Home Obtaining higher-order Galerkin accuracy when the boundary is polygonally approximated
Article Open Access

Obtaining higher-order Galerkin accuracy when the boundary is polygonally approximated

  • Todd Dupont , Johnny Guzmán ORCID logo and L. Ridgway Scott ORCID logo EMAIL logo
Published/Copyright: October 7, 2024

Abstract

Inspired by the methods developed in J. H. Bramble, T. Dupont, and V. Thomée (“Projection methods for Dirichlet’s problem in approximating polygonal domains with boundary-value corrections,” Math. Comput., vol. 26, no. 120, pp. 869–879, 1972), we introduce a new technique that yields a symmetric formulation and has similar performance. The new method is based on a Robin-type problem on an approximate polygonal domain. Optimal error estimates in the energy norm are proved for piecewise quadratics and cubics. We provide numerical experiments that show our theoretical results are sharp.

MSC 2010 Classification: 65M60

1 Introduction

When a Dirichlet problem on a smooth domain is approximated by a polygon, an error occurs that is suboptimal for piecewise quadratic approximations [1], [2], [3], [4]. There are several approaches that have been developed to overcome the sub-optimality. Two common approaches are: (1) methods that use curved elements (see, for example [5], [6], [7], to name a few) and (2) methods that use augmented polygonal approximations. The method we develop here falls within the second category. A non-exhaustive list of such methods includes [8], [9], [10], [11], [12], [13], [14], [15], [16], [17], [18], [19].

To put our contribution in context, we consider a model problem and previous numerical methods for this problem. Let Ω be a piecewise smooth, bounded, two-dimensional domain that is on only one side of its boundary. Consider the Poisson equation with Dirichlet boundary conditions:

(1) Δ u = f  in  Ω , u = g  on  Ω .

We assume that f and g are sufficiently smooth that u can be extended to be in W 2 , q ( Ω ̂ ) , where Ω ̂ contains a neighborhood of the closure of Ω , for some q in the range 1 < q . For a Lipschitz domain, this is possible with q < 4 / 3 .

One way to discretize (1) is to approximate the domain Ω by polygons Ω h , where the edge lengths of Ω h are of order h in size. Then conventional finite elements can be employed on each Ω h , with the Dirichlet boundary conditions being approximated by the assumption that u h = g ̂ on Ω h [20], with g ̂ appropriately defined. For example, let us suppose for the moment that g 0 and we take g ̂ 0 as well. In particular, we assume that Ω h is triangulated with a nondegenerate mesh T h of maximum triangle size h , and the boundary vertices of Ω h are in Ω . We define W ̊ h k H 0 1 ( Ω h ) W h k , where

(2) W h k = { v C ( Ω h ) : v | T P k T T h }

and P k is the set of polynomials of total degree k . Then the standard finite element approximation finds u h W ̊ h k satisfying

(3) a h ( u h , v ) = ( f , v ) L 2 ( Ω h ) v W ̊ h k ,

where a h ( u , v ) Ω h u v d x . Here we assume that f is extended smoothly outside of Ω .

This approach for k = 1 (piecewise linear approximation) leads to the error estimate

u u h H 1 ( Ω h ) C h u H 2 ( Ω ̂ ) .

However, when this approach is applied with piecewise quadratic polynomials ( k = 2 ) , the best possible error estimate [20] is

(4) u u h H 1 ( Ω h ) C h 3 / 2 ,

which is less than optimal order by a factor of h . The reason of course is that we have made only a piecewise linear approximation of Ω . Table 1 summarizes some computational experiments for the test problem in Section 3. We see a significant improvement for quadratics over linears, but there is almost no improvement with cubics. Moreover, we will see that a significant improvement using quadratics can be obtained using simple approaches that modify the variational form.

Table 1:

Errors u h u I in L 2 ( Ω h ) and H 1 ( Ω h ) , as a function of the maximum mesh size (hmax) for the polygonal approximation (3) for the test problem in Section 3 using various polynomial degrees k . Key: “ M ” is input parameter to mshr function circle used to generate the mesh, “seg” is the number of boundary edges. The approximate solutions were generated using (3). The interpolant u I is defined in (16).

k M L2 err rate H1 err rate seg hmax
1 2 1.84e+00 NA 6.25e+00 NA 10 1.05e+00
1 4 2.93e−01 2.65 1.89e+00 1.73 20 4.94e−01
1 8 9.55e−02 1.62 1.06e+00 0.83 40 2.61e−01
1 16 2.47e−02 1.95 5.45e−01 0.96 80 1.35e−01
2 2 4.18e−01 NA 1.41e+00 NA 10 1.05e+00
2 4 9.44e−02 2.15 4.26e−01 1.73 20 4.94e−01
2 8 2.30e−02 2.04 1.59e−01 1.42 40 2.61e−01
2 16 5.62e−03 2.03 5.45e−02 1.54 80 1.35e−01
3 2 3.17e−01 NA 8.25e−01 NA 10 1.05e+00
3 4 8.81e−02 1.85 2.94e−01 1.49 20 4.94e−01
3 8 2.22e−02 1.99 1.07e−01 1.46 40 2.61e−01
3 16 5.53e−03 2.01 3.82e−02 1.49 80 1.35e−01

The first method using a polygonal approximate domain to obtain higher order schemes was based on modifying the method of Nitsche [5] and appeared in 1972 [8]. There are two main ingredients in the scheme in ref. [8]:

  1. Nitsche’s penalization to both enforce the boundary condition and stabilize the method;

  2. Taylor’s expansions to give approximate boundary conditions on Ω h .

The idea is to think of u as the solution of a PDE on the approximate domain, with boundary conditions that need to be approximated.

Methods for any polynomial order are developed in ref. [8], and it is proved that the error estimates are optimal in the energy norm. The bulk of ref. [8] analyzes a non-symmetric extension of Nitsche’s method, but a symmetrized version is defined [8], eq.  (3.12)] for the lowest-order scheme for which the same estimates hold by trivial modifications, and estimates are described in the case that the distance to the boundary is only approximated.

Two years later [8], was extended [15] to cover both 2 and 3 dimensions, variable coefficients, and estimates in H 1 as well as H 1 and L 2 . The paper [15] uses the symmetric form throughout, it allows both linear and nonlinear approximations of the boundary (that is, the approximating domains can be curved), and it also applies the elliptic theory to nonlinear parabolic equations.

The work of refs. [8], [15] has been extended in many ways [9], [10], [11], [16], [21], [22], [23], [24] over the intervening decades.

Recently, the related shifted-boundary method has been developed [17], [18] and analyzed [25], [26]. It uses the two main ingredients (i.e., Nitsche’s penalization and Taylor’s expansions) to develop methods for Poisson’s problem, fluid flow problems and advection–diffusion problems. The method seems to be stable when the boundary of Ω h is within O ( h ) of the boundary of Ω . Cheung et al. [12] develop a method using average Taylor expansions, and they prove stability in the case the boundary of Ω h is within O ( h 3 / 2 ) of the boundary of Ω . Finally, a series of papers [13], [14], [19], develops hybridizable discontinuous Galerkin (HDG) methods using polygonal approximations. HDG has its own stabilization mechanism which they use. A distinctive feature is that they approximate both u and u independently. The latter has been named the “transfer path method” (TPM) [27] and been developed not only for HDG methods, but also for mixed finite element methods [28], [29]. Therefore, it does not require a stabilization parameter.

In this paper, we introduce a new method that uses a first order Taylor expansion which naturally leads to a Robin-type boundary problem on Ω h . However, we do not use Nitsche’s stabilization, and thus we avoid the need to choose a penalty parameter. Another parameter-free method is developed in refs. [30], [31], [32].

The Robin-type method studied here is naturally symmetric, but it can be not positive definite. Despite this, we are able to prove optimal estimates for piecewise quadratics and cubics. The analysis is quite different from what is used for methods that are rooted in Nitsche’s method, such as refs. [8], [15] and its descendents. It is not a simple perturbation of the standard arguments. For this reason, we restrict attention to the model problem (1) in order to make our analysis as transparent as possible. We assume for simplicity that the vertices of the boundary Ω h belong to boundary of Ω (i.e., a fitted mesh). We give numerical results that show that our estimates are sharp.

2 The Bramble–Dupont–Thomée approach

We start by reviewing the method [8] of Bramble–Dupont–Thomée (BDT) which achieves high-order accuracy by modifying Nitsche’s method [5] applied on Ω h . We assume that Ω h Ω and we do not necessarily assume that the boundary vertices of Ω h belong to Ω . The bilinear form used in ref. [8] is

(5) N h ( u , v ) = a h ( u , v ) Ω h u n v d s Ω h u + δ u n v n γ h 1 v d s .

Here, n denotes the outward-directed normal to Ω h and

δ ( x ) = min s > 0 : x + sn Ω .

Contrast the definition of δ to the closely related function d defined by

d ( x ) = min | x y | : y Ω ,

see Figure 1.

Figure 1: 
Definitions of (A) 


δ


$\delta $



 and (B) 


d


$d$



.
Figure 1:

Definitions of (A) δ and (B) d .

For simplicity the assume that g = 0 . Then the BDT method will find u h W h k such that

N h ( u h , v ) = Ω h f v d x v W h k .

If δ were 0, this would be Nitsche’s method on Ω h .

Corrections of arbitrary order, involving terms δ u n for > 1 are studied in ref. [8], but for simplicity we restrict attention to the first-order correction to Nitsche’s method given in (5). The error estimates obtained in ref. [8] are as follows

| | | u u h | | | 1 C h k u H k + 1 ( Ω ) + C h 7 / 2 u W 2 ( Ω ) ,

where

| | | v | | | 1 a h ( v , v ) + h 1 Ω h v 2 d s + h Ω h v n 2 d s 1 / 2 .

Thus using the variational form (5) leads to an approximation that is optimal-order with quadratics and cubics and is only suboptimal for quartics by a factor of h .

3 An example: the circle

We consider a numerical example. Consider the case where Ω is a disc of radius R centered at the origin, in which case we have d ( x ) = R | x | . However, it is more difficult to evaluate δ ( x ) . We assume that the vertices of Ω h lie on Ω . We have x + δ ( x ) n Ω for x Ω h , where n denotes the outward normal to Ω h . Let t denote the unit tangent vector to Ω h such that n × t points up. We can write x = ( x n ) n + ( x t ) t , and ( x t ) 2 = | x | 2 ( x n ) 2 . Since | x + δ ( x ) n | = R , we have

R 2 = ( x t ) 2 + ( x n + δ ( x ) ) 2 = | x | 2 ( x n ) 2 + ( x n + δ ( x ) ) 2 .

Then

δ ( x ) = ± R 2 | x | 2 + ( x n ) 2 x n .

Note that for x Ω h , | x | R and x n > 0 . Since δ ( x ) 0 , we must pick the plus sign, so

(6) δ ( x ) = R 2 | x | 2 + ( x n ) 2 x n .

Note that this formula does not depend on the placement of the boundary vertices. If x i is a boundary vertex, then | x i | = R , and δ ( x i ) = 0 .

It is not hard to see that d δ = O ( h 4 ) in this case.

This problem is simple to implement using the FEniCS Project code dolfin [33]. We take R = 1 , u ( x , y ) = 1 ( x 2 + y 2 ) 3 , and f = 36 ( x 2 + y 2 ) 2 in the computational experiments described subsequently. Computational results for this example are given in Table 2, where we see optimal order approximation for k 3 , improvement for k = 4 over k = 3 (suboptimal by a factor h 1 / 2 ), and no improvement for quintics. These errors are depicted in Figure 2.

Table 2:

Errors u h u I in L 2 ( Ω h ) and H 1 ( Ω h ) as a function of mesh size (hmax) for the test problem in Section 3 using the BDT approximation in Section 2, with γ = 100 , for various polynomial degrees k . Key: M is the value of the meshsize input parameter to the mshr function circle used to generate the mesh. The number of boundary edges was set to 5 M , and hmax is the maximum mesh size. The interpolant u I is defined in (16).

k M hmax L2 error rate H1 error rate
1 8 0.261 0.0947 1.61 1.06 0.82
1 16 0.135 0.0245 1.95 0.544 0.96
1 32 0.0688 0.00639 1.94 0.277 0.97
1 64 0.0353 0.00158 2.02 0.137 1.02
2 8 0.261 2.81e−03 2.61 0.103 1.57
2 16 0.135 3.70e−04 2.93 0.0277 1.89
2 32 0.0688 4.77e−05 2.96 0.00717 1.95
2 64 0.0353 5.91e−06 3.01 0.00179 2.00
3 8 0.261 1.56e−04 3.92 5.31e−03 2.54
3 16 0.135 9.44e−06 4.05 7.06e−04 2.91
3 32 0.0688 5.81e−07 4.02 9.23e−05 2.94
3 64 0.0353 3.57e−08 4.02 1.15e−05 3.00
4 8 0.261 1.49e−04 3.96 7.41e−04 3.42
4 16 0.135 9.29e−06 4.00 6.63e-05 3.48
4 32 0.0688 5.80e−07 4.00 5.90e−06 3.49
4 64 0.0353 3.63e−08 4.00 5.22e−07 3.50
5 8 0.261 1.47e−04 3.96 7.10e−04 3.41
5 16 0.135 9.27e−06 3.99 6.44e−05 3.46
5 32 0.0688 5.80e−07 4.00 5.77e−06 3.48
5 64 0.0353 3.62e−08 4.00 5.12e−07 3.49
Figure 2: 
Errors 




u


h


−


u


I




${u}_{h}-{u}_{I}$



 in (A) 




L


2



(



Ω


h



)



${L}^{2}\left({{\Omega}}_{h}\right)$



 and (B) 




H


1



(



Ω


h



)



${H}^{1}\left({{\Omega}}_{h}\right)$



 as a function of the maximum mesh size for the BDT method with 


γ
=
100


$\gamma =100$



. The asterisks indicate data for (A) 


k
=
4


$k=4$



 and (B) 


k
=
5


$k=5$



. The interpolant 




u


I




${u}_{I}$



 is defined in (16).
Figure 2:

Errors u h u I in (A) L 2 ( Ω h ) and (B) H 1 ( Ω h ) as a function of the maximum mesh size for the BDT method with γ = 100 . The asterisks indicate data for (A) k = 4 and (B) k = 5 . The interpolant u I is defined in (16).

4 A new method based on a Robin-type approach

One issue with the BDT method is that the resulting linear system is not symmetric, although it is easily symmetrized as we discuss in Section 11. Here we develop a technique that leads directly to a symmetric system. More importantly, this method does not require the parameter(s) from Nitsche’s method. For Nitsche’s method to succeed, γ must be chosen appropriately [34]. Naturally, there is a price to pay for having a parameter-free method. We will have to make some restrictive assumptions about the domain boundary that would not be required for the success of BDT.

We first separate Ω into its piecewise linear part and its curvilinear part. We will assume that

(7) Ω = Γ 0 S 1 S ϰ + 1 , ϰ 0 ,

where Γ 0 is a finite union of piecewise linear segments and the S i ’s are C 2 and nowhere linear. The rectilinear part Γ 0 of the boundary may be empty, as is the cases for our numerical examples. Denote by

(8) y i , i = 1 , , ϰ ,

the intersection points (if any) where S i and S i + 1 meet. We make the following assumption on the domain.

Assumption 1.

We assume that the curvature is nonzero (and thus of one sign) in the interior of each S i .

In Figure 3, we show a domain with two S i ’s and exactly one point y i , where the two circles meet tangentially, the point (2, 1). The domain may be written as

(9) Ω = [ 0,2 ] × [ 0,3 ] D ( 2,2 ) \ D ( 2,0 ) ,

where D ( x , y ) denotes the unit disc centered at ( x , y ) . The dashed lines indicate this construction via constructive solid geometry.

Figure 3: 
A P-shaped domain (solid lines) with one point 




y


i




${\mathbf{y}}_{i}$



. The dashed lines indicate the definition (9) via constructive solid geometry.
Figure 3:

A P-shaped domain (solid lines) with one point y i . The dashed lines indicate the definition (9) via constructive solid geometry.

It may be that different S i are disconnected and have no end points, as in our example in Section 9.2. So the set of y i ’s could be empty ( ϰ = 0 ) .

For the method in this section we assume that the vertices of Ω h belong to Ω , and hence Ω h might not be a subdomain of Ω . Thus, we need to define δ in this case. We assume that for every x Ω h there is a unique smallest number δ ( x ) in absolute value such that

x + δ ( x ) n ( x ) Ω .

For x Γ 0 , we have δ ( x ) = 0 provided that Γ 0 Ω h .

We assume that the approximate domain boundary Ω h can be decomposed into three parts, as follows. Let E h be the edges of Ω h . Define

(10) Γ ± = e E h : ± δ | e o > 0 ,

where e o denotes the interior of e . Let Γ = Γ + Γ . We make the following assumption on the boundary approximations.

Assumption 2.

We assume that the polygonal part Γ 0 of the boundary, defined in (7), is a subset of Ω h . We also assume that all the vertices of Ω h belong to Ω and that each y i (defined just before Assumption 1) is a vertex of Ω h and that the mesh is fine enough so that y i and y j are not the vertices of a single edge in Ω h when i j . Finally, we assume that

Ω h = Γ 0 Γ .

This assumption means that δ cannot change sign in the interior of an edge.

Note that Γ depends on h , but we omit a subscript to simplify notation.

Our method resembles a Robin-type of boundary condition on Γ . It is similar to the closely related problem:

Δ w = f  on  Ω , w = g  on  Γ 0 , w + δ w n = g ̂  on  Γ .

Here we define

(11) g ̂ ( x ) = g ( x + δ ( x ) n ( x ) )

for x Γ . The key here is that, using that u = g on Ω , for x Γ ( x not a vertex of Ω h ) we have

(12) E u ( x ) + δ ( x ) E u n ( x ) = g ̂ ( x ) + 0 δ ( x ) ( s δ ( x ) ) 2 E u n 2 ( x + s n ) d s .

Here E u denotes an extension of u outside of Ω to allow for the possibility that Ω h Ω . The function S defined by

(13) S ( x ) = δ ( x ) 1 ( E u ( x ) g ̂ ( x ) ) = E u n ( x ) + δ 1 ( x ) 0 δ ( x ) ( s δ ( x ) ) 2 E u n 2 ( x + s n ) d s

is piecewise smooth for smooth u and will play a significant role in the study of quadrature error in Section 6.3. We postpone to Section 13 a discussion of the smoothness of S . But suffice it to say that

(14) S ( x ) = E u n ( x ) + δ ( x ) S ̂ ( x )

and S ̂ is piecewise smooth.

Now we can define the method. Assume that Ω h is triangulated by a nondegenerate mesh, and we denote by h Γ the maximum edge length on the boundary and by h Ω the maximum mesh size over the entire domain. By nondegenerate, we mean the following. For each triangle T in a mesh T h , let ρ min T be the radius of the largest circle lying inside T and let ρ max T be the radius of the smallest circle containing T . Define

(15) ρ T h = inf T T h ρ min T ρ max T .

A nondegenerate mesh family is one for which ρ T h ρ > 0 for each mesh in the family. In the following, many important constants will depend on ρ T h , but we will suppress mentioning the dependence to simplify the discussion.

Let { ψ j } be the usual Lagrange nodal basis for W h k , and define the interpolant

(16) u I = j u ( x j ) ψ j

for any continuous function u on the closure of Ω h .

We start by defining one finite element space we will use:

(17) V ̊ h k = v W h k : v = 0  on  Γ 0 , v ( x ) = 0  for all vertices  x  of  Ω h ,

where W h k is defined in (2). Also define

(18) V ̊ h k ( g ) = v W h k : v = g I  on  Γ 0 , v ( x ) = g I ( x )  for all vertices  x  of  Ω h ,

where g I C ( Ω h ) is a suitable approximation of g and is a piecewise polynomial of degree at most k on Ω h . For example, we can take g I to be the interpolant, defined in (16), of g ̂ defined in (11). However, note that the definition (18) does not require values of g I except on Γ 0 and at vertices of Ω h where we do know these values.

The bilinear form for the new method is given by

(19) b ̃ h ( u , v ) a h ( u , v ) + c ̃ h ( u , v ) ,

where

(20) a h ( u , v ) = Ω h u v d x , c ̃ h ( u , v ) = Γ δ 1 u v d s .

The form c ̃ h ( , ) depends on h because Γ depends on h . Then the method solves: Find u h V ̊ h k ( g ) such that, for all v V ̊ h k ,

(21) b ̃ h ( u h , v ) = Ω h ( E f ) v d x + c ̃ h ( g ̂ , v ) ,

where E f is an extension of f outside of Ω , not necessarily the same extension used for u . For the moment, we assume that we can compute c ̃ h ( g ̂ , v ) exactly, based on the formula (11). But this is not a practical method because it requires us to work with a space V ̊ h k whose functions are forced to vanish at prescribed points. However, it is easier to analyze this limited method and from this we learn the key issues for more complicated (and practical) versions.

Integration by parts gives

(22) b ̃ h ( E u , v ) Ω h ( E f ) v d x = Ω h \ Ω Δ E u E f v d x + Γ δ 1 ( E u ) v E u n v d s .

Define the extension error

(23) E = Δ E u E f L ( Ω h \ Ω ) .

For the two-circle problem in Section 9.2, we have analytical expressions for u and f , and using these for the extensions, we get Δ E u E f = 0 , so the term E can typically be ignored. Combining (12), (21), and (22), we get

(24) | b ̃ h ( E u u h , v ) | E v L 1 ( Ω h \ Ω ) + Γ δ 1 E u + δ E u n g ̂ v d s .

We can estimate the second term via

(25) Γ δ 1 E u + δ E u n g ̂ v d s C h 2 2 / q 2 E u n 2 L q ( Ω Δ Ω h ) v L p ( Γ ) , 1 p + 1 q = 1 ,

where Ω Δ Ω h = Ω \ Ω h Ω h \ Ω . Here, the normal direction is the normal to Ω h . We postpone the proof of (25) to Section 12. Our method thus appears at first to be a standard variational crime with small error. However, the stability of the method is not standard.

The role of the form c ̃ h ( , ) appears to be of two parts. Due to the singularity, it forces adoption of the boundary conditions. But in addition, it forms the required correction in view of (25).

4.1 Required bounds

The stability of the method rests on some inequalities. The first pair of these express continuity and a type of coercivity on an appropriate space. Define B ̊ h k to be the span of the basis functions ψ j in (16) for which the corresponding nodes x j are on Γ but not vertices. Then B ̊ h k is a complementary space:

(26) V ̊ h k = W ̊ h k B ̊ h k .

The choice of complementary space does not affect the computational method, but we now examine its effect on the subsequent analysis of the method.

Now assume that c h is a general bilinear form defined on Γ and that B h k is a space of functions on Γ . Assume that there is an inner-product , c so that | v | c 2 = v , v c and

(27) | c h ( u , v ) | C | u | c | v | c

for all u , v B h k , and

(28) 0 < β inf u B h k sup v B h k | c h ( u , v ) | | u | c | v | c .

Here we are thinking of general forms c h such as c ̃ h and spaces B h k such as B ̊ h k . We will later apply these ideas to other, similar, forms and spaces For example, for the form in (20), we choose

u , v c = Γ | δ | 1 u v d s .

For the spaces V ̊ h k in (17) and B ̊ h k in (26), we can prove (28) by taking

(29) v = u on Γ + , u on Γ , 0 on Γ 0 ,

in which case c h ( u , v ) = | u | c 2 = | v | c 2 . Thus for the form in (20) and the space B ̊ h k defined in (26), we have (27) with C = 1 and (28) with β = 1 .

Now define V h k and V h k ( g ) by

(30) V h k = v W h k : v = 0  on  Γ 0 , V h k ( g ) = v W h k : v = g I  on  Γ 0 .

Define B h k to be the span of all basis functions ψ j in (16) for which the corresponding nodes x j are on Γ . Then B h k is a complementary space:

(31) V h k = W ̊ h k B h k .

However, if we do not require functions in V h k to vanish at vertices (see Section 4.4), then a problem can arise at a vertex where δ changes sign. If ψ B h k is the basis function for that vertex, then c ̃ h ( ψ , ψ ) 0 by symmetry. In such a case, we modify the form c h ( , ) as follows:

(32) c ̄ h ( u , v ) = Γ δ 1 u v d s + C i u ( y i ) v ( y i ) = c ̃ h ( u , v ) + C i u ( y i ) v ( y i ) ,

where y i denotes the boundary points where δ changes sign and C is a constant to be specified. Adding this sum does not change the exactness of satisfaction in (24), since u satisfies the boundary conditions exactly at all vertices of Ω h . On the other hand, such a modification can enhance stability on the approximation space. We will show that (28) holds with suitable conditions.

The form c ̄ h is more stable but still not quite practical, since it involves boundary integrals with a variable coefficient. We will later modify it further to use numerical quadrature.

Define the norm

(33) v a = a h ( v , v ) .

where the bilinear form a h is defined in (20). The final inequality required for proving stability is a linking lemma of the form

(34) v a c 1 h | v | c  for all  v B h k ,

for some 0 . The latter will be proved in Lemma 2 for the form in (20) and the space B h k defined in (26) with = 1 / 2 .

4.2 The linking lemma

Due to the singularity of δ 1 , c ̃ h ( u , v ) may not be well defined for all u , v V ̊ h k . Therefore, we first show that this is not the case if we make Assumption 1.

Lemma 1.

Under Assumption 1,

(35) | c ̃ h ( u , v ) | < u , v V ̊ h k .

Proof.

Assumption 1 implies that δ is non-zero in the interior of each edge. If δ 0 at the end of each edge, then δ 1 v is bounded for all v V h k . The condition δ 0 is obvious for edges whose vertices are in the interior of each segment S i , since the curvature of S i in the interior would be bounded away from zero, but at a boundary, the segment could be flat. But examining Figure 4 shows that δ 0 there as well. The tangent to S i at the left vertex has zero slope, but the chord connecting that vertex and the next has a positive slope, due to the strict monotonicity of the boundary arc. The difference of slopes is δ . □

Figure 4: 
Bound for 


δ


$\delta $



 for the example in (38).
Figure 4:

Bound for δ for the example in (38).

Assumption 1 does not hold for a domain of the form

(36) Ω f = ( x , y ) : | x | < 1 , f ( x ) < y < 1

if f is defined by

(37) f ( x ) = 0 , x 0 , sin ( π / x ) e 1 / x , x > 0 .

In particular, if we take boundary mesh points at (0,0) and ( 1 / n , 0 ) , then the corresponding edge e with these vertices in the polygonal approximation will be on the x -axis. Thus δ = f in this interval and c h ( v , v ) < only if v vanishes in that interval. Although we must rule out such domains for the new method, the BDT method would not be deterred by such boundaries.

On the other hand, if f is monotone, Assumption 1 does hold for Ω f . For f defined by

(38) f ( x ) = 0 , x 0 , e 1 / x , x > 0 ,

the slope of δ in [ 0,1 / n ] is e n at the origin. Therefore Assumption 1 holds for reasonable domains.

Lemma 2.

Under Assumption 1, there exists a constant c 1 > 0 such that

(39) v a c 1 h | v | c v B h k .

Proof.

Let E h Γ be the collection of edges that are a subset of Γ and let T h Γ be triangles T such that T has an edge in E h Γ . Then, if v B h k and using inverse estimates [20] we have

(40) v a 2 = T T h Γ v L 2 ( T ) 2 T T h Γ C h T 2 v L 2 ( T ) 2 e E h Γ C h e v L 2 ( e ) 2 e E h Γ C h e max x e | δ ( x ) | | δ | 1 / 2 v L 2 ( e ) 2 .

The result is complete after we use that

(41) max x e | δ ( x ) | C h e 2

for all e E h Γ , which holds since δ is essentially the error in a piecewise linear approximation of the boundary. □

4.3 Bounding δ

We will need an upper bound on δ for certain estimates. Return to the example in (36). In Figure 4, we depict a way to give a bound on δ . We have δ c , where c is the length of the edge indicated in Figure 4. Using the similarity of the triangles indicated in Figure 4, we find

a b = h a b = a 2 h .

By the Pythagorean theorem,

c = a 2 + b 2 = a 1 + a 2 / h 2 = f ( h ) 1 + f ( h ) 2 / h 2 .

Therefore, we have proved the following result.

Lemma 3.

Suppose Ω is as in (36) where f ( 0 ) = 0 and f is strictly increasing for x 0 . Then

(42) δ L ( [ 0 , h ] ) C f L ( [ 0 , h ] ) ,

where C = 1 + f ( h ) 2 / h 2 1 + f L ( [ 0 , h ] ) 2 .

Thus if f is exponentially small, so is δ . More generally,

(43) f ( i ) ( 0 ) = 0 0 i k δ L ( [ 0 , h ] ) C h k + 1 .

More specifically, let f ( x ) = x k + 1 , k > 0 . Note that the slope of the line in Figure 4 is a / h = h k . Then

δ ( x ) = 1 + h 2 k 1 h k x x k + 1 , x [ 0 , h ] .

Therefore

δ ( x ) = 1 + h 2 k 2 1 h k ( k + 1 ) x k , x [ 0 , h ] .

Thus the maximum of δ on [ 0 , h ] occurs when x = ( k + 1 ) 1 / k h , and hence

(44) δ L ( [ 0 , h ] ) = 1 + h 2 k 1 h k + 1 ( k + 1 ) 1 / k ( k + 1 ) ( k + 1 ) / k .

This implies that c h ( , ) could be quite large in some cases. On the other hand, the bound (42) implies that we can modify certain approximations on the boundary when f is unusually small.

4.4 Relaxing the requirements

We consider three types of algorithmic modifications. The algorithm as presented so far requires the exact evaluation of boundary integrals with singular integrands. Here we consider the use of quadrature for computing the form c h ( u , v ) . This has two benefits: it avoids the requirement for exact evaluation of boundary integrals, and it also avoids the singularities.

In addition, we allow for the approximation of δ . For example, the function δ may come from a mesh generator, and we must make provision for some inaccuracies. As a motivating example, we take

(45) δ h = ε sign ( δ ) + δ ,

where ϵ is either fixed or depends on h , even locally. This example has the added benefit of removing the singularity. We present computational results for this example, but our analysis applies to much more general δ h .

Finally, we allow the boundary functions in B h k to be nonzero at vertices. This makes the implementation much easier. On the other hand, we still assume that the boundary functions in B h k vanish on the piecewise linear part Γ 0 of the boundary. If we also require boundary functions in B h k to vanish at all points y i , then we can use the definition of c h ( , ) as before. But if we want to allow them to be nonzero at such points, we need to make a modification of the boundary form as indicated in (32). More precisely, we assume that the form c h and the related inner product and norm are now defined by

(46) c h ( u , v ) = Q Γ δ h 1 u v + i μ i u ( y i ) v ( y i ) , u , v c = Q Γ | δ h | 1 u v + i μ i u ( y i ) v ( y i ) , | v | c = v , v c ,

where Q Γ is a quadrature rule approximating the integral over Γ , and

(47) μ i 10 Q E i | δ h | 1 ψ i 2 ,

where ψ i is the Lagrange basis function that is 1 at y i and E i is the support of ψ i .

Note that the analog of (27) holds:

(48) | c h ( u , v ) | | u | c | v | c u , v B h k .

For finite-element functions, we can evaluate the c h form in (46) using

u ( y i ) v ( y i ) = Q Γ χ i h u v ,

where χ i h is an approximate identity centered at y i . This may simplify implementation on variational-form based systems such as dolfin [33]. The calculation of μ i can be done in the same way.

4.5 Quadrature assumptions

Regarding the quadrature rule, we assume that

Q Γ ( f ) = e Q e ( f ) ,

where Q e is a quadrature rule with positive weights approximating the integral over e without quadrature points at the vertices of e . More precisely, we assume that Q e is generated from a single rule for [0,1] with the usual change of variables:

Q [ 0,1 ] ( f ) = i = 1 q ω i f ( ξ i ) , Q [ a , b ] ( f ) = ( b a ) i = 1 q ω i f ( a + ξ i ( b a ) ) .

Without loss of generality, we assume that 0 < ξ 1 < ξ 2 < < ξ q < 1 and that ξ 1 1 ξ q . For the approximate identity, we pick χ i h to satisfy

Q Γ χ i h u v = u ( y i ) v ( y i ) u , v B h k .

In particular, we assume that χ i h is supported in E i , the union of the two edges meeting at y i .

Let us make some assumptions about δ h and Q e . First of all we assume that

(49) δ δ h 0 ,

that is, we assume that δ h has the same sign in each element as δ . Recall that we assume that the points (8) are vertices in the mesh. For the example in (45), δ δ h = ϵ | δ | + δ 2 0 .

Next, we assume that, for all boundary edges e Γ ,

(50) ( δ δ h ) | δ h | 1 / 2 L ( e ) C D h e D

for some D 1 . As a result,

δ h L ( e ) δ δ h L ( e ) + δ L ( e ) C D h e D δ h L ( e ) 1 / 2 + C Γ h e 2 ,

for all e Γ . Thus the arithmetic-geometric mean inequality implies that, for some constant C ,

(51) δ h L ( e ) C h e 2 e Γ .

To get a sense of the restrictiveness of the assumption (50), consider our motivating example (45). In this case, we have | δ h | ϵ , and | δ δ h | = ϵ . Therefore (50) holds with C = 1 if ϵ h e 2 D for all e Γ . Secondly, we assume that

(52) e ϕ d s Q Γ ( ϕ ) C h m ϕ W m , 1 ( e ) , m > 2 k ,

for all boundary edges e .

4.6 Revised method

We now replace Lemma 1 by the following. Recall the definitions from (30). The revised method is the following: Find u h V h k ( g ) such that, for all v V h k ,

(53) b h ( u h , v ) = Ω h ( E f ) v d x + c h ( g ̂ , v ) .

We need a replacement for Lemma 2. Recall the definition (31) of B h k . Note that (52) implies

(54) e v 2 d s = Q e ( v 2 ) v B h k .

Lemma 4.

Suppose that the quadrature has positive weights and that (52) holds. Then

(55) v L 2 ( Γ ) c 1 h | v | c , v a c 1 h | v | c ,

for all v B h k .

Proof.

From (54),

(56) e E h Γ v L 2 ( e ) 2 = e E h Γ Q e ( v 2 ) e E h Γ max x e | δ h ( x ) | Q e | δ h | 1 v 2 max e max x e | δ h ( x ) | Q Γ | δ h | 1 v 2 .

Recall from (46) that

(57) Q Γ | δ h | 1 v 2 = | v | c 2 i μ i v ( y i ) 2 | v | c 2 ,

since the μ i ’s are positive. From the proof of Lemma 2, we have

v a 2 C h 1 v L 2 ( Γ ) 2 .

The result follows from (51). □

We will prove (28) for the relaxed algorithm in Section 6.

5 Error analysis

5.1 Stability analysis

Unfortunately, the bilinear form b h is not positive definite. However, we are still able to prove stability of the method.

Theorem 1.

Assume that (27), (28), and (34) hold. Suppose that G is a bounded linear functional on V h k and suppose that u h V h k solves

b h ( u h , v ) = G ( v ) v V h k .

Then, assuming

(58) c 1 h 1 2 β ,

we have

u h a 4 3 sup v h W ̊ h k | G ( v h ) | v h a + 4 c 1 h 3 β sup v h B h k | G ( v h ) | | v h | c

and

| u h | c 1 β sup v h W ̊ h k | G ( v h ) | v h a + 2 β sup v h B h k | G ( v h ) | | v h | c .

In particular, Theorem 1 proves that the system (53) is invertible.

Proof.

We can write u h = w h + s h , where w h W ̊ h k and s h B h k . Use (28) to define ϕ h B h k satisfying | ϕ h | c = | s h | c and β | s h | c 2 c h ( s h , ϕ h ) . Then

β | s h | c 2 c h ( s h , ϕ h ) = b h ( u h , ϕ h ) a h ( u h , ϕ h ) = G ( ϕ h ) a h ( u h , ϕ h ) .

Hence, we have

(59) β | s h | c 2 sup v h B h k | G ( v h ) | | v h | c | ϕ h | c + u h a ϕ h a sup v h B h k | G ( v h ) | | v h | c | s h | c + w h a + c 1 h | s h | c ϕ h a sup v h B h k | G ( v h ) | | v h | c | s h | c + c 1 h w h a + c 1 h | s h | c | ϕ h | c = sup v h B h k | G ( v h ) | | v h | c | s h | c + c 1 h w h a + c 1 h | s h | c | s h | c .

Here we used (34) twice. In particular, we used

u h a w h a + s h a w h a + c 1 h | s h | c .

Assuming h c 1 1 2 β we have

3 4 β | s h | c 2 sup v h B h k | G ( v h ) | | v h | c | s h | c + 1 2 β w h a | s h | c .

Hence,

(60) β | s h | c 4 3 sup v h B h k | G ( v h ) | | v h | c + 2 3 β w h a .

Next,

w h a 2 = a h ( w h , w h ) = a h ( u h , w h ) a h ( s h , w h ) = b h ( u h , w h ) a h ( s h , w h ) = G ( w h ) a h ( s h , w h ) .

We therefore have

w h a 2 sup v h W ̊ h k | G ( v h ) | v h a w h a + s h a w h a .

Dividing by w h a and applying (34) and (60), we obtain

w h a sup v h W ̊ h k | G ( v h ) | v h a + s h a sup v h W ̊ h k | G ( v h ) | v h a + c 1 h | s h | c sup v h W ̊ h k | G ( v h ) | v h a + 4 c 1 h 3 β sup v h B h k | G ( v h ) | | v h | c + 2 c 1 h 3 β w h a .

Thus for h c 1 1 2 β we have

(61) w h a 3 2 sup v h W ̊ h k | G ( v h ) | v h a + 2 c 1 h β sup v h B h k | G ( v h ) | | v h | c 3 2 sup v h W ̊ h k | G ( v h ) | v h a + 1 β sup v h B h k | G ( v h ) | | v h | c .

From (60) and (61) we get

β | u h | c = β | s h | c 2 sup v h B h k | G ( v h ) | | v h | c + β sup v h W ̊ h k | G ( v h ) | v h a .

Finally, (34) and (60) again imply

u h a w h a + s h a w h a + c 1 h | s h | c 1 + 2 c 1 h 3 β w h a + 4 c 1 h 3 β sup v h B h k | G ( v h ) | | v h | c 4 3 sup v h W ̊ h k | G ( v h ) | v h a + 4 c 1 h 3 β sup v h B h k | G ( v h ) | | v h | c

for c 1 h 1 2 β . □

5.2 Quasi-optimal error estimates

For clarity, we begin with the algorithm based on V ̊ h k in (17) and exact quadrature for the forms in (20). Note that in this case we have the inf-sup constant β = 1 .

Theorem 2.

Assume Assumptions 1 and 2 hold, and assume that u solves (1) and that 2 E u n 2 L q ( Ω Δ Ω h ) where 1 < q . Define

r q = min 7 2 2 q , 4 3 q .

Let u h V ̊ h k ( g ) solve (21). Then we have

E u u h a inf w V ̊ h k ( g ) 7 3 + 4 c 1 2 h 3 β w E u a + 4 c 1 h 3 β | w E u | c + C h 3 E + h r q K q ,

where C depends on β 1 , E is defined in (23), and

(62) K q = 2 E u n 2 L q ( Ω Δ Ω h ) ,

cf. (25). Similarly,

| E u u h | c inf w V ̊ h k ( g ) 1 + 1 β | E u w | c + 1 β + 2 c 1 h β E u w a + C h 5 / 2 E + h r q 1 / 2 K q .

In the ideal case when E u W 2 , ( Ω ̂ ) , the term h r q simplifies to h 7 / 2 .

Proof.

Let w V ̊ h k ( g ) be arbitrary and define e h = w u h V ̊ h k . Then we see that

b h ( e h , v ) = G ( v ) v V ̊ h k ,

where G ( v ) = G 1 ( v ) + G 2 ( v ) , G 1 ( v ) = b h ( E u u h , v ) and G 2 ( v ) = b h ( w E u , v ) . We can apply Theorem 1 to get bounds for e h = w u h for arbitrary w in terms of bounds for the form G . Thus we need only estimate the forms G i .

Applying (25) to (24), we find

(63) | G 1 ( v ) | E v L 1 ( Ω h \ Ω ) + C h 2 2 / q K q v L p ( Γ ) , 1 p + 1 q = 1 ,

where K q is defined in (62). Recall that W ̊ h k = W h k H 0 1 ( Ω h ) . For v W ̊ h k ,

v L 1 ( Ω h \ Ω ) C h 4 v W 1 ( Ω h \ Ω ) C h 3 v a ,

using a standard inverse estimate. Thus

(64) sup v W ̊ h k | G 1 ( v ) | v a C h 3 E

since the boundary term in (63) vanishes.

Recall the definition (26) of B ̊ h k . Now consider v B ̊ h k . For p 2 , inverse estimates give

v L p ( Γ ) C h 1 / p 1 / 2 v L 2 ( Γ ) C h 1 / p + 1 / 2 | δ | 1 / 2 v L 2 ( Γ ) .

For p < 2 ,

v L p ( Γ ) p = Γ | δ | p / 2 | δ | p / 2 | v | p d x Γ | δ | t p / 2 d x 1 / t Γ | δ | t p / 2 | v | t p d x 1 / t 1 t + 1 t = 1 = Γ | δ | p / ( 2 p ) d x 1 p / 2 Γ | δ | 1 | v | 2 d x 1 / t 1 t = p 2 , 1 t = 1 p 2 .

Taking the p -th root, we get

v L p ( Γ ) Γ | δ | p / ( 2 p ) d x ( 2 p ) / ( 2 p ) | v | c C h | v | c .

Thus for general p ,

v L p ( Γ ) C h r p | v | c , r p = 1 , p 2 , 1 p + 1 2 , p 2 .

Applying this to (63) and using (34) and inverse estimates, we get

| G 1 ( v ) | h 2 E v L ( Ω h \ Ω ) + h 2 2 / q + r p K q | v | c h 2 E v a + h 2 2 / q + r p K q | v | c c 1 h 5 / 2 E | v | c + h 2 2 / q + r p K q | v | c ,

where K q is defined in (62). Note that

2 2 q + r p = 3 2 q , q 2 ( p 2 ) 7 2 3 q , q 2 ( p 2 ) = min 3 2 q , 7 2 3 q = r q 1 2 .

Hence,

(65) h 1 / 2 sup v B ̊ h k | G 1 ( v ) | | v | c C h 3 E + h r q K q .

Now consider G 2 . If we let v W ̊ h k then

G 2 ( v ) = a h ( w E u , v ) w E u a v a .

Hence,

(66) sup v W ̊ h k | G 2 ( v ) | v a w E u a .

For v B ̊ h k , (34) implies

| G 2 ( v ) | w E u a v a + | w E u | c | v | c c 1 h w E u a + | w E u | c | v | c .

Therefore, we have

(67) h sup v B ̊ h k | G 2 ( v ) | | v | c c 1 h w E u a + h | w E u | c .

Combining (64) and (66), we get

(68) sup v W ̊ h k | G ( v h ) | v h a C h 3 E + w E u a .

Combining (65) and (67), we get

(69) h sup v B ̊ h k | G ( v ) | | v | c C h 3 E + h r q u W 2 , q ( Ω ̂ ) + c 1 h w E u a + h | w E u | c .

Applying Theorem 1, we find

(70) w u h a 4 3 w E u a + 4 c 1 3 β c 1 h w E u a + h | w E u | c + C h 3 E + h r q K q , h | w u h | c h β + 2 c 1 h β w E u a + C h 3 E + h r q K q + h β | w E u | c ,

where C depends on β 1 . Therefore

(71) E u u h a E u w a + w u h a 7 3 + 4 c 1 2 h 3 β w E u a + 4 c 1 h 3 β | w E u | c + C h 3 E + h r q K q .

Similarly,

(72) | E u u h | c | E u w | c + | w u h | c 1 + 1 β | E u w | c + 1 β + 2 c 1 h β E u w a + C h 5 / 2 E + h r q 1 / 2 K q .

Taking the infimum over w completes the proof. □

6 Proof of inf-sup

Now we prove (28) for the relaxed algorithm. The main difficulty comes from changing signs for δ h . On parts of the boundary where it is of one sign, we can apply the idea behind (29).

Let us number the basis functions ψ 1 , ψ 2 , , ψ N of B h k associated with boundary nodes x i so that ψ 1 , ψ 2 , , ψ ϰ are the basis functions for the boundary vertices y i where δ changes sign. Note that Assumption 2 implies that h is small enough so that these are not neighboring vertices in the mesh, and thus the supports of ψ i and ψ j do not overlap. Write

u = i = 1 N a i ψ i = s h + i = 1 ϰ a i ψ i .

Define

(73) v = ϕ h + i = 1 ϰ a i ψ i ,

where

(74) ϕ h = s h on x Γ : δ h ( x ) 0 , s h on x Γ : δ h ( x ) 0 , 0 on Γ 0 .

Note that

c h ( s h , ϕ h ) = | s h | c 2 .

Expanding, we find

c h ( u , v ) = | s h | c 2 + i = 1 ϰ a i 2 c h ( ψ i , ψ i ) + a i c h ( s h , ψ i ) + a i c h ( ψ i , ϕ h )

and

(75) | u | c 2 = u , u c = | s h | c 2 + i = 1 ϰ a i 2 | ψ i | c 2 + 2 a i s h , ψ i c .

Therefore

(76) | u | c 2 = c h ( u , v ) + i = 1 ϰ a i 2 | ψ i | c 2 a i 2 c h ( ψ i , ψ i ) + 2 a i s h , ψ i c a i c h ( s h , ψ i ) + a i c h ( ψ i , ϕ h ) .

Using the definition of ϕ h , we have

(77) s h , ψ i c c h ( ϕ h , ψ i ) = Q E i | δ h | 1 ψ i s h Q E i δ h 1 ψ i ϕ h = Q E i ( | δ h | 1 ψ i ( s h sign ( δ h ) ϕ h ) ) = 0 ,

where we recall that E i is the union of the two edges adjacent to y i . Therefore

(78) | u | c 2 = c h ( u , v ) + i = 1 ϰ a i 2 | ψ i | c 2 a i 2 c h ( ψ i , ψ i ) + a i s h , ψ i c a i c h ( s h , ψ i ) .

First of all,

| ψ i | c 2 c h ( ψ i , ψ i ) = Q E i ( | δ h | 1 δ h 1 ( ψ i ) 2 ) 2 Q E i ( | δ h | 1 ( ψ i ) 2 ) .

Define temporarily q i = Q E i ( | δ h | 1 ( ψ i ) 2 ) . Therefore

a i 2 | ψ i | c 2 c h ( ψ i , ψ i ) 2 a i 2 q i .

Similarly,

| s h , ψ i c c h ( s h , ψ i ) | 2 | Q E i ( | δ h | 1 ( s h ψ i ) ) | .

Since s h = u a i ψ i on E i , we find

| Q E i ( | δ h | 1 ( s h ψ i ) ) | = | Q E i ( | δ h | 1 u ψ i a i ψ i 2 | | Q E i ( | δ h | 1 ( u ψ i ) | + | a i | q i .

Using the arithmetic–geometric mean (AGM) inequality,

2 | Q E i ( | δ h | 1 ( u ψ i ) | 1 2 | a i | Q E i | δ h | 1 u 2 + 2 | a i | q i .

Therefore

| a i | | s h , ψ i c c h ( s h , ψ i ) | 1 2 Q E i | δ h | 1 u 2 + 3 a i 2 q i .

Thus (78) becomes

(79) | u | c 2 | c h ( u , v ) | + i = 1 ϰ 1 2 Q E i | δ h | 1 u 2 + 5 a i 2 q i | c h ( u , v ) | + 1 2 | u | c 2 + i = 1 ϰ a i 2 1 2 μ i + 5 q i .

Thus (47) implies

(80) 1 2 | u | c 2 | c h ( u , v ) |

for v defined in (73).

We have thus shown that

(81) | u | c 2 | c h ( u , v ) | | u | c 2 | c h ( u , v ) | | v | c | v | c | u | c

for v defined in (73).

Recall that E i is the union of the two edges meeting at y i . We will show in Section 6.1 that

(82) a i 2 | ψ i | c 2 = a i 2 | ψ i | c , E i 2 C k | u | c , E i 2

for a constant C k depending only on the polynomial degree k and the shape regularity of the mesh.

Thus (82) implies that

(83) | v | c | ϕ h | c + i = 1 ϰ a i ψ i c = | s h | c + i = 1 ϰ a i ψ i c | u | c + 2 i = 1 ϰ a i ψ i c 1 + 2 C k | u | c .

Therefore

(84) | v | c C | u | c ,

as required, proving the inf-sup condition (28) with β = 1 / 2 C by using (81).

6.1 Proof of (82)

Let us focus on a particular zero crossing i and rename basis functions as ϕ i and renumber indices so that i = 0 . Number the other basis functions supported in e ± as ϕ j , ± j = 1 , , k 1 , with ϕ ± k being the nearest vertex basis functions. Let e and e + be the two edges on either side of y i , and let E = e e + . Suppose that the edges e ± can be parameterized by ± x [ 0 , h ± ] . Suppose that

u | e ± = j = 0 ± k b j ϕ j .

To prove (82), we will prove more generally that

(85) j = 0 ± k b i 2 | ϕ j | c , e ± 2 C | u | c , e ± 2

for a constant C to be made explicit. The estimate (85) shows equivalence of two different norms on a finite dimensional space. There may be many ways to prove this, but we choose a simplification to facilitate this.

Let us introduce a simplifying assumption about δ . For each triangle T having a boundary edge e Γ , choose coordinates so that e corresponds to ( x , 0 ) : 0 x h .

Assumption 3.

We assume that δ is such that, for all boundary edges e ,

(86) | δ ( x ) | ζ x ( h x ) 0 < x < h ,

where ζ > 0 is independent of e and h .

By construction, the domain depicted in Figure 3 satisfies Assumption 3; to prove this, we need only to evaluate ζ for a circle of radius 1. In our example in Section 3, we examine such a circle, and we can now show that ζ = 1/2 . In particular, for δ as defined in (6), in appropriate coordinates we have

δ ( ( ξ + h ) / 2 ) = 1 ξ 2 1 h 2 = h 2 ξ 2 r ( ξ ) , | ξ | h ,

where r ( ξ ) = 1 ξ 2 + 1 h 2 1 is analytic for | ξ | < 1 and r ( ξ ) 1/2 for | ξ | < 1 , provided that h 1 .

Returning to the proof of (82), define

(87) v Q , e ± = max j v ξ j ± .

Then

(88) Q e ± | δ h | 1 = j ω j ± δ h ξ j ± 1 j ω j ± δ h 1 Q , e ± = h ± δ h 1 Q , e ± .

If (50) holds, then for all x e ± we have

| δ ( x ) | | δ h ( x ) | + | δ ( x ) δ h ( x ) | | δ h ( x ) | + C D h e ± D | δ h ( x ) | 1 / 2 | δ h ( x ) | + C D h e ± D + 1 .

Therefore Assumption 3 implies

| δ h ( x ) | | δ ( x ) | C D h e ± D + 1 ζ x ( h e ± x ) C D h e ± D + 1 .

Thus

(89) δ h 1 Q , e ± ζ ξ 1 ( 1 ξ 1 ) h ± 2 C D h e ± D + 1 1 = h ± 2 ζ ξ 1 ( 1 ξ 1 ) C D h e ± D 1 1 .

If D > 1 , then

(90) δ h 1 Q , e ± 2 h ± 2 ζ ξ 1 ( 1 ξ 1 ) ,

provided that

(91) C D h ± D 1 1 2 ξ 1 ( 1 ξ 1 ) ζ .

Therefore (88) implies

(92) Q e ± | δ h | 1 2 h ± 1 ζ ξ 1 ( 1 ξ 1 )

for h ± satisfying (91).

By the equivalence of norms on a finite dimensional vector space, we have

(93) j = 0 ± k b j 2 ϕ j L 2 ( e ± ) 2 c k u L 2 ( e ± ) 2 .

This is proved by scaling separately by h ± on each interval e ± to the unit interval, as follows. Define

ϕ j | e ± ( ± x h ± ) = ϕ ̂ j ( x ) x [ 0,1 ] .

Then c k is chosen so that

j = 0 k b i 2 ϕ ̂ j L 2 ( [ 0,1 ] ) 2 c k j = 0 k b j ϕ ̂ j L 2 ( [ 0,1 ] ) 2

for all { b j } R k + 1 . This completes the proof of (93). Note that (54) implies

u L 2 ( e ± ) 2 = Q e ± ( u 2 ) δ h L ( e ± ) Q e ± | δ h | 1 u 2 = δ h L ( e ± ) | u | c , e ± 2 .

Thus (93) and (51) imply

(94) j = 0 ± k b i 2 ϕ j L 2 ( e ± ) 2 c k δ h L ( e ± ) | u | c , e ± 2 C c k h ± 2 | u | c , e ± 2 ,

where C is the constant in (51). Recalling (54), (90), and the norm defined in (87), we have

(95) | ϕ j | c , e ± 2 δ h 1 Q , e ± Q ϕ j 2 = δ h 1 Q , e ± ϕ j L 2 ( e ± ) 2 2 h ± 2 ζ ξ 1 ( 1 ξ 1 ) ϕ j L 2 ( e ± ) 2 .

Combining (94) and (95) yields

j = 0 ± k b i 2 | ϕ j | c , e ± 2 2 C c k ζ ξ 1 ( 1 ξ 1 ) | u | c , e ± 2

proving (85). Thus

a i 2 | ψ i | c 2 = b 0 2 | ϕ 0 | c , e + 2 + | ϕ 0 | c , e 2 C k | u | c , E 2 ,

where E = e e + , as claimed, with

C k = 4 C c k ζ ξ 1 ( 1 ξ 1 ) ,

provided that the constant D in (50) satisfies D > 1 and that the mesh size is small enough that (58) holds. Thus we have proved the following theorem.

Theorem 3.

Suppose that δ h satisfies (49) and (50), with the constant D > 1 , that the mesh size is small enough that (58) holds, that the mesh is nondegenerate, that the quadrature rule satisfies (52), and that Assumptions 13 hold. Then the inf-sup bound (28) holds.

6.2 Estimates for the general algorithm

The main change to the arguments in the proof of Theorem 2 is that (22) and subsequent estimates need to be augmented. The replacement for (22) reads

(96) b h ( E u , v ) Ω h ( E f ) v d x = Ω h \ Ω Δ E u E f v d x + Q Γ ( δ h 1 ( E u ) v ) Γ E u n v d s .

Note that

Q Γ ( δ h 1 ( E u ) v ) Γ E u n v d s c h ( g ̂ , v ) = Q Γ ( δ h 1 ( E u g ̂ ) v ) Γ E u n v d s .

Thus subtracting (53) from (96) revises (24) to be

(97) | G 1 ( v ) | = | b h ( E u u h , v ) | E v L 1 ( Ω h \ Ω ) + Γ δ 1 ( E u g ̂ ) v d s Q Γ ( δ h 1 ( E u g ̂ ) v ) + C h 2 2 / q E u W 2 , q ( Ω ̂ ) v L p ( Γ ) , 1 p + 1 q = 1 ,

where we have used (25). Therefore

(98) | G 1 ( v ) | E v L 1 ( Ω h \ Ω ) + Q h | v | c + C h 2 2 / q E u W 2 , q ( Ω ̂ ) v L p ( Γ ) ,

where the quadrature error Q h is defined by

(99) Q h = sup v B h k 1 | v | c Γ δ 1 ( E u g ̂ ) v d s Q Γ ( δ h 1 ( E u g ̂ ) v ) .

The estimate (64) is unchanged since the boundary terms again vanish. Using (55), estimate (65) becomes

(100) h sup v B h k | G 1 ( v ) | | v | c C h 3 E + h r q u W 2 , q ( Ω ̂ ) + h Q h .

The estimates for G 2 are unchanged. Thus (68) is also unchanged. Combining (100) and (67), we get the following analog of (69):

(101) h sup v B h k | G ( v ) | | v | c C h 3 E + h r q u W 2 , q ( Ω ̂ ) + c 1 h w E u a + h | w E u | c + h Q h .

Applying Theorem 1, we get

(102) E u u h a C inf w V h k ( g ) w E u a + h | w E u | c + C h 3 E + h r q u W 2 , q ( Ω ̂ ) + h Q h .

Similarly,

(103) | E u u h | c C inf w V h k ( g ) | E u w | c + E u w a + C h 5 / 2 E + h r q 1 / 2 u W 2 , q ( Ω ̂ ) + Q h .

6.3 Quadrature error

The quadrature error (99) can be written in terms of the piecewise smooth function S = δ 1 ( E u g ̂ ) as

(104) Q h = sup v B h k 1 | v | c Γ S v d s Q Γ δ δ h 1 S v .

To estimate Q h , consider

(105) Γ S v d s Q Γ δ δ h 1 S v Γ S v d s Q Γ ( S v ) + Q Γ ( 1 δ δ h 1 S v ) .

Introduce the broken Sobolev norms W ̃ p m ( Γ ) in the usual way for functions that are smooth on each element of Γ .

The first term on the right-hand side of (105) can be estimated using (52) and inverse estimates:

(106) Γ S v d s Q Γ ( S v ) C h m S v W ̃ 1 m Γ C h m S W ̃ m Γ v W ̃ k , 1 ( Γ ) C h m k + 1 / 2 S W ̃ m , ( Γ ) | v | L 2 ( Γ ) C h m k + 3 / 2 S W ̃ m , ( Γ ) | v | c .

For the second term on the right-hand side of (105), we have

(107) Q Γ ( 1 δ δ h 1 S v ) = Q Γ ( ( δ h δ ) δ h 1 / 2 S δ h 1 / 2 v ) C D h D S L ( Γ ) | v | c .

Combining (106) and (107) yields

(108) Q h δ δ h L ( Γ ) | S | c + C h m k + 3 / 2 S W ̃ m , ( Γ ) .

Combining (102), (103), and (108), we have proved the following theorem.

Theorem 4.

Assume that the inverse estimates

v L p ( Γ ) C h 1 / p 1 / 2 v L 2 ( Γ ) , v W 1 k ( Γ ) C h k + 1 / 2 v L 2 ( Γ )

hold for p 2 , k 1 , and v B h k . Assume that Assumption 2 and (50) hold. Suppose that the quadrature has positive weights and that (52) holds, and that u solves (1) and that E u W 2 , ( Ω ̂ ) . Let u h V h k ( g ) solve (53). Then we have

(109) E u u h a inf w V h k ( g ) 7 3 + c 1 h E u w a + h | E u w | c + C h 3 E + h 7 / 2 E u W 2 , ( Ω ̂ ) + C h D | S | c + C h m k + 2 S W ̃ m , ( Γ ) , | E u u h | c inf w V h k ( g ) 2 | E u w | c + ( 1 + c 1 h ) E u w a + C h 5 / 2 E + h 3 E u W 2 , ( Ω ̂ ) + C h D | S | c + C h m k + 2 S W ̃ m , ( Γ ) ,

where E is defined in (23) and S is defined in (13).

If D 7 / 2 , the estimates in (109) are as good as in (63), at least for appropriate quadrature rules. However, our computations in Section 9 suggest that there may be benefit to taking δ δ h L ( Γ ) even smaller.

7 Approximation results

We have proved stability and quasi-optimal approximation in certain norms, but we need to translate this into more conventional representations. A key point is that, so far, the form c h ( v , v ) could be arbitrarily large.

In Theorems 2 and 4 we can take w = ( E u ) I , but the issue is to estimate

e δ 1 ( E u ( E u ) I ) 2 d s .

We can write E u = δ S + g ̂ , and so it suffices to estimate

e δ 1 ( δ S ( δ S ) I ) 2 d s , e δ 1 ( g ̂ ( g ̂ ) I ) 2 d s .

For the first of these, it is tempting to investigate how interpolation commutes with multiplication by δ . When δ is very small, we can just take ( δ S ) I to be zero, and we get a small result. For the second, when δ is small, g ̂ is very close to g , which may provide some benefit. But first we limit our discussion to a simpler situation.

Lemma 5.

Let e denote the interval [ 0 , h ] . Let δ ̂ ( x ) = x ( h x ) . Suppose that ϕ H 0 1 ( e ) . Then

(110) sup r e ϕ ( r ) 2 δ ̂ ( r ) d r 1 h e ϕ ( t ) 2 d t

for all ϕ H 0 1 ( e ) .

Proof.

We begin with h = 1 . For ϕ C c ( 0,1 ) ,

ϕ ( r ) 2 = 0 r ϕ ( t ) d t 2 = r 1 ϕ ( t ) d t 2 .

Therefore

ϕ ( r ) 2 = ( 1 r ) 0 r ϕ ( t ) d t 2 + r r 1 ϕ ( t ) d t 2 .

From the Cauchy–Schwarz inequality,

(111) ϕ ( r ) 2 r ( 1 r ) 0 r ϕ ( t ) 2 d t + r ( 1 r ) r 1 ϕ ( t ) 2 d t = r ( 1 r ) 0 1 ϕ ( t ) 2 d t .

The lemma follows from the density of C c ( 0,1 ) in H 0 1 ( 0,1 ) . The result for h 1 follows by scaling variables. □

Lemma 6.

Assume that Assumption 3 holds. Then

| δ | 1 / 2 ( u u I ) L 2 ( e ) C h k u H k + 1 ( e ) ,

where the constant C does not depend on e .

Proof.

Applying Lemma 5 with ϕ = u u I , we find from (86) that

(112) | δ | 1 / 2 ( u u I ) L 2 ( e ) | e | 1 / 2 | δ | 1 / 2 ( u u I ) L ( e ) 1 ζ | u u I | H 1 ( e ) C h k | u | H k + 1 ( e ) ,

since the restriction of the interpolant to e is the interpolant of the restriction, for Lagrange elements. □

Theorem 5.

Suppose that the assumptions of Theorem 4 hold and that Assumption 3 holds. Let u h V h k ( g ) solve (53). Then we have

(113) E u u h a C h k E u H k + 1 ( Ω ) + E u H k + 1 ( Ω ) + C h 3 E + h 7 / 2 E u W 2 , ( Ω ̂ ) + C h D | S | c + C h m k + 2 S W ̃ m , ( Γ ) , | E u u h | c C h k E u H k + 1 ( Ω ) + E u H k + 1 ( Ω ) + C h 5 / 2 E + h 3 E u W 2 , ( Ω ̂ ) + C h D | S | c + C h m k + 2 S W ̃ m , ( Γ ) ,

where E is defined in (23) and S is defined in (13).

If we require only | u | H k + 1 ( T ) to be bounded, we get a sub-optimal estimate:

| u u I | H 1 ( e ) C h k 1 / 2 | u | H k + 1 ( T ) .

Thus

| δ | 1 / 2 ( u u I ) L 2 ( e ) C h k 1 / 2 u H k + 1 ( T )

is the best possible estimate.

8 Implementation

The modification of W h k to obtain the space V ̊ h k of piecewise polynomials vanishing at boundary vertices is not trivial to implement in automated systems like FEniCS [33]. Thus we took the approach of modifying c h as described in Section 4.4. The default approach to boundary integrals in dolfin, which it inherits from FIAT, is to choose a Gauss-type rule with order m sufficiently large that

(114) e v 2 d s = Q e ( v 2 ) v B h k .

We also experimented with δ h given by (45) for various values of ϵ . The answers do not depend on ϵ for ϵ small, as indicated in Table 3. We were even able to have ϵ = 0 for (45) using dolfin, as our estimates confirm.

Table 3:

Unit disc domain. Errors u h u I L 2 ( Ω h ) , u h u I H 1 ( Ω h ) , and | δ | 1 / 2 ( u h u I ) L 2 ( Ω h ) as a function of ϵ and maximum mesh size (hmax) for the Robin-like approximation (21) but modified as in Section 4.4, for piecewise quadratic polynomials ( k = 2 ) . Key: M is the value of the meshsize input parameter to the mshr function circle used to generate the mesh; segs is the number of boundary edges.

k M segs hmax ϵ L2 err H1 err bdry err
2 64 320 3.5e−02 1.0e−04 1.1e−03 2.1e−03 1.3e−01
2 64 320 3.5e−02 1.0e−05 1.1e−04 1.8e−03 2.5e−02
2 64 320 3.5e−02 1.0e−06 1.2e−05 1.8e−03 3.2e−03
2 64 320 3.5e−02 1.0e−07 6.0e−06 1.8e−03 3.2e−04
2 64 320 3.5e−02 1.0e−08 5.9e−06 1.8e−03 4.3e−05
2 64 320 3.5e−02 1.0e−10 5.9e−06 1.8e−03 3.1e−05
2 128 640 1.8e−02 1.0e−07 1.3e−06 4.4e−04 6.4e−04
2 128 640 1.8e−02 1.0e−08 7.3e−07 4.4e−04 6.5e−05
2 128 640 1.8e−02 1.0e−09 7.2e−07 4.4e−04 7.3e−06
2 128 640 1.8e−02 1.0e−10 7.2e−07 4.4e−04 3.9e−06
2 256 1,280 9.0e−03 1.0e−09 8.9e−08 1.1e−04 1.3e−05
2 256 1,280 9.0e−03 1.0e−10 8.9e−08 1.1e−04 1.3e−06

9 Computational experiments

Here we consider two examples. In the first, Ω h Ω and δ > 0 . In the second, Ω is not convex and δ is of both signs.

9.1 Return to the circle

We return now to the computational test problem described in Section 3. By varying ϵ , we were able to assess the impact of an approximate δ as studied in Section 4.4. We see that there are visible effects. We have highlighted (in boldface) the smallest value of ϵ for which there is an impact in Table 3. Thus it appears that taking δ δ h L ( Γ ) h k + 1 is a good choice.

We see from Table 4 and Figure 5 that the H 1 ( Ω h ) error is optimal order for k 3 , consistent with Theorem 4. In these cases, the L 2 ( Ω h ) error is also optimal order, and the boundary error is higher order for quadratics. For k 4 our numerical experiments seem to predict the error

u u h H 1 ( Ω h ) C h 7 / 2 + h k ,

which coincides with Theorem 4.

Table 4:

Unit disc domain. Errors u h u I L 2 ( Ω h ) , u h u I H 1 ( Ω h ) , and | δ 1 / 2 ( u h u I ) L 2 ( Ω h ) as a function of mesh size (hmax) for the method (53) for various polynomial degrees k . The fudge factor ϵ was taken to be 1 0 13 . Results were insignificantly different for smaller values, including ϵ = 0 . Key: M is the value of the meshsize input parameter to the mshr function circle used to generate the mesh. The number of boundary edges was set to 5 M , and hmax is the maximum mesh size.

k M hmax L2 error rate H1 error rate bdry err rate
1 16 0.135 0.0264 1.95 0.545 0.96 0.292 1.04
1 32 0.0688 0.00683 1.95 0.277 0.98 0.145 1.01
1 64 0.0353 0.00169 2.01 0.137 1.02 0.0724 1.00
2 16 0.135 3.71e−04 2.88 0.0278 1.90 0.00177 2.71
2 32 0.0688 4.80e−05 2.95 0.00719 1.95 2.52e−04 2.81
2 64 0.0353 5.94e−06 3.02 0.00179 2.00 3.12e−05 3.02
3 16 0.135 8.43e−06 3.94 7.07e−04 2.91 5.22e−04 2.98
3 32 0.0688 5.39e−07 3.97 9.25e−05 2.93 6.52e−05 3.00
3 64 0.0353 3.35e−08 4.00 1.15e−05 3.01 8.13e−06 3.01
4 16 0.135 8.43e−06 3.99 7.07e−05 3.45 5.34e−04 2.97
4 32 0.0688 5.27e−07 4.00 6.38e−06 3.47 6.74e−05 2.99
4 64 0.0353 3.29e−08 4.00 5.69e−07 3.49 8.47e−06 2.99
5 16 0.135 8.43e−06 3.99 6.80e−05 3.45 5.35e−04 2.97
5 32 0.0688 5.27e−07 4.00 6.11e−06 3.48 6.75e−05 2.99
5 64 0.0353 3.30e−08 4.00 5.45e−07 3.49 8.47e−06 2.99

It appears from Table 4 that the boundary error term

| δ | 1 / 2 ( u u h ) L 2 ( Ω h ) C h 3 k 2 ,

which is consistent with Theorem 4.

Comparing Tables 2 and 4, we see that the errors are almost identical for degrees k = 2 and k = 3 . The Robin method is only slightly less accurate for higher degrees. Note that the condition number for the Robin method can be quite large; we used direct methods to solve the linear systems in both cases.

Figure 5: 
Errors 




u


h


−


u


I




${u}_{h}-{u}_{I}$



 in (A) 




L


2



(



Ω


h



)



${L}^{2}\left({{\Omega}}_{h}\right)$



 and (B) 




H


1



(



Ω


h



)



${H}^{1}\left({{\Omega}}_{h}\right)$



 as a function of the maximum mesh size for the method (21). The asterisks indicate data for (A) 


k
=
4


$k=4$



 and (B) 


k
=
5


$k=5$



.
Figure 5:

Errors u h u I in (A) L 2 ( Ω h ) and (B) H 1 ( Ω h ) as a function of the maximum mesh size for the method (21). The asterisks indicate data for (A) k = 4 and (B) k = 5 .

9.2 An example with δ < 0

Now consider the case where Ω is a disc of radius 1 centered at the origin, having a concentric disc of radius R < 1 removed.

For boundary value problem, we take R = 1 / 2 and Δ u = f , with

u ( x , y ) = ( x 2 + y 2 ) 5 ( x 2 + y 2 ) 2 + 4 ( x 2 + y 2 ) 3 , f = 4 + 80 ( x 2 + y 2 ) 144 ( x 2 + y 2 ) 2

in the computational experiments described in Table 5. Note that u vanishes on both boundary arcs, and that the computed errors are consistent with the error estimates in Theorem 4.

Table 5:

Disc with a disc removed. Errors u h u I measured in L 2 ( Ω h ) (L2 error), H 1 ( Ω h ) (H1 error), and L 2 ( Ω h ) (bdry error) as a function of mesh size (hmax) for the method (53) for selected polynomial degrees k . Here ϵ = 1 0 9 . Key: M is the value of the meshsize input parameter to the mshr function circle used to generate the mesh. The number of boundary edges for the outer boundary was set to 4 M , and the number of boundary edges for the inner boundary was set to 2 M .

k M hmax L2 error H1 error bdry error
2 16 0.132 8.76e−04 6.87e−02 1.39e−04
2 32 0.070 1.20e−04 1.84e−02 9.64e−06
2 64 0.036 1.54e−05 4.68e−03 6.51e−07
3 16 0.132 2.90e−05 2.29e−03 6.59e−05
3 32 0.070 1.89e−06 3.07e−04 4.13e−06
3 64 0.036 1.17e−07 3.93e−05 2.47e−07
4 16 0.132 2.23e−05 3.37e−04 7.24e−05
4 32 0.070 1.39e−06 2.97e−05 4.57e−06
4 64 0.036 8.10e−08 2.61e−06 2.76e−07

10 Boundary layers

It is natural to expect the error with various boundary approximations might be limited to a boundary layer, with the interior error of a smaller magnitude. Our observations indicate something like this, but the behavior is more complex. In Figure 6, we see two computations done on the same mesh based on a triangulation of Ω h with Ω h having 80 segments and using piecewise-quadratic approximation. In Figure 6(A), we see the simple polygonal approximation (3). In this case, the error is somewhat larger near the boundary, but it does not decay to zero in the interior. Thus there is a significant pollution effect away from the boundary. On the other hand, Figure 6(B) shows what happens for the Robin-like method (21). Now we see that the error does decay towards zero in the interior, with the majority of the error concentrated at the boundary.

Figure 6: 
Error with piecewise quadratics on a mesh with 


∂


Ω


h




$\partial {{\Omega}}_{h}$



 having 80 segments. The mesh is drawn in the plane corresponding to zero error. (A) The method (3), no boundary integral corrections. The error is uniformly positive. (B) The Robin-like method (21). The error oscillates around zero. Note the factor of ten difference in scales in the error plots.
Figure 6:

Error with piecewise quadratics on a mesh with Ω h having 80 segments. The mesh is drawn in the plane corresponding to zero error. (A) The method (3), no boundary integral corrections. The error is uniformly positive. (B) The Robin-like method (21). The error oscillates around zero. Note the factor of ten difference in scales in the error plots.

11 Higher order and symmetric methods

The Robin-type method presented in the previous section is at most of O ( h 7 / 2 ) . High-order methods using the same technique do not lead to symmetric systems. For simplicity assume that g 0 . Using that

u | Ω h + δ u n Ω h + δ 2 2 2 u n 2 Ω h C δ 3 u W 3 ( Ω ) ,

we define

(115) b h ( u , v ) = a h ( u , v ) + Ω h δ 1 u v d s + Ω h δ 2 2 u n 2 v d s .

Unfortunately, b h is not symmetric.

One way to have higher-order, symmetric methods is by symmetrizing the approach of Bramble–Dupont–Thomée. Recall that Bramble et al. [8] developed arbitrary order methods, but that the bilinear forms are not symmetric. The lowest order method was presented in Section 2, where the bilinear N h is given by (5). One way to symmetrize N h and maintain the same convergence rates is by introducing the bilinear form:

M h ( u , v ) = N h ( u , v ) + Ω h μ δ h 1 v n u + δ u n d s .

This is precisely what is done in ref. [8], eq.  (3.12)]. We see that

M h ( u , v ) = a h ( u , v ) + Ω h μ δ h 1 δ u n v n + u n v + v n u d s + μ h Ω h u v d s

is clearly symmetric. It would be very interesting if one can symmetrize even higher order methods.

12 Proof of (25)

For each edge e in the triangulation on Γ , we can choose coordinates so that the normal direction in (12) is the y -coordinate:

(116) | δ ( x ) | 1 E u ( x , 0 ) + δ ( x ) E u n ( x , 0 ) g ̂ ( x , 0 ) = | δ ( x ) | 1 0 δ ( x ) ( s δ ( x ) ) 2 E u n 2 ( x , s ) d s | δ ( x ) | 1 0 δ ( x ) | s δ ( x ) | p d s 1 / p 0 δ ( x ) 2 E u n 2 ( x , s ) q d s 1 / q C h 2 2 / q 0 δ ( x ) 2 E u n 2 ( x , s ) q d s 1 / q .

Here we have used the simplified notation δ ( x , 0 ) = δ ( x ) . Recall from (41) that δ = O h 2 . Therefore

(117) e δ 1 E u + δ E u n g ̂ v d x C h 2 2 / q 0 h 0 δ ( x ) 2 E u n 2 ( x , s ) q d s 1 / q | v ( x ) | d x C h 2 2 / q 0 h 0 δ ( x ) 2 E u n 2 ( x , s ) q d s d x 1 / q e | v ( x ) | p d x 1 / p .

Summing over all edges e and applying Hölder’s inequality one more time completes the proof of (25).

In the case that q = , this simplifies to

e δ 1 E u + δ E u n g ̂ v d x C 2 E u n 2 L ( Ω Δ Ω h ) e | δ ( x ) | | v ( x ) | d x ,

and thus we see there is no singularity due to the zeroes of δ .

13 Piecewise smoothness of S

Recall the function S defined in (13). For each edge e in the triangulation on Γ , we can choose coordinates so that the normal direction in (12) is the y -coordinate.

The first term is clearly smooth if E u is smooth, so we focus on the second. Choosing σ = s / δ ( x ) we see from (14) that

(118) S ̂ ( x ) = δ 2 ( x ) 0 δ ( x ) ( s δ ( x ) ) 2 E u n 2 ( x , s ) d s = 0 1 ( σ 1 ) 2 E u n 2 ( x , σ δ ( x ) ) d σ .

Thus if E u is smooth, then S ̂ is piecewise smooth, and thus S = E u n + δ S ̂ is also piecewise smooth.

14 Conclusions and perspectives

We have presented and analyzed a parameter-free method to impose boundary conditions for the Poisson equation with curved boundaries. The analysis involves a theory for general constraints which can be applied to other methods. For example, it can be applied to Nitsche’s method. In this case, the exponent in the linking lemma is zero. The stability condition in the new analysis requires c 1 h to be sufficiently small. This can be understood as explaining why γ in Nitsche’s method needs to be sufficiently large.

Assumption 3 is used in only two places, in proving (85) and in approximation results in Section 7. It is possible that this assumption can be relaxed substantially. It would also be of interest to know if the fitted-mesh requirement, that the vertices of Ω h belong to Ω , can be relaxed. We have not studied L 2 error estimates, although these are known for the method in ref. [8]. Similarly, we have not considered extensions to 3D, but this would also of interest. However, we have been able to extend these results to vector-valued functions in the context of the Stokes equations [35].


Corresponding author: L. Ridgway Scott, The University of Chicago, Emeritus, Chicago, IL 60637, USA, E-mail: 

Funding source: NSF DMS

Award Identifier / Grant number: 2309606

Acknowledgments

We thank Rob Kirby and Anders Logg for valuable information regarding quadrature in dolfin.

  1. Research ethics: Not applicable.

  2. Author contributions: The authors have accepted responsibility for the entire content of this manuscript and approved its submission.

  3. Competing interests: The authors state no conflict of interest.

  4. Research funding: Guzmán was funded by NSF DMS 2309606.

  5. Data availability: The raw data and codes can be obtained on request from the corresponding author.

References

[1] A. Berger, R. Scott, and G. Strang, “Approximate boundary conditions in the finite element method,” in Symposia Mathematica, vol. 10, London, Academic Press, 1972, pp. 295–313.Search in Google Scholar

[2] Z. Li, T. Lin, and X. Wu, “New cartesian grid methods for interface problems using the finite element formulation,” Numer. Math., vol. 96, no. 1, pp. 61–98, 2003. https://doi.org/10.1007/s00211-003-0473-x.Search in Google Scholar

[3] L. R. Scott, “Finite element techniques for curved boundaries,” Ph.D. dissertation, Massachusetts Institute of Technology, 1973.Search in Google Scholar

[4] R. Scott, “Interpolated boundary conditions in the finite element method,” SIAM J. Numer. Anal., vol. 12, no. 3, pp. 404–427, 1975. https://doi.org/10.1137/0712032.Search in Google Scholar

[5] J. Nitsche, “Über ein Variationsprinzip zur Lösung von Dirichlet-Problemen bei Verwendung von Teilräumen, die keinen Randbedingungen unterworfen sind,” Abh. Math. Semin. Univ. Hambg., vol. 36, no. 1, pp. 9–15, 1971. https://doi.org/10.1007/bf02995904.Search in Google Scholar

[6] A. Hansbo and P. Hansbo, “An unfitted finite element method, based on Nitsche’s method, for elliptic interface problems,” Comput. Methods Appl. Mech. Eng., vol. 191, nos. 47–48, pp. 5537–5552, 2002. https://doi.org/10.1016/s0045-7825(02)00524-8.Search in Google Scholar

[7] E. Burman, “Ghost penalty,” C. R. Math., vol. 348, nos. 21–22, pp. 1217–1220, 2010. https://doi.org/10.1016/j.crma.2010.10.006.Search in Google Scholar

[8] J. H. Bramble, T. Dupont, and V. Thomée, “Projection methods for Dirichlet’s problem in approximating polygonal domains with boundary-value corrections,” Math. Comput., vol. 26, no. 120, pp. 869–879, 1972. https://doi.org/10.1090/s0025-5718-1972-0343657-7.Search in Google Scholar

[9] J. H. Bramble and J. T. King, “A robust finite element method for nonhomogeneous Dirichlet problems in domains with curved boundaries,” Math. Comput., vol. 63, no. 207, pp. 1–17, 1994. https://doi.org/10.2307/2153559.Search in Google Scholar

[10] E. Burman, P. Hansbo, and M. Larson, “A cut finite element method with boundary value correction,” Math. Comput., vol. 87, no. 310, pp. 633–657, 2018. https://doi.org/10.1090/mcom/3240.Search in Google Scholar

[11] E. Burman, P. Hansbo, and M. G. Larson, “Dirichlet boundary value correction using Lagrange multipliers,” BIT Numer. Math., vol. 60, no. 1, pp. 235–260, 2020. https://doi.org/10.1007/s10543-019-00773-4.Search in Google Scholar

[12] J. Cheung, M. Perego, P. Bochev, and M. Gunzburger, “Optimally accurate higher-order finite element methods for polytopial approximations of domains with smooth boundaries,” Math. Comput., vol. 88, no. 319, pp. 2187–2219, 2019. https://doi.org/10.1090/mcom/3415.Search in Google Scholar

[13] B. Cockburn, W. Qiu, and M. Solano, “A priori error analysis for HDG methods using extensions from subdomains to achieve boundary conformity,” Math. Comput., vol. 83, no. 286, pp. 665–699, 2014. https://doi.org/10.1090/s0025-5718-2013-02747-0.Search in Google Scholar

[14] B. Cockburn and M. Solano, “Solving dirichlet boundary-value problems on curved domains by extensions from subdomains,” SIAM J. Sci. Comput., vol. 34, no. 1, pp. A497–A519, 2012. https://doi.org/10.1137/100805200.Search in Google Scholar

[15] T. Dupont, “L2 error estimates for projection methods for parabolic equations in approximating domains,” in Mathematical Aspects of Finite Elements in Partial Differential Equations, London, Elsevier, 1974, pp. 313–352.10.1016/B978-0-12-208350-1.50015-7Search in Google Scholar

[16] R. H. W. Hoppe, “A penalty method for the approximate solution of stationary Maxwell equations,” Numer. Math., vol. 36, no. 4, pp. 389–403, 1981. https://doi.org/10.1007/bf01395954.Search in Google Scholar

[17] A. Main and G. Scovazzi, “The shifted boundary method for embedded domain computations. Part I: Poisson and Stokes problems,” J. Comput. Phys., vol. 372, pp. 972–995, 2018, https://doi.org/10.1016/j.jcp.2017.10.026.Search in Google Scholar

[18] A. Main and G. Scovazzi, “The shifted boundary method for embedded domain computations. Part II: linear advection–diffusion and incompressible Navier–Stokes equations,” J. Comput. Phys., vol. 372, pp. 996–1026, 2018, https://doi.org/10.1016/j.jcp.2018.01.023.Search in Google Scholar

[19] M. Solano and F. Vargas, “A high order HDG method for Stokes flow in curved domains,” J. Sci. Comput., vol. 79, no. 3, pp. 1505–1533, 2019. https://doi.org/10.1007/s10915-018-00901-2.Search in Google Scholar

[20] S. C. Brenner and L. R. Scott, The Mathematical Theory of Finite Element Methods, vol. 15 TAM, 3rd ed., New York, Springer Science & Business Media, 2008.10.1007/978-0-387-75934-0Search in Google Scholar

[21] J. J. Blair, “Higher order approximations to the boundary conditions for the finite element method,” Math. Comput., vol. 30, no. 134, pp. 250–262, 1976. https://doi.org/10.2307/2005966.Search in Google Scholar

[22] A. Hansbo and P. Hansbo, “A finite element method for the simulation of strong and weak discontinuities in solid mechanics,” Comput. Methods Appl. Mech. Eng., vol. 193, nos. 33–35, pp. 3523–3540, 2004. https://doi.org/10.1016/j.cma.2003.12.041.Search in Google Scholar

[23] S. Bertoluzza, M. Pennacchio, and D. Prada, “High order VEM on curved domains,” arXiv preprint arXiv:1811.04755, 2018.10.4171/rlm/853Search in Google Scholar

[24] L. B. Da Veiga, F. Brezzi, L. D. Marini, and A. Russo, “Virtual elements and curved edges,” arXiv preprint arXiv:1910.10184, 2019.Search in Google Scholar

[25] N. M. Atallah, C. Canuto, and G. Scovazzi, “Analysis of the shifted boundary method for the Stokes problem,” Comput. Methods Appl. Mech. Eng., vol. 358, p. 112609, 2020, https://doi.org/10.1016/j.cma.2019.112609.Search in Google Scholar

[26] N. M. Atallah, C. Canuto, and G. Scovazzi, “The second-generation shifted boundary method and its numerical analysis,” arXiv preprint arXiv:2004.10584, 2020.10.1016/j.cma.2020.113341Search in Google Scholar

[27] N. Sánchez, T. Sánchez-Vizuet, and M. E. Solano, “Afternote to “coupling at a distance”: convergence analysis and a priori error estimates,” Comput. Methods Appl. Math., vol. 22, no. 4, pp. 945–970, 2022. https://doi.org/10.1515/cmam-2022-0004.Search in Google Scholar

[28] R. Oyarzúa, M. Solano, and P. Zúñiga, “A high order mixed-fem for diffusion problems on curved domains,” J. Sci. Comput., vol. 79, no. 1, pp. 49–78, 2019. https://doi.org/10.1007/s10915-018-0840-5.Search in Google Scholar

[29] R. Oyarzúa, M. Solano, and P. Zúñiga, “A priori and a posteriori error analyses of a high order unfitted mixed-FEM for Stokes flow,” Comput. Methods Appl. Mech. Eng., vol. 360, p. 112780, 2020, https://doi.org/10.1016/j.cma.2019.112780.Search in Google Scholar

[30] L. Blank, A. Caiazzo, F. Chouly, A. Lozinski, and J. Mura, “Analysis of a stabilized penalty-free Nitsche method for the Brinkman, Stokes, and Darcy problems,” ESAIM: Math. Model. Numer. Anal., vol. 52, no. 6, pp. 2149–2185, 2018. https://doi.org/10.1051/m2an/2018063.Search in Google Scholar

[31] T. Boiveau, E. Burman, and S. Claus, “Penalty-free Nitsche method for interface problems,” in Geometrically Unfitted Finite Element Methods and Applications, New York, Springer, 2017, pp. 183–210.10.1007/978-3-319-71431-8_6Search in Google Scholar

[32] E. Burman, “A penalty-free nonsymmetric Nitsche-type method for the weak imposition of boundary conditions,” SIAM J. Numer. Anal., vol. 50, no. 4, pp. 1959–1981, 2012. https://doi.org/10.1137/10081784x.Search in Google Scholar

[33] A. Logg, K. A. Mardal, and G. Wells, Eds. Automated Solution of Differential Equations by the Finite Element Method: The FEniCS Book, vol. 84, New York, Springer Science & Business Media, 2012.10.1007/978-3-642-23099-8Search in Google Scholar

[34] L. R. Scott, Introduction to Automated Modeling Using FEniCS, Cedarville, MI, Computational Modeling Initiative, 2018.Search in Google Scholar

[35] F. Eickmann, L. R. Scott, and T. Tscherpel, “High-order Stokes approximation on polygonally approximated curved boundaries,” in preparation, 2024.Search in Google Scholar

Received: 2023-11-06
Accepted: 2024-03-29
Published Online: 2024-10-07
Published in Print: 2025-03-26

© 2024 the author(s), published by De Gruyter, Berlin/Boston

This work is licensed under the Creative Commons Attribution 4.0 International License.

Downloaded on 10.9.2025 from https://www.degruyterbrill.com/document/doi/10.1515/jnma-2023-0135/html
Scroll to top button