Weight w | Multiplicity Aw |
0 | 1 |
22m−2−2m+v−2 | 2m−v−1(2m−v+1) |
22m−2 | 22m−1−22m−2v |
22m−2+2m+v−2 | 2m−v−1(2m−v−1) |
An energy-preserving finite difference method is first presented for solving the nonlinear coupled space-fractional Klein-Gordon (KG) equations. The discrete conservation law, boundedness of the numerical solutions and convergence of the numerical schemes are obtained. These results are proved by the recent developed fractional Sobolev inequalities, the matrix analytical methods and so on. Numerical experiments are carried out to confirm the theoretical findings.
Citation: Min Li, Ju Ming, Tingting Qin, Boya Zhou. Convergence of an energy-preserving finite difference method for the nonlinear coupled space-fractional Klein-Gordon equations[J]. Networks and Heterogeneous Media, 2023, 18(3): 957-981. doi: 10.3934/nhm.2023042
[1] | Boran Kim, Chang Heon Kim, Soonhak Kwon, Yeong-Wook Kwon . Jacobi forms over number fields from linear codes. AIMS Mathematics, 2022, 7(5): 8235-8249. doi: 10.3934/math.2022459 |
[2] | Yang Pan, Yan Liu . New classes of few-weight ternary codes from simplicial complexes. AIMS Mathematics, 2022, 7(3): 4315-4325. doi: 10.3934/math.2022239 |
[3] | Jianying Rong, Fengwei Li, Ting Li . Two classes of two-weight linear codes over finite fields. AIMS Mathematics, 2023, 8(7): 15317-15331. doi: 10.3934/math.2023783 |
[4] | Yang Liu, Ruihu Li, Qiang Fu, Hao Song . On the minimum distances of binary optimal LCD codes with dimension 5. AIMS Mathematics, 2024, 9(7): 19137-19153. doi: 10.3934/math.2024933 |
[5] | Xiaomeng Zhu, Yangjiang Wei . Few-weight quaternary codes via simplicial complexes. AIMS Mathematics, 2021, 6(5): 5124-5132. doi: 10.3934/math.2021303 |
[6] | Hatoon Shoaib . Double circulant complementary dual codes over F4. AIMS Mathematics, 2023, 8(9): 21636-21643. doi: 10.3934/math.20231103 |
[7] | Ismail Aydogdu . On double cyclic codes over Z2+uZ2. AIMS Mathematics, 2024, 9(5): 11076-11091. doi: 10.3934/math.2024543 |
[8] | Victoria Herranz, Diego Napp, Carmen Perea . Weight-2 input sequences of 1/n convolutional codes from linear systems point of view. AIMS Mathematics, 2023, 8(1): 713-732. doi: 10.3934/math.2023034 |
[9] | Claude Carlet . Identifying codewords in general Reed-Muller codes and determining their weights. AIMS Mathematics, 2024, 9(5): 10609-10637. doi: 10.3934/math.2024518 |
[10] | Lunyi Liu, Qunying Wu . Complete integral convergence for weighted sums of negatively dependent random variables under sub-linear expectations. AIMS Mathematics, 2023, 8(9): 22319-22337. doi: 10.3934/math.20231138 |
An energy-preserving finite difference method is first presented for solving the nonlinear coupled space-fractional Klein-Gordon (KG) equations. The discrete conservation law, boundedness of the numerical solutions and convergence of the numerical schemes are obtained. These results are proved by the recent developed fractional Sobolev inequalities, the matrix analytical methods and so on. Numerical experiments are carried out to confirm the theoretical findings.
Throughout this paper, we let q=2m for a positive integer m. An [n,κ,d] linear code C over the finite field F2 is a κ-dimensional subspace of Fn2 with minimum distance d. A linear code C is called projective if its dual code has minimum distance at least 3. For a codeword c∈C the Hamming weight wt(c) is the number of nonzero coordinates in c. Let Ai be the number of codewords with weight i in C of length n. The sequence (1,A1,…,An) is referred as the weight distribution of C. If the number of nonzero Ai in the sequence (A1,…,An) is equal to t, we call C a t-weight code.
The weight distribution contains important information of a code. In classic coding theory, it gives the minimum distance of the code which determines the error correction capability of the code. In addition, the weight distribution allows the computation of the error probability of error detection and error correction with respect to some algorithms [2,16,31]. Thus, it is desirable to determine the weight distributions of linear codes. Moreover, linear codes with a few nonzero weights have many applications in constant composition codes [10], authentication codes [11] and secret sharing schemes [38] and some other fields. So it has provoked tremendous interests in determining the weight distributions of linear codes in literature. Different kinds of linear codes over finite fields and rings have been investigated explicitly for the past two decades, see [5,9,13,15,17,18,19,24,27,29,30,34,35,39]. In particular, Ding et al. [13] studied the weight distributions of a class of binary linear codes. Heng et al. dealt with projective binary linear codes from special Boolean functions in their recent work [18]. Huang et al. [19] constructed primitive binary LCD BCH codes and determined their parameters.
Let q=pm for a prime p. Choose a subset D={d1,d2,…,dn} of F∗q, where F∗q is the multiplicative group of Fq. Denote by Tr the absolute trace function from Fq to Fp. A linear code of length n is defined by
CD={(Tr(bd1),Tr(bd2),…,Tr(bdn)):b∈Fq}. | (1.1) |
The set D is called the defining set. Ding [12] pointed out that the defining-set construction is a fundamental approach and is equivalent to the generator matrix construction of all linear codes. Therefore it has attracted extensive attention and many families of linear codes were proposed following this way [1,13,14,21,22,23,33,36,37], most of which have good parameters. Particularly, Wu et al. [33] investigated three-weight binary linear codes from generalized Moisio's exponential sums. We refer the reader to [25,28] and the references therein for an overall survey on recent results and problems on constructions of linear codes from cryptographic functions.
In the rest of the paper, we always take p=2 unless otherwise stated. In [13], a class of three-weight binary code CD of (1.1) is constructed using the defining set
D={x∈F∗q:Tr(x2h+1)=0}, |
where q=2m and 1⩽h<m/2.
Let α,β∈F∗q, and u a positive integer less than m. We consider a special case of the defining-set construction by defining a class of linear codes
CD={c(a,b):a,b∈Fq}, | (1.2) |
where c(a,b)=(Tr(ax+by))(x,y)∈D and
D={(x,y)∈F2q∖{(0,0)}:Tr(αx2u+1+βy2u+1)=0}. | (1.3) |
The set D is also called the defining set of CD. Clearly, this is an extension of the work in [13].
The purpose of this paper is to study the weight distributions of CD by employing Weil sums. These linear codes are projective with at most three nonzero weights and can be utilized to construct secret sharing schemes with good access structures.
Now we present the main results of this paper and their proofs are given in Section 3. Let v=gcd(m,u) stand for the greatest common divisor of m and u. Let g be a generator of the cyclic group F∗q. Namely, F∗q=⟨g⟩. The weight distributions of CD are given in the following four theorems.
Theorem 1.1. Let CD be defined by (1.2) and (1.3). If m/v is odd, then CD is a [22m−1−1,2m,22m−2−2m+v−2] three-weight binary code with the weight distribution in Table 1.
Weight w | Multiplicity Aw |
0 | 1 |
22m−2−2m+v−2 | 2m−v−1(2m−v+1) |
22m−2 | 22m−1−22m−2v |
22m−2+2m+v−2 | 2m−v−1(2m−v−1) |
Theorem 1.2. Suppose that m/v is even and α,β∉⟨g2v+1⟩. Then CD is a [22m−1+2m−1−1,2m,22m−2] two-weight binary code with the weight distribution in Table 2.
Weight w | Multiplicity Aw |
0 | 1 |
22m−2 | 22m−1+2m−1−1 |
22m−2+2m−1 | 22m−1−2m−1 |
Theorem 1.3. Let m/v be even and α,β∈⟨g2v+1⟩. If u≠m/2, then CD is a [22m−1+2m+2v−1−1,2m,22m−2] three-weight binary code with the weight distribution in Table 3. If u=m/2, then CD is a simplex code with parameters [22m−1,2m,22m−1] and the only nonzero weight 22m−1. Moreover, the simplex code meets the Griesmer bound.
Weight w | Multiplicity Aw |
0 | 1 |
22m−2 | 2m−2v−1(2m−2v+1)−1 |
22m−2+2m+2v−2 | 22m−4v(24v−1) |
22m−2+2m+2v−1 | 2m−2v−1(2m−2v−1) |
Theorem 1.4. Suppose that m/v is even and only one of α and β is in ⟨g2v+1⟩, then CD is a [22m−1−2m+v−1−1,2m,22m−2−2m+v−1] three-weight binary code with the weight distribution in Table 4.
Weight w | Multiplicity Aw |
0 | 1 |
22m−2−2m+v−1 | 2m−v−1(2m−v+1) |
22m−2−2m+v−2 | 22m−22m−2v |
22m−2 | 2m−v−1(2m−v−1)−1 |
Some examples are provided to illustrate our main results. All of the numerical results are verified by Magma programs.
Example 1. Let (m,u)=(3,1). By Theorem 1.1, the binary code CD has parameters [31, 6, 12]. Its weight enumerator is 1+10z12+47z16+6z20.
Example 2. Let (m,u)=(2,1) and F∗4=⟨g⟩. If we take α=g2 and β=g, from Theorem 1.2 the binary code CD has parameters [9,4,4]. Its weight enumerator is 1+9z4+6z6. It is optimal according to Markus Grassl's code tables available at http://www.codetables.de/.
Example 3. Let (m,u)=(4,2). Write F∗16=⟨g⟩ and α=β=g5. By Theorem 1.3, the code CD has parameters [255,8,128] and it is an optimal simplex code with the only nonzero weight 128.
Example 4. Let (m,u)=(4,1), F∗16=⟨g⟩, α=g3 and β=g. By Theorem 1.4, the code CD has parameters [111,8,48]. Its weight enumerator is 1+36z48+192z56+27z64.
In this section, we present some results on group characters and Weil sums. Let G be a finite abelian group (written multiplicatively). A character χ of G is a homomorphism from G into the multiplicative group U of complex numbers of absolute value 1. That is, χ is a mapping from G into U with χ(xy)=χ(x)χ(y) for all x,y∈G. Let q=2m. For each b∈Fq, the function
χb(x)=(−1)Tr(bx) for all x∈Fq |
defines an additive character of Fq, where Tr is the absolute trace function from Fq to F2. The additive character χ0 is called trivial, whereas other characters χb with b∈F∗q are called nontrivial. Especially χ1 is called the canonical additive character and is denoted by χ for simplicity. See [26] for more information about characters over finite fields.
In [7], Coulter determined the value of Weil sums Su(α,β) defined by
Su(α,β)=∑x∈Fqχ(αx2u+1+βx), |
for all α,β∈Fq, where q=2m and u is a positive integer. Recall that v=gcd(m,u) is the greatest common divisor of m and u.
Lemma 2.1 (Theorem 4.1, [7]). If m/v is odd, then
Su(α,0)={qif α=0,0otherwise. |
Lemma 2.2 (Theorem 4.2, [7]). Let β∈F∗q and suppose m/v is odd. Then Su(α,β)=Su(1,βγ−1), where γ∈F∗q is the unique element satisfying γ2u+1=α. Further, we have
Su(1,β)={0if Trv(β)≠1,±2m+v2if Trv(β)=1, |
where and hereafter Trv is the trace function from Fq to F2v.
Lemma 2.3 (Theorem 5.2, [7]). Let m/v be even so that m=2k for some integer k. Then
Su(α,0)={(−1)k/v2kif α≠gt(2v+1) for any integer t,−(−1)k/v2k+vif α=gt(2v+1) for some integer t, |
where g is a generator of F∗q.
When m/v is even, the evaluation of Su(α,β) for p=2, where β≠0, was due to Coulter [7], and it can be similarly proved as the case of an odd prime p, see the poofs of Theorems 1 and 2 in [6].
Lemma 2.4 (Theorem 5.3, [7]). Let β∈F∗q and suppose m/v is even such that m=2k for some integer k. Let fα(x)=α2ux22u+αx∈Fq[x]. There are two cases.
(i) If α≠gt(2v+1) for any integer t then fα is a permutation polynomial. Let x0∈Fq be the unique element satisfying fα(x0)=β2u. Then
Su(α,β)=(−1)k/v2kχ(αx2u+10). |
(ii) If α=gt(2v+1) for some integer t then Su(α,β)=0 unless the equation fα(x)=β2u is solvable. If the equation is solvable, with solution x0 say, then
Su(α,β)=−(−1)k/v2k+vχ(αx2u+10). |
In this section, we always fix α,β∈F∗q and let g be a generator of F∗q.
The code length is defined by
n=|D|=|{(x,y)∈F2q∖{(0,0)}:Tr(αx2u+1+βy2u+1)=0}|. | (3.1) |
Lemma 3.1. The code length n of (3.1) is given as follows.
(i) If m/v is odd, then n=22m−1−1.
(ii) If m/v is even, then
n={22m−1+2m−1−1if α,β∉⟨g2v+1⟩,22m−1+2m+2v−1−1if α,β∈⟨g2v+1⟩,22m−1−2m+v−1−1otherwise. |
Proof. It follows from the orthogonal property of additive characters that
n=12∑x,y∈Fq∑z1∈F2(−1)z1Tr(αx2u+1+βy2u+1)−1=22m−1+12∑x,y∈Fq(−1)Tr(αx2u+1+βy2u+1)−1=22m−1−1+12Su(α,0)Su(β,0). |
Thus we obtain the desired conclusions from Lemmas 2.1 and 2.3.
The Pless power moments are useful tools when we calculate the weight distribution of a given code. Recall that the code CD is defined by (1.2) and (1.3) with length n and dimension κ=dimF2(CD). The weight distributions of CD and its dual C⊥D are denoted by (1,A1,…,An) and (1,A⊥1,…,A⊥n), respectively. As we will prove later in Theorem 4.1, the minimum weight of the dual code C⊥D is at least 3. So A⊥1=0, A⊥2=0 and consequently the first three Pless power moments are given by [20Y, p.260]:
n∑j=0Aj=2κ,n∑j=0jAj=2κ−1n,n∑j=0j2Aj=2κ−2n(n+1). |
In this subsection, we will prove the weight distributions of CD given in Theorems 1.1, 1.2, 1.3 and 1.4. The code length n is given in Lemma 3.1. Assume that (a,b)≠(0,0) unless otherwise stated. We define
N0(a,b)=|{(x,y)∈F2q:Tr(αx2u+1+βy2u+1)=0,Tr(ax+by)=0}|. | (3.2) |
Then the Hamming weight of c(a,b) is expressed as
wt(c(a,b))=n−N0(a,b)+1. | (3.3) |
By (3.2) and the orthogonal property of additive characters,
N0(a,b)=2−2∑x,y∈Fq∑z1∈F2(−1)z1Tr(αx2u+1+βy2u+1)∑z2∈F2(−1)z2Tr(ax+by)=2−2∑x,y∈Fq(1+(−1)Tr(αx2u+1+βy2u+1))(1+(−1)Tr(ax+by))=22m−2+2−2(Su(α,0)Su(β,0)+Su(α,a)Su(β,b)). | (3.4) |
Now we are going to determine the values of N0(a,b) given by (3.4). There are four cases to consider according to the parity of m/v and the values of α and β.
In the first case, if m/v is odd, the length is n=22m−1−1. At first glance, when a=0 and b≠0, we have Su(α,0)=0 by Lemma 2.1. So N0(a,b)=22m−2. Similarly when a≠0 and b=0, N0(a,b)=22m−2. Assume that a∈F∗q, we have from Lemma 2.2 that
Su(α,a)=Su(1,aγ−1)={0 if Trv(aγ−1)≠1,±2m+v2 if Trv(aγ−1)=1, |
where γ∈F∗q is the unique element satisfying γ2u+1=α. Thus it follows from (3.4), Lemmas 2.1 and 2.2 that
N0(a,b)∈{22m−2,22m−2+2m+v−2,22m−2−2m+v−2}. |
Hence, by (3.3), the weight wt(c(a,b)) of the codeword c(a,b) satisfies
wt(c(a,b))∈{22m−2,22m−2+2m+v−2,22m−2−2m+v−2}. |
Put
w1=22m−2−2m+v−2,w2=22m−2,w3=22m−2+2m+v−2. |
We now determine the number Awi of codewords with weight wi in CD. The first three Pless power moments yield the following system of equations:
{Aw1+Aw2+Aw3=22m−1,w1Aw1+w2Aw2+w3Aw3=22m−1n,w21Aw1+w22Aw2+w23Aw3=22m−2n(n+1), | (3.5) |
where n=22m−1−1. Solving the system of equations in (3.5) leads to the weight distribution given in Table 1. This proves Theorem 1.1.
In the second case, if m/v is even and α,β∉⟨g2v+1⟩, the length is n=22m−1+2m−1−1. It follows from Lemmas 2.3 and 2.4 that
Su(α,0)=(−1)k/v2k,Su(α,a)=(−1)k/v2kχ(αx2u+10), |
where a≠0 and x0 satisfies fα(x0)=a2u. By (3.4),
N0(a,b)∈{22m−2,22m−2+2m−1}. |
From (3.3), the weight wt(c(a,b)) belongs to the set
{22m−2,22m−2+2m−1}. |
Let
w1=22m−2,w2=22m−2+2m−1. |
Again by solving the system of equations
{Aw1+Aw2=22m−1,w1Aw1+w2Aw2=22m−1n, | (3.6) |
where n=22m−1+2m−1−1, we get the weight distribution given in Table 2. This finishes the proof of Theorem 1.2.
In the third case, if m/v is even and α,β∈⟨g2v+1⟩, the length is n=22m−1+2m+2v−1−1. Again from Lemma 2.3, we have
Su(α,0)=−(−1)k/v2k+v. |
Let a≠0.
It follows from Lemma 2.4 that Su(α,a)=0 or if the equation fα(x)=a2u is solvable with a solution x0∈Fq, then
Su(α,a)=−(−1)k/v2k+vχ(αx2u+10). |
By (3.3) and (3.4), the weight wt(c(a,b)) belongs to the set
{22m−2,22m−2+2m+2v−2,22m−2+2m+2v−1}. |
Write
w1=22m−2,w2=22m−2+2m+2v−2,w3=22m−2+2m+2v−1. |
The first three Pless power moments are given by (3.5), where n=22m−1+2m+2v−1−1. Solving these equations yields the weight distribution given in Table 3. This completes the proof of Theorem 1.3.
The last case is that m/v is even and α∈⟨g2v+1⟩, β∉⟨g2v+1⟩ (or β∈⟨g2v+1⟩, α∉⟨g2v+1⟩). In this case, n=22m−1−2m+v−1−1. After a similar argument as we have done in the previous case, we obtain from (3.3) and (3.4) that wt(c(a,b)) belongs to the set
{22m−2,22m−2−2m+v−2,22m−2−2m+v−1}. |
Set
w1=22m−2−2m+v−1,w2=22m−2−2m+v−2,w3=22m−2. |
From the first three Pless power moments (3.5), we get the weight distribution given in Table 4, completing the proof of Theorem 1.4.
For the dual C⊥D of the code CD, we have the following conclusion.
Theorem 4.1. Let m⩾2 and α,β∈F∗q. The dual C⊥D of the code CD is a binary code with parameters [n,n−2m,d⊥], where n is given in Lemma 3.1 and d⊥=3 if m is even and 3⩽d⊥⩽4 if m is odd.
Proof. The dimension of the code C⊥D is obvious. Since D does not contain the zero element of F2q, the minimum distance of C⊥D cannot be one. Similarly, since D is not a multiset, any two elements di and dj of D must be distinct if i≠j. Hence, the minimum distance C⊥D cannot be 2. So we have d⊥⩾3.
When m is even, we assume that (x1,0),(0,y2)∈D. We claim that (x1,y2) is in D. Actually,
Tr(αx2u+11+βy2u+12)=Tr(αx2u+11)+Tr(βy2u+12)=0. |
Therefore, the minimum distance of C⊥D is 3.
When m is odd, n=22m−1−1 by Theorem 1.1. Let D={di=(d1i,d2i):i=1,2,…,n}. Consider the sums di+dj for i≠j. The total number of such sums is equal to (22m−1−1)(22m−2−1)>22m for m⩾2. Hence, there must be four distinct integers i,j,k,l∈{1,2,…,n} such that di+dj=dk+dl. This means that C⊥D has a codeword with Hamming weight 4. So we have 3⩽d⊥⩽4, completing the whole proof.
When m is odd, the code C⊥D is at least almost optimal. This is because the minimum weight of any binary code with length 22m−1−1 and dimension 22m−1−1−2m is at most 4 according to the sphere packing bound.
Example 5. Let (m,u)=(2,1), α=g2 and β=g, where F∗4=⟨g⟩. Magma programs show that the binary code C⊥D has parameters [9,5,3] and it is optimal. If we take α=β=g3, then C⊥D has parameters $ [15,11,3] and it is optimal, too.
Example 6. Let (m,u)=(3,1). Then the binary code C⊥D has parameters [31,25,3] and it is almost optimal, while the optimal binary code has parameters [31,25,4].
In this paper, a class of projective binary codes with two or three weights were constructed from a proper defining set. Their weight distributions were determined by applying Weil sums and the first three Pless power moments. Furthermore, we determined the parameters of their dual codes. Some optimal and almost optimal codes were also constructed. Due to [38], a linear code over F2 is suitable to construct secret sharing schemes with interesting access structures if
wminwmax>12, | (5.1) |
where wmin and wmax denote the minimum and maximum nonzero weights of the code, respectively. For the linear codes CD in Theorems 1.1-1.4, the inequality (5.1) always holds if m⩾2v+2. So they can be used in secret sharing schemes with good access structures. Additionally, projective two-weight codes in Theorem 1.2 can be applied in strongly regular graphs [4,8] and projective three-weight codes in Theorems 1.1, 1.3 and 1.4 are related to association schemes with three classes [3].
The authors would like to thank the referee for his/her thorough review with constructive suggestions and valuable comments. The work is partly supported by the National Natural Science Foundation of China under Grant 12071247, Grant 11701317, Grant U1811461 and Grant 11971496.
The authors declare that there is no conflict of interests regarding the publication of this paper.
[1] |
J. Zhang, On the standing wave in coupled nonlinear Klein-Gordon equations, Math. Methods Appl. Sci., 26 (2003), 11–25. https://doi.org/10.1002/mma.340 doi: 10.1002/mma.340
![]() |
[2] |
V. Makhankov, Dynamics of classical solitons in non-integrable systems, Phys. Rep, 35 (1978), 1–128. https://doi.org/10.1016/0370-1573(78)90074-1 doi: 10.1016/0370-1573(78)90074-1
![]() |
[3] | K. Jörgens, Nonlinear Wave Equation, Lecture Notes, University of Colordo, 1970. |
[4] |
L. Medeiros, M. M. Miranda, Weak solutions for a system of nonlinear Klein-Gordon equations, Ann. Math. Pure Appl., 146 (1986), 173–183. https://doi.org/10.1007/BF01762364 doi: 10.1007/BF01762364
![]() |
[5] | A. Biswas, A. H. Kara, L. Moraru, A. H. Bokhari, F. D. Zaman, Conservation laws of coupled Klein-Gordon equations with cubic and power law nonlinearities, Proc. Rom. Acad. Sci. Ser. A Math. Phys. Tech. Sci. Inf. Sci., 15 (2014), 123–129. |
[6] |
V. Benci, D. F. Fortunato, Solitary waves of the nonlinear Klein-Gordon equation coupled with the Maxwell equations, Rev. Math. Phys., 14 (2002), 409–420. https://doi.org/10.1142/S0129055X02001168 doi: 10.1142/S0129055X02001168
![]() |
[7] |
I. Fukuda, M. Tsutsumi, On the Yukawa-coupled Klein-Gordon-Schrödinger equations in three space dimensions, Proc. Jpn. Acad. Ser. A, Math. Sci., 51 (1975), 402–405. https://doi.org/10.3792/pja/1195518563 doi: 10.3792/pja/1195518563
![]() |
[8] | I. Segal, Nonlinear partial differential equations in quantum field theory, Proc. Symp. Appl. Math. AMS., 17 (1965), 210–226. |
[9] |
M. Tsutsumi, Nonrelativistic approximation of nonlinear Klein-Gordon equations in two space dimensions, Nonlinear Anal. Theory Methods Appl., 8 (1984), 637–643. https://doi.org/10.1016/0362-546X(84)90008-7 doi: 10.1016/0362-546X(84)90008-7
![]() |
[10] |
Joseph, P. Subin, New traveling wave exact solutions to the coupled Klein-Gordon system of equations, Partial Differ. Equations Appl. Math., 5 (2022), 100208. https://doi.org/10.1016/j.padiff.2021.100208 doi: 10.1016/j.padiff.2021.100208
![]() |
[11] |
D. Deng, D. Liang, The energy-preserving finite difference methods and their analyses for system of nonlinear wave equations in two dimensions, Appl. Numer. Math., 151 (2020), 172–198. https://doi.org/10.1016/j.apnum.2019.12.024 doi: 10.1016/j.apnum.2019.12.024
![]() |
[12] |
M. He, P. Sun, Energy-preserving finite element methods for a class of nonlinear wave equations, Appl. Numer. Math., 157 (2020), 446–469. https://doi.org/10.1016/j.apnum.2020.06.016 doi: 10.1016/j.apnum.2020.06.016
![]() |
[13] | X. Zhu, M. He, P. Sun, Comparative Studies on Mesh-Free deep neural network approach versus finite element method for solving coupled nonlinear hyperbolic/wave equations, Int. J. Numer. Anal. Mod., 19 (2022), 603–629. |
[14] |
D. Deng, Q. Wu, The error estimations of a two-level linearized compact ADI method for solving the nonlinear coupled wave equations, Numer. Algorithms, 89 (2022), 1663–1693. https://doi.org/10.1007/s11075-021-01168-9 doi: 10.1007/s11075-021-01168-9
![]() |
[15] |
D. Deng, Q. Wu, The studies of the linearly modified energy-preserving finite difference methods applied to solve two-dimensional nonlinear coupled wave equations, Numer. Algorithms, 88 (2021), 1875–1914. https://doi.org/10.1007/s11075-021-01099-5 doi: 10.1007/s11075-021-01099-5
![]() |
[16] |
D. Deng, Q. Wu, Accuracy improvement of a Predictor-Corrector compact difference scheme for the system of two-dimensional coupled nonlinear wave equations, Math. Comput. Simul., 203 (2023), 223–249. https://doi.org/10.1016/j.matcom.2022.06.030 doi: 10.1016/j.matcom.2022.06.030
![]() |
[17] |
D. Deng, Q. Wu, Error estimations of the fourth-order explicit Richardson extrapolation method for two-dimensional nonlinear coupled wave equations, Comput. Appl. Math., 41 (2022), 1–25. https://doi.org/10.1007/s40314-021-01701-5 doi: 10.1007/s40314-021-01701-5
![]() |
[18] |
X. Cheng, J. Duan, D. Li, A novel compact ADI scheme for two-dimensional Riesz space fractional nonlinear reaction-diffusion equations, Appl. Math. Comput., 346 (2019), 452–464. https://doi.org/10.1016/j.amc.2018.10.065 doi: 10.1016/j.amc.2018.10.065
![]() |
[19] |
J. Wang, A. Xiao, Conservative Fourier spectral method and numerical investigation of space fractional Klein-Gordon-Schrödinger equations, Appl. Math. Comput., 350 (2019), 348–365. https://doi.org/10.1016/j.amc.2018.12.046 doi: 10.1016/j.amc.2018.12.046
![]() |
[20] |
Q. Liu, F. Zeng, C. Li, Finite difference method for time-space-fractional Schrödinger equation, Int. J. Comput. Math., 92 (2015), 1439–1451. https://doi.org/10.1080/00207160.2014.945440 doi: 10.1080/00207160.2014.945440
![]() |
[21] |
X. Cheng, H. Qin, J. Zhang, Convergence of an energy-conserving scheme for nonlinear space fractional Schrödinger equations with wave operator, J. Comput. Appl. Math., 400 (2022), 113762. https://doi.org/10.1016/j.cam.2021.113762 doi: 10.1016/j.cam.2021.113762
![]() |
[22] |
X. Li, J. Wen, D. Li, Mass and energy-conserving difference schemes for nonlinear fractional Schrödinger equations, Appl. Math. Lett., 111 (2021), 106686. https://doi.org/10.1016/j.aml.2020.106686 doi: 10.1016/j.aml.2020.106686
![]() |
[23] |
W. Cao, D. Li, Z. Zhang, Unconditionally optimal convergence of an energy-preserving and linearly implicit scheme for nonlinear wave equations, Sci. China Math., 65 (2022), 1731–1748. https://doi.org/10.1007/s11425-020-1857-5 doi: 10.1007/s11425-020-1857-5
![]() |
[24] |
D. Wang, A. Xiao, W. Yang, A linearly implicit conservative difference scheme for the space fractional coupled nonlinear Schrödinger equations, J. Comput. Phys., 272 (2014), 644–655. https://doi.org/10.1016/j.jcp.2014.04.047 doi: 10.1016/j.jcp.2014.04.047
![]() |
[25] |
D. Wang, A. Xiao, W. Yang, Crank–Nicolson difference scheme for the coupled nonlinear Schrödinger equations with the Riesz space fractional derivative, J. Comput. Phys., 242 (2013), 670–681. https://doi.org/10.1016/j.jcp.2013.02.037 doi: 10.1016/j.jcp.2013.02.037
![]() |
[26] |
N. Norman, The Fourier transform method for normalizing intensities, Acta Cryst., 10 (1957), 370–373. https://doi.org/10.1107/S0365110X57001085 doi: 10.1107/S0365110X57001085
![]() |
[27] |
P. L. Butzer, S. Jansche, A direct approach to the Mellin transform, J.Fourier Anal. Appl., 3 (1997), 325–376. https://doi.org/10.1007/BF02649101 doi: 10.1007/BF02649101
![]() |
[28] |
E. Hairer, M. Hochbruck, A. Iserles, C. Lubich, Geometric numerical integration, Oberwolfach Rep., 3 (2006), 805–882. https://doi.org/10.4171/owr/2006/14 doi: 10.4171/owr/2006/14
![]() |
[29] |
I. Higueras, Monotonicity for Runge-Kutta methods: inner product norms, J. Sci. Comput., 24 (2005), 97–117. https://doi.org/10.1007/s10915-004-4789-1 doi: 10.1007/s10915-004-4789-1
![]() |
[30] | D. Li, X. Li, Z. Zhang, Implicit-explicit relaxation Runge-Kutta methods: construction, analysis and applications to PDEs, Math. Comput., 92 (2023), 117–146. |
[31] |
D. I. Ketcheson, Relaxation Runge-Kutta methods: conservation and stability for inner-product norms, SIAM J. Numer. Anal., 57 (2019), 2850–2870. https://doi.org/10.1137/19M1263662 doi: 10.1137/19M1263662
![]() |
[32] |
D. Li, X. Li, Z. Zhang, Linearly implicit and high-order energy-preserving relaxation schemes for highly oscillatory Hamiltonian systems, J. Comput. Phys., 477 (2023), 111925. https://doi.org/10.1016/j.jcp.2023.111925 doi: 10.1016/j.jcp.2023.111925
![]() |
[33] |
D. Li, W. Sun, Linearly implicit and high-order energy-conserving schemes for nonlinear wave equations, J. Sci. Comput., 83 (2020), 65. https://doi.org/10.1007/s10915-020-01245-6 doi: 10.1007/s10915-020-01245-6
![]() |
[34] |
W. Cao, D. Li, Z. Zhang, Optimal superconvergence of energy conserving local discontinuous Galerkin methods for wave equations, Commun. Comput. Phys., 21 (2017), 211–236. https://doi.org/10.4208/cicp.120715.100516a doi: 10.4208/cicp.120715.100516a
![]() |
[35] |
Z. Hao, Z. Sun, W. Cao, A fourth-order approximation of fractional derivatives with its applications, J. Comput. Phys., 281 (2015), 787–805. https://doi.org/10.1016/j.jcp.2014.10.053 doi: 10.1016/j.jcp.2014.10.053
![]() |
[36] |
P. Wang, C. Huang, An implicit midpoint difference scheme for the fractional Ginzburg-Landau equation, J. Comput. Phys., 312 (2016), 31–49. https://doi.org/10.1016/j.jcp.2016.02.018 doi: 10.1016/j.jcp.2016.02.018
![]() |
[37] |
Y. Zhang, Z. Sun, T. Wang, Convergence analysis of a linearized Crank-Nicolson scheme for the two-dimensional complex Ginzburg-Landau equation, Numer. Methods Partial Differ. Equ., 29 (2013), 1487–1503. https://doi.org/10.1002/num.21763 doi: 10.1002/num.21763
![]() |
[38] | Y. L. Zhou, Application of Discrete Functional Analysis to the Finite Difference Method, Inter, Beijing: Ac ad. Publishers, 1990. |
[39] |
S. Vong, P. Lyu, X. Chen, S Lei, High order finite difference method for time-space fractional differential equations with Caputo and Riemann-Liouville derivatives, Numer. Algorithms, 72 (2016), 195–210. https://doi.org/10.1007/s11075-015-0041-3 doi: 10.1007/s11075-015-0041-3
![]() |
[40] | A. Quarteroni, A. Valli, Numerical Approximation of Partial Differential Equations, Springer Science & Business Media, 2008. |
[41] |
X. M. Gu, H. W. Sun, Y. Zhang, Y. L. Zhao, Fast implicit difference schemes for time-space fractional diffusion equations with the integral fractional Laplacian, Math. Methods Appl. Sci., 44 (2021), 441–463. https://doi.org/10.1002/mma.6746 doi: 10.1002/mma.6746
![]() |
[42] |
M. Li, X. M. Gu, C. Huang, M. Fei, G. Zhang, A fast linearized conservative finite element method for the strongly coupled nonlinear fractional Schrödinger equations, J. Comput. Phys., 358 (2018), 256–282. https://doi.org/10.1016/j.jcp.2017.12.044 doi: 10.1016/j.jcp.2017.12.044
![]() |
Weight w | Multiplicity Aw |
0 | 1 |
22m−2−2m+v−2 | 2m−v−1(2m−v+1) |
22m−2 | 22m−1−22m−2v |
22m−2+2m+v−2 | 2m−v−1(2m−v−1) |
Weight w | Multiplicity Aw |
0 | 1 |
22m−2 | 22m−1+2m−1−1 |
22m−2+2m−1 | 22m−1−2m−1 |
Weight w | Multiplicity Aw |
0 | 1 |
22m−2 | 2m−2v−1(2m−2v+1)−1 |
22m−2+2m+2v−2 | 22m−4v(24v−1) |
22m−2+2m+2v−1 | 2m−2v−1(2m−2v−1) |
Weight w | Multiplicity Aw |
0 | 1 |
22m−2−2m+v−1 | 2m−v−1(2m−v+1) |
22m−2−2m+v−2 | 22m−22m−2v |
22m−2 | 2m−v−1(2m−v−1)−1 |
Weight w | Multiplicity Aw |
0 | 1 |
22m−2−2m+v−2 | 2m−v−1(2m−v+1) |
22m−2 | 22m−1−22m−2v |
22m−2+2m+v−2 | 2m−v−1(2m−v−1) |
Weight w | Multiplicity Aw |
0 | 1 |
22m−2 | 22m−1+2m−1−1 |
22m−2+2m−1 | 22m−1−2m−1 |
Weight w | Multiplicity Aw |
0 | 1 |
22m−2 | 2m−2v−1(2m−2v+1)−1 |
22m−2+2m+2v−2 | 22m−4v(24v−1) |
22m−2+2m+2v−1 | 2m−2v−1(2m−2v−1) |
Weight w | Multiplicity Aw |
0 | 1 |
22m−2−2m+v−1 | 2m−v−1(2m−v+1) |
22m−2−2m+v−2 | 22m−22m−2v |
22m−2 | 2m−v−1(2m−v−1)−1 |