Research article Special Issues

A Hilliges-Weidlich-type scheme for a one-dimensional scalar conservation law with nonlocal flux

  • The simulation model proposed in [M. Hilliges and W. Weidlich. A phenomenological model for dynamic traffic flow in networks. Transportation Research Part B: Methodological, 29 (6): 407–431, 1995] can be understood as a simple method for approximating solutions of scalar conservation laws whose flux is of density times velocity type, where the density and velocity factors are evaluated on neighboring cells. The resulting scheme is monotone and converges to the unique entropy solution of the underlying problem. The same idea is applied to devise a numerical scheme for a class of one-dimensional scalar conservation laws with nonlocal flux and initial and boundary conditions. Uniqueness of entropy solutions to the nonlocal model follows from the Lipschitz continuous dependence of a solution on initial and boundary data. By various uniform estimates, namely a maximum principle and bounded variation estimates, along with a discrete entropy inequality, the sequence of approximate solutions is shown to converge to an entropy weak solution of the nonlocal problem. The improved accuracy of the proposed scheme in comparison to schemes based on the Lax-Friedrichs flux is illustrated by numerical examples. A second-order scheme based on MUSCL methods is presented.

    Citation: Raimund Bürger, Harold Deivi Contreras, Luis Miguel Villada. A Hilliges-Weidlich-type scheme for a one-dimensional scalar conservation law with nonlocal flux[J]. Networks and Heterogeneous Media, 2023, 18(2): 664-693. doi: 10.3934/nhm.2023029

    Related Papers:

    [1] Raimund Bürger, Antonio García, Kenneth H. Karlsen, John D. Towers . Difference schemes, entropy solutions, and speedup impulse for an inhomogeneous kinematic traffic flow model. Networks and Heterogeneous Media, 2008, 3(1): 1-41. doi: 10.3934/nhm.2008.3.1
    [2] Felisia Angela Chiarello, Giuseppe Maria Coclite . Nonlocal scalar conservation laws with discontinuous flux. Networks and Heterogeneous Media, 2023, 18(1): 380-398. doi: 10.3934/nhm.2023015
    [3] Martin Gugat, Alexander Keimer, Günter Leugering, Zhiqiang Wang . Analysis of a system of nonlocal conservation laws for multi-commodity flow on networks. Networks and Heterogeneous Media, 2015, 10(4): 749-785. doi: 10.3934/nhm.2015.10.749
    [4] Jan Friedrich, Oliver Kolb, Simone Göttlich . A Godunov type scheme for a class of LWR traffic flow models with non-local flux. Networks and Heterogeneous Media, 2018, 13(4): 531-547. doi: 10.3934/nhm.2018024
    [5] Abraham Sylla . Influence of a slow moving vehicle on traffic: Well-posedness and approximation for a mildly nonlocal model. Networks and Heterogeneous Media, 2021, 16(2): 221-256. doi: 10.3934/nhm.2021005
    [6] Alexander Kurganov, Anthony Polizzi . Non-oscillatory central schemes for traffic flow models with Arrhenius look-ahead dynamics. Networks and Heterogeneous Media, 2009, 4(3): 431-451. doi: 10.3934/nhm.2009.4.431
    [7] Markus Musch, Ulrik Skre Fjordholm, Nils Henrik Risebro . Well-posedness theory for nonlinear scalar conservation laws on networks. Networks and Heterogeneous Media, 2022, 17(1): 101-128. doi: 10.3934/nhm.2021025
    [8] Qing Li, Steinar Evje . Learning the nonlinear flux function of a hidden scalar conservation law from data. Networks and Heterogeneous Media, 2023, 18(1): 48-79. doi: 10.3934/nhm.2023003
    [9] Jan Friedrich, Sanjibanee Sudha, Samala Rathan . Numerical schemes for a class of nonlocal conservation laws: a general approach. Networks and Heterogeneous Media, 2023, 18(3): 1335-1354. doi: 10.3934/nhm.2023058
    [10] Christophe Chalons, Paola Goatin, Nicolas Seguin . General constrained conservation laws. Application to pedestrian flow modeling. Networks and Heterogeneous Media, 2013, 8(2): 433-463. doi: 10.3934/nhm.2013.8.433
  • The simulation model proposed in [M. Hilliges and W. Weidlich. A phenomenological model for dynamic traffic flow in networks. Transportation Research Part B: Methodological, 29 (6): 407–431, 1995] can be understood as a simple method for approximating solutions of scalar conservation laws whose flux is of density times velocity type, where the density and velocity factors are evaluated on neighboring cells. The resulting scheme is monotone and converges to the unique entropy solution of the underlying problem. The same idea is applied to devise a numerical scheme for a class of one-dimensional scalar conservation laws with nonlocal flux and initial and boundary conditions. Uniqueness of entropy solutions to the nonlocal model follows from the Lipschitz continuous dependence of a solution on initial and boundary data. By various uniform estimates, namely a maximum principle and bounded variation estimates, along with a discrete entropy inequality, the sequence of approximate solutions is shown to converge to an entropy weak solution of the nonlocal problem. The improved accuracy of the proposed scheme in comparison to schemes based on the Lax-Friedrichs flux is illustrated by numerical examples. A second-order scheme based on MUSCL methods is presented.



    Nonlocal conservation laws model various phenomena, such as the dynamics of crowds [8,9,10], vehicular traffic [7,18], supply chains [3], granular materials [1], and sedimentation phenomena [5]. These nonlocal equations are given by expressions of the type

    tρ+divxF(x,t,ρ,W)=0,t>0,xRd,d1,

    where ρ=ρ(x,t)RN, N1 is the vector of the conserved quantities and the variable W=W(x,t,ρ) depends on an integral evaluation of ρ. The aim of this work is to propose an approach for a rigorous treatment of boundary conditions in the case of a spatially one-dimensional nonlocal problems, through development of new numerical schemes that are more accurate and less diffusive. The strategies that we employ are inspired by the results obtained in [5,6,17]. Particularly, we propose to study a simplification of the problem studied in [5], we adopt the treatment of the boundary conditions proposed in [17] and we present a numerical scheme based on local one studied in [6,19]. Our proposed scheme takes advantage of the form in which the flow is written, namely density ρ times a local decreasing factor g(ρ) times a nonlocal convolution term V(x,t)=(ωv(ρ)), where v is a given velocity function and ω is a convolution kernel such that the governing conservation law becomes

    tρ+x(ρg(ρ)V(x,t))=0. (1.1)

    In the case of a standard (local) conservation law, captured by setting V=const., the above-mentioned approach results in a monotone scheme [6], so it is possible to invoke standard arguments to prove its convergence to an entropy solution. This idea is extended herein to the nonlocal equation (1.1), although we emphasize that the resulting scheme is not monotone.

    There are many works about existence and uniqueness results for nonlocal equations, see e.g., [2,14,15,17] for the scalar case in one space dimension. In these papers a first-order Lax-Friedrichs (LxF)-type numerical scheme is used to approximate the problem and to prove the existence of solutions and the nonlocal term is considered as a convolution between a kernel function and the unknown (mean downstream density approach). LxF-type schemes are the most common approach used to solve nonlocal conservation laws because they are easy to implement and due to their monotonicity, they make it possible to numerically analyze nonlocal flux problems. Their well-known main disadvantage is, however, their large amount of numerical diffusion that smears out sharp features of the exact solution. To reduce this phenomenon, Friedrich et al. [16] proposed a Godunov-type numerical scheme where the nonlocal term is considered as a convolution between a kernel function and the velocity of unknown (mean downstream velocity approach). We adopt this idea about the convolution to propose and develop our model and computations. A well-known early analysis of initial-boundary value problems (IBVP) for conservation laws is due to Bardos et al. [4], where existence, uniqueness and continuous dependence of the solution on initial data in the case of zero boundary data are proved. These results were extended to more general but smooth boundary data by Colombo and Rossi [11]. Rossi [21] studied an IBVP for a general scalar balance law in one space dimension. Under rather general assumptions on the flux and source functions, the author proves the well-posedness of the problem and stability of its solutions with respect to variations in the flux and the source terms. For both results, the initial and boundary data are required to be bounded functions with bounded total variation. In [14] a global well-posedness result for a class of weak entropy solutions of bounded variations of scalar conservation laws with nonlocal flux on bounded domains is established under suitable regularity assumptions on the flux function. The nonlocal operator is the standard convolution product. The existence of solutions is obtained by proving the convergence of an adapted LxF algorithm. Lipschitz continuous dependence from initial and boundary data is derived applying Kružkov's doubling of variables technique. In [17] Goatin and Rossi study the same problem as De Filippis and Goatin [14], but with a different approach, namely following the treatment of the boundary conditions proposed by Colombo and Rossi in [12] where a particular multi-dimensional system of conservation laws in bounded domains with zero boundary conditions was considered. More specifically, the nonlocal operator in the flux function is not a mere convolution product, but it is assumed to be 'aware' of boundaries and by introducing an adapted LxF algorithm, various estimates on the approximate solutions that allow to prove the existence of solutions to the original IBVP are introduced. Uniqueness was derived from the Lipschitz continuous dependence on initial and boundary data, which is proved exploiting results available for the local problem.

    This work is organized as follows: In Section 2 we present the class of nonlocal conservation laws considered and the assumptions needed the problem studied as well as the main result of this paper, whose proof is postponed to end of Section 3. Lipschitz continuous dependence of solutions to the problem on initial and boundary data is proved in Section 3. Afterwards, in Section 4 we introduce the numerical scheme and derive some of its important properties such as the maximum principle and BV and L1 Lipschitz continuity in time estimates. These imply convergence of the scheme proposed, which in turn covers existence part of the well-posedness of the governing model. Throughout the paper we address the new scheme as a "HW scheme" according to the proponents of the original idea (Hilliges and Weidlich [19]), and in Section 5 we provide a second-order version of a HW-type numerical scheme. Finally, in Section 6 we present some numerical examples, analyzing the L1-error of the approximate solutions of studied problem computed with different schemes. Appendix A collects some estimates necessary throughout the paper.

    We consider a particular initial-boundary value problem which is a version of a nonlocal model of sedimentation proposed in [5]. Our model has the following structure:

    tρ+x(f(ρ)V(x,t))=0,(x,t)]a,b[×R+,ρ(x,0)=ρ0(x),x]a,b[,ρ(a,t)=ρa(t),ρ(b,t)=ρb(t),tR+, (2.1)

    where

    f(ρ):=ρg(ρ), (2.2)
    V(x,t):=(ωv(ρ))(x,t)=1W(x)bav(ρ(y,t))ω(yx)dy (2.3)

    with W(x):=baω(yx)dy for a suitable convolution kernel ω.

    Remark 2.1. The particular combination of local and nonlocal evaluations of ρ present in Eqs (2.2) and (2.3) can be motivated by following the discussion of [5, Sect. 1.2] for a model of sedimentation. Namely, if we assume that the nonlocal model describes the volume fraction of solids ρ[0,1] within a solid-fluid two-phase flow system, then the solid and fluid conservation equations in differential form are tρ+x(ρvs)=0 and t(1ρ)+x((1ρ)vf)=0, where vs and vf are the solid and fluid phase velocities and x is the vertical spatial coordinate. One then defines the volume average velocity of the mixture q:=ρvs+(1ρ)vf and the solid-fluid relative velocity vr=vsvf. Now for the particular case of batch settling in a closed column, we have q=0 for all x and t, and then ρvs=ρ(1ρ)vr, so that the unique PDE to be solved is

    tρ+x(ρ(1ρ)vr)=0, (2.4)

    where vr is specified by some constitutive function. This scenario corresponds to Eqs (2.1)(2.3) if we choose g(ρ)=1ρ and assume that vr is given through the nonlocal convolution

    vr=vr(x,t)=(ωv(ρ))(x,t), (2.5)

    where ρv(ρ) is a given, in general nonlinear function. In other words, the local and nonlocal evaluations of ρ in Eq (2.1) arise from the combination of properly defined volume fractions in mixture theory with the constitutive assumption in Eq (2.5). The standard local evaluation vr(x,t)=v(ρ(x,t)) corresponds to the well-known kinematic sedimentation model, while utilizing v(ωρ)(x,t) instead of (ωv(ρ))(x,t) is the model alternative explored in [5].

    Assumptions 2.1. The initial-boundary value problem (2.1) is studied under the following assumptions:

    (i) The initial function satisfies ρ0BV(I;R+), where I:=]a,b[R+.

    (ii) The function g satisfies gC2([0,1];R+0), g(ρ)0 for ρ[0,1], and g(1)=0.

    (iii) The function v satisfies vC2([0,1];R+), v(ρ)0 for ρ[0,1], and 0=v(1)v(ρ)v(0)=1.

    (iv) The convolution kernel ω satisfies ω(C2W2,1W2,)(R;R) such that Rω(y)dy=1, and there exists Kω>0 such that for all xI, W(x)=baω(yx)dyKω.

    In what follows, we denote L([0,1]):=. The weak entropy solution of problem (2.1) is defined, as in [14,17], in the following sense:

    Definition 2.1. A function ρ(L1LBV)(]a,b[×R+;R) is an entropy weak solution if for all φC1c(R2;R+) and kR,

    0ba(|ρk|φt+sgn(ρk)(f(ρ)f(k))Vφxsgn(ρk)f(k)Vxφ)dxdt+ba|ρ0(x)k|φ(x,0)dx+0sgn(ρaκ)(f(ρ(a+,t))f(κ))V(a,t)φ(a,t)dt0sgn(ρbκ)(f(κ)f(ρ(b,t)))V(b,t)φ(b,t)dt0.

    Definition 2.2. A function ρL(]a,b[×R+;[0,1]) is an entropy weak solution to problem (2.1) if, for all φC1c(R2,R+) and kR,

    0ba((ρk)±tφ(x,t)+sgn±(ρk)(f(ρ)f(k))V(x,t)xφ(x,t)sgn±(ρk)f(k)φ(x,t)xV(x,t))dxdt+ba(ρ0(x)k)±φ(x,0)dx+L(0(ρa(t)k)±φ(a,t)dt+0(ρb(t)k)±φ(b,t)dt)0,

    where

    L:=v(g+g). (2.6)

    Here we have used the notation s+:=max{s,0}, s:=max{s,0}, and

    sgn+(s):={1ifs>0,0ifs0,sgn(s):={0ifs0,1ifs<0.

    Definition 2.1 will be useful in the existence proof, while Definition 2.2 will be used in the uniqueness proof. We need to remark that in the frame of functions in L, Definition 2.2 implies Definition 2.1, for more details see [20]. In the rest of the paper, we denote I(r,s):=[min{r,s},max{r,s}] for any r,sR.

    Our main result concerning the new model is given by the following theorem, which states the well-posedness of the problem.

    Theorem 2.1 (Well-posedness). Let ρ0BV(I;R+), ρa,ρbBV(R+;[0,1]) and Assumptions 2.1 be in effect. Then, for all T>0, the Cauchy problem (2.1) admits a unique entropy weak solution ρ(L1LBV)(I×[0,T];R+) in the sense of the Definitions 1 and 2. Moreover, the following estimates hold: for any t[0,T],

    0ρ(x,t)1 for allxI, (2.7)
    ρ(,t)L1(I)R1, (2.8)
    TV(ρ(,t);I)etT1(TV(ρ0;I)+TV(ρa;]0,T[)+|ρ0(a+)ρa(0+)|+TV(ρb;]0,T[)+|ρ0(b)ρb(0+)|)+T2(t)T1(t)(etT11), (2.9)

    and for τ>0,

    ρ(.,t)ρ(.,tτ)L1(I)τ(Ct(t)+L(TV(ρa;]tτ,t[)+TV(ρa;]tτ,t[))

    where L is defined by Eq (2.6) and

    R1(t):=cρ0L1(I)+L(ρaL1([0,t])+ρbL1([0,t])),T1:=L(g+g),L:=2K1ωvωL1(R), (2.10)
    T2:=(WR1(t)+2L)g,W:=2K1ωvωL1(R)+4K2ωω2L1(I)v,Ct(t):=v(g+g)Cx(t)+gLR1(t). (2.11)

    The proof consists of two parts: existence and uniqueness of entropy solutions. While uniqueness follows from the Lipschitz continuous dependence of weak entropy solutions on initial and boundary data, existence is based on a construction of a converging sequence of approximate solutions defined by a numerical scheme.

    One part of the proof of Theorem 2.1 is to show uniqueness of weak entropy solutions for the model (2.1). Therefore, we prove the Lipschitz continuous dependence of weak entropy solutions with respect to initial and boundary data. Here, we follow [17]. We define V(x,t) by Eq (2.3) and analogously U(x,t) by replacing ρ in Eq (2.3) by another function σ. Furthermore, we let r(x,t,u):=ug(u)V(x,t) and h(x,t,u):=ug(u)U(x,t). Observe that by the definition of V and U,

    V(x,t)v,U(x,t)v,

    furthermore, we have the following estimates derived in Appendix A:

    |xV(x,t)|2K1ωvωL1(I)=:P1, (3.1)
    |2xxV|K2ωvωL1(I)ωL1(I)+P1K2ωωL1(I)+P1K1ω+K1ωvωL1(I)=:P2, (3.2)
    |V(x,t)U(x,t)|P3ba|ρ(y,t)σ(y,t)|dy,P3:=K1ωωL(R)v, (3.3)
    |xV(x,t)xU(x,t)|Mba|ρ(y,t)σ(y,t)|dy,M:=K2ωωL1(R)vωL(R)+K1ωvωL(R). (3.4)

    In order to obtain the desired estimate, we first consider the local initial-boundary value problem

    tϕ+xr(x,t,ϕ)=0,(x,t)I×]0,T[,ϕ(x,0)=σ0(x),xI;ϕ(a,t)=σa(t),ϕ(b,t)=σb(t),t]0,T[. (3.5)

    By Assumptions 2.1, rC2(I×[0,T]×R;R) and urL(I×[0,T]×R;R) and by estimation Eq (3.1), 2xur(x,t,u)<. Thus, we may apply Theorem 2.4 of [21] to deduce that problem (3.1) admits a unique solution in (LBV)(I×]0,T[;R) which satisfies, for all t[0,T[, 0ϕ(x,t)1 for all xI and

    TV(ϕ(t))etC2(t)(TV(σ0)+TV(σa;]0,t[)+|σ0(a+)σa(0+)|+TV(σb;]0,t[)+|σ0(b)σb(0+)|+Kt), (3.6)

    where

    C2(t):=P1(g+g),K:=2((P1+P2)g+P1g).

    Assume that ρ is a solution to the IBVP

    tρ+xr(x,t,ρ)=0,(x,t)I×]0,T[,ρ(x,0)=ρ0(x),xI;ρ(a,t)=ρa(t),ρ(b,t)=ρb(t),t]0,T[

    and that σ is a solution to the analogous IBVP

    tσ+xh(x,t,σ)=0,(x,t)I×]0,T[,σ(x,0)=σ0(x),xI;σ(a,t)=σa(t),σ(b,t)=σb(t),t]0,T[.

    Therefore, for t>0 we compute

    ρ(,t)σ(,t)L1(I)ρ(,t)ϕ(,t)L1(I)+ϕ(,t)σ(,t)L1(I), (3.7)

    where the first term on the right-hand side of Eq (3.7) evaluates the distance between solutions to IBVPs with the same flux function, but different initial and boundary data. Then, we can apply Proposition 3.7 of [21] to get

    ρ(,t)ϕ(,t)L1(I)ρ0σ0L1(I)+L(ρaσaL1([0,t])+ρbσbL1([0,t]))=:A(t).

    Now, the second term on the right-hand side of Eq (3.7) evaluates the distance between solutions to IBVPs with different flux functions, but same initial and boundary data. Therefore, we apply Theorem 2.6 of [21] to obtain

    ϕ(,t)σ(,t)L1(I)t0bax(rh)(x,s,)L(U)dxds+t0u(rh)(,s,)L(I×U))min{TV(σ(,s)),TV(ϕ(,s))}ds+2t0(rh)(a,s,)L(U)ds+2t0(rh)(b,s,)L(U)ds, (3.8)

    where

    U:=[max{π(s)L(I),σ(s)L(I)},max{π(s)L(I),σ(s)L(I)}]=[1,1].

    Next, we estimate all terms appearing in Eq (3.8). First of all, by Theorem 2.1,

    TV(σ(,t))etT1(t)(TV(σ0;I)+TV(σa;(0,t))+|σ0(a+)σa(0+)|+TV(σb;(0,t))+|σ0(b)σb(0+)|)+T2(t)T1(t)(etT1(t)1) (3.9)

    with

    T1(t):=L(g+g),T2(t):=(WS1(t)+2L)g,S1(t):=σ0L1(I)+L(σaL1([0,t])+σbL1([0,t])).

    Thus, by Eqs (3.6) and (3.9), we get

    min{TV(σ(,s)),TV(ϕ(,s))}etT3(t)(TV(σ0;I)+TV(σa;(0,t))+|σ0(a+)σa(0+)|+TV(σb;(0,t))+|σ0(b)σb(0+)|)+min{KteC2(t)t,(T2(t)/T1(t))(etT11)}=:T4(t). (3.10)

    To handle the first term on the right-hand side of Eq (3.8), we use the estimate

    |x(rh)(x,t,u)|=|ug(u)x(VU)|C|u|Mba|ρ(y,t)σ(y,t)|dy,

    which implies

    x(rh)(x,s,)L(U)CMba|ρ(y,t)σ(y,t)|dy. (3.11)

    Next, in view of u(rh)(x,t,u)=u(ug(u))(VU) we get

    u(rh)(,s,)L(I×U)u(ug(u))P3ba|ρ(y,s)σ(y,s)|dy(g+g)P3ba|ρ(y,s)σ(y,s)|dy. (3.12)

    The third integral on the right-hand side of Eq (3.8) is estimated by considering that

    |(rh)(a,t,u)|=|ug(u)(VU)|C|u|P3ba|ρ(y,t)σ(y,t)|dy,

    hence

    (rh)(a,s,)L([1,1])CP3ba|ρ(y,t)σ(y,t)|dy; (3.13)

    the fourth integral is treated similarly. Finally, combining Eq (3.10) to Eq (3.13) we get

    ϕ(,t)σ(,t)L1(I)B(t)t0ba|ρ(y,t)σ(y,t)|dyds, (3.14)

    where we define

    B(t)=CM+P3((g+g)T4(t)+4C). (3.15)

    Inserting A(t) and Eq (3.14) into Eq (3.7) yields

    ρ(,t)σ(,t)L1(I)A(t)+B(t)t0ρ(,s)σ(,s)L1(I)ds,

    so by an application of Gronwall's lemma we arrive at the estimate

    ρ(,t)σ(,t)L1(I)A(t)+t0A(s)B(s)exp(tsB(τ)dτ)dsA(t)+B(t)t0A(s)eB(t)(ts)dsA(t)(1+B(t)teB(t)t).

    Consequently, we have proved the following lemma.

    Lemma 3.1 (Lipschitz continuous dependence on initial and boundary data). If Assumptions Eq (2.1) are in effect and ρ and σ are two entropy solutions to Eq (2.1) with initial data ρ0, σ0BV(I;R+) and ρa,ρb,σa,σbBV(]0,T[;[0,1]), then the estimate

    ρ(,T)σ(,T)L1(I)(ρ0σ0+L(ρaσaL1([0,T])+ρbσbL1([0,T])))(1+B(T)TeB(T)T) (3.16)

    holds for any T>0, where B(T) is defined in Eq (3.15).

    The proof of existence of solutions consists of several steps that are developed in this section. We construct a sequence of approximate solutions to Eq (2.1) and derive the compactness estimates necessary to prove its convergence by Helly's theorem. We then show that the limit function is a weak entropy solution to the IBVP (2.1).

    Fix T>0, we take a space step Δx=(ba)/M with MN and a time step Δt that is subject to a CFL condition specified later, and we set λ=Δt/Δx. We denote the center of the cells by xj:=a+(j1/2)Δx for j=1,,M, and xj+1/2=a+jΔx,j=0,,M are the cells interfaces. Moreover, we set NT=TΔt and, for n=0,,NT let tn=nΔt be the time mesh. The initial datum and the boundary data are approximated as

    ρ0j:=1Δxxj+1/2xj1/2ρ0(x)dx,j=1,,M;ρna:=1Δttn+1tnρa(t)dt,ρnb:=1Δttn+1tnρb(t)dtn=0,,NT1,

    furthermore, we set ρn0:=ρa and ρnM+1:=ρb. For n=0,,NT1, we set ωk:=ω((k1/2)Δx) for kZ and define

    Wj+1/2:=ΔxMk=1ωkj,Vnj+1/2:=ΔxWj+1/2Mk=1ωkjv(ρk)forj=0,,M.

    We define a piecewise constant approximate solution ρΔ(x,t) to Eq (2.1) as

    ρΔ(x,t)=ρnjfort[tn,tn+1[,x[xj1/2,xj+1/2[, (4.1)

    where n=0,,NT1, j=1,,M, through the numerical scheme

    ρn+1j=ρnjλ(Fnj+1/2(ρnj,ρnj+1)Fnj1/2(ρnj1,ρnj)),j=1,,M, (4.2)

    where a nonlocal version of the monotone numerical flux proposed in [19] and also used in [6] is employed, namely

    Fnj+1/2(u,w)=ug(w)Vnj+1/2. (4.3)

    Next, we study the properties of the numerical scheme (4.2) and (4.3). Particularly, we are going to prove that the sequence of approximate solutions ρΔ(x,t) satisfies the assumptions of Helly's compactness theorem.

    Lemma 4.1 (Maximum principle). If Assumptions 2.1 and the CFL condition

    λv(g+g)1 (4.4)

    hold, then if ρ0(x)[0,1] for xI, the approximate solution satisfies

    0ρnj1 for all j=1,,M andn=1,,NT.

    Proof. We assume that 0ρnj1 for j=1,,M. From Eq (4.2) we have

    ρn+1j=ρnjλ(ρnjg(ρnj+1)Vnj+1/2ρnj1g(ρnj)Vnj1/2)ρnj+λρnj1g(ρnj)Vnj1/2ρnj+λg(ρnj)Vnj1/2=:G(ρnj).

    In view of G(ρ)=1+λg(ρ)Vnj1/2, under the CFL condition (4.4), G is a non-decreasing function of ρ. Thus

    maxρnj[0,1]G(ρnj)=G(1)=1,

    which implies that ρn+1j1. Returning to Eq (4.2), we obtain that

    ρn+1jρnjλρnjg(ρnj+1)Vnj+1/2=(1λg(ρnj+1)Vnj+1/2)ρnj,j=1,,M.

    Consequently, if Eq (4.4) is in effect, then ρn+1j0.

    Lemma 4.2 (L1 bound). Let Assumptions 2.1 and the CFL condition (4.4) hold. If ρ0L(I;[0,1]) and ρa,ρbL(R+;[0,1]), then, for all t>0, ρΔ satisfies

    ρΔ(,t)L1(I)ρ0L1(I)+L(ρaL1([0,t])+ρbL1([0,t]))=:C1(t), (4.5)

    where L is defined in Eq (2.6).

    Proof. Lemma 4.1 (for n=0,,N) and the assumption g(1)=0 imply

    ρΔ(,tn+1)L1(I)=Δx(ρn1++ρnM)+Δt(ρnag(ρn1)V1/2ρnMg(ρnb)VnM+1/2)=ρΔ(,tn)L1(I)+Δt(ρnag(ρn1)Vn1/2+ρnM(g(1)g(ρnb))VnM+1/2)=ρΔ(,tn)L1(I)+Δtρnag(ρn1)Vn1/2+ΔtρnMg(ζnj)(1ρnb)VnM+1/2,

    where ζnjI(ρnb,1). Now, using item (ii) of Assumptions 2.1 and the nonnegativity of ρna and ρnb we have

    ρΔ(,tn+1)L1(I)ρΔ(,tn)L1(I)+Δtv(g+g)(ρna+ρnb).

    An iterative argument yields the desired estimate (4.5).

    Lemma 4.3 (BV estimate in space). Let Assumptions 2.1 hold, ρ0BV(I;R+), ρa,ρbBV(R+,[0,1]) and let ρΔ be given by Eq (4.2). If the CFL condition (4.4) holds, then for all n=1,,NT the discrete space BV estimate

    Mj=0|ρnj+1ρnj|Cx(tn) (4.6)

    is satisfied, where we define the time-dependent bound

    Cx(tn):=eK1tn(Mj=0|ρ0j+1ρ0j|+nm=1|ρmaρm1a|+nm=1|ρmbρm1b|)+K11K2(eK1tn1) (4.7)

    and K1 and K2 are defined as

    K1:=L(g+g),K2:=(WC1(t)+2L)g. (4.8)

    Proof. Subtracting two versions of Eq (4.2) from each other, we obtain

    ρn+1j+1ρn+1j=AnjλBnj,

    where

    Anj:=ρnj+1ρnjλ(ρnj+1g(ρnj+2)Vnj+3/2ρnjg(ρnj+1)Vnj+1/2ρnjg(ρnj+1)Vnj+3/2+ρnj1g(ρnj)Vnj+1/2),Bnj:=ρnjg(ρnj+1)Vnj+3/2ρnjg(ρnj+1)Vnj+1/2+ρnj1g(ρnj)Vnj1/2ρnj1g(ρnj)Vnj+1/2.

    A straightforward computation reveals that Anj can be written in the form

    Anj=(1λ(g(ρnj+1)Vnj+3/2ρnjg(ξnj+1/2)Vnj+1/2))(ρnj+1ρnj)λρnj+1g(ξnj+3/2)Vnj+3/2(ρnj+2ρnj+1)+λg(ρnj)Vnj+1/2(ρnjρnj1), (4.9)

    where ξnj+3/2I(ρnj+1,ρnj+2). By the CFL condition (4.4), the first term in the right-hand side of Eq (4.9) is positive, thus summing over j{1,,M1} yields

    M1j=1|Anj|M1j=1|ρnj+1ρnj|+λg(ρn1)Vn3/2|ρn1ρna|λg(ρnM)VnM+1/2|ρnMρnM1|λρnMg(ξnM+1/2)VnM+1/2|ρnbρnM|+λρn1g(ξn3/2)Vn3/2|ρn2ρn1|. (4.10)

    On the other hand,

    Bnj=ρnj(Vnj+1/2Vnj+3/2)g(ξnj+1/2)(ρnj+1ρnj)+g(ρnj)(Vnj+1/2Vnj1/2)(ρnjρnj1)+ρnjg(ρnj)(Vnj+3/22Vnj+1/2+Vnj1/2).

    Taking absolute values and summing over j{1,,M1} we have

    λM1j=1|Bnj|λM1j=1ρnjg(ξnj+1/2)|Vnj+3/2Vnj+1/2||ρnj+1ρnj|+λM1j=1g(ρnj)|Vnj1/2Vnj+1/2||ρnjρnj1|+λM1j=1ρnjg(ρnj)|Vnj+3/22Vnj+1/2+Vnj1/2|=λM1j=1(ρnjg(ξnj+1/2)g(ρnj+1))|Vnj+3/2Vnj+1/2||ρnj+1ρnj|+λM1j=1ρnjg(ρnj)|Vnj+3/22Vnj+1/2+Vnj1/2|+λg(ρn1)|Vn3/2Vn1/2||ρn1ρna|λg(ρnM)|VnM+1/2VnM1/2||ρnMρnM1|.

    By using the following estimations (which are proved in Appendix A)

    |Vnj+3/2Vnj+1/2|LΔx,|Vnj+3/22Vnj+1/2+Vnj1/2|Δx2W, (4.11)

    we obtain

    λM1j=1|Bnj|λLΔxM1j=1(ρnjg(ξnj+1/2)g(ρnj+1))|ρnj+1ρnj|+λΔx2WM1j=1ρnjg(ρnj)+λg(ρn1)|Vn3/2Vn1/2||ρn1ρna|λg(ρnM)|VnM+1/2VnM1/2||ρnMρnM1|LΔtM1j=1(ρnjg(ξnj+1/2)g(ρnj+1))|ρnj+1ρnj|+ΔtWgρL1(I)+LΔtg(ρn1)|ρn1ρna|. (4.12)

    We now deal with the boundary terms, first for the left boundary term. By the definition of the scheme (4.2),

    ρn+11ρn+1a=ρn1ρna+ρnaρn+1aλ((ρn1g(ρn2)ρn1g(ρn1))Vn3/2+(ρn1g(ρn1)ρnag(ρn1))Vn3/2+ρnag(ρn1)(Vn3/2Vn1/2))=ρn1ρna+ρnaρn+1aλ(ρn1g(ξn3/2)Vn3/2(ρn2ρn1)+(ρn1ρna)g(ρn1)Vn3/2+ρnag(ρn1)(Vn3/2Vn1/2))=ρnaρn+1a+(1λg(ρn1)Vn3/2)(ρn1ρna)λρn1g(ξn3/2)(ρn2ρn1)λρnag(ρn1)(Vn3/2Vn1/2).

    Taking absolute values, invoking Eq (4.4) and using Eq (4.11) we obtain

    |ρn+11ρn+1a||ρnaρn+1a|+(1λg(ρn1)Vn3/2)|ρn1ρna|λρn1g(ξn3/2)Vn3/2|ρn2ρn1|+LΔtρnag(ρn1). (4.13)

    An analogous discussion of the other boundary term yields

    |ρn+1bρn+1M||ρnbρn+1b|+(1+λρnMg(ξnM+1/2)VnM+1/2)|ρnMρnb|+λg(ρnM)VnM+1/2|ρnMρnM1|+ΔtρnM1g(ρnM)L. (4.14)

    Finally, collecting the estimates Eqs (4.10), (4.12), (4.13) and (4.14) we arrive at

    Mj=0|ρn+1j+1ρn+1j||ρnaρn+1a|+Mj=0|ρnj+1ρnj|LΔtM1j=1(ρnjg(ξnj+1/2)g(ρnj+1))|ρnj+1ρnj|+ΔtWgρL1(I)+ΔtLg(ρn1)|ρn1ρna|+|ρnbρn+1b|+ΔtL(ρnag(ρn1)+ρnM1g(ρnM))|ρnaρn+1a|+(1+ΔtL(g+g))Mj=0|ρnj+1ρnj|+ΔtWgρL1(I)+|ρnbρn+1b|+2ΔtLg=|ρnaρn+1a|+(1+ΔtK1)Mj=0|ρnj+1ρnj|+|ρnbρn+1b|+ΔtK2,

    with L, W, K1 and K2 defined as in Eqs (2.10), (2.11), and (4.8). The previous estimate implies Eqs (4.6) and (4.7) by standard arguments.

    Lemma 4.4 (BV estimate in space and time). Let ρ0BV(I;R+) and ρa, ρbBV(R+;[0,1]). If Assumptions 2.1 and the CFL condition (4.4) hold, then for all n=0,,NT, the estimate

    n1m=0Mj=0Δt|ρmj+1ρmj|+n1m=0M+1j=0Δx|ρm+1jρmj|Cxt(tn) (4.15)

    holds, where

    Cxt(tn)=tnCx(tn)+Ct(tn)+Δx(TV(ρa;[0,T])+TV(ρb;[0,T])).

    Proof. By Lemma 4.3 we have

    n1m=0Mj=0Δt|ρmj+1ρmj|nΔtCx(nΔt). (4.16)

    By the definition of numerical scheme (4.2), for m{0,,n1} and j{1,,M} we get

    |ρm+1jρmj|=|λρmjg(ξmj+1/2)Vmj+1/2(ρmj+1ρmj)+λρmjg(ρmj)(Vmj+1/2Vmj1/2)+λg(ρmj)Vmj1/2(ρmjρmj)|λgv|ρmj+1ρmj|+λgLΔxρmj+λgv|ρmjρmj1|.

    Multiplying the last inequality by Δx and summing for j from 1 to M we get

    Mj=1Δx|ρm+1jρmj|Δtv(g+g)Mj=0|ρmj+1ρmj|+ΔtgLρmL1(I).

    Lemmas 4.2 and 4.3 now imply that

    Mj=1Δx|ρm+1jρmj|Δtv(g+g)Cx(mΔt)+ΔtgLC1(mΔt)=ΔtCt(mΔt),

    where we define

    Ct(τ):=vL([0,1])(g+g)Cx(τ)+gLC1(τ).

    In particular,

    M+1j=0Δx|ρm+1jρmj|=Δx|ρm+1aρma|+Δx|ρm+1bρmb|+Mj=1Δx|ρm+1jρmj|Δx|ρm+1aρma|+Δx|ρm+1bρmb|+ΔtCt(mΔt), (4.17)

    which, summed over m=0,,n1, yields

    n1m=0M+1j=0Δx|ρm+1jρmj|Δxn1m=0(|ρm+1aρma|+|ρm+1bρmb|)+nΔtCt(nΔt). (4.18)

    Summing Eqs (4.16) and (4.18) we get the desired estimate Eq (4.15).

    Lemmas 4.1 and 4.4 allow us to apply Helly's compactness theorem that ensures the existence of a subsequence of ρΔ, still denoted by ρΔ, that converges in L1 to a function ρL(I×[0,T]), for all T>0. Now we need to prove that this limit function is indeed an entropy weak solution to Eq (2.1) in the sense of Definition 2.2. First we will show that the approximate solutions obtained by the scheme (4.2) satisfies a discrete entropy inequality. To this end, for j=1,,M, n=0,,NT1, and kR, we define

    Hnj(u,w,z):=wλ(Fnj+1/2(w,z)Fnj1/2(u,w)),Gn,kj+1/2(u,w):=Fnj+1/2(uk,wk)Fnj+1/2(k,k),Ln,kj+1/2(u,w):=Fnj+1/2(k,k)Fnj+1/2(uk,wk),

    where wz:=min{w,z}, wz:=max{w,z}, and Fnj+1/2(u,w) is defined as in Eq (4.3). Observe that due to the definition of the scheme,

    ρn+1j=Hnj(ρnj1,ρnj,ρnj+1),

    and we also recall the equivalence (sk)+=skk and (sk)=ksk.

    Lemma 4.5 (Discrete entropy inequalities). If Assumptions 2.1 and the CFL condition (4.4) are in effect, then the approximate solution ρΔ in Eq (4.1) satisfies the discrete entropy inequalities

    (ρn+1jk)+(ρnjk)++λ(Gn,kj+1/2(ρnj,ρnj+1)Gn,kj1/2(ρnj1,ρnj))+λsgn+(ρn+1jk)f(k)(Vnj+1/2Vnj1/2)0<italic>and</italic> (4.19)
    (ρn+1jk)(ρnjk)+λ(Ln,kj+1/2(ρnj,ρnj+1)Ln,kj1/2(ρnj1,ρnj))+λsgn(ρn+1jk)f(k)(Vnj+1/2Vnj1/2)0, (4.20)

    for j=1,,M, n=0,,NT1 and kR.

    Proof. By the CFL condition (4.4), the map (u,w,z)Hnj(u,w,z) satisfies

    uHnj(u,w,z)=λg(w)Vnj/20,wHnj(u,w,z)=1λ(g(z)Vnj+1/2ug(w)Vnj1/2)0,zHnj(u,w,z)=λwg(z)Vnj+1/20. (4.21)

    Notice that

    Hnj(k,k,k)=kλf(k)(Vnj+1/2Vnj1/2).

    The monotonicity properties Eq (4.21) imply that

    Hnj(ρnj1k,ρnjk,ρnj+1k)Hnj(k,k,k)Hnj(ρnj1,ρnj,ρnj+1)Hnj(k,k,k)Hnj(k,k,k)=(Hnj(ρnj1,ρnj,ρnj+1)Hnj(k,k,k))+=(ρn+1jk+λf(k)(Vnj+1/2Vnj1/2))+,

    moreover, we also have

    Hnj(ρnj1k,ρnjk,ρnj+1k)Hnj(k,k,k)=(ρnjk)λ(Fnj+1/2(ρnjk,ρnj+1k)Fnj1/2(ρnj1k,ρnjk)))(kλ(Fnj+1/2(k,k)Fnj1/2(k,k)))=(ρnjk)kλ(Fnj+1/2(ρnjk,ρnj+1k)Fnj1/2(ρnj1k,ρnjk)Fnj+1/2(k,k)+Fnj1/2(k,k))=(ρnjk)+λ(Gn,kj+1/2(ρnj,ρnj+1)Gn,kj1/2(ρnj1,ρnj)),

    hence

    (ρnjk)+λ(Gn,kj+1/2(ρnj,ρnj+1)Gn,kj1/2(ρnj1,ρnj))(ρn+1jk+λf(k)(Vnj+1/2Vnj1/2))+=sgn+(ρn+1jk+λf(k)(Vnj+1/2Vnj1/2))(ρn+1jk+λf(k)(Vnj+1/2Vnj1/2))(ρn+1jk)+λsgn+(ρn+1jk)f(k)(Vnj+1/2Vnj1/2),

    which proves Eq (4.19), while Eq (4.20) is proven in an entirely analogous way.

    Remark 4.1. Lemma 4.5 and its proof mimic standard arguments known for monotone schemes of local conservation laws [13], although the scheme is not monotone in the proper sense since the argument Eq (4.21) suppresses the presence of ρnj1, ρnj and ρnj+1 within Vnj1/2 and Vnj+1/2.

    Lemma 4.6. Let ρ0BV(]a,b[;R+), ρa,ρbBV(R+;R+), and Assumptions 2.1 and the CFL condition (4.4) be in effect. Then the piecewise constant approximate solutions ρΔ in Eq (4.1) resulting from the HW scheme (4.2) converge, as Δx0, towards an entropy weak solution of initial boundary value problem (2.1).

    Proof. Adding and subtracting λGn,kj+1/2(ρnj,ρnj) we may rewrite Eq (4.19) as

    0(ρn+1jk)+(ρnjk)++λ(Gn,kj+1/2(ρnj,ρnj+1)Gn,kj+1/2(ρnj,ρnj))+λ(Gn,kj+1/2(ρnj,ρnj)Gn,kj1/2(ρnj1,ρnj))+λsgn+(ρn+1jk)f(k)(Vnj+1/2Vnj1/2).

    Let φC1c([0,T]×I;R+) for some T>0. Multiplying the inequality above by Δxφ(xj,tn) and summing over j=1,,M and nN yields

    0T1+T2+T3+T4,

    where we define the terms

    T1:=Δxn=0Mj=1((ρn+1jk)+(ρnjk)+)φ(xj,tn),T2:=Δtn=0Mj=1(Gn,kj+1/2(ρnj,ρnj+1)Gn,kj+1/2(ρnj,ρnj))φ(xj,tn),T3:=Δtn=0Mj=1(Gn,kj1/2(ρnj1,ρnj)Gn,kj+1/2(ρnj,ρnj))φ(xj,tn),T4:=Δtn=0Mj=1sgn+(ρn+1jk)f(k)(Vnj+1/2Vnj1/2)φ(xj,tn).

    Summing by parts, we obtain

    T1=Δxn=1Mj=1(ρnjk)+φ(xj,tn1)Δxn=0Mj=1(ρnjk)+φ(xj,tn)=ΔxMj=1(ρ0jk)+φ(xj,0)ΔxΔtn=1Mj=1(ρnjk)+φ(xj,tn)φ(xj,tn1)Δt,

    and by the dominated convergence theorem,

    T1Δx0+ba(ρ0(x)k)+φ(xj,0)dx0ba(ρ(x,t)k)+tφ(x,t)dxdt.

    Again by the dominated convergence theorem,

    T4=ΔtΔxn=0Mj=1sgn+(ρn+1jk)f(k)Vnj+1/2Vnj1/2Δxφ(xj,tn)Δx0+0basgn+(ρ(x,t)k)f(k)(xV)φ(x,t)dxdt.

    Concerning T2 and T3, we get

    T2+T3=Δtn=0Mj=1(Gn,kj+1/2(ρnj,ρnj+1)Gn,kj+1/2(ρnj,ρnj))φ(xj,tn)Δtn=0M1j=0(Gn,kj+1/2(ρnj,ρnj+1)Gn,kj+3/2(ρnj+1,ρnj+1))φ(xj+1,tn)=T20+T30=T23,

    where we define

    T20:=Δtn=0M1j=1((Gn,kj+1/2(ρnj,ρnj+1)Gn,kj+1/2(ρnj,ρnj))φ(xj,tn)(Gn,kj+1/2(ρnj,ρnj+1)Gn,kj+3/2(ρnj+1,ρnj+1))φ(xj+1,tn)),T30:=Δtn=0((Gn,kM+1/2(ρnM,ρnb)Gn,kM+1/2(ρnM,ρnM))φ(xM,tn)(Gn,k1/2(ρna,ρn1)Gn,k3/2(ρn1,ρn1))φ(x1,tn)).

    Now we define

    S:=ΔxΔt+n=0Mj=1Gn,kj+1/2(ρnj,ρnj)φ(xj+1,tn)φ(xj,tn)ΔxLΔt+n=0((ρnak)+φ(a,tn)+(ρnbk)+φ(b,tn)). (4.22)

    Since

    Gn,kj+1/2(ρnj,ρnj)=Fnj+1/2(ρnjk,ρnjk)Fnj+1/2(k,k)=(f(ρnjk)f(k))Vnj+1/2=sgn+(ρnjk)(f(ρnj)f(k))Vnj+1/2,

    it follows that

    SΔx0++0basgn+(ρ(x,t)k)(f(ρnj)f(k))Vxφ(x,t)dxdtL(+0(ρa(t)k)+φ(a,t)dt++0(ρb(t)k)+φ(b,t)dt).

    Let us rewrite S in Eq (4.22) as follows:

    S=Δt+n=0Mj=1Gn,kj+1/2(ρnj,ρnj)(φ(xj+1,tn)φ(xj,tn))LΔt+n=0((ρnak)+φ(a,tn)+(ρnbk)+φ(b,tn))=Δt+n=0(Mj=1Gn,kj+1/2(ρnj,ρnj)φ(xj+1,tn)M1j=0Gn,kj+3/2(ρnj+1,ρnj+1)φ(xj+1,tn))LΔt+n=0((ρnak)+φ(a,tn)+(ρnbk)+φ(b,tn))=S20+S30,

    where we define

    S20:=Δtn=0M1j=1{Gn,kj+1/2(ρnj,ρnj)Gn,kj+3/2(ρnj+1,ρnj+1)}φ(xj+1,tn),S30:=Δt+n=0(Gn,kM+1/2(ρnM,ρnM)φ(xM+1,tn)Gn,k3/2(ρn1,ρn1)φ(x1,tn))LΔt+n=0((ρnak)+φ(a,tn)+(ρnbk)+φ(b,tn)).

    Adding and subtracting Gn,kj+1/2(ρnj,ρnj), we may rewrite S20 as

    S20=Δtn=0M1j=1(Gn,kj+1/2(ρnj,ρnj+1)Gn,kj+1/2(ρnj,ρnj))φ(xj+1,tn)Δtn=0M1j=1(Gn,kj+1/2(ρnj,ρnj+1)Gn,kj+3/2(ρnj+1,ρnj+1))φ(xj+1,tn).

    We evaluate now the distance between T20 and S20:

    |T20S20|Δtn=0M1j=1|Gn,kj+1/2(ρnj,ρnj+1)Gn,kj+1/2(ρnj,ρnj)||φ(xj+1,tn)φ(xj,tn)|,

    since

    |Gn,kj+1/2(ρnj,ρnj+1)Gn,kj+1/2(ρnj,ρnj)|=|Fnj+1/2(ρnjk,ρnj+1k)Fnj+1/2(ρnjk,ρnjk)|=|(ρnjk)(g(ρnj+1k)g(ρnjk))Vnj+1/2|=|(ρnjk)g(ηnj+1/2)((ρnj+1k)(ρnjk))Vnj+1/2|vg|(ρnjk)((ρnj+1k)(ρnjk))|vg|ρnj+1ρnj|L|ρnj+1ρnj|,

    in light of the uniform BV estimate Eq (4.6) we deduce that

    |T20S20|LΔxΔtxφn=0M1j=1|ρnj+1ρnj|LΔxTxφmax0nT/ΔtTV(ρΔ(,tn))=O(Δx). (4.23)

    Furthermore, we obtain

    S30T30=Δtn=0(Gn,kM+1/2(ρnM,ρnM)φ(xM+1,tn)Gn,k3/2(ρn1,ρn1)φ(x1,tn))LΔtn=0((ρnak)+φ(a,tn)+(ρnbk)+φ(b,tn))Δtn=0((Gn,kM+1/2(ρnM,ρnb)Gn,kM+1/2(ρnM,ρnM))φ(xM,tn)(Gn,k1/2(ρna,ρn1)Gn,k3/2(ρn1,ρn1))φ(x1,tn)),

    which we can write as S30T30=R1+R2+R3 with

    R1:=Δtn=0(Gn,k1/2(ρna,ρn1)φ(x1,tn)L(ρnak)+φ(a,tn)),R2:=Δtn=0(L(ρnbk)+φ(b,tn)+Gn,kM+1/2(ρnM,ρnb)φ(xM,tn)),R3:=Δtn=0Gn,kM+1/2(ρnM,ρnM)(φ(xM+1,tn)φ(xM,tn)).

    Observe that

    uFnj+1/2(u,z)=u(ug(z)Vnj+1/2)=g(z)Vnj+1/20,zFnj+1/2(u,z)=z(ug(z)Vnj+1/2)=ug(z)Vnj+1/20,

    meaning that the numerical flux is increasing with respect to the first variable and the decreasing with respect to the second one. Consequently,

    Gn,kj+1/2(u,z)=Fnj+1/2(uk,zk)Fnj+1/2(k,k)Fnj+1/2(k,zk)Fnj+1/2(k,k)=(kg(zk)kg(k))Vnj+1/2=kg(νnj+1/2)((zk)k)Vnj+1/2vg(zk)+L(zk)+,Gn,kj+1/2(u,z)=Fnj+1/2(uk,zk)Fnj+1/2(k,k)Fnj+1/2(uk,k)Fnj+1/2(k,k)=(uk)g(k)Vnj+1/2kg(k)Vnj+1/2=((uk)k)g(k)Vnj+1/2vg(uk)+L(uk)+,

    hence

    R1=Δtn=0Gn,k1/2(ρna,ρn1)(φ(x1,tn)φ(a,tn))+Δtn=0(Gn,k1/2(ρna,ρn1)L(ρnak)+)φ(a,tn)LTΔxxφsup0nT/Δt(ρnak)++LΔtn=0((ρnak)+(ρnak)+)φ(a,tn)TΔxxφLρaL([0,t])=O(Δx),R2=Δtn=0(L(ρnbk)++Gn,kM+1/2(ρnM,ρnb))φ(b,tn)Δtn=0Gn,kM+1/2(ρnM,ρnb)(φ(xM,tn)φ(b,tn))LΔtn=0((ρnbk)+(ρnbk)+)φ(b,tn)+LTΔxxφLsup0nT/Δt(ρnbk)+LTΔxxφLρbL([0,t])=O(Δx),R3Δt|n=0Gn,kM+1/2(ρnM,ρnM)(φ(xM+1,tn)φ(xM,tn))|ΔtΔxxφL+n=0|Gn,kM+1/2(ρnM,ρnM)|.

    Taking into account that

    Gn,kM+1/2(ρnM,ρnM)=FnM+1/2(ρnMk,ρnMk)FnM+1/2(k,k)=(ρnMk)g(ρnMk)VnM+1/2kg(k)VnM+1/2=((ρnMk)(g(ρnMk)g(k))+(ρnMkk)g(k))VnM+1/2=((ρnMk)g(ηnj+1/2)(ρnMkk)+(ρnMkk)g(k))VnM+1/2=((ρnMk)g(ηnj+1/2)+g(k))(ρnMkk)VnM+1/2,

    we get

    R3=ΔtΔxxφL+n=0|((ρnMk)g(ηnj+1/2)+g(k))(ρnMkk)VnM+1/2|ΔtΔxxφL+n=0|(g(ηnj+1/2)+g(k))(ρnMkk)VnM+1/2|LΔtΔxxφLvn=0|ρnMkk|=LΔtΔxxφLvn=0(ρnMk)+LTΔxxφLvsup0nT/ΔtρnLTΔxxφLv=O(Δx),

    thanks to the maximum principle estimate. Hence, S30T30O(Δx), so that we finally get

    0T1+T2+T3+T4=T1+T4+T23±S=T1+T4+SO(Δx).

    This concludes the proof.

    Proof of Theorem 2.1. The existence of solutions to problem (2.1) follows from the results of Section 4. The uniqueness is ensured by the Lipschitz continuous dependence of solutions to Eq (2.1) on initial and boundary data, see Section 3. The estimates on the solution to Eq (2.1) are obtained from the corresponding discrete estimates passing to the limit. In particular, the L1 bound follows from Eq (3), the maximum principle from Eq (2), the total variation bound from Eq (4) and the Lipschitz continuity in time from Eq (4.17), since Δx=Δt/λ and taking λ=1/L.

    The scheme given by Eqs (4.2), (4.3) is only first-order accurate. We propose here a second-order accuracy scheme, constructed using MUSCL-type variable extrapolation and Runge-Kutta temporal differencing. To implement it, we approximate ρ(x,tn) by a piecewise linear functions in each cell, i.e. ˆρj(x,tn)=ρnj+σnj(xxj), where the slopes σnj are calculated via the generalized minmod limiter, i.e.

    σnj=1Δxminmod(ϑ(ρnjρnj1),12(ρnj+1ρnj1),ϑ(ρnj+1ρnj)),

    where ϑ[1,2] and

    minmod(a,b,c):={sgn(a)min{|a|,|b|,|c|}if sgn(c)=sgn(b)=sgn(a),0otherwise.

    This extrapolation enables one to define left and right values at the cell interfaces respectively by

    ρLj+1/2:=ˆρj(xj+Δx2,tn)=ρnj+σnjΔx2,ρRj1/2:=ˆρj(xjΔx2,tn)=ρnjσnjΔx2.

    and

    ˆVnj+1/2=1ˆWj+1/2bav(ˆρ(y,t))ω(yxj+1/2)dy=1ˆWj+1/2Mk=1xk+1/2xk1/2v(ˆρk(y,t))ω(yxj+1/2)dy=Δx2ˆWj+1/2Mk=111v(ˆρk(Δx2y+xk,tn))ω(Δx2y+(kj+1/2)Δx)dy=Δx2ˆWj+1/2Mk=1NGe=1pev(ˆρk(Δx2ye+xk,tn))ω(Δx2ye+(kj+1/2)Δx)=Δx2ˆWj+1/2Mk=1NGe=1pev(ρnk+Δx2yeσnk)ω(Δx2ye+(kj+1/2)Δx)

    where ˆWj+1/2=baω(yxj+1/2)dy is computed in exact form, and ye are the Gauss-Lobatto-Quadrature points. The MUSCL version of the numerical flux reads

    Fnj+1/2:=ρLj+1/2g(ρRj+1/2)ˆVnj+1/2.

    To achieve formal second-order accuracy also in time, we use second-order Runge-Kutta (RK) time stepping. More precisely, if we write our scheme with first-order Euler time differences and second-order spatial differences formally as

    ρn+1j=ρnjλLj(ρn):=ρnjλ(Fnj+1/2Fnj1/2), (5.1)

    then the RK version takes the two-step form

    ρ1j=ρnjλLj(ρn);ρn+1j=12(ρnj+ρ1j)λ2Lj(ρ1j). (5.2)

    In this section we solve Eq (2.1) by using the numerical scheme (4.2) on the x-interval I=[0,1] with suitable boundary conditions and t[0,T], with T specified later. In the numerical examples we consider the equation (2.1) with g(ρ)=1ρ and v(ρ)=(1ρ)4, where we recall that f(ρ)=ρg(ρ) and V(x,t)=(ωv(ρ))(x,t), where the kernel function ω(x) is specified later in each case. For numerical experiments the interval I is subdivided into M subintervals of length Δx=1/M, and the time step is computed taking account the CFL condition (4.4), and for each numerical experiment, we specify the inital and boundary conditions.

    In this example we compare numerical approximations obtained by scheme (4.2) with those generated by an adapted LxF-type scheme proposed by Goatin and Rossi in [17], starting from the initial and boundary conditions

    ρ0(x)=0.2for xI;ρa(t)=0.1,ρb(t)=0.5fort>0.

    Here we employ the symmetric kernel function

    ω(y)=ω1(y):=34η(1y2η2)χ[η,η](y) (6.1)

    with η=0.05. In Figure 1 we display the numerical approximations for M=800 at simulated times T=2 and T=8 and compare them with the reference solution which is computed with the LxF scheme with Mref=12800. We observe better accuracy for the proposed scheme. This property also becomes apparent in Table 1 where we show the corresponding approximate L1 errors for discretizations M=100×2l, l=0,1,,4 and respective experimental orders of convergence (E.O.C.). We observe that the approximate L1 errors decrease as the grid is refined and E.O.C. assumes values close to one, in agreement with the formal first order of acccuracy of the scheme.

    Figure 1.  Example 1: numerical approximations obtained with HW and LxF numerical flux with M=800 and symmetric kernel ω1(y) with η=0.05 at simulated times (a) T=2, (b) T=8.
    Table 1.  Example 1: approximate L1-error eM(u) and E.O.C. for the LxF and HW numerical fluxes with Δx=1/M and symmetric kernel (6.1) with η=0.05 at simulated times T=2 and T=8.
    T=2 T=8
    LxF HW LxF HW
    M eM(ρΔ) E.O.C. eM(ρΔ) E.O.C.
    100 1.71e-01 1.02e-01 6.34e-01 5.28e-01
    200 1.11e-01 0.63 5.42e-02 0.92 5.96e-01 0.89 5.80e-01 -0.14
    400 4.64e-02 1.25 2.74e-02 0.98 4.89e-01 0.28 3.69e-01 0.65
    800 2.02e-02 1.20 1.39e-02 0.98 2.86e-01 0.78 1.19e-01 1.63
    1600 9.58e-03 1.07 6.84e-03 1.03 1.11e-01 1.37 4.18e-02 1.51

     | Show Table
    DownLoad: CSV

    We now compare the dynamics in the solution of model (2.1) by using various kernel functions. We consider the symmetric kernel ω1 Eq (6.1) as in Example 1 along with a non-symmetric kernel

    ω2(y):=20η(5yη+12)exp(10yη1)χ[η10,η](y) (6.2)

    and the anisotropic discontinuous kernels

    ω3(y):=1ηχ[0,η](y),ω4(y):=3η3(ηy)2χ[0,η](y), (6.3)

    where in all cases we choose η=0.2. In Figure 2 we display the different kernel functions. The initial and boundary conditions are given by

    ρ0(x)=0.1forxI;ρa(t)=0.1,ρb(t)=1fort>0.
    Figure 2.  Example 2: kernel functions ω(x)=ωi(x), i=1,,4, given by Eqs (6.1), (6.2) and (6.3) with η=0.2.

    In Figure 3 we display numerical approximations with Δx=1/400 at times T=10 and T=100. We can evidence that the dynamics of the solution is different for each kernel functions; by using ω1 we observe that numerical solution goes faster to a stationary state solution than for other kernel functions, in which this stationary state is not observed for enough large simulation time. Regarding the kernel ω2 we can see the formation of some oscillations. Now, for the kernel ω3 we can see the formation of some layers on the numerical solution and that the period of these layers are proportional to η. Finally, for ω4 we can observe a numerical solution more smooth than in the previous solutions.

    Figure 3.  Example 2: dynamics of the model (2.1) for various kernel functions (ω1, ω2, ω3 or ω4). Numerical solutions with M=800 at simulated times T=10 and T=100.

    The aim of the present example is to investigate the behavior of numerical solutions considering the kernel functions ω1, ω2, and ω3 as well as for two different values of the parameter η, namely η=0.1 and η=0.025. The initial and boundary conditions are

    ρ0(x)=0.5forxI;ρa(t)=0,ρb(t)=1fort>0,

    which leaves zero flow conditions at boundary, i.e., f1/2=fM+1/2=0. Numerical approximations are computed at simulated times T=2, T=7 and T=15 with discretization M=400. In Figure 4, first we observe that numerical solutions for the nonlocal problem (2.1) get closer to the solution of the local problem as η takes a smaller value, but ω1 and ω2 make it slower due to the presence of the oscillations that the numerical solutions present when we use these functions.

    Figure 4.  Example 3: numerical solutions of (2.1) for M=400 at indicated simulated times with (left) η=0.1 and (right) η=0.025.

    We consider the problem (2.1), with a smooth initial datum

    ρ0(x)=0.9exp(70(x0.4)2)forx[0,1], (6.4)

    with boundary conditions ρa=ρb=0, and with the symmetric kernel function ω1 with η=0.2. In Figure 5 we display the numerical approximations obtained with the second order scheme (5.1), (5.2), computed with M=100 at T=0.1. The reference solution is computed with M=6400. As expected, the numerical solutions obtained with second order version of the HW scheme capture the reference solution better than the first order one. In Table 2 we compute the L1error and E.O.C. We recover the correct order of accuracy for the second order HW scheme. Instead, we obtain just first order accuracy for HW scheme (4.2). We also can observe for scheme (4.2) that the L1error for each level of refinement is bigger than the error of the second order version scheme.

    Figure 5.  Example 4: comparison of the numerical solutions at T=0.1 corresponding to initial condition (6.4), computed with 1/Δx=100 and kernel function ω1.
    Table 2.  Example 4: approximate L1 errors eM(ρ) and E.O.C for the first and second order version of the HW scheme with Δx=1/M, at T=0.1.
    T=0.1
    HW first-order version HW second-order version
    M eM(ρΔ) E.O.C. eM(ρΔ) E.O.C.
    100 8.71e-03 3.20e-04
    200 4.60e-03 9.19e-01 8.63e-05 1.89
    400 2.38e-03 9.54e-01 2.24e-05 1.95
    800 1.21e-03 9.77e-01 5.53e-06 2.02

     | Show Table
    DownLoad: CSV

    In this paper we extend to its nonlocal version a numerical scheme presented in [6,19] where we take advantages of the form in which the flow is written, ρv(ρ)V(x,t), where v(ρ) is a positive and non-increasing function, and V(x,t) is a positive function containing the nonlocal terms. We have proved maximum principle, L1-bound, and BV estimations, also, a discrete entropy inequality in order to prove the well-posedness of an 1-D and nonlocal IBVP. In future work, we aim to investigate how to extend this numerical scheme in applications such as crowd dynamics models where the function V(x,t) is a vector field containing the preference directions and nonlocal corrections terms.

    RB, HDC and LMV are supported by project MATH-Amsud 22-MATH-05 "NOTION - NOn-local conservaTION laws for engineering, biological and epidemiological applications: theoretical and numerical" (2022–2023). RB, HDC and LMV are supported by ANID (Chile) through Anillo project ANID/PIA/ACT210030; Centro de Modelamiento Matemático (BASAL projects ACE210010 and FB210005). RB, HDC and LMV are supported by the Inria Associated team "NOLOCO - efficient numerical schemes for non-local transport phenomena" (2018-2022). RB is supported by CRHIAM, project ANID/Fondap/ 15130015 and Fondecyt project 1210610. HDC is supported by the National Agency for Research and Development, ANID-Chile through Scholarship Program, Doctorado Becas Chile 2021, 21210826.

    The authors declare there is no conflict of interest.

    In this appendix we show the computations for some estimates used in the proofs of above sections. First, we prove estimates Eq (4.11) in the proof of Lemma 4.3. We denote yk:=(k1/2)Δx, for kZ and then we compute

    |Vnj+3/2Vnj+1/2|=|ΔxWj+3/2Mk=1ωkj1v(ρnk)ΔxWj+1/2Mk=1ωkjv(ρnk)|=|ΔxWj+3/2Mk=1(ωkj1ωkj)v(ρnk)+Δx(1Wj+3/21Wj+1/2)Mk=1ωkjv(ρnk)||ΔxWj+3/2Mk=1(ωkj1ωkj)v(ρnk)|+|Δx2Wj+3/2Wj+1/2(Mk=1ωkjv(ρnk))Mk=1(ωkjωkj1)|Δxv|Wj+3/2|Mk=1|ωkj1ωkj|+ΔxvWj+3/2Wj+1/2|Δx(Mk=1ωkj)Mk=1(ωkjωkj1)|ΔxKωv(Mk=1|ykjykj1ω(y)dy|+Mk=1|ωkjωkj1|)LΔx

    with L=2K1ωvωL1(R). Now following closely [17], we compute

    |Vnj+3/22Vnj+1/2+Vnj1/2|=|ΔxMk=1v(ρnk)(ωkj1Wj+3/2ωkjWj+1/2ωkjWj+1/2+ωkj+1Wj1/2)||Δx3Wj+3/2Wj+1/2((Mk=1v(ρnk)ξkj+1/2ξkj1/2ω(y)dy)Ml=1ωlj(Mk=1v(ρnk)ωkj)Ml=1ξlj+1/2ξlj1/2ω(y)dy)|+|2Δx4ωL1Wj+3/2Wj+1/2Wj1/2((Mk=1v(ρnk)ωkj)Ml=1ω(ξlj+1/2)(Mk=1v(ρnk)ω(ξkj+1/2))Ml=1ωlj)||Δx2vWj+3/2Wj+1/2(Mk=1ξkj+1/2ξkj1/2ω(y)dy)ΔxMl=1ωlj|+|Δx2vWj+3/2Wj+1/2(ΔxMk=1ωkj)Ml=1ξlj+1/2ξlj1/2ω(y)dy|+|2Δx2ωL1(I)vWj+3/2Wj+1/2Wj1/2(ΔxMk=1ωkj)ΔxMl=1ω(ξlj+1/2)|+|2Δx2ωL1(I)vWj+3/2Wj+1/2Wj1/2(ΔxMk=1ω(ξkj+1/2))ΔxMl=1ωlj|Δx2v(|1Wj+3/2Mk=1ξkj+1/2ξkj1/2ω(y)dy|+|1Wj+3/2Ml=1ξlj+1/2ξlj1/2ω(y)dy|+|2ωL1(I)Wj+3/2Wj1/2ΔxMl=1ω(ξlj+1/2)|+|2ωL1(I)Wj+3/2Wj1/2ΔxMk=1ω(ξkj+1/2)|)Δx2vKω(|Mk=1ξkj+1/2ξkj1/2ω(y)dy|+|Ml=1ξlj+1/2ξlj1/2ω(y)dy|)+2K2ωΔx2ω2L1(I)v+2K2ωΔx2ω2L1(I)vΔx2W,

    where we set W:=2K1ωvωL1(R)+4K2ωω2L1(I)v and ξkj+1/2]ykj1,ykj[. This concludes the proof of estimates Eq (4.11) in the proof of Lemma 4.3. Next, we establish estimates Eq (3.1) to Eq (3.4) in Section 3.1. To this end we calculate

    |xV(x,t)|=|W(x)(W(x))2bav(ρ(y,t))ω(yx)dy1W(x)bav(ρ(y,t))ω(yx)dy|2K1ωvωL1(I),|2xxV|=|(W(x))2W(x)+2(W(x))W(x)(W(x))4bav(ρ(y,t))ω(yx)dy+W(x)(W(x))2bav(ρ(y,t))ω(yx)dy+W(x)(W(x))2bav(ρ(y,t))ω(yx)dy+1W(x)bav(ρ(y,t))ω(yx)dy|K2ωvωL1(I)ωL1(I)+2K3ωvωL1(I)ωL1(I)+2K2ωvωL1(I)+K1ωvωL1(I),|V(x,t)U(x,t)|=|1W(x)ba(v(ρ(y,t))v(σ(y,t)))ω(yx)dy|=|1W(x)bav(ξ)(ρσ)(y,t)ω(yx)dy|ω(R)vKωba|ρ(y,t)σ(y,t)|dy,|xV(x,t)xU(x,t)|=|W(x)(W(x))2ba(v(ρ(y,t))v(σ(y,t)))ω(yx)dy1W(x)ba(v(ρ(y,t))v(σ(y,t)))ω(yx)dy|=|W(x)(W(x))2bav(ξ)(ρσ)(y,t)ω(yx)dy1W(x)bav(ξ)(ρσ)(y,t)ω(yx)dy|Mba|ρ(y,t)σ(y,t)|dy,

    with M as in Eq (3.4).



    [1] D. Amadori, W. Shen, An integro-differential conservation law arising in a model of granular flow, J. Hyperbolic Differ. Equ., 9 (2012), 105–131. https://doi.org/10.1142/S0219891612500038 doi: 10.1142/S0219891612500038
    [2] P. Amorim, R. Colombo, A. Teixeira, On the numerical integration of scalar nonlocal conservation laws, ESAIM M2AN, 49 (2015), 19–37. http://dx.doi.org/10.1051/m2an/2014023 doi: 10.1051/m2an/2014023
    [3] D. Armbruster, P. Degond, C. Ringhofer, A model for the dynamics of large queuing networks and supply chains, SIAM J. Appl. Math., 66 (2006), 896–920. https://doi.org/10.1137/040604625 doi: 10.1137/040604625
    [4] C. Bardos, A. Y. le Roux, J. C. Nédélec, First order quasilinear equations with boundary conditions, Commun. Partial. Differ. Equ., 4 (1979), 1017–1034. https://doi.org/10.1080/03605307908820117 doi: 10.1080/03605307908820117
    [5] F. Betancourt, R. Bürger, K. H. Karlsen, E. M. Tory, On nonlocal conservation laws modelling sedimentation, Nonlinearity, 24 (2011), 855–885. https://doi.org/10.1088/0951-7715/24/3/008 doi: 10.1088/0951-7715/24/3/008
    [6] R. Bürger, A. García, K. Karlsen, J. Towers, A family of numerical schemes for kinematic flows with discontinuous flux, J Eng Math, 60 (2008), 387–425. https://doi.org/10.1007/s10665-007-9148-4 doi: 10.1007/s10665-007-9148-4
    [7] C. Chalons, P. Goatin, L. M. Villada, High-order numerical schemes for one-dimensional nonlocal conservation laws, SIAM J. Sci. Comput., 40 (2018), A288–A305. https://doi.org/10.1137/16M110825X doi: 10.1137/16M110825X
    [8] R. M. Colombo, M. Garavello, M. Lécureux-Mercier, A class of nonlocal models for pedestrian traffic, Math Models Methods Appl Sci, 22 (2012), 1150023. https://doi.org/10.1142/S0218202511500230 doi: 10.1142/S0218202511500230
    [9] R. M. Colombo, M. Herty, M. Mercier, Control of the continuity equation with a non local flow, ESAIM Control Optim. Calc. Var., 17 (2011), 353–379. https://doi.org/10.1051/cocv/2010007 doi: 10.1051/cocv/2010007
    [10] R. M. Colombo, M. Lécureux-Mercier, Nonlocal crowd dynamics models for several populations, Acta Math. Sci. Ser. B Engl. Ed., 32 (2012), 177–196. https://doi.org/10.1016/S0252-9602(12)60011-3 doi: 10.1016/S0252-9602(12)60011-3
    [11] R. M. Colombo, E. Rossi, Rigorous estimates on balance laws in bounded domains, Acta Math. Sci. Ser. B Engl. Ed., 35 (2015), 906–944. https://doi.org/10.1016/S0252-9602(15)30028-X doi: 10.1016/S0252-9602(15)30028-X
    [12] R. M. Colombo, E. Rossi, Nonlocal conservation laws in bounded domains, Math Models Methods Appl Sci, 50 (2018), 4041–4065. https://doi.org/10.1137/18M1171783 doi: 10.1137/18M1171783
    [13] M. G. Crandall, A. Majda, Monotone difference approximations for scalar conservation laws, Math. Comp., 34 (1980), 1–21. https://doi.org/10.1090/S0025-5718-1980-0551288-3 doi: 10.1090/S0025-5718-1980-0551288-3
    [14] C. De Filippis, P. Goatin, The initial–boundary value problem for general non-local scalar conservation laws in one space dimension, Nonlinear Analysis, 161 (2017), 131–156. https://doi.org/10.1016/j.na.2017.05.017 doi: 10.1016/j.na.2017.05.017
    [15] F. A. Chiarello, P. Goatin, Global entropy weak solutions for general non-local traffic flow models with anisotropic kernel, ESAIM: M2AN, 52 (2018), 163–180. https://doi.org/10.1051/m2an/2017066 doi: 10.1051/m2an/2017066
    [16] J. Friedrich, O. Kolb, S. Göttlich, A Godunov type scheme for a class of LWR traffic flow models with non-local flux, Netw. Heterog. Media, 13 (2018), 531–547. https://doi.org/10.3934/nhm.2018024 doi: 10.3934/nhm.2018024
    [17] P. Goatin, E. Rossi, Well-posedness of IBVP for 1D scalar non-local conservation laws, Z. Angew. Math. Mech., 99 (2019), e201800318. https://doi.org/10.1002/zamm.201800318 doi: 10.1002/zamm.201800318
    [18] P. Goatin, S. Scialanga, Well-posedness and finite volume approximations of the LWR traffic flow model with non-local velocity, Netw. Heterog. Media, 11 (2016), 107–121. https://doi.org/10.3934/nhm.2016.11.107 doi: 10.3934/nhm.2016.11.107
    [19] M. Hilliges, W. Weidlich, A phenomenological model for dynamic traffic flow in networks, TRANSPORT RES B-METH, 29 (1995), 407–431. https://doi.org/10.1016/0191-2615(95)00018-9 doi: 10.1016/0191-2615(95)00018-9
    [20] E. Rossi, Definitions of solutions to the IBVP for multi-dimensional scalar balance laws, J. Hyperbolic Differ. Equ., 15 (2018), 349–374. https://doi.org/10.1142/S0219891618500133 doi: 10.1142/S0219891618500133
    [21] E. Rossi, Well-posedness of general 1d initial boundary value problems for scalar balance laws, Discrete Contin Dyn Syst Ser A, 39 (2019), 3577–3608. https://doi.org/10.3934/dcds.2019147 doi: 10.3934/dcds.2019147
  • This article has been cited by:

    1. Jan Friedrich, Sanjibanee Sudha, Samala Rathan, Numerical schemes for a class of nonlocal conservation laws: a general approach, 2023, 18, 1556-1801, 1335, 10.3934/nhm.2023058
    2. Aekta Aggarwal, Ganesh Vaidya, Convergence of the numerical approximations and well-posedness: Nonlocal conservation laws with rough flux, 2024, 0025-5718, 10.1090/mcom/3976
    3. Jan Friedrich, Simone Göttlich, Alexander Keimer, Lukas Pflug, 2024, Chapter 30, 978-3-031-55263-2, 347, 10.1007/978-3-031-55264-9_30
    4. Veerappa Gowda G. D., Sudarshan Kumar Kenettinkara, Nikhil Manoj, Convergence of a second-order scheme for non-local conservation laws, 2023, 57, 2822-7840, 3439, 10.1051/m2an/2023080
    5. Harold Deivi Contreras, Paola Goatin, Luis-Miguel Villada, A two-lane bidirectional nonlocal traffic model, 2025, 543, 0022247X, 129027, 10.1016/j.jmaa.2024.129027
  • Reader Comments
  • © 2023 the Author(s), licensee AIMS Press. This is an open access article distributed under the terms of the Creative Commons Attribution License (http://creativecommons.org/licenses/by/4.0)
通讯作者: 陈斌, bchen63@163.com
  • 1. 

    沈阳化工大学材料科学与工程学院 沈阳 110142

  1. 本站搜索
  2. 百度学术搜索
  3. 万方数据库搜索
  4. CNKI搜索

Metrics

Article views(2442) PDF downloads(137) Cited by(5)

/

DownLoad:  Full-Size Img  PowerPoint
Return
Return

Catalog