Next Article in Journal
A New Fractional Poisson Process Governed by a Recursive Fractional Differential Equation
Next Article in Special Issue
An Implicit Difference Scheme for the Fourth-Order Nonlinear Evolution Equation with Multi-Term Riemann–Liouvile Fractional Integral Kernels
Previous Article in Journal
Sampled-Data Stabilization of Fractional Linear System under Arbitrary Sampling Periods
Previous Article in Special Issue
Local Discontinuous Galerkin Method Coupled with Nonuniform Time Discretizations for Solving the Time-Fractional Allen-Cahn Equation
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

The Construction of High-Order Robust Theta Methods with Applications in Subdiffusion Models

School of Mathematical Sciences, Inner Mongolia University, Hohhot 010021, China
*
Author to whom correspondence should be addressed.
Fractal Fract. 2022, 6(8), 417; https://doi.org/10.3390/fractalfract6080417
Submission received: 10 June 2022 / Revised: 21 July 2022 / Accepted: 26 July 2022 / Published: 29 July 2022

Abstract

:
An exponential-type function was discovered to transform known difference formulas by involving a shifted parameter θ to approximate fractional calculus operators. In contrast to the known θ methods obtained by polynomial-type transformations, our exponential-type θ methods take the advantage of the fact that they have no restrictions in theory on the range of θ such that the resultant scheme is asymptotically stable. As an application to investigate the subdiffusion problem, the second-order fractional backward difference formula is transformed, and correction terms are designed to maintain the optimal second-order accuracy in time. The obtained exponential-type scheme is robust in that it is accurate even for very small α and can naturally resolve the initial singularity provided θ = 1 2 , both of which are demonstrated rigorously. All theoretical results are confirmed by extensive numerical tests.

1. Introduction

Diffusion is one of the most common phenomena of the physical world in which a particle’s motion is Brownian and can be characterized by the classical model t u Δ u = f . It is well known that Brownian motions assume that mean-squared particle displacements grow linearly with respect to time t, whereas an increasing list of experiments in the last decades indicates that such growths can be sublinear or superlinear; i.e., the diffusion can be anomalous. From a macro-perspective, the probability density function u in anomalous diffusion obeys the equation involving a fractional order derivative [1,2]. In this work, we concern ourselves with the subdiffusion transport mechanism (with the fractional derivative order α ( 0 , 1 ) ), which has received much attention in recent years, since the electron transport, thermal diffusion, and protein transport, among others, reveal that the underlying stochastic process is the continuous time random walk instead of Brownian motions [1,2,3,4]. Perhaps the simplest subdiffusion model [2,5] takes the following form:
t α u ( x , t ) Δ u ( x , t ) = f ( x , t ) ,
with suitable initial boundary conditions. Here, t α denotes the Caputo fractional operator [6] of order α ( 0 , 1 ) :
( t α ϕ ) ( t ) = 1 Γ ( 1 α ) 0 t ϕ ( s ) ( t s ) α d s ,
which satisfies t α ϕ = D t α ( ϕ ϕ ( 0 ) ) where D t α is the Riemann–Louisville fractional differential operator [6].
( D t α ϕ ) ( t ) = 1 Γ ( 1 α ) d d t 0 t ϕ ( s ) ( t s ) α d s .
Its integral counterpart, the Riemann-Liouville fractional integral operator [6] D t α ϕ is defined by
( D t α ϕ ) ( t ) = 1 Γ ( α ) 0 t ϕ ( s ) ( t s ) 1 α d s .
The literature on numerically exploring the fractional calculus operators is vast. The authors of [7,8] proposed the well-known L1 method for the Caputo fractional derivative, which is convergent of order 2 α . Lubich [9] systematically developed the convolution quadrature (CQ) theory for discretizing the operators D t α and D t α . The well-known fractional linear multistep methods, which include the Grünwald formula [6] and pth-order fractional backward difference formulas (BDF-p) as special cases, belong to such framework. Some other difference formulas that essentially fit the framework of convolution quadrature can be found in [10,11,12], to mention just a few. In [13], the authors developed the shifted Grünwald formula to overcome the instability of the Grünwald formula when applied to fractional advection–dispersion flow equations. Galeone and Garrappa [14] devised explicit multistep methods for the fractional derivative and examined the stability properties in much detail. By weighting and averaging the shifted Grünwald formula, Tian et al. [15] proposed the weighted and shifted Grünwald difference formulas for space fractional Riemann–Louisville derivatives. Ding et al. [16] built a second-order midpoint formula by shifting the fractional BDF-2 and applied it to fractional cable equations. In [17], the authors investigated shifted convolution quadrature (SCQ) methods in detail aiming to develop θ -methods systematically, where a polynomial-type transformation strategy was proposed to convert any known CQ method into a θ method. However, the existence of zeros of polynomials severely restricts the choice of the parameter θ such that the method is A-stable. In this work, we propose a novel transformation strategy by resorting to the exponential-type function, illustrating its superiority in developing A-stable methods and robust numerical schemes for subdiffusion problems.
Clearly, the fractional operators mentioned above involve a weak singular kernel s γ for some γ ( 0 , 1 ) , which renders numerically solving subdiffusion problems rather difficult, since most high-order difference formulas, if directly applied to such problem on uniform meshes, lose their deserved high accuracy [18,19,20]. To resolve such difficulties, modified difference formulas by adding correction terms [21,22,23,24,25] or using nonuniform meshes are developed [26,27], to mention just a few. Specifically, Yan et al. [21] developed the modified L1 method by adding correction terms to recover the optimal convergence order 2 α , while Jin et al. [22] established the corrected fractional BDF-p to restore the high accuracy. By shifting the approximation point by α 2 with respect to grid points, Jin et al. [23] designed a two-step correction method for the fractional Crank–Nicolson scheme and such a correction technique was further optimized by Wang et al. [24] where only the first-step correction is needed to maintain the optimal accuracy. In particular, we studied a general second-order difference scheme for (1) in [25], which is generated by an SCQ difference formula with a free parameter θ ( 0 , 1 2 ) and can preserve the high accuracy if correction terms are added. The θ = 1 2 is excluded there for the singularity of the corresponding transform functions involved in theoretical analysis. Indeed, the case θ = 1 2 is of special interest since the correction terms vanish, enlightening us that a carefully designed time-stepping method, even on uniform meshes, should automatically resolve the singularity. A close examination, as shown in this study, indicates that the singularity of transform functions stems from the zeros of polynomials, which can be avoided by using the exponential-type transform functions. To sum up, the contribution of this study comes from three aspects:
  • An exponential-type transformation strategy is proposed to transfer any known pth order ( p 6 ) time-stepping methods into θ methods with the same accuracy.
  • The robustness of numerical schemes obtained by the exponential-type transformation strategy for a trial equation is examined theoretically and verified numerically.
  • Rigorous arguments of the optimal error estimates of the transformed fractional BDF-2 are provided for the subdiffusion Problem (1).
The rest of the article is outlined as follows. In Section 2, we first review some basic aspects of the SCQ and then determine the stability region of θ methods when applied to a simple differential equation. In Section 3, we propose the exponential-type transformation to convert known stepping methods into θ methods and demonstrate its superiority over traditional polynomial-type transformations. In Section 4, the exponentially transformed fractional BDF-2 is applied to subdiffusion problems where correction terms are designed to recover the optimal convergence rate, which are confirmed rigorously by theoretical analyses. Extensive numerical tests are offered in Section 5 to verify all theoretical results. Finally, in Section 6, we make some concluding remarks.

2. Preliminaries

2.1. Review of θ -Methods in SCQ

The construction of novel robust θ methods is based on the framework of shifted convolution quadrature [28] for the fractional calculus, which will be introduced briefly in this subsection.
Divide the time interval [ 0 , T ] by the following grids: 0 = t 0 < t 1 < < t N = T with t n = n τ and τ = T / N . Let ϕ n be the value of a function ϕ ( t n ) for the sake of simplicity. Given a sequence { ω j } j = 0 , the difference formula
D τ , θ α , n ϕ : = τ α j = 0 n ω j ϕ n j
represents an approximation to the Riemann–Louisville derivative ( D t α ϕ ) ( t n θ ) if the generating function ω ( ζ ) defined by ω ( ζ ) = j = 0 ω j ζ j for | ζ | < 1 satisfies
( i ) Stability : ω n = O ( n α 1 ) , ( ii ) Consistency : τ α e θ τ ω ( e τ ) 1 = o ( 1 ) ,
simultaneously.
Lemma 1
(See [28], Theorem 1). The difference Formula (2) is pth-order convergent if and only if both the stability in (3) and the following consistent condition
Consistency of order p : τ α e θ τ ω ( e τ ) 1 = O ( τ p )
are fulfilled.
It is notable that if the shift parameter θ vanishes in (2) or (4), meaning that a difference formula D τ α , n ϕ : = D τ , 0 α , n ϕ is designed for D t α ϕ at the grid point t n ; then, one essentially obtains approximation methods belonging to the convolution quadrature theory, which was partially founded in [9] for approximating fractional calculus and then extended to more general convolution-type operators [29,30]. In previous studies, we have extended several traditional difference formulas such as the fractional BDF-2 [31], the fractional trapezoidal rule [17], and the fractional Adams–Moulton method [32], among others, to their generalized versions by involving shifted parameter θ . Moreover, a conversion strategy was proposed in [28] to transform a difference formula D τ α , n ϕ into D τ , θ α , n ϕ , which, in the viewpoint of the generating function reconstruction, can be stated as follows:
ω ( ζ ) = ϖ p ( ζ ) Θ ( ζ ; θ ) , Θ ( ζ ; θ ) = γ 0 + γ 1 ( 1 ζ ) + γ 2 ( 1 ζ ) 2 + + γ p 1 ( 1 ζ ) p 1 ,
where ϖ p ( ζ ) = j = 0 ϖ j ζ j represents the generating function with ϖ j from the weights of D τ α , n ϕ , which is convergent of order p. The γ j s are obtained from identity i = 0 γ i ( 1 ζ ) i = ζ θ . Specifically, the second-, third- and fourth-order transformed generating functions take the following forms:
ω ( ζ ) = ϖ 2 ( ζ ) ( 1 θ ) + θ ζ , f o r   2 n d - o r d e r , ϖ 3 ( ζ ) 1 2 ( 1 θ ) ( 2 θ ) + θ ( 2 θ ) ζ + 1 2 θ ( θ 1 ) ζ 2 , f o r   3 r d - o r d e r , ϖ 4 ( ζ ) [ 1 6 ( 1 θ ) ( 2 θ ) ( 3 θ ) + 1 2 θ ( 2 θ ) ( 3 θ ) ζ 1 2 θ ( 1 θ ) ( 3 θ ) ζ 2 + 1 6 θ ( 1 θ ) ( 2 θ ) ζ 3 ] , f o r   4 t h - o r d e r ,
where ϖ p ( ζ ) ( p = 2 , 3 ) stands for any generating functions in CQ that is convergent of order p.
ϖ 2 ( ζ ) = 3 2 2 ζ + 1 2 ζ 2 α , f r a c t i o n a l   B D F - 2 , ( 1 ζ ) α 1 + α 2 ( 1 ζ ) , 2 n d - o r d e r   N e w t o n - G r e g o r y   f o r m u l a , ϖ 3 ( ζ ) = 11 6 3 ζ + 3 2 ζ 2 1 3 ζ 3 α , f r a c t i o n a l   B D F - 3 , ( 1 ζ ) α [ 1 + α 2 ( 1 ζ ) + ( 1 8 α 2 + 5 α 24 ) ( 1 ζ ) 2 ] , 3 r d - o r d e r   N e w t o n - G r e g o r y   f o r m u l a , ϖ 4 ( ζ ) = 25 12 4 ζ + 3 ζ 2 4 3 ζ 3 + 1 4 ζ 4 α , f r a c t i o n a l   B D F - 4 , ( 1 ζ ) α [ 1 + α 2 ( 1 ζ ) + ( 1 8 α 2 + 5 α 24 ) ( 1 ζ ) 2 + ( 1 48 α 3 + 5 α 2 48 + α 8 ) ( 1 ζ ) 3 ] , 4 t h - o r d e r   N e w t o n - G r e g o r y   f o r m u l a .
We also mention that transformation (5) indicates that the function ϕ ( t ) = D t 0 ϕ at time t n θ can be approximated, in accordance with (2), by formula j = 0 n θ j ϕ n j with the weights { θ j } j = 0 generated by Θ ( ζ ; θ ) , where identity ϖ p ( ζ ) 1 is prescribed.

2.2. Stability Regions

Historically, Lubich [33] has proven that when using a convolution quadrature method (with a generating function ω ˜ ( ζ ) = j = 0 ω ˜ j ζ j ) to solve the linear Abel integral equation
u ( t ) = f ( t ) + λ Γ ( α ) 0 t ( t s ) α 1 u ( s ) d s ,
where f ( t ) has finite limit as t , the stability region S is precisely determined by
C { 1 / ω ˜ ( ζ ) : | ζ | 1 } ,
if the weights ω ˜ n fulfill the following condition.
ω ˜ n = n α 1 Γ ( α ) + π n , n 1 , with n = 1 | π n | < .
Instead of (8), we concern ourselves in this work with the following fractional differential equation:
t α u = λ u + g ( t ) , α ( 0 , 1 ) and ( λ ) < 0 ,
where g ( t ) decays exponentially and partially. Resorting to any ϖ p ( ζ ) in CQ, the numerical scheme reads as follows:
j = 0 n ϖ n j ( U j U 0 ) = τ ¯ ( U n + 1 λ g n ) , n n 0 ,
where τ ¯ = λ τ α . We next identify conditions on ϖ j or its generating function ϖ p ( ζ ) to determine the related stability region. It is worth noting that the first few steps ( n = 1 , 2 , , n 0 1 ) for (12) may need to be treated separately, e.g., by adding correction terms [9], to retain the high accuracy in cases where high-order methods are adopted.
Some assumptions on ϖ p ( ζ ) are needed.
( A 1 ) τ α ϖ p ( e τ ) 1 = O ( τ p ) , ( A 2 ) ϖ p ( ζ ) = ( 1 ζ ) α ( ζ ) , ( ζ ) is nonzero and analytic for ζ { ζ : | ζ | 1 } .
Note that the most well-known implicit CQ methods meet the assumptions (A1) and (A2), e.g., the fractional BDF-p and Newton–Gregory formula, among others. The assumption (A2) actually implies that ϖ n = O ( n α 1 ) .
Given ϖ p ( ζ ) that fulfills (A1) and (A2), introduce the sequence { ϖ j ( 1 ) } j = 0 generated by 1 ϖ p ( ζ ) . The next lemma shows that τ α j = 0 n ϖ j ( 1 ) ϕ n j is an approximation to D t α ϕ at t n . For a better presentation, the proof of the following lemmas in this section is left in Appendix A.
Lemma 2.
Let ϖ p ( ζ ) satisfy the assumptions (A1) and (A2). Then, τ α j = 0 n ϖ j ( 1 ) ϕ n j approximates ( D t α ϕ ) ( t n ) with convergence order p, i.e., ϖ n ( 1 ) = O ( n α 1 ) and τ α / ϖ p ( e τ ) 1 = O ( τ p ) .
Lemma 3.
Let ϖ p ( ζ ) satisfy the assumptions (A1) and (A2). The stability region S for (12) is determined by the following.
C   \   { ϖ p ( ζ ) : | ζ | 1 } .

3. Novel Transformation Strategy

Instead of transformation (5) in which a polynomial-type function Θ ( ζ ; θ ) is involved, we shall, in this section, propose a different strategy by resorting to an exponential-type transform function and demonstrate that the new strategy is more robust by allowing a wider range of θ to guarantee the stability of schemes in solving fractional differential equations.
Let δ ( ζ ) = j = 1 p 1 j ( 1 ζ ) j denote the generating function of backward difference formulas (BDF) of order p 6 .
Theorem 1
(Exponential-type transformation). Let θ R and assume ϖ p ( ζ ) fulfills (A1) and (A2). Define the following:
ω ( ζ ) = ϖ p ( ζ ) e θ δ ( ζ ) ,
then, the difference Formula (2) with weights generated by ω ( ζ ) is convergent of order p.
Proof. 
Clearly, the function e θ δ ( ζ ) (with respect to ζ) is analytic within the unit disc | ζ | < 1 and is k-times differentiable on the unit circle for any positive integer k; thus, its Fourier coefficients, i.e., the e n generated from e θ δ ( ζ ) = n = 0 e n ζ n , decay faster than, e.g., O ( n k ) . Then, the asymptotic property of ω n is fully determined by ϖ n , which, by assumption (A2), leads to the following.
ω n = O ( n α 1 ) .
Moreover, by the consistency condition of order p for ϖ p ( ζ ) due to (A1) and that of δ ( ζ ) , the following holds.
τ α ϖ p ( e τ ) = 1 + O ( τ p ) , τ 1 δ ( e τ ) = 1 + O ( τ p ) .
Using the Taylor expansion, one immediately obtains the following:
τ α e θ τ ω ( e τ ) = τ α ϖ p ( e τ ) e θ τ e θ δ ( e τ ) = 1 + O ( τ p ) ,
indicating that ω ( ζ ) , as a generating function in SCQ, is consistent of order p as well. Finally, by (16) and (17), we complete the proof of the theorem in accordance with Lemma 1. □
Remark 1.
In view of the fact that ϕ ( t n θ ) = ( D t 0 ϕ ) ( t n θ ) , Theorem 1 actually permits us to approximate ϕ ( t n θ ) by a discrete convolution.
ϕ n θ : = j = 0 n θ j ϕ n j , where θ j is generated by j = 0 θ j ζ j = e θ δ ( ζ ) .
As demonstrated in the arguments, θ n decays faster than O ( n k ) for any integer k > 0 . Indeed, since e θ δ ( ζ ) is analytic for | ζ | < ρ for some ρ > 1 , θ n decays exponentially.
For the purpose of application, it is of interest to present efficient algorithms to calculate the coefficients of ω ( ζ ) in (15). The next lemma offers an algorithm by which ω j can be obtained in a recursive manner.
Lemma 4.
Assume ω ( ζ ) takes the form P ( ζ ) α e θ Q ( ζ ) where P ( ζ ) and Q ( ζ ) are polynomials such that ω ( ζ ) is analytic within the unit disc | ζ | < 1 ; then, we obtain the following:
ω 0 = P ( 0 ) α e θ Q ( 0 ) , ω n = 1 n P ( 0 ) ω 0 G n 1 + k = 1 n 1 ω n k G k 1 ( n k ) P k , n 1 ,
where G k includes the coefficients of G ( ζ ) defined by G ( ζ ) = α P ( ζ ) + θ P ( ζ ) Q ( ζ ) .
Proof. 
Take the derivative of ω ( ζ ) = P ( ζ ) α e θ Q ( ζ ) with respect to ζ and multiply both sides by P ( ζ ) to obtain the following.
P ( ζ ) ω ( ζ ) = ω ( ζ ) G ( ζ ) .
The Formula (19) then follows by taking the nth coefficient of both sides of the above equality. □
Remark 2.
It is notable that Algorithm (19) is efficient since G ( ζ ) and P ( ζ ) have finitely many nonzero coefficients; thus, the computing complexity to obtain { ω j } j = 0 N is of O ( N ) .
In contrast to the polynomial-type transform function Θ ( ζ ; θ ) in (5), the exponential function e θ δ ( ζ ) takes the advantage that it has no zero for any θ R , whence e θ δ ( ζ ) can always be expanded into a series without limiting the range of θ . The immediate consequence is that in designing A( ϑ )-stable schemes, the exponential-type transform places no constraint on θ while the polynomial-type transform may limit the choice of θ severely, particularly for high-order methods.
To be more specific, consider the following simple trial equation:
t α u = λ u , α ( 0 , 1 ) and ( λ ) < 0 ,
with initial condition u ( 0 ) = u 0 . For a given generating function ϖ p ( ζ ) that satisfies the Assumptions (A1) and (A2), by adopting the polynomial-type transform (5) or the exponential transform as in Theorem 1, one obtain the following discrete scheme:
j = 0 n ω n j ( U j U 0 ) = τ ¯ U n θ , n n 0 ,
where τ ¯ = λ τ α and U n θ = j = 0 n θ n j U j . The weights θ j , depending on the choice of transform strategies, are coefficients of Θ ( ζ ; θ ) or e θ δ ( ζ ) , respectively.
Theorem 2.
Assume that ϖ p ( ζ ) satisfies (A1) and (A2). For ω ( ζ ) = ϖ p ( ζ ) Θ ( ζ ; θ ) , the stability region S for (21) is determined by the following:
C   \   { ϖ p ( ζ ) : | ζ | 1 } ,
provided that θ Λ θ : = { θ : Θ ( ζ ; θ ) 0 for all | ζ | 1 } . In contrast, for ω ( ζ ) = ϖ p ( ζ ) e θ δ ( ζ ) , stability region S is determined by (22) for any θ R .
Proof. 
Since Θ ( ζ ) or e θ δ ( ζ ) is analytic and nonzero for | ζ | 1 , 1 / Θ ( ζ ) or e θ δ ( ζ ) can be expanded at ζ = 0 with coefficients θ n ( 1 ) decay exponentially. By replacing n with k in the Equation (21) and multiplying both sides by θ n k ( 1 ) and summing k from n 0 to n, we obtain the following.
k = n 0 n θ n k ( 1 ) j = 0 k ω k j ( U j U 0 ) = τ ¯ k = n 0 n θ n k ( 1 ) U k θ .
By resorting to the fact that ϖ p ( ζ ) = ω ( ζ ) 1 Θ ( ζ ) or ϖ p ( ζ ) = ω ( ζ ) e θ δ ( ζ ) and Cauchy product of series, one can obtain the following:
k = 0 n ϖ n k ( U k U 0 ) = τ ¯ U n + 1 λ g n ,
where g n takes the following form
g n = τ α j = 0 n 0 1 k = 0 n 0 1 j ω k λ τ α θ k θ n k j ( 1 ) U j τ α U 0 j = 0 n 0 1 k = 0 n 0 1 j θ n k j ( 1 ) ω k ,
indicating that g n decays exponentially. By comparing (24) with (12), one readily obtains result (22) from Lemma 3. □
Remark 3.
Several methods can be found in the literature [34] for determining Λ θ explicitly. For example, resorting to the Schur criterion (see Schur polynomial in Appendix A, one can readily obtain the explicit form of Λ θ , as shown in Table 1. The sharpness of the constraints on θ are verified in Example 1 of Section 5.

4. Applications

In this section, we apply the exponential-type transformation strategy to the following subdiffusion problem and demonstrate its advantages in developing robust numerical schemes:
t α u ( x , t ) Δ u ( x , t ) = f ( x , t ) , ( x , t ) Ω × ( 0 , T ] , u ( x , t ) = 0 , x Ω , t ( 0 , T ] , u ( x , 0 ) = v ( x ) , x Ω ,
where the space Ω R d ( d = 1 , 2 , 3 ) is a bounded convex polygonal domain with the boundary denoted by Ω . The operator Δ : D ( Δ ) L 2 ( Ω ) stands for the Laplacian with D ( Δ ) = H 0 1 ( Ω ) H 2 ( Ω ) and f : ( 0 , T ] L 2 ( Ω ) is a given function. The initial function v, depending on its smoothness, belongs to D ( Δ ) or L 2 ( Ω ) .

4.1. Formulation of Fully Discrete Scheme

In this section, we take δ ( ζ ) = 3 2 2 ζ + 1 2 ζ 2 and let ω j be generated by ω ( ζ ) = δ ( ζ ) α e θ δ ( ζ ) . In accordance with Theorem 1 (see also Remark 1), ϕ n θ and D τ , θ α , n ϕ both are of second-order accuracy relative to their continuous counterparts. To formulate the fully discrete scheme of the model, define the finite element space as follows:
V h = { χ h H 0 1 ( Ω ) : χ h | e is a linear polynomial function , e T h }
where T h is a shape regular and a quasi-uniform triangulation of Ω .
Let P h : L 2 ( Ω ) V h and R h : H 0 1 ( Ω ) V h stand for the L 2 ( Ω ) and Ritz projection, respectively, and define Δ h : V h V h as the discrete Laplacian. By replacing u ( t ) with w ( t ) + v and f ( t ) with g ( t ) + f ( 0 ) in (25), the space semi-discrete scheme then reads as follows:
D t α w h ( t ) Δ h w ( t ) = g h ( t ) + f h 0 + Δ h v h ,
where g h : = P h g , f h 0 = P h f ( 0 ) and v h = R h v if v D ( Δ ) or v h = P h v if v L 2 ( Ω ) . The fully discrete scheme can, thus, be stated as finding W h n V h such that the following is the case.
D τ , θ α , n W h Δ h W h n θ = g h n θ + f h 0 + Δ h v h , n 1 , θ ( 1 , 1 ) .
In general cases, scheme (27) can only result in first-order convergence rates at positive times due to the initial singularity of the solution. We propose a modified scheme, with the motivation explained in the next section, by resorting to a single-step correction.
D τ , θ α , 1 W h Δ h W h 1 θ = ( θ + 3 / 2 ) ( Δ h v h + f h 0 ) + g h 1 θ , n = 1 , D τ , θ α , n W h Δ h W h n θ = g h n θ + f h 0 + Δ h v h , n 2 .
Note that for θ = 1 2 , the scheme (28) recovers exactly (27), indicating that (27) can resolve the initial singularity automatically if the problem is discretized at point t n + 1 2 .

4.2. Optimal Error Estimates

The error estimate is based on solution representation and estimates of some kernels. Denote by ϕ ^ the Laplace transform of ϕ . Then, using the Laplace transform and its inverse transform, we obtain the following:
w h ( t ) = 1 2 π i Γ σ , ϵ e z t K ( z ) ( Δ h v h + f h ( 0 ) ) + z K ( z ) g h ^ ( z ) d z ,
where K ( z ) = z 1 ( z α Δ h ) 1 stands for the kernel function, and the contour (with the direction of an increasing imaginary part) Γ σ , ϵ is defined by the following.
Γ σ , ϵ : = { z C : | z | = ϵ , | arg z | σ } { z C : z = r e ± i σ , r ϵ } .
Theorem 3.
For α ( 0 , 1 ) and θ ( 1 , 1 ) , there exist σ 0 ( π / 2 , π ) and ϵ 0 > 0 , both of which are free of α and τ such that for any σ ( π / 2 , σ 0 ) and any ϵ < ϵ 0 , the solution of (28) takes the following form:
W h n = 1 2 π i Γ σ , ϵ τ e z t n ( e z τ ) K ( δ τ ( e z τ ) ) ( Δ h v h + f h 0 ) + τ δ τ ( e z τ ) K ( δ τ ( e z τ ) ) g h ( e z τ ) d z ,
where Γ σ , ϵ τ = { z Γ σ , ϵ : | ( z ) | π / τ } , δ τ ( ζ ) = δ ( ζ ) / τ and ( ζ ) = δ ( ζ ) ζ 1 1 ζ + θ + 1 2 e θ δ ( ζ ) .
Proof. 
Multiply both sides of (28) by ζ n and sum the index n from 1 to ∞ to yield the following:
n = 1 ζ n D τ , θ α , n W h n = 1 ζ n Δ h W h n θ = n = 1 ζ n g h n θ + ( f h 0 + Δ h v h ) n = 1 ζ n + ( θ + 1 / 2 ) ζ ,
which leads to the following:
δ τ ( ζ ) α Δ h W h ( ζ ) = g h ( ζ ) + ( f h 0 + Δ h v h ) κ ( ζ ) ,
where κ ( ζ ) = ζ 1 1 ζ + θ + 1 2 e θ δ ( ζ ) . By Lemma B.1 in [22], for fixed constant ϕ 0 ( π / 2 , π ) , there exists σ 0 ( π / 2 , π ) , which depends only on ϕ 0 for any σ ( π / 2 , σ 0 ) and any ϵ < ϵ 0 where ϵ 0 is small enough, δ τ ( e z τ ) | z Γ σ , ϵ τ Σ ϕ 0 : = { z C : | arg z | < ϕ 0 , z 0 } . By the Cauchy integral formula, we have the expression for W h n by the following:
W h n = 1 2 π i | ζ | = ε W h ( ζ ) ζ n + 1 d ζ ζ = e z τ τ 2 π i Γ ε τ e z t n W h ( e z τ ) d z
where Γ ε τ : = z = 1 τ ln ε + i y : y R , | y | π / τ . Let L be the region enclosed by contours Γ σ , ϵ τ , Γ ε τ , Γ ± τ : = R ± i π / τ (oriented from left to right); one can check whether W h ( e z τ ) is analytic for z L ¯ . By using the Cauchy integral formula again and noting that the integral values along Γ τ and Γ + τ are opposite, result (30) follows readily by taking ( ζ ) = τ δ τ ( ζ ) κ ( ζ ) . The proof is completed. □
Remark 4.
The arguments for Theorem 3 reveal the superiority of the exponential-type transformation strategy that, for any arbitrary θ, the transform function e θ δ ( ζ ) | ζ = e z τ appearing in κ ( ζ ) is analytic for z L ¯ , in contrast to the polynomial-type transform function 1 1 θ + θ ζ | ζ = e z τ adopted in [25], which is singular at points z = ± π τ L ¯ when θ = 1 2 (in which case, the Crank–Nicolson scheme is excluded). See also [23,24] for similar situations. Therefore, the numerical scheme or numerical analysis is robust against shifted parameter θ when the exponential-type transformation strategy is considered. On the other hand, thanks to Theorem 1, function δ τ ( ζ ) appearing in (30) is independent of α, allowing us to develop robust analyses even for small α. We argue that such types of robustness are not available for the schemes in [23,24,25] as δ τ ( ζ ) in those schemes are singular at α = 0 , leading to the blow-up of constants C in their estimates. See Example 3 in Section 5.
Lemma 5.
Let Γ σ , ϵ τ be the contour defined in Theorem 3. For given θ ( 1 , 1 ) and any z Γ σ , ϵ τ , the following holds
| ( e z τ ) 1 | C τ 2 | z | 2 ,
where C is independent of τ , z , but may be dependent on θ.
Proof. 
Since | z | τ π / sin σ < + , we only need to prove (31) for sufficiently small | z | τ . By the expansion of ( ζ ) at the point ζ = 1 , we have the following: ( ζ ) = 1 + c ( θ ) ( 1 ζ ) 2 + ( 1 ζ ) 3 r ( ζ ) , where r ( ζ ) is analytic at ζ = 1 . One then immediately obtains the following: ( e z τ ) = 1 + c ( θ ) τ 2 | z | 2 + o ( τ 2 | z | 2 ) , which completes the proof of the lemma. □
Theorem 4.
Suppose that u h ( t ) : = w h ( t ) + v h is the solution of the space semi-discrete scheme of (25), and U h n : = W h n + v h is the solution of the fully discrete scheme of (25). If f W 1 , ( 0 , T ; L 2 ( Ω ) ) and 0 t ( t s ) α 1 f ( x ) d s L ( 0 , T ) where · denotes the L 2 norm, then the following is the case:
U h n u h ( t n ) C τ 2 R ( t n , v ) + t n α 2 f ( 0 ) + t n α 1 f ( 0 ) + 0 t n ( t n s ) α 1 f ( s ) d s ,
where R ( t n , v ) = t n α 2 Δ v if v D ( Δ ) and R ( t n , v ) = t n 2 v if v L 2 ( Ω ) . The constant C is independent of τ , α , n , N and f but may depend on θ.
Proof. 
The technique for this theorem is quite standard and is essentially and partially based on Lemma 5 and the following estimates on δ τ ( ζ ) , which can be found in [22].
| δ τ ( e z τ ) z | C τ 2 | z | 3 , | δ τ α ( e z τ ) z α | C τ 2 | z | 2 + α , C 1 | z | | δ τ ( e z τ ) | C 2 | z | .
We omitted the details here for reasons of space. □
Remark 5.
The error u u h of the space semi-discrete scheme (26) has been well studied by researchers and is not our main concern in this article. Interested readers can refer to [35] for more information.

5. Numerical Tests

Example 1.
In this example, we explore the stability of the numerical scheme (21):
j = 0 n ω n j ( U j U 0 ) = τ ¯ U n θ , n n 0 ,
for trial Equation (20) in which n 0 = 1 and the polynomial-type transformation is adopted and verify the sharpness of Λ θ in Theorem 2. Let λ = 1 , α = 0.5 and fix τ = 0.1 . The exact solution of (20) can be expressed by the Mittag–Leffler function [6] E α ( x ) : = j = 0 x j Γ ( j α + 1 ) , as u ( t ) = u 0 E α ( λ t α ) .
In Figure 1, we illustrate the asymptotic properties of numerical solutions obtained under different θ for different numerical methods. The solutions in the first column are obtained under the threshold values θ = 1 2 , 2 2 2 , 3 7 2 (see Table 1) where one can observe, for each case, that the amplitude is invariant as time passes. By taking a smaller value of θ than its threshold, as shown in the middle column of Figure, we obtain numerical solutions that are asymptotically stable in contrast to the unbounded ones demonstrated in the last column in which θ exceeds the threshold a bit.
Example 2.
For the subdiffusion Problem (25), let T = 1 . Depending on the smoothness of v, we consider two cases:
(i) f = 0 , v = sin x D ( Δ ) , Ω = ( 0 , π ) , with the exact solution u ( x , t ) = E α ( t α ) sin x ;
(ii) f = 0 , v = χ ( 0 , 1 / 2 ) , Ω = ( 0 , 1 ) .
In Table 2 and Table 3, we present the L 2 error and convergence rates for different α and θ for schemes (27) and (28), respectively. One observes that scheme (28) with correction terms results in optimal convergence rates while scheme (27) is of first-order accuracy except for θ = 0.5 , both of which are in line with our theoretical results.
Example 3.
We illustrate the robustness of (28) when α 0 for subdiffusion Problem (25). Let Ω = ( 0 , π ) , T = 1 and u ( x , t ) = ( E α ( t α ) + t 3 ) sin x such that v = sin x D ( Δ ) . The source term is f ( x , t ) = 6 t 3 α / Γ ( 4 α ) + t 3 sin x . In Figure 2a, we illustrate the L 2 error of scheme (28) for varying α under different θ = 0.5 , 0.1 , 0.4 , 0.8 . In particular, the cases θ = 0.1 and 0.4 of the scheme in [25] are also presented. Obviously, the scheme (28) is much more robust when α 0 than the scheme in [25].
It may seem weird that, in (18), the term ϕ ( t n θ ) is approximated by a nonlocal formula with coefficients θ j with j = 0 , 1 , , n . We note that θ j decays exponentially as plotted in Figure 2b, and in application, one can adopt only the first few values; e.g., the first 50 values will be sufficient to guarantee the accuracy.

6. Conclusions

A novel exponential-type transformation strategy is proposed to develop robust and accurate difference formulas for fractional derivatives by involving shifted parameter θ . The advantages of this novel strategy over the polynomial type transform methods are explored in detail. As an application, the well-known fractional BDF-2 is transformed under the novel strategy and is adopted in the subdiffusion problem. Rigorous arguments are carried out, showing that the resultant scheme can resolve the solution initial singularity quite naturally at the special point t n + 1 2 . The robustness for small α is also verified both theoretically and numerically.

Author Contributions

Conceptualization, B.Y.; methodology, B.Y.; software, B.Y.; validation, G.Z.; writing—original draft preparation, B.Y.; writing—review and editing, G.Z., Y.L. and H.L.; funding acquisition, G.Z., Y.L. and H.L. All authors have read and agreed to the published version of the manuscript.

Funding

This work is supported by the National Natural Science Foundation of China (12061053 and 12161063) and Natural Science Foundation of Inner Mongolia (2021BS01003, 2020MS01003, and 2021MS01018).

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Data Availability Statement

All data reported are obtained by the numerical schemes designed in this paper.

Acknowledgments

The authors are grateful to the editor and all the anonymous referees for their valuable comments, which greatly improved the presentation of the article.

Conflicts of Interest

The authors declare no conflict of interest. The funders had no role in the design of the study; in the collection, analyses, or interpretation of data; in the writing of the manuscript; or in the decision to publish the results.

Abbreviations

The following abbreviations are used in this manuscript:
CQConvolution quadrature;
SCQShifted convolution quadrature;
BDFBackward difference formula.

Appendix A

Appendix A.1.

Proof of Lemma 2.
Assumption (A2) indicates that 1 ϖ p ( ζ ) = ( 1 ζ ) α 1 ( ζ ) where 1 ( ζ ) is analytic on the closed unit disc; then, clearly ϖ n ( 1 ) = O ( n α 1 ) by the expansion of ( 1 ζ ) α . On the other hand, assumption (A1) implies the following:
τ α ϖ p ( e τ ) = 1 τ α ϖ p ( e τ ) = 1 + O ( τ p ) ,
which concludes the proof of the lemma. □

Appendix A.2.

Proof of Lemma 3.
(Step 1.) Since | τ α ϖ p ( e τ ) 1 | 0 as τ 0 , then the following is the case:
1 e τ τ α ( e τ ) 1 + 1 e τ τ α 1 0 ,
indicating that ( 1 ) = 1 . By expanding 1 ( ζ ) at ζ = 1 , one obtains the following:
1 ( ζ ) = 1 + ( 1 ζ ) [ c 1 + c 2 ( 1 ζ ) + ] = : 1 + ( 1 ζ ) ψ ( ζ ) ,
where ψ ( ζ ) is analytic at 1. Hence, we have the following:
1 ϖ p ( ζ ) = ( 1 ζ ) α + ( 1 ζ ) 1 α ψ ( ζ ) ,
requiring the following:
ϖ n ( 1 ) = a n + j = 0 n b n j ψ j ,
where ψ n are the coefficients of ψ ( ζ ) , and the following is the case.
a n : = ( 1 ) n α n = n α 1 Γ ( α ) [ 1 + O ( n 1 ) ] , b n : = ( 1 ) n 1 α n = n α 2 Γ ( α 1 ) [ 1 + O ( n 1 ) ] .
Note that (A1) implies the following:
ψ ( ζ ) = 1 ( ζ ) 1 1 ζ ,
which combined with the fact that 1 ( ζ ) 1 is analytic for | ζ | 1 leads to the analyticity of ψ ( ζ ) for | ζ | 1 . Hence, ψ n decays exponentially, meaning that n = 0 | ψ n | < . On the other hand, using the following inequality:
n = 0 | j = 0 n b n j ψ j | n = 0 | b n | n = 0 | ψ n | < ,
and combining (A2) and (A3), one immediately obtains the following.
n = 0 | ϖ n ( 1 ) n α 1 Γ ( α ) | n = 0 | a n n α 1 Γ ( α ) | + n = 0 | j = 0 n b n j ψ j | < .
(Step 2.) Replace n in (12) with k, multiply both sides by ϖ n k ( 1 ) and then sum k from n 0 to n to obtain the following.
k = n 0 n ϖ n k ( 1 ) j = 0 k ϖ k j ( U j U 0 ) = τ ¯ k = n 0 n ϖ n k ( 1 ) U k + 1 λ g k .
For the left-hand side of (A5), the following holds.
k = n 0 n ϖ n k ( 1 ) j = 0 k ϖ k j ( U j U 0 ) = k = 0 n ϖ n k ( 1 ) j = 0 k ϖ k j ( U j U 0 ) k = 0 n 0 1 ϖ n k ( 1 ) j = 0 k ϖ k j ( U j U 0 ) = U n U 0 j = 0 n 0 1 k = 0 n 0 1 j ϖ n k j ( 1 ) ϖ k ( U j U 0 ) .
For the right-hand side of (A5), we have the following.
τ ¯ k = n 0 n ϖ n k ( 1 ) U k + 1 λ g k = τ ¯ k = 0 n ϖ n k ( 1 ) U k τ ¯ k = 0 n 0 1 ϖ n k ( 1 ) U k + τ α k = n 0 n ϖ n k ( 1 ) g k .
Combining (A5)–(A7), one obtains the following:
U n = f n + τ ¯ k = 0 n ϖ n k ( 1 ) U k ,
where
f n = U 0 1 τ ¯ ϖ n ( 1 ) j = 1 n 0 1 k = 0 n 0 1 j ϖ n k j ( 1 ) ϖ k + j = 1 n 0 1 U j k = 0 n 0 1 j ϖ n k j ( 1 ) ϖ k τ ¯ ϖ n j ( 1 ) + τ α k = n 0 n ϖ n k ( 1 ) g k .
For fixed τ > 0 , since ϖ n = O ( n α 1 ) , ϖ n ( 1 ) = O ( n α 1 ) and g n decays exponentially, it holds that f n has finite limit as n . Meanwhile, by Lemma 2, (A8) actually is an approximation to (8) with convergence order p. In accordance with (10), the estimate (A4) indicates that stability region S is the following:
C { 1 / ϖ p ( 1 ) ( ζ ) : | ζ | 1 } = C { ϖ p ( ζ ) : | ζ | 1 } ,
which completes the proof of the lemma. □

Appendix A.3. Schur Polynomial

The polynomial Φ ( ζ ) of order k
Φ ( ζ ) = c k ζ k + c k 1 ζ k 1 + + c 1 ζ + c 0 , c k 0 , c 0 0 ,
is said to be a Schur polynomial if its roots ζ j satisfy | ζ j | < 1 , j = 1 , 2 , , k . Given Φ ( ζ ) , introduce the following polynomials:
Φ 0 ( ζ ) = c 0 * ζ k + c 1 * ζ k 1 + + c k 1 * ζ + c k * , Φ 1 ( ζ ) = 1 ζ Φ 0 ( 0 ) Φ ( ζ ) Φ ( 0 ) Φ 0 ( ζ ) ,
where c j * denotes the complex conjugate of c j .
Lemma A1.
Φ ( ζ ) is a Schur polynomial if and only if | Φ 0 ( 0 ) | > | Φ ( 0 ) | and Φ 1 ( ζ ) is a Schur polynomial.
To identify Λ θ in Theorem 2, one merely needs to require the polynomial ζ p 1 Θ ( 1 / ζ ; θ ) be a Schur polynomial, which by Lemma A1, a sequence of Schur polynomials with decreasing degrees are obtained, leading to Λ θ listed in Table 1.

References

  1. Jin, B.; Lazarov, R.; Zhou, Z. Numerical methods for time-fractional evolution equations with nonsmooth data: A concise overview. Comput. Methods Appl. Mech. Eng. 2019, 346, 332–358. [Google Scholar] [CrossRef]
  2. Metzler, R.; Klafter, J. The random walk’s guide to anomalous diffusion: A fractional dynamics approach. Phys. Rep. 2000, 339, 1–77. [Google Scholar] [CrossRef]
  3. Feng, L.; Turner, I.; Perré, P.; Burrage, K. An investigation of nonlinear time-fractional anomalous diffusion models for simulating transport processes in heterogeneous binary media. Commun. Nonlinear Sci. Numer. Simul. 2021, 92, 105454. [Google Scholar] [CrossRef]
  4. Povstenko, Y. Linear Fractional Diffusion-Wave Equation for Scientists and Engineers; Springer: Berlin/Heidelberg, Germany, 2015. [Google Scholar]
  5. Wyss, W. The fractional diffusion equation. J. Math. Phys. 1986, 27, 2782–2785. [Google Scholar] [CrossRef]
  6. Podlubny, I. Fractional Differential Equations: An Introduction to Fractional Derivatives, Fractional Differential Equations, to Methods of Their Solution and Some of Their Applications; Elsevier: Amsterdam, The Netherlands, 1998. [Google Scholar]
  7. Lin, Y.; Xu, C. Finite difference/spectral approximations for the time-fractional diffusion equation. J. Comput. Phys. 2007, 225, 1533–1552. [Google Scholar] [CrossRef]
  8. Sun, Z.Z.; Wu, X. A fully discrete difference scheme for a diffusion-wave system. Appl. Numer. Math. 2006, 56, 193–209. [Google Scholar] [CrossRef]
  9. Lubich, C. Discretized fractional calculus. SIAM J. Math. Anal. 1986, 17, 704–719. [Google Scholar] [CrossRef]
  10. Wang, Z.; Vong, S. Compact difference schemes for the modified anomalous fractional sub-diffusion equation and the fractional diffusion-wave equation. J. Comput. Phys. 2014, 277, 1–15. [Google Scholar] [CrossRef]
  11. Zeng, F.; Zhang, Z.; Karniadakis, G.E. Second-order numerical methods for multi-term fractional differential equations: Smooth and non-smooth solutions. Comput. Methods Appl. Mech. Eng. 2017, 327, 478–502. [Google Scholar] [CrossRef]
  12. Yin, B.; Liu, Y.; Li, H.; Zhang, Z. Two families of novel second-order fractional numerical formulas and their applications to fractional differential equations. arXiv 2019, arXiv:1906.01242. [Google Scholar]
  13. Meerschaert, M.M.; Tadjeran, C. Finite difference approximations for fractional advection–dispersion flow equations. J. Comput. Appl. Math. 2004, 172, 65–77. [Google Scholar] [CrossRef]
  14. Galeone, L.; Garrappa, R. Explicit methods for fractional differential equations and their stability properties. J. Comput. Appl. Math. 2009, 228, 548–560. [Google Scholar] [CrossRef]
  15. Tian, W.; Zhou, H.; Deng, W. A class of second order difference approximations for solving space fractional diffusion equations. Math. Comput. 2015, 84, 1703–1727. [Google Scholar] [CrossRef]
  16. Ding, H.; Li, C.; Yi, Q. A new second-order midpoint approximation formula for Riemann–Liouville derivative: Algorithm and its application. IMA J. Appl. Math. 2017, 82, 909–944. [Google Scholar] [CrossRef]
  17. Yin, B.; Liu, Y.; Li, H. Necessity of introducing non-integer shifted parameters by constructing high accuracy finite difference algorithms for a two-sided space-fractional advection–diffusion model. Appl. Math. Lett. 2020, 105, 106347. [Google Scholar] [CrossRef]
  18. Stynes, M. Too much regularity may force too much uniqueness. Fract. Calc. Appl. Anal. 2016, 19, 1554–1562. [Google Scholar] [CrossRef]
  19. Sakamoto, K.; Yamamoto, M. Initial value/boundary value problems for fractional diffusion-wave equations and applications to some inverse problems. J. Math. Anal. Appl. 2011, 382, 426–447. [Google Scholar] [CrossRef]
  20. Diethelm, K.; Garrappa, R.; Stynes, M. Good (and not so good) practices in computational methods for fractional calculus. Mathematics 2020, 8, 324. [Google Scholar] [CrossRef]
  21. Yan, Y.; Khan, M.; Ford, N.J. An analysis of the modified L1 scheme for time-fractional partial differential equations with nonsmooth data. SIAM J. Numer. Anal. 2018, 56, 210–227. [Google Scholar] [CrossRef]
  22. Jin, B.; Li, B.; Zhou, Z. Correction of high-order BDF convolution quadrature for fractional evolution equations. SIAM J. Sci. Comput. 2017, 39, A3129–A3152. [Google Scholar] [CrossRef]
  23. Jin, B.; Li, B.; Zhou, Z. An analysis of the Crank–Nicolson method for subdiffusion. IMA J. Numer. Anal. 2018, 38, 518–541. [Google Scholar] [CrossRef]
  24. Wang, J.; Wang, J.; Yin, L. A single-step correction scheme of Crank–Nicolson convolution quadrature for the subdiffusion equation. J. Sci. Comput. 2021, 87, 1–18. [Google Scholar] [CrossRef]
  25. Yin, B.; Liu, Y.; Li, H.; Zhang, Z. Efficient shifted fractional trapezoidal rule for subdiffusion problems with nonsmooth solutions on uniform meshes. BIT Numer. Math. 2022, 62, 631–666. [Google Scholar] [CrossRef]
  26. Liao, H.l.; McLean, W.; Zhang, J. A discrete gronwall inequality with applications to numerical schemes for subdiffusion problems. SIAM J. Numer. Anal. 2019, 57, 218–237. [Google Scholar] [CrossRef]
  27. Liao, H.L.; Li, D.; Zhang, J. Sharp error estimate of the nonuniform L1 formula for linear reaction-subdiffusion equations. SIAM J. Numer. Anal. 2018, 56, 1112–1133. [Google Scholar] [CrossRef]
  28. Liu, Y.; Yin, B.; Li, H.; Zhang, Z. The unified theory of shifted convolution quadrature for fractional calculus. J. Sci. Comput. 2021, 89, 1–24. [Google Scholar] [CrossRef]
  29. Lubich, C. Convolution quadrature and discretized operational calculus. I. Numer. Math. 1988, 52, 129–145. [Google Scholar] [CrossRef]
  30. Lubich, C. Convolution quadrature revisited. BIT Numer. Math. 2004, 44, 503–514. [Google Scholar] [CrossRef]
  31. Yin, B.; Liu, Y.; Li, H. A class of shifted high-order numerical methods for the fractional mobile/immobile transport equations. Appl. Math. Comput. 2020, 368, 124799. [Google Scholar] [CrossRef]
  32. Yin, B.; Liu, Y.; Li, H.; Zeng, F. A class of efficient time-stepping methods for multi-term time-fractional reaction-diffusion-wave equations. Appl. Numer. Math. 2021, 165, 56–82. [Google Scholar] [CrossRef]
  33. Lubich, C. A stability analysis of convolution quadrature for Abel-Volterra integral equations. IMA J. Numer. Anal. 1986, 6, 87–101. [Google Scholar] [CrossRef]
  34. Miller, J.J. On the location of zeros of certain classes of polynomials with applications to numerical analysis. IMA J. Appl. Math. 1971, 8, 397–406. [Google Scholar] [CrossRef]
  35. Jin, B.; Lazarov, R.; Zhou, Z. Error estimates for a semidiscrete finite element method for fractional order parabolic equations. SIAM J. Numer. Anal. 2013, 51, 445–466. [Google Scholar] [CrossRef]
Figure 1. Justification of the sharpness of Theorem 2 when using the polynomial-type transform function Θ ( ζ ; θ ) for Example 1. (ac): exact solution u ( t ) vs. numerical solution U n obtained by the transformed 2nd-order Newton–Gregory formula. (df): exact solution u ( t ) vs. numerical solution U n obtained by the transformed 3rd-order Newton–Gregory formula. (gi): exact solution u ( t ) vs. numerical solution U n obtained by the transformed fractional BDF-4.
Figure 1. Justification of the sharpness of Theorem 2 when using the polynomial-type transform function Θ ( ζ ; θ ) for Example 1. (ac): exact solution u ( t ) vs. numerical solution U n obtained by the transformed 2nd-order Newton–Gregory formula. (df): exact solution u ( t ) vs. numerical solution U n obtained by the transformed 3rd-order Newton–Gregory formula. (gi): exact solution u ( t ) vs. numerical solution U n obtained by the transformed fractional BDF-4.
Fractalfract 06 00417 g001aFractalfract 06 00417 g001b
Figure 2. For Example 3. (a) Comparison of L 2 error between our scheme and that in [25] for different α . (b) Exponential decay of the weights | θ n | defined in (18).
Figure 2. For Example 3. (a) Comparison of L 2 error between our scheme and that in [25] for different α . (b) Exponential decay of the weights | θ n | defined in (18).
Fractalfract 06 00417 g002
Table 1. Explicit form of Λ θ .
Table 1. Explicit form of Λ θ .
Order p234
Λ θ ( , 1 2 ) ( , 1 2 2 ) ( , 3 2 7 2 )
Table 2. L 2 error and convergence rates at time t = 0.5 of Example 2 (i).
Table 2. L 2 error and convergence rates at time t = 0.5 of Example 2 (i).
α θ Corrected Scheme (28)Standard Scheme (27)
τ = 2 5 τ = 2 6 τ = 2 7 τ = 2 8 Rates τ = 2 5 τ = 2 6 τ = 2 7 τ = 2 8 Rates
−0.94.33 × 10 6 3.10 × 10 6 6.92 × 10 7 1.62 × 10 7 2.097.50 × 10 4 3.91 × 10 4 1.96 × 10 4 9.82 × 10 5 1.00
0.1−0.51.86 × 10 6 8.76 × 10 7 2.65 × 10 7 7.13 × 10 8 1.891.86 × 10 6 8.76 × 10 7 2.65 × 10 7 7.13 × 10 8 1.89
0.51.47 × 10 4 3.43 × 10 5 8.27 × 10 6 2.02 × 10 6 2.032.02 × 10 3 9.97 × 10 4 4.95 × 10 4 2.47 × 10 4 1.01
0.92.53 × 10 4 5.78 × 10 5 1.38 × 10 5 3.37 × 10 6 2.032.87 × 10 3 1.41 × 10 3 6.95 × 10 4 3.46 × 10 4 1.01
−0.81.15 × 10 4 2.49 × 10 5 5.78 × 10 6 1.39 × 10 6 2.053.15 × 10 3 1.60 × 10 3 8.04 × 10 4 4.03 × 10 4 1.00
0.5−0.53.86 × 10 5 6.97 × 10 6 1.44 × 10 6 3.24 × 10 7 2.153.86 × 10 5 6.97 × 10 6 1.44 × 10 6 3.24 × 10 7 2.15
02.35 × 10 4 5.70 × 10 5 1.40 × 10 5 3.49 × 10 6 2.015.49 × 10 3 2.72 × 10 3 1.35 × 10 3 6.74 × 10 4 1.00
0.62.35 × 10 4 5.70 × 10 5 1.40 × 10 5 3.49 × 10 6 2.011.23 × 10 2 6.02 × 10 3 2.98 × 10 3 1.49 × 10 3 1.01
−0.52.35 × 10 4 5.70 × 10 5 1.40 × 10 5 3.49 × 10 6 2.013.05 × 10 4 7.23 × 10 5 1.76 × 10 5 4.35 × 10 6 2.02
0.9−0.21.28 × 10 4 2.95 × 10 5 7.10 × 10 6 1.74 × 10 6 2.036.78 × 10 3 3.30 × 10 3 1.63 × 10 3 8.10 × 10 4 1.01
0.33.56 × 10 4 8.65 × 10 5 2.14 × 10 5 5.31 × 10 6 2.011.78 × 10 2 8.72 × 10 3 4.33 × 10 3 2.15 × 10 3 1.01
0.67.64 × 10 4 1.84 × 10 4 4.51 × 10 5 1.12 × 10 5 2.012.44 × 10 2 1.20 × 10 2 5.95 × 10 3 2.96 × 10 3 1.01
Table 3. L 2 error and convergence rates at time t = 0.5 of Example 2 (ii).
Table 3. L 2 error and convergence rates at time t = 0.5 of Example 2 (ii).
α θ Corrected SchemeStandard Scheme
τ = 2 5 τ = 2 6 τ = 2 7 τ = 2 8 Rates τ = 2 5 τ = 2 6 τ = 2 7 τ = 2 8 Rates
0.2−0.52.68 × 10 6 7.74 × 10 7 2.03 × 10 7 5.14 × 10 8 1.982.68 × 10 6 7.74 × 10 7 2.03 × 10 7 5.14 × 10 8 1.98
−0.37.66 × 10 6 1.92 × 10 6 4.80 × 10 7 1.18 × 10 7 2.029.41 × 10 5 4.69 × 10 5 2.28 × 10 5 1.07 × 10 5 1.09
01.83 × 10 5 4.39 × 10 6 1.07 × 10 6 2.62 × 10 7 2.032.42 × 10 4 1.19 × 10 4 5.75 × 10 5 2.68 × 10 5 1.10
0.97.69 × 10 5 1.75 × 10 5 4.14 × 10 6 9.97 × 10 7 2.067.07 × 10 4 3.40 × 10 4 1.63 × 10 4 7.56 × 10 5 1.11
0.8−0.58.79 × 10 5 2.12 × 10 5 5.20 × 10 6 1.28 × 10 6 2.038.79 × 10 5 2.12 × 10 5 5.20 × 10 6 1.28 × 10 6 2.03
0.11.99 × 10 4 4.64 × 10 5 1.12 × 10 5 2.71 × 10 6 2.047.59 × 10 4 3.95 × 10 4 1.95 × 10 4 9.18 × 10 5 1.09
0.53.28 × 10 4 7.47 × 10 5 1.77 × 10 5 4.27 × 10 6 2.051.36 × 10 3 6.82 × 10 4 3.31 × 10 4 1.54 × 10 4 1.10
0.74.11 × 10 4 9.26 × 10 5 2.18 × 10 5 5.25 × 10 6 2.061.68 × 10 3 8.29 × 10 4 3.99 × 10 4 1.86 × 10 4 1.10
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Share and Cite

MDPI and ACS Style

Yin, B.; Zhang, G.; Liu, Y.; Li, H. The Construction of High-Order Robust Theta Methods with Applications in Subdiffusion Models. Fractal Fract. 2022, 6, 417. https://doi.org/10.3390/fractalfract6080417

AMA Style

Yin B, Zhang G, Liu Y, Li H. The Construction of High-Order Robust Theta Methods with Applications in Subdiffusion Models. Fractal and Fractional. 2022; 6(8):417. https://doi.org/10.3390/fractalfract6080417

Chicago/Turabian Style

Yin, Baoli, Guoyu Zhang, Yang Liu, and Hong Li. 2022. "The Construction of High-Order Robust Theta Methods with Applications in Subdiffusion Models" Fractal and Fractional 6, no. 8: 417. https://doi.org/10.3390/fractalfract6080417

Article Metrics

Back to TopTop