Order p | 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 | 11 |
No of conditions | 1 | 1 | 2 | 3 | 6 | 10 | 20 | 36 | 72 | 137 | 275 |
This paper investigates a novel multi-objective optimization framework for the multi-stage missile target allocation (M-MTA) problem, which also widely exists in other real-world complex systems. Specifically, a constrained model of M-MTA is built with the trade-off between minimizing the survivability of targets and minimizing the cost consumption of missiles. Moreover, a multi-objective optimization algorithm (NSGA-MTA) is proposed for M-MTA, where the hybrid encoding mechanism establishes the expression of the model and algorithm. Furthermore, rule-based initialization is developed to enhance the quality and searchability of feasible solutions. An efficient non-dominated sorting method is introduced into the framework as an effective search strategy. Besides, the genetic operators with the greedy mechanism and random repair strategy are involved in handling the constraints with maintaining diversity. The results of numerical experiments demonstrate that NSGA-MTA performs better in diversity and convergence than the excellent current algorithms in metrics and Pareto front obtained in 15 scenarios. Taguchi method is also adopted to verify the contribution of proposed strategies, and the results show that these strategies are practical and promotive to performance improvement.
Citation: Shiqi Zou, Xiaoping Shi, Shenmin Song. A multi-objective optimization framework with rule-based initialization for multi-stage missile target allocation[J]. Mathematical Biosciences and Engineering, 2023, 20(4): 7088-7112. doi: 10.3934/mbe.2023306
[1] | Zhongdi Cen, Jian Huang, Aimin Xu . A posteriori mesh method for a system of singularly perturbed initial value problems. AIMS Mathematics, 2022, 7(9): 16719-16732. doi: 10.3934/math.2022917 |
[2] | Lin Fan, Shunchu Li, Dongfeng Shao, Xueqian Fu, Pan Liu, Qinmin Gui . Elastic transformation method for solving the initial value problem of variable coefficient nonlinear ordinary differential equations. AIMS Mathematics, 2022, 7(7): 11972-11991. doi: 10.3934/math.2022667 |
[3] | Shuqin Zhang, Jie Wang, Lei Hu . On definition of solution of initial value problem for fractional differential equation of variable order. AIMS Mathematics, 2021, 6(7): 6845-6867. doi: 10.3934/math.2021401 |
[4] | Jean-Paul Chehab, Denys Dutykh . On time relaxed schemes and formulations for dispersive wave equations. AIMS Mathematics, 2019, 4(2): 254-278. doi: 10.3934/math.2019.2.254 |
[5] | Yu He, Jianing Yang, Theodore E. Simos, Charalampos Tsitouras . A novel class of Runge-Kutta-Nyström pairs sharing orders 8(6). AIMS Mathematics, 2024, 9(2): 4882-4895. doi: 10.3934/math.2024237 |
[6] | Jiadong Qiu, Danfu Han, Hao Zhou . A general conservative eighth-order compact finite difference scheme for the coupled Schrödinger-KdV equations. AIMS Mathematics, 2023, 8(5): 10596-10618. doi: 10.3934/math.2023538 |
[7] | Sara S. Alzaid, Pawan Kumar Shaw, Sunil Kumar . A numerical study of fractional population growth and nuclear decay model. AIMS Mathematics, 2022, 7(6): 11417-11442. doi: 10.3934/math.2022637 |
[8] | Daniel Clemente-López, Esteban Tlelo-Cuautle, Luis-Gerardo de la Fraga, José de Jesús Rangel-Magdaleno, Jesus Manuel Munoz-Pacheco . Poincaré maps for detecting chaos in fractional-order systems with hidden attractors for its Kaplan-Yorke dimension optimization. AIMS Mathematics, 2022, 7(4): 5871-5894. doi: 10.3934/math.2022326 |
[9] | Sen Ming, Xiaodong Wang, Xiongmei Fan, Xiao Wu . Blow-up of solutions for coupled wave equations with damping terms and derivative nonlinearities. AIMS Mathematics, 2024, 9(10): 26854-26876. doi: 10.3934/math.20241307 |
[10] | Huichol Choi, Kinam Sin, Sunae Pak, Kyongjin Sok, Sungryol So . Representation of solution of initial value problem for fuzzy linear multi-term fractional differential equation with continuous variable coefficient. AIMS Mathematics, 2019, 4(3): 613-625. doi: 10.3934/math.2019.3.613 |
This paper investigates a novel multi-objective optimization framework for the multi-stage missile target allocation (M-MTA) problem, which also widely exists in other real-world complex systems. Specifically, a constrained model of M-MTA is built with the trade-off between minimizing the survivability of targets and minimizing the cost consumption of missiles. Moreover, a multi-objective optimization algorithm (NSGA-MTA) is proposed for M-MTA, where the hybrid encoding mechanism establishes the expression of the model and algorithm. Furthermore, rule-based initialization is developed to enhance the quality and searchability of feasible solutions. An efficient non-dominated sorting method is introduced into the framework as an effective search strategy. Besides, the genetic operators with the greedy mechanism and random repair strategy are involved in handling the constraints with maintaining diversity. The results of numerical experiments demonstrate that NSGA-MTA performs better in diversity and convergence than the excellent current algorithms in metrics and Pareto front obtained in 15 scenarios. Taguchi method is also adopted to verify the contribution of proposed strategies, and the results show that these strategies are practical and promotive to performance improvement.
We are exploring the initial value problem (IVP) defined as:
z′′=f(t,z),z(t0)=z0,z′(t0)=z′0, | (1.1) |
where f:R×Rm⟶Rm and z0,z′0∈Rm. The above equation is widely applicable in various scientific and engineering contexts. Notably, Eq (1.1) lacks z′.
The Numerov method facilitates the numerical advancement of the solution from tk to tk+1=h+tk, a well-established approach for solving Eq (1.1). It is expressed as:
zk+1=2zk−zk−1+h212(fk+1+10fk+fk−1), |
where zk≈z(tk) and fk≈z′′n=f(tk,zk). Note that fk,zk∈Rm.
Hairer [1], Cash [2] and Chawla [3] introduced hybrid implicit Numerov-type methods (i.e., using non-mesh points) approximately 40–45 years ago. Addressing the P-stability property, crucial for handling stiff oscillatory problems, was the primary challenge then. Chawla [4] proposed the modified Numerov scheme, evaluated explicitly as follows:
v1=zk−1,v2=zk,v3=2zk−zk−1+h2f(tk,v2),zk+1−2zk+zk−1=112h2⋅(f(tk+1,v3)+10f(tk,v2)+f(tk−1,v1)), | (1.2) |
where h is a constant step length:
h=tk−tk−1=tk+1−tk=⋯=t1−t0. |
The vectors zk+1,zk, and zk−1 approximate z(tk+h),z(tk), and z(tk−h) respectively, while v1∈Rm,v2∈Rm, and v3∈Rm represent the stages (alternatively named: function evaluations) used by the method.
We utilize the information known at the mesh:
v1=zk−1,v2=zk. |
Since f(tk−1,v1) is computed in the previous step, only f(tk+1,v3) and f(tk,v2) need evaluation each step, resulting in only two function evaluations per step.
Tsitouras then introduced a Runge–Kutta–Nyström (RKN)-style method [5], significantly reducing the cost. Consequently, only four steps are required to create a sixth-order method, whereas previous implementations required six function evaluations (see [6]).
Subsequent to this, our group extensively investigated the topic. Tsitouras developed eighth-order methods with nine steps per step in [7]. Ninth-order methods were studied in [8]. Concurrently, a group of Spanish researchers conducted highly interesting work on the same topic [9,10,11].
In this study, we aim to present a new method for better addressing problems with periodic solutions. Traditionally, various properties from a simple test equation are fulfilled for this purpose. The novelty lies in training the available free parameters across a wide set of relevant problems. Differential evolution is employed for this training. It is anticipated that this methodology will yield a method better tuned for oscillatory problems.
For the numerical treatment of Eq (1.1) with higher-order algebraic methods, there exists a considerable demand. We can represent the independent variable t as one of the components of z (if necessary, add t′′=0 see [12, pg. 286] for details). Consequently, our focus, without loss of generality, lies on the autonomous system z′′=f(z). Subsequently, a hybrid Numerov method with s stages, as delineated in [7], may be expressed as:
zk+1=2zk−zk−1+h2⋅(w⊗Is)⋅f(v), v=(1+a)⊗zk−a⊗zk−1+h2⋅(D⊗Is)⋅f(v) | (2.1) |
where Is∈Rs×s represents the identity matrix, D∈Rs×s,wT∈Rs,a∈Rs denote the coefficient matrices of the method, and
1=[11⋯1]T∈Rs. |
To present the coefficients, we utilize the Butcher tableau [13,14],
aDw. |
The method described in (1.2) can be represented using matrices [8]. As the function evaluations are computed sequentially, these methods are explicit. Therefore, D represents a strictly lower triangular matrix. For the case when s=8, the method takes the following structure:
fk−1=f(tk−1,zk−1)fk=f(tk,zk)zα=a3zk−1+(1−a3)zk+h2(d31fk−1+ad2fk), fα=f(tk−a3h,zα),zβ=a4zk−1+(1−a4)zk+h2(d41fk−1+d42fk+d43fα),fβ=f(tk−a4h,zβ),zc=a5zk−1+(1−a5)zk+h2(d51fk−1+d52fk+d53fα+d54fβ),fc=f(tk−a5h,zc),zδ=a6zk−1+(1−a6)zk+h2(d61fk−1+d62fk+d63fα+d64fβ+d65fc),fδ=f(tk−a6h,zδ),ze=a7zk−1+(1−a7)zk+h2(d71fk−1+d72fk+d73fα+d74fβ+d75fc+d76fδ),fe=f(tk−a7h,ze),zg=a8zk−1+(1−a8)zk+h2(d81fk−1+d82fk+d83fα+d84fβ+d85fc+d86fδ+d87fe),zk+1=2zk−zk−1+h2(w1fk−1+w2fk+w3fα+w4fβ+w5fc+w6fδ+w7fe+w8fg). |
After assuming [15]
w3=0,w5=w4,w7=w6,w8=w1,a5=−a4,a6=−a7,a8=1, |
the associated matrices take the form
D=[0000000000000000d31d32000000d41d42d4300000d51d52d53d540000d61d62d63d64d65000d71d72d73d74d75d7600d81d82d83d84d85d86d870], |
w=[w1w20w4w4w6w6w1]anda=[−10a3a4−a4−a5a51]T. |
Given that fk−1 is determined from the preceding stage, seven function assessments are performed per step. To achieve an algebraic order eight, it is imperative to nullify the corresponding error truncation components (refer to [16]).
Our technique encompasses a total of 34 parameters. As noted earlier, there exist 27 coefficients for matrix D, denoted as
d31,d32,d41,d42,d43,⋯,d87. |
Moreover, there are 4 coefficients associated with vector w and 3 elements pertaining to vector a. The quantity of condition equations for various orders matches those of the RKN methods [17,18], as presented in Table 1. To attain an eighth order, a cumulative total of 1+1+2+3+6+10+20+36=79 equations must be fulfilled. The equations up to the ninth order can be found in assorted tables within [16].
Order p | 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 | 11 |
No of conditions | 1 | 1 | 2 | 3 | 6 | 10 | 20 | 36 | 72 | 137 | 275 |
The parameters are fewer than the equations, presenting a comparable challenge encountered in devising Runge-Kutta (RK) techniques. Hence, we are compelled to employ simplifying assumptions that diminish the quantity of conditions, thereby also decreasing the number of coefficients. The most prevalent options include
(D⋅1)(3−8)=12(a2+a)(3−8)(D⋅a)(3−8)=16(a3−a)(3−8)(D⋅a2)(4−8)=112(a4+a)(4−8) | (2.2) |
with
ai=[(−1)i0ai3ai4(−a4)i(−a5)iai51]T, |
and for κ1<κ2
(v)(κ1−κ2)=[vκ1vκ1+1⋯vκ2]T. |
The remaining order conditions are presented in Table 2. In this table, the symbol "*" can be interpreted as element-wise multiplication:
[u1u2⋯un]T∗[v1v2⋯vn]T=[u1v1u2v2⋯unnn]T. |
w⋅1=1, w⋅a2=16, | w⋅a4=115, | w⋅a6=128, |
w⋅D2⋅a=0, | w⋅D3⋅1=120160, | w⋅D⋅(a∗Dc)=−1115120, |
w⋅D3⋅a=0, | w⋅D⋅(a∗D2⋅1)=17560, | w⋅(a∗D2c)=1710080, |
w⋅(a∗D⋅(a∗D⋅a))=−1720, | w⋅(a∗D3⋅1)=2360480, | w⋅(D⋅1∗D2⋅a)=1720160. |
This operation holds lower precedence. Parentheses, exponents, and dot products are always computed prior to "*".
Given the thirteen order conditions outlined in Table 2 and the fulfillment of 17 assumptions (2.2), we determine that only thirty equations are necessary. This results in four coefficients remaining as variables. Let's consider a3,a4,a5, and d64. The issue can be resolved explicitly, and the corresponding efficient Mathematica [19] module is depicted in Table 3.
BeginPackage["Numerov8'"]; |
Clear["Numerov8'*"] |
Numerov8::usage = " Numerov8[x1, x2, x3, x4] for 7-stages 8-order explicit Numerov" |
Begin["'Private'"]; |
Clear["Numerov8'Private'*"]; |
Numerov8[aa3_?NumericQ, aa4_?NumericQ, aa5_?NumericQ, dd64_?NumericQ] := |
Module[{a3, a4, a5, w, w1, w2, w4, w6, w7, a, d, d31, d32, d41, d42, d43, |
d85, d54, d61, d63, d72, d74, d53, d51, d84, d62, d52, e, so, |
d87, d75, d64, d71, d81, d83, d85, d65, d73, d82, d86, d76}, |
w = {w1, w2, 0, w4, w4, w6, w6, w1}; |
a = {-1, 0, a3, a4, -a4, -a5, a5, 1}; |
d = {{0, 0, 0, 0, 0, 0, 0, 0}, |
{0, 0, 0, 0, 0, 0, 0, 0}, |
{d31, d32, 0, 0, 0, 0, 0, 0}, |
{d41, d42, d43, 0, 0, 0, 0, 0}, |
{d51, d52, d53, d54, 0, 0, 0, 0}, |
{d61, d62, d63, d64, d65, 0, 0, 0}, |
{d71, d72, d73, d74, d75, d76, 0, 0}, |
{d81, d82, d83, d84, d85, d86, d87, 0}}; |
e = {1, 1, 1, 1, 1, 1, 1, 1}; |
a3 = Rationalize[aa3, 10^-17]; a4 = Rationalize[aa4, 10^-17]; |
a5 = Rationalize[aa5, 10^-17]; d64 = Rationalize[dd64, 10^-17]; |
so = Solve[{-1 + w. e, -(1/12) + w. a^2/2, -(1/360) + w. a^4/24, |
-(1/20160) + w. a^6/720} == {0, 0, 0, 0}, {w1, w2, w4, w6}]; |
w = Simplify[w /. so[[1]]]; |
so = Solve[ |
Join[(d. e - 1/2*(a^2 + a))[[3;; 8]], (d. a - 1/6*(a^3 - a))[[3;; 8]], |
(d. a^2 - 1/12*(a^4 + a))[[4;; 8]], {w. d. d. a, |
w. d. d. d. e - 1/20160, w. d. (a d. a) + 11/15120, |
- w. d. d. d. a, w. d. (a d. d. e) + 1/7560, |
w. (a d. d. a) - 17/10080, w. (a d. (a d. a)) + 1/720, |
w. (a d. d. d. e) - 23/60480, w. (d. e d. d. a) - 17/20160}] |
== Array[0 &, 26], |
{d32, d31, d42, d41, d52, d51, d62, d61, d72, d71, d82, d81, d43, |
d53, d63, d73, d83, d54, d65, d74, d75, d76, d84, d85, d86, d87}]; |
d = Simplify[d /. so][[1]]; |
Return[{a, w, d}]] |
End[]; |
EndPackage[]; |
For comprehensive details regarding the computation of truncation error coefficients, refer to the comprehensive overview in [16]. Coleman [20] emphasized the utilization of the B2 series representation of the local truncation error, drawing connections with the T2 rooted trees.
In [21], the scalar test problem
z′′=−ω2z,ω∈R, | (3.1) |
was introduced to examine the periodic characteristics of techniques applied to solve (1.1).
Upon employing a Numerov-style approach akin to (2.1) to tackle problem (3.1), a discrete equation is formulated, taking the form
zk+1+S(ψ2)zk+P(ψ2)zk−1=0, | (3.2) |
where ψ=ωh, and S(ψ2),P(ψ2) represent polynomials in ψ2.
The periodicity interval (0,ψ0) encompasses all 0<ψ<ψ0 with P(ψ2)≡1 and 0<|S(ψ2)|<2. A method deemed P-stable exhibits ψ0=∞.
The fulfillment of the zero dissipation property necessitates that
P(ψ2)=1−ψ2w(Is+ψ2D)−1a≡1, |
ensuring that the numerical method approximating (3.1) remains within its cyclic orbit.
The dissipation order ρ of a method is characterized by the number for which 1−P(ψ2)=O(ψρ). It is worth noting that
P(ψ2)=1+∞∑j=0ψ2j+1w⋅Dj⋅a=1+ψq1+ψ3q3+⋯. |
A method with algebraic order 2⋅i satisfies the terms in the aforementioned series for j=0,1,⋯,i−1. Consequently, for an eighth order method, it is advantageous to address
q9=w⋅D4⋅a=0,q11=w⋅D5⋅a=0,⋯etc., |
to enhance the dissipation order. In the case of a zero-dissipative method, only q9=z11=q13=q15=q17=0 is necessary, and as for the lower triangular matrix D, all other q′-s vanish,
q2i+1=w⋅Di⋅a=0,fori>8. |
The difference in angles between the numerical and theoretical cyclic solution of (3.1) is called phase-lag. Since the solution of (3.1) is
z(t)=eωt√−1, |
we may write Eq (3.2) as
Λ=e2ψ√−1+S(ψ2)⋅eψ√−1+P(ψ2)=O(ψτ), | (3.3) |
with the number τ the phase-lag order of the method. Since
S(ψ2)=2−ψ2w⋅(I+ψ2D)−1⋅(1+a), |
we observe that expression (3.3) is a series of the form
Λ=∞∑i=1ψ2i(−1)i+1(i∑j=11(2(i−j))!w⋅Dj−1⋅(1+a)−w⋅Di−1⋅a−2i∑j=11(2j)!⋅(2(i−j))!), | (3.4) |
or in a compact form
Λ=ψ2λ2+ψ4λ4+ψ6λ6+O(ψ8). |
In this series, λ2=λ4=⋯=λ2i=0 for i=1,2,⋯,⌊p−12⌋+1, where p denotes the algebraic order of the method. For eighth order methods, the order conditions yield λ2=λ4=λ6=λ8=0. Given that p=8, and for i=3, we infer from (3.4):
λ6=1(2⋅(3−1))!w⋅(1+a)+12!w⋅D⋅(1+a)+w⋅D2⋅1−2⋅(12!4!+14!2!+16!0!)=0. |
In case of i=4, we get (observe already that w⋅1=1,w⋅c=0,w⋅D⋅c=0, etc.),
λ8=−12720160+1720(w⋅a+w⋅1)+124(w⋅D⋅a+w⋅D⋅1) |
+12(w⋅D2⋅a+w⋅D2⋅1)+w⋅D3⋅1=0. |
Further we have that,
λ10=w⋅D4⋅1−11814400, |
λ12=12w⋅D4⋅a+w⋅D5⋅1−1239500800, |
λ14=124w⋅D4⋅c+12w⋅D5⋅a+12w⋅D5⋅1+w⋅D6⋅1−2310897286400, |
λ16=1720w⋅D4⋅c+124w⋅d5⋅c+124w⋅D5⋅1 |
+12w⋅D6⋅c+12w⋅D6⋅1+w⋅D7⋅1−6473487131648000. |
Then we may ask for simultaneous satisfaction of phase-lag order conditions:
λ10=0,λ12=0,λ14=0,λ16=0. | (3.5) |
The set of four nonlinear equations (3.5) can be resolved to determine the four independent parameters. Our analysis reveals that the method exhibits a phase error on the order of O(ψ18), whereas the amplification error is O(ψ9). Consequently, the newly devised method demonstrates dissipative characteristics and lacks a periodicity interval.
The free parameters satisfying (3.5) in double precision are the following [15],
a3=0.870495922977052833,a4=−0.265579060733883584, |
a5=−1.11694341482497459,d64=−2.43624015403357971, |
and form the method N8ph18 that outperforms other methods in oscillatory problems.
Another noteworthy characteristic is P-stability [2,3]. In this context, it is essential to ensure σ≡1, while also meeting the condition
−2≤(2−ψ2w⋅(Is−ψ2D)−1⋅(1+a))≤2. |
Only implicit methods are capable of fulfilling these two criteria simultaneously.
From the aforementioned set, our aim is to create a specific hybrid Numerov-style approach. The resultant technique should excel when applied to challenges exhibiting oscillatory solutions. Therefore, we opt to evaluate the following scenarios for testing purposes.
z′′(x)=−μ2z(t),z(0)=1,z′(0)=0,t∈[0,10π], |
with the analytical solution z(t)=cos(μx). This scenario was tested using five distinct values of μ: specifically, μ=1,3,5,7,9. These numbers were chosen arbitrarily. Different choices will produce slightly different coefficients. Anyway, Differential Evolution is a metaheuristic method that produces random results in (hopefully) the direction of desired solutions. We may get thousands of results extremely close to each other. Consequently, we have five scenarios denoted as 1–5.
Our current project's primary framework is rooted in [22]. Upon selection of the independent parameters a3,a4,a5,d64, we establish a method termed NEW8. Each scenario undergoes four runs with varying step counts. For each run we evaluated the maximum global error geproblem,steps observed and we record the "accurate digits" i.e., −log10(geproblem,steps). The mean value r, computed over these 20 problems, serves as an efficacy metric to be optimized. To facilitate this optimization, we employ the differential evolution technique [23].
DE operates through iterative steps, where each iteration, or generation g, involves a "population" of individuals (a(g)3,i,a(g)4,i,a(g)5,i,d(g)64,i), i=1,2,⋯,N, with N denoting the population size. The initial population (a(0)3,i,a(0)4,i,a(0)5,i,d(0)64,i), i=1,2,⋯,N is randomly generated in the first step. Furthermore, we designate r as the fitness function, computed as the average precision over the 20 aforementioned runs. This fitness function is then assessed for each individual within the initial population. In every generation (iteration) g, a three-step sequential process updates all individuals involved, consisting of Differentiation, Crossover, and Selection.
We utilized MATLAB [24] software DeMat [25] for the implementation of the aforementioned technique. Indeed, notable enhancements were achieved through selection:
a3=0.9442042052877105,a4=0.4611624530665672,a5=−0.8575664014828354,d64=12.56127525577038. |
The coefficients of the new method in matrix forms are given below, which are suitable for double precision computations.
D=(0000000000000000130732317658168351162425931129044887300000015504301303446304204546529691503620−546856154811287000000−46437667980424298−95091815105485855613784899946911356−12906369987916670000−2384643161951946033−5551854734301857693−8620903922937779178979110577148247610304258074853918619000276746015103739989911310502356884076881867403621030099325−11393142131212843869−150014782512313274896071398108981421100−348994066631129559599−2911101496981237155877−449631141911183071678627264613553972419591427497962419695557411239701631671884409−19931375841240640), |
w=[−134157939231282746116004310849584420306071289125807465530607128912580746554260787989493731642607879894937316−1341579392312827], |
and
a=[−101987811512105277124336150294026523−433615029402652396673439112729975−966734391127299751]T. |
With this approach, we achieved a value of approximately r≈9.24, which demonstrates remarkable performance. In fact, numerous methods yielding r>9.1 were obtained, indicating the presence of a narrow range of parameter combinations a3,a4,a5,d64 where r reaches elevated levels. It is noteworthy that in the current configuration, the amplification differs from unity (σ≠1), and the phase lag is on the order of O(v8), implying ρ=O(v8), where ρ8≠0. Moreover, no specific property is satisfied under these conditions.
In Table 4 we present the results for the new method and the method N8ph18 presented in [15] that was especially formed for addressing oscillatory problems. For this latter method we observe a performance ρ≈7.82 which is much smaller.
Problem | Steps | NEW8 | N8ph18 |
1 | 20 | 7.5 | 6.6 |
40 | 11.2 | 9.4 | |
60 | 12.3 | 11.0 | |
80 | 13.3 | 12.1 | |
2 | 50 | 6.0 | 5.4 |
100 | 10.1 | 8.2 | |
150 | 11.2 | 9.8 | |
200 | 12.0 | 10.9 | |
3 | 80 | 5.6 | 5.0 |
130 | 8.2 | 7.0 | |
180 | 10.8 | 8.3 | |
230 | 12.0 | 9.2 | |
4 | 100 | 4.7 | 4.4 |
150 | 7.0 | 6.0 | |
200 | 8.6 | 7.2 | |
250 | 11.0 | 8.1 | |
5 | 150 | 5.5 | 4.9 |
225 | 7.7 | 6.6 | |
300 | 9.6 | 7.7 | |
375 | 10.3 | 8.6 |
The NEW8 method was designed to excel following multiple iterations on model scenarios. In the assessments outlined in Table 4, it was anticipated to outperform alternative methods for the specified intervals and step counts.
Hence, we aim to subject NEW8 to a distinct array of challenges, encompassing varying intervals and step counts. To this end, we re-evaluate problems 1–5 over an extended interval [0,20π]. These problems are now labeled as 1′,2′,⋯,5′. Additionally, we introduce two additional nonlinear problems and a wave equation to broaden the scope of evaluation. Specifically, we consider:
z′′(t)=−100z(t)+99sint,z(0)=1,z′(0)=11,t∈[0,20π], |
with the theoretical solution z(t)=cos(10t)+sin(10t)+sint.
Next, we choose the equation
z′′(t)=1500⋅cos(1.01t)−z(t)−z(t)3,z(0)=0.2004267280699011,z′(0)=0, |
with an approximate analytical solution given in [16],
z(t)≈{6⋅10−16cos(11.11t)+4.609⋅10−13cos(9.09t)+3.743495⋅10−10cos(7.07t)+3.040149839⋅10−7cos(5.05t)+2.469461432611⋅10−4cos(3.03t)+0.2001794775368452cos(1.01t)}. |
Finally, we consider the linearized wave equation, which is a rather large-scale problem [16],
ϑ2uϑt2=4ϑ2uϑx2+sint⋅cos(πxb), 0≤x≤b=100, t∈[0,20π],ϑuϑx(t,0)=ϑuϑx(t,b)=0,u(0,x)≡0, ϑuϑt(0,x)=b24π2−b2cosπxb, |
with the theoretical solution
u(t,x)=b24π2−b2⋅sint⋅cosπxb. | (5.1) |
We discretize ϑ2uϑx2 using fourth-order symmetric differences for internal points, while boundary points utilize one-sided differences of the same order (while considering the information about ϑuϑx at those points). This results in the following system:
[z′′0z′′1z′′N]=4(Δx)2[−415728−389−18257144−10374−291480−11243−5243−112⋱⋱⋱⋱⋱−11243−5243−1120148−2974−103257144−1889−38−41572]⋅[z0z1⋮zN]+sint⋅[cos(0⋅Δxb⋅π)cos(1⋅Δxb⋅π)⋮cos(N⋅Δxb⋅π)]. |
Here, z0,z1⋯zN may be understood as coordinates of z∈RN+1, and not as time steps. Upon selecting Δx=5, we establish a system with constant coefficients and N=20. The outcomes for this scenario were primarily influenced by the errors arising from the semi-discretization process. As a consequence, an error of about 10−6.1 is added constantly to the theoretical solution (5.1). Thus, no method can have a true error smaller than this. But, as shown in Table 5, our new method even though it has limited accuracy, is faster (i.e., uses fewer time steps) than N8ph18.
Problem | Steps | NEW8 | N8ph18 |
1′ | 40 | 7.2 | 6.3 |
80 | 10.9 | 9.1 | |
120 | 12.0 | 10.7 | |
160 | 12.9 | 11.8 | |
2′ | 100 | 5.7 | 5.1 |
200 | 9.8 | 7.9 | |
300 | 10.9 | 9.5 | |
400 | 11.7 | 10.6 | |
3′ | 160 | 5.2 | 4.7 |
260 | 7.9 | 6.7 | |
360 | 10.5 | 8.0 | |
460 | 12.0 | 8.9 | |
4′ | 200 | 4.4 | 4.1 |
300 | 6.7 | 5.7 | |
400 | 8.3 | 6.9 | |
500 | 10.7 | 7.8 | |
5′ | 300 | 5.2 | 4.6 |
450 | 7.4 | 6.2 | |
600 | 9.3 | 7.4 | |
750 | 10.0 | 8.3 | |
6 | 240 | 2.9 | 3.0 |
480 | 7.0 | 5.9 | |
720 | 10.1 | 7.5 | |
960 | 10.1 | 8.6 | |
7 | 100 | 4.8 | 4.9 |
200 | 7.7 | 7.3 | |
300 | 9.3 | 8.7 | |
400 | 10.4 | 9.7 | |
8 | 60 | 6.0 | 5.0 |
70 | 6.1 | 5.4 | |
80 | 6.1 | 5.8 | |
90 | 6.1 | 5.9 |
We execute these 8 scenarios with varying step counts and present the outcomes in Table 5. Notably, we also incorporate results obtained using the N8ph18 method. For economy and ease of reading the results, only the best methods of eighth order were tested on oscillatory problems. i.e., NEW8 and N8ph18. N8ph18 has already proven to outperform other 8th order methods [15,16]. It becomes evident from the table that NEW8 significantly outperforms all other methods documented in the literature. Overall, an improvement of nearly one decimal digit in accuracy was achieved.
The proposed method is constructed for application to second order Ordinary Differential Equations (ODEs) with oscillatory solutions. However, this is a rather wide category of problems that is constantly under the interest of respected scholars. As seen from problem 8 (wave equation), our method may also apply to a certain kind of partial differential equations sharing periodic solutions after proper transformation to system of ODEs.
The key aspects of our investigation were as follows:
● We explored a family of eighth-order hybrid two-step techniques characterized by minimal stage counts, with a notable innovation being the proposal of a methodology for selecting appropriate independent parameters.
● The parameters of the novel technique were determined following extensive evaluation of their performance across a diverse array of periodic scenarios.
● Optimal parameter selection was achieved through the application of the differential evolution approach. Across a broad spectrum of challenges featuring oscillatory solutions, the devised approach demonstrated significant superiority over methods belonging to both similar and disparate families.
● The method we introduced is finely calibrated for scenarios with periodic solutions, particularly those featuring substantial linear components.
Both authors of this article have been contributed equally. Both authors have read and approved the final version of the manuscript for publication.
The authors declare that no Artificial Intelligence (AI) tools were used in the creation of this article.
This work does not have any conflicts of interest.
[1] |
R. K. Ahuja, A. Kumar, K. C. Jha, J. B. Orlin, Exact and heuristic algorithms for the weapon-target assignment problem, Oper. Res., 55 (2007), 1136–1146. https://doi.org/10.1287/opre.1070.0440 doi: 10.1287/opre.1070.0440
![]() |
[2] |
W. Wei, R. Yang, H. Gu, W. Zhao, C. Chen, S. Wan, Multi-objective optimization for resource allocation in vehicular cloud computing networks, IEEE Trans. Intell. Transp. Syst., 23 (2021), 25536–25545. https://doi.org/10.1109/TITS.2021.3091321 doi: 10.1109/TITS.2021.3091321
![]() |
[3] |
X. Hao, N. Yao, L. Wang, J. Wang, Joint resource allocation algorithm based on multi-objective optimization for wireless sensor networks, Appl. Soft Comput., 94 (2020), 106470. https://doi.org/10.1016/j.asoc.2020.106470 doi: 10.1016/j.asoc.2020.106470
![]() |
[4] |
O. A. Ogbolumani, N. I. Nwulu, Multi-objective optimisation of constrained food-energy-water-nexus systems for sustainable resource allocation, Sustainable Energy Technol. Assess., 44 (2021), 100967. https://doi.org/10.1016/j.seta.2020.100967 doi: 10.1016/j.seta.2020.100967
![]() |
[5] | S. P. Lloyd, H. S. Witsenhausen, Weapons allocation is np-complete, in 1986 Summer Computer Simulation Conference, (1986), 1054–1058. |
[6] |
J. Li, B. Xin, P. M. Pardalos, J. Chen, Solving bi-objective uncertain stochastic resource allocation problems by the CVaR-based risk measure and decomposition-based multi-objective evolutionary algorithms, Ann. Oper. Res., 296 (2021), 639–666. https://doi.org/10.1007/s10479-019-03435-4 doi: 10.1007/s10479-019-03435-4
![]() |
[7] | P. A. Hosein, M. Athans, Preferential Defense Strategies, 1990. |
[8] |
B. Xin, J. Chen, J. Zhang, L. Dou, Z. Peng, Efficient decision makings for dynamic weapon-target assignment by virtual permutation and tabu search heuristics, IEEE Trans. Syst. Man Cyber. C, 40 (2010), 649–662. https://doi.org/10.1109/TSMCC.2010.2049261 doi: 10.1109/TSMCC.2010.2049261
![]() |
[9] |
X. Shi, S. Zou, S. Song, R. Guo, A multi-objective sparse evolutionary framework for large-scale weapon target assignment based on a reward strategy, J. Intell. Fuzzy Syst., 40 (2021), 10043–10061. https://doi.org/10.3233/JIFS-202679 doi: 10.3233/JIFS-202679
![]() |
[10] |
O. Karasakal, Air defense missile-target allocation models for a naval task group, Comput. Oper. Res., 35 (2008), 1759–1770. https://doi.org/10.1016/j.cor.2006.09.011 doi: 10.1016/j.cor.2006.09.011
![]() |
[11] |
A. G. Kline, D. K. Ahner, B. J. Lunday, Real-time heuristic algorithms for the static weapon target assignment problem, J. Heuristics, 25 (2019), 377–397. https://doi.org/10.1007/s10732-018-9401-1 doi: 10.1007/s10732-018-9401-1
![]() |
[12] |
A. G. Kline, D. K. Ahner, B. J. Lunday, A heuristic and metaheuristic approach to the static weapon target assignment problem, J. Global Optim., 78 (2020), 791–812. https://doi.org/10.1007/s10898-020-00938-4 doi: 10.1007/s10898-020-00938-4
![]() |
[13] |
G. denBroeder Jr, R. Ellison, L. Emerling, On optimum target assignments, Oper. Res., 7 (1959), 322–326. https://doi.org/10.1287/opre.7.3.322 doi: 10.1287/opre.7.3.322
![]() |
[14] |
Z. J. Lee, C. Y. Lee, S. F. Su, An immunity-based ant colony optimization algorithm for solving weapon–target assignment problem, Appl. Soft Comput., 2 (2002), 39–47. https://doi.org/10.1016/S1568-4946(02)00027-3 doi: 10.1016/S1568-4946(02)00027-3
![]() |
[15] |
C. M. Lai, T. H. Wu, Simplified swarm optimization with initialization scheme for dynamic weapon–target assignment problem, Appl. Soft Comput., 82 (2019), 105542. https://doi.org/10.1016/j.asoc.2019.105542 doi: 10.1016/j.asoc.2019.105542
![]() |
[16] |
Z. J. Lee, S. F. Su, C. Y. Lee, Efficiently solving general weapon-target assignment problem by genetic algorithms with greedy eugenics, IEEE Trans. Syst. Man Cyber. B, 33 (2003), 113–121. https://doi.org/10.1109/TSMCB.2003.808174 doi: 10.1109/TSMCB.2003.808174
![]() |
[17] |
T. Chang, D. Kong, N. Hao, K. Xu, G. Yang, Solving the dynamic weapon target assignment problem by an improved artificial bee colony algorithm with heuristic factor initialization, Appl. Soft Comput., 70 (2018), 845–863. https://doi.org/10.1016/j.asoc.2018.06.014 doi: 10.1016/j.asoc.2018.06.014
![]() |
[18] | L. Juan, C. Jie, X. Bin, Efficiently solving multi-objective dynamic weapon-target assignment problems by NSGA-II, in 2015 34th Chinese Control Conference (CCC), (2015), 2556–2561. https://doi.org/10.1109/ChiCC.2015.7260033 |
[19] | J. Li, J. Chen, B. Xin, L. Dou, Solving multi-objective multi-stage weapon target assignment problem via adaptive NSGA-II and adaptive MOEA/D: A comparison study, in 2015 IEEE Congress on Evolutionary Computation (CEC), (2015), 3132–3139. https://doi.org/10.1109/CEC.2015.7257280 |
[20] |
K. Deb, A. Pratap, S. Agarwal, T. Meyarivan, A fast and elitist multiobjective genetic algorithm: NSGA-II, IEEE Trans. Evol. Comput., 6 (2002), 182–197. https://doi.org/10.1109/4235.996017 doi: 10.1109/4235.996017
![]() |
[21] |
Q. Zhang, H. Li, MOEA/D: A multiobjective evolutionary algorithm based on decomposition, IEEE Trans. Evol. Comput., 11 (2007), 712–731. https://doi.org/10.1109/TEVC.2007.892759 doi: 10.1109/TEVC.2007.892759
![]() |
[22] |
N. Srinivas, K. Deb, Muiltiobjective optimization using nondominated sorting in genetic algorithms, Evol. Comput., 2 (1994), 221–248. https://doi.org/10.1162/evco.1994.2.3.221 doi: 10.1162/evco.1994.2.3.221
![]() |
[23] |
F. Sarro, F. Ferrucci, M. Harman, A. Manna, J. Ren, Adaptive multi-objective evolutionary algorithms for overtime planning in software projects, IEEE Trans. Software Eng., 43 (2017), 898–917. https://doi.org/10.1109/TSE.2017.2650914 doi: 10.1109/TSE.2017.2650914
![]() |
[24] |
P. Arumugam, E. Amankwah, A. Walker, C. Gerada, Design optimization of a short-term duty electrical machine for extreme environment, IEEE Trans. Ind. Electron., 64 (2017), 9784–9794. https://doi.org/10.1109/TIE.2017.2711555 doi: 10.1109/TIE.2017.2711555
![]() |
[25] |
J. Zhou, J. Sun, X. Zhou, T. Wei, M. Chen, S. Hu, et al., Resource management for improving soft-error and lifetime reliability of real-time mpsocs, IEEE Trans. Comput. Aided Design Integr. Circuits Syst., 38 (2019), 2215–2228. https://doi.org/10.1109/TCAD.2018.2883993 doi: 10.1109/TCAD.2018.2883993
![]() |
[26] |
X. Zhang, Y. Tian, R. Cheng, Y. Jin, An efficient approach to nondominated sorting for evolutionary multiobjective optimization, IEEE Trans. Evol. Comput., 19 (2014), 201–213. https://doi.org/10.1109/TEVC.2014.2308305 doi: 10.1109/TEVC.2014.2308305
![]() |
[27] |
J. Chen, B. Xin, Z. Peng, L. Dou, J. Zhang, Evolutionary decision-makings for the dynamic weapon-target assignment problem, Sci. China Ser. F Inf. Sci., 52 (2009), 2006. https://doi.org/10.1007/s11432-009-0190-x doi: 10.1007/s11432-009-0190-x
![]() |
[28] |
Y. Wang, B. Xin, J. Chen, An adaptive memetic algorithm for the joint allocation of heterogeneous stochastic resources, IEEE Trans. Cybern., 52 (2021), 11526–11538. https://doi.org/10.1109/TCYB.2021.3087363 doi: 10.1109/TCYB.2021.3087363
![]() |
[29] |
K. Deb, H. Jain, An evolutionary many-objective optimization algorithm using reference-point-based nondominated sorting approach, part i: Solving problems with box constraints, IEEE Trans. Evol. Comput., 18 (2013), 577–601. https://doi.org/10.1109/TEVC.2013.2281535 doi: 10.1109/TEVC.2013.2281535
![]() |
[30] |
K. Li, R. Chen, G. Fu, X. Yao, Two-archive evolutionary algorithm for constrained multiobjective optimization, IEEE Trans. Evol. Comput., 23 (2018), 303–315. https://doi.org/10.1109/TEVC.2018.2855411 doi: 10.1109/TEVC.2018.2855411
![]() |
[31] |
H. Jain, K. Deb, An evolutionary many-objective optimization algorithm using reference-point based nondominated sorting approach, part ii: Handling constraints and extending to an adaptive approach, IEEE Trans. Evol. Comput., 18 (2013), 602–622. https://doi.org/10.1109/TEVC.2013.2281534 doi: 10.1109/TEVC.2013.2281534
![]() |
[32] |
A. A. Ghanbari, H. Alaei, Meta-heuristic algorithms for resource management in crisis based on OWA approach, Appl. Intell., 51 (2021), 646–657. https://doi.org/10.1007/s10489-020-01808-y doi: 10.1007/s10489-020-01808-y
![]() |
[33] |
X. Wu, C. Chen, S. Ding, A modified moea/d algorithm for solving bi-objective multi-stage weapon-target assignment problem, IEEE Access, 9 (2021), 71832–71848. https://doi.org/10.1109/ACCESS.2021.3079152 doi: 10.1109/ACCESS.2021.3079152
![]() |
[34] |
C. A. C. Coello, N. C. Cortés, Solving multiobjective optimization problems using an artificial immune system, Genet. Program. Evol. Mach., 6 (2005), 163–190. https://doi.org/10.1007/s10710-005-6164-x doi: 10.1007/s10710-005-6164-x
![]() |
[35] | H. Ishibuchi, H. Masuda, Y. Nojima, Sensitivity of performance evaluation results by inverted generational distance to reference points, in 2016 IEEE Congress on Evolutionary Computation (CEC), (2016), 1107–1114. https://doi.org/10.1109/CEC.2016.7743912 |
[36] |
E. Zitzler, L. Thiele, Multiobjective evolutionary algorithms: A comparative case study and the strength pareto approach, IEEE Trans. Evol. Comput., 3 (1999), 257–271. https://doi.org/10.1109/4235.797969 doi: 10.1109/4235.797969
![]() |
[37] | K. Deb, S. Jain, Running performance metrics for evolutionary multi-objective optimization, in Proceedings of the Fourth Asia-Pacific Conference on Simulated Evolution and Learning (SEAL'02), (Singapore), (2002), 13–20. https://doi.org/10.1016/S1350-4789(02)80143-X |
[38] |
M. Srinivas, L. M. Patnaik, Adaptive probabilities of crossover and mutation in genetic algorithms, IEEE Trans. Syst. Man Cybern., 24 (1994), 656–667. https://doi.org/10.1109/21.286385 doi: 10.1109/21.286385
![]() |
[39] |
W. Xu, C. Chen, S. Ding, P. M. Pardalos, A bi-objective dynamic collaborative task assignment under uncertainty using modified MOEA/D with heuristic initialization, Expert Syst. Appl., 140 (2020), 112844. https://doi.org/10.1016/j.eswa.2019.112844 doi: 10.1016/j.eswa.2019.112844
![]() |
[40] |
I. Voutchkov, A. Keane, A. Bhaskar, T. M. Olsen, Weld sequence optimization: The use of surrogate models for solving sequential combinatorial problems, Comput. Methods Appl. Mech. Eng., 194 (2005), 3535–3551. https://doi.org/10.1155/IMRN.2005.3551 doi: 10.1155/IMRN.2005.3551
![]() |
[41] |
W. Luo, J. Lü, K. Liu, L. Chen, Learning-based policy optimization for adversarial missile-target assignment, IEEE Trans. Syst. Man Cybern. Syst., 52 (2021), 4426–4437. https://doi.org/10.1109/TSMC.2021.3096997 doi: 10.1109/TSMC.2021.3096997
![]() |
Order p | 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 | 11 |
No of conditions | 1 | 1 | 2 | 3 | 6 | 10 | 20 | 36 | 72 | 137 | 275 |
w⋅1=1, w⋅a2=16, | w⋅a4=115, | w⋅a6=128, |
w⋅D2⋅a=0, | w⋅D3⋅1=120160, | w⋅D⋅(a∗Dc)=−1115120, |
w⋅D3⋅a=0, | w⋅D⋅(a∗D2⋅1)=17560, | w⋅(a∗D2c)=1710080, |
w⋅(a∗D⋅(a∗D⋅a))=−1720, | w⋅(a∗D3⋅1)=2360480, | w⋅(D⋅1∗D2⋅a)=1720160. |
BeginPackage["Numerov8'"]; |
Clear["Numerov8'*"] |
Numerov8::usage = " Numerov8[x1, x2, x3, x4] for 7-stages 8-order explicit Numerov" |
Begin["'Private'"]; |
Clear["Numerov8'Private'*"]; |
Numerov8[aa3_?NumericQ, aa4_?NumericQ, aa5_?NumericQ, dd64_?NumericQ] := |
Module[{a3, a4, a5, w, w1, w2, w4, w6, w7, a, d, d31, d32, d41, d42, d43, |
d85, d54, d61, d63, d72, d74, d53, d51, d84, d62, d52, e, so, |
d87, d75, d64, d71, d81, d83, d85, d65, d73, d82, d86, d76}, |
w = {w1, w2, 0, w4, w4, w6, w6, w1}; |
a = {-1, 0, a3, a4, -a4, -a5, a5, 1}; |
d = {{0, 0, 0, 0, 0, 0, 0, 0}, |
{0, 0, 0, 0, 0, 0, 0, 0}, |
{d31, d32, 0, 0, 0, 0, 0, 0}, |
{d41, d42, d43, 0, 0, 0, 0, 0}, |
{d51, d52, d53, d54, 0, 0, 0, 0}, |
{d61, d62, d63, d64, d65, 0, 0, 0}, |
{d71, d72, d73, d74, d75, d76, 0, 0}, |
{d81, d82, d83, d84, d85, d86, d87, 0}}; |
e = {1, 1, 1, 1, 1, 1, 1, 1}; |
a3 = Rationalize[aa3, 10^-17]; a4 = Rationalize[aa4, 10^-17]; |
a5 = Rationalize[aa5, 10^-17]; d64 = Rationalize[dd64, 10^-17]; |
so = Solve[{-1 + w. e, -(1/12) + w. a^2/2, -(1/360) + w. a^4/24, |
-(1/20160) + w. a^6/720} == {0, 0, 0, 0}, {w1, w2, w4, w6}]; |
w = Simplify[w /. so[[1]]]; |
so = Solve[ |
Join[(d. e - 1/2*(a^2 + a))[[3;; 8]], (d. a - 1/6*(a^3 - a))[[3;; 8]], |
(d. a^2 - 1/12*(a^4 + a))[[4;; 8]], {w. d. d. a, |
w. d. d. d. e - 1/20160, w. d. (a d. a) + 11/15120, |
- w. d. d. d. a, w. d. (a d. d. e) + 1/7560, |
w. (a d. d. a) - 17/10080, w. (a d. (a d. a)) + 1/720, |
w. (a d. d. d. e) - 23/60480, w. (d. e d. d. a) - 17/20160}] |
== Array[0 &, 26], |
{d32, d31, d42, d41, d52, d51, d62, d61, d72, d71, d82, d81, d43, |
d53, d63, d73, d83, d54, d65, d74, d75, d76, d84, d85, d86, d87}]; |
d = Simplify[d /. so][[1]]; |
Return[{a, w, d}]] |
End[]; |
EndPackage[]; |
Problem | Steps | NEW8 | N8ph18 |
1 | 20 | 7.5 | 6.6 |
40 | 11.2 | 9.4 | |
60 | 12.3 | 11.0 | |
80 | 13.3 | 12.1 | |
2 | 50 | 6.0 | 5.4 |
100 | 10.1 | 8.2 | |
150 | 11.2 | 9.8 | |
200 | 12.0 | 10.9 | |
3 | 80 | 5.6 | 5.0 |
130 | 8.2 | 7.0 | |
180 | 10.8 | 8.3 | |
230 | 12.0 | 9.2 | |
4 | 100 | 4.7 | 4.4 |
150 | 7.0 | 6.0 | |
200 | 8.6 | 7.2 | |
250 | 11.0 | 8.1 | |
5 | 150 | 5.5 | 4.9 |
225 | 7.7 | 6.6 | |
300 | 9.6 | 7.7 | |
375 | 10.3 | 8.6 |
Problem | Steps | NEW8 | N8ph18 |
1′ | 40 | 7.2 | 6.3 |
80 | 10.9 | 9.1 | |
120 | 12.0 | 10.7 | |
160 | 12.9 | 11.8 | |
2′ | 100 | 5.7 | 5.1 |
200 | 9.8 | 7.9 | |
300 | 10.9 | 9.5 | |
400 | 11.7 | 10.6 | |
3′ | 160 | 5.2 | 4.7 |
260 | 7.9 | 6.7 | |
360 | 10.5 | 8.0 | |
460 | 12.0 | 8.9 | |
4′ | 200 | 4.4 | 4.1 |
300 | 6.7 | 5.7 | |
400 | 8.3 | 6.9 | |
500 | 10.7 | 7.8 | |
5′ | 300 | 5.2 | 4.6 |
450 | 7.4 | 6.2 | |
600 | 9.3 | 7.4 | |
750 | 10.0 | 8.3 | |
6 | 240 | 2.9 | 3.0 |
480 | 7.0 | 5.9 | |
720 | 10.1 | 7.5 | |
960 | 10.1 | 8.6 | |
7 | 100 | 4.8 | 4.9 |
200 | 7.7 | 7.3 | |
300 | 9.3 | 8.7 | |
400 | 10.4 | 9.7 | |
8 | 60 | 6.0 | 5.0 |
70 | 6.1 | 5.4 | |
80 | 6.1 | 5.8 | |
90 | 6.1 | 5.9 |
Order p | 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 | 11 |
No of conditions | 1 | 1 | 2 | 3 | 6 | 10 | 20 | 36 | 72 | 137 | 275 |
w⋅1=1, w⋅a2=16, | w⋅a4=115, | w⋅a6=128, |
w⋅D2⋅a=0, | w⋅D3⋅1=120160, | w⋅D⋅(a∗Dc)=−1115120, |
w⋅D3⋅a=0, | w⋅D⋅(a∗D2⋅1)=17560, | w⋅(a∗D2c)=1710080, |
w⋅(a∗D⋅(a∗D⋅a))=−1720, | w⋅(a∗D3⋅1)=2360480, | w⋅(D⋅1∗D2⋅a)=1720160. |
BeginPackage["Numerov8'"]; |
Clear["Numerov8'*"] |
Numerov8::usage = " Numerov8[x1, x2, x3, x4] for 7-stages 8-order explicit Numerov" |
Begin["'Private'"]; |
Clear["Numerov8'Private'*"]; |
Numerov8[aa3_?NumericQ, aa4_?NumericQ, aa5_?NumericQ, dd64_?NumericQ] := |
Module[{a3, a4, a5, w, w1, w2, w4, w6, w7, a, d, d31, d32, d41, d42, d43, |
d85, d54, d61, d63, d72, d74, d53, d51, d84, d62, d52, e, so, |
d87, d75, d64, d71, d81, d83, d85, d65, d73, d82, d86, d76}, |
w = {w1, w2, 0, w4, w4, w6, w6, w1}; |
a = {-1, 0, a3, a4, -a4, -a5, a5, 1}; |
d = {{0, 0, 0, 0, 0, 0, 0, 0}, |
{0, 0, 0, 0, 0, 0, 0, 0}, |
{d31, d32, 0, 0, 0, 0, 0, 0}, |
{d41, d42, d43, 0, 0, 0, 0, 0}, |
{d51, d52, d53, d54, 0, 0, 0, 0}, |
{d61, d62, d63, d64, d65, 0, 0, 0}, |
{d71, d72, d73, d74, d75, d76, 0, 0}, |
{d81, d82, d83, d84, d85, d86, d87, 0}}; |
e = {1, 1, 1, 1, 1, 1, 1, 1}; |
a3 = Rationalize[aa3, 10^-17]; a4 = Rationalize[aa4, 10^-17]; |
a5 = Rationalize[aa5, 10^-17]; d64 = Rationalize[dd64, 10^-17]; |
so = Solve[{-1 + w. e, -(1/12) + w. a^2/2, -(1/360) + w. a^4/24, |
-(1/20160) + w. a^6/720} == {0, 0, 0, 0}, {w1, w2, w4, w6}]; |
w = Simplify[w /. so[[1]]]; |
so = Solve[ |
Join[(d. e - 1/2*(a^2 + a))[[3;; 8]], (d. a - 1/6*(a^3 - a))[[3;; 8]], |
(d. a^2 - 1/12*(a^4 + a))[[4;; 8]], {w. d. d. a, |
w. d. d. d. e - 1/20160, w. d. (a d. a) + 11/15120, |
- w. d. d. d. a, w. d. (a d. d. e) + 1/7560, |
w. (a d. d. a) - 17/10080, w. (a d. (a d. a)) + 1/720, |
w. (a d. d. d. e) - 23/60480, w. (d. e d. d. a) - 17/20160}] |
== Array[0 &, 26], |
{d32, d31, d42, d41, d52, d51, d62, d61, d72, d71, d82, d81, d43, |
d53, d63, d73, d83, d54, d65, d74, d75, d76, d84, d85, d86, d87}]; |
d = Simplify[d /. so][[1]]; |
Return[{a, w, d}]] |
End[]; |
EndPackage[]; |
Problem | Steps | NEW8 | N8ph18 |
1 | 20 | 7.5 | 6.6 |
40 | 11.2 | 9.4 | |
60 | 12.3 | 11.0 | |
80 | 13.3 | 12.1 | |
2 | 50 | 6.0 | 5.4 |
100 | 10.1 | 8.2 | |
150 | 11.2 | 9.8 | |
200 | 12.0 | 10.9 | |
3 | 80 | 5.6 | 5.0 |
130 | 8.2 | 7.0 | |
180 | 10.8 | 8.3 | |
230 | 12.0 | 9.2 | |
4 | 100 | 4.7 | 4.4 |
150 | 7.0 | 6.0 | |
200 | 8.6 | 7.2 | |
250 | 11.0 | 8.1 | |
5 | 150 | 5.5 | 4.9 |
225 | 7.7 | 6.6 | |
300 | 9.6 | 7.7 | |
375 | 10.3 | 8.6 |
Problem | Steps | NEW8 | N8ph18 |
1′ | 40 | 7.2 | 6.3 |
80 | 10.9 | 9.1 | |
120 | 12.0 | 10.7 | |
160 | 12.9 | 11.8 | |
2′ | 100 | 5.7 | 5.1 |
200 | 9.8 | 7.9 | |
300 | 10.9 | 9.5 | |
400 | 11.7 | 10.6 | |
3′ | 160 | 5.2 | 4.7 |
260 | 7.9 | 6.7 | |
360 | 10.5 | 8.0 | |
460 | 12.0 | 8.9 | |
4′ | 200 | 4.4 | 4.1 |
300 | 6.7 | 5.7 | |
400 | 8.3 | 6.9 | |
500 | 10.7 | 7.8 | |
5′ | 300 | 5.2 | 4.6 |
450 | 7.4 | 6.2 | |
600 | 9.3 | 7.4 | |
750 | 10.0 | 8.3 | |
6 | 240 | 2.9 | 3.0 |
480 | 7.0 | 5.9 | |
720 | 10.1 | 7.5 | |
960 | 10.1 | 8.6 | |
7 | 100 | 4.8 | 4.9 |
200 | 7.7 | 7.3 | |
300 | 9.3 | 8.7 | |
400 | 10.4 | 9.7 | |
8 | 60 | 6.0 | 5.0 |
70 | 6.1 | 5.4 | |
80 | 6.1 | 5.8 | |
90 | 6.1 | 5.9 |