We study the initial-boundary value problem for Rosenau-RLW equation. We propose a three-level linear finite difference scheme, which has the theoretical accuracy of . The scheme simulates two conservative properties of original problem well. The existence, uniqueness of difference solution, and a priori estimates in infinite norm are obtained. Furthermore, we analyze the convergence and stability of the scheme by energy method. At last, numerical experiments demonstrate the theoretical results.

1. Introduction

In the study of the dynamics of compact discrete systems, wave-wave and wave-wall interactions cannot be described by the well-known KdV equation. To overcome this shortcoming of KdV equation, Rosenau proposed the following Rosenau equation in [1, 2]: Rosenau equation (1) is usually used to describe the dense discrete system and simulate the long-chain transmission model through an L-C flow in radio and computer fields. The existence and uniqueness of solution to (1) were proved by Park in [3]. Rosenau equation is also regarded as the transformation of the Regularized Long Wave (RLW) equation (see [4]): which is usually used to simulate the long wave in nonlinear emanative medium. RLW equation plays important role in the study of nonlinear diffusion wave because it could model lots of physical phenomena. As RLW equation and KdV equation have the same approximative order when they are used to describe motivations, RLW equation could simulate almost all of the applications of KdV equation [5]. Therefore, there are many works about Rosenau equation (1) and RLW equation (2) (see, e.g., [623]).

Rosenau-RLW equation is the generalization of Rosenau equation (1) and RLW equation (2). The authors of [2427] studied the numerical solution of Rosenau-RLW equation. Motivated by the above works, we consider the initial-boundary value problem of the following Rosenau-RLW equation: where is a smooth function.

As the solitary wave solution of (3) is (see, e.g., [2426]) the initial-boundary problem (3)–(5) is in accordance with the Cauchy problem of (3) when , . It is easy to verify that problem (3)–(5) satisfies the following conservative laws [27]: where and are both constants only depending on initial data.

Li and Vu-Quoc pointed in [28] that in some areas, the ability to preserve some invariant properties of the original differential equation is a criterion to judge the success of a numerical simulation. It is said in [29] that conservative difference scheme can simulate the conservative law of initial problem well and it could avoid the nonlinear blowup. Therefore, constructing conservative difference scheme is an important and significant job. To our knowledge, the theoretic accuracy of the existing difference scheme for Rosenau-RLW equation (see [24, 25, 27]) is . Particularly, in [27], the authors proposed a three-level linear conservative difference scheme for problem (3)–(5), whose theoretic accuracy is . One does not need iteration when solving the equation numerically using this scheme. Henceforth, it could save some computing time. Using Richardson extrapolation idea, we will propose a three-level linear difference scheme which has the theoretic accuracy of without refined mesh in this paper. Our scheme simulates the two conservative laws (7) and (8) well. And we will study the a priori estimate, existence, and uniqueness of the difference solution. Furthermore, we shall analyze the convergence and stability.

The rest of this paper is organized as follows. We propose the conservative difference scheme in Section 2 and prove the existence and uniqueness of solution to difference scheme by mathematical induction in Section 3. Section 4 is devoted to the prior estimate, convergence, and stability of the difference scheme. In Section 5, we verify our theoretical analysis by numerical experiments.

2. Difference Scheme and Its Conservative Law

Let and be the uniform stepsize in the spatial and temporal directions, respectively. Denote , , and , where . Let be the difference approximation of at ; that is, . Let We define the difference operators, inner product, and norms that will be used in this paper as follows:

Lemma 1. It follows from the Cauchy-Schwarz inequality and summation by parts (see [30]) that, for any ,

In the paper, denotes a general positive constant which may have a different value in a different occurrence.

Consider the following finite difference scheme for problem (3)–(5): The discrete boundary condition (15) is reasonable from the boundary condition of (3)–(5). The following theorem shows how the difference scheme (12)–(15) simulates the conservative law numerically.

Theorem 2. Suppose that and . Then the scheme (12)–(15) is conservative for discrete energy; that is, , where

Proof. Multiplying in the two sides of (12) and taking summation for , we could obtain from (15) and summation by parts [30] that On the other hand, From the definition of , we know that (16) could be deduced from (19)-(20).
Taking an inner product of (12) and (i.e., ), we could obtain from boundary condition (15) and summation by parts [30] that where On the other hand, Taking (23)–(25) into (21), we have From the definition of , we know that (17) could be obtained by deducing the above equality from to .

3. Solvability

Theorem 3. The solution of difference scheme (12)–(15) is unique.

Proof. We will use the mathematical induction to prove our theorem. We first note that and are determined uniquely by (13) and (14).
Suppose that are the unique solution to scheme (12)–(15). Next we prove that there exists unique which satisfies (12)–(15).
Taking an inner product of (27) and , we could obtain from boundary condition (15) and summation by parts [30] that Note that Furthermore, from Lemma 1, one can easily obtain that Henceforth we could have from (28)–(30).
That is, (27) only admits zero solution. So, there exits unique that satisfies (12).

4. Convergence and Stability of the Difference Scheme

Suppose that is the solution to problem (3)–(5). Let . Then the truncation error of the difference scheme (12)–(15) is Making use of the Taylor expansion theorem, we know that as , .

Lemma 4. Assume that , . Then the solution to problem (3)–(5) satisfies

Proof. From (8), we know that Then from the Sobolev inequality.

Theorem 5. Suppose that , . Then the solution to difference scheme (12)–(15) satisfies thus,

Proof. From Theorem 2 and (30) we can get that is, Then the discrete Sobolev inequality (see [30]) shows that

Theorem 6. Suppose that , . Then the solution to difference scheme (12)–(15) converges to the solution of problem (3)–(5) in the sense of norm , and the convergent rate is .

Proof. Subtracting (12)–(15) from (32) and letting , we have Taking the inner product of (43) and , and using boundary condition (44), we obtain Noticing that we can obtain that from the Cauchy-Schwarz inequality and (30), and (44).
Then taking the inner product of (41) and , and combining with boundary condition (44) again, one can get
Similar to (23), we have By using Lemma 4, Theorem 5, Lemma 1, and the Cauchy-Schwarz inequality, we can get Taking (49)-(50) into (48), we obtain Set Summarizing (51) from to , we get From (42) and (47), we know that
Furthermore, Therefore, The discrete Gronwall inequality (see [30]) implies that Then we can obtain from the discrete Sobolev inequality.

We could prove the following theorems in a similar way of Theorem 6.

Theorem 7. Suppose that and . The solution to difference scheme (12)–(15) is stable in the sense of norm .

5. Numerical Simulations

As the difference scheme (12)–(15) is a linear system about , it does not need iteration when we solve it numerically.

Let , , , and For some different values of and , we list errors at several times in Table 1 and verify the accuracy of the difference scheme in Table 2. The numerical simulation of two conservative quantities (7) and (8) is listed in Table 3.

The stability and convergence of the scheme are verified by these numerical experiments. And it shows that our proposed algorithm is effective and reliable.


The authors are very grateful to the anonymous referees for their careful reading and useful suggestions, which greatly improved the presentation of the paper. This work is supported in part by Scientific Research Foundation of Sichuan Provincial Education Department (no. 11ZB009), the Key Scientific Research Foundation of Xihua University (no. Z0912611), and the fund of Key Disciplinary of Computer Software and Theory, Sichuan, China, Grant no. SZD0802-09-1.