ArticlePDF Available

A Simplified Derivation and Analysis of Fourth Order Runge Kutta Method

Authors:
  • Universiti Putra Malaysia and Umaru Musa Yar'adua University Katsina

Abstract

The derivation of fourth order Runge-Kutta method involves tedious computation of many unknowns and the detailed step by step derivation and analysis can hardly be found in many literatures. Due to the vital role played by the method in the field of computation and applied science/engineering, we simplify and further reduce the complexity of its derivation and analysis by exploring some possibly well-known works and propose a step by step derivation of the method. We have also shown the stability region graphically
International Journal of Computer Applications (0975 8887)
Volume 9 No.8, November 2010
51
A Simplified Derivation and Analysis of Fourth Order
Runge Kutta Method
Musa H.
Department of Mathematics and
Computer Science
UMYU
Ibrahim Saidu
Faculty of Computer Science and
Information Technology
University Putra,Malaysia.
M. Y. Waziri
Faculty of Science, Department of
Mathematics
University Putra,Malaysia
ABSTRACT
The derivation of fourth order Runge-Kutta method involves
tedious computation of many unknowns and the detailed step by
step derivation and analysis can hardly be found in many
literatures. Due to the vital role played by the method in the
field of computation and applied science/engineering, we
simplify and further reduce the complexity of its derivation and
analysis by exploring some possibly well-known works and
propose a step by step derivation of the method. We have also
shown the stability region graphically
Keywords: Fourth order Runge Kutta Method, Derivation,
Stability Analysis
1. INTRODUCTION
Runge-Kutta formulas are among the oldest and best understood
schemes in numerical analysis. However, despite the evolution of
a vast and comprehensive body of knowledge, it continues to be a
source of active research [7]. Runge-Kutta methods provide a
popular way to solve the initial value problem for a system of
ordinary differential equations [11]:
with a given step length h through the interval ,
successively producing approximations to . We deal
exclusively with the step by step derivation and the stability
analysis of the fourth order Runge-Kutta Method. For a thorough
coverage of the derivation and analysis the reader is referred to
[1,2,3,4,5].
The paper has the following structure: section 2 presents
mathematical formulation and derivation, Section 3 presents the
analysis and section 4 presents the conclusion.
2. MATHEMATICAL FORMULATION
AND DERIVATION
We begin by defining the function as in [1,2,3,4,5 and 6]
1( , , )
nn
y y h x y h

Where
1
1
1
1
1
1
( , , )
( , )
( , ), 2,3,..., 1
s
ii
i
i
i i n ij j
j
i
i ij
j
x y h b k
k f x y
k f x c h y h a k i i
ca
 
1 1 1 2 2 3 3 4 4
1
2 2 21 1
3 3 31 1 32 2
4 4 41 1 42 2 43 3
()
( , )
( , )
( , ( ))
( , ( ))
nn
n
n
n
y y h b k b k b k b k
k f x y
k f x c h y ha k
k f x c h y h a k a k
k f x c h y h a k a k a k
 
 
 
 
The functions are expanded using a Taylor series expansion for
function of two variables. To get the unknowns, we use the
fourth order coefficients of order 4
(1)
1
(2)
1
(3) 2
1
(3)
2
(4) 3
1
(2)
2
(4) 2
3
(4)
4
1
1
2
11
26
1
6
11
6 24
1
8
11
2 24
1
24
i
i
ii
i
ii
i
i ij j
ij
ii
i
i i ij j
ij
i ij j
ij
i ij jk k
ij
b
bc
bc
ba c
bc
b c a c
ba c
ba a c








Setting the coefficients to zero, we have
1 2 3 4 1b b b b  
(1)
International Journal of Computer Applications (0975 8887)
Volume 9 No.8, November 2010
52
2 2 3 3 4 4 1
2
b c b c b c 
(2)
2 2 2
2 2 3 3 4 4 1
3
b c b c b c
(3)
(4)
3 3 3
2 2 3 3 4 4 1
4
b c b c b c 
(5)
3 3 32 2 4 4 42 2 4 4 43 3 1
8
b c a c b c a c b c a c  
(6)
2 2 2
3 32 2 4 42 2 4 43 3 1
12
b a c b a c b a c  
(7)
4 43 32 2 1
24
b a a c
(8)
We use the simplifying assumptions by Butcher:
1(1 ), 2,3,4
s
i ij i j
iba b c j
 
(9)
Which affect the expression for
(3) (4)
23
,

and
(4)
4
. i.e.
(3) (2) (3)
2 1 1
2
 

(4) (3) (4)
3 1 1
3
 

(4) (2) (3) (4)
4 1 1 2
2
 
 
Now using equation (9) for
2,3 and 4j
we have:
3 32 4 42 2 2
(1 )b a b a b c  
(i)
4 43 3 3
(1 )b a b c
(ii)
44
0 (1 )bc
respectively. (iii)
Now when
4j
in (iii),
41c
and
40b
for a four stage
method.
We substitute
41c
in equations 2, 3 and 5 and solve for
2
b
,
3
b
and
4
b
simultaneously. Therefore equations 2, 3 and 5
becomes
2 2 3 3 4 1
2
b c b c b  
22
2 2 3 3 4 1
3
b c b c b
33
2 2 3 3 4 1
4
b c b c b  
Using crammer’s rule, we first find the determinant of the
coefficient matrix
23
22
2 3 2 3 2 2 3 3
33
23
1
1 ( 1)( )( 1)
1
cc
D c c c c c c c c
cc
 
To solve for
2
b
2
3
23 3 3
3
3
3
11
2( 1)(2 1)
11
3 12
11
4
b
c
c c c
Dc
c
 

23 3 3 3
2 2 3 2 2 3 3 2 2 3 2
( 1)(2 1) 1 2
( 1)( )( 1)
12 12 (1 )( )
b
Dc c c c
b c c c c c c
D c c c c
 
    
To solve for
3
b
3
2
22 2 2
2
3
2
11
2( 1)(2 1)
11
3 12
11
4
b
c
c c c
Dc
c


32 2 2 2
3 2 3 2 2 3 3 3 3 2 3
( 1)(2 1) 1 2
( 1)( )( 1)
12 12 ( )(1 )
b
Dc c c c
b c c c c c c
D c c c c
 
    
To solve for
4
b
4
23
22 2 3 2 3 2 3 2 3
23
33
23
1
2( )(3 4 4 6 )
1
3 12
1
4
b
cc
c c c c c c c c
D c c
cc
  

42 3 2 3 2 3 2 3 2 3 2 3
4 2 3 2 2 3 3 23
( )(3 4 4 6 ) 6 4( ) 3
( 1)( )( 1)
12 12(1 )(1 )
b
Dc c c c c c c c c c c c
b c c c c c c
D c c
 
    
Now to solve for
43
a
, we use equation (ii) i.e. when j=3
Hence, we have
3 3 2 3
2
43 3
4 3 3 2 3 2 3 2 3
(1 ) 12(1 )(1 )
12 (1 )
12 ( )(1 ) 6 4( ) 3
b c c c
c
ac
b c c c c c c c c
 
 
 
International Journal of Computer Applications (0975 8887)
Volume 9 No.8, November 2010
53
2 2 3
3 2 3 2 3 3 2
(1 )(2 1)(1 )
( )(6 4( )) 3
c c c
c c c c c c c
 
 
To solve for
32
a
and
42
a
, we use equations (i) (when j=2) and
(8) i.e.
3 32 4 42 2 2
(1 )b a b a b c  
(i)
4 43 32 2 1
24
b a a c
(8)
From equation (8) above,
2 3 3 2 3 2 3 3 2
32 2 4 43 2 2 3 3 2 2 2 3
12(1 )(1 ) ( )(6 4( ) 3)
1 1 1 1
24 24 6 4( ) 3 (1 )(2 1(1 )
c c c c c c c c c
ac b a c c c c c c c c
 
   
 
3 2 3
22
()
2 (2 1)
c c c
cc
Substituting this value into (i), we have
2 2 3 32
42 4
3 3 2 3 2 3
2
2
2 2 3 2 3 3 3 2 2 2 2 3 2 3
2 3 3 2 3
2 2 3 2 3 2 3
(1 )
1 2 ( ) 12(1 )(1 )
12
(1 )
12 (1 )( ) 12 (1 )( ) 2 (2 1) 6 4( ) 3
(1 ){2(1 )(1 2 ) ( )}
2 ( ){6 4( ) 3)}
b c b a
ab
c c c c c c
c
c
c c c c c c c c c c c c c c
c c c c c
c c c c c c c


 
 

 

 
 
This solution assumes that
2 3 2 3 2 1
0,1, 0,1, , 2
c c c c c  
We choose two free parameters
21
3
c
and
32
3
c
Substituting these values into
4
b
,
3
b
and
2
b
we have:
4
1 2 2 1 4
6 4 3 11
3 3 3 3 38
12 8
12 1 1 3
33
b
  
 
  
  
 
  

  
  
3
11
12 3
33
8
2 2 2 1 8
12 1 9
3 3 3 3
b



 
 

 
 
2
21
12 3
33
8
1 1 1 2 8
12 1 9
3 3 3 3
b



 
 

 
 
Using equation (1)
1 2 3 4
1 2 3 4
1
1
3 3 1 1
1 8 8 8 8
b b b b
b b b b
  
 
  
Also
2 21 1
3
ca
Using equation (ii) (when j=3),
4 43 3 3
(1 )b a b c
33
43 4
(1 ) 3 2 8
11
8 3 1
bc
ab

 


Also
2 3 3 2 3
42 2 2 3 2 3 2 3
(1 ){2(1 )(1 2 ) ( )}
2 ( ){6 4( ) 3)}
1 2 2 1 2
1 {2(1 )(1 2 ) ( )}
3 3 3 3 3
1
1 1 2 1 2 1 2
2 ( ){6 4( ) 3)}
3 3 3 3 3 3 3
c c c c c
ac c c c c c c
 
 

 


 
 
Using equation (2) we can obtain
4
c
as
4 4 2 2 3 3
4
1
21 3 1 3 2
2 8 3 8 3 1
1
8
b c b c b c
c
 
 
   
 
 
 
Hence,
4 41 42 43
41 4 42 43 1 ( 1) 1 1
c a a a
a c a a
  
   
Also
3 2 3
32 22
2 1 2 2
()
()3 3 3 9 1
1 1 2
2 (2 1) 2 (2 1)
3 3 9
c c c
acc
 
 
From
3 31 32
c a a
31 3 32 21
1
33
a c a
 
Finally, we know that
1 11 0ca
.
We have therefore determined all the unknowns in the method
and the method can be written in Butcher’s Tableu [3] as
0 0 0 0 0
1/3 1/3 0 0 0
2/3 -1/3 1 0 0
1/8 3/8 3/8 1/8
Which has the form
1 1 2 3 4
( 3 3 )
8
nn
h
y y k k k k
 
International Journal of Computer Applications (0975 8887)
Volume 9 No.8, November 2010
54
1
1
2 2 21 1
3 3 31 1 32 2 1 2
4 4 41 1 42 2 43 3 1 2 3
( , )
( , ) ( , )
33
21
( , ( )) ( , ( )
33
( , ( ) ( , ( )
nn
n n n n
n n n n
n n n n
k f x y
hk
h
k f x c h y ha k f x y
k f x c h y h a k a k f x h y h k k
k x c h y h a k a k a k f x h y h k k k
   
   
 
3. ANALYSIS OF THE METHOD
The stability polynomial is given by
1
( ) 1 ( )
T
R h hb I hA e
 
and it is required that
( ) 1Rh
for absolute stability see [6]. Now for the Runge Kutta forth
order method,
1 1 2 3 4
( 3 3 )
8
nn
h
y y k k k k
 
The Butcher’s Tableu is
0 0 0 0 0
1/3 1/3 0 0 0
2/3 -1/3 1 0 0
1/8 3/8 3/8 1/8
0 0 0 0
10 0 0
311 0 0
3
1 1 1 0
A









,
1 0 0 0
1 0 0
3
10
3
1
h
I hA hh
h h h











,
1 3 3 1 3 3
8 8 8 8 8 8 8 8
Th h h h
hb h 






1
( ) 1 ( )
T
R h hb I hA e
 
1
1 0 0 0
1
1 0 0 1
33 3
11
8 8 8 8 10 1
3
1
h
h h h h
hh
h h h






 
 
 








2
23 2
1 0 0 0
1
1 0 0
31
33
11
8 8 8 8 10
33 1
21
33
h
h h h h hh h
hh
h h h h



















 


2 2 2 3
22
2
32
8 8 8 3 3 8 3 3
1
33 1
8 8 8
11
31
88
8
h h h h h h h h
h
h h h hh
hh
h

 

 
 
 

 




 













2 2 3 2 3 4
2 2 3
2
3 3 2
8 8 24 24 8 24 24 1
33 1
8 8 8 8
11
31
88
8
h h h h h h h
h h h h
hh
h


   





 













2 3 4 2 3 2
33
18 8 24 24 8 4 8 8 8 8
h h h h h h h h h h
       
2 3 4
12 6 24
h h h
h 
For absolute stability
2 3 4
1 1 1
1 1 1
2 6 24
h h h h 
Taking the RHS
2 3 4
1 1 1
11
2 6 24
h h h h 
2 3 4
1 1 1 0
2 6 24
h h h h  
Using Mathematica we get the roots as
NSolve[h+h*h/2+h*h*h/6+h*h*h*h/24==0,h]
{{h-2.78529},{h-0.607353-2.8719 },{h-
0.607353+2.8719 },{h0.}}
We consider 3 cases as it can be found in [1]
Case 1
When
is real and
0
,
The roots are -2.785 and 0
International Journal of Computer Applications (0975 8887)
Volume 9 No.8, November 2010
55
Hence the stability interval is
( 2.785,0)h
.
Case 2
2 3 4
23
2
8 8 24 24 1
31
8 4 8
11
31
88
8
h h h h
h h h
hh
h


  



















When
h
is pure and
imaginary,
We set
iy
in the stability polynomial to get
3
24
( ) ( ) ( )
1 ( ) 1
2 6 24
yh yh yh
i yh i 
3
24
( ) ( ) ( )
1 ( ) 1
2 24 6
yh yh yh
iyh i 
Let
t yh
and take the magnitude
2
2 4 3
11
2 24 6
t t t
t
 
   
 
 
2 4 2 4 6 4 6 8 4 4 6
2
11
2 24 2 4 48 24 48 578 6 6 36
t t t t t t t t t t t
t
 
       
 
 
Simplifying, we get
68
11
72 576
tt
 
68
0
72 576
tt
 
Using Mathematica to find the roots we have
NSolve[(-(t^6)/72)+((t^8)/576)0,t]
{{t-
.82843},{t0.},{t0.},{t0.},{t0.},{t0.},{
t0.},{t2.82843}}
The equation is satisfied for
2.82843t
i.e.
22t
Hence the stability interval is
0 2 2h
. i.e.
(0,2 2)h
Case 3 When
is complex with
Re( ) 0
, we set
x iy

in
24
3
( ) ( ) ( )
11
2 6 24
h h h
h
  
 
and plot the boundary of the region by plotting the real and
imaginary parts.
The stability region is plotted using Maple as follows
Re( )h
4. CONCLUSION
In this paper, we have simplified the existing derivation and
analysis of the fourth order Runge-Kutta Method for easy
reference to students and plot the stability region. We also
reduced the complexity of the method by proposing a step by
step derivation approach for better understanding to students.
5. REFERENCES
[1] M.K. Jain, S.R.K. Iyengar, R.K. Jain, (2007), Numerical
Methods for Scientific and Engineering Computing.
[2] J. D. Lambert, (1991), Numerical Methods for Ordinary
Differential Systems, the initial value Problem, John Wiley &
Sons Ltd.
[3] J.C. Butcher, (2003), Numerical Methods for Ordinary
Differential Equations, John Wiley & Sons Ltd.
[4] John R. Dorman, (1996), Numerical Methods for
Differential Equations, a Computational Approach, CRC Press,
Inc.
[5] J. D. Lambert, (1973), Computational Methods in
Ordinary Differential Equations, John Wiley & Sons Ltd
[6] Fudzia Ismail, (2010), Lecture Notes on Numerical
Methods (unpublished), University Putra Malaysia
[7] G. Byrne and Hindmarsh, (1990), RK Methods prove
popular at IMA Conference on Numerical ODE’s,SIAM
News,23/2 pp.14-15.
[8] Lawrence F. Shampine, (1985),Interpolation for Runge-
Kutta Methods.SIAM Journal of numerical
analysis,22/5,pp.1014-1027.
... Being based on the finite element method (FEM), transient calculations rely on matrix-vector multiplication when applying the DG approach, making it specifically suitable for the approximation of transient exponential integrators. To approximate the transient exponential operator by the use of matrix-vector multiplications, a variety of algorithms including the Krylov methods [5], Faber polynomial-based algorithms [6], or Runge-Kutta schemes [7][8][9] can be utilized. A further benefit of the scheme is the use of block-diagonal matrices. ...
... It is important to note that the expansion order N p must be even to avoid singularity issues. Finally, the expansion in (9) is applied onto (6) and (8). Coupled with a basis transformation of k and B in (6) and (8) from the left-hand side the discrete quantum Liouville-type equation ...
... negative half of the complex plane, which is important to fulfill the stability condition for transient simulations [8]. ...
Article
Full-text available
The simulation of nanodevices is computationally inefficient with current algorithms. The discontinuous Galerkin approach has been demonstrated in the field of computational fluid dynamics to deliver high order accuracy and efficiency due to its reliance on matrix–vector multiplications. Previously, the discontinuous Galerkin approach was successfully used in conjunction with the finite volume technique to solve the Liouville–von Neumann equation in center-mass coordinates and thus simulate nanodevices. To exploit its full potential regarding high-performance computing, this work aims to substitute the aforementioned finite volume technique with the discontinuous Galerkin method. To arrive at the said formalism, a finite element method is implemented as an intermediate step.
... Instead, we consider partitioning the interval [0, T ] and updating the function throughout these intervals. Adaptive ODE solvers, such as Runge-Kutta and Bogacki-Shampine methods [22,25], adjust intervals based on the smoothness of the solution. Larger steps are taken in smooth regions where the accuracy in the region is not critical towards the final solution, while smaller steps are used in volatile regions where accuracy is critical [22,25,26]. ...
... Adaptive ODE solvers, such as Runge-Kutta and Bogacki-Shampine methods [22,25], adjust intervals based on the smoothness of the solution. Larger steps are taken in smooth regions where the accuracy in the region is not critical towards the final solution, while smaller steps are used in volatile regions where accuracy is critical [22,25,26]. ...
Preprint
Full-text available
Neural networks have continued to gain prevalence in the modern era for their ability to model complex data through pattern recognition and behavior remodeling. However, the static construction of traditional neural networks inhibits dynamic intelligence. This makes them inflexible to temporal changes in data and unfit to capture complex dependencies. With the advent of quantum technology, there has been significant progress in creating quantum algorithms. In recent years, researchers have developed quantum neural networks that leverage the capabilities of qubits to outperform classical networks. However, their current formulation exhibits a static construction limiting the system's dynamic intelligence. To address these weaknesses, we develop a Liquid Quantum Neural Network (LQNet) and a Continuous Time Recurrent Quantum Neural Network (CTRQNet). Both models demonstrate a significant improvement in accuracy compared to existing quantum neural networks (QNNs), achieving accuracy increases as high as 40\% on CIFAR 10 through binary classification. We propose LQNets and CTRQNets might shine a light on quantum machine learning's black box.
... Для численного моделирования используется метод Рунге-Кутты 4-го порядка [9] для решения обыкновенного дифференциального уравнения (4). . Для уравнений (2) и (3) данный метод используется аналогичным образом. ...
Article
Cardiovascular aging poses a significant threat to the health and quality of life of individuals, especially those aged 65 years and older. This paper presents a way to predict cardiovascular aging using mathematical modeling. The developed model integrates various physiological and behavioral factors including blood pressure, cholesterol level, body mass index, smoking, physical activity and alcohol. The model is based on the application of iteration and Runge Kutta methods, which allows us to describe the dynamic interaction of these factors over time. Validation of the model was performed based on data from clinical studies of elderly patients' health. The results show that the model has high accuracy in predicting the progression of cardiovascular aging and allows to identify patients with increased risk of cardiovascular diseases. The proposed prediction method may become a valuable tool for physicians, helping to develop personalized prevention and intervention strategies in geriatrics, which, in turn, may improve treatment outcomes and prolong the healthy life of patients. Further refinement of the model parameters and expansion of its application to broader populations are planned for the future.
... The SIR model is a straightforward dynamic model that depicts how illness spreads among communities [12]. Numerous researchers have utilized this approach to gain insights into disease transmission [5,13,[16][17][18]23]. The SIR model, which may examine disease transmission within a community, is the cornerstone of epidemiological modeling. ...
Article
Full-text available
In this work, the Backward Euler technique and the Adams-Bashforth 2-step method-two numerical approaches for solving the SIR model of epidemiology are compared for performance. An essential resource for comprehending the transmission of infectious illnesses like COVID-19 in the SIR model. While the explicit Adams-Bash forth 2-step approach is well known for its computing efficiency , the implicit Backward Euler method is noted for its stability. The study evaluates the accuracy, strength, and computing cost of the two approaches to determine which approach is best for simulating the spread of infectious illnesses. The SIR Model was easily solved using the Adams Bashforth 2-step analysis and the Backward Euler method. The approaches' solutions are close to the exact requirements. There are important distinctions between the two-step Adams Bash-forth and backward Euler procedures. The running time of the Adams Bashforth 2-step backward Euler method is shorter than that of the backward Euler method.
... Hence, the bubbly layer can be considered as a metamaterial and will be referred to as bubbly meta-screen in the present text. The bubbly meta-screen radial oscillations in response to an incident sound field are determined by numerically solving (as described in the Supplementary material), via fourth order Runge Kutta method [17] the Rayleigh-Plesset equation: ...
Article
Full-text available
Bubble-based metamaterials have been extensively studied both theoretically and experimentally thanks to their simple geometry and their ability to manipulate acoustic waves. The latter is partly dependent on the structural characteristics of the metamaterial and partly dependent on the incident acoustic wave. Initially, the selection of specific structural characteristics is explained by presenting the Fourier transformations of the reflected waves for different arrangements of a bubbly meta-screen subject to Gaussian excitation. Next, the numerical study focuses on the changes induced to the response of a bubbly meta-screen, subject to different excitation pulses. For complex frequency excitation the bubbles delay to return to their equilibrium position for a couple of moments, hence the energy is stored in the system during those moments. This research provides a new strategy to actively control the response of a bubbly meta-screen and seeks to inspire future studies towards further optimization of the incident pulse based on the functionalities in need.
... The objective of the particle tracking model was to simulate the horizontal surface advection (i.e., 0 m depth) of virtual particles in which the change in a particle's position is determined by ocean surface currents plus a downwind drift calculated as a percentage of the wind speed, plus an additional horizontal stochastic diffusive step. The 4th order Runge-Kutta method (Waziri et al., 2010) was used to simulate this diffusion. Allison et al. (2022) explored the influence of different coastal boundary conditions on the dispersion of floating plastic marine litter. ...
Article
Full-text available
This paper uses a particle tracking model to simulate the distribution of fishing-related marine-sourced plastic litter from demersal trawling activities along the Atlantic coast of Scotland. The modelled fishing litter dispersed widely across the region, with ~50% of the particles beaching along the northwestern Scottish coast after a year-long simulation. The model was tuned using observations of beached litter loadings along the same coastline to estimate the annual input, by mass, of small (<1 kg) plastic litter. Model results suggest that between 107 g and 280 g of small fishing-related litter enters the ocean per hour of fishing, resulting in an estimated 234 t to 614 t of small fishing-related litter entering the ocean annually on the Scottish west coast. These results suggest that fishing on the Atlantic coast of Scotland may be a significant source of marine plastic. However, more modelled and observational data are required to reduce uncertainty.
Preprint
Full-text available
This thesis calculates the special-relativistic internal energy of a non-interacting gas. We derive an equation of state (EoS) which we apply to the Tollmann-Oppenheimer Volkoff (TOV) equation. Furthermore we present numerical results of the TOV equation for various configurations of a polytropic EoS. These results show that the zero values of the TOV equation compared to its non-relativistic counterpart, the Lane-Emden (LE) equation, are smaller for identical parameters. We present initial developments to a proof of this theorem. Furthermore, an additional exact solution and index n=2 of the LE equation was discovered.
Conference Paper
Full-text available
Pertussis generally known as whooping cough is an airborne infectious disease which spreads through respiratory droplets and vaccine preventable. Whooping cough primarily affects infants and young children. Due to the disruption in basic routine immunization programs caused by the recent COVID-19 pandemic, the disease reemergence stands as a double burden and a significant global health concern for both developed and developing countries. In this paper, a comprehensive analysis of pertussis transmission dynamics is presented via a five (5) non-linear mathematical model. The developed model considers the impact of Vaccination, Treatment and maternally derived immunity on disease spread. The stability of the systems equilibrium point was analyzed and the basic reproduction number R0 obtained using the next generation matrix method. The Normalized forward sensitivity index analysis for R0 was conducted to find the most crucial parameters to be targeted upon for disease intervention strategy. MATLAB 2021a was used to carry out numerical simulations to validate theoretical findings, corresponding results interprets that periodic vaccination from birth, disease treatment in adults, vaccination of pregnant women will specifically lower the basic reproduction number and in turn cushion or eradicate disease spread.
Article
Full-text available
This study develops the Runge-Kutta Like Method (RKLM), which uses Pontryagin's principle to solve optimal control problems numerically using forward-backward sweep methods. It is based on the Patade and Bhalekar methodology. The RKLM's stability properties and its convergence are examined. The Forward-backward sweep algorithm and the RKLM algorithm are implemented using MATLAB code. Physical optimum control problems are solved with the RKLM. The first problem's conclusion demonstrates that, when investment declines, the capital first grow to boost production before it depreciates. The outcome of the second problem demonstrates that a larger weight parameter causes the harvesting rate to reach zero more quickly and the total fish mass to reach its maximum level more quickly. The findings obtained demonstrate the effectiveness of using RKLM in conjunction with forward-backward sweep methods to solve optimal control problems.
Article
Full-text available
This paper presents a review of the role played by trees in the theory of Runge–Kutta methods. The use of trees is in contrast to early publications on numerical methods, in which a deceptively simpler approach was used. This earlier approach is not only non-rigorous, but also incorrect. It is now known, for example, that methods can have different orders when applied to a single equation and when applied to a system of equations; the earlier approach cannot show this. Trees have a central role in the theory of Runge–Kutta methods and they also have applications to more general methods, involving multiple values and multiple stages.
Chapter
This introduction expresses commonly understood ideas in the style that will be used for the rest of this book. The aim is to understand, as much as possible, what is expected to happen to a quantity that satisfies a differential equation. The chapter discusses differential equation problems, differential equation theory, evolutionary problems, difference equation theory and location of polynomial zeros. It emphasizes numerical methods, and often discusses problems with known solutions mainly to illustrate qualitative and numerical behaviour. Differential and difference equations belong together as a unified theory and as related areas of applicable mathematics. Furthermore, each is used to approximate the other. The link between the smooth and the discrete is not only the numerical approximation process but, in the reverse direction, it is an interpolation process, aimed at finding values of the smooth function from the discrete values. Many properties of differential equation solutions have discrete counterparts.
Article
Runge-Kutta methods provide a popular way to solve the initial value problem for a system of ordinary differential equations. In contrast to the Adams methods, there is no natural way to approximate the solution between mesh points. A way to accomplish this is proposed which is applicable to some important formulas. Its theoretical support is much better than that of interpolation in the popular variable order, variable step Adams codes.
Chapter
Numerical methods for the solution of initial value problems in ordinary differential equations made enormous progress during the 20th century for several reasons. The first reasons lie in the impetus that was given to the subject in the concluding years of the previous century by the seminal papers of Bashforth and Adams for linear multistep methods and Runge for Runge-Kutta methods. Other reasons, which of course apply to numerical analysis in general, are in the invention of electronic computers half way through the century and the needs in mathematical modelling of efficient numerical algorithms as an alternative to classical methods of applied mathematics. This survey paper follows many of the main strands in the developments of these methods, both for general problems, stiff systems, and for many of the special problem types that have been gaining in significance as the century draws to an end.
RK Methods prove popular at IMA Conference on Numerical ODE's,SIAM News
  • G Byrne
G. Byrne and Hindmarsh, (1990), RK Methods prove popular at IMA Conference on Numerical ODE's,SIAM News,23/2 pp.14-15.
  • Fudzia Ismail
Fudzia Ismail, (2010), Lecture Notes on Numerical Methods (unpublished), University Putra Malaysia