A Residual-Based A Posteriori Error Estimator For A Fully-Mixed Formulation of The Stokes-Darcy Coupled Problem
A Residual-Based A Posteriori Error Estimator For A Fully-Mixed Formulation of The Stokes-Darcy Coupled Problem
A Residual-Based A Posteriori Error Estimator For A Fully-Mixed Formulation of The Stokes-Darcy Coupled Problem
Ricardo Oyarz ua
Francisco-Javier Sayas
Abstract
In this paper we develop an a posteriori error analysis of a new fully mixed nite element
method for the coupling of uid ow with porous media ow in 2D. Flows are governed by
the Stokes and Darcy equations, respectively, and the corresponding transmission conditions
are given by mass conservation, balance of normal forces, and the Beavers-Joseph-Saman
law. We consider dual-mixed formulations in both media, which yields the pseudostress and
the velocity in the uid, together with the velocity and the pressure in the porous medium,
and the traces of the porous media pressure and the uid velocity on the interface, as the
resulting unknowns. The set of feasible nite element subspaces includes Raviart-Thomas
elements of lowest order and piecewise constants for the velocities and pressures, respectively,
in both domains, together with continuous piecewise linear elements for the traces. We derive
a reliable and ecient residual-based a posteriori error estimator for the coupled problem.
The proof of reliability makes use of the global inf-sup condition, Helmholtz decompositions
in both media, and local approximation properties of the Clement interpolant and Raviart-
Thomas operator. On the other hand, inverse inequalities, the localization technique based
on triangle-bubble and edge-bubble functions, and known results from previous works, are
the main tools for proving the eciency of the estimator. Finally, some numerical results
conrming the theoretical properties of this estimator, and illustrating the capability of the
corresponding adaptive algorithm to localize the singularities of the solution, are reported.
Key words: a posteriori error analysis, eciency, reliability, Stokes, Darcy, fully-mixed
Mathematics Subject Classications (2000): 65N15, 65N30, 74F10, 74S05
1 Introduction
The derivation of new nite element methods for the Stokes-Darcy coupled problem, in which
the respective interface conditions are given by mass conservation, balance of normal forces,
and the Beavers-Joseph-Saman law, has become a very active research area lately (see, e.g.
[5], [10], [13], [14], [20], [22], [23], [24], [29], [30], [35], [38], [40], [41], [42], [43], [47] and the
references therein). The above list includes porous media with cracks, nonlinear problems, and
the incorporation of the Brinkman equation in the model (see [10], [23], and [47]). In addition,
CI
2
MA and Departamento de Ingeniera Matematica, Universidad de Concepcion, Casilla 160-C, Concepcion,
Chile, email: [email protected]
Departamento de Ingeniera Matematica, Universidad de Concepcion, Casilla 160-C, Concepcion, Chile, email:
[email protected]
w L
2
(O) : div w L
2
(O)
,
is standard in the realm of mixed problems (see, e.g. [12] or [32]). The space of matrix valued
functions whose rows belong to H(div ; O) will be denoted H(div; O). The Hilbert norms of
H(div ; O) and H(div; O) are denoted by | |
div ;O
and | |
div;O
, respectively. On the other
hand, the symbol for the L
2
() and L
2
() inner products
', `
:=
, L
2
(), ', `
:=
, L
2
()
will also be employed for their respective extensions as the duality products H
1/2
() H
1/2
()
and H
1/2
() H
1/2
(). Finally, we employ 0 as a generic null vector, and use C and c, with
or without subscripts, bars, tildes or hats, to mean generic positive constants independent of
the discretization parameters, which may take dierent values at dierent places.
2 The Stokes-Darcy coupled problem
In this section we follow very closely the presentation from [31] to introduce the model problem
and the corresponding continuous and discrete mixed variational formulations.
2.1 The model problem
The Stokes-Darcy coupled problem consists of an incompressible viscous uid occupying a region
S
, which ows back and forth across the common interface into a porous medium living in
another region
D
and saturated with the same uid. Physically, we consider a simplied 2D
model where
D
is surrounded by a bounded region
S
(see Figure 2.1 below). Their common
interface is supposed to be a Lipschitz curve and we assume that
D
= . The remaining
part of the boundary of
S
is also assumed to be a Lipschitz curve
S
. For practical purposes,
we can assume that both
S
and are polygons. The unit normal vector eld on the boundaries
n is chosen pointing outwards from
S
(and therefore inwards to
D
when seen on ). On
we also consider a unit tangent vector eld t in any xed orientation of this closed curve.
The governing equations in
S
are those of the Stokes problem, which are written in the
following non-standard velocity-pressure-pseudostress formulation:
S
= p
S
I + u
S
in
S
, div
S
+ f
S
= 0 in
S
,
div u
S
= 0 in
S
, u
S
= 0 on
S
,
(2.1)
where > 0 is the viscosity of the uid, u
S
is the uid velocity, p
S
is the pressure,
S
is the
pseudostress tensor, I is the 2 2 identity matrix, and f
S
L
2
(
S
) are known source terms.
4
t
n
n
D
S
S
D
f
D
= 0. The matrix valued function K, describing permeability of
D
divided by the viscosity , is symmetric, has L
(
D
) components and is uniformly elliptic.
Finally, the transmission conditions on are given by
u
S
n = u
D
n on ,
S
n +
1
(u
S
t) t = p
D
n on ,
(2.3)
where :=
( Kt) t
d
S
= u
S
in
S
, div
S
+ f
S
= 0 in
S
,
p
S
=
1
2
tr
S
in
S
, u
S
= 0 on
S
,
(2.4)
where tr stands for the usual trace of tensors, that is tr :=
11
+
22
, and
d
:=
1
2
(tr ) I
is the deviatoric part of the tensor := (
ij
)
22
.
5
We end this section by remarking that, though the geometry described by Figure 2.1 was
choosen to simplify the presentation, the case of a uid owing only across a part of the boundary
of the porous medium does not yield further complications for the a posteriori error analysis
of the problem. We already discussed this issue in [31, Section 2.1], in connection with the
respective a priori error analysis, and further details can be found in [24].
2.2 The fully-mixed variational formulation
We rst dene the global unknows := (
S
, u
D
, , ) and u := (u
S
, p
D
), where and are
the traces := u
S
[
and := p
D
[
q L
2
(
D
) :
D
q = 0
,
and dene the product spaces
X := H(div;
S
) H(div ;
D
) H
1/2
() H
1/2
() , M := L
2
(
S
) L
2
0
(
D
) ,
endowed with the product norms
||
X
:= |
S
|
div,
S
+ |v
D
|
div ;
D
+ ||
1/2,
+ ||
1/2,
:= (
S
, v
D
, , ) X,
and
|v|
M
:= |v
S
|
0.
S
+ |q
D
|
0,
D
v := (v
S
, q
D
) M.
In this way, as explained in [31, Sections 2 and 3]), it suces to consider from now on the
following modied variational formulation of (2.2), (2.3), and (2.4): Find (, u) XM such
that
/(, ) + B(, u) = T() := (
S
, v
D
, , ) X,
B(, v) = ((v) v := (v
S
, q
D
) M,
(2.5)
where
T() := 0, ((v) = (((v
S
, q
D
)) := (f
S
, v
S
)
S
(f
D
, q
D
)
D
, (2.6)
and / and B are the bounded bilinear forms dened by
/(, ) := a((
S
, u
D
), (
S
, v
D
)) + b((
S
, v
D
), (, ))
+ b((
S
, u
D
), (, )) c((, ), (, )) ,
(2.7)
with
a((
S
, u
D
), (
S
, v
D
)) :=
1
(
d
S
,
d
S
)
S
+ (K
1
u
D
, v
D
)
D
,
b((
S
, v
D
), (, )) := '
S
n, `
'v
D
n, `
,
c((, ), (, )) :=
1
' t, t`
+ ' n, `
' n, `
,
6
and
B(, v) := (div
S
, v
S
)
S
(div v
D
, q
D
)
D
. (2.8)
Hereafter we utilize, for each S, D, the following notations
(u, v)
:=
uv, (u, v)
:=
u v, (, )
:=
: ,
for all u, v L
2
(
), u, v L
2
(
), and , L
2
(
), where : := tr(
t
).
We nd it important to remark that and constitute the Lagrange multipliers associated
with the transmission conditions (2.3). In addition, we notice that (2.5) is equivalent to the
variational formulation dened in [31, Section 3.2, eq. (3.2)], in which
S
is decomposed into
S
= + , with H
0
(div;
S
) and R, where
H
0
(div;
S
) :=
H(div;
S
) :
S
tr() = 0
.
The following result taken from [31] establishes, in particular, the well-posedness of (2.5).
Theorem 2.1 For each pair (T, () X
|T|
X
+ |(|
M
. (2.9)
Proof. See [31, Theorem 3.9].
We end this section with the converse of the derivation of (2.5). More precisely, the following
theorem establishes that the unique solution of (2.5), with T and ( given by (2.6), solves the
original transmission problem described in Section 2.1. This result will be used later on in
Section 3.2 to prove the eciency of our a posteriori error estimator. We remark that no extra
regularity assumptions on the data, but only f
S
L
2
(
S
) and f
D
L
2
(
D
), are required here.
Theorem 2.2 Let (, u) H Q be the unique solution of the variational formulation (2.5)
with T and ( given by (2.6). Then div
S
= f
S
in
S
,
1
d
S
= u
S
in
S
, u
S
H
1
(
S
),
div u
D
= f
D
in
D
, u
D
= Kp
D
in
D
, p
D
H
1
(
D
), u
D
n + n = 0 on ,
S
n + n
( t) t = 0 on , = p
D
on , = u
S
on , and u
S
= 0 on
S
.
Proof. It basically follows by applying integration by parts backwardly in (2.5) and using suitable
test functions. We omit further details.
2.3 The Galerkin formulation
Although the analysis in [31] provides general hypotheses for the well-posedness of a Galerkin
scheme of (2.5), it suces to consider in what follows the particular case described in [31, Section
5]. Let T
S
h
and T
D
h
be respective triangulations of the domains
S
and
D
formed by shape-
regular triangles T of diameter h
T
, and assume that T
S
h
and T
D
h
match in , so that their union
is a triangulation of
S
D
. Then, for each T T
S
h
T
D
h
we let RT
0
(T) be the local
Raviart-Thomas space of order 0, that is
RT
0
(T) : = span
1
0
0
1
x
1
x
2
,
7
where x :=
x
1
x
2
is a generic vector of R
2
, and for each S, D we dene the global spaces
H
h
(
) :=
v
h
H(div ;
) : v
h
[
T
RT
0
(T) T T
, (2.10)
and
L
h
(
) :=
q
h
:
R : q
h
[
T
P
0
(T) T T
.
Hereafter, given a non-negative integer k and a subset S of R
2
, P
k
(S) stands for the space of
polynomials dened on S of degree k. Next, we let
h
be the partition of inherited from
T
S
h
(or T
D
h
), and assume, without loss of generality, that the number of edges of
h
is even. The
case of an odd number of edges is easily reduced to the even case (see [31]). Then, we let
2h
be the partition of arising by joining pairs of adjacent edges of
h
. Note that because
h
is
inherited from one of the interior triangulations, it is automatically of bounded variation (that
is, the ratio of lengths of adjacent edges is bounded) and, therefore, so is
2h
.
Employing the above notations, we now introduce
H
h
(
S
) := :
S
R
22
: c
t
H
h
(
S
) c R
2
,
L
h
(
S
) := L
h
(
S
) L
h
(
S
) ,
L
h,0
(
D
) := L
h
(
D
) L
2
0
(
D
) ,
h
() :=
h
C() :
h
[
e
P
1
(e) e edge of
2h
,
h
() :=
h
()
h
() ,
and the product spaces
X
h
:= H
h
(
S
) H
h
(
D
)
h
()
h
() and M
h
:= L
h
(
S
) L
h,0
(
D
) .
In this way, the Galerkin scheme of (2.5) becomes: Find (
h
, u
h
) X
h
M
h
such that
/(
h
, ) +B(, u
h
) = T() := (
S
, v
D
, , ) X
h
,
B(
h
, v) = ((v) v := (v
S
, q
D
) M
h
,
(2.11)
where
h
= (
S,h
, u
D,h
,
h
,
h
) and u
h
:= (u
S,h
, p
D,h
).
The following theorems, also taken from [31], provide the well-posedness of (2.11), the asso-
ciated Cea estimate, and the corresponding theoretical rate of convergence.
Theorem 2.3 Assume that T
S
h
and T
D
h
are quasiuniform in a neighborhood of . Then the
Galerkin scheme (2.11) has a unique solution (
h
, u
h
) X
h
M
h
. Moreover, there exist
C
1
, C
2
> 0, independent of h, such that
|(
h
, u
h
)|
XM
C
1
|T[
X
h
|
X
h
+ |([
M
h
|
M
,
and
|
h
|
X
+ |u u
h
|
M
C
2
inf
h
X
h
|
h
|
X
+ inf
v
h
M
h
|u v
h
|
M
.
8
Proof. See [31, Theorems 5.3 and 5.4].
Theorem 2.4 Assume the same hypotheses of Theorem 2.3, and let (, u) X M and
(
h
, u
h
) X
h
M
h
be the unique solutions of the continuous and discrete formulations (2.5)
and (2.11), respectively. Assume that there exists (0, 1] such that
S
H
(
S
), div
S
H
(
S
), u
D
H
(
D
), and div u
D
H
(
D
). Then, u
S
H
1+
(
S
), p
D
H
1+
(
D
),
H
1/2+
(), H
1/2+
(), and there exists C > 0, independent of h and the continuous
and discrete solutions, such that
|(, u) (
h
, u
h
)|
XM
C h
|
S
|
,
S
+ |div
S
|
,
S
+ |u
D
|
,
D
+ |div u
D
|
,
D
+ |u
S
|
1+,
S
+ |p
D
|
1+,
D
.
(2.12)
Proof. See [31, Theorem 5.5].
3 A residual-based a posteriori error estimator
We rst introduce some notations. For each T T
S
h
T
D
h
we let c(T) be the set of edges of
T, and we denote by c
h
the set of all edges of T
S
h
T
D
h
, that is
c
h
= c
h
(
S
) c
h
(
S
) c
h
(
D
) c
h
() ,
where c
h
(
S
) := e c
h
: e
S
, c
h
(
) := e c
h
: e
for each S, D,
and c
h
() := e c
h
: e . Note that c
h
() is the set of edges dening the partition
h
. Analogously, we let c
2h
() be the set of double edges dening the partition
2h
. In what
follows, h
e
stands for the diameter of a given edge e c
h
c
2h
(). Now, let D, S and
let q [L
2
(
)]
m
, with m 1, 2, such that q[
T
[C(T)]
m
for each T T
h
. Then, given
e c
h
(
and
T
h
having e as an edge. Also, we x a unit normal vector n
e
:= (n
1
, n
2
)
t
to the edge e, which points either inward T
or inward T
, and let t
e
:= (n
2
, n
1
)
t
be the
corresponding xed unit tangential vector along e. Hence, given v L
2
(
) and L
2
(
)
such that v[
T
[C(T)]
2
and [
T
[C(T)]
22
, respectively, for each T T
h
, we let [v t
e
] and
[ t
e
] be the tangential jumps of v and , across e, that is [v t
e
] := (v[
T
)[
e
(v[
T
)[
e
t
e
and [ t
e
] := ([
T
)[
e
([
T
)[
e
t
e
, respectively. From now on, when no confusion arises, we
simply write t and n instead of t
e
and n
e
, respectively. Finally, for suently smooth scalar,
vector and tensors elds q, v := (v
1
, v
2
)
t
and := (
ij
)
22
, respectively, we let
curl v :=
v
1
x
2
v
1
x
1
v
2
x
2
v
2
x
1
, curl q :=
q
x
2
,
q
x
1
t
,
rot v :=
v
2
x
1
v
1
x
2
, and rot :=
12
x
1
11
x
2
,
22
x
1
21
x
2
t
.
Next, let (, u) XM and (
h
, u
h
) := ((
S,h
, u
D,h
,
h
,
h
), (u
S,h
, p
D,h
)) X
h
M
h
be the
unique solutions of (2.5) and (2.11), respectively. Then, we introduce the global a posteriori
9
error estimator:
:=
TT
S
h
2
S,T
+
TT
D
h
2
D,T
1/2
, (3.1)
where, for each T T
S
h
:
2
S,T
:= |f
S
+div
S,h
|
2
0,T
+ h
2
T
|rot
d
S,h
|
2
0,T
+ h
2
T
|
d
S,h
|
2
0,T
+
eE(T)E
h
(
S
)
h
e
|[
d
S,h
t]|
2
0,e
+
eE(T)E
h
(
S
)
h
e
|
d
S,h
t|
2
0,e
+
eE(T)E
h
()
h
e
|u
S,h
+
h
|
2
0,e
+
eE(T)E
h
()
h
e
S,h
n +
h
n
(
h
t) t
2
0,e
+ h
e
d
S,h
t +
h
t
2
0,e
,
and for each T T
D
h
:
2
D,T
:= |f
D
div u
D,h
|
2
0,T
+ h
2
T
|rot (K
1
u
D,h
)|
2
0,T
+ h
2
T
|K
1
u
D,h
|
2
0,T
+
eE(T)E
h
(
D
)
h
e
[K
1
u
D,h
t]
2
0,e
+
eE(T)E
h
()
h
e
K
1
u
D,h
t +
d
h
dt
2
0,e
+
eE(T)E
h
()
h
e
|u
D,h
n +
h
n|
2
0,e
+ h
e
|p
D,h
h
|
2
0,e
.
3.1 Reliability of the a posteriori error estimator
The main result of this section is stated as follows.
Theorem 3.1 There exists C
rel
> 0, independent of h, such that
|
h
|
X
+ |u u
h
|
M
C
rel
. (3.2)
We begin the derivation of (3.2) by recalling that the continous dependence result given by
(2.9) is equivalent to the global inf-sup condition for the continuous formulation (2.5). Then,
applying this estimate to the error (
h
, u u
h
) X M, we obtain
|(
h
, u u
h
)|
XM
C sup
( ,v)XM
(,v)=0
[R(, v)[
|(, v)|
XM
, (3.3)
where R : X MR is the residual operator dened by
R(, v) := /(
h
, ) + B(, u u
h
) + B(
h
, v), (, v) X M.
More precisely, according to (2.5) and the denitions of / and B (cf. (2.7), (2.8)), we nd that
for any (, v) := ((
S
, v
D
, , ), (v
S
, q
D
)) X M there holds
R(, v) = R
1
(
S
) + R
2
(v
D
) + R
3
() + R
4
() + R
5
(v
S
) + R
6
(q
D
) ,
10
where
R
1
(
S
) :=
1
d
S,h
:
d
S
S
u
S,h
div
S
'
S
n,
h
`
,
R
2
(v
D
) :=
D
K
1
u
D,h
v
D
+
D
p
D,h
div v
D
+ 'v
D
n,
h
`
,
R
3
() := '
S,h
n, `
' n,
h
`
' t,
h
t`
,
R
4
() := 'u
D,h
n, `
+ '
h
n, `
,
R
5
(v
S
) :=
S
v
S
(f
S
+div
S,h
) ,
and
R
6
(q
D
) :=
D
q
D
(f
D
div u
D,h
) .
Hence, the supremum in (3.3) can be bounded in terms of R
i
, i 1, ..., 6, which yields
|(
h
, u u
h
)|
XM
C
sup
S
H(div;
S
)
S
=0
[R
1
(
S
)[
|
S
|
div;
S
+ sup
v
D
H(div;
D
)
v
D
=0
[R
2
(v
D
)[
|v
D
|
div ;
D
+ sup
H
1/2
()
=0
[R
3
()[
||
1/2,
+ sup
H
1/2
()
=0
[R
4
()[
||
1/2,
+ sup
v
S
L
2
(
S
)
v
S
=0
[R
5
(v
S
)[
|v
S
|
0,
S
+ sup
q
D
L
2
0
(
D
)
q
D
=0
[R
6
(q
D
)[
|q
D
|
0,
D
.
(3.4)
Throughout the rest of this section we provide suitable upper bounds for each one of the terms
on the right hand side of (3.4). The following lemma, whose proof follows from straightforward
applications of the Cauchy-Schwarz inequality, is stated rst.
Lemma 3.1 There hold
sup
v
S
L
2
(
S
)
v
S
=0
[R
5
(v
S
)[
|v
S
|
0,
S
|f
S
+div
S,h
|
0,
S
=
TT
S
h
|f
S
+div
S,h
|
2
0,T
1/2
, (3.5)
and
sup
q
D
L
2
0
(
D
)
q
D
=0
[R
6
(q
D
)[
|q
D
|
0,
D
|f
D
div u
D,h
|
0,
D
=
TT
D
h
|f
D
div u
D,h
|
2
0,T
1/2
. (3.6)
The next lemma estimates the suprema on the spaces dened in the interface .
11
Lemma 3.2 There exist C
3
, C
4
> 0, independent of h, such that
sup
H
1/2
()
=0
[R
3
()[
||
1/2,
C
3
eE
h
()
h
e
S,h
n +
h
n
(
h
t) t
2
0,e
1/2
, (3.7)
and
sup
H
1/2
()
=0
[R
4
()[
||
1/2,
C
4
eE
h
()
h
e
|u
D,h
n +
h
n|
2
0,e
1/2
. (3.8)
Proof. It is clear from the denition of R
3
that
R
3
() = '
S,h
n +
h
n
(
h
t) t, `
H
1/2
() ,
and hence
sup
H
1/2
()
=0
[R
3
()[
||
1/2,
=
S,h
n +
h
n
(
h
t) t
1/2,
. (3.9)
In order to estimate
S,h
n +
h
n
(
h
t) t
1/2,
in terms of local quantities we now apply
a technical result from [16]. In fact, taking
S
= 0, v
D
= 0 and = 0 in the rst equation of
(2.11), we have
'
S,h
n +
h
n
(
h
t) t, `
= 0
h
() ,
which says that
S,h
n +
h
n
(
h
t) t is L
2
()-orthogonal to
h
(). Hence, applying [16,
Theorem 2], and recalling that
h
and
2h
are of bounded variation, we deduce that
S,h
n +
h
n
(
h
t) t
2
1/2,
C
eE
2h
()
h
e
S,h
n +
h
n
(
h
t) t
2
0,e
C
eE
h
()
h
e
S,h
n +
h
n
(
h
t) t
2
0,e
,
which, together with (3.9), yields (3.7).
The proof of (3.8) proceeds analogously. In fact, it is easy to see that
sup
H
1/2
()
=0
[R
4
()[
||
1/2,
= |u
D,h
n +
h
n|
1/2,
,
and hence, noting also from the rst equation of (2.11) that u
D,h
n+
h
n is L
2
()-orthogonal
to
h
(), another straightforward application of [16, Theorem 2] yields the required estimate.
We omit further details here.
Our next goal is to bound the rst two suprema on the right hand side of (3.4), for which
we need several preliminary results. We begin with the following lemma showing the existence
of stable Helmholtz decompositions for H(div;
D
) and H(div;
S
).
12
Lemma 3.3
a) For each v
D
H(div;
D
) there exist w H
1
(
D
) and H
1
(
D
), with
S
= 0,
such that there hold v
D
= w + curl in
D
, and
|w|
1,
D
+ ||
1,
D
C
D
|v
D
|
div ;
D
,
where C
D
is a positive constant independent of v
D
.
b) For each
S
H(div;
S
) there exist H
1
(
S
) and H
1
(
S
) such that there hold
S
= + curl in
S
, and
||
1,
S
+ ||
1,
S
C
S
|
S
|
div;
S
,
where C
S
is a positive constant independent of
S
.
Proof. Given v
D
H(div;
D
), we let G be a smooth convex domain containing
D
, and let
z H
1
0
(G) H
2
(G) be the unique solution of
z =
div v
D
in
D
0 in G `
in G, z = 0 on G.
It follows that
|z|
2,G
C |div v
D
|
0,
D
C |v
D
|
div ;
D
,
and hence, dening w := z in
D
, we nd that
div w = div v
D
in
D
and |w|
1,
D
|z|
2,
D
|z|
2,G
C |v
D
|
div ;
D
.
In addition, since div (v
D
w) = 0 and
D
is connected, there exists H
1
(
D
), with
D
= 0, such that v
D
w = curl in
D
. In this way, using the generalized Poincare
inequality and the above estimate for w, we deduce that
||
1,
D
C [[
1,
D
= C |curl |
0,
D
= C |v
D
w|
0,
D
C|v
D
|
div ;
D
,
which completes the proof of a).
We now let
S
H(div;
S
). Since
S
is not necessarily connected, we rst perform a
suitable extension of
S
to the domain :=
S
D
, and then apply a) to each row of
the resulting tensor. More precisely, let
S,i
H(div ;
S
) be the i-th row of
S
, i 1, 2,
and let
i
H
1
(
D
) be the unique solution of the Neumann problem:
i
=
'
S,i
n, 1`
[
D
[
in
D
,
i
n
=
S,i
n on ,
i
= 0 .
Then we dene
ext
i
=
S,i
in
S
i
in
D
, and notice that
ext
i
H(div ; ) and
|
ext
i
|
div ;
|
S,i
|
div ;
S
+ |
i
|
div ;
D
|
S,i
|
div ;
S
+ C |
S,i
n|
1/2,
C |
S,i
|
div ;
S
.
13
Proceeding as in the proof of a), but now for
ext
i
H(div ; ), we deduce the existence of
w
i
H
1
() and
i
H
1
(), with
i
= 0, such that
ext
i
= w
i
+ curl
i
in , and
|w
i
|
1,
+ |
i
|
1,
C |
ext
i
|
div ;
C |
S,i
|
div ;
S
.
Hence, the proof of b) follows by dening i-th row of := w
i
[
S
and := (
1
[
S
,
2
[
S
).
The Raviart-Thomas interpolation operator
h
: H
1
(
) H
h
(
) (cf. (2.10)), S, D,
which, given v H
1
(
), is characterized by
h
(v) H
h
(
) and
h
(v) n =
e
v n edge e of T
h
, (3.10)
will also be needed in what follows. Note that as a consequence of (3.10), there holds
div (
h
(v)) = {
h
(div v) , (3.11)
where {
h
, S, D, is the L
2
(
. A tensor version of
h
, say
h
: H
1
(
) H
h
(
h
,
and a vector version of {
h
, say P
h
, which is the L
2
(
h
(and
hence of
h
) are stated as follows.
Lemma 3.4 For each S, D there exist constants c
1
, c
2
> 0, independent of h, such that
for all v H
1
(
) there hold
|v
h
(v)|
0,T
c
1
h
T
|v|
1,T
T T
h
,
and
|v n
h
(v) n|
0,e
c
2
h
1/2
e
|v|
1,Te
edge e of T
h
,
where T
e
is a triangle of T
h
containing e on its boundary.
Proof. See [12].
We will also utilize the Clement interpolation operators I
h
: H
1
(
) X
,h
(cf. [19]),
where
X
,h
:= v C(
) : v[
T
P
1
(T) T T
h
for each S, D .
In addition, we will make use of a vector version of I
h
, say I
h
: H
1
(
) X
,h
:= X
,h
X
,h
,
which is dened componentwise by I
h
. The following lemma establishes the local approximation
properties of I
h
(and hence of I
h
).
Lemma 3.5 For each S, D there exist constants c
3
, c
4
> 0, independent of h, such that
for all v H
1
(
) there hold
|v I
h
(v)|
0,T
c
3
h
T
|v|
1,(T)
T T
h
,
and
|v I
h
(v)|
0,e
c
4
h
1/2
e
|v|
1,(e)
e c
h
,
where
(T) := T
h
: T
T = 0 and
(e) := T
h
: T
e = 0 .
14
Proof. See [19].
Finally, we require the technical results given by the following two lemmas.
Lemma 3.6 Let H
1
(
S
) and H
1
(
S
). Then there hold
[R
1
(
S
h
())[ c
1
1
TT
S
h
h
T
|
d
S,h
|
0,T
||
1,T
+ c
2
eE
h
()
h
1/2
e
|u
S,h
+
h
|
0,e
||
1,Te
,
and
[R
1
(curl ( I
S
h
()))[
c
3
1
TT
S
h
h
T
|rot (
d
S,h
)|
0,T
||
1,
S
(T)
+ c
4
1
eE
h
(
S
)
h
1/2
e
|[
d
S,h
t]|
0,e
||
1,
S
(e)
+c
4
1
eE
h
(
S
)
h
1/2
e
|
d
S,h
t|
0,e
||
1,
S
(e)
+ c
4
eE
h
()
h
1/2
e
d
S,h
t +
h
t
0,e
||
1,
S
(e)
.
Proof. We rst let :=
S
h
() and observe, according to (3.10) and (3.11), that
e
p n = 0 p [P
0
(e)]
2
, edge e of T
S
h
, and div = div P
S
h
(div ) .
Then, since
d
S,h
:
d
=
d
S,h
: and u
S,h
is a constant vector on each T T
S
h
, we deduce from
the denition of R
1
and the above identities that
R
1
() =
1
TT
S
h
d
S,h
:
d
TT
S
h
T
u
S,h
div
eE
h
()
h
n
=
1
TT
S
h
d
S,h
:
eE
h
()
h
n
=
1
TT
S
h
d
S,h
:
eE
h
()
e
(u
S,h
+
h
) n.
On the other hand, we now let := I
S
h
(). Then, using that div(curl ()) = 0, noting
that curl () n = t on , integrating by parts on each T T
S
h
and on , and observing
that
h
t L
2
(), we obtain
R
1
(curl ()) =
1
d
S,h
: curl () 'curl () n,
h
`
=
1
TT
S
h
T
rot (
d
S,h
) +
T
d
S,h
t
eE
h
()
e
(
h
t)
=
TT
S
h
T
rot (
d
S,h
) +
eE
h
(
S
)
e
[
d
S,h
t]
+
eE
h
(
S
)
e
d
S,h
t +
eE
h
()
d
S,h
+
h
t .
15
Hence, straighforward applications of the Cauchy-Schwarz inequality to the above equations,
together with the approximation properties provided by Lemmas 3.4 and 3.5, namely
|
S
h
()|
0,T
c
1
h
T
||
1,T
, | n
S
h
() n|
0,e
c
2
h
1/2
e
||
1,T
| I
S
h
()|
0,T
c
3
h
T
||
1,
S
(T)
, and | I
S
h
()|
0,e
c
4
h
1/2
e
||
1,
S
(e)
,
for each T T
S
h
and for each e c(T), imply the required estimates and nish the proof.
Lemma 3.7 Let w H
1
(
D
) and H
1
(
D
). Then there hold
[R
2
(w
D
h
(w))[ c
1
TT
D
h
h
T
|K
1
u
D,h
|
0,T
|w|
1,T
+ c
2
eE
h
()
h
1/2
e
|p
D,h
h
|
0,e
|w|
1,Te
,
and
[R
2
(curl ( I
D
h
()))[ c
3
TT
D
h
h
T
|rot (K
1
u
D,h
)|
0,T
||
1,
D
(T)
+ c
4
eE
h
(
D
)
h
1/2
e
|[K
1
u
D,h
t]|
0,e
||
1,
D
(e)
+ c
4
eE
h
()
h
1/2
e
K
1
u
D,h
t +
d
h
dt
0,e
||
1,
D
(e)
.
Proof. Since R
1
and R
2
have analogue structures, the proof proceeds similarly as for Lemma
3.6.
We are now in a position to bound the suprema depending on R
1
and R
2
.
Lemma 3.8 There exists C
1
> 0, independent of h, such that
sup
S
H(div;
S
)
S
=0
[R
1
(
S
)[
|
S
|
div;
S
C
1
TT
S
h
2
S,T
1/2
, (3.12)
where, for each T T
S
h
:
2
S,T
:= h
2
T
|rot
d
S,h
|
2
0,T
+ h
2
T
|
d
S,h
|
2
0,T
+
eE(T)E
h
(
S
)
h
e
|[
d
S,h
t]|
2
0,e
+
eE(T)E
h
(
S
)
h
e
|
d
S,h
t|
2
0,e
+
eE(T)E
h
()
h
e
d
S,h
t +
h
t
2
0,e
+ h
e
|u
S,h
+
h
|
2
0,e
Proof. Given
S
H(div;
S
) we know from Lemma 3.3 that there exist H
1
(
S
) and
H
1
(
S
) such that
S
= + curl in
S
and
||
1,
S
+ ||
1,
S
C |
S
|
div;
S
. (3.13)
16
Then, since R
1
(
S,h
) = 0
S,h
H
h
(
S
), which follows from the rst equation of the
Galerkin scheme (2.11) taking (v
D
, , ) = (0, 0, 0), and thanks to the fact that R
1
is linear,
we obtain
R
1
(
S
) = R
1
(
S
S,h
)
S,h
H
h
(
S
) . (3.14)
In particular, we let
S,h
:=
S
h
() + curl (I
S
h
()), which can be seen as a discrete Helmholtz
decomposition of
S,h
, and obtain
R
1
(
S
) = R
1
(
S
h
()) + R
1
(curl ( I
S
h
()) . (3.15)
Hence, applying Lemma 3.6 and then the discrete Cauchy-Schwarz inequality to the resulting
terms, noting that the numbers of triangles in
S
(T) and
S
(e) are bounded, and nally using
the estimate (3.13), we conclude the upper bound (3.12).
Lemma 3.9 There exists C
2
> 0, independent of h, such that
sup
v
D
H(div;
D
)
v
D
=0
[R
2
(v
D
)[
|v
D
|
div ;
D
C
2
TT
D
h
2
D,T
1/2
, (3.16)
where, for each T T
D
h
:
2
D,T
:= h
2
T
|rot (K
1
u
D,h
)|
2
0,T
+ h
2
T
|K
1
u
D,h
|
2
0,T
+
eE(T)E
h
(
D
)
h
e
[K
1
u
D,h
t]
2
0,e
+
eE(T)E
h
()
h
e
K
1
u
D,h
t +
d
h
dt
2
0,e
+ h
e
|p
D,h
h
|
2
0,e
.
Proof. It follows basically the same lines of the proof of Lemma 3.8. In fact, given v
D
H(div;
D
) we rst apply Lemma 3.3 to deduce the existence of w H
1
(
D
) and H
1
(
D
)
such that v
D
= w+ curl and
|w|
1,
D
+ ||
1,
D
C |v
D
|
div ;
D
. (3.17)
Then, since R
2
(v
D,h
) = 0 v
D,h
H
h
(
D
), which corresponds to the rst equation of the
Galerkin scheme (2.11) with (
S
, , ) = (0, 0, 0), and thanks to the fact that R
2
is linear, we
obtain
R
2
(v
D
) = R
2
(v
D
v
D,h
) v
D,h
H
h
(
D
) . (3.18)
Next, we choose v
D,h
=
D
h
(w) + curl
I
D
h
()
, notice that
R
2
(v
D
) = R
2
(w
D
h
(w)) + R
2
curl ( I
D
h
())
,
and apply Lemma 3.7. Thus, using again the discrete Cauchy-Schwarz inequality, noting that
the numbers of triangles in
D
(T) and
D
(e) are bounded, and employing now the upper bound
(3.17), we conclude (3.16).
We end this section by observing that the reliability estimate (3.2) (cf. Theorem 3.1) is a
direct consequence of Lemmas 3.1, 3.2, 3.8, and 3.9.
17
3.2 Eciency of the a posteriori error estimator
The main result of this section is stated as follows.
Theorem 3.2 There exists C
eff
> 0, independent of h, such that
C
eff
|
h
|
X
+ |u u
h
|
M
+ h.o.t. , (3.19)
where h.o.t. stands, eventually, for one or several terms of higher order.
We remark in advance that the proof of (3.19) makes frequent use of the identities provided
by Theorem 2.2. We begin with the estimates for the zero order terms appearing in the denition
of
2
S,T
and
2
D,T
.
Lemma 3.10 There hold
|f
S
+ div
S,h
|
0,T
|
S
S,h
|
div;T
T T
S,h
and
|f
D
div u
D,h
|
0,T
|u
D
u
D,h
|
div ;T
T T
D,h
.
Proof. It suces to recall, as established by Theorem 2.2, that f
S
= div
S
in
S
and
f
D
= div u
D
in
D
.
In order to derive the upper bounds for the remaining terms dening the global a posteriori
error estimator (cf. (3.1)), we proceed similarly as in [8], using results from [15], [17] and [25],
and apply Helmholtz decomposition, inverse inequalities, and the localization technique based
on triangle-bubble and edge-bubble functions. To this end, we now introduce further notations
and preliminary results. Given T T
S
h
, T
D
h
, T T , and e c(T), we let
T
and
e
be
the usual triangle-bubble and edge-bubble functions, respectively (see (1.5) and (1.6) in [46]).
In particular,
T
satises
T
P
3
(T), supp(
T
) T,
T
= 0 on T, and 0
T
1 in
T. Similarly,
e
[
T
P
2
(T), supp(
e
) w
e
:= T
T : e c(T
),
e
= 0 on T`e,
and 0
e
1 in w
e
. We also recall from [45] that, given k N 0, there exists an
extension operator L : C(e) C(T) that satises L(p) P
k
(T) and L(p)[
e
= p p P
k
(e).
A corresponding vector version of L, that is the componentwise application of L, is denoted by
L. Additional properties of
T
,
e
, and L are collected in the following lemma.
Lemma 3.11 Given k N 0, there exist positive constants c
1
, c
2
and c
3
, depending only
on k and the shape regularity of the triangulations (minimum angle condition), such that for
each triangle T and e c(T), there hold
|q|
2
0,T
c
1
|
1/2
T
q|
2
0,T
q P
k
(T), (3.20)
|q|
2
0,e
c
2
|
1/2
e
q|
2
0,e
q P
k
(e), (3.21)
and
|
1/2
e
L(q)|
2
0,T
c
3
h
e
|q|
2
0,e
q P
k
(e) . (3.22)
Proof. See Lemma 1.3 in [45].
The following inverse estimate for polynomials will also be used.
18
Lemma 3.12 Let k, l, m N 0 such that l m. Then, there exists c > 0, depending only
on k, l, m and the shape regularity of the triangulations, such that for each triangle T there
holds
[q[
m,T
c h
lm
T
[q[
l,T
, q P
k
(T) . (3.23)
Proof. See Theorem 3.2.6 in [18].
In addition, we need to recall a discrete trace inequality, which establishes the existence of a
positive constant c, depending only on the shape regularity of the triangulations, such that for
each T T
S
h
T
D
h
and e c(T), there holds
|v|
2
0,e
c
h
1
e
|v|
2
0,T
+ h
e
[v[
2
1,T
v H
1
(T) . (3.24)
For a proof of inequality (3.24) we refer to Theorem 3.10 in [1] (see also eq. (2.4) in [6]).
The following lemma summarizes known eciency estimates for ten terms dening
2
S,T
and
2
D,T
. In fact, their proofs, which apply the preliminary results described above, are already
available in the literature (see, e.g. [8], [9], [15], [25], [26], [28]). From now on we assume,
without loss of generality, that K
1
u
D,h
is polynomial on each T T
D
h
. Otherwise, additional
higher order terms, given by the errors arising from suitable polynomial approximations, should
appear in the corresponding bounds below, which explains the expression h.o.t. in (3.19).
Lemma 3.13 There exist positive constants C
i
, i 1, ..., 10, independent of h, such that
a) h
2
T
|rot (K
1
u
D,h
)|
2
0,T
C
1
|u
D
u
D,h
|
2
0,T
T T
D
h
,
b) h
2
T
|rot
d
S,h
|
2
0,T
C
2
|
S
S,h
|
2
0,T
T T
S
h
,
c) h
e
[[K
1
u
D,h
t]|
2
0,e
C
3
|u
D
u
D,h
|
2
0,we
e c
h
(
D
), where the set w
e
is given by
w
e
:=
T
D
h
: e c(T
,
d) h
e
|[
d
S,h
t]|
2
0,e
C
4
|
S
S,h
|
2
0,we
e c
h
(
S
), where the set w
e
is given by
w
e
:=
T
S
h
: e c(T
,
e) h
e
|
d
S,h
t|
2
0,e
C
5
|
S
S,h
|
2
0,T
e c
h
(
S
), where T is the triangle of T
S
h
having
e as an edge,
f) h
2
T
|K
1
u
D,h
|
2
0,T
C
6
|p
D
p
D,h
|
2
0,T
+ h
2
T
|u
D
u
D,h
|
2
0,T
T T
D
h
,
g) h
2
T
|
d
S,h
|
2
0,T
C
7
|u
S
u
S,h
|
2
0,T
+ h
2
T
|
S
S,h
|
2
0,T
T T
S
h
,
h) h
e
|p
D,h
h
|
2
0,e
C
8
|p
D
p
D,h
|
2
0,T
+ h
2
T
|u
D
u
D,h
|
2
0,T
+ h
e
|
h
|
2
0,e
e c
h
(),
where T is the triangle of T
D
h
having e as an edge,
i)
eE
h
()
h
e
K
1
u
D,h
t +
d
h
dt
2
0,e
C
9
eE
h
()
|u
D
u
D,h
|
2
0,Te
+ |
h
|
2
1/2,
,
where, given e c
h
(), T
e
is the triangle of T
D
h
having e as an edge, and
19
j)
eE
h
(
S
)
h
e
d
S,h
t +
h
t
2
0,e
C
10
eE
h
(
S
)
|
S
S,h
|
2
0,Te
+ |
h
|
2
1/2,
,
where, given e c
h
(
S
), T
e
is the triangle of T
S
h
having e as an edge.
Proof. For a) and b) we refer to [15, Lemma 6.1]. Alternatively, a) and b) follow from straight-
forward applications of the technical result provided in [9, Lemma 4.3] (see also [28, Lemma
4.9]). Similarly, for c), d), and e) we refer to [15, Lemma 6.2] or apply the technical result given
by [9, Lemma 4.4] (see also [28, Lemma 4.10]). Then, for f) and g) we refer to [15, Lemma
6.3] (see also [28, Lemma 4.13] or [25, Lemma 5.5]). On the other hand, the estimate given
by h) corresponds to [8, Lemma 4.12]. In particular, its proof makes use of the discrete trace
inequality (3.24). Finally, the proofs of i) and j) follow from very slight modications of the
proof of [25, Lemma 5.7]. Alternatively, an elasticity version of i) and j), which is provided in
[26, Lemma 20], can also be adapted to our case.
We nd it important to remark that the estimates i) and j) in the previous lemma provide the
only non-local bounds of the present eciency analysis. However, under additional regularity
assumptions on and , one is able to prove the following local bounds.
Lemma 3.14 Assume that [
e
H
1
(e) for each e c
h
(), and that [
e
H
1
(e) for each
e c
h
(
S
). Then there exist
C
9
,
C
10
> 0, such that
h
e
K
1
u
D,h
t +
d
h
dt
2
0,e
C
9
|u
D
u
D,h
|
2
0,Te
+ h
e
d
dt
2
0,e
e c
h
() ,
and
h
e
d
S,h
t +
h
t
2
0,e
C
10
|
S
S,h
|
2
0,Te
+ h
e
d
dt
2
0,e
e c
h
(
S
) .
Proof. Similarly as for i) and j) from Lemma 3.13, it follows by adapting the corresponding
elasticity version from [26]. We omit details here and refer to [26, Lemma 21].
It remains to provide the eciency estimates for three residual terms dened on the edges of
the interface . They have to do with the transmision conditions and with the trace equation
u
S
+ = 0 on . More precisely, we have the following lemmas.
Lemma 3.15 There exists C > 0, independent of h, such that for each e c
h
(), there holds
h
e
|u
D,h
n +
h
n|
2
0,e
C
|u
D
u
D,h
|
2
0,T
+ h
2
T
|div (u
D
u
D,h
)|
2
0,T
+ h
e
|
h
|
2
0,e
,
where T is the triangle of T
D
h
having e as an edge.
Proof. We proceed similarly as in [8, Lemma 4.7]. Given e c
h
(), we let T be the triangle of
T
D
h
having e as an edge, and dene v
e
:= u
D,h
n +
h
n on e. Then, applying (3.21), recalling
that
e
= 0 on T`e, extending
e
L(v
e
) by zero in
D
`T so that the resulting function belongs
to H
1
(
D
), and using that u
D
n + n = 0 on , we get
|v
e
|
2
0,e
c
2
|
1/2
e
v
e
|
2
0,e
= c
2
e
v
e
(u
D,h
n +
h
n) = c
2
'u
D,h
n +
h
n,
e
L(v
e
)`
= c
2
'u
D,h
n u
D
n,
e
L(v
e
)`
+ c
2
'
h
n n,
e
L(v
e
)`
,
(3.25)
20
where ', `
h
n n
L
2
(), we nd, respectively, that
'u
D,h
n u
D
n,
e
L(v
e
)`
e
L(v
e
)
(u
D,h
u
D
) +
e
L(v
e
) div (u
D,h
u
D
) ,
and
'
h
n n,
e
L(v
e
)`
h
n n
e
v
e
.
Thus, replacing the above expressions back into (3.25), applying the Cauchy-Schwarz inequality
and the inverse estimate (3.23), and recalling that 0
e
1, we obtain
|v
e
|
2
0,e
C
h
1
T
|u
D
u
D,h
|
0,T
+ |div (u
D
u
D,h
)|
0,T
|
e
L(v
e
)|
0,T
+ c |v
e
|
0,e
|
h
|
0,e
.
But, using again that 0
e
1 and thanks to (3.22), we get
|
e
L(v
e
)|
0,T
|
1/2
e
L(v
e
)|
0,T
c
1/2
3
h
1/2
e
|v
e
|
0,e
, (3.26)
whence the previous inequality yields
|v
e
|
0,e
C h
1/2
e
h
1
T
|u
D
u
D,h
|
0,T
+ |div (u
D
u
D,h
)|
0,T
+ c |
h
|
0,e
.
Finally, it is easy to see that this estimate and the fact that h
e
h
T
imply the required upper
bound for h
e
|v
e
|
2
0,e
, which nishes the proof.
Lemma 3.16 There exists C > 0, independent of h, such that for each e c
h
(), there holds
h
e
|
S,h
n +
h
n
(
h
t) t|
2
0,e
C
|
S
S,h
|
2
0,T
+ h
2
T
|div(
S
S,h
)|
2
0,T
+ h
e
|
h
|
2
0,e
+ h
e
|
h
|
2
0,e
,
where T is the triangle of T
S
h
having e as an edge.
Proof. We proceed as in the previous lemma (see also [8, Lemma 4.6]). Indeed, given e c
h
(),
we let T be the triangle of T
S
h
having e as an edge, and dene v
e
:=
S,h
n +
h
n
(
h
t) t
on e. Then, applying (3.21), recalling that
e
= 0 on T`e, extending
e
L(v
e
) by zero in
S
`T so that the resulting function belongs to H
1
(
S
), using that
S
n + n
( t) t = 0
on , and then integrating by parts in
S
, we arrive at
|v
e
|
2
0,e
c
2
|
1/2
e
v
e
|
2
0,e
= c
2
e
v
e
S,h
n +
h
n
(
h
t) t
= c
2
T
(
e
L(v
e
)) : (
S,h
S
) + c
2
e
L(v
e
)) div(
S,h
S
)
+ c
2
e
v
e
(
h
) n
(
h
t t) t
.
Next, applying the Cauchy-Schwarz inequality and the inverse estimate (3.23), recalling that
0
e
1, and employing the vector version of (3.26), we deduce that
|v
e
|
0,e
C h
1/2
e
h
1
T
|
S
S,h
|
0.T
+ |div(
S
S,h
)|
0,T
+ C
|
h
|
0,e
+ |
h
|
0,e
,
which easily yields the required estimate, thus nishing the proof.
21
Lemma 3.17 There exists C > 0, independent of h, such that for each e c
h
(), there holds
h
e
|u
S,h
+
h
|
2
0,e
C
|u
S
u
S,h
|
2
0,T
+ h
2
T
|
S
S,h
|
2
0,T
+ h
e
|
h
|
2
0,e
,
where T is the triangle of T
S
h
having e as an edge.
Proof. Let e c
h
() and let T be the triangle of T
S
h
having e as an edge. We follow the proof
of [8, Lemma 4.12] and obtain rst an upper bound of h
2
T
[u
S
u
S,h
[
2
1,T
. Indeed, using that
u
S
=
1
d
S
in
S
(cf. Theorem 2.2) and that u
S,h
is constant in T, adding and substracting
d
S,h
, and then applying the estimate g) from Lemma 3.13, we deduce that
h
2
T
[u
S
u
S,h
[
2
1,T
=
h
2
T
2
|
d
S
|
2
0,T
C h
2
T
|
S
S,h
|
2
0,T
+ |
d
S,h
|
2
0,T
|u
S
u
S,h
|
2
0,T
+ h
2
T
|
S
S,h
|
2
0,T
.
(3.27)
Next, since = u
S
on (cf. Theorem 2.2), we nd that
h
e
|u
S,h
+
h
|
2
0,e
2 h
e
|u
S
u
S,h
|
2
0,e
+ |
h
|
2
0,e
,
which, employing the discrete trace inequality (3.24) and the estimate (3.27), yields
h
e
|u
S,h
+
h
|
2
0,e
C
|u
S
u
S,h
|
2
0,T
+ h
2
T
[u
S
u
S,h
[
2
1,T
+ h
e
|
h
|
2
0,e
|u
S
u
S,h
|
2
0,T
+ h
2
T
|
S
S,h
|
2
0,T
+ h
e
|
h
|
2
0,e
,
which completes the proof.
We end this section by observing that the eciency estimate (3.19) follows straightforwardly
from Lemmas 3.10, 3.13, 3.15, 3.16, and 3.17. In particular, the terms h
e
|
h
|
2
0,e
and
h
e
|
h
|
2
0,e
, which appear in Lemma 3.13 (item h)), 3.15, 3.16, and 3.17, are bounded as
follows:
eE
h
()
h
e
|
h
|
2
0,e
h|
h
|
2
0,
C h|
h
|
2
1/2,
,
and
eE
h
()
h
e
|
h
|
2
0,e
h|
h
|
2
0,
C h|
h
|
2
1/2,
.
4 Numerical results
In [31, Section 5] we presented several numerical results illustrating the performance of the
Galerkin scheme (2.11) with the subspaces X
h
:= H
h
(
S
) H
h
(
D
)
h
()
h
() and
M
h
:= L
h
(
S
) L
h,0
(
D
) dened in Section 2.3. We now provide three examples conrming
the reliability and eciency of the respective a posteriori error estimator derived in Section
3, and showing the behaviour of the associated adaptive algorithm.
22
In what follows, N stands for the number of degrees of freedom dening X
h
and M
h
, and
the individual and total errors are dened by:
e(
S
) := |
S
S,h
|
div,
S
, e(u
S
) := |u
S
u
S,h
|
div ;
S
,
e(u
D
) := |u
D
u
D,h
|
div ;
D
, e(p
D
) := |p
D
p
D,h
|
0,
D
,
e() := |
h
|
1/2,
, e() := |
h
|
1/2,
,
and
e(, u) :=
(e(
S
))
2
+ (e(u
S
))
2
+ (e(u
D
))
2
+ (e(p
D
))
2
+ (e())
2
+ (e())
2
1/2
,
whereas the eectivity index with respect to is given by
eff() := e(, u)/,
where
(, u) := ((
S
, u
D
, , ), (u
S
, p
D
)) X M
and
(
h
, u
h
) := ((
S,h
, u
D,h
,
h
,
h
), (u
S,h
, p
D,h
)) X
h
M
h
denote the unique solutions of (2.5) and (2.11), respectively.
Also, we let r(
S
), r(u
S
), r(u
D
), r(p
D
), r(), r(), and r(, u) be the individual and global
experimental rates of convergence given by
r(%) :=
log(e(%)/e
(%))
log(h/h
)
for each %
S
, u
S
, u
D
, p
D
, ,
,
and
r(, u) :=
log(e(, u)/e
(, u))
log(h/h
)
,
where h and h
) appearing in the
computation of the above rates is replaced by
1
2
log(N/N
), where N and N
denote the
corresponding degrees of freedom of each triangulation.
The examples to be considered in this section are described next. In all of them we choose
for simplicity = 1, K = I, the identity matrix of R
22
, and = 1. Example 1 is employed
to conrm the reliability and eciency of the a posteriori error estimator . Then, Examples 2
and 3 are utilized to illustrate the behaviour of the associated adaptive algorithm, which applies
the following procedure from [46]:
1) Start with a coarse mesh T
h
:= T
D
h
T
S
h
.
2) Solve the discrete problem (2.11) for the actual mesh T
h
.
3) Compute
,T
for each triangle T T
h
, D, S.
4) Evaluate stopping criterion and decide to nish or go to next step.
23
5) Use blue-green procedure to rene each T
h
, D, S, whose indicator
,T
satises
T
1
2
max
i{D,S}
max
i,T
: T T
i
h
.
6) Dene resulting meshes as actual meshes T
D
h
and T
S
h
, and go to step 2.
In Example 1 we consider the regions
D
:=] 0.5, 0.5[
2
and
S
:=] 1, 1[
2
`
D
, which
yields a porous medium completely surrounded by a uid, and choose the data f
S
and f
D
so
that the exact solution is given by the regular functions
u
S
(x) =
2 sin
2
(x
1
) sin(x
2
) cos(x
2
)
2 sin(x
1
) sin
2
(x
2
) cos(x
1
)
x := (x
1
, x
2
)
S
,
p
S
(x) = x
3
1
e
x
2
x := (x
1
, x
2
)
S
,
and
p
D
(x) = x
3
1
sin(x
2
) x := (x
1
, x
2
)
D
.
In Example 2 we consider
D
:=] 1, 0[
2
and let
S
be the L-shaped domain given by
] 1, 1[
2
`
D
, which yields a porous medium partially surrounded by a uid. Then we choose
the data f
S
and f
D
so that the exact solution is given by
u
S
(x) = curl
0.1
x
2
2
1
2
sin
2
(x
1
)
x := (x
1
, x
2
)
S
,
p
S
(x) =
1
100 (x
2
1
+ x
2
2
) + 0.1
x := (x
1
, x
2
)
S
,
and
p
D
(x) =
x
1
+ 1
10
2
sin
3
(2 (x
2
+ 0.5)) x := (x
1
, x
2
)
D
.
Note that the uid pressure p
S
has high gradients around the origin.
Finally, in Example 3 we take
D
:=] 1, 1[ ] 2, 1[ and
S
:=] 1, 1[
2
` [0, 1]
2
, which
yields a porous medium below a uid, and choose the data f
S
and f
D
so that the exact solution
is given by
u
S
(r, ) = curl
0.1 r
5/3
(r
2
cos
2
() 1)
2
(r sin() 1)
2
sin
2
2
3
(r, )
S
,
p
S
(x) = 0.1 x
1
sin(x
2
) x := (x
1
, x
2
)
S
,
and
p
D
(x) = 0.1 (x
2
+ 2)
2
sin
3
(x
1
) x := (x
1
, x
2
)
D
.
Note that u
S
is dened in polar coordinates and that its derivatives are singular at the origin.
The numerical results shown below were obtained using a MATLAB code. In Table 4.1 we
summarize the convergence history of the mixed nite element method (2.11), as applied to
Example 1, for a sequence of quasi-uniform triangulations of the domain. We observe there,
24
Table 4.1: Example 1, quasi-uniform scheme
N h e(
S
) r(
S
) e(u
S
) r(u
S
) e(u
D
) r(u
D
) e(p
D
) r(p
D
)
321 0.5000 35.4015 0.6875 0.1996 0.0117
1201 0.2500 20.0107 0.8647 0.4266 0.7234 0.1121 0.8743 0.0057 1.0798
4641 0.1250 10.0700 1.0160 0.1615 1.4370 0.0531 1.1046 0.0023 1.3213
18241 0.0625 5.0492 1.0087 0.0801 1.0238 0.0259 1.0490 0.0011 1.0967
72321 0.0312 2.5268 1.0052 0.0401 1.0064 0.0129 1.0178 0.0005 1.0234
288001 0.0156 1.2637 1.0029 0.0200 1.0031 0.0064 1.0062 0.0003 1.0062
N h e() r() e() r() e(, u) r(, u) eff()
321 0.5000 4.2653 0.0981 35.6649 39.0015 0.9144
1201 0.2500 4.3919 0.0973 0.0124 20.4920 0.8399 22.6847 0.9033
4641 0.1250 1.7410 1.3690 0.0537 0.8781 10.2209 1.0292 11.1965 0.9129
18241 0.0625 0.8088 1.1202 0.0259 1.0670 5.1144 1.0117 5.5954 0.9140
72321 0.0312 0.3949 1.0408 0.0126 1.0516 2.5579 1.0060 2.7969 0.9145
288001 0.0156 0.1962 1.0123 0.0062 1.0266 1.2791 1.0031 1.3982 0.9148
looking at the corresponding experimental rates of convergence, that the O(h) predicted by
Theorem 2.4 (when = 1) is attained in all the unknowns. In addition, we notice that the
eectivity index eff() remains always in a neighborhood of 0.91, which illustrates the reliability
and eciency of in the case of a regular solution.
Next, in Tables 4.2 - 4.5 we provide the convergence history of the quasi-uniform and adaptive
schemes, as applied to Examples 2 and 3. We observe that the errors of the adaptive procedures
decrease faster than those obtained by the quasi-uniform ones, which is conrmed by the global
experimental rates of convergence provided there. This fact is also illustrated in Figures 4.1 and
4.3 where we display the total errors e(, u) vs. the degrees of freedom N for both renements.
As shown by the values of r(, u), the adaptive method is able to keep the quasi-optimal rate of
convergence O(h) for the total error. Furthermore, the eectivity indexes remain bounded from
above and below, which conrms the reliability and eciency of in these cases of non-smooth
solutions. Intermediate meshes obtained with the adaptive renements are displayed in Figures
4.2 and 4.4. Note that the method is able to recognize the region with high gradients in Example
2, and the singularity of the solution in Example 3.
References
[1] S. Agmon, Lectures on Elliptic Boundary Value Problems. Van Nostrand, Princeton, New
Jersey, 1965.
[2] M. Ainsworth and J.T. Oden, A unied approach to a posteriori error estimation based
on element residual methods. Numerische Mathematik, vol. 65, pp. 23-50, (1993).
[3] M. Ainsworth and J.T. Oden, A posteriori error estimators for the Stokes and Oseen
equations. SIAM Journal on Numerical Analysisi, vol. 34, 1, pp. 228-245, (1997).
25
Table 4.2: Example 2, quasi-uniform scheme
N h e(
S
) e(u
S
) e(u
D
) e(p
D
) e() e()
608 0.3536 4.5187 0.1198 0.2649 0.0184 0.5760 0.1120
2332 0.1768 4.9963 0.0529 0.1520 0.0035 0.2653 0.0347
9140 0.0884 6.7481 0.0253 0.0778 0.0005 0.1485 0.0096
36196 0.0442 4.2857 0.0125 0.0392 0.0002 0.0771 0.0042
144068 0.0221 2.4834 0.0062 0.0196 0.0001 0.0348 0.0022
N h e(, u) r(, u) eff()
608 0.3536 4.5660 5.4033 0.8450
2332 0.1768 5.0060 5.2805 0.9480
9140 0.0884 6.7503 6.8230 0.9894
36196 0.0442 4.2866 0.6599 4.3158 0.9932
144068 0.0221 2.4837 0.7901 2.4958 0.9952
1
10
100 1000 10000 100000
N
quasi-uniform renement
3
3
3
3
3
3
adaptive renement
+
+
+
+
+
+
+
+
+
+
+
+
+
+
Figure 4.1: Example 2, e(, u) vs. N for quasi-uniform/adaptive schemes
26
Table 4.3: Example 2, adaptive scheme
N e(
S
) e(u
S
) e(u
D
) e(p
D
) e() e()
608 4.5188 0.1199 0.2649 0.0184 0.5760 0.1121
1118 5.3792 0.0709 0.2262 0.0091 0.3185 0.0402
1391 7.2290 0.0661 0.2098 0.0082 0.2846 0.0215
1636 5.1151 0.0657 0.2094 0.0110 0.2591 0.0236
1884 3.9177 0.0657 0.2093 0.0108 0.2577 0.0229
3558 2.6519 0.0491 0.2020 0.0037 0.1626 0.0128
7164 1.8814 0.0320 0.1751 0.0067 0.1160 0.0171
13073 1.3945 0.0237 0.1591 0.0034 0.0742 0.0109
26227 0.9771 0.0165 0.1222 0.0030 0.0730 0.0103
35611 0.8163 0.0140 0.1089 0.0018 0.0384 0.0075
55318 0.6608 0.0114 0.0808 0.0005 0.0375 0.0039
70434 0.5825 0.0099 0.0747 0.0005 0.0357 0.0038
149402 0.4052 0.0070 0.0548 0.0003 0.0208 0.0023
N e(, u) r(, u) eff()
608 4.5660 5.4033 0.8450
1118 5.3940 5.7977 0.9304
1391 7.2379 7.4956 0.9656
1636 5.1264 4.2524 5.4334 0.9435
1884 3.9324 3.7572 4.3145 0.9114
3558 2.6650 1.2238 2.9662 0.8985
7164 1.8934 0.9768 2.0913 0.9054
13073 1.4057 0.9902 1.5394 0.9132
26227 0.9876 1.0142 1.0951 0.9018
35611 0.8246 1.1796 0.9191 0.8972
55318 0.6669 0.9637 0.7388 0.9026
70434 0.5885 1.0359 0.6505 0.9046
149402 0.4095 0.9644 0.4550 0.8999
27
Figure 4.2: Example 2, adapted meshes with 1884, 7164, 26227, and 55318 degrees of freedom
Table 4.4: Example 3, quasi-uniform scheme
N h e(
S
) e(u
S
) e(u
D
) e(p
D
) e() e()
344 0.5000 16.8563 0.4452 0.7130 0.0674 1.8109 0.1615
1324 0.2500 11.3317 0.3329 0.3846 0.0130 2.5160 0.0826
5204 0.1250 7.0011 0.0849 0.1980 0.0038 0.8665 0.0458
20644 0.0625 4.4530 0.0412 0.0992 0.0018 0.3859 0.0203
82244 0.0312 2.8037 0.0206 0.0496 0.0009 0.1877 0.0097
N h e(, u) r(, u) eff()
344 0.5000 16.9751 18.8901 0.8986
1324 0.2500 11.6191 0.5626 13.1132 0.8861
5204 0.1250 7.0579 0.7284 7.8041 0.9044
20644 0.0625 4.4711 0.6626 5.0014 0.8940
82244 0.0312 2.8105 0.6717 3.1653 0.8879
28
Table 4.5: Example 3, adaptive scheme
N e(
S
) e(u
S
) e(u
D
) e(p
D
) e() e()
344 16.8564 0.4453 0.7131 0.0675 1.8109 0.1616
684 11.8048 0.3406 0.5828 0.0177 2.5165 0.0863
1367 10.6242 0.1330 0.4426 0.0099 0.8682 0.0530
1625 10.4486 0.1314 0.4426 0.0099 0.8682 0.0530
1863 10.3440 0.1278 0.4426 0.0098 0.8678 0.0530
2291 9.2480 0.1173 0.4427 0.0097 0.8672 0.0526
3109 7.5456 0.1013 0.4425 0.0098 0.8670 0.0522
11719 3.9053 0.0530 0.3296 0.0072 0.3875 0.0271
34611 2.2713 0.0202 0.2614 0.0058 0.1901 0.0092
60159 1.7281 0.0153 0.1723 0.0034 0.1759 0.0083
79482 1.5031 0.0111 0.1644 0.0032 0.1154 0.0072
115241 1.2620 0.0167 0.1498 0.0019 0.1101 0.0055
182014 0.9954 0.0130 0.1226 0.0012 0.0900 0.0027
N e(, u) r(, u) eff()
344 16.9751 18.8901 0.8986
684 12.0893 0.9877 13.6112 0.8882
1367 10.6698 0.3608 11.3264 0.9420
1625 10.4949 0.1912 11.1221 0.9436
1863 10.3907 0.1460 10.8244 0.9599
2291 9.3000 1.0724 9.9113 0.9383
3109 7.6090 1.3146 8.2092 0.9269
11719 3.9388 1.0924 4.2413 0.9362
34611 2.2943 0.9981 2.4691 0.9292
60159 1.7456 0.9889 1.8902 0.9235
79482 1.5165 1.0102 1.5941 0.9513
115241 1.2757 0.9309 1.3418 0.9507
182014 1.0070 1.0350 1.0817 0.9309
29
1
10
100 1000 10000 100000
N
quasi-uniform renement
3
3
3
3
3
3
adaptive renement
+
+
+++
+
+
+
+
+
+
+
+
+
Figure 4.3: Example 3, e(, u) vs. N for quasi-uniform/adaptive schemes
[4] A. Alonso, Error estimators for a mixed method. Numerische Mathematik, vol. 74, pp.
385-395, (1996).
[5] T. Arbogast and D.S. Brunson, A computational method for approximating a Darcy-
Stokes system governing a vuggy porous medium. Computational Geosciences, vol. 11, 3,
pp. 207-218, (2007).
[6] D.N. Arnold, An interior penalty nite element method with discontinuous elements.
SIAM Journal on Numerical Analysis, vol. 19, 4, pp. 742-760, (1982).
[7] I. Babuska and G.N. Gatica, On the mixed nite element method with Lagrange multi-
pliers. Numerical Methods for Partial Dierential Equations, vol. 19, 2, pp. 192-210, (2003).
[8] I. Babuska and G.N. Gatica, A residual-based a posteriori error estimator for the
Stokes-Darcy coupled problem. SIAM Journal on Numerical Analysis, vol. 48, 2, pp. 498-523,
(2010).
[9] T.P. Barrios, G.N. Gatica, M. Gonz alez, and N. Heuer, A residual based a pos-
teriori error estimator for an augmented mixed nite element method in linear elasticity.
ESAIM: Mathematical Modelling and Numerical Analysis, vol. 40, 5, pp. 843-869, (2006).
[10] C. Bernardi, F. Hecht, and O. Pironneau, Coupling Darcy and Stokes equations for
porous media with cracks. ESAIM: Mathematical Modelling and Numerical Analysis, vol.
39, 1, pp. 7-35, (2005).
[11] D. Braess and R. Verf urth, A posteriori error estimators for the Raviart-Thomas
element. SIAM Journal on Numerical Analysis, vol. 33, pp. 24312444, (1996).
30
Figure 4.4: Example 3, adapted meshes with 1863, 3109, 11719, and 60159 degrees of freedom
31
[12] F. Brezzi and M. Fortin, Mixed and Hybrid Finite Element Methods. Springer Verlag,
1991.
[13] E. Burman and P. Hansbo, Stabilized Crouzeix-Raviart elements for the Darcy-Stokes
problem. Numerical Methods for Partial Dierential Equations, vol. 21, 5, pp. 986-997,
(2005).
[14] E. Burman and P. Hansbo, A unied stabilized method for Stokes and Darcys equations.
Journal of Computational and Applied Mathematics, vol. 198, 1, pp. 35-51, (2007).
[15] C. Carstensen, A posteriori error estimate for the mixed nite element method. Mathe-
matics of Computation, vol. 66, 218, pp. 465-476, (1997).
[16] C. Carstensen, An a posteriori error estimate for a rst kind integral equation. Mathe-
matics of Computation, vol. 66, 217, pp. 139-155, (1997).
[17] C. Carstensen and G. Dolzmann, A posteriori error estimates for mixed FEM in
elasticity. Numerische Mathematique, vol. 81, pp. 187-209, (1998).
[18] P. G. Ciarlet, The nite Element Method for Elliptic Problems. North-Holland, Amster-
dam, New York, Oxorfd, 1978.
[19] P. Clement, Approximation by nite element functions using local regularisation. RAIRO
Modelisation Mathematique et Analyse Numerique, vol. 9, pp. 77-84, (1975).
[20] M.R. Correa, Stabilized Finite Element Methods for Darcy and Coupled Stokes-Darcy
Flows. D.Sc. Thesis, LNCC, Petropolis, Rio de Janeiro, Brasil (in portuguese), (2006).
[21] M.R. Correa and A.F.D. Loula, A unied mixed formulation naturally coupling Stokes
and Darcy ows. Computer Methods in Applied Mechanics and Engineering, vol. 198, 33-36,
pp. 2710-2722, (2009).
[22] M. Discacciati, E. Miglio, and A. Quarteroni, Mathematical and numerical models
for coupling surface and groundwater ows. Applied Numerical Mathematics, vol. 43, pp.
57-74, (2002).
[23] V.J. Ervin, E.W. Jenkins, and S. Sun, Coupled generalized nonlinear Stokes ow with
ow through a porous medium. SIAM Journal on Numerical Analysis, vol. 47, 2, pp. 929-952,
(2009).
[24] J. Galvis and M. Sarkis, Non-matching mortar discretization analysis for the coupling
Stokes-Darcy equations. Electronic Transactions on Numerical Analysis, vol. 26, pp. 350-
384, (2007).
[25] G.N. Gatica, A note on the eciency of residual-based a-posteriori error estimators for
some mixed nite element methods. Electronic Transactions on Numerical Analysos, vol 17,
pp. 218-233, (2004).
[26] G.N. Gatica, G.C. Hsiao, and S. Meddahi, A residual-based a posteriori error esti-
mator for a two-dimensional uid-solid interaction problem. Numerische Mathemaik, vol.
114, 1, pp. 63-106, (2009).
32
[27] G.N. Gatica and M. Maischak, A posteriori error estimates for the mixed nite element
method with Lagrange multipliers. Numerical Methods for Partial Dierential Equations,
vol. 21, 3, pp. 421-450, (2005).
[28] G.N. Gatica, A. M arquez, and M.A. S anchez, Analysis of a velocity-pressure-
pseudostress formulation for the stationary Stokes equations. Computer Methods in Applied
Mechanics and Engineering, vol. 199, 17-20, pp. 1064-1079, (2010).
[29] G.N. Gatica, S. Meddahi, and R. Oyarz ua, A conforming mixed nite-element method
for the coupling of uid ow with porous media ow. IMA Journal of Numerical Analysis,
vol. 29, 1, pp. 86-108, (2009).
[30] G.N. Gatica, R. Oyarz ua and F-J Sayas, Convergence of a family of Galerkin dis-
cretizations for the Stokes-Darcy coupled problem. Numerical Methods for Partial Dieren-
tial Equations DOI 10.1002/num, to appear.
[31] G.N. Gatica, R. Oyarz ua, and F.-J. Sayas, Analysis of fully-mixed nite element
methods for the Stokes-Darcy coupled problem. Preprint 2009-08, Departamento de Inge-
niera Matematica, Universidad de Concepcion, Chile, (2009).
[32] V. Girault and P. A. Raviart, Finite Element Methods for Navier-Stokes Equations.
Theory and Algorithms. Springer Series in Computational Mathematics, vol. 5, Springer-
Verlag, 1986.
[33] R.H.W. Hoppe and B.I. Wohlmuth, A comparison of a posteriori error estimators for
mixed nite element discretizations by Raviart-Thomas elements. Mathematics of Compu-
tation, vol. 68, 228, pp. 1347-1378, (1999).
[34] R. Kress, Linear Integral Equations. Springer Verlag, Berlin, 1989.
[35] W.J. Layton, F. Schieweck, and I. Yotov, Coupling uid ow with porous media
ow. SIAM Journal on Numerical Analysis, vol. 40, 6, pp. 2195-2218, (2003).
[36] M. Lonsing and R. Verf urth, A posteriori error estimators for mixed nite element
methods in linear elasticity. Numerische Mathematik, vol. 97, 4, pp. 757-778, (2004).
[37] C. Lovadina and R. Stenberg, Energy norm a posteriori error estimates for mixed nite
element methods. Mathematics of Computation, vol. 75, 256, pp. 1659-1674, (2006).
[38] A. Masud, A stabilized mixed nite element method for Darcy-Stokes ow. International
Journal for Numerical Methods in Fluids, vol. 54, 6-8, pp. 665-681, (2008).
[39] S. Repin, S. Sauter, and A. Smolianski, Two-sided a posteriori error estimates for
mixed formulations of elliptic problems. SIAM Journal on Numerical Analysis, vol. 45, 3,
pp. 928-945, (2007).
[40] B. Riviere, Analysis of a discontinuous nite element method for coupled Stokes and Darcy
problems. Journal of Scientic Computing, vol. 22-23, pp. 479-500, (2005).
[41] B. Riviere and I. Yotov, Locally conservative coupling of Stokes and Darcy ows. SIAM
Journal on Numerical Analysis, vol. 42, 5, pp. 1959-1977, (2005).
33
[42] H. Rui and R. Zhang, A unied stabilized mixed nite element method for coupling Stokes
and Darcy ows. Computer Methods in Applied Mechanics and Engineering, vol. 198, 33-36,
pp. 2692-2699, (2009).
[43] J.M. Urquiza, D. NDri, A. Garon, and M.C. Delfour, Coupling Stokes and Darcy
equations. Applied Numerical Mathematics, vol. 58, 5, pp. 525-538, (2008).
[44] R. Verf urth, A posteriori error estimators for the Stokes problem. Numerische Mathe-
matik, vol. 55, pp. 309-325, (1989).
[45] R. Verf urth, A posteriori error estimation and adaptive mesh-renement thecniques.
Journal of Computational and Applied Mathematics, vol 50, pp. 67-83, (1994).
[46] R. Verf urth, A Review of A posteriori Error Estimation and Adaptive Mesh-Renement
Thecniques. Wiley-Teubner (Chichester), 1996.
[47] X. Xie, J. Xu, and G. Xue, Uniformly stable nite element methods for Darcy-Stokes-
Brinkman models. Journal of Computational Mathematics, vol. 26, 3, pp. 437-455, (2008).
34