Next Article in Journal
A Normalized Global Economic Policy Uncertainty Index from Unsupervised Machine Learning
Previous Article in Journal
Retrieval-Augmented Knowledge Graph Reasoning for Commonsense Question Answering
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

On the Convergence of α Schemes with Source Terms for Scalar Convex Conservation Laws

Department of Mathematical Sciences, University of South Dakota, Vermillion, SD 57069, USA
Mathematics 2023, 11(15), 3267; https://doi.org/10.3390/math11153267
Submission received: 12 May 2023 / Revised: 14 July 2023 / Accepted: 19 July 2023 / Published: 25 July 2023
(This article belongs to the Special Issue Numerical Approaches for Solving Nonlinear Equations and Systems)

Abstract

:
In this study, we use an extension of Yang’s convergence criterion [N. Jiang, On the wavewise entropy inequality for high-resolution schemes with source terms II: the fully discrete case] to show the entropy convergence of a class of fully discrete α schemes, now with source terms, for non-homogeneous scalar convex conservation laws in the one-dimensional case. The homogeneous counterparts (HCPs) of these schemes were constructed by S. Osher and S. Chakravarthy in the mid-1980s [A New Class of High Accuracy TVD Schemes for Hyperbolic Conservation Laws (1985), Very High Order Accurate TVD Schemes (1986)], and the entropy convergence of these methods, when m = 2 , was settled by the author [N. Jiang, The Convergence of α Schemes for Conservation Laws II: Fully-Discrete]. For semi-discrete α schemes, with or without source terms, the entropy convergence of these schemes was previously established (for m = 2 ) by the author [N. Jiang, The Convergence of α Schemes for Conservation Laws I: Semi-Discrete Case].

1. Introduction

This paper is concerned with the entropy convergence of fully discrete α schemes with source terms that approximate inhomogeneous scalar conservation laws. The homogeneous counterparts (HCPs) of this class of high-order schemes, i.e., α schemes without source terms, were constructed and analyzed by S. Osher and S. Chakravarthy [1,2], who also established the TVD property of this family of schemes. Furthermore, for 0 < α 1 2 and m = 2 , 3 , , 8 , α schemes are in conservative form, using 2 m + 1 points and having 2 m 2 -order of accuracy (except at isolated critical points). In addition, the utility and the effectiveness of these methods in obtaining approximate solutions to nonlinear hyperbolic conservation laws were demonstrated in [1,2,3]. When m = 2 , the author [4] showed that the numerical solutions to S. Osher and S. Chakravarthy’s original α schemes of a fully discrete case indeed converge to the entropy solution. The goal of this study is to extend this result to the non-homogeneous case. In other words, we show the entropy consistence of fully discrete α schemes with source terms for m = 2 . The technique of this research is based on an extension of [5] Yang’s WEI framework [6], which was established for fully discrete schemes that approximate homogeneous scalar conservation laws, to handle non-homogeneous cases.
We would like to mention that in the literature, not many convergence results for systems or/and multidimensional conservation laws have been verified. Nonetheless, in practice, once the convergence of the scalar case has been established, using nonlinear field-by-field decomposition extension to systems generally works well; see [1,3,7,8], for example. Osher and Chakravarthy also showed that the extensions of α schemes to systems have many of the same properties as in the scalar case [2]. Two-dimensional schemes that are based on dimension-by-dimension high-resolution differencing, even for complex configurations with very strong shocks, also perform well; see [7,9,10], for example. Consequently, the analysis of the entropy convergence of α schemes with source terms is very important and relevant from both the theoretical and practical points of view. These schemes can be embedded in or integrated into the design and development of state-of-the-art schemes that can handle modern computational needs for systems and multidimensional cases.
In this study, we consider numerical approximations to scalar conservation laws with source terms:
u t + f ( u ) x = q ( u ) , u ( x , 0 ) = u 0 ( x ) ,
where f C 1 ( R ) is convex and u 0 B V ( R ) . Here, B V stands for the subspace of L l o c 1 consisting of functions with bounded total variation. Next, to introduce the numerical methods, we let λ = τ h , where h and τ are spatial and temporal step sizes, respectively. Let u k n = u ( x k , t n ) be the nodal values of piecewise constant mesh function u h ( x , t ) approximating the solution of (1). Now, the numerical schemes that we are interested in admit the conservative form
u k n + 1 = H ( u k p n , , u k + p n ; λ ) = u k n λ ( g k + 1 2 n g k 1 2 n ) + τ q ( u k n ) ,
where the numerical flux, g, is given by
g k + 1 2 n = g k + 1 2 [ u k n ] ,
and
g k + 1 2 [ v ] = g ( v k p + 1 , v k p + 2 , , v k , , v k + p ) ,
for any data { v j } . Also, function g is Lipschitz continuous with respect to its 2 p arguments and is consistent with the conservation law in the sense that
g ( u , u , , u ) f ( u ) .
The homogeneous problems that correspond to (1) are
w t + f ( w ) x = 0 , w ( x , 0 ) = w 0 ( x ) .
With the numerical flux given by (4), we call the corresponding schemes
u ^ j n + 1 = H ^ ( u j p n , , u j + p n ; λ ) = u j n λ ( g j + 1 2 n g j 1 2 n )
that are consistent with the problems of (6) the homogeneous counterparts (HCPs) of schemes (2)–(5).
The paper is organized as follows: In Section 2, we review the notions of the extremum paths [6], the definition of α schemes with source terms in the case of m = 2 ; then, we establish the extremum traceableness of ε -scaled forms [5], which is necessary for analyzing the entropy convergence of the α schemes with source terms that are given in the next section. In Section 3, we present a simplified version of the extension of Yang’s convergence criterion [5], an important entropy estimate, and then the main convergence result. Section 4 presents the concluding remarks; finally, in Abbreviations, we list some abbreviations that are used throughout the paper.

2. Extremum Traceableness of ε -Scaled Forms

2.1. Extremum Paths

In this subsection, we introduce the α schemes with source terms, whose HCPs were constructed by Chakravarthy and Osher [1,2], and the notions of Yang’s extremum paths [6].
To improve readability, throughout the rest of the paper, we use the following shorthand notation: f k n : = f ( u k n ) , u k ± 1 2 n : = Δ u k ± 1 2 n = ± ( u k ± 1 n u k n ) , and f k ± 1 2 n : = Δ f k ± 1 2 n = ± ( f k ± 1 n f k n ) . Also, whenever there is no ambiguity in the context, we employ the following simplified notation: u k : = u k n + 1 , u k : = u k n , f k : = f k n , and f k ± 1 2 ± : = ( f k ± 1 2 n ) ± , where k and n are the spatial and temporal indexes, respectively.
Let g k + 1 2 E : = g E ( u k n , u k + 1 n ) be the flux of an E-scheme [11] that is characterized by
sgn ( u k + 1 n u k n ) [ g k + 1 2 E f ( u ) ] 0 ,
for all u between u k n and u k + 1 n . Then, the flux differences are defined by
f k + 1 2 + = f k + 1 g k + 1 2 E , f k + 1 2 = g k + 1 2 E f k .
At time level t = t n , for all k, we define a series of local CFL numbers
ν k + 1 2 + = λ f k + 1 2 + u k + 1 2 , ν k + 1 2 = λ f k + 1 2 u k + 1 2 .
Clearly, we have ν k + 1 2 + 0 and ν k + 1 2 0 . For convenience, we also set the ratios
r k + = f k 1 2 + f k + 1 2 + , r k = f k + 1 2 f k 1 2 .
We recall that the “minmod” operator is defined by
minmod ( x , y ) = x , if | x | | y | and x y > 0 , y , if | x | > | y | and x y > 0 , 0 , if x y 0 ,
which can be converted, when divided by x, to a monotonically increasing function
ϕ ( r ) = max ( 0 , min ( 1 , r ) ) = 1 , if r 1 , r , if 0 r 1 , 0 , if r 0 ,
where r = y x . Clearly, ϕ ( r ) has a symmetry property,
ϕ ( r ) r = ϕ ( 1 r ) .
In the sequel, using this symmetry property, we can recast a scheme of form (2)–(5) into an increment form. For 0 < α 1 2 and m = 2 , an α scheme [1,2], now with a source term, is given by
u k = u k λ ( g k + 1 2 g k 1 2 ) + τ q ( u k ) ,
where
g k + 1 2 = g k + 1 2 E α ( f k + 3 2 ) ( 1 ) ( 1 2 α ) ( f k + 1 2 ) ( 0 ) + ( 1 2 α ) ( f k + 1 2 + ) ( 0 ) + α ( f k 1 2 + ) ( 1 ) .
The superscripts shown over f ± denote flux-limited values of f ± and are computed as follows:
( f k + 3 2 ) ( 1 ) = minmod [ f k + 3 2 , b f k + 1 2 ] = minmod [ 1 b f k + 3 2 f k + 1 2 , 1 ] b f k + 1 2 = ϕ ( r k + 1 b ) b f k + 1 2 ,
( f k + 1 2 ) ( 0 ) = minmod [ f k + 1 2 , b f k + 3 2 ] = minmod [ 1 , b f k + 3 2 f k + 1 2 ] f k + 1 2 = ϕ ( b r k + 1 ) f k + 1 2 ,
( f k + 1 2 + ) ( 0 ) = minmod [ f k + 1 2 + , b f k 1 2 + ] = minmod [ 1 , b f k 1 2 + f k + 1 2 + ] f k + 1 2 + = ϕ ( b r k + ) f k + 1 2 + ,
( f k 1 2 + ) ( 1 ) = minmod [ f k 1 2 + , b f k + 1 2 + ] = minmod [ 1 b f k 1 2 + f k + 1 2 + , 1 ] b f k + 1 2 + = ϕ ( r k + b ) b f k + 1 2 + .
In the above, b is a “compression” parameter [2] chosen in the range
0 < b 1 + 1 2 α = b max .
We shall assume for the remainder of the paper that the local CFL numbers satisfy | ν k + 1 2 ± | 1 for all k Z .
By rewriting the expression
[ ( 1 2 α ) ϕ ( b r k + ) + α b ϕ ( r k + b ) ] ν k + 1 2 + u k + 1 2
as
[ ( 1 2 α ) 1 r k + ϕ ( b r k + ) + α b 1 r k + ϕ ( r k + b ) ] ν k 1 2 + u k 1 2 ;
and
[ α b ϕ ( r k b ) + ( 1 2 α ) ϕ ( b r k ) ] ν k 1 2 u k 1 2
as
[ α b 1 r k ϕ ( r k b ) + ( 1 2 α ) 1 r k ϕ ( b r k ) ] ν k + 1 2 u k + 1 2 ,
it is easy to see that an α scheme of form (15)–(16) can be written in an increment form [4] as
u k = u k C k 1 2 u k 1 2 + D k + 1 2 u k + 1 2 + τ q ( u k ) ,
with
C k 1 2 = ν k 1 2 + [ ( 1 2 α ) 1 r k + ϕ ( b r k + ) + α b 1 r k + ϕ ( r k + b ) + 1 ( 1 2 α ) ϕ ( b r k 1 + ) α b ϕ ( r k 1 + b ) ] ,
and
D k + 1 2 = ν k + 1 2 [ 1 α b ϕ ( r k + 1 b ) ( 1 2 α ) ϕ ( b r k + 1 ) + α b 1 r k ϕ ( r k b ) + ( 1 2 α ) 1 r k ϕ ( b r k ) ] .
The HCPs of schemes (21)–(23) are given by
u ^ k n + 1 = H ^ ( u k p n , , u k + p n ; λ ) = u k n C k 1 2 u k 1 2 n + D k + 1 2 u k + 1 2 n .
A scheme of form (21)–(23) provides a convenient way of checking the extremum traceability of a scheme of form (25) and the TVD property of the associated HCP (7) [10,12].
For convenience, let Y be the set of all sequences of numbers in ( 0 , 1 ) with a zero limit. We use bold-faced letters to represent the sequences in Y and use the corresponding light-faced ones with subscripts to represent the terms in such a sequence.
Let ε Y , i.e., ε = { ε } l = 0 and lim l ε l = 0 . We call the following scheme the ε -scaled form [5] of schemes (2)–(5):
u k n + 1 = H ε ( u k p n , , u k + p n ; λ ) = u k n λ [ g k + 1 2 ( u k n ) g k 1 2 ( u k n ) ] + ε l τ q ( u k n ) ,
where step size τ Y and step size h Y .
The concept of discrete extremum paths was introduced by Yang (see Definition 6.3 [13] and Definition 2.13 [6]) for both semi-discrete and fully discrete cases. For the purpose of keeping this paper reasonably self-contained, we re-state Yang’s definitions for the fully discrete case in order.
Let us consider a numerical solution u defined on set of grid points X : = { ( x j , t n ) : j Z , n Z + } . A finite set of successive grid points { x q , , x r } , with r q , is said to be the stencil of a spatial maximum or simply an E ¯ -stencil of u at time t n , provided that u q n = = u r n , u q 1 n < u q n , and u r + 1 n < u r n . Notions of E ̲ -stencils for minima and E-stencils for general extrema are defined similarly. Throughout the paper, we refer to [6] for the definitions, lemmas, and theorems that we quote in the context.
Definition 1 
(see Definition 2.13 [6]). A nonempty subset of X denoted by E ¯ t n , t m , n m , is called a ridge of numerical solution u from t n to t m if the following apply:
(i) For all ν, n ν m , set
P E ¯ ( ν ) : = { x j : ( x j , t ν ) E ¯ t n , t m } = { x q ν , , x r ν }
is not empty and is an E ¯ -stencil of u at t ν ;
(ii) For all ν, n ν m 1 ,
P E ¯ ( ν ) P E ¯ ( ν + 1 ) = { x j : min ( q ν , q ν + 1 ) j max ( r ν , r ν + 1 ) } .
Set P E ¯ ( ν ) is called the x-projection of E ¯ t n , t m at t ν . The value of u along the ridge is denoted by V E ¯ ( ν ) : V E ¯ ( ν ) = u j ν for q ν j r ν .
If for all ν , n ν m , the E ¯ -stencil in item (i) of the definition is replaced with an E ̲ -stencil, then the set is called a trough of u from t n to t m and is denoted by E ̲ t n , t m . The related notions P E ̲ ( ν ) and V E ̲ ( ν ) are defined similarly. Ridges and troughs are also called extremum paths. When we do not distinguish between ridges and troughs, we use E t n , t m , P E ( ν ) , or V E ( ν ) for either type. We write
E t n , t m 1 < ( ) E t n , t m 2 , if max P E 1 ( ν ) < ( ) max P E 2 ( ν ) for n ν m .
Definition 2 
(see Definition 2.14 [6]). A scheme is said to be extremum-traceable if there exists a positive constant c 1 such that for each numerical solution u of the scheme and each integer N > 0 , there exists a finite or infinite collection of extremum paths { E t 0 , t N l } l = l 1 l 2 with the following properties:
(i) { P E l ( N ) } l = l 1 l 2 is precisely the set of E-stencils of u j n at time t N arranged in ascending spatial coordinates.
(ii) If E t 0 , t N l is a ridge (trough), then V E l ( n ) is a non-increasing (non-decreasing) function of n.
(iii) Let P E l ( n ) = { x q l ( n ) , , x r l ( n ) } for 1 n N . If P E l ( n ) P E l ( n + 1 ) = , then
| u q l ( n + 1 ) n u r l ( n ) n | c | V E l ( n + 1 ) V E l ( n ) | w h e n q l ( n + 1 ) > r l ( n ) ,
| u r l ( n + 1 ) n u q l ( n ) n | c | V E l ( n + 1 ) V E l ( n ) | w h e n q l ( n ) > r l ( n + 1 ) .
(iv) If l 2 > l 1 , then E t 0 , t N l < E t 0 , t N l + 1 for l 1 l l 2 1 .

2.2. Extremum Traceableness of the ε -Scaled Form

In the next section, we use an extension of Yang’s convergence criterion [5,6] to show the entropy convergence of schemes (15)–(16). For this purpose, we need to verify that ε -scaled form (25) is extremum-traceable. The proof of Theorem 1 is similar to the proof of Theorem 2.3 [12]. For this reason, we omit the proof.
Theorem 1 
(see Theorem 2.3 [12]). The conditions for ε-scaled form (25) to be extremum-traceable for sufficiently small ε and ε l < ε are the following inequalities:
0 C k + 1 2 , 0 D k + 1 2 , 0 C k + 1 2 + D k + 1 2 1 ,   f o r   a l l   k ;
and there is a positive constant μ such that if u k is a space extremum, then
max { C k ± 1 2 , C k ± 3 2 , D k ± 1 2 , D k + 3 2 } μ 4 < 1 4 ,
where C k + 1 2 and D k + 1 2 are given by (22)–(23).
The inequalities of (26) are Harten’s [10] sufficient conditions for the HCPs of schemes (15)–(16) to be TVD. In terms of the local CFL numbers, the conclusion of Theorem 1 can be stated as follows.
Corollary 1. 
The conditions for ε-scaled form (25) to be extremum-traceable for sufficiently small ε and ε l < ε are the following inequalities:
ν k + 1 2 + ν k + 1 2 4 α 1 + 4 α ,
for all k and for 0 < α 1 2 ; when u k is an extremum,
max ( ν k 1 2 + , ν k + 1 2 ) < α 2 ,
and
max { ν k + 1 2 + , ν k ± 3 2 + , ν k + 3 2 , ν k 1 2 } α 2 4 α 1 + 4 α .
Proof. 
Indeed, for all k, in reference to (22)–(23), we have C k + 1 2 0 , D k + 1 2 0 , and
C k + 1 2 + D k + 1 2 ( ν k + 1 2 + ν k + 1 2 ) 4 α + 1 4 α 1 .
When u k is an extremum, C k ± 1 2 and D k ± 1 2 are reduced to
C k 1 2 = ν k 1 2 + [ 1 ( 1 2 α ) ϕ ( b r k 1 + ) α b ϕ ( r k 1 + b ) ] ν k 1 2 + ,
D k + 1 2 = ν k + 1 2 [ 1 α b ϕ ( r k + 1 b ) ( 1 2 α ) ϕ ( b r k + 1 ) ] ν k + 1 2 ,
C k + 1 2 = ν k + 1 2 + [ 1 + ( 1 2 α ) 1 r k + 1 + ϕ ( b r k + 1 + ) + α b 1 r k + 1 + ϕ ( r k + 1 + b ) ] ν k + 1 2 + 4 α + 1 4 α ,
and
D k 1 2 = ν k 1 2 [ 1 + α b 1 r k 1 ϕ ( r k 1 b ) + ( 1 2 α ) 1 r k 1 ϕ ( b r k 1 ) ] ν k 1 2 4 α + 1 4 α .
Using the four inequalities above, we arrive at the desired estimations:
C k ± 1 2 + D k ± 1 2 ( ν k ± 1 2 + ν k ± 1 2 ) 4 α + 1 4 α 1 ,
2 C k 1 2 + D k 1 2 2 ν k 1 2 + ν k 1 2 4 α + 1 4 α < 1 ,
C k + 1 2 + 2 D k + 1 2 ν k + 1 2 + 4 α + 1 4 α 2 ν k + 1 2 < 1 ,
C k + 1 2 + D k + 1 2 + D k + 3 2 + C k 1 2 ( ν k + 1 2 + ν k + 3 2 ) 4 α + 1 4 α + ν k 1 2 + ν k + 1 2 < 1 ,
C k 1 2 + D k 1 2 + D k + 1 2 + C k 3 2 ν k 1 2 + ν k 1 2 4 α + 1 4 α ν k + 1 2 + ν k 3 2 + 4 α + 1 4 α < 1 ,
and so on. □
Notice that max 0 < α 1 2 α 2 4 α 1 + 4 α = 1 6 ; Lemma 1 follows from Corollary 1 when the building block of α schemes belongs to a subfamily of E-fluxes defined by
g E ( x , y ) = f ( x ) if s x y , f ( y ) if x y s ,
where s is a sonic point of f ( · ) : f ( s ) = 0 .
It is clear that both Godunov [14] and Engquist–Osher [15] fluxes,
g G o d ( u j , u j + 1 ) = min u j w u j + 1 f ( w ) when u j u j + 1 , max u j w u j + 1 f ( w ) when u j u j + 1 ,
and
g E O ( u j , u j + 1 ) = 0 u j max ( f ( w ) , 0 ) d w + 0 u j + 1 min ( f ( w ) , 0 ) d w + f ( 0 ) ,
are members of the fluxes given by (31).
Lemma 1. 
ε-scaled form (25), with the building block of an E-flux defined by (31) and ε l < ε for sufficiently small ε, is extremum-traceable provided that
ν k + 1 2 + ν k + 1 2 4 α 1 + 4 α
for all k and for 0 < α 1 2 ; when u k is an extremum, we have
λ K = λ max u k 2 w u k + 2 | f ( w ) | 1 6 .

3. The Main Result: The Entropy Convergence of α Schemes with Source Terms

The schemes that we are concerned satisfy the following separation property at the spatial extrema. See E. Tadmor [16] for a similar kind of conditions that were used to check the TVD conditions of the HCPs of schemes (2)–(5).
Assumption 1. 
The numerical fluxes g k + 1 2 n , < k < , satisfy
g k + 1 2 n f ( u k n ) g k 1 2 n i f u k n u k ± 1 n ,
and
g k + 1 2 n f ( u k n ) g k 1 2 n i f u k n u k ± 1 n .
Lemma 2. 
A scheme of form (15)–(16) satisfies Assumption 1.
The proof of Lemma 2 is the same as the one for the associated HCPs of (15)–(16), since the proof does not involve source terms.
In reference to (25), we denote v ˜ j = H ε ( v j p , , v j + p ; λ ) and v ¯ j = v j + v ˜ j 2 for any collection of data { v j } . Let v ¯ j ± 1 2 n : = Δ v ¯ j ± 1 2 n , v ˜ j ± 1 2 n : = Δ v ˜ j ± 1 2 n , and f [ w ; L , R ] be the linear functions interpolating f ( w ) at w = L and w = R . In this section, we assume that f ( w ) 0 and q ( w ) 0 . Clearly, HCPs (24) of schemes (21)–(23) and thus of schemes (15)–(16) are TVD, since schemes (24) are the original TVD α schemes (for m = 2 ) by Osher and Chakravarthy [2].
Definition 3 
(see Definition 3.3 [5]). For ε-scaled form (25), we call an ordered pair of numbers { L , R } a rarefying pair if L < R and f [ w ; L , R ] > f ( w ) when L < w < R . We call a collection of data Γ = { v j } j = I p J + p an ε-rarefying collection of ε-scaled form (25) to rarefying pair { L , R } if, for ε > 0 , the following apply:
(i) L = v I v I + 1 v J = R ;
(ii) v ˜ I v ˜ I + 1 v ˜ J , | L v ˜ I | < ε , | R v ˜ J | < ε ;
(iii) Either v I 1 v I or v I = v I + 1 , and either v J + 1 v J or v J 1 = v J .
Clearly, conditions (i) and (ii) imply that
v ¯ I v ¯ I + 1 v ¯ J , | L v ¯ I | < ε 2 ,   and   | R v ¯ J | < ε 2 .
We define piecewise constant function g Γ associated with ε -rarefying collection Γ of ε -scaled form (25) as follows:
g Γ ( w ) = g j + 1 2 [ v ] for   w ( v ¯ j , v ¯ j + 1 ) , I j J 1 .
An ε -rarefying collection Γ = { v j } j = I 2 J + 2 of ε -scaled form (25) to pair { L , R } that satisfies
L = v I 2 = v I 1 = v I = v I + 1 v J 1 = v J = v J + 1 = v J + 2 = R
is called an ε-normal collection.
Theorem 2 
(see Theorem 3.21 [5]). A scheme of form (15)–(16), thus of form (21)–(23), with extremum-traceable ε-scaled form (25) converges for convex conservation laws (1) if, for every rarefying pair { L , R } and ε-rarefying collection of ε-scaled form (25) to the pair, the quadrature inequality
L R f [ w ; L , R ] d w v ¯ I v ¯ J g Γ ( w ) d w > δ
holds for some constant δ > 0 , provided that ε is sufficiently small.
For the class of α schemes with source terms, the condition of every ε -rarefying collection in Theorem 2 can be weakened by every ε -normal collection; thus, we can simplify this convergence criterion as the following lemma.
Lemma 3. 
A scheme of form (15)–(16), thus of form (21)–(23), with extremum-traceable ε-scaled form (25) converges for convex conservation laws (1), provided that for each rarefying pair { L , R } , there is a constant δ > 0 such that, for sufficiently small ε, inequality (37) holds for all ε-normal collections of ε-scaled form (25) to rarefying pair { L , R } .
Proof. 
Let Λ = { κ P 2 , , κ Q + 2 } be an arbitrary ε -rarefying collection of ε -scaled form (25) to pair { L , R } . Without loss of generality, we assume that | ε l τ q | < ε . Let
S = κ ¯ P κ ¯ Q g Λ ( w ) d w = j = P Q 1 ( κ ¯ j + 1 κ ¯ j ) g j + 1 2 [ κ ] .
By (i) and (iii) of Definition 3, κ P is a minimum or a maximum. In either case, Assumption 1 and condition (ii) of Definition 3 imply that
ε > | L κ ˜ P | = | κ ˜ P κ P | λ | g P + 1 2 [ κ ] g P 1 2 [ κ ] | | ε l τ q | λ | g P ± 1 2 [ κ ] f ( L ) | | ε l τ q | ,
or
λ | g P ± 1 2 [ κ ] f ( L ) | ε + | ε l τ q | < 2 ε .
Similarly, we have
ε > | R κ ˜ Q | λ | g Q ± 1 2 [ κ ] f ( R ) | | ε l τ q | ,
or
λ | g Q ± 1 2 [ κ ] f ( R ) | < ε + | ε l τ q | < 2 ε .
Next, we construct an ε -normal collection Γ = { v j } j = I 2 J + 2 as follows: First, let I = P 1 and J = Q + 1 ; we also set v I 2 = v I 1 = v I = L , v J = v J + 1 = v J + 2 = R , and v j = κ j for I + 1 j J 1 . Then, we have
g I ± 1 2 [ v ] = f ( L ) and g J ± 1 2 [ v ] = f ( R ) ,
which imply that
v ˜ I = L + ε l τ q ( L ) , v ˜ J = R + ε l τ q ( R ) .
Thus, the ε -normality of Γ = { v j } j = I 2 J + 2 is justified by the non-decreasing relation of
v ˜ I v ˜ I + 1 v ˜ J .
Indeed, we notice that the relationship
v ˜ I + 3 v ˜ I + 4 v ˜ J 4 v ˜ J 3 ,
is directly inherited from condition (ii) of the given ε -rarefying collection of Λ ,
κ ˜ P + 2 κ ˜ P + 3 κ ˜ Q 3 κ ˜ Q 2 .
Therefore, we only need to verify that
v ˜ I v ˜ I + 1 v ˜ I + 2 v ˜ I + 3 ,
and similarly, we have
v ˜ J 3 v ˜ J 2 v ˜ J 1 v ˜ J .
The proof is straightforward, and we omit the details.
Now, let G be the Lipschitz constant of numerical flux g, and K = max { | f ( L ) | , | f ( R ) | , | g | } + G ( R L ) . If we denote
S = v ¯ I v ¯ J g Γ ( w ) d w = j = I J 1 ( v ¯ j + 1 v ¯ j ) g j + 1 2 [ v ] ,
then a priori estimate | S S | 4 K ε holds. Let δ be a constant such that for all ε -normal collections of ε -scaled form (25) to pair { L , R } , inequality (37) holds for δ = δ . Thus, for δ = δ , inequality (37) also holds for ε -normal collection Γ = { v j } j = I 2 J + 2 . Therefore, for δ = δ 2 , inequality (37) holds for all ε -rarefying collections of ε -scaled form (25) to pair { L , R } provided that ε δ 4 K .
It remains for us to show the a priori estimate. First, we notice that κ ¯ j = v ¯ j for P + 2 j Q 3 , and we can verify that for P + 1 j Q 2 , the jth term of S equals the jth term of S . Therefore, the terms of the difference
S S = j = I J 1 ( v ¯ j + 1 v ¯ j ) g j + 1 2 [ v ] j = P Q 1 ( κ ¯ j + 1 κ ¯ j ) g j + 1 2 [ κ ]
from j = P + 1 to j = Q 2 are all diminished. Then, for the remaining terms, we use the relationship of Λ and Γ , and (39)–(42) to yield the following estimates:
| v ¯ I + 1 κ ¯ I + 1 | < ε , | v ¯ J 1 κ ¯ J 1 | < ε ,
| v ¯ I + 1 v ¯ I | = λ 2 | g I + 3 2 f ( L ) | = λ 2 | g P + 1 2 f ( L ) | < ε ,
and
| v ¯ J v ¯ J 1 | = λ 2 | f ( R ) g J 3 2 | = λ 2 | f ( R ) g Q 1 2 | < ε .
Finally, using the fact that v ¯ I + 2 = κ ¯ P + 1 , v ¯ J 2 = κ ¯ Q 1 , g I + 3 2 [ v ] = g P + 1 2 [ κ ] , g J 3 2 [ v ] = g Q 1 2 [ κ ] , and (44)–(46), we derive the desired estimate as follows:
| S S | = | ( v ¯ I + 1 v ¯ I ) g I + 1 2 [ v ] + ( v ¯ J v ¯ J 1 ) g J 1 2 [ v ] + ( v ¯ I + 2 v ¯ I + 1 ) g I + 3 2 [ v ] ( κ ¯ P + 1 κ ¯ P ) g P + 1 2 [ κ ] + ( v ¯ J 1 v ¯ J 2 ) g J 3 2 [ v ] ( κ ¯ Q κ ¯ Q 1 ) g Q 1 2 [ κ ] | | v ¯ I + 1 v ¯ I | | g I + 1 2 [ v ] | + | v ¯ J v ¯ J 1 | | g J 1 2 [ v ] | + | v ¯ I + 1 κ ¯ P | | g I + 3 2 [ v ] | + | v ¯ J 1 κ ¯ Q | | g Q 1 2 [ κ ] | < ( ε + ε + ε + ε ) K = 4 K ε ,
and the proof is completed. □
For an ε -normal collection Γ = { v j } j = I 2 J + 2 , we denote vertex ( v j , f ( v j ) ) by V j and the area of convex polygon V j 1 V j 2 V j r by S j 1 , , j r . Let σ Γ = max I 2 j J + 2 | ν j ± 1 2 ± | , and let
α j = 0.5 if Δ v j 2 = Δ v j + 1 = 0 , 1 otherwise .
When the building blocks of schemes (15)–(16), thus of schemes (21)–(23), are the subclass of E-schemes with the fluxes defined by (31), we obtain a very important inequality (49), which enables us to prove Theorem 3, the main result of this paper. The proof of Lemma 4 is similar to the one, given by the author [4], for the HCPs of (15)–(16). To see the reason for that, first, we can show the inequality
L R g Γ ( w ) d w v ¯ I v ¯ J g Γ ( w ) d w + ε
by mimicking the proof for inequality (50) with the following modifications: In the proof of case 1, let c be a constant such that | g Γ ( w ) | c for w ( R , v ¯ J ) , and we set g Γ ( w ) = c , when w ( L , v ¯ I ) ; for case 3, let c be a constant such that | g Γ ( w ) | c for w ( v ¯ I , L ) , and we set g Γ ( w ) = c , when w ( v ¯ J , R ) . Next, we remark that the derivations of all estimations in the proof of (49) are the same as the ones in the proof for their HCPs; except for ε -scaled form (25), we now have extra finite terms of form ε l τ q (which may be multiplied by a bounded quantity), which all vanish to zero as l . This means that if ε is small enough and ε l τ q < ε , then the contributions of these terms are negligible; therefore, inequality (49) still holds for ε -scaled form (25). For the convenience of the reader, we provide the proof at the end of the paper. Also, we would like to recall that Lemma 5 is Yang’s original result [6].
Lemma 4. 
Let Γ = { v j } j = I 2 J + 2 be an ε-normal collection of ε-scaled form (25) to rarefying pair { L , R } . Then, the numerical solutions of ε-scaled form (25) for convex conservation laws (1) satisfy, for sufficiently small ε and σ Γ , the following inequality:
L R ( f [ w ; L , R ] g Γ ) d w S I , I + 1 , , J j = I + 1 J 1 α j S j 1 , j , j + 1 .
Lemma 5 
(see Lemma 3.7 [6]). We have
S I , I + 1 , , J j = I + 1 J 1 S j 1 , j , j + 1 S I , i , i + 1 , J ( S I , i , i + 1 + S i , i + 1 , J )
for I < i < J 1 .
Let σ = λ max w | f ( w ) | . When m = 2 , for the class of fully discrete α schemes with source terms, equipped with the above lemmas, we obtain the following entropy convergence result.
Theorem 3. 
The numerical solutions of schemes (15)–(16) to convex problems (1) converge to the entropy solution provided that g E ( · , · ) is a numerical flux given by (31) and that σ and ε are sufficiently small.
Proof. 
First, by Lemma 1, ε -scaled form (25) is extremum-traceable for sufficiently small σ and ε . Next, for each ε -normal collection Γ = { v i } i = I 2 J + 2 of (25) to rarefying pair { L , R } , we claim that
v ¯ I v ¯ J g Γ ( w ) d w L R g Γ ( w ) d w + ε .
Indeed, for the given ε -normal collection Γ = { v i } i = I 2 J + 2 , we have v ¯ I = L + ε l τ 2 q ( L ) and v ¯ J = R + ε l τ 2 q ( R ) . Also, we recall that q ( w ) 0 and
g Γ ( w ) = g j + 1 2 [ v ] for w ( v ¯ j , v ¯ j + 1 ) , I j J 1 .
Case 1. If q ( L ) 0 , then q ( R ) 0 as well. Let c be a constant such that | g Γ ( w ) | c for w ( R , v ¯ J ) and set g Γ ( w ) = c , when w ( L , v ¯ I ) . We obtain
v ¯ I v ¯ J g Γ ( w ) d w = { v ¯ I L + L R + R v ¯ J } g Γ ( w ) d w c ε l τ q ( L ) + q ( R ) 2 + L R g Γ ( w ) d w .
Case 2. If q ( L ) 0 and q ( R ) 0 , we let c be a constant such that | g Γ ( w ) | c for w ( R , v ¯ J ) ( v ¯ I , L ) . Now, we have
v ¯ I v ¯ J g Γ ( w ) d w = { v ¯ I L + L R + R v ¯ J } g Γ ( w ) d w c ε l τ q ( L ) + q ( R ) 2 + L R g Γ ( w ) d w .
Case 3. If q ( L ) 0 and q ( R ) 0 , we let c be a constant such that | g Γ ( w ) | c for w ( v ¯ I , L ) and set g Γ ( w ) = c , when w ( v ¯ J , R ) . We obtain
v ¯ I v ¯ J g Γ ( w ) d w = { v ¯ I L + L R + R v ¯ J } g Γ ( w ) d w c ε l τ q ( L ) q ( R ) 2 + L R g Γ ( w ) d w .
In all three cases, without loss of generality, for the given ε > 0 , we let c ε l τ | q ( L ) | + | q ( R ) | 2 < ε for all l. Thus, as claimed, the following inequality holds:
v ¯ I v ¯ J g Γ ( w ) d w L R g Γ ( w ) d w + ε .
Now, we set
d 1 ( Γ ) = max I i J min ( v i L , R v i ) .
Since J I is finite, d 1 ( Γ ) = min ( v j L , R v j ) for some j between I and J. We then let
d 2 ( Γ ) = max I i J , i j min ( v i L , R v i ) .
We also have d 2 ( Γ ) = min ( v k L , R v k ) for some k j between I and J. Clearly, we can choose j and k so that | j k | = 1 .
To complete the proof, we argue by contradiction. Hence, we assume that for certain convex f, a scheme of form (15)–(16), thus of form (21)–(23), does not converge. By Lemma 3 and inequality (50), there is a rarefying pair { L , R } such that for each δ > 0 , δ = δ / 2 , and ε = δ / 2 , there is an ε -normal collection Γ = { v j } j = I 2 J + 2 of ε -scaled form (25) to the pair that satisfies
L R { f [ w ; L , R ] g Γ ( w ) } d w δ + ε = δ .
It follows that there is a sequence of ε -normal collections { Γ ν } ν = 1 , where Γ ν = { v j ν } j = I ν 2 J ν + 2 , such that
lim ν L R { f [ w ; L , R ] g Γ ν ( w ) } 0 .
The following three cases exhaust all possibilities.
Case 1. lim sup ν d 2 ( Γ ν ) > 0 . Let us set ρ = 1 / 2 lim sup ν d 2 ( Γ ν ) . Then, there are a subsequence of ε -normal collections, still denoted by { Γ ν } ν = 1 , and a corresponding sequence of integers { i ( ν ) } ν = 1 such that
L + ρ v i ( ν ) ν v i ( ν ) + 1 ν R ρ ,
and sup ν σ Γ ν σ . For simplicity, we fix ν and drop it from the notation. Let us set γ = f [ L + R 2 ; L , R ] f ( L + R 2 ) . It is a positive constant, since { L , R } is a rarefying pair. By applying Lemmas 4 and 5, we have
L R { f [ w ; L , R ] g Γ ν ( w ) } d w S I , i , i + 1 , J ( S I , i , i + 1 + S i , i + 1 , J ) = 1 / 2 { ( v i v I ) ( f [ v i + 1 ; L , R ] f ( v i + 1 ) ) + ( v J v i + 1 ) ( f [ v i ; L , R ] f ( v i ) ) } > η ,
if η = 2 ρ 2 γ / ( R L ) . This contradicts (51).
Case 2. lim sup ν d 1 ( Γ ν ) > lim sup ν d 2 ( Γ ν ) = 0 . Let us set ρ = 1 / 2 lim sup ν d 1 ( Γ ν ) . Then, there are a subsequence of the ε -normal collections, still denoted by { Γ ν } ν = 1 , and a corresponding sequence of integers { i ν } ν = 1 such that lim ν v i ν 1 ν = L , lim ν v i ν + 1 ν = R , and lim ν v i ν ν = v [ L + ρ , R ρ ] . We then have
L R ( f [ w ; L , R ] g Γ ν ( w ) ) d w L R ( f [ w ; L , R ] g Γ ( w ) ) d w ,
where Γ is the following ε -normal collection: I = 0 , J = 4 , v 2 = v 1 = v 0 = v 1 = L , v 2 = v , and v 3 = v 4 = v 5 = v 6 = R . By Lemma 4, we have
L R ( f [ w ; L , R ] g Γ ( w ) ) d w S 1 , 2 , 3 α 2 S 1 , 2 , 3 = 1 / 2 S 1 , 2 , 3 > 0
for α 2 = 1 / 2 since Δ + v 0 = Δ + v 3 = 0 . This contradicts (51).
Case 3. lim sup ν d 1 ( Γ ν ) = 0 . Then, there exists a sequence of integers { i ν } with I ν + 1 i ν < J ν 1 such that lim ν v i ν ν = L , lim ν v i ν + 1 ν = R . We then have
L R ( f [ w ; L , R ] g Γ ν ( w ) ) d w L R ( f [ w ; L , R ] g Γ ( w ) ) d w ,
where Γ is the following ε -normal collection: I = 0 , J = 3 , v 2 = v 1 = v 0 = v 1 = L , v 2 = v 3 = v 4 = v 5 = R . In this case, numerical flux g Γ ( w ) becomes E-flux g E ( L , R ) . Hence, we have
L R ( f [ w ; L , R ] g Γ ( w ) ) d w L R ( f [ w ; L , R ] f ( w ) ) d w .
The right-hand side of the inequality is a positive constant, since { L , R } is a rarefying pair. This contradicts (51) again. We have thus completed the proof of Theorem 3. □
Finally, we finish this section by presenting the proof of Lemma 4.
Proof of Lemma 4. 
In the following, we keep the same notation, f j + 1 2 ± and r j ± for { v j } instead of { u j } . We also use
f j + 1 2 : = f ( v j + 1 ) f ( v j ) v j + 1 v j
to denote the divided difference.
To justify inequality (49), it suffices to show the following inequality:
L R g Γ ( w ) d w j = I J 1 v j v j + 1 f [ w ; v j , v j + 1 ] d w j = I + 1 J 1 α j S j 1 , j , j + 1 .
Without loss of generality, let v s be a sonic point ( f ( v s ) = 0 ) such that v k v s v k + 1 for some integer k with I k J 1 . Then, for any g E ( · , · ) given by (31), we have
f j + 1 2 + = 0 , for   I j k 1 ;
f j + 1 2 + = f j + 1 2 v j + 1 2 , for   J 1 j k + 1 ;
f j + 1 2 = 0 , for   J 1 j k + 1 ;
and
f j + 1 2 = f j + 1 2 v j + 1 2 , for   I j k 1 .
To enhance readability, we further simplify the notation. We denote f j : = f ( v j ) , f s : = f ( v s ) , v j ± 1 2 : = Δ v j ± 1 2 = ± ( v j ± 1 v j ) , v s + 1 2 : = v k + 1 v s , v s 1 2 : = v s v k , v ¯ j ± 1 2 : = Δ v ¯ j ± 1 2 , v ˜ j ± 1 2 : = Δ v ˜ j ± 1 2 , f s + 1 2 : = ( f k + 1 f s ) / v s + 1 2 , and f s 1 2 : = ( f s f k ) / v s 1 2 . Then, by (35) and (48), we have
LHS   of   ( 54 ) = L R g Γ ( w ) d w j = I J 1 v j v j + 1 f [ w ; v j , v j + 1 ] d w v ¯ I v ¯ J g Γ ( w ) d w j = I J 1 v j v j + 1 f [ w ; v j , v j + 1 ] d w + ε = j = I J 1 g j + 1 2 v ¯ j + 1 2 j = I J 1 v j v j + 1 f [ w ; v j , v j + 1 ] d w + ε = j = I J 1 g j + 1 2 v j + 1 2 + v ˜ j + 1 2 2 j = I J 1 f j + f j + 1 2 v j + 1 2 + ε = 1 2 ( P ( j k 2 ) + P k 1 + P k + P k + 1 + P ( j k + 2 ) ) + ε ,
and the definitions of P ( j k 2 ) , P k 1 , P k , P k + 1 , and P ( j k + 2 ) will be given shortly. Let us recall that the numerical flux is defined by
g j + 1 2 = g j + 1 2 E α ( f j + 3 2 ) ( 1 ) ( 1 2 α ) ( f j + 1 2 ) ( 0 ) ( 1 2 α ) ( f j + 1 2 + ) ( 0 ) + α ( f j 1 2 + ) ( 1 ) ,
and with the help of increment form (21)–(23), we have
v ˜ j + 1 2 = v j + 1 2 ( C j + 1 2 + D j + 1 2 ) v j + 1 2 + D j + 3 2 v j + 3 2 + C j 1 2 v j 1 2 + ε l τ q v j + 1 2 0 .
Let
d j : = ( 1 2 + 2 α ) f j + 1 2 v j + 1 2 2 ( 1 2 α ) f j 1 2 v j 1 2 v j + 1 2 ,
T : = [ f k 1 α f k 1 2 v k 1 2 ( 1 2 α ) f k 3 2 v k 3 2 ] D k 1 2 v k 1 2 ,
and
T ( k k 2 ) : = α f k 1 2 v k 1 2 2 + T .
With these definitions and the convexity of the flux in mind, we derive the following estimates:
P ( j k 2 ) : = j = I k 2 { g j + 1 2 [ v j + 1 2 + v ˜ j + 1 2 ] ( f j + f j + 1 ) v j + 1 2 } = j = I k 2 { [ g j + 1 2 E α ( f j + 3 2 ) ( 1 ) ( 1 2 α ) ( f j + 1 2 ) ( 0 ) ] [ 2 v j + 1 2 D j + 1 2 v j + 1 2 + D j + 3 2 v j + 3 2 + ε l τ q v j + 1 2 ] ( f j + f j + 1 ) v j + 1 2 } j = I k 2 { [ g j + 1 2 E α f j + 3 2 ( 1 2 α ) f j + 1 2 ] [ 2 v j + 1 2 D j + 1 2 v j + 1 2 + D j + 3 2 v j + 3 2 + ε l τ q v j + 1 2 ] ( f j + f j + 1 ) v j + 1 2 } = j = I k 2 { [ 2 f j + 1 ( f j + f j + 1 ) + ε l τ q ] v j + 1 2 2 α f j + 3 2 v j + 3 2 v j + 1 2 ( 1 2 α ) f j + 1 2 v j + 1 2 2 } j = I k 2 [ f j + 1 v j + 1 2 α f j + 3 2 v j + 3 2 v j + 1 2 ( 1 2 α ) f j + 1 2 v j + 1 2 2 ] D j + 1 2 + j = I k 2 [ f j + 1 v j + 3 2 α f j + 3 2 v j + 3 2 2 ( 1 2 α ) f j + 1 2 v j + 1 2 v j + 3 2 ] D j + 3 2 = j = I k 2 [ 2 α f j + 3 2 v j + 3 2 v j + 1 2 + 2 α f j + 1 2 v j + 1 2 2 + ε l τ q v j + 1 2 ] + j = I k 2 [ f j + 1 v j + 1 2 + α f j + 3 2 v j + 3 2 v j + 1 2 + ( 1 2 α ) f j + 1 2 v j + 1 2 2 + f j v j + 1 2 α f j + 1 2 v j + 1 2 2 ( 1 2 α ) f j 1 2 v j 1 2 v j + 1 2 ] D j + 1 2 + T j = I k 2 [ α f j + 3 2 ( v j + 3 2 v j + 1 2 ) 2 + ε l τ q v j + 1 2 ] α f k 1 2 v k 1 2 2 + j = I k 2 [ ( 1 2 + 2 α ) f j + 1 2 v j + 1 2 2 + α f j + 3 2 v j + 3 2 v j + 1 2 ( 1 2 α ) f j 1 2 v j 1 2 v j + 1 2 ] D j + 1 2 + T j = I k 2 [ ( 1 2 + 2 α ) f j + 1 2 v j + 1 2 2 + α f j + 3 2 v j + 3 2 v j + 1 2 ( 1 2 α ) f j 1 2 v j 1 2 v j + 1 2 ] D j + 1 2 + T ( j k 2 ) + c ε j = I k 2 d j D j + 1 2 + T ( j k 2 ) + c ε ,
where c is some constant. Similarly, notice that by writing
2 α j = k + 2 J 1 f j + 1 2 v j + 1 2 2 = α j = k + 2 J 1 f j + 1 2 v j + 1 2 2 α j = k + 2 J 1 f j 1 2 v j 1 2 2 + α f k + 3 2 v k + 3 2 2 ,
we obtain
P ( j k + 2 ) : = j = k + 2 J 1 { g j + 1 2 [ v j + 1 2 + v ˜ j + 1 2 ] ( f j + f j + 1 ) v j + 1 2 } = j = k + 2 J 1 { [ g j + 1 2 E + ( 1 2 α ) ( f j + 1 2 + ) ( 0 ) + α ( f j 1 2 + ) ( 1 ) ] [ 2 v j + 1 2 C j + 1 2 v j + 1 2 + C j 1 2 v j 1 2 + ε l τ q v j + 1 2 ] ( f j + f j + 1 ) v j + 1 2 } j = k + 2 J 1 { [ f j + ( 1 2 α ) f j + 1 2 + + α f j 1 2 + ] [ 2 v j + 1 2 C j + 1 2 v j + 1 2 + C j 1 2 v j 1 2 + ε l τ q v j + 1 2 ] ( f j + f j + 1 ) v j + 1 2 } j = k + 2 J 1 [ ( 1 2 + 2 α ) f j + 1 2 v j + 1 2 2 + ( 1 2 α ) f j + 3 2 v j + 1 2 v j + 3 2 ] C j + 1 2 + T ( j k + 2 ) + c ε = j = k + 2 J 1 c j C j + 1 2 + T ( j k + 2 ) + c ε ,
where
c j : = ( 1 2 + 2 α ) f j + 1 2 v j + 1 2 2 + ( 1 2 α ) f j + 3 2 v j + 1 2 v j + 3 2 ,
and
T ( j k + 2 ) : = α f k + 3 2 v k + 3 2 2 + [ f k + 2 v k + 3 2 + ( 1 2 α ) f k + 5 2 v k + 5 2 v k + 3 2 + α f k + 3 2 v k + 3 2 2 ] C k + 3 2 .
Now, we compute the ( k 1 ) th, kth, and ( k + 1 ) th terms of the RHS of (55) defined by P k 1 , P k , and P k + 1 , respectively, as follows: Again, we let c be some generic constant.
P k 1 : = [ g k 1 2 E + α ( f k + 1 2 ) ( 1 ) ( 1 2 α ) ( f k 1 2 ) ( 0 ) ] [ 2 v k 1 2 D k 1 2 v k 1 2 + D k + 1 2 v k + 1 2 + ε l τ q v k 1 2 ] ( f k 1 + f k ) v k 1 2 [ f k α f k + 1 2 ( 1 2 α ) f k 1 2 ] [ 2 v k 1 2 D k 1 2 v k 1 2 + D k + 1 2 v k + 1 2 + ε l τ q v k 1 2 ] ( f k 1 + f k ) v k 1 2 2 α f s 1 2 v s 1 2 v k 1 2 + 2 α f k 1 2 v k 1 2 2 + c ε l τ q v k 1 2 + [ f k v k 1 2 + α f s 1 2 v s 1 2 v k 1 2 + ( 1 2 α ) f k 1 2 v k 1 2 2 ] D k 1 2 + [ f k v k + 1 2 α f s 1 2 v s 1 2 v k + 1 2 ( 1 2 α ) f k 1 2 v k 1 2 v k + 1 2 ] D k + 1 2 ,
P k : = g k + 1 2 E [ 2 v k + 1 2 D k + 1 2 v k + 1 2 C k + 1 2 v k + 1 2 + ε l τ q v k + 1 2 ] ( f k + f k + 1 ) v k + 1 2 = f s [ 2 v k + 1 2 D k + 1 2 v k + 1 2 C k + 1 2 v k + 1 2 + ε l τ q v k + 1 2 ] ( f k + f k + 1 ) v k + 1 2 = f s 1 2 v s 1 2 v k + 1 2 f s + 1 2 v s + 1 2 v k + 1 2 f s v k + 1 2 D k + 1 2 f s v k + 1 2 C k + 1 2 + f s ε l τ q v k + 1 2 ,
and
P k + 1 : = [ g k + 3 2 E + ( 1 2 α ) ( f k + 3 2 + ) ( 0 ) + α ( f k + 1 2 + ) ( 1 ) ] [ 2 v k + 3 2 C k + 3 2 v k + 3 2 + C k + 1 2 v k + 1 2 + ε l τ q v k + 3 2 ] ( f k + 1 + f k + 2 ) v k + 3 2 [ f k + 1 + ( 1 2 α ) f k + 3 2 + + α f k + 1 2 + ] [ 2 v k + 3 2 C k + 3 2 v k + 3 2 + C k + 1 2 v k + 1 2 + ε l τ q v k + 3 2 ] ( f k + 1 + f k + 2 ) v k + 3 2 2 α f k + 3 2 v k + 3 2 2 + 2 α f s + 1 2 v s + 1 2 v k + 3 2 + c ε l τ q v k + 3 2 + [ f k + 1 v k + 3 2 ( 1 2 α ) f k + 3 2 v k + 3 2 2 α f s + 1 2 v s + 1 2 v k + 3 2 ] C k + 3 2 + [ f k + 1 v k + 1 2 + ( 1 2 α ) f k + 3 2 v k + 1 2 v k + 3 2 + α f s + 1 2 v s + 1 2 v k + 1 2 ] C k + 1 2 .
Next, we combine the estimates of T ( j k 2 ) , T ( j k + 2 ) , P k 1 , P k , and P k + 1 into one estimate. But first, we let
d k 1 = ( 1 2 + 2 α ) f k 1 2 v k 1 2 2 ( 1 2 α ) f k 3 2 v k 3 2 v k 1 2 + α f s 1 2 v s 1 2 v k 1 2 ,
d k = ( 1 2 α ) f k 1 2 v k 1 2 v k + 1 2 ( 1 + α ) f s 1 2 v s 1 2 v k + 1 2 ,
c k = ( 1 + α ) f s + 1 2 v s + 1 2 v k + 1 2 + ( 1 2 α ) f k + 3 2 v k + 1 2 v k + 3 2 ,
and
c k + 1 = ( 1 2 + 2 α ) f k + 3 2 v k + 3 2 2 + ( 1 2 α ) f k + 5 2 v k + 3 2 v k + 5 2 α f s + 1 2 v s + 1 2 v k + 3 2 .
Using the fact that v k + 1 2 = v s + 1 2 + v s 1 2 , f s 1 2 v s 1 2 v k + 1 2 f s 1 2 v s 1 2 2 = f s 1 2 v s 1 2 v s + 1 2 , and f s + 1 2 v s + 1 2 v k + 1 2 + f s + 1 2 v s + 1 2 2 = f s + 1 2 v s 1 2 v s + 1 2 , we have
T ( k ) : = T ( j k 2 ) + T ( j k + 2 ) + P k 1 + P k + P k + 1 α f k 1 2 v k 1 2 2 + [ f k 1 α f k 1 2 v k 1 2 ( 1 2 α ) f k 3 2 v k 3 2 ] D k 1 2 v k 1 2 + α f k + 3 2 v k + 3 2 2 + [ f k + 2 v k + 3 2 + ( 1 2 α ) f k + 5 2 v k + 3 2 v k + 5 2 + α f k + 3 2 v k + 3 2 2 ] C k + 3 2 2 α f s 1 2 v s 1 2 v k 1 2 + 2 α f k 1 2 v k 1 2 2 + [ f k v k 1 2 + α f s 1 2 v s 1 2 v k 1 2 + ( 1 2 α ) f k 1 2 v k 1 2 2 ] D k 1 2 + [ f k v k + 1 2 α f s 1 2 v s 1 2 v k + 1 2 ( 1 2 α ) f k 1 2 v k 1 2 v k + 1 2 ] D k + 1 2 + f s 1 2 v s 1 2 v k + 1 2 f s + 1 2 v s + 1 2 v k + 1 2 f s v k + 1 2 D k + 1 2 f s v k + 1 2 C k + 1 2 2 α f k + 3 2 v k + 3 2 2 + 2 α f s + 1 2 v s + 1 2 v k + 3 2 + [ f k + 1 v k + 3 2 ( 1 2 α ) f k + 3 2 v k + 3 2 2 α f s + 1 2 v s + 1 2 v k + 3 2 ] C k + 3 2 + [ f k + 1 v k + 1 2 + ( 1 2 α ) f k + 3 2 v k + 1 2 v k + 3 2 + α f s + 1 2 v s + 1 2 v k + 1 2 ] C k + 1 2 + c ε = T 1 ( k ) + T 2 ( k ) T 2 ( k ) ,
where
T 1 ( k ) : = α f k 1 2 v k 1 2 2 2 α f s 1 2 v s 1 2 v k 1 2 + f s 1 2 v s 1 2 v k + 1 2 f s + 1 2 v s + 1 2 v k + 1 2 α f k + 3 2 v k + 3 2 2 + 2 α f s + 1 2 v s + 1 2 v k + 3 2 = α f k 1 2 v k 1 2 2 + α f s 1 2 ( v s 1 2 v k 1 2 ) 2 α f s 1 2 v s 1 2 2 α f s 1 2 v k 1 2 2 + f s 1 2 v s 1 2 v k + 1 2 f s + 1 2 v s + 1 2 v k + 1 2 α f k + 3 2 v k + 3 2 2 + 2 α f s + 1 2 v s + 1 2 v k + 3 2 α ( f k 1 2 f s 1 2 ) v k 1 2 2 + ( 1 α ) f s 1 2 v s 1 2 2 + f s 1 2 v s 1 2 v s + 1 2 α f s + 1 2 ( v s + 1 2 v k + 3 2 ) 2 ( 1 α ) f s + 1 2 v s + 1 2 2 f s + 1 2 v s 1 2 v s + 1 2 0 ,
and
T 2 ( k ) : = d k 1 D k 1 2 + d k D k + 1 2 + c k C k + 1 2 + c k + 1 C k + 3 2 + c ε .
Finally, using (55)–(58), we have
LHS   of   ( 54 ) j = I J 1 g j + 1 2 v ¯ j + 1 2 j = I J 1 v j v j + 1 f [ w ; v j , v j + 1 ] d w + ε = 1 2 ( P ( j k 2 ) + P k 1 + P k + P k + 1 + P ( j k + 2 ) ) + ε 1 2 { j = I k 2 d j D j + 1 2 + j = k + 2 J 1 c j C j + 1 2 + T 2 ( k ) } + c ε = 1 2 { j = I k d j D j + 1 2 + j = k J 1 c j C j + 1 2 } + c ε .
Clearly, for sufficiently small σ Γ and ε , it is feasible that
LHS   of   ( 54 ) 1 2 j = I + 1 J 1 S j 1 , j , j + 1 j = I + 1 J 1 α j S j 1 , j , j + 1 .
Thus, we have completed the proof of Lemma 4. □

4. Concluding Remarks

In this paper, we establish the entropy convergence of α schemes with source terms for scalar convex conservation laws when 0 < α 1 2 and m = 2 . These (five-point grid bandwidth) schemes, except at isolated critical points, are second-order-accurate in space. Nevertheless, they are only first-order-accurate in time. Further research could consider the case of α schemes for m 3 or their extensions with higher-order accuracy in time and could consider other methods with higher-order accuracy in space and time. The author is currently working on the convergence analysis of a non-homogeneous and nonlinear SSP Runge–Kutta method, which indeed has second-order accuracy both in time and (except at isolated critical points) space, and we hope to report this new result soon. The homogeneous counterpart of this method is one of the original SSP Runge–Kutta methods constructed by Shu [17], and Shu and Osher [18], of which the entropy convergence has been shown by the author [19].

Funding

This research received no external funding.

Acknowledgments

This recent, improved version of the paper was inspired by all reviewer’s positive and constructive feedback. The author would like to express her great appreciation to each of them for their time, expertise, and suggestions on the subject.

Conflicts of Interest

The author declares no conflict of interest.

Abbreviations

HCPsHomogeneous counterparts
TVDTotal variation diminishing
WEIWavewise entropy inequality
BVSubspace of L l o c 1 consisting of functions with bounded total variation
CFLCourant–Friedrichs–Lewy
LHSLeft-hand side
SSPStrong stability preserving

References

  1. Chakravarthy, S.; Osher, S. A New Class of High Accuracy TVD Schemes for Hyperbolic Conservation Laws. In Proceedings of the 23rd Aerospace Science Meeting, Reno, NV, USA, 14–17 January 1985; pp. 1–11. [Google Scholar]
  2. Osher, S.; Chakravarthy, S. Very High Order Accurate TVD Schemes. J. Oscil. Theory Comput. Methods Compens. Compact. 1986, 2, 229–274. [Google Scholar]
  3. Chakravarthy, S.; Osher, S. Computing with High Resolution Upwind Schemes for Hyperbolic Equations. In Proceedings of the AMS-SIAM 1983, Boulder, CO, USA, 5–11 June 1983. [Google Scholar]
  4. Jiang, N. The Convergence of α Schemes for Conservation Laws II: Fully-Discrete Case. Methods Appl. Anal. 2014, 21, 201–220. [Google Scholar] [CrossRef] [Green Version]
  5. Jiang, N. On the wavewise entropy inequality for high-resolution schemes with source terms II: The fully discrete case. Methods Appl. Anal. 2019, 26, 297–318. [Google Scholar] [CrossRef]
  6. Yang, H. On Wavewise Entropy Inequalities for High Resolution Schemes II: Fully Discrete MUSCL Schemes with Exact Evolution in Small Time. SIAM. J. Numer. Anal. 1999, 36, 1–31. [Google Scholar] [CrossRef]
  7. Chakravarthy, S.; Osher, S. High resolution applications of the Osher upwind scheme for the Euler equations. Presented at the 6th CFD Conference, Danvers, MA, USA, 13–15 July 1983. [Google Scholar]
  8. Sweby, P.K. High resolution schemes using flux limiters for hyperbolic conservation laws. SIAM J. Numer. Anal. 1984, 21, 995–1011. [Google Scholar] [CrossRef]
  9. Colella, P.; Woodeard, P.R. The piecewise-parabolic method (PPM) for gas-dynamical simulations. Presented at the 6th CFD Conference, Danvers, MA, USA, 13–15 July 1983. [Google Scholar]
  10. Harten, A. High resolution schemes for hyperbolic conservative laws. J. Comput. Phys. 1983, 49, 357–393. [Google Scholar] [CrossRef] [Green Version]
  11. Osher, S.; Chakravarthy, S. High resolution schemes and entropy condition. SIAM J. Numer. Anal. 1984, 21, 955–984. [Google Scholar] [CrossRef] [Green Version]
  12. Jiang, N. On the Convergence of Fully-Discrete High-Resolution Schemes with Van Leer’s Flux Limiter for Conservation Laws. Methods Appl. Anal. 2009, 16, 403–422. [Google Scholar] [CrossRef] [Green Version]
  13. Yang, H. On Wavewise Entropy Inequalities for High-Resolution Schemes I: The Semi-Discrete Case. Math. Comp. 1996, 65, 45–67. [Google Scholar] [CrossRef] [Green Version]
  14. Godunov, S.K. Finite-difference method for numerical computation of discontinuous solutions of the equations of fluid dynamics. Mat. Sb. 1959, 47, 271–306. [Google Scholar]
  15. Engquist, B.; Osher, S. Stable and Entropy Satisfying Approximations for Transonic Flow Calculations; LBL Report No. 14661; American Mathematical Society: Providence, RI, USA, 1982. [Google Scholar]
  16. Tadmor, E. Convenient total variation diminishing conditions for nonlinear difference schemes. SIAM J. Numer. Anal. 1988, 25, 1002–1014. [Google Scholar] [CrossRef] [Green Version]
  17. Shu, C.-W. Total-variation-diminishing time discretizations. SIAM J. Sci. Stat. Comput. 1988, 9, 1073–1084. [Google Scholar] [CrossRef]
  18. Shu, C.-W.; Osher, S. Efficient implementation of essentially non-oscillatory shock capturing schemes II. J. Comp. Phys. 1989, 83, 32–78. [Google Scholar] [CrossRef]
  19. Jiang, N. On the Convergence of a Second Order Nonlinear SSP Runge-Kutta Method for Convex Scalar Conservation laws. Methods Appl. Anal. 2022, 29, 209–228. [Google Scholar] [CrossRef]
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Jiang, N. On the Convergence of α Schemes with Source Terms for Scalar Convex Conservation Laws. Mathematics 2023, 11, 3267. https://doi.org/10.3390/math11153267

AMA Style

Jiang N. On the Convergence of α Schemes with Source Terms for Scalar Convex Conservation Laws. Mathematics. 2023; 11(15):3267. https://doi.org/10.3390/math11153267

Chicago/Turabian Style

Jiang, Nan. 2023. "On the Convergence of α Schemes with Source Terms for Scalar Convex Conservation Laws" Mathematics 11, no. 15: 3267. https://doi.org/10.3390/math11153267

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop