• Aucun résultat trouvé

A finite volume scheme for a seawater intrusion model with cross-diffusion

N/A
N/A
Protected

Academic year: 2021

Partager "A finite volume scheme for a seawater intrusion model with cross-diffusion"

Copied!
9
0
0

Texte intégral

(1)

HAL Id: hal-01541229

https://hal.archives-ouvertes.fr/hal-01541229

Submitted on 18 Jun 2017

HAL is a multi-disciplinary open access

archive for the deposit and dissemination of

sci-entific research documents, whether they are

pub-lished or not. The documents may come from

teaching and research institutions in France or

abroad, or from public or private research centers.

L’archive ouverte pluridisciplinaire HAL, est

destinée au dépôt et à la diffusion de documents

scientifiques de niveau recherche, publiés ou non,

émanant des établissements d’enseignement et de

recherche français ou étrangers, des laboratoires

publics ou privés.

A finite volume scheme for a seawater intrusion model

with cross-diffusion

Ahmed Ait Hammou Oulhaj

To cite this version:

Ahmed Ait Hammou Oulhaj. A finite volume scheme for a seawater intrusion model with

cross-diffusion. FVCA8 2017 - International Conference on Finite Volumes for Complex Applications 8, Jun

2017, Lille, France. pp.421-429, �10.1007/978-3-319-57397-7_35�. �hal-01541229�

(2)

A finite volume scheme for a seawater intrusion

model with cross-diffusion

Ahmed Ait Hammou Oulhaj

Abstract We consider a finite volume scheme for a seawater intrusion model. It is based on a two-point flux approximation with upwind mobilities. The scheme preserves at the discrete level the main features of the continuous problem: the non-negativity of the solutions, the decay of the energy and the control of the entropy and its dissipation. Moreover the scheme converges towards a weak solution to the problem. Numerical results are provided to illustrate the behavior of the model and of the scheme.

Key words: Finite Volume scheme, entropy stability, decay of energy. MSC (2010): 65M08, 65N08, 35Q30

1 The continuous problem and objectives

Let Ω be a polygonal open bounded and connected subset of R2, and T > 0 be a

finite time horizon. We consider the following cross-diffusion system of degenerate parabolic equations          ∂tf− ∇. µ f ∇( f + g + b) = 0 in ΩT:= Ω × (0, T ), ∂tg− ∇. g∇(µ f + g + b) = 0 in ΩT, ∇ f · n = ∇g · n = 0, on ∂ Ω × (0, T ), f|t=0= f0≥ 0, g|t=0= g0≥ 0, in Ω . (1)

Ahmed Ait Hammou Oulhaj

Laboratoire Paul Painlev´e, UMR CNRS 8524 Universit´e Lille 1, 59655 Villeneuve d’Ascq Cedex e-mail: ahmed.ait-hammou-oulhaj@math.univ-lille1.fr

(3)

2 Ahmed Ait Hammou Oulhaj

It models the seawater intrusion in an unconfined aquifer (see [4]). We assume that the impermeable interface between the saltwater and the bedrock is given by

z= b(x). The saltwater and the freshwater are assumed to be immiscible. The

inter-faces between the salt-and freshwater, and between the freshwater and the dry soil is located at height z=g(x,t)+b(x) and z=f(x,t)+g(x,t) + b(x) respectively (cf. Fig.

1). The parameter µ is given by µ =ρfresh

ρsalt

∈ (0, 1), with ρ the mass density of the

fluid. The initial data f0and g0are assumed to belong to L∞(Ω ).

Fig. 1 Description of an unconfined aquifer

Following [2, 6, 5], there exists a weak solution to the problem (1). Moreover

f≥ 0, g ≥ 0 a.e in ΩT. (2)

We recall the definition of entropy (resp. energy) functional introduced in [2, 6]: H( f , g) = Z Ω h Γ (g) + 1 µΓ ( f ) i dx, where Γ (s) = s log s − s + 1, E( f , g) = Z Ω hµ 2( f + g + b) 2+1 − µ 2 (g + b) 2idx.

Multiplying (formally) the first equation of (1) by 1

µlog f (resp. µ( f + g + b)) and

the second equation by log g (resp. µ f + g + b), integrating over Ω and summing both equalities, get the classical entropy/dissipation property:

d dtH( f , g) + 1 − µ 2 Z Ω h (∇ f )2+ (∇g)2idx ≤ 1 2(µ + 1) Z Ω (∇b)2dx, (3)

and the decay of the energy functional along time: d dtE( f , g) + Z Ω h µ2f(∇( f + g + b))2+ g(∇(µ f + g + b))2idx = 0. (4)

(4)

In this work, We propose a finite volume scheme for the problem (1). This scheme is based on a two-point flux approximation with upwind mobilities. It is designed in order to preserve at the discrete level the main features of the continu-ous problem: the nonnegativity of the solutions (2), the decay of the energy (4), and the control of the entropy and of its dissipation (3). Based on these estimates, the convergence of the scheme can be proved. We refer to [1] for this purpose.

2 The finite volume scheme

An admissible mesh of Ω is given by a familyT of a control volumes (open and

convex polygons), a familyE of edges, and a family of points (xK)K∈T which

sat-isfy Definition 9.1 in [3]. This definition implies that the straight line between two

neighboring centers of cells (xK, xL) is orthogonal to the edge σ = K|L.

We distinguish the interior edges σ ∈Eintand the boundary edges σ ∈Eext. The

set of edgesE equals the union Eint∪Eext. For a control volume K ∈E , we denote

byEK the set of its edges, byEint,Kthe set of its interior edges, and byEext,Kthe set

of edges of K included in ∂ Ω .

Furthermore, we denote by d the distance in R2and by m the Lebesgue measure

in R2or R. We assume that the mesh satisfies the following regularity requirement:

there exists ζ > 0 such that it holds

d(xK, σ ) ≥ ζ d(xK, xL), ∀K ∈T , ∀σ ∈ Eint,K, with σ = K|L. (5)

For all σ ∈Eint,K, with σ = K|L, we define dσ= d(xK, xL), and the transmissibility

coefficient τσ=

m(σ ) dσ

, σ ∈E . The size of the mesh is δ = maxK∈T(diam(K)).

Let N be a positive integer, and ∆t = T

N; then a uniform discretization of (0, T ) is

given by the family (tn)n∈{0,...,N}where tn= n∆t.

We denote byD an admissible space-time discretization of ΩT composed of an

admissible mesh T of Ω and the values ∆t and N. The size of this space-time

discretizationD is defined by η = max(δ,∆t).

Remark 1.Vorono¨ı meshes and triangular meshes with uniformly acute angles are a

typical examples of admissible meshes satisfying (5). The initial conditions are discretized by

s0T =

K∈T s0K1K, where s0K= 1 m(K) Z K s0(x)dx, ∀K ∈T , with s = f or g,

and 1Kis the characteristic function on K. The discretization of problem (1) is given

(5)

4 Ahmed Ait Hammou Oulhaj m(K)f n+1 K − fKn ∆ t +σ ∈E

int,K τσfσn+1µ  un+1K − un+1 L  = 0, (6) m(K)g n+1 K − gnK ∆ t +σ ∈E

int,K τσg n+1 σ  vn+1K − vn+1L = 0, (7) where un+1K = fKn+1+ gn+1K + bK, vn+1K = µ f n+1 K + g n+1 K + bK, with bK= b(xK), fσn+1= ( ( fKn+1)+ if un+1K ≥ un+1L , ( fLn+1)+ if un+1K < un+1L , g n+1 σ = ( (gn+1K )+ if vn+1K ≥ vn+1L , (gn+1L )+ if vn+1K < vn+1L , (8) with x+= max(x, 0).

Proposition 1. (existence of a discrete solution) For n ∈ {0, ..., N} there exists (at

least) one solution of the scheme (6)-(8). Moreover fKn≥ 0, gn

K≥ 0, for K ∈T .

Proof. Let us to prove the nonnegativity of fKn(which is similar for gnK). This

prop-erty clearly holds for n = 0. Assume now the nonnegativity holds at time step n, and

assume that fKn+1< 0, for some K ∈T . In view of the definition (8) of fn+1

σ one has that fKn+1= fKn− µ ∆ t m(K)σ ∈E

int,K τσ( fKn+1)+ | {z } =0 (un+1K − un+1 L ) +− ( fn+1 L ) +(un+1 K − u n+1 L ) − ) ≥ 0,

yielding a contradiction, ensuring that fKn+1≥ 0, ∀K ∈T ,∀n ≥ 0. The proof of

existence is detailed in [1]. ut

3 Entropy and energy estimates

We introduce a discrete version of entropy (resp. energy) functional: Hn:= H( fKn, gnK) =

K∈T m(K)1 µΓ ( f n K) + Γ (gnK)  , En:= E( fKn, gnK) =

K∈T m(K)µ 2( f n K+ gnK+ bK)2+ 1 − µ 2 (g n K+ bK)2  . We etasblish now the discrete countrepart of (3) and (4).

Proposition 2. There exists C depending only on T, Ω and b such that sup n∈{0,...,N−1} Hn+1+ N−1

n=0 ∆ t

σ ∈Eint σ =K|L τσ h ( fKn+1− fLn+1)2+ (gn+1K − gn+1L )2i≤ C.

(6)

Proof. We multiply (6) (resp. (7)) by ∆tlog f

n+1 K

µ (resp. ∆t log g

n+1

K ) and sum over

K∈T , provides that: A + B +C = 0, where

A=

K∈T mK h1 µ( f n+1 K − f n K) log fKn+1+ (g n+1 K − g n K) log gn+1K i , B= ∆t

K∈Tσ ∈E

int,K τσfσn+1  un+1K − un+1 L  log fKn+1, C= ∆t

K∈Tσ ∈E

int,K τσg n+1 σ  vn+1K − vn+1L )log gn+1K .

By the convexity of Γ , we find that

Hn+1− Hn=

K∈T m(K)h1 µ(Γ ( f n+1 K ) − Γ ( f n K)) + Γ (gn+1K ) − Γ (g n K) i ≤ A. We can rewrite B and C as:

B= ∆t

σ ∈Eint σ =K|L τσf n+1 σ (u n+1 K − u n+1 L )(log f n+1 K − log f n+1 L ), C= ∆t

σ ∈Eint σ =K|L τσgn+1σ (v n+1 K − vn+1L )(log gn+1K − log gn+1L ).

It follows from the convexity of exp that

a(log a − log b) ≥ a − b ≥ b(log a − log b) ∀a, b ∈ [0, +∞[,

where we have used the convention log(0) = −∞ and 0 log(0) = 0. Hence, in view of the definition (8), one has

B≥ ∆t

σ ∈Eint σ =K|L τσ  ( fKn+1− fn+1 L )2+ (gn+1K − gn+1L )( fKn+1− fLn+1) + (bK− bL)( fKn+1− fKn+1)  , C≥ ∆t

σ ∈Eint σ =K|L τσ  (gn+1K − gn+1L )2+ µ(gKn+1− gn+1L )( fKn+1− fLn+1) + (bK− bL)(gn+1K − g n+1 L )  . Combining these inequalities, one deduces that

(7)

6 Ahmed Ait Hammou Oulhaj Hn+1− Hn+ ∆t

σ ∈Eint σ =K|L τσ( fKn+1− fLn+1)2+ ∆t

σ ∈Eint σ =K|L τσ(gn+1K − gn+1L )2 + (µ + 1)∆t

σ ∈Eint σ =K|L τσ( f n+1 K − f n+1 L )(g n+1 K − g n+1 L ) ≤ −∆t

σ ∈Eint σ =K|L τσ(bK− bL) h ( fKn+1− fn+1 L ) + (gn+1K − gn+1L ) i := D.

Using the Young inequality, one has for all ε > 0

D≤ 1 2ε∆ tσ ∈E

int σ =K|L τσ(bK− bL)2+ ε 2∆ tσ ∈E

int σ =K|L τσ h ( fKn+1− fLn+1) + (gn+1K − gn+1L )i 2 . We choose ε = 1 + µ, we have |D| ≤ ∆t

σ ∈Eint σ =K|L τσ 1 2(µ + 1)(bK− bL) 2 + (µ + 1)( fKn+1− fLn+1)(gn+1K − gn+1L ) ! +µ + 1 2 ∆ tσ ∈E

int σ =K|L τσ  ( fKn+1− fLn+1)2+ (gn+1K − gn+1L )2.

Finally, one has

Hn+1− Hn+1 − µ 2 ∆ tσ ∈E

int σ =K|L τσ( fKn+1− fLn+1)2 +1 − µ 2 ∆ tσ ∈E

int σ =K|L τσ(gn+1K − gn+1L )2≤ 1 2(µ + 1)∆ tσ ∈E

int σ =K|L τσ(bK− bL)2.

Summing over n = 0, ..., N − 1, concludes the proof of Proposition 2. ut

Proposition 3. For n ∈ {0, · · · , N − 1} sup

n∈{0,...,N−1}

En+1≤ E0.

Proof. We multiply (6) (resp. (7)) by ∆t µun+1K (resp. ∆tvn+1K ) and sum over K ∈T .

(8)

A=

K∈T m(K)hµ  ( fKn+1+ gn+1K + bK) − ( fKn+ gnK+ bK)  fKn+1+ gn+1K + bK i +

K∈T m(K)h(1 − µ)(gn+1K + bK) − (gKn+ bK)gn+1K + bKi, B= ∆t

σ ∈Eint σ =K|L τσ µ 2fn+1 σ  un+1K − un+1L 2+ gσn+1vn+1K − vn+1L 2 ! .

We use the following inequality: (a − b)a ≥1

2(a 2− b2), ∀a, b ∈ R, to get A≥

K∈T m(K)hµ 2  ( fKn+1+ gn+1K + bK)2− ( fKn+ gnK+ bK)2 i +

K∈T m(K)h1 − µ 2  (gn+1K + bK)2− (gnK+ bK)2 i = En+1− En.

Summing over n = 0, ..., N − 1, concludes the proof of Proposition 3. ut

Let us remark that Proposition 2 and Proposition 3 give a discrete L2(0, T ; H1(Ω ))

and L∞(0, T ; L2(Ω )) bounds on the approximate solutions. These estimates are

suf-ficient to prove the convergence of the scheme when the discretization parameters δ and ∆t tend to 0. We refer to [1] for the proof. As a byproduct, this convergence re-sult ensures the existence of a weak solution to the continuous model. The question of uniqueness of the solution is open as far as we know.

4 Numerical results

Let us provide some illustrations of the behaviour of the numerical scheme (6)-(8). The scheme leads to a nonlinear system that we solve thanks to the Newton-Raphson method. The numerical analysis of the scheme was carried out for a uni-form time discretization of (0, T ) only in order to avoid heavy notations. In order to increase the robustness of the algorithm and to ensure the convergence of the Newton-Raphson iterative procedure, we used an adaptive time step procedure in the

practical implementation. More precisely, we associate a maximal time step ∆tmax

for the mesh . If the Newton-Raphson method fails to converge after 30 iterations

—we choose that the `∞norm of the residual has to be smaller than 10−10as

stop-ping criterion—, the time step is divided by two. If the Newton-Raphson method

converges, the time step is multiplied by two and projected on [0, ∆tmax].

In our test case, the domain is the unit square, i.e., Ω = (0, 1)2. We

con-sider an admissible triangular mesh made of 14336 triangles. We choose b(x, y) =

max 0,1 2  1 − 16(x − 1/2)2(cos(πy) + 2 ! . We set µ = 0.9, and

(9)

8 Ahmed Ait Hammou Oulhaj f0(x, y) =    1 2 if x ≤ 1 4, 0 elsewher, g0(x, y) =    b1 2, 0  − b(x, y) − (x −1 2) if x ≤ 1 2, 0 elsewhere.

Fig. 2 shows the evolution of b(x) (black), b(x) + g(x,t) (red) and b(x) + g(x,t) +

f(x,t) (blue) at different times, and also the evolution of the energy along time.

About the model, we observe that there is convergence towards an equilibrium state, with horizontal interfaces as expected.

Fig. 2 Behaviour of the model at t = 0.2, t = 0.79, t = 12, and evolution of the energy along time

Acknowledgements The author thanks the team Inria/Rapsodi, the Labex CEMPI (ANR-11-LABX-0007-01) and the project GEOPOR (ANR-13-JS01-0007-01) for their support.

References

1. Ait Hammou Oulhaj, A.: Numerical analysis of a finite volume scheme for a seawater intrusion model with cross-diffusion in an unconfined aquifer (2017). HAL: hal-01432197, submitted 2. Escher, J., Laurencot, P., Matioc, B.V.: Existence and stability of weak solutions for a

degen-erate parabolic system modelling two-phase flows in porous media. In: Annales de l’Institut Henri Poincare (C) Non Linear Analysis, vol. 28, pp. 583–598. Elsevier (2011)

3. Eymard, R., Gallou¨et, T., Herbin, R.: Finite volume methods. In: Handbook of numerical anal-ysis, Vol. VII, Handb. Numer. Anal., VII, pp. 713–1020. North-Holland, Amsterdam (2000) 4. Jazar, M., Monneau, R.: Derivation of seawater intrusion models by formal asymptotics. SIAM

J. Appl. Math. 74(4), 1152–1173 (2014)

5. J¨ungel, A.: The boundedness-by-entropy method for cross-diffusion systems. Nonlinearity 28(6), 1963–2001 (2015)

6. Laurenc¸ot, P., Matioc, B.V.: A thin film approximation of the Muskat problem with gravity and capillary forces. Journal of the Mathematical Society of Japan 66(4), 1043–1071 (2014)

Figure

Fig. 1 Description of an unconfined aquifer
Fig. 2 Behaviour of the model at t = 0.2, t = 0.79, t = 12, and evolution of the energy along time

Références

Documents relatifs

Convergence and long time behavior of a Finite Volume scheme for an isotropic seawater intrusion model with a sharp-diffuse interface in a confined aquifer.... VOLUME SCHEME FOR

The numerical results indicate that H is also a Lyapunov functional for system (1)-(4), even if the assumptions of [15] are not satisfied, and that scheme (16)-(20) preserves

In this subsection we prove the existence, via Lax-Milgram theorem, of the unique solution for the linear elliptic system (1.16).. Let us recall our linear

In this subsection we prove the existence, using Schaefer’s fixed point theorem, of a solution for the nonlinear time discrete confined system (2.10) given below... ,

Wellknown discretization methods are finite differences, finite volumes and finite elements. The mathemat- ical study of convergence is quite wellknown in the case of

The proof of this convergence result is divided into Section 4 (basic a priori estimates and existence of a solution to the scheme), Section 5 (compactness for discrete solutions)

Given a microarchitectural timing model and a program, the task of microarchitectural analysis is to determine bounds on the execution times of program fragments.. The main

Il faut penser beaucoup de bien des fusions de communes, puisque cette opération a pour effet, dans tous les cas, d'assurer une amélioration de la gestion de la