Next Article in Journal
A Robust Framework for Probability Distribution Generation: Analyzing Structural Properties and Applications in Engineering and Medicine
Previous Article in Journal
Singularity Analysis of Lightlike Hypersurfaces Generated by Null Cartan Curves in Minkowski Spacetime
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Exponential Stability of a Wave Equation with Boundary Delay Control

1
Department of Mathematics, Civil Aviation University of China, Tianjin 300300, China
2
School of Mathematics and Statistics, Henan Normal University, Xinxiang 453007, China
*
Author to whom correspondence should be addressed.
Axioms 2025, 14(4), 280; https://doi.org/10.3390/axioms14040280 (registering DOI)
Submission received: 1 March 2025 / Revised: 31 March 2025 / Accepted: 2 April 2025 / Published: 7 April 2025

Abstract

:
In this paper, we investigate the stability of a 1-d wave equation with boundary difference-type delay control. We utilize the idea of system equivalence to find a system with known stability characteristics and select an appropriate regulation mechanism, ensuring that the original system becomes equivalent to the stable one. In this method, we adopt integral-type feedback control, utilizing integral kernel functions as parameters, and determine appropriate parameter functions. The specific steps are as follows: To begin with, an exponentially convergent system is selected as the desired target reference model. Next, we construct a bounded, reversible linear mapping to equate the studied system with the target model. During this process, we derive the expressions for the integral controller and the corresponding kernel function. Subsequently, we prove the solvability of the kernel function. By establishing equations for the kernel function and linear transformations, we find that the initial system exhibits equivalence to the desired model. Ultimately, based on the equivalence between the two systems, we conclude that the original system attains exponential stability under the integral-type feedback controller.

1. Introduction

As a mathematical tool to describe wave phenomena, the wave formula is a significant partial differential mathematical expression, and problems related to it have gradually been widely studied, such as the stability of it [1,2]. Time delay is a phenomenon that can be observed in the processes of transmission or processing, prevalent in diverse practical systems [3,4]. As early as the last century, the problem of time delay had been the subject of considerable academic interest. Datko [5,6] found that the time delay within a system can potentially disrupt its stability, and similar conclusions also exist in [7]. Time delay exists in multiple systems in our daily life. For instance, ref. Ref. [8] solved a problem pertaining to robotics. Ref. [9] dealt with a time delay question in the signal field. Ref. [10] addressed the issue in a medical setting.
There are various types of delay categorizations, such as lumped delay, distributed delay, retarded delay, neutral delay, etc. In this article, we mainly focus on time delay. Generally, time delay can be categorized into state delay (internal delay), control delay (input delay), and observation delay (output delay). The input delay is capable of being categorized into two principal classifications: internal input delay and boundary input delay. The development of various controllers has been designed and implemented for these systems without due consideration of the impact of time delays [11,12,13,14,15]. In considering the phenomenon of time delay, scholars have pursued a multitude of research directions, each tailored to the specific type of delay under investigation. Some researchers conducted examinations on systems that exhibited state delay. For example, ref. [16] investigated the impact of state delay on abstract equations. Ref. [17] developed a tracker for the system incorporating state delay. Some scholars investigated systems with output delay. For instance, ref. [18] presented a methodology for the design of observers and predictors for wave equations with output feedback. Comparable control strategies also existed in [19].
Some scholars have concentrated their research on systems featuring input delay, as they represent the central theme of this paper. A variety of techniques can be employed to address the issue of input delays in a range of fields, including wave, heat, and beam equations. For instance, ref. [20] employed spectral analysis methods to discuss the stabilization of wave systems with an input delay at the boundary, characterized by the differential-type delay α u ( t ) + β u ( t τ ) . [21] applied techniques associated with the frequency domain means to investigate the stability enhancement of wave-based systems subject to internal input delay, represented by the differential-type delay α x μ 1 w ( x , t ) + μ 2 w t ( x , t τ ) . In attempting to surmount the constraints of these parameters, ref. [22] designed a dynamic feedback controller. This method is with great frequency used in [23,24,25,26,27]. In recent years, a novel design strategy of controller has been introduced by scholars. Ref. [28] introduced an integral-type feedback controller design. This approach has also been widely applied in [29,30,31,32,33,34,35]. However, the stability properties of systems incorporating boundary difference-type delay control have not yet been analyzed using this method.
Therefore, in this paper, we research this system, which is determined as shown below:
q t t ( y , t ) = q y y ( y , t ) , y ( 0 , 1 ) , t > 0 , q ( 0 , t ) = 0 , q ( 1 , t ) = ψ ( t ) + ψ ( t ϵ ) , t > 0 , q ( y , 0 ) = q 0 ( y ) , q t ( y , 0 ) = q 1 ( y ) , y ( 0 , 1 ) , ψ ( s ϵ ) = j ( s ) , s ( 0 , ϵ ) ,
where q ( y , t ) C is the wave function, ψ ( t ) represents control function defined over the interval ϵ , , q 0 ( y ) , q 1 ( y ) are the initial states of the wave, ϵ > 0 is an arbitrary constant delay, and j ( s ) represents the historical behavior of the controller. we will construct a integral-type feedback controller that stabilises the system applying the idea of system equivalence.
The approach introduced in reference [28] forms the basis of this study. We set the auxiliary function:
ϕ ( s , t ) = ψ ( t + s ϵ ) , s ( 0 , ϵ ) , t > 0 .
System (1) is represented by the following equivalent formulation:
ϕ t ( s , t ) = ϕ s ( s , t ) , y ( 0 , 1 ) , s ( 0 , ϵ ) , t > 0 , ϕ ( ϵ , t ) = ψ ( t ) , ϕ ( s , 0 ) = ϕ 0 ( s ) , q t t ( y , t ) = q y y ( y , t ) , y ( 0 , 1 ) , t > 0 , q ( 0 , t ) = 0 , q ( 1 , t ) = ϕ ( ϵ , t ) + ϕ ( 0 , t ) , t > 0 , q ( y , 0 ) = q 0 ( y ) , q t ( y , 0 ) = q 1 ( y ) , y ( 0 , 1 ) .
The control ψ ( t ) is required to take the following form:
ψ ( t ) = 0 ϵ χ ( ϵ r ) ϕ ( r , t ) d r + 0 1 ζ ( ϵ , z ) q ( z , t ) d z + 0 1 ϱ ( ϵ , z ) q t ( z , t ) d z ,
where χ ( s ) , ζ ( s , z ) and ϱ ( s , z ) are the parametrization functions.
By applying function (3), the closed-loop system associated with system (2) can be expressed as:
ϕ t ( s , t ) = ϕ s ( s , t ) , s ( 0 , ϵ ) , t > 0 , ϕ ( ϵ , t ) = 0 ϵ χ ( ϵ r ) ϕ ( r , t ) d r + 0 1 ζ ( ϵ , z ) q ( z , t ) d z + 0 1 ϱ ( ϵ , z ) q t ( z , t ) d z , ϕ ( s , 0 ) = ϕ 0 ( s ) , q t t ( z , t ) = q z z ( z , t ) , z ( 0 , 1 ) , t > 0 , q ( 0 , t ) = 0 , q ( 1 , t ) = ϕ ( ϵ , t ) + ϕ ( 0 , t ) , t > 0 , q ( z , 0 ) = q 0 ( z ) , q t ( z , 0 ) = q 1 ( z ) , z ( 0 , 1 ) .
The primary objective of this article is to guarantee the exponential stability of system (4). To accomplish this objective, we adopt a two-step approach. The initial step consists of choosing an intermediate system and ensuring the equivalence between the closed-loop system (4) and the intermediate system:
φ t ( s , t ) = φ s ( s , t ) , s ( 0 , ϵ ) , t > 0 , φ ( ϵ , t ) = 0 , φ ( s , 0 ) = φ 0 ( s ) , q t t ( y , t ) = q y y ( y , t ) , y ( 0 , 1 ) , t > 0 , q ( 0 , t ) = 0 , q ( 1 , t ) = φ ( 0 , t ) + 0 1 ζ 0 ( z ) q ( z , t ) d z + 0 1 ϱ 0 ( z ) q t ( z , t ) d z , t > 0 , q ( y , 0 ) = q 0 ( y ) , q t ( y , 0 ) = q 1 ( y ) , y ( 0 , 1 ) ,
where ϱ ( ϵ , z ) + ϱ ( 0 , z ) = ϱ 0 ( z ) , ζ ( ϵ , z ) + ζ ( 0 , z ) = ζ 0 ( z ) , z ( 0 , 1 ) . φ 0 ( s ) , ζ 0 ( z ) , ϱ 0 ( z ) are the initial conditions of the functions ϕ ( s , t ) , ζ ( s , z ) and ϱ ( s , z ) .
The next step consists of choosing a target system and ensuring the equivalence between the intermediate system (5) and the following target system:
φ t ( s , t ) = φ s ( s , t ) , s ( 0 , ϵ ) , t > 0 , φ ( ϵ , t ) = 0 , φ ( s , 0 ) = φ 0 ( s ) , g t t ( y , t ) = g y y ( y , t ) 2 b g t ( y , t ) b 2 g ( y , t ) , y ( 0 , 1 ) , t > 0 , b > 0 , g ( 0 , t ) = 0 , g ( 1 , t ) = θ φ ( 0 , t ) , θ 0 , g ( y , 0 ) = g 0 ( y ) , g t ( y , 0 ) = g 1 ( y ) , y ( 0 , 1 ) .
The remainder of this manuscript is systematized as described below. Section 2 explores the equivalence between systems (4) and (5). Firstly, we establish a linear transformation and its inverse between systems (4) and (5), and then derive the corresponding kernel equations. Secondly, we prove that kernel function equations are solvable and that transformations are bounded. Therefore, these transformations establish equivalence between two systems. Section 3 uses the same method to investigate the equivalence between systems (5) and (6). Section 4 establishes the exponential stability of system (6), which implies the exponential stability of system (4) and, consequently, the original system governed by control function (3). Section 5 presents mathematical simulations to validate the effectiveness of the proposed controller. As a last remark, Section 6 provides concluding remarks.

2. Equivalence Between Systems (4) and (5)

2.1. The Transformation Between Systems (4) and (5)

Observing the boundary condition of system (4), we build a linear mapping as shown below:
φ ( s , t ) = ϕ ( s , t ) 0 s χ ( s r ) ϕ ( r , t ) d r s ϵ κ ( r s ) ϕ ( r , t ) d r 0 1 ζ ( s , z ) q ( z , t ) d z 0 1 ϱ ( s , z ) q t ( z , t ) d z , q ( y , t ) = q ( y , t ) , q t ( y , t ) = q t ( y , t ) ,
where χ ( s ) , κ ( s , z ) , ζ ( s ) and ϱ ( s , z ) are unknown parameter functions, also known as kernel functions.
Theorem 1. 
Suppose ( ϕ ( s , t ) , q ( y , t ) , q t ( y , t ) ) denote a solution of the closed-loop system (4) and ( φ ( s , t ) , q ( y , t ) , q t ( y , t ) ) be described via the mapping (7). If functions χ ( s ) , κ ( s ) , ζ ( s , z ) and ϱ ( s , z ) fulfill the following conditions:
ϱ s ( s , z ) = ζ ( s , z ) , s ( 0 , ϵ ) , z ( 0 , 1 ) , ζ s ( s , z ) = ϱ z z ( s , z ) , ϱ ( s , 0 ) = 0 , ϱ ( s , 1 ) = 0 , ϱ ( ϵ , z ) + ϱ ( 0 , z ) = ϱ 0 ( z ) , z ( 0 , 1 ) , ζ ( ϵ , z ) + ζ ( 0 , z ) = ζ 0 ( z ) , χ ( s ) = ϱ z ( s , 1 ) , s ( 0 , ϵ ) , κ ( ϵ s ) = ϱ z ( s , 1 ) ,
then ( φ ( s , t ) , q ( y , t ) , q t ( y , t ) ) constitutes a solution to system (5).
Proof. 
According to the system (4) and transformation (7), we arrive at the subsequent finding:
φ t ( s , t ) = ϕ t ( s , t ) 0 s χ ( s r ) ϕ t ( r , t ) d r s ϵ κ ( r s ) ϕ t ( r , t ) d r 0 1 ζ ( s , z ) q t ( z , t ) d z 0 1 ϱ ( s , z ) q t t ( z , t ) d z = ϕ t ( s , t ) χ ( 0 ) ϕ ( s , t ) + χ ( s ) ϕ ( 0 , t ) + 0 s χ r ( s r ) ϕ ( r , t ) d r κ ( ϵ s ) ϕ ( ϵ , t ) + κ ( 0 ) ϕ ( s , t ) + s ϵ κ r ( r s ) ϕ ( r , t ) d r + ϱ ( s , 0 ) q z ( 0 , t ) ϱ ( s , 1 ) q z ( 1 , t ) 0 1 ϱ z z ( s , z ) q ( z , t ) d z + ϱ z ( s , 1 ) ϕ ( ϵ , t ) + ϱ z ( s , 1 ) ϕ ( 0 , t ) 0 1 ζ ( s , z ) q t ( z , t ) d z ,
and
φ s ( s , t ) = ϕ s ( s , t ) 0 s χ s ( s r ) ϕ ( r , t ) d r χ ( 0 ) ϕ ( s , t ) 0 1 ζ s ( s , z ) q ( z , t ) d z 0 1 ϱ s ( s , z ) q t ( z , t ) d z + s ϵ κ s ( r s ) ϕ ( r , t ) d r + κ ( 0 ) ϕ ( s , t ) .
Based on expression (8), it is evident that φ t ( s , t ) = φ s ( s , t ) for any s ( 0 , ϵ ) and t > 0 .
Obviously,
φ ( ϵ , t ) = ϕ ( ϵ , t ) 0 ϵ χ ( ϵ r , z ) ϕ ( r , t ) d r 0 1 ζ ( ϵ , z ) q ( z , t ) d z 0 1 ϱ ( ϵ , z ) q t ( z , t ) d z = 0 ,
φ ( 0 , t ) = ϕ ( 0 , t ) 0 ϵ κ ( r ) ϕ ( r , t ) d r 0 1 ζ ( 0 , z ) q ( z , t ) d z 0 1 ϱ ( 0 , z ) q t ( z , t ) d z ,
and
φ ( s , 0 ) = ϕ ( s , 0 ) 0 s χ ( s r ) ϕ ( r , 0 ) d r s ϵ κ ( r s ) ϕ ( r , 0 ) d r 0 1 ζ ( s , y ) q ( y , 0 ) d y 0 1 ϱ ( s , y ) q t ( y , 0 ) d y = ϕ 0 ( s ) 0 s χ ( s r ) ϕ 0 ( r ) d r s ϵ κ ( r s ) ϕ 0 ( r ) d r 0 1 ζ ( s , y ) q 0 ( y ) d y 0 1 ϱ ( s , y ) q 1 ( y ) d y = φ 0 ( s ) .
Then ( φ ( s , t ) , q ( y , t ) , q t ( y , t ) ) constitutes a solution to system (5).
Afterwards, we shall create the inverse mapping corresponding to the transformation (7):
ϕ ( s , t ) = φ ( s , t ) 0 s χ ˜ ( s r ) φ ( r , t ) d r s ϵ κ ˜ ( r s ) φ ( r , t ) d r 0 1 ζ ˜ ( s , z ) q ( z , t ) d z 0 1 ϱ ˜ ( s , z ) q t ( z , t ) d z , q ( y , t ) = q ( y , t ) , q t ( y , t ) = q t ( y , t ) ,
where χ ˜ ( s ) , κ ˜ ( s , z ) , ζ ˜ ( s , z ) and ϱ ˜ ( s , z ) are unknown parameter functions. □
Theorem 2. 
Suppose ( φ ( s , t ) , q ( y , t ) , q t ( y , t ) ) denote a solution of the system (5) and ( ϕ ( s , t ) , q ( y , t ) , q t ( y , t ) ) be described via the transformation (9). If functions χ ˜ ( s r ) , κ ˜ ( r s ) , ζ ˜ ( s , z ) , and ϱ ˜ ( s , z ) fulfill the following conditions:
ϱ s ˜ ( s , z ) = ζ ˜ ( s , z ) ϱ z ˜ ( s , 1 ) ϱ 0 ( z ) , s ( 0 , ϵ ) , z ( 0 , 1 ) , ζ ˜ s ( s , z ) = ϱ ˜ z z ( s , z ) ϱ z ˜ ( s , 1 ) ζ 0 ( z ) , ϱ ˜ ( s , 0 ) = 0 , ϱ ˜ ( s , 1 ) = 0 , s ( 0 , ϵ ) , ϱ ˜ ( 0 , z ) + ϱ ˜ ( ϵ , z ) = ϱ 0 ( z ) , z ( 0 , 1 ) , ζ ˜ ( 0 , z ) + ζ ˜ ( ϵ , z ) = ζ 0 ( z ) , χ ˜ ( s ) + ϱ z ˜ ( s , 1 ) = 0 , χ ˜ ( ϵ r ) + κ ˜ ( r ) = 0 , r ( 0 , ϵ ) ,
then ( ϕ ( s , t ) , q ( y , t ) , q t ( y , t ) ) constitutes a solution to system (4).
Proof. 
Initially, we validate that ϕ t ( s , t ) = ϕ s ( s , t ) , as shown below:
ϕ t ( s , t ) = φ t ( s , t ) 0 s χ ˜ ( s r ) φ t ( r , t ) d r s ϵ κ ˜ ( r s ) φ t ( r , t ) d r 0 1 ζ ˜ ( s , z ) q t ( z , t ) d z 0 1 ϱ ˜ ( s , z ) q t t ( z , t ) d z = φ t ( s , t ) 0 s χ r ˜ ( s r ) φ ( r , t ) d r + s ϵ κ r ˜ ( r s ) φ ( r , t ) d r χ ˜ ( 0 ) φ ( s , t ) + ϱ z ˜ ( s , 1 ) φ ( 0 , t ) ϱ ˜ ( s , 1 ) q z ( 1 , t ) + 0 1 [ ϱ z ˜ ( s , 1 ) ϱ 0 ( z ) ζ ˜ ( s , z ) ] q t ( z , t ) d z + χ ˜ ( s ) φ ( 0 , t ) + κ ˜ ( 0 ) φ ( s , t ) + 0 1 [ ϱ z ˜ ( s , 1 ) ζ 0 ( z ) ϱ z z ˜ ( s , z ) ] q ( z , t ) d z + ϱ ˜ ( s , 0 ) q z ( 0 , t ) ,
and
ϕ s ( s , t ) = φ s ( s , t ) 0 s χ ˜ s ( s r ) φ ( r , t ) d r χ ˜ ( 0 ) φ ( s , t ) + s ϵ κ ˜ s ( r s ) φ ( r , t ) d r + κ ˜ ( 0 ) φ ( s , t ) 0 1 ζ ˜ s ( s , z ) q ( z , t ) d z 0 1 ϱ ˜ s ( s , z ) q t ( z , t ) d z .
From the expression (10), it is verified that ϕ t ( s , t ) = ϕ s ( s , t ) for any s ( 0 , ϵ ) and t > 0 .
Now
ϕ ( ϵ , t ) = φ ( ϵ , t ) 0 ϵ χ ˜ ( ϵ r ) φ ( r , t ) d r 0 1 ζ ˜ ( ϵ , z ) q ( z , t ) d z 0 1 ϱ ˜ ( τ , z ) q t ( z , t ) d z = 0 ϵ χ ˜ ( ϵ r ) φ ( r , t ) d r 0 1 ζ ˜ ( ϵ , z ) q ( z , t ) d z 0 1 ϱ ˜ ( ϵ , z ) q t ( z , t ) d z = ψ ( t ) ,
and
ϕ ( s , 0 ) = φ ( s , 0 ) 0 s χ ˜ ( s r ) φ ( r , 0 ) d r s ϵ κ ˜ ( r s ) φ ( r , 0 ) d r 0 1 ζ ˜ ( s , z ) q ( z , 0 ) d z 0 1 ϱ ˜ ( s , z ) q t ( z , 0 ) d z = φ 0 ( s ) 0 s χ ˜ ( s r ) φ 0 ( r ) d r s ϵ κ ˜ ( r s ) φ 0 ( r ) d r 0 1 ζ ˜ ( s , z ) q 0 ( z ) d z 0 1 ϱ ˜ ( s , z ) q 1 ( z ) d z = ϕ 0 ( s ) .
Then ( ϕ ( s , t ) , q ( y , t ) , q t ( y , t ) ) also satisfies the system (4). Accordingly, system (4) and system (5) are equivalent. □

2.2. The Solvability of Kernel Function Equations (8) and (10)

To obtain the solvability of Equations (8) and (10), first, introduce the following lemma.
Lemma 1 
([36]). Suppose X denote a Banach space, and A represent the infinitesimal generator of a C 0 semigroup T ( t ) on X , which satisfies T ( t ) M e w t . Provided that B is a bounded linear operator on X , the operator A + B generates a C 0 semigroup S ( t ) , with the property that S ( t ) M e w + M B t .
Theorem 3. 
The kernel Equation (8) has unique solutions χ ( s ) , κ ( s ) , ζ ( s , z ) , and ϱ ( s , z ) in the space H E 1 [ 0 , 1 ] × L 2 [ 0 , 1 ] , where
H E 1 [ 0 , 1 ] = f H 1 [ 0 , 1 ] f ( 0 ) = 0 , L 2 [ 0 , 1 ] = f L 2 [ 0 , 1 ] 0 1 f ( x ) 2 d x < .
Proof. 
According to the equation ζ ( s , z ) = ϱ s ( s , z ) , the solvability of the kernel function Equation (8) can be simplified as the solvability of the following equation:
ϱ s s ( s , z ) = ϱ z z ( s , z ) , z ( 0 , 1 ) , s ( 0 , ϵ ) , ϱ ( s , 0 ) = 0 , ϱ ( s , 1 ) = 0 , s ( 0 , ϵ ) , ϱ ( ϵ , z ) + ϱ ( 0 , z ) = ϱ 0 ( z ) , z ( 0 , 1 ) , ϱ s ( 0 , z ) + ϱ s ( ϵ , z ) = ζ 0 ( z ) , z ( 0 , 1 ) .
Define the norm in space H E 1 [ 0 , 1 ] × L 2 [ 0 , 1 ] as
( m , n ) 2 = 0 1 m ( y ) 2 d y + 0 1 n ( y ) 2 d y ,
then the space is a Hilbert space.
An operator A 0 is defined on the space H E 1 [ 0 , 1 ] × L 2 [ 0 , 1 ] as follows:
A 0 ( m , n ) T = ( n , m ) T , D ( A 0 ) = ( m , n ) H E 2 [ 0 , 1 ] × H E 1 [ 0 , 1 ] m ( 1 ) = 0 ,
then the Equation (11) can be rewritten as
d Q ( s ) d s = A 0 Q ( s ) , s > 0 , Q ( 0 ) = Q 0 ,
where Q ( s ) = ( ϱ ( s , z ) , ϱ s ( s , z ) ) T , and Q 0 = ( ϱ ( 0 , z ) , ϱ s ( 0 , z ) ) T . From [32], A 0 is a skew-adjoint operator on H E 1 [ 0 , 1 ] × L 2 [ 0 , 1 ] , and hence a C 0 semigroup T 0 ( s ) on this space is generated by A 0 . Consequently, Equation (11) admits a unique solution Q ( s ) . Given that χ ( s ) = ϱ z ( s , 1 ) and κ ( ϵ s ) = ϱ z ( s , 1 ) , the kernel Equation (6) possesses a unique solution consisting of χ ( s ) , κ ( s ) , ζ ( s , z ) , and ϱ ( s , z ) in the space H E 1 [ 0 , 1 ] × L 2 [ 0 , 1 ] . □
Theorem 4. 
The kernel Equation (10) possesses a unique solution χ ˜ ( s ) , κ ˜ ( s ) , ζ ˜ ( s , z ) , and ϱ ˜ ( s , z ) in the space H E 1 [ 0 , 1 ] × L 2 [ 0 , 1 ] .
Proof. 
Since the kernel Equation (10) can be reformulated in an alternative form:
s ϱ ˜ ( s , z ) ζ ˜ ( s , z ) = 0 1 z z 0 ϱ ˜ ( s , z ) ζ ˜ ( s , z ) ϱ 0 ( z ) ζ 0 ( z ) ϱ z ˜ ( s , 1 ) .
The definition of A 0 adheres to the formulation outlined in the demonstration of Theorem 3. Additionally, we define B 0 as follows:
B 0 ( m , n ) T = ( m 0 , n 0 ) T m ( 1 ) , D ( B 0 ) = { ( m , n ) H E 1 [ 0 , 1 ] × C 1 [ 0 , 1 ] m ( 0 ) = 0 } .
Subsequently, (12) can be reformulated as an evolutionary equation defined on H E 1 [ 0 , 1 ] × C 1 [ 0 , 1 ] :
d R ( s ) d s = A 0 R ( s ) + B 0 R ( s ) , R ( 0 ) = R 0 ,
where R ( s ) = ( ϱ ˜ ( s , z ) , ζ ˜ ( s , z ) ) T , and R 0 = ( ϱ ˜ ( 0 , z ) , ζ ˜ ( 0 , z ) ) T .
It is important to note that A 0 serves as the generator of a C 0 semigroup T 0 ( t ) on the space H E 1 [ 0 , 1 ] × L 2 [ 0 , 1 ] and B 0 is a bounded linear operator. By applying Lemma 1, it follows that a C 0 semigroup T 1 ( t ) is generated by A 1 = A 0 + B 0 on the same space as well. Consequently, the system of equations defined by (12) admits a unique solution comprising ζ ˜ ( s , z ) and ϱ ˜ ( s , z ) . Furthermore, from Equation (10), we derive the conditions χ ˜ ( s ) + ϱ z ˜ ( s , 1 ) = 0 , and χ ˜ ( ϵ r ) + κ ˜ ( r ) = 0 . Therefore, these relationships ensure that the kernel Equation (10) possesses a unique solution consisting of χ ˜ ( s ) , κ ˜ ( s ) , ζ ˜ ( s , z ) , and ϱ ˜ ( s , z ) within the space H E 1 [ 0 , 1 ] × L 2 [ 0 , 1 ] . □

2.3. The Boundedness of Transformations (7) and (9)

Theorem 5. 
In space H = L 2 [ 0 , ϵ ] × H E 1 [ 0 , 1 ] × L 2 [ 0 , 1 ] , the transformation (7) is bounded.
Proof. 
Define the norm in space H as
( ϕ , q , q 1 ) H 2 = 0 ϵ ϕ ( s ) 2 d s + 0 1 q ( y ) 2 d y + 0 1 q 1 ( y ) 2 d y ,
then H is a Hilbert space.
Let χ ( s ) , κ ( s ) , ζ ( s , z ) , and ϱ ( s , z ) be solutions to the kernel Equation (8), a linear operator J is described on the space H as follows:
φ ( s ) q ( y ) q 1 ( y ) = J ϕ ( s ) q ( y ) q 1 ( y ) = ( 1 χ ^ κ ^ ) ζ ^ ϱ ^ 0 1 0 0 0 1 ϕ ( s ) q ( y ) q 1 ( y ) ,
where its components specified as follows:
χ ^ : L 2 [ 0 , ϵ ] L 2 [ 0 , ϵ ] , χ ^ ϕ = 0 s χ ( s r ) ϕ ( r ) d r , ϕ L 2 [ 0 , ϵ ] , κ ^ : L 2 [ 0 , ϵ ] L 2 [ 0 , ϵ ] , κ ^ ϕ = s ϵ κ ( r s ) ϕ ( r ) d r , ϕ L 2 [ 0 , ϵ ] , ζ ^ : H E 1 [ 0 , 1 ] L 2 [ 0 , ϵ ] , ζ ^ q = 0 1 ζ ( s , z ) q ( z ) d z , q H E 1 [ 0 , 1 ] , η ^ : L 2 [ 0 , 1 ] L 2 [ 0 , ϵ ] , ϱ ^ q 1 = 0 1 ϱ ( s , z ) q 1 ( z ) d z . q 1 L 2 [ 0 , 1 ] .
For any ϕ L 2 [ 0 , ϵ ] ,
χ ^ ϕ L 2 2 = 0 ϵ 0 s χ ( s r ) ϕ ( r ) d r 2 d s 0 ϵ 0 s ϱ z ( s r , 1 ) 2 d r 0 s ϕ ( r ) 2 d r d s ,
so
χ ^ ϕ L 2 2 ϕ L 2 2 0 ϵ ( ϵ s ) ϱ z ( s , 1 ) 2 d s .
For any ϕ L 2 [ 0 , ϵ ] ,
κ ^ ϕ L 2 2 = 0 ϵ s ϵ κ ( r s ) ϕ ( r ) d r 2 d s 0 ϵ s ϵ ϱ z ( s + r ϵ , 1 ) 2 d r s ϵ ϕ ( r ) 2 d r d s ,
so
κ ^ ϕ L 2 2 ϕ L 2 2 0 ϵ ( ϵ s ) ϱ z ( s ϵ , 1 ) 2 d s .
For any q H E 1 [ 0 , 1 ] ,
ζ ^ q L 2 2 = 0 ϵ 0 1 ζ ( s , z ) q ( z ) d z 2 d s 0 ϵ 0 1 ζ ( s , z ) 2 d z 0 1 q ( z ) 2 d z d s ,
so
ζ ^ q L 2 2 1 2 q H 1 2 0 ϵ 0 1 ζ ( s , z ) 2 d z d s .
For any q 1 L 2 [ 0 , 1 ] ,
ϱ ^ q 1 L 2 2 = 0 ϵ 0 1 ϱ ( s , z ) q 1 ( z ) d z 2 d s 0 ϵ 0 1 ϱ ( s , z ) 2 d z 0 1 q 1 ( z ) 2 d z d s ,
so
ϱ ^ q 1 L 2 2 q 1 L 2 2 0 ϵ 0 1 ϱ ( s , z ) 2 d z d s .
From the definition of operators, we can see that χ ^ , κ ^ , ζ ^ , ϱ ^ are bounded linear operators. As a result, J is also a bounded linear operator on H . Furthermore, within the space H , the transformation (7) corresponds to the operator J . Thus, transformation (7) is bounded. □
Theorem 6. 
In space H = L 2 [ 0 , ϵ ] × H E 1 [ 0 , 1 ] × L 2 [ 0 , 1 ] , the transformation (9) is bounded.
Proof. 
Let χ ˜ ( s ) , κ ˜ ( s ) , ζ ˜ ( s , z ) , and ϱ ˜ ( s , z ) be solutions to the kernel Equation (9). In an analogous manner, we introduce a linear operator K on the space H , defined as follows:
ϕ ( s ) q ( y , s ) q 1 ( y , s ) = K φ ( s ) q ( y , s ) q 1 ( y , s ) = ( 1 χ ˜ ^ κ ˜ ^ ) ζ ˜ ^ ϱ ˜ ^ 0 1 0 0 0 1 φ ( s ) q ( y , s ) q 1 ( y , s ) ,
where χ ˜ ^ , κ ˜ ^ , ζ ˜ ^ , ϱ ˜ ^ are analogous to χ ^ , κ ^ , ζ ^ , ϱ ^ .
Similarly, we can draw a conclusion that K is a bounded linear operator on H . Within the space H , the transformation (9) corresponds to the operator K . Therefore, transformation (9) is bounded. □

3. Equivalence Between Systems (5) and (6)

3.1. The Transformation Between Systems (5) and (6)

Employing the idea from reference [37], we construct a linear transformation as follows:
φ ( s , t ) = φ ( s , t ) , g ( y , t ) = ( y ) q ( y , t ) 0 y 𝚥 ( y , z ) q ( z , t ) d z 0 y 𝚤 ( y , z ) q t ( z , t ) d z , g t ( y , t ) = ( y ) q t ( y , t ) 0 y 𝚥 ( y , z ) q t ( z , t ) d z 𝚤 ( y , y ) q y ( y , t ) + 𝚤 ( y , 0 ) q y ( 0 , t ) + 𝚤 z ( y , y ) q ( y , t ) 0 y 𝚤 z z ( y , z ) q ( z , t ) d z ,
where ( y ) , 𝚥 ( y , z ) , and 𝚤 ( y , z ) are unknown parameter functions.
First, if ( y ) , 𝚥 ( y , z ) , and 𝚤 ( y , z ) fulfill the subsequent formulas:
𝚥 y y ( y , z ) 𝚥 z z ( y , z ) = 2 b 𝚤 z z ( y , z ) + b 2 𝚥 ( y , z ) , y ( 0 , 1 ) , z ( 0 , y ) , b > 0 , 𝚤 y y ( y , z ) 𝚤 z z ( y , z ) = 2 b 𝚥 ( y , z ) + b 2 𝚤 ( y , z ) , 𝚥 ( y , 0 ) = 0 , 𝚤 ( y , 0 ) = 0 , 𝚥 ( y , y ) = ( y ) b 2 ( y ) 2 b 𝚤 z ( y , y ) 𝚥 z ( y , y ) 𝚥 y ( y , y ) , 𝚤 ( y ) = 2 b ( y ) 𝚤 z ( y , y ) 𝚤 y ( y , y ) , ( y ) = b 𝚤 ( y , y ) ,
according to the transformation (13), it follows that
g t t ( y , t ) = ( y ) q t t ( y , t ) 0 y 𝚥 z z ( y , z ) q ( z , t ) d z s y 𝚤 z z ( y , z ) q t ( z , t ) d z 𝚥 ( y , y ) q z ( y , t ) + 𝚥 ( y , 0 ) q z ( 0 , t ) + 𝚥 z ( y , y ) q ( y , t ) 𝚤 ( y , y ) q y t ( y , t ) + 𝚤 ( y , 0 ) q y t ( 0 , t ) + 𝚤 z ( y , y ) q t ( y , t ) ,
and
g y y ( y , t ) 2 b g t ( y , t ) b 2 g ( y , t ) = 0 y [ b 2 𝚥 ( y , z ) + 2 b 𝚤 z z ( y , z ) 𝚥 y y ( y , z ) ] q ( z , t ) d z 𝚤 ( y , y ) q y t ( y , t ) + s y [ b 2 𝚤 ( y , z ) + 2 b 𝚥 ( y , z ) 𝚤 y y ( y , z ) ] q t ( z , t ) d z + ( y ) q y y ( y , t ) + [ ( y ) 𝚥 y ( y , y ) 𝚥 ( y , y ) 2 b 𝚤 z ( y , y ) b 2 ( y ) ] q ( y , t ) + [ 2 ( y ) 𝚥 ( y , y ) + 2 b 𝚤 ( y , y ) ] q y ( y , t ) 2 b 𝚤 ( y , 0 ) q y ( 0 , t ) [ 𝚤 y ( y , y ) + 𝚤 ( y , y ) + 2 b ( y ) ] q t ( y , t ) .
Based on expression (14), we derive g t t ( y , t ) = g y y ( y , t ) 2 b g t ( y , t ) b 2 g ( y , t ) , which holds for for all y ( 0 , ϵ ) and t > 0 .
Second, if θ , ζ 0 ( z ) , and ϱ 0 ( z ) ssatisfy the following system of equations:
θ = ( 1 ) , ζ 0 ( z ) = 𝚥 ( 1 , z ) / ( 1 ) , ϱ 0 ( z ) = 𝚤 ( 1 , z ) / ( 1 ) ,
it follows that g ( 0 , t ) = 0 , and
g ( 1 , t ) = ( 1 ) q ( 1 , t ) 0 1 𝚥 ( 1 , z ) q ( z , t ) d z 0 1 𝚤 ( 1 , z ) q t ( z , t ) d z = ( 1 ) φ ( 0 , t ) + 0 1 [ ( 1 ) ζ 0 ( z ) 𝚥 ( 1 , z ) ] q ( z , t ) d z + 0 1 [ ( 1 ) ϱ 0 ( z ) 𝚤 ( 1 , z ) ] q t ( z , t ) d z = θ φ ( 0 , t ) ,
thus g ( y , t ) meets the boundary constraints of system (6).
Theorem 7. 
Suppose ( φ ( s , t ) , q ( y , t ) , q t ( y , t ) ) denote a solution of the system (5) and
( φ ( s , t ) , g ( y , t ) , g t ( y , t ) ) be described through the transformation (13). If functions ( y ) , 𝚥 ( y , z ) , 𝚤 ( y , z ) fulfill Equation (14) and if θ, ζ 0 ( z ) , ϱ 0 ( z ) fulfill Equation (15), so ( φ ( s , t ) , g ( y , t ) , g t ( y , t ) ) constitutes a solution to system (6).
Afterwards, we shall create the inverse mapping corresponding to the transformation (13):
φ ( s , t ) = φ ( s , t ) , q ( y , t ) = ˜ ( y ) g ( y , t ) 0 y 𝚥 ˜ ( y , z ) g ( z , t ) d z 0 y 𝚤 ˜ ( y , z ) g t ( z , t ) d z , q t ( y , t ) = ˜ ( y ) g t ( y , t ) 𝚤 ˜ ( y , y ) g y ( y , t ) + 0 y [ b 2 𝚤 ˜ ( y , z ) 𝚤 ˜ z z ( y , z ) ] g ( z , t ) d z + 𝚤 ˜ ( y , 0 ) g y ( 0 , t ) + 𝚤 z ( y , y ) g ( y , t ) + 0 y [ 2 b 𝚤 ˜ ( y , z ) 𝚥 ˜ ( y , z ) ] g t ( z , t ) d z ,
where ˜ ( y ) , 𝚥 ˜ ( y , z ) and 𝚤 ˜ ( y , z ) are unknown parameter functions.
First, if ˜ ( y ) , 𝚥 ˜ ( y , z ) and 𝚤 ˜ ( y , z ) fulfill the following formulas:
𝚤 ˜ y y ( y , z ) 𝚤 ˜ z z ( y , z ) = 3 b 2 𝚤 ˜ ( y , z ) 2 b 𝚥 ˜ ( y , z ) , y ( 0 , 1 ) , z ( 0 , y ) , b > 0 , 𝚥 ˜ y y ( y , z ) 𝚥 ˜ z z ( y , z ) = 2 b 3 𝚤 ˜ ( y , z ) b 2 𝚥 ˜ ( y , z ) 2 b 𝚤 ˜ z z ( y , z ) , 𝚥 ˜ ( y , 0 ) = 0 , 𝚤 ˜ ( y , 0 ) = 0 , 𝚥 ˜ ( y , y ) = ˜ ( y ) + b 2 ˜ ( y ) + 2 b 𝚤 ˜ z ( y , y ) 𝚥 ˜ z ( y , y ) 𝚥 ˜ y ( y , y ) , 𝚤 ˜ ( y , y ) = 2 b ˜ ( y ) 𝚤 ˜ z ( y , y ) 𝚤 ˜ y ( y , y ) , ˜ ( y ) = b 𝚤 ˜ ( y , y ) ,
according to the transformation (16), the calculation is as follows:
q t t ( y , t ) = ˜ ( y ) g t t ( y , t ) 2 b ˜ ( y ) g t ( y , t ) b 2 ˜ ( y ) g ( y , t ) + 2 b 𝚤 ˜ ( y , y ) g y ( y , t ) + 0 y [ 2 b 𝚤 ˜ z z ( y , z ) 𝚥 ˜ z z ( y , z ) 2 b 3 𝚤 ˜ ( y , z ) + b 2 𝚥 ˜ ( y , z ) ] q ( z , t ) d z + 0 y [ 2 b 𝚥 ˜ ( y , z ) 3 b 2 𝚤 ˜ ( y , z ) 𝚤 ˜ z z ( y , z ) ] q t ( z , t ) d z 2 b 𝚤 ˜ z ( y , y ) g ( y , t ) + 𝚥 ˜ ( y , 0 ) g y ( 0 , t ) 2 b 𝚤 ˜ ( y , 0 ) g y ( 0 , t ) + 𝚥 ˜ z ( y , y ) g ( y , t ) 𝚥 ˜ ( y , y ) g y ( y , t ) 𝚤 ˜ ( y , y ) g y t ( y , t ) + 𝚤 ˜ ( y , 0 ) g y t ( 0 , t ) + 𝚤 ˜ z ( y , y ) g t ( y , t ) ,
and
q y y ( y , t ) = ˜ ( y ) g ( y , t ) + 2 ˜ ( y ) g y ( y , t ) + ˜ ( y ) g y y ( y , t ) 𝚥 ˜ y ( y , y ) g ( y , t ) 𝚥 ˜ ( y , y ) g ( y , t ) 𝚥 ˜ ( y , y ) g y ( y , t ) 0 y 𝚥 ˜ y y ( y , y ) g ( z , t ) d z 𝚤 ˜ y ( y , y ) g t ( y , t ) 𝚤 ˜ ( y , y ) g t ( y , t ) 𝚤 ˜ ( y , y ) g y t ( y , t ) 0 y 𝚤 ˜ y y ( y , y ) g t ( z , t ) d z .
From the expression (18), it holds that q t t ( x , t ) = q x x ( x , t ) for any x ( 0 , 1 ) and t > 0 .
Second, if ˜ ( y ) , 𝚥 ˜ ( y , z ) and 𝚤 ˜ ( y , z ) fulfill the subsequent formulas:
θ ˜ ( 1 ) = 1 θ ϱ 0 ( 1 ) 𝚤 ˜ ( 1 , 1 ) , 𝚥 ˜ ( 1 , z ) = ζ 0 ( z ) ˜ ( z ) ϱ 0 ( z ) 𝚤 ˜ ( z , z ) ϱ 0 ( z ) 𝚤 ˜ ( z , z ) ϱ 0 ( z ) 𝚤 ˜ z ( z , z ) z 1 [ ϱ 0 ( y ) ( b 2 𝚤 ˜ ( y , z ) 𝚤 z z ˜ ( y , z ) ) ζ 0 ( y ) 𝚥 ( y , z ) ] d y 𝚤 ˜ ( 1 , z ) = ϱ 0 ( z ) ˜ ( z ) z 1 [ ϱ 0 ( y ) ( 2 b 𝚤 ˜ ( y , z ) 𝚥 ˜ ( y , z ) ) ζ 0 ( y ) 𝚤 ˜ ( y , z ) ] d y , 𝚤 ˜ ( z , 0 ) = 0 ,
it follows that q ( 0 , t ) = 0 , and
q ( 1 , t ) = ˜ ( 1 ) g ( 1 , t ) 0 1 𝚥 ˜ ( 1 , z ) g ( z , t ) d z 0 1 𝚤 ˜ ( 1 , z ) g t ( z , t ) d z = φ ( 0 , t ) + 0 1 ζ 0 ( z ) q ( z , t ) d z + 0 1 ϱ 0 ( z ) q t ( z , t ) d z ,
then q ( y , t ) meets the boundary constraints of system (5).
Theorem 8. 
Suppose ( φ ( s , t ) , g ( y , t ) , g t ( y , t ) ) denote a solution of the system (6) and
( ϕ ( s , t ) , q ( t ) , q t ( y , t ) ) be described through the transformation (15). If functions ˜ ( y ) , 𝚥 ˜ ( y , z ) , and 𝚤 ˜ ( y , z ) fulfill the Equations (17) and (18), so ( φ ( s , t ) , q ( y , t ) , q t ( y , t ) ) constitutes a solution to system (5).
Accordingly, systems (5) and (6) are equivalent.

3.2. The Solvability of Kernel Function Equations (14) and (17)

Theorem 9. 
The kernel function Equation (14) are solvable.
Proof. 
Based on the results presented in reference [37], the functions ( y ) , 𝚥 ( y , z ) , and 𝚤 ( y , z ) are solvable, although their solutions are not unique. Consequently, we select one particular solution as follows:
𝚥 ( y , z ) = b sinh ( b z ) , 𝚤 ( y , z ) = sinh ( b z ) , ( y ) = cosh ( b y ) .
Theorem 10. 
The kernel function Equation (17) are solvable.
Proof. 
In a similar manner, we choose one specific solution as follows:
𝚥 ˜ ( y , z ) = 2 b sinh ( b z ) , 𝚤 ˜ ( y , z ) = sinh ( b z ) , ˜ ( y ) = cosh ( b y ) .

3.3. The Boundedness of Transformations (13) and (16)

Theorem 11. 
In space H = L 2 [ 0 , ϵ ] × H E 1 [ 0 , 1 ] × L 2 [ 0 , 1 ] , the transformation (13) is bounded.
Proof. 
Let ( y ) , 𝚥 ( y , z ) , and 𝚤 ( y , z ) denote solutions to the kernel Equation (14). Based on these solutions, we introduce a linear operator P on H , defined as follows:
φ ( s ) g ( y ) g 1 ( y ) = P φ ( s ) q ( y ) q 1 ( y ) = I 0 0 0 Q 22 Q 23 0 Q 32 Q 33 ϕ ( s ) q ( y ) q 1 ( y ) ,
where its components specified as follows:
Q 22 : H E 1 [ 0 , 1 ] H E 1 [ 0 , 1 ] , Q 22 q ( y ) = ( y ) q ( y ) 0 y 𝚥 ( y , z ) q ( z ) d z , q H E 1 [ 0 , 1 ] , Q 23 : L 2 [ 0 , 1 ] H E 1 [ 0 , 1 ] , Q 23 q 1 ( y ) = 0 y 𝚤 ( y , z ) q 1 ( z ) d z , q 1 L 2 [ 0 , 1 ] , Q 32 : H E 1 [ 0 , 1 ] L 2 [ 0 , 1 ] , Q 32 q ( y ) = 𝚤 z ( y , y ) q ( y ) 𝚤 ( y , y ) q ( y ) 0 y 𝚤 z z ( y , z ) q ( z ) d z , q H E 1 [ 0 , 1 ] , Q 33 : L 2 [ 0 , 1 ] L 2 [ 0 , 1 ] Q 33 q 1 ( y ) = ( y ) q 1 ( y ) 0 y 𝚥 ( y , z q 1 ( z ) d z , q 1 L 2 [ 0 , 1 ] .
Therefore, operator Q is defined as
Q = Q 22 Q 23 Q 32 Q 33 .
From the results established in [32], it follows that Q is both bounded and invertible. As a result, P is also a bounded and invertible linear operator on H . What’s more, within the space H , the transformation (13) corresponds to the operator P . Therefore, transformation (13) is bounded. □
Theorem 12. 
In space H , the transformation (16) is bounded.
Proof. 
In space H , the transformation (16) is equivalent to the operator P 1 . According to Theorem 11 and reference [32], transformation (16) is bounded. □

4. The Stability of Systems (4) and (6)

According to the findings presented in reference [32], the following Theorem can be established.
Theorem 13. 
In space H = L 2 [ 0 , ϵ ] × H E 1 [ 0 , 1 ] × L 2 [ 0 , 1 ] , the target system (6) exhibits exponential stability.
Theorem 14. 
In space H , the closed-loop system (4) demonstrates exponential stability.
Proof. 
From the analysis presented above, it is evident that the system (4) is equivalent to the system (6):
φ ( s ) g ( y ) g 1 ( y ) = PJ ϕ ( s ) q ( y ) q 1 ( y ) = ( 1 χ ^ κ ^ ) ζ ^ ϱ ^ 0 Q 22 Q 23 0 Q 32 Q 33 ϕ ( s ) q ( y ) q 1 ( y ) ,
in accordance with Theorem 8, the system (4) also demonstrates exponential stability. □

5. Numerical Results

Within this section, mathematical simulations are conducted to verify the efficacy of the proposed control law. The dynamical behavior of system (1) is simulated using the following parameters:
q ( y , 0 ) = q 0 ( y ) = c o s ( 3 π y ) , q t ( y , 0 ) = q 1 ( y ) = s i n ( 3 π y ) ,
ϵ = 3 , b = 3 , θ = 3 , j ( s ) = s i n ( s ϵ ) .
In the absence of control function, system (1) is as described below:
q t t ( y , t ) = q y y ( y , t ) , y ( 0 , 1 ) , t > 0 , q ( 0 , t ) = 0 , q ( 1 , t ) = 0 , t > 0 , q ( y , 0 ) = c o s ( 3 π y ) , q t ( y , 0 ) = s i n ( 3 π y ) , y ( 0 , 1 ) , ψ ( s 3 ) = s i n ( s 3 ) . s ( 0 , 3 ) .
The resulting figure is shown in Figure 1.
For the control function, system (1) is as described below:
q t t ( y , t ) = q y y ( y , t ) , y ( 0 , 1 ) , t > 0 , q ( 0 , t ) = 0 , q ( 1 , t ) = ψ ( t ) + ψ ( t 3 ) , q ( y , 0 ) = c o s ( 3 π y ) , q t ( y , 0 ) = s i n ( 3 π y ) , y ( 0 , 1 ) , ψ ( s 3 ) = s i n ( s 3 ) , s ( 0 , 3 ) .
The resulting figure is shown in Figure 2.
All computations are implemented in MATLAB R2016a. The implicit Euler method and central finite difference approximations are employed, with the temporal and spatial grid sizes set to d y = 0.03 and d t = 0.01 , respectively. In Figure 1, no controller is applied, indicating that the system is unstable. The addition of a controller in Figure 2 shows that the system becomes stable. Therefore, the results in the figure above illustrate the effectiveness of the controller developed in this study.

6. Conclusions

The stability problem of a wave equation featuring boundary difference-type delay control is investigated in this study. We conclude that under the action of the integral feedback controller (3), the original system (1) achieves exponential stability, which has been verified by numerical simulations. Therefore, the controller designed in this article is effective.
Unlike traditional dynamic controller design, our approach establishes an equivalence between the system under study and a target system. The key advantage of our controller design method lies in its ability to ensure the stability of the original system by guaranteeing the stability of the target system. The primary challenge lies in rigorously proving the equivalence between the two systems. In future work, we aim to explore the design of more sophisticated control structures.

Author Contributions

Conceptualization, Y.X. and C.T.; writing—original draft preparation, C.T.; Writing—review and editing, Y.X. and Y.L.; funding acquisition, Y.X. and Y.L. All authors have read and agreed to the published version of the manuscript.

Funding

This research was funded by National Natural Science Foundation of China (NSFC) grant numbers 12301579, 12301569 and Special Fund for Basic Research Operating Costs of Central Universities grant number 3122019140.

Data Availability Statement

Data sharing is applicable.

Conflicts of Interest

The authors declare no conflicts of interest.

References

  1. Russell, D.L. Mathematical models for the elastic beam and their control-theoretic implications. Semigroups. Theory Appl. 1986, 2, 177–216. [Google Scholar]
  2. Lions, J.L. Exact controllability, stabilization and perturbations for distributed systems. SIAM Rev. 1988, 30, 1–68. [Google Scholar]
  3. Malek-Zavarei, M.; Jamshidi, M. Time-Delay Systems: Analysis, Optimization and Applications; Elsevier Science Inc.: Amsterdam, The Netherlands, 1987. [Google Scholar]
  4. Michiels, W.; Niculescu, S.I. Stability and Stabilization of Time-Delay Systems: An Eigenvalue-Based Approach; SIAM: Bangkok, Thailand, 2007. [Google Scholar]
  5. Datko, R.; Lagnese, J.; Polis, M. An example on the effect of time delays in boundary feedback stabilization of wave equations. SIAM J. Control Optim. 1986, 24, 152–156. [Google Scholar]
  6. Datko, R. Two examples of ill-posedness with respect to small time delays in stabilized elastic systems. IEEE Trans. Autom. Control 1993, 38, 163–166. [Google Scholar]
  7. Logemann, H.; Rebarber, R.; Weiss, G. Conditions for robustness and nonrobustness of the stability of feedback systems with respect to small delays in the feedback loop. SIAM J. Control Optim. 1996, 34, 572–600. [Google Scholar]
  8. Brahmi, B.; Driscoll, M.; Laraki, M.H.; Brahmi, A. Adaptive high-order sliding mode control based on quasi-time delay estimation for uncertain robot manipulator. Control Theory Technol. 2020, 18, 279–292. [Google Scholar]
  9. Sheng, Z.; Guo, Y.; Xue, A.; Han, W. Multi-sensor multi-target bearing-only tracking with signal time delay. Signal, Image Video Process. 2023, 17, 4495–4502. [Google Scholar] [CrossRef]
  10. Xia, Y.; Zhang, X.; Xia, S.; Wu, M.; Feng, Y. Pathological basal ganglia oscillations with time delays: A memoryless feedback control strategy. Control Theory Technol. 2024, 22, 1–13. [Google Scholar]
  11. Komornik, V. On the Nonlinear Boundary Stabilization of the Wave-Equation. Chin. Ann. Math. Ser. 1993, 14, 153–164. [Google Scholar]
  12. Komornik, V. Rapid boundary stabilization of linear distributed systems. SIAM J. Control Optim. 1997, 35, 1591–1613. [Google Scholar]
  13. Lasiecka, I.; Triggiani, R. Control Theory for Partial Differential Equations: Continuous and Approximation Theories. Encyclopedia of Mathematics and its Applications; Cambridge University Press: Cambridge, UK, 2000. [Google Scholar]
  14. Kobayashi, T. Stabilization of infinite-dimensional undamped second order systems by using a parallel compensator. Ima J. Math. Control Inf. 2004, 1, 85–94. [Google Scholar]
  15. Xu, G.Q. Stabilization of string system with linear boundary feedback. Nonlinear Anal. Hybrid Syst. 2007, 1, 383–397. [Google Scholar]
  16. Rebarber, R.; Townley, S. Robustness with respect to delays for exponential stability of distributed parameter systems. SIAM J. Control Optim. 1998, 37, 230–244. [Google Scholar]
  17. Dastan, Z.; Tavakoli-Kakhki, M. Suppression of high order disturbances and tracking for nonchaotic systems: A time-delayed state feedback approach. Control Theory Technol. 2022, 20, 54–68. [Google Scholar]
  18. Guo, B.Z.; Xu, C.Z.; Hammouri, H. Output feedback stabilization of a one-dimensional wave equation with an arbitrary time delay in boundary observation. ESAIM Control Optim. Calc. Var. 2022, 18, 22–35. [Google Scholar]
  19. Lhachemi, H.; Prieur, C. Boundary output feedback stabilisation of a class of reaction–diffusion PDEs with delayed boundary measurement. Int. J. Control 2023, 96, 2285–2295. [Google Scholar]
  20. Xu, G.Q.; Yung, S.P.; Li, L.K. Stabilization of wave systems with input delay in the boundary control. ESAIM Control Optim. Calc. Var. 2006, 12, 770–785. [Google Scholar]
  21. Nicaise, S.; Pignotti, C. Stability and instability results of the wave equation with a delay term in the boundary or internal feedbacks. SIAM J. Control Optim. 2006, 45, 1561–1585. [Google Scholar]
  22. Shang, Y.F.; Xu, G.Q. Stabilization of an Euler–Bernoulli beam with input delay in the boundary control. Syst. Control Lett. 2012, 61, 1069–1078. [Google Scholar]
  23. Wang, H.; Xu, G.Q. Exponential stabilization of 1-d wave equation with input delay. WSEAS Trans. Math. 2013, 12, 1001–1013. [Google Scholar]
  24. Liu, X.F.; Xu, G.Q. Exponential stabilization for Timoshenko beam with distributed delay in the boundary control. Abstr. Appl. Anal. 2013, 2013, 726794. [Google Scholar] [CrossRef]
  25. Han, Z.J.; Xu, G.Q. Output-based stabilization of Euler–Bernoulli beam with time-delay in boundary input. IMA J. Math. Control Inf. 2014, 31, 533–550. [Google Scholar] [CrossRef]
  26. Shang, Y.F.; Xu, G.Q. Dynamic feedback control and exponential stabilization of a compound system. J. Math. Anal. Appl. 2015, 422, 858–879. [Google Scholar] [CrossRef]
  27. Guo, Y.; Xu, G.; Guo, Y. Stabilization of the wave equation with interior input delay and mixed Neumann-Dirichlet boundary. Discret. Contin. Dyn. Syst.-B 2016, 21, 2491–2507. [Google Scholar] [CrossRef]
  28. Liu, X.P.; Xu, G.Q. Integral-Type Feedback Controller and Application to the Stabilization of Heat Equation with Boundary Input Delay. WSEAS Trans 2018, 17, 311–318. [Google Scholar]
  29. Feng, X.; Xu, G.; Chen, Y. Rapid stabilisation of an Euler–Bernoulli beam with the internal delay control. Int. J. Control 2019, 92, 42–55. [Google Scholar]
  30. Chen, H.; Xie, Y.; Genqi, X. Rapid stabilisation of multi-dimensional Schrödinger equation with the internal delay control. Int. J. Control 2019, 92, 2521–2531. [Google Scholar]
  31. Liu, X.P.; Xu, G.Q. Solvability of the nonlocal initial value problem and application to design of controller for heat-equation with delay. J. Math. Study 2019, 52, 127–159. [Google Scholar]
  32. Zhang, L.; Xu, G.Q.; Chen, H. Uniform stabilization of 1-d wave equation with anti-damping and delayed control. J. Frankl. Inst. 2020, 357, 12473–12494. [Google Scholar] [CrossRef]
  33. Xu, G.Q.; Zhang, L. Uniform stabilization of 1-D coupled wave equations with anti-dampings and joint delayed control. SIAM J. Control Optim. 2020, 58, 3161–3184. [Google Scholar] [CrossRef]
  34. Zhang, L.; Xu, G.Q.; Mastorakis, N.E. A new approach for stabilization of Heat-ODE cascaded systems with boundary delayed control. IMA J. Math. Control Inf. 2022, 39, 112–131. [Google Scholar]
  35. Xie, Y.; Chen, Y. Rapid Stabilization of Timoshenko Beam System with the Internal Delay Control. Acta Appl. Math. 2023, 186, 7. [Google Scholar] [CrossRef]
  36. Pazy, A. Semigroups of Linear Operators and Applications to Partial Differential Equations; Springer-Verlag: Berlin/Heidelberg, Germany, 1983. [Google Scholar]
  37. Smyshlyaev, A.; Cerpa, E.; Krstic, M. Boundary Stabilization of a 1-D Wave Equation with In-Domain Antidamping. SIAM J. Control Optim. 2010, 48, 4014–4031. [Google Scholar] [CrossRef]
Figure 1. q ( y , t ) without control law.
Figure 1. q ( y , t ) without control law.
Axioms 14 00280 g001
Figure 2. q ( y , t ) with control.
Figure 2. q ( y , t ) with control.
Axioms 14 00280 g002
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Xie, Y.; Tian, C.; Li, Y. Exponential Stability of a Wave Equation with Boundary Delay Control. Axioms 2025, 14, 280. https://doi.org/10.3390/axioms14040280

AMA Style

Xie Y, Tian C, Li Y. Exponential Stability of a Wave Equation with Boundary Delay Control. Axioms. 2025; 14(4):280. https://doi.org/10.3390/axioms14040280

Chicago/Turabian Style

Xie, Yaru, Congyue Tian, and Yanfang Li. 2025. "Exponential Stability of a Wave Equation with Boundary Delay Control" Axioms 14, no. 4: 280. https://doi.org/10.3390/axioms14040280

APA Style

Xie, Y., Tian, C., & Li, Y. (2025). Exponential Stability of a Wave Equation with Boundary Delay Control. Axioms, 14(4), 280. https://doi.org/10.3390/axioms14040280

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Article metric data becomes available approximately 24 hours after publication online.
Back to TopTop