Evolution Equations and Applications
Chapter One
Preamble of the Study
In this section, we recall some de nitions and results from linear functional analysisย
De nition 1.1.1 Let X be a linear space over aย eld K, where K holds either for R or C. A mapping k.k: X โโ R is called a norm provided that the following conditions hold:ย
kxkโฅ 0 for all x โ X, and kxk= 0 โ x = 0ย
kฮปxk= |ฮป|kxk, for all ฮป โ K, x โ Xย
ย kx + ykโค kxk+kyk, for arbitrary x, y โ X.ย
If X is a linear space and k.k is a norm on X, then the pair (X, k.k) is called a normed linear space over K.ย
Should no ambiguity arise about the norm, we simply abbreviate this pair by saying that X is a normed linear space over K.ย
Example . Let X = C([0, 1]) be the space of all real-valued continuous functions on [0, 1]. Each of the following expressions de nes on the vector space C([0, 1]) a norm which is in common use.ย
CHAPTER TWO
ABSTRACT LINEAR EVOLUTION EQUATIONSย
Most often signicant external forces a sect the evolution of a process. Let X be a real Banach space. In this chapter, we discuss the non-homogeneous Cauchy problemย
ย U0(t) = AU(t) + f(t), t > 0ย
U(0) = U0ย
where A : D(A) โ X โโ X is a given linear operator and f : [0, โ) โโ X is a given function of the time variable only. This equation is called linear evolution equation. Basically we shall study the existence and uniqueness of solutions of the above problem, imposing di erent conditions on f.ย
ย Linear Evolution Equations inย nite dimensional spaces: Well Posednessย
In this section, we examine the linear Cauchy problem in theย nite dimensional case. In this case we identify the linear operator A with an N ร N matrix. We shall see that if the forcing term is continuous, then there is existence and uniqueness of the solution. So consider the following initial value problem (I.V.P) :ย
ย U0(t) = AU(t) + f(t), t > 0ย
Advertisements
U(0) = U0(2.1)ย
where Aโ MN (R), f : [0, โ) โโ RN and U0 โ RN . We shall formulate the theory for (2.1). We haveย
U0(s) = AU(s) + f(s)ย
โโ U0(s) โ AU(s) = f(s),ย
โโ eโsA(U0(s) โ AU(s)) = eโsAf(s)ย
โโ dds (eโsAU(s)) = eโsAf(s),since,dds (eโsA) = โAeโsA.ย
โโ R t0dds (eโsAU(s))ds =R t0eโsAf(s)ds โโ eโtAU(t) โ U(0) = R t0eโsAf(s)ds It implies thatย
U(t) = etAU0 +ย
Z t 0ย
e(tโs)Af(s)ds (2.2)ย
De nition 2.1.1 Let U : [0, T] โโ RN be a functionย
- a) U is a classical solution of (1) ifย
- i) U is continuous on [0, T]ย
- ii) U is di erentiable on (0, T]ย
iii) U satis es (2.1)ย
- b) U is a mild solution of (1) ifย
- i) U is continuous on [0, T]ย
- ii) U is given by (2), โt โ [0, T] .ย
Theorem 2.1.1 (Existence and Uniqueness) Let T > 0 and suppose that f โ C([0, T]; RN ). Then (2.1) has a unique classical solution on [0, T] given by (2.2).ย
Proof:ย
Existenceย
Let U be given by (2.2). From the continuity of f we have that the map t 7โR t0e(tโs)Af(s)ds and also the map t 7โ etAU0 is continuous. therefore U given by (2.2) is continuous as the sum of two continuous functions. Moreoverย
U0(t) = AetAU0 + f(t) + Aย
Z t 0ย
e(tโs)Af(s)dsย
= A(etAU0 +ย
Z t 0ย
e(tโs)Af(s)ds) + f(t)ย
= AU(t) + f(t)ย
Also U(0) = e0AU0 = e0U0 = U0ย
Thus U is a classical solution of (2.2).ย
Uniqueness:ย
Suppose that U and V are both classical solutions of (2.1). Then de ne Z : [0, T] โโ RN by Z(t) = U(t) โ V (t) .Then Z is continuous and di erentiable on [0,T] and (0,T] respectively as the sum of two continuous and di erentiable functions. Moreoverย
Z0(t) = U0(t) โ V0(t)ย
= A(U(t) โ V (t))ย
= AZ(t)ย
So Z(t) = etAZ0 but Z0 = Z(0) = 0, thus Z(t) = 0, โt โ [0, T] and therefore U = V proving uniqueness and completing the proof of the theorem.ย
Continuous dependence on the given data:ย
Consider the following perturbed system from (2.1).ย
ย V0(t) = AV (t) + g(t), t > 0ย
V (0) = V0(2.3)ย
where A is the matrix given in (2.1).ย
We are hopeful that the di erence between the solutions U and V of (2.1) and (2.3), respectively, in the sense of the supnorm on C([0, T]; RN ) , for any time interval [0,T] can be controlled by making the error terms su ciently small. In this case we say that the solution depends continuously on the given data. We summarize this in the following proposition.ย
CHAPTER THREE
SEMI-LINEAR EVOLUTION EQUATIONSย
Introductionย
In this chapter we study another class of evolution equations in which the forcing term depends on the state of the system at some time t. We consider the following Cauchy problem: ย u0(t) = Au(t) + f(t, u(t)), t > 0ย
u(0) = u0(3.1)ย
where A is the in nitesimal generator of a C0-semigroup denoted by {etA, t โฅ 0} and f : [0, T] ร X โ X is continuous.ย
In the linear case we need the forcing term to just be continuous to guarantee the existence of a mild solution. But in this present case, we will require more than continuity on f to have existence of a solution, as we can see in the following example.ย
Example: In (3.1) above, let A = 0 and X = C0 the Banach space of all real-valued sequences u = {ฮพn}โn=1 with limnโโ ฮพn = 0 and kuk = supnโฅ1|ฮพn|. De ne the functionย
f : X โ X by f(u) = {|ฮพn|12 + nโ1}โn=1, u = {ฮพn}โn=1 โ X.ย
The continuity of the function ฮพ 7โ ฮพ12 for ฮพ โฅ 0 and the de nition of the norm on X imply that f is continous on X. But the initial value problem
References
- Parmar DN, Mehta BB (2014) Face Recognition Methods and Applications.
- NEC Corporation of America (2013) NeoFace reveal advanced criminal investigative solution using face recognition technology
- Dessimoz D, Champod C (2018) Linkages between biometrics and forensic science. In: Handbook of biometrics. Springer, US
- Saini M, Kapoor AK (2016) Biometrics in Forensic Identification: Applications and Challenges. J Forensic Med 1: 108. doi:10.4172 /2472-1026 1000108 Page 3 of 6 J Forensic Med ISSN:2472-1026 Volume 1 โข Issue 2 โข 1000108
- Zhang D, Kong WK, You J (2003) Online palmprint identifcation- 3attern Analysis and Machine Intelligence. IEEE Transactions 25: 1041-1050
- Counter PB (2015) Invisible Biometrics Month: 4 Unique Applications of Voice Biometrics.
- Gallagher R (2012) Watch your tongue: Law enforcement speech recognition system stores millions of voices
- Delac K, Grgic M (2014) A survey of biometric recognition methods. In: Electronics in Marine. Proceedings Elmar 2014. 46th International
Symposium. IEEE - Jain AK, Ross A, Prabhakar S (2014) An introduction to biometric recognition. Circuits and Systems for Video Technology. IEEE Transactions 14: 4-20
- Prabhakar S, Pankanti S, Jain AK (2013) Biometric recognition: Security and privacy concerns. IEEE Security and Privacy 33-42.
- Saini M, Kapoor AK (2014) Estimation of ethnicity from handwriting. IEEE Security and Privacy 33-42.