Processing math: 45%
Research article

A robust technique of cubic Hermite splines to study the non-linear reaction-diffusion equation with variable coefficients

  • Received: 06 December 2023 Revised: 07 February 2024 Accepted: 21 February 2024 Published: 27 February 2024
  • MSC : 35K51, 35K55, 65M06, 65M12

  • The present study proposes a hybrid numerical technique to discuss the solution of non-linear reaction-diffusion equations with variable coefficients. The perturbation parameter was assumed to be time-dependent. The spatial domain was discretized using the cubic Hermite splines collocation method. These splines are smooth enough to interpolate the function as well as its tangent at the node points. The temporal domain was discretized using the Crank-Nicolson scheme, commonly known as the CN scheme. The cubic Hermite splines are convergent of order h4, and the CN scheme is convergent of order Δt2. The technique is found to be convergent of order O(h2(γ2εjΔt+γ0(1+ˉα)h2)+Δt2). The step size in the space direction is taken to be h, and the step size in the time direction is Δt. Stability of the proposed scheme was studied using the L2 and L norms. The proposed scheme has been applied to different sets of problems and is found to be more efficient than existing schemes.

    Citation: Abdul-Majeed Ayebire, Inderpreet Kaur, Dereje Alemu Alemar, Mukhdeep Singh Manshahia, Shelly Arora. A robust technique of cubic Hermite splines to study the non-linear reaction-diffusion equation with variable coefficients[J]. AIMS Mathematics, 2024, 9(4): 8192-8213. doi: 10.3934/math.2024398

    Related Papers:

    [1] Norman Maswanganyi, Edmore Ranganai, Caston Sigauke . Long-term peak electricity demand forecasting in South Africa: A quantile regression averaging approach. AIMS Energy, 2019, 7(6): 857-882. doi: 10.3934/energy.2019.6.857
    [2] Dimitrios Saligkaras, Vasileios E. Papageorgiou . On the detection of patterns in electricity prices across European countries: An unsupervised machine learning approach. AIMS Energy, 2022, 10(6): 1146-1164. doi: 10.3934/energy.2022054
    [3] Kashif Raza Abbasi, Khadim Hussain, Jaffar Abbas, Festus Fatai Adedoyin, Pervez Ahmed Shaikh, Hazrat Yousaf, Faqeer Muhammad . Analyzing the role of industrial sector's electricity consumption, prices, and GDP: A modified empirical evidence from Pakistan. AIMS Energy, 2021, 9(1): 29-49. doi: 10.3934/energy.2021003
    [4] Abdulrahman Th. Mohammad, Amer Ibrahim Ismael . An equivalent photovoltaic solar system to solve the problems of electricity in Iraqi houses. AIMS Energy, 2019, 7(5): 660-670. doi: 10.3934/energy.2019.5.660
    [5] Yan Li, Yaheng Su, Qixin Zhao, Bala Wuda, Kaibo Qu, Lei Tang . An electricity price optimization model considering time-of-use and active distribution network efficiency improvements. AIMS Energy, 2025, 13(1): 13-34. doi: 10.3934/energy.2025002
    [6] Sameer Thakare, Neeraj Dhanraj Bokde, Andrés E. Feijóo-Lorenzo . Forecasting different dimensions of liquidity in the intraday electricity markets: A review. AIMS Energy, 2023, 11(5): 918-959. doi: 10.3934/energy.2023044
    [7] Chrish Kavuma, Diego Sandoval, Hakizimana Khan Jean de Dieu . Analysis of power generating plants and substations for increased Uganda's electricity grid access. AIMS Energy, 2021, 9(1): 178-192. doi: 10.3934/energy.2021010
    [8] Alemayehu T. Eneyaw, Demiss A. Amibe . Annual performance of photovoltaic-thermal system under actual operating condition of Dire Dawa in Ethiopia. AIMS Energy, 2019, 7(5): 539-556. doi: 10.3934/energy.2019.5.539
    [9] Ghafi Kondi Akara, Benoit Hingray, Adama Diawara, Arona Diedhiou . Effect of weather on monthly electricity consumption in three coastal cities in West Africa. AIMS Energy, 2021, 9(3): 446-464. doi: 10.3934/energy.2021022
    [10] Emrah Gulay . Forecasting the total electricity production in South Africa: Comparative analysis to improve the predictive modelling accuracy. AIMS Energy, 2019, 7(1): 88-110. doi: 10.3934/energy.2019.1.88
  • The present study proposes a hybrid numerical technique to discuss the solution of non-linear reaction-diffusion equations with variable coefficients. The perturbation parameter was assumed to be time-dependent. The spatial domain was discretized using the cubic Hermite splines collocation method. These splines are smooth enough to interpolate the function as well as its tangent at the node points. The temporal domain was discretized using the Crank-Nicolson scheme, commonly known as the CN scheme. The cubic Hermite splines are convergent of order h4, and the CN scheme is convergent of order Δt2. The technique is found to be convergent of order O(h2(γ2εjΔt+γ0(1+ˉα)h2)+Δt2). The step size in the space direction is taken to be h, and the step size in the time direction is Δt. Stability of the proposed scheme was studied using the L2 and L norms. The proposed scheme has been applied to different sets of problems and is found to be more efficient than existing schemes.



    Interval T2 (IT2) FLSs [1,2,3] have been applied to many fields with higher uncertainties and nonlinear characteristics. Despite this, since the alpha-plane (or z-slice) representation theory [4,5,6,7] of GT2 FSs was put forward by a few different research groups, much of the academic attention has shifted from IT2 fuzzy logic to GT2 fuzzy logic. As the computational complexity has been decreased significantly, they are increasingly being applied to in fields like border detection [8,9], fuzzy logic control [10,11], permanent magnetic drive [12,13,14,15], and so forth. As the secondary membership grades of GT2 FSs exist between zero and one, so that, they may be considered as more advanced order parameter models compared with IT2 FSs. Because the design degrees of freedom increase, GT2 FLSs have more of an ability to cope with issues arising from uncertainties in contrast to IT2 FLSs.

    GT2 FLSs [7] are made up of five blocks: Fuzzifier, rules, inference, TR, and defuzzification. TR is the kernel block, which plays the role of transforming the GT2 FS to the type-1 (T1) FS. The block of defuzzification maps the T1 FS to the crisp output. The most popular enhanced Karnik-Mendel (EKM [16,17,18,19,20,21,22,23]) TR algorithms have the advantage of keeping the uncertainty flows between the lower membership functions (LMFs) and upper MFs (UMFs). Despite so, this kind of algorithm is still computationally intensive. Liu gave the initialization interpretations [18] for the EKM algorithms, then the sensible beginning (SB, or say reasonable initialization) EKM (SBEKM) algorithms [24] can be generated. Based on these studies, this paper further divides the search space [25] of SBEKM algorithms, and then proposes the sensible beginning divided-search EKM (SBDEKM) algorithms for performing the centroid TR for GT2 FLSs.

    The remainder is organized as follows: Section 2 provides the background knowledge of GT2 FLSs. The SBDEKM algorithms are proposed to complete the centroid TR and defuzzification of GT2 FLSs in Section 3. Section 4 provides computer simulations to show the performance of the SBDEKM algorithms compared with the EKM algorithms and SBEKM algorithms. Finally, Section 5 gives the conclusions and expectations.

    In general, we may categorize the GT2 FLSs into two types from the aspect of inference: Mamdani [7,26,27] and Takagi-Sugeno-Kang [12,29,30]. In this paper, without loss of generality, consider a GT2 FLS with n inputs x1X1,xnXn and one output ˜B, among which, the sth is given as:

    Rs: if x1 is ˜Fs1 and x2 is ˜Fs2 and  and xn is ˜Fsn, then y is ˜Gs (1)

    in which ˜Fsi(i=1,,n;s=1,,M) is the antecedent, and ˜Gs(s=1,2,,M) is the consequent.

    For the sake of simplifying the expressions, here the singleton fuzzifier xi=xi is used, only one vertical slice (secondary membership) ˜Fsi(xi) of antecedent ˜Fsi is activated, and the alpha-cut decomposition can be represented as:

    ˜Fsi(xi)=supα[0,1]α/[csi,α(xi),dsi,α(xi)]. (2)

    For each rule, the firing interval at the corresponding alpha-level is:

    Fα:{Fsα(x)[f_sα(x),¯fsα(x)]f_sα(x)Tpi=1csi,α(xi)¯fsα(x)Tpi=1csi,α(xi), (3)

    where p denotes the number of antecedents, and T represents the minimum or product t-norm.

    Let ˜Gsα be the alpha-plane of consequent ˜Gs under the corresponding alpha-level, i.e.,

    ˜Gsα=yY˜Gsα(y)/y=yY[gsL,α(y),gsR,α(y)]/y. (4)

    In the following, we merge the firing interval of each rule with the related rule consequent alpha-plane ˜Gsα to get the firing rule alpha-plane ˜Bsα, i.e.,

    ˜Bsα:{FOU(˜Bsα)=[f_˜Bsα(y|x),¯f˜Bsα(y|x)]f_˜Bsα(y|x)=f_sα(x)gsL,α(y)¯f˜Bsα(y|x)=¯fsα(x)gsR,α(y). (5)

    Aggregating all the ˜Bsα to get the output alpha-plane ˜Bα, i.e.,

    ˜Bα:{FOU(˜Bα)=[f_˜Bα(y|x),¯f˜Bα(y|x)]f_˜Bα(y|x)=f_˜B1α(y|x)f_˜BMα(y|x)¯f˜Bα(y|x)=¯f˜B1α(y|x)¯f˜BMα(y|x). (6)

    Calculating the centroid of ˜Bα at the corresponding alpha-level to obtain the type-reduced set l˜Bα=ξl˜Bα, i.e.,

    YC,α(x)=C˜Bα(x)=α/[l˜Bα(x),r˜Bα(x)], (7)

    in which r˜Bα(x) and l˜Bα(x) can be computed by many different kinds of TR algorithms [16,17,18,19,20,21,27,28] as:

    l˜Bα(x)=minf˜Bα(yi)[f_˜Bα(yi),¯f˜Bα(yi)]ni=1yifR˜Bα(yi)ni=1fR˜Bα(yi), (8)
    r˜Bα(x)=maxf˜Bα(yi)[f_˜Bα(yi),¯f˜Bα(yi)]ni=1yifR˜Bα(yi)ni=1fR˜Bα(yi), (9)

    where n is the number of sampling points, and the specific IT2 FS R˜Bα=α/˜Bα.

    Aggregating all the YC,α to obtain the final T1 type-reduced set YC, i.e.,

    YC=supα[0,1]α/YC,α(x). (10)

    Suppose that the number of alpha-planes is m, that is to say, alpha is decomposed into α1,α2,,αm, and then the output should:

    y(x)=mi=1αi[(l˜Bαi(x)+r˜Bαi(x))/2]/mi=1αi. (11)

    First of all, we provide the sensible beginning (or say reasonable initialization) EKM algorithms [18,24,31,32] for finishing the centroid TR and defuzzification of GT2 FLSs. According to the inference, let the output of the GT2 FLSs be ˜B, whose primary variable is discretized into c=y1<<yn=d, then l˜Bα and r˜Bα under the alpha-level can be computed by a continuous version of the KM algorithms:

    l˜Bα=minη[c,d]Fl˜Bα(η)=minη[c,d]ηcy¯fR˜Bα(y)dy+dηyf_R˜Bα(y)dyηc¯fR˜Bα(y)dy+dηf_R˜Bα(y)dy, (12)
    r˜Bα=maxη[c,d]Fr˜Bα(η)=maxη[c,d]ηcyf_R˜Bα(y)dy+dηy¯fR˜Bα(y)dyηcf_R˜Bα(y)dy+dη¯fR˜Bα(y)dy. (13)

    For computing the two end points, Tables 1 and 2 give the computation steps for CKM and CEKM algorithms. According to the representations Fl˜Bα in (12) and Fr˜Bα in (13), i.e.,

    ηl˜Bα=Fl˜Bα(η)=η, (14)
    ηr˜Bα=Fr˜Bα(η)=η. (15)
    Table 1.  CKM algorithms [7,16,17,18,31,32] for computing the centroid.
    Step For l˜Bα, l˜Bα=minθ(y)[f_R˜Bα(y),¯fR˜Bα(y)]dcyθ(y)dydcθ(y)dy
    1 Let θ(y)=[¯fR˜Bα(y)+f_R˜Bα(y)]/2, and calculate η=ccyθ(y)dydcθ(y)dy.
    2 Let θ(y)¯fR˜Bα(y) when yη, and θ(y)f_R˜Bα(y) when y>η, and calculate ηl˜Bα=dcyθ(y)dydcθ(y)dy.
    3 Check whether |ηηl˜Bα|ε, if so, pause and let l˜Bα=ηl˜Bα, if it were not true,
    go to Step 4.
    4 Let η=ηl˜Bα and go to the second step.
    Step For r˜Bα, r˜Bα=maxθ(y)[f_R˜Bα(y),¯fR˜Bα(y)]dcyθ(y)dydcθ(y)dy
    1 Let θ(y)=[¯fR˜Bα(y)+f_R˜Bα(y)]/2, and calculate η=dcyθ(y)dydcθ(y)dy.
    2 Let θ(y)=f_R˜Bα(y) when yη, and θ(y)=¯fR˜Bα(y) when y>η, and calculate ηr˜Bα=dcyθ(y)dydcθ(y)dy.
    3 Check whether |ηηr˜Bα|ε, if so, stop and let r˜Bα=ηr˜Bα, if it were not true,
    go to the next step.
    4 Let η=ηr˜Bα and go to Step 2.

     | Show Table
    DownLoad: CSV
    Table 2.  CEKM algorithms [7,16,17,18,31,32] for computing the centroid.
    Step For l˜Bα
    1 Let a=(dc)/2.4+c, and calculate α=acy¯fR˜Bα(y)dy+dayf_R˜Bα(y)dy,
    β=ac¯fR˜Bα(y)dy+daf_R˜Bα(y)dy, a=α/β.
    2 Check if |aa|ε, if so, stop and let a=l˜Bα, if it were not true, return to the fourth step.
    3 Calculate s=sign(aa), α=α+smax(a,a)min(a,a)y[¯fR˜Bα(y)f_R˜Bα(y)]dy,
    β=β+smax(a,a)min(a,a)[¯fR˜Bα(y)f_R˜Bα(y)]dy, a=α/β.
    4 Let a=a,a=a,α=α,β=β and go to the Step 2.
    Step For r˜Bα
    1 Let a=(dc)/1.7+c, and compute α=acyf_R˜Bα(y)dy+day¯fR˜Bα(y)dy,
    β=acf_R˜Bα(y)dy+da¯fR˜Bα(y)dy, a=α/β.
    2 Check if |aa|ε, if so, stop and let a=r˜Bα, if it were not true, return to the fourth step.
    3 Calculate s=sign(aa), α=αsmax(a,a)min(a,a)y[¯fR˜Bα(y)f_R˜Bα(y)]dy,
    β=βsmax(a,a)min(a,a)[¯fR˜Bα(y)f_R˜Bα(y)]dy, a=α/β.
    4 Let a=a,a=a,α=α,and β=β and go to the Step 2.

     | Show Table
    DownLoad: CSV

    When l˜Bα=ηl˜Bα, and r˜Bα=ηr˜Bα, the iteration finishes, and we have that,

    l˜Bα=Fl˜Bα(l˜Bα), and r˜Bα=Fr˜Bα(r˜Bα). (16)

    For initializing the algorithms, as y[c,d], let f_R˜Bα(y)=¯fR˜Bα(y)θ(y), so that, θ(y)=[¯fR˜Bα(y)+f_R˜Bα(y)]/2. Then Eqs (12) and (13) turn out to be the same.

    r˜Bα=l˜Bα=dcyθ(y)dydcθ(y)dy=dcy[¯fR˜Bα(y)+f_R˜Bα(y)]/2dydc[¯fR˜Bα(y)+f_R˜Bα(y)]/2dy. (17)

    The initialization of the CKM algorithms may be represented as η(1), that is to say,

    η(1)=dcyθ(y)dydcθ(y)dy. (18)

    Tables 3 and 4 give the computation steps for the discrete KM, and discrete EKM algorithms, respectively. Here the discrete representation of η(1) can be written as:

    k(1)={k|ykni=1yi[¯fR˜Bα(yi)+f_R˜Bα(yi)]ni=1[¯fR˜Bα(yi)+f_R˜Bα(yi)]<yk+1,1kn1}. (19)
    Table 3.  KM algorithms [7,16,17,18,31,32] for computing the centroid.
    Step l˜Bα=minθi[f_R˜Bα(yi),¯fR˜Bα(yi)]ni=1yiθini=1θi
    1 Let θ(i)=[f_R˜Bα(yi)+¯fR˜Bα(yi)]/2, and compute a=(ni=1yiθi)/(ni=1θi).
    2 Seek for k(1kn1), satisfying yka<yk+1.
    3 Let θi=¯fR˜Bα(yi) as ik, and θi=f_R˜Bα(yi) as i>k,
    and compute l˜Bα(k)=(ni=1yiθi)/(ni=1θi).
    4 Check if l˜Bα(k)=a, if so, pause and let l˜Bα(k)=l˜Bα, and k=L, if it does not satisfy, return to the next step.
    5 Let a=l˜Bα(k) and go to the second step.
    Step r˜Bα=maxθi[f_R˜Bα(yi),¯fR˜Bα(yi)]ni=1yiθini=1θi
    1 Let θ(i)=[f_R˜Bα(yi)+¯fR˜Bα(yi)]/2, and compute a=(ni=1yiθi)/(ni=1θi).
    2 Seek for k(1kn1), satisfying yka<yk+1.
    3 Let θi=f_R˜Bα(yi) as ik, and θi=¯fR˜Bα(yi) as i>k,
    and compute r˜Bα(k)=(ni=1yiθi)/(ni=1θi).
    4 Check if r˜Bα(k)=a, if so, pause and let r˜Bα(k)=r˜Bα, and k=R, if it is not true, return to the next step.
    5 Let a=r˜Bα(k) and go to the second step.

     | Show Table
    DownLoad: CSV
    Table 4.  EKM algorithms [7,16,17,18,31,32] for computing the centroid.
    Step For l˜Bα
    1 Let k=[n/2.4] and calculate
    α=ki=1yi¯fR˜Bα(yi)+ni=k+1yif_R˜Bα(yi), β=ki=1¯fR˜Bα(yi)+ni=k+1f_R˜Bα(yi), a=α/β.
    2 Seek for k(1k<n1), satisfying yka<yk+1.
    3 Check if k=k, if so, stop and let a=l˜Bα, k=L, if it is not true, return to
    the next step.
    4 Compute s=sign(kk), α=α+smax(k,k)i=min(k,k)+1yi[¯fR˜Bα(yi)f_R˜Bα(yi)],
    β=β+smax(k,k)i=min(k,k)+1[¯fR˜Bα(yi)f_R˜Bα(yi)], a=α/β.
    5 Let a=a,α=α,β=β,and k=k and go to Step 2.
    Step For r˜Bα
    1 Let k=[n/1.7] and calculate
    α=ki=1yif_R˜Bα(yi)+ni=k+1yi¯fR˜Bα(yi), β=ki=1f_R˜Bα(yi)+ni=k+1¯fR˜Bα(yi), a=α/β.
    2 Seek for k(1k<n1), satisfying yka<yk+1.
    3 Check if k=k, if so, stop and let a=r˜Bα, k=R, if it is not true, go to
    the next step.
    4 Calculate s=sign(kk), α=αsmax(k,k)i=min(k,k)+1yi[¯fR˜Bα(yi)f_R˜Bα(yi)],
    β=βsmax(k,k)i=min(k,k)+1[¯fR˜Bα(yi)f_R˜Bα(yi)], a=α/β.
    5 Let a=a,α=α,β=β,and k=k and go to Step 2.

     | Show Table
    DownLoad: CSV

    Suppose that,

    ρ=dc¯fR˜Bα(y)dyccf_R˜Bα(y)dy. (20)

    For y[c,d], as ¯fR˜Bα(y)f_R˜Bα(y), therefore, ρ1. Let both ¯fR˜Bα(y) and f_R˜Bα(y) be constants, that is to say, ¯fR˜Bα(y)=ρN>0, so that,

    Fl˜Bα(η)=ηcy¯fR˜Bα(y)dy+dηyf_R˜Bα(y)dyηc¯fR˜Bα(y)dy+dηf_R˜Bα(y)dy=ρ(η2c2)+(d2η2)2[ρ(ηc)+(dη)]. (21)

    Find the derivative of Fl˜Bα(η) to η, that is to say,

    Fl˜Bα(η)=(ρ1)[ρ(ηc)2(dη)2]2[ρ(ηc)+(dη)]2. (22)

    Let Fl˜Bα(η)=0, so that,

    (dη)2(ηc)2=ρdηηc=ρ. (23)

    Therefore,

    ηl˜Bα=c+dc1+ρ. (24)

    As η[a,ηl˜Bα), Fl˜Bα(η)<0; and as η(ηl˜Bα,b], Fl˜Bα(η)>0. So ηl˜Bα is the minimum value of Fl˜Bα(η).

    In a similar manner, let us seek the maximum value of Fr˜Bα(η), i.e.,

    Fr˜Bα(η)=ηcyf_R˜Bα(y)dy+dηy¯fR˜Bα(y)dyηcf_R˜Bα(y)dy+dη¯fR˜Bα(y)dy=(η2c2)+ρ(d2η2)2[(ηc)+ρ(dη)]. (25)

    Find the derivative of Fr˜Bα(η) to η, that is to say,

    Fr˜Bα(η)=(ρ1)[(ηa)2ρ(bη)2]2[(ηa)+ρ(bη)]2. (26)

    Let Fr˜Bα(η)=0, so that,

    (dη)2(ηc)2=1ρdηηc=1/ρ. (27)

    Therefore, the solution of above equation can be written as:

    ηr˜Bα=c+dc1+1/ρ. (28)

    As η[c,ηr˜Bα), Fr˜Bα(η)>0; and as η(ηr˜Bα,d], Fr˜Bα(η)<0. Therefore, ηr˜Bα is the minimum value of Fr˜Bα(η).

    Considering the Eqs (24) and (28) comprehensively, the sensible beginning method for η may be represented as η(2), i.e.,

    η(2)={c+dc1+ρ for l˜Bα,c+dc1+1/ρ for r˜Bα. (29)

    Comparing the initializations of discrete EKM and CEKM algorithms, we can get the discrete.

    form of Eq (29) as:

    k(2)={[n/(1+ρ)] for l˜Bα,[n/(1+1/ρ)] for r˜Bα. (30)

    in which ρ=ni=1¯fR˜Bα(y)/ni=1¯fR˜Bα(y)ni=1f_R˜Bα(y)ni=1f_R˜Bα(y).

    Interestingly, as ρ=2, 1+ρ=1+22.4, and 1+1/ρ=1+1/21.7, so the Eq (30) turns out to be the initialization of the EKM algorithms.

    Meanwhile, for the SBEKM algorithms, ρ should be determined according to the corresponding experiments. Then the computation steps of the SBEKM and SBCEKM algorithms are given in Tables 5 and 6, respectively.

    Table 5.  SBEKM algorithms [16,17,18,31,32] for computing the centroid.
    Step For l˜Bα
    1 Let k=[n/(1+ρ)] and compute
    α=ki=1yi¯fR˜Bα(yi)+ni=k+1yif_R˜Bα(yi), β=ki=1¯fR˜Bα(yi)+ni=k+1f_R˜Bα(yi), a=α/β.
    2 Seek for k(1k<n1), satisfying yka<yk+1.
    3 Check if k=k, if so, stop and let a=l˜Bα, k=L, if not, go to the next step.
    4 Compute s=sign(kk), α=α+smax(k,k)i=min(k,k)+1yi[¯fR˜Bα(yi)f_R˜Bα(yi)],
    β=β+smax(k,k)i=min(k,k)+1[¯fR˜Bα(yi)f_R˜Bα(yi)], a=α/β.
    5 Let r˜Bα and go to Step 2.
    Step For Δ=1:1:100
    1 Let k=[n/(1+1/ρ)] and compute
    α=ki=1yif_R˜Bα(yi)+ni=k+1yi¯fR˜Bα(yi), β=ki=1f_R˜Bα(yi)+ni=k+1¯fR˜Bα(yi), a=α/β.
    2 Seek for k(1k<n1), satisfying yka<yk+1.
    3 Check if k=k, if so, stop and let a=r˜Bα, k=R, if not, go to the next step.
    4 Calculate s=sign(kk), α=αsmax(k,k)i=min(k,k)+1yi[¯fR˜Bα(yi)f_R˜Bα(yi)],
    β=βsmax(k,k)i=min(k,k)+1[¯fR˜Bα(yi)f_R˜Bα(yi)], a=α/β.
    5 Let a=a,α=α,β=β,and k=k and go to Step 2.

     | Show Table
    DownLoad: CSV
    Table 6.  SBCEKM algorithms [16,17,18,31,32] for computing the centroid.
    Step For l˜Bα
    1 Let ρ=(dc¯fR˜Bα(y)dy)/(dcf_R˜Bα(y)dy), a=c+(dc)/(ρ+1),
    and compute α=acy¯fR˜Bα(y)dy+dayf_R˜Bα(y)dy,
    β=ac¯fR˜Bα(y)dy+daf_R˜Bα(y)dy, a=α/β.
    2 Check if |aa|ε, if so, stop and let a=l˜Bα, if not, go to the fourth step.
    3 Calculate s=sign(aa), α=α+smax(a,a)min(a,a)y[¯fR˜Bα(y)f_R˜Bα(y)]dy,
    β=β+smax(a,a)min(a,a)[¯fR˜Bα(y)f_R˜Bα(y)]dy, a=α/β.
    4 Let a=a,a=a,α=α,β=β and go to the Step 2.
    Step For r˜Bα
    1 Let ρ=(dc¯fR˜Bα(y)dy)/(dcf_R˜Bα(y)dy), a=c+(dc)/(1/ρ+1),
    and compute α=acyf_R˜Bα(y)dy+day¯fR˜Bα(y)dy,
    β=acf_R˜Bα(y)dy+da¯fR˜Bα(y)dy, a=α/β.
    2 Check if |aa|ε, if so, stop and let a=r˜Bα, if not, go to the fourth step.
    3 Compute s=sign(aa), α=αsmax(a,a)min(a,a)y[¯fR˜Bα(y)f_R˜Bα(y)]dy,
    β=βsmax(a,a)min(a,a)[¯fR˜Bα(y)f_R˜Bα(y)]dy, a=α/β.
    4 Let a=a,a=a,α=α,β=β and go to the Step 2.

     | Show Table
    DownLoad: CSV

    In order to give the proposed SBDEKM algorithms, we divide the searching space for SBEKM algorithms. Wang et al. proposed the divided-search EKM (DEKM) algorithms [20] for calculating the centroids of IT2 FSs. Here we first extend it for completing the centroid TR for GT2 FLSs. For computing l˜Bα, the initialization of the DEKM algorithms is:

    k=round(n/2.4). (31)

    The initialization of the SBDEKM algorithms is:

    k=round[n/(1+ρ)]. (32)

    Next, we introduce how to divide the searching points for the SBDEKM (or DEKM) algorithms. Here, they are given as: round(k/2), k(or round[(k+n)/2)]).The analysis process is as follows:

    At the corresponding alpha-level, for l˜Bα, initialize k and find k. Comparing the values of the current l˜Bα=α/β, yk, and yk+1. There may be three major situations:

    Major situation 1: If l˜Bα<yk, judge the relations between l˜Bα and yround(k/2), for which there are three minor situations: i) l˜Bα<yround(k/2), ii) yround(k/2)l˜Bα<yround(k/2)+1, and iii) yround(k/2)+1l˜Bα.

    In i): Search down from round(k/2)1 to 1, seek the k which satisfies ykα/βyk+1.

    In ii): L=round(k/2).

    In iii): Search up from round(k/2)+1 to k1, find the k which satisfies ykα/βyk+1.

    Major situation 2: If ykl˜Bα<yk+1, L=k.

    Major situation 3: If yk+1l˜Bα, then judge the relations between l˜Bα and yround[(k+n)/2]. There may be three minor situations: i)l˜Bα<yround[(k+n)/2], ii)yround[(k+n)/2]l˜Bα<yround[(k+n)/2]+1, and iii)yround[(k+n)/2]+1l˜Bα.

    In i): Search down from round[(k+n)/2] to 1, seek the k which satisfies ykα/βyk+1.

    In ii): L=round[(k+n)/2].

    In iii): Search up from L=round[(k+n)/2]+1 to n1, find the k which satisfies ykα/βyk+1.

    For r˜Bα, initialize k and find k. Comparing the values of the current r˜Bα=α/β, yk, and yk+1. There maybe three major situations:

    Major situation 1: If r˜Bα<yk, judge the relations between r˜Bα and yround(k/2), for which there are three minor situations: i) r˜Bα<yround(k/2), ii) yround(k/2)r˜Bα<yround(k/2)+1, and iii) yround(k/2)+1r˜Bα.

    In i): Search down from round(k/2)1 to 1, seek for the k which satisfies ykα/βyk+1.

    In ii): R=round(k/2).

    In iii): Search up from round(k/2)+1 to k1, find the k which satisfies ykα/βyk+1.

    Major situation 2: If ykr˜Bα<yk+1, R=k.

    Major situation 3: If yk+1r˜Bα, then judge the relations between r˜Bα and yround[(k+n)/2]. There may be three minor situations: i)r˜Bα<yround[(k+n)/2], ii)yround[(k+n)/2]r˜Bα<yround[(k+n)/2]+1, and iii)yround[(k+n)/2]+1r˜Bα.

    In i): Search down from round[(k+n)/2] to 1, seek for the k which satisfies ykα/βyk+1.

    In ii): R=round[(k+n)/2].

    In iii): Search up from R=round[(k+n)/2]+1 to n1, find the k which satisfies ykα/βyk+1.

    Finally, we provide the computation steps for the SBDEKM algorithms.

    For l˜Bα,

    Step 1. Set k=[n/(1+ρ)].

    Step 2. Compute α=ki=1yi¯f˜Bα(yi)+ni=k+1yif_˜Bα(yi), and β=ki=1¯f˜Bα(yi)+ni=k+1f_˜Bα(yi).

    Step 3. If α/β<yk and α/β<yround(k/2), then search down from round(k/2)1 to 1, seek the k which satisfies ykα/βyk+1, and go to Step 10.

    Step 4. If yround(k/2)α/β<yround(k/2)+1, then l˜Bα=α/β, L=k, and go to Step 10.

    Step 5. If yround(k/2)α/β<yk, then search down from round(k/2)+1 to k1, find the k which satisfies ykα/βyk+1, and go to Step 10.

    Step 6. If ykα/β<yk+1, then l˜Bα=α/β, L=k, and go to Step 10.

    Step 7. If yk+1α/β<yround[(k+n)/2], then search down from round[(k+n)/2]1 to k+1, find the k which satisfies ykα/βyk+1, and go to Step 10.

    Step 8. If yround[(k+n)/2]α/β<yround[(k+n)/2]+1, let l˜Bα=α/β, L=round[(k+n)/2], and go to Step 10.

    Step 9. If yk+1α/β and yround[(k+n)/2]+1α/β, then search up from round[(k+n)/2]+1 to n1, seek for the k which meets ykα/βyk+1, and go to Step 10.

    Step 10. Calculate s = sign(k' - k) ,

    \alpha ' = \alpha + s\sum\limits_{i = \min (k, k') + 1}^{\max (k, k')} {{y_i}} [{\overline f _{{{\tilde B}_\alpha }}}({y_i}) - {\underline f _{{{\tilde B}_\alpha }}}({y_i})], \text{ and } \beta ' = \beta + s\sum\limits_{i = \min (k, k') + 1}^{\max (k, k')} {[{{\overline f }_{{{\tilde B}_\alpha }}}({y_i}) - {{\underline f }_{{{\tilde B}_\alpha }}}({y_i})]}.

    Step 11. Update k = k' .

    Step 12. Search down from k to 1, seek the k' which satisfies {y_{k'}} \leqslant \alpha /\beta \leqslant {y_{k' + 1}} .

    Step 13. While k' \ne k .

    Step 14. Update \alpha ' = \alpha - \sum\limits_{i = k' + 1}^k {{y_i}} [{\overline f _{{{\tilde B}_\alpha }}}({y_i}) - {\underline f _{{{\tilde B}_\alpha }}}({y_i})], \beta ' = \beta - \sum\limits_{i = k' + 1}^k {[{{\overline f }_{{{\tilde B}_\alpha }}}({y_i}) - {{\underline f }_{{{\tilde B}_\alpha }}}({y_i})]} , and k = k' .

    Step 15. Search down from k to 1, seek the k' which satisfies {y_{k'}} \leqslant \alpha /\beta \leqslant {y_{k' + 1}} .

    Step 16. End while.

    Step 17. Let {l_{\tilde B}} = \alpha /\beta , L = k .

    For {r_{{{\tilde B}_\alpha }}} :

    Step 1. Set k = [n/(1 + \sqrt {1/\rho })].

    Step 2. Compute \alpha = \sum\limits_{i = 1}^k {{y_i}} {\underline f _{{{\tilde B}_\alpha }}}({y_i}) + \sum\limits_{i = k + 1}^n {{y_i}} {\overline f _{{{\tilde B}_\alpha }}}({y_i}), and \beta = \sum\limits_{i = 1}^k {{{\underline f }_{{{\tilde B}_\alpha }}}({y_i})} + \sum\limits_{i = k + 1}^n {{{\overline f }_{{{\tilde B}_\alpha }}}({y_i})} .

    Step 3. If \alpha /\beta < {y_k} and \alpha /\beta < {y_{round(k/2)}}, then search down from round(k/2) - 1 to 1, seek for the k' which satisfies {y_{k'}} \leqslant \alpha /\beta \leqslant {y_{k' + 1}} , and go to Step 10.

    Step 4. If {y_{round(k/2) + 1}} \leqslant \alpha /\beta < {y_k} , then search up from round(k/2) + 1 to k - 1 , find the k' which meets {y_{k'}} \leqslant \alpha /\beta \leqslant {y_{k' + 1}} , and go to Step 10.

    Step 5. If {y_{round(k/2)}} \leqslant \alpha /\beta < {y_{round(k/2) + 1}} , let {r_{{{\tilde B}_\alpha }}} = \alpha /\beta , R = k , and go to Step 10.

    Step 6. If {y_{k + 1}} \leqslant \alpha /\beta and {y_{round[(k + n)/2] + 1}} \leqslant \alpha /\beta , then search up from round[(k + n)/2] + 1 to n - 1 , seek for the k' which satisfies {y_{k'}} \leqslant \alpha /\beta \leqslant {y_{k' + 1}} , and go to Step 10.

    Step 7. If {y_{k + 1}} \leqslant \alpha /\beta < {y_{round[(k + n)/2]}} , then search down from round[(k + n)/2] - 1 to k + 1 , find the k' which satisfies {y_{k'}} \leqslant \alpha /\beta \leqslant {y_{k' + 1}} , and go to Step 10.

    Step 8. If {y_{round[(k + n)/2]}} \leqslant \alpha /\beta < {y_{round[(k + n)/2] + 1}} , let {r_{{{\tilde B}_\alpha }}} = \alpha /\beta , R = round[(k + n)/2] , and go to Step 10.

    Step 9. If {y_k} \leqslant \alpha /\beta < {y_{k + 1}} , then {r_{{{\tilde B}_\alpha }}} = \alpha /\beta , R = k , and go to Step 10.

    Step 10. Calculate s = sign(k' - k) ,

    \alpha ' = \alpha - s\sum\limits_{i = \min (k, k') + 1}^{\max (k, k')} {{y_i}} [{\overline f _{{{\tilde B}_\alpha }}}({y_i}) - {\underline f _{{{\tilde B}_\alpha }}}({y_i})], \text{ and } \beta ' = \beta - s\sum\limits_{i = \min (k, k') + 1}^{\max (k, k')} {[{{\overline f }_{{{\tilde B}_\alpha }}}({y_i}) - {{\underline f }_{{{\tilde B}_\alpha }}}({y_i})]}.

    Step 11. Update k = k' .

    Step 12. Search up from k to n - 1 , seek the k' which satisfies {y_{k'}} \leqslant \alpha /\beta \leqslant {y_{k' + 1}} .

    Step 13. While k' \ne k .

    Step 14. Update \alpha ' = \alpha - \sum\limits_{i = k' + 1}^k {{y_i}} [{\overline f _{{{\tilde B}_\alpha }}}({y_i}) - {\underline f _{{{\tilde B}_\alpha }}}({y_i})], \beta ' = \beta - \sum\limits_{i = k' + 1}^k {[{{\overline f }_{{{\tilde B}_\alpha }}}({y_i}) - {{\underline f }_{{{\tilde B}_\alpha }}}({y_i})]} , and k = k' .

    Step 15. Search up from k to n - 1 , seek the k' which satisfies {y_{k'}} \leqslant \alpha /\beta \leqslant {y_{k' + 1}} .

    Step 16. End while.

    Step 17. Let {r_{{{\tilde B}_\alpha }}} = \alpha /\beta , R = k .

    Here we give four simulation examples. According to the fuzzy inference, by combining the firing fuzzy rule, let the output GT2 FS be known in advance.

    In example one, the footprint of uncertainty (FOU) of primary membership function (MF) is composed of piecewise linear functions [17,18,33,34,35], while the secondary MF (or say vertical slice) is selected as the trapezoidal MF. In example two, for the primary MF, FOU is composed of Gaussian functions and linear functions [36,37,38,39,40,41], while the vertical slice is selected as the trapezoidal MF. In example three, for the primary MF, whose FOU is completely composed of Gaussian functions [17,18,33,34,35], while the secondary MF is selected as the triangle MF. In instance four, for the primary MF, FOU is selected as the Gaussian T2 MF which has uncertain standard deviations [36,37,38,39,40,41], while the secondary MF is selected as the triangle MF.

    In computer simulation experiments, the alpha is equally decomposed into: 0, 1/\Delta, \cdots, 1, where \Delta represents the number of effective values. Here we let \Delta be varied from one to a hundred with a step size of 1. First Table 7 and Figure 1 provide the defined FOUs for the four examples.

    Table 7.  Representation of FOUs [18,34,35,36].
    Num Representation
    1 {\underline f _{{{\tilde B}_1}}}(y) = \max \{ \left[\begin{array}{l} \frac{{y - 1}}{6}, {\text{ 1}} \leqslant y \leqslant 3 \hfill \\ \frac{{7 - y}}{6}, {\text{ }}y \in {\text{(4, 7]}} \hfill \\ 0, {\text{ else}} \hfill \\ \end{array} \right], \left[\begin{array}{l} \frac{{y - 3}}{6}, {\text{ }}y \in {\text{[3,5] }} \hfill \\ \frac{{8 - y}}{9}, {\text{ }}y \in {\text{(5, 8]}} \hfill \\ 0, {\text{ else}} \hfill \\ \end{array} \right]\} ,
    {\overline f _{{{\tilde B}_1}}}(y) = \max \{ \left[\begin{array}{l} \frac{{y - 1}}{2}, {\text{ 1}} \leqslant y \leqslant 3 \hfill \\ \frac{{7 - y}}{4}, {\text{ }}y \in (3, 7] \hfill \\ 0, {\text{ else}} \hfill \\ \end{array} \right], \left[\begin{array}{l} \frac{{y - 2}}{5}, {\text{ }}y \in [2,6] \hfill \\ \frac{{16 - 2y}}{5}, {\text{ 6 < }}y \leqslant 8 \hfill \\ 0, {\text{ else}} \hfill \\ \end{array} \right]\} .
    2 {\underline f _{{{\tilde B}_2}}}(y) = \left\{ \begin{array}{l} \frac{{0.6(y + 5)}}{{19}}, - 5 \leqslant y \leqslant 2.6 \hfill \\ \frac{{0.4(14 - y)}}{{19}}, 2.6 < y \leqslant 14 \hfill \\ \end{array} \right.,
    {\overline f _{{{\tilde B}_2}}}(y) = \left\{ \begin{array}{l} \exp [- \frac{1}{2}{(\frac{{y -2}}{5})^2}], y \in {\text{[- 5, 7}}{\text{.185]}} \hfill \\ \exp [- \frac{1}{2}{(\frac{{y -9}}{{1.75}})^2}], y \in (7.185, 14] \hfill \\ \end{array} \right..
    3 {\underline f _{{{\tilde B}_3}}}(y) = \max \{ 0.5\exp [- \frac{{{{(y -3)}^2}}}{2}], 0.4\exp [- \frac{{{{(y -6)}^2}}}{2}]\} ,
    {\overline f _{{{\tilde B}_3}}}(y) = \max \{ \exp [- 0.5\frac{{{{(y -3)}^2}}}{4}], 0.8\exp [- 0.5\frac{{{{(y -6)}^2}}}{4}]\} .
    4 {\underline f _{{{\tilde B}_4}}}(y) = \exp [- \frac{1}{2}{(\frac{{y -3}}{{0.25}})^2}],
    {\overline f _{{{\tilde B}_4}}}(y) = \exp [- \frac{1}{2}{(\frac{{y -3}}{{1.75}})^2}].

     | Show Table
    DownLoad: CSV
    Figure 1.  Graphs for FOUs; (a) instance one; (b) instance two; (c) instance three, and (d) instance four.

    Let the primary variable be y \in [0, 10] in Examples 1, 3 and 4. Suppose that the primary variable is y \in [- 5, {\text{ }}14] in instance two. Moreover, the Table 8 and Figure 2 provide the vertical slices of four instances.

    Table 8.  Representations of secondary membership functions for four examples [18,27,28,29].
    Num Representation
    1 L(y) = \underline f (y) + 0.6w[\overline f (y) - \underline f (y)],
    R(y) = \overline f (y) - \frac{3}{5}(1 - w)[\overline f (y) - \underline f (y)],
    and w is 0
    2 Just as in example one
    3 Apex = \underline f (y) + w[\overline f (y) - \underline f (y)], and w = 0.5
    4 Just as in example three, and w = 0.75

     | Show Table
    DownLoad: CSV
    Figure 2.  Graphs of secondaryMFs; (a) instance one; (b) instance two; (c) instance three, and (d) instance four.

    Because the computations of {l_{{{\tilde B}_\alpha }}} and {r_{{{\tilde B}_\alpha }}} are quite similar, only the {l_{{{\tilde B}_\alpha }}} is calculated in four simulations. Here the SBCEKM algorithms are considered as a benchmark. As the number of effective alpha-planes \Delta = 100 , let the error accuracy \varepsilon = {10^{ - 6}} , then the left centroid type-reduced sets calculated by the benchmark are given in Figure 3.

    Figure 3.  The left centroid type-reduced sets computed by the SBCEKM algorithms; (a) instance one; (b) instance two; (c) instance three, and (d) instance four.

    Then the left centroid type-reduced sets computed by the EKM algorithms, SBEKM algorithms and proposed SBDEKM algorithms are provided in Figure 4.

    Figure 4.  The left type-reduced sets computed by EKM, SBEKM, and SBDEKM algorithms; (a) instance one; (b) instance two; (c) instance three, and (d) instance four.

    Furthermore, for comparing the performances of these three algorithms, the defined graphs for the absolute errors of type-reduced sets between the benchmark SBCEKM, EKM algorithms, SBEKM algorithms and the proposed SBDEKM algorithms are provided in Figure 5, in which the independent variable is the grade of type-reduced MF.

    Figure 5.  Absolute errors of left type-reduced sets between the SBCEKM, EKM algorithms, SBEKM algorithms and SBDEKM algorithms; (a) Example 1; (b) Example 2; (c) Example 3, and (d) Example 4.

    In order to measure the calculational accuracies of the EKM, SBEKM, and SBDEKM algorithms quantitatively, we define the means of relative absolute errors as:|{C_{EK{M_i}, SBEK{M_i}, SBDEK{M_i}}} - {C_{SBCEK{M_i}}}|/|{C_{SBCEK{M_i}}}|(i = 1, 2, \cdots, 4), where {C_{SBCEK{M_i}}} is the benchmark results of SBCEKM algorithms. Table 9 provides the means of absolute errors of the EKM, SBDEKM, and SBDEKM algorithms, where the results in this table are divided by {10^{ - 4}} .

    Table 9.  Means of relative absolute errors of the EKM, SBEKM, and SBDEKM algorithms ( /{10^{ - 4}} ).
    Algorithms EKM SBEKM SBDEKM
    Example 1 0.00058 0.00054 0.00052
    Example 2 0.41340 0.68047 0.68162
    Example 3 0.11373 0.11440 0.11451
    Example 4 0.00612 0.01134 0.00685
    Total average 0.13346 0.20169 0.20088

     | Show Table
    DownLoad: CSV

    Observing Figures 4, 5 and Table 9, we can make the following conclusions:

    For the absolute errors of type-reduced sets between the benchmark SBCEKM algorithms and the EKM, SBEKM, and SBDEKM algorithms, the results of all of them converge to certain values. In example one, the SBDEKM algorithms obtain the smallest value. In other three examples and for the total average, the EKM algorithms get the smallest value. However, as the results in Table 9 should be divided by {10^{ - 4}} , the differences between these results are very small (see the Figure 3), and so these three kinds of discrete algorithms can get almost the same computational accuracies. If more attention was paid to computational accuracy, we should use the SBWEKM algorithms.

    Next, the more important computational times for these three types of algorithms are researched for potential applications. Here the unrepeatable computational times rely on the computer hardware and software environments. The simulation platform consists of a dual core CPU desktop and MATLAB 2013a. In the test, as the number of samples of primary variable is selected as n = 50:5000 with a stepsize of 50. The specific unrepeatable calculation times for four instances are given in Figure 6.

    Figure 6.  Computation times comparions for EKM, SBEKM and SBDEKM algorithms; (a) instance one; (b) instance two; (c) instance three, and (d) instance four.

    Generally speaking, the computational times of the three types of algorithms vary linearly in correspondence with the number of samples. Therefore, the linear regression model t = g + hn can be selected here for simulation, where t represents the calculation time, and g and h are two coefficients. Finally, Table 10 provides the regression coefficients. The calculational time variance rate is given as:

    (\mathop {\max }\limits_{i = 1, \cdots , 4} \{ {t_i}\} - \mathop {\min }\limits_{i = 1, \cdots , 4} \{ {t_i}\} )/\mathop {\max }\limits_{i = 1, \cdots , 4} \{ {t_i}\} . (33)
    Table 10.  Regression coefficients of three types of algorithms.
    Coefficient /{10^{ - 4}} ( g, h ) EKM SBEKM SBDEKM
    Example 1 0.0524 -1.4608 0.0682 13.8054 0.0330 11.5248
    Example 2 0.0531 -0.7299 0.0645 12.8895 0.0337 9.7175
    Example 3 0.0329 7.1359 0.0382 15.7954 0.0303 11.1144
    Example 4 0.0412 7.0540 0.0581 4.4558 0.0290 12.8824

     | Show Table
    DownLoad: CSV

    Observing Figure 6 and Table 10, it is clear that the computational times of proposed SBDEKM algorithms are much less than the EKM and SBEKM algorithms. The SBDEKM algorithms should be considered as the first, and the other two types of algorithms should be viewed as the second. As the start of the SBEKM algorithms is more complicated than the EKM algorithms, the computational times of EKM algorithms are better than SBEKM algorithms. In a word, the relation between the times of three kinds of algorithms is:

    SBDEKM < EKM < SBDEKM. Moreover, the computational time difference rate for these four instances is between 17.68%~71.16%.

    On the basis of the above analysis, it is reasonable to see that the initialization and searching spaces have an effect on completing the centroid TR. Therefore, we should adopt the SBDEKM algorithms for studying the TR. If we only consider the computational accuracies, these three types of algorithms almost have the same performances. However, if we consider both the calculational accuracies and times comprehensively, it is suggested that one uses the SBDEKM algorithms for performing the centroid TR with piece-wise defined primary MF and trapezoidal secondary MF as in instance 1, Gaussian and linear primary MFs and trapezoidal vertical slice as in Example 2, Gaussian primary MF and triangular secondary MF as in Example 3, and uncertain derivation primary MF and triangular secondary MF as in Example 4.

    This paper explains the sensible beginning and divides the searching space for EKM algorithms, and then the SBDEKM algorithms are put forward to complete the centroid TR. Compared with both the EKM and SBEKM algorithms, the SBDEKM algorithms can significantly improve the efficiencies of computations.

    Next, we will study the SBWEKM algorithms for finishing the TR of IT2 and GT2 FLSs. Both the computational accuracy and efficiency should be enhanced. Furthermore, the center-of-sets (COS) TR [42,43] of IT2 FLSs and GT2 FLSs should continue to be investigated, and designing and applying T2 FLSs optimized with the hybrid application of different kinds of optimization algorithms [9,10,40,41,42,43,44,45,46,47,48,49] will be further focused on.

    The authors declare that they have not used Artificial Intelligence (AI) tools in the creation of this article.

    The paper is supported by the National Natural Science Foundation of China (61973146, 61773188), and the Education Department of Liaoning Province (LJKQZ2021143).

    The author is thankful to the Professor Mendel, who has provided some important advices.

    The authors declare that they have no conflict of interest.



    [1] B. Gurbuz, M. Sezer, Laguerre polynomial approach for solving Lane-Emden type functional differential equations, Appl. Math. Comput., 242 (2014), 255–264. http://dx.doi.org/10.1016/j.amc.2014.05.058 doi: 10.1016/j.amc.2014.05.058
    [2] S. Yuzbasi, M. Sezer, An improved Bessel collocation method with a residual error function to solve a class of Lane-Emden differential equations, Math. Comput. Model., 57 (2013), 1298–1311. http://dx.doi.org/10.1016/j.mcm.2012.10.032 doi: 10.1016/j.mcm.2012.10.032
    [3] B. Mehta, R. Aris, A note on a form of the Emden-Fowler equation, J. Math. Anal. Appl., 36 (1971), 611–621. http://dx.doi.org/10.1016/0022-247X(71)90043-6 doi: 10.1016/0022-247X(71)90043-6
    [4] J. Wong, On the generalized Emden-Fowler equation, SIAM Rev., 17 (1975), 339–360. http://dx.doi.org/10.1137/1017036 doi: 10.1137/1017036
    [5] A. Verma, M. Kumar, Numerical solution of third-order Emden-Fowler type equations using artificial neural network technique, Eur. Phys. J. Plus, 135 (2020), 751. http://dx.doi.org/10.1140/epjp/s13360-020-00780-3 doi: 10.1140/epjp/s13360-020-00780-3
    [6] G. File, T. Aga, Numerical solution of quadratic Riccati differential equations, Egyptian Journal of Basic and Applied Sciences, 3 (2016), 392–397. http://dx.doi.org/10.1016/j.ejbas.2016.08.006 doi: 10.1016/j.ejbas.2016.08.006
    [7] S. Arora, I. Bala, Numerical study of the coupled Burger and Burger Huxley equations using Bessel collocation scheme, MESA, 14 (2023), 323.
    [8] W. Wang, H. Zhang, X. Jiang, X. Yang, A high-order and efficient numerical technique for the nonlocal neutron diffusion equation representing neutron transport in a nuclear reactor, Ann. Nucl. Energy, 195 (2024), 110163. http://dx.doi.org/10.1016/j.anucene.2023.110163 doi: 10.1016/j.anucene.2023.110163
    [9] I. Kaur, S. Arora, I. Bala, An improvised technique of quintic Hermite splines to discretize generalized Burger Huxley type equations, Iranian Journal of Numerical Analysis and Optimization, 13 (2023), 59–79. http://dx.doi.org/10.22067/ijnao.2022.75871.1120 doi: 10.22067/ijnao.2022.75871.1120
    [10] S. Arora, R. Jain, V. Kukreja, A robust Hermite spline collocation technique to study generalized Burgers-Huxley equation, generalized Burgers-Fisher equation and Modified Burgers' equation, J. Ocean. Eng. Sci., in press. http://dx.doi.org/10.1016/j.joes.2022.05.016
    [11] M. Hausser, The Hodgkin-Huxley theory of the action potential, Nat. Neurosci., 3 (2000), 1165. http://dx.doi.org/10.1038/81426 doi: 10.1038/81426
    [12] K. Petousakis, A. Apostolopoulou, P. Poirazi, The impact of Hodgkin-Huxley models on dendritic research, J. Physiol., 601 (2023), 3091–3102. http://dx.doi.org/10.1113/JP282756 doi: 10.1113/JP282756
    [13] J. Bisquert, A frequency domain analysis of the excitability and bifurcations of the FitzHugh-Nagumo neuron model, J. Phys. Chem. Lett., 12 (2021), 11005–11013. http://dx.doi.org/10.1021/acs.jpclett.1c03406 doi: 10.1021/acs.jpclett.1c03406
    [14] A. Cevikel, A. Bekir, O. Arqub, M. Abukhaled, Solitary wave solutions of Fitzhugh-Nagumo-type equations with conformable derivatives, Front. Phys., 10 (2022), 1028668. http://dx.doi.org/10.3389/fphy.2022.1028668 doi: 10.3389/fphy.2022.1028668
    [15] J. Villadsen, W. Stewart, Solution of boundary value problem by orthogonal collocation, Chem. Eng. Sci., 20 (1995), 3981–3996. http://dx.doi.org/10.1016/0009-2509(96)81831-8 doi: 10.1016/0009-2509(96)81831-8
    [16] S. Arora, I. Kaur, Applications of quintic Hermite collocation with time discretization to singularly perturbed problems, Appl. Math. Comput., 316 (2018), 409–421. http://dx.doi.org/10.1016/j.amc.2017.08.040 doi: 10.1016/j.amc.2017.08.040
    [17] M. Noor, M. Waseem, Some iterative method for solving a system of nonlinear equations, Comput. Math. Appl., 57 (2009), 101–106. http://dx.doi.org/10.1016/j.camwa.2008.10.067 doi: 10.1016/j.camwa.2008.10.067
    [18] H. Zhang, X. Yang, Q. Tang, D. Xu, A robust error analysis of the OSC method for a multi-term fourth-order sub-diffusion equation, Comput. Math. Appl., 109 (2022), 180–190. http://dx.doi.org/10.1016/j.camwa.2022.01.007 doi: 10.1016/j.camwa.2022.01.007
    [19] S. Arora, S. Dhaliwal, V. Kukreja, Solution of two point boundary value problems using orthogonal collocation on finite elements, Appl. Math. Comput., 171 (2005), 358–370. http://dx.doi.org/10.1016/j.amc.2005.01.049 doi: 10.1016/j.amc.2005.01.049
    [20] S. Arora, I. Kaur, H. Kumar, V. Kukreja, A robust technique of cubic Hermite collocation for solution of two phase non linear model, Journal of King Saud University-Engineering Sciences, 29 (2017), 159–165. http://dx.doi.org/10.1016/j.jksues.2015.06.003 doi: 10.1016/j.jksues.2015.06.003
    [21] P. Mishra, K. Sharma, A. Pani, G. Fairweather, Orthogonal spline collocation for singularly perturbed reaction diffusion problems in one dimension, Int. J. Numer. Anal. Mod., 16 (2019), 647–667.
    [22] X. Yang, Z. Zhang, On conservative, positivity preserving, nonlinear FV scheme on distorted meshes for the multi-term nonlocal Nagumo-type equations, Appl. Math. Lett., 150 (2024), 108972. http://dx.doi.org/10.1016/j.aml.2023.108972 doi: 10.1016/j.aml.2023.108972
    [23] X. Yang, L. Wu, H. Zhang, A space-time spectral order sinc-collocation method for the fourth-order nonlocal heat model arising in viscoelasticity, Appl. Math. Comput., 457 (2023), 128192. http://dx.doi.org/10.1016/j.amc.2023.128192 doi: 10.1016/j.amc.2023.128192
    [24] B. Bialecki, R. Fernandes, An alternating-direction implicit orthogonal spline collocation scheme for nonlinear parabolic problems on rectangular polygons, SIAM J. Sci. Comput., 28 (2006), 1054–1077. http://dx.doi.org/10.1137/050627885 doi: 10.1137/050627885
    [25] C. Hendricks, M. Ehrhardt, M. Gunther, High-order ADI schemes for diffusion equations with mixed derivatives in the combination technique, Appl. Numer. Math., 101 (2016), 36–52. http://dx.doi.org/10.1016/j.apnum.2015.11.003 doi: 10.1016/j.apnum.2015.11.003
    [26] M. Kadalbajoo, A. Awasthi, A numerical method based on Crank-Nicolson scheme for Burgers' equation, Appl. Math. Comput., 182 (2006), 1430–1442. http://dx.doi.org/10.1016/j.amc.2006.05.030 doi: 10.1016/j.amc.2006.05.030
    [27] Priyanka, S. Arora, F. Mebrek-Oudina, S. Sahani, Super convergence analysis of fully discrete Hermite splines to simulate wave behaviour of Kuramoto-Sivashinsky equation, Wave Motion, 121 (2023), 103187. http://dx.doi.org/10.1016/j.wavemoti.2023.103187 doi: 10.1016/j.wavemoti.2023.103187
    [28] D. Kumar, M. Kadalbajoo, A parameter-uniform numerical method for time-dependent singularly perturbed differential difference equations, Appl. Math. Model., 35 (2011), 2805–2819. http://dx.doi.org/10.1016/j.apm.2010.11.074 doi: 10.1016/j.apm.2010.11.074
    [29] S. Rubin, R. Graves, A cubic spline approximation for problems in fluid dynamics, NASA Technical Report, 1975, 19750025272.
    [30] E. Rainville, Special functions, New York: The Macmillan Company, 1960.
    [31] I. Sneddon, Special function of mathematical physics and chemistry, 3 Eds, London: Longman Mathematical Texts, 1980.
    [32] M. Mazure, On the Hermite interpolation, CR Math. 340 (2005), 177–180. http://dx.doi.org/10.1016/j.crma.2004.11.004 doi: 10.1016/j.crma.2004.11.004
    [33] C. Hall, On error bounds for spline interpolation, J. Approx. Theory, 1 (1968), 209–218. http://dx.doi.org/10.1016/0021-9045(68)90025-7 doi: 10.1016/0021-9045(68)90025-7
    [34] P. Prenter, Splines and variational methods, New York: Wiley interscience publication, 1975.
    [35] R. Jiwari, R. Gupta, V. Kumar, Polynomial differential quadrature method for numerical solutions of the generalized Fitzhugh-Nagumo equation with time-dependent coefficients, Ain Shams Eng. J., 5 (2014), 1343–1350. http://dx.doi.org/10.1016/j.asej.2014.06.005 doi: 10.1016/j.asej.2014.06.005
    [36] R. Ezzati, K. Shakibi, Using Adomian's decomposition and multiquadric quasi-interpolation methods for solving Newell-Whitehead equation, Procedia Computer Science, 3 (2011), 1043–1048. http://dx.doi.org/10.1016/j.procs.2010.12.171 doi: 10.1016/j.procs.2010.12.171
  • This article has been cited by:

    1. Muhumuza Ezra Rubanda, Livingstone Senyonga, Mohammed Ngoma, Muyiwa S. Adaramola, Energy market integration: Harmonizing tariff recourse policies in East Africa, 2023, 84, 09571787, 101653, 10.1016/j.jup.2023.101653
    2. Dilshod Hudayberganov, Farxod Abdullaev, Tukhtabek Rakhimov, Maksuda Aminova, Sarvar Norboyev, I. Abdullayev, V. Kukhar, E. Akhmetshin, D. Bekjanov, A. Carballo-Penela, Possibilities of organizing smart markets in the region, 2023, 449, 2267-1242, 04001, 10.1051/e3sconf/202344904001
    3. Fazıl GÖKGÖZ, Öykü YÜCEL, Measuring The Long-Term Impact of Wind, Run-of-River, Solar Renewable Energy Alternatives on Market Clearing Prices, 2024, 09601481, 122292, 10.1016/j.renene.2024.122292
  • Reader Comments
  • © 2024 the Author(s), licensee AIMS Press. This is an open access article distributed under the terms of the Creative Commons Attribution License (http://creativecommons.org/licenses/by/4.0)
通讯作者: 陈斌, bchen63@163.com
  • 1. 

    沈阳化工大学材料科学与工程学院 沈阳 110142

  1. 本站搜索
  2. 百度学术搜索
  3. 万方数据库搜索
  4. CNKI搜索

Metrics

Article views(1457) PDF downloads(80) Cited by(2)

Figures and Tables

Figures(11)  /  Tables(15)

/

DownLoad:  Full-Size Img  PowerPoint
Return
Return

Catalog