• Aucun résultat trouvé

4 Properties of the discrete solution

N/A
N/A
Protected

Academic year: 2022

Partager "4 Properties of the discrete solution"

Copied!
33
0
0

Texte intégral

(1)

Error estimate for the approximation of non-linear conservation laws on bounded domains by the nite volume method

Mario Ohlberger Julien Vovelle y

Abstract

In this paper we derivea priorianda posteriorierror estimates for cell centered nite volume ap- proximations of non-linear conservation laws on polygonal bounded domains. Numerical experiments show the applicability of thea posterioriresult for the derivation of local adaptive solution strategies.

Keywords: hyperbolic equation, initial-boundary value problem, nite volume method, error estimate

MSC: 35L65,65N15

1 Introduction

Let be an open convex polygonal bounded domain in IRd,d= 2 3, endowed with the Euclidean norm

j j and let T 2 IR+. We consider the following initial boundary value problem for non-linear scalar conservation laws:

ct+r F(x t c) = 0 in (0 T) (1)

c( 0) = c0 in (2)

c(x t) = c(t x) in@(0 T): (3) The ux in equation (1) is given by the functionF2C1((0 T)IRIRd) the functionsc02L1() andc2L1(@(0 T)) are respectively the initial and boundary data of the problem (1){(3).

The nite volume methods are known to be well-suited for the discretization of conservation laws. A basic account for this claim is the fact that, by construction, they respect the conservation principle which constitutes the root of equation (1). Indeed, the evolution of the discrete unknown cK in each control volumeK is given by the equation

jKjcnK+1=jKjcnK+ tn X

2@K

Qn (4)

in which we denote abusively by@Kthe set of faces ofKand wherejKjis the volume ofK. Equation (4) is the expression of the fact that the discrete evolution of cK is governed by the values of the discrete uxesQnacross the boundary ofKin the time interval tn tn+1]. It is the choice of this numerical uxes

Qn that determine the nite volume method. In what follows, we will specically consider three-point nite volume schemes with monotone uxes (see (13){(17)). This category of schemes encloses all relevant rst order three-point nite volume schemes.

Since both (1) and (4) are evolution equations, the main features of the analysis of conservation laws, and of their approximations by the nite volume method already appear in the context of the Cauchy problem, i.e. = IRd and no boundary conditions have to be taken into account. The order of accuracy of the nite volume method for the Cauchy problem is one of these well-known features: the rst given

Abteilung fur Angewandte Mathematik, Universitat Freiburg, Hermann-Herder-Str.10, D-79104 Freiburg, mario@mathematik.uni-freibrug.de

yUniversite de Provence, CMI, F-13453 Marseille, vovelle@cmi.univ-mrs.fr

(2)

a priorierror estimate is the (sharp) h1=2(hbeing the size of the mesh) estimate of Kuznetsov Kuz76]

in the 1D case. This estimate remains valid on structured meshes in IRd while, for nite volume schemes on unstructured meshes, the lack of an uniformBV estimate on the numerical solution leads to an error estimate of reduced order h1=4 KNR95, BCV95, CCL95a, EGH00]. Still, in the context of the Cauchy problem, rened error estimates have been given (and their sharpness analyzed) according to the genuine non-linearity of the ux, to the structure of the entropy solution to (1)-(2), or to the nature of the waves in the solution. We refer to the discussion and compilation made by T. Tang on that profuse subject Tan01].

For practical applications a posteriori error estimates are even more important than just convergence rates. Such estimates allow to extract error indicator information that can be used in order to derive ecient self adaptive strategies for the nite volume schemes. A posteriori error estimates for nite volume approximations to the Cauchy problem were rst derived by Tadmor Tad91] in one space dimension, and by Cockburn and Gau CG95] in the multi dimensional case. A localized estimate for general ux functions and the derivation of self adaptive schemes was given in KO00]. Further results for nite volume approximations to the Cauchy problem were obtained in GM00, KO03, KKP02], while nite element approximations to the Cauchy problem were studied in JS95, SH95, HMSW99, HH02]. We emphasize that up to now no a posteriori results are available for approximations of the initial boundary value problem (1){(3).

Although the study of the nite volume method applied to the Cauchy problem (1), (2) has led to the understanding of most of the mechanisms which govern the accuracy of this numerical method of approximation, the initial-boundary value problem (1){(3) has its own interest (for the simple and major reason that the domains under consideration in practical applications can be bounded domains), and its approximation by nite volume schemes deserves an analysis. With that purpose in mind, notice that a new and characteristic feature of the approximation of the initial-boundary value problem (1){(3) by a nite volume scheme is the possible creation of a numerical boundary layer. This numerical boundary layer is a sub-product of the numerical diusion eects induced by the scheme. Of course, its presence is also related to the way in which the boundary data are implemented in the scheme. Let us specify this point. We consider here and in the following the implementation of boundary data via "ghosts control volumes". This is a way to compute the numerical uxes at the boundary of the domain inspired by the design of the uxes inside the domain. Indeed, if is an edge of a control volumeK but also one of the edges of the control volume L then the numerical ux Qn (cf. (4)) is given as a function of the discrete unknowns cnK and cnL by the formula Qn =Gn(cnK cnL) where, among other properties, the functionGn is non-decreasing with respect to its rst argument and non-increasing with respect to the second. If, edge of a control volumeK, is now located at the boundary of the domain , then a ghost control volumeLsuch thatLIRdn and =K\Lis introduced and the computation of the numerical ux at the boundaryQnrelies on a numerical ux functionGn(non-decreasing with respect to its rst argument and non-increasing with respect to the second) via the formulaQn=Gn(cnK cnL) where the value cnL is a discretization (typically the mean value) of the boundary datum c on tn tn+1). This method of computation of the numerical uxes at the boundary of the domain is classical and ensures the convergence of the nite volume scheme to the entropy solution of the problem (1){(3) Sze91, BCV95, CCL95a, Vov02]. Let us also stress that the proposed nite volume discretization is of rather importance for practical applications (see the discussion on the implementation of numerical boundary conditions in the approximation of two-phase ow problems in EGV03]). Before coming back to our considerations on numerical boundary layers, and on their inuence on the speed of convergence of the nite volume method, let us observe that, whensystemsof conservation laws are considered, the computation of the numerical uxes at the boundary of the domain by the method of ghost control volumes may be not accurate. Other methods, like reecting, or absorbing boundary conditions are in use, and, when used, the method of ghost control volumes is associated to the Godunov method for the computation of the ux. In this context, the Godunov method is indeed considered to give the reliable choice of numerical ux functions at the boundary.

The study of the numerical boundary layer has been performed by C. Chainais-Hillairet and E. Grenier CHG01], in the 1D case and for modied Lax-Friedrichs schemes on cartesian grids in the multi-D case.

Such an analysis gives a precise description of the numerical solution and, as a consequence, the speed of convergence of this solution to the entropy solution of the problem (1){(3). In the non-characteristic case

(3)

with smooth exact solutions, this speed of convergence is proved to be of orderhin theL1(0 TL1()) norm, wherehis the size of the mesh.

Unfortunately, the techniques of numerical boundary layer analysis seem dicult to be set when no selected direction of (discrete) derivation exists, as is the case when nite volume schemes on unstructured meshes are used. For such schemes one can therefore think to adapt the technique developed by Kuznetsov Kuz76] for the analysis of the Cauchy problem in the framework of the initial boundary value problem to get error estimates, with the drawback that this tool is not accurate at all to take into account the special phenomena at the boundary of the domain. In the specic situationF(x t c) =u(x t)f(c) with

f monotone, this drawback can be overcome, for the reason that the inow and outow parts of the boundary are determineda prioriby the given velocity eldu. In Vig97], Vignal gives an a priori error estimate of order h1=4 for the initial boundary value problem. However, to our knowledge, for general uxesF, and general schemes on possibly unstructured meshes no results or techniques of error estimates which account for the inuence of the boundary condition have been delivered. In order to ll in this gap, we adapt the technique of Kuznetsov Kuz76] to the proof of uniqueness of the entropy solution given by F. Otto Ott96, MNRR96], and prove that the error can be estimated by ana posteriori error bound which is at least of orderh1=6 for meshes with mesh sizeh. (see Propositions 5.1, 5.2). The order,h1=6, of oura priorierror estimate has also to be discussed. Our comments are postponed to Remark 5.9.

Since the nite volume methods introduce some numerical diusion eects in the approximation of the entropy solution to the problem (1){(3), they are often related to the approximation by the vanishing viscosity method with, say, a viscosity of (small) order". In IV03, DIV03] are developed the tools (notion of kinetic solution for the initial boundary value problem) and given the proof of an error estimate of order"1=3.

The article is structured as follows. In Section 2 are given and recalled some properties of the entropy solution to the problem (1){(3). In Section 3 are dened the nite volume schemes under consideration some of their properties are explained in Section 4 while in Section 5 are proved the error estimates which are the center of our study. Finally, in Section 6 we give numerical experiments to illustrate our analysis. We complete the presentation with the proof of a BV estimate on the entropy solution on convex polygonal bounded domains in Appendix A.

2 Properties and regularity of the exact solution

Problem (1){(3) for general ux F, and in the context of entropy solutions has rst been analyzed by C. Bardos, A.-Y. LeRoux and J.-C. Nedelec BLN79] in the BV framework. The notion of entropy solution given by the three authors has been extended, in theL1 setting, by F. Otto Ott96, MNRR96].

We present and use this last denition, by using the following semi Kruzhkov entropy-entropy ux pairs Ser96, Car99].

Notation 2.1 (Semi Kruzhkov entropy-entropy ux pairs). Leta>b(resp. a?b) denote the max- imum (resp. the minimum) of aand b, set s+=s>0,s;= (;s)+ and denote by sgn(s)the derivative of the functions+ (resp. s;) with the value0ats= 0. We denote by(s )the entropy ux associated to the entropy(s;), that is to say

(x t s ) =sgn(s;)(F(x t s);F(x t )):

We will often drop the dependence of over the variablesxandtand shorten the notation to(s ).

Notation 2.2. We denote byCm and CM2IRsome lower and upper bounds for the data:

Cmc0 cCM a.e.

setC= max(jCmj jCMj)and letLbe a xed real satisfying

L maxfjFc(x t c)j (x t c)2(0 T)Cm CM]g: (5)

(4)

Denition 2.3 (Entropy solution). A functionc2L1((0 T))is called an entropy weak solution of (1){(3), if it satises the following entropy inequalities: for all2Cm CM], for all'2Cc1(IRdIR+) with' 0,

Z

(0T)(c;)@t'+ (c ) r'+Z

(c0;)'( 0) +LZ@

(0T)(c;)' 0: (6) The spaceL1is preserved by equation (1), as well as the space BV, and we have the following theorem.

Theorem 2.4 (Existence, uniqueness, regularity).

Letc02L1(), c2L1(@(0 T)). Suppose that F2C1((0 T)IR)and divxF(x t c) = 0 for all(x t c)2(0 T)IR. Then there exists a unique entropy weak solutionc2L1((0 T))of the problem (1){(3) which is bounded by the data as follows

jjc(t)jjL1((0T))maxfjjc0jjL1() jjcjjL1(@(0T))g:

If furthermore, c0 2 BV(), and c 2 BV(@(0 T)), then c 2 BV((0 T)) and there exists a constantCBV >0which depends on the data and on only such that

jjcjjBV((0T))CBV: (7)

Proof. We refer to BLN79, Ott96, MNRR96, Vov02] for the results of existence and uniqueness of the entropy solution. In BLN79] is given aBV estimate on the entropy solution, which requires to beC2. TheBV estimate in the case where is a polygonal bounded domain is a new result and we give the rather involved and technical proof in Appendix A.

Remark 2.5 (BLN). Under the hypotheses of Theorem 2.4, let c be the entropy solution of the prob- lem (1){(3). Suppose thatc2BV((0 T))and denote byc the trace of the functioncon@(0 T). Then:

1. c satises the following entropy inequalities: for all 2Cm CM]:

Z

IR +

(c;)@t'+ (c )r'+Z

(c0;)'( 0);Z@

(0T)(c ) n' 0: (8) for all'2Cc1(IRdIR+)with' 0.

2. Moreover, the so-called BLN condition BLN79] is satised bycon the boundary of the domain: for a.e. (x t)2@(0 T), for allin the interval with extremitiesc(x t) and c(x t):

(c ) n 0: (9)

3. The inequality (8), together with (9), implies (6). Indeed, if(x t)2@(0 T)and ifc(x t) then (9) gives

;;(c(x t) ) n0 =L(c(x t);); while, if >c(x t)then (9) gives;(c c) n 0and

;;(c(x t) ) n(;(c c);;(c )) nL(c(x t););:

4. In fact, it is possible to prove MNRR96, Vov02] that for every functionwwhich is measurable and bounded a.e. on @(0 T), one has

;(c(x t) w(x t)) nL(c(x t);w(x t)) (10) for a.e. (x t)2@(0 T).

(5)

3 Notations, assumptions and the denition of the scheme

In this section we will x the notations and assumptions and dene the nite volume scheme for solving (1){(3).

Assumption 3.1. The data of problem (1){(3) are supposed to satisfy the following conditions:

c

0 2 L

1

\BV(IRd) c2L1\BV(@(0 T))

F 2 C1((0 T)IR) divxF(x t c) = 0 8(x t c)2(0 T)IR: (11) The initial and boundary data are supposed to belong to the spaceL1\BV. This makes sense if one has in mind practical applications in which these data are physical or biological quantities. The hypotheses of regularity and divergence-free on the uxF are also in coherence with the possible physical or biological underlying model for equation (1). The divergence free condition in (11) may be removed, and source terms may be considered in equation (1) as well.

Let us now give the description of the meshes and schemes used to solve (1){(3). LetJ :=ft0 ::: tNgbe a partition of 0 T] and tn:=tn+1;tnbe the step size ofJ. For eachn2f0 ::: NgletTn=fTjjj2In

int

be a regular triangulation of . The joint edge ofTj and Tl will be denoted bySjl. g

The set of internal edgesSintn and the oriented set of internal edgesEintn are assimilated to the sets of the corresponding indexes and are respectively dened as

Sn

int:=f(j l)2Iintn Iintn gjSjl is an interior edge ofTng Eintn :=f(j l)2Sintn jj>l g:

As mentioned in the introduction, we use the concept of ghost cells to compute the ux at the boundary.

We therefore introduce the notations related to the use of this method. Let the index setIextn be such that

In

ext

\In

int =and such that for each edgeS@ there exists a unique pair of indices (j l)2Iintn Iextn with @Tj \S = S. In this situation we denote Sjl := S. Accordingly, the set of edges located on the boundary of is denoted by

Sn

ext :=f(j l)2Iintn Iextn jSjl is an exterior edge ofTng:

We also denote byhnmin:= minj2Indiam (Tj) the size of the mesh at timetn. The meshTnsatises the following structural hypothesis:

Assumption 3.2. There exists a real >0such that for allhj :=diam(Tj),j2I:

hdj jTjj j@Tjj hdj;1: (12) In order to design the nite volume approximation, we rst dene the class of monotone numerical uxes in use.

Denition 3.3 (Numerical uxes). The numerical uxes are functions gnjl2C(IR2 IR), each for any (j l) 2 Sn and tn 2 IR+, satisfying the following conditions (respectively: monotony, convervativity, regularity, consistency).

8v 2Cm CM] gnjl(v )is monotone non-increasing on Cm CM]

8w2Cm CM] gnjl( w)is monotone non-decreasing onCm CM] (13)

8v w2Cm CM] 8(j l)2Sintn gnjl(v w) =;gnlj(w v) (14)

8w v w 0

v 0

2Cm CM] jgnjl(v w);gnjl(v0 w0)jLjSjlj(jw;w0j+jv;v0j) (15) and

gnjl(w w) = 1t

Z tn+1 tn

Z

Sj lF(x t w) njl dx dt (16)

wherenjl denotes the outer unit normal toSjl with respect toTj.

(6)

Denition 3.4 (Finite volume scheme). Set

c 0j := 1

jTjj

Z

Tjc0 j2I

0

int

cnl:= 1t 1

jSjlj

Z tn+1 tn

Z

Sjlc(x t)dx dt (j l)2Sextn : The discrete evolution of the approximate valuecj of c in the cellTj is governed by the equation

cnj+1:= cnj; t

jTjj

X

l2N(j)

gnjl(cnj cnl) j 2Iintn (17) for alln2f0 ::: Ng, whereN(j) denotes the index set of the neighboring cells ofTj including the ghost indices across the boundaries of the domain.

Given the discrete values cnj, we denote bych the approximate solutionch: (0 T)!IRdened by

ch(x t) :=cnj if x2Tj tnt<tn+1: (18) The stability of the explicit scheme (17) is ensured under the following CFL condition.

Assumption 3.5 (CFL - condition). We assume the following CFL-condition, for a given 2(0 1): tn (1;) 2hnmin

L :

4 Properties of the discrete solution

As the entropy solution of problem (1){(3), the discrete solution is L1 stable. On the contrary, the validity of BV estimates on ch is still an open question (in the case where unstructured meshes are considered): only \weakBV estimates" are known. These two aspects of the behavior of the discrete solution are detailed in the following two lemmas (see Vov02] for a proof).

Lemma 4.1 (L1 - stability). Letchbe the discrete solution (17) and let the Assumptions 3.1, 3.2 and 3.5 be fullled. Then the function ch satisfy the followingL1 estimates:

jjchjjL1(0T])maxfjjc0jjL1() jjcjjL1(@(0T))g and

CmcnjCM for all(Tj tn)2TnJ:

Lemma 4.2 (Weak BV estimate). Letch be the discrete solution (17) and let the Assumptions 3.1, 3.2 and 3.5 be fullled. Then there existsC 0only depending on c0 c L T and such that

X

tn2J

X

(jl)2Eintn tn( maxcn

l

abcnj(gnjl(b a);gnjl(b b)) + maxcn

l

abcnj(gnjl(b a);gnjl(a a)) pC

h

(19) and

X

tn2J

X

j2In

jTjjjcnj+1;cnjj pC

h

: (20)

Entropy inequality satis ed by the approximate solution

In Section 2 we recalled that problem (1) has a unique weak solution conforming to the entropy inequality (6). In this subsection we will show that the approximate solutionchfullls an analog inequality, including a small error term. To comparediscretetocontinuousequations, let us introduce the following formsE+ andEh+:

(7)

Denition 4.3. The discrete functionch being dened by (3.4) and 2IR, we set

E

h+(ch ') :=;X

tn2J

X

j2In

(cnj+1;)+;(cnj;)+ tn

Z tn+1 tn

Z

Tj'(x t)dx dt

; X

tn2J

X

j2In

1

jTjj

Z tn+1 tn

Z

Tj'(x t)X

l2N(j)

gnjl(cnj> cnl>);gnjl( )dxdt

E

+(ch ') :=Z

IR +

(ch(x t);)+@t'(x t) dx dt

+ Z

IR +

+(ch(x t) ) r'(x t)dx dt +

Z

(c0(x);)+'(x 0) dx+L

Z

@(0T)(c(x t);)+'d(x) dt for any '2C1(0 T)).

The discrete (and local) entropy inequality given in Lemma 4.4 is the main account for the approximate continuous entropy inequality detailed in Lemma 4.5.

Lemma 4.4 (Discrete entropy inequality). Let ch be the discrete solution dened in 3.4 and let Assumptions 3.1, 3.2 and 3.5 be fullled. Then we have

E

h+(ch ') 0: (21)

Proof. The discrete entropy inequality (21) follows from the monotonicity properties of the numerical uxes. See,e.g. Vov02].

Lemma 4.5 (Continuous entropy estimate). Letchbe the discrete solution dened in Denition 3.4 and let the Assumptions 3.1, 3.2 and 3.5 be fullled. Then we have

E

+(ch ') ;X

tn2J

X

j2In

jcnj+1;cnjjZTj

Z tn+1

tn j't(x t)jdx dt;

Z

jch(x 0);c0(x)j'(x 0)dx

; X

tn2J

X

(jl)2Eintn 2 maxcn

l

abcnj(gnjl(b a);gnjl(b b))hnjl jr'j+j'tji

; X

tn2J

X

(jl)2Eintn 2 maxcn

l

abcnj(gnjl(b a);gnjl(a a))hnlj jr'j+j'tji

; X

tn2J

X

(jl)2Eintn

L(jcnjj+jcnlj)hnjl jr'j+j'tji

;L Z

@(0T)(ch;c)+'(x t)d(x)dt; X

tn2J

X

(jl)2Sextn

L(cl+cj;2Cm)hnlj jr'ji(22) where the Radon measures njl,njl,njl are dened as

hnjl g i := hj+ tn tnjTjjjSjlj

Z tn+1 tn

Z

Tj

Z tn+1 tn

Z

Sj l

Z

1

0

g(+#(x;) s+#(t;s)) d#d ds dx dt

hnjl g i := (hj+ tn)2 tnjSjlj

Z tn+1 tn

Z

Sj l

Z tn+1 tn

Z

Sj l

Z

1

0

g(+#(;) +#(s;))d#d dt d d

hnjl g i := hj

jTjj

Z tn+1 tn

Z

Tj

Z

Sj l

Z

1

0

g(+#(x;) t) d# d dx dt:

Here, we have introduced the discrete boundary datumchdened bychjSj ltntn+1):=cnlfor(j l)2Sextn .

Références

Documents relatifs

L’archive ouverte pluridisciplinaire HAL, est destinée au dépôt et à la diffusion de documents scientifiques de niveau recherche, publiés ou non, émanant des

In this section, our aim is to prove that the misanthrope process, defined by the Chapman-Kolmogorov equation (10) and a given initial probability measure on D, converges to an

We first present the level set method, and then we derive from the previous analysis an iterative scheme which converges provided that the initial guess is not too far from

In this thesis, with the assumption of infinite depth water, heave added mass and damping coefficients of a floating hemisphere, a Wigley hull and a Liquefied Natural

Abstract Based on a proposal by Warren and Schroeder (2015), we provide a simple script in the R programming language for the computation of the topological entropy (TE) from

Mais pour tous ceux qui se pressent chaque matin sur des routes encombrées ou dans des trains bondés – ce qui pourrait concerner bientôt une majorité de la population

Ein verwandt- schaftliches Empfinden ergab sich vor allem aus dem gemeinsamen Status einer Republik, aber auch aufgrund der ähnliehen politischen Institutionen und

L’archive ouverte pluridisciplinaire HAL, est destinée au dépôt et à la diffusion de documents scientifiques de niveau recherche, publiés ou non, émanant des