skip to main content
10.1145/800194.805865acmconferencesArticle/Chapter ViewAbstractPublication Pagesacm-national-conferenceConference Proceedingsconference-collections
Article
Free Access

The application of symbolic mathematics to a singular perturbation problem

Published:01 August 1972Publication History

ABSTRACT

A basic technique for the numerical solution of ordinary differential equations is to express them as a singular perturbation problem. However, computational studies indicate that the resultant matrix equations which must be solved are often highly ill-conditioned. In this paper a particular singular perturbation problem which was shown to be ill-conditioned using 8 numerical methods is solved by symbolic techniques. These techniques lead both to an analytic proof of the solution plus to the precise knowledge of the asymptotic behavior of the solution vector as it converges. The difficulties encountered in solving the problem symbolically are discussed. Then several conclusions are drawn about the merits of a symbolic versus a numeric approach when applied to the solution of linear systems. Finally some advice and warnings to both the user and the designer of symbol manipulation systems are given concerning their goals and expectations when large matrix equations are to be solved.

References

  1. 1.Collins, G.E., "The SAC-1 System: An Introduction and Survey", Proceedings of the Second Symbosium on Symbolic and Algebraic Manipulation, ACM, Los Angeles, March 1971. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. 2.Dorr, F.W., "The Numerical Solution of Singular Perturbations of Boundary Value Problems", SIAM Journal on Numerical Analysis, Vol. 7, No. 2, June 1970, pp. 281-313.Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. 3.Dorr, F.W., "An Example of Ill-Conditioning in the Numerical Solution of Singular Perturbation Problems", Mathematics of Computation, Vol. 25, No. 114, April 1971, pp. 271-283.Google ScholarGoogle ScholarCross RefCross Ref
  4. 4.Horowitz, E., "User Notes for the SAC-1 system at Cornell University", Computer Science Department, Ithaca, New York, 1970.Google ScholarGoogle Scholar
  5. 5.Knuth, D.E., The Art of Computer Programming, Vol. 1, Fundamental Algorithms, Addison Wesley, 1968. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. 6.McClellan, M.T., The Exact Solution of Systems of Linear Equations with Polynomial Coefficients, Ph.D. Thesis, University of Wisconsin, Sept. 1971.Google ScholarGoogle Scholar
  7. 7.O'Malley Jr., R.E., "Topics in Singular Perturbations", Advances in Mathematics, Vol. 2, 1968, pp. 364-470.Google ScholarGoogle ScholarCross RefCross Ref
  8. 8.Wasow, W., Asymptotic Expansions for Ordinary Differential Equations, Interscience, New York, 1965.Google ScholarGoogle Scholar
  9. 9.Zohar, S., "Toeplitz Matrix Inversion: The Algorithm of W. F. Trench", JACM, Vol. 16, No. 4, October 1969. Google ScholarGoogle ScholarDigital LibraryDigital Library

Recommendations

Comments

Login options

Check if you have access through your login credentials or your institution to get full access on this article.

Sign in
  • Published in

    cover image ACM Conferences
    ACM '72: Proceedings of the ACM annual conference - Volume 2
    August 1972
    530 pages
    ISBN:9781450374927
    DOI:10.1145/800194

    Copyright © 1972 ACM

    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    • Published: 1 August 1972

    Permissions

    Request permissions about this article.

    Request Permissions

    Check for updates

    Qualifiers

    • Article

PDF Format

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader