2012
DOI: 10.1016/j.jcp.2011.11.023
|View full text |Cite
|
Sign up to set email alerts
|

A second order virtual node method for elliptic problems with interfaces and irregular domains in three dimensions

Abstract: Keywords: Elliptic interface problems Embedded interface methods Virtual node methods Variational methods Multigrid methods a b s t r a c tWe present a numerical method for the variable coefficient Poisson equation in threedimensional irregular domains and with interfacial discontinuities. The discretization embeds the domain and interface into a uniform Cartesian grid augmented with virtual degrees of freedom to provide accurate treatment of jump and boundary conditions. The matrix associated with the discret… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
62
0

Year Published

2012
2012
2022
2022

Publication Types

Select...
7
1
1

Relationship

2
7

Authors

Journals

citations
Cited by 75 publications
(62 citation statements)
references
References 87 publications
(126 reference statements)
0
62
0
Order By: Relevance
“…However, most of these methods typically require tools not frequently available in standard finite element and finite difference software packages. Examples of such approaches include the extended and composite finite element methods (e.g., [31,12,23,13,32,55,7,4]), immersed interface methods (e.g., [40,43,60,44,65]), virtual node methods with embedded boundary conditions (e.g., [3,73,34]), matched interface and boundary methods (e.g., [71,68,69,67,72]), modified finite volume/embedded boundary/cut-cell methods/ghost-fluid methods (e.g., [27,36,19,25,26,35,47,70,48,37,46,64,49,9,10,52,53,33,63]). In another approach, known as the fictitious domain method (e.g., [28,29,56,45]), the original system is either augmented with equations for Lagrange multipliers to enforce the boundary conditions, or the penalty method is used to enforce the boundary condi-tions weakly.…”
Section: Introductionmentioning
confidence: 99%
“…However, most of these methods typically require tools not frequently available in standard finite element and finite difference software packages. Examples of such approaches include the extended and composite finite element methods (e.g., [31,12,23,13,32,55,7,4]), immersed interface methods (e.g., [40,43,60,44,65]), virtual node methods with embedded boundary conditions (e.g., [3,73,34]), matched interface and boundary methods (e.g., [71,68,69,67,72]), modified finite volume/embedded boundary/cut-cell methods/ghost-fluid methods (e.g., [27,36,19,25,26,35,47,70,48,37,46,64,49,9,10,52,53,33,63]). In another approach, known as the fictitious domain method (e.g., [28,29,56,45]), the original system is either augmented with equations for Lagrange multipliers to enforce the boundary conditions, or the penalty method is used to enforce the boundary condi-tions weakly.…”
Section: Introductionmentioning
confidence: 99%
“…IIM can achieve higher accuracy near boundaries when compared with IBM because it is able to successfully reduce the effects of the transfer function smearing due smooth kernels. The IIM is one of the most popular second-order finite difference methods for approximating interface problems (HELLRUNG et al, 2012).…”
Section: Continuous Forcing Methodsmentioning
confidence: 99%
“…To extend this strategy to multiple distinct flow regions within a single regular grid cell, as produced by our mesh clipping strategy, we take inspiration from recent virtual node (MOLINO; BAO;HELLRUNG et al, 2012) andtopology-preserving (TERAN et al, 2005;NESME et al, 2009) schemes. We allow multiple disjoint active sub-cells within a single original cell, with additional pressure and velocity degrees of freedom that conceptually coincide for consistency with Ng's discretization (see Figure 3.4).…”
Section: Topology-aware Pressure Projectionmentioning
confidence: 99%
“…We evaluate these integrands analytically over the polyhedral subelement embedded material regions. This is done with the divergence theorem as in [Hellrung et al 2012].…”
Section: Time Steppingmentioning
confidence: 99%