 Research
 Open Access
 Published:
Computation of solutions to linear difference and differential equations with a prescribed asymptotic behavior
Advances in Difference Equations volume 2021, Article number: 173 (2021)
Abstract
Linear differential equations usually arise from mathematical modeling of physical experiments and realworld problems. In most applications these equations are linked to initial or boundary conditions. But sometimes the solution under consideration is characterized by its asymptotic behavior, which leads to the question how to infer from the asymptotic growth of a solution to its initial values. In this paper we show that under some mild conditions the initial values of the desired solution can be computed by means of a continuoustime analogue of a modified matrix continued fraction. For numerical applications we develop forward and backward algorithms which behave well in most situations. The topic is closely related to the theory of special functions and its extension to higherdimensional problems. Our investigations result in a powerful tool for solving some classical mathematical problems. To demonstrate the efficiency of our method we apply it to Poincaré type and Kneser’s differential equation.
1 Introduction
A huge variety of realworld problems is modelled by means of linear differential equations. Although questions of existence and uniqueness of solutions are easy to answer for linear differential equations, explicit solutions are rare, in particular for differential equations of order >2, so that numerical procedures are needed. But most of these procedures are restricted to initial and boundary value problems.
However, in some applications we do not have initial or boundary conditions. In probability theory for example, densities of probability distribution functions, stationary measures of stochastic processes or certain functionals defined on diffusion processes are characterized by ordinary differential equations and are often uniquely determined by a single regularity or integrability condition (see [1]).
Another area of possible applications concerns linear differential equations with almost constant coefficients. Following Levinson‘s seminal paper [2], a relatively rich theory concerning the asymptotic behavior of their solutions has been developed. Here, it is obvious to ask which initial values correspond to which asymptotic behavior, and how to compute these solutions numerically. Since the mathematical theory of differential equations is primarily qualitatively oriented, there is only little literature addressing this problem (see [3]). An exception is the class of secondorder linear differential equations, which has come into focus due to Miller’s famous algorithm (see [4–8]). This is because it has been turned out that many special functions can be represented as socalled minimal solutions of secondorder linear differential equations and their discrete analogues. But when it was recognized that this approach could not directly be transferred to higher order linear difference and differential equations (see [8]), the interest in this subject waned. For discrete systems and scalar differential equations, some of these problems have been investigated by Schäfke [9, 10] and Hanschke [11, 12].
In the sequel it is shown that the initial values corresponding to a specific growth property can be determined by means of a continuoustime analogue of a modified matrix continued fraction. Matrix continued fractions have been originally developed for computing subdominant solutions of linear systems of difference equations (see P. Levrie and A. Bultheel [13]) and stationary measures of discrete state Markov chains with blockband transition matrix (see [14, 15]).
Note that standard numerical methods for solving differential equations are dedicated to solving boundary value problems or initial value problems. In particular, if a numerical method is applied to a differential equation for some function \(x:[0,\infty )\to \mathbb{R}\), consistency/convergence statements guarantee that the approximation to \(x(t)\) converges to the exact value \(x(t)\) as the maximum step size h tends to 0 (note that we only consider linear problems, and hence, consistency implies convergence). Furthermore, the order of consistency/convergence gives some estimates on the speed of convergence. However, for any method, the error will increase with t, in most cases exponentially. This fact entails that the solution of the discretized system can have other asymptotic properties than the exact solution. In so far, finding a solution with prescribed asymptotic behavior, requires a thorough consideration not only of the original equation but also of its corresponding discretization scheme. The alignment of these two systems may be crucial for the success of the approach.
The rest of this paper is organized as follows: After some remarks on \(2\times 2\)blockmatrices and their inverses we present our main results. In order to be able to distinguish the asymptotically differently growing solutions of the underlying differential equation we introduce the concept of Σsubdominant solutions, which is a generalization of the concept introduced in [12]. It turns out that under certain regularity conditions each subspace of Σsubdominant solutions can be characterized by means of a continuoustime analogue of a modified matrix continued fraction. Since matrix continued fractions represent generalizations of the Jacobi–Perronalgorithm (see [16]), we refer to this correspondence as Jacobi–Perroncharacterization. To demonstrate the efficiency of our method we apply it to Poincaré type and Kneser‘s differential equation. Numerical examples complete our work.
2 Preparation: some notes on block matrices
In this paper, we will frequently use a block partition of some \(r\times r\)matrix
where B is a square \(p\times p\)matrix for some \(p< r\). In order to avoid an overload of notation, we introduce {F}_{1}=\left(\begin{array}{c}{I}_{p}\\ 0\end{array}\right)\in {\mathbb{C}}^{r\times p} and {F}_{2}=\left(\begin{array}{c}0\\ {I}_{rp}\end{array}\right)\in {\mathbb{C}}^{r\times (rp)}. Hence, in the above partition, we have \(B=F_{1}^{T}AF_{1}, C=F_{1}^{T}AF_{2}, \ldots\) .
Sometimes, we have to derive the inverse of a blockpartitioned matrix. Fundamental identities are
where \(S= (EDB^{1}C )^{1}\) and \(V= (BCE^{1}D )^{1}\), provided that A is nonsingular and that B or E, respectively, are nonsingular square submatrices; see [17, pp. 37–39].
3 Setting, notations, and definitions
We consider solutions to
where \(A(t)\in \mathbb{C}^{r\times r}\) is assumed to be invertible for all \(t\in I\). In case of the differential equation (4), we look for solutions being differentiable on \(I\setminus t_{0}\) and rightcontinuous in \(t_{0}\). Note that a scalar rth order linear differential equation can always be transformed into a system of the form (4). Therefore, we do not consider scalar rth order linear differential equations separately.
For the solutions of both (3) and (4), we can state some wellknown properties:

The solution space of (3) and (4), respectively, is a linear vector space of dimension r.

A fundamental system of solutions consists of r linearly independent solutions, say \((x^{(j)}(t) )_{t\in I}\) for \(j=1,\ldots ,r\). By setting \(z_{ij}(t)=x_{i}^{(j)}(t)\), we define matrices \(Z(t)=(z_{ij}(t))_{i,j=1}^{r}\) which are invertible for all \(t\in I\) (due to the linear independence of the columns), and the sequence \((Z(t))_{t\in I}\) is a matrixvalued solution of (3) or (4).

We can directly look for matrixvalued solutions to (3) or (4). If \(Z=(Z(t))_{t\in I}\) is a solution with \(Z(t)\in \mathbb{C}^{r\times p}\) for some \(p\in \mathbb{N}\), then we obtain another solution \(\tilde{Z}= (\tilde{Z}(t) )_{t\in I}\) with \(\tilde{Z}(t)\in \mathbb{C}^{r\times s}\) by setting \(\tilde{Z}(t)=Z(t)B\) for all \(t\in I\) with some constant matrix \(B\in \mathbb{C}^{p\times s}\) for some \(s\in \mathbb{N}\). Furthermore, if \(Z(t)\) has full rank (which is p for \(p\leq r\)) for some \(t\in I\), then \(Z(t)\) has full rank for all \(t\in I\).

In particular, we can look for solutions \(Z=(Z(t))_{t\in I}\) with square matrices \(Z(t)\in \mathbb{C}^{r\times r}\). Then \(Z(t)\) might be invertible, and the above rank statement can be written as follows: If \(Z^{1}(t)\) exists for some \(t\in I\) then \(Z^{1}(t)\) exists for all \(t\in I\). Furthermore, if Z is a solution with existing inverse \(Z^{1}(t_{0})\), and \(\tilde{Z}= (\tilde{Z}(t) )\) is another solution, we have \(\tilde{Z}(t)=Z(t)Z^{1}(t_{0})\tilde{Z}(t_{0})\). For the latter statement, \(\tilde{Z}(t)\) is not necessarily a square matrix.
As pointed out in the introduction, often we know that there are vectorvalued solutions with a certain asymptotic behavior. These solutions form a pdimensional subspace (\(p< r\)) of the space of all vectorvalued solutions. This pdimensional vector space is uniquely characterized by a matrixvalued solution \(P=(P(t))_{t\in I}\) with matrices \(P(t)\in \mathbb{C}^{r\times p}\) of full rank p, since then we obtain vectorvalued solutions \(x=(x(t))_{t\in I}\) by setting \(x(t)=P(t)\alpha \) for some \(\alpha \in \mathbb{C}^{p\times 1}\).
The characterization of the asymptotic behavior can have different forms:

In some situations, we know that there is a solution \((Z(t))\) of square and invertible matrices with an asymptotic representation of the form
$$ Z(t)=Y(t)+E(t), $$where the errorterm \(E(t)\) is ‘neglectible’ in comparison to the matrices \(Y(t)\) in the sense that \(Y^{1}(t)\) exists for all \(t\geq t_{1}\) (with some \(t_{1}\in I\)) with \(\lim_{t\to \infty } \vert \vert Y^{1}(t)E(t) \vert \vert =0\). We will briefly express this assumption as
$$ \lim_{t\to \infty }Y^{1}(t)Z(t)=I. $$(5)If \(P(t)\) contains the first p columns of \(Z(t)\), that is, \(P(t)=Z(t)F_{1}\), \(P(t)\) has rank p, and hence, the vector space of vectorvalued solutions \(x=(x(t))_{t\in I}\) with \(x(t)=P(t)\alpha \) for some α is pdimensional. In some sense, the columns of \(P(t)\) have an asymptotic expansion given by the first p columns of \(Y(t)\). (We have to be careful with this interpretation since the characterization of \(E(t)\) as the ‘error term’ is given in the form \(Y^{1}(t)E(t)\to 0\).)

Let \(P(t)=Z(t)F_{1}\) contain the first p columns of \(Z(t)\), and let \(R(t)=Z(t)F_{2}\) contain the last \(rp\) columns of \(Z(t)\). Set \(\Sigma ^{T}(t)=F_{2}^{T}Y^{1}(t)\in \mathbb{C}^{(rp)\times r}\). Under the assumption (5), it becomes obvious that \(\Sigma ^{T}(t)R(t)\) converges to \(I_{rp}\) while \(\Sigma ^{T}(t)P(t)\in \mathbb{C}^{(rp)\times p}\) converges to a null matrix of appropriate size. Hence, we have
$$ \lim_{t\to \infty } \bigl(\Sigma ^{T}(t)R(t) \bigr)^{1} \bigl( \Sigma ^{T}(t)P(t) \bigr)=0. $$(6)This may be interpreted as follows: With respect to multiplication with \(\Sigma ^{T}(t)\), the solution \((P(t))_{t\in I}\) is subdominant to the solution \((R(t))_{t\in I}\), or concisely, \((P(t))\) is Σsubdominant. In some sense, \(P(t)\) can be interpreted as ‘asymptotically normal’ to \(\Sigma (t)\).

Note that under the assumption (5), both denominator and numerator in (6) converge for the choice \(\Sigma ^{T}(t)=F_{2}^{T}Y^{1}(t)\). On the other hand, there are situations where (6) holds for a specific choice of the family \((\Sigma (t))_{t\in I}\) of matrices with full rank \(rp\), but neither denominator nor numerator converge for \(t\to \infty \). Hence, for \(Z(t)=(P(t)~R(t))\), the characterization of \(P(t)\) as the first p columns of a solution \((Z(t))\) of invertible matrices satisfying (5) is a special case of the characterization (6) with a specific choice of \((\Sigma (t))\), whereas the opposite is not true. Hence, the characterization of \(P(t)\), being subdominant with respect to some family \((\Sigma (t))\) of matrices, is more general.

For \(p=r1\), \(\sigma ^{T}(t)=\Sigma ^{T}(t)\) and \(R(t)\) are vectors. Hence (6) may be written as
$$ \lim_{t\to \infty } \frac{\langle \sigma ^{T}(t),P_{\bullet ,j}(t)\rangle }{\langle \sigma ^{T}(t),R(t)\rangle }=0,\quad j=1,\ldots ,r1, $$where \(P_{\bullet ,j}(t)\) denotes the jth column of \(P(t)\). This is equivalent to
$$ \lim_{t\to \infty } \frac{\langle \sigma ^{T}(t),x(t)\rangle }{\langle \sigma ^{T}(t),\tilde{x}(t)\rangle }=0 $$(7)for any solutions x, x̃ of (3) or (4), respectively, with the following assumptions: There is some vector \(\alpha \in \mathbb{C}^{p\times 1}\) with \(x(t)=P(t)\alpha \) for all \(t\in I\), and there is no such vector for x̃. This is the concept of σsubdominance which was introduced in [3, 12].
Since the Σsubdominance is the most general concept for characterizing the asymptotic behavior, we introduce a special notation for the space of all vectorvalued solution which can be derived from the matrixvalued Σsubdominant solution \((P(t))\): Let \(\Sigma =(\Sigma (t))_{t\in I}\) of \(r\times (rp)\)dimensional matrices with rank \(rp\), and let \((Z(t))_{t\in I}\) be a solution to (3) or (4), respectively, with the property (6) for \(P(t)=Z(t)F_{1}\) and \(R(t)=Z(t)F_{2}\). Then we define
The following is about the determination of \(S_{\Sigma }\).
4 The Jacobi–Perron characterization of Σsubdominant solutions
In the special case of \(p=r1\), (6) and (7) become equivalent. Up to notation, in [12], it was suggested to characterize the subspace \(\mathcal{S}_{\sigma }\) as follows:

For all \(\tau \in I\) and for all \(i=1,\ldots ,r\), define \((\Psi _{ij}(\tau ,t) )_{i=1}^{r}\) as a (vectorvalued) solution to (3), subject to \(\psi _{ij}(\tau ,t)=\delta _{ij}\), that is, the sequence of matrices \(\Xi (\tau ,t)= (\Psi _{ij}(\tau ,t) )_{i,j=1}^{r}\) is a matrixvalued solution of (3) with \(\Xi (\tau ,\tau )=I_{r}\).

In the case of existence, set
$$ \eta _{i}(\tau ,\sigma )=\lim_{n\to \infty } \frac{\langle \sigma (t),\Psi _{j}(\tau ,t)\rangle }{\langle \sigma (t), \Psi _{r}(\tau ,t)\rangle },\quad j=1,\ldots ,r1. $$ 
Then it was shown that the limits \(\eta _{1}(\tau ,\sigma ), \ldots , \eta _{r1}(\tau ,\sigma )\) exist and are finite iff there are r linearly independent solutions \(x^{(1)},\ldots ,x^{(r)}\) to (3) satisfying
$$ \lim_{t \to \infty } \frac{\langle \sigma (t),x^{(j)}(t)\rangle }{\langle \sigma (t),x^{(r)}(t)\rangle } =0,\quad i=1, \ldots , r1, $$(8)and
$$ \begin{vmatrix} x_{1}^{(1)}(\tau )&\cdots &x_{1}^{(r1)}(\tau ) \\ x_{2}^{(1)}(\tau )&\cdots &x_{2}^{(r1)}(\tau ) \\ \vdots &&\vdots \\ x_{r1}^{(1)}(\tau )&\cdots &x_{r1}^{(r1)}(\tau )\end{vmatrix}\neq 0. $$(9) 
$$ x\in \operatorname{span} \bigl\{ x^{(1)},\ldots ,x^{(r1)} \bigr\} \quad \text{iff}\quad \sum_{j=1}^{r1} \eta _{j}(\tau ,\sigma )x_{j}(\tau )+x_{r}( \tau )=0. $$(10)
(10) characterizes the rth entry of \(x(\tau )\) in terms of the other entries. By reinserting (10) into (3), it is seen that the first \(r1\) entries of \(x(\tau )\) satisfy a system of the form (3) of order \(r1\).

In [12], it was demonstrated how this method can be used to reduce the order of the underlying system step by step. In addition, it was shown that the algorithm may be interpreted as a generalization of socalled Jacobi–Perron algorithm; see [16].
In this paper, we deal with the determination of \(S_{\Sigma }\) for arbitrary \(p< r\) in only one step. For this purpose, let \((\Sigma (t))_{t\in I}\) be given, define \((\Xi (\tau ,t))\) as a solution to (3) or (4) with \(\Xi (\tau ,\tau )=I_{r}\), let \(F_{1}\), \(F_{2}\) be defined as above, and, in the case of existence, set

\(\eta (\tau ,\Sigma )=\lim_{t\to \infty } (\Sigma ^{T}(t) \Xi (\tau ,t)F_{2} )^{1} (\Sigma ^{T}(t)\Xi (\tau ,t)F_{1} )\in \mathbb{C}^{(rp)\times p}\),

\(\xi _{1}(\tau ,\Sigma )=\lim_{t\to \infty }\Sigma ^{T}(t) \Xi (\tau ,t)F_{1}\in \mathbb{C}^{(rp)\times p}\), and

\(\xi _{2}(\tau ,\Sigma )=\lim_{t\to \infty }\Sigma ^{T}(t) \Xi (\tau ,t)F_{2}\in \mathbb{C}^{(rp)\times (rp)}\).
Obviously, if \(\xi _{1}(\tau ,\Sigma )\) and \(\xi _{2}(\tau ,\Sigma )\) do exist so does \(\eta (\tau ,\Sigma )=\xi _{2}^{1}(\tau ,\Sigma )\xi _{1}(\tau , \Sigma )\). On the other hand, the existence of \(\eta (\tau ,\Sigma )\) does not imply the existence of \(\xi _{i}(\tau ,\sigma )\) for \(i=1,2\). The next result is a straightforward extension of the results in [12].
Theorem 4.1
Let \((\Sigma (t))_{t\in I}\) be a family of matrices \(\Sigma (t)\in \mathbb{C}^{r\times (rp)}\) with rank \(rp\), and let \(F_{1},F_{2},\Xi (\tau ,t)\), \(\eta (\tau ,\Sigma )\) be defined as above. The limit \(\eta (\tau ,\Sigma )\) exists if and only if there is a solution \((Z(t))_{t\in I}\) to (3) or (4), respectively, with \(\det (Z(t_{0}))\neq 0\),
If these conditions hold, we have \(x\in \mathcal{S}_{\Sigma }\) if and only if
Proof
In [12], the result was proven with respect to the recurrence relation (3) and \(p=r1\). Since our result is more general, we state a detailed proof here. However, the basic principles of the proof remain the same.
Assume first that the limit \(\eta (\tau ,\Sigma )\) exists. Define \(Z(t)\) by
Then
implying condition (12). Condition (11) follows from
Conversely, suppose there is a solution \((Z(t))_{t\in I}\) of invertible matrices satisfying (11) and (12). Then we have \(Z(t)=\Xi (\tau ,t)Z(t)\), or equivalently \(\Xi (\tau ,t)=Z(t)Z^{1}(\tau )\). Let Z(\tau )=\left(\begin{array}{cc}B& C\\ D& E\end{array}\right). (12) guarantees that B is invertible so that we are enabled to apply inversion formula (1) with
Note that the definition of S ensures that \(E'\) is invertible. Hence, we have \mathrm{\Xi}(\tau ,t){F}_{2}=Z(t)\left(\begin{array}{c}{C}^{\prime}\\ {E}^{\prime}\end{array}\right) and \mathrm{\Xi}(\tau ,t){F}_{1}=Z(t)\left(\begin{array}{c}{B}^{\prime}\\ {D}^{\prime}\end{array}\right), implying
Therefore, \(\eta (\tau ,\Sigma )\) exists with \(\eta (\tau ,\Sigma )B+D=0\), that is,
This concludes the proof since we have \(x\in \mathcal{S}_{\Sigma }\) if and only if \(x(t)=Z(t)F_{1}\alpha \) for some \(\alpha \in \mathbb{C}^{p\times 1}\). □
We refer to Theorem 4.1 as the Jacobi–Perron characterization of Σsubdominant solutions since the results gives an exact characterization of the pdimensional Σsubdominant subspace of solutions.
Note that Theorem 4.1 allows one to reduce the order of the differential equation if \(\eta (\tau ,\Sigma )\) can be computed explicitly: From (3) and (4), respectively, we obtain
By inserting (13) into (14), we get a reduced system for the first p entries of \(x(t)\in S_{\Sigma }\):
The other entries of \(x(t)\) can be calculated by applying (13) a second time.
Remark 4.1
Let \(u(t)\) satisfy an rth order linear difference or differential equation. By setting \(x(t)= (u(t),u(t+1),\ldots ,u(t+r1) )^{T}\) or \((u(t),u'(t),\ldots ,u^{(r1)}(t) )^{T}\), we easily obtain an equation of the form (3) or (4), respectively. In this case, (15) contains all information we are looking for, and another application of (13) for computing \(x_{p+1}(t), \ldots , x_{r}(t)\) is not necessary. In particular, for \(p=1\), we obtain a first order difference or differential equation for \(u(t)\).
Remark 4.2
In Theorem 5.2, we will show that the approximate values of \(\eta (\tau ,t)\) satisfy a continuedfractiontype recursion scheme. For this reason, we refer to \(\eta (\tau ,t)\) as some kind of matrixdriven continued fraction. Note that a similar construction can be found in [13] although the authors only use the ordinary term of subdominance. The results based on this can be derived from the more general concept by the restriction \(Y(t)=I_{r}\) or \(\Sigma ^{T}(t)=F_{2}^{T}\). For an overview on extensions of ordinary and generalized continued fractions with a special focus on matrixdriven models consult [18]. With regard to this overview, Theorem 4.1 may be interpreted as a matrixversion of Pincherletype convergence criteria for ordinary and generalized continued fractions [19–21].
Next, we show that an asymptotic expansion of the form (5) allows to find an even simpler variant of the Jacobi–Perron characterization.
Theorem 4.2
Let \((Z(t))_{t\in I}\) be a fundamental system for (3) or (4), respectively, let \((Y(t))_{t\in I}\) be a family of matrices satisfying (5), and set \(\Sigma ^{T}(t)=F_{2}^{T}Y^{1}(t)\) for all \(t\in I\). Then \(\xi _{1}(\tau ,\Sigma )\in \mathbb{C}^{(rp)\times p}\) and \(\xi _{2}(\tau ,\Sigma )\in \mathbb{C}^{(rp)\times (rp)}\) as defined above exist and \(x\in \mathcal{S}_{\Sigma }\) if and only if
Proof
By definition, we have
Due to \(Z(t)=\Xi (\tau ,t)Z(\tau )\), we can write \(\Xi (\tau ,t)=Z(t)Z^{1}(\tau )\). Since \(\Sigma ^{T}(t)=F_{2}^{T}Y^{1}(t)\), we conclude that
exists. Consequently,
implying
Again, this concludes the proof since we have \(x\in \mathcal{S}_{\Sigma }\) if and only if \(x(n)=Z(n)F_{1}\alpha \) for some \(\alpha \in \mathbb{C}^{p\times 1}\). □
From (16), we obviously return to (13) by multiplying both sides by \(\xi _{2}^{1}(\tau ,\Sigma )\). Again, it becomes clear that the method (13) still works in situations where the limits \(\xi _{i}(\tau ,\Sigma )\) do not exist and therefore (16) cannot be applied.
5 Equivalent backward computation
For the discrete problem (3), the Jacobi–Perron characterization can be exploited in a direct way (we only have to replace the limits by very large choices of t), whereas in the continuoustime case, the numerical calculations must be preceded by a suitable discretization.
Either way, algorithms should be efficient, and it seems natural to compute the values of \(\eta (\tau ,\Sigma )\) (or the \(\xi _{i}(\tau ,\Sigma )\)) for all values \(\tau \in [t_{0},t_{1}]\cap I\) for an ‘interval of interest’ \([t_{0},t_{1}]\). For this purpose, we demonstrate that the approximants of \(\eta (\tau ,\Sigma )\) or \(\xi _{i}(\tau ,\Sigma )\) can be computed by different kinds of ‘backward procedures’.
5.1 A direct backward computation
In case of the strong asymptotic condition (5), the natural approach is to define \(W^{(t)}\) as a solution to (3) or (4), respectively, with \(W^{(t)}(t)=Y(t)F_{1}\), that is, \(W^{(t)}(t)\in \mathbb{C}^{r\times p}\) consists of the first p columns of \(Y(t)\). For \(t\to \infty \), we should expect \(W^{(t)}(\tau )\to Z(\tau )\). Indeed, in this situation, we can write
(note that we \(W^{(t)}(\tau )\) and \(Z(\tau )\) are solutions (3) or (4), respectively, as functions of τ, and \(Z^{1}(t)W^{(t)}(t)\) is constant with respect to τ), and since (5) guarantees that \(Z^{1}(t)W^{(t)}(t)=Z^{1}(t)Y(t)F_{1}\) converges to \(I_{r}F_{1}=F_{1}\), the conjecture is true. In particular, in the discrete setting of (3), \(W^{(t)}(\tau )\) can be easily computed (numerically) for \(\tau \in [t_{0},t_{1}]\), and for \(t\gg t_{1}\), we get good approximations to \(P(\tau )=Z(\tau )F_{1}\).
Next we demonstrate that a similar kind of backward procedure can be used to compute the approximants of \(\eta (\tau ,\Sigma )\) even in the case that the less restrictive condition (5) holds.
Theorem 5.1
Let \((\Sigma (t))_{t\in I}\) be a family of matrices \(\Sigma (t)\in \mathbb{C}^{r\times (rp)}\) with rank \(rp\), and let \(Y(t)\) be an invertible \(r\times r\)matrix for all \(t\in I\) in such a way that \(\Sigma ^{T}(t)=F_{2}^{T}Y^{1}(t)\). Furthermore, let \((W^{(t)}(\tau ) )_{\tau \in I}\) be a solution to (3) or (4), respectively, with \(W^{(t)}(t)=Y(t)F_{1}\). Then we have
for the approximants of \(\eta (\tau ,\Sigma )\in \mathbb{C}^{(rp)\times p}\).
Proof
We write {Y}^{1}(t)=\left(\begin{array}{c}{H}^{T}(t)\\ {\mathrm{\Sigma}}^{T}(t)\end{array}\right). (17) holds for any solution Z with invertible \(Z(t)\). In particular, if we choose \(Z(t)=\Xi (\tau ,t)\), we obtain
where \(V(\tau ,t)\) is chosen according to (1), that is,
which proves our assertion. □
Theorem 5.1 suggests the following numerical methods.
Algorithm 5.1

Find \(Y(n)\) with \(\Sigma ^{T}(n)=F_{2}^{T}Y^{1}(n)\), set \(W^{(t)}(t)=Y(t)F_{1}\) for t sufficiently large.

Then compute \(W^{(t)}(n)\) successively for \(n=t1,t2,\ldots ,t_{0}\) by backward calculation.
For \(t\gg n\), the proportion of \(F_{1}^{T}W^{(t)}(n)\) and \(F_{2}^{T}W^{(t)}(n)\) is a good approximation to the proportion of \(F_{1}P(n)\) and \(F_{2}P(n)\), where \((P(n))_{\tau \in I}\) is the \(\mathbb{C}^{r\times p}\)valued solution characterizing \(\mathcal{S}_{\Sigma }\).
Algorithm 5.2

Set \(W^{(t)}(t)=Y(t)F_{1}\) for t sufficiently large.

Then compute \(W^{(t)}(n)\) successively for \(n=t1,t2,\ldots ,t_{0}\) by backward calculation.
For \(t\gg \tau \), \(W^{(t)}(n)\) is a good approximation for \(P(n)\).
5.2 Continuedfraction type scheme for η
According to Theorem 4.1, the limit \(\eta (\tau ,\Sigma )\) exists if and only if there is a fundamental system \((Z(t))_{t\in I}\) satisfying (11) and (12). Obviously, condition (11) does not depend on τ. Hence, there will be many situations in which \(\eta (\tau ,\Sigma )\) exists for all \(\tau \in I\).
In this section, we derive a recursion scheme for computing approximations of \(\eta (\tau ,\Sigma )\) in the discretetime setting. The advantage of this scheme is that approximations of \(\eta (\tau ,\Sigma )\) for different values of τ can be computed simultaneously. The special form of the recursive scheme justifies to refer to the values \(\eta (\tau )\) as some kind of generalized matrix continued fraction.
In order to derive the recursion scheme for \(\eta (\tau ,t)\), we define the approximation
For \(t\to \infty \), we have convergence to \(\eta (\tau ,\Sigma )\) by definition.
Theorem 5.2
With the notation introduced above and with A(t)=\left(\begin{array}{cc}B(t)& C(t)\\ D(t)& E(t)\end{array}\right), that is, \(B(t)=F_{1}^{T}A(t)F_{1}, C(t)=F_{1}^{T}A(t)F_{2}, \ldots \) , we have
for all \(t\in I\) and
for all \(\tau ,t\in I\) with \(\tau < t\), provided that these inverses exist.
Proof
For \(\tau =t\), we have \(\Xi (t,t)=I_{r}\) and hence
Let Y(t)=\left(\begin{array}{cc}\tilde{B}& \tilde{C}\\ \tilde{D}& \tilde{E}\end{array}\right). According to the inversion formula (2), we have \(F_{2}^{T}Y^{1}(t)F_{1}={\tilde{E}}^{1}\tilde{D}\tilde{V}\) and \(F_{2}^{T}Y^{1}(t)F_{2}={\tilde{E}}^{1}+{\tilde{E}}^{1}\tilde{D} \tilde{V}\tilde{C}{\tilde{E}}^{1}\) where \(\tilde{V}= (\tilde{B}{\tilde{C}}{\tilde{E}}^{1}\tilde{D} )^{1}\). Using this representation of Ṽ, it is easy to show that \((I_{r}+\tilde{D}\tilde{V}\tilde{C}{\tilde{E}}^{1} )\tilde{D}= \tilde{D}\tilde{V}\tilde{B}\), and hence
which is exactly the statement for \(\tau =t\).
Now let \(\tau < t\) and write {Y}^{1}(t)\mathrm{\Xi}(\tau ,t)=\left(\begin{array}{cc}{\beta}_{\tau}& {\gamma}_{\tau}\\ {\delta}_{\tau}& {\u03f5}_{\tau}\end{array}\right). By construction of \(\Xi (\tau ,t)\), we have \(\Xi (\tau ,t)=\Xi (\tau +1,t)A(\tau )\). Hence, we conclude that
which completes the proof. □
With the notations of Theorem 5.2, we obtain the following
Algorithm 5.3

Choose t sufficiently large.

Set \(\eta ^{(t)}(t,\sigma )=F_{2}^{T} Y(t)F_{1}\cdot (F_{1}^{T}Y(t)F_{1} )^{1}\).

For \(n=t1,t2,\ldots ,t_{0}\), compute
$$ \eta ^{(t)}(\tau ,\Sigma )= \bigl(\eta ^{(t)}(\tau +1, \Sigma )C(\tau )+E(\tau ) \bigr)^{1} \bigl(\eta ^{(t)}(\tau +1,\Sigma )B(\tau )+D(\tau ) \bigr). $$ 
By means of (15), compute approximate values to \(x(t_{0}+1), x(t_{0}+2), \ldots \) .
6 On the dichotomy of differential equations and their discretization schemes
For the differential equation (4), it is obvious to use Algorithms 5.1 and 5.2, where the numerical calculation of \(W^{(t)}(\tau )\) for \(\tau < t\) is performed by means of some discretization method. However, this discretization will effect the asymptotic behavior. Therefore,

in some situations, we will have to replace \(\Sigma (t)\) in algorithm 5.1 by a sequence adapted to the discretization method,

in almost all situations, we will have to replace \(Y(t)\) in algorithm 5.2 by a sequence adapted to the discretization method.
Example 6.1
We consider the case \(r=1\), although our results have little meaning in this situation since the space of solutions is onedimensional and explicitly known. Nevertheless, it becomes clear that the asymptotic behavior of the solutions of \(x'(t)=A(t)x(t)\), \(t\in I\), and the corresponding discretized system differ. Consider the differential equation \(x'(t)=(\lambda +\phi (t))x(t)\), \(t\in I=[0,\infty )\), for some constant \(\lambda \in \mathbb{R}\) and some function \(\phi (t)\in L^{1}\). Then the exact solution is given by
Now apply Euler’s explicit method for computing approximations \(x^{[h]}(n)\) to \(x(nh)\). Then
implying
From the general theory of discretization methods we know that
since we apply a consistent method to a linear and therefore Lipschitzcontinuous problem. Although the limit (22) is a key topic in numerical mathematics, we are interested in a somewhat different property: We want to compare the behavior of the exact solution \(x(t)\) for \(t\to \infty \) with the behavior of \(x^{[h]}(n)\) for \(n\to \infty \).
Set \(y(t)=e^{\lambda t}\) for \(t\geq 0\). From (19), we see that
Since \(\phi \in L^{1}\), we observe that there is a solution \(x(t)\) with
that is, (5) is satisfied for \(x'(t)=(\lambda +\phi (t))x(t)\), \(t\geq 0\), with \(y(t)=e^{\lambda t}\), \(t\geq 0\).
In the sequel, we consider the discretized system. Since \(x^{[h]}(n)\) is an approximation to \(x(nh)\), we conclude that
Under appropriate conditions (e.g. monotonicity), \(\phi \in L^{1}\) ensures that \(\sum_{k=0}^{\infty }\phi (kh)\) is absolutely convergent, so that the product on the righthand side converges to a finite value for \(n\to \infty \). Observe \(\ln (1+\lambda h)\lambda h\neq 0\), implying that \(y^{1}(nh)x^{[h]}(n)\) either tends to 0 or ∞. Hence, (5) is not satisfied for the discretized system with the sequence \((y(nh) )\). Therefore, setting \(W^{(N)}(N)=y(Nh)\) for some large N and compute \(W^{(N)}(n)\) backwards by use of (20) will not give good approximations to \(x(nh)\) for the solution \(x(t)\sim e^{\lambda t}\).
The above calculation already tells us what to do: We have to choose \(y^{[h]}(n)=(1+\lambda h)^{n}\). Then \((y^{[h]}(n) )^{1}x^{[h]}(n)\) converges to some value \(\in \mathbb{R}\setminus \{0\}\), that is, it converges to 1 for an appropriate choice of \(x^{[h]}(0)\). Hence, we could use Algorithm 5.2 in the following way: Set \(W^{(N)}(N)=y^{[h]}(N)\), compute \(W^{(N)}(n)\) backwards by means of (20). Then we obtain good approximations to \(x^{[h]}(n)\).
Note that usually, there is no need to solve \(x'(t)=(\lambda +\phi (t))x(t)\), \(t\in I\), numerically, since we have the explicit solution given in (19). However, this behavior is typical also in situations where we have no explicit solution.
Of course, there are better discretization methods (in terms of consistency order, speed of convergence, …) than the explicit Euler method. However, for any classical discretization method, the discretizaton error will increase (often exponentially) as \(t\to \infty \). Therefore, we can never expect the discretized system to have the same asymptotic behavior as the original differential equation.
For the sake of simplicity, we restrict the discussion in this paper to:

Singlestep methods. The reason is that discretizing (4) with \(A(t)\in \mathbb{C}^{r\times r}\) by means of a singlestep method will result in a system \(x^{[h]}(n+1)=A^{[h]}(n)x^{[h]}(n)\) with \(A^{[h]}(n)\in \mathbb{C}^{r\times r}\) whereas multistep methods will change (increase) the number of dimensions of the discretized system.

Constant step size h. This is mostly done for the sake of simplicity of the formulas.
This means that we approximate \(x(nh)\) by \(x^{[h]}(n)\) where
For explicit methods, \(D^{[h]}(n)=0\). With
we obtain \(x^{[h]}(n+1)=A^{[h]}(n)x(n)\), \(n=0,1,2,\ldots \) . Popular examples are as follows:

For the explicit Euler method, we have \(C^{[h]}(n)=A(nh)\).

For the implicit Euler method, we have \(C^{[h]}(n)=0\) and \(D^{[h]}(n)=A((n+1)h)\).

For the (implicit) trapezoidal rule, we have \(C^{[h]}(n)=\frac{1}{2}A(nh)\) and \(D^{[h]}(n)=\frac{1}{2}A((n+1)h)\).
7 Poincarétype/Levinsontype systems of linear difference and differential equations
In this section, we consider the case where \(A(\infty ):=\lim_{t\to \infty }A(t)\) exists. Basic results on the asymptotic behavior of the solutions of linear difference and differential equations with almost constant coefficients are due to Poincaré [22] and Perron [23–25]. A milestone in the analysis of such differential equations is due to Levinson [2]. Therefore, literature refers to these systems as Poincarétype equations, Poincaré–Perrontype equations, or Levinsontype equations (in particular, in the continuoustime setting). Levinsontype results refer to statements on the asymptotic behavior of the solutions of systems (3) or (4) for which we can write
where \(R(t)\) is summable/integrable and \(V(t)\to 0\) with some additional constraints (e.g. \(V'(t)\) should be summable/integrable with some conditions on the eigenvalues of \(A(\infty )+V(t)\), the latter conditions are referred to as dichotomy conditions). We refer to the literature (e.g. [2, 26–28]) for results in this setting or similar settings. An exact translation of Levinson’s ideas to the discretetime setting is due to Benzaid and Lutz [29], and therefore, such results are often referred to as Benzaid–Lutztype results (or sometimes, Levinson–Benzaid–Lutztype results). A more recent publication in this direction is [30] where further remarks on literature can be found. Note that our focus is not on deriving such results but using these results and finding numerical methods for computing solutions with prescribed asymptotic behavior. Therefore, referring to all literature in this direction is far beyond the scope of this paper, and furthermore, we will only consider the ‘simple’ situation where \(V(t)=0\).
7.1 Difference equations
In the discretetime setting of (3), let \(A(t)=A(\infty )+R(t)\) where

\(A(\infty )=BDB^{1}\) with \(D=\operatorname{diag}(\lambda _{1},\ldots ,\lambda _{r})\) and \(B=(b_{1},\ldots ,b_{r})\),

\(\sum_{t=t_{0}}^{\infty }\R(t)\<\infty \) for some \(t_{0}\in \mathbb{N}\).
By means of [29] or Theorem 8.25 in [31], we conclude that there is a fundamental system of vectorvalued solutions to (3), say \(x^{(1)},\ldots ,x^{(r)}\), with \(x^{(i)}(t)=(b_{i}+o(1))\lambda _{i}^{t}\) for \(i=1,\ldots ,r\).
The asymptotic representation of the solutions is equivalent to \(\lim_{n\to \infty }z_{i}\lambda _{i}^{n}=b_{i}\), and in matrix notation, we conclude that there is a solution \(Z=(Z(n))\) with \(Z(n)\in \mathbb{C}^{r\times r}\) for \(n\in \mathbb{N}_{0}\) with
Remark 7.1
By setting \(Y(t)=B\operatorname{diag} (\lambda _{1}^{t},\ldots ,\lambda _{r}^{t} )\), we find that \(Z(t)Y^{1}(t)\to I\). Unfortunately, this is not equivalent to our strong condition (5) which requires \(Y^{1}(t)Z(t)\to I\). There are some exceptions, e.g. if all eigenvalues of \(A(\infty )\) have absolute value 1 since in that situation, both \(Y(t)\) and \(Y^{1}(t)\) are bounded and we can argue that
7.2 Differential equations
Now consider (4) with \(A(t)=A(\infty )+R(t)\) where

\(A(\infty )=BDB^{1}\) with \(D=\operatorname{diag}(\lambda _{1},\ldots ,\lambda _{r})\) and \(B=(b_{1},\ldots ,b_{r})\),

\(\int _{0}^{\infty }\R(t)\ \,dt<\infty \).
By Levinsontype criteria (e.g. [2, 26, 28]), it is guaranteed that there is a fundamental system \(Z(t)\) of (4) with
Let us consider a special case: Let \(u(t)\) satisfy the scalar rthorder linear differential equation
with \(p_{0}(t)\neq 0\) for all \(t\in I\) and assume that the limits \(p_{k}=\lim_{t\to \infty }p_{k}(t)\) exist. Then the vector \(x(t)= (u(t),u^{(1)}(t),\ldots ,u^{(r1)}(t) )^{T}\) satisfies
Then
and the eigenvector corresponding to the eigenvalue \(\lambda _{j}\) has the form \((1,\lambda _{j},\ldots ,\lambda _{j}^{r1} )^{T}\). Hence, the solution associated with this eigenvector satisfies \(\lim_{t\to \infty }\frac{u'(t)}{u(t)}=\lambda _{j}\).
Remark 7.2
Again, setting \(Y(t)=B\operatorname{diag} (e^{\lambda _{1} t},\ldots ,e^{\lambda _{r} t} )\) does not imply that our strong condition (5) is met. Again, there are some exceptions, e.g. for \(\mathrm{Re}(\lambda _{j})=0\) for \(j=1,\ldots ,r\), both \(Y(t)\) and \(Y^{1}(t)\) are bounded and we can argue as in the discretetime setting.
7.3 Discretization
We give some instructions concerning the discretization of Poincarétype differential equations. As above, we focus on singlestep methods with constant step size h. Since these methods rely on the idea of replacing the integral at the righthand side of
by an appropriate summation formula, it becomes apparent that however we calculate, we finally arrive at
Since \(A^{[h]}(n)\) tends to some \(A^{[h]}(\infty )\) by assumption, we conclude from (24) that \(A^{[h]}(\infty )=I_{r}+hA(\infty )\) has eigenvalues \(\mu _{j}^{[h]}(n)=1+h\lambda _{j}+o(h)\). Applying the Levinsontype theorem for the discrete setting, we note that there is a fundamental matrix \(Z^{[h]}(n)\) with
provided that \(R(nh)\) satisfies the summability condition. For example, if \(R(t)\) is (componentwise) monotone, the integrability of \(R(t)\) implies summability of \(R(nh)\). Due to
we have \(\lim_{h\to 0}B^{[h]}=B\). More precisely, for all discretization methods discussed above, \(A^{[h]}(\infty )\) may be decomposed into \(I_{r}\) and \(A(\infty )\), and hence, the eigenvectors of \(A(\infty )\) coincide with the eigenvectors of \(A^{[h]}(\infty )\) (but with different eigenvalues), that is, \(B^{[h]}=B\).
Hence, if we want to compute solutions generated by the first p columns of the fundamental system \(Z(t)\) of the differential equation, a good approximation can be obtained by computing solutions generated by the first p columns of the fundamental system \(Z^{[h]}(n)\) of the discretized system. For this purpose, we need to compute the corresponding eigenvalues \(\mu _{1}^{[h]},\ldots ,\mu _{r}^{[h]}\).
We give some examples. Let \(D=\operatorname{diag}(\lambda _{1},\ldots ,\lambda _{r})\), then we have \(A(\infty )B=BD\) and \(B^{1}A(\infty )=DB^{1}\).

For the explicit Euler method, we have \(A^{[h]}(\infty )=I+hA(\infty )\). Therefore, we obtain \(A^{[h]}B=B+hA(\infty )B=(I+hd)B\), that is, \(\mu _{j}=1+h\lambda _{j}\) for \(j=1,\ldots ,r\).

For the implicit Euler method, we have \(A^{[h]}(\infty )=(IhA(\infty ))^{1}\), and hence
$$\begin{aligned} B^{1}A^{[h]}(\infty ) =&B^{1} \bigl(I_{r}hA(\infty ) \bigr)^{1}= \bigl(BhA(\infty )B \bigr)^{1} \\ =& (BhBD )^{1}= (IhD )^{1}B^{1}, \end{aligned}$$that is, \(\mu _{j}=\frac{1}{1h\lambda _{j}}\) for \(j=1,\ldots ,r\).

For the trapezoidal rule, we have \(A^{[h]}(\infty )= (I\frac{h}{2}A(\infty ) )^{1} (I_{r}+ \frac{h}{2}A(\infty ) )\), and we obtain
$$\begin{aligned} B^{1}A^{[h]}(\infty )B =& \biggl(B\frac{h}{2}A( \infty )B \biggr)^{1} \biggl(B+\frac{h}{2}A(\infty )B \biggr) \\ =& \biggl(B\frac{h}{2}DB \biggr)^{1} \biggl(B+ \frac{h}{2}DB \biggr) \\ =& \biggl(I_{r}\frac{h}{2}D \biggr)^{1} \biggl(I+\frac{h}{2}D \biggr). \end{aligned}$$Hence, we have \(\mu _{j}=\frac{1+\frac{h}{2}\lambda _{j}}{1\frac{h}{2}\lambda _{j}}\) for \(j=1,\ldots ,r\).

For Runge–Kutta4, we have
$$\begin{aligned} &B^{1}A^{[h]}(\infty )B \\ =&B^{1} \biggl(I_{r}+hA(\infty )+\frac{5}{6}h^{2}A^{2}( \infty )+ \frac{1}{2}h^{3}A^{3}(\infty )+ \frac{1}{6}h^{4}A^{4}(\infty ) \biggr)B \\ =&I_{r}+hD+\frac{5}{6}h^{2}D^{2}+ \frac{1}{2}h^{3}D^{3}+\frac{1}{6}h^{4}D^{4}, \end{aligned}$$that is, \(\mu _{j}=1+h\lambda _{j}+\frac{5}{6}h^{2}\lambda _{j}^{2}+\frac{1}{2}h^{3} \lambda _{j}^{3}+\frac{1}{6}h^{4}\lambda _{j}^{4}\).
Remark 7.3
Although each solution of the discretized system corresponds to a solution of the original differential equation, it is worth noting that for fixed step size h, the dominance–subdominance relationship between the solutions may change. As a simple example, consider the continuoustime setting where \(r=2\), \(A(\infty )=B\operatorname{diag}(1,100)B^{1}\) with all entries of B being ≠0. Then, for \(\Sigma ^{T}=(0,1)\) (resulting in the classical dominance and subdominance term), the solution corresponding to the eigenvalue −1 dominates over the solution corresponding to the eigenvalue −100. As a simple discretization scheme, choose the explicit Euler method with step size \(h=0.1\). For the discretized system, the eigenvalues are \(1+h\cdot (1)=0.9\) and \(1+h\cdot (100)=9\), where the latter eigenvalue corresponds to the original eigenvalue −100. Obviously, for the discrete system, the solutions corresponding to the eigenvalue 0.9 are subdominant.
This problem is wellknown in the context of initial value problems: If the initial values are chosen in such a way that the desired solution is the solution corresponding to the eigenvalue −1, the explicit Euler method and many other discretization schemes require a very small step size h since otherwise the solution corresponding to the eigenvalue −100 becomes dominant and will cause massive numerical deviations. This is a wellknown effect which belongs to the phenomenon of stiffness of differential equations.
In order to avoid the effects of stiffness, it is often recommended to use implicit discretization methods. Indeed, when applying the implicit Euler method in the situation sketched above, we would obtain the new eigenvalues \(\frac{1}{1h\cdot (1)}=\frac{10}{11}\) and \(\frac{1}{1h\cdot (100)}=\frac{1}{11}\), that is, the dominance–subdominance relationship of the two solutions is preserved.
In some way, this is not entirely true for all applications of implicit discretization schemes. Think of the situation where \(A(\infty )\) admits the eigenvalues +1 and +100. Then the corresponding eigenvalues of the implicit Euler method with step size \(h=0.1\) are \(\frac{1}{1h\cdot 1}=\frac{10}{9}\) and \(\frac{1}{1h\cdot 100}=\frac{1}{9}\). Hence, the apparently dominant solution (eigenvalue 100) corresponds to the subdominant solution of the discretized system (eigenvalue \(\frac{1}{9}\)). Of course, in this situation, the step size \(h=0.1\) is too large for aspects of accuracy.
Anyway, discussing all aspects of stiffness and stability definitions from a numerical point of view is far beyond the scope of this paper since we cannot claim to answer all questions related with them. This remark simply intends to draw attention to the fact that when dealing with solutions of differential equations with prescribed asymptotic behavior numerically, one should carefully study the properties of the resulting discrete system since it is not guaranteed that the dominance–subdominance relationship is preserved during the discretization process.
8 Numerical examples
8.1 A Poincarétype difference equation
Let \(D=\operatorname{diag}(2i,2i,2,2)\),
Furthermore, let \(A(t)=A(\infty )+R(t)\) for \(t\in \mathbb{N}_{0}\) where \(\sum_{t=0}^{\infty }\R(t)\<\infty \). The general remarks concerning linear differential equations with almost constant coefficients imply that \(Z(t)Y^{1}(t)\to I\) where
Define \(\tilde{Y}(t)=\frac{1}{2^{t}}Y(t)\). Then \(\tilde{Y}(t)\) and \((\tilde{Y}(t) )^{1}\) are bounded. Hence, we obtain
that is, our strong assumption (5) is satisfied. For this reason, we may apply all algorithms developed in this paper.
We start with testing our algorithms by setting \(R(t)=0\). Then \(Z(t)=Y(t)B^{1}Z(0)\) for all solutions Z and all \(t\in \mathbb{N}_{0}\). This means that each linear combination of the columns of \(Y(t)\) provides a solution of the underlying differential equation. We slightly modify \(Y(t)\):

Let us change the order of the columns such that \(Y(t)F_{1}\) represents the latter two columns of the original matrices \(Y(t)\), that is,
$$ Y(t)F_{1}= \begin{pmatrix} 0&2 \\ 1&4 \\ 0&0 \\ 1&1\end{pmatrix}\cdot \operatorname{diag} \bigl((2)^{t},2^{t} \bigr). $$With initialization time \(t=100\), we apply Algorithm 5.2, that is, we set \(W^{(100)}(100)=Y(100)F_{1}\) and compute \(W^{(100)}(n)\) for \(n=99,98,\ldots ,1,0\). We recognize that all numerically computed values coincide with the true entries of \(Y(n)F_{1}\).

With the same definition of \(Y(t)F_{1}\) as before, we want to apply Algorithm 5.3, that is, we set \eta (t)=\left(\begin{array}{cc}0& 0\\ 1& 1\end{array}\right){\left(\begin{array}{cc}0& 2\\ 1& 4\end{array}\right)}^{1}=\left(\begin{array}{cc}0& 0\\ \frac{5}{2}& 1\end{array}\right) for some large t (here, \(t=100\)), and compute \(\eta (n)\) by the continuedfractiontype scheme for \(n=t1,t2,\ldots ,0\). Due to \(R(t)=0\), the exact proportions \(\eta (n)\) do not depend on n. Indeed, Algorithm 5.3 reproduces the exact (and constant) matrices \(\eta (n)\).

Next, we are interested in the subspace spanned by the two solutions corresponding to the eigenvalues \(2i\), 2i. In order to obtain a realvalued solution, we set
$$ Y(t)F_{1}= \begin{pmatrix} 2&10 \\ 2&6 \\ 10&2 \\ 20&0\end{pmatrix}\operatorname{diag} \bigl(2^{t},2^{t} \bigr) $$for all \(t\in \mathbb{N}_{0}\) which are divisible by four. We apply the backward procedure 5.2 with \(t=100\). Again, the algorithm reproduces the exact solution.

Finally, we use \(Y(t)F_{1}\) as defined in the last point, and we set \eta (100)=\left(\begin{array}{cc}10& 2\\ 20& 0\end{array}\right){\left(\begin{array}{cc}2& 10\\ 2& 6\end{array}\right)}^{1}=\left(\begin{array}{cc}2& 3\\ \frac{15}{4}& \frac{25}{4}\end{array}\right) for applying Algorithm 5.3. It turns out that the algorithm reproduces the exact values (e.g. \(\eta (n)=\eta (100)\) for all n which are divisible by four) in this situation, too.
Now let us consider
Obviously, \(\sum \R(t)\\) converges. Suppose we are interested in the solutions corresponding to the real eigenvalues 2, −2. As in the case for \(R(t)=0\), we set
and apply Algorithm 5.2 or we set \eta (100)=\left(\begin{array}{cc}0& 0\\ \frac{5}{2}& 1\end{array}\right) and apply Algorithm 5.3. In Table 1, we have listed some numerical results. Although we are not in a position to find the exact solution to (3) in the given situation, we remark that the results of both algorithms ‘fit together’ in the sense that we have \(\eta ^{(100)}(0)= (F_{2}^{T}W^{(100)}(0) ) (F_{1}^{T}W^{(100)}(0) )\).
Since both algorithms lead to the same results, it becomes clear that using the continuedfraction type scheme in Algorithm 5.3 has some advantages: Whereas the growth/decay values of \(W^{(100)}(n)\) are clearly influenced by the absolute value of the eigenvalues, this is not true for the values of \(\eta ^{(t)}(n)\). Hence, computing \(\eta ^{(t)}(n)\) does not require any ‘scaling technique’ and Algorithm 5.3 can be applied with much larger t. E.g. for \(t=1000\), we obtain {\eta}^{(1000)}(0)=\left(\begin{array}{cc}1.5504& 0.6340\\ 1.0773& 1.3982\end{array}\right).
8.2 Ordinary subdominance for Poincarétype differential equations
The computation of subdominant solutions in the ordinary sense is a special case of our approach. By ‘ordinary sense’ we mean that we consider a scalar rth order linear differential equation, and that we say a subspace \(\mathcal{S}\) to be subdominant if \(\frac{u(t)}{v(t)}\to 0\) for every \(u\in \mathcal{S}\) and every solution \(v\notin \mathcal{S}\).
Consider the scalar differential equation
with some differentiable function \(\phi (t)\) converging to 0 monotonically. (The assumption of monotonicity is chosen for the sake of simplicity, it could be replaced by a weaker one.) With the above construction, we have
where the monotonicity ensures that \(V'(t)\in L^{1}\). \(A(\infty )\) has the eigenvalues \(\lambda _{1}=2\), \(\lambda _{2}=1\) and \(\lambda _{3}=1\). According to (23), there is a fundamental system of solutions \(x^{(1)}\), \(x^{(2)}\), \(x^{(3)}\) such that the asymptotic growth of \(x^{(i)}\) is expressed by \(\lambda _{i}\).
First, assume that we want to compute a solution which is a multiple of \(x^{(1)}\). Then we set \(p=1\) and \(\Sigma ^{T}(t)=F_{2}^{T}B^{1}\). With an arbitrary \(\lambda ^{*}\in (\lambda _{1},\lambda _{2})=(2,1)\), we can write
Since \(\lambda _{j}\lambda ^{*}>0\) for \(j=2,3\) and \(\lambda _{1}\lambda ^{*}<0\), this term obviously converges to 0, that is, the main condition (11) of Theorem 4.1 is satisfied.
For a thorough numerical computation, we have to use some discretization method. The monotonicity of \(\phi (t)\) ensures that \((V(nh))\) converges to 0 in a (componentwise) monotonic sense and therefore, (25) holds. Since \(B^{[h]}=B\), we choose \((\Sigma ^{[h]}(t) )^{T}=F_{2}^{T}B^{1}\). Then we can easily prove that (11) is satisfied for the discretized system; in the above calculation for the continuous case, we only have to replace \(e^{\lambda ^{*}t}\) by \((\mu ^{*} )^{n}\) with some \(\mu ^{*}\in (1+h\lambda _{1},1+h\lambda _{2} )\).
For our numerical experiment, we set \(\phi (t)=\frac{1}{1+t^{2}}\), \(h=0.001\) and start our backward procedure (for the discretized system) at \(t=20=2\cdot 10^{4}\cdot h\). For the discretization, we consider the explicit Euler method (EE) and the trapezoidal rule (TR). The results are listed in Table 2. We have included the values \(\frac{u_{1}(t)u_{1}(th)}{hu_{1}(th)}\) as approximations to \(\frac{u'_{1}(t)}{u_{1}(t)}\). The results clearly indicate that we calculate the solution \(u_{1}\) for which \(\frac{u'_{1}(t)}{u_{1}(t)}\) approaches −2 as \(t\to \infty \).
Next, assume that we want to compute solutions which are linear combinations of \(x^{(1)}\) and \(x^{(2)}\). Hence, we set \(p=2\) and \(\Sigma ^{T}(t)=F_{2}^{T}B^{1}\). Again, (11) is satisfied not only for the differential equation but also for its discretized version. In addition to the above parameters for \(p=1\), we compute a solution \(u_{1}(t)\) with \(u_{1}(0)=1\) and \(u'_{1}(0)=2\). The results are documented in Table 3, and they clearly indicate that here, \(\frac{u'_{1}(t)}{u_{1}(t)}\) approaches −1 as \(t\to \infty \). This is completely in accordance with our goals.
8.3 Knesers’s differential equation
For computing subdominant solutions in the ‘ordinary sense’, we were allowed to choose \(\Sigma ^{T}(t)= (\Sigma ^{[h]}(t) )^{T}=F_{2}^{T}B^{1}\) independently of the discretization scheme. Next, we demonstrate that there are situations in which the choice of \(\Sigma ^{[h]}(t)\) depends on the discretization scheme.
Consider Kneser’s differential equation
in which ϕ is continuous and realvalued with \(\phi (t)\to 0\) ‘sufficiently fast’. Kneser [32, 33] already investigated conditions under which there is a fundamental set of solutions \([u^{(1)},u^{(2)} ]\) to equation (26) satisfying
Various conditions on the speedofconvergence condition on \(\phi (t)\) were discussed by Wintner [34]. The algebraic characterization of these solutions in terms of its initial values and its computation for small values of t remained an open problem.
For the sake of simplicity, let us assume \(t_{0}=0\), \(\phi (t)\to 0\) monotonically and \(\phi (t)\in L^{1}\). Then we have \(\phi ((nh))\in \ell ^{1}\) for all \(h>0\) so that we can apply Levinsontype results to the underlying differential equation and Bensaid–Lutztype results to its discretization scheme.
Put x(t)=\left(\begin{array}{c}u(t)\\ {u}^{\prime}(t)\end{array}\right). Then \(x(t)\) satisfies (4) with A(t)=\left(\begin{array}{cc}0& 1\\ (1+\varphi (t))& 0\end{array}\right)\to A(\mathrm{\infty})=\left(\begin{array}{cc}0& 1\\ 1& 0\end{array}\right) and A(t)A(\mathrm{\infty})=\left(\begin{array}{cc}0& 0\\ \varphi (t)& 0\end{array}\right)\in {L}^{1}. In addition, we have \(A(\infty )B=BD\) for B=\left(\begin{array}{cc}1& 1\\ i& i\end{array}\right) and \(D=\operatorname{diag}(i,i)\). Applying (23), we conclude that there is a fundamental system \(Z(t)\) with \(Z(t)Y^{1}(t)\to I\) where
With \tilde{B}=\left(\begin{array}{cc}\frac{1}{2i}& \frac{1}{2}\\ \frac{1}{2i}& \frac{1}{2}\end{array}\right), set \(\tilde{Z}(t)=Z(t)\tilde{B}\) and
and obtain \(\tilde{Z}(t){\tilde{Y}}^{1}(t)\to I\). Note that \({\tilde{Y}}^{1}(t)=\tilde{Y}(t)\) and \(\sup_{t\geq 0} \vert \vert \tilde{Y}(t) \vert \vert < \infty \). Hence,
and therefore, (5) is satisfied, allowing the naive backward computation for computing the sinussolution.
However, due to the need of discretization, we have to replace \(Y(t)\) by a sequence \((Y^{[h]}(n) )\). For the discretized system, we have \(A^{[h]}(n)=A^{[h]}(\infty )+R^{[h]}(n)\), and clearly \(R^{[h]}(n)\in \ell ^{1}\). As pointed out above, the eigenvalues of \(A^{[h]}(\infty )\) depend on the discretization method. For example, for the explicit Euler method, we have the eigenvalues \(\mu _{j}=1+h\lambda _{j}\), that is, \(\mu _{1}=1+ih\) and \(\mu _{2}=1ih\). Hence, we choose
For the trapezoidal rule, we have
for \(n=0,1,2,\ldots \) . In order to assess the accuracy of the backward computation procedure, we apply it to those cases whose solutions we know. For this purpose, we choose

\(\phi ^{(1)}(t)=0\), implying \(u^{(1)}(t)=\sin (t)\) and \(u^{(2)}(t)=\cos(t)\) and

\(\phi ^{(2)}(t)=\frac{2}{(t+1)^{2}}\), implying
$$\begin{aligned}& \begin{aligned} u^{(1)}(t)&=\sqrt{\frac{1+(t+1)^{2}}{(t+1)^{2}}}\cos \bigl(t\arctan (t+1) \bigr) \\ &=\sqrt{\frac{1+(t+1)^{2}}{(t+1)^{2}}}\sin \biggl(t\arctan (t+1)+ \frac{\pi }{2} \biggr),\quad t\geq 0,\quad \text{and} \end{aligned} \\& \begin{aligned} u^{(2)}(t)&=\sqrt{\frac{1+(t+1)^{2}}{(t+1)^{2}}}\sin \bigl(t\arctan (t+1) \bigr) \\ &=\sqrt{\frac{1+(t+1)^{2}}{(t+1)^{2}}}\cos \biggl(t\arctan (t+1)+ \frac{\pi }{2} \biggr),\quad t\geq 0, \end{aligned} \end{aligned}$$which can be verified by standard calculations.
The results for \(\phi ^{(1)}\) can be found in Tables 4 and 5, the corresponding results for \(\phi ^{(2)}\) are listed in Tables 6 and 7. In all cases, we have chosen \(h=0.001=10^{3}\), and the backward computation starts at time \(T=10^{4}=10^{7}\cdot h\). ‘EE’ denotes the explicit Euler method, while ‘TR’ denotes the trapezoidal rule. In order to demonstrate the effect of choosing \(Y^{[h]}(n)\) according to the method of discretization, we have computed all results twice: In the first case, the backward computation was initialized with \(u_{1}(T)=\sin (T)\) and \(u_{2}(T)=\cos (T)\), in the ‘Corrected EE’ and ‘Corrected TR’, the backward computation was initialized with the corresponding column of \(Y^{[h]} (10^{7} )\) according to (29) and (30), respectively.
The tables clearly indicate that the corrected methods relying on initial values of the discretized problem work much better. In particular, even the explicit Euler method with these initial values yields very good results.
9 Conclusion and further research
As outlined in this paper the concept of Σsubdominant solutions of linear systems of differential and difference equations, respectively, has a strong impact to a lot of classical mathematical problems. Our aim was to raise awareness of this problem not only from a theoretical but also from a practical point of view. It is therefore to be expected that even more problems can be subjected to this context. As an example we mention the mathematical representation of regular solutions of complexvalued singular linear systems of differential equations. For the scalar case this problem has been addressed by Pincherle [19] and Perron [35], who linked it to the computation of certain ordinary and generalized continued fractions.
This paper is restricted to linear differential equations. But there is also a connection with nonlinear equations. For example, if x(t)=\left(\begin{array}{c}z(t)\\ {z}^{\prime}(t)\end{array}\right) satisfies
that is, \(z''(t)= (g(t)+\frac{f'(t)}{f(t)} )z'(t)f(t)h(t)z(t)\) for \(t\geq t_{0}\), the function \(y(t)=\frac{z'(t)}{f(t)z(t)}\) solves the Ricatti differential equation
which means that our methods can also be applied to special cases of Ricatti differential (or difference) equations. But this is not surprising since the continuedfractiontype scheme in Theorem 5.2 reminds one of Ricatti difference equations.
Without further investigations we cannot principally exclude that our algorithm is subject to inherent numerical instability. For example, in the situation of Sect. 7, it is not trivial to find \(Y(t)\) or \(\Sigma ^{T}(t)\) such that the strong criterion (5) or the weaker condition (6) is met. A trivial exception is given for \(R(t)=0\) where we know the exact solutions. Numerical computations in this situation reveal that our algorithms might still be susceptible to numerical instabilities. However, a profound study of these effects cannot be performed before it is clarified how to choose \(\Sigma ^{T}(t)\) in this situation. Therefore, these questions need further research. In order to solve these problems, it might make sense to consider the adjoint systems of (3) and (4) (some considerations in the scalar case can be found in [3, 11, 35]).
Availability of data and materials
No additional data or material was used to support this study.
References
Karlin, S., Taylor, H.M.: A Second Course in Stochastic Processes. Academic Press, San Diego (1981)
Levinson, N.: The asymptotic nature of solutions of linear systems of differential equations. Duke Math. J. 15, 111–126 (1948)
Hanschke, T.: Charakterisierung scalarsubdominanter Lösungen von linearen Differenzen und Differentialgleichungssystemen. Habilitationsschrift, Universität Mainz (1989)
Miller, K.S.: Linear Difference Equations. Benjamin, New York (1968)
Wimp, J.: Computation with Recurrence Relations. Pitman, Boston (1984)
Gautschi, W.: Computational aspects of threeterm recurrence relations. SIAM Rev. 9, 24–82 (1967)
Gautschi, W.: Zur Numerik rekurrenter Relationen. Computing 9, 107–126 (1972)
Zahar, R.V.M.: A mathematical analysis of Miller’s algorithm. Numer. Math. 27, 427–447 (1977)
Schäfke, F.W.: Lösungstypen von Differenzengleichungen und Summengleichungen in normierten abelschen Gruppen. Math. Z. 88, 61–104 (1965)
Schäfke, F.W.: Minimallösungen von Differenzengleichungen in Gruppen: eine verallgemeinerte Kettenbruchmethode. Math. Z. 98, 52–59 (1967)
Hanschke, T.: Characterization of antidominant solutions of linear differential equations. J. Comput. Appl. Math. 40, 351–361 (1992)
Hanschke, T.: Ein verallgemeinerter Jacobi–PerronAlgorithmus zur Reduktion linearer Differenzengleichungssysteme. Mh. Math. 126, 287–311 (1998)
Levrie, P., Bultheel, A.: Matrix continued fractions related to firstorder linear recurrence systems. Electron. Trans. Numer. Anal. 4, 46–63 (1996)
Hanschke, T.: A matrix continued fraction algorithm for the multiserver repeated order queue. Math. Comput. Model. 30, 159–170 (1999)
Baumann, H., Hanschke, T.: Computation of invariant measures and stationary expectations for Markov chains with blockband transition matrix. J. Appl. Math. 2020, Article ID 4318906 (2020)
Perron, O.: Über die Konvergenz der JacobiKettenalgorithmen mit komplexen Elementen. Sitzungsber. Akad. München Math.Phys. 37, 401–482 (1907)
Zhang, F.: Matrix Theory. Springer, New York (1999)
Baumann, H.: Generalized continued fractions: a unified definition and a Pringsheimtype convergence criterion. Adv. Differ. Equ. 2019, 406 (2019)
Pincherle, S.: Sur la génération de systèmes récurrents au moyen d’une équation linéaire différentielle. Acta Math. 16, 341–363 (1892)
Pincherle, S.: Delle funzioni ipergeometriche e di varie questioni ad esse attinenti. G. Mat. Battaglini 32, 209–291 (1894)
Cruyssen, P.: Linear difference equations and generalized continued fractions. Computing 22, 269–278 (1979)
Poincaré, H.: Sur les équations linéaires aux différentielles ordinaires et aux différences finies. Am. J. Math. 7, 203–258 (1885)
Perron, O.: Über Systeme von linearen Differenzengleichungen erster Ordnung. J. Reine Angew. Math. 147, 36–53 (1917)
Perron, O.: Über Summengleichungen und Poincarésche Differenzengleichungen. Math. Ann. 84(1), 1–15 (1921)
Perron, O.: Über Stabilität und asymptotisches Verhalten der Lösungen eines Systems von Differenzengleichungen. J. Reine Angew. Math. 161, 6–64 (1929)
Coddington, E.A., Levinson, N.: Theory of Ordinary Differential Equations. McGrawHill, New York (1955)
Hartman, P., Wintner, A.: Asymptotic integrations of linear differential equations. Am. J. Math. 77, 48–86 (1955)
Devinatz, A.: An asymptotic theorem for systems of linear differential equations. Trans. Am. Math. Soc. 160, 353–363 (1971)
Benzaid, Z., Lutz, D.A.: Asymptotic representation of solutions of perturbed systems of linear difference equations. Stud. Appl. Math. 77, 195–221 (1987)
Ren, G., Shi, Y., Wang, Y.: Asymptotic behavior of solutions of perturbed linear difference systems. Linear Algebra Appl. 395, 283–302 (2005)
Elaydi, S.: An Introduction to Difference Equations, 3rd edn. Springer, Berlin (2005)
Kneser, A.: Untersuchung und asymptotische Darstellung der Integrale gewisser linearer Differentialgleichungen bei großen reellen Werten des Arguments. J. Reine Angew. Math. 117, 72–103 (1889)
Kneser, A.: Untersuchung über die reellen Nullstellen der Integrale linearer Differentialgleichungen. Math. Ann. 42, 409–435 (1893)
Wintner, A.: Asymptotic integrations of the adiabatic oscillator. Am. J. Math. 69, 251–272 (1947)
Perron, O.: Über lineare Differenzen und Differentialgleichungen. Math. Ann. 66, 446–487 (1909)
Acknowledgements
We would like to thank the anonymous referees for their valuable comments.
Funding
Open Access funding enabled and organized by Projekt DEAL.
Author information
Authors and Affiliations
Contributions
The authors declare that the mathematical results were realized in collaboration with equal responsibility. Both authors read and approved the final manuscript.
Corresponding author
Ethics declarations
Competing interests
The authors declare that they have no competing interests.
Rights and permissions
Open Access This article is licensed under a Creative Commons Attribution 4.0 International License, which permits use, sharing, adaptation, distribution and reproduction in any medium or format, as long as you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons licence, and indicate if changes were made. The images or other third party material in this article are included in the article’s Creative Commons licence, unless indicated otherwise in a credit line to the material. If material is not included in the article’s Creative Commons licence and your intended use is not permitted by statutory regulation or exceeds the permitted use, you will need to obtain permission directly from the copyright holder. To view a copy of this licence, visit http://creativecommons.org/licenses/by/4.0/.
About this article
Cite this article
Baumann, H., Hanschke, T. Computation of solutions to linear difference and differential equations with a prescribed asymptotic behavior. Adv Differ Equ 2021, 173 (2021). https://doi.org/10.1186/s13662021033339
Received:
Accepted:
Published:
DOI: https://doi.org/10.1186/s13662021033339
Keywords
 Linear systems of difference and differential equations
 Asymptotic behavior of solutions of linear differential equations
 Modified matrixdriven Jacobi–Perron algorithm
 Poincaré–Perrontype differential equation
 Kneser’s differential equation