A uniformly valid approximation algorithm for nonlinear ordinary singular perturbation problems with boundary layer solutions

This paper is concerned with two-point boundary value problems for singularly perturbed nonlinear ordinary differential equations. The case when the solution only has one boundary layer is examined. An efficient method so called Successive Complementary Expansion Method (SCEM) is used to obtain uniformly valid approximations to this kind of solutions. Four test problems are considered to check the efficiency and accuracy of the proposed method. The numerical results are found in good agreement with exact and existing solutions in literature. The results confirm that SCEM has a superiority over other existing methods in terms of easy-applicability and effectiveness.


subject to boundary condions
It is a well established fact that a nonlinear second-order two-point boundary value problem (1-2) with small parameter plays a critical role in nonlinear physics. Also it is of great practical interest to study this nonlinear phenomena. Singular perturbation problems and the methods used to tackle them are very important concepts because of their mathematical properties, physical meanings and applications in engineering sciences. We refer the reader to consult the reference Kumar (2011) for more detailed information and some significant examples.
The first study in the perturbation theory was presented by Prandtl (1905). But, the term singular perturbation was used for the first time by Friedrichs and Wasow (1946). Scientists have paid great attention for this theory for more than a century. After the first studies, a number of excellent books were published such as O'Malley (1974), Bender and Orszag (1978), Kevorkian and Cole (1981), Eckhaus (1973), Eckhaus (1979), Lagerstrom (1988), Hinch (1991), Van Dyke (1975), Johnson (2006), Verhulst (2006), Holmes (1995) and Roos et al. (1996). Thanks to these great books and the other works, today we have certain traditional asymptotic methods. Some of them are the Method of Matched Asymptotic Expansions (MMAE), the Method of Multiple-scale Analysis, the Periodic Averaging Method, the Method of Wentzel-Kramers-Brillouin (WKB) Approximation and the Method of Strained Coordinates.
Towards the end of 1980s, various methods, apart from the traditional asymptotic methods, began to appear. In those years Kadalbajoo, Reddy, Jiwari et al. conducted so many significant studies such as , , Chawla and Katti (1982), Mo (1993), Kadalbajoo and Patidar (2003), Kadalbajoo and Gupta (2010), Mittal andJiwari (2011), Sharma et al. (2012a) and Sharma et al. (2012b). In 2003, Kadalbajoo and Patidar made a detailed survey of singular perturbation problems in partial differential equations (PDEs) (Kadalbajoo and Patidar 2003). In 2010, Kadalbajoo and Gupta in their study Kadalbajoo and Gupta (2010) made a great survey on the numerical methods for singularly perturbed problems. In 2011, Parul studied the traditional methods to solve this kind of problems and gave important examples occuring in engineering and science (Kumar 2011(Kumar , 2011. In 2012, Roos made a survey, particularly of singularly perturbed convection-reaction-diffusion problems covering the years 2008-2012 (Roos 2012). In the mean time, a number of intriguing numerical methods were presented such as Reproducing Kernel Method Geng and Cui 2007;Geng 2011;Geng and Cui 2011;Li et al. 2012), Variational Iteration Method (Kumar and Mishra 2014), Haar Wavelet Approach (Pandit and Kumar 2014). We must state that there are so many various methods and the above-mentioned methods are just some of them.
In this paper, we study on an efficient asymptotic method called SCEM that generates uniformly valid approximations (UVA) to the solution of singularly perturbed nonlinear boundary value problems. Applying the present method, we are able to get rid of tedious matching procedure of MMAE. We propose a UVA at the first step and then seek appropriate approximations called outer approximation and complementary approximations such that the resulting successive approximations satisfy the boundary conditions exactly.
The paper is organized as follows: "About asymptotic expansions" section gives a brief description of the asymptotic expansions. The overview of SCEM is given in "Successive Complementary Expansion Method" section. In "Numerical examples" section, we consider four numerical problems for comparison with existing methods. The conclusion is given in the last section.

About asymptotic expansions
In this section, we briefly review the basic concepts of asymptotic approximation theory.
The limit process is fundamental tool of mathematical analysis. It is defined for a given real continuous function f: given any δ > 0 there exists a number n 0 (δ) such that f (x) − f < δ for any n n 0 (δ). This definition gives information about the behavior of the function f as x → a, but not about how. Therefore, asymptotic approximation theory requires another definition that enables us to describe the behavior of functions and compare them in a more precise way under the limit process: Bachmann-Landau notations. Consider real and continuous functions f (ε) and g(ε), where Here the subscript S denotes sharp estimate. Now consider a sequence of functions {φ n+1 }, n = 0, 1, . . . . Such a sequence is an asymptotic sequence if φ n+1 (ε) = o(φ n (ε)) for ε → 0 and n = 0, 1, . . . Let y(x, ε) be defined in some domain of x and some neighborhood of ε = 0. The series is called regular asymptotic expansion (Poincaré expansion) of y(x, ε) as ε → 0 if the condition is satisfied. And generalized asymptotic expansions are defined as Interesting cases occur when the function y(x, ε) is not regular in , so expansion (3) is uniformly valid only in a restricted region 0 ∈ that is called outer region. In this case, the asymptotic expansion that is valid in outer region is often called outer expansion and (3) can be given as is an asymptotic sequence and the special operator E 0 called the outer expansion operator at a given order φ(ε).
On the other hand, we encounter with a singular perturbation problem and we must introduce boundary layer domains. Here, in the simplest case (we assume that the problem has boundary layer near the origin x = 0), we introduce an inner region which can be formally denoted 1 = − 0 and located near the origin. The boundary layer variable is x = x ξ(ε) , ξ(ε) being the order of thickness of this boundary layer. If a regular expansion can be constructed in 1 , we can write This inner expansion operator E 1 is defined in 1 at the same order φ(ε) as the outer expansion operator E 0 ; thus, y(x, ε) − E 1 y(x, ε) = o(φ(ε)) and so is clearly uniformly valid approximation to order δ(ε) satisfying the modified Van Dyke . This is the main idea underlying the method of matched asymptotic expansions (MMAE). We know that MMAE which has been designed for finding uniformly valid approximations to singularly perturbed boundary value problems is a powerful mathematical technique. It is based on finding two different approximations for different two regions, which are called as inner region (where the solution exhibits rapid changes) and outer region (which is far from the inner region). In the last step, these two approximations are matched using the limit process to obtain a uniformly valid approximation. For more details we refer the reader to O'Malley (1974), Bender and Orszag (1978), Kevorkian and Cole (1981), Eckhaus (1973), Eckhaus (1979), Lagerstrom (1988), Hinch (1991), Van Dyke (1975), Johnson (2006, Verhulst (2006), Mauss and Cousteix (2002), Cousteix and Mauss (2004), Mauss (2009), Cathalifaud et al. (2010) and Nayfeh (1973).

Successive Complementary Expansion Method
Sometimes the matching procedure in MMAE can be tedious or impossible. Therefore, we wish to present and examine an efficient asymptotic method named as successive complementary expansion method, which is designed by French scientists J. Mauss and J. Cousteix in order to obtain uniformly valid approximations to the boundary layer problems occur in fluid mechanics in Mauss and Cousteix (2002). In SCEM, instead of finding two different approximations to match later, a uniformly valid approximation that exactly satisfies the boundary conditions is proposed at the first step. So, thanks to the SCEM we will not be in need of any matching procedure. We can not ignore the fact that SCEM is not the first method which does not require any matching procedure. For instance, the WKB method and the Method of Multiple-scale Analysis also do not require any matching procedure (Cousteix and Mauss 2004). But their applicabilities are restricted to some certain problems. The uniformly valid SCEM approximation is in the regular form given as follows where δ i (ε) is an asymptotic sequence and � i (x) are the complementary approximation functions that depends on x. Functions y i (x) are the outer approximations that have been found by MMAE and they only depend on x, not also on ε. In its regular form, SCEM is equivalent to MMAE. If the functions y i (x) and � i (x) also depend on ε, the uniformly valid SCEM approximation is named as generalized SCEM approximation and given in the following form (Cousteix and Mauss 2007;Mauss and Cousteix 2002;Cousteix and Mauss 2009) with The sequence of order functions δ i (ε) may or not be same with δ i (ε). If only one-term SCEM approximation is desired, then one seeks a uniformly valid SCEM approximation in the form of To improve the accuracy of SCEM approximation, the first SCEM approximation can be iterated using (7). It means that successive complementary terms will be add to the approximation. To this end, second SCEM approximation will be sought in the form of In Cousteix and Mauss (2007), error estimates for first and second SCEM approximations are given as y − y scem 0 < εK 0 and y − y scem 1 < ε 2 K 1 , where K 0 and K 1 are positive constants independent of ε and y is the exact solution of the problem.

Numerical examples
In this section, we present four numerical experiments to show the efficiency and the robustness of the proposed method. All the numerical calculations are performed using Shampine et al. (2000).
Example 1 Consider the singular perturbation problem subject to boundary conditions This problem has a boundary layer near the point x = 0 and uniformly valid asymptotic approximation is given as follows in Bender and Orszag (1978) ε . Cengizci et al. SpringerPlus (2016) 5:280 To obtain SCEM approximation for n = 0 (first-term approximation) of (8-9), we seek an approximation in the form of Example 2 Consider the second singular perturbation problem given in O'Malley (1974) subject to boundary conditions (11) y scem 0 (x, x, ε) = y 0 (x, ε) + � 0 (x, ε). In Table 3     Example 3 Consider the following singular perturbation problem given in O'Malley (1974) with the boundary conditions and with the asymptotic solution This problem has boundary layer near the point x = 0.   In Tables 4, 5 and Figs. 5, 6, 7 we deliberately choose the node points as possible as near the boundary layer (for this problem, near the point x = 0) in order to see efficiency of the method.
Example 4 As the last example, let us consider the singular perturbation problem given in Kevorkian and Cole (1981) with the boundary conditions   This problem has boundary layer near the point x = 0 and the uniformly valid approximation is given in Kevorkian and Cole (1981) as where c 1 = 2.9995 and c 2 = 1 c 1 ln c 1 −1 c 1 +1 .
In Tables 6, 7 and Figs. 8, 9 we deliberately choose the node points as possible as near the boundary layer (for this problem, near the point x = 0) in order to see efficiency of the method.

Conclusion
In this paper, an efficient method so-called SCEM has been presented for singularly perturbed two-point second order nonlinear boundary value problems in ordinary differential equations and then the results have been compared with those which are previously  obtained by various methods in literature. SCEM is very easy to implement using a mathematical software. As a result of our study, even though only one-term SCEM approximations are used in numerical examples, we obtain highly accurate approximations. As one can see in the numerical examples, SCEM does not require any matching procedures. Moreover, the boundary conditions are satisfied exactly, not asymptotically. Consequently, the present method is well-suited for solving nonlinear singular perturbation problems.