- Research
- Open access
- Published:

# A uniformly valid approximation algorithm for nonlinear ordinary singular perturbation problems with boundary layer solutions

*SpringerPlus*
**volume 5**, Article number: 280 (2016)

## Abstract

This paper is concerned with two-point boundary value problems for singularly perturbed nonlinear ordinary differential equations. The case when the solution only has one boundary layer is examined. An efficient method so called Successive Complementary Expansion Method (SCEM) is used to obtain uniformly valid approximations to this kind of solutions. Four test problems are considered to check the efficiency and accuracy of the proposed method. The numerical results are found in good agreement with exact and existing solutions in literature. The results confirm that SCEM has a superiority over other existing methods in terms of easy-applicability and effectiveness.

## Background

Nonlinear problems have always been more attractive than linear ones for scientists. The main reason for this is that almost all natural phenomena in nature lead us to nonlinear models to describe them. In these models, finding exact solutions are quite difficult or sometimes impossible. Because of this reason, it is needed to get at least an approximate solution to these types of problems by certain methods.

Singularly perturbed problems occurs frequently in electrical systems, celestial mechanics, particle physics, quantum mechanics, (semi/super) conductor systems, fluid mechanics, thermal processes and in chemical/biochemical reactions (Kumar 2011). These problems are characterized by the presence of a very small positive parameter \(0< \varepsilon \ll 1\) that multiplies the highest order derivative term in the differential equation. This small parameter is known as *singular perturbation parameter*. In the case of \(\varepsilon =0\), problem is called as *reduced problem* since the order of the differential equation reduces. Consider the general form of a singularly perturbed nonlinear second-order ordinary differential equation

subject to boundary condions

It is a well established fact that a nonlinear second-order two-point boundary value problem (1–2) with small parameter plays a critical role in nonlinear physics. Also it is of great practical interest to study this nonlinear phenomena. Singular perturbation problems and the methods used to tackle them are very important concepts because of their mathematical properties, physical meanings and applications in engineering sciences. We refer the reader to consult the reference Kumar (2011) for more detailed information and some significant examples.

The first study in the perturbation theory was presented by Prandtl (1905). But, the term *singular perturbation* was used for the first time by Friedrichs and Wasow (1946). Scientists have paid great attention for this theory for more than a century. After the first studies, a number of excellent books were published such as O’Malley (1974), Bender and Orszag (1978), Kevorkian and Cole (1981), Eckhaus (1973), Eckhaus (1979), Lagerstrom (1988), Hinch (1991), Van Dyke (1975), Johnson (2006), Verhulst (2006), Holmes (1995) and Roos et al. (1996). Thanks to these great books and the other works, today we have certain *traditional asymptotic methods*. Some of them are the Method of Matched Asymptotic Expansions (MMAE), the Method of Multiple-scale Analysis, the Periodic Averaging Method, the Method of Wentzel–Kramers–Brillouin (WKB) Approximation and the Method of Strained Coordinates.

Towards the end of 1980s, various methods, apart from the traditional asymptotic methods, began to appear. In those years Kadalbajoo, Reddy, Jiwari et al. conducted so many significant studies such as Kadalbajoo et al. (1987), Kadalbajoo and Reddy (1987), Chawla and Katti (1982), Mo (1993), Kadalbajoo and Patidar (2003), Kadalbajoo and Gupta (2010), Mittal and Jiwari (2011), Sharma et al. (2012a) and Sharma et al. (2012b). In 2003, Kadalbajoo and Patidar made a detailed survey of singular perturbation problems in partial differential equations (PDEs) (Kadalbajoo and Patidar 2003). In 2010, Kadalbajoo and Gupta in their study Kadalbajoo and Gupta (2010) made a great survey on the numerical methods for singularly perturbed problems. In 2011, Parul studied the traditional methods to solve this kind of problems and gave important examples occuring in engineering and science (Kumar 2011, 2011). In 2012, Roos made a survey, particularly of singularly perturbed convection–reaction–diffusion problems covering the years 2008–2012 (Roos 2012). In the mean time, a number of intriguing numerical methods were presented such as Reproducing Kernel Method (Cui and Geng 2007; Geng and Cui 2007; Geng 2011; Geng and Cui 2011; Li et al. 2012), Variational Iteration Method (Kumar and Mishra 2014), Haar Wavelet Approach (Pandit and Kumar 2014). We must state that there are so many various methods and the above-mentioned methods are just some of them.

In this paper, we study on an efficient asymptotic method called SCEM that generates uniformly valid approximations (UVA) to the solution of singularly perturbed nonlinear boundary value problems. Applying the present method, we are able to get rid of tedious matching procedure of MMAE. We propose a UVA at the first step and then seek appropriate approximations called outer approximation and complementary approximations such that the resulting successive approximations satisfy the boundary conditions exactly.

The paper is organized as follows: “About asymptotic expansions” section gives a brief description of the asymptotic expansions. The overview of SCEM is given in “Successive Complementary Expansion Method” section. In “Numerical examples” section, we consider four numerical problems for comparison with existing methods. The conclusion is given in the last section.

## About asymptotic expansions

In this section, we briefly review the basic concepts of asymptotic approximation theory.

The limit process is fundamental tool of mathematical analysis. It is defined for a given real continuous function *f*: given any \(\delta >0\) there exists a number \(n_{0}\left( \delta \right)\) such that \(\left| f\left( x\right) -f\right| <\delta\) for any \(n\eqslantgtr n_{0}\left( \delta \right) .\) This definition gives information about the behavior of the function *f* as \(x\rightarrow a,\) but not about how. Therefore, asymptotic approximation theory requires another definition that enables us to describe the behavior of functions and compare them in a more precise way under the limit process: Bachmann–Landau notations. Consider real and continuous functions \(f\left( \varepsilon \right)\) and \(g\left( \varepsilon \right) ,\) where \(0<\varepsilon \le \varepsilon _{0}\ll 1.\)
\(f\left( \varepsilon \right) =O\left( g\left( \varepsilon \right) \right) ,\)
\(\varepsilon \rightarrow 0\) if there exist positive constants *K* and \(\varepsilon _{0}\) such that \(\left| f\left( \varepsilon \right) \right| \le K\left| g\left( \varepsilon \right) \right|\) for \(\varepsilon \rightarrow 0\) in \(\left( 0,\varepsilon _{0}\right] .\)
\(f\left( \varepsilon \right) =o\left( g\left( \varepsilon \right) \right) ,\) for \(\varepsilon \rightarrow 0\) if \({\lim\nolimits_{\varepsilon \rightarrow 0}}\frac{f\left( \varepsilon \right) }{g\left( \varepsilon \right) }=0\). \(f\left( \varepsilon \right)\) and \(g\left( \varepsilon \right)\) are said to be asymptotically equivalent, \(f\left( \varepsilon \right) \approx g\left( \varepsilon \right)\) as \(\varepsilon \rightarrow 0\) if \(f\left( \varepsilon \right) =O\left( g\left( \varepsilon \right) \right)\) and \(g\left( \varepsilon \right) =O\left( f\left( \varepsilon \right) \right)\) for \(\varepsilon \rightarrow 0\). \(f\left( \varepsilon \right) =O_{S}\left( g\left( \varepsilon \right) \right)\) if \(f\left( \varepsilon \right) =O\left( g\left( \varepsilon \right) \right)\) and \(f\left( \varepsilon \right) \ne o\left( g\left( \varepsilon \right) \right)\) for \(\varepsilon \rightarrow 0\). Here the subscript *S* denotes *sharp estimate*. Now consider a sequence of functions \(\left\{ \phi _{n+1}\right\}\), \(n=0,1, \ldots\) . Such a sequence is an *asymptotic sequence* if \(\phi _{n+1}\left( \varepsilon \right) =o\left( \phi _{n}\left( \varepsilon \right) \right)\) for \(\varepsilon \rightarrow 0\) and \(n=0,1, \ldots\) Let \(y\left( x,\varepsilon \right)\) be defined in some domain \(\Omega\) of *x* and some neighborhood of \(\varepsilon =0\). The series

is called *regular asymptotic expansion (Poincaré expansion)* of \(y\left( x,\varepsilon \right)\) as \(\varepsilon \rightarrow 0\) if the condition

is satisfied. And *generalized asymptotic expansions* are defined as

Interesting cases occur when the function \(y\left( x,\varepsilon \right)\) is not regular in \(\Omega\), so expansion (3) is uniformly valid only in a restricted region \(\Omega _{0}\)
\(\in\)
\(\Omega\) that is called *outer region*. In this case, the asymptotic expansion that is valid in outer region is often called *outer expansion* and (3) can be given as

where \(\phi _{i}^{\left( 0\right) }\left( \varepsilon \right)\) is an asymptotic sequence and the special operator \(E_{0}\) called the *outer expansion operator* at a given order \(\phi \left( \varepsilon \right) .\)

On the other hand, we encounter with a singular perturbation problem and we must introduce boundary layer domains. Here, in the simplest case (we assume that the problem has boundary layer near the origin \(x=0\)), we introduce an *inner region* which can be formally denoted \(\Omega _{1}=\Omega -\Omega _{0}\) and located near the origin. The boundary layer variable is \({\overline{x}}=\frac{x}{\xi (\varepsilon )}\), \(\xi (\varepsilon )\) being the order of thickness of this boundary layer. If a regular expansion can be constructed in \(\Omega _{1}\), we can write

This *inner expansion operator*
\(E_{1}\) is defined in \(\Omega _{1}\) at the same order \(\phi \left( \varepsilon \right)\) as the outer expansion operator \(E_{0};\) thus, \(y\left( x,\varepsilon \right) -E_{1}y\left( x,\varepsilon \right) =o(\phi \left( \varepsilon \right) )\) and so

is clearly uniformly valid approximation to order \(\delta \left( \varepsilon \right)\) satisfying the *modified Van Dyke principle (MVDP)*
\(E_{1}E_{0}y\left( x,\varepsilon \right) =E_{0}E_{1}y\left( x,\varepsilon \right)\). This is the main idea underlying the method of matched asymptotic expansions (MMAE). We know that MMAE which has been designed for finding uniformly valid approximations to singularly perturbed boundary value problems is a powerful mathematical technique. It is based on finding two different approximations for different two regions, which are called as inner region (where the solution exhibits rapid changes) and outer region (which is far from the inner region). In the last step, these two approximations are matched using the limit process to obtain a uniformly valid approximation. For more details we refer the reader to O’Malley (1974), Bender and Orszag (1978), Kevorkian and Cole (1981), Eckhaus (1973), Eckhaus (1979), Lagerstrom (1988), Hinch (1991), Van Dyke (1975), Johnson (2006), Verhulst (2006), Mauss and Cousteix (2002), Cousteix and Mauss (2004), Cousteix and Mauss (2009), Cathalifaud et al. (2010) and Nayfeh (1973).

## Successive Complementary Expansion Method

Sometimes the matching procedure in MMAE can be tedious or impossible. Therefore, we wish to present and examine an efficient asymptotic method named as *successive complementary expansion method*, which is designed by French scientists J. Mauss and J. Cousteix in order to obtain uniformly valid approximations to the boundary layer problems occur in fluid mechanics in Mauss and Cousteix (2002). In SCEM, instead of finding two different approximations to match later, a uniformly valid approximation that exactly satisfies the boundary conditions is proposed at the first step. So, thanks to the SCEM we will not be in need of any matching procedure. We can not ignore the fact that SCEM is not the first method which does not require any matching procedure. For instance, the WKB method and the Method of Multiple-scale Analysis also do not require any matching procedure (Cousteix and Mauss 2004). But their applicabilities are restricted to some certain problems. The uniformly valid SCEM approximation is in the regular form given as follows

where \(\delta _{i}\left( \varepsilon \right)\) is an asymptotic sequence and \(\Psi _{i}({\overline{x}})\) are the complementary approximation functions that depends on \({\overline{x}}\). Functions \(y_{i}(x)\) are the outer approximations that have been found by MMAE and they only depend on *x*, not also on \(\varepsilon\). In its regular form, SCEM is equivalent to MMAE. If the functions \(y_{i}(x)\) and \(\Psi _{i}({\overline{x}})\) also depend on \(\varepsilon\), the uniformly valid SCEM approximation is named as *generalized SCEM approximation* and given in the following form (Cousteix and Mauss 2007; Mauss and Cousteix 2002; Cousteix and Mauss 2009)

with

The sequence of order functions \(\delta _{i}\left( \varepsilon \right)\) may or not be same with \(\overline{\delta }_{i}\left( \varepsilon \right) .\) If only one-term SCEM approximation is desired, then one seeks a uniformly valid SCEM approximation in the form of

To improve the accuracy of SCEM approximation, the first SCEM approximation can be iterated using (7). It means that successive complementary terms will be add to the approximation. To this end, second SCEM approximation will be sought in the form of

In Cousteix and Mauss (2007), error estimates for first and second SCEM approximations are given as \(\left| y-y_{0}^{scem}\right| <\varepsilon K_{0}\) and \(\left| y-y_{1}^{scem}\right| <\varepsilon ^{2}K_{1},\) where \(K_{0}\) and \(K_{1}\) are positive constants independent of \(\varepsilon\) and *y* is the exact solution of the problem.

## Numerical examples

In this section, we present four numerical experiments to show the efficiency and the robustness of the proposed method. All the numerical calculations are performed using Shampine et al. (2000).

###
*Example 1*

Consider the singular perturbation problem

subject to boundary conditions

This problem has a boundary layer near the point \(x=0\) and uniformly valid asymptotic approximation is given as follows in Bender and Orszag (1978)

To obtain SCEM approximation for \(n=0\) (first-term approximation) of (8–9), we seek an approximation in the form of

For \(\varepsilon =0\), Eq. (8) yields

and we have the outer solution as follows

Now we look for a uniformly valid SCEM approximation in the form of

where \({\overline{x}}=\frac{x}{\varepsilon }\). Substituting (14) into the Eq. (8) and balancing the terms with respect to the powers of parameter \(\varepsilon\) yields

and consequently, applying the balancing procedure we have

with the boundary conditions

Then,

is the first term of the SCEM approximation.

The numerical results of the problem are shown in Tables 1, 2 and in Figs. 1, 2. We deliberately choose the node points as possible as near the boundary layer (for this problem, near the point \(x=0\)) in order to see efficiency of the method.

###
*Example 2*

Consider the second singular perturbation problem given in O’Malley (1974)

subject to boundary conditions

and with the exact solution

This problem has boundary layer near the point \(x=-1.\)

In Table 3 and Figs. 3, 4 we deliberately choose the node points as possible as near the boundary layer (for this problem, near the point \(x=-1\)) in order to see efficiency of the method.

###
*Example 3*

Consider the following singular perturbation problem given in O’Malley (1974)

with the boundary conditions

and with the asymptotic solution

This problem has boundary layer near the point \(x=0\).

In Tables 4, 5 and Figs. 5, 6, 7 we deliberately choose the node points as possible as near the boundary layer (for this problem, near the point \(x=0\)) in order to see efficiency of the method.

###
*Example 4*

As the last example, let us consider the singular perturbation problem given in Kevorkian and Cole (1981)

with the boundary conditions

This problem has boundary layer near the point \(x=0\) and the uniformly valid approximation is given in Kevorkian and Cole (1981) as

where \(c_{1}=2.9995\) and \(c_{2}=\frac{1}{c_{1}}\ln \left[ \frac{c_{1}-1}{ c_{1}+1}\right]\).

In Tables 6, 7 and Figs. 8, 9 we deliberately choose the node points as possible as near the boundary layer (for this problem, near the point \(x=0\)) in order to see efficiency of the method.

## Conclusion

In this paper, an efficient method so-called SCEM has been presented for singularly perturbed two-point second order nonlinear boundary value problems in ordinary differential equations and then the results have been compared with those which are previously obtained by various methods in literature. SCEM is very easy to implement using a mathematical software. As a result of our study, even though only one-term SCEM approximations are used in numerical examples, we obtain highly accurate approximations. As one can see in the numerical examples, SCEM does not require any matching procedures. Moreover, the boundary conditions are satisfied exactly, not asymptotically. Consequently, the present method is well-suited for solving nonlinear singular perturbation problems.

## References

Bender CM, Orszag SA (1978) Advanced mathematical methods for scientists and engineers. McGraw-Hill, New York

Cathalifaud P, Mauss J, Cousteix J (2010) Nonlinear aspects of high Reynolds number channel flows. Eur J Mech B/Fluids 29:295–304

Chawla MM, Katti CP (1982) Finite difference methods and their convergence for a class of singular two-point boundary value problems. Numer Math 39:341–350

Cousteix J, Mauss J (2004) Approximations of the Navier–Stokes equations for high Reynolds number flows past a solid wall. J Comput Appl Math 166(1):101–122

Cousteix J, Mauss J (2007) Asymptotic analysis and boundary layers. Scientific computation, vol XVIII. Springer, Berlin

Cousteix J, Mauss J (2009) Interactive boundary layer models for channel flow. Eur J Mech B Fluids 28:72–87

Cui MG, Geng FZ (2007) Solving singular two-point boundary value problem in reproducing kernel space. J Comput Appl Math 205:6–15

Eckhaus W (1973) Matched asymptotic expansions and singular perturbation. North Holland Publishing Company, Amsterdam

Eckhaus W (1979) Asymptotic analysis of singular perturbations, studies in mathematics and its applications, vol 9. North-Holland Publishing Co., Amsterdam

Friedrichs KO, Wasow W (1946) Singular perturbations of nonlinear oscillations. Duke Math J 13:367–381

Geng FZ (2011) A novel method for solving a class of singularly perturbed boundary value problems based on reproducing kernel method. Appl Math Comput 218(8):4211–4215

Geng FZ, Cui MG (2007) Solving singular nonlinear second-order periodic boundary value problems in the reproducing kernel space. Appl Math Comput 192:389–398

Geng FZ, Cui MG (2011) A novel method for nonlinear two-point boundary value problems: combination of ADM and RKM. Appl Math Comput 217:4676–4681

Hinch EJ (1991) Perturbation methods. Cambridge University Press, Cambridge

Holmes MH (1995) Introduction to perturbation methods, vol 20 of texts in applied mathematics. Springer, New York

Johnson RS (2006) Singular perturbation theory: mathematical and analytical techniques with applications to engineering. Springer, Berlin

Kadalbajoo MK, Gupta V (2010) A brief survey on numerical methods for solving singularly perturbed problems. Appl Math Comput 217:3641–3716

Kadalbajoo MK, Mohan K, Reddy YN (1987) Numerical treatment of singularly perturbed two point boundary value problems. Appl Math Comput 21(2):93–110

Kadalbajoo MK, Patidar KC (2003) Singularly perturbed problems in partial differential equations: a survey. Appl Math Comput 134(2):371–429

Kadalbajoo MK, Reddy YN (1987) Approximate method for the numerical solution of singular perturbation problems. Appl Math Comput 21(3):185–199

Kevorkian J, Cole JD (1981) Perturbation methods in applied mathematics. Springer, New York

Kumar M (2011) Parul: methods for solving singular perturbation problems arising in science and engineering. Math Comput Model 54:556–575

Kumar M (2011) Parul: a recent development of computer methods for solving singularly perturbed boundary value problems. Int J Differ Equ 404276:1–32

Kumar M, Mishra HK (2014) Variational iteration method for a singular perturbation boundary value problems. Am J Numer Anal 2(4):102–106

Lagerstrom PA (1988) Matched asymptotic expansions: ideas and techniques, vol 76 of applied mathematical sciences. Springer, New York

Li Z et al (2012) The solution of a class of singularly perturbed two-point boundary value problems by the iterative reproducing kernel method. Abst Appl Anal 2012:1–7. doi:10.1155/2012/984057

Mauss J, Cousteix J (2002) Uniformly valid approximation for singular perturbation problems and matching principle. CR Méc 330(10):697–702

Mittal RC, Jiwari R (2011) A numerical scheme for singularly perturbed Burger–Huxley equation. J Appl Math Inform 29(3–4):813–829

Mo JQ (1993) A singularly perturbed nonlinear boundary value problem. J Math Anal Appl 178(1):289–293

Nayfeh AH (1973) Perturbation methods, pure and applied mathematics. Wiley, New York

O’Malley RE Jr (1974) Introduction to singular perturbations. Academic Press, New York

Pandit S, Kumar M (2014) Haar wavelet approach for numerical solution of two parameters singularly perturbed boundary value problems. Appl Math Inf Sci 6:2965–2974

Prandtl L (1905) Uber Flussigkeits-bewegung bei kleiner reibung, verhandlungen, III. Int. Math. Kongresses, Tuebner, Leipzig, pp 484–491

Roos HG, Stynes M, Tobiska L (1996) Numerical methods for singularly perturbed differential equations, convection-diffusion and flow problems. Springer, Berlin

Roos H (2012) Robust numerical methods for singularly perturbed differential equations: a survey covering 2008–2012. ISRN Appl Math 379547

Shampine LF, Kierzenka J, Reichelt MW (2000) Solving boundary value problems for ordinary differential equations in MATLAB with bvp4c. Tutorial notes, pp 437–448. http://www.mathworks.com/bvp_tutorial

Sharma D, Jiwari R, Kumar S (2012) Numerical solution of two point boundary value problems using Galerkin–Finite element method. Int J Nonlinear Sci 13(2):204–210

Sharma D, Jiwari R, Kumar S (2012) A comparative study of modal matrix and finite elements methods for two point boundary value problems. Int J Appl Math Mech 8(13):29–45

Van Dyke M (1975) Perturbation methods in fluid mechanics. Parabolic Press, Stantord

Verhulst F (2006) Methods and applications of singular perturbations: boundary layers and multiple timescale dynamics, vol 50. Springer, Berlin

## Authors’ contributions

This work was carried out by the three authors, in collaboration. MTA designed research; SC and AE performed research; SC contributed the numerical tools. All authors read and approved the final manuscript.

### Acknowledgements

The authors would like to express their sincere thanks to the editor in chief, editor and anonymous reviewers for their valuable suggestions to revise the manuscript.

### Competing interests

The authors declare that they have no competing interests.

## Author information

### Authors and Affiliations

### Corresponding author

## Rights and permissions

**Open Access** This article is distributed under the terms of the Creative Commons Attribution 4.0 International License (http://creativecommons.org/licenses/by/4.0/), which permits unrestricted use, distribution, and reproduction in any medium, provided you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons license, and indicate if changes were made.

## About this article

### Cite this article

Cengizci, S., Atay, M.T. & Eryılmaz, A. A uniformly valid approximation algorithm for nonlinear ordinary singular perturbation problems with boundary layer solutions.
*SpringerPlus* **5**, 280 (2016). https://doi.org/10.1186/s40064-016-1865-6

Received:

Accepted:

Published:

DOI: https://doi.org/10.1186/s40064-016-1865-6

### Keywords

- Uniformly valid approximation
- Asymptotic expansion
- Boundary layer
- Singular perturbation
- Successive Complementary Expansion Method