Abstract
We present a Lohnertype algorithm for rigorous integration of systems of delay differential equations (DDEs) with multiple delays, and its application in computation of Poincaré maps, to study the dynamics of some bounded, eternal solutions. The algorithm is based on a piecewise Taylor representation of the solutions in the phase space, and it exploits the smoothing of solutions occurring in DDEs to produce enclosures of solutions of a high order. We apply the topological techniques to prove various kinds of dynamical behaviour, for example, existence of (apparently) unstable periodic orbits in Mackey–Glass equation (in the regime of parameters where chaos is numerically observed) and persistence of symbolic dynamics in a delayperturbed chaotic ODE (the Rössler system).
Similar content being viewed by others
1 Introduction
We consider a system of delay differential equations (DDEs) with constant delays and the initial condition of the following form:
where \(m \in \mathbb {N}\) and \(\tau = \tau _1> \tau _2> \ldots > \tau _m \ge 0\) are the delays, \(x'\) is understood as a right derivative and \(\psi : [\tau , 0] \rightarrow \mathbb {R}^d\) is of class \(C^0\) on \([\tau , 0]\), \(x(t) \in \mathbb {R}^d\), \(f: \mathbb {R}^{(m+1)d} \rightarrow \mathbb {R}^d\).
In [34], we have presented a method of producing rigorous estimates on the function x(t) for \(t \ge 0\) for the simplest scalar (\(d = 1\)) DDE with a single delay:
The algorithm presented in [34] is an explicit Taylor method with piecewise Taylor representation of the solution over a fixed step size grid and with Lohnertype control of the wrapping effect encountered in interval arithmetic [22]. The method consists of two algorithms: one computing Taylor coefficients of the solutions at equally spaced grid points (together with the rigorous estimate on the error size), and the second one to compute enclosures of the solution segment after an arbitrary step of size \(\varepsilon \), smaller than the grid step size h. The method is suited to construct Poincaré maps in the phase space of the DDEs and it was successfully applied to prove several (apparently stable) periodic solutions to scalar DDEs [32, 34] (among them to Mackey–Glass equation). However, the second method—\(\varepsilon \) step part—is not optimal in the sense of the local error order. Essentially, the local error of some of the coefficients in the Taylor representation of solution is O(h). The reason is that some of the coefficients are computed using just an explicit Euler method with very rough estimates on the derivative. With this apparent loss of accuracy, the images of Poincaré maps in [34] are computed with less than optimal quality and are not well suited to handle more diverse spectrum of dynamical results.
In this work, we provide an effective way to increase the local order of the fullstep algorithm after each full delay of the integration procedure to significantly reduce the error size later on, when applying the second \(\varepsilon \) step procedure. Under some additional but reasonable assumptions about the integration time being long enough (see Definition 3 and Sect. 3.4), the modification allows to decrease the local error size of the \(\varepsilon \) step method for all coefficients to \(O(h^{n+1})\) where n is the order of representation of the initial function and h the step size of interpolation grid (compared to O(h) for the previous version from [34]).
All those enhancements are done without a significant increase in computational complexity of the most time consuming part of the algorithm: a Lohnertype method of controlling the wrapping effect. What is more, we present an elegant and more general Lohnertype method of wrapping effect control to handle both systems of equations and many delays such as Eq. (1). We also employ more elaborate Lohner sets to further reduce undesirable effects of interval arithmetic. With all those improvements, the method produces estimates on solutions of several orders of magnitude better than the previous one.
As a presentation of effectiveness of the new method, we give proofs of the existence of periodic solutions to Mackey–Glass equation for a wider spectrum of parameters than in [34]. The proofs are done for parameters in the chaotic regime and the orbits are apparently unstable. To this end, we need to expand on the theory, so we extend the concept of covering relations [5] to infinite Banach spaces, and we use Fixed Point Index in absolute neighbourhood retracts (ANRs) [8] to prove Theorem 25 about the existence of orbits for compact mappings in infinitedimensional spaces following chains of covering relations. We use this technique to show existence of symbolic dynamics in a perturbed model \(x'(t) = f(x(t)) + \varepsilon \cdot g(x(t\tau ))\), where f is a chaotic ODE in three dimensions (Rössler system) and for a couple of g’s which are some explicitly bounded functions. We hope similar techniques will allow to prove chaos in Mackey–Glass equation [24].
The paper is organized as follows: in Sect. 2 we present some basic theory for DDEs with constant delays, and we recall shortly the basic structure of (p, n)functions sets to represent objects in the phase space of (1). We also generalize this structure and we discuss its properties. In Sect. 3, we recall algorithm from [34] within a new, more general notation and we introduce several modifications that will be crucial for the complexity and accuracy of the algorithm. This new algorithm will form a base to some improvements in the construction of Poincaré maps in the phase space, especially to enhance the quality of the estimates. We present some benchmarks to show how the new estimates are in comparison with the old algorithm. In Sect. 4, we present topological tools to prove existence of a special kind of solutions to DDEs (1). We go beyond the Schauder fixedpoint theorem used in [34]: we use fixedpoint index on ANRs [8] and we adapt the notion of covering relations [5] to the setting of (p, n)function sets describing the infinitedimensional phase space of the DDEs. The compactness of the solution operator in the phase space for times bigger than delay allows to apply the Schauder fixedpoint index in our case. We establish theorems to prove existence of symbolic dynamics conjugated to the sequences of covering relations on (p, n)functions sets. In Sect. 5, we apply presented methods to prove existence of (apparently unstable) periodic solutions to the Mackey–Glass equation, for the original values of parameters for which Mackey and Glass observed numerically chaotic attractor [24]. We also prove existence of symbolic dynamics in a delayperturbed chaotic ODE (Rössler system).
1.1 Our Results in the Perspective of Current Research in the Field
There are many important works that establish the existence and the shape of the (global) attractor under some assumptions on (2), for example if it is of the form \(x'=\mu x(t) + f (x(t  1))\) and under the assumption that f is strictly monotonic, either positive or negative, or if f has a simple explicit formula, usually piecewise constant or affine. We would like here to point out some results, but the list is for sure not exhaustive (we refer to the mentioned works and references therein). MalletParet and Sell used discrete Lyapunov functionals to prove a Poincaré–Bendixson type of theorem for special kind of monotone systems [25]. Krisztin, Walther and Wu have conducted an intensive study on systems having a monotone positive feedback, including studies on the conditions needed to obtain the shape of a global attractor, see [17] and references therein. Krisztin and Vas proved that in the case of a monotonic positive feedback f, under some assumptions on the stationary solutions, there exists large amplitude slowly oscillatory periodic solutions (LSOPs) which revolve around more than one stationary solution [16]. Vas continued this work and showed a method to construct f such that the structure of the global attractor may be arbitrarily complicated (containing an arbitrary number of unstable LSOPs) [37]. On the other hand, Lani–Wayda and Walther were able to construct systems of the form \(x'=f(x(t  1))\) for which they proved the existence of a dynamic which is conjugate to a symbol shift (Smale’s horseshoe) [19]. Srzednicki and LaniWayda proved the existence of multiple periodic orbits and the existence of chaos for some periodic, toothshaped (piecewise linear) f by the use of the generalized Lefshetz fixed point theorem [18]. A nice review of works that deal with the question of existence of chaos in Mackey–Glass and similar systems are compiled in Walther review [38]. Recently, a new approach have been used to prove the existence of some periodic orbits to the Mackey–Glass equation in a limiting case when \(n \rightarrow \infty \) [15].
While impressive, all mentioned analytical/theoretical results are usually hard to apply in the context of general functions f, so we might look for other means of obtaining rigorous results in such cases, for example, by employing computers for this task. In recent years, there were many computerassisted proofs of various dynamical properties for maps, ODEs and (dissipative) partial differential equations ((d)PDEs) by application of the theory of dynamical systems with estimates obtained from rigorous numerical methods and interval arithmetic, see for example [12] and references therein. A big achievement of the rigorous computations are proofs of the existence of chaos and strange attractors, for example the paper by Tucker [35], and recently to prove chaos in Kuramoto–Shivasinski PDE [39]. The application of rigorous numerical methods to DDEs started to appear a few years ago and are steadily getting more attention. Probably the first method used to prove existence of periodic orbits by the expansion in Fourier modes was given in [41], and then in a more general framework and by a different theoretical approach in [14, 20]. Other methods, strongly using the form of r.h.s. f in (2), were used in [16] to prove the structure of the global attractor; then in [36] to close a gap in the proof of the Wright conjecture; and finally recently in [1] to show the existence of many stable periodic orbits for a DDE equation that is the limiting case of Mackey–Glass equation when \(n \rightarrow \infty \). To the author’s knowledge, the results from our work [34] are the first application of rigorous integration (forward in time) of DDEs in the full phase space for a general class of problems to prove the existence of some dynamics, namely the existence of apparently stable periodic orbits in Mackey–Glass equation. A different approach to one presented in our work [34] was recently published which uses Chebyshev polynomials to describe solutions in the phase space and a rigorous fixedpoint finding argument to produce estimates on the solutions to DDEs forward in time, together with estimates on the Frechét derivative of the timeshift operator \(\varphi (\tau , \cdot )\) [21]; however, the presented approach has one disadvantage: it can find solutions only on fulldelay intervals and therefore cannot be used directly to construct Poincaré maps. Recently, the extension of those methods was used to prove persistence of periodic solutions under small perturbations of ODEs [7], and a similar approach was used in a rigorous method of numerically solving initial value problems to statedependent DDEs [3]. This last work uses similar technique as our work to subdivide the basic interval into smaller pieces and piecewise polynomial interpolation of the functions in the phase space, but instead of Taylor it uses Chebyshev polynomials and a fixedpoint finding argument to prove existence of a true solution nearby. On the other hand, the parametrization method was used to prove the persistence of periodic orbits in delayperturbed differential equations, including the statedependent delays [40]; however, it assumes that \(\tau \) is relatively small. Our method has an advantage over those methods, as it allows for a larger amplitude of the perturbation and to prove theorems beyond the existence of periodic orbits, as we are showing persistence of symbolic dynamics in a perturbed ODE. Finally, there are also some methods to obtain rigorous bounds on the solutions, e.g. [28]; however, as authors say, they do not produce estimates of quality good enough to prove theorems.
1.2 Notation
For reader’s convenience, we include here all the basic notions used in this paper. We will also remind them the first time they are used in the text, if necessary.
We will denote by \(C^k([\tau , 0], \mathbb {R}^d)\) the set of functions which are \(C^{k}\) on \((\tau , 0)\) and right and left derivatives up to k exist at \(t = \tau \) and \(t = 0\), respectively. For short, we will usually write \(C^k\) to denote \(C^k([\tau , 0], \mathbb {R}^d)\) when d and \(\tau \) is known from the context.
We use standard convention in DDEs to denote the segment of \(x: (a\tau , b) \rightarrow \mathbb {R}^d\) at \(t \in (a, b)\) by \(x_t\), where \(x_t(s) = x(t+s)\) for all \(s \in [\tau , 0]\). Then, we will denote by \(\varphi \) the semiflow generated by DDE (1) on the space \(C^0\), \(\varphi (t, x_0):= x_t\) for a solution x of Eq. (1) with initial data \(x_0\).
The algorithms presented in this paper produce estimates on various quantities; particularly, we often work with sets of values that only enclose some quantity. Therefore, for convenience, by \(\mathbb {I}\) we will denote the set of all closed intervals \([a, b]: a \le b, a, b \in \mathbb {R}\) and we will denote sets by capital letters like X, Y, Z, etc., and values by lower case letters x, y, z, etc. Usually, the value \(x \in X\) for easier reading, but it will be always stated explicitly in the text for clarity.
Sometimes, instead of using subscripts \(x_i\), we will write projections to coordinates as \(\pi _i x\) or \(\pi _{\mathcal {X}} x\) (projection on some subspace \(\mathcal {X}\) of some bigger space. This will be applied to increase readability of formulas.
Let \(Z \subset \mathbb {R}^M\). By \(\texttt{hull}(Z)\) we denote the interval hull of Z, that is, the smallest set \([Z] \in \mathbb {I}^M\) such that \(Z \subset [Z]\). By \({\overline{Z}}\) we denote the closure of set Z, by \({{\,\textrm{int}\,}}Z\) we denote the interior of Z and by \(\delta Z\) we denote boundary of Z. If Y is some normed vector space and \(Z \subset Y\), then we will write \(\delta _Y Z, {{\,\textrm{int}\,}}_Y Z, {{\,\textrm{cl}\,}}_Y {Z}\) to denote boundary, interior and closure of Z in space Y. By \({{\,\mathrm{\texttt{Dom}}\,}}f\) we denote the domain of f.
For multiindex vectors \(\eta , \zeta \in \mathbb {N}^p\) we will write \(\eta \ge \zeta \) iff \(\eta _i \ge \zeta _i\) for all \(i \in \{1,\dots ,p\}\).
By \(\mathcal {M}(k, l)\), we denote the set of matrices of dimensions \(k \times l\) (rows \(\times \) columns), while by \(Id_{d \times d}\) the identity matrix and by \(0_{d \times d}\) the zero matrix in \(\mathcal {M}(d, d)\). When d is known from the context we will drop the subscript in Id.
By \({{\,\mathrm{\textbf{B}}\,}}^{\Vert \cdot \Vert }_{D}(p, r)\) we denote the (open) ball in \(\mathbb {R}^D\) in the given norm \(\Vert \cdot \Vert \) at a point \(p\in R^D\) with radius r. In the case when the norm is known from the context, we simply use \({{\,\mathrm{\textbf{B}}\,}}_{D}(p, r)\), and eventually \({{\,\mathrm{\textbf{B}}\,}}_{D}(r)\) for 0centered balls.
2 FiniteDimensional Description of the Phase Space
In the beginning, we will work with Eq. 2 (single delay) for simplicity of presentation, but all the facts can be applied to a more general Eq. (1).
As we are interested in computerassisted proofs of dynamical phenomena for (2), we assume that f is a simple/elementary function, so that it and its derivatives can be given/obtained automatically as computer programs (subroutines). Many equations encountered in theory and applications are of this form, two wellknown examples that fit into this category are Wright and Mackey–Glass equations. We will also assume that f is sufficiently smooth, usually \(C^\infty \) in both variables. Under this assumptions, the solution x(t) of (2) with \(x_0 = \psi \in C^0\) exists forward in time (for some maximal time \(T_{max}(\psi ) \in [0, +\infty ]\)) and is unique, see e.g. [4].
The crucial property of DDEs with f smooth (for simplicity we assume \(f \in C^\infty \)) is the smoothing of solutions [4]. If the solution exists for a long enough time, then it is of class at least \(C^{k}\) on the interval \((\tau + \tau \cdot k, \tau \cdot k)\) and it is of class at least \(C^{k}\) at \(t = \tau \cdot k\). If \(\psi \) is of class \(C^{m}\) then x is of class \(C^{m+k}\) on any interval \((\tau + \tau \cdot k, \tau \cdot k)\). Moreover, the solutions on the global attractor of (2) must be of class \(C^\infty \) (for \(f \in C^\infty \)). From the topological methods point of view, the smoothing of solutions implies the semiflow \(\varphi (t, \cdot ): C^0 \rightarrow C^0\) is a compact operator for \(t \ge \tau \), essentially by the Arzela–Ascoli theorem, see e.g. [34] (in general, \(\varphi (t, \cdot ): C^k \rightarrow C^k\) is well defined and compact in \(C^k\) if \(t \ge (k+1) \cdot \tau \)).
On the other hand, the solution can still be of a lower class, in some cases—even only of class \(C^0\) (at \(t = 0\)). It happens due to the very nature of the DDE (2), as the right derivative at \(t = 0\) is given by (2) whereas the left derivative of the initial data \(\psi \) at 0 can be arbitrary. This discontinuity propagates in time so the solution x, in general, is only of class \(C^k\) at \(t = k \cdot \tau \). In other words, a solution to DDE with an initial segment of higher regularity can sometimes “visit” the lower regularity subset of the phase space. This behaviour introduces some difficulties in the treatment of the solutions of DDEs and the phase space, especially when one is interested in finding \(\varphi (t, x)\) for \(t \ne m \cdot \tau \), \(m \in \mathbb {N}\).
In the rest of this section, we will recall the notion of (p, n)functions sets from [34] used in our method to represent functions in the phase space of DDE (2). However, we use a slightly different notation and we introduce some generalizations that will be suitable for the new integration algorithm in Sect. 3.
2.1 Basic Definitions
The algorithm we are going to discuss in Sect. 3 is a modified version of the (explicit) Taylor rigorous method for ODEs, that is, we will be able to produce the Taylor coefficients of the solution at given times using only the wellknown recurrent relation resulting from the successively differentiating formula (2) w.r.t. t. For this recurrent formula [presented later in the text, in Eq. (11)], it is convenient to use the language of jets.
Let \(m \in \mathbb {N}\) and let \(g: \mathbb {R}^m \rightarrow \mathbb {R}\) be of class \(C^{n}\) and \(z \in \mathbb {R}^d\). We denote by \(\alpha \) the mdimensional multiindex \(\alpha = \left( \alpha _1, \dots , \alpha _m \right) \in \mathbb {N}^m\) and we denote \(z^{\alpha } = \Pi _{i=1}^{m} z_i^{\alpha _i}\), \(\alpha  = \sum _{i=1}^{m} \alpha _i\), \(\alpha ! = \Pi _{i=1}^{n} \alpha _{i}!\), and
By \(J^{[n]}_{z}{g}\) we denote the ddimensional jet of order n of g at z, i.e.:
We will identify \(J^{[n]}_{z}{g}\) with the collection of the Taylor coefficients \(J^{[n]}_{z}{g} = \left( g^{[\alpha ]}(z)\right) _{\alpha  \le n}\), where
We will use \(J^{[n]}_{z}{g}\) either as a function defined by (3) or a collection of numbers depending on the context. For a function \(g: \mathbb {R}^m \rightarrow \mathbb {R}^d\) the jet \(J^{[n]}_z(g) = \left( J^{[n]}_z{g_1}, \ldots , J^{[n]}_z{g_d}\right) \) is a collection of jets of components of g.
In the sequel we will use extensively the following properties of jets:
Proposition 1
The following are true:

1.
if \(g: \mathbb {R}\rightarrow \mathbb {R}\) then \(J^{[k]}_z\left( {J^{[n]}_z{g}}\right) = J^{[k]}_z{g}\) for \(k \le n\);

2.
if \(f = g \circ h: \mathbb {R}\rightarrow \mathbb {R}\) for \(g: \mathbb {R}^d \rightarrow \mathbb {R}\) and \(h: \mathbb {R}\rightarrow \mathbb {R}^d\), then
$$\begin{aligned} J^{[n]}_{t_0} f = J^{[n]}_{t_0} \left( \left( J^{[n]}_{h(t_0)} g\right) \circ \left( J^{[n]}_{t_0}h_1, \dots , J^{[n]}_{t_0} h_d\right) \right) . \end{aligned}$$(4)
In other words, Eq. (4) tells us that, in order to compute nthorder jet of the composition, we only need to compose jets (polynomials) of two functions and ignore terms of order higher than n. For a shorter formulas, we will denote by \(\circ _J\) the composition of jets in (4), i.e. if \(a = J^{[n]}_{h(t_0)} g\) and \(b_i = J^{[n]}_{t_0} h_i\), for \(i \in \{1,\dots ,d\}\) then:
Remark 2
Operation from Eq. (4) can be effectively implemented in an algorithmic and effective way by means of Automatic Differentiation [26, 27].
From the Taylor’s Theorem with integral form of the remainder it follows:
Equation (6) motivates the following:
Definition 1
We say that a function \(x: \mathbb {R}\rightarrow \mathbb {R}\) has a forward Taylor representation of order n on interval \(I = [a, a+\delta )\), \(\delta > 0\) iff formula (6) is valid for \(x_I\).
We say that \(x: \mathbb {R}\rightarrow \mathbb {R}^d\) has a forward Taylor representation on I, iff each component \(x_j: \mathbb {R}\rightarrow \mathbb {R}\) has the representation on I.
Mostly, we will be using jets to describe (parts of) functions \(g: I \rightarrow \mathbb {R}^d\) with forward Taylor representations; therefore, in such cases we understand that in
the \(g^{(k)}\) is computed as a rightside derivative.
It is easy to see and it will be often used in the algorithms:
Proposition 3
Assume \(x: \mathbb {R}\rightarrow \mathbb {R}\) has a forward Taylor representation over \([t, t+\delta )\) of order n. Then, for \(k \in \{0, \dots , n\}\) the function \(x^{[k]} = \frac{x^{(k)}}{k!}\) has a forward Taylor representation over \([t, t+\delta )\) of order \(m = nk\) and
where
Proposition 4
Assume \(x: \mathbb {R}\rightarrow \mathbb {R}\) has a forward Taylor representation over \(I = [t, t+\delta )\) of order n. Then, for \(k=0,\dots ,n\)
for \(\varepsilon \in [0, \delta )\).
Remark 5
(On treating jets as vectors and vice versa) As mentioned earlier, for \(g: \mathbb {R}\rightarrow \mathbb {R}\) the Taylor series \(J^{[n]}_{t_0} g\) (which is formally also a function \(\mathbb {R}\rightarrow \mathbb {R}\)) can be uniquely identified with the collection of the Taylor coefficients \(\left( g^{[k]}(t_0)\right) _{0 \le k \le n}\), and this collection might be identified with a vector in \(\mathbb {R}^{n+1}\). One have a freedom how to organize the sequence into the vector (up to a permutation of coefficients), but in computer programs we will use the standard ordering from \(k = 0\) at the first coordinate of the vector and \(k = n\) at the last coordinate. Conversely, for any vector \(j \in \mathbb {R}^n\):
we can build a jet (at some point \(t_0\)) given by
This notion will be convenient when we would have some estimates on the jet, in particular, we can write that a jet \(J^{[n]}_{t_0}{g} \in X \subset \mathbb {R}^{n+1}\), meaning, that there exists a vector \(j \in X\) such that (9) is true for j interpreted as a jet at a given \(t_0\). Also, we can use the convention to do algebraic operations on jets, such as vector–matrix multiplication to describe jets in suitable coordinates, etc.
We will use convention with square brackets \(j_{[k]}\) to denote the relevant coefficient from the sequence \(j = J^{[n]}_{z}{g}\), and to underline the fact that we are using the vector j as its jet interpretation.
For \(g: \mathbb {R}\rightarrow \mathbb {R}^d\), the jet \(J^{[n]}_{t_0} g\) can be represented as a vector in a highdimensional space \(\mathbb {R}^M\), where \(M = d \cdot (n+1)\). We organize such jets into vectors in the same manner as in Eq. (8), but each \(j_{[k]}\) represents d consecutive values.
2.2 Outline of the Method and the Motivation for Phase Space Description
In a numerical Taylor method for ODEs, one produces the jet of solution at the current time \(t_0\) by differentiating the equation \(x'(t) = f(x(t))\) w.r.t. t on both sides at \(t_0\), as long as the differentiation makes sense. For \(f \in C^\infty \) we can get any order of the jet at \(t_0\) and the situation is similar in the case of DDE (2). If f has a jet at \(z = \left( x(t_0), x(t_0  \tau )\right) \) and x has a jet at \((t_0  \tau )\), both of order n, then we can proceed as in the case of ODEs to obtain jet at \(t_0\). In the following Lemma we underline the fact that this jet can be computed from \(x(t_0)\) and \(J^{[n]}_{t_0  \tau } x\):
Lemma 6
Let \(t_0\) be fixed and z be a solution to (2) with f of class at least \(C^{n}\). Assume z exists on \([t_0  \tau , t_0 + \delta ]\), and z is of class \(C^{n}\) on some past interval \(I = [t_0  \tau , t_0  \tau + \delta )\) for some \(\delta > 0\). Then z is of class \(C^{n+1}\) on \(I = [t_0, t_0 + \delta )\), \(J^{[n+1]}_{t_0} z\) exists and it is given explicitly in terms of \(z(t_0)\), \(J^{[n]}_{t_0  \tau } z\) and r.h.s. f of Eq. (2).
Proof
The continuity \(C^{n+1}\) on \([t_0, t_0 + \delta )\) follows directly from (2), since \(x'\) is of class \(C^n\) on \([t_0, t_0 + \delta )\). Let \(F(t):= f(z(t\tau ), z(t))\) and denote the coefficients of jets \(J^{[n]}_{t_0}F\), \(J^{[n+1]}_{t_0}z\) and \(J^{[n]}_{t_0  \tau }z\) by \(F_{[0]},\ldots ,F_{[n]}\), \(x_{[0]},\ldots ,x_{[n]},x_{[n+1]}\) and \(y_{[0]},\ldots ,y_{[n]}\), respectively, that is
Now Eq. (2) implies that
or more explicitly:
Using the obvious fact that \((z^{(k)})' = z^{(k+1)}\), we have \((z^{[k]})' = (k+1) z^{[k+1]}\) and matching coefficients of the same powers we end up with:
Finally, using Proposition 1 on \(J^{[n]}_{t_0}{F}\) we get:
Now, we get the following recurrent formula:
for \(1 \le k \le n\) with operation \(w_n * j\) defined for a jet j as:
Obviously \(F^{[k]}(x_{[0]}, y) = (F_{[0]},\ldots , F_{[k]}) = J^{[k]}_{t_0} F\), and together with (10) we get:
that depends only on the formula for f, \(x_{[0]} = z(t_0)\) and the jet \(y = J^{[n]}_{t_0  \tau } z\). \(\square \)
We note two important facts. Firstly, the a priori existence of the solution z over \([t_0, t_0 + \delta )\) is assumed in Lemma 6 and, when doing the integration step, it needs to be achieved by some other means—we will later show one way to do that. Secondly, Eq. (12) gives recipe to produce \(J^{[n+1]}_{t_0}\)—a jet of order one higher than the order of the input jet \(y = J^{[n]}_{t_0  \tau } x\). This simple observation will lead to a significant improvement in the rigorous integration algorithm in comparison with the first version presented in [34]. To have a complete rigorous method, we will need also formulas to estimate Taylor remainder in (6)—we will do this later in Sect. 3.
As the jet at \(t_0  \tau \) and the value at \(t_0\) allows to compute the jet of the solution x at \(t_0\), the reasonable choice for the description of functions in the phase space is to use piecewise Taylor representation of the solutions at grid points that match the step size of the method. Uniform step size over the integration time will assure that the required jets of the solution in the formula (12) are always present in the description of the solution. This approach have been proposed in [34] with the uniform order of the jets at each grid point. Now, we are going to elaborate how to implement and use the extra derivative we get in Eq. (12) to improve the method. For this, we will need a representation of solutions with nonuniform order of jets.
2.3 Representation of the Phase Space
Previously, in [34], we have proposed to describe sets in the phase space by piecewise Taylor forward representation of a fixed order n on a uniform grid of points over basic interval \([\tau , 0]\). Our definition was stated for \(d = 1\) (scalar equations), but the notion can be extended to any number of dimensions—just by assuming each of the Taylor coefficients in equations are in fact ddimensional vectors. No formula will be different in that case. In the rest of the paper we will assume that d is known from the general context, so we will omit it from the definitions.
We start with a key definition from [34] and then we will propose some generalization that will be relevant to many important improvements proposed later in this paper.
Definition 2
Let \(p \ge 1\), \(n \ge 0\) be given natural numbers. Let \(h = \frac{\tau }{p}\) be a grid step, \(t_i = i \cdot h\) be grid points for \(i \in \{0, \dots , p\}\) and let intervals \(I_i = [t_i, t_{i1})\) for \(i \in \{1, \dots , p\}\).
We define \(C^n_p([\tau , 0], \mathbb {R}^d)\) to be a set of functions \(x: [\tau , 0] \rightarrow \mathbb {R}^d\) such that x has a forward Taylor representation of order n on all \(I_i\) and such that \(x^{(n+1)}\) (understood as a right derivative) is bounded over whole \([\tau , 0]\).
From now on, we will assume that \(\tau \) is fixed and we will write \(C^n_p\) and \(C^{k}\) to denote \(C^n_p([\tau , 0], \mathbb {R}^d)\) and \(C^k([\tau , 0], \mathbb {R}^d)\), respectively. Moreover, whenever we use p and h without an additional assumption, we assume that h is given by \(h = h(p, \tau ) = \frac{\tau }{p}\) as in Definition 2.
Note that \(x \in C^{n}_{p}\) might be discontinuous at \(t = t_i\), \(i \in \{p, \dots , 0\}\). However, \(C^n_p \cap C^k\) is a linear subspace of \(C^k\) for any \(k \in \mathbb {N}\) and if \(k > n\) then obviously \(C^k_p \subset C^n_p\) (see [34]). Therefore, \(\mathcal {X} = C^n_p \cap C^0\) can be used as a suitable subspace of the phase space \(C^0\) for solutions of Eq. (2). In fact, following two lemmas, proved in [34], state that \(\varphi (h, \cdot )\) and \(\varphi (t, \cdot )\) for t large enough are well defined maps \(\mathcal {X} \rightarrow \mathcal {X}\):
Lemma 7
Assume f in (2) is \(C^\infty \) (or smooth enough). Let \(\psi \in C^{n}_p\) be an initial function to (2). If \(\varphi (h, \psi )\) exists then \(\varphi (h, \psi ) \in C^{n}_{p}\). Moreover, if \(\psi \in C^n_p \cap C^0\) and \(i = k \cdot p\) for some \(k \in \mathbb {N}\) then \(\varphi (i \cdot h, \psi ) \in C^{n+k}_{p} \cap C^k\).
Lemma 8
Assume f in (2) is \(C^\infty \) (or smooth enough). Let \(\psi \in C^{n}_p \cap C^0\) be initial function so that the solution to (2) exists up to some \(t \ge T\), where \(T = T(n, \tau ) = (n+1) \cdot \tau \). Then \(\varphi (t, \psi ) \in C^{n}_{p} \cap C^0\).
Time \(T(n, \tau )\) will be important when constructing Poincaré maps later in the paper, so to underline its importance, we state the following:
Definition 3
We call T(n) in Lemma 8 a long enough integration time.
In the current work, we generalize the notion of the space \(C^n_p\) to allow different order of the jets at different points of the grid. This will be beneficial to the final estimates later, as the representation of functions will take advantage of the smoothing of solutions:
Definition 4
Let p be fixed, \(\eta = (n_1, \dots , n_p) \in \mathbb {N}^p\) and let \(t_i, I_i, h\) be as in Definition 2. We define space of functions \(C^\eta _p\) so that \(x \in C^\eta _p\) iff x has a forward Taylor representation of order \(n_i\) on \(I_i\) and \(x^{(n_i + 1)}(I_i)\) is bounded for \(i \in \{1,\dots ,p\}\).
The discussion from Sect. 2.2 about the smoothing of solutions of DDEs shows that if we have nthorder Taylor representation at \(t = \tau \) then we can obtain \((n+1)\)thorder representation of x at \(t = 0\). Therefore, the order of the representation of solution will not decrease during the integration, and it can increase, in general, only by one at a time (after integration over a full delay). Therefore, we introduce the following special class of \(C^\eta _p\) spaces. Let \(q \in \{0, \dots , p\}\) by \(C^n_{p, q}\) we will denote the space \(C^{\eta }_{p}\) with
that is, the Taylor representation would be of order n on grid points \(\tau = t_p, t_{p1}, \dots , t_{q1}\) and of order \(n+1\) on \(t_{q}, t_{q+1}, \dots , t_1 = h\). Among all \(C^\eta _p\) spaces, spaces \(C^n_{p,q}\) will be used most extensively in the context of rigorous integration of DDEs, but we keep the general notation of Definition 4 for simplicity of formulas later.
Now, it is easy to see that \(C^{n}_{p, p} = C^{n+1}_{p, 0}\) and so that \(C^n_p = C^n_{p,0}\). Analogously we can write for \(q > p\) that \(C^{n}_{p, q} = C^{n+{\overline{q}}}_{p, {\underline{q}}}\) with \({\overline{q}} = \left\lfloor \frac{q}{p} \right\rfloor \) and \({\underline{q}} = q \bmod p\). With that in mind the analogue of Lemma 7 can be stated as:
Lemma 9
Let \(\psi \in C^{n}_{p, q}\) be an initial function to (2) and let h be as in Definition 2. If \(\varphi (h, \psi )\) exists then \(\varphi (h, \psi ) \in C^{n}_{p,q+1}\). Moreover, if \(\psi \in C^n_{p,q} \cap C^0\) and \(m = k \cdot p\) for some \(k \in \mathbb {N}\) then \(\varphi (m \cdot h, \psi ) \in C^{n+k}_{p,q} \cap C^k\).
Proof
It follows from the smoothing of solutions, the definition of \(C^{n}_{p,q}\), equality of spaces \(C^{n}_{p,p} = C^{n+1}_{p,0}\) and by applying method of steps (see e.g. [4]) to solve (2). \(\square \)
In the rigorous method we will use Lemma 9 as follows: we will start with some set \(X_0 \subset C^n_p = C^n_{p,0}\) defined with a finite number of constraints. Then we will in sequence produce representations of sets \(X_i = \varphi (h, X_{i1}) \in C^{n}_{p,i} = C^{n + {\overline{i}}}_{p,{\underline{i}}}\). Finally, to compare sets defined in different \(C^\eta _p\) spaces we would need the following simple fact:
Proposition 10
\(C^{\eta }_{p} \subset C^{\zeta }_{p}\) iff \(\eta _i \ge \zeta _i\) for all \(i \in \{1,\dots ,p\}\).
Now we show how to describe sets in \(C^{\eta }_p\). Obviously, by the Taylor’s theorem, we have that \(x \in C^\eta _{p}\) is uniquely described by a tuple \({\bar{x}} = \left( z(x), j(x), \xi (x)\right) \), where

\(z(x):= x(0) \in \mathbb {R}^d\),

\(j(x):= (j_1(x),\dots ,j_p(x))\) with \(j_i(x):= J^{[n_i]}_{t_i}(x) \in \mathbb {R}^{d \cdot (n_i+1)}\),

\(\xi (x):= (\xi _1(x),\dots ,\xi _p(x))\) and \(\xi _i(x):= x^{[n_i+1]}_{I_i} \in C^0(I_i, \mathbb {R}^d)\) are bounded.
Please note that the subscript i denotes the grid point here, not the component of the x in \(\mathbb {R}^d\). We will usually use subscript j for this purpose and we will write \(z(x)_j\), \(j_i(x)_j\), etc., but for now, all formulas can be interpreted simply for \(d = 1\), generalization to many dimensions being straightforward. We will use notation of z(x), j(x), \(\xi (x)\) etc. for a shorthand notation in formulas, sometimes dropping the argument x if it is known from the context. For example, we will say that we have a solution described by a tuple \((z, j, \xi ) \in \mathbb {R}^M \times (C^{0})^{p\cdot d}\), then we will know how to interpret them to get the function x. Here \(M = M(p, \eta , d) = d \cdot (1 + \sum _{i=1}^{p} (\eta _i + 1))\). A direct consequence is that:
Proposition 11
The space \(C^\eta _p\) is a Banach space isomorphic to \(\mathbb {R}^M \times (C^{0})^{p \cdot d}\) by \(x \mapsto (z(x), j(x), \xi (x))\), and with a natural norm on x given by
where \(\Vert \cdot \Vert \) denotes any norm in \(\mathbb {R}^M\) (all equivalent). We will use \(\max \) norm in \(\mathbb {R}^M\).
Let now \(\mathbb {I}\) be a set of all closed intervals over \(\mathbb {R}\). We define:
and \([\xi ](x) = \left( [\xi ]_1(x),\dots ,[\xi ]_p(x)\right) \in \mathbb {I}^{d \cdot p}\). That is a very complicated way to say \([\xi ](x)\) is the collection of bounds on the remainder terms in the Taylor representation of x. The interval \([\xi ]_i(x)_j\) is well defined, since we assumed each \(x^{(n_i+1)}\) bounded in Definition 4. Now, we can describe \(x \in C^{\eta }_{p}\) by the following finite set of numbers:
Definition 5
Let \(M = M(p, \eta , d) = d \cdot \left( 1 + \sum _{i=1}^{p} (\eta _i+1) \right) \).
We say that \({\bar{x}} = (z(x), j(x), [\xi ](x)) \in \mathbb {R}^M \times \mathbb {I}^{d \cdot p}\) is a (p,\(\eta \))representation of \(x \in C^\eta _p\).
Given \({\bar{x}} \in \mathbb {R}^M \times \mathbb {I}^{d \cdot p}\) by \(X({\bar{x}}) \subset C^\eta _p\) we denote the set of all functions whose \({\bar{x}}\) is their (p,\(\eta \))representation.
The number M is called the size of the representation and we will omit parameters if they are known from the context. We will use shorthand notation of \(\mathbb {R}^{n}_{p}\), \(\mathbb {R}^{\eta }_{p}\) or \(\mathbb {R}^{n}_{p,q}\) to denote appropriate \(\mathbb {R}^{M}\) in context of spaces \(C^{n}_{p}\), \(C^{\eta }_{p}\) and \(C^{n}_{p,q}\), respectively. We will write \(\mathbb {I}_p\) to denote \(\mathbb {I}^{p \cdot d}\). Note that we are dropping d because it is always well known from the context.
Observe that, in general, \(X({\bar{x}})\) contains infinitely many functions. We will identify \({\bar{x}}\) and \(X({\bar{x}})\), so that we could use notion of \(z({\bar{x}})\), \(j({\bar{x}})\), etc. Moreover, we will further generalize the notion of \(X({\bar{x}})\):
Definition 6
Let \(A \subset \mathbb {R}^\eta _p\), \(R \in \mathbb {I}_p\) be a product of closed intervals. We define set X(A, R) as
We call X(A, R) a (p,\(\eta \))functions set (or (p,\(\eta \))fset for short) and (A, R) its (p,\(\eta \))representation.
If A is convex then X(A, R) is also a convex subset of \(C^{\eta }_p\), so \(X(A, R) \cap C^k\) is also convex for any \(k \in \mathbb {N}\), see [34]. For a space \(C^{n}_{p,q}\) we will use the term (p, q, n)representation and (p, q, n)fsets when needed, but usually we will use just names like “fset” and “representation”.
Finally, we introduce the following shorthand symbols used for evaluation of terms:
for any function \(\xi \in C^{0}([0, h), \mathbb {R}^d)\) and any jet \(j \in \mathbb {R}^{N \cdot d}\) of order \(N \ge n\). The letters should be coined to the terms \(\texttt{T}\)—(T)aylor sum, \(\texttt{S}\)—(S)umma, formal name for the integral symbol, \(\texttt{E}\)—(E)valuation of the function. We use superscript n to underline order to which the operation applies, but in general, it can be simply inferred from the arguments (for example—maximal order of the jet j in \(\texttt{T}\)). Also, the superscript argument might be used to truncate computation for higherorder jets, e.g. let \(j = J^{[2n]}_t x\) and consider applying \(\texttt{T}^{n}(j)\) to Taylorsum only part of the jet. This will be used in algorithms later. If we omit the parameter n then it is assumed that we use the biggest possible n (for that argument, inferred from the representation itself).
Then we will write formally for any \(x \in C^\eta _p\):
where \(t = t_i + \varepsilon \), \(\varepsilon \in [0, h)\). For \(X = X(A,R)\) we will write \(a(X) = A\) and \([\xi ](X) = R\) and for \(x \in X(A, R)\) we will write \(a(x) = (z(x), j(x)) \in A\). We will also extend the notion of operators \(\texttt{T}\), \(\texttt{S}\) and \(\texttt{E}\) to (\(p,\eta \))fsets:
where \(t = t_i + \varepsilon \), \(\varepsilon \in [0, h)\). Note that \(\texttt{T}(x; t) = \texttt{T}({\bar{x}}; t)\), \(\texttt{S}(x; t) \in \texttt{S}({\bar{x}}; t)\) and of course \(\texttt{E}(x; t) \in \texttt{E}({\bar{x}}; t)\). In the rigorous computation we as well might use intervals or whole sets in the computation (e.g. \(t = [t] = t_i + [0, \varepsilon ]\))—in such circumstances we will get sets representing all possible results and in that way an estimate for the true value. From now on, we will also drop bar in \({\bar{x}}\) wherever we treat x as an element of \(C^{\eta }_p\) with a known bounds in form of some X(A, R).
Finally, we make an observation that for x—a solution to DDE (2) such that \(x_{t_0} \in C^\eta _p\)—the kth derivative \(x_{t_0}^{[k]}\) must also by representable by piecewise Taylor representation. In fact, since we know x(0) and all jets of the representation of \(x_{t_0}\) we can obtain \(x_{t_0}^{[k]}(0)\) by applying Lemma 6, namely Eq. (12). Then, the value of all other jets and remainders follows from Proposition 3:
Proposition 12
Let \(x \in C^{\eta }_{p}\) be a segment of a solution to DDE (2) and for \(k \in \mathbb {N}\) define \(\eta  k:= (\eta _1k, \dots , \eta _p k)\). Then for \(1 \le k \le \min _i{\eta _i}\) the derivative \(x^{[k]}(t)\) (interpreted as a right derivative) exists for \(t \in [\tau , 0]\) and \(x^{[k]} \in C^{\eta k}_{p}\), with a (p,\(\eta k\))representation given in terms of the (p,\(\eta \))representation of x:
for \(i \in \{1,\dots ,p\}\), where
3 Rigorous Integrator: Basic Algorithms and Some Improvements
Now we are ready to show how to obtain estimates on the representation Y of \(\varphi (h, X)\) for a given set of initial functions \(X \in C^{\eta }_{p}\). Due to the finite nature of the description of the set Y we will only have the relation \(\varphi (h, X) \subset Y\), in general.
First, we want to recall in short the details of the integrator from [34] as those are crucial in the improvements presented later. Then, we will show how to incorporate new elements: the extension of the representation from (12) and the spaces \(C^\eta _p\), the generalization to systems of equations (i.e. \(d > 1\)), and to multiple delays (under the assumption that they match the grid points). Then, we will discuss the Lohnertype method for the generalized algorithm.
3.1 ODE Tools
We start with describing some ODE tools to be used in rigorously solving (18) using the computer. For this we will need a method to find rigorous enclosures of the solution x (and its derivatives w.r.t. t) over compact intervals [0, h]. A straightforward method here is to consider Eq. (2) on \([t_0, t_0 + h]\), \(h \le \tau \) as a nonautonomous ODE, just as in the case of method of steps [4]. If we plugin a known initial function \(x_{t_0}\) into (2) and we denote \({\hat{f}}(z, t):= f(z, x_{t_0}(t\tau ))\) for \(t\in [0, h]\) we end up with nonautonomous ODE:
Please note that \(t  \tau \in {{\,\mathrm{\texttt{Dom}}\,}}\left( x_{t_0}\right) = [\tau , 0]\) so \({\hat{f}}\) is well defined, and \({\hat{f}}\) is of class \(C^{k}\) as long as the solution segment \(x_{t_0}\) is of class \(C^{k}\) (for f sufficiently smooth). Therefore, in view of (10) and (11), to find estimates on the Taylor coefficients of x over \(I_{t_0} = [t_0, t_0 + h)\) it suffices only to ascertain the existence of z over \(I_{t_0}\) and to have some finite a priori bounds Z on it, as the estimates on the higherorder coefficients will follow from recurrent formulas (10) and (11). Luckily, the existence of the solution to Eq. (18) and a good a priori bounds over \(I_{t_0}\) can be obtained using existing tools for ODEs [22, 43] as was shown in [34] and efficient implementations are already available [11, 12]. We have the following:
Lemma 13
(see Theorem 1 in [22]) We consider \({\hat{f}}\) as in nonautonomous ODE (18).
Let \(B \subset \mathbb {R}^d\) be a compact set. If a set \(W \subset \mathbb {R}^d\) is such that
then, any solution z of (18) such that \(z(t_0) \in B\) has \(z(t_0 + \delta ) \in Z\) for all \(\delta \in [0,\varepsilon ]\).
By \(\texttt{roughEncl}\) we denote a procedure (heuristic) to find the set Z:
We do not go into the details of this algorithm nor the proof of Lemma 13, but we refer to [11, 22, 43] and references therein.
Remark 14
Please note that finding a rough enclosure is a heuristic procedure, and therefore it is the point where the algorithm can fail (in fact the only one). If that happens, we must abort computations or apply some strategy to overcome the problem. In the ODE context, it is possible to shorten the step or to subdivide the set of initial conditions. Those strategies can be difficult to adopt in the DDE context: we cannot shorten step because of the definition of \(C^\eta _p\) spaces and the loss of continuity problems discussed earlier; and we could not afford extensive subdivision as we work with very highdimensional representations (projections) of functions. This makes obtaining the higherorder methods even more useful.
Consider now \(x_{t_0} \in C^n_p\), so that \({\hat{f}} \in C^{n+1}\). Applying Eqs. (10) and (11) allows to obtain \(J^{[n+1]}_{t_0} x\), where rough enclosure procedure gives Z such that \(x(I_{t_0}) \subset Z\). In what follows, we will sum up all the formulas needed to obtain (guaranteed enclosures on) the forward Taylor representation of x on the interval \(I_{t_0}\) of order \(n+1\).
3.2 The Rigorous Integrator in \(C^{n}_{p,q}\)
Assume now that we are given some \(x_0 \in C^n_{p,q}\). We will show how to compute rigorous estimates on a set \(X(A_h, R_h) \subset C^n_{p,q+1}\), with an explicitly given \(A_h \subset \mathbb {R}^n_{p,q+1}\) and \(R_h \in \mathbb {I}^{p\cdot d}\), representing \(\varphi (h, x_0)\), i.e. \(\varphi (h, x_0) \in X(A_h, R_h)\). The sets \(A_h\) and \(R_h\) will be computed using only data available in \((z(x), j(x), \xi (x))\). The subscript h in \(A_h\), \(R_h\) is used to underline that we are making a full step \(h = \frac{1}{p}\). In what follows, we will use the convention that \(X_h = X(A_h, R_h)\).
This is an analogue to the algorithm described in Sect. 2.2 in [34], but we account for the effect of smoothing of the solutions in DDEs (Lemma 9), so that \(\varphi (h, x_0) \in C^{n}_{p,q+1}\) (and we remind that \(C^n_{p,p} = C^{n+1}_{p,0} = C^{n+1}_p\)):
Theorem 15
Let \(x \in C^n_{p,q}\), with \(0 \le q < p\) and the representation \((z(x), j(x), [\xi ](x)) \in \mathbb {R}^n_{p,q} \times \mathbb {I}^{d \cdot p}\).
We define the following quantities:
Then, we have for \(y = \varphi (x, h)\) the following:
or, in other words, \(y \in X_h \subset C^{n}_{p,q+1}\).
Proof
Equations (21) and (22) are representing the shift in time by h (one full grid point): from segment \(x_0\) to segment \(x_h\) (of the solution x), therefore, we simply reassign appropriate jets \(j_i\) and remainders \([\xi ]_i\), as the appropriate grid points in both representations overlap. The rest of formulas are an easy consequence of Lemmas 9 and 13, the recurrence relation (10) for \(F^{[n]}\) and Proposition 12 to obtain estimates on \(x^{[k]}\) over intervals \([\tau , \tau + h)\) in (19). Note that the second term in (25) is formally given by the integral remainder in Taylor formula (6), namely for \(s \in [0, h)\) we have \(\xi _1(y)(s) \in [\xi ]_1(y) = \frac{1}{n+2} \cdot [F]_{[n+2]}\) (by the recurrence formula 10) and
\(\square \)
We denote the procedure of computing \(X(A_h, R_h)\) for a given initial data \(x \in C^n_{p,q}\) by \(\mathcal {I}\), i.e. \(\mathcal {I}(x) = X(A_h, R_h)\). Clearly, it is a multivalued function \(\mathcal {I}: C^n_{p,q} \rightrightarrows C^n_{p,q+1}\). We are abusing the notation here, as \(\mathcal {I}\) is a family of maps (one for each domain space \(C^n_{p,q}\)), but it is always known from the context (inferred from the input parameters).
We would like to stress again that the increase in the order of representation at \(t = h\) in the solution x will be very important for obtaining better estimates later. It happens in Eq. (23), as the resulting jet is of order \(n+1\) instead of order n as it was in [34]. Please remember that \(F^{[n]}\) is a recurrent formula for computing whole jet of order n of function \(F = f \circ (x(\cdot ), x(\cdot  \tau ))\) at the current time t, so it produces a sequence of coefficients, when evaluating (20) and (23). Obviously, each of those coefficients belongs to \(\mathbb {R}^d\).
The nice property of the method is that the Taylor coefficients at \(t = 0\), i.e. \(j_1(y)\) are computed exactly, just like in the corresponding Taylor method for ODEs (or in other words, if x is a true solution to (2) and \(X_h = \mathcal {I}(x)\) then \(J^{(n+1)}_h(x) = j_1(X_h)\)). It is easy to see, as formulas (21) and (23) does not involve a priori any interval sets (bracketed notation, e.g. \([\xi ]\),[Z], etc.). Therefore, to assess local error made by the method we only need to investigate Eq. (25), which is essentially the same as in the Taylor method for ODEs. As the interval bounds are only involved in the remainder part \(\left( [F]_{[n+1]} \cdot [0, h]\right) \cdot h^{n+1}\), the local error of the method is \(O(h^{n+2})\). Since \(J^{(n+1)}_h(x) = j_1(X_h)\) for a true solution x, this error estimation also applies to all the coefficients in the \(j_1(y)\) computed in Eq. (23) in the next integration step, when computing \(X_{2h} = \mathcal {I}(X_h)\), as they depend on \(z(X_h)\) that already contains the error. It will be also easily shown in numerical experiments (benchmarks) presented at the end of this section.
3.3 Extension to Many Delays
Now, we are in a position to show how our algorithm can be generalized to include the dependence on any number of delays \(\tau _i\) as in Eq. (1), as long as they match with the grid points: \(\tau _i = i \cdot h\). Therefore, we consider the following:
where \(1 \le m \le p\) and \(p = p_1> p_2> \ldots > p_m \ge 1\). We will denote by \(u(x_t) = u_f(x_t):= (x(t), x(t  p_1 h), x(t  p_2 h), \ldots , x(t  p_mh))\) the set of variables that are actually used in the evaluation of the r.h.s. f in Eq. (26) [as opposed to “unused” variables, those at grid points not corresponding to any delays \(\tau _i = p_i \cdot h\) in (26)]. This distinction will be important to obtain good computational complexity later on. In case of Eq. (2), we have \(u(x_t) = (x(t), x(t\tau ))\). Please note that since \(u(x_t)\) contains variables at grid points, it is easy to obtain \(J_{t}^{(n)} u\) of appropriate order n. If \(u = u(x_t)\), we will use subscripts \(u_{0}\), \(u_{p_1}\), etc. to denote respective projections onto given delayed arguments, and we will use \(u_{p_i,[k]}\) to denote their appropriate coefficients of the jet \(J^{(n)}_{\tau _i} x_t\).
In order to present the method for many delays we need to redefine \(F(t) = (f \circ u \circ x) (t)\) and investigate Eqs. (19)–(25). It is easy to see, that the only thing which is different is F and computation of its jets. Thus, we rewrite the algorithm \(F^{[n]}\) from Eq. (11) in terms of \(u = u(x)\):
Now, the algorithm from (19)–(25) for an \(x \in C^{\eta }_p\) consists of two parts. First, the enclosure of the solution and all used variables over the basic interval [0, h]:
then, building the representation after the step h:
Please note that we used in (29) symbol \([U]_0\) to denote enclosure of x over [0, h] (computed by the \(\texttt{roughEncl}\) procedure). All other components of [U] are computed estimates on jets \(j_{p_i}(x)\) over the same interval [0, h] using Proposition 3. That way, we can think of [U] as the enclosure of u over interval [0, h]. We have also generalized the algorithm to be valid for any \(C^\eta _p\) by introducing the notion of \(n(\eta ,f)\) in Eq. (28). The \(n(\eta ,f)\) depends on f in the sense, the minimum is computed only for \(n_i\) that are actually used in computations.
3.4 Steps Smaller than h
In this section, we consider computation of the (p, n)representations of \(\varphi (t, x_0)\) where t is not necessary the multiple of the basic step size \(h = \frac{\tau }{p}\), and for the initial \(x_0 \in C^{\eta }_{p}\), where the apparent connection between \(\eta \), n and t will be discussed soon. This problem arises naturally in the construction of Poincaré maps. Roughly speaking, the Poincaré map P for a (semi)flow in the phase space \(\mathcal {X}\) is defined as \(P(x) = \varphi (t_P(x), x)\), where \(x \in S \subset \mathcal {X}\) and \(t_P: S \rightarrow (0, \infty )\)—the return time to the section S  is a continuous function such that \(\varphi (t_P(x), x) \in S\) (we skip the detailed definition and refer to [34]). We see that the algorithm presented so far is insufficient for this task, as it can produce estimates only for discrete times \(t = i \cdot h\), \(i \in \mathbb {N}\), not for a possible continuum of values of \(t_P(S)\). It is obvious that we can express \(t = m \cdot h + \varepsilon \) with \(m \in \mathbb {N}\) and \(0< \varepsilon < h\) and the computation of \(\varphi (t, x_0)\) can be realized as a composition \(\varphi (\varepsilon , \varphi (m \cdot h, x_0))\). Therefore, we assume that the initial function is given as \(x_m = \varphi (m \cdot h, x)\) and we focus on the algorithm to compute (estimates on) \(x_\varepsilon = \varphi (\varepsilon , x_m)\).
First, we observe that, for a general \(x_m\) in some \((p, \eta )\)fset, we cannot expect that \(x_\varepsilon \in C^{\zeta }_p\) for any \(\zeta \). The reason is that the solution x of DDE (2) with initial data in \(C^\eta _p\) can be of class as low as \(C^0\) at \(t=0\), even when the r.h.s. and the initial data is smooth (as we have discussed in the beginning of Sect. 2). The discontinuity appears at \(t = 0\) due to the very nature of Eq. (2). This discontinuity is located at \(s = \varepsilon \) in the segment \(x_\varepsilon \) of the solution and, of course, we have \(\varepsilon \in [h, 0]\). Therefore, the function \(x_\varepsilon \) does not have any Taylor representation (in the sense of Definition 1) on the interval \(I_1 = [h, 0]\), as the first derivative of x is discontinuous there.
On the other hand, we are not working with a general initial function, but with \(x_m = \varphi (m \cdot h, x_0)\), with \(x_0 \in C^\eta _p\). From Lemma 9 we get that \(x_m \in C^{\eta + n + 1}_{p} \cap \mathcal {C}^{n + 1}\), where \(n \in \mathbb {N}\) be the largest value such that \(m \ge (n + 1) \cdot p\). Moreover, the same is true for \(x_{m+1} = \varphi (h, x_m)\). Therefore, \(x_\varepsilon = \varphi (\varepsilon , x_m) \in \mathcal {C}^{n+1}\), so that it has a \(C^{n}_{p}\) representation.
Now, the question is: can we estimate this (p, n)representation in terms of the coefficients of representations of \(x_m\) (and maybe \(x_{m+1}\))? The answer is positive, and we have:
Lemma 16
Assume x is a solution to (2) with a segment \(x_0 \in C^{\eta }_{p} \cap \mathcal {C}^{0}\). Let \(t \in \mathbb {R}\) be given with \(t = m \cdot h + \varepsilon \), \(m \in \mathbb {N}\), \(0< \varepsilon < h\). Let \(n = \lfloor \frac{m}{p}\rfloor  1\) and assume \(n \ge 0\), i.e. \(m \ge p\) and \(t \ge \tau \).
Let denote \(x_m = \varphi (m \cdot h, x_0)\) and \(x_{m+1} = \varphi (m \cdot h + h, x_0)\) and for \(i \in \{1,\ldots , p\}\) let
Then we have \(x_t \in X_\varepsilon \subset C^{n}_{p} \cap C^{n+1}\) for \(X_\varepsilon \) given by:
Before the proof, we would like to make a small comment. The representation of \(x_{m+1}\) is used for optimization and simplification purposes, as usually we have it computed nevertheless (when finding the crossing time of the Poincaré map). It contains the representation of x over \([mh, mh + h)\) in \(j_1\). Otherwise we would need to expand the jet of solution x at \(t = 0\) to compute \([R]_1\) and z in (33). Also, the formula (32) would be less compact.
Proof of Lemma 16
It is a matter of simple calculation. To focus the attention on the \(\varepsilon \) step, let us abuse notation and denote \(x_t = x_\varepsilon = \varphi (\varepsilon , x_m)\). We have
so we get a straightforward formula:
where representations of \(x^{[k]}_{m}\) are obtained by applying Proposition 12. Similarly, one can find that
and for \(s \in [0, h)\), \(i \in \{1, \ldots , p \}\):
Note, in the second case of Eq. (38), we have \(0 \le (\varepsilon + s  h) < h\). Now, we exchange each \(\xi \) with \([\xi ]\) in Eqs. (36)–(38) to get the corresponding estimates in Eqs. (33)–(35). \(\square \)
This algorithm is valid for any number of dimensions and for any number of delays (i.e. for any definition of used variables u(n, f))—in fact, there is no explicit dependence on the r.h.s of (2) in the formulas—the dynamics is “hidden” implicitly in the already computed jets \(j_{i}(x_m)\) and \(j_1(x_{m+1})\). This form of the algorithm will allow in the future to make general improvements to the method, without depending on the actual formula for the projection of used variables u(n, f) in the r.h.s. of DDE (1), or even when constructing methods for other forms of functional differential equations. We will denote the \(\varepsilon \) step algorithm given by (33)–(35) by \(\mathcal {I}_\varepsilon \).
As a last remark, similarly to the discussion in the last paragraph of Sect. 3.2, let us consider the order of the local error in the method \(\mathcal {I}_\varepsilon \). This local error will have a tremendous impact on the computation of Poincaré maps, and thus on the quality of estimates in computerassisted proofs. To see why, set the order n and let us consider two maps: \(T = \varphi (m h, \cdot )\) and \(T_\varepsilon = \varphi (m h + \varepsilon , \cdot )\), where, without loss of generality, we choose \(m = p \cdot (n+1)\) (in applications, return time in Poincaré maps will be required to be greater than this) and we fix some \(0< \varepsilon < h\). It is of course sufficient to use fullstep method \(\mathcal {I}\) to rigorously compute map T, while \(T_\varepsilon \) is a good model of computing estimates on a real Poincaré Map and will require usage of \(\mathcal {I}_\varepsilon \) in the last step. Let us denote \(x_m = T(x_0)\), \(x_{m+1} = \varphi (h, T(x_0))\) and \(x_\varepsilon = T_{\varepsilon }(x_0)\). Obviously, we have \(x_{m+1} = \varphi (h, x_m) \in \mathcal {I}(x_m)\) and \(x_\varepsilon = \varphi (\varepsilon , x_m) \in \mathcal {I}_\varepsilon (x_m)\) Assume \(x_0 \in C^\eta _p\) with uniform order on all grid points, \(\eta = n\). From Lemma 9 for both maps, we end up with \(x_m \in C^{2n + 1}_{p} \cap \mathcal {C}^{n+1}\), \(x_{m+1} \in C^{2n + 2}_{p,1} \cap \mathcal {C}^{n+1}\) and \(x_\varepsilon \in C^{n+1}_{p} \cap \mathcal {C}^{n+1}\). From discussion in the last paragraph of Sect. 3.2,we can infer that the local error introduced in \(\mathcal {I}(x_m)\) is of order \(O(h^{2n + 2})\), as the only term with nonzero Taylor remainder is \(z(\mathcal {I}_\varepsilon (x_m))\). Therefore, we can expect that the accumulated error of estimating map T with \(\mathcal {I}^m\) (m steps of the fullstep integrator \(\mathcal {I}\)) is of order \(O(h^n)\) [9], as this is the accumulated error of covering the first delay interval \([0, \tau )\) in the beginning of the integration process. Later, thanks to smoothing of solutions and expanded space, the subsequent errors would be of higher order. This in general should apply even if we do not expand the representation, as in such case the local error in each step (even after \([0, \tau ]\)) in \(\mathcal {I}\) is still just \(O(h^{n+1})\).
In comparison, algorithm \(I_\varepsilon \) evaluates Taylor expansion with nonzero remainder not only at \(z(\cdot )\) in (33), but also at every grid point and every coefficient order of the representation in (34). What is more, the impact of the remainder term \([\xi ]\) is of different order at different Taylor coefficients. Here, we use Proposition 12 to get that kth Taylor coefficient \(x_m^{[k]}\) has a (p,l)representation with \(l = 2n + 1  k\), so the local error of \(j_{i,{[k]}}(X_\varepsilon )\) is of order \(O(h^{2n + 1  k})\). Since \(k \in \{0, \ldots , n\}\), then in the worst case of \(k = n\), the local error size is \(O(h^{n+1})\). This is of course worse than \(O(h^{2n + 2})\) of the fullstep method, but it is a significant improvement over the first version of the algorithm presented in [34], where the local error of the last \(\varepsilon \) step was O(h) (basically, because \(x^{[n]}_\varepsilon \) was computed by explicit Euler method in the nonexpanded representation of \(x_m \in C^n_p\)). Current error is of the order comparable to the accumulated error over the course of a longtime integration \(\mathcal {I}^m\) and therefore has a lot less impact on the resulting estimates.
Exemplary computations, supporting the above discussion, are presented in Sect. 3.7.
3.5 Computation of Poincare Maps
In this section, we would like to discuss shortly some minor changes to the algorithm of computing images of Poincaré map using algorithms \(\mathcal {I}\) (full step h) and \(\mathcal {I}_\varepsilon \) (\(\varepsilon < h\)), particularly, we discuss the case when the estimate on \(t_P(S)\) has diameter bigger than h—this will be important in one of the application discussed in this paper.
In the context of using rigorously computed images of Poincaré maps in computerassisted proofs in DDEs, we will usually do the following (for details, see [34]):

1.
We choose subspace of the phase space of the semiflow \(\varphi \) as \(C^n_p \cap \mathcal {C}^0\) with p, n fixed.

2.
We choose sections \(S_1, S_2 \subset C^{n}_{p}\), usually as some hyperplanes \(S_i = \{ x \in C^{n}_{p}: S_i(x):= (s_i. a(x))  c_i = 0 \}\), with \(s_i \in \mathbb {R}^{M(d, p, n)}\), \(c \in \mathbb {R}\) and (.) denoting the standard scalar product in \(\mathbb {R}^{M(d, p, n)}\) (we remind \(a(x) = (z(x), j(x)) \in \mathbb {R}^{M(d,p,n)}\), \(M(d,p,n) = d \cdot (1 + (n+1) \cdot p)\)). Of course, in the simplest case, we can work only with a single section, \(S_1 = S_2\).

3.
We choose some initial, closed and convex set \(X_0 \subset S_1 \subset C^n_p\) on the section \(S_1\).

4.
We construct \([t] \in \mathbb {I}\) such that \(t_P(X_0) \subset [t]\), where \(t_P: X_0 \rightarrow \mathbb {R}_+\) is the return time function from \(X_0\) to \(S_2\), so that \(\varphi (t_P(x_0), x_0) \in S_2 \subset C^n_p\) for all \(x_0 \in X_0\). This is done usually alongside the computation of the image \(P(X_0)\), by successive iterating \(X_{j+1} = \mathcal {I}(X_{j})\) until \(X_m\) is before and \(X_{m+1}\) is after the section \(S_2\) (i.e. \(S_2(X_m) < 0\) and \(S_2(X_{m+1}) > 0\) or \(S_2(X_m) > 0\) and \(S_2(X_{m+1}) < 0\)). In such a case, \([t] = m \cdot h + [\varepsilon ]\), where \([\varepsilon ] \subset [0, h)\).
In view of Lemma 16, we require \(t_P(X_0) \ge (n+1) \cdot \tau \)—the return time to the section is long enough. Moreover, \(X_m\) and \(X_{m+1}\) are already computed to be used in the formulas (33)–(35). The tight estimates on [t] can be obtained for example with the binary search algorithm, in the same manner as it was done in [34].
Finally, using formulas from Lemma 16 we get \(X_\varepsilon \subset C^n_p\) such that \(\varphi ([\varepsilon ], X_m) \subset X_\varepsilon \).

5.
We use sets \(X_0\) and \(X_\varepsilon \) together with the estimates on \(P(X_0) \subset \varphi ([t], X_0)\) to draw conclusion on existence of some interesting dynamics. For example, if \(S_1 = S_2\) and \(P(X_0) \subset X_0\) we can use Schauder fixedpoint theorem to show existence of a periodic point of P (the compactness of the operator P plays here a crucial role).
Now, we have already mentioned that the computation of the Poincaré map \(P(x_0) = \varphi (t_P(x_0), x_0)\) can be done by splitting the return time \(t_P(x_0) = m(x_0) \cdot h + \varepsilon (x_0)\) with \(m(x_0) \in \mathbb {N}\) and \(\varepsilon (x_0) \in (0, h)\). This leads to a rough idea of rigorous algorithm to compute estimates on \(P(x_0)\) in the following form:
However, in the case of computing (estimates on) \(P(X_0)\) for a whole set \(X_0 \subset C^n_p\), we can face the following problem: for \(x, y \in X_0\) we can have \(m(x) \ne m(y)\), especially when \(X_0\) is large. In [34], we have simply chosen \(X_0\) so small, such that m(x) is constant in \(X_0\). Then, we have \([t] = m \cdot h + [\varepsilon ]\), with \([\varepsilon ] = [\varepsilon _1, \varepsilon _2]\), \(0< \varepsilon _1 \le \varepsilon _2 < h\). In such a situation, formula (39) could be applied with \(m(x) = m\) and \(\varepsilon = [\varepsilon ]\). In the current work, we propose to take the advantage of all the data already stored in the \((p,\eta )\)fsets and to extend the algorithm in Lemma 16 to produce rigorous estimates on \(\varphi ([\varepsilon ], x_0)\) for \([\varepsilon ] = [\varepsilon ] = [\varepsilon _1, {\bar{m} \cdot h} + \varepsilon _2]\), \(0< \varepsilon _i < h\) \({\bar{m}} \in \mathbb {N}\). It is not difficult to see that we have the following:
Proposition 17
Let \([t] = m \cdot h + [\varepsilon _1, {\bar{m}} \cdot h + \varepsilon _2]\) with \(0< \varepsilon _1, \varepsilon _2 < h\), \(m, {\bar{m}} \in \mathbb {N}\) with \({\bar{m}} > 0\). Let assume \(X_j\) are such that \(\varphi (j \cdot h, X_0) \subset X_M\) for \(j = m, m+1, \ldots , m+{\bar{m}}+1\). Finally, let n be as in Lemma 16.
We define (\(k \in \{ 0, \ldots , n+1 \}\), \(j \in \{0, \ldots , {\bar{m}} + 1\}\), \(i \in \{ 1, \ldots , p\}\)):
and a set \(X_\varepsilon \) given by:
Then for all \(t \in [t]\) we have \(x_t \in X_\varepsilon \subset C^{n}_{p} \cap C^{n+1}\).
Of course, in the case \(m(X_0) = const\) we use algorithm from Lemma 16.
3.6 The LohnerType Control of the Wrapping Effect
An important aspect of the rigorous methods using interval arithmetic is an effective control of the wrapping effect. The wrapping effect occur in interval numerics, when the result of some nonlinear operation or map needs to be enclosed in an interval box. When this box is chosen naively, then a huge overestimates may occur, see Fig. 6 in “Appendix A”.
To control wrapping effect in our computations, we employ the Lohner algorithm [22] by representing sets in a good local coordinate frame: \(X = x_0 + C \cdot r + E\), where \(x_0\) is a vector in \(\mathbb {R}^M\), \(C \in \mathcal {M}(M, N)\), \(r_0 \in \mathbb {I}^N\)—an interval box centred at 0, and E some representation of local error terms. As it was shown in [34], taking \(E \in \mathbb {I}^M\) (an interval form of the error term) was enough to prove existence of periodic orbits. Moreover, taking into account the form of the algorithm given by (21)–(25) (especially the shift part (21)–(22)) to properly reorganize computations was shown to be crucial to obtain an algorithm of optimal computational complexity.
In this work, we not only adopt this optimized Lohner algorithm to the systems of equations and to many delays, but we also propose another form of the error term E to get better estimates on the solutions in case of systems of equations, \(d > 1\), much in the same way it is done for systems of ODEs [12, 22]. The proposed algorithm does not sacrifice the computational complexity to obtain better estimates. We use this modified algorithm in our proof of the symbolic dynamics in a delayperturbed Rössler system.
The details of the algorithm are highly technical, so we decided to put them in “Appendix A”, to not overshadow the presentation of the theoretical aspects, but on the other hand to be accessible for people interested in actual implementation details and/or in reimplementing presented methods on their own.
3.7 Benchmarks
As the last remark in this section, we present the numerical experiment showing the effect of using the new algorithm with expanding representation in comparison with the old algorithm in [34]. As a test, we use a constant initial function \(x_0(t) = 1.1\) for \(t \in [\tau , 0]\) and the Mackey–Glass equation with parameter values \(\beta = 2\), \(\gamma = 1\), \(n = 8\) and \(\tau = 2\). The configuration of (d, p, n)fset \(X_0\) has \(n = 4\) (order 4 method), \(p = 128\), \(d = 1\) (scalar equation). The initial diameter of the set \(X_0\) is 0. The test does integration over the 3n full delays (so that the final solution is smoothed enough). Then, an \(\varepsilon \)step is made, with the step \(\varepsilon = \frac{h}{2}\), where \(h = \frac{\tau }{p}\) is the grid size (full step). In Table 1, we present the maxima over all diameters of the coefficients of the sets: \(X_{3n} = \mathcal {I}^{3n}(X_0)\) that contains the segment \(x_{3n}\) of the solution, and \(X_{3n + \varepsilon } = \mathcal {I}_{\varepsilon } \left( \mathcal {I}^{3n}(X_0)\right) \). We remind that \(\mathcal {I}\) denotes the fullstep integrator method that does one step of size h, while \(\mathcal {I}_{\varepsilon }\) is the \(\varepsilon \)step method. Each maximum diameter is computed over all Taylor coefficients of a given order \(0 \le k \le 4\). We also show the maximum diameter of the \(\Xi \) part (order \(k = 5\)).
We test several maximal orders of the expanded representations: 2n, \(2n+1\) and 3n. The last one is the maximal order obtainable with the 3n fulldelay integration steps, while the first one is the minimal reasonable one—taking into account the long enough integration time, see Definition 3 and Lemma 8.
Remark 18
Using the diameter 0 of the set \(X_0\) in the test will show how the local errors of the method at each step affect the final outcome.
From Table 1, we see that the diameters of the sets integrated with the new algorithm are far superior to the old one. One can observe in (a) that for the fixed number of full steps both methods produce results with coefficients of all orders of a comparable diameter. This indicates that both methods are of order \(h^4\). However, new algorithm produces estimates of three orders of magnitude better. This is because internally, the algorithm becomes of higher order after each full delay. After k full delays, the actual order of the method is \(n + k\). The second big advantage is shown in the (b) part, where we have diameters of coefficients after a small \(\varepsilon \) step. This simulates for example computation of a Poincaré map. The old algorithm produces estimates that depend on the order of coefficient: the coefficient 0 has a diameter proportional to \(h^n\); however, other coefficients are computed with worse accuracy. The fourthorder coefficient is computed with the lowest accuracy of order \(h^1\). On the contrary, the new algorithm still retains the accuracy of the fullstep size algorithm and produce far superior estimates (several orders of magnitude better).
The data and programs used in those computations are described more in detail in “Appendix B”.
4 Topological Tools
In [34], we have proven the existence of periodic orbits (apparently stable) using the Schauder fixedpoint theorem. Here, we are interested in a more general way to prove existence of particular solutions to DDEs with the use of Poincaré maps generated with semiflow \(\varphi \) of (2). For this, we will recall the concept of covering relations from [5], but we will adopt it to the setting of infinitedimensional spaces and compact mappings, similarly to a recent work [39]. The main theoretical tool to prove the existence of solutions, in particular the fixed points of continuous and compact maps in \(C^n_p\), will be the Leray–Schauder degree, which is an extension of fixedpoint index (i.e. the local Brouwer degree of \(Id  F\)) to infinitedimensional Banach spaces. We only recall the properties of the degree that are relevant to our applications. For a broader description of the topic together with the proofs of presented theorems, we point out to [2, 8] and references therein. In particular, in what follows, we will use the notion of absolute neighbourhood retract (ANR) [8]. We do not introduce the formal definition but we only note that (1) any Banach space is ANR and (2) any convex, closed subset of a Banach space (or a finite sum of such) is an ANR (Corollaries 4.4 and 5.4 in Sect. 11 of [8], respectively).
4.1 FixedPoint Index for Compact Maps in ANRs
Let \(\mathcal {X}\) be a Banach space. We recall that a continuous function \(f: \mathcal {X}\supset V \rightarrow \mathcal {X}\) is a compact map iff \(\overline{f(V)}\) is compact in \(\mathcal {X}\). With \(Fix(f, U) = \{ x \in U: f(x) = x \}\) we denote the set of fixed points of f in U. Let now X be an ANR [8], in particular \(\mathcal {X}\) can be X, and let U be open subset of X, \(f: {\overline{U}} \rightarrow X\). Following [8], by \(\mathcal {K}\left( {\overline{U}}, X\right) \) we denote the set of all compact maps \({\overline{U}} \rightarrow X\), and by \(\mathcal {K}_{\delta U}\left( {\overline{U}}, X\right) \) the set of all maps \(f \in \mathcal {K}({\overline{U}}, X)\) that have no fixed points on \(\delta U\), \(Fix(f, \delta U) = \emptyset \). We will denote \(Fix(f) = Fix(f, U) = Fix(f, {\overline{U}})\). Let \(V \subset \mathcal {X}\) be any set in the Banach space \(\mathcal {X}\). We say that a map is admissible in V iff Fix(f, V) is a compact set. The following stronger assumption that implies admissibility is often used in applications:
Lemma 19
Let \(\mathcal {X}\) be a Banach space (can be infinite dimensional) and \(U \subset \mathcal {X}\) be an open set. Assume \(f: {\overline{U}} \rightarrow \mathcal {X}\) is a continuous, compact map. If \(f(x) \ne x\) for all \(x \in \delta U\) then f is admissible.
Proof
Let \(F = (Id  f)^{1}(\{0\})\) be the set of fixed points of f. By assumption \(f(x) \ne x\) on \(\delta U\), we have \(F \cap \delta U = \emptyset \) so \(F \cap {\bar{U}} = F \cap U\). The set F is closed as a preimage of the closed set \(\{0\}\) under continuous function \(Id  f\), and so is \(F \cap {\overline{U}}\). Therefore, \(F \cap U\) is closed and thus compact as a subset of a compact set \(\overline{f({\overline{U}})}\): \(F \cap U = F \cap {\overline{U}} = f(F \cap {\overline{U}}) \subset \overline{f({\overline{U}})}\). \(\square \)
By Lemma 19, we see that all functions \(f \in \mathcal {K}_{\delta U}({\overline{U}}, X)\) are admissible, so that the fixedpoint index is well defined on them [8]:
Theorem 20
(Theorem 6.2 in [8]) Let X be an ANR. Then, there exists an integervalued fixedpoint index function \(\iota (f, U) \in \mathbb {Z}\) (Leray–Schauder degree of \(Id  f\)) which is defined for all \(U \subset X\) open and all \(f \in \mathcal {K}_{\delta U}\left( {\overline{U}}, X\right) \) with the following properties:

(I)
(Normalization) If f is constant \(f(x) = x_0\) then, \(\iota (f, U) = 1\) iff \(x_0 \in U\) and \(\iota (f, U) = 0\) iff \(x_0 \notin U\).

(II)
(Additivity) If \(Fix(f) \subset U_1 \cup U_2 \subset U\) with \(U_1, U_2\) open and \(U_1 \cap U_2 = \emptyset \), then \(\iota (f,U) = \iota (f,U_1) + \iota (f,U_2)\).

(III)
(Homotopy) If \(H: [0, 1] \times {\overline{U}} \rightarrow X\) is an admissible compact homotopy, i.e. H is continuous, \(H_t = H(t, \cdot )\) is compact and admissible for all t, then \(\iota (H_t) = \iota (H_0)\) for all \(t \in [0, 1]\).

(IV)
(Existence) If \(\iota (f, U) \ne 0\) then \(Fix(f) \ne \emptyset \).

(V)
(Excision) If \(V \subset U\) is open, and f has no fixed points in \(U {\setminus } V\) then \(\iota (f, U) = \iota (f, U {\setminus } V)\).

(VI)
(Multiplicativity) Assume \(f_i: \mathcal {X}_i \supset X_i \supset {\overline{U}}_i \rightarrow X_i\), \(i = 1, 2\) are admissible compact maps, and define \(f(x_1, x_2) = (f_1(x_1), f_2(x_2)) \in X_1 \times X_2\) for \((x_1, x_2) \in U:= {\overline{U}}_1 \times {\overline{U}}_2\). Then f is a continuous, compact and admissible map with \(\iota (f, U) = \iota (f_1, U_1) \cdot \iota (f_2, U_2)\).

(VII)
(Commutativity) Let \(U_i \subset X_i \subset \mathcal {X}_i\), for \(i =1, 2\) be open and assume \(f_i: U_1 \rightarrow X_2\), \(g: U_2 \rightarrow \mathcal {X}_1\) and at least one of the maps f, g is compact. Define \(V_1 = U_1 \cap f^{1}(U_2)\) and \(V_2 = U_2 \cap g^{1}(U_1)\), so that we have maps \(g \circ f: \overline{V_1} \rightarrow X_1\) and \(f \circ g: \overline{V_2} \rightarrow X_2\).
Then \(f \circ g\) and \(g \circ f\) are compact and if \(Fix(g \circ f) \subset V_1\) and \(Fix(f \circ g) \subset V_2\) then
$$\begin{aligned} \iota (g \circ f, V_1) = \iota (f \circ g, V_2). \end{aligned}$$
For us, the key and the mostly used properties are the Existence, Homotopy and Multiplicativity properties. First one states that, if the fixedpoint index is nonzero, then there must be a solution to the fixedpoint problem \(f(x) = x\) in the given set. The homotopy allows to relate the fixedpoint index \(\iota (f, U)\) to some other, usually easier and better understood map, for example \(\iota (A, U)\), where A is some linear function in finitedimensional space. Normalization and Multiplicativity are used to compute the fixed point index in the infinitedimensional “tail part”.
The following is a wellknown fact:
Lemma 21
Let \(A: \mathbb {R}^n \rightarrow \mathbb {R}^n\) be a linear map. Then for any \(U \subset \mathbb {R}^n\):
Applying Commutativity property to \(f = F \circ h^{1}\) and \(g = h\) gives:
Lemma 22
Let \(F: U \rightarrow \mathcal {X}\) be admissible, continuous, compact map and let \(h: \mathcal {X}\rightarrow \mathcal {X}'\) be a homeomorphism. Then \(h \circ F \circ h^{1}: \mathcal {X}' \supset h(U) = V \rightarrow \mathcal {X}'\) is admissible, and
4.2 Covering Relations in \(\mathbb {R}^d\)
In our application, we will apply the fixedpoint index to detect periodic orbits of some Poincaré maps \(P: C^{n}_p \supset U \rightarrow C^{n}_p\). We will introduce a concept of covering relations. A covering relation is a way to describe that a given map f stretches in a proper way one set over another. This notion was formalized in [5] for finitedimensional spaces and recently extended to infinite spaces in [39] in the case of mappings between compact sets. In the sequel we will modify this slightly for compact mappings between (not compact) sets in the \(C^n_p\) spaces.
To set the context and show possible applications, we start with the basic definitions from [5] in finitedimensional space \(\mathbb {R}^d\), and then we will move to extend the theory in case of \(C^n_p\) spaces later in this section.
Definition 7
(Definition 1 in [5]) An hset N in \(\mathbb {R}^{d_N}\) is an object consisting of the following data:

N—a compact subset of \(\mathbb {R}^{d_N}\);

\(u_N, s_N \in \mathbb {N}\) such that \(u_N + s_N = d_N\);

a homeomorphism \(c_N: \mathbb {R}^{d_N} \rightarrow \mathbb {R}^{d_N} = \mathbb {R}^{u_N} \times \mathbb {R}^{s_N}\) such that
$$\begin{aligned} c_N(N) = \overline{{{\,\mathrm{\textbf{B}}\,}}_{u_N}}(0,1) \times \overline{{{\,\mathrm{\textbf{B}}\,}}_{s_N}}(0,1). \end{aligned}$$
We set:
In another words, hset N is a product of two closed balls in an appropriate coordinate system. The numbers \(u_N\) and \(s_N\) stands for the dimensions of exit (nominally unstable) and entry (nominally stable) directions. We will usually drop the bars from the support N of the hset, and use just N (e.g. we will write f(N) instead of f(N).
The hsets are just a way to organize the structure of a support into nominally stable and unstable directions and to give a way to express the exit set \(N^\) and the entry set \(N^+\). There is no dynamics here yet—until we introduce some maps that stretch the hsets across each other in a proper way.
Definition 8
(Definition 2 in [5]) Assume N, M are hsets, such that \(u_N = u_M = u\). Let \(P: N \rightarrow \mathbb {R}^{d_M}\) a continuous map. We say that N Pcovers M, denoted by:
iff there exists continuous homotopy \(H: [0,1] \times N \rightarrow R^{d_M}\) satisfying the following conditions:

\(H(0, \cdot ) = P\);

\(h([0,1], N^) \cap M = \emptyset \);

\(h([0,1], N) \cap M^+ = \emptyset \);

there exists a linear map \(A: \mathbb {R}^{u} \rightarrow \mathbb {R}^{u}\) such that
$$\begin{aligned} H_c(1, (p, q))= & {} (A p, 0) \\ A(\delta {{\,\mathrm{\textbf{B}}\,}}_u(0,1))\subset & {} \mathbb {R}^u \setminus \overline{{{\,\mathrm{\textbf{B}}\,}}_u}(0,1) \end{aligned}$$where \(H_c(t, \cdot ) = c_M \circ H(t, \cdot ) \circ c_N^{1}\) is the homotopy expressed in good coordinates.
A basic theorem about covering relations is as follows:
Theorem 23
(Simplified version of Theorem 4 in [5]) Let \(X_i \subset \mathbb {R}^d\) be hsets and let
be a covering relations chain. Then there exists \(x \in X_1\) such that
Before we move on, we would like to point out what results can be obtained using Theorem 23:

Example 1. Let \(X {\mathop {\Longrightarrow }\limits ^{P}} X\), where X is some hset on a section \(S \subset \mathbb {R}^d\) and P is a Poincare map \(S \rightarrow S\) induced by the local flow \(\varphi \) of some ODE \(x' = f(x)\). Then, there exists a periodic solution x to this ODE, with initial value \(x_0 \in X\). The parameter \(u_X\) gives the number of apparently unstable directions for P at x.

Example 2. Let \(X_1\) and \(X_2\) be hsets on a common section \(S \subset \mathbb {R}^d\), \(X_1 \cap X_2 = \emptyset \), and assume \(X_i {\mathop {\Longrightarrow }\limits ^{P}} X_j\) for all \(i, j \in \{1, 2\}\) where again P is a Poincaré map \(S \rightarrow S\) induced by the semiflow \(\varphi \) of some ODE. Then, this ODE is chaotic in the sense that there exists a countable many periodic solutions of arbitrary basic period that visits \(X_1\) and \(X_2\) in any prescribed order. Also, there exist nonperiodic trajectories with the same property, see for example [5, 42].
In what follows, we will show the same construction can be done under some additional assumptions in the infinitedimensional spaces.
4.3 Covering Relations in InfiniteDimensional Spaces
The crucial tool in proving Theorem 23 is the fixedpoint index in finitedimensional spaces. Therefore, similar results are expected to be valid for maps and sets for which the infinitedimensional analogue, namely Leray–Schauder degree of \(Id  f\), exists. This was used in [39] for maps on compact sets in infinitedimensional spaces. In this work, we do not assume sets are compact, but we use the assumption that the maps are compact—the reasoning is almost the same. We will work on spaces \(\mathcal {X}= \mathcal {X}_1 \oplus \mathcal {X}_2\), where \(\mathcal {X}_1\) is finite dimensional (i.e. \(\mathcal {X}_1 \equiv \mathbb {R}^M\)) and \(\mathcal {X}_2\) will be infinite dimensional (sometimes refereed to as the tail). In our applications, we will set \(\mathcal {X}= C^n_p = \mathbb {R}^{M(d,p,n)} \times (C^0([0,h], \mathbb {R}^d))^{d \cdot p}\), with \(\mathcal {X}_1 = \mathbb {R}^{M(d,p,n)}\). We will use the following definitions that are slight modifications of similar concepts from [39], where the tail was assumed to be a compact set.
Definition 9
Let \(\mathcal {X}\) be a real Banach space. An hset with tail is a pair \(N = (N_1, N_2)\) where

\(N_1\) is an hset in \(\mathcal {X}_1\),

\(N_2 \subset \mathcal {X}_2\) is a closed, convex and bounded set.
Additionally, we set \(u_N = u_{N_1}\), \(N = N_1 \times N_2\), \(c_N = (c_{N_1}, Id)\) and
The tail in the definition refers to the part \(N_2\). We will just say that N is an hset when context is clear. Please note that each hset N in \(\mathbb {R}^d\) can be viewed as an hset with tail, where the tail is set as the trivial space \(\mathbb {R}^{0} = \{ 0 \}\).
Definition 10
Let \(\mathcal {X}\) be as in Definition 9. Let N, M be hsets with tails in \(\mathcal {X}\) such that \(u_N = u_M = u\). Let \(P: N \rightarrow \mathcal {X}\) be a continuous and compact mapping in \(\mathcal {X}\).
We say that N Pcovers M (denoted as before in Definition 8 by \(N {\mathop {\Longrightarrow }\limits ^{P}} M\)), iff there exists continuous and compact homotopy \(H: [0,1] \times N \rightarrow \mathcal {X}\) satisfying the conditions:

(C0) \(H\left( t, N\right) \subset \mathbb {R}^{d_{M_1}} \times M_2\);

(C1) \(H\left( 0, \cdot \right) = P\);

(C2) \(H\left( \left[ 0,1\right] , N_1^ \times N_2\right) \cap M = \emptyset \);

(C3) \(H\left( \left[ 0,1\right] , N\right) \cap \left( M_1^+ \times M_2\right) = \emptyset \);

(C4) there exists a linear map \(A: \mathbb {R}^{u} \rightarrow \mathbb {R}^{u}\) and a point \({\bar{r}} \in M_2\) such that for all \((p, q, r) \in N_c = \overline{{{\,\mathrm{\textbf{B}}\,}}_{u_{N_1}}}(0,1) \times \overline{{{\,\mathrm{\textbf{B}}\,}}_{s_{N_1}}}(0,1) \times N_2\) we have:
$$\begin{aligned} H_c(1, (p, q, r))= & {} (A p, 0, {\bar{r}}) \\ A(\delta {{\,\mathrm{\textbf{B}}\,}}_u(0,1))\subset & {} \mathbb {R}^u \setminus \overline{{{\,\mathrm{\textbf{B}}\,}}_u}(0,1) \end{aligned}$$where again \(H_c(t, \cdot ) = c_M \circ H(t, \cdot ) \circ c_N^{1}\) is the homotopy expressed in good coordinates.
Let us make some remarks on Definition 10. In contrary to [39], we do not assume that the hsets with tails N and M are compact in \(\mathcal {X}\), but we assume that the map P is compact instead. However, the definition in [39] is a special case of Definition 10, if we have \(u_{N_1} = d_{N_1}\) and \(M_2\) is a compact set. The additional structure of the finitedimensional part \(N_1\) we assume in Definition 10 allows for a more general form of covering occurring in the finitedimensional part, see Fig. 1.
Now we will state theorems, similar to Theorem 23, that joins the sequences of covering relations to the real dynamics happening in the underlying compact maps. We start with definitions:
Definition 11
Let \(k > 0\) be a fixed integer and let B be a transition matrix: \(B \in \mathcal {M}(k, k)\) such that \({{\,\mathrm{\textbf{B}}\,}}_{ij} \in \{0, 1\}\). Then define:
and a shift function \(\sigma : \Sigma ^+_B \rightarrow \Sigma ^+_B\) by
The pair \((\Sigma ^+_B, \sigma )\) is called a subshift of finite type with transition matrix B.
Definition 12
Let \(\mathcal {F}\) be a family of compact maps in a real Banach space \(\mathcal {X}\).
We say that \(\Gamma = ( \mathcal {N}, \mathcal {F}, Cov )\) is a set of covering relations on \(\mathcal {X}\) iff

\(\mathcal {F}\) is a collection of continuous and compact maps on \(\mathcal {X}\),

\(\mathcal {N}\) is a collection of hsets with tails \(N_i \subset \mathcal {X}\), \(i \in \{1,..,k\}\),

\(Cov \subset \mathcal {N} \times \mathcal {F} \times \mathcal {N}\) is a collection of covering relations, that is, if \((N_i, P_l, N_j) \in Cov\) then \(N_j {\mathop {\Longrightarrow }\limits ^{P_l}} N_j\).
A transition matrix \(B \in \mathcal {M}(k, k)\) associated to \(\Gamma \) is defined as:
Definition 13
A sequence \((x_i)_{i \in \mathbb {N}}\) is called a full trajectory with respect to family of maps \(\mathcal {F} = \{ f_i: 1 \le i \le m\}\) if for all \(i \in \mathbb {N}\) there is \(j(i) \in \{ 1,\ldots ,m \}\) such that \(f_{j(i)}(x_i) = x_{i+1}\).
Now we state two main theorems:
Theorem 24
The claim of Theorem 23 is true for a covering relation chain where sets \(X_i\) are hsets with tail in a real Banach space \(\mathcal {X}\).
Theorem 25
Let \(\Gamma = ( \mathcal {N}, \mathcal {F}, Cov )\) be a set of covering relations and let B be its transition matrix.
Then, for every sequence of symbols \((\alpha _i )_{i \in \mathbb {N}} \in \Sigma ^+_B\) there exist \((x_i)_{i \in \mathbb {N}}\)—a full trajectory with respect to \(\mathcal {F}\), such that \(x_i \in X_{\alpha _i}\). Moreover, if \((\alpha _i )_{i \in \mathbb {N}}\) is Tperiodic, then the corresponding trajectory may be chosen to be a Tperiodic sequence too.
Before we do the proofs of Theorems 24 and 25, we note that the examples of results that can be obtained with covering relations on hsets with tails are the same as given before in Sect. 4.2 in the case of a finitedimensional space \(\mathbb {R}^d\). In the context of DDEs we will use those theorems for hsets with tails in the form of a (p, n)fset: \(N = (N_1, N_2) = X(A, R) \subset C^n_p\). The natural decomposition is such that \(\{ \xi \in \left( C([0, h], \mathbb {R}^d)\right) ^p: [\xi ] \subset R \} = N_2\) (the tail) and \(N_1 = A \subset \mathbb {R}^{M(d,p,n)}\) (the finitedimensional part). In each application presented later in the paper, we will decide on \(u_{N_1}\) and on the coordinates \(c_{N_1}\) on the finitedimensional part A.
Proof of Theorem 24
We proceed in a way similar to the proof of Theorem 2 in [39]. To focus the attention and get rid of too many subscripts at once, we assume without loss of generality that \(c_{X_i} = Id\) for all i and \(X_i = N_i \times R_i\), where \(N_i \in \mathbb {R}^M\) is the finitedimensional part.
Let now denote \(X = X_1 \times \cdots \times X_k\), \(N = N_1 \times \cdots \ N_k\) and \(R = R_1 \times \cdots \ R_k\). Let also denote by \(\mathcal {Y} = \mathbb {R}^{M \cdot k} \times R\). With a slight abuse of notation we can write \(X \subset \mathcal {Y}\) and that \(\mathcal {Y} \subset \mathcal {X}^k\). Since \(\mathcal {X}^k\) is a Banach space (with the product maximum norm) so is \(\mathcal {Y}\) with topology inherited from the space \(\mathcal {X}^k\). Moreover, we have \(X \subset \mathcal {Y}\) with \({{\,\textrm{int}\,}}_\mathcal {Y}X = {{\,\textrm{int}\,}}N_1 \times R_1 \times \cdots \times {{\,\textrm{int}\,}}N_k \times R_k\). This will be important for proving that a fixedpoint problem we are going to construct is solutionfree on the boundary of X in \(\mathcal {Y}\).
We construct zero finding problem:
we denote the left side of (45) by F(x) and we are looking for a solution \(x = F(x)\) with \(x = (x_1, x_2, \ldots , x_k) \in X\). With the already mentioned abuse of notation, we can write \(F(a, \xi ) = (b, \zeta )\) for \(a \in \mathbb {R}^{M \cdot k}\), \(\xi \in R\). In a similar way we construct a homotopy H, by pasting together homotopies from the definition of hsets with tails \(X_i\):
It is obvious that \(H(0,\cdot ) = F\) and we will show that \(H(t, \cdot )\) is fixedpoint free (admissible) on the boundary \(\delta _{\mathcal {Y}}X\). Indeed, since \({{\,\textrm{int}\,}}_\mathcal {Y}X = {{\,\textrm{int}\,}}N_1 \times R_1 \times \ldots \times {{\,\textrm{int}\,}}N_k \times R_k\) then for \((b, \zeta ) \in \delta _\mathcal {Y}X\) there must be \(i \in \{1,\ldots ,k\}\) such that \(b_i \in \delta N_i = N_i^+ \cup N_i^\). If \(b_i \in N_i^\) then (C2) gives \(H_i\left( t, (b_i,\zeta _i)\right) \notin X_{i+1}\) and consequently \(({{\,\mathrm{\textbf{B}}\,}}_{i+1}, \zeta _{i+1}) \ne H\left( t, (b, \zeta )\right) _{i+1}\) (note, if \(i = k\), then we set \(i+1 = 1\)). If \(b_i \in N_i^+\), then from (C3) it follows that \(H_{i1}\left( t, ({{\,\mathrm{\textbf{B}}\,}}_{i1}, \zeta _{i1})\right) \notin \left( N_i^+ \times R_i\right) \) and so \(H\left( t, (b, \zeta )\right) _i \ne (b_i, \zeta _i)\) (note, if \(i = 1\), then we set \(i1 = k\)). Therefore, H is admissible, \(H(t, x) \ne x\) for all \(x \in \delta _\mathcal {Y}X\). Of course H is also continuous and compact.
Now, \(\mathcal {Y}\) is an ANR (Corollary 4.4 in Sect. 11. of [8]) so fixedpoint index \(\iota (H(t, \cdot ), X)\) is well defined and constant for all \(t \in [0, 1]\). Applying Multiplicativity, Normalization (on the tail part) and 21 on \(H(1,\cdot )\) we get \(\iota (H(1, \cdot ), X) = \Pi \iota \left( A_i, B^{u}(0,1)\right) = \pm 1\) (since \(det(Id  A_i) \ne 0\) as \(\Vert A_i\Vert > 1\) due to (C4)).
Finally, Existence property yields a fixed point \({\bar{x}}\) to \(H(0, x) = F(x) = x\). \(\square \)
Proof of Theorem 25
is almost the same as of Theorem 3 in [39], with the exception that the sets \(X_i\) are not compact. This is overcome by considering the convergence of sequences of points in the images \(P_i(X_i)\), which are precompact by the assumption on \(P_i\)’s. \(\square \)
We conclude with a lemma that allows to easily check whether \(N {\mathop {\Longrightarrow }\limits ^{P}} M\) in case \(u_N = u_M = 1\). We will check the assumptions of this lemma later in Sect. 5, with the help of a computer.
Lemma 26
For an hset with tail N let define:

\(N_c^{l} = \{1\} \times {{\,\mathrm{\textbf{B}}\,}}_{s} \times N\), \(N^l = c_N^{1}(N_c^{l})\)—the left edge of N, and

\(N_c^{r} = \{1\} \times {{\,\mathrm{\textbf{B}}\,}}_{s} \times N\), \(N^r = c_N^{1}(N_c^{r})\)—the right edge of N.
Let \(\mathcal {X}\) be a Banach space, \(X \subset \mathcal {X}\) be an ANR, \(N = (N_1, N_2)\), \(M(M_1, M_2)\) be hsets with tails in X with \(u_N = u_M = 1\) and \(P: N \rightarrow X\) be a continuous and compact map such that the following conditions apply (with \(P_c = c_M \circ P \circ c_N^{1}: N_c \rightarrow M_c\)):

1.
(CC1) \(\pi _{\mathcal {X}_2} P\left( N\right) \subset M_2\);

2.
Either (CC2A)
$$\begin{aligned} P_c\left( N_c^l\right) \subset (\infty , 1) \times \mathbb {R}_{s} \times M_2&and&P_c\left( N_c^r\right) \subset (1, \infty ) \times \mathbb {R}_{s} \times M_2 \end{aligned}$$or (CC2B)
$$\begin{aligned} P_c\left( N_c^l\right) \subset (1, \infty ) \times \mathbb {R}_{s} \times M_2&and&P_c\left( N_c^r\right) \subset (\infty , 1) \times \mathbb {R}_{s} \times M_2 \end{aligned}$$ 
3.
(CC3) \(P_c\left( N_c\right) \cap \left( {{\,\mathrm{\textbf{B}}\,}}_s \times M_2\right) = \emptyset \)
Then, \(N {\mathop {\Longrightarrow }\limits ^{P}} M\) with the homotopy given as \(H(t, \cdot ) = (1t) \cdot P + t \cdot (A, 0, {\bar{r}})\), where \(A: \mathbb {R}\rightarrow \mathbb {R}\) such that \(Ax = 2x\) (CC2A) or \(Ax = 2x\) (CC2B) and \({\bar{r}}\) is any selected point in \(M_2\).
Proof
(C0) and (C1) from Definition 10 are obviously satisfied. We also have (CC2) implies (C2) and (CC3) is the same as (C3). Therefore, we only need to show (C4), that is, the image of the homotopy computed on the set \(\delta {{\,\mathrm{\textbf{B}}\,}}_u \times \overline{{{\,\mathrm{\textbf{B}}\,}}_s} \times N_2\) does not touch the set \(M_c\). This is obvious from the definition of A in both cases (CC2A) and (CC2B). \(\square \)
Figure 1 presents such a covering in case \(u = s = 1\) and \(N = M\). The easiest way to assure (CC1) and (CC3) is to assume \(P_c(N_c) \subset \mathbb {R}\times {{\,\mathrm{\textbf{B}}\,}}_s \times M_2\)—in fact we check this in our computerassisted proofs presented in the next section.
5 Applications
In this section, we present applications of the discussed algorithm to two exemplary problems. First one is a computerassisted proof of symbolic dynamics in a delayperturbed Rössler system [29]. The proof is done for two different choices of perturbations. The second application consists of proofs of (apparently) unstable periodic orbits in the Mackey–Glass equation for parameter values for which Mackey and Glass observed chaos in their seminal paper [24].
Before we state the theorems, we would like to discuss presentation of floatingpoint numbers in the article. Due to the very nature of the implementation of real numbers in current computers, numbers like 0.1 are not representable [10], i.e. cannot be stored in memory exactly. On the other hand, many numbers representable on the computer could not be presented in the text of the manuscript in a reasonable way, unless we adopt not so convenient digital base2 number representation. However, the implementation IEEE754 of the floatingpoint numbers on computers [10] guarantees that, for any real number x and its representation \({\tilde{x}}\) in a computer format, there is always a number \(\varepsilon  \le \varepsilon _{machine}\) such that \({\tilde{x}} = x(1+\varepsilon )\). The number \(\varepsilon _{machine}\) defines the machine precision, and, for the double precision C++ floatingpoint numbers that we use in the applications, it is of the order \(10^{16}\). Finally, in our computations we use the interval arithmetic to produce rigorous estimates on the results of all basic operations such as \(+\), −, \(\times \), \(\div \), etc. In principle, we operate on intervals [a, b], where a and b are representable numbers, and the result of an operation contains all possible results, adjusting end points so that they are again representable numbers (for a broader discussion on this topic, see the work [34] and references therein). For a number \(x \in \mathbb {R}\) we will write [x] to denote the interval containing x. If \(x \in \mathbb {Z}\) then we have \([z] = [z,z]\), as integer numbers (of reasonably big value) are representable in floating point arithmetic.
Taking all that into account we use the following convention:

Whenever there is an explicit decimal fraction defined in the text of the manuscript of the form \(d_1 d_2 \cdots d_k. q_1 q_2 \cdots q_m\), that number appears in the computer implementation as
$$\begin{aligned}{}[d_1 d_2 \cdots d_k q_1 q_2 \cdots q_k] \div [10^m], \end{aligned}$$where \(\div \) is computed rigorously with the interval arithmetic. For example, number \(10^{3} = 0.001\) appears in source codes as Interval(1.)/Interval(1000.).

Whenever we present a result from the output of the computer program x as a decimal number with nonzero fraction part, then we have in mind the fact that this represents some other number y—the true value, such that \(y = x(1+\varepsilon )\) with \(\varepsilon  \le \varepsilon _{machine}\). This convention applies also to intervals: if we write interval \([a_1, a_2]\), then there are some representable computer numbers \(b_1\), \(b_2\) which are true output of the program, so that \(b_i = a_i (1 +\varepsilon _i)\).

If we write a number in the following manner: \(d_1. d_2 \cdots d_k {}^{u_1 u_2 \cdots u_m}_{l_1 l_2 \cdots l_m}\) with digits \(l_i, u_i, d_i \in \{0,..,9\}\) then it represents the following interval
$$\begin{aligned} \left[ d_1. d_2 \cdots d_k l_1 l_2 \cdots l_m, d_1. d_2 \cdots d_k u_1 u_2 \cdots u_m \right] . \end{aligned}$$For example \(12.3_{456}^{789}\) represents the interval [12.3456, 12.3789] (here we also understand the numbers taking into account the first two conventions).
The last comment concerns the choice of various parameters for the proof, namely the parameters of the space \(C^n_p\) and the initial sets around the numerically found approximations of the dynamical phenomena under consideration. The latter strongly depend on the investigated phenomena, so we will discuss general strategy in each of the following sections, whereas the technical details are presented in Appendices A and B.
The choice of parameters n and p corresponds basically to the choice of the order of the numerical method and a fixed step size \(h = \frac{\tau }{p}\), respectively.
Usually, in computerassisted proofs, we want n to be high, so that the local errors are very small. In the usual case of ODEs with \(f \in C^\infty \) we can use almost any order, and it is easy for example to set \(n = 40\). However, in the context of \(C^n_p\) spaces and constructing Poincaré maps for DDEs, we are constrained with the long enough time \(T = (n+1) \cdot \tau \) (Definition 3) to obtain well defined maps. Therefore, the choice of n corresponds usually to the return time to section \(t_P\) for a given Poincaré map, satisfying \(t_P(X_0) > (n+1) \cdot \tau \), for some set of initial data \(X_0 \subset C^n_p\).
The choice of the step size h is more involved. It should not be too small, to reduce the computational time and cumulative impact of all local errors after many iterations, and not so big, as to effectively reduce the size of the local error. Also, the dynamics of the system (e.g. stiff systems) can impact the size of the step size h. In the standard ODE setting, there are strategies to set the step size dynamically, from step to step, e.g. [9], but in the setting of our algorithm for DDEs, due to the continuity issues described in Sect. 3, we must stick to the fixed step size \(h = \frac{\tau }{p}\). The step size must be also smaller than the (apparent) radius of convergence of the forward Taylor representation of the solution at each subinterval, but this is rarely an issue in comparison with other factors, e.g. the local error estimates. In our applications, we chose \(p = 2^{m}\) for a fixed \(m \in \mathbb {N}\), so that the grid points are representable floating point numbers (but the implementation can work for any p).
We also need to account for the memory and computing power resources. For ddimensional systems (2), and with n, p fixed, we have that the representation of a Lohnertype set \(A = x_0 + C \cdot r_0 + E\) in phase space of \(\varphi \), where \(C \in \mathcal {M}{(M, M)}\), requires at least \(O(M^2)\), with \(M = O(d \cdot n \cdot p)\). Then, doing one step of the fullstep algorithm is of \(O(d^2 \cdot n^2 \cdot M)\) computational complexity. Due to the long enough time integration, computation of a single orbit takes usually \(O(n \cdot p)\) steps, and we get the computational complexity of computing image P(X) for a single set X of \(O(d \cdot n^2 \cdot d \cdot p \cdot n \cdot M) = O(d \cdot n^2 \cdot M \cdot M) = O(M^2)\) (if we assume \(n, d \ll M\)). Therefore, we want to keep \(M^2 = (d \cdot n \cdot p)^2\) of reasonable size, both because of time and memory constraints. Our choice here is \(M \le 10^3\).
5.1 Symbolic Dynamics in a DelayPerturbed Rössler System
In the first application, we use Rössler ODE of the form [29]:
In what follows, we will denote r.h.s. of (46) by f and by \(v \in \mathbb {R}^3\) we denote vector \(v = (x, y, z)\). By \(\pi _x\) we denote projection onto x coordinate, similarly for \(\pi _y, \pi _z\).
We set the classical value of parameters \(a = b = 0.2\), \(c = 5.7\) [29]. For those parameter values, an evidence of a strange attractor was first observed numerically in [29], see Fig. 2. In [42], it was proved by computerassisted argument that there is a subset of the attractor which exhibit symbolic dynamics. A more recent results for Rössler system can also be found in [6] (Sharkovskii’s theorem) and the methodologies there should be easily adaptable in the context of delayperturbed systems presented in this paper.
We are going to study a delayed perturbation of the Rössler system (46) of the following form:
where parameter \(\epsilon \) is small. We consider two toy examples: first, where \(g = f\) and the second one where g is given explicitly as
We expect that for any bounded g there should be a sufficiently small \(\epsilon \) [33] so that the dynamics of the perturbed system is preserved. However, in this work, we study explicitly given value for \(\epsilon \).
Remark 27
The source codes of the proof are generic. The interested reader can experiment with other forms of the perturbation by just changing the definition of the function g in the source codes of the example.
We will be studying the properties of a Poincaré map defined on the section \(S_0 \subset C^n_p\) given by:
The section \(S_0\) is an extension to \(C^n_p\) of the section \(S = \{ v \in \mathbb {R}^3: \pi _x v = 0 \} \subset \mathbb {R}^3\) used in the proofs in [42]. The section S is drawn in green in Fig. 3, whereas the projection of the attractor onto section \(S_0\) is drawn as a bluered gradient (the solution segments v with \(\pi _x v(0) = 0\)).
In what follows, we set the parameters for the space \(C^n_p\) to \(p = 32\) and \(n = 3\). We prove, with the computer assistance, the following theorems:
Theorem 28
For parameter values \(a = b = 0.2\), \(c = 5.7\) in (46), there exist sets \(X_A = X(A, \Xi ), X_1 = X(N_1, \Xi ), X_2 = X(N_2, \Xi ) \subset S_0\) with explicitly given \(A, N_1, N_2\) and \(\Xi \), such that for the system (47) with \(\epsilon = 10^{3}\) and perturbations: (a) \(g \equiv 0\)—original system treated as a DDE, (b) \(g = f\), and (c) g given as in Eq. (48) we have the following:

1.
\(P(X(A, \Xi )) \subset X(A, \Xi )\) and, in consequence, there exists a nonempty invariant set in \(X(A, \Xi )\) for the map \(P: S_0 \rightarrow S_0\).

2.
The invariant set \(I = Inv(P^2, X_1 \cup X_2)\) of \( X_1 \cup X_2\) under the map \(P^2\) on I is nonempty and the dynamics of \(P^2\) is conjugated to the shift on two symbols (\(\sigma : \Sigma _2 \rightarrow \Sigma _2\), \(\sigma (e_k) = e_{k+1}\)), i.e. if we denote by \(g: I \rightarrow \Sigma _2\) the function \(g(x)_k = i \iff P^{2k}(x) \in X_i\), then we have \(g \circ P^2_I = \sigma \circ g\).
Before we present the proof(s), we would like to make a remark on the presentation of the data from the computerassisted part:
Remark 29
(Convention used in the proofs) The proofs of those theorems are computerassisted and the parameters of the phase space \(C^n_p\) of representations are \(d = 3\), \(p = 32\), \(n=3\), giving in total the dimension of the finitedimensional part of \(M(d, p, n) = d \cdot (1 + p \cdot (n+1)) = 387\). Therefore, it is not convenient to present complete data of the proofs in the manuscript. Instead, we assume the sets are explicitly given in the following forms (and the interested reader is refereed to “Appendix B” for the details on how they are constructed):
with \(v_\textrm{ref} \in S_0\), \(W_u, W_1, W_2\) closed intervals such that \(W_1 \cap W_2 = \emptyset \) and \(W_i \subset W_u \subset \mathbb {R}\), and we remind \({{\,\mathrm{\textbf{B}}\,}}^{\Vert \cdot \Vert _\infty }_{D}(0, 1)\) denotes the unit radius ball in the \(\max \) norm in \(\mathbb {R}^{D}\) centred at 0. Note that this description of sets makes it clear they are hsets with tails on \(S_0\) (up to the scaling of nominally unstable direction W), where \(u = 1\) and \(s_A = s_{N_i} = s = M(d, p,n)2\), the support set \(A = \{ 0\} \times W_u \times {{\,\mathrm{\textbf{B}}\,}}^{\Vert \cdot \Vert _\infty }_{M2}(0, 1)\) and the affine coordinate change \(c_A(\cdot ) = v_\textrm{ref} + C(\cdot )\) with inverse change \(c_A^{1}(\cdot ) = C^{1}(\cdot  v_{ref})\). Now, the computation of any Poincaré map \(P: X_A \rightarrow S_0\) for the initial data \(X(A, \Xi )\) produces a set \(X(B, \Omega ) = P(X(A, \Xi ))\) and there exist sets
for some \(r_{B}, r_{\Omega } \in \mathbb {R}_{+}\). This allows to describe the geometry of \(X(A, \Xi )\) and (estimates on) \(P(X(A, \Xi ))\) by just a couple of numbers: \(W_u\), \(\pi _2 B_c\) (the size of set B in the nominally unstable direction), \(r_{B}\) (upper bound on all coefficients in the finite nominally stable part) and \(r_{\Omega }\) (upper bound on all \(\xi \) in the tail part), which are suitable for a concise presentation in the manuscript.
The sets used in the computations are obtained by computing the appropriately enlarged enclosure on the set of segments of solutions to the unperturbed ODE (46). We choose a set \({\tilde{A}} \subset \mathbb {R}^3\) such that \({\tilde{A}} \in \{ v \in \mathbb {R}^3 \pi _x v = 0\}\) is a trapping region for the Poincaré map of the unperturbed ODE: \(P({\tilde{A}}) \subset {\tilde{A}}\). Then we choose a set \(X(A, \Xi )\) to contain the segments of \({\tilde{A}}\) propagated back in time for a full delay with the unperturbed ODE:
where \(\varphi _0\) is the flow in \(\mathbb {R}^3\) for (46). Detailed procedure how the set A was generated is described in “Appendix B”. The set \({\tilde{A}}\) was chosen to be \(\{0 \} \times [10.7, 2.2] \times [0.021, 0.041]\), whereas the sets \({\tilde{N}}_1 = [8.4, 7.6]\) and \({\tilde{N}}_2 = [5.7, 4.6]\). Finally, the orbit \(v_0\) with \(\pi _2 v_0(0) = 6.8\) is selected among the orbits in the attractor as the reference point of the sets \(X_A, X_1, X_2\). The set \(W_u\) is chosen as \(W_u = \pi _2 A_c = \pi _y {\tilde{A}}  \pi _2 v_0(0) = [3.9,4.6]\). The same is true for sets \(N_1, N_2\), with \(W_1 = [1.6, 0.8]\), \(W_2 = [1.1, 2.2]\).
Now, we can proceed to the proofs.
Proof o Theorem 28
The proofs for parts (a), (b), and (c) follow the same methodology; therefore, we present the details only for case (a) and then only the estimates from the other two cases. In principle, we will show that \(P(X_A) \subset X_A\) and \(X_i {\mathop {\Longrightarrow }\limits ^{P^2}} X_j\) for all \(i, j \in \{ 1, 2 \}\) and then apply Theorem 25.
The set X(A, R) and two other sets are given as described in Remark 29. The computer programs for the proof are stored in ./examples/rossler_delay_zero. The data for which presented values were computed is stored in ./data/rossler_chaos/epsi_0.001. See “Appendix B” for more information. Additionally to the estimates presented below, the computer programs verify that \(t_P(x) > (n+1)\) (i.e. long enough for Poincaré maps to be well defined) and that the function \(t_P(\cdot )\) is well defined. For details, see the previous work [34].
First, we prove that \(P_c(X(A, \Xi )) \subset (A_c, \Xi )\). Let \((B_c, \Omega )\) will be output of the rigorous program rig_prove_trapping_region_exists run for the system in case (a) such that \(P_c(X(A, \Xi )) \subset (B_c, \Omega )\). It suffices to show the following:

\(\pi _2 P_c(X(A, \Xi )) = \pi _2 B_c \subset W_u = \pi _2 A_c\);

\(\pi _i P_c(X(A, \Xi )) = \pi _i B_c < 1\) for all \(i > 2\);

\(\pi _{\Xi _i} P_c(X(A, \Xi )) = \pi _i \Omega < 1\) for all \(i \in \{1, \ldots , p \cdot d \}\).
Indeed, we have:

\(\pi _2 P_c(X(A, \Xi )) = [3.786230021035,3.92103823500285] \subset [3.9,4.6] = W_u\);

\(\pi _i P_c(X(A, \Xi )) \le 0.910355124006778 < 1\), for \(i > 2\);

\(\pi _{\Xi _i} P_c(X(A, \Xi )) \le 0.395102819146026 < 1\) for all i.
Which finishes the proof of the first assertion.
For the second assertion we prove that we have a set of full covering relations:
We remind that the sets \(N_{i,c} = \{ 0 \} \times [W_{i}^{l}, W_{i}^r] \times {{\,\mathrm{\textbf{B}}\,}}^{\Vert \cdot \Vert _\infty }_{M2}(0, 1)\) with \(W_1 = [1.6, 0.8]\), \(W_2 = [1.1, 2.2]\). The program ./rig_prove_covering_relations produces the following inequalities:

(L1L1) \(\pi _2 P^2_c(X(N_{1}^{l}, \Xi )) = 1._{696238902429803}^{708946819732338}< 1.6 = \pi _2 N_{1,c}^{l} < \pi _2 N_{2,c}^{l}\)

(R1R2) \(\pi _2 P^2_c(X(N_{1}^{r}, \Xi )) = 2.4_{09511664184434}^{17718805618395}> 2.2 = \pi _2 N_{2,c}^{r} > \pi _2 N_{1,c}^{r}\)

(R2L1) \(\pi _2 P^2_c(X(N_{2}^{r}, \Xi )) = 1.83_{8887194518363}^{9215629292839}< 1.6 = \pi _2 N_{1,c}^{l} < \pi _2 N_{2,c}^{l}\)

(L2R2) \(\pi _2 P^2_c(X(N_{2}^{l}, \Xi )) = 2.2_{69015891346912}^{70120359885664}> 2.2 = \pi _2 N_{2,c}^{r} > \pi _2 N_{1,c}^{l}\),
where sets \(N^l\), \(N^r\) etc. are defined as in Lemma 26. It is ease to see that those inequalities, together with the existence of trapping region \(X_A\), imply that for each \(i, j \in \{1, 2\}\) conditions (CC1)(CC3) in Lemma 26 are satisfied, that is \(X_i {\mathop {\Longrightarrow }\limits ^{P^2}} X_j\), which finishes the proof for the case (a) after applying Theorem 25.
For the cases (b) and (c) we only present estimates:

Case (b), \(g = f\). Output from rig_prove_trapping_region_exists is:

\(\pi _2 P_c(X(A, \Xi )) = [3.82791635121864,3.90123013871349] \subset [3.9,4.6] = W_u\);

\(\pi _i P_c(X(A, \Xi )) \le 0.960537051554584 < 1\), for \(i > 2\);

\(\pi _{\Xi _i} P_c(X(A, \Xi )) \le 0.397264977921163 < 1 = r_\Xi \), for all i.
Output from program ./rig_prove_covering_relations is:

(L1L1) \(\pi _2 P^2_c(X(N_{1}^{l}, \Xi )) = 1.6_{68486957556001}^{84410417326001}< 1.6 = \pi _2 N_{1,c}^{l} < \pi _2 N_{2,c}^{l}\)

(R1R2) \(\pi _2 P^2_c(X(N_{1}^{r}, \Xi )) = 2.4_{64065036803807}^{74268236696726}> 2.2 = \pi _2 N_{2,c}^{r} > \pi _2 N_{1,c}^{r}\)

(R2L1) \(\pi _2 P^2_c(X(N_{2}^{r}, \Xi )) = 1.76_{7206286440370}^{9151140189891}< 1.6 = \pi _2 N_{1,c}^{l} < \pi _2 N_{2,c}^{l}\)

(L2R2) \(\pi _2 P^2_c(X(N_{2}^{l}, \Xi )) = 2.36_{0282881761384}^{2685243092644}> 2.2 = \pi _2 N_{2,c}^{r} > \pi _2 N_{1,c}^{r}\)


Case (c), g as in (48). Output from rig_prove_trapping_region_exists is:

\(\pi _2 P_c(X(A, \Xi )) = [3.78710970137727,3.92188126709857] \subset [3.9,4.6] = W_u\);

\(\pi _i P_c(X(A, \Xi )) \le 0.951680057117636 < 1\), for \(i > 2\);

\(\pi _{\Xi _i} P_c(X(A, \Xi )) \le 0.459753301095895 < 1\), for all i.
Output from program ./rig_prove_covering_relations is:

(L1L1) \(\pi _2 P^2_c(X(N_{1}^{l}, \Xi )) = 1._{695427259804897}^{714200213156898}< 1.6 = \pi _2 N_{1,c}^{l} < \pi _2 N_{2,c}^{l}\)

(R1R2) \(\pi _2 P^2_c(X(N_{1}^{r}, \Xi )) = 2.4_{08774107762390}^{20396855111791}> 2.2 = \pi _2 N_{2,c}^{r} > \pi _2 N_{1,c}^{r}\)

(R2L1) \(\pi _2 P^2_c(X(N_{2}^{r}, \Xi )) = 1.8_{38300180457653}^{41157932729915}< 1.6 = \pi _2 N_{1,c}^{l} < \pi _2 N_{2,c}^{l}\)

(L2R2) \(\pi _2 P^2_c(X(N_{2}^{l}, \Xi )) = 2.2_{67377344403297}^{70144525622461}> 2.2 = \pi _2 N_{2,c}^{r} > \pi _2 N_{1,c}^{r}\)

\(\square \)
Figure 3 shows the numerical representations of the apparent strange attractor in the respective systems, while Fig. 4 depicts the computed estimates of the proof in a humanfriendly manner. The total running time of the proof in (a) is around 16 min, and the cases (b) and (c) of around 23 min. Computations were done on a laptop with Intel® Core\({}^{\texttt{TM}}\) i710750 H 2.60GHz CPU. The majority of the computations is done in the proof of trapping region \(X_A\), which must be divided into 200 pieces along the vector \(W_u\). Those computations are easily parallelized (each piece computed in a separate thread). The data and programs used in the proofs are described in more detail in “Appendix B”, together with the links to source codes.
5.2 Unstable Periodic Orbits in Mackey–Glass Equation
In this application, we study the following scalar equation:
In [24], the authors shown numerical evidence of chaotic attractor in that system, see Fig. 5a. In their work, Mackey and Glass used the following values of parameters: \(\tau = 2\), \(n = 9.65\), \(\beta = 2\), \(\gamma = 1\). In our previous work [34], we have shown existence of several (apparently) stable periodic orbit for \(n \le 8\). In this work, we show that the new algorithm, together with the fixedpoint index, can be used to prove more diverse spectrum of results. We prove existence of several (apparently) unstable periodic orbits for the classical values of parameters, for which the chaotic attractor is observed, \(\tau = 2\), \(n = 9.65\), \(\beta = 2\), \(\gamma = 1\).
Remark 30
In what follows, we get rid of the variable delay \(\tau \) and we rescale the system to have unit delay by the change of variables: \(y(t) = x(\tau \cdot t)\). It is easy to see that Eq. (49) in the new variables becomes:
that is, we can remove parameter \(\tau \) by rescaling \(\beta \) and \(\gamma \) to \({\bar{\beta }} = \tau \cdot \beta \) and \({\bar{\gamma }} = \tau \cdot \gamma \).
We state the following:
Theorem 31
Each of the three approximate solutions \({\bar{T}}^i\) shown in Fig. 5c, d has a small, explicitly given vicinity \(V_i \subset C^n_p\) with \(n=4\) and \(p=128\) of the initial segment \({\bar{T}}^i_0\) such that there exists a true periodic solution \(T^i\) with the initial segment \(T^i_0 \in V_i\) of the Mackey–Glass equation (49) for the classical parameter values \(\tau = 2\), \(n = 9.65\), \(\beta = 2\), \(\gamma = 1\) [24].
Proof of Theorem 31
we use the parameters \(\beta = 4\) and \(\gamma = 2\), \(n = 9.65\) and \(\tau = 1\) in (49) and we use Remark 30. The proof is similar to that of Theorem 28 and boils down to checking appropriate covering relations. The initial segments \({\bar{T}}^i\) lie on the section \(S = \left\{ x \in C([0,1],\mathbb {R}): x(0) = x(1), x(t) < 0.96 \right\} \). The index i corresponds to the basic period of the solution \(T^i\) as a periodic point of a map \(P: S \rightarrow S\). In the coverings, we use map \(P^2\) to guarantee that the return time \(t_P\) to the section is long enough.
Each of the \(V_i = X(N_i, \Xi _i)\) is given with \(N_i = {\bar{T}}^i_0 + C_i \cdot r_i\) with \(r_i = \{ 0 \} \times W_i^u \times [1,1]^{M2}\). Additionally, in case of \(T^4\) we have another set \(V'_4 = X(N'_4, \Xi '_4)\) with \(N'_4\) of the similar form: \(N'_4 = P^2({\bar{T}}^4) + C'_4 \cdot r'_4\). In other words, the origin point of the set \(N'_4\) is the second iteration of the Poincaré map \(P^2\) of the initial segment of \(T^4\). The sets are obtained as described in “Appendix B”. Each of these sets defines a section \(S_i = \{ x \in C^n_p: c_i \cdot (a(x)  {\bar{T}}^i_0) = 0 \}\) (different from S), where \(c_i = (C_i)_{\cdot ,1}\)—the first column of the matrix \(C_i\). The reason for that is described in “Appendix B” and boils down to assure that \({{\,\mathrm{\textbf{diam}}\,}}(t_P(X_i))\) is as small as possible.
We will show that:
where the Poincaré maps \(P_{S_i \rightarrow S_j}\) are derived from the flow of Eq. (49) and maps indicated sections: \(P_{S_i \rightarrow S_j}: S_i \rightarrow S_j\), with additional assumption that the return time \(t_P\) is long enough. We will drop the subscripts if they are easily known from the context.
For \(T^1\) we have:

for all \(i > 2\), \(\left \pi _i P_c(X(N_{1}, \Xi _{i}))\right = 0.614451801967851 < 1\)

for all i, \(\left \pi _{\Xi _i} P_c(X(N_{1}, \Xi _{i}))\right = 0.999998174289212 < 1\)

\(\pi _2 P_c(X(N_{1}^{r}, \Xi )) = {}_{3.845940820239275}^{4.514877050431105} < 1 = \pi _2 N_{c}^{l}\)

\(\pi _2 P_c(X(N_{1}^{r}, \Xi )) = {}_{3.827847664967472}^{4.496773405715568} > 1 = \pi _2 N_{c}^{r}\)
For \(T^2\) we have:

for all \(i > 2\), \(\left \pi _i P_c(X(N_{2}, \Xi _{2}))\right \le 0.731193331043839 < 1\)

for all i, \(\left \pi _{\Xi _i} P_c(X(N_{2}, \Xi _{2}))\right \le 0.999996951451891 < 1\)

\(\pi _2 P_c(X(N_{2}^{r}, \Xi _2)) = {}_{3.995778903452447}^{5.033339010859840} > 1 = \pi _2 N_{2,c}^{r}\)

\(\pi _2 P_c(X(N_{2}^{r}, \Xi _2)) = {}_{3.978765934264806}^{5.016322912452834} < 1 = \pi _2 N_{2,c}^{l}\)
For \(T_4\) we have:

for all \(i > 2\), \(\left \pi _i P_c(X(N_{4}, \Xi _{4}))\right \le 0.999948121260377 < 1\)

for all i, \(\left \pi _{\Xi _i} P_c(X(N_{4}, \Xi _{4}))\right \le 0.956276660970399 < 1\)

\(\pi _2 P_c(X(N_{4}^{l}, \Xi _4)) = {}_{1.1221122505976317}^{3.2368193002087367} < 1 = {N'_{4}}^{l}_{c}\)

\(\pi _2 P_c(X(N_{4}^{r}, \Xi _4)) = {}_{1.1239689716822263}^{3.2385726261859316} > 1 = {N'_{4}}^{r}_{c}\)
and

for all \(i > 2\), \(\left \pi _i P_c(X(N'_{4}, \Xi '_{4}))\right \le 0.898580326387734 < 1\)

for all i, \(\left \pi _{\Xi _i} P_c(X(N'_{4}, \Xi '_{4}))\right \le 0.952378028038733 < 1\)

\(\pi _2 P_c(X({N'_{4}}^{l}, \Xi '_4)) = {}_{1.6331410212899785}^{3.0485204456349866} > 1 = {N_{4}}^{r}_{c}\)

\(\pi _2 P_c(X({N'_{4}}^{r}, \Xi '_4)) = {}_{1.6341550945779965}^{3.0495636957165507} < 1 = {N_{4}}^{l}_{c}\)
All those inequalities satisfy appropriate assumptions of Lemma 26. Therefore, all the coverings from (50) exist and, from Theorem 25, we infer existence of appropriate periodic points \(T^i_0 \in V_i\). \(\square \)
The diameters of the sets expressed in commonly used functional norms are presented in Table 2. The data and programs used in the proofs are described in more detail in “Appendix B”, together with the links to source codes.
5.3 A Comment About the Exemplary Systems
Both Rössler and Mackey–Glass systems studied as an exemplary application in this work are chaotic for the parameters used. However, Mackey–Glass system is a scalar equation, so the chaos present in the system must be a result of the infinite nature of the phase space and the delay plays a crucial role here. It is not clear if the dynamics can be approximated with a finite number of modes, and how to choose good coordinate frame to embed the attractor. The Rssler system on the other hand is a 3D chaotic ODE (for parameters specified), and the chaotic behaviour is the result of the dynamic in this explicitly finite dimension space. The systems of the form (47) are small perturbations of the ODE and thus one can expect the dynamics of the ODE persist in some sense, at least for \(\epsilon \) small enough [33]. It is much easier to propose sets for the covering relations inherited directly from the coverings in finite dimension for unperturbed system, see “Appendix B”, where we use the flow of unperturbed ODE to generate the apparently unstable direction for the trapping region containing the attractor.
References
F.A. Bartha, T. Krisztin, and A. Vigh. Stable periodic orbits for the Mackey–Glass equation. J. Differential Equations, 296 (2021), 15–49.
R.F. Brown. A Topological Introduction to Nonlinear Analysis. Second Edition. Springer, New York, 2004.
K.E.M. Church. Validated integration of differential equations with statedependent delay. Commun. Nonlinear Sci. Numer. Simul., https://doi.org/10.1016/j.cnsns.2022.106762(2022).
R.D. Driver. Ordinary and Delay Differential Equations. Springer, New York, 1977.
M. Gidea and P. Zgliczyński. Covering relations for multidimensional dynamical systems. J. Differential Equations, 202 (2004), 32–58.
A. Gierzkiewicz and P. Zgliczyński. From the Sharkovskii theorem to periodic orbits for the Rössler system. J. Differential Equations, 314 (2022), 733–751.
J. Gimeno, J.P. Lessard, J.D. Mireles James, and J. Yang. Persistence of Periodic Orbits under Statedependent Delayed Perturbations: Computerassisted Proofs. arxiv:2111.06391
A. Granas and J. Dugundi. Fixed Point Theory. Springer, New York, 2003.
D.F. Griffiths and D.J. Higham. Numerical Methods for Ordinary Differential Equations: Initial Value Problems. Springer, London, 2010.
IEEE Computer Society. IEEE Standard for FloatingPoint Arithmetic. https://doi.org/10.1109/IEEESTD.2008.4610935 (2008).
T. Kapela, M. Mrozek, D. Wilczak, and P. Zgliczyński. CAPD DynSys library. http://capd.ii.uj.edu.pl, 2014. Accessed: 20220624.
T. Kapela, M. Mrozek, D. Wilczak, and P. Zgliczyński. CAPD::DynSys: A flexible C++ toolbox for rigorous numerical analysis of dynamical systems. Commun. Nonlinear Sci. Numer. Simul., 101 (2021), 105578.
T. Kapela, D. Wilczak, and P. Zgliczyński. Recent advances in a rigorous computation of Poincaré maps. Commun. Nonlinear Sci. Numer. Simul., 110 (2022), 106366.
G. Kiss and JP. Lessard. Computational fixedpoint theory for differential delay equations with multiple time lags. J. Differential Equations, 252 (2012), 3093 – 3115.
T. Krisztin. Periodic solutions with long period for the Mackey–Glass equation . Electron. J. Qual. Theory Differ. Equ., 83 (2020), 1–12.
T. Krisztin and G. Vas. LargeAmplitude Periodic Solutions for Differential Equations with Delayed Monotone Positive Feedback. J. Dyn. Diff. Eq., 23 (2011), 727–790.
T. Krisztin, H.O. Walther, and J. Wu. Shape, smoothness and invariant stratification of an attracting set for delayed monotone positive feedback. American Mathematical Society, Providence, 1999.
B. LaniWayda and R. Srzednicki. A generalized Lefschetz fixed point theorem and symbolic dynamics in delay equations. Ergodic Theory Dynam. Systems, 22 (2002), 1215–1232.
B. LaniWayda and HO. Walther. Chaotic Motion Generated by Delayed Negative Feedback Part II: Construction of Nonlinearities. Math. Nachr., 180 (1996), 141–211.
JP. Lessard. Recent advances about the uniqueness of the slowly oscillating periodic solutions of Wright’s equation. J. Differential Equations, 248 (2010), 992–1016.
J.P. Lessard and J.D. Mireles James. A rigorous implicit \(C^1\) Chebyshev integrator for delay equations. J. Dynam. Differential Equations, 33 (2021), 1959–1988.
R.J. Lohner. Computation of Guaranteed Enclosures for the Solutions of Ordinary Initial and Boundary Value Problems, in Computational Ordinary Differential Equations (J.R. Cach, and I. Gladwel, eds) pp. 425–434, 1992.
M. C. Mackey and L. Glass. Mackey–Glass equation, article on Scholarpedia. http://www.scholarpedia.org/article/MackeyGlass_equation. Accessed: 20220624.
M. C. Mackey and L. Glass. Oscillation and chaos in physiological control systems. Science, 197 (1977), 287–289.
J. MalletParet and G. R. Sell. The Poincaré–Bendixson Theorem for Monotone Cyclic Feedback Systems with Delay. J. Differential Equations, 125 (1996), 441 – 489.
R.E. Moore. Interval Analysis. Prentice Hall, Hoboken, 1966.
L.B. Rall. Automatic Differentiation: Techniques and Applications. Springer, Berlin, 1981.
A. Rauh and E. Auer. Verified integration of differential equations with discrete delay. Acta Cybernet., 25 (2022), 677–702.
O.E. Rössler. An equation for continuous chaos. Physics Letters A, 57 (1976), 397–398.
R. Szczelina. Source codes for the computer assisted proofs. http://scirsc.org/p/ddehighorder. Accessed: 20220624.
R. Szczelina. Virtual machine with the source codes. http://scirsc.org/p/ddehighordervm. Accessed: 20220624.
R. Szczelina. A computer assisted proof of multiple periodic orbits in some first order nonlinear delay differential equation. Electron. J. Qual. Theory Differ. Equ., 83 (2016), 1–19.
R. Szczelina and P. Zgliczyński. Delayed perturbation of ODEs. In preparation.
R. Szczelina and P. Zgliczyński. Algorithm for rigorous integration of Delay Differential Equations and the computerassisted proof of periodic orbits in the Mackey–Glass equation. Found. Comput. Math., 18 (2018), 1299–1332.
W. Tucker. A rigorous ODE solver and Smale’s 14th problem. Found. Comput. Math., 2 (2002), 53–117.
J.B. van den Berg and J. Jaquette. A proof of Wright’s conjecture. J. Differential Equations, 264 (2018), 7412–7462.
G. Vas. Configurations of periodic orbits for equations with delayed positive feedback. J. Differential Equations, 262 (2017), 1850 – 1896.
H.O. Walther. The impact on mathematics of the paper “Oscillation and Chaos in Physiological Control Systems” by Mackey and Glass in Science, 1977. arxiv:2001.09010 (2020).
D. Wilczak and P. Zgliczyński. A geometric method for infinitedimensional chaos: Symbolic dynamics for the Kuramoto–Sivashinsky PDE on the line. J. Differential Equations, 269 (2020), 8509–8548.
J. Yang, J. Gimeno, and R. De la Llave. Parameterization method for statedependent delay perturbation of an ordinary differential equation. SIAM J. Math. Anal., 53 (2021), 4031–4067.
M. Zalewski. Computerassisted proof of a periodic solution in a nonlinear feedback DDE. Topol. Methods Nonlinear Anal., 33 (2009), 373–393.
P. Zgliczynski. Computer assisted proof of chaos in the Rössler equations and in the Hénon map. Nonlinearity, 10 (1997), 243–252.
P. Zgliczyński. \(C^1\)Lohner algorithm. Found. Comput. Math., 2 (2002), 429–465.
Acknowledgements
Research has been supported by Polish National Science Centre Grant No. 2016/22/A/ST1/00077.
Author information
Authors and Affiliations
Corresponding author
Additional information
Communicated by Konstantin Mischaikow.
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Appendices
Appendix A: LohnerType Algorithm for Control of the Wrapping Effect
In the “Appendix”, we present technical details of the implementation of an efficient Lohnertype control of the wrapping effect.
1.1 A.1: Lohner’s Algorithms and Lohner’s Sets—Basic Idea
Lohner [22] proposed, in the case of finitedimensional maps \(G: \mathbb {R}^M \rightarrow \mathbb {R}^M\), to use a decomposition of the rigorous method for G into the numerical (approximate) part \(\Phi : \mathbb {R}^M \rightarrow \mathbb {R}^M\), that can be explicitly differentiated w.r.t. initial value x, and the remainder part of all the errors \(\texttt{Rem}\), such that \(G(x) \in \Phi (x) + \texttt{Rem}(X)\) for all \(x \in X\). The Lohner’s original idea was to use mean value form of the \(\Phi \) part to “rotate” the coordinate frame to reduce the impact of the so called the wrapping effect encountered when using interval arithmetic. Without the change of local coordinate frame for the set, the result of computations would be represented as an Interval box in \(\mathbb {R}^M\) and big overestimates would occur, see for example Fig. 6. The Lohner’s idea allows to reduce this problem significantly.
In a case of a general map G one can use the mean value form for \(\Phi \) to get the following:
for all \(z \in X \subset \mathbb {R}^M\), and the point \(x \in X\) is just any point, but usually chosen to be the centre of the set X. Here \([X] \in \mathbb {I}^M\) is an interval hull of X and \(\left[ D\Phi ([X])\right] \) is an interval matrix that contains the true Jacobians \(D\Phi (z)\) at all \(z \in [X]\). Then, the strategy to reorganize operations depends on the shape of the set. In the simplest case let assume
where C is a linear transform \(\mathbb {R}^M \rightarrow \mathbb {R}^M\), \(x \in \mathbb {R}^M\), and with interval vectors \(r_0, r \in \mathbb {I}^M\) centred at 0. Using (51) we have:
It is now evident, that the result set has structure similar to (52):
With some additional reorganizations to keep x and C as thin as possible (e.g. point vector and matrix) and vectors r and \(r_0\) centred at 0, we arrive at the following Lohnertype algorithm:
where \(\texttt{m}(\cdot )\) is an operation that returns the middle point of the interval vector or matrix. The terms in (58) might require some comments: the first term is the error left from the part \(S \cdot r_0\) introduced by taking midpoint of matrix S as \({\bar{C}}\) in (57). Second term is just applying mean value form on the r part. Third term is the error introduced after taking midpoint of the sum in (55) as the new reference \({\bar{x}}\). If the matrix \(\left[ D \Phi ([X])\right] \) and the term \(\texttt{Rem}(X)\) are “thin” (i.e. their entries as intervals have small diameter) then we hope the newly introduced errors should be small in comparison with the term \({\bar{C}} \cdot r_0\).
This is just one of the proposed shapes of the set in Lohner’s algorithm, the so called “parallelepiped (\(C \cdot r_0\) part) with interval form of the remainder (the r part is an interval box in \(\mathbb {I}^M\))”. A more general approach is the “doubleton set”:
where matrix B is chosen in some way (to be described later). The Lohner algorithm is more involved in this case:
The difference from the previous algorithm in (58) is in Eqs. (60)–(62). The idea of the improvement over the previous version is that one hope the first term in (62) to have some wrapping effect controlled by the matrix \(Q^{1}\), when doing interval enclosure. The choice about Q and \(Q^{1}\) is done in Eq. (60) and depends on the algorithm implementation. Ideally, we should set \(R = Id\), so that
just as in case of (57). However, we need to compute rigorous inverse of this matrix, which might be either computationally expensive, very difficult, or even impossible. On the other hand, we can choose \(Q = Id\), which transforms the algorithm into the previous one (for sets with the interval form of the remainder, i.e. defined as (52)). Finally, the most commonly used method is to apply (rigorously) any QR decomposition in (60) so that the matrix \(Q^{1} = Q^{T}\) is easily obtainable. This strategy will be crucial later to get better results for DDEs in the case of \(d > 1\) (systems of equations).
One last remark, before we move on to the application of the Lohner’s idea in the context of DDEs, is that the method can be applied also to functions \(G: \mathbb {R}^{M_1} \rightarrow \mathbb {R}^{M_2}\) where the dimensions of the domain and the image is different: \(M_1 \ne M_2\). Formulas (55)–(58) are all valid, but one must be very careful about dimensions of all vectors and matrices involved in the computations.
1.2 A.2: Lohner’s Algorithm—Complexity and Optimization Idea
Lohner’s algorithm complexity is dominated by the two main factors: computation of \(\left[ D \Phi ([X])\right] \) used in (56) and multiplication of matrices. Additionally, there might be some setstructuredependent complexity, such as the need to compute the QR decomposition and the inverse of the matrix Q in (60). All other operations such as matrix–vector multiplication and matrix–matrix and vector–vector additions have lower computational complexity. Computation of \(\left[ D \Phi ([X])\right] \) cannot be avoided and has complexity depending on the complexity of the formula for \(\Phi \). The complexity of matrix–matrix multiplication is \(O(M^3)\), not taking into account the possible faster (and more complicated) multiplication algorithms (e.g. Strassen’s algorithm and similar). In the rest of the “Appendix”, we will discuss the possible simple and effective optimization of those dominant operations based on the sparse structure of \(\left[ D \Phi ([X])\right] \). We will recall from [34] that the \(\left[ D \Phi ([X])\right] \) is very sparse in the case of the integration algorithm \(\mathcal {I}\) for DDEs. We will extend and provide nicer description for the “fast matrix multiplication” method presented in [34] that is easily generalized for any used variables u in the case of multiple delays. Moreover, later on, we will discuss possible shape of the matrix B in (59) which will provide better results but without significant cost in the computational complexity.
The matrix multiplication optimization idea was first proposed in [34] for a specific case of DDEs with one delay i.e. of the form (2). Now we propose a more elegant and more general implementation, that will be suitable for implementation of the problem (26) and with \(d > 1\) (systems of equations). The idea is based on the decomposition of the computation of \(A \cdot B\), \(A \in \mathcal {M}(M, M)\), \(B \in \mathcal {M}(M, N)\) into consecutive computation of products of \(A_{i,\cdot }\)—ith row of A and B. In our case we think of A as \(A = \left[ D \Phi ([X])\right] \). Let assume that \(A_{i,\cdot }\) has a lot of zeros (it is sparse). Let denote by \(u(\cdot )\) (name conflict intentional) the following projection
The function \(u: \mathbb {R}^M \rightarrow \mathbb {R}^k\) and reduces the dimension of the vectors from M to k, so we will call it a reduction. For matrix B, we define:
that is, \(u(B) \in \mathcal {M}(k, N)\) contains all rows corresponding to the variables used in the reduction u. It is now easy to see that
and the complexity of the operation is reduced from \(O(M \cdot N)\) to \(O(k \cdot M)\). We can now apply the multiplication in a loop for all i separately, changing the u accordingly (or using the same u for some coordinates and do multiple rows of A at the same time).
We note that, in the simplest case, when \(u = (\pi _l)\) (only one nonzero element in the ith row of A), and \(A_{i,l} = 1\) we have:
and we can skip multiplication completely, changing it to a shift (selection of a given row). This will be used when A has a large Id block in its structure.
1.3 A.3: LohnerType Algorithm for DDEs Integrator—Preparation
Now, we apply the Lohner strategy to our rigorous DDE integrator \(\mathcal {I}\). We decompose the general method for many delays from Sect. 3.3 into the numerical procedure \(\Phi : \mathbb {R}^n_{p,q} \rightarrow \mathbb {R}^n_{p,q+1}\) and the remainder \(\texttt{Rem}: \mathbb {R}^n_{p,q} \times \mathbb {I}^{d \cdot p} \rightarrow \mathbb {I}^n_{p,q+1} \times \mathbb {I}^{d \cdot p}\) in the following way:
where \(F^{[n]}\) as in (27), [F] as in (30), and \(a(x) = (z(x), j(x))\) is the finitedimensional part of the description \((z, j, \xi )\) of x. The order n of the new jet (67) comes from (28) in the algorithm, see details there. The intermediate variable y is defined in (68) to shorten (69) and underline the dependence on the “used variables” u(x). We remind that the “used variables” vector u(x) is defined for DDE (26) with m delays \(\tau _1 = p_1 \cdot h = \tau \) (i.e. \(p_1 = p\)), \(\tau> \tau _i = p_i \cdot h > \tau _j = p_j \cdot h\) for \(i, j \in \{2,..., m\}\), \(i < j\), \(p_i, p_j \in \{1,...,p1\}\) as:
Please note that, with some abuse of notation, we can think of u as a vector in \(\mathbb {R}^{dim(u)}\). If \(x \in C^n_p\) then \(dim(u) = d(1 + m \cdot (n+1))\).
First we observe that the map \(\Phi \) is well defined map from \(\mathbb {R}^M \rightarrow \mathbb {R}^{M + d}\) with \(M =M(d, p, \eta )\) and it can be differentiated w.r.t. a if f is smooth enough, for example as in our simplifying assumption \(f \in C^\infty \). Therefore, the Lohner algorithm might be applied “as it is” to the algorithm in the pair of Eqs. (69) and (70) (the Apart of the set). However, this approach would be highly ineffective in applications, we will demonstrate now why.
1.4 A.4: Naive, Straightforward Implementation and the Structure of \(D\Phi \)
For simplicity, let us assume we deal with the interval representation of the error term \(B \cdot r = Id \cdot r\) in the Lohner set (59) for \(X = X(A,R) \subset C^n_p\). In that case, it is easy to observe that the dominant operation in the Lohner’s algorithm (in terms of computational complexity) is the matrix–matrix multiplication in Eq. (56). The application of the standard naive matrix multiplication leads to the computational complexity of \(O(M^3) = O( (d \cdot n \cdot p)^3) \) since the matrix dimensions of both \(D \Phi (x)\) and C dimensions are of the order of \(O(d \cdot n \cdot p)\). This is also true (under some assumption) if the size of the representation M grows as the algorithm is iterated. Indeed, let consider \(X_0 = X(x + C \cdot r_0 + r, R)\) with \(C \in \mathcal {M}(M, N)\) \(r_0 \in \mathbb {I}^N\), \(r \in \mathbb {I}^M = \mathbb {I}^n_{p,0}\). Usually \(N = M\), but setup with \(N \le M\) might be beneficial in some applications. Let now consider the chain of sets \(X_i = \Phi (X_{i1})\) represented as Lohner’s sets (59). We have, that in the ith step (\(i \ge 1\)) the sizes of the matrices involved in Eq. (56) are \(D\Phi (X_i) \in \mathcal {M}\left( M + d \cdot i, M+ d \cdot (i1)\right) \), \(C \in \mathcal {M}\left( M+d \cdot (i1), N\right) \) and the result matrix \(S \in \mathcal {M}(M+d \cdot i, N)\). So the naive multiplication complexity is proportional to
provided that both \(N, i \in O(M)\)—this is usually the case, as \(N > M\) does not make sense and \(i \gg M\) is not feasible computationally.
Please note that, for M used in applications, we usually have \(M \approx 1000\). Therefore, the matrix–matrix multiplication in the naive implementation of Lohner’s algorithm does enormous \(O(10^9)\) operations per integration step. On the other hand, investigating Eqs. (69)–(71) reveals that the dynamics on a lot of coefficients is simply a shift to the past. Therefore, \(\left[ D \Phi ([X])\right] \) has a following nice block structure:
The matrix \(J_{11}(v) \in \mathcal {M}(d, d)\) corresponds to the derivative \(D_z \Phi _z(v)\), i.e. the derivative of the zth component (value of the solution x at current time \(t = h\)) w.r.t. to the change in z(x)—the value of x in the previous step (at \(t = 0\)). Likewise, \(J_{13}(v) \in \mathcal {M}(d, d \cdot (n+1))\) corresponds to the \(D_{j_p} \Phi _z(v)\), \(J_{21}(v) = D_{z} \Phi _{j_1}(v) \in \mathcal {M}((n+2) \cdot p, d)\), and so on. We will denote the matrix \((J_{11}, J_{12}, J_{13})\) as \(D_u \Phi _z (v)\) and \((J_{21}, J_{22}, J_{23})\) as \(D_u \Phi _{j_1} (v)\), respectively. Here, we use the convention that subindex such as \(j_i\), z, etc. denotes the corresponding set of variables from the description of the function \(x = (z, j, \xi )\).
Investigating the matrices \(J_{12}(v)\) and \(J_{22}(v)\) we see they correspond to the derivatives of \(\Phi \) w.r.t. values at all intermediate delays \(\tau _{p_i}\), \(i > 1\), so they might also contain a large number of zeros (if the equation does not depend on a particular \(\tau _i\)). When we are dealing with only one delay (\(m = 1\)), then \(J_{12}(v) = 0\) and \(J_{22}(v) = 0\). In that case, we can apply idea proposed in the previous Sect. 1 to get enormous reduction in the computational complexity. We will additionally introduce the structure to the matrix B defined in (59) to help with wrapping effect in the error part \(B \cdot r\).
Remark 32
All matrices \(J_{ij}\) in the actual implementation of the method are computed using automatic differentiation techniques. Those techniques can be readily applied to any equation of the form (26) as long as f is a composition of simple (well known) functions like \(\sin \), \(\exp \), etc. and standard algebraic operations \(\times \), \(\div \), \(+\), −. We do not discus details of this matter in the article.
1.5 A.5: Lohner Algorithm Using \(D_u\Phi _{z}\) and \(D_u\Phi _{j_1}\) Directly
Let \(X(A,R) \subset C^n_{p,q}\) be an fset such that
as in the Lohner structure (59) where \(C \in \mathcal {M}(M, N)\), \(M = \texttt{dim}(\mathbb {R}^n_{p,q})\). The matrix B will have a special block diagonal:
where each \(B_{b,b} \in \mathcal {M}(d, d)\).
Now, we can apply (54) to the pair of methods \((\Phi , \texttt{Rem}_A)\) in Eqs. (69)–(70) to get a new fset of the same structure \(Y = X({\bar{x}} + {\bar{C}} \cdot r_0 + {\bar{r}},\texttt{Rem}_R(X)) \subset C^n_{p,q+1}\) so that for all \(z \in X(A, R)\) we have \(\varphi (h, z) \in Y\). Please note that \({\bar{C}} \in \mathcal {M}(M + d, N)\), \({\bar{r}} \in \mathbb {R}^n_{p,q + 1} = \mathbb {R}^{M + d}\) and \(r_0 \in \mathbb {R}^N\) stays the same as in the original Lohner’s algorithm (this is important). The extra d rows in matrix \({\bar{C}}\) are due to the extra Taylor coefficient computed at \(t=0\). In general, in ith iteration of the algorithm the matrix \(C_i\) will be of the dimension \(\mathcal {M}(M_0+d \cdot i, N)\) and the error term r will be of dimension \(\mathbb {R}^{M_0+d \cdot i}\), \(B \in \mathcal {M}(M_0+d \cdot i, M_0+d \cdot i)\), where \(M_0 = M(d, p_0, \eta _0)\) is the dimensional of the initial set \(X_0 \in C^{\eta _0}_{p_0}\) at the beginning of the integration process. In applications, we usually set \(N = M_0\).
Remark 33
There is a slight abuse of notation here, as we are using x to denote the base point of the set A and, at the same time, usually it denotes the segment of the solution \(x \in X\). However, the two are used in a different context, so it should not create confusion (one is the Lohner’s set of the A part in X(A, R), second is as an element of X(A, R)). We will state explicitly if \(x \in X\) otherwise x always denotes the mid point of A. Please also note that, by definition, if \(x \in X\), then naturally \(a(x) \in A = x + C \cdot r_0 + B \cdot r\).
Now, the crucial part is to look at each ddimensional variable z(X) and \(j_{i,[k]}(X)\) as a separate Lohner’s set with its own structure inherited from the full set \(X = X(A, R)\) and apply the Lohner’s algorithm separately on each part, together with the optimization idea from A.2.
1.5.1 A.5.1: The Convention
As with the u in (64), for a matrix \(C \in \mathcal {M}(M, N)\) we define z(C) and \(j_{i,[k]}(C)\) as the matrix containing all the appropriate rows from C. Each z(C) and \(j_{i,[k]}(C)\) is therefore a matrix in \(\mathcal {M}(d, N)\).
It is easy to see that if the set \(X = X(A, R)\), with A as in (73), then
where \(B_z \in \mathcal {M}(d, d)\) given as in (74) and \(z(C) \in \mathcal {M}(d, M)\). Similarly \(j_{i,[k]}(X) = j_{i,[k]}(x) + j_{i,[k]}(C) \cdot r_0 + B_{j_{i,[k]}} \cdot j_{i,[k]}(r)\).
Remark 34
The use of the abstract operations \(z(\cdot )\), \(j_{i,[k]}(\cdot )\), and u allows for a more general implementation of the methods, independent of the actual storage organization of the data in computer programs.
1.5.2 A.5.2: The Shift Part
First consider the easy case of computing \(j_{i}({\bar{X}})\) in \({\bar{A}} = \Phi (a(X))\) for \(i > 1\). We observe that
as this is the case of the shift to the past in Eq. (21). The procedure is exact [i.e. \(\texttt{Rem}_A(X)_{j_i} = 0\), see Eq. (70)] and no extra errors are introduced. Therefore:
and using observation (66) we have for all appropriate k:
With a proper computer implementation those assignment operations could be avoided completely, for example by implementing some form of pointers swap or just by designing the data structures to be easily extended to accommodate new data. This last approach is implemented in our current source code so that the computational complexity is negligible.
What is left to be computed are two parts: \(j_{1}({\bar{X}})\) and \(z({\bar{X}})\).
1.5.3 A.5.3: The \(\Phi _{j_1}\) Part
From (69) we have
It is obvious that \(\Phi _{j_{1,[k]}}\) as a function of the variables a is in fact a function only of the subset of variables u, so is the function
Therefore, with some abuse of notation, we can define \(D_u \Phi _{j_1}(u)\) for all \(u \in u(X)\). This is a matrix \(\mathcal {M}(K, dim(u))\) with \(K = (1+n(f, \eta )) \cdot d\) and is given by:
This way we can skip the computation of many entries in \(D\Phi _{j_{1,[k]}}\).
Applying the trick from Eq. (65) on each row of \(D \Phi _{j_1} \cdot C\) we get:
The dimension of matrices taking part in the multiplication on the right side are \(\mathcal {M}(K, dim(u))\) and \(\mathcal {M}(dim(u), N)\). Therefore, the cost of the computation is \(O(K \cdot dim(u) \cdot N)\) instead of \(O(K \cdot M \cdot N)\) when performing the multiplication on the left.
1.5.4 A.5.4: The \(\Phi _{z}\) Part
Similarly as before, we treat \(\Phi _z(a(x))\) as a function of only used variables \(\Phi _z(u(x))\). It has an explicit formula:
so that the Jacobian \(D_u \Phi _z(u)\) has a known form expressed in terms that are already computed:
Therefore, the computation of \(D_u \Phi _z\) is computationally inexpensive in comparison with the matrix–matrix multiplication.
Applying again the trick from Eq. (65) on each row of \(D \Phi _{z} \cdot C\) and the Eq. (78), we get:
where the matrix term \(D_u \Phi _{j_1}(u) \cdot u(C)\) is already computed in Eq. (77). Therefore, the cost of this operation consists only of additions and scalarmatrix multiplication and, thus, may be neglected in comparison with other operations in the Lohnertype algorithm.
1.5.5 A.5.5: Summary Computational Cost of \(D\Phi \cdot C\) Multiplication
Taking all into account, we get that computing the matrix–matrix multiplication of the Lohnertype algorithm applied to the integration scheme for DDEs is dominated only by the multiplication \(D_u \Phi _{j_1}(u) \cdot u(C)\) in (77). Its cost is \(O(K \cdot dim(u) \cdot N)\) with \(K = (1+n(f, \eta )) \cdot d\) which is a big reduction from \(O(M^2 \cdot N)\). To better see this, note that \(dim(u) \le M\) and assuming \(\eta _i = n\) for all i (for simplicity) we have \(M = d \cdot (1 + (n+1) \cdot p) = O(d\cdot n\cdot p)\). In that case \(K = d \cdot (n+2)\) and we get the upper estimate on the complexity \(O(d \cdot n \cdot M \cdot N) = O(d^2 \cdot n^2 \cdot p \cdot N)\). The naive implementation has the complexity \(O(d^2 \cdot n^2 \cdot p^2 \cdot N)\). Moreover, if we assume a constant and small number of delays used in the definition of r.h.s. f of Eq. (26), \(m = const \ll p\) then we get complexity of order \(O(d^2 \cdot n^2 \cdot N)\)—a reduction in the factor \(p^2\). Noting that p is usually the biggest of the parameters d, p, n (see applications), we get an enormous reduction in the computation times, making the algorithm feasible to be applied for a variety of problems. To see how big is the reduction let assume \(p = 128\), \(n=4\), \(d = 1\) and \(N = M\) as in the Mackey–Glass examples. We get \((d p n)^3 = 134217728\) of order \(10^8\), whereas \(d^2 \cdot n^2 \cdot M = 10256\) of order \(10^4\).
1.5.6 A.5.6: QR Decomposition on \(\Phi _z\), \(\Phi _{j_1}\) Parts in the Case \(d > 1\)
Up to now, we only focussed (56) in the Lohnertype algorithm for DDEs. Now, we need to return to the problem of managing local errors—the part \(B \cdot r\) in (59), and the formulas in Eqs. (60)–(62).
First, we note that the structure of matrix B in (73) is block diagonal (74). We want to create a matrix \({\bar{B}}\) in the representation of \(\Phi (X) + \texttt{Rem}(X)\) of the same structure. The choice of the blockdiagonal structure of B is dictated by the need to compute \(Q^{1} = {\bar{B}}^{1}\) in (62). We cannot hope to be able to rigorously compute decomposition \(Q \cdot R\) or rigorously invert a big and full matrix \({\bar{B}}\), as those operations are illconditioned and very costly (\(O(M^3)\)). The sparse diagonal matrix B removes both those problems with the tradeoff in a form of more complicated algorithm and some extra error terms.
We have already used the structure of B in Eqs. (75)–(76) to reduce problem complexity significantly for the shift part, i.e. computing \({\bar{B}}_{j_i,[k]}\) for all \(i > 1\). What is left to compute is \({\bar{B}}_{j_1,[k]} \in \mathcal {M}(d, d)\) and \({\bar{B}}_{z} \in \mathcal {M}(d, d)\).
To define appropriate \(Q_{j_{1,[k]}} = {\bar{B}}_{j_{1,[k]}}\) and a new \(j_{i,[k]}\left( {\bar{r}}\right) \) we investigate the term \(\left[ D \Phi ([X])\right] \cdot B \cdot r\) from Eq. (62). Taking projection onto the \(j_{1,[k]}\)th coordinate and using the uvariable trick, we get:
with \(D = \left[ D_u \Phi _{j_{1,[k]}}([X])\right] \) for a shorter notation. A close inspection reveals that \(D \cdot u(B) \in \mathcal {M}(d, dim(u))\). Such a matrix is not suitable to apply the QR strategy of the Lohner’s set. We expand further:
where \(D_{j_{q,[s]}} = \left[ D_{j_{q,[s]}} \Phi _{j_1,[k]}([X])\right] \in \mathcal {M}(d, d)\). Now, the term \(D \cdot u(B) \cdot u(r)\) can be computed as follows:
Now, a decision has to be made, as to which \(I \in u = (z, j_{p_1,[0]}, j_{p_1,[1]}, \ldots )\) to choose for the QR decomposition:
and to compute \({\bar{r}}_{j_{1,[k]}}\) according to (62):
The matrix–matrix and matrix–vector operations are done in the order defined by parentheses. Note that all operations are well defined. The dimensions of the matrices are as follows: \(Q_{j_{1,[k]}}^{1}, D_J, B_J \in \mathcal {M}(d,d)\), and \(j_{i,[k]}(S) \in \mathcal {M}(d, N)\) for all variables \(J \in u\). The vectors are: \(r_0 \in \mathbb {I}^N\) while \(r_J, \Phi _{j_{1,[k]}}(x), \texttt{Rem}_{j_{1,[k]}}(x) \in \mathbb {I}^d\).
Remark 35
The same algorithm might be used to compute \({\bar{r}}_{z}\). We only change the projection \(j_{1,[k]}\) to z in the presented formulas.
1.5.7 A.5.7: Complexity of Handling Doubleton Set Structure
The computational cost of using QR strategy with the doubleton set structure (59) in comparison with the interval form of the error terms in the basic structure (52) is as follows. In the basic set structure, the operation (58) is exactly realized by the presented algorithm when we take \(Q = Id_{d \times d}\) and we use the fact that each \(B_J = Id\). We can, of course, skip multiplication by Id. Therefore, the cost of operations is (we count scalar multiplications):

for (80): \(\frac{dim(u)}{d} \cdot d^2 = d \cdot \dim (u) \)

for (81): \(d \cdot N\),

for (82): 0 (no matrix–matrix and matrix–vector multiplications).
In total, we get that computing \({\bar{r}}_J\) for each \(J \in \left\{ z, j_{1,[0]}, \ldots , j_{1,[n]}\right\} \) is \(O(d \cdot (dim(u) + N))\). Taking into account \(dim(u) \le M\) and \(d \ll M\), together with the assumption \(N = M\) (in applications) we get the complexity \(O(d \cdot M) = O(M)\) under assumption that \(d = const\), small.
The algorithm for the doubleton set (59) with nontrivial QR decomposition has the following complexity for each \({\bar{r}}_J\):

cost of computing QR decomposition for a matrix \(D_I \cdot B_I \in \mathcal {M}(d,d)\), usually it is \(O(d^3)\) multiplications,

cost of computing \(Q^{1}\), should not exceed \(O(d^3)\), but it is usually O(1)—if Q is chosen to be orthogonal,

for (80): \(\frac{dim(u)}{d} \cdot \left( d^3 + d^3 + d^2\right) = O(d^2 \cdot \dim (u))\)

for (81): \(d^2 \cdot N + N \cdot d = O(d^2 \cdot N)\),

for (82): \(d^2\).
In total, the complexity is \(O\left( d^2 \cdot (d + dim(u) + N)\right) \). Under the same assumptions as before, we estimate that in applications the complexity is \(O(d^2 \cdot M)\). Therefore, handling the proposed doubleton structure is not much more costly than using the interval form of the remainder (at least for small d).
Remark 36
Please note that the current strategy does not help in the scalar case \(d = 1\). The two sets are in this case equivalent, and the computational cost is basically the same.
1.5.8 A.5.8: Choice of the Matrix \(D_I \cdot B_I\) for the QR Procedure
As to the selection of the matrix \(D_I \cdot B_I\) used in the QR decomposition procedure, in our current implementation we always use \(I = z\). The motivation is as follows: in our applications to the Rössler system we apply the method to a perturbed system \(x'(t) = f(x(t)) + \varepsilon \cdot g(x(t\tau ))\) with \(\varepsilon \) small. Therefore, we expect that the influence \(D_J \cdot B_J\) for \(J \ne z\) will be small. Taking \(I = z\) allows to compare the method to the ODE version of the proofs. Indeed, if we set \(\varepsilon = 0\) and integrate the problem with our code, all \(D_J = 0_{d \times d}\) and the method (80)–(82) reduces to that of the ODE (we only do operations on z coordinate).
Other choices of I are easily implementable and one might want to pursue other forms of the matrix B, for example using various size blocks \(B_{j_i}\) that does QR decomposition on more than d dimensions.
Appendix B: Description of the Data and Computer Programs
In the appendix, we present details of the methodology to generate initial sets for computerassisted proofs. As the data sets are large, one cannot hope to select good initial set candidates “by hand”, as can be done sometimes in the context of lowdimensional ODEs or maps. Instead, some kind of automatic or semiautomatic procedure must be used.
1.1 B.1: Source Codes and a Virtual Machine
The compressed archive of the source codes can be downloaded from the web page [30]. A file README.txt from the main directory contains information on dependencies, compiling process and running the programs on the user’s own computer. For users not wanting to compile files by themselves, we made an image of a virtual machine (VM) with Linux system, all compiler tools, and the source codes compiled to executables that were used to produce data for this paper. It can be downloaded from [31], where one also find the instructions for running the virtual machine. A computer running Docker VM on a Linux system is needed to use the virtual machine image. We recommend following instructions on the official web page: https://docs.docker.com/engine/install/ and selecting the user’s system.
1.2 B.2: List of Programs Used in ComputerAssisted Proofs
All the programs used in proofs reside in the subdirectories placed under the root directory of the compressed archive or in the directory /home/user/DDEs in the VM image. This root directory is common for all programs, and in what follows we give paths relative to this root directory. The programs can be found in the ./examples subdirectory. The data for the proofs used in this paper can be found in ./results subdirectory.
1.2.1 B.2.1: The Program Used to Produce Data in Table 1
The programs used for benchmark in Table 1 can be found in ./examples/benchmark. The program can be compiled by issuing the following command in the main directory of the source codes:
make benchmark
To obtain data from Table 1 one needs to invoke the following command in the ./bin/examples/benchmark directory:
./benchmark diam=’[0,0]’ xi=’[0,0]’ dirpath=’table1’
Results of the computations will be stored in ./bin/examples/benchmark/table1 and will consist of several files (.tex, .pdf, .png, .dat, etc.). One need latex and gnuplot packages installed in the host system for the program to work correctly. One can make various tests by changing the parameters. The full list of parameters is presented below:
./benchmark \(\backslash \) initial=’{[1.1,1.1]}’ \(\backslash \) dirpath=’.’ \(\backslash \) prefix=’benchmark’ \(\backslash \) N=’[8,8]’ \(\backslash \) n=’4’ \(\backslash \) p=’128’ \(\backslash \) epsi=’50%’ \(\backslash \) diam=’[1e06,1e06]’ \(\backslash \) xi=’[ \(\)0.1,0.1]’
The values on the right of = are the default values. It is important to put the parameters into single quotes ’...’. The system modelled by the program is Mackey–Glass equation with \(\gamma = 1\), \(\beta = 2\), \(\tau = 2\) and \(n = \) N (do not confuse with n in the definition of \(C^n_p\). Parameter initial represents \(x_0\) in the definition of the initial Lohner set \(X(A_0, R_0)\), \(A_0 = x_0 + Id \cdot r_0\), \(r_0\) given by diam (see later). Parameter initial can either be an interval, in that case the program will treat \(x_0\) as a representation of a constant initial function \(x_0 \equiv \) initial; or it can be a path to a file containing a vector describing the (z, j) part of the initial segment. For examples of such files, please refer to initial data in the computerassisted proofs. Parameter dirpath describes the directory of the output files from the program. It is advised to select nonexisting folder, as the program overwrites existing files without asking. Parameter prefix will be appended in front of all filenames. Parameters n and p correspond to n and p in \(C^n_p\) and are the order of the representation and the number of grid points on the base interval \([2, 0]\), respectively. The full step \(h = \frac{2}{p}\). Parameter epsi corresponds to \(\varepsilon \) step done to simulate computation of the Poincaré map, and can be given as a percentage of the full step h or as an explicit interval. Parameter diam is the diameter \(r_0\) of the \(A_0 = x_0 + Id \cdot r_0\) part in \(X(A_0, R_0)\), while xi is the diameter of \(R_0\).
1.2.2 B.2.2: The Programs Used in the Proof of Theorem 28
The programs used in the proof of Theorem 28 reside in the following subdirectories:

./examples/rossler_delay_zero for the Rössler original ODE (46), but studied in the extended space \(C^n_p\) over the base delay interval \([1,0]\). Programs in this directory are used to generate common set for all the proofs.

./examples/rossler_delay_rossler for the delayed perturbation of the form \(g = f\).

./examples/rossler_delay_other for the delayed perturbation g given in (48).
Each of the directories contain the following programs

nonrig_attractor (nonrigorous, approximate), it is used to generate initial set of functions to be used in the program nonrig_coords. It generates also plot to view the structure of the apparent attractor.

nonrig_coords (nonrigorous, approximate) it computes first approximation of the coordinate frame for the set A in the definition of the set X(A, R). The program uses the output of the program nonrig_attractor to generate a set S of several hundred solution segments lying on the section \(S_0\). Due to the nature of Rössler attractor, those segments are contained in a thin strip over (x, y)plane (set is thin in z direction), see Fig. 3. Then, a reference solution \(v_{ref}\) segment is selected as the one closest to the centre of this collection. Let denote by S the number of solution segments in S. We define:
$$\begin{aligned} w^i= & {} v^i  v_{ref}, \quad v^i \in S \setminus \{ v_{ref} \}, \\ u^i= & {} \frac{u^i}{u^i_2}, \\ u= & {} \frac{\sum u^i}{S  1} \end{aligned}$$or, in other words, u is the mean vector that spans the intersection of the apparent Rössler attractor with the section \(S_0\). The vector is normed in such a way that \(u_2 = 1\). This corresponds to \(\pi _y u = 1\). The initial coordinate frame is chosen to be:
$$\begin{aligned} {\tilde{C}} = \left( \begin{array}{ccccc} 1 &{} &{} 0 &{} \cdots &{} 0 \\ 0 &{} &{} 0 &{} \cdots &{} 0 \\ \vdots &{} u^T &{} &{} &{} \\ \vdots &{} &{} &{} Id_{(M2) \times (M  2)} &{} \\ 0 &{} &{} &{} &{} \end{array} \right) , \end{aligned}$$(83)that is, first column corresponds to the normal vector to the section hyperplane \(S_0 = \{ v: \pi _x v(0) = 0\}\), the second column corresponds to the nominally unstable direction u, and the rest of coordinates are just the canonical basis in \(\mathbb {R}^{M2}\). The set \(X(A, \Xi )\) is then defined with: \(A = v_{ref} + {\tilde{C}} \cdot r_0\), with \(r_0\) to be defined by the next program rig_find_trapping_region.

rig_find_trapping_region (rigorous) as input, it takes the width \(W = [W_l, W_r]\) of the set in the nominally unstable direction u and the coordinate frame \(v_{ref}\) and \({\tilde{C}}\). Then it starts with \(A^0 = v_{ref} + {\tilde{C}} \cdot r\) with \(r_1 = 0\), \(r_2 = W\), \(r_i = (\epsilon , \epsilon )\) for some small \(\epsilon \) for \(i > 2\). Then, it tries to obtain the set \(X(A, \Xi )\) iteratively “from below”, i.e. at each step \(k = 0,1,...\) it computes image \(P(X(A^k, \Xi ))\) and checks if it is subset of \(X(A^k, \Xi )\). If the test is passed, the program stops, otherwise it takes \(A^{k+1} = \texttt{hull}(A^{k}, \pi _{A} P(X(A^k, \Xi )))\) and continues to the next step. The computation of \(P(X(A^k, \Xi ))\) is done by dividing the input set into N pieces along the nominally unstable direction \(r_2\). For proofs used in this work \(N = 200\).
Finally, when the set A is found, the coordinate frame \({\tilde{C}}\) is changed (by rescaling) to \(C = {\tilde{C}} \cdot \textrm{Diag}(r)\) so that \(A = v_{ref} + C \cdot \left( \{ 0 \} \times W \times {{\,\mathrm{\textbf{B}}\,}}^{\Vert \cdot \Vert _\infty }_{M2}(0,1)\right) \). The matrix \(\textrm{Diag}(r)\) denotes the diagonal matrix with \(r_i\)’s on the diagonal.

rig_prove_trapping_region_exists (rigorous) the program computes the image of the set \(X(A, \Xi )\) under the Poincaré map \(P: S_0 \rightarrow S_0\). If the rig_find_trapping_region is successful in finding the rigorous candidate A, then this program must succeed, as it computes the image \(P(X(A, \Xi ))\) in the same way, dividing the set into the same N pieces.

rig_prove_covering_relations (rigorous) the program checks the conditions (CC2A) and (CC2B) of Lemma 26 on sets \(X(N_1,\Xi )\) and \(X(N_2, \Xi )\). The sets are defined as the restrictions of the set \(X(A, \Xi )\) on the nominally unstable direction \(r_2\). The user can manipulate the definitions of sets changing the values in the configuration file rig_common.h.
Remark 37
To prepare the set \(X(A, \Xi )\) for Theorem 28, we run rig_find_trapping_region for the system without the delay first. Then, we use it again on the resulting set for the delayed systems. In this way, we obtain three sets \(A_0\) for the unperturbed system, \(A_f\) for \(g=f\) and \(A_g\) for the system with g given as in (48). As the final set A we take \(A = \texttt{hull}(A_0, A_f, A_g)\). The computerassisted proofs show that this set is a trapping region for all systems.
The data used in the proofs can be found for each of the systems in the respective directories:

./results/work3_rossler_delay_zero,

./results/work3_rossler_delay_rossler,

./results/work3_rossler_delay_other.
1.2.3 B.2.3: The Programs Used in the Proof of Periodic Orbits in the Mackey–Glass Equation
The programs used in the proof of Theorem 31 can be found in ./examples/mackey_glass_unstable. There is a single program for each of the orbits: prove_T1, prove_T2, and prove_T4, respectively. The data for the proofs are stored in ./results/work3_mackey_glass_proofs. Additionally, a set of generic programs to generate the flow, coordinates and sets for proofs are available in ./examples/mackey_glass_finder. The programs comprise a full set of tools that once compiled can be used to find candidates for periodic solutions to Mackey–Glass equation for any set of parameters and later to prove their existence. With a little effort the programs can be adjusted to work with any scalar DDE—small changes in the file constans.h should suffice. The collection of programs is as follows:

attractorcoordsnonrig nonrigorous program to generate good coordinates for presentation of the MackeyGass attractor (used for parameters in chaotic regime).

comparerig a program to compare two interval sets and print the comparison in a humanfriendly manner.

drawnonrig nonrigorous program to draw solutions in various ways.

findnonrig a nonrigorous Newtonlike method to refine the nonrigorous candidate for a periodic solution with high accuracy.

jacpoincarenonrig a program to compute nonrigorous image of the Poincaré map P for a single initial condition x, together with the (approximate) Jacobian DP(x).

periodiccoordsnonrig a program to generate the “good” basis for the set X(A, R). The procedure is described in more detail later in the “Appendix”.

poincarenonrig a program to compute nonrigorous Poincaré map for a collection of initial conditions.

poincarerig a program to compute rigorously the image of the Poincaré map P on a (p, n)fset \(X(A, R) \subset C^n_p\).

simplecoordsnonrig alternative program to generate very simple coordinates, where majority of base vectors comes from the cannonical basis.
An exemplary process of finding good candidates and initial sets for orbits T1, T2 and T4 can be found in the subdirectory ./results/work3_mackey_glass_finder. The scripts contained there were used to generate data for this paper, and they are as follows ($i \(\in \{1, 2, 4\}\)):

setup.sh a common setup script for all other scripts. In principle, user only edits this file.

T$i1makecoords.sh uses some aforementioned programs to refine the candidate solution \(x_0\) (mid point of the set) and generate good coordinates for the fset \(X(A,\Xi )\), with \(A = x_0 + C \cdot r_0\).
In case of the solution T4, the script is more complicated as it finds a pair of sets \(X_1 = X(A_1,\Xi _1)\), \(X_2 = X(A_2,\Xi _2)\) for the covering \(X_1 {\mathop {\Longrightarrow }\limits ^{P_1}} X_2 {\mathop {\Longrightarrow }\limits ^{P_2}} X_1\), where \(P_1, P_2\) are two Poncaré maps, defined between two different sections.

T$i2findstart.sh try to do the first step of an algorithm to find appropriate \(r_0\) and \(\Xi \) such that \(X(A, \Xi ) {\mathop {\Longrightarrow }\limits ^{P}} X(A, \Xi )\). It starts with a thin set \(x_0 + C \cdot \{0\} \times W \times [0,0]^M2\) and build the set \(X_1 = P(X)\). The sets are set to have the first coordinate of width W (guessed by the user, similarly to the building sets in the Rössler case).
The procedure is more involved in the case of T4, as there are two sets \(X_1\) and \(X_2\) on different sections such that we hope \(X_1 {\mathop {\Longrightarrow }\limits ^{P_1}} X_2 {\mathop {\Longrightarrow }\limits ^{P_2}} X_1\). The program tries to find both sets at the same time.

T$i3findonce.sh subsequent iteration of the previous algorithm. The user needs to run this script until satisfactory \(r_0\) and \(\Xi \) is found. This part of the finding procedure is semiautomatic, as the decision when to stop the procedure is left to the user.
The data generated by the authors of this manuscript can be found in the following directory: ./data/examples/mg.

T$i4proof.sh the script runs the final check of the covering relations in the proof of Theorem 31. If the W width in the unstable direction was set improperly in the previous steps (too narrow), then the script might fail to prove the covering relation.
In case of T1 and T2 the program checks the simplest covering relation \(X {\mathop {\Longrightarrow }\limits ^{P}} X\). In case of T4 the covering relation to check is more involved: \(X_1 {\mathop {\Longrightarrow }\limits ^{P_1}} X_2 {\mathop {\Longrightarrow }\limits ^{P_2}} X_1\), where \(P_1, P_2\).
1.2.4 B.2.4: Idea of the Coordinate Selection
The following procedure is adopted in the program periodiccoordsnonrig for choosing right coordinates for periodic orbits proofs. Each set \(V_i = X(A_i, \Xi _i)\) with \(A_i = {\bar{T}}^i_0 + C_i \cdot r_i\). The matrix \(C_i\) must be computed carefully, as it was shown in [34] and in more detail in [13]. In short, one expects that the linearized dynamics near the stationary point \({\bar{T}}^i_0\) of the Poincaré map \(P^{i}\), \(i \in 1, 2, 4\) should decompose into invariant subspaces \(E_c \oplus E_u \oplus E_s\) with \(dim(E_c) = dim(E_u) = 1\). The subspace \(E_c\) corresponds to the direction along the flow, where \(E_u\) is the unstable space of solutions that have a backward intime limit at the fixed point, where \(E_s\) is the space of those solutions that approach the fixed point as \(t \rightarrow +\infty \). The matrix \(C_i\) is chosen as a composition of the bases of appropriate subspaces:
where we have:

c is the vector defining a section and is chosen in the program as a left eigenvector (i.e. eigenvector of the transposed matrix) of the approximate matrix \({\overline{DP}}({\bar{T}}^i_0)\) corresponding to the eigenvalue \(\lambda _2 = 1\).

u is the eigenvector of \({\overline{DP}}({\bar{T}}^i_0)\) corresponding to the largest and unstable eigenvalue \(\lambda _1\) with \(\lambda _1 > 1\).

the set of vectors \(s_j\) is the basis of the (finite projection) of the stable subspace \(E_s\). It is obtained as an orthonormal basis orthogonal to the vector \({\tilde{u}}\)—the left eigenvector corresponding to the unstable eigenvalue \(\lambda _1\).
The reason why those are chosen as described is explained in detail in [13, 34], and we skip the details here. We only hint that the selection of c guarantees to have a very thin interval \([t_p(X)]\) in rigorous computations of Poincaré maps, where selection of \(s_3, \ldots s_M\) gives a hope that the finitedimensional projection of the P(X) onto stable subspace \(E_s\) could be mapped inside the stable part of the initial set X (\(\pi _{E_s} P(X) \subset \pi _{E_s}X\)) without the need to resort to a set subdivision in computations.
1.2.5 B.2.5: Utility Programs
The programs in directory ./examples/converter are used in some other scripts to do conversion between different kinds of data, for example making interval versions of vector/matrices from their double counterparts. One important program is the matrix converter convmatrix that can compute rigorously in high precision the rigorous inverse of interval matrix. For more information how to use those programs, see their source code documentation. The list of utility programs is as follows:

convmatrix a conversion between various formats of matrices. It can compute rigorous inverse of a matrix in high precision.

convvector a conversion between various formats of vectors.

growvector converts an interval vector [x] into \([w] = \texttt{m}([x]) + r \cdot \left( [x]  \texttt{m}([x])\right) \), for some \(r \in \mathbb {R}\).

splitvector converts an interval vector [x] into \([w] = \texttt{m}([x])\) and \([v] = [x]  \texttt{m}([x])\).

crmatrix takes a matrix C and a vector r and makes a rigorous matrix \(C_r\) such that \(C \cdot r \subset C_r \cdot [1,1]^M\).

rmatrix takes a vector r and makes rigorous matrices R and \(R^{1}\) such that \(R_{i,i} = r_i\), \(R_{i,j}=0\) otherwise.

invmatrixtest performs a test if the pair of matrices A and B given on input has the property that \(Id \subset A \cdot B\) and \(Id \subset B \cdot A\). Computes also the width (maximal diameter of all entries) of \(A \cdot B\) and \(B \cdot A\), allowing to assess the quality of computed inverses.

matrixcmp compares two (large) matrices in a humanfriendly manner.

midmatrix compute \(\texttt{m}(A)\) for a matrix A.

vectorcmp compares two (large) vectors in a humanfriendly manner.

vectorhull compute an interval hull of all vectors given on input.
Rights and permissions
Open Access This article is licensed under a Creative Commons Attribution 4.0 International License, which permits use, sharing, adaptation, distribution and reproduction in any medium or format, as long as you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons licence, and indicate if changes were made. The images or other third party material in this article are included in the article’s Creative Commons licence, unless indicated otherwise in a credit line to the material. If material is not included in the article’s Creative Commons licence and your intended use is not permitted by statutory regulation or exceeds the permitted use, you will need to obtain permission directly from the copyright holder. To view a copy of this licence, visit http://creativecommons.org/licenses/by/4.0/.
About this article
Cite this article
Szczelina, R., Zgliczyński, P. HighOrder LohnerType Algorithm for Rigorous Computation of Poincaré Maps in Systems of Delay Differential Equations with Several Delays. Found Comput Math (2023). https://doi.org/10.1007/s1020802309614x
Received:
Revised:
Accepted:
Published:
DOI: https://doi.org/10.1007/s1020802309614x
Keywords
 Computerassisted proofs
 Periodic orbits
 Symbolic dynamics
 Covering relations
 Fixedpoint index
 Infinitedimensional phase space