Академический Документы
Профессиональный Документы
Культура Документы
HIERARCHICAL B-SPLINES
Abstract. We consider an adaptive algorithm for finite element methods for the isogeomet-
ric analysis (IGAFEM) of elliptic (possibly non-symmetric) second-order partial differential
equations in arbitrary space dimension d ≥ 2. We employ hierarchical B-splines of arbitrary
degree and different order of smoothness. We propose a refinement strategy to generate a
sequence of locally refined meshes and corresponding discrete solutions. Adaptivity is driven
by some weighted residual a posteriori error estimator. We prove linear convergence of the
error estimator (resp. the sum of energy error plus data oscillations) with optimal algebraic
rates. Numerical experiments underpin the theoretical findings.
1. Introduction
Finally, we note that the additional regularity A ∈ W 1,∞ (Ω) (instead of A ∈ L∞ (Ω)) is only
required for the well-posedness of the residual a posteriori error estimator, see Section 2.
1.3. Outline & Contributions. The remainder of this work is roughly organized as fol-
lows: Section 2 provides an abstract framework for adaptive mesh-refinement for conforming
FEM for the model problem (1.1). Its main result is Theorem 2.4 which states optimal
convergence behavior of some standard adaptive algorithm. Section 3 considers conforming
FEM based on hierarchical splines. Its main result is Theorem 3.8 which states that hierar-
chical splines fit into the framework of Section 2. The proofs of Theorem 2.4 and Theorem 3.8
are given in Section 4 and Section 5, respectively. Three numerical experiments in Section 6
underpin the optimal convergence behavior of adaptive IGAFEM with hierarchical splines.
In more detail, the contribution of Section 2 can be paraphrased as follows: We formulate
the standard adaptive strategy (Algorithm 2.3) driven by some residual a posteriori error
estimator (2.9) in the frame of conforming FEM. We formulate three assumptions (M1)–(M3)
for the underlying meshes (Section 2.1), five assumptions (R1)–(R5) on the mesh-refinement
(Section 2.2), and six assumptions (S1)–(S6) on the FEM spaces (Section 2.3). First, these
2
assumptions are sufficient to guarantee that the error estimator η• associated with the FEM
solution U• ∈ X• ⊂ H01 (Ω) is efficient and reliable, i.e., there exist Ceff , Crel > 0 such that
−1
Ceff η• ≤ inf ku − V• kH 1 (Ω) + osc• (V• ) ≤ ku − U• kH 1 (Ω) + osc• (U• ) ≤ Crel η• . (1.6)
V• ∈X•
where osc• (·) denotes certain data oscillation terms. Second, Theorem 2.4 states that Algo-
rithm 2.3 leads to linear convergence with optimal rates in the spirit of [CKNS08, CFPP14]:
Let ηℓ denote the error estimator in the ℓ-th step of the adaptive algorithm. Then, there
exist C > 0 and 0 < q < 1 such that
ηℓ+n ≤ C q n ηℓ for all ℓ, n ∈ N0 . (1.7)
Moreover, for sufficiently small marking parameters in Algorithm 2.3, the estimator (resp.
the so-called total error ku−Uℓ kH 1 (Ω) +oscℓ (Uℓ ); see (1.6)) decays even with the optimal alge-
braic convergence rate in the sense of certain nonlinear approximation classes (Section 2.7).
In explicit terms, we identify sufficient conditions of the underlying meshes, the local FEM
spaces, as well as the employed (local) mesh-refinement rule which guarantee that the related
residual a posteriori error estimator satisfies the axioms of adaptivity from [CFPP14], so that
linear convergence with optimal rates for the standard adaptive algorithm follows. While
we exploit this framework only for IGAFEM with hierarchical splines, we believe that it
might also serve as a promising starting point to analyze different technologies for adaptive
IGAFEM like (analysis-suitable) T -splines or LR-splines, as well as for other conforming
discretizations like the virtual element method (VEM) from [BdVBC+ 13].
Section 3 recalls the definition of hierarchical splines from [VGJS11], derives the canonical
basis of the hierarchical spline space X• ⊂ H01 (Ω) with Dirichlet boundary conditions (Sec-
tion 3.3), formulates an admissibility criterion (3.21) for hierarchical meshes (Section 3.4),
and introduces some local mesh-refinement rule for admissible hierarchical meshes (Sec-
tion 3.5). One crucial observation is that the new mesh-refinement strategy for hierarchical
meshes (Algorithm 3.5) guarantees that the number of (truncated) hierarchical B-splines on
each element as well as the number of active elements contained in the support of each (trun-
cated) hierarchical B-spline is uniformly bounded (Proposition 3.3). If one uses the strategy
of [BG16b, BGMP16] instead, this property is is not satisfied for hierarchical B-splines, but
only for truncated hierarchical B-splines. In general, the latter have a smaller, but also more
complicated and not necessarily connected support.
The main result of Section 3 and the entire work is Theorem 3.8 which states that hierarchi-
cal splines together with the proposed local mesh-refinement strategy satisfy all assumptions
of Section 2, so that Theorem 2.4 applies. In particular, our work goes beyond [BG16b] in
two respects: While [BG16b] only proves linear convergence of the adaptive algorithm, we
give the first proof of optimal convergence rates for IGAFEM. Moreover, [BG16b] adapts the
analysis of [CKNS08] and is hence restricted to symmetric problems (i.e., b = 0 and c ≥ 0
in (1.1)). Our analysis exploits the framework of [CFPP14] together with some recent ideas
from [FFP14, BHP17] and also covers the non-symmetric problem (1.1).
Technical contributions of general interest include the following: We prove that a hierar-
chical mesh is admissible if and only if it can be obtained by the mesh-refinement strategy of
Algorithm 3.5 (Proposition 5.2). Moreover, admissible meshes also allow a simpler compu-
tation of truncated hierarchical B-splines in the sense that truncation simplifies considerably
(Proposition 5.6). Together with some ideas from [SM16], we use this observation to define
3
a Scott-Zhang-type projector J• : L2 (Ω) → X• which is locally L2 - and H 1 -stable and has a
first-order approximation property (Section 5.10).
1.4. General notation. Throughout, | · | denotes the absolute value of scalars, the
Euclidean norm of vectors in Rd , as well as the d-dimensional measure of a set in Rd .
Moreover, # denotes the cardinality of a set as well as the multiplicity of a knot within a
given knot vector. We write A . B to abbreviate A ≤ cB with some generic constant c > 0
which is clear from the context. Moreover, A ≃ B abbreviates A . B . A. Throughout,
mesh-related quantities have the same index, e.g., X• is the ansatz space corresponding to
the mesh T• . The analogous notation is used for meshes T◦ , T⋆ or Tℓ etc. Moreover, we use
b· to transfer quantities in the physical domain Ω to the parameter domain Ω,b e.g., we write
b
T for the set of all admissible meshes in the parameter domain instead of T which denotes
the set of all admissible meshes in the physical domain.
To abbreviate notation,
S we let π• (ω) := π•1 (ω) 1
S and Π• (ω) := Π• (ω). For SS• ⊆ T• , we define
k k k k
π• (SS• ) := π• ( SS• ) and Π• (SS• ) := Π• ( SS• ).
We suppose that there exist Cshape , Cpatch , Ctrace > 0 such that all meshes T• ∈ T satisfy
the following three properties (M1)–(M3):
−1
(M1) Shape regularity. For all T ∈ T• and all T ′ ∈ Π• (T ), it holds that Cshape |T ′| ≤
′
|T | ≤ Cshape |T |, i.e., neighboring elements have comparable size.
(M2) Bounded element patch. For all T ∈ T• , it holds that #Π• (T ) ≤ Cpatch , i.e., the
number of elements in a patch is uniformly bounded.
(M3) Trace inequality. For all T ∈ T• and all v ∈ H 1 (Ω), it holds that kvk2L2 (∂T ) ≤
Ctrace |T |−1/d kvk2L2 (T ) + |T |1/d k∇vk2L2 (T ) .
4
2.2. Mesh-refinement. For T• ∈ T and an arbitrary set of marked elements M• ⊆ T• ,
we associate a corresponding refinement T◦ := refine(T• , M• ) ∈ T with M• ⊆ T• \ T◦ ,
i.e., at least the marked elements have been refined. We define refine(T• ) as the set of all
T◦ such that there exist meshes T(0) , . . . , T(J) and marked elements M(0) , . . . , M(J−1) with
T◦ = T(J) = refine(T(J−1) , M(J−1) ), . . . , T(1) = refine(T(0) , M(0) ) and T(0) = T• . Here, we
formally allow J = 0, i.e., T• ∈ refine(T• ). We assume that there exists a fixed initial mesh
T0 ∈ T with T = refine(T0 ).
We suppose that there exist Cson ≥ 2 and 0 < qson < 1 such that all meshes T• ∈
T satisfy for arbitrary marked elements M• ⊆ T• with corresponding refinement T◦ :=
refine(T• , M• ), the following elementary properties (R1)–(R3):
(R1) Bounded number of sons. It holds that #T◦ ≤ Cson #T• , i.e., one step of refine-
ment leads to a bounded increase of elements. S
(R2) Father is union of sons. It holds that T = T ′ ∈ T◦ : T ′ ⊆ T for all T ∈ T• ,
i.e., each element T is the union of its successors.
(R3) Reduction of sons. It holds that |T ′ | ≤ qson |T | for all T ∈ T• and all T ′ ∈ T◦ with
T ′ $ T , i.e., successors are uniformly smaller than their father.
By induction and the definition of refine(T• ), one easily sees that (R2)–(R3) remain valid
if T◦ is an arbitrary mesh in refine(T• ). In particular, (R2)–(R3) imply that each refined
element T ∈ T• \ T◦ is split into at least two sons, wherefore
#(T• \ T◦ ) ≤ #T◦ − #T• for all T◦ ∈ refine(T• ). (2.3)
Besides (R1)–(R3), we suppose the following less trivial requirements (R4)–(R5) with a
generic constant Cclos > 0:
(R4) Closure estimate. If Mℓ ⊆ Tℓ and Tℓ+1 = refine(Tℓ , Mℓ ) for all ℓ ∈ N0 , then
L−1
X
#TL − #T0 ≤ Cclos #Mℓ for all L ∈ N.
ℓ=0
2.3. Finite element space. With each T• ∈ T, we associate a finite dimensional space
X• ⊂ v ∈ H01 (Ω) : v|T ∈ H 2 (T ) for all T ∈ T• . (2.4)
Let U• ∈ X• be the corresponding Galerkin approximation to the solution u ∈ H01 (Ω), i.e.,
ˆ
hU• , V• iL = f V• dx for all V• ∈ X• . (2.5)
Ω
2.4. Error estimator. Let T• ∈ T and T1 ∈ T• . For almost every x ∈ ∂T1 ∩ Ω, there
exists a unique element T2 ∈ T• with x ∈ T1 ∩ T2 . We denote the corresponding outer normal
vectors by ν1 resp. ν2 and define the normal jump as
[A∇U• · ν](x) = A∇U• |T1 (x) · ν1 (x) + A∇U• |T ′ (x) · ν2 (x). (2.8)
With this definition, we employ the residual a posteriori error estimator
X
η• := η• (T• ) with η• (SS• )2 := η• (T )2 for all SS• ⊆ T• , (2.9a)
T ∈SS•
2.5. Data oscillations. The definition of the data oscillations corresponding to the
residual error estimator (2.9) requires some further notation. Let P(Ω) ⊂ H 1 (Ω) be a fixed
′
discrete subspace. We suppose that there exists Cinv such that the following property (O1)
holds for all T• ∈ T:
−1/d
(O1) Inverse estimate in dual norm. For all
′
´W ∈ P(Ω), it holds1that |T | kW kH −1 (T ) ≤
Cinv kW kL2 (T ) , where kW kH −1 (T ) := sup T W v dx : w ∈ H0 (T ) ∧ k∇vkL2 (T ) = 1 .
6
Besides (O1), we suppose that there exists Clift > 0 such that for all T• ∈ T and all
T, T ′ ∈ T• with (d − 1)-dimensional
intersection E := T ∩ T ′ , there exists a lifting operator
L•,E : W |E : W ∈ P(Ω) → H01 (T ∪ T ′ ) with the following properties (O2)–(O4):
(O2) Dual inequality. For all W ∈ P(Ω), it holds that E W 2 dx ≤ Clift E L•,E (W |E )W dx.
´ ´
(O3) L2 -control. For all W ∈ P(Ω), it holds that kL•,E (W |E )k2L2 (T ∪T ′ ) ≤ Clift |T ∪
T ′ |1/d kW k2L2 (E) .
(O4) H 1 -control. For all W ∈ P(Ω), it holds that k∇L•,E (W |E )k2L2 (T ∪T ′ ) ≤ Clift|T ∪
T ′ |−1/d kW k2L2 (E) .
Let T• ∈ T. For T ∈ T• , we define the L2 -orthogonal
projection P •,T : L 2
(T ) → W |T :
′ ′ ′
W ∈ P(Ω) . For an interior edge E ∈ E•,T := T ∩ T : T ∈ T• ∧ dim(T ∩ T ) = d − 1 ,
we define the L2 -orthogonal projection P•,E : L2 (E) → W |E : W ∈ P(Ω) . Note that
S
E•,T = ∂T ∩ Ω. For V• ∈ X• , we define the corresponding oscillations
X
osc• (V• ) := osc• (V• , T• ) with osc• (V• , SS• )2 := osc• (V• , T )2 for all SS• ⊆ T• ,
T ∈SS•
(2.10a)
where, for all T ∈ T• , the local oscillations read
osc• (V• , T )2 := |T |2/d k(1 − P•,T )(f + divA∇V• − b · ∇V• − cV• )k2L2 (T )
X
+ |T |1/d k(1 − P•,E )[A∇V• · ν]k2L2 (E) . (2.10b)
E∈E•,T
We refer, e.g., to [NV12] for the analysis of oscillations in the frame of standard FEM with
piecewise polynomials of fixed order.
Remark 2.2. If X• ⊂ C 1 (Ω), then the jump contributions in (2.10) vanish and osc• (V• , T )
consists only of the volume oscillations; see [BG16b] in the frame of IGAFEM.
and
kukBs := sup min (N + 1)s inf ku − V• kH 1 (Ω) + osc• (V• ) ∈ [0, ∞]. (2.13)
N ∈N0 T• ∈T(N ) V• ∈X•
By definition, kukAs < ∞ (resp. kukBs < ∞) implies that the error estimator η• (resp. the
−s
total error) on the optimal meshes T• decays at least with rate O (#T• ) . The following
main theorem states that each possible rate s > 0 is in fact realized by Algorithm 2.3. The
(sketch of the) proof is given in Section 4. It is split into eight steps and builds upon the
analysis of [CFPP14].
Theorem 2.4. (i) Suppose (M2)–(M3) and (S5)–(S6). Then, the residual error esti-
mator (2.9) satisfies reliability, i.e., there exists a constant Crel > 0 such that
ku − U• kH 1 (Ω) + osc• ≤ Crel η• for all T• ∈ T. (2.14)
(ii) Suppose (M1)–(M3), (S1), and (O1)–(O4). Then, the residual error estimator satis-
fies efficiency, i.e., there exists a constant Ceff > 0 such that
−1
Ceff η• ≤ inf ku − V• kH 1 (Ω) + osc• (V• ) . (2.15)
V• ∈X•
(iii) Suppose (M1)–(M3), (R2)–(R3), and (S1)–(S6). Then, for arbitrary 0 < θ ≤ 1 and
Cmin ≥ 1, there exist constants Clin > 0 and 0 < qlin < 1 such that the estimator
sequence of Algorithm 2.3 guarantees linear convergence in the sense of
2 j
ηℓ+j ≤ Clinqlin ηℓ2 for all j, ℓ ∈ N0 . (2.16)
(iv) Suppose (M1)–(M3), (R1)–(R5), and (S1)–(S6). Then, there exists a constant 0 <
θopt ≤ 1 such that for all 0 < θ < θopt , all Cmin ≥ 1, and all s > 0, there exist
constants copt , Copt > 0 such that
copt kukAs ≤ sup (#Tℓ − #T0 + 1)s ηℓ ≤ Copt kukAs , (2.17)
ℓ∈N0
i.e., the estimator sequence will decay with each possible rate s > 0.
All involved constants Crel , Ceff , Clin, qlin, θopt , copt , and Copt depend only on the assumptions
made as well as the coefficients of the differential operator L and diam(Ω), where Clin, qlin
depend additionally on θ and the sequence (Uℓ )ℓ∈N0 , and copt , Copt depend furthermore on
Cmin , and s > 0.
Remark 2.5. If the assumptions of Theorem 2.4 (i)–(ii) are satisfied, there holds in partic-
ular
−1
Ceff kukAs ≤ kukBs ≤ Crel kukAs for all s > 0. (2.18)
Remark 2.6. Note that almost minimal cardinality of Mℓ in Step (iii) of Algorithm 2.3 is
only required to prove optimal convergence behavior (2.17), while linear convergence (2.16)
formally allows Cmin = ∞, i.e., it suffices that Mℓ satisfies the Dörfler marking criterion in
Step (iii). We refer to [CFPP14, Section 4.3–4.4] for details.
8
Remark 2.7. (a) If the bilinear form h· , ·iL is symmetric, Clin , qlin as well as copt , Copt are
then independent of (Uℓ )ℓ∈N0 ; see Remark 4.1 below.
(b) If the bilinear form h· , ·iL is non-symmetric, there exists an index ℓ0 ∈ N0 such that
the constants Clin , qlin as well as copt , Copt are independent of (Uℓ )ℓ∈N0 , if (2.16)–(2.17) are
formulated only for ℓ ≥ ℓ0 . We refer to the recent work [BHP17, Theorem 19].
Remark 2.8. If X• ⊂ C 1 (Ω), all jump contributions vanish; see Remark 2.1 and Remark 2.2.
In this case, the assumptions (O2)–(O4) are not necessary for the proof of (2.15).
Remark 2.9. (a) Let hℓ := maxT ∈Tℓ |T |1/d be the maximal mesh-width. Then, hℓ → 0 as
S
ℓS→ ∞, ensures that X∞ := ℓ∈N0 Xℓ = H01 (Ω). To see this, recall that (S2) ensures that
ℓ∈N0 Xℓ is a vector space and, in particular, convex.
S
By Mazur’s lemma (see, e.g., [Rud91,
Theorem 3.12]), it is thus sufficient to show that ℓ∈N0 Xℓ is weakly dense in H01 (Ω). Let
v ∈ H01 (Ω). The Banach-Alaoglu theorem (see, e.g., [Rud91, Theorem 3.15]) together with
(M2) and (S5)–(S6) proves that each subsequence (Jℓm v)m∈N0 admits a further subsequence
(Jℓmn v)n∈N0 which is weakly convergent in H01 (Ω) towards some limit w ∈ H01 (Ω). The Rellich
compactness theorem hence implies kw − Jℓmn vkL2 (Ω) → 0 as n → ∞. On the other hand,
(S5) together with (M2), (R1)–(R3), and hℓ → 0 shows that kv −Jℓ vkL2 (Ω) . hℓ kvkH 1 (Ω) → 0
as ℓ → ∞. Together with the uniqueness of limits, these two observations conclude v = w.
Overall, each subsequence (Jℓm v)m∈N0 of (Jℓ v)ℓ∈N admits a further subsequence (Jℓmn v)n∈N0
which converges weakly in H01 (Ω) to v. Basic calculus thus yields that Jℓ v ⇀ v weakly in
H01 (Ω) as ℓ → ∞. This concludes the proof.
(b) We note that the latter observation allows to follow the ideas of [BHP17] and to show
that the adaptive algorithm yields convergence even if the bilinear form h· , ·iL is only elliptic
up to some compact perturbation, provided that the continuous problem is well-posed. This
includes, e.g., adaptive FEM for the Helmhotz equation. For details, the reader is referred
to [BHP17].
3. Hierarchical setting
In this section, we recall the definition of hierarchical (B-)splines from [VGJS11] and
propose a local mesh-refinement strategy. The main result of this section is Theorem 3.8
which states that hierarchical splines together with the proposed mesh-refinement strategy
fit into the abstract setting of Section 2 and are hence covered by Theorem 2.4. The proof
of Theorem 3.8 is given in Section 5.
3.1. Nested tensor meshes and splines. We define the parameter domain Ω b := (0, 1)d .
b 0 be an arbitrary
Let p1 , . . . , pd ≥ 1 be fixed polynomial degrees with p := maxi=1,...,d pi . Let K
fixed d-dimensional vector of pi -open knot vectors with multiplicity smaller or equal to pi
for the interior knots, i.e.,
b 0 = (K
K b 10 . . . , K
b d0 ), (3.1)
N 0 +p
b 0 = (t0 ) i i is a non-decreasing vector in [0, 1] such that t0 = · · · = t0 = 0,
where K i i,j j=0 i,0 i,pi
t0i,N 0 = · · · = t0i,N 0 +pi , and #t0i,j := # k ∈ {0, . . . , Ni0 + pi } : t0i,k = t0i,j ≤ pi for j =
i i
b k
where B(·|t k
i,ji −1 , . . . , ti,ji +pi ) denotes the one-dimensional B-spline corresponding to the lo-
cal knot vector (tki,ji −1 , . . . , tki,ji+pi ). It is well known that the function in Bbk have support
bk k k k k d
supp(B j1 ,...,jd ) = [t1,j1 −1 , t1,j1 +p1 ] × · · · × [td,jd −1 , td,jd +pd ] ⊆ [0, 1] , form a partition of unity,
d
and are even locally linearly independent, i.e, for any open set O ⊆ [0, 1] , the restricted
B-splines β|b O : βb ∈ Bbk ∧ supp(β)
b ∩ O 6= ∅ are linearly independent. Let Ybk := span(Bbk ).
This yields a nested sequence of tensor-product d-variate spline function spaces (Ybk )k∈N0
that are at least Lipschitz continuous
Ybk ⊂ Ybk+1 ⊂ W 1,∞ (Ω).
b (3.4)
In particular, each βbk ∈ Bbk can be written as linear combination of functions in Bbk+1 , i.e.,
it has a unique representation of the form
X
βbk = cβbk+1 βbk+1. (3.5)
βbk+1 ∈Bbk+1
By the knot insertion procedure, one can show that these coefficients satisfy
X
cβbk+1 = 1 and cβbk+1 ≥ 0. (3.6)
βbk+1 ∈Bbk+1
b0 = Ω
Ω b and Ω
bk ⊇ Ω
b k+1 . (3.9)
• • •
We suppose that for k > 0 each Ωb k• is the union of a selection of cells of level k − 1, i.e.,
[
bk =
Ω b ∈ Tb k−1 : Tb ⊆ Ω
T bk . (3.10)
• •
10
Figure 3.1. A two-dimensional hierarchical mesh Tb• on the parameter do-
main is depicted, where Ω b 4• = ∅. The corresponding domains Ω
b 0• ⊇ Ω
b 1• ⊇ Ω
b 2• ⊇
b 3• are highlighted in black, red, blue and green.
Ω
with Tb ⊆ Ω
b k• and Tb 6⊆ Ω
b k+1 b b
• . Note that T• is a mesh of Ω in the sense of Section 2.1.
With these preparations, one inductively defines the set of all hierarchical B-splines in the
parameter domain H b• := H b M• −1 as follows:
•
b 0 := Bb0 .
(i) Define H •
b k+1 := old(H
(ii) For k = 0, . . . , M• − 2, define H b k+1 ) ∪ new(H b k+1 ), where
• • •
b k+1 b b k b
old(H• ) := β ∈ H• : supp(β) 6⊆ Ω• b k+1
,
(3.12)
new(Hb k+1 ) := βb ∈ Bbk+1 : supp(β) b ⊆Ω b k+1 .
• •
One can prove that the so-called hierarchical basis Hb• is linearly independent; see [VGJS11,
Lemma 2]. By definition, it holds that
[
b• =
H βb ∈ Bbk : supp(β)
b ⊆Ω
•
b 6⊆ Ω
b k ∧ supp(β) b k+1 .
• (3.13)
k∈N0
Moreover, supp(β)b must contain at least one element of level level(β), b otherwise one would
b
b ⊆Ω
get the contradiction supp(β) b level(
•
β)+1
. In particular, this shows that
b =
level(β) min level(Tb) for all βb ∈ H
b•. (3.16)
b ∈T
T b•
b ⊆supp(β)
T b
Define the space of hierarchical splines in the parameter domain by Yb• := span(H b• ).
According to (3.15), each Vb• ∈ Yb• is a Tb• -piecewise tensor polynomial of degree (p1 , . . . , pd ).
We define our ansatz space in the parameter domain as
Xb• := Vb• ∈ Yb• : Vb• |∂ Ωb = 0 ⊂ Yb• ⊂ b b : vb| b ∈ C 2 (Tb) for all Tb ∈ Tb• . (3.17)
v ∈ W01,∞ (Ω) T
Note that this specifies the abstract setting of Section 2.3. For a more detailed introduction
to hierarchical meshes and splines, we refer to, e.g., [VGJS11, BG15, SM16].
3.3. Basis of Xb• . In this section, we characterize a basis of the hierarchical splines Xb• that
vanish on the boundary. To this end, we first determine the restriction of the hierarchical
basis Hb• to a facet of the boundary. It turns out that this restriction coincides with the set
of (d − 1)-dimensional hierarchical B-splines.
Proposition 3.1. Let Tb• be an arbitrary hierarchical mesh on the parameter domain Ω. b For
E = [0, 1]I−1 × {e} × [0, 1]d−I with some I ∈ {1, . . . , d} and some e ∈ {0, 1}, set K b 0 |E :=
(Kb0, . . . , K
b0 K b0 b0 bk bk
I−1 I+1 , . . . , Kd ), and Ω• |E := (s1 , . . . , sI−1 , sI+1 , . . . , sd ) : (s1 , . . . , sd ) ∈ Ω• ∩
1
E for k ∈ N0 . Moreover, let Tb• |E be the corresponding hierarchical mesh and H b• |E the
corresponding hierarchical basis. Then, there holds1 H b• |E = β| b E : βb ∈ H b• ∧ β| b E 6= 0 .
Moreover, the restriction H b• → H b• |E is essentially injective, i.e., for βb1 , βb2 ∈ H b• with
βb1 6= βb2 and βb1 |E 6= 0, it follows that βb1 |E 6= βb2 |E .
Proof. We prove the assertion in two steps.
Step 1: Let k ∈ N0 . We recall that the knot vectors K b k are pi -open. In particular, this
i
implies that the corresponding one-dimensional B-splines Bbik are interpolatoric at the end
points e ∈ {0, 1}. This means that the first resp. last B-spline in Bbik (i.e., B(·|tki,0 , . . . , tki,1+pi )
resp. B(·|tki,N k −1 , . . . , tki,N k +pi )) is equal to one at 0 resp. 1 and that all other B-splines of Bbik
i i
vanish at these points; see, e.g., [Sch16, Lemma 2.1].
Step 2: We consider arbitrary d > 1. For k ∈ N0 , let Bbk |E be the set of tensor product
B-splines induced by the reduced knots K b k |E which are defined analogously to K b 0 |E . Since
1Actually, the set on left-hand side consists of functions defined on [0, 1]d−1 , whereas the right-hand side
functions are defined on E. However, clearly these functions can be identified.
12
Kb k is pj -open, it holds that Bbk |E = β| b E : βb ∈ Bbk ∧ β|
b E 6= 0 ; see also Step 1. Then, the
j
identity (3.13) shows
[n o
Hb • |E = b E : βb ∈ Bbk ∧ β|
β| b E 6= 0 ∧ supp(β|
b E) ⊆ Ω b E ) 6⊆ Ω
b k |E ∧ supp(β| b k+1 |E . (3.18)
• •
k∈N0
b k , . . . , tk
where the second factor is one if sI = e and satisfies supp(B(·|t k k
I,J I,J+pI +1 )) = [tI,J , tI,J+pI +1 ].
This shows that supp(β) b is the union of elements Tb ∈ Tb k with non-empty intersection with
b E) ⊆ Ω b ⊆ Ω
b k• |E is equivalent to supp(β) b k• , and supp(β| b E ) 6⊆ Ω b k+1
E. Hence supp(β| • |E is
b b k+1
equivalent to supp(β) 6⊆ Ω• . Therefore, (3.18) becomes
[n o
Hb • |E = b E : βb ∈ Bbk ∧ β|
β| b E 6= 0 ∧ supp(β)
b ⊆Ω b k• ∧ supp(β) b 6⊆ Ωb k+1 .
•
k∈N0
Together with (3.13), this shows H b• |E = β|b E : βb ∈ H b E 6= 0 . Finally, let βb1 , βb2 ∈ H
b• ∧ β| b•
with βb1 |E 6= 0. If βb1 |E = βb2 |E , then (3.19) already implies βb1 = βb2 . This concludes the proof.
Corollary 3.2. Let Tb• be an arbitrary hierarchical mesh on the parameter domain Ω.
b Then,
βb ∈ Hb• : β| b = 0 is a basis of Xb• .
∂Ω
Proof. Linear independence as well as βb ∈ H b b = 0 ⊆ X• are obvious. To see X• ⊆
b• : β|
∂ Ω
span βb ∈ H b b = 0 , let Vb• ∈ Xb• . Consider the unique representation Vb• = P b b c bβb
b• : β|
∂Ω β∈H• β
b b b
with cβb ∈ R. For arbitrary β ∈ H• with β|∂ Ωb 6= 0, we have to prove cβb = 0, i.e., we have to
show the implication
X
b b = 0 =⇒
cβb β| ∀βb∈H b• with β| b 6= 0 c b = 0 .
∂Ω ∂Ω β
b H
β∈ b•
b b 6=0
β| ∂Ω
P b E = 0. According
Let E = [0, 1]I−1 ×{e}×[0, 1]d−I with I ∈ {1, . . . , d} and β∈b b b c b β|
H• ∧β|E 6=0 β
to Proposition 3.1, the family β| b E : βb ∈ Hb• ∧ β| b E 6= 0 is linearly independent. Hence,
cβb = 0 for βb ∈ H
b b E 6= 0. Since ∂ Ω
b• with β| b is the union of such facets E, this concludes the
proof.
3.4. Admissible meshes in the parameter domain Ω. b Let Tb• be an arbitrary hier-
archical mesh. We define the set of all neighbors of an element Tb ∈ Tb• as
N• (Tb) := Tb′ ∈ Tb• : ∃βb ∈ H b ,
b• Tb, Tb′ ⊆ supp(β) (3.20)
13
According to (3.15), the condition Tb, Tb′ ⊆ supp(β) b is equivalent to |Tb ∩ supp(β)|
b =
6 0 6=
b We call Tb• admissible if
|Tb ∩ supp(β)|.
′
|level(Tb) − level(Tb′ )| ≤ 1 for all Tb, Tb′ ∈ Tb• with Tb′ ∈ N• (Tb). (3.21)
Let T b be the set of all admissible hierarchical meshes in the parameter domain. Clearly,
b for all k ∈ N0 . Moreover, admissible meshes satisfy the following interesting proper-
Tb k ∈ T
ties which are also important for an efficient implementation of IGAFEM with hierarchical
splines.
Proposition 3.3. Let Tb• ∈ T. b Then, the support of any basis function βb ∈ H b• is the union
of at most 2 (p + 1) elements Tb ∈ Tb• . Moreover, for any Tb ∈ Tb• , there are at most 2(p + 1)d
d d ′
basis functions βb′ ∈ Hb• that have support on Tb, i.e., |supp(βb′ ) ∩ Tb| > 0.
3.5. Refinement in the parameter domain Ω. b We define the initial mesh Tb0 := Tb 0 .
Note that Tb0 is a hierarchical mesh with Ω b k = ∅ for all k > 0. We say that a hierarchical
0
mesh Tb◦ is finer than another hierarchical mesh Tb• if Ω bk ⊆ Ω
•
b k for all k ∈ N0 . This just means
◦
that T◦ is obtained from T• by iterative dyadic bisections of the elements in Tb• . To bisect an
b b
element Tb ∈ Tb• , one just has to add it to the set Ωb •level(Tb)+1 , see (3.25) below. In this case,
the corresponding spaces are nested, i.e.,
Yb• ⊆ Yb◦ and Xb• ⊆ Xb◦ . (3.22)
For a proof, see, e.g., [SM16, Corollary 2]. In particular, this implies
Yb0 ⊆ Yb• ⊆ YbM• −1 . (3.23)
Next, we present a concrete refinement algorithm to specify the setting of Section 2.2. To
this end, we first define for Tb ∈ Tb• ∈ T the set of its bad neighbors
N•bad (Tb) := Tb′ ∈ N• (Tb) : level(Tb′) = level(Tb) − 1 . (3.24)
Clearly, refine(Tb• , M
c• ) is finer than Tb• . For any hierarchical mesh Tb• , we define refine(Tb• )
as the set of all hierarchical meshes Tb◦ such that there exist hierarchical meshes Tb(0) , . . . , Tb(J)
and marked elements M c(0) , . . . , M
c(J−1) with Tb◦ = Tb(J) = refine(Tb(J−1) , M
c(J−1) ), . . . , Tb(1) =
refine(Tb(0) , M
c(0) ), and Tb(0) = Tb• . Here, we formally allow J = 0, i.e., T• ∈ refine(T• ).
Proposition 5.2 below will show that T b = refine(Tb0 ), i.e., starting from Tb0 = Tb 0 , all admis-
sible meshes Tb• can be generated by iterative refinement via Algorithm 3.5.
Remark 3.6. [BG16b, BGMP16] studied a related refinement strategy, where N• (Tb) of
(3.20) and N•bad (Tb) from (3.24) are replaced by
Ne• (Tb) := Tb′ ∈ Tb• : ∃βb ∈ Bblevel(Tb) with |Tb ∩ supp(β)|
b = b ,
6 0 6= |Tb′ ∩ supp(β)|
(3.26)
e bad (Tb) := Tb′ ∈ N
N e• : level(Tb′ ) = level(Tb) − 1 .
•
There, the refinement strategy was designed for truncated hierarchical B-splines; see Sec-
tion 5.9. Compared to the hierarchical B-splines H b• , those have generically a smaller, but
also more complicated and not necessarily connected support. [BG16b, Corollary 17] shows
that the generated meshes are strictly admissible in the sense of [BG16b, BGMP16], i.e., for
all k ∈ N, it holds that
[
bk ⊆
Ω• Tb ∈ Tb k−1 : ∀βb ∈ Bbk−1 Tb ⊆ supp(β)b =⇒ supp(β) b ⊆Ω b k−1 .
• (3.27)
This definition actually goes back to [GJS14, Appendix A]. According to [BG16b, Section 2.4],
strictly admissible meshes satisfy a similar version of Proposition 3.3 for truncated hierar-
chical B-splines. However, the example from Figure 3.2 shows that the proposition fails
for hierarchical B-splines and the refinement strategy from [BG16b]. In particular, strictly
admissible meshes are not necessarily admissible in the sense of Section 3.4.
3.6. Hierarchical meshes and splines in the physical domain Ω. To transform the
definitions in the parameter domain to the physical domain, we assume that we are given
γ:Ω b → Ω with γ ∈ W 1,∞ (Ω) b ∩ C 2 (Tb0 ) and γ −1 ∈ W 1,∞ (Ω) ∩ C 2 (T0 ), (3.28)
where C 2 (T0 ) := v : Ω → R : v|T ∈ C 2 (T ) for all T ∈ T0 . Consequently, there exists
Cγ > 0 such that for all i, j, k ∈ {1, . . . , d}
∂
∂
γ i
∞ b ≤ Cγ ,
(γ −1 )i
≤ Cγ ,
∂tj L (Ω) ∂xj L∞ (Ω)
∂2
∂2
(3.29)
−1
γi
≤ Cγ ,
(γ )i
≤ Cγ ,
∂tj ∂tk b
L∞ (Ω) ∂xj ∂xk L∞ (Ω)
15
Algorithm [BG16b] Algorithm 3.5
Figure 3.2. An initial mesh Tb0 with only one element [0, 1]2 is locally refined
in the lower left corner using the refinement of [BG16b] (left) resp. the refine-
ment of Algorithm 3.5 (right); see Remark 3.6 . Consider the lowest-order case
(p1 , p2 ) = (1, 1). By repetitive refinement via [BG16b], the number of elements
in the support of the hierarchical B-spline B(s b 1 |0, 1/2, 1)B(s
b 2 |0, 1/2, 1) grows
to infinity. Moreover, the number of hierarchical B-splines with support on
the element in the lower left corner grows to infinity. This is not the case if
one uses Algorithm 3.5, see also Proposition 3.3.
where γi resp. (γ −1 )i denotes the i-th component of γ resp. γ −1 . All previous definitions
can now also be made in the physical domain, just by pulling them from the parameter
domain via the diffeomorphism γ. For these definitions, we drop the symbol b·. If Tb• ∈ T,b
b b
we define the corresponding mesh in the physical domain as T• := γ(T ) : T ∈ T• . In b
particular, we have T0 = γ(Tb) : Tb ∈ Tb0 . Moreover, let T := T• : Tb• ∈ T b be the set
−1 meshes in the physical domain. If now M• ⊆T• with T• ∈ T, we abbreviate
of admissible
c
M• := γ (T ) : T ∈ M• and define refine(T• , M•) := γ(Tb) : Tb ∈ refine(Tb• , M c• ) .
For T• ∈ T, let X• := Vb• ◦ γ −1 : Vb• ∈ Xb• be the the corresponding hierarchical spline
space. By regularity of γ, we especially obtain
X• ⊂ v ∈ H01 (Ω) : v|T ∈ H 2 (T ) for all T ∈ T• . (3.30)
3.7. Main result. Before we come to the main result of this work, we fix polynomial
orders (q1 , . . . , qd ) and define for T• ∈ T the space of transformed polynomials
P(Ω) := Vb ◦ γ : Vb is a tensor polynomial of order (q1 , . . . , qd ) (3.31)
Remark 3.7. In order to obtain higher-order oscillations, the natural choice of the polyno-
mial orders is qi ≥ 2pi − 1; see, e.g., [NV12, Section 3.1]. If X• ⊂ C 1 (Ω), it is sufficient to
choose qi ≥ 2pi − 2; see Remark 2.2.
Altogether, we have specified the abstract framework of Section 2 to hierarchical meshes
and splines. The following theorem is the main result of the present work. It shows that all
assumptions of Theorem 2.4 are satisfied for the present IGAFEM approach. The proof is
given in Section 5.
Theorem 3.8. Hierarchical splines on admissible meshes satisfy the abstract assumptions
(M1)–(M3), (R1)–(R5), and (S1)–(S6) from Section 2, where the constants depend only on d,
Cγ , Tb0 , and (p1 , . . . , pd ). Moreover, the piecewise polynomials P(Ω) from (3.31) on admissible
meshes satisfy the abstract assumptions (O1)–(O4), where the constants depend only on d,
16
Cγ , Tb0 , and (q1 , . . . , qd ). By Theorem 2.4, this implies reliability (2.14) as well as efficiency
(2.15) of the error estimator, linear convergence (2.16), and quasi-optimal convergence rates
(2.17) for the adaptive strategy from Algorithm 2.3.
3.8. Generalization to rational hierarchical splines. One can easily verify that all
theoretical results of this work are still valid if one replaces the ansatz space X• by rational
hierarchical splines, i.e., by the set
nV o
•
X•W0 := : V• ∈ X• , (3.32)
W0
where W0 is a fixed positive weight function in the initial ansatz space X0 . In this case, the
corresponding basis consists of NURBS instead of B-splines. Indeed, the mesh properties
(M1)–(M3) as well as the refinement properties (R1)–(R5) from Section 2 are independent
of the discrete spaces. To verify the validity of Theorem 3.8 in the NURBS setting, it thus
only remains to verify the properties (S1)–(S6) for the NURBS finite element spaces. The
inverse estimate (S1) follows similarly as in Section 5.6 since we only consider a fixed and
thus uniformly bounded weight function W0 ∈ X0 . The properties (S2)–(S3) depend only on
the numerator of the NURBS functions and thus transfer. To see (S4)–(S6), one can proceed
as in Section 5.10, where the corresponding Scott-Zhang type operator J•W0 : L2 (Ω) → X•W0
now reads
J• (vW0 )
J•W0 v := for all v ∈ L2 (Ω). (3.33)
W0
With this definition, Lemma 5.9 holds accordingly, and (S4)–(S6) are proved as in Sec-
tion 5.10.
4.1. Discrete reliability. Under the assumptions (M2)–(M3), and (S2)–(S6), we show
that there exists Cdrel , Cref ≥ 1 such that for all T• ∈ T and all T◦ ∈ refine(T• ), the subset
R•◦ := Πloc
• (T• \ T◦ ) ⊆ T• satisfies
X
≤ |T |1/d kf − LU• kL2 (T ) |T |−1/d k(1 − J• )e◦ kL2 (T ) (4.2)
T ∈R•◦
1/(2d) −1/(2d)
+ |T | k[A∇U• · ν]kL2 (∂T ∩Ω) |T | k(1 − J• )e◦ kL2 (∂T ∩Ω) .
max(kapp ,kgrad )
We abbreviate π•max := π• . By (M3), (S5), and (S6), we have
|T |−1/d k(1 − J• )e◦ kL2 (T ) + |T |−1/(2d) k(1 − J• )e◦ kL2 (∂T ∩Ω) . kU◦ − U• kH 1 (π•max (T )) .
Plugging this into (4.2) and using the Cauchy-Schwarz inequality, we obtain
X 1/2 X 1/2
2 2 2
kU◦ − U• kH 1 (Ω) . η• (T ) kU◦ − U• kH 1 (π•max (T )) .
T ∈R•◦ T ∈R•◦
With (M2), the second factor is controlled by kU◦ − U• kH 1 (Ω) . This concludes the current
section, and Cdrel depends only on Cell , (M2)–(M3), and (S2)–(S6).
4.2. Reliability (2.14). Note that osc• . η• follows immediately from their defini-
tions (2.9) –(2.10). If one replaces U◦ ∈ X◦ by the exact solution u ∈ H01 (Ω) and R•◦ by T• ,
18
reliability (2.14) follows along the lines of Section 4.1, but now, (S2)–(S4) are not needed for
the proof.
4.3. Efficiency (2.15). As in [NV12, Theorem 7], the assumptions (M1)–(M2) and
(O1)–(O4) imply that
η• . ku − U• kH 1 (Ω) + osc• (U• ). (4.3)
As in [CKNS08, Proposition 3.3], the assumptions (M1)–(M3) and (S1) imply that
osc(U• ) . osc• (V• ) + kU• − V• kH 1 (Ω) for all V• ∈ X• . (4.4)
The Céa lemma (2.7) and (4.4) show that
(4.4)
ku − U• kH 1 (Ω) + osc• (U• ) . ku − U• kH 1 (Ω) + osc• (V• ) + ku − V• kH 1 (Ω)
(2.7)
. ku − V• kH 1 (Ω) + osc• (V• ) for all V• ∈ X• .
This proves ku − U• kH 1 (Ω) + osc• (U• ) ≃ inf V• ∈X• ku − V• kH 1 (Ω) + osc• (V• ) . Combining
these observations, we conclude (2.15), where Ceff depends only on Cell , (M1)–(M3), (S1)
and (O1)–(O4).
4.4. Stability on non-refined elements. As in [CKNS08, Corollary 3.4], the assump-
tions (M1)–(M3) and (S1) imply the existence of Cstb ≥ 1 such that for all T• ∈ T, all
T◦ ∈ refine(T• ), and all subsets SS ⊆ T• ∩ T◦ of non-refined elements, it holds that
|η• (SS) − η◦ (SS)| ≤ Cstb kU• − U◦ kH 1 (Ω) .
The constant Cstb depends only on (M1)–(M3), (S1), as well as on kAkW 1,∞ (Ω) , kbkL∞ (Ω) ,
kckL∞ (Ω) , and diam(Ω).
4.5. Reduction on refined elements. As in [CKNS08, Corollary 3.4], the assump-
tions (M1)–(M3), (R2)–(R3), and (S1) imply the existence of Cred ≥ 1 and 0 < qred < 1 such
that for all T• ∈ T and all T◦ ∈ refine(T• ), it holds that
η◦ (T◦ \ T• )2 ≤ qred η• (T• \T◦ )2 + Cred kU◦ − U• k2H 1 (Ω) .
1/d
The constants Cred and qred = qson depend only on (M1)–(M3), (R2)–(R3), (S1) as well as on
kAkW 1,∞ (Ω) , kbkL∞ (Ω) , kckL∞ (Ω) , and diam(Ω). Note that [A∇U• · ν] = 0 on (∂T ′ \ ∂T ) ∩ Ω
for all sons T ′ $ T of an element T ∈ T• , since U• |T ∈ H 2 (T ).
4.6. Estimator reduction
principle. Choose sufficiently small δ > 0 such that 0 <
qest := (1+δ) 1−(1−qred )θ < 1 and define Cest := Cred +(1+δ −1 )Cstb
2
. With Section 4.4–4.5,
elementary calculation shows that
2
ηℓ+1 ≤ qest ηℓ2 + Cest kUℓ+1 − Uℓ k2H 1 (Ω)
for all ℓ ∈ N0 ; (4.5)
S
see [CFPP14, Lemma 4.7]. Nestedness (S2) ensures that X∞ := ℓ∈N0 Xℓ is a closed subspace
of H01 (Ω) and hence admits a unique Galerkin solution U∞ ∈ X∞ . Note that Uℓ is also a
Galerkin approximation of U∞ . Hence, the Céa lemma (2.7) with u replaced by U∞ and a
density argument prove kU∞ − Uℓ kH 1 (Ω) → 0 as ℓ → ∞. Elementary calculus, estimator
19
reduction (4.5), and Section 4.2 thus prove ku − Uℓ kH 1 (Ω) . ηℓ → 0 as ℓ → ∞. This proves
Uℓ → U∞ = u; see [AFLP12, Section 2] for the detailed argument.
4.7. General quasi-orthogonality. By use of reliability from Section 4.2, the plain
convergence result from Section 4.6 and a perturbation argument (since the non-symmetric
part of L is compact), it is shown in [FFP14, Proof of Theorem 8] that
N
X
kUk+1 −Uk k2H 1 (Ω) − ε ku−Uk k2H 1 (Ω) ≤ C(ε) ηℓ2 for all 0 ≤ ℓ ≤ N and all ε > 0. (4.6)
k=ℓ
The constant C(ε) depends on ε > 0, the operator L, the sequence (Uℓ )ℓ∈N0 , and Crel . See
also [CFPP14, Proposition 6.1] for a short paraphrase of the proof.
Remark 4.1. If the bilinear form h· , ·iL is symmetric, (4.6) follows from the Pythagoras
theorem in the L-induced energy norm |||v|||2L := hv , viL and norm equivalence
N
X N
X
kUk+1 − Uk k2H 1 (Ω) ≃ |||Uk+1 − Uk |||2L = |||u − Uℓ |||2L − |||u − UN |||2L . ku − Uℓ k2H 1 (Ω) .
k=ℓ k=ℓ
2
Together with reliability (2.14), this proves (4.6) even for ε = 0, and C(ε) ≃ Crel is indepen-
dent of the sequence (Uℓ )ℓ∈N0 .
4.8. Linear convergence with optimal rates. The remaining claims (2.16)–(2.17)
follow from [CFPP14, Theorem 4.1] which only relies on (R1), (2.3), (R4)–(R5), stability
(Section 4.4), reduction (Section 4.5), quasi-orthogonality (Section 4.7), discrete reliability
(Section 4.1), and reliability (Section 4.2).
5.1. Admissibility and refine. In this section, we show that, given a mesh Tb• ∈
b iterative application of the refinement Algorithm 3.5 generates exactly the set of all
T,
admissible meshes Tb◦ that are finer than Tb• . In particular, this implies that T
b coincides with
the set of all admissible hierarchical meshes that are finer than Tb0 , which we has already
been mentioned in Section 3.5. We start with the following lemma.
Lemma 5.1. Let Tb• and Tb◦ be hierarchical meshes such that Tb◦ is finer than Tb• , i.e., Ω
bk ⊆ Ω
•
bk
◦
for all k ∈ N0 . Then, for all βb◦ ∈ H
b◦ there exists βb• ∈ H
b • with supp(βb◦ ) ⊆ supp(βb• ).
Proof. Clearly, we may assume βb◦ ∈ H b◦ \ Hb• . Let k := level(βb◦ ) and define βbk := βb◦ . Since
βbk ∈ Hb◦ , (3.13) implies that supp(βbk ) \ Ω b k+1 6= ∅ and supp(βbk ) ⊆ Ω
◦
b k . Since βbk 6∈ H
◦
b• ,
(3.13) implies that supp(βbk ) \ Ω b k+1 = ∅ or supp(βbk ) 6⊆ Ω
•
b k . However, Ω
•
b k+1 ⊆ Ω
•
b k+1 and
◦
supp(βbk ) \ Ω
b k+1 6= ∅ imply that supp(βbk ) \ Ω
◦
b k+1 = ∅. Hence, we have supp(βbk ) 6⊆ Ω
•
b k , which
•
especially implies k > 0. This is equivalent to supp(βbk ) \ Ω b k 6= ∅. Clearly, there exists
•
βbk−1 ∈ Bk−1 with supp(βbk ) ⊆ supp(βbk−1 ). If βbk−1 ∈ H b• , we are done. Otherwise, (3.13)
implies that supp(βbk−1 ) \ Ωb k = ∅ or supp(βbk−1) 6⊆ Ω
•
b k−1 . Again, the first case is not possible
•
because
supp(βbk−1) \ Ω
b k ⊇ supp(βbk ) \ Ω
•
b k 6= ∅.
•
20
Hence, we have supp(βbk−1 ) 6⊆ Ω b k−1 which especially implies k − 1 > 0. This is equivalent
•
to supp(βbk−1 ) \ Ωb •k−1 6= ∅. Inductively, we obtain a sequence βbk , . . . , βbK with βbj ∈ Bj and
supp(βbK ) ⊇ · · · ⊇ supp(βbk ), where βbK ∈ Hb• for some K ≥ 0.
By definition of N•bad (·), we have Tb(J) , Tb(J−1) ⊆ supp(β) b for some βb ∈ H b• as well as
level(Tb(J−1) ) = level(Tb(J) ) − 1. Hence, (3.16) and Tb• ∈ T b show k := level(β) b = level(Tb(J−1) ).
Since Tb (J−1)
∈ Tb◦ , (3.11) implies Tb (J−1) b
6⊆ Ω k+1
and hence supp(β) b 6⊆ Ω b k+1 . Moreover,
◦ ◦
(3.13) shows supp(β) b ⊆ Ω bk ⊆ Ω b k . Using (3.13) again, we see βb ∈ H b◦ . Together with
• ◦
21
Tb◦ , Tb(J−1) ⊆ supp(β)
(J) b and level(Tb◦(J) ) ≥ level(Tb(J) ) + 1 = level(Tb(J−1) ) + 2, this contradicts
admissibility of Tb◦ ∈ T, b and concludes the proof.
Step 4: Let again Tb◦ ∈ T b be an arbitrary admissible mesh that is finer than Tb• . Step 3 to-
gether with Step 2 shows that we can iteratively refine Tb• and obtain a sequence Tb(0) , . . . , Tb(J)
with Tb• = Tb(0) , Tb(j+1) = refine(Tb(j) , {Tb(j) }) with some Tb(j) ∈ Tb(j) \ Tb(j+1) for j = 1, . . . , J − 1
and Tb(J) = Tb◦ . By definition, this proves Tb◦ ∈ refine(Tb• ).
Proof. Let Tb′ ∈ Π• (Tb), i.e., Tb′ ∈ Tb• with Tb ∩ Tb′ 6= ∅. We abbreviate k := level(Tb). Since all
knot multiplicities are smaller that p + 1, there exists βbk ∈ Bbk such that |Tb ∩ supp(βbk )| = 6
b′ b k bk b b′ b b b k b
0 6= |T ∩ supp(β )|. If β ∈ H• , then T ∈ N• (T ). If β 6∈ H• , the characterization (3.13)
shows that supp(βbk ) 6⊆ Ω b k or supp(βbk ) ⊆ Ω
•
b k+1 . By choice of k, it holds that Tb ⊆ supp(βbk ).
•
In view of (3.11), T ∈ T• implies T 6⊆ Ω• . Hence, supp(βbk ) 6⊆ Ω
b b b b k+1 b k• and, in particular,
k > 0. Next, there exists βb k−1
∈ Bbk−1
such that supp(βb ) ⊆ supp(βb ). If βbk−1 ∈ H
k k−1 b• , then
Tb ∈ N
′ b• (Tb). If βbk−1
6∈ H b• , there holds again either supp(βb ) 6⊆ Ω
k−1 b • or supp(βb ) ⊆ Ω
k−1 k−1 b k• .
Due to supp(βbk ) 6⊆ Ω b k , the second case is not possible. Hence, supp(βbk−1 ) 6⊆ Ω
•
b k−1 and, in
•
particular, k −1 > 0. We proceed in the same way to get a sequence βbk , . . . , βbK with βbj ∈ Bbj
and supp(βbK ) ⊇ · · · ⊇ supp(βbk ), where βbK ∈ H b• for some K ≥ 0.
We define the patches π• (·) and Π• (·) in the parameter domain analogously to the patches
in the physical domain, see Section 2.1.
With Lemma 5.3, one can easily verify that T satisfies (M1)–(M3): Let T• ∈ T. We
start with (M1). Let T ∈ T• and T ′ ∈ Π• (T ). Lemma 5.3 and admissibility show for
the corresponding elements Tb, Tb′ in the parameter domain that |level(Tb) − level(Tb′ )| ≤ 1,
wherefore |Tb| ≃ |Tb′ |. Regularity (3.29) of the transformation γ finally yields |T | ≃ |T ′ |. The
constant Cshape depends only on d, Cγ , and T0 .
To prove (M2), let T ∈ T• and T ′ ∈ Π• (T ). As before, we have |level(Tb) − level(Tb′ )| ≤ 1
for the corresponding elements in the parameter domain. With this, one easily sees that
#Π• (T ) ≤ Cpatch with a constant Cpatch > 0 that depends only on the dimension d.
Regularity (3.29) of γ shows that it is sufficient to prove (M3) for hyperrectangles Tb in
the parameter domain. There, the trace inequality (M3) is well-known; see, e.g., [Era05,
Satz 3.4.5]. The constant Ctrace depends only on d, Cγ , and T0 .
5.3. Verification of (R1)–(R3). Let T• ∈ T, T◦ ∈ refine(T• ), and T ∈ T• . (R1) is
trivially satisfied with Cson = 2d , since each refined element is split into exactly 2d elements.
Moreover, the union of sons property (R2) holds by definition.
To see the reduction property (R3), let T ′ ∈ T◦ with T ′ $ T . Since each refined element
is split it into 2d elements, we have for the corresponding elements in the parameter domain
|Tb′ | ≤ 2−d |Tb|. Next, we prove |T ′ | ≤ qson |T | with a constant 0 < qson < 1 which depends
22
only on d and Cγ . Indeed, we even prove for arbitrary measurable sets Sb′ ⊆ Sb ⊆ Ω b and
b S ′ := γ(Sb′ ) that 0 < |Sb′ | ≤ 2−d |S|
S := γ(S), b implies |S ′ | ≤ qson |S|. To see this, we argue
by contradiction and assume that there are two sequences of such sets (Sbn )n∈N and (Sbn′ )n∈N
with |Sn′ |/|Sn | → 1. This implies |Sn \ Sn′ |/|Sn | → 0 and yields the contradiction
´
| bn \ Sb′ |
S Sb \Sb′
| det Dγ(t)| dt |Sn \ Sn′ | n→∞
n
1 − 2−d ≤ ≃ ´n n = −→ 0.
|Sbn | Sbn | det Dγ(t)| dt |Sn |
5.4. Verification of (R4). The proof of the closure estimate (R4) goes back to the
seminal works [BDD04, Ste08]. Our analysis builds on [BGMP16, Section 3] which proves
(R4) for the refinement strategy of [BG16b]; see also Remark 3.6. The following auxiliary
result states that refine(·, ·) is equivalent to iterative refinement of one single element. For a
mesh in the parameter domain Tb• ∈ T b and an arbitrary set M c• , we define refine(Tb• , M
c•) :=
refine(Tb• , M
c• ∩ Tb• ) and note that refine(Tb• , ∅) = Tb• .
b and M
Lemma 5.4. Let Tb• ∈ T c• = {Tb1 , . . . , Tbn } ⊆ Tb• . Then, it holds that
refine(Tb• , M
c• ) = refine(refine(. . . refine(Tb• , {Tb1 }) . . . , {Tbn−1 }), {Tbn }). (5.2)
For i ∈ N0 , we introduce the following notation which is conform with that of Algorithm 3.5:
[ [
c(i+1) := M
M c(i) ∪ N bad b
( T ), c(i+1) := M
M c(i) ∪ bad b
N(1) (T ),
(0) (0) • (1) (1)
c(i)
Tb∈M c(i)
T∈ M
(0) (1)
[
f(i+1) := M
M f(i) ∪ N•bad (Tb).
(1) (1)
f(i)
Tb∈M (1)
Finally, we set
[ [ [
c(end) :=
M c(i) ,
M c(end) :=
M c(i) ,
M f(end) :=
M f(i) .
M
(0) (0) (1) (1) (1) (1)
i∈N0 i∈N0 i∈N0
Tb• \ refine(Tb(1) , M
c• \ {Tb1 }) = M
c(end) ∪ M
(0)
f(end) .
(1)
Step 2: Let Tb ∈ M
c(end) . In this step, we will prove that
(1)
(5.3) [
c(end) ∪ M
= M c(i) ∪ N•bad (Tb)
(0) (1)
c(end) ∪M
Tb∈M c(i)
(0) (1)
[
c(end) ∪ M
=M f(i) ∪ N•bad (Tb)
(0) (1)
c(end) ∪M
Tb∈M f(i)
(0) (1)
c(end) ∪ M
=M f(i+1) .
(0) (1)
Let Tb• ∈ T.
b For Tb, Tb′ ∈ Tb• , let dist(Tb, Tb′ ) be the Euclidean distance of their midpoints
in the parameter domain. Let Tb ∈ Tb• and Tb′ ∈ N• (Tb). Hence, there is βb ∈ H b• such that
b By admissibility
Tb, Tb′ ⊆ supp(β). In particular, it holds that dist(Tb, Tb′ ) ≤ diam(supp(β)).
b − level(Tb)| ≤ 1. This proves
of Tb• and (3.16), we see |level(β)
b
dist(Tb, Tb′) ≤ Cdiam 2−level(T ) , (5.4)
where Cdiam > 0 depends only on d, Tb0 and (p1 , . . . , pd ). With this observation, we can
prove the following lemma. The proof follows the lines of [BGMP16, Lemma 11], but is also
included here for completeness.
24
b and Tb′ ∈ Tb• . With Tb◦ = refine(Tb• , {Tb′}), it holds that
Lemma 5.5. Let Tb• ∈ T
b
dist(Tb, Tb′) ≤ 2−level(T ) Cdist for all Tb ∈ Tb◦ \ Tb• , (5.5)
where Cdist > 0 depends only on d, Tb0 and (p1 , . . . , pd ).
Proof. Tb ∈ Tb◦ \ Tb• implies the existence of a sequence Tb′ = TbJ , TbJ−1 , . . . , Tb0 such that
Tbj−1 ∈ N•bad (Tbj ) and Tb is a child of Tb0 , i.e., Tb $ Tb0 and level(Tb) = level(Tb0 ) + 1. Since
level(Tbj−1) = level(Tbj ) − 1, it follows
level(Tbj ) = level(Tb0 ) + j. (5.6)
The triangle inequality proves
J
X
dist(Tb, Tb′ ) ≤ dist(Tb, Tb0 ) + dist(Tb0 , Tb′) ≤ dist(Tb, Tb0 ) + dist(Tbj , Tbj−1)
j=1
Further, there exists a constant C > 0 which depends only on Tb0 and d, such that
b
dist(Tb, Tb0 ) ≤ C2−level(T ) .
With (5.4) and (5.6), we see
J
X J
X J
X
(5.4) b (5.6) b b
dist(Tbj , Tbj−1 ) ≤ Cdiam 2−level(Tj ) = Cdiam 2−level(T0 )−j ≤Cdiam 2−level(T )−1 ,
j=1 j=1 j=1
where the hidden constants depend only on d and Cγ . Since Vb• is a Tb• -piecewise tensor
polynomial, there holds for i, j ∈ {0, 1, 2} with j ≤ i that
|Tb|(i−j)/d kVb• kH i (Tb) . kVb• kH j (Tb) , (5.10)
where the hidden constant depends only on d, Tb0 , and (p1 , . . . , pd ). Together, (5.9)–(5.10)
conclude the proof of (S1), where Cinv depends only on d, Cγ , Tb0 , and (p1 , . . . , pd ).
5.7. Verification of (S2). In (3.22), we already saw that T◦ ∈ refine(T• ) with T• ∈ T
implies nestedness of the corresponding ansatz spaces X• ⊆ X◦ .
5.8. Verification of (S3). We show the assertion in the parameter domain. For arbitrary
but fixed kproj ∈ N0 (which will be fixed later in Section 5.10 to be kproj := 2(p + 1)), we
set kloc := kproj + 2(p + 1). Let Tb• ∈ T,
b Tb◦ ∈ refine(Tb• ), and Vb◦ ∈ Xb◦ . We define the
patch functions π• and Π• in the parameter domain analogously to the patch functions in
the physical domain, see Section 2.1. Let Tb ∈ Tb• \ Πloc b b loc kloc
• (T• \ T◦ ), where Π• := Π• . First,
we show that
Πloc b b b
• (T ) ⊆ T• ∩ T◦ . (5.11)
To this end, we argue by contradiction and assume that there exists Tb′ ∈ Πloc b
• (T ) with
Tb′ 6∈ Tb• ∩Tb◦ . This is equivalent to Tb ∈ Πloc b′ b′ b b b loc b b
• (T ) and T ∈ T• \ T◦ . This implies T ∈ Π• (T• \ T◦ ),
k
contradicts Tb ∈ Tb• \Πloc b b
• (T• \T◦ ), and hence proves (5.11). Again, we abbreviate π•
proj
:= π• proj .
According to Corollary 3.2, it holds that
V• |π•proj (T ) : V• ∈ X• = span β| b proj b b b b = 0 ∧ |supp(β) b ∩ π proj (Tb)| > 0 ,
π• (T ) : β ∈ H• ∧ β|∂ Ω •
as well as
b proj
V◦ |π•proj (T ) : V◦ ∈ X◦ = span β| : b∈H
β b b = 0 ∧ |supp(β)
b◦ ∧ β| b ∩ π proj (Tb)| > 0 .
π• (T ) ∂Ω •
We will prove
βb ∈ H b ∩ π proj (Tb)| > 0 = βb ∈ H
b• : |supp(β)
•
b ∩ π proj (Tb)| > 0 ,
b◦ : |supp(β)
• (5.12)
which will conclude (S3). First let βb be an element of the left set. By Remark 3.4, this implies
b ⊆ π loc (Tb). Together with (5.11), we see supp(β)
supp(β) b ⊆ S(Tb• ∩ Tb◦ ). This proves that no
•
element within supp(β)b is changed during refinement, i.e., Ω b =Ω
b k ∩ supp(β) b for
b k ∩ supp(β)
• ◦
26
all k ∈ N0 . Thus, (3.13) proves βb ∈ H
b◦ . The proof works the same if we start with some βb
in the right set. This proves (5.12) and therefore (S3).
5.9. Truncated hierarchical B-splines. We will define some Scott-Zhang type operator
J• similarly as in [SM16] with the help of so-called truncated hierarchical B-splines (THB-
splines) introduced in [GJS12]. In this section, we recall their definition and list some basic
properties. For a more detailed presentation, we refer to, e.g., [GJS12, SM16].
Let Tb• be an arbitrary hierarchical mesh in the parameter domain. For k ∈ N0 , we define
the truncation trunck+1• : Ybk → Ybk+1 as follows:
X X
trunck+1 ( b k ) :=
V c βb for all b
V k
= cβbβb ∈ Ybk ⊂ Ybk+1, (5.13)
• βb
b B
β∈ bk+1 b Bbk+1
β∈
b ⊆Ω
supp(β)6 b k+1
•
i.e., truncation is defined via the (unique) basis representation of Vb k ∈ Ybk with respect
Bbk+1 . Recall that M• ∈ N is the minimal integer such that Ω b M• = ∅. For all βb ∈ H
b• , the
•
corresponding truncated hierarchical B-spline reads
b
b := truncM• −1 truncM• −2 . . . trunclevel(β)+1 b ... ,
Trunc• (β) • • • ( β) (5.14)
As the set H b• , the set of THB-splines Trunc• (β) b : βb ∈ Hb• forms a basis of the space
of hierarchical splines Yb• . In Section 3.1, we mentioned that each basis function in Bbk
is the linear combination of basis functions Bbk+1 , where the corresponding coefficients are
nonnegative; see (3.5)–(3.6). For βb ∈ Hb• , this proves
0 ≤ Trunc• (β) b ≤ βb ≤ 1, (5.15)
and in particular supp(Trunc• (β)) b ⊆ supp(β).
b With this and the fact that the THB-splines
are a basis of Yb• , Corollary 3.2 proves
b : βb ∈ H
Xb• = span Trunc• (β) b b =0 ,
b• ∧ β| (5.16)
∂Ω
where the set on the right-hand side is even a basis of Xb• . The following proposition shows
b
that for an admissible mesh Tb• ∈ Tb• , the full truncation Trunc• reduces to trunc•
level(β)+1
.
b and βb ∈ H
Proposition 5.6. Let Tb• ∈ T b• . Then, it holds that
b
b = trunclevel(β)+1 b
Trunc• (β) (β). • (5.17)
Proof. We prove the proposition in three steps.
P
Step 1: Let k ′ < k ′′ ∈ N0 and βb′ ∈ Bbk with representation βb′ = βb′′ ∈Bbk′′ cβb′′ βb′′ . Let
′
βb′′ ∈ Bbk such that c b′′ 6= 0. Then, local linear independence (with the open set O =
′′
β
(0, 1)d \ supp(βb′ )) of Bbk implies supp(βb′′ ) ⊆ supp(βb′ ).
′′
b′′ ∈B
β bk′′ βb′′ ∈Bbk′′
supp(β b k′′
b′′ )6⊆Ω
•
27
If βb′′ ∈ Bbk with supp(βb′′ ) ⊆ Ω b (3.11) shows the
b k′′ , let Tb′′ ∈ Tb k′′ with Tb′′ ⊆ supp(β).
′′
•
existence of an element Tb ∈ Tb• with level(Tb) ≥ k such that Tb ⊆ Tb′′ . To see cβb′′ = 0,
′′
These dual basis functions βb∗ satisfy the following scaling property.
Lemma 5.8. There exists Cdual > 0 such that for all k ∈ N0 and all βb ∈ Bbk , it holds that
kβb∗ kL∞ (Tbb) ≤ Cdual |Tbβb|−1 . (5.20)
β
2Therefore, the elements Tbβb depend additionally on the considered mesh Tb• .
28
the Riesz theorem implies that βb∗ = (βe∗ ◦ Φ−1 )/C d , where βe∗ is the unique element in
Bek := βb′ ◦ Φ : βb′ ∈ Bbk \ {0} such that
ˆ
βe∗ βe′ dt = δβ,
e βe′ for all βe′ ∈ Bek .
Teβb
We only have to consider βe′ that are supported on Teβb. As the support of any B(·|tki,ji , . . . , tki,ji+pi +1 )
is just [tki,ji , tki,ji +pi+1 ], it is sufficient to consider ji = ℓi − pi , . . . , ℓi . By the definition of B-
splines, one immediately sees that an affine transformation in the parameter domain can just
be passed to the knots, i.e.,
si (tki,ji − a1 )/C, . . . , (tki,ji +pi+1 − ad )/C .
B(si |tki,ji , . . . , tki,ji +pi+1 ) = B e
Before we prove the properties (S4)–(S6), we collect some basic properties of Jb• .
b Then, Jb• is a projection, i.e.,
Lemma 5.9. Let Tb• ∈ T.
Jb• Vb• = Vb• for all Vb• ∈ X• . (5.23)
Moreover, Jb• is locally L2 -stable, i.e., there exists CJ > 0 such that for all Tb ∈ Tb•
kJb• b
v kL2 (Tb) ≤ CJ kb
vkL2 (π2(p+1) (Tb)) for all b b
v ∈ L2 (Ω). (5.24)
•
M
X • −1 X
(5.15)
b b = (Jb• Vb• )| b (5.23)
hβb∗ , Vb• i Trunc• (β)| b
= T T = V• |Tb = b
v |Tb.
k=0 b H
β∈ b b =0
b • ∧β|
∂Ω
supp(β)⊆π•proj (Tb)
b
b
level(β)=k
Next, we prove (S5). Let Tb ∈ Tb• , b b and Vb• ∈ Xb• . By (5.23)–(5.24), it holds that
v ∈ H01(Ω),
(5.24)
(5.23)
k(1 − Jb• )b
v kL2 (Tb) = kb v − Vb• kL2 (Tb) + kJb• (b
v − Vb• )kL2 (Tb) . kb
v − Vb• kL2 (π2(p+1) (Tb)) .
•
30
4(p+1) b b = ∅ and, second,
To proceed, we distinguish between two cases, first, π• (T ) ∩ ∂ Ω
4(p+1) b b 6= ∅, i.e., if Tb is far away from the boundary or not. Note that these
π• (T ) ∩ ∂ Ω
4(p+1) b b = 0 resp. |π•4(p+1) (Tb) ∩ ∂ Ω|
b > 0, since the elements
cases are equivalent to |π• (T ) ∩ ∂ Ω|
in the parameter domain are rectangular.
P b
In the first case, we proceed as follows: (3.23) especially proves 1 ∈ Yb• with 1 = β∈ b Hb• cβbβ
b With Remark 3.4, we see that |supp(β)∩π
on Ω. b 2(p+1) b
• (T )| > 0 implies supp(β)b ⊆ π•4(p+1) (Tb).
Therefore, the restriction satisfies
X X X
1= b 2(p+1) b =
c bβ| b 2(p+1) b =
c bβ| b 2(p+1) b .
c bβ|
β π• (T ) β π• (T ) β π• (T )
b H
β∈ b• b H
β∈ b• b H
β∈ b•
b 2(p+1) b b 4(p+1) b
|supp(β)∩π• (T )|>0 supp(β)⊆π • (T )
We define
X ˆ
Vb• := b
vπ2(p+1) (Tb) b
cβbβ, where vbπ2(p+1) (Tb) := |π•2(p+1) (Tb)|−1 vb dt.
• • 2(p+1)
b Hb• π• (Tb)
β∈
b 4(p+1) b
supp(β)⊆π • (T )
In the second case, we set Vb• := 0. For the first case, the Poincaré inequality combined with
admissibility concludes the proof, whereas we use the Friedrichs inequality combined with
admissibility in the second case. In either case, we obtain Vb• ∈ Xb• and
v − Vb• k 2 2(p+1) b . diam(π 4(p+1) (Tb))k∇b
kb L (π• (T )) • vk 2 4(p+1) b ≃ |Tb|1/d k∇b
L (π•
vk 2 4(p+1) b . (5.25)
(T )) L (π• (T ))
The hidden constants depend only on Tb0 , (p1 , . . . , pd ), and the shape of the patch π•
2(p+1) b
(T )
4(p+1) b 2(p+1) b b
resp. the shape of π• (T ) and of π• (T ) ∩ ∂ Ω. However, by admissibility, the number
of different patch shapes is bounded itself by a constant which again depends only on d, Tb0
and (p1 , . . . , pd ).
Finally, we prove (S6). Let again Tb ∈ Tb• , b b For all Vb• ∈ Xb• that are constant
v ∈ H01 (Ω).
on Tb, the projection property (5.23) implies that
(5.10)
(5.23)
vkL2 (Tb) = k∇Jb• (b
k∇Jb• b v − Vb• )kL2 (Tb) . |Tb|−1/d kJb• (v − Vb• )kL2 (Tb)
(5.24)
. |Tb|−1/d kb
v − Vb• kL2 (π2(p+1) (Tb)) .
•
6. Numerical examples
In this section, we apply our adaptive algorithm to the 2D Poisson model problem
−∆u = f in Ω,
(6.1)
u = 0 on ∂Ω.
knot vectors with multiplicity smaller or equal to pγi for the interior knots, i.e.,
b γ = (K
K b 1γ , K
b 2γ ); (6.2)
see also Section 3.1. Let Bbγ be the corresponding tensor-product B-spline basis, i.e.,
γ
Bbγ = Bb γ
j1 ,j2 : ji ∈ {0, . . . , Ni − 1} , (6.3)
where B b γ is defined as in (3.3). For given points in the plane cγ ∈ R2 and positive weights
j1 ,j2 j1 ,j2
γ
wj1 ,j2 > 0 for ji ∈ {0, . . . , Niγ − 1}, a NURBS-surface Ω is defined via a parametrization
γ:Ω b → Ω of the form
P
b γ (s1 , s2 )
wjγ1 ,j2 cγj1 ,j2 Bj1 ,j2
i∈{1,2}
ji ∈{0,...,Niγ −1}
γ(s1 , s2 ) = P . (6.4)
b γ (s1 , s2 )
wjγ1 ,j2 Bj1 ,j2
i∈{1,2}
ji ∈{0,...,Niγ −1}
6.1. Square. In the first experiment, we consider the unit square Ω = (0, 1)2 , where we
bγ = K
choose pγ1 , pγ2 = 1 and K b γ = (0, 0, 1, 1). We set the control points
1 2
cγ1,1 = (0, 0), cγ2,1 = (1, 0), cγ1,2 = (0, 1), cγ2,2 = (1, 1)
and all weights equal to 1. We choose f as in [BG16a, Example 7.4] such that the exact
solution of (6.1) is given by u(x1 , x2 ) = x2.3 2.9
1 (1 − x1 )x2 (1 − x2 ), which implies u ∈ H (Ω) \
2
3
H (Ω). To create the initial ansatz space with spline degrees p1 = p2 ∈ {2, 3, 4}, we choose
the initial knot vectors Kb0 = Kb 0 = (0, . . . 0, 1, . . . , 1), where the multiplicity of 0 and 1 is
1 2
p1 + 1 = p2 + 1. We apply Algorithm 2.3 for the spline degrees 2, 3, and 4 with uniform
(θ = 1) and adaptive (θ = 0.5) mesh-refinement. Some adaptively generated hierarchical
meshes are shown in Figure 6.1. In Figure 6.2, we plot the energy error k∇u − ∇Uℓ kL2 (Ω)
as well as the error estimator ηℓ against the number of elements #Tℓ . Due to the regularity
of u, we obtain a suboptimal convergence rate for p1 = p2 > 2. The adaptive strategy on
32
the other hand recovers the optimal convergence of the energy error and the error estimator,
i.e., O((#Tℓ )−p/2 ).
6.2. L-shape. To obtain the L-shaped domain Ω = (0, 1)2 \ ([0, 0.5] × [0, 0.5]), we choose
b γ = (0, 0, 0.5, 1, 1), K
pγ1 , pγ2 = 1 and K b γ = (0, 0, 1, 1). Moreover, we choose the control points
1 2
Acknowledgement
The authors acknowledge support through the Austrian Science Fund (FWF) under grant
P29096 and grant W1245.
References
[AFLP12] Markus Aurada, Samuel Ferraz-Leite, and Dirk Praetorius. Estimator reduction and conver-
gence of adaptive BEM. Appl. Numer. Math., 62(6):787–801, 2012.
33
1 1 1
0 0 0
0 0.5 1 0 0.5 1 0 0.5 1
-4
10 -5
10
-4
10
10 -6
10 -5
O(#Tℓ −2/2 )
10
-5
10
-7
O(#Tℓ −4/2 )
O(#Tℓ −3/2 )
-6
10
10 -8
10 -6 -7
10
-9
10
-7 -8 -10
10 0 1 2 3 4 5 6
10 0 1 2 3 4 5 6
10 0 1 2 3 4 5 6
10 10 10 10 10 10 10 10 10 10 10 10 10 10 10 10 10 10 10 10 10
number of elements #Tℓ number of elements #Tℓ number of elements #Tℓ
Figure 6.2. Energy error k∇u − ∇Uℓ kL2 (Ω) and error estimator ηℓ for the
problem of Section 6.1 on the unit square for uniform (θ = 1) and adaptive
(θ = 0.5) mesh-refinement and different spline orders p1 = p2 = p ∈ {2, 3, 4},
where adaptivity always regains the respective optimal convergence rate.
1 1 1
0 0 0
0 0.5 1 0 0.5 1 0 0.5 1
34
0 0 0
10 10 10
err. unif. err. unif. err. unif.
energy error/error estimator
-2
10
-3 -3
10 10
-3 -4 -4
10 10 10
10 -4
10 -6 10 -6
-5
10
-7 -7
10 10
-6 -8 -8
10 10 10
10 0 10 1 10 2 10 3 10 4 10 5 10 6 10 0 10 1 10 2 10 3 10 4 10 5 10 6 10 0 10 1 10 2 10 3 10 4 10 5 10 6
number of elements #Tℓ number of elements #Tℓ number of elements #Tℓ
Figure 6.4. Energy error k∇u − ∇Uℓ kL2 (Ω) and error estimator ηℓ for the
problem of Section 6.3 on the L-shape for uniform (θ = 1) and adaptive (θ =
0.5) mesh-refinement and different spline orders p1 = p2 = p ∈ {2, 3, 4}, where
adaptivity always regains the respective optimal convergence rate.
1 1 1
0 0 0
0 0.5 1 0 0.5 1 0 0.5 1
10 -5
-4 -5
10 10
-6
10
-5
10 10 -6
O(#Tℓ −3/2 ) 10
-7 O(#Tℓ −4/2 )
10
-6 O(#Tℓ −2/2 ) 10
-7
-8
10
-7 -8
10 10
10 -9
10 -8 10 -9 10 -10
1 2 3 4 5 6 7 1 2 3 4 5 6 1 2 3 4 5
10 10 10 10 10 10 10 10 10 10 10 10 10 10 10 10 10 10
number of elements #Tℓ number of elements #Tℓ number of elements #Tℓ
Figure 6.6. Energy error k∇u − ∇Uℓ kL2 (Ω) and error estimator ηℓ for the
problem of Section 6.3 on the quarter ring for uniform (θ = 1) and adaptive
(θ = 0.8) mesh-refinement and different spline orders p1 = p2 = p ∈ {2, 3, 4},
where adaptivity always regains the respective optimal convergence rate.
35
[AO00] Mark Ainsworth and J. Tinsley Oden. A posteriori error estimation in finite element analysis.
Pure and Applied Mathematics (New York). John Wiley & Sons, New York, 2000.
[BBdVC+ 06] Yuri Bazilevs, Lourenco Beirão da Veiga, J. Austin Cottrell, Thomas J. R. Hughes, and
Giancarlo Sangalli. Isogeometric analysis: approximation, stability and error estimates for
h-refined meshes. Math. Mod. Meth. Appl. S., 16(07):1031–1090, 2006.
[BDD04] Peter Binev, Wolfgang Dahmen, and Ron DeVore. Adaptive finite element methods with
convergence rates. Numer. Math., 97(2):219–268, 2004.
[BdVBC+ 13] Lourenco Beirão da Veiga, Franco Brezzi, Andrea Cangiani, Gianmarco Manzini, L. Donatella
Marini, and Alessandro Russo. Basic principles of virtual element methods. Math. Mod. Meth.
Appl. S., 23(01):199–214, 2013.
[BdVBSV13] Lourenco Beirão da Veiga, Annalisa Buffa, Giancarlo Sangalli, and Rafael Vázquez. Analysis-
suitable T-splines of arbitrary degree: definition, linear independence and approximation
properties. Math. Mod. Meth. Appl. S., 23(11):1979–2003, 2013.
[BdVBSV14] Lourenco Beirão da Veiga, Annalisa Buffa, Giancarlo Sangalli, and Rafael Vázquez. Mathe-
matical analysis of variational isogeometric methods. Acta numerica, 23:157–287, 2014.
[BG15] Annalisa Buffa and Eduardo M. Garau. Refinable spaces and local approximation estimates
for hierarchical splines. arXiv preprint arXiv:1507.06534, 2015.
[BG16a] Annalisa Buffa and Eduardo M. Garau. A posteriori error estimators for hierarchical b-spline
discretizations. arXiv preprint arXiv:1611.07816, 2016.
[BG16b] Annalisa Buffa and Carlotta Giannelli. Adaptive isogeometric methods with hierarchical
splines: error estimator and convergence. Math. Mod. Meth. Appl. S., 26(01):1–25, 2016.
[BGMP16] Annalisa Buffa, Carlotta Giannelli, Philipp Morgenstern, and Daniel Peterseim. Complexity
of hierarchical refinement for a class of admissible mesh configurations. Comput. Aided Geom.
Design, 47:83–92, 2016.
[BHP17] Alex Bespalov, Alexander Haberl, and Dirk Praetorius. Adaptive FEM with coarse initial
mesh guarantees optimal convergence rates for compactly perturbed elliptic problems. Com-
put. Methods Appl. Mech. Eng., 317:318–340, 2017.
[CFPP14] Carsten Carstensen, Michael Feischl, Marcus Page, and Dirk Praetorius. Axioms of adaptiv-
ity. Comput. Math. Appl., 67(6):1195–1253, 2014.
[CHB09] J. Austin Cottrell, Thomas J. R. Hughes, and Yuri Bazilevs. Isogeometric analysis: toward
integration of CAD and FEA. John Wiley & Sons, New York, 2009.
[CKNS08] J. Manuel Cascon, Christian Kreuzer, Ricardo H. Nochetto, and Kunibert G. Siebert. Quasi-
optimal convergence rate for an adaptive finite element method. SIAM J. Numer. Anal.,
46(5):2524–2550, 2008.
[DB01] Carl De Boor. A practical guide to splines (revised ed.). Springer, 2001.
[DLP13] Tor Dokken, Tom Lyche, and Kjell F. Pettersen. Polynomial splines over locally refined box-
partitions. Comput. Aided Geom. Design, 30(3):331–356, 2013.
[Dör96] Willy Dörfler. A convergent adaptive algorithm for Poisson’s equation. SIAM J. Numer.
Anal., 33(3):1106–1124, 1996.
[Era05] Christoph Erath. Adaptive Finite Volumen Methode. Master’s thesis, TU Wien, 2005.
[FFP14] Michael Feischl, Thomas Führer, and Dirk Praetorius. Adaptive FEM with optimal conver-
gence rates for a certain class of nonsymmetric and possibly nonlinear problems. SIAM J.
Numer. Anal., 52(2):601–625, 2014.
[FGHP16a] Michael Feischl, Gregor Gantner, Alexander Haberl, and Dirk Praetorius. Adaptive 2D IGA
boundary element methods. Eng. Anal. Bound. Elem., 62:141–153, 2016.
[FGHP16b] Michael Feischl, Gregor Gantner, Alexander Haberl, and Dirk Praetorius. Optimal conver-
gence for adaptive IGA boundary element methods for weakly-singular integral equations.
Numerische Mathematik, published online first: http://dx.doi.org/10.1007/s00211-016-0836-
8:1–36, 2016.
[FGP15] Michael Feischl, Gregor Gantner, and Dirk Praetorius. Reliable and efficient a posteriori
error estimation for adaptive IGA boundary element methods for weakly-singular integral
equations. Comput. Methods Appl. Mech. Eng., 290:362–386, 2015.
36
[GJS12] Carlotta Giannelli, Bert Jüttler, and Hendrik Speleers. THB-splines: The truncated basis for
hierarchical splines. Comput. Aided Geom. Design, 29(7):485–498, 2012.
[GJS14] Carlotta Giannelli, Bert Jüttler, and Hendrik Speleers. Strongly stable bases for adaptively
refined multilevel spline spaces. Adv. Comput. Math., 40(2):459–490, 2014.
[HCB05] Thomas J. R. Hughes, J. Austin Cottrell, and Yuri Bazilevs. Isogeometric analysis: CAD,
finite elements, NURBS, exact geometry and mesh refinement. Comput. Methods Appl. Mech.
Eng., 194(39):4135–4195, 2005.
[HKMP16] Patrick Hennig, Markus Kästner, Philipp Morgenstern, and Daniel Peterseim. Adaptive Mesh
Refinement Strategies in Isogeometric Analysis - A Computational Comparison. Comput.
Methods Appl. Mech. Eng., 2016. Also Available as INS Preprint No. 1611.
[JKD14] Kjetil A. Johannessen, Trond Kvamsdal, and Tor Dokken. Isogeometric analysis using LR
B-splines. Comput. Methods Appl. Mech. Eng., 269:471–514, 2014.
[JRK15] Kjetil A. Johannessen, Filippo Remonato, and Trond Kvamsdal. On the similarities and
differences between classical hierarchical, truncated hierarchical and LR B-splines. Comput.
Methods Appl. Mech. Eng., 291:64–101, 2015.
[KVVdZvB14] Gokturk Kuru, Clemens V. Verhoosel, Kristoffer G. Van der Zee, and E. Harald van Brum-
melen. Goal-adaptive isogeometric analysis with hierarchical splines. Comput. Methods Appl.
Mech. Eng., 270:270–292, 2014.
[MNS00] Pedro Morin, Ricardo H. Nochetto, and Kunibert G. Siebert. Data oscillation and convergence
of adaptive FEM. SIAM J. Numer. Anal., 38(2):466–488, 2000.
[NV12] Ricardo H. Nochetto and Andreas Veeser. Primer of adaptive finite element methods. Naldi,
Giovanni (ed.) et al., Multiscale and adaptivity: Modeling, numerics and applications.
C.I.M.E. summer school, Cetraro, Italy, July 6–11, 2009. Berlin: Springer; Firenze: Fon-
dazione CIME Roberto Conti. Lecture Notes in Mathematics 2040, 125-225 (2012), 2012.
[Rud91] Walter Rudin. Functional analysis. 2nd ed. McGraw-Hill, New York, 1991.
[Sch07] Larry Schumaker. Spline functions: Basic theory. Cambridge University Press, Cambridge,
2007.
[Sch16] Stefan Schimanko. Adaptive isogeometric boundary element method for the hyper-singular
integral equation. Master’s thesis, TU Wien, 2016.
[SLSH12] Michael A. Scott, Xin Li, Thomas W. Sederberg, and Thomas J. R. Hughes. Local refinement
of analysis-suitable T-splines. Comput. Methods Appl. Mech. Eng., 213:206–222, 2012.
[SM16] Hendrik Speleers and Carla Manni. Effortless quasi-interpolation in hierarchical spaces. Nu-
mer. Math., 132(1):155–184, 2016.
[Ste07] Rob Stevenson. Optimality of a standard adaptive finite element method. Found. Comput.
Math., 7(2):245–269, 2007.
[Ste08] Rob Stevenson. The completion of locally refined simplicial partitions created by bisection.
Mathematics of computation, 77(261):227–241, 2008.
[Ver13] Rüdiger Verfürth. A posteriori error estimation techniques for finite element methods. Oxford
University Press, Oxford, 2013.
[VGJS11] Anh-Vu Vuong, Carlotta Giannelli, Bert Jüttler, and Bernd Simeon. A hierarchical approach
to adaptive local refinement in isogeometric analysis. Comput. Methods Appl. Mech. Eng.,
200(49):3554–3567, 2011.
37