Next Article in Journal
Nonlinear Operators as Concerns Convex Programming and Applied to Signal Processing
Previous Article in Journal
The Distribution Function of a Probability Measure on a Linearly Ordered Topological Space
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Fourier Truncation Regularization Method for a Time-Fractional Backward Diffusion Problem with a Nonlinear Source

School of Science, Lanzhou University of Technology, Lanzhou 730050, China
*
Author to whom correspondence should be addressed.
Mathematics 2019, 7(9), 865; https://doi.org/10.3390/math7090865
Submission received: 4 August 2019 / Revised: 4 September 2019 / Accepted: 4 September 2019 / Published: 19 September 2019

Abstract

:
In present paper, we deal with a backward diffusion problem for a time-fractional diffusion problem with a nonlinear source in a strip domain. We all know this nonlinear problem is severely ill-posed, i.e., the solution does not depend continuously on the measurable data. Therefore, we use the Fourier truncation regularization method to solve this problem. Under an a priori hypothesis and an a priori regularization parameter selection rule, we obtain the convergence error estimates between the regular solution and the exact solution at 0 x < 1 .

1. Introduction

Over the past decade, fractional diffusion problems have become important in engineering and science [1]. This term is used to describe a large number of problems in biological, chemical, control theory, mechanical engineering, finance, and fractional dynamics [2,3,4]. Fractional order derivatives and integrals can be used to describe the memory and hereditary properties of different substances [5], leading to the fractional-order model, which is very useful. Information regarding the development of fractional differential operators can be found in [6,7].
The fractional diffusion equation, which can be used to describe the superdiffusion and superdiffusion phenomena [8], is obtained by converting the derivative of the heat equation regarding time into the derivative of the fractional order. A large number of scholars have studied the time-fractional diffusion equation. In [9], an iteration regularization method is used to consider the inverse heat conduction problem for a time-fractional diffusion equation. In [10], the mollification regularization method is used to consider the Cauchy problem of the time-fractional diffusion equation. In [11], the spectral regularization method is applied to solve the inverse problem of the time-fractional inverse diffusion problem. In [12], two different regularization methods are used to solve a Riesz–Feller space-fractional backward diffusion problem. In [13], the spectral regularization method is used to solve the Cauchy problem of the time-fractional advection-dispersion equation. In [14], a new regularization method is applied to solve a time-fractional inverse diffusion problem. In [15], the optimal regularization method is used to solve an inverse heat conduction problem for the fractional diffusion equation. In [16], the Landweber iterative regularization method is applied to identify the initial value problem of the time–space fractional diffusion-wave equation. In [17,18], The quasi-boundary value method is used to identify the initial value of the heat equation and the time-fractional diffusion equation on a spherically symmetric domain. In [19,20], the authors considered the nonlinear equation with variable exponents and proved a finite-time blow-up result for the solutions with negative initial energy and for certain solutions with positive energy.
However, in the above papers on inverse problem of the fractional diffusion equation, the equation is homogeneous and the problem is linear. In [21], a new modified regularization method can be used to solve the backward problem for the nonlinear space-fractional diffusion equation. In [22], two new modified regularization methods are applied to solve the backward problem for a nonlinear Riesz–Feller space fractional diffusion equation. However, in [21,22], the fractional diffusion equation is a space-fractional diffusion equation. In this paper, we investigate the following nonlinear time-fractional diffusion equation:
D t α u ( x , t ) u x x ( x , t ) = f ( x , t , u ( x , t ) ) , t > 0 , x R , u ( x , 0 ) = 0 , x R , u ( 1 , t ) = g ( t ) , t > 0 , u ( x , t ) | x b o u n d e d , t > 0 ,
where the time-fractional derivative D t α u ( x , t ) is the Caputo fractional derivative of order α ( 0 < α 1 ) defined by [16]:
D t α u ( x , t ) = 1 Γ ( 1 α ) 0 t d u ( x , s ) d s d s ( t s ) α , 0 < α < 1 , D t α u ( x , t ) = d u ( x , t ) d t , α = 1 ,
where f ( x , t , u ( x , t ) ) is a known nonlinear heat source. u ( 1 , t ) = g ( t ) is an additional condition and can be used to identify u ( x , t ) as 0 x < 1 . The measurable data g δ ( t ) L 2 ( R ) meets
g δ g L 2 ( R ) δ ,
where · represents L 2 ( R ) norm and δ > 0 is a noise level.
The structure of this article is as follows. Some auxiliary results are given in Section 2. The Fourier truncation regularization method is presented in Section 3. The error estimates are given in Section 4, and a simple conclusion is given in Section 5.

2. Some Auxiliary Results

Suppose f ^ ( ξ ) denotes the Fourier transform of f ( t ) defined by
f ^ ( ξ ) = 1 2 π e i ξ t f ( t ) d t .
In order to use the Fourier transform for variable t, we let u ( x , t ) = 0 , as t < 0 . Using the Fourier transform for variable t, we obtain
( i ξ ) α 2 u ^ ( x , ξ ) u ^ x x ( x , t ) = f ( s , t , u ) ^ ( x , ξ ) , ξ R , x R , u ^ ( x , 0 ) = 0 , x R , u ^ ( 1 , ξ ) = g ^ ( ξ ) , ξ R , u ^ ( x , ξ ) | x b o u n d e d , ξ R .
Through solving this ordinary differential equation, we obtain the solution of Problem (1) in the following frequency domain:
u ^ ( x , ξ ) = e ( i ξ ) α 2 ( 1 x ) g ^ ( ξ ) + x 1 e ( i ξ ) α 2 ( s x ) f ( s , t , u ) ^ ( s , ξ ) 2 ( i ξ ) α 2 d s .
Then,
u ( x , t ) = 1 2 π e i ξ t ( e ( i ξ ) α 2 ( 1 x ) g ^ ( ξ ) + x 1 e ( i ξ ) α 2 ( s x ) f ( s , t , u ) ^ ( s , ξ ) 2 ( i ξ ) α 2 d s ) d ξ .
Using the properties of the Fourier transform for the time-fractional derivative, we obtain
( i ξ ) α 2 = ξ α 2 ( c o s ( α π 4 ) i s i n ( α π 4 ) ) , ξ < 0 , ξ α 2 ( c o s ( α π 4 ) + i s i n ( α π 4 ) ) , ξ 0 .
Using (7) and (8), we find ( i ξ ) α 2 has the positive real part ξ α 2 c o s ( α π 4 ) . As a result of 0 x < s < 1 , as | ξ | becomes large, | e ( i ξ ) α 2 ( 1 x ) | and | e ( i ξ ) α 2 ( s x ) | increase quickly. The solution for 0 x < 1 can be destroyed by the small errors in the high-frequency components of the measurable data g δ ( t ) . Thus, Problem (1) is severely ill-posed. Therefore, the Fourier truncation regularization method is used to solve Problem (1). First, we introduce an important Lemma.
Lemma 1.
If w ( x ) C ( 0 , 1 ) and satisfies
w ( x ) C 1 + 2 C 2 ( 1 x ) x 1 w ( y ) d y ,
then,
w ( x ) C 1 e 2 C 2 ( 1 x ) ,
where C 1 0 , C 2 0 are constants.
Proof. 
Assume W ( x ) = w ( 1 x ) , W ( 1 x ) = w ( x ) , x ( 0 , 1 ) .
Then,
W ( 1 x ) C 1 + 2 C 2 ( 1 x ) x 1 w ( y ) d y .
Assuming z = 1 y , we have
W ( 1 x ) C 1 + 2 C 2 ( 1 x ) 0 1 x w ( 1 z ) d z C 1 + 2 C 2 0 1 x w ( 1 z ) d z .
Assuming τ = 1 x , τ ( 0 , x ) , then we have
W ( τ ) C 1 + 2 C 2 0 τ W ( z ) d z .
Using the Gronwall inequality for (13), we have
W ( τ ) e 0 τ 2 C 2 d s 0 τ C 1 d s .
Then,
W ( τ ) C 1 τ e 2 C 2 τ C 1 e 2 C 2 τ ,
and so,
W ( 1 x ) C 1 e 2 C 2 ( 1 x ) .
Hence,
w ( x ) C 1 e 2 C 2 ( 1 x ) .
 □

3. Fourier Regularization Method and Results

Define the Fourier regularization solution of Problem (1) as follows:
u ξ m a x δ ( x , t ) = 1 2 π e i ξ t ( e ( i ξ ) α 2 ( 1 x ) g ^ δ ( ξ ) X m a x ( ξ ) + x 1 e ( i ξ ) α 2 ( s x ) f ( s , t , u ξ m a x ( ξ ) δ ) ^ ( s , ξ ) 2 ( i ξ ) α 2 d s X m a x ( ξ ) ) d ξ ,
where X m a x is the characteristic function of the interval [ ξ max , ξ max ] , i.e.,
X m a x ( ξ ) = 1 , ξ ξ m a x , 0 , ξ ξ m a x .
The Fourier truncation regularization method is a very effective method for dealing with ill-posed problems. Many authors have used it to deal with different ill-posed problems, such as in [23,24,25,26,27,28,29,30,31,32]. In [33], the authors extended the Fourier method to the general filtering method and solved the semi-linear ill-posed problem in the general framework. Moreover, they obtained excellent results. Hereafter, the existence, uniqueness, and stability of the solution for Problem (18) is considered.
Theorem 1.
Suppose g L 2 ( R ) , assume f L ( [ 0 , 1 ] × R × R ) satisfy f ( x , t , 0 ) = 0 and
f ( x , t , ω ) f ( x , t , ν ) k ω ν ,
for constant k > 0 independent of x , t , ω , ν . Therefore, a unique solution u ξ m a x δ ( x , t ) to problem (18) exists.
Proof. 
For ω ( x , t ) C ( [ 0 , 1 ] ; L 2 ( R ) ) , define the operator as follows:
G ( ω ) ( x , t ) : = 1 2 π e ( i ξ ) α 2 ( 1 x ) g ^ ( ξ ) X m a x ( ξ ) e i ξ t d ξ + 1 2 π e i ξ t x 1 e ( i ξ ) α 2 ( s x ) f ( s , t , ω ) ^ ( s , ξ ) 2 ( i ξ ) α 2 d s X m a x ( ξ ) d ξ .
Therefore, for ω , ν C ( [ 0 , 1 ] ; L 2 ( R ) ) , we first prove the following inequality:
G p ( ω ξ m a x ) ( x , · ) G p ( ν ξ m a x ) ( x , · ) ( k 2 ) p ( e ξ m a x α 2 ξ m a x α 2 ) p 1 p ! ( 1 x ) p 2 | | | ω ξ m a x ν ξ m a x | | | ,
where · is the norm in L 2 ( R ) , and | | | · | | | is the sup norm of C ( [ 0 , 1 ] ; L 2 ( R ) ) . We use the method of induction to prove Inequality (21).
When p = 1 , we have
G ( ω ξ m a x ) ( x , · ) G ( ν ξ m a x ) ( x , · ) 2 = G ^ ( ω ξ m a x ) ( x , · ) G ^ ( ν ξ m a x ) ( x , · ) 2 = | x 1 e ( i ξ ) α 2 ( s x ) f ( s , t , ω ξ m a x ) ^ ( s , ξ ) f ( s , t , ν ξ m a x ^ ) ( s , ξ ) 2 ( i ξ ) α 2 d s X m a x ( ξ ) | 2 d ξ = ξ m a x ξ m a x [ x 1 e ( i ξ ) α 2 ( s x ) 2 ( i ξ ) α 2 ( f ( s , t , ω ξ m a x ) ^ ( s , ξ ) f ( s , t , ν ξ m a x ) ^ ( s , ξ ) ) d s ] 2 d ξ ξ m a x ξ m a x [ x 1 e 2 ( i ξ ) α 2 ( s x ) 4 ( i ξ ) α d s x 1 | f ( s , t , ω ξ m a x ) ^ ( s , ξ ) f ( s , t , ν ξ m a x ) ^ ( s , ξ ) | 2 d s ] d ξ e 2 ( i ξ m a x ) α 2 4 ( i ξ m a x ) α ( 1 x ) ξ m a x ξ m a x [ x 1 | f ( s , t , ω ξ m a x ) ^ ( s , ξ ) f ( s , t , ν ξ m a x ) ^ ( s , ξ ) | 2 d s ] d ξ e 2 ξ m a x α 2 4 ξ m a x α ( 1 x ) x 1 [ | f ( s , t , ω ξ m a x ) ^ ( s , ξ ) f ( s , t , ν ξ m a x ) ^ ( s , ξ ) | 2 d ξ ] d s = e 2 ξ m a x α 2 4 ξ m a x α ( 1 x ) x 1 [ | f ( s , t , ω ξ m a x ) ( s , t ) f ( s , t , ν ξ m a x ( s , t ) | 2 d t ] d s e 2 ξ m a x α 2 4 ξ m a x α ( 1 x ) k 2 x 1 [ | ω ξ m a x ( s , t ) ν ξ m a x ( s , t ) | 2 d t ] d s = e 2 ξ m a x α 2 4 ξ m a x α ( 1 x ) k 2 x 1 ω ξ m a x ( s , · ) ν ξ m a x ( s , · ) 2 d s e 2 ξ m a x α 2 4 ξ m a x α ( 1 x ) k 2 ( 1 x ) | | | ω ξ m a x ν ξ m a x | | | 2 e 2 ξ m a x α 2 4 ξ m a x α ( 1 x ) k 2 | | | ω ξ m a x ν ξ m a x | | | 2 .
When p = j , the inequality satisfies
G j ( ω ξ m a x ) ( x , · ) G j ( ν ξ m a x ) ( x , · ) 2 ( k 2 4 ) j ( e 2 ξ m a x α 2 ξ m a x α ) j ( 1 x ) j j ! | | | ω ξ m a x ν ξ m a x | | | 2 .
Therefore, when p = j + 1 , we have
G j + 1 ( ω ξ m a x ) ( x , · ) G j + 1 ( ν ξ m a x ) ( x , · ) 2 = G ^ ( G j ( ω ξ m a x ) ) ( x , · ) G ^ ( G j ( ν ξ m a x ) ) ( x , · ) 2 = | x 1 e ( i ξ ) α 2 ( s x ) f ( s , t , G j ( ω ξ m a x ^ ( s , ξ ) ) ) f ( s , t , G j ( ν ξ m a x ^ ( s , ξ ) ) ) 2 ( i ξ ) α 2 d s X m a x ( ξ ) | 2 d ξ ξ m a x ξ m a x [ x 1 e 2 ( i ξ ) α 2 ( s x ) 4 ( i ξ ) α d s x 1 | f ( s , t , G j ( ω ξ m a x ^ ( s , ξ ) ) ) f ( s , t , G j ( ν ξ m a x ^ ( s , ξ ) ) ) | 2 d s ] d ξ e 2 ( i ξ m a x ) α 2 4 ( i ξ m a x ) α ( 1 x ) ξ m a x ξ m a x [ x 1 | f ( s , t , G j ( ω ξ m a x ^ ( s , ξ ) ) ) f ( s , t , G j ( ν ξ m a x ^ ( s , ξ ) ) ) | 2 d s ] d ξ e 2 ξ m a x α 2 4 ξ m a x α ( 1 x ) x 1 [ | f ( s , t , G j ( ω ξ m a x ^ ( s , ξ ) ) ) f ( s , t , G j ( ν ξ m a x ^ ( s , ξ ) ) ) | 2 d ξ ] d s = e 2 ξ m a x α 2 4 ξ m a x α ( 1 x ) x 1 [ | f ( s , t , G j ( ω ξ m a x ( s , ξ ) ) ) f ( s , t , G j ( ν ξ m a x ( s , ξ ) ) ) | 2 d t ] d s e 2 ξ m a x α 2 4 ξ m a x α ( 1 x ) k 2 x 1 [ | G j ( ω ξ m a x ( s , t ) ) G j ( ν ξ m a x ( s , t ) ) | 2 d t ] d s = e 2 ξ m a x α 2 4 ξ m a x α ( 1 x ) k 2 x 1 G j ( ω ξ m a x ( s , · ) ) G j ( ν ξ m a x ( s , · ) ) 2 d s e 2 ξ m a x α 2 4 ξ m a x α ( 1 x ) k 2 x 1 ( k 2 4 ) j ( e 2 ξ m a x α 2 ξ m a x α ) j ( 1 s ) j j ! | | | ω ξ m a x ν ξ m a x | | | 2 d s ( k 2 4 ) j + 1 ( e 2 ξ m a x α 2 ξ m a x α ) j + 1 | | | ω ξ m a x ν ξ m a x | | | 2 j ! x 1 ( 1 s ) j d s = ( e 2 ξ m a x α 2 k 2 4 ξ m a x α ) j + 1 ( 1 x ) j + 1 ( j + 1 ) ! | | | ω ξ m a x ν ξ m a x | | | 2 .
Then,
G j + 1 ( ω ξ m a x ) ( x , · ) G j + 1 ( ν ξ m a x ) ( x , · ) ( e ξ m a x α 2 k 2 ξ m a x α 2 ) j + 1 ( 1 x ) j + 1 2 ( j + 1 ) ! | | | ω ξ m a x ν ξ m a x | | | .
Applying the method of induction, for all ω , ν C ( [ 0 , 1 ] ; L 2 ( R ) ) , we have
G p ( ω ξ m a x ) ( x , · ) G p ( ν ξ m a x ) ( x , · ) ( k 2 ) p ( e ξ m a x α 2 ξ m a x α 2 ) p 1 p ! ( 1 x ) p 2 | | | ω ξ m a x ν ξ m a x | | | .
Considering the operator G : C ( x ; L 2 ( R ) ) C ( x ; L 2 ( R ) ) , we can obtain
lim p ( k 2 ) p ( e ξ m a x α 2 ξ m a x α 2 ) p 1 p ! ( 1 x ) p 2 = 0 .
Therefore, a positive number p 0 exists such that 0 < ( k 2 ) p 0 ( e ξ m a x α 2 ξ m a x α 2 ) p 0 1 p 0 ! ( 1 x ) p 0 2 < 1 . Thus, G p 0 is a contractive mapping, stating that equation G p 0 ( ω ) = ω has the unique solution u ξ m a x ( x , t ) C ( x ; L 2 ( R ) ) . Note that G ( G p 0 ( u ξ m a x ) ) = G ( u ξ m a x ) , so G p 0 ( G ( u ξ m a x ) ) = u ξ m a x . According to the uniqueness of the fixed point, for the equation G ( ω ) = ω , there exists the unique solution u ξ m a x . □
Theorem 2.
Suppose f satisfies Inequality (20), u ξ m a x and u ξ m a x δ are the solutions of Equation (18), respectively. For 0 < x < 1 , we have
u ξ m a x u ξ m a x δ 2 δ e ξ m a x α 2 ( 1 x ) e 1 4 ξ m a x α k 2 ( 1 x ) .
Proof. 
Using Parseval’s equality, we get
u ξ m a x ( x , · ) u ξ m a x δ ( x , · ) 2 = u ^ ξ m a x ( x , · ) u ^ ξ m a x δ ( x , · ) 2 = | [ e ( i ξ ) α 2 ( 1 x ) ( g ^ ( ξ ) g ^ δ ( ξ ) ) + x 1 e ( i ξ ) α 2 ( s x ) f ( s , t , u ξ m a x ) ^ ( s , ξ ) f ( s , t , u ξ m a x δ ) ( s , ξ ) ^ 2 ( i ξ ) α 2 d s ] X m a x ( ξ ) | 2 d ξ = ξ m a x ξ m a x | [ e ( i ξ ) α 2 ( 1 x ) ( g ^ ( ξ ) g ^ δ ( ξ ) ) + x 1 e ( i ξ ) α 2 ( s x ) f ( s , t , u ξ m a x ) ^ ( s , ξ ) f ( s , t , u ξ m a x δ ) ^ ( s , ξ ) 2 ( i ξ ) α 2 d s ] | 2 d ξ 2 ξ m a x ξ m a x [ e ( i ξ ) α 2 ( 1 x ) ( g ^ ( ξ ) g ^ δ ( ξ ) ) ] 2 d ξ + 1 2 ξ m a x ξ m a x [ x 1 e ( i ξ ) α 2 ( s x ) ( i ξ ) α 2 ( f ( s , t , u ξ m a x ) ^ ( s , ξ ) f ( s , t , u ξ m a x δ ) ^ ( s , ξ ) d s ] 2 d ξ 2 e 2 ξ m a x α 2 ( 1 x ) | g ^ ( ξ ) g ^ δ ( ξ ) | 2 d ξ + 1 2 ξ m a x ξ m a x [ x 1 e ξ m a x α 2 ( s x ) ξ m a x α 2 ( f ( s , t , u ξ m a x ) ^ ( s , ξ ) f ( s , t , u ξ m a x δ ) ^ ( s , ξ ) ) d s ] 2 d ξ 2 e 2 ξ m a x α 2 ( 1 x ) g ^ ( ξ ) g ^ δ ( ξ ) 2 + 1 2 ξ m a x ξ m a x [ x 1 e 2 ξ m a x α 2 x d s x 1 e 2 ξ m a x α 2 s ξ m a x α ( f ( s , t , u ξ m a x ) ^ ( s , ξ ) f ( s , t , u ξ m a x δ ) ^ ( s , ξ ) ) 2 d s ] d ξ 2 e 2 ξ m a x α 2 ( 1 x ) g ^ ( ξ ) g ^ δ ( ξ ) 2 + 1 2 ( 1 x ) e 2 ξ m a x α 2 x x 1 e 2 ξ m a x α 2 s ξ m a x α ( f ( s , t , u ξ m a x ) ^ ( s , ξ ) f ( s , t , u ξ m a x δ ) ^ ( s , ξ ) ) 2 d s d ξ = 2 e 2 ξ m a x α 2 ( 1 x ) g ^ ( ξ ) g ^ δ ( ξ ) 2 + 1 2 ( 1 x ) e 2 ξ m a x α 2 x x 1 e 2 ξ m a x α 2 s ξ m a x α ( f ( s , t , u ξ m a x ) f ( s , t , u ξ m a x δ ) ) 2 d t d s 2 e 2 ξ m a x α 2 ( 1 x ) g ^ ( ξ ) g ^ δ ( ξ ) 2 + 1 2 ( 1 x ) k 2 e 2 ξ m a x α 2 x x 1 e 2 ξ m a x α 2 s ξ m a x α | u ξ m a x ( s , t ) u ξ m a x δ ( s , t ) | 2 d t d s = 2 e 2 ξ m a x α 2 ( 1 x ) δ 2 + 1 2 ( 1 x ) k 2 e 2 ξ m a x α 2 x ξ m a x α x 1 e 2 ξ m a x α 2 s u ξ m a x ( s , · ) u ξ m a x δ ( s , · ) 2 d s .
Then,
u ξ m a x ( x , · ) u ξ m a x δ ( x , · ) 2 2 e 2 ξ m a x α 2 ( 1 x ) δ 2 + 1 2 ( 1 x ) k 2 e 2 ξ m a x α 2 x ξ m a x α x 1 e 2 ξ m a x α 2 s u ξ m a x ( s , · ) u ξ m a x δ ( s , · ) 2 d s .
Therefore,
e 2 ξ m a x α 2 x u ξ m a x ( x , · ) u ξ m a x δ ( x , · ) 2 2 e 2 ξ m a x α 2 δ 2 + 1 2 ( 1 x ) k 2 ξ m a x α x 1 e 2 ξ m a x α 2 s u ξ m a x ( s , · ) u ξ m a x δ ( s , · ) 2 d s .
Using Lemma 1, we obtain
e 2 ξ m a x α 2 x u ξ m a x ( x , · ) u ξ m a x δ ( x , · ) 2 2 e 2 ξ m a x α 2 δ 2 e 1 2 ξ m a x α k 2 ( 1 x ) ,
then,
u ξ m a x ( x , · ) u ξ m a x δ ( x , · ) 2 2 e 2 ξ m a x α 2 ( 1 x ) δ 2 e 1 2 ξ m a x α k 2 ( 1 x ) .
Hence,
u ξ m a x ( x , · ) u ξ m a x δ ( x , · ) 2 e ξ m a x α 2 ( 1 x ) δ e 1 4 ξ m a x α k 2 ( 1 x ) .
 □
Remark 1.
From Theorem 2, we can see δ 0 , u ξ m a x ( x , · ) u ξ m a x δ ( x , · ) 0 . Therefore, the solution of Problem (18) depends continuously on g L 2 ( R ) . □

4. Error Estimate

The error estimates at 0 < x < 1 a n d x = 0 are given in this section.
  • The error estimate at 0 <x< 1.
In order to obtain the error estimate at 0 < x< 1, we impose an a priori bound on u ( x , t ) , i.e.,
e 2 x ξ α 2 | u ^ ( x , ξ ) | 2 d ξ E 2 , x ( 0 , 1 ) ,
where E is a constant.
Theorem 3.
Assume that f satisfies Equation (20). u ( x , t ) is the exact solution of Problem (1) and u ξ m a x δ ( x , t ) is the solution of (18). Suppose conditions (3) and (29) hold. Choosing the regularization parameter
ξ m a x = ( l n ( E δ ) ) 2 α ,
we get the following estimate at 0 < x < 1 :
u ( x , · ) u ξ m a x δ ( x , · ) 2 2 E 1 x δ x e 1 4 ( l n E δ ) 2 k 2 ( 1 x ) .
Proof. 
Applying Parseval’s equality, we obtain
u ( x , · ) u ξ m a x ( x , · ) 2 = u ^ ( x , · ) u ^ ξ m a x ( x , · ) 2 = | e ( i ξ ) α 2 ( 1 x ) ( 1 X m a x ( ξ ) ) g ^ ( ξ ) + x 1 e ( i ξ ) α 2 ( s x ) f ( s , t , u ) ^ ( s , ξ ) 2 ( i ξ ) α 2 d s x 1 e ( i ξ ) α 2 ( s x ) f ( s , t , u ξ m a x ) ^ ( s , ξ ) 2 ( i ξ ) α 2 d s X m a x ( ξ ) | 2 d ξ = | e ( i ξ ) α 2 ( 1 x ) ( 1 X m a x ( ξ ) ) g ^ ( ξ ) + x 1 e ( i ξ ) α 2 ( s x ) f ( s , t , u ) ^ ( s , ξ ) 2 ( i ξ ) α 2 d s x 1 e ( i ξ ) α 2 ( s x ) f ( s , t , u ) ^ ( s , ξ ) 2 ( i ξ ) α 2 d s X m a x ( ξ ) d ξ + x 1 e ( i ξ ) α 2 ( s x ) f ( s , t , u ) ^ ( s , ξ ) 2 ( i ξ ) α 2 d s X m a x d ξ x 1 e ( i ξ ) α 2 ( s x ) f ( s , t , u ξ m a x ) ^ ( s , ξ ) 2 ( i ξ ) α 2 d s X m a x ( ξ ) | 2 d ξ = | [ e ( i ξ ) α 2 ( 1 x ) g ^ ( ξ ) + x 1 e ( i ξ ) α 2 ( s x ) f ( s , t , u ) ^ ( s , ξ ) 2 ( i ξ ) α 2 d s ] ( 1 X m a x ( ξ ) ) + x 1 e ( i ξ ) α 2 ( s x ) 2 ( i ξ ) α 2 ( f ( s , t , u ) ^ ( s , ξ ) f ( s , t , u ξ m a x ) ^ ( s , ξ ) ) d s X m a x ( ξ ) | 2 d ξ = | ( 1 X m a x ( ξ ) ) u ^ ( x , ξ ) + x 1 e ( i ξ ) α 2 ( s x ) 2 ( i ξ ) α 2 ( f ( s , t , u ) ^ ( s , ξ ) f ( s , t , u ξ m a x ) ^ ( s , ξ ) ) d s X m a x ( ξ ) | 2 d ξ 2 | ( 1 X m a x ( ξ ) ) u ^ ( x , ξ ) | 2 d ξ + 2 x 1 e ( i ξ ) α 2 ( s x ) 2 ( i ξ ) α 2 ( f ( s , t , u ) ^ ( s , ξ ) f ( s , t , u ξ m a x ) ^ ( s , ξ ) ) d s X m a x ( ξ ) | 2 d ξ = 2 | ξ | > ξ m a x | u ^ ( x , ξ ) | 2 d ξ + 2 ξ m a x ξ m a x | x 1 e ( i ξ ) α 2 ( s x ) 2 ( i ξ ) α 2 ( f ( s , t , u ) ^ ( s , ξ ) f ( s , t , u ξ m a x ) ^ ( s , ξ ) ) d s | 2 d ξ 2 | ξ | > ξ m a x e 2 x ξ α 2 e 2 x ξ α 2 | u ^ ( x , ξ ) | 2 d ξ + 1 2 ξ m a x ξ m a x | x 1 e ξ m a x α 2 ( s x ) ξ m a x α 2 ( f ( s , t , u ) ^ ( s , ξ ) f ( s , t , u ξ m a x ) ^ ( s , ξ ) ) d s | 2 d ξ 2 e 2 x ξ α 2 E 2 + 1 2 ξ m a x ξ m a x | x 1 e 2 ξ m a x α 2 x d s x 1 e 2 ξ m a x α 2 s ξ m a x α | f ( s , t , u ) ^ ( s , ξ ) f ( s , t , u ξ m a x ) ^ ( s , ξ ) | 2 d s | d ξ 2 e 2 x ξ α 2 E 2 + 1 2 ( 1 x ) e 2 ξ m a x α 2 x ξ m a x ξ m a x x 1 e 2 ξ m a x α 2 s ξ m a x α | f ( s , t , u ) ^ ( s , ξ ) f ( s , t , u ξ m a x ) ^ ( s , ξ ) | 2 d s d ξ = 2 e 2 x ξ α 2 E 2 + 1 2 ( 1 x ) e 2 ξ m a x α 2 x x 1 e 2 ξ m a x α 2 s ξ m a x α ξ m a x ξ m a x | f ( s , t , u ) ^ ( s , ξ ) f ( s , t , u ξ m a x ) ^ ( s , ξ ) | 2 d ξ d s 2 e 2 x ξ α 2 E 2 + 1 2 ( 1 x ) e 2 ξ m a x α 2 x x 1 e 2 ξ m a x α 2 s ξ m a x α | f ( s , t , u ) f ( s , t , u ξ m a x ) | 2 d t d s 2 e 2 x ξ α 2 E 2 + 1 2 ( 1 x ) e 2 ξ m a x α 2 x k 2 x 1 e 2 ξ m a x α 2 s ξ m a x α | u ( s , t ) u ξ m a x ( s , t ) | 2 d t d s = 2 e 2 x ξ α 2 E 2 + 1 2 ( 1 x ) k 2 e 2 ξ m a x α 2 x ξ m a x α x 1 e 2 ξ m a x α 2 s u ( s , · ) u ξ m a x ( s , · ) 2 d s .
Then,
u ( x , · ) u ξ m a x ( x , · ) 2 2 e 2 x ξ α 2 E 2 + 1 2 ( 1 x ) k 2 e 2 ξ m a x α 2 x ξ m a x α x 1 e 2 ξ m a x α 2 s u ( s , · ) u ξ m a x ( s , · ) 2 d s .
Therefore,
e 2 x ξ m a x α 2 u ( x , · ) u ξ m a x ( x , · ) 2 2 E 2 + 1 2 ( 1 x ) k 2 ξ m a x α x 1 e 2 ξ m a x α 2 s u ( s , · ) u ξ m a x ( s , · ) 2 d s .
Using Lemma 1, we obtain
e 2 x ξ m a x α 2 u ( x , · ) u ξ m a x ( x , · ) 2 2 E 2 e 1 2 ( 1 x ) k 2 ξ m a x α .
Then,
u ( x , · ) u ξ m a x ( x , · ) 2 E e 1 4 ( 1 x ) k 2 ξ m a x α e x ξ m a x α 2 .
Applying the triangle inequality, combining (25) and (34) with (30), we obtain
u ( x , · ) u ξ m a x δ ( x , · ) u ( x , · ) u ξ m a x ( x , · ) + u ξ m a x ( x , · ) u ξ m a x δ ( x , · ) 2 E e 1 4 ( 1 x ) k 2 ξ m a x α e x ξ m a x α 2 + 2 e ξ m a x α 2 ( 1 x ) δ e 1 4 ξ m a x α k 2 ( 1 x ) = 2 2 e 1 4 ( 1 x ) k 2 ( l n E δ ) 2 E 1 x δ x .
Remark 2.
From Theorem 3, we only get that the error estimate is bound but not the convergence, as δ 0 when x = 0 . In order to give the convergence error estimate at x = 0 , we must give an a priori error bound of u ( 0 , t ) as follows:
| u ^ ( 0 , ξ ) | 2 ( 1 + ξ 2 ) p d ξ E 2 ,
where E is a constant.
  • The error estimate at x = 0 .
Theorem 4.
By choosing the regularization parameter
ξ m a x = ( l n ( E δ ) ) 2 α ,
we get the error estimate as follows:
u ( 0 , · ) u ξ m a x δ ( 0 , · ) 2 2 E δ 1 2 e 1 4 ( l n E δ ) 2 k 2 .
Proof. 
Applying Parseval’s equality, we obtain
u ( 0 , · ) u ξ m a x ( 0 , · ) 2 = u ^ ( 0 , · ) u ^ ξ m a x ( 0 , · ) 2 = | e ( i ξ ) α 2 ( 1 X m a x ( ξ ) ) g ^ ( ξ ) + 0 1 e ( i ξ ) α 2 s f ( s , t , u ) ^ ( s , ξ ) 2 ( i ξ ) α 2 d s 0 1 e ( i ξ ) α 2 s f ( s , t , u ξ m a x ) ^ ( s , ξ ) 2 ( i ξ ) α 2 d s X m a x ( ξ ) | 2 d ξ = | e ( i ξ ) α 2 ( 1 X m a x ( ξ ) ) g ^ ( ξ ) + 0 1 e ( i ξ ) α 2 s f ( s , t , u ) ^ ( s , ξ ) 2 ( i ξ ) α 2 d s 0 1 e ( i ξ ) α 2 s f ( s , t , u ) ^ ( s , ξ ) 2 ( i ξ ) α 2 d s X m a x ( ξ ) d ξ + 0 1 e ( i ξ ) α 2 s f ( s , t , u ) ^ ( s , ξ ) 2 ( i ξ ) α 2 d s X m a x ( ξ ) d ξ 0 1 e ( i ξ ) α 2 s ) f ( s , t , u ξ m a x ) ^ ( s , ξ ) 2 ( i ξ ) α 2 d s X m a x ( ξ ) | 2 d ξ = | [ e ( i ξ ) α 2 g ^ ( ξ ) + 0 1 e ( i ξ ) α 2 s ) f ( s , t , u ) ^ ( s , ξ ) 2 ( i ξ ) α 2 d s ] ( 1 X m a x ( ξ ) ) + 0 1 e ( i ξ ) α 2 s 2 ( i ξ ) α 2 ( f ( s , t , u ) ^ ( s , ξ ) f ( s , t , u ξ m a x δ ) ^ ( s , ξ ) ) d s X m a x ( ξ ) | 2 d ξ = | ( 1 X m a x ( ξ ) ) u ^ ( 0 , ξ ) + 0 1 e ( i ξ ) α 2 s 2 ( i ξ ) α 2 ( f ( s , t , u ) ^ ( s , ξ ) f ( s , t , u ξ m a x δ ) ^ ( s , ξ ) ) d s X m a x ( ξ ) | 2 d ξ 2 | ( 1 X m a x ( ξ ) ) u ^ ( 0 , ξ ) | 2 d ξ + 2 0 1 e ( i ξ ) α 2 s 2 ( i ξ ) α 2 ( f ( s , t , u ) ^ ( s , ξ ) f ( s , t , u ξ m a x δ ) ^ ( s , ξ ) ) d s X m a x ( ξ ) | 2 d ξ = 2 | ξ | > ξ m a x | u ^ ( 0 , ξ ) | 2 d ξ + 2 ξ m a x ξ m a x | 0 1 e ( i ξ ) α 2 s 2 ( i ξ ) α 2 ( f ( s , t , u ) ^ ( s , ξ ) f ( s , t , u ξ m a x δ ) ^ ( s , ξ ) ) d s | 2 d ξ 2 | ξ | > ξ m a x ( 1 + ξ 2 ) p ( 1 + ξ 2 ) p | u ^ ( 0 , ξ ) | 2 d ξ + 1 2 ξ m a x ξ m a x | 0 1 e ξ m a x α 2 s ξ m a x α 2 ( f ( s , t , u ) ^ ( s , ξ ) f ( s , t , u ξ m a x δ ) ^ ( s , ξ ) ) d s | 2 d ξ 2 sup | ξ | > ξ m a x { ( 1 + ξ 2 ) p } E 2 + 1 2 ξ m a x ξ m a x | 0 1 e 2 ξ m a x α 2 s ξ m a x α | f ( s , t , u ) ^ ( s , ξ ) f ( s , t , u ξ m a x δ ) ^ ( s , ξ ) | 2 d s | d ξ 2 ( 1 + ξ m a x 2 ) p E 2 + 1 2 ξ m a x ξ m a x 0 1 e 2 ξ m a x α 2 s ξ m a x α | f ( s , t , u ) ^ ( s , ξ ) f ( s , t , u ξ m a x δ ) ^ ( s , ξ ) | 2 d s d ξ 2 ξ m a x 2 p E 2 + 1 2 0 1 e 2 ξ m a x α 2 s ξ m a x α ξ m a x ξ m a x | f ( s , t , u ) ^ ( s , ξ ) f ( s , t , u ξ m a x δ ) ^ ( s , ξ ) | 2 d ξ d s 2 ξ m a x 2 p E 2 + 1 2 0 1 e 2 ξ m a x α 2 s ξ m a x α | f ( s , t , u ) f ( s , t , u ξ m a x ) | 2 d t d s 2 ξ m a x 2 p E 2 + 1 2 k 2 0 1 e 2 ξ m a x α 2 s ξ m a x α | u ( s , t ) u ξ m a x ( s , t ) | 2 d t d s = 2 ξ m a x 2 p E 2 + 1 2 k 2 ξ m a x α 0 1 e 2 ξ m a x α 2 s u ( s , · ) u ξ m a x ( s , · ) 2 d s .
Then,
u ( 0 , · ) u ξ m a x ( 0 , · ) 2 2 ξ m a x 2 p E 2 + 1 2 k 2 ξ m a x α 0 1 e 2 ξ m a x α 2 s u ( s , · ) u ξ m a x ( s , · ) 2 d s .
Therefore,
e 2 · 0 ξ m a x α 2 u ( 0 , · ) u ξ m a x ( 0 , · ) 2 2 ξ m a x 2 p E 2 + 1 2 k 2 ξ m a x α 0 1 e 2 ξ m a x α 2 s u ( s , · ) u ξ m a x ( s , · ) 2 d s .
Using Lemma 1, we obtain
e 2 · 0 · ξ m a x α 2 u ( 0 , · ) u ξ m a x ( 0 , · ) 2 2 ξ m a x 2 p E 2 e 1 2 k 2 ξ m a x α .
Then,
u ( 0 , · ) u ξ m a x ( 0 , · ) 2 ξ m a x p E e 1 4 k 2 ξ m a x α .
Applying the triangle inequality, combining (25) and (40) with (36), we have
u ( 0 , · ) u ξ m a x δ ( 0 , · ) u ( 0 , · ) u ξ m a x ( 0 , · ) + u ξ m a x ( 0 , · ) u ξ m a x δ ( 0 , · ) 2 ξ m a x p E e 1 4 k 2 ξ m a x α + 2 e ξ m a x α 2 δ e 1 4 ξ m a x α k 2 = 2 2 e 1 4 k 2 ( l n E δ ) 2 E δ 1 2 .
 □

5. Conclusions

In this paper, the Fourier truncation regularization method is used to deal with the backward problem for a time-fractional with a nonlinear source. At the same time, the error estimates between the exact solution and the regularization solution are obtained at 0 x < 1 .

Author Contributions

Conceptualization, X.-X.L.; Formal analysis, X.-Y.M.; Methodology, F.Y. and P.F.

Funding

The project is supported by the National Natural Science Foundation of China (No. 11561045, No. 11961044), the Doctor Fund of Lan Zhou University of Technology.

Acknowledgments

The authors would like to thanks the editor and the referees for their valuable comments and suggestions that improve the quality of our paper.

Conflicts of Interest

The authors declare that they have no conflict of interest.

References

  1. Diethelm, K. The Analysis of Fractional Differential Equations; Springer: Belin, Germany, 2010. [Google Scholar]
  2. Metzler, R.; Klafter, J. The random walk’s guide to anomalous diffusion: A fractional dynamics approach. Phys. Rep. 2000, 339, 1–77. [Google Scholar] [CrossRef]
  3. Podlubny, I. Fractional Differential Equations: An introduction to Fractional Derivatives, Fractional Differential Equations, to Methods of Their Solution and Some of Their Applications; Academic: San Diego, CA, USA, 1999; Volume 198. [Google Scholar]
  4. Scalas, E.; Gorenflo, R.; Mainardi, F. Fractional calculus and continuous-time finance. Physica A 2000, 284, 376–384. [Google Scholar] [CrossRef] [Green Version]
  5. Gorenflo, R.; Mainardi, F. Some recent advances in theory and simulation of fractional diffusion processes. J. Comput. Appl. Math. 2009, 229, 400–415. [Google Scholar] [CrossRef] [Green Version]
  6. Miller, K.S.; Ross, B. An Introduction to the Fractional Calculus and Fractional Differential Equations; Wiley: New York, NY, USA, 1993. [Google Scholar]
  7. Oldham, K.B.; Spanier, J. The Fractional Calculus; Academic Press: New York, NY, USA, 1974. [Google Scholar]
  8. Sokolov, I.M.; Klafter, J. From diffusion to anomalous diffusion: A century after Einsteins Brownian motion. Chaos 2005, 15, 1–77. [Google Scholar] [CrossRef] [PubMed]
  9. Cheng, H.; Fu, C.L. An iteration regularization for a time-fractional inverse diffusion problem. Appl. Math. Model. 2012, 36, 5642–5649. [Google Scholar] [CrossRef]
  10. Zheng, G.H.; Wei, T. A new regularization method for a Cauchy problem of the time fractional diffusion equation. Adv. Comput. Math. 2012, 36, 377–398. [Google Scholar] [CrossRef]
  11. Zheng, G.H.; Wei, T. Spectral regularization method for solving a time-fractional inverse diffusion problem. Appl. Math. Comput. 2011, 218, 396–405. [Google Scholar] [CrossRef]
  12. Zheng, G.H.; Wei, T. Two regularization methods for solving a Riesz-Feller space-fractional backward diffusion problem. Inverse Probl. 2010, 26, 115017. [Google Scholar] [CrossRef]
  13. Zheng, G.H.; Wei, T. Spectral regularization method for a Cauchy problem of the time fractional advection-dispersion equation. J. Comput. Appl. Math. 2010, 233, 2631–2640. [Google Scholar] [CrossRef]
  14. Zheng, G.H.; Wei, T. A new regularization method for solving a time-fractional inverse diffusion problem. J. Math. Anal. Appl. 2011, 378, 418–431. [Google Scholar] [CrossRef] [Green Version]
  15. Xiong, X.T.; Guo, H.B.; Liu, X.H. An inverse problem for a fractional diffusion equation. J. Comput. Appl. Math. 2012, 236, 4474–4484. [Google Scholar] [CrossRef]
  16. Yang, F.; Zhang, Y.; Li, X.X. Landweber iterative method for identifying the initial value problem of the time-space fractional diffusion-wave equation. Numer. Algorithms 2019, 1–22. [Google Scholar] [CrossRef]
  17. Yang, F.; Sun, Y.R.; Li, X.X.; Huang, C.Y. The quasi-boundary value method for identifying the initial value of heat equation on a columnar symmetric domain. Numer. Algorithms 2019, 81, 623–639. [Google Scholar] [CrossRef]
  18. Yang, F.; Wang, N.; Li, X.X. A quasi-boundary regularization method for identifying the initial value of time-fractional diffusion equation on spherically symmetric domain. J. Inverse Ill Pose Probl. 2019. [Google Scholar] [CrossRef]
  19. Messaoudi, S.A. Blow up inn solutions of a quasilinear wave equation with variable exponent nonlineaities. Math. Methods Appl. Sci. 2017, 40, 6976–6986. [Google Scholar] [CrossRef]
  20. Messaoudi, S.A.; Bonfoh, A.; Mukiawa, B.S.; Enyi, C.D. The global attractor for a suspension bridge with memory and partially hinged boundary conditions. Z. Angew. Math. Mech. 2016, 97, 159–172. [Google Scholar] [CrossRef]
  21. Duy, H.D.N.; Huy, T.N.; Dinh, L.L.; Le, G.Q.T. Inverse problem for nonlinear backward space-fractional diffusion equation. J. Inverse Ill Pose Probl. 2016, 25, 423–443. [Google Scholar] [CrossRef]
  22. Tuan, N.H.; Duy, D.H.; Huy, T.N.; Dinh, H.L.; Nguyen, L.V.T.; Kirane, M. On a Riesz-Feller space fractional backward diffusion problem with a nonlinear source. J. Comput. Appl. Math. 2017, 312, 103–126. [Google Scholar] [CrossRef]
  23. Xiong, X.T.; Zhou, Q.; Hon, Y.C. An inverse problem for fractional diffusion equationin 2-dimensional case: Stability analysis and regularization. J. Math. Anal. Appl. 2012, 393, 185–199. [Google Scholar] [CrossRef]
  24. Qian, Z.; Fu, C.L.; Xiong, X.T.; Wei, T. Fourier truncation method for high order numerical derivatives. Appl. Math. Comput. 2006, 181, 940–948. [Google Scholar] [CrossRef]
  25. Yang, F.; Fu, C.L. Two regularization methods to identify time-dependent heat source through an internal measurement of temperature. Math. Comput. Model. 2011, 53, 793–804. [Google Scholar] [CrossRef]
  26. Yang, F.; Fu, C.L.; Li, X.X. The inverse source problem for time fractional diffusion equation: stability analysis and regularization. Inverse Probl. Sci. Eng. 2015, 23, 969–996. [Google Scholar] [CrossRef]
  27. Fu, C.L.; Xiong, X.T.; Qian, Z. Fourier regularization for a backward heat equation. J. Math. Anal. Appl. 2007, 331, 472–480. [Google Scholar] [CrossRef] [Green Version]
  28. Fu, C.L.; Zhang, Y.X.; Cheng, H.; Ma, Y.J. The a posteriori Fourier method for solving ill-posed problems. Inverse Probl. 2012, 28, 095002. [Google Scholar] [CrossRef]
  29. Fu, C.L.; Feng, X.L.; Qian, Z. The Fourier regularization for solving the Cauchy problem for the Helmholtz equation. Appl. Numer. Math. 2009, 59, 2625–2640. [Google Scholar] [CrossRef]
  30. Fu, C.L.; Xiong, X.T.; Fu, P. Fourier regularization method for solving thesurface heat flux from interior observations. Math. Comput. Model. 2005, 42, 489–498. [Google Scholar] [CrossRef]
  31. Yang, F.; Zhang, P.; Li, X.X. The truncation method for the Cauchy problem of the inhomogeneous Helmholtz equation. Appl. Anal. 2019, 98, 991–1004. [Google Scholar] [CrossRef]
  32. Yang, F.; Fan, P.; Li, X.X. Fourier Truncation Regularization Method for a Three-Dimensional Cauchy Problem of the Modified Helmholtz Equation with Perturbed Wave Number. Mathematics 2019, 7, 705. [Google Scholar] [CrossRef]
  33. Doan, V.N.; Nguyen, H.T.; Khoa, V.A.; Vo, V.A. A note on the derivation of filter regularization operators for nonlinear evolution equations. Appl. Anal. 2018, 97, 3–12. [Google Scholar] [CrossRef]

Share and Cite

MDPI and ACS Style

Yang, F.; Fan, P.; Li, X.-X.; Ma, X.-Y. Fourier Truncation Regularization Method for a Time-Fractional Backward Diffusion Problem with a Nonlinear Source. Mathematics 2019, 7, 865. https://doi.org/10.3390/math7090865

AMA Style

Yang F, Fan P, Li X-X, Ma X-Y. Fourier Truncation Regularization Method for a Time-Fractional Backward Diffusion Problem with a Nonlinear Source. Mathematics. 2019; 7(9):865. https://doi.org/10.3390/math7090865

Chicago/Turabian Style

Yang, Fan, Ping Fan, Xiao-Xiao Li, and Xin-Yi Ma. 2019. "Fourier Truncation Regularization Method for a Time-Fractional Backward Diffusion Problem with a Nonlinear Source" Mathematics 7, no. 9: 865. https://doi.org/10.3390/math7090865

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop