Input-output L2-well-posedness, regularity and Lyapunov stability of string equations on networks

  • Received: 01 August 2021 Revised: 01 January 2022 Published: 21 March 2022
  • Primary: 93C20, 93D05; Secondary: 35B35, 35L05

  • We consider the general networks of elastic strings with Neumann boundary feedbacks and collocated observations in this paper. By selecting an appropriate multiplier, we show that this system is input-output L2-well-posed. Moreover, we verify its regularity by calculating the input-output transfer function of system. In the end, by choosing an appropriate multiplier, we give a method to construct a Lyapunov functional and prove the exponential decay of tree-shaped networks with one fixed root under velocity feedbacks acted on all leaf vertices.

    Citation: Dongyi Liu, Genqi Xu. Input-output L2-well-posedness, regularity and Lyapunov stability of string equations on networks[J]. Networks and Heterogeneous Media, 2022, 17(4): 519-545. doi: 10.3934/nhm.2022007

    Related Papers:

    [1] Felisia Angela Chiarello, Harold Deivi Contreras, Luis Miguel Villada . Nonlocal reaction traffic flow model with on-off ramps. Networks and Heterogeneous Media, 2022, 17(2): 203-226. doi: 10.3934/nhm.2022003
    [2] Christian Budde, Marjeta Kramar Fijavž . Bi-Continuous semigroups for flows on infinite networks. Networks and Heterogeneous Media, 2021, 16(4): 553-567. doi: 10.3934/nhm.2021017
    [3] Sara Monsurrò, Carmen Perugia . Homogenization and exact controllability for problems with imperfect interface. Networks and Heterogeneous Media, 2019, 14(2): 411-444. doi: 10.3934/nhm.2019017
    [4] Kota Kumazaki, Adrian Muntean . Local weak solvability of a moving boundary problem describing swelling along a halfline. Networks and Heterogeneous Media, 2019, 14(3): 445-469. doi: 10.3934/nhm.2019018
    [5] Sergei A. Nazarov, Rafael Orive-Illera, María-Eugenia Pérez-Martínez . Asymptotic structure of the spectrum in a Dirichlet-strip with double periodic perforations. Networks and Heterogeneous Media, 2019, 14(4): 733-757. doi: 10.3934/nhm.2019029
    [6] Young-Pil Choi, Cristina Pignotti . Emergent behavior of Cucker-Smale model with normalized weights and distributed time delays. Networks and Heterogeneous Media, 2019, 14(4): 789-804. doi: 10.3934/nhm.2019032
    [7] Jacek Banasiak, Adam Błoch . Telegraph systems on networks and port-Hamiltonians. Ⅱ. Network realizability. Networks and Heterogeneous Media, 2022, 17(1): 73-99. doi: 10.3934/nhm.2021024
    [8] Yogiraj Mantri, Michael Herty, Sebastian Noelle . Well-balanced scheme for gas-flow in pipeline networks. Networks and Heterogeneous Media, 2019, 14(4): 659-676. doi: 10.3934/nhm.2019026
    [9] Xiaoqian Gong, Benedetto Piccoli . A measure model for the spread of viral infections with mutations. Networks and Heterogeneous Media, 2022, 17(3): 427-442. doi: 10.3934/nhm.2022015
    [10] Yves Achdou, Manh-Khang Dao, Olivier Ley, Nicoletta Tchou . A class of infinite horizon mean field games on networks. Networks and Heterogeneous Media, 2019, 14(3): 537-566. doi: 10.3934/nhm.2019021
  • We consider the general networks of elastic strings with Neumann boundary feedbacks and collocated observations in this paper. By selecting an appropriate multiplier, we show that this system is input-output L2-well-posed. Moreover, we verify its regularity by calculating the input-output transfer function of system. In the end, by choosing an appropriate multiplier, we give a method to construct a Lyapunov functional and prove the exponential decay of tree-shaped networks with one fixed root under velocity feedbacks acted on all leaf vertices.



    Generally, the motion of elastic strings on network can be formulated by means of a graph ([12,15,24,25]). In this paper, we always suppose that G=(V(G),E(G)) is a connected planar metric graph with the vertex set V(G)={p1,p2,,pm} and the edge set E(G)={e1,e2,,en}. Thus, every edge ej with the length j of G can be parameterized by a continuous function πj with respective to its arc length. If every edge of G is assigned to a direction that coincides with the arc length increasing, G becomes a digraph. Denote by IE(G)={1,2,,n}, IV(G)={1,2,,m} and IE(pj)=I+E(pj)IE(pj), where I+E(pj) and IE(pj)

    I+E(pj)={kIE(G)|pj is the starting point (tail) of the edge ek,ekE}

    and

    IE(pj)={kIE(G)|pj is the final point (head) of the edge ek,ekE}.

    Then, the number of elements in sets IE(pj), I+E(pj) and IE(pj) are the degree (deg(pj)), out-degree (deg+(pj)) and in-degree (deg(pj)) of the vertex pj, respectively. The boundary and the interior of G are defined respectively by

    G={pjV(G)|deg(pj)=1} and Int(G)={pjV(G)|deg(pj)>1}.

    Denote the set (nk=1ek)V(G) by G for convenience, we thus can use a function w(z,t), from G×[0,+) to R, to describe the dynamic behavior of a one-dimensional (1-d) wave equations on network G, where z stands for any point of the set G and t is the time. Especially, w(p,t) is the value of w(z,t) at the vertex pV(G), which describes the dynamic behavior of the vertex p with the time t. Let the restriction of w(z,t) to the j-th edge be parametrized by wj(x,t), that is, wj(x,t)=w(z,t)|zej=w(πj(x),t). Without loss of generality, we assume that every edge has the unit length. We fix a partition of the vertex set V(G)=DGN(Int(G)D), where GN=GD. Thus, the string equations on a continuous type network G can be formulated by (see also [8,13,15,16,22,24])

    {ρj(x)wj,tt(x,t)=(Tj(x)wj,x)x(x,t),x(0,1),jIE(G),pD,wi(1,t)=wk(0,t)=w(p,t)=0,iIE(p),kI+E(p),pGN, either Tk(1)wk,x(1,t)=u(p,t),kIE(p), or Tk(0)wk,x(0,t)=u(p,t),kI+E(p),pInt(G)D,wi(1,t)=w(p,t)=wk(0,t),iIE(p),kI+E(p), and iIE(p)Ti(1)wi,x(1,t)kI+E(p)Tk(0)wk,x(0,t)=u(p,t), (1)

    where ρj(x) and Tj(x) (j=1,,n) are positive and bounded continuous functions, which are the mass density and the tension of the j-th string, respectively, u(p,t) is the input signal at the vertex p. The input u(p,t) may be zero, then F={pV(G)|u(p,t)0} is called the free vertex set. That is, there no is input signal at the free vertex p. pD is called a fixed vertex of G, since w(p,t)=0. Thus, the network G is fixed on D, called the Dirichlet set. In this paper, we assume that D is not empty and V(G)D={pȷ1,pȷ2,,pȷm0}, where m0 is the number of vertices in the set V(G)D. The output of system (1) is

    yk(t)=wt(pȷk,t)for pȷkF,k=1,,m0, (2)

    where wt(pȷk,t) is the derivative of w(pȷk,t) with respective to time t.

    One of the objective of this paper is to investigate the input-output well-posedness and regularity of 1-d wave equations on networks (1). Let the state space X, the control space U and the observation space Y be Hilbert spaces, and L2loc([0,+),U) be the space of those functions on [0,+) whose restriction to [0,τ] is in L2([0,τ],U), for every τ>0. An infinite-dimensional linear system is input-output L2-well-posed, if, for every t0, there exists Mt>0, only depending on t, such that

    X(t)2+t0Y(s)2dsMt[X02+t0U(s)2ds],

    where X(t) is the state of system, X0 is its initial state, U()L2loc([0,+),U) is the input of system and Y()L2loc([0,+),Y) is the output of system. Denote by H(s) the input-output transfer function of the well-posed system. Thus, a well-posed system is called regular if lims+H(s)u=Du,uU, where D is a bounded operator from U to Y. Refer to [7,20,21,23,26] and references therein for more details on the theory of input-output well-posedness and regularity. Since 1980s, it has been demonstrated that this class of systems is quite general, including many control systems described by partial differential equations with inputs and outputs on internal sub-domains, or on the (partial) boundary of the spatial region (see [4,5,6,10,11,14,18,30] and references therein). But the well-posedness and regularity of 1-d networks has received little attention in the literature. In [1], the well-posedness of a tree-shaped network of strings with feedback acting on the root of the tree was shown, based on the d'Alembert formula. One of main contributions of this paper is to prove the L2-well-posedness and regularity of the general network system of strings (1) with outputs (2), by constructing suitable multipliers with graph theory and the asymptotical theory of fundamental solution. Here we state this result as Theorem 1.1 and its proof is deferred to Section 3.

    Theorem 1.1. Assume that D is not empty, 0<ρLρk(x)ρU, 0<TLTk(x)TU, and ρk(),Tk()C1[0,1], kIE(G), and that the input u(p,)L2loc([0,+),R)for every vertex pV(G)(DF), andthe outputs are defined by (2). Then the system (1) is input-output L2-well-posed and regular.

    It is well-known that only tree-shaped networks with one fixed vertex can be exponential decay under appropriate velocity feedbacks; and when there exist more than two fixed vertices or closed cycles in networks of strings, under velocity feedbacks, the networks is at most polynomial decay or is not stable [13]. Based on the observability estimate, the polynomial decay of a planar tree-shaped network of strings under only one vertex being damped (one-node stabilization) were discussed in [1,2,8,24]. Riesz basis approach is used in [15,28,29] to prove that the spectrum-determined-growth (SDG) condition holds for the networks, so the stability of closed-loop systems can be determined by their spectral bound. The decay rate of the chain-shaped and star-shaped networks was estimated by choosing a suitable weighted energy functional in [27]. By means of the frequency domain method, the exponential stability of a tree-shaped network was confirmed in [16]. However, Lyapunov stability is more common and intuitive in engineering. So, in this paper, we use the Lyapunov method to study the stability on networks, e.g., the tree-shaped networks shown as Figure 1b and Figure 2. Thus, the second contribution of this paper is to provide a construction method of Lyapunov functional for general tree-shaped networks of strings with one fixed vertex.

    Figure 1. 

    Networks consisting of strings with one fixed vertex

    .
    Figure 2. 

    The tree-shaped network consisting of six strings with the fixed root p4

    .

    For a connected tree G=(V(G),E(G)), a vertex is selected as its root, then, G is said to be a rooted tree. A boundary vertex of the rooted tree is called a leaf vertex, or a leaf for short, if it is not the root. That is, GN is consisted of all leaves of the rooted tree G. An edge incident with a leaf is called a leaf edge. For convenience, we give a hypothesis as follows (see [15,16]).

    Hypotheses 1.2.

    (1) The rooted tree-shaped networks G with the fixed root pr hasno input signal at the internal vertex pk (kr), i.e., D={pr} andu(pk,t)=0, for pkInt(G)D.

    (2) deg(pr)=deg+(pr)=1, I+E(pr)={r}.

    (3) deg(pk)=1 for all kIV(G) with kr.

    Under Hypothesis 1.2, the motion of the tree-shaped network G is described by

    {ρj(x)wj,tt(x,t)=(Tj(x)wj,x)x(x,t),x(0,1),jIE(G),wr(0,t)=w(pr,t)=0,pInt(G){pr},IE(p)={k},wk(1,t)=w(p,t)=wi(0,t)for iI+E(p), and Tk(1)wk,x(1,t)=iI+E(p)Ti(0)wi,x(0,t),pGN,IE(p)={k},Tk(1)wk,x(1,t)=u(p,t). (3)

    Thus, we have the following result.

    Theorem 1.3. Assume that Hypothesis 1.2 holds and that0<ρLρk(x)ρU, 0<TLTk(x)TU on [0,1] and ρk(),Tk()C1[0,1], for every kIE(G), then the tree-shaped network (3) is exponentially stable under the output feedback

    u(pȷk,t)=βkyk(t)=βkwt(pȷk,t),pȷkGN, (4)

    where βk>0.

    Theorem 1.3 will be proven by constructing a suitable Lyapunov functional in Section 4.

    Remark 1. Under Hypothesis 1.2 (3), a tree G with the root pr is also called a branching with the root pr [3]. In fact, the root may be an internal vertex (i.e., (2) in Hypothesis 1.2 dose not hold). Hypothesis 1.2 only is for the sake of the proof of Theorem 1.3 and the construction of Lyapunov functional. If Hypothesis 1.2 (3) is not true, we can take a change of variable x:=1x, such that it is satisfied. Thus, we can also construct a Lyapunov functional such that the result of Theorem 1.3 also holds for all trees with one fixed root and all leaves controlled by velocity feedbacks, like (4). See the example in Subsection 4.2.2 below.

    All in all, main contributions of this paper are:

    (1): to prove the input-output L2-well-posedness and regularity of the general network system of strings, by constructing suitable multipliers and the asymptotical theory of fundamental solution, respectively;

    (2): to provide a construction method of Lyapunov functional for general tree-shaped networks of strings with one fixed root.

    The choice of multipliers for the L2-well-posedness and the Lyapunov functional, based on graph notions and theories, is the novelty of this paper, which is also the main difficulty of this paper. The paper is organized as follows. The matrix-vector form of network (1) is provided in light of graph theory in Section 2. Theorem 1.1 and Theorem 1.3 are proven in Section 3 and Section 4, respectively. Finally, the conclusions follow in Section 5.

    To study the 1-d wave propagation on general networks, we need some fundamental notations, concepts of the graph theory and a proposition. See [3] and [9] for more details about the graph theory.

    Definition 2.1. The matrices Υ+=(υ+i,j)m×n and Υ=(υi,j)m×n, given by

    υ+i,j={1, if πj(0)=pi,0, otherwise  and υi,j={1, if πj(1)=pi,0, otherwise,

    are called the outgoing incidence matrix and the incoming incidence matrix, respectively. The incidence matrix is defined by Υ=Υ+Υ.

    From the above definition, it follows that

    Υ+=(ϵȷ+1,,ϵȷ+k,,ϵȷ+n)m×n and Υ=(ϵȷ1,,ϵȷk,,ϵȷn)m×n (5)

    where ȷ+k,ȷkIV(G), kIE(G), ϵȷ+k and ϵȷk are the ȷ+k-th and the ȷk-th column vector of Im, the identity matrix of order m, respectively. ϵȷ+k shows that the ȷ+k-th vertex pȷ+k is the starting point (tail) of the edge ek, and ϵȷk shows that the ȷk-th vertex pȷk is the final point (head) of the edge ek. We denote an m0×m matrix by

    PD=(ϵȷ1,ϵȷ2,,ϵȷm0),pȷkV(G)D, (6)

    where the vector ϵȷk is the ȷk-th column of the identity matrix Im. Then PD is an orthogonal projection from Rm to Rm0. Thus, PDW retains the ȷ1-th row, the ȷ2-th row, , the ȷm0-th row of an m-row matrix W, and removes the other rows of W. Moreover,

    PDPD=Im0Rm0×m0 and PDPD=IDRm×m, (7)

    where Im0 is the identity matrix of order m0, ID is a diagonal matrix whose entries from the ȷ1-th to the ȷm0-th are one, others are zero.

    Let

    w(x,t)=(w1(x,t)wn(x,t)) and w(p,t)=(w(p1,t)w(pm,t)),

    and call them the vectorization of w(z,t), where p=(p1,p2,,pm). Thus, the system (1) can be rewritten as

    {M(x)wtt(x,t)=(T(x)wx)x(x,t),x(0,1),t>0,w(0,t)=(Υ+)w(p,t),w(1,t)=(Υ)w(p,t),PD[ΥT(1)wx(1,t)Υ+T(0)wx(0,t)]=u(t), (8)

    where M(x)=diag(ρ1(x),,ρn(x)), T(x)=diag(T1(x),,Tn(x)),

    u(t)=(u(pȷ1,t)u(pȷm0,t)) withu(pȷk,t)=0as pȷkF andu()L2loc([0,+);Rm0).

    The output of system (2) can be read as

    Y(t)=(y1(t)ym0(t))=PDwt(p,t)=(wt(pȷ1,t)wt(pȷm0,t)), (9)

    where yk(t) or wt(pȷk,t) is 0 when pȷkF, which means that the system (1) has no output signal at free vertex pȷk.

    Remark 2. Similar to the matrix PD, we introduce matrices

    Pu=(ϵȷk1,ϵȷk2,,ϵȷkmu),for pȷkiV(G)(DF) (10)

    and

    Pu=(ϵȷˆk1,ϵȷˆk2,,ϵȷˆkm0mu),for pȷˆkiF,

    where the vector ϵȷki and ϵȷˆki are the ȷki-th and ȷˆki-th column of the identity matrix Im, respectively. Thus, the last boundary condition in (8) can be rewritten as

    (PuPu)[ΥT(1)wx(1,t)Υ+T(0)wx(0,t)]=(0PuPDu(t)),

    where PuPDu(t) is the true (nonzero) input signal. According to (2), (7) and (9), the true (nonzero) output signal can be written as

    Yu(t)=PuPDY(t)=(yk1(t)ykmu(t))=Puwt(p,t)=(wt(pȷk1,t)wt(pȷkmu,t)).

    The energy function of system (1) is defined as follows:

    E(t)=1210[M(x)wt(x,t),wt(x,t)+T(x)wx(x,t),wx(x,t)]dx, (11)

    where , represents the Euclidean inner product in Rn. Thus it can be derived from integration by parts and (8) that

    dE(t)dt=(Υ)T(1)wx(1,t)(Υ+)T(0)wx(0,t),wt(p,t)=u(t),PDwt(p,t)Rm0=u(t),Y(t)Rm0, (12)

    which means that the output of system (1), i.e., Y(t)=PDwt(p,t), is collocated.

    In the end of this section, we introduce the following definition of edge adjacency matrix and its proposition which discloses relationship between this definition and Definition 2.1.

    Definition 2.2. An edge in G is said to be a loop, if its tail and head are the same. Let G=(V(G),E(G)) be a loopless digraph. The n×n matrix B+G=(b+i,j)n×n, defined by

    b+i,j={1,iftwodifferentedgeseiandejjoinatacommontail,0,otherwise,

    is called the outgoing edge adjacency matrix of G. The n×n matrix BG=(bi,j)n×n, defined by

    bi,j={1,iftwodifferentedgeseiandejjoinatacommonhead,0,otherwise,

    is called the incoming edge adjacency matrix of G. The n×n matrix Bt,hG=(bt,hi,j)n×n, defined by

    bt,hi,j={1, ifpisthetailofeiandtheheadofej,forsomevertexpV(G),0,otherwise,

    is called the outgoing-incoming edge adjacency matrix G. The n×n matrix Bh,tG=(bh,ti,j)n×n, where

    bh,ti,j={1,ifpistheheadofei,andthetailofej,forsomevertexpV(G),0,otherwise,

    is called the incoming-outgoing edge adjacency matrix of G. Thus, the matrix BG=B+G+BG+Bt,hG+Bh,tG, is called the edge adjacency matrix of G.

    Note that, in Definition 2.2, the diagonal entries of these matrices, BG, B+G, BG, Bt,hG and Bh,tG, are all zeros, B+G and BG are symmetrical and Bt,hG=(Bh,tG). In addition, the following proposition can be derived from Definition 2.1 and 2.2.

    Proposition 1. Assume that G is a loopless digraph, Υ+ and Υare its outgoing incidence matrix and incoming incidence matrix, respectively. Let

    Λ=diag(λ1,,λm),Λ=diag(λȷ1,λȷ2,,λȷn)

    and Λ=diag(λȷ+1,λȷ+2,,λȷ+n), where ȷ+k and ȷkdefined by (5). Then

    (1): (Υ)Λ(Υ)=diag(kIE(p1)λk,,kIE(pi)λk,,kIE(pm)λk);

    (2): (Υ+)Λ(Υ+)=diag(kI+E(p1)λk,,kI+E(pi)λk,,kI+E(pm)λk);

    (3): (Υ)ΛΥ+=[Λ]Bh,tG and (Υ+)ΛΥ=[Λ]Bt,hG=Bt,hG[Λ];

    (4): (Υ)ΛΥ=[Λ](I+BG) and (Υ+)ΛΥ+=[Λ](I+B+G);

    where we agree that sλk=0. Especially,

    (Υ)Υ+=Bh,tG,(Υ+)Υ=Bt,hG,(Υ)Υ=I+BGand(Υ+)Υ+=I+B+G.

    Remark 3. Assume that m=n+1, and ˜Λ=diag(˜λ0,˜λ1,,˜λn). Denote by λk=˜λk1, for k=1,,n+1, then ˜Λ=diag(λ1,λ2,,λn+1),

    ˜Λ=diag(λȷ1,λȷ2,,λȷn)=diag(˜λȷ11,˜λȷ21,,˜λȷn1)

    and

    ˜Λ=diag(λȷ+1,λȷ+2,,λȷ+n)=diag(˜λȷ+11,˜λȷ+21,,˜λȷ+n1).

    The proof is divided into two parts: the input-output L2-well-posedness and the regularity. We first prove the input-output L2-well-posedness.

    Proof. We choose bounded continuous and differentiable functions on [0,1]: ξk(x), kIE(G), such that

    ξk(1)/Tk(1)>2n,ξk(0)/Tk(0)>2n,kIE(G), (13a)

    and

    {maxx[0,1]{M1/2(x)Ξ(x)T1/2(x)2}cE,maxx[0,1]{[Ξ(x)T1(x)]T(x)2}cE,maxx[0,1]{[Ξ(x)M(x)]M1(x)2}cE, (13b)

    where Ξ(x)=diag(ξ1(x),,ξn(x)) and cE>0.

    The first equation in (8) multiplied by Ξ(x)wx(x,t) on both sides, then integrated on [0,1] with respect to x and on [0,t] with respect to t leads to

    t010Ξ(x)wx(x,t),M(x)wtt(x,t)dxdt=t010Ξ(x)wx(x,t),(T(x)wx)x(x,t)dxdt. (14)

    Applying integration by parts, (9), the following equality

    t010Ξ(x)wxt(x,t),M(x)wt(x,t)dxdt=12t0wt(1,t),Ξ(1)M(1)wt(1,t)dt12t0wt(0,t),Ξ(0)M(0)wt(0,t)dt12t010wt(x,t),(Ξ(x)M(x))wt(x,t)dxdt,

    and boundary conditions in (8): w(0,t)=(Υ+)w(p,t), w(1,t)=(Υ)w(p,t), to the left-hand side of (14) yields

    LHS=10[Ξ(x)wx(x,t),M(x)wt(x,t)Ξ(x)wx(x,0),M(x)wt(x,0)]dxt010Ξ(x)wxt(x,t),M(x)wt(x,t)dxdt=10Ξ(x)wx(x,t),M(x)wt(x,t)dx10Ξ(x)wx(x,0),M(x)wt(x,0)dx12t0Y(t),PD[ΥΞ(1)M(1)(Υ)Υ+Ξ(0)M(0)(Υ+)]PDY(t)dt+12t010wt(x,t),(Ξ(x)M(x))wt(x,t)dxdt.

    Similarly, applying integration by parts to the right-hand side of (14) yields

    RHS=12t0Ξ(1)wx(1,t),T(1)wx(1,t)dt12t0Ξ(0)wx(0,t),T(0)wx(0,t)dt12t010[Ξ(x)T1(x)]T(x)wx(x,t),T(x)wx(x,t)dxdt.

    Thus, it can be derived from (14) that

    10Ξ(x)wx(x,t),M(x)wt(x,t)dx10Ξ(x)wx(x,0),M(x)wt(x,0)dx+12t010wt(x,t),[Ξ(x)M(x)]wt(x,t)dxdt+12t010[Ξ(x)T1(x)]T(x)wx(x,t),T(x)wx(x,t)dxdt=12t0Ξ(1)wx(1,t),T(1)wx(1,t)dt12t0Ξ(0)wx(0,t),T(0)wx(0,t)dt+12t0Y(t),PD[ΥΞ(1)M(1)(Υ)Υ+Ξ(0)M(0)(Υ+)]PDY(t)dt. (15)

    From the boundary condition PD[ΥT(1)wx(1,t)Υ+T(0)wx(0,t)]=u(t) in (8), it is obtained that

    u(t)2=u(t),u(t)Rm02(PDΥ)PDΥT(1)wx(1,t),T(1)wx(1,t)+2[PDΥ+]PDΥ+T(0)wx(0,t),T(0)wx(0,t).

    It can be deduced from Definition 2.2 that

    0min1in{nj=1bi,j}max1in{nj=1bi,j}n1

    and

    0min1in{nj=1b+i,j}max1in{nj=1b+i,j}n1,

    thus, it follows from (7), the equalities (4) in Proposition 1 and (13a) that

    Ξ(1)T(1)12(Υ)PDPDΥ=Ξ(1)T(1)12[ID](I+BG)>0

    and

    Ξ(0)T(0)12(Υ+)PDPDΥ+=Ξ(0)T(0)12[ID](I+B+G)>0,

    i.e., Ξ(1)T(1)12(PDΥ)PDΥ and Ξ(0)T(0)12(PDΥ+)PDΥ+ are symmetric positive definite matrices. Therefore,

    Ξ(1)wx(1,t),T(1)wx(1,t)Ξ(0)wx(0,t),T(0)wx(0,t)u(t)2Ξ(1)wx(1,t),T(1)wx(1,t)Ξ(0)wx(0,t),T(0)wx(0,t)2(PDΥ)PDΥT(1)wx(1,t),T(1)wx(1,t)2[PDΥ+]PDΥ+T(0)wx(0,t),T(0)wx(0,t)0. (16)

    Obviously, the equalities (1) and (2) in Proposition 1 and (13a) imply that

    PD[(Υ)Ξ(1)M(1)(Υ)(Υ+)Ξ(0)M(0)(Υ+)]PD=diag(cpȷ1,,cpȷm0)

    with

    cpȷk=[iIE(pȷk)ξi(1)ρi(1)iI+E(pȷk)ξi(0)ρi(0)]>0.

    So, it yields that

    Y(t),PD[ΥΞ(1)M(1)(Υ)Υ+Ξ(0)M(0)(Υ+)]PDY(t)cpY(t)2, (17)

    where cp=mink=1,,m0{cpȷk}. From the inequalities in (13b), it can be derived that

    |10Ξ(x)wx(x,t),M(x)wt(x,t)dx|cEE(t) (18)

    and

    1210wt(x,t),(Ξ(x)M(x))wt(x,t)dx+1210[Ξ(x)T1(x)]T(x)wx(x,t),T(x)wx(x,t)dxcEE(t). (19)

    Thus, it follows from (15), (16), (17), (18) and (19) that

    c0[E(t)+E(0)+t0E(t)dt]t0u(t)2dt+t0Y(t)2dt (20)

    with c10=12cEmin{1,cp}. From (12) and (20), it can be deduced that

    E(t)E(0)+c0γ[E(t)+E(0)+t0E(t)dt]+(14γγ)t0u(t)2dt

    with 0<γ<min{1/2,1/c0}. So, for tτ,

    E(t)1+c0γ1c0γE(0)+14γ24γ(1c0γ)τ0u(s)2ds+c0γ1c0γt0E(s)ds. (21)

    Applying the Gronwall inequality to (21) leads to

    E(t)[1+c0γ1c0γE(0)+14γ24γ(1c0γ)τ0u(s)2ds]ec0γ1c0γt

    and

    t0E(s)ds[1+c0γ1c0γE(0)+14γ24γ(1c0γ)τ0u(s)2ds]1c0γc0γ(ec0γ1c0γt1).

    From (20) and the above two inequalities, it follows that

    t0|Y(t)|2dtc0[E(t)+E(0)+t0E(s)ds][c01+c0γ1c0γec0γ1c0γt+c0+1+c0γγ(ec0γ1c0γt1)]E(0)+[c0(14γ2)4γ(1c0γ)ec0γ1c0γt+14γ24γ2(ec0γ1c0γt1)]τ0u(s)2ds.

    Hence

    E(t)+t0|Y(s)|2ds[(1+γ)(1+c0γ)γ(1c0γ)ec0γ1c0γt1γ]E(0)+[(1+γ)(14γ2)4γ2(1c0γ)ec0γ1c0γt14γ24γ2]τ0u(s)2ds,

    which shows that τ0, there exists Mτ>0 such that

    E(τ)+τ0|Yu(s)|2ds=E(τ)+τ0|Y(s)|2dsMτ[E(0)+τ0u(s)2ds]=Mτ[E(0)+τ0PuPDu(s)2ds].

    Therefore, the system (1) is input-output L2-well-posedness.

    Proof. Applying Laplace transform to the first equation in (1) leads to

    s2ρj(x)ˆwj,ss(x,s)=(Tj(x)ˆwj,x)x(x,s),x(0,1),jIE(G). (22)

    We introduce a new independent variable for (22)

    θ(x)=˜a1jx0ρj(x)T1j(x)dxfor x[0,1], with ˜aj=10ρj(x)T1j(x)dx.

    Obviously, θ(x) is strictly monotone function on [0,1]. Denote by x(θ) the inverse function of θ(x), θ[0,1], then

    dθ(x)dx=˜a1jρj(x)Tj(x)>0 and dx(θ)dθ=˜ajTj(x(θ))ρj(x(θ))>0.

    So, the following equalities can be easily calculated

    ˆwj,x(x(θ),s)=ˆwj,θ(x(θ),s)dθ(x)dx=˜a1jˆwj,θ(x(θ),s)ρj(x(θ))Tj(x(θ))

    and

    x[Tj(x(θ))ˆwj,x(x(θ),s)]=ˆwj,θ(x(θ),s)[(ρj(x(θ))Tj(x(θ)))3/2dTj(x)dx+Tj(x(θ))ρj(x(θ))dρj(x)dx]2˜a3j+˜a2jρj(x(θ))ˆwj,θ2(x(θ),s).

    Let ˜wj(θ,s)=ˆwj(x(θ),s) and

    αj(θ)=[ρj(x(θ))Tj(x(θ))2˜a2j[Tj(x(θ))]2+ρj(x(θ))2˜a2jρj(x(θ))],jIE(G),

    where the prime denotes the derivative with respect to θ, then (22) can be reformulated by

    ˜a2js2˜wj(θ,s)=˜wj,θθ(θ,s)+αj(θ)˜wj,θ(θ,s),θ(0,1).

    So, Laplace transform of the system (1) can be written as follows:

    {˜A2s2˜w(θ,s)=˜wθθ(θ,s))+α(θ)˜wθ(θ,s),θ(0,1),˜w(0,s)=ˆw(0,s)=(Υ+)ˆw(p,s),˜w(1,s)=ˆw(1,s)=(Υ)ˆw(p,s),PD[Υ˜T(1)˜wθ(1,s)Υ+˜T(0)˜wθ(0,s)]=ˆu(s), (23)

    where ˜T(0)=˜A1[M(0)T(0)]1/2, ˜T(1)=˜A1[M(1)T(1)]1/2,

    ˜A=diag(˜a1,,˜an) and α(θ)=diag(α1(θ),,αn(θ)).

    Let ˜η(θ)=(˜w(θ,s),s1˜w(θ,s)), then (23) shows that ˜η(θ) satisfies

    d˜ηdθ=s(0I˜A20)˜η+(00s1α0)˜η. (24)

    According to the asymptotical theory of fundamental solution ([17,19]), the fundamental solution matrix of (24) has the form:

    ˜W(θ,s)=(I+s1Q(θ,s))˜W0(θ,s),

    where Q(θ,s)=(Q11(θ,s)Q12(θ,s)Q21(θ,s)Q22(θ,s)), Q(θ,s) is uniformly bounded and

    ˜W0(θ,s)=(cosh(sθ˜A)˜A1sinh(sθ˜A)˜Asinh(sθ˜A)cosh(sθ˜A)).

    Thus,

    ˜η(θ)=˜W(θ,s)˜η(0)=(I+s1Q(θ,s))˜W0(θ,s)˜η(0)=(cosh(sθ˜A)+s1WQ11(sθ˜A)˜A1sinh(sθ˜A)+s1WQ12(sθ˜A)˜Asinh(sθ˜A)+s1WQ21(sθ˜A)cosh(sθ˜A)+s1WQ22(sθ˜A))˜η(0), (25)

    where ˜η(0)=(˜η0,1,˜η0,2) and

    WQ(θ,s)=Q(θ,s)˜W0(θ,s)=(WQ11(sθ˜A)WQ12(sθ˜A)WQ21(sθ˜A)WQ22(sθ˜A))=(Q11cosh(sθ˜A)+Q12˜Asinh(sθ˜A)Q11˜A1sinh(sθ˜A)+Q12cosh(sθ˜A)Q21cosh(sθ˜A)+Q22˜Asinh(sθ˜A)Q21˜A1sinh(sθ˜A)+Q22cosh(sθ˜A)).

    Let d(s)=PDˆw(p,s), then ˆw(p,s)=PDd(s), ˜η(0)=((PDΥ+)00I)(d(s)˜η0,2) and

    ˜η(1)=(˜w(1,s)s1˜w(1,s))=((Υ)ˆw(p,s)s1˜w(1,s))=((Υ)PDd(s)s1˜w(1,s)).

    Thus, it follows from (25) and the last boundary condition in (23) that d(s) and ˜η0,2 satisfy the linear system of equations:

    ˜D(s)(d(s)˜η0,2)=(s1ˆu(s)0), (26)

    where

    ˜D(s)=(PD(Υ)˜T(1)˜Asinh(s˜A)(PDΥ+)PD(Υ)˜T(1)cosh(s˜A)PD(Υ+)˜T(0)cosh(s˜A)(PDΥ+)(PDΥ)˜A1sinh(s˜A))+s1(PD(Υ)˜T(1)WQ21(s˜A)(PDΥ+)PD(Υ)˜T(1)WQ22(s˜A)WQ11(s˜A)(PDΥ+)WQ12(s˜A)).

    Moreover, it can be deduced that

    ˜D(s)(I0˜A(PDΥ+)I)=˜De(s)+˜DC(I0012exp(s˜A))

    with

    ˜DC=[(PDΥ+˜T(0)˜A(PDΥ+)PDΥ˜T(1)(PDΥ)˜A1)+s1(0Q21˜A1+Q220Q11˜A1+Q12)]

    and

    ˜De(s)=(PDΥ˜T(1)˜Aexp(s˜A)(PDΥ+)PDΥ˜T(1)exp(s˜A)2PDΥ+˜T(0)exp(s˜A)(PDΥ+)˜A1exp(s˜A)2)+s1(PDΥ˜T(1)(Q11Q12˜A)exp(s˜A)(PDΥ+)12(Q21˜A1+Q22)exp(s˜A)(Q11Q12˜A)exp(s˜A)(PDΥ+)12(Q11˜A1+Q12)exp(s˜A)).

    Thus, the linear system of equations (26) can be reformulated by

    [˜DC+˜De(s)(I0012exp(s˜A))](d(s)˜ηd(s))=(s1ˆu(s)0), (27)

    where ˜ηd(s)=12exp(s˜A)[˜η0,2+(PDΥ+)d(s)]. Since

    (IPDΥT(1)˜A0I)˜DC=(˜DΛ0(PDΥ)˜A1)+s1(0Q21˜A1+Q22PDΥT(1)˜A(Q11˜A1+Q12)0Q11˜A1+Q12)

    with

    ˜DΛ=PDΥ+˜T(0)˜A(Υ+)PD+PDΥ˜T(1)˜A(Υ)PD=diag(iI+E(pȷ1)ρi(0)Ti(0),,iI+E(pȷm0)ρi(0)Ti(0))+diag(iIE(pȷ1)ρi(1)Ti(1),,iIE(pȷm0)ρi(1)Ti(1)), (28)

    ˜DC is invertible for (s)>0 large enough, and

    ˜D1C=[(˜DΛ0(PDΥ)˜A1)1+o(D)](IPDΥT(1)˜A0I)=(˜D1Λ˜D1Λ(PDΥ)T(1)˜A˜A(PDΥ)˜D1Λ˜A[I(PDΥ)˜D1Λ(PDΥ)T(1)˜A])+o(D), (29)

    where o(D) stands for a matrix which tends to zero matrix with appropriate rows and columns as s+. Thus, it follows from

    ˜De(s)(I0012exp(s˜A))0 as s+,

    (27) and (29) that

    (d(s)˜ηd)=[˜D1C+o(D)](s1ˆu(s)0)andd(s)=s1[˜D1Λ+o(D)]ˆu(s),

    which implies that ˆY(s)=sPDˆw(p,s)=sd(s)=[˜D1Λ+o(D)]ˆu(s). So, it can be deduced from Remark 2, Proposition 1 and (28) that

    lims+H(s)=PuPD˜D1ΛPDPu=diag(iI+E(pȷk1)ρi(0)Ti(0)+iIE(pȷk1)ρi(1)Ti(1),,iI+E(pȷkmu)ρi(0)Ti(0)+iIE(pȷkmu)ρi(1)Ti(1))1, (30)

    i.e., the system (1) is regular.

    Here, we give two networks: one is a network with cycles, another is a tree-shaped network with the fixed root p1, shown in Figure 1.

    See Figure 1a, the motion of strings on the network G is governed by

    {ρj(x)wj,tt(x,t)=(Tj(x)wj,x)x(x,t),x(0,1),j=1,2,3,4,5,6,7,w1(0,t)=w4(1,t)=w5(1,t),w3(1,t)=w2(0,t)=w1(1,t),w3(0,t)=w4(0,t)=w6(1,t),w5(0,t)=w6(0,t)=w7(1,t),w7(0,t)=0,T1(1)w1,x(1,t)+T3(1)w3,x(1,t)T2(0)w2,x(0,t)=0,T6(1)w6,x(1,t)[T4(0)w4,x(0,t)+T3(0)w3,x(0,t)]=0,T7(1)w7,x(1,t)[T5(0)w5,x(0,t)+T6(0)w6,x(0,t)]=0,T4(1)w4,x(1,t)+T5(1)w5,x(1,t)T1(0)w1,x(0,t)=u(p1,t),T2(1)w2,x(1,t)=u(p3,t), (31)

    where D={p6}. The expressions PD and Pu ((6) and (10)) lead to

    PD=ȷ1ȷ2ȷ3ȷ4ȷ5(ϵ1ϵ2ϵ3ϵ4ϵ5) and Pu=ȷk1ȷk2(ϵ1ϵ3),

    where the vector ϵk is the k-th column of the identity matrix I6. So, it follows from ȷk1=1, ȷk2=3, the definitions of I+E(pj) and IE(pj), and (30) that

    lims+H(s)=diag([ρ1(0)T1(0)+k{4,5}ρk(1)Tk(1)]1,[ρ2(1)T2(1)]1),

    i.e., the system (31) is regular.

    See Figure 1b, the motion of strings on the tree-shaped network G is governed by

    {ρj(x)wj,tt(x,t)=(Tj(x)wj,x)x(x,t),x(0,1),j=1,,9,w1(0,t)=0,w1(1,t)=w2(0,t)=w3(0,t),w6(1,t)=w7(0,t),w2(1,t)=w4(0,t)=w5(0,t)=w6(0,t),w5(1,t)=w8(0,t)=w9(0,t),T1(1)w1,x(1,t)=T2(0)w2,x(0,t)+T3(0)w3,x(0,t),T2(1)w2,x(1,t)=T4(0)w4,x(0,t)+T5(0)w5,x(0,t)+T6(0)w6,x(0,t),T5(1)w5,x(1,t)=T8(0)w8,x(0,t)+T9(0)w9,x(0,t),T6(1)w6,x(1,t)=T7(0)w7,x(0,t),T3(1)w3,x(1,t)=u(p6,t),T9(1)w9,x(1,t)=u(p7,t),T8(1)w8,x(1,t)=u(p8,t),T7(1)w7,x(1,t)=u(p9,t),T4(1)w4,x(1,t)=u(p10,t). (32)

    where D={p1}. The expressions PD and Pu ((6) and (10)) lead to

    PD=ȷ1ȷ2ȷ3ȷ4ȷ5ȷ6ȷ7ȷ8ȷ9(ϵ2ϵ3ϵ4ϵ5ϵ6ϵ7ϵ8ϵ9ϵ10) and Pu=ȷk1ȷk2ȷk3ȷk4ȷk5(ϵ6ϵ7ϵ8ϵ9ϵ10),

    where the vector ϵk is the k-th column of the identity matrix I10. Thus, from (28) and (30), it can be derived that

    lims+H(s)=diag(ρ3(1)T3(1),ρ9(1)T9(1),ρ8(1)T8(1),ρ7(1)T7(1),ρ4(1)T4(1))1,

    i.e., the system (32) is regular.

    For the tree-shaped network G=(V(G),E(G)), the number of vertices m is equal to the number of edges plus one, i.e., m=n+1. Without loss of generality, let D={p1}, then, the number of vertices in the set V(G)D is m0=n. It follows from Hypothesis 1.2 and (5) that PD=(0,In)n,n+1 and the index set {ȷ1,ȷ2,,ȷn}={2,3,,n+1}. Thus, it is derived from the system (8) and Proposition 1 that (Υ)w(1,t)=DGw(p,t),

    w(p,t)=(0w(p2,t)w(pn+1,t))=DGΥw(1,t) and w(0,t)=(Υ+)w(p,t)=Bt,hGw(1,t),

    where

    DG=Υ(Υ)=diag(deg(p1),deg(p2),,deg(pn+1))=diag(0,1,,1)

    and (DG)=In. Since PDΥ[(Υ)DGPD]=In=[(Υ)DGPD]PDΥ, it follows from the last boundary condition in the system (8) and Proposition 1 that

    (Υ)DGPDu(t)=T(1)wx(1,t)(Υ)DGΥ+T(0)wx(0,t)=T(1)wx(1,t)Bh,tGT(0)wx(0,t).

    In the feedback control law (4), βk>0 for pȷkGN. Now, we supplement βk=0 for pȷkF, and let β=diag(β1,,βn), then (4) can be formulated by

    u(t)=βPDwt(p,t) with βk={0, if pȷkF,>0, if pȷkGN. (33)

    In addition, it can be obtained from BG=0 and Proposition 1 that

    (Υ)DGPDu(t)=(Υ)DGPDβPDDGΥwt(1,t).

    Denote by β=(Υ)DGPDβPDDGΥ=(Υ)(000β)Υ, then it is derived from (33), Proposition 1 and Remark 3 that

    β=diag(β1,,βn), with βk=βȷk1={0, if deg(pȷk)>1,>0, if deg(pȷk)=1, (34)

    where ȷk1{1,2,,n}, kIE(G). Therefore, the closed-loop system (3)-(4) can be reformulated by (see also [15,28])

    {M(x)wtt(x,t)=(T(x)wx)x(x,t),x(0,1),t>0,w(0,t)=Bt,hGw(1,t),T(1)wx(1,t)Bh,tGT(0)wx(0,t)=βwt(1,t). (35)

    Remark 4. Since pȷk is the final point (head) of the edge ek for kIE(G), according to Definition 2.2, all entries in k-th row of Bh,tG are zeros for boundary vertex pȷkGN, i.e., deg(pȷk)=1. Moreover, for internal vertex pȷk, i.e., deg(pȷk)>1, βk=0. Hence, it can be followed from (34) that Bh,tGz,βvRn0, for all z,vRn.

    Let Vb(t)=10b(x)wx(x,t),M(x)wt(x,t)Rndx with the diagonal matrix b(x)=diag(b1(x),,bn(x)) satisfying the following condition.

    Condition 4.1.

    (1) For every kIE(G), bk()C1[0,1]and there exist positive constants cρL, cρU, cTL and cTU such thatcρL[bk(x)ρk(x)]cρU andcTL[bk(x)T1k(x)]cTU, for all x[0,1].

    (2) For every edge ek, corresponding to the component bk(x),

    {min{2[bk(1)(βk)2Tk(1)+bk(1)ρk(1)]1βk,1cb}>cV>0 aspȷkGN,bk(1)ρk(1)iI+E(pȷk)bi(0)ρi(0), as pȷkInt(G),

    where cb=maxx[0,1]{M(x)2,b2(x)T1(x)2}>0 (see (36) below), the final point (head) of the edge ek is pȷk andIE(pȷk)={k}.

    (3) For every edge ek, corresponding to the component bk(x),

    {deg+(pȷ+k)iIE(pȷ+k)bi(1)Ti(1)<bk(0)Tk(0),as pȷ+kInt(G),bk(0)Tk(0)0,aspȷ+k=p1(kI+E(p1)),

    where the starting point (tail) of the edge ek is the vertex pȷ+k.

    According to (1) and (2) in Condition 4.1, obviously, the following inequality

    |Vb(t)|1210b(x)wx(x,t),b(x)wx(x,t)Rndx+1210M(x)wt(x,t),M(x)wt(x,t)RndxcbE(t) (36)

    holds, and there exist cL>0 and cU>0 such that

    cLE(t)O(E)=1210wt(x,t),(b(x)M(x))wt(x,t)Rndx+1210[b(x)T1(x)]T(x)wx(x,t),T(x)wx(x,t)RndxcUE(t). (37)

    Now, we construct a Lyapunov functional

    V(t)=E(t)+cVVb(t),t>0,

    where 0<cbcV<1, then

    (1cbcV)E(t)V(t)(1+cbcV)E(t),t>0. (38)

    In what follows, using this Lyapunov functional, we prove Theorem 1.3.

    Proof. Using (35) and the following two equalities

    10b(x)wxt(x,t),M(x)wt(x,t)dx=1210wt(x,t),(b(x)M(x))wt(x,t)dx+12[b(1)M(1)Bh,tGb(0)M(0)Bt,hG]wt(1,t),wt(1,t)

    and

    10b(x)wx(x,t),M(x)wtt(x,t)dx=12b(1)wx(1,t),T(1)wx(1,t)12b(0)wx(0,t),T(0)wx(0,t)1210[b(x)T1(x)]T(x)wx(x,t)),T(x)wx(x,t)dx,

    we can get that

    dVb(t)dt=12[b(1)T(1)1(β)2+b(1)M(1)Bh,tGb(0)M(0)Bt,hG]wt(1,t),wt(1,t)+12[T(0)Bt,hGb(1)T(1)1Bh,tGT(0)T(0)b(0)]wx(0,t),wx(0,t)b(1)T(1)1Bh,tGT(0)wx(0,t),βwt(1,t)O(E). (39)

    Moveover, it follows from (11) and (35) that

    dE(t)dt=T(1)wx(1,t)Bh,tGT(0)wx(0,t),wt(1,t)=βwt(1,t),wt(1,t). (40)

    Thus, it can be obtained from Remark 4, (37), (39) and (40) that

    dV(t)dt=dE(t)dt+cVdVb(t)dtcVcLE(t)Cβwt(1,t),wt(1,t)cV2CbT(0)wx(0,t),T(0)wx(0,t), (41)

    where

    Cβ=βcV2[b(1)T(1)1(β)2+b(1)M(1)Bh,tGb(0)M(0)Bt,hG]

    and

    Cb=b(0)T(0)1Bt,hGb(1)T(1)1Bh,tG.

    Next, we prove that the symmetric matrices Cβ and Cb are positive semi-definite. Denote by Λ=diag(λ1,λ2,,λn+1), where

    λj=iI+E(pj)bi(0)ρi(0)={b1(0)ρ1(0), as j=1,0, as pjGN,iI+E(pj)bi(0)ρi(0), as pjInt(G)D.

    From Proposition 1, BG=0 and (34), it can be obtained that

    Cβ=β12cV[b(1)T(1)1(β)2+b(1)M(1)(Υ)Υ+b(0)M(0)(Υ+)Υ]=βcV2[b(1)T(1)1(β)2+b(1)M(1)]+cV2diag(λȷ1,,λȷn)=diag(cβ,1,,cβ,n),

    where

    cβ,k=βkcV2[bk(1)(βk)2Tk(1)+bk(1)ρk(1)λȷk],k=1,,n.

    Thus, (2) in Condition 4.1 and (34) lead to

    {cβ,k=βkcV2[bk(1)(βk)2Tk(1)+bk(1)ρk(1)]0, as pȷkGN,cβ,k=iI+E(pȷk)bi(0)ρi(0)bk(1)ρk(1)0, as pȷkInt(G),

    i.e., Cβ is a positive semi-definite matrix. It follows from Proposition 1 that

    Cb=b(0)T1(0)(Υ+)Υb(1)T(1)1(Υ)Υ+=b(0)T1(0)(Υ+)diag(iIE(p1)bi(1)Ti(1),,iIE(pn+1)bi(1)Ti(1))Υ+=b(0)T1(0)diag(iIE(pȷ+1)bi(1)Ti(1),,iIE(pȷ+n)bi(1)Ti(1))(I+B+G).

    The k-th row of Cb matches the edge ek, whose tail and head are the vertices pȷ+k and pȷk, respectively. In light of Definition 2.2, the number of 1 in the k-th row of I+B+G is deg+(pȷ+k). Thus, when bk(0)Tk(0)>deg+(pȷ+k)iIE(pȷ+k)bi(1)Ti(1) for the internal vertex pȷ+k, the k-th row of Cb is strictly (row) diagonally dominant. When bk(0)Tk(0)>0 for the root pȷ+k=p1, the k-th row of Cb has only one non-zero diagonal element bk(0)Tk(0), since deg+(p1)=1 and deg(p1)=0, according to Hypothesis 1.2; when bk(0)Tk(0)=0 for the root pȷ+k=p1, the entries in k-th row of Cb are zeros. Hence, the matrix Cb is positive semi-definite under (3) in Condition 4.1.

    Thus, it follows from (38) and (41) that

    dV(t)dtcVcL1+cbcVV(t),

    which, together with (38), implies that the system (35), i.e., the closed-loop system (3)-(4), is exponential stable.

    Remark 5. The construction of matrix multiplier b(x) is crucial in the proof, here, we discuss its choice. A path in G is a non-empty subgraph P=(VP,EP) of the form VP={pι0,pι1,,pιk} and EP={ei1,ei2,,eik}, where pι1,,pιk and ei1,,eik are all distinct vertices and edges, respectively, the edge eij is joined pιj1 and pιj, j=1,,k. The number of edges, k, is called the length of path, a path of length k is called a k-path. The vertices pι0 and pιk, linked by P, are called its ends, so the path is also denoted by P(pι0,pιk). If pι0 and pιk are the same vertex, then P(pι0,pιk) is called a cycle. For a connected tree G=(V(G),E(G)) with the root pr, for every vertex pV(G){pr}, there is a unique path connecting p and pr, denoted by P(pr,p). The length of P(pr,p) is denoted by mp and let dP=maxpV(G){pr}{mp}. We define sets: V0(G)={pr} and for k1, Vk(G)={pV(G)|P(pr,p)isakpath} and

    Ek(G)={eE(G)|pVk1(G),qVk(G)suchthattheyarejoinedbye},

    then V(G)=dPk=0Vk(G) and E(G)=dPk=1Ek(G), where Vk(G)s and Ek(G)s are mutual disjoint, respectively. Next, b(x) on [0,1] can be chosen via the following three steps.

    Step 1: For every pGN, denote the path P(pr,p) by

    VP={pι0,pι1,,pιmp1,pιmp} and EP={ei1,ei2,,eimp},

    where pι0=pr is the root and pιmp=pGN. Let bimp(0)=mpTimp(0) and choose a value of bimp(1) such that

    bimp(1)>mpecρTLρLmax{Timp(0)ρimp(0)ρimp(1),Timp(1)}.

    Step 2: Beginning with the maximum mp (the longest path P(pr,p)), for j=mp1,,2,1, corresponding to eikEj(G)EP, we calculate

    bik(1)=min{Tik(1)minjI+E(pιk){bj(0)Tj(0)}1+deg+(pιk),jI+E(pιk)bj(0)ρj(0)1+ρik(1)},

    and bik(0)=12min{ρik(1)ρik(0),ecρTLρLTik(0)Tik(1)}bik(1). Repeat the above procedure, till the least mp (the shortest path P(pr,p)).

    Step 3: For every edge ekE(G), by virtue of bk(0) and bk(1) given by above two steps, we choose bk(x) as follows:

    bk(x)=[ecρxTLρL(bk(0)Tk(0)+c(k)b)c(k)b]Tk(x) with cρ>|[Tk(x)ρk(x)]|

    and c(k)b=(ecρTLρL1)1[bk(1)Tk(1)ecρTLρLbk(0)Tk(0)]>0.

    At last, after b(x) is determined by above steps, it is easy to verify that

    cρTLρLminkIE{bk(1)Tk(1)}cρTLρLbk(1)Tk(1)[bk(x)Tk(x)]cρecρTLρLTLρL(ecρTLρL1)bk(1)Tk(1)cρecρTLρLTLρL(ecρTLρL1)maxkIE{bk(1)Tk(1)}

    and

    cρ(112ecρTLρL)minkIE{bk(1)Tk(1)}cρ(112ecρTLρL)bk(1)Tk(1)[bk(x)ρk(x)](ecρTLρLecρTLρL1TUρUTLρL+1)bk(1)Tk(1)cρ(ecρTLρLecρTLρL1TUρUTLρL+1)cρmaxkIE{bk(1)Tk(1)}.

    Thus, Condition 4.1 is always fulfilled. Note that the construction of b(x) is not unique, the choice based on Step 1, 2 and 3 is just one way of constructing b(x).

    To explain further how to choose the diagonal matrix-valued function b(x) and construct the Lyapunov functional via steps in Remark 5, we provide two tree-shaped networks. The first one is shown in Figure 1b, the underlying tree is a branching with a fixed root p1, i.e., D={p1}G and Hypothesis 1.2 holds. The second one is shown in Figure 2 and D={p4}Int(G). Its underlying rooted tree is not a branching, i.e., (2) and (3) in Hypothesis 1.2 are not satisfied. A concrete Lyapunov functional will be constructed for the second example.

    We reconsider the tree-shaped network governed by (32), shown in Figure 1b. The outgoing incidence matrix and the incoming incidence matrix of the underlying tree-shaped graph of system (32) are

    Υ+=e1e2e3e4e5e6e7e8e9(100000000011000000000111000000000100000000011000000000000000000000000000000000000000000000)p1p2p3p4p5p6p7p8p9p10ȷ+1ȷ+2ȷ+3ȷ+4ȷ+5ȷ+6ȷ+7ȷ+8ȷ+9 (42)

    and

    Υ=e1e2e3e4e5e6e7e8e9(000000000100000000010000000000001000000010000001000000000000001000000010000000100000100000)p1p2p3p4p5p6p7p8p9p10ȷ1ȷ2ȷ3ȷ4ȷ5ȷ6ȷ7ȷ8ȷ9, (43)

    respectively.

    To choose b(x) satisfying Condition 4.1, we first write down all paths from the root p1 to leaves (GN={p6,p7,p8,p9,p10}) in the network (see Table 1).

    Table 1. 

    Paths from the root p1 to leaves

    .
    E1(G) V1(G) E2(G) V2(G) E3(G) V3(G) E4(G) V4(G) mp
    indices i1 ι1 i2 ι2 i3 ι3 i4 ι4
    P(p1,p6) e1 p2 e3 p6 2
    P(p1,p7) e1 p2 e2 p3 e5 p5 e9 p7 4
    P(p1,p8) e1 p2 e2 p3 e5 p5 e8 p8 4
    P(p1,p9) e1 p2 e2 p3 e6 p4 e7 p9 4
    P(p1,p10) e1 p2 e2 p3 e4 p10 3

     | Show Table
    DownLoad: CSV

    Second, according to Remark 5, we choose the function bk(x) as follows.

    Step 1: For the leaf p6, the corresponding leaf edge is e3, then b3(0)=2T3(0) and b3(1)>2ecρTLρLmax{T3(0)ρ3(0)ρ3(1),T3(1)}. For the leaf p7, the corresponding leaf edge is e9, then b9(0)=4T9(0) and b9(1)>4ecρTLρLmax{T9(0)ρ9(0)ρ9(1),T9(1)}. For the leaf p8, the corresponding leaf edge is e8, then b8(0)=4T8(0) and b8(1)>4ecρTLρLmax{T8(0)ρ8(0)ρ8(1),T8(1)}. For the leaf p9, the corresponding leaf edge is e7, then b7(0)=4T7(0) and b7(1)>4ecρTLρLmax{T7(0)ρ7(0)ρ7(1),T7(1)}. For the leaf p10, the corresponding leaf edge is e4, then b4(0)=3T4(0) and b4(1)>3ecρTLρLmax{T4(0)ρ4(0)ρ4(1),T4(1)}.

    Step 2: The maximum mp=4. For e5=ei3E3(G)EP(p1,p7)=E3(G)EP(p1,p8) and pι3=p5, we choose b5(0)=12min{ρ5(1)ρ5(0),ecρTLρLT5(0)T5(1)}b5(1) and

    b5(1)=min{T5(1)3min{b8(0)T8(0),b9(0)T9(0)},b8(0)ρ8(0)+b9(0)ρ9(0)1+ρ5(1)}.

    For e6=ei3E3(G)EP(p1,p9) and pι3=p4, we choose

    b6(1)=min{T6(1)b7(0)2T7(0),b7(0)ρ7(0)1+ρ5(1)}

    and

    b6(0)=12min{ρ6(1)ρ6(0),ecρTLρLT6(0)T6(1)}b6(1).

    For e2=ei2E2(G)EP(p1,pk), k=7,8,9,10, and pi2=p3, we choose

    b2(1)=min{14T2(1)minj{4,5,6}{bj(0)Tj(0)},11+ρ2(1)j{4,5,6}bj(0)ρj(0)}

    and b2(0)=12min{ρ2(1)ρ2(0),ecρTLρLT2(0)T2(1)}b2(1). For e1=ei1E1(G)EP(p1,pk), k=6,,10, and pι1=p2, we choose b1(0)=12min{ρ1(1)ρ1(0),ecρTLρLT1(0)T1(1)}b1(1) and

    b1(1)=min{13T1(1)minj{2,3}{bj(0)Tj(0)},b2(0)ρ2(0)+b3(0)ρ3(0)1+ρ1(1)}.

    Thus, b(x) is constructed by Step 3 in Remark 5, and all assumptions in Theorem 1.3 are fulfilled. Finally, by use of (4), (34), (42), (43) and ȷk=k+1 for k=1,,9, it is shown that the network (32), under velocity feedbacks

    {u(p6,t)=β5wt(pȷ5,t)=β5wȷ3,t(1,t)=β3w3,t(1,t),u(p7,t)=β6wt(pȷ6,t)=β6wȷ9,t(1,t)=β9w9,t(1,t),u(p8,t)=β7wt(pȷ7,t)=β7wȷ8,t(1,t)=β8w8,t(1,t),u(p9,t)=β8wt(pȷ8,t)=β8wȷ7,t(1,t)=β7w7,t(1,t),u(p10,t)=β9wt(pȷ9,t)=β9wȷ4,t(1,t)=β4w4,t(1,t),

    is exponentially stable.

    The tree-shaped network consisting of six strings with one fixed root is shown in Figure 2. The motion of the network can be formulated by

    {ρj(x)wj,tt(x,t)=(Tj(x)wj,x)x(x,t),x(0,1),j=1,,6,w3(0,t)=w4(0,t)=0,w1(0,t)=w2(0,t)=w3(1,t),w6(0,t)=w5(1,t)=w4(1,t),T3(1)w3,x(1,t)[T1(0)w1,x(0,t)+T2(0)w2,x(0,t)]=0,T4(1)w4,x(1,t)+T5(1)w5,x(1,t)T6(0)w6,x(0,t)]=0,T1(1)w1,x(1,t)=u(p1,t),T2(1)w2,x(1,t)=u(p2,t),T5(0)w5,x(0,t)=u(p7,t),T6(1)w6,x(1,t)=u(p5,t), (44)

    where ρ1(x)=ρ2(x)=ρ3(x)=1, ρ4(x)=1.250.25x2, ρ5(x)=2x, ρ6(x)=1.25(2π)1sin(2πx), T1(x)=1, T2(x)=1.5, T3(x)=2, T4(x)=1.25+(2π)1sin(2πx), T5(x)=1+x and T6(x)=1+0.25x2. The outgoing incidence matrix and the incoming incidence matrix are

    Υ+=e1e2e3e4e5e6(000000000000110000001100000000000001000010)p1p2p3p4p5p6p7ȷ+1ȷ+2ȷ+3ȷ+4 and Υ=e1e2e3e4e5e6(100000010000001000000000000001000110000000)p1p2p3p4p5p6p7ȷ1ȷ2ȷ3ȷ4ȷ5ȷ6, (45)

    respectively. The Dirichlet set D={p4}Int(G), and deg(p6)=2, which means that the rooted tree is not a branching and the system (44) is not the standard form of (3). V(G)D={pȷ1,pȷ2,pȷ3,pȷ4,pȷ5,pȷ6}, where pȷk=pk for k=1,2,3, pȷk=pk+1 for k=4,5,6, and m0=6. F={pȷ3,pȷ5}={p3,p6}. The set of leaves GN=G={p1,p2,p5,p7}. The system (44) is L2-well-posedness and regular, according to Theorem 1.1.

    Similar to (4), the collocated output feedback is read as

    u(pȷk,t)=βkwt(pȷk,t), for k=1,2,4,6, (46)

    where βk>0 and pȷkGN, k=1,2,4,6. Hence, the closed-loop system (44) with (46) can be rewritten as

    {ρj(x)wj,tt(x,t)=(Tj(x)wj,x)x(x,t),x(0,1),j=1,,6,w3(0,t)=w4(0,t)=0,w1(0,t)=w2(0,t)=w3(1,t),w5(0,t)=w6(0,t)=w4(1,t),T1(1)w1,x(1,t)=β1w1,t(1,t),T2(1)w2,x(1,t)=β2w2,t(1,t),T3(1)w3,x(1,t)[T1(0)w1,x(0,t)+T2(0)w2,x(0,t)]=0,T4(1)w4,x(1,t)+T5(1)w5,x(1,t)T6(0)w6,x(0,t)=0,T5(0)w5,x(0,t)=β6w5,t(0,t),T6(1)w6,x(1,t)=β4w6,t(1,t). (47)

    Notice that the closed-loop system (47) can not be written in the form of (35). Thus, the matrix-vector form of (47) can only be formulated by (8) with Υ and Υ+ being determined by (45), and

    u(t)=(β1w1,t(1,t),β2w2,t(1,t),0,β4w6,t(1,t),0,β6w5,t(0,t)). (48)

    To construct a Lyapunov functional for (47), we do a change of variable x:=1x, for the edge e5, and let ˜w5(x,t)=w5(1x,t), ˜ρ5(x)=1+x and ˜T5(x)=2x, and for j5, let ˜wj(x,t)=wj(x,t), ˜ρj(x)=ρj(x) and ˜Tj(x)=Tj(x). Thus, (47) is reformulated by

    {˜ρj(x)˜wj,tt(x,t)=(˜Tj(x)˜wj,x)x(x,t),x(0,1),j=1,,6,˜w3(0,t)=˜w4(0,t)=0,˜w1(0,t)=˜w2(0,t)=˜w3(1,t),˜w5(0,t)=˜w6(0,t)=˜w4(1,t),˜T3(1)˜w3,x(1,t)[˜T1(0)˜w1,x(0,t)+˜T2(0)˜w2,x(0,t)]=0,˜T4(1)˜w4,x(1,t)[˜T5(0)˜w5,x(0,t)+˜T6(0)˜w6,x(0,t)]=0,˜T1(1)˜w1,x(1,t)=β1˜w1,t(1,t),˜T2(1)˜w2,x(1,t)=β2˜w2,t(1,t),˜T5(1)˜w5,x(1,t)=β6˜w5,t(1,t),˜T6(1)˜w6,x(1,t)=β4˜w6,t(1,t). (49)

    Thus, (1) and (3) in Hypothesis 1.2 are satisfied and the underlying tree of system (49) is a branching with the root p4, which is joined with two edges.

    In the following, we determine the multiplier ˜b(x) for (49) due to Remark 5. A simple calculation shows that 0<1=ρL˜ρk(x)ρU, 0<1=TL˜Tk(x)TU and

    |[˜Tk(x)˜ρk(x)]|158+14π=cρ<2=ˆcρ, on [0,1].

    All paths from the root p4 to leaves (GN={p1,p2,p5,p7}) in the tree-shaped network are filled in Table 2. Thus, using Step 1 in Remark 5, we choose ˜b1(0)=2 and ˜b1(1)=2eˆcρ for the leaf edge e1; ˜b2(0)=3 and ˜b2(1)=3eˆcρ for the leaf edge e2; ˜b6(0)=2 and ˜b6(1)=52eˆcρ for the leaf edge e6; ˜b5(0)=4 and ˜b5(1)=2eˆcρ for the leaf edge e5. Using Step 2 in Remark 5, we choose ˜b3(1)=43 and ˜b3(0)=23ecρ for the edge e3; ˜b4(1)=23 and ˜b4(0)=13ecρ for the edge e4. According to Step 3 in Remark 5, we have

    {˜b1(x)=2[ecρx+(eˆcρecρ)ecρx1ecρ1],˜b3(x)=23[ecρ(x1)+ecρx1ecρ1],˜b2(x)=32˜b1(x),˜b4(x)=˜T4(x)2˜b3(x),˜b5(x)=˜T5(x)˜b1(x),˜b6(x)=˜T6(x)˜b1(x).
    Table 2. 

    Paths from the root p4 to leaves

    .
    E1(G) V1(G) E2(G) V2(G) mp
    indices i1 ι1 i2 ι2
    P(p4,p1) e3 p3 e1 p1 2
    P(p4,p2) e3 p3 e2 p2 2
    P(p4,p5) e4 p6 e6 p5 2
    P(p4,p7) e4 p6 e5 p7 2

     | Show Table
    DownLoad: CSV

    Hence, we obtain the matrix multiplier b(x) for (47): bk(x)=˜bk(x) for k5 and b5(x)=˜b5(1x), that is,

    {b1(x)=2[ecρx+eˆcρecρecρ1(ecρx1)],b2(x)=3b1(x)2,b3(x)=23[ecρ(x1)+ecρx1ecρ1],b4(x)=T4(x)b3(x)2,b5(x)=T5(x)b1(1x),b6(x)=T6(x)b1(x). (50)

    Thus, the Lyapunov functional for the system (47) is

    V(t)=E(t)+cVVb(t)=E(t)+cV10b(x)wx(x,t),M(x)wt(x,t)dx.

    From (6), (8), (12), (45) and (48), it can be deduced that

    dE(t)dt=β1w21,t(1,t)β2w22,t(1,t)β4w26,t(1,t)β6w25,t(0,t). (51)

    Similar to (39), it follows from integration by parts, (6), (8), (44) and (45) that

    dVb(t)dt=12CwPDwt(p,t),PDwt(p,t)Cm0+12b(1)wx(1,t),T(1)wx(1,t)Cn12b(0)wx(0,t),T(0)wx(0,t)CnO(E), (52)

    where O(E) satisfies (37),

    Cw=PD[(Υ)M(1)b(1)(Υ)(Υ+)M(0)b(0)(Υ+)]PD=diag(2eˆcρ,3eˆcρ,113,258eˆcρ,356,4eˆcρ) (53)

    and

    12b(1)wx(1,t),T(1)wx(1,t)12b(0)wx(0,t),T(0)wx(0,t)=23[T1(0)w1,x(0,t)+T2(0)w2,x(0,t)]22T21(0)w21,x(0,t)2T22(0)w22,x(0,t)+23T24(1)w24,x(1,t)2T25(1)w25,x(1,t)2[T4(1)w4,x(1,t)+T5(1)w5,x(1,t)]2+2eˆcρ[β21w21,t(1,t)+β22w22,t(1,t)+β24w26,t(1,t)+β26w25,t(0,t)]13ecρT23(0)w23,x(0,t)16ecρT24(0)w24,x(0,t)2eˆcρ[β21w21,t(1,t)+β22w22,t(1,t)+β24w26,t(1,t)+β26w25,t(0,t)]. (54)

    Thus, it follows from (51), (52), (53) and (54) that

    dV(t)dt=dE(t)dt+cVdVb(t)dt[β1cVeˆcρcVeˆcρβ21]w21,t(1,t)[β232cVeˆcρcVeˆcρβ22]w22,t(1,t)[β42516cVeˆcρcVeˆcρβ24]w26,t(1,t)[β62cVeˆcρcVeˆcρβ26]w25,t(0,t)cVO(E).

    Let cV<min{β1eˆcρ1+β21,β2eˆcρ1.5+β22,β4eˆcρ2516+β24,β6eˆcρ2+β26,c1b}, it can be derived that

    dV(t)dtcVO(E)cLcVE(t)cLcV1+cVcbV(t).

    Hence, the system (47) is exponentially stable.

    The multiplier method is applied to discuss the well-posedness and regularity of the open-loop system of strings network and the exponential stability of the closed-loop system in this paper. Especially, a Lyaponuv functional for tree-shaped networks of elastic strings is presented by constructing an appropriate multiplier. This construction method (see Remark 5) may be generalized to other types of networks, e.g., networks of beams etc, even for nonlinear networks, which will be discussed in other papers. In engineering, it is more meaningful work. Additionally, the issues of time-delay and anti-disturbance for networks governed by partial differential equations may also be investigated based on the same methods. These problems are worth exploring in future.

    The authors would like to thank the editors and the anonymous reviewers whose valuable comments and suggestions were very helpful to the improvement of the manuscript.



    [1] Remark on stabilization of tree-shaped networks of strings. Applications of Mathematics (2007) 52: 327-343.
    [2] Stabilization of generic trees of strings. Journal of Dynamical and Control Systems (2005) 11: 177-193.
    [3]

    J. A. Bondy and U. S. R. Murty, Graph Theory, Springer-Verlag, New York, 2008.

    [4] Regular linear systems governed by a boundary controlled heat equation. Journal of Dynamical and Control Systems (2002) 8: 341-370.
    [5] Well-posedness and regularity of Naghdi's shell equation under boundary control and observation. Journal of Differential Equations (2010) 249: 3174-3214.
    [6] Well-posedness of boundary control systems. SIAM Journal on Control and Optimization (2003) 42: 1244-1265.
    [7] The Salamon-Weiss class of well-posed infinite-dimensional linear systems: A survey. IMA Journal of Mathematical Control and Information (1997) 14: 207-223.
    [8]

    R. Dáger and E. Zuazua, Wave Propagation, Observation and Control in 1–d Flexible Multistructures, Springer Verlag, Berlin Heidelberg, 2006.

    [9]

    R. Diestel, Graph Theory, 3nd edition, Springer-Verlag, Heidelberg, New York, 2005.

    [10] Regularity of an Euler-Bernoulli equation with Neumann control and collocated observation. Journal of Dynamical and Control Systems (2006) 12: 405-418.
    [11] Well-posedness of systems of linear elasticity with dirichlet boundary control and observation. SIAM Journal on Control and Optimization (2009) 48: 2139-2167.
    [12] Variational and semigroup methods for waves and diffusion in networks. Applied Mathematics and Optimization (2007) 55: 219-240.
    [13]

    J. Lagnese, G. Leugering and E. J. P. G. Schmidt, Modeling, Analysis and Control of Dynamic Elastic Multi-link Structures, Systems and Control: Foundations and Applications, Birkhäuser, Inc., Boston, MA, 1994.

    [14] L2(Σ)-Regularity of the boundary to boundary operator BL for hyperbolic and Petrowski PDEs. Abstract and Applied Analysis (2003) 19: 1061-1139.
    [15] Riesz basis and stability properties for the feedback controlled networks of 1-D wave equations. WSEAS Transactions on Mathematics (2012) 11: 434-455.
    [16] Stabilization of one-dimensional wave equations coupled with an ODE system on general tree-shaped networks. IMA Journal of Mathematical Control and Information (2015) 32: 557-589.
    [17]

    R. Mennicken and M. Moller, Non-self-adjoint Boundary Eigenvalue Problem, North-Holland mathematics studies 192, Elsevier, 2003.

    [18]

    K. A. Morris, The well-posedness of accelerometer control systems,, in Analysis and Optimization of Systems: State and Frequency Domain Approaches for Infinite-Dimensional Systems (eds. R. F. Curtain, A. Bensoussan and J. L. Lions), Springer, Berlin, Heidelberg, 185 (1993), 378–387.

    [19]

    M. A. Naimark, Linear Differential Operators (Part 1), Frederick Ungar, New York, 1967.

    [20] Infinite dimensional linear systems with unbounded control and observation: A functional analytic approach. Transactions of the American Mathematical Society (1987) 300: 383-431.
    [21] Realization theory in Hilbert space. Mathematical Systems Theory (1989) 21: 147-164.
    [22] Super-stability and the spectrum of one-dimensional wave equations on general feedback controlled networks. IMA Journal of Mathematical Control and Information (2014) 31: 73-99.
    [23] (2005) Well-Posed Linear Systems. UK: Cambridge University Press.
    [24] Stabilization of the wave equation on 1-d networks. SIAM Journal on Control and Optimization (2009) 48: 2771-2797.
    [25] A characteristic equation associated to an eigenvalue problem on c2-networks. Linear Algebra and Its Applications (1985) 71: 309-325.
    [26] Transfer functions of regular linear systems. Part Ⅰ: Characterizations of regularity. Transactions of the American Mathematical Society (1994) 342: 827-854.
    [27] The exponential decay rate of generic tree of 1-d wave equations with boundary feedback controls. Networks and Heterogeneous Media (2016) 11: 527-543.
    [28] Abstract second order hyperbolic system and applications to controlled networks of strings. SIAM Journal on Control and Optimization (2008) 47: 1762-1784.
    [29] Stability and spectral properties of general tree-shaped wave networks with variable coefficients. Acta Applicandae Mathematicae (2019) 164: 219-249.
    [30] Well-posedness and regularity of hyperbolic boundary control systems on a one-dimensional spatial domain. ESAIM: Control, Optimisation and Calculus of Variations (2010) 16: 1077-1093.
  • Reader Comments
  • © 2022 the Author(s), licensee AIMS Press. This is an open access article distributed under the terms of the Creative Commons Attribution License (http://creativecommons.org/licenses/by/4.0)
通讯作者: 陈斌, bchen63@163.com
  • 1. 

    沈阳化工大学材料科学与工程学院 沈阳 110142

  1. 本站搜索
  2. 百度学术搜索
  3. 万方数据库搜索
  4. CNKI搜索

Metrics

Article views(991) PDF downloads(192) Cited by(0)

Other Articles By Authors

/

DownLoad:  Full-Size Img  PowerPoint
Return
Return

Catalog