/math.2022624 |
[5] | Batirkhan Turmetov, Valery Karachik . On solvability of some inverse problems for a nonlocal fourth-order parabolic equation with multiple involution. AIMS Mathematics, 2024, 9(3): 6832-6849. doi: 10.3934/math.2024333 |
[6] | Ebrahem A. Algehyne, Nifeen Hussain Altaweel, Mounirah Areshi, Faizan Ahmad Khan . Relation-theoretic almost ϕ-contractions with an application to elastic beam equations. AIMS Mathematics, 2023, 8(8): 18919-18929. doi: 10.3934/math.2023963 |
[7] | Mukhamed Aleroev, Hedi Aleroeva, Temirkhan Aleroev . Proof of the completeness of the system of eigenfunctions for one boundary-value problem for the fractional differential equation. AIMS Mathematics, 2019, 4(3): 714-720. doi: 10.3934/math.2019.3.714 |
[8] | Kun Li, Peng Wang . Properties for fourth order discontinuous differential operators with eigenparameter dependent boundary conditions. AIMS Mathematics, 2022, 7(6): 11487-11508. doi: 10.3934/math.2022640 |
[9] | Ammar Khanfer, Lazhar Bougoffa . On the fourth-order nonlinear beam equation of a small deflection with nonlocal conditions. AIMS Mathematics, 2021, 6(9): 9899-9910. doi: 10.3934/math.2021575 |
[10] | Yanyan Cui, Chaojun Wang . Dirichlet and Neumann boundary value problems for bi-polyanalytic functions on the bicylinder. AIMS Mathematics, 2025, 10(3): 4792-4818. doi: 10.3934/math.2025220 |
Multi Stakeholders collaboration becomes imperative when a single agency such as the NNPC or the Oil Companies alone cannot adequately address a recurring menace such as oil pipeline disasters. Thus, agencies such as National Emergency Management Agency (NEMA), NOSDRA, FMHDSD, Fire Service, Oil Companies, Health and Security agencies, the Media and Academia, as well the Community must seek to promote cooperation in order to achieve successful oil pipeline disaster policy implementation. To achieve this goal efficiently and effectively, a framework for stakeholders* collaboration in the management and mitigation of oil pipeline disasters in Nigeria was developed in this study, following a logical path and adopting the use of interviews conducted among the main stakeholders and with industry experts. In a bid to achieve an un-biased opinion, questionnaires and document analysis of data obtained from secondary sources was carried out.
A framework for the mitigation of oil pipeline disasters before, during and after disaster occurrence was developed. The framework captures the relevant stakeholders as well as their roles in disaster mitigation.
We consider characteristic equations, i.e., equations for eigenvalues and eigenfunctions of the class of integral operators on the Hilbert space L2[−l,l] of the form
KM[w](x)=∫l−lGM(x,ξ)w(ξ)dξ,x∈[−l,l], w∈L2[−l,l], | (1.1) |
where GM is the Green function [1,2] for the boundary value problem consisting of the fourth-order linear differential equation
EI⋅u(4)(x)+k⋅u(x)=w(x),x∈[−l,l] | (1.2) |
and a well-posed two-point boundary condition
M⋅(u(−l)u′(−l)u′′(−l)u′′′(−l)u(l)u′(l)u′′(l)u′′′(l))T=0. | (1.3) |
Here, M∈gl(4,8,C) is called a boundary matrix, where gl(4,8,C) is the set of 4×8 matrices with complex entries. For example, the two-point boundary condition u(−l)=u′(−l)=u(l)=u′(l)=0 can be expressed by (1.3) with
M=(10000000010000000000100000000100). |
The differential equation (1.2) is the classical Euler–Bernoulli beam equation [3] which governs the vertical downward deflection u(x) of a linear-shaped beam with finite length 2l resting horizontally on an elastic foundation with spring constant density k. The constants E and I are the Young's modulus and the mass moment of inertia of the beam respectively, and w(x) is the downward load density applied vertically on the beam. The beam deflection problem has been one of the central topics in mechanical engineering with diverse and important applications [3,4,5,6,7,8,9,10,11,12].
Throughout this paper, we assume that l, E, I, k in (1.2) are positive constants and put α=4√k/(EI)>0. When the boundary value problem consisting of (1.2) and (1.3) is well-posed or, equivalently, when (1.2) and (1.3) has a unique solution, we call the boundary matrix M well-posed. The set of well-posed boundary matrices is denoted by wp(4,8,C). It was shown in [2] that, up to a natural equivalence relation, wp(4,8,C) is in one-to-one correspondence with the 16-dimensional algebra gl(4,C) of 4×4 matrices with complex entries.
For M∈wp(4,8,C), we denote by SpecKM the spectrum or, the set of eigenvalues, of the integral operator KM in (1.1). Since KM[w] is the unique solution of the boundary value problem (1.2) and (1.3) for every M∈wp(4,8,C), analyzing the behavior of the integral operators KM is important in understanding the beam deflection problem. In general, spectral analysis for integral operators arising from various differential equations is crucial in many applications such as inverse problem [13] and nonlinear problem [5,6]. In contrast to this importance, there are few explicit spectral analyses for the integral operators KM which arise from a most fundamental and basic differential equation (1.2) in the history of mechanical engineering.
Choi [14] analyzed SpecKQ of a special integral operator KQ in detail, where
Q=(0α2−√2α10000√2α3−α201000000000α2√2α10000−√2α3−α201), | (1.4) |
which is in wp(4,8,C) [2]. The Green function GQ(x,ξ) corresponding to Q is the restriction in [−l,l]×[−l,l] of the Green function for the boundary value problem consisting of the infinite version EI⋅u(4)(x)+k⋅u(x)=w(x), x∈(−∞,∞) of (1.2) and the boundary condition limx→±∞u(x)=0.
For two positive sequences an, bn, we denote an∼bn if there exists N>0 such that m≤an/bn≤M for every n>N for some constants 0<m≤M<∞.
Proposition 1.1 ([14]). For every l>0, the spectrum SpecKQ of the operator KQ is of the form {μn/k|n=1,2,3,⋯}∪{νn/k|n=1,2,3,⋯}⊂(0,1/k), where 1>μ1>ν1>μ2>ν2>⋯↘0. Each of μn and νn for n=1,2,3,… is determined only by the intrinsic length L=2lα of the beam. μn∼νn∼n−4, and
11+{h−1(2πn+π2)}4<νn<11+{h−1(2πn)}4<μn<11+{h−1(2πn−π2)}4,n=1,2,3,…,11+{h−1(2πn−π2)}4−μn∼νn−11+{h−1(2πn+π2)}4∼n−5e−2πn,11+1L4(2π(n−1)−π2)4−μn∼11+1L4(2π(n−1)+π2)4−νn∼n−6. |
Here, h:[0,∞)→[0,∞) is the strictly increasing real-analytic function defined in Supplementary D, with the properties h(0)=0 and h−1(an)∼an/L for any positive sequence an such that an→∞. See [14] for numerical computations of μn, νn with arbitrary precision.
Recently, Choi [2] derived explicit characteristic equations for the integral operator KM in (1.1) for arbitrary well-posed M∈wp(4,8,C), which are stated in more detail in Section 2. Although these characteristic equations are expressed in terms of the explicit 4×4 matrices G(M), Xλ, Yλ, they still involve determinants of full 4×4 matrices, which makes it hard to analyze the structure of SpecKM for general well-posed boundary matrix M.
In this paper, we utilize some of the symmetries in the 4×4 matrices Xλ, Yλ to block-diagonalize them with explicit 2×2 blocks X±λ, Y±λ, which enables us to obtain new and simpler forms of characteristic equations for the integral operator KM for arbitrary well-posed boundary matrix M∈wp(4,8,C). In particular, the entries of the 2×2 blocks X±λ and Y±λ are represented explicitly with the concrete holomorphic functions δ±(z,κ) and p±(z) introduced in Section 3.
Our results significantly reduce the complexity of dealing with determinants of 4×4 matrices and facilitate to represent SpecKM for arbitrary M∈wp(4,8,C) essentially as the zero set of one explicit holomorphic function composed with the concrete functions δ±(z,κ). For example, Corollary 1 in Section 3 states that 0,1/k≠λ∈SpecKQ if and only if λ is a zero of the holomorphic function δ+(αl,χ(λ))⋅δ−(αl,χ(λ)), where χ is a 4th root transformation introduced in Section 2. In particular, the holomorphic functions δ±(z,κ) unify the real-analytic functions which were analyzed in detail in [14,15] to obtain concrete results on SpecKQ such as Proposition 1.1. The fact that δ±(z,κ) encapsulate condensed information on SpecKQ, and hence on SpecKM in general, is demonstrated in Supplementary D by showing that the seemingly complex-looking conditions φ±(κ)=p(κ), which were derived in [14] with the help of computer algebra systems, can be directly and elegantly recovered from δ±(z,κ).
Our results open up practical ways to direct and concrete spectral analysis for the whole 16-dimensional class of the integral operators KM arising from arbitrary well-posed boundary value problem of finite beam deflection on elastic foundation.
After introducing basic notations, definitions, and previous results relevant to our analysis in Section 2, we state our main results Theorems 1, 2 and 3 in Section 3, which are proved in Sections 4, 5 and 6 respectively. Some remarks and future directions are given in Section 7. In Supplementary D, the conditions φ±(κ)=p(κ) on SpecKQ in [14] are derived from our holomorphic functions δ±(z,κ).
We denote i=√−1. Denote by Z, R, and C, the set of integers, the set of real numbers, and the set of complex numbers respectively. The set of m×n matrices with entries in C is denoted by gl(m,n,C). When m=n, we also denote gl(m,n,C)=gl(n,C). We write A=(ai,j)1≤i≤m,1≤j≤n when the (i,j)th entry of A∈gl(m,n,C) is ai,j. When m=n, we also write A=(ai,j)1≤i,j≤n. For A∈gl(m,n,C), we denote the (i,j)th entry of A by Ai,j. The complex conjugate, the transpose, and the conjugate transpose of A∈gl(m,n,C) are denoted by ¯A, AT, and A∗ respectively. For A∈gl(n,C), adjA is the classical adjoint of A, so that, if A is invertible then A−1=adjA/detA.
Regardless of size, the identity matrix and the zero matrix are denoted by I and O respectively. The zero column vector with any size is denoted by 0. The diagonal matrix with diagonal entries c1,c2,⋯,cn is denoted by diag(c1,c2,⋯,cn).
Definition 2.1. Denote ω=eiπ4=1√2+i1√2 and ωn=in−1ω for n∈Z. Denote Ω=diag(ω1,ω2,ω3,ω4) and W0=(ωi−1j)1≤i,j≤4.
ω1=ω, ω2, ω3, ω4 are the primitive 4th roots of −1 and satisfy
¯ω=ω4=−ω2=−iω,ω3=−ω,¯ωn=ω−1n, n∈Z,ω+¯ω=√2,ω−¯ω=i√2,ω2=i,ω¯ω=1. | (2.1) |
Definition 2.2. Denote ϵ1=ϵ4=1, ϵ2=ϵ3=−1, and ϵn+4=ϵn for n∈Z. Denote E=diag(ϵ1,ϵ2,ϵ3,ϵ4)=diag(1,−1,−1,1).
By Definitions 2.1, 2.2 and (2.1), we have
e−EΩz=diag(e−ω1z,eω2z,eω3z,e−ω4z)=diag(e−ωz,e−¯ωz,e−ωz,e−¯ωz)=(diag(e−ωz,e−¯ωz)OOdiag(e−ωz,e−¯ωz)),z∈C. | (2.2) |
Definition 2.3. Denote
V=1√2(II−II)=1√2(10100101−10100−101),ˆV=(1000001001000001). |
Note that V and ˆV are orthogonal and
V−1=VT,ˆV−1=ˆVT=ˆV,detV=1,detˆV=−1. | (2.3) |
Lemma 2.1. V(ABBA)VT=(A+BOOA−B) for A,B∈gl(2,C).
Proof. By Definition 2.3,
V(ABBA)VT=1√2(II−II)⋅(ABBA)⋅1√2(I−III)=12(A+BA+B−A+BA−B)(I−III)=(A+BOOA−B). |
By (2.2) and Lemma 2.1,
Ve−EΩzVT=(diag(e−ωz,e−¯ωz)+OOOdiag(e−ωz,e−¯ωz)−O)=(diag(e−ωz,e−¯ωz)OOdiag(e−ωz,e−¯ωz))=e−EΩz,z∈C. | (2.4) |
By (2.1),
detdiag(e−ωz,e−¯ωz)=e−ωz⋅e−¯ωz=e−(ω+¯ω)z=e−√2z,z∈C. | (2.5) |
Definition 2.4. For λ∈C∖{0,1/k}, define χ(λ) to be the unique complex number satisfying χ(λ)4=1−1/(λk) and 0≤Argχ(λ)<π/2.
Note that χ is a one-to-one correspondence from C∖{0,1/k} to the set {κ∈C|0≤Argκ<π/2}∖{0,1}.
Definition 2.5. Let 0≠λ∈C and x∈R. For λ≠1/k, let κ=χ(λ). Denote
W(x)=(y(x)y′(x)y′′(x)y′′′(x))T,Wλ(x)=(y(i−1)λ,j(x))1≤i,j≤4, |
where y(x)=(eω1αxeω2αxeω3αxeω4αx)T and yλ,j(x)={1(j−1)!⋅xj−1,if λ=1/k,eωjκαx,if λ≠1/k,j=1,2,3,4. Denote Xλ(x)=diag(0,1,1,0)⋅W(−x)−1Wλ(−x)+diag(1,0,0,1)⋅W(x)−1Wλ(x). When detXλ(x)≠0, denote Yλ(x)=Xλ(−x)Xλ(x)−1−I.
Definition 2.6. Define G:wp(4,8,C)→gl(4,C) by
G(M)={M−W(−l)+M+W(l)}−1M+W(l)E−diag(1,0,0,1), |
where M−,M+∈gl(4,C) are the 4×4 minors of M such that M=(M−M+). Define ψ:gl(4,C)→gl(4,8,C) by
ψ(G)=({diag(0,1,1,0)−GE}W(−l)−1{diag(1,0,0,1)+GE}W(l)−1). |
The map G in Definition 2.6 is well defined since, for M=(M−M+)∈gl(4,8,C), M∈wp(4,8,C) if and only of det{M−W(−l)+M+W(l)}≠0 [2,Lemma 3.1]. G(M) is denoted by GM in [2]. Define the equivalence relation ≈ on wp(4,8,C) by M≈N if and only if M=AN for some invertible A∈gl(4,C).
Proposition 2.1. (a) ([2,Lemma 6.1]) For M,N∈wp(4,8,C), the following (i), (ii), (iii) are equivalent: (i)M≈N, (ii)G(M)=G(N), (iii)KM=KN.
(b)([2,Eq 6.4]) For G∈gl(4,C), ψ(G)∈wp(4,8,C) and G(ψ(G))=G.
Denote by wp(C) the quotient set wp(4,8,C)/≈ of wp(4,8,C) with respect to the relation ≈. For M∈wp(4,8,C), denote by [M] the equivalence class in wp(4,8,C)/≈ which contains M. Then we have the canonical projection π:wp(4,8,C)→wp(C) defined by π(M)=[M]. By Proposition 2.1, the map π∘ψ:gl(4,C)→wp(C) is a one-to-one correspondence, and we denote its inverse by Γ:wp(C)→gl(4,C). Thus we have the commutative diagram in Figure 1 which holds for any invertible A∈gl(4,C). Here, the map PA:wp(4,8,C)→wp(4,8,C) is defined by PA(M)=AM.
By Proposition 2.1, the set of integral operators KM in (1.1) is in one-to-one correspondence with the set wp(C) of equivalent well-posed boundary matrices, and hence is also in one-to-one correspondence with gl(4,C). Note that both of the maps G and ψ in Definition 2.6 are explicitly computable, hence Γ and its inverse Γ−1 are explicitly computable. For the special boundary matrix Q in (1.4), we have [2,Eq 6.2]
G(Q)=O. | (2.6) |
Proposition 2.2. For M∈wp(4,8,C) and λ∈C, the following (a) and (b) hold.
(a) ([2,Theorem 1 and Corollary 1]) KM[u]=λ⋅u for some 0≠u∈L2[−l,l] if and only if λ≠0 and u=cTyλ for some 0≠c∈gl(4,1,C) such that [G(M){Xλ(l)−Xλ(−l)}+Xλ(l)]c=0. KQ[u]=λ⋅u for some 0≠u∈L2[−l,l] if and only if λ≠0 and u=cTyλ for some 0≠c∈gl(4,1,C) such that Xλ(l)c=0. In particular, 0≠λ∈SpecKQ if and only if detXλ(l)=0.
(b) ([2,Corollary 2]) Let 0≠λ∈C∖SpecKQ. Then λ∈SpecKM if and only if det{G(M)Yλ(l)−I}=0.
The following is well defined since the range χ(C∖{0,1/k}) of χ in Definition 2.4 does not contain 1,−1,i,−i.
Definition 3.1. For λ∈C∖{0,1/k} and x∈R, denote
X±λ(x)=1−κ44⋅diag(e−ωz,e−¯ωz)(eωκz1−κ±e−ωκz1+κe−¯ωκz1−iκ±e¯ωκz1+iκe−ωκz1+iκ±eωκz1−iκe¯ωκz1−κ±e−¯ωκz1+κ), |
where z=αx and κ=χ(λ).
The following is well defined, since
(1+κ21−κ2)2−(2κ1−κ2)2=1,κ∈C∖{−1,1},(1−κ21+κ2)2+(2κ1+κ2)2=1,κ∈C∖{−i,i}. |
Definition 3.2. Denote by β(κ) any holomorphic branch in C∖{−1,1} satisfying
coshβ(κ)=1+κ21−κ2,sinhβ(κ)=2κ1−κ2, |
and denote by γ(κ) any holomorphic branch in C∖{−i,i} satisfying
cosγ(κ)=1−κ21+κ2,sinγ(κ)=2κ1+κ2. |
For z∈C and κ∈C∖{1,−1,i,−i}, define
δ±(z,κ)=sinh(√2κz+β(κ))±sin(√2κz+γ(κ)). |
β(κ) and γ(κ) are holomorphic branches of 2arctanhκ and 2arctanκ respectively, which, in turn, are anti-derivatives of 2/(1−κ2) and 2/(1+κ2) respectively.
Definition 3.3. Define F:wp(4,8,C)→gl(4,C) by F(M)=VG(M)VT and ϕ:gl(4,C)→wp(4,8,C) by ϕ(G)=ψ(VTGV). F(M) is called the fundamental boundary matrix corresponding to the well-posed boundary matrix M∈wp(4,8,C).
Denote by SimVT,SimV:gl(4,C)→gl(4,C) the similarity transforms defined by SimVTG=VGVT and SimVG=VTGV respectively, so that F=SimVT∘G and ϕ=ψ∘SimV by Definition 3.3. By (2.3), Sim−1VT=SimV, hence, by Proposition 2.1 (b), F(ϕ(G))=SimVTG(ψ(SimVG))=SimVTSimVG=G for G∈gl(4,C). Thus Definition 3.3 gives a new one-to-one correspondence Φ:wp(C)→gl(4,C) defined by Φ=SimVT∘Γ. See Figure 2 for a commutative diagram which expands the one in Figure 1 to incorporate Φ.
By Proposition 2.1 and Definition 3.3, the set of integral operators KM in (1.1) is in one-to-one correspondence with the 16-dimensional algebra gl(4,C). Both of Φ and its inverse Φ−1 are explicitly computable by using the maps F and ϕ in Definition 3.3.
Theorem 1. For λ∈C∖{0,1/k}, the following (a) and (b) hold.
(a) For M∈wp(4,8,C), KM[u]=λ⋅u for some 0≠u∈L2[−l,l] if and only if u=cTyλ for some 0≠c∈gl(4,1,C) such that
{F(M)(X+λ(−l)−X+λ(l)OOX−λ(−l)−X−λ(l))−(X+λ(l)OOX−λ(l))}Vc=0. |
KQ[u]=λ⋅u for some 0≠u∈L2[−l,l] if and only if u=cTyλ for some 0≠c∈gl(4,1,C) such that (X+λ(l)OOX−λ(l))Vc=0.
(b) Let κ=χ(λ) and z=αx. Then, for x∈R,
detX±λ(x)=e−√2zκ(1−κ4)4⋅δ±(z,κ),detXλ(x)=detX+λ(x)detX−λ(x)=e−2√2zκ2(1−κ4)216⋅δ+(z,κ)δ−(z,κ). |
The proof of Theorem 1 will be given at the end of Section 4.
By Proposition 1.1, 0,1/k∉SpecKQ for every l>0. Note that κ≠0 and κ4≠1 when κ=χ(λ) and λ∈C∖{0,1/k}. Thus, by Proposition 2.2 (a) and Theorem 1, the zero sets of the holomorphic functions δ±(z,κ) in Definition 3.2 completely describe SpecKQ in Proposition 1.1.
Corollary 1. For every l>0, λ∈C is in SpecKQ if and only if λ≠0, λ≠1/k, and δ+(αl,χ(λ))⋅δ−(αl,χ(λ))=0.
Definition 3.4. For z∈C, denote pn(z)=∑nr=0ωn−rr!zr, n=0,1,2,3, where it is understood that 00=1, and denote
P+(z)=(¯p0(¯z)¯p2(¯z)p0(z)p2(z)),P−(z)=(−¯p1(¯z)−¯p3(¯z)p1(z)p3(z)). |
For x∈R, denote
X+1/k(x)=12√2diag(e−ωz,e−¯ωz)⋅P+(z)⋅diag(1,α−2),X−1/k(x)=12√2diag(e−ωz,e−¯ωz)⋅P−(z)⋅diag(α−1,α−3), |
where z=αx.
Definition 3.5. For z∈C, denote
p+(z)=1+z√2,p−(z)=1+√2z+z2+z33√2. |
Theorem 2. The following (a) and (b) hold.
(a) For M∈wp(4,8,C), KM[u]=1k⋅u for some 0≠u∈L2[−l,l] if and only if u=cTy1/k for some 0≠c∈gl(4,1,C) such that
{F(M)(X+1/k(−l)−X+1/k(l)OOX−1/k(−l)−X−1/k(l))−(X+1/k(l)OOX−1/k(l))}ˆVc=0. |
(b) For x∈R,
detX+1/k(x)=ie−√2z4α2⋅p+(z),detX−1/k(x)=−ie−√2z4α4⋅p−(z),detX1/k(x)=−detX+1/k(x)detX−1/k(x)=−e−2√2z16α6⋅p+(z)p−(z), |
where z=αx. detX±1/k(x)≠0 and detX1/k(x)≠0 for x>0.
The proof of Theorem 2 will be given at the end of Section 5.
Definition 3.6. For 0≠λ∈C and x∈R such that detX±λ(x)≠0, denote Y±λ(x)=X±λ(−x)⋅X±λ(x)−1−I.
Theorem 3. The following (a) and (b) hold.
(a) For M∈wp(4,8,C) and 0≠λ∈C∖SpecKQ, λ∈SpecKM if and only if
det{F(M)(Y+λ(l)OOY−λ(l))−I}=0. |
(b) Let 0≠λ∈C, x∈R, and z=αx. Suppose that detX±λ(x)≠0. If λ≠1/k, then
Y±λ(x)=1δ±(z,κ)(e2ωzδ±(−iz,κ)−δ±(z,κ)√2ωe√2zs±(zκ)√2¯ωe√2zs±(zκ)e2¯ωzδ±(iz,κ)−δ±(z,κ)), |
where κ=χ(λ) and s±(ζ)=sinh(√2ζ)±sin(√2ζ) for ζ∈C. Also,
Y±1/k(x)=1p±(z)(e2ωzp±(−iz)−p±(z)12∓1ωe√2zz2∓112∓1¯ωe√2zz2∓1e2¯ωzp±(iz)−p±(z)). |
The proof of Theorem 3 will be given at the end of Section 6.
Definition 4.1. For z,κ∈C, denote
X(z,κ)=14e−EΩz{diag(0,1,1,0)⋅W∗0⋅diag(1,κ,κ2,κ3)⋅W0e−Ωκz+diag(1,0,0,1)⋅W∗0⋅diag(1,κ,κ2,κ3)⋅W0eΩκz}. |
Proposition 4.1. ([2,Eq 7.9]) For λ∈C∖{0,1/k} and x∈R, Xλ(x)=X(z,κ), where z=αx and κ=χ(λ).
Definition 4.2. Denote D=C∖{0,1,−1,i,−i}. For z∈C and κ∈D, denote
ˆX(z,κ)=11−κ4{diag(0,1,1,0)⋅W∗0⋅diag(1,κ,κ2,κ3)⋅W0e−Ωκz+diag(1,0,0,1)⋅W∗0⋅diag(1,κ,κ2,κ3)⋅W0eΩκz}. |
By Definitions 4.1 and 4.2, we have
X(z,κ)=1−κ44⋅e−EΩz⋅ˆX(z,κ),z∈C, κ∈D. | (4.1) |
Lemma 4.1. For z∈C and κ∈D, ˆX(z,κ)=(eϵiωjκz1−ωjωiκ)1≤i,j≤4.
Proof. By Definition 2.1 and (2.1), W∗0=(¯ωij−1)1≤i,j≤4=(ω1−ji)1≤i,j≤4, hence
{W∗0⋅diag(1,κ,κ2,κ3)⋅W0}i,j=4∑r=1ω1−ri⋅κr−1⋅ωr−1j=4∑r=1(ωjωi⋅κ)r−1=1−ω4jω4i⋅κ41−ωjωi⋅κ=1−κ41−ωjωiκ |
for 1≤i,j≤4. So by Definition 4.2, we have
ˆX(z,κ)=diag(0,1,1,0)⋅(11−ωjωiκ)1≤i,j≤4⋅e−Ωκz+diag(1,0,0,1)⋅(11−ωjωiκ)1≤i,j≤4⋅eΩκz=diag(0,1,1,0)⋅(e−ωjκz1−ωjωiκ)1≤i,j≤4+diag(1,0,0,1)⋅(eωjκz1−ωjωiκ)1≤i,j≤4. |
Thus the result follows by Definition 2.2.
Definition 4.3. For z∈C and κ∈D, denote
ˆX±(z,κ)=(eωκz1−κ±e−ωκz1+κe−¯ωκz1−iκ±e¯ωκz1+iκe−ωκz1+iκ±eωκz1−iκe¯ωκz1−κ±e−¯ωκz1+κ),X±(z,κ)=1−κ44⋅diag(e−ωz,e−¯ωz)⋅ˆX±(z,κ). |
Note from Definitions 3.1 and 4.3 that
X±λ(x)=X±(z,κ),λ∈C∖{0,1/k}, x∈R, | (4.2) |
where z=αx and κ=χ(λ).
Lemma 4.2. For z∈C and κ∈D, VˆX(z,κ)VT=(ˆX+(z,κ)OOˆX−(z,κ)).
Proof. By (2.1), Definition 2.2 and Lemma 4.1,
ˆX(z,κ)i+2,j+2=eϵi+2ωj+2κz1−ωj+2ωi+2κ=e(−ϵi)(−ωj)κz1−(−ωj)(−ωi)κ=eϵiωjκz1−ωjωiκ=ˆX(z,κ)i,j,ˆX(z,κ)i+2,j=eϵi+2ωjκz1−ωjωi+2κ=e(−ϵi)(−ωj+2)κz1−(−ωj+2)(−ωi)κ=eϵiωj+2κz1−ωj+2ωiκ=ˆX(z,κ)i,j+2 |
for 1≤i,j≤2, which implies that ˆX(z,κ)=(ABBA), where we put A={ˆX(z,κ)i,j}1≤i,j≤2,B={ˆX(z,κ)i,j+2}1≤i,j≤2∈gl(2,C). So by Lemma 2.1, we have
VˆX(z,κ)VT=(A+BOOA−B). | (4.3) |
By Lemma 4.1, we have
A±B={ˆX(z,κ)i,j}1≤i,j≤2±{ˆX(z,κ)i,j+2}1≤i,j≤2=(eϵiωjκz1−ωjωiκ±eϵiωj+2κz1−ωj+2ωiκ)1≤i,j≤2=(eϵ1ω1κz1−ω1ω1κ±eϵ1ω3κz1−ω3ω1κeϵ1ω2κz1−ω2ω1κ±eϵ1ω4κz1−ω4ω1κeϵ2ω1κz1−ω1ω2κ±eϵ2ω3κz1−ω3ω2κeϵ2ω2κz1−ω2ω2κ±eϵ2ω4κz1−ω4ω2κ), |
hence, by (2.1) and Definitions 2.2, 4.3,
A±B=(eωκz1−κ±e−ωκz1+κe−¯ωκz1−iκ±e¯ωκz1+iκe−ωκz1+iκ±eωκz1−iκe¯ωκz1−κ±e−¯ωκz1+κ)=ˆX±(z,κ). |
Thus the lemma follows by (4.3).
Lemma 4.3. For z∈C and κ∈D, VX(z,κ)VT=(X+(z,κ)OOX−(z,κ)).
Proof. By (2.3), (2.4), (4.1) and Lemma 4.2,
VX(z,κ)VT=V{1−κ44⋅e−EΩz⋅ˆX(z,κ)}VT=1−κ44⋅Ve−EΩzVT⋅VˆX(z,κ)VT=1−κ44⋅(diag(e−ωz,e−¯ωz)OOdiag(e−ωz,e−¯ωz))(ˆX+(z,κ)OOˆX−(z,κ))=1−κ44⋅(diag(e−ωz,e−¯ωz)ˆX+(z,κ)OOdiag(e−ωz,e−¯ωz)ˆX−(z,κ)). |
Thus the lemma follows by Definition 4.3.
By Proposition 4.1, (4.2) and Lemma 4.3, we have
Xλ(x)=VT(X+λ(x)OOX−λ(x))V,λ∈C∖{0,1/k}, x∈R. | (4.4) |
Lemma 4.4. For z∈C and κ∈D, detˆX±(z,κ)=4κ1−κ4⋅δ±(z,κ).
See Supplementary A for proof of Lemma 4.4.
Proof of Theorem 1. Let λ∈C∖{0,1/k} and M∈wp(4,8,C). By Proposition 2.2 (a), KM[u]=λ⋅u for some 0≠u∈L2[−l,l] if and only if u=cTyλ for some 0≠c∈gl(4,1,C) such that
0=V[G(M){Xλ(−l)−Xλ(l)}−Xλ(l)]c, | (4.5) |
since V is invertible by (2.3). Thus the first assertion in (a) follows, since (4.5) is equivalent to
0=[VG(M){VT(X+λ(−l)OOX−λ(−l))V−VT(X+λ(l)OOX−λ(l))V}−V⋅VT(X+λ(l)OOX−λ(l))V]c=[F(M)(X+λ(−l)−X+λ(l)OOX−λ(−l)−X−λ(l))−(X+λ(l)OOX−λ(l))]Vc |
by (4.4) and Definition 3.3. The second assertion in (a) follows from the first one, since F(Q)=VG(Q)VT=O by (2.6) and Definition 3.3.
Let κ=χ(λ), x∈R, and z=αx. By (2.3) and (4.4), we have
detXλ(x)=det{VT⋅(X+λ(x)OOX−λ(x))⋅V}=detVT⋅{detX+λ(x)⋅detX−λ(x)}⋅detV=detX+λ(x)⋅detX−λ(x). | (4.6) |
By (4.2) and Definition 4.3,
detX±λ(x)=detX±(z,κ)=det{1−κ44⋅diag(e−ωz,e−¯ωz)ˆX±(z,κ)}=(1−κ44)2⋅detdiag(e−ωz,e−¯ωz)⋅detˆX±(z,κ), |
hence, by (2.5) and Lemma 4.4,
detX±λ(x)=(1−κ4)216⋅e−√2z⋅4κ1−κ4δ±(z,κ)=e−√2zκ(1−κ4)4⋅δ±(z,κ). |
So by (4.6), we have
detXλ(x)=e−√2zκ(1−κ4)4⋅δ+(z,κ)⋅e−√2zκ(1−κ4)4⋅δ−(z,κ)=e−2√2zκ2(1−κ4)216⋅δ+(z,κ)δ−(z,κ). |
Thus we showed (b), and the proof is complete.
Definition 5.1. For z∈C, denote
P(z)=(¯p0(¯z)¯p1(¯z)¯p2(¯z)¯p3(¯z)p0(z)−p1(z)p2(z)−p3(z)¯p0(¯z)−¯p1(¯z)¯p2(¯z)−¯p3(¯z)p0(z)p1(z)p2(z)p3(z)). |
Proposition 5.1. (a) ([2,Eq 7.13]) X1/k(x)=14e−EΩzP(z)⋅diag(1,α,α2,α3)−1 for x∈R, where z=αx.
(b) ([2,Lemma B1]) For z∈C, VP(z)ˆV=√2(P+(z)OOP−(z)).
The result in Proposition 5.1 (b) was for z∈R in [2] originally, but it can immediately be extended to z∈C.
By (2.3), we have
ˆVTdiag(1,α−1,α−2,α−3)ˆV=ˆVdiag(1,α−1,α−2,α−3)ˆV=(1000001001000001)(10000α−10000α−20000α−3)(1000001001000001)=(100000α−200α−100000α−3)(1000001001000001)=diag(1,α−2,α−1,α−3)=(diag(1,α−2)OOdiag(α−1,α−3)). | (5.1) |
By Proposition 5.1 (a) and (2.3),
VX1/k(x)ˆV=V{14e−EΩzP(z)⋅diag(1,α,α2,α3)−1}ˆV=14Ve−EΩzVT⋅VP(z)ˆV⋅ˆVTdiag(1,α−1,α−2,α−3)ˆV, |
hence, by (2.4), (5.1) and Proposition 5.1 (b),
VX1/k(x)ˆV=14(diag(e−ωz,e−¯ωz)OOdiag(e−ωz,e−¯ωz))⋅√2(P+(z)OOP−(z))⋅(diag(1,α−2)OOdiag(α−1,α−3)). |
Thus, by (2.3) and Definition 3.4, we have
X1/k(x)=VT(X+1/k(x)OOX−1/k(x))ˆV,x∈R. | (5.2) |
By Definition 3.4 and (2.1), we have
p0(z)=1,p1(z)=ω+z,p2(z)=ω2+ωz+12z2=i+ωz+12z2,p3(z)=ω3+ω2z+12ωz2+16z3=−¯ω+iz+12ωz2+16z3. | (5.3) |
Lemma 5.1. For z∈C, detP+(z)=2i⋅p+(z) and detP−(z)=−2i⋅p−(z).
Proof. By Definitions 3.4, 3.5, (2.1) and (5.3),
detP+(z)=¯p0(¯z)⋅p2(z)−p0(z)⋅¯p2(¯z)=1⋅(i+ωz+12z2)−1⋅(−i+¯ωz+12z2)=2i+√2iz=2i⋅p+(z),detP−(z)=−¯p1(¯z)⋅p3(z)+p1(z)⋅¯p3(¯z)=−(¯ω+z)(−¯ω+iz+12ωz2+16z3)+(ω+z)(−ω−iz+12¯ωz2+16z3)={−i−√2iz−(12+i)z2−(ω2+¯ω6)z3−16z4}+{−i−√2iz+(12−i)z2+(¯ω2+ω6)z3+16z4}=−2i−2√2iz−2iz2−√2i3z3=−2i⋅p−(z). |
Proof of Theorem 2. Let M∈wp(4,8,C). By Proposition 2.2 (a), KM[u]=1k⋅u for some 0≠u∈L2[−l,l] if and only if u=cTy1/k for some c∈gl(4,1,C) such that
0=V[G(M){X1/k(−l)−X1/k(l)}−X1/k(l)]c, | (5.4) |
since V is invertible by (2.3). Thus (a) follows, since (5.4) is equivalent to
0=[VG(M){VT(X+1/k(−l)OOX−1/k(−l))ˆV−VT(X+1/k(l)OOX−1/k(l))ˆV}−V⋅VT(X+λ(l)OOX−λ(l))ˆV]c=[F(M)(X+1/k(−l)−X+1/k(l)OOX−1/k(−l)−X−1/k(l))−(X+1/k(l)OOX−1/k(l))]ˆVc |
by (5.2) and Definition 3.3.
Let x∈R and z=αx. By (2.3) and (5.2),
detX1/k(x)=detVT⋅det(X+1/k(x)OOX−1/k(x))⋅detˆV=−detX+1/k(x)⋅detX−1/k(x). | (5.5) |
By (2.5), Definition 3.4 and Lemma 5.1,
detX+1/k(x)=(12√2)2detdiag(e−ωz,e−¯ωz)⋅detP+(z)⋅detdiag(1,α−2)=18e−√2z⋅{2i⋅p+(z)}⋅α−2=ie−√2z4α2⋅p+(z), | (5.6) |
detX−1/k(x)=(12√2)2detdiag(e−ωz,e−¯ωz)⋅detP−(z)⋅detdiag(α−1,α−3)=18e−√2z⋅{−2i⋅p−(z)}⋅α−4=−ie−√2z4α4⋅p−(z). | (5.7) |
By (5.5), (5.6), (5.7),
detX1/k(x)=−ie−√2z4α2⋅p+(z){−ie−√2z4α4⋅p−(z)}=−e−2√2z16α6⋅p+(z)p−(z). |
It follows that detX±1/k(x)≠0 and detX1/k(x)≠0 for x>0, since p±(z)>0 for z>0 by Definition 3.5. Thus we showed (b), and the proof is complete.
Denote R=(0110). For a,b,c,d∈C, we have
R(abcd)R=(0110)(abcd)(0110)=(dcba). | (6.1) |
By Definition 4.3,
adjˆX±(z,κ)=(e¯ωκz1−κ±e−¯ωκz1+κ−(e−¯ωκz1−iκ±e¯ωκz1+iκ)−(e−ωκz1+iκ±eωκz1−iκ)eωκz1−κ±e−ωκz1+κ) | (6.2) |
for z∈C and κ∈D. Note from Definition 4.2 that ¯κ∈D if and only if κ∈D.
Lemma 6.1. For z∈C and κ∈D,
{ˆX±(−z,κ)⋅adjˆX±(z,κ)}2,1=¯{ˆX±(−¯z,¯κ)⋅adjˆX±(¯z,¯κ)}1,2,{ˆX±(−z,κ)⋅adjˆX±(z,κ)}2,2=¯{ˆX±(−¯z,¯κ)⋅adjˆX±(¯z,¯κ)}1,1. |
Proof. Let z∈C and κ∈D. It can be checked from Definition 4.3 and (6.2) that ˆX±(z,κ)2,1=¯ˆX±(¯z,¯κ)1,2, ˆX±(z,κ)2,2=¯ˆX±(¯z,¯κ)1,1, and {adjˆX±(z,κ)}2,1=¯{adjˆX±(¯z,¯κ)}1,2, {adjˆX±(z,κ)}2,2=¯{adjˆX±(¯z,¯κ)}1,1, which, by (6.1), are equivalent to R⋅ˆX±(z,κ)⋅R=¯ˆX±(¯z,¯κ), R⋅adjˆX±(z,κ)⋅R=¯adjˆX±(¯z,¯κ). So we have
R{ˆX±(−z,κ)⋅adjˆX±(z,κ)}R={R⋅ˆX±(−z,κ)⋅R}{R⋅adjˆX±(z,κ)⋅R}=¯ˆX±(−¯z,¯κ)⋅¯adjˆX±(¯z,¯κ)=¯{ˆX±(−¯z,¯κ)⋅adjˆX±(¯z,¯κ)}, |
since R2=I. Thus the result follows by (6.1).
Lemma 6.2. For z∈R and κ∈D,
ˆX±(−z,κ)⋅adjˆX±(z,κ)=4κ1−κ4(δ±(−iz,κ)√2ωs±(zκ)√2¯ωs±(zκ)δ±(iz,κ)), |
where s±(ζ)=sinh(√2ζ)±sin(√2ζ) for ζ∈C.
See Supplementary B for proof of Lemma 6.2.
Definition 6.1. For z∈C and κ∈D such that detX±(z,κ)≠0, denote Y±(z,κ)=X±(−z,κ)⋅X±(z,κ)−1−I.
By Definitions 3.6, 6.1 and (4.2),
Y±λ(x)=Y±(z,κ),λ∈C∖{0,1/k}, x∈R, detX±λ(x)≠0, | (6.3) |
where z=αx and κ=χ(λ). Note from (2.1) that, for a,b,c,d,δ∈C, δ≠0,
1δdiag(eωz,e¯ωz)(abcd)diag(eωz,e¯ωz)−I=1δ(e2ωzae√2zbe√2zce2¯ωzd)−I=1δ(e2ωza−δe√2zbe√2zce2¯ωzd−δ). | (6.4) |
Lemma 6.3. For z∈C and κ∈D such that detX±(z,κ)≠0,
Y±(z,κ)=1δ±(z,κ)(e2ωzδ±(−iz,κ)−δ±(z,κ)√2ωe√2zs±(zκ)√2¯ωe√2zs±(zκ)e2¯ωzδ±(iz,κ)−δ±(z,κ)), |
where s±(ζ)=sinh(√2ζ)±sin(√2ζ) for ζ∈C.
Proof. Let z∈C, κ∈D, and suppose that detX±(z,κ)≠0. By Definition 4.3,
X±(z,κ)−1={1−κ44⋅diag(e−ωz,e−¯ωz)ˆX±(z,κ)}−1=41−κ4⋅ˆX±(z,κ)−1diag(eωz,e¯ωz), |
hence, by Definition 6.1,
Y±(z,κ)={1−κ44⋅diag(e−ω(−z),e−¯ω(−z))ˆX±(−z,κ)}{41−κ4⋅ˆX±(z,κ)−1diag(eωz,e¯ωz)}−I=diag(eωz,e¯ωz)ˆX±(−z,κ)⋅ˆX±(z,κ)−1diag(eωz,e¯ωz)−I. | (6.5) |
By Lemmas 4.4 and 6.2,
ˆX±(−z,κ)⋅ˆX±(z,κ)−1=1detˆX±(z,κ)⋅ˆX±(−z,κ)⋅adjˆX±(z,κ)=14κ1−κ4δ±(z,κ)⋅4κ1−κ4(δ±(−iz,κ)√2ωs±(zκ)√2¯ωs±(zκ)δ±(iz,κ)), |
hence, by (6.5),
Y±(z,κ)=1δ±(z,κ)diag(eωz,e¯ωz)(δ±(−iz,κ)√2ωs±(zκ)√2¯ωs±(zκ)δ±(iz,κ))diag(eωz,e¯ωz)−I. |
Thus the lemma follows by (6.4).
By Definition 3.4, we have
adjP+(z)=(p2(z)−¯p2(¯z)−p0(z)¯p0(¯z)),adjP−(z)=(p3(z)¯p3(¯z)−p1(z)−¯p1(¯z)),z∈C. | (6.6) |
Lemma 6.4. For z∈C, P±(−z)⋅adjP±(z)=±2i(p±(−iz)12∓1ωz2∓112∓1¯ωz2∓1p±(iz)).
See Supplementary C for proof of Lemma 6.4.
Lemma 6.5. Let x∈R, z=αx, and suppose that detX±1/k(x)≠0. Then
Y±1/k(x)=1p±(z)(e2ωzp±(−iz)−p±(z)12∓1ωe√2zz2∓112∓1¯ωe√2zz2∓1e2¯ωzp±(iz)−p±(z)). |
Proof. By Definition 3.4,
X±1/k(x)−1={12√2diag(e−ωz,e−¯ωz)⋅P±(z)⋅diag(α−1±12,α−5±12)}−1=2√2⋅diag(α−1±12,α−5±12)−1⋅P±(z)−1diag(eωz,e¯ωz). |
So by Definitions 3.4 and 3.6,
Y±1/k(x)={12√2diag(e−ω(−z),e−¯ω(−z))P±(−z)⋅diag(α−1±12,α−5±12)}⋅{2√2⋅diag(α−1±12,α−5±12)−1⋅P±(z)−1diag(eωz,e¯ωz)}−I=diag(eωz,e¯ωz)P±(−z)P±(z)−1diag(eωz,e¯ωz)−I. | (6.7) |
By Lemmas 5.1 and 6.4,
P±(−z)⋅P±(z)−1=1detP±(z)⋅P±(−z)⋅adjP±(z)=1±2i⋅p±(z)⋅{±2i(p±(−iz)12∓1ωz2∓112∓1¯ωz2∓1p±(iz))}, |
hence, by (6.7),
Y±1/k(x)=1p±(z)diag(eωz,e¯ωz)(p±(−iz)12∓1ωz2∓112∓1¯ωz2∓1p±(iz))diag(eωz,e¯ωz)−I. |
Thus the lemma follows by (6.4).
Let 0≠λ∈C and x∈R. Suppose that detXλ(x)≠0, which is equivalent to detX+λ(x)≠0 and detX−λ(x)≠0 by (4.4) and (5.2). Let A={VT,if λ≠1/k,ˆV,if λ=1/k. Then by Definition 2.5 and (2.3),
VYλ(x)VT=V{Xλ(−x)⋅Xλ(x)−1−I}VT=VXλ(−x)A⋅A−1Xλ(x)−1VT−I=VXλ(−x)A⋅{VXλ(x)A}−1−I, |
hence, by (2.3), (4.4) and (5.2),
VYλ(x)VT=(X+λ(−x)OOX−λ(−x))(X+λ(x)OOX−λ(x))−1−I=(X+λ(−x)OOX−λ(−x))(X+λ(x)−1OOX−λ(x)−1)−(IOOI)=(X+λ(−x)⋅X+λ(x)−1−IOOX−λ(−x)⋅X−λ(x)−1−I). |
Thus, by (2.3) and Definition 3.6, we have
Yλ(x)=VT(Y+λ(x)OOY−λ(x))V,0≠λ∈C, x∈R, detX±λ(x)≠0. | (6.8) |
Proof of Theorem 3. Let M∈wp(4,8,C) and 0≠λ∈C∖SpecKQ. By Proposition 2.2 (b), λ∈SpecKM if and only if
det[V{G(M)Yλ(l)−I}VT]=0, | (6.9) |
since V is invertible by (2.3). Thus (a) follows, since (6.9) is equivalent to
0=det{VG(M)⋅VT(Y+λ(l)OOY−λ(l))V⋅VT−V⋅VT}=det{F(M)(Y+λ(l)OOY−λ(l))−I} |
by (6.8) and Definition 3.3.
Let 0≠λ∈C, x∈R, and z=αx. Suppose that detX±λ(x)≠0. (b) follows from (6.3) and Lemma 6.3 when λ≠1/k, and from Lemma 6.5 when λ=1/k. Thus the proof is complete.
The boundary conditions usually considered in practice are only a few in number, including clamped, free, or hinged conditions at each end of the beam. An important aspect of our results is that we have obtained explicit and manageable characteristic equations for the whole 16-dimensional class of integral operators KM arising from arbitrary well-posed boundary value problem of the Euler–Bernoulli beam equation.
In our characteristic equations in Theorems 1, 2, and 3, the explicit matrices X±λ and Y±λ are not affected by specific boundary conditions. The effect of the boundary condition M is encoded separately in the fundamental boundary matrix F(M). The set of equivalent well-posed boundary matrices wp(C), and hence the set of integral operators KM in (1.1), is in one-to-one correspondence with the 16-dimensional algebra gl(4,C) via the map Φ. Φ and its inverse Φ−1 are explicitly computable using the maps F and ϕ in Definition 3.3. See Figure 2 in Section 3 for a commutative diagram showing the details.
The 2×2 matrices X±λ and Y±λ themselves are pre-calculated in terms of the explicit functions δ±(z,κ) and p±(z). Thus our characteristic equations have simple and manageable expressions with the functions δ±(z,κ) and p±(z), which are amenable to concrete analysis similar to that in [14].
By inverting the 2×2 matrices Y±λ(l) in Theorem 3, we would have alternate forms of the characteristic equations in Theorem 1 (a) and Theorem 2 (a) with matrix entries also explicitly expressed by δ±(z,κ) and p±(z). However, these forms are suppressed in this paper due to the nontrivial problem of identifying the zeros of detY±λ(l) or det{X±λ(−l)−X±λ(l)}, which will be dealt in future works.
Although our results are for boundary matrices with complex entries in general, boundary conditions of practical importance are those represented by boundary matrices with real entries. See [2] for the characterization of these real boundary conditions M in terms of G(M) by using the R-algebra ¯π(4)⊂gl(4,C).
An immediate application of our results would be spectral analysis for a few typical boundary conditions encountered frequently in practice. Specifically, concrete spectral analysis for the following combinations of clamped, free, and hinged boundary conditions at each end of the beam are now possible, which will be performed in future works.
∙ clamped-clamped or bi-clamped.
∙ free-free or bi-free.
∙ hinged-hinged or bi-hinged.
∙ clamped-free or cantilevered.
∙ hinged-free.
∙ clamped-hinged.
In fact, it turns out that the fundamental boundary matrices F(M) corresponding to the first three symmetric boundary conditions M above also have the following block-diagonal form with 2×2 blocks.
F(M)=(F(M)+OOF(M)−). |
In these cases, our characteristic equations in Theorems 1, 2, and 3 are completely separable into 2×2 blocks, resulting in further simplified forms which involve determinants of 2×2 matrices only.
The author thanks the anonymous reviewers for their careful and constructive comments which helped to improve the manuscript.
The author declares no conflict of interest in this paper.
By Definition 4.3 and (2.1),
detˆX±(z,κ)=ˆX±(z,κ)1,1⋅ˆX±(z,κ)2,2−ˆX±(z,κ)2,1⋅ˆX±(z,κ)1,2=(eωκz1−κ±e−ωκz1+κ)(e¯ωκz1−κ±e−¯ωκz1+κ)−(e−ωκz1+iκ±eωκz1−iκ)(e−¯ωκz1−iκ±e¯ωκz1+iκ)=e√2κz(1−κ)2+e−√2κz(1+κ)2±ei√2κz1−κ2±e−i√2κz1−κ2−e√2κz1+κ2−e−√2κz1+κ2∓ei√2κz(1−iκ)2∓e−i√2κz(1+iκ)2={1(1−κ)2−11+κ2}e√2κz+{1(1+κ)2−11+κ2}e−√2κz±{11−κ2−1(1−iκ)2}ei√2κz±{11−κ2−1(1+iκ)2}e−i√2κz=2κ(1−κ)2(1+κ2)e√2κz−2κ(1+κ)2(1+κ2)e−√2κz∓2iκ(1−κ2)(1−iκ)2ei√2κz±2iκ(1−κ2)(1+iκ)2e−i√2κz=2κ(1−κ2)2(1+κ2){(1+κ)2e√2κz−(1−κ)2e−√2κz}∓2iκ(1−κ2)(1+κ2)2{(1+iκ)2ei√2κz−(1−iκ)2e−i√2κz}=2κ(1−κ4)(1−κ2){2(1+κ2)sinh(√2κz)+4κcosh(√2κz)}∓2iκ(1−κ4)(1+κ2){2i(1−κ2)sin(√2κz)+4iκcos(√2κz)}=4κ1−κ4{1+κ21−κ2sinh(√2κz)+2κ1−κ2cosh(√2κz)}±4κ1−κ4{1−κ21+κ2sin(√2κz)+2κ1+κ2cos(√2κz)}. |
Thus, by Definition 3.2,
detˆX±(z,κ)=4κ1−κ4{sinh(√2κz)coshβ(κ)+cosh(√2κz)sinhβ(κ)}±4κ1−κ4{sin(√2κz)cosγ(κ)+cos(√2κz)sinγ(κ)}=4κ1−κ4{sinh(√2κz+β(κ))±sin(√2κz+γ(κ))}=4κ1−κ4⋅δ±(z,κ). |
Let z∈C and κ∈D. By Definition 4.3, (2.1) and (6.2),
{ˆX±(−z,κ)⋅adjˆX±(z,κ)}1,1=ˆX±(−z,κ)1,1⋅{adjˆX±(z,κ)}1,1+ˆX±(−z,κ)1,2⋅{adjˆX±(z,κ)}2,1=(eωκ(−z)1−κ±e−ωκ(−z)1+κ)(e¯ωκz1−κ±e−¯ωκz1+κ)−(e−¯ωκ(−z)1−iκ±e¯ωκ(−z)1+iκ)(e−ωκz1+iκ±eωκz1−iκ)=ei√2κz(1+κ)2+e−i√2κz(1−κ)2±e√2κz1−κ2±e−√2κz1−κ2−ei√2κz1+κ2−e−i√2κz1+κ2∓e√2κz(1−iκ)2∓e−√2κz(1+iκ)2={1(1+κ)2−11+κ2}ei√2κz+{1(1−κ)2−11+κ2}e−i√2κz∓{1(1−iκ)2−11−κ2}e√2κz∓{1(1+iκ)2−11−κ2}e−√2κz=−2κ(1+κ)2(1+κ2)ei√2κz+2κ(1−κ)2(1+κ2)e−i√2κz∓2iκ(1−iκ)2(1−κ2)e√2κz±2iκ(1+iκ)2(1−κ2)e−√2κz=−2κ(1−κ2)2(1+κ2){(1−κ)2ei√2κz−(1+κ)2e−i√2κz}∓2iκ(1+κ2)2(1−κ2){(1+iκ)2e√2κz−(1−iκ)2e−√2κz}=−2κ(1−κ4)(1−κ2){2i(1+κ2)sin(√2κz)−4κcos(√2κz)}∓2iκ(1−κ4)(1+κ2){2(1−κ2)sinh(√2κz)+4iκcosh(√2κz)}=−4κ1−κ4{1+κ21−κ2sinh(i√2κz)−2κ1−κ2cosh(i√2κz)}∓4κ1−κ4{1−κ21+κ2sin(i√2κz)−2κ1+κ2cos(i√2κz)}, |
hence, by Definition 3.2,
{ˆX±(−z,κ)⋅adjˆX±(z,κ)}1,1=−4κ1−κ4{−sinh(−i√2κz)coshβ(κ)−cosh(−i√2κz)sinhβ(κ)}∓4κ1−κ4{−sin(−i√2κz)cosγ(κ)−cos(−i√2κz)sinγ(κ)}=4κ1−κ4{sinh(−i√2κz+β(κ))±sin(−i√2κz+γ(κ))}=4κ1−κ4⋅δ±(−iz,κ). | (B.1) |
By Definition 4.3, (2.1) and (6.2),
{ˆX±(−z,κ)⋅adjˆX±(z,κ)}1,2=ˆX±(−z,κ)1,1⋅{adjˆX±(z,κ)}1,2+ˆX±(−z,κ)1,2⋅{adjˆX±(z,κ)}2,2=−(eωκ(−z)1−κ±e−ωκ(−z)1+κ)(e−¯ωκz1−iκ±e¯ωκz1+iκ)+(e−¯ωκ(−z)1−iκ±e¯ωκ(−z)1+iκ)(eωκz1−κ±e−ωκz1+κ)=−e√2κz(1+κ)(1+iκ)−e−√2κz(1−κ)(1−iκ)∓ei√2κz(1+κ)(1−iκ)∓e−i√2κz(1−κ)(1+iκ)+e√2κz(1−κ)(1−iκ)+e−√2κz(1+κ)(1+iκ)±ei√2κz(1−κ)(1+iκ)±e−i√2κz(1+κ)(1−iκ)={1(1−κ)(1−iκ)−1(1+κ)(1+iκ)}(e√2κz−e−√2κz)±{1(1−κ)(1+iκ)−1(1+κ)(1−iκ)}(ei√2κz−e−i√2κz)=(1+κ)(1+iκ)−(1−κ)(1−iκ)1−κ4⋅2sinh(√2κz)±(1+κ)(1−iκ)−(1−κ)(1+iκ)1−κ4⋅2isin(√2κz)=2(1+i)κ1−κ4⋅2sinh(√2κz)±2(1−i)κ1−κ4⋅2isinh(√2κz)=√2ω⋅4κ1−κ4{sinh(√2κz)±sin(√2κz)}=4κ1−κ4⋅√2ωs±(zκ). | (B.2) |
By Lemma 6.1, (B.1), (B.2) and Definition 3.2,
{ˆX±(−z,κ)⋅adjˆX±(z,κ)}2,1=¯{4¯κ1−¯κ4⋅√2ωs±(¯zκ)}=4κ1−κ4⋅√2¯ωs±(zκ), | (B.3) |
{ˆX±(−z,κ)⋅adjˆX±(z,κ)}2,2=¯{4¯κ1−¯κ4⋅δ±(−i¯z,¯κ)}=4κ1−κ4⋅δ±(iz,κ). | (B.4) |
Thus the lemma follows from (B.1), (B.2), (B.3), (B.4).
Let z∈C. By Definition 3.4 and (6.6), we have
P+(−z)⋅adjP+(z)=(¯p0(¯−z)¯p2(¯−z)p0(−z)p2(−z))(p2(z)−¯p2(¯z)−p0(z)¯p0(¯z))=(¯p0(−¯z)p2(z)−p0(z)¯p2(−¯z)−¯p0(−¯z)¯p2(¯z)+¯p0(¯z)¯p2(−¯z)p0(−z)p2(z)−p0(z)p2(−z)−p0(−z)¯p2(¯z)+¯p0(¯z)p2(−z)), | (C.1) |
P−(−z)⋅adjP−(z)=(−¯p1(¯−z)−¯p3(¯−z)p1(−z)p3(−z))(p3(z)¯p3(¯z)−p1(z)−¯p1(¯z))=(−¯p1(−¯z)p3(z)+p1(z)¯p3(−¯z)−¯p1(−¯z)¯p3(¯z)+¯p1(¯z)¯p3(−¯z)p1(−z)p3(z)−p1(z)p3(−z)p1(−z)¯p3(¯z)−¯p1(¯z)p3(−z)). | (C.2) |
So, by (2.1), (5.3) and Definition 3.5,
{P+(−z)⋅adjP+(z)}1,1=¯p0(−¯z)p2(z)−p0(z)¯p2(−¯z)=1⋅(i+ωz+12z2)−1⋅¯(i−ω¯z+12¯z2)=2i+√2z=2i{1+(−iz)√2}=2i⋅p+(−iz), | (C.3) |
{P+(−z)⋅adjP+(z)}2,1=p0(−z)p2(z)−p0(z)p2(−z)=1⋅(i+ωz+12z2)−1⋅(i−ωz+12z2)=2ωz, | (C.4) |
{P−(−z)⋅adjP−(z)}1,1=−¯p1(−¯z)p3(z)+p1(z)¯p3(−¯z)=−¯(ω−¯z)(−¯ω+iz+12ωz2+16z3)+(ω+z)¯(−¯ω−i¯z+12ω¯z2−16¯z3)={−i−√2z+(−12+i)z2+(ω2−¯ω6)z3+16z4}+{−i−√2z+(12+i)z2+(¯ω2−ω6)z3−16z4}=2(−i−√2z+iz2+13√2z3)=−2i{1+√2(−iz)+(−iz)2+13√2(−iz)3}=−2i⋅p−(−iz), | (C.5) |
{P−(−z)⋅adjP−(z)}2,1=p1(−z)p3(z)−p1(z)p3(−z)=(ω−z)(−¯ω+iz+12ωz2+16z3)−(ω+z)(−¯ω−iz+12ωz2−16z3)=(−1−i2z2−ω3z3−16z4)+(1+i2z2−ω3z3+16z4)=−2ω3z3. | (C.6) |
Note from (C.1) and (C.2) that
{P±(−z)⋅adjP±(z)}1,2=−¯{P±(−¯z)⋅adjP±(¯z)}2,1,{P±(−z)⋅adjP±(z)}2,2=−¯{P±(−¯z)⋅adjP±(¯z)}1,1. |
So by (C.3), (C.4), (C.5), (C.6),
{P+(−z)⋅adjP+(z)}1,2=−¯{P+(−¯z)⋅adjP+(¯z)}2,1=−¯(2ω¯z)=−2¯ωz, | (C.7) |
{P+(−z)⋅adjP+(z)}2,2=−¯{P+(−¯z)⋅adjP+(¯z)}1,1=−¯{2i⋅p+(−i¯z)}=2i⋅p+(iz), | (C.8) |
{P−(−z)⋅adjP−(z)}1,2=−¯{P−(−¯z)⋅adjP−(¯z)}2,1=−¯(−2ω3¯z3)=2¯ω3z3, | (C.9) |
{P−(−z)⋅adjP−(z)}2,2=−¯{P−(−¯z)⋅adjP−(¯z)}1,1=−¯{−2i⋅p−(−i¯z)}=−2i⋅p−(iz). | (C.10) |
Thus, by (C.3), (C.4), (C.5), (C.6), (C.7), (C.8), (C.9), (C.10), we have
P+(−z)⋅adjP+(z)=(2ip+(−iz)−2¯ωz2ωz2ip+(iz))=2i(p+(−iz)ωz¯ωzp+(iz)),P−(−z)⋅adjP−(z)=(−2ip−(−iz)2¯ω3z3−2ω3z3−2ip−(iz))=−2i(p−(−iz)ω3z3¯ω3z3p−(iz)), |
and the proof is complete.
We start with some exotic definitions in [14]. For κ≥0, let
p(κ)=1−√2κ+κ21+√2κ+κ2,φ±(κ)=eLκ⋅1±sinh(κ)cosh(κ). | (D.1) |
Here, L=2lα is the intrinsic length of the beam and
h(κ)=Lκ−ˆh(κ), | (D.2) |
where ˆh:[0,∞)→R is defined by
ˆh(κ)={arctan{2√2κ(κ2−1)κ4−4κ2+1},if 0≤κ<√3−1√2,−π2,if κ=√3−1√2,−π+arctan{2√2κ(κ2−1)κ4−4κ2+1},if √3−1√2≤κ≤√3+1√2,−3π2,if κ=√3+1√2,−2π+arctan{2√2κ(κ2−1)κ4−4κ2+1},if κ>√3+1√2. | (D.3) |
The branch of arctan here is taken such that arctan0=0. ˆh is a strictly decreasing real-analytic function with ˆh(0)=0 and limκ→∞ˆh(κ)=−2π, hence h:[0,∞)→R is a strictly increasing real-analytic function with h(0)=0 and limκ→∞h(κ)=∞.
Proposition D.1. ([14,Eqs 8 and 25]) λ∈C is an eigenvalue of KQ=Kl,α,k if and only if λ=1k⋅11+κ4 for κ>0 such that φ+(κ)=p(κ) or φ−(κ)=p(κ).
Now we demonstrate how the seemingly ad hoc and complex conditions φ±(κ)=p(κ) in Proposition D.1, which were practically unobtainable without help of computer algebra systems as indicated in [14], can be derived so naturally and elegantly from our holomorphic functions δ±(z,κ).
By Definition 3.2,
eiγ(κ)=cosγ(κ)+isinγ(κ)=1−κ21+κ2+i2κ1+κ2=(1+iκ)21+κ2=1+iκ1−iκ,κ∈D, | (D.4) |
where D=C∖{0,1,−1,i,−i} by Definition 4.2.
Lemma D.1. For κ≥0, p(κ)=ei{γ(ωκ)−γ(¯ωκ)} and e−iˆh(κ)=ei{γ(ωκ)+γ(¯ωκ)}.
Proof. By (2.1), (D.1), (D.4),
ei{γ(ωκ)−γ(¯ωκ)}=eiγ(ωκ)e−iγ(¯ωκ)=1+iωκ1−iωκ⋅1−i¯ωκ1+i¯ωκ=1−¯ωκ1+¯ωκ⋅1−ωκ1+ωκ=1−√2κ+κ21+√2κ+κ2=p(κ). |
By (2.1) and (D.4),
ei{γ(ωκ)+γ(¯ωκ)}=eiγ(ωκ)eiγ(¯ωκ)=1+iωκ1−iωκ⋅1+i¯ωκ1−i¯ωκ=1−¯ωκ1+¯ωκ⋅1+ωκ1−ωκ=1+i√2κ−κ21−i√2κ−κ2=(1+i√2κ−κ2)2(1−i√2κ−κ2)(1+i√2κ−κ2)=(1−4κ2+κ4)+i⋅2√2κ(1−κ2)(1−κ2)2+2κ2. |
So we have
cos{γ(ωκ)+γ(¯ωκ)}=1−4κ2+κ41+κ4,sin{γ(ωκ)+γ(¯ωκ)}=2√2κ(1−κ2)1+κ4, |
hence
tan{γ(ωκ)+γ(¯ωκ)}=2√2κ(1−κ2)κ4−4κ2+1. |
Thus, by (D.3),
tan{−ˆh(κ)}=−tanˆh(κ)=2√2κ(1−κ2)κ4−4κ2+1=tan{γ(ωκ)+γ(¯ωκ)}. |
It follows that e−iˆh(κ)=ei{γ(ωκ)+γ(¯ωκ)}, and the proof is complete.
By (D.2) and Lemma D.1,
eih(κ)=ei{Lκ−ˆh(κ)}=eiLκe−iˆh(κ)=eiLκei{γ(ωκ)+γ(¯ωκ)}=ei{Lκ+γ(ωκ)+γ(¯ωκ)}. |
So we have cosh(κ)=cos{Lκ+γ(ωκ)+γ(¯ωκ)}, sinh(κ)=sin{Lκ+γ(ωκ)+γ(¯ωκ)}, hence, by (D.1),
φ±(κ)=eLκ⋅1±sin{Lκ+γ(ωκ)+γ(¯ωκ)}cos{Lκ+γ(ωκ)+γ(¯ωκ)}. | (D.5) |
By Definition 3.2,
eβ(κ)=coshβ(κ)+sinhβ(κ)=1+κ21−κ2+2κ1−κ2=(1+κ)21−κ2=1+κ1−κ,κ∈D. | (D.6) |
Comparing (D.4) and (D.6), we have eiγ(κ)=eβ(iκ) for κ∈D, hence
eβ(ωκ)=eβ(i⋅(−iωκ))=eiγ(¯ωκ),κ∈D, | (D.7) |
since −iω=¯ω by (2.1).
Now let λ=1k⋅11+κ4 for κ>0, and let z=lα so that
2κz=Lκ. | (D.8) |
By Definitions 2.1 and 2.4,
χ(λ)=4√1−1(1k⋅11+κ4)⋅k=4√−κ4=ωκ, |
hence δ±(lα,χ(λ))=δ±(z,ωκ). So by Corollary 1, λ∈SpecKQ if and only if δ+(z,ωκ)=0 or δ−(z,ωκ)=0. By Definition 1, √2ω=1+i, hence, by Definition 3.2 and (D.7),
2δ±(z,ωκ)={e√2ωκzeβ(ωκ)−e−√2ωκze−β(ωκ)}∓i{ei√2ωκzeiγ(ωκ)−e−i√2ωκze−iγ(ωκ)}={eκzeiκzeiγ(¯ωκ)−e−κze−iκze−iγ(¯ωκ)}∓i{e−κzeiκzeiγ(ωκ)−eκze−iκze−iγ(ωκ)}=eκz{eiκzeiγ(¯ωκ)±ie−iκze−iγ(ωκ)}−e−κz{e−iκze−iγ(¯ωκ)±ieiκzeiγ(ωκ)}. |
So δ±(z,ωκ)=0 if and only if
e−2κz=eiκzeiγ(¯ωκ)±ie−iκze−iγ(ωκ)e−iκze−iγ(¯ωκ)±ieiκzeiγ(ωκ)=eiκzeiγ(¯ωκ)±ie−iκze−iγ(ωκ)e−iκze−iγ(¯ωκ)±ieiκzeiγ(ωκ)⋅e−iκze−iγ(¯ωκ)∓ieiκzeiγ(ωκ)e−iκze−iγ(¯ωκ)∓ieiκzeiγ(ωκ)=2∓ie2iκzei{γ(ωκ)+γ(¯ωκ)}±ie−2iκze−i{γ(ωκ)+γ(¯ωκ)}e2iκzei2γ(ωκ)+e−2iκze−i2γ(¯ω)=2∓i{e2iκzei{γ(ωκ)+γ(¯ωκ)}−e−2iκze−i{γ(ωκ)+γ(¯ωκ)}}ei{γ(ωκ)−γ(¯ωκ)}{e2iκzei{γ(ωκ)+γ(¯ωκ)}+e−2iκze−i{γ(ωκ)+γ(¯ωκ)}}=e−i{γ(ωκ)−γ(¯ωκ)}⋅1±sin{2κz+γ(ωκ)+γ(¯ωκ)}cos{2κz+γ(ωκ)+γ(¯ωκ)}, |
which is equivalent to p(κ)=φ±(κ) by Lemma D.1, (D.5) and (D.8). Thus we conclude that λ∈SpecKQ if and only if p(κ)=φ+(κ) or p(κ)=φ−(κ), which is exactly the condition in Proposition D.1.
[1] | OPEC, Nigeria facts and figures, Annual Statistical Bulletin, 2022. Available from: https://www.opec.org/opec_web/en/about_us/167.htm. |
[2] | U.S. EIA, Nigeria Energy Outlook, 2019. Available from: https://www.iea.org/articles/nigeria-energy-outlook. |
[3] | Iwueke EL, Anyarum GO, Fagorite VI, et al. (2019) Entrepreneurship: Characteristics, practices and impacts on Nigeria economy in relation to geosciences. ⅡARD Int J Econ Bus Manage 5: 48–63. |
[4] | Okoli A, Orinya S (2013) Oil pipeline vandalism and Nigeria's national security. Global J Human Soc Sci 13: 68–75. |
[5] |
Omeje K (2005) Oil conflict in Nigeria: contending issues and perspectives of the local Niger Delta people. New Political Econ 10: 321–334. https://doi.org/10.1080/13563460500204183 doi: 10.1080/13563460500204183
![]() |
[6] |
Onuoha F (2009) Why the poor pay with their lives: Oil pipeline vandalisation, fires and human Security in Nigeria. Disaster 33: 369–389. https://doi.org/10.1111/j.1467-7717.2008.01079.x doi: 10.1111/j.1467-7717.2008.01079.x
![]() |
[7] | Collins N, Jürgen E (2012) Negative impacts of oil exploration on biodiversity management in the Niger De area of Nigeria. Impact Assess Proj Appraisal 26: 139–147. |
[8] | Asumi J (2009) Blood oil in the Niger Delta. Special Report 229. United States Institute of Peace. |
[9] |
Incardona JP, Collier TK, Scholz NK (2010) Oil spills and fish health: Exposing the heart of the matter. J Expo Sci Environ Epidemiol. https://doi.org/10.1038/jes.2010.51 doi: 10.1038/jes.2010.51
![]() |
[10] | Wunder S (2005) Oil wealth and the fate of the forest: A comparative study of eight tropical countries. Taylor and Francis e-Library, 432, London, United Kingdom. |
[11] |
Rajan SR (2002) Disaster, development and governance: reflections on the 'Lessons' of Bhopal. Environ Values 11: 369–394. https://doi.org/10.3197/096327102129341136 doi: 10.3197/096327102129341136
![]() |
[12] |
Anifowose B, Lawler DM, van der Horst D, et al. (2012) Attacks on oil transport pipelines in Nigeria: a quantitative exploration and possible explanation of observed patterns. Appl Geogr 32: 636–651. https://doi.org/10.1016/j.apgeog.2011.07.012 doi: 10.1016/j.apgeog.2011.07.012
![]() |
[13] |
Musa A, Watanabe O, Matsuoka H, et al. (2018) Real-time tsunami inundation forecast system for tsunami disaster prevention and mitigation. J Supercomput 74: 3093–3113. https://doi.org/10.1007/s11227-018-2363-0 doi: 10.1007/s11227-018-2363-0
![]() |
[14] |
Osland A (2015) Building hazard resilience through collaboration: the role of technical partnerships in areas with hazardous liquid and natural gas transmission pipelines. Environ Plann 47: 1063–1080. https://doi.org/10.1177/0308518X15592307 doi: 10.1177/0308518X15592307
![]() |
[15] |
Godschalk D (2003) Urban hazard mitigation: Creating resilient cities. Nat Hazards Rev 4: 136–143. https://doi.org/10.1061/(ASCE)1527-6988(2003) doi: 10.1061/(ASCE)1527-6988(2003)4:3(136)
![]() |
[16] | Britton N (2002) A new emergency management for the new millennium. Aust J Emerg Manage 16: 44–54. |
[17] |
Pearce L (2003) Disaster management and community planning, and public participation: how to achieve sustainable hazard mitigation. Nat Hazards 28: 211–228. https://doi.org/10.1023/A:1022917721797 doi: 10.1023/A:1022917721797
![]() |
[18] | Chika-Amanze N, Edomaruse C (2007) Nigeria: Vandalism-Federal government opts for underground pipelines. Available from: https://allafrica.com/stories/200710050321.html. |
[19] | NNPC (2016) Development of Nigeria's oil industry. Available from: http://nnpcgroup.com/NNPCBusiness/BusinessInformation/OilGasinNigeria/DevelopmentoftheIndustry.aspx. |
[20] |
Onuoha FC (2008) Vandals or victims? Poverty, risk perception and vulnerability of women to oil pipeline disasters in Nigeria. Gender Behav 6: 41–52. https://doi.org/10.4314/gab.v6i2.23427 doi: 10.4314/gab.v6i2.23427
![]() |
[21] |
Onuoha F (2007) Poverty, pipeline vandalism and explosion and Human Security: Integrating disaster management into poverty reduction in Nigeria. Afr Secur Rev 16: 32–46. https://doi.org/10.1080/10246029.2007.9627420 doi: 10.1080/10246029.2007.9627420
![]() |
[22] | UNEP (1999) National Emergency Management Agency (Establishment, etc.) Decree 1999 (No. 12 of 1999). Available from: https://leap.unep.org/countries/ng/national-legislation/national-emergency-management-agency-establishment-etc-decree. |
[23] | Orji FM (2018) Management of environmental issues in the Nigerian oil-producing region: A framework for stakeholders' collaboration. Doctoral thesis, University of Central Lancashire. Available from: https://core.ac.uk/download/pdf/161125249.pdf. |
[24] |
Rashid AS (2011) Management of farmer-herdsmen conflicts in north-central Nigeria: Implications for collaboration between agricultural extension service and other stakeholders. J Int Agric Ext Educ 18: 60–72. https://doi.org/10.5191/jiaee.2011.18105 doi: 10.5191/jiaee.2011.18105
![]() |
[25] |
Bodin Ö, Nohrstedt D (2016) Formation and performance of collaborative disaster management networks: Evidence from a Swedish wildfire response. Global Environ Change-human Policy Dimens 41: 183–194. https://doi.org/10.1016/j.gloenvcha.2016.10.004 doi: 10.1016/j.gloenvcha.2016.10.004
![]() |
[26] |
Shah I, Mahmood T, Khan SA, et al. (2022) Inter-agency collaboration and disaster management: A case study of the 2005 earthquake disaster in Pakistan. J Disaster Risk Stud 14: 1–11. https://doi.org/10.4102/jamba.v14i1.1088 doi: 10.4102/jamba.v14i1.1088
![]() |
[27] |
Umar M, Wilson M (2021) Supply chain resilience: Unleashing the power of collaboration in disaster management. Sustainability 13: 1–20. https://doi.org/10.3390/su131910573 doi: 10.3390/su131910573
![]() |
[28] |
Abdeen FN, Fernando T, Kulatunga U, et al. (2021) Challenges in multi-agency collaboration in disaster management: A Sri Lankan perspective. Int J Disaster Risk Reduct 62: 1–14. https://doi.org/10.1016/j.ijdrr.2021.102399 doi: 10.1016/j.ijdrr.2021.102399
![]() |
[29] |
Nguyen D, Fumihiko I, Kanako I (2017) Public-private collaboration for disaster risk management: A case study of hotels in Matsushima, Japan. Tourism Manage 61: 129–140. https://doi.org/10.1016/j.tourman.2017.02.003 doi: 10.1016/j.tourman.2017.02.003
![]() |
[30] |
Hermansson H (2015) Disaster management collaboration in Turkey: Assessing progress and challenges of hybrid network governance. Public Adm 94: 333–349. https://doi.org/10.1111/padm.12203 doi: 10.1111/padm.12203
![]() |
[31] |
Sitas N, Belinda R, Georgina C, et al. (2016) Fostering collaboration for knowledge and action in disaster management in South Africa. Curr Opin Environ Sustainability 19: 94–102. https://doi.org/10.1016/j.cosust.2015.12.007 doi: 10.1016/j.cosust.2015.12.007
![]() |
[32] |
Noran O (2014) Collaborative disaster management: An interdisciplinary approach. Comput Ind 65: 1032–1040. https://doi.org/10.1016/j.compind.2014.04.003 doi: 10.1016/j.compind.2014.04.003
![]() |
[33] |
Moe T, Gehbauer G, Sentz S, et al. (2007) Balanced scorecard for natural hazard management projects. Disaster Prev Manage 16: 785–806. https://doi.org/10.1108/09653560710837073 doi: 10.1108/09653560710837073
![]() |
[34] | Saeed A, Narimah K (2019) Role of stakeholders in mitigating disaster prevalence: Theoretical Perspective. MATEC Web of Conferences. Available from: https://www.matec-conferences.org/articles/matecconf/pdf/2019/15/matecconf_iconbee2019_03008.pdf. |
[35] |
Barnes B, Dunn S, Wilkinson S (2019) Natural hazards, disaster management and simulation: a bibliometric analysis of keyword searches. Nat Hazards 97: 813–840. https://doi.org/10.1007/s11069-019-03677-2 doi: 10.1007/s11069-019-03677-2
![]() |
[36] | Kvale S, Brinkmann S (2009) Inter Views: Learning the Craft of Qualitative Research Interviewing, Los Angeles, CA: Sage, 2009. Available from: https://journals.sagepub.com/doi/abs/10.1177/14687941100100030608. |
[37] |
Braun V, Clarke V (2006) Using thematic analysis in psychology. Qual Res Psychol 3: 77–101. https://doi.org/10.1191/1478088706qp063oa doi: 10.1191/1478088706qp063oa
![]() |
[38] | Yin RK (2018) Case Study Research Design and Methods, 6th Ed. ed., Thousand Oaks, CA: Sage Publishing, 2018. Available from: https://cmc.marmot.org/Record/.b5928917x. |
[39] | Creswell J, Poth C (2017) Qualitative Inquiry and Research Design: Choosing among Five Approaches. New York: Sage Publications, 2017. Available from: https://www.pdfdrive.com/qualitative-inquiry-research-design-choosing-among-five-approaches-e195306686.html. |
[40] | Marshall C, Rossman G (2016) Designing Qualitative Research, 6th Edition ed., Thousand Oaks, CA: Sage Publications, 2016. Available from: https://www.proquest.com/docview/1722656115. |
[41] |
Faehnle M, Tyrväinen L (2013) A framework for evaluating and designing collaborative planning. Land Use Policy 34: 332–341. https://doi.org/10.1016/j.landusepol.2013.04.006 doi: 10.1016/j.landusepol.2013.04.006
![]() |
[42] |
Willems T, Van Doreen W (2012). Coming to terms with accountability: combining multiple forums and function. Public Manage Rev 14: 1011–1036. https://doi.org/10.1080/14719037.2012.662446 doi: 10.1080/14719037.2012.662446
![]() |
[43] | Buse K, Walt G (2000) Global public-private partnerships: Part Ⅰ—A new development in health. Bull World Health Organ 78: 549–561. |
[44] |
Lockwood M (2010) Good governance for terrestrial protected areas: A framework, principles and performance outcomes. J Environ Manage 91: 754–766. https://doi.org/10.1016/j.jenvman.2009.10.005 doi: 10.1016/j.jenvman.2009.10.005
![]() |
[45] |
Willems T, VanDooren W (2012) Coming to terms with accountability. Public Manage Rev 14: 1–26. https://doi.org/10.1080/14719037.2012.662446 doi: 10.1080/14719037.2012.662446
![]() |
[46] |
Goodman L, Dion P (2001) The determinants of commitment in the distributor–manufacturer relationship. Ind Mark Manage 30: 287–300. https://doi.org/10.1016/S0019-8501(99)00092-9 doi: 10.1016/S0019-8501(99)00092-9
![]() |
[47] |
Andrews R, Entwistle T (2010) Does cross-sectoral partnership deliver? An empirical exploration of public service effectiveness, efficiency, and equity. J Public Adm Res Theory 20: 679–701. https://doi.org/10.1093/jopart/mup045 doi: 10.1093/jopart/mup045
![]() |
[48] |
Kasper-Fuehrer EC, Ashkanasy NM (2001) Communicating trustworthiness and building trust in inter-organizational virtual organizations. J Manage 27: 235–254. https://doi.org/10.1177/014920630102700302 doi: 10.1177/014920630102700302
![]() |
[49] | Sumaina K (2019) "Thisday Online, " 2019.[Online]. Available from: https://www.thisdaylive.com/index.php/2019/04/30/nema-stakeholders-to-review-contingency-plan-against-natural-disasters/. |
[50] | OCHA (2018) ReliefWeb Available from: https://reliefweb.int/report/nigeria/dg-nema-moves-enhance-collaboration-between-nigerian-military-and-agency. |
[51] | UNDP (1992) Disaster management. Available from: https://www.physio-pedia.com/Disaster_Management. |
[52] | Sani M (2012) Nigeria: NEMA develops national contingency plan on disaster management. Available from: http://allafrica.com/stories/201206180409.htm1. |
[53] | Caroline SW, Irene B, Brian J, et al. (2001) Science and technology collaboration: Building capacity in developing countries. Prepared for the World Bank, RAND Science and Technology MR-1357.0-WB. Available from: https://www.rand.org/pubs/monograph_reports/MR1357z0.html. |
[54] | Giesen G (2002) Creating collaboration: A process that works. Greg Giesen & Associates, Colorado, United States cited by Camarihna-Matos, L. M., & Afsarmanesh, H. (2008). Concept of Collaboration. Encyclopedia of Networked and Virtual Organizations, 311-315. Available from: https://www.researchgate.net/publication/312056980_Concept_of_Collaboration. |
[55] | Kareko J, Siegel P (2003) Planning for Marine Protected Areas. In: Francis J, et al. (eds.) Training for the Sustainable Management of Marine Protected Areas: a Training Manual for MPA Managers. CZMC/UDSM, WIOMSA, The World Bank, 2003, Page 42. Available from: https://www.cbd.int/doc/pa/tools/Managing%20marine%20protected%20areas%20a%20toolkit.pdf. |
[56] |
Couillard J, Garon S, Riznic J (2009) The logical framework approach—millenium. Proj Manage J 40: 31–44. https://doi.org/10.1002/pmj.20117 doi: 10.1002/pmj.20117
![]() |
[57] | NEMA, 2010 Annual Report. National Emergency Management Agency. NEMA, Abuja-Nigeria, 2011. Available from: https://www.refworld.org/pdfid/5b3f84874.pdf. |
[58] | UNISDR (2004) Towards Sustainable Development in Africa—Report on the Status of Disaster Risk Management & Disaster Risk Assessment in Africa. UNISDR, African Union, NEPAD, African Development Bank. Available from: https://www.unisdr.org/2005/task-force/working%20groups/wg-africa/NEPAD-report-may-2004.doc. |
[59] | Nolte S, Martin, EC, Boenigk S (2012) Cross-sectoral Coordination of Disaster Relief. Bucknell Digital Commons, Bucknell University, 1–34. Available from: https://digitalcommons.bucknell.edu/cgi/viewcontent.cgi?article=1406&context=fac_journ. |
[60] | Eide A, Haugstveit I, Halvorsrud R, et al. (2014) Key challenges in multiagency collaboration during large-scale emergency management. Pisa: Italy, 2014. Available from: https://ceur-ws.org/Vol-953/paper5.pdf. |
[61] | EGASPIN (2002) Containment Procedures and Clean-Up of Spills, para 2.6.3. Environmental Guidelines and Standards for the Petroleum Industry in Nigeria, Nigeria. Available from: https://www.iea.org/policies/8676-environmental-guidelines-and-standards-for-the-petroleum-industry-in-nigeria-egaspin. |
[62] |
Comfort LK (2007) Crisis Management in Hindsight: Cognition, Communication, Coordination, and Control. Public Adm Rev 67: 189–197. https://doi.org/10.1111/j.1540-6210.2007.00827.x doi: 10.1111/j.1540-6210.2007.00827.x
![]() |
[63] |
Moore S, Eng E, Daniel M (2003) International NGOs and the role of network centrality in humanitarian aid operations: A case study of coordination during the 2000 Mozambique floods. Disasters 27: 305–318. https://doi.org/10.1111/j.0361-3666.2003.00235.x doi: 10.1111/j.0361-3666.2003.00235.x
![]() |
[64] | Prizzia R (2008) The role of coordination in disaster management. https://doi.org/10.1201/9781420058635.ch5 |
[65] |
Moynihan DP (2008) Learning under Uncertainty: Networks in crisis management. Public Adm Rev 68: 350–365. https://doi.org/10.1111/j.1540-6210.2007.00867.x doi: 10.1111/j.1540-6210.2007.00867.x
![]() |
[66] |
Sapat A, Esnard AM, Kolpakov A (2019) Understanding collaboration in disaster assistance networks: Organizational homophily or resource dependency? Am R Public Adm 49: 957–972. https://doi.org/10.1177/0275074019861347 doi: 10.1177/0275074019861347
![]() |
[67] |
Cigler B (2007) The "big questions" of Katrina and the 2005 great flood of New Orleans. Public Adm Rev 67: 64–76. https://doi.org/10.1111/j.1540-6210.2007.00814.x doi: 10.1111/j.1540-6210.2007.00814.x
![]() |
[68] |
Kettl D (2006) Managing boundaries in American administration: the collaboration imperative. Public Adm Rev 66: 10–19. https://doi.org/10.1111/j.1540-6210.2006.00662.x doi: 10.1111/j.1540-6210.2006.00662.x
![]() |
[69] |
Weiss J (1987) Pathways to Cooperation among Public Agencies. J Policy Anal Manage 7: 94–117. https://doi.org/10.2307/3323353 doi: 10.2307/3323353
![]() |
[70] | UNEP (2014) Stakeholder Engagement at UNEP. Available from: http://www.unep.org/civil-society/Portals/24105/documents/resources/stakeholder_engagement/Review_of_current_practices_of_stakeholder_engagement_in_multilateral_organisations_30July_2013.pdf. |
1. | Sung Woo Choi, Fundamental boundary matrices for 36 elementary boundary value problems of finite beam deflection on elastic foundation, 2023, 20, 1551-0018, 13704, 10.3934/mbe.2023611 |