Loading [MathJax]/jax/output/SVG/jax.js
Research article

An asymptotic-preserving scheme for isentropic flow in pipe networks

  • We considered the simulation of isentropic flow in pipelines and pipe networks. Standard operating conditions in pipe networks suggested an emphasis to simulate low Mach and high friction regimes—however, the system was stiff in these regimes and conventional explicit approximation techniques proved quite costly and often impractical. To combat these inefficiencies, we developed a novel asymptotic-preserving scheme that was uniformly consistent and stable for all Mach regimes. The proposed method for a single pipeline followed the flux splitting suggested in Haack et al., in which the flux was separated into stiff and non-stiff portions then discretized in time using an implicit-explicit approach. The non-stiff part was advanced in time by an explicit hyperbolic solver; we opted for the second-order central-upwind finite volume scheme. The stiff portion is advanced in time implicitly using an approach based on Rosenbrock-type Runge-Kutta methods, which ultimately reduced this implicit stage to a discretization of a linear elliptic equation. To extend to full pipe networks, the scheme on a single pipeline was paired with coupling conditions defined at pipe-to-pipe intersections to ensure a mathematically well-posed problem. We showed that the coupling conditions remained well-posed at the low Mach/high friction limit—which, when used to define the ghost cells of each pipeline, resulted in a method that was accurate across these intersections in all regimes. The proposed method was tested on several numerical examples and produced accurate, non-oscillatory results with run times independent of the Mach number.

    Citation: Michael T. Redle, Michael Herty. An asymptotic-preserving scheme for isentropic flow in pipe networks[J]. Networks and Heterogeneous Media, 2025, 20(1): 254-285. doi: 10.3934/nhm.2025013

    Related Papers:

    [1] Xiaohang Su, Peng Liu, Haoran Jiang, Xinyu Yu . Neighbor event-triggered adaptive distributed control for multiagent systems with dead-zone inputs. AIMS Mathematics, 2024, 9(4): 10031-10049. doi: 10.3934/math.2024491
    [2] Wei Zhao, Lei Liu, Yan-Jun Liu . Adaptive neural network control for nonlinear state constrained systems with unknown dead-zones input. AIMS Mathematics, 2020, 5(5): 4065-4084. doi: 10.3934/math.2020261
    [3] Shihua Zhang, Xiaohui Qi, Sen Yang . A cascade dead-zone extended state observer for a class of systems with measurement noise. AIMS Mathematics, 2023, 8(6): 14300-14320. doi: 10.3934/math.2023732
    [4] Hadil Alhazmi, Mohamed Kharrat . Echo state network-based adaptive control for nonstrict-feedback nonlinear systems with input dead-zone and external disturbance. AIMS Mathematics, 2024, 9(8): 20742-20762. doi: 10.3934/math.20241008
    [5] Giovanni G. Soares, Ernesto Estrada . Navigational bottlenecks in nonconservative diffusion dynamics on networks. AIMS Mathematics, 2024, 9(9): 24297-24325. doi: 10.3934/math.20241182
    [6] Guijun Xing, Huatao Chen, Zahra S. Aghayan, Jingfei Jiang, Juan L. G. Guirao . Tracking control for a class of fractional order uncertain systems with time-delay based on composite nonlinear feedback control. AIMS Mathematics, 2024, 9(5): 13058-13076. doi: 10.3934/math.2024637
    [7] Miao Xiao, Zhe Lin, Qian Jiang, Dingcheng Yang, Xiongfeng Deng . Neural network-based adaptive finite-time tracking control for multiple inputs uncertain nonlinear systems with positive odd integer powers and unknown multiple faults. AIMS Mathematics, 2025, 10(3): 4819-4841. doi: 10.3934/math.2025221
    [8] Le You, Chuandong Li, Xiaoyu Zhang, Zhilong He . Edge event-triggered control and state-constraint impulsive consensus for nonlinear multi-agent systems. AIMS Mathematics, 2020, 5(5): 4151-4167. doi: 10.3934/math.2020266
    [9] Fang Zhu, Pengtong Li . Adaptive fuzzy consensus tracking control of multi-agent systems with predefined time. AIMS Mathematics, 2025, 10(3): 5307-5331. doi: 10.3934/math.2025245
    [10] Mohsen Bakouri, Abdullah Alqarni, Sultan Alanazi, Ahmad Alassaf, Ibrahim AlMohimeed, Mohamed Abdelkader Aboamer, Tareq Alqahtani . Robust dynamic control algorithm for uncertain powered wheelchairs based on sliding neural network approach. AIMS Mathematics, 2023, 8(11): 26821-26839. doi: 10.3934/math.20231373
  • We considered the simulation of isentropic flow in pipelines and pipe networks. Standard operating conditions in pipe networks suggested an emphasis to simulate low Mach and high friction regimes—however, the system was stiff in these regimes and conventional explicit approximation techniques proved quite costly and often impractical. To combat these inefficiencies, we developed a novel asymptotic-preserving scheme that was uniformly consistent and stable for all Mach regimes. The proposed method for a single pipeline followed the flux splitting suggested in Haack et al., in which the flux was separated into stiff and non-stiff portions then discretized in time using an implicit-explicit approach. The non-stiff part was advanced in time by an explicit hyperbolic solver; we opted for the second-order central-upwind finite volume scheme. The stiff portion is advanced in time implicitly using an approach based on Rosenbrock-type Runge-Kutta methods, which ultimately reduced this implicit stage to a discretization of a linear elliptic equation. To extend to full pipe networks, the scheme on a single pipeline was paired with coupling conditions defined at pipe-to-pipe intersections to ensure a mathematically well-posed problem. We showed that the coupling conditions remained well-posed at the low Mach/high friction limit—which, when used to define the ghost cells of each pipeline, resulted in a method that was accurate across these intersections in all regimes. The proposed method was tested on several numerical examples and produced accurate, non-oscillatory results with run times independent of the Mach number.



    The rapid proliferation of cloud computing, the Internet of Things, and online video applications has led to an exponential surge in network traffic. This causes network capacity to quickly reach its limits, making congestion control a critical issue in ensuring efficient network operation. Since the birth of the Internet, the congestion problem of network transmission has received widespread attention[1,2,3,4,5]. For this reason, many methods to solve network congestion came into being. Traditional queue management policies adopt the "Drop-Tail" policy, which is easy to produce continuous full queue state, and even lead to data flow deadlock and global synchronization. Therefore, active queue management (AQM) has attracted the attention of many scholars[6]. It can effectively mitigates congestion, diminishes packet loss rates, enhances network utilization, and averts network crashes. The initial AQM algorithm introduced is Random Early Detection (RED), which computes the likelihood of packet loss based on the average queue length[7]. Although RED algorithm can effectively control the congestion in the network, the performance of RED algorithm can not adapt to the change of network load because it is sensitive to static parameters. In the following decades, many scholars have improved the RED algorithm[8,9], but these improved RED algorithms have high requirements for parameter tuning and are easily affected by the environment[10]. Due to the lack of systematic theory, the algorithm basically relies on intuition and inspiration, which leads to some problems in stability and robustness. To avoid this problem, Misra established a new TCP/AQM model based on fluid flow theory combined with stochastic differential equations, which laid the foundation for applying control theory to settle the corresponding congestion problem[11]. Due to the complexity of the network, scholars focus on different issues. Ren introduced an AQM algorithm grounded in linear control principles[12]. However, the AQM controller based on linear theory can not well compensate the nonlinearity of the network system, and is vulnerable to the disturbance of unresponsive flow and other factors, its robustness is poor, the stability of the algorithm is difficult to be guaranteed. [13] uses linear matrix inequality (LMI) to linearize the nonlinear model, and compensates the influence of uncertainty in the network through the designed sliding surface. These studies are based on linear systems, ignoring the nonlinear dynamic nature of TCP networks. Therefore, many scholars have proposed congestion control algorithms for nonlinear TCP networks. Liu applies the prescribed performance technology to the TCP/AQM congestion problem, and designs congestion control combined with H control, which can estimate the unknown link capacity[14]. Considering the dynamic nature of the session count during network transmission, Chen adapted the TCP/AQM model into a switching model. Subsequently, a network congestion controller was devised, integrating prescribed performance technology. This designed controller adeptly manages the frequent fluctuations in the number of sessions[15]. Furthermore, certain studies also use intelligent control methods[16], data segmentation methods[17] and various other control methodologies to formulate network congestion controllers. The author develops an AQM algorithm using Neural Network (NN) approaches and fuzzy variable structure control respectively[18,19]. The output weight of radial basis function NN was obtained by particle swarm optimization, and then AQM controller was implemented in [20].

    The dynamic nonlinear system of TCP network has saturation characteristics, which may deteriorate the performance of the network system and inducing instability of the system. Therefore, accounting for the saturation characteristics of the control input becomes imperative when designing AQM algorithm[21,22,23,24]. [21] considers the input constraint of the TCP network system, and replaces the non-differentiable saturation function with the smooth differentiable function, the designed AQM algorithm enables the system to obtain better asymptotic stability. [22] designs robust enhanced proportional derivatives affected by input saturation, and solves the controller design problem for linear systems with asymmetric constraints by the scaling small gain theorem. Considering the input saturation within the TCP/AQM system, Shen proposed a new AQM control combined with the prescribed performance control. Employing FLS, the approach effectively addresses error disturbances stemming from input saturation, thereby enhancing the overall control effectiveness of the system.[23]. Similarly, dead zone may exist in the actual dynamic system[25,26,27], although many scholars have noticed the input nonlinearity such as dead zone and saturation, have also proposed corresponding solutions, the existing researches on TCP network congestion control only consider the dynamic characteristics of a single characteristic. So the control problems of multi-type input nonlinearity, particularly those associated with uncertain nonlinearities, remain relatively scarce. In this paper, the effects of dead zone and saturation inputs concurrently on TCP network congestion control are considered at the same time, and the performance of the system is controlled effectively.

    In the Internet, under the influence of the environment, there are always some uncertainties in practical TCP network, such as the uncertainty of network parameters and unresponsive User Datagram Protocol (UDP) flows. At present, the most effective solution is to learn the uncertain functions in the nonlinear systems with the neural networks or the fuzzy logical systems[28,29,30,31,32]. Based on the approximate characteristics of FLS, Liu et al. introduced an adaptive fuzzy control scheme to improve the robustness and convergence of nonlinear stochastic switching systems[33]. In the context of a nonlinear system characterized by uncertain function constraints, a fuzzy state observer is devised to estimate the unmeasurable state variables, so that the system state is no longer constrained by the function[34]. Based on the above analysis, the application of FLS in TCP/AQM system can effectively alleviate the congestion problem. Mohammadi et al. proposed a PID controller for TCP/AQM systems with saturated input delay, which reduces packet loss and improves network utilization. In the design process of the controller, fuzzy algorithm is used to approximate the optimal PID control gain[35]. In view of the time-varying number of sessions during network transmission, Chen modified the TCP/AQM model into a switching model and established a network congestion controller combined FLS with prescribed performance technology, the designed controller can cope with frequent changes in the number of sessions[36]. The incorporation of FLS is undertaken to address unknown elements, accompanied by the formulation of a novel practical control law. The designed adaptive tracking controller ensures the actual boundary of all signals in the TCP/AQM network system [37].

    At present, in the big data environment, the number of network nodes and data traffic are very large, especially UDP flow represented by audio and video occupy a large amount of bandwidth. Therefore, Controlling traffic for a single node proves challenging in mitigating network congestion. Recognizing this, in the development of a congestion control algorithm, a holistic approach that considers the entire network becomes imperative to effectively avert congestion issues within the expansive realm of big data. Based on this, this paper studies delves into an exploration of an adaptive fuzzy control for AQM network nonlinear systems, incorporating considerations for both saturated input and dead zones. The principal contributions of this study can be summarized in the following three key points.

    (1) Considering the unknown response flow and the interplay among network nodes, this paper takes the TCP network as a whole and builds a multi-bottleneck TCP/AQM network model, which can more accurately describe the real network and improve the window utilization.

    (2) In this paper, for the first time, the dead zone and saturation input nonlinear characteristics of the network model are considered at the same time, by confining the input within the permissible range, this approach renders the model in this study notably more comprehensive and inclusive.

    (3) Combined with the backstepping technique, this paper designs the adaptive fuzzy control algorithm, which guarantees the steady-state and transient performance of the tracking error, allowing the queue length of nodes to effectively track the desired queue length.

    The subsequent sections of this paper are structured as follows: Section 2 provides the TCP network model and outlines the preliminaries. Section 3 presents the primary result. To illustrate the effectiveness of the proposed method, Section 4 conducts simulation experiments. Finally, Section 5 summarizes the conclusion.

    Building upon Misra's fluid model in 2001, this paper considers the following multi-bottleneck TCP network

    {˙Ws,i(t)=Ni(t)Ri(t)W2s,i(t)2Ni(t)Ri(t)pi(t)˙qi(t)=Ci(t)+Ws,i(t)Ri(t)nj=1Ws,j(t)Nj(t)+ωi(t) (2.1)

    where Ws,i(t) is the total congestion window size, Ri(t) is the round-trip delay, qi(t) is the queue length in the router, pi(t) is the probability of packet loss, Ni(t) and Ci(t) is the number of TCP sessions and available link capacity, respectively. ωi(t) is the external disturbance caused by unresponsive flows like UDP flows. i is the i-th network node.

    Remark 1. A multi-bottleneck TCP/AQM network is different from a single-bottleneck network in that it contains multiple bottleneck nodes. In the transmission process, the upstream node acts as the sender of the downstream node, and its link capacity is affected by the adjustment of the downstream node to the size of the sender window. Hence, in formulating the network model, this paper takes into account how downstream nodes affect the link capacity of upstream nodes. It is worth noting that the queue capacity of each bottleneck node is usually not the same, making its transmission model different.

    Due to the complexity of multi-bottleneck networks, the queue length in single-bottleneck networks is no longer suitable. Therefore, in the congestion control design, this paper considers tracking the queue usage rate qu,i. Assuming the known total number of queues that a single router can accommodate, denoted as qmax, and the queue usage rate of a single router as qu,i=qiqmax, model (2.1) can be reformulated as follows:

    {˙Ws,i(t)=Ni(t)Ri(t)W2s,i(t)2Ni(t)Ri(t)pi(t)˙qu,i(t)=˙qi(t)qmax,i=Ws,i(t)Ri(t)qmax,iCi+nj=1aijWs,j(t)Nj(t)qmax,i+ωi(t). (2.2)

    Let x1,i=qu,i, x2,i=Ws,i(t), NiN+, The network dynamics model (2.2) can be written as

    {˙x1,i=fi(x2,i)Ci+nj=1aijx2,j(t)Nj(t)qmax,i+ωi(t)˙x2,i=gσ(t),i(x2,i)+hσ(t),i(x2,i)ui(t)yi=x1,i (2.3)

    where fi(x2,i)=x2,iRi(t)qmax,i, gσ(t),i=Nσ(t),i(t)Ri(t), hσ(t),i(x2,i)=x22,i(t)2Nσ(t),i(t)Ri(t), ui(t)=pi(t), σ(t):[0,)N=1,,Nmax is switching signal.

    Assumption 1. Suppose that the unknown disturbance ωi(t) is bounded, and 0ωiωmax.

    ui(t) is a nonsymmetric dead-zone input nonlinearity which is defined as follows:

    D(u)={mr(uur),uur0,ul<u<urml(uul),uul (2.4)

    where the parameters ur>0 and ul<0 represent the breakpoints of control signal nonlinearity. ml>0 and mr>0 denote the right slope and the left slope of the dead zone.

    Given that the control signal ui(t) for TCP/AQM represents the marking probability, with a value range of [0,1], the system input is constrained by nonlinear saturation as defined by

    sat(u)={umax,u>umaxu,uminuumaxumin,u<umin=(u)u (2.5)

    where umax>0 and umin>0 are unknown constants, respectively.

    Let's assume umax>mrur and umin>mlul. Defined (u) as follows:

    (u)={umaxu,u>umax1,uminuumaxuminu,u<umin. (2.6)

    Obviously, (u)R and η(u)1, where η>0 is an unknown constant.

    Remark 2. Significantly, both the input dead zone and saturation characteristics of the network model are considered in this paper, which makes the application more extensive.

    Thus, according to (2.4–2.6), sat(D(u)) can be characterized as

    sat(D(u))={umaxD(u)D(u)=(D(u))mr(uur),u>umaxmr+urmr(uur),umaxmr+uru>umax0,uminuumaxml(uul),uminml+ulu<uluminD(u)D(u)=(D(u))ml(uul),u<uminml+ul. (2.7)

    Consider the jth IF-THEN rule of the following form:

    R: IF x1 is F1 and and xn is Fn.

    Then y is G, l=1,2,,N, where x=[x1,x2,,xn]TRn, and yR are input and output of the FLS, respectively. Fi and G are fuzzy sets in R. By using the singleton fuzzification, the product inference and the center-average defuzzification, the FLS can be given as

    y(x)=N=1φni=1μFi(ˉxi)n=1[ni=1μFi(ˉxi)]

    where N is the number of IF-THEN rules, ϖj is the point at which fuzzy membership function μP(ϖ)=1.

    Let

    ζ(x)=ni=1μFi(xi)N=1[ni=1μFi(xi)]

    where ζ(x)=[ζ1(x),ζ2(x),,ζN(x)]T Then the FLS can be described as

    y=φTζ(x). (2.8)

    Lemma 1. [38] Let f(x) be a continuous function defined on a compact set Ω. Then, for ϵ>0, there exists a FLS (2.8) such that

    supxΩ|f(x)φTζ(x)|ϵ. (2.9)

    Lemma 2. (Young's inequality) For (x,y)R2, the following inequality holds:

    xyαpp|x|p+1qαq|y|q, (2.10)

    where α>0, p>1, q>1, and (p1)(q1)=1.

    Lemma 3. For 1in, there is an unknown constant b>0 that satisfies:

    |hσ(t),i|b. (2.11)

    This section introduces an adaptive fuzzy control scheme utilizing the backstepping method for system (2.3). The backstepping design scheme includes n steps. First of all, the transfer error of network nodes is given as follows:

    {z1,i=nj=1aij(yiyj)+(yiyref)z2,i=x2,iα1,i (3.1)

    where α1,i is the virtual control law and yref is the tracking objective function.

    Theorem 1. Under assumption 1, using virtual control law (3.2), adaptive law (3.3), (3.4) and control law (3.12), multi-bottleneck TCP/AQM system (2.2) exhibits the following characteristics:

    (1) The queue length required for the output tracking of the system.

    (2) All signals within the closed-loop system are semi-globally uniform and ultimately bounded.

    (3) The tracking error of each bottleneck node converges to a small neighborhood near the origin.

    Before designing the controller, it is necessary to establish the constants θk,i=Φk,i2,k=1,2,,n, where ˆθk,i represents the estimation of θk,i, with the estimation error denoted as ˜θk,i=θk,iˆθk,i.

    Select the virtual control law and adaptive law as follows:

    α1,i=Rqmax,idi(Ci+nj=1aijxi,jNjqmax,idi+˙qref12a21z1,iˆθ1,iξT1,iξ1,i). (3.2)
    ˙ˆθ1,i=r12a21z21,iξT1,iξ1,iτ1,iˆθ1,i. (3.3)
    ˙ˆθ2,i=r22a22z22,iξT2,iξ2,iτ2,iˆθ2,i. (3.4)

    Step 1. Consider the following Lyapunov function:

    V1,i=12z21,i+12r1˜θ21,i. (3.5)

    Then, differentiating V1,i with respect to time results in

    ˙V1,i=z1,i[nj=1,jiaij(yiyj)+(yiyref)]1r1˜θ1,i˙ˆθ1,i=z1,i[nj=1,jiaij(fi(x2,i)Ci+nj=1aijx2,jNjqmax,i+ωi(t))nj=1,jiaij(fj(x2,j)Cj+nk=1ajkx2,kNkqmax,jωi(t))+(fi(x2,i)Ci+nj=1aijx2,jNjqmax,i+ωj(t)˙qref)]1r1˜θ1,i˙ˆθ1,i. (3.6)

    Let Nj=1aij+1=di, then (3.6) can be written as

    ˙V1,i=z1,i[di(fi(x2,i)Ci+nj=1aijx2,jNjqmax,i)˙qrefnj=1,jiaij(fj(x2,j)Cj+nk=1ajkx2,kNkqmax,j+ωj(t))+diωi(t)]1r1˜θ1,i˙ˆθ1,i. (3.7)

    The following nonlinear functions are approximated by FLS. According to Lemma 1, there are fuzzy logic functions ΦT1,iξ1,i(X) that satisfy

    F1,i(X)=nj=1,jiaij(fj(x2,j)Cj+nk=1ajkx2,kNkqmax,j+ωj(t))+diωi(t)=ΦT1,iξ1,i(X)+ϵ1,i(X),ϵ1,i(X)ε1,i.

    From young's inequality of Lemma 2

    z1,iF1,i(X)=z1,iΦT1,iξ1,i(X)+z1,iϵ1,i(X)12a21z21,iθ1,iξT1,iξ1,i+12a21+12z21,i+12ε21,i.

    Therefore, (3.7) can be reformulated as

    ˙V1,iz1,i[di(fi(x2,i)Ci+nj=1aijx2,jNjqmax,i)˙qref]+12a21z21,iθ1,iξT1,iξ1,i+12a21+12z21,i+12ε21,i1r1˜θ1,i˙ˆθ1,i. (3.8)

    According to the (3.3), we have

    1r1˜θ1,i˙ˆθ1,i=12a21z21,i˜θ1,iξT1,iξ1,iτ1,ir1˜θ1,iˆθ1,i.

    It is noted that

    τ1,ir1˜θ1,iˆθ1,iτ1,i2r1˜θ21,i+τ1,i2r1θ21,i.

    Due to z2,i=x2,iα1,ix2,i=z2,i+α1,i. Substituting (3.2) into (3.8), the calculation of V1,i can be determined as:

    ˙V1,idiRqmax,iz1,iz2,i+12a21+12z21,i+12ε21,iτ1,i2r1˜θ21,i+τ1,i2r1θ21,i. (3.9)

    Step 2. Consider the following Lyapunov function:

    V2,i=V1,i+12z22,i+12r2˜θ22,i. (3.10)

    The computation of the derivative of V2,i is expressed as follows:

    ˙V2,i=˙V1,i+z2,i[gσ(t),i(x2,i)+hσ(t),i(x2,i)sat(D(ui))˙α1,i]1r2˜θ2,i˙ˆθ2,i. (3.11)

    Define the following control laws:

    ui={uiˆθ2,i+ur,i,z2,i<0uiˆθ2,i+ul,i,z2,i0 (3.12)

    where ui0, θ2,i=hσ(t),iηimi and mi=min{mr,i,ml,i}.

    We'll delve into the discussion of the following two cases:

    Case 1:z2,i<0

    Since z2,i<0, It follows from (3.12) that one has

    ui=uiˆθ2,i+ur,i.

    Since ui>ur,i, from (2.4), one has

    D(u)=mr,i(uiur,i).

    For the analysis of sat(D(ui)), we have the following two cases:

    (1) uiumax,imr,i+ur,i

    From (2.7), it gives

    sat(D(ui))=mr,i(uiur,i). (3.13)

    According to Lemma 3 and combine (3.12) and (3.13), we have

    z2,ihσ(t),isat(D(ui))z2,ibmr,i(uiur,i)=z2,ibmr,iuiˆθ2,i. (3.14)

    This case is based on z2,i<0 discussion, one has z2,i=|z2,i|. Then, (3.14) can be rewritten as

    z2,ihσ(t),isat(D(ui))z2,ibmr,iuiˆθ2,i|z2,i|ηibmr,iuiˆθ2,i (3.15)

    where 0<ηi(D(ui))1.

    Substituting (3.15) into (3.11) yields

    ˙V2,i˙V1,i+z2,igσ(t),i(x2,i)|z2,i|ηibmr,iuiˆθ2,iz2,i˙α1,i1r2˜θ2,i˙ˆθ2,i. (3.16)

    (2) ui>umax,imr,i+ur,i

    From (2.7), it gives

    sat(D(ui))=umax,iD(ui)D(ui)=(D(ui))mr,i(uiur,i). (3.17)

    According to Lemma 3 and combine (3.12), (3.17), we have

    z2,ihσ(t),isat(D(ui))z2,ib(D(ui))mr,i(uiur,i)=z2,ib(D(ui))mr,iuiˆθ2,i. (3.18)

    Since 0<ηi<(D(ui))1, similar to (3.15), we have

    z2,ihσ(t),isat(D(ui))|z2,i|bηimr,iuiˆθ2,i. (3.19)

    Substituting (3.19) into (3.11) yields

    ˙V2,i˙V1,i+z2,igσ(t),i(x2,i)|z2,i|ηibmr,iuiˆθ2,iz2,i˙α1,i1r2˜θ2,i˙ˆθ2,i. (3.20)

    Based on the above discussion of (1) and (2), in Case 1, when subjected to the control law defined in (3.12), (3.11) can be formulated as

    ˙V2,i˙V1,i+z2,igσ(t),i(x2,i)|z2,i|ηibmr,iuiˆθ2,iz2,i˙α1,i1r2˜θ2,i˙ˆθ2,i. (3.21)

    Case 2:z2,i0

    Since z2,i0, It follows from (3.12) that one has

    ui=uiˆθ2,i+ul,i.

    Since uiur,i, from (2.4), one has

    D(u)=ml,i(uiul,i).

    For the analysis of sat(D(ui)), we have the following two cases:

    (1) uiumin,iml,i+ul,i

    From (2.7), it gives

    sat(D(ui)=ml,i(uiul,i). (3.22)

    According to Lemma 3 and combine (3.12), (3.22), we have

    z2,ihσ(t),isat(D(ui))z2,ibml,i(uiul,i)=z2,ibml,iuiˆθ2,i. (3.23)

    This case is based on z2,i<0 discussion, one has z2,i=|z2,i|. Then, (3.23) can be rewritten as

    z2,ihσ(t),isat(D(ui))z2,ibml,iuiˆθ2,i|z2,i|ηibml,iuiˆθ2,i, (3.24)

    where 0<ηi(D(ui))1.

    Substituting (3.24) into (3.11) yields

    ˙V2,i˙V1,i+z2,igσ(t),i(x2,i)|z2,i|ηibml,iuiˆθ2,iz2,i˙α1,i1r2˜θ2,i˙ˆθ2,i. (3.25)

    (2) ui<umin,iml,i+ul,i

    From (2.7), it gives

    sat(D(ui))=umax,iD(ui)D(ui)=(D(ui))ml,i(uiul,i). (3.26)

    According to Lemma 3 and combine (3.12), (3.26), we have

    z2,ihσ(t),isat(D(ui))z2,ib(D(ui))ml,i(uiul,i)=z2,ib(D(ui))ml,iuiˆθ2,i. (3.27)

    Since 0<ηi<(D(ui))1, similar to (3.24), we have

    z2,ihσ(t),isat(D(ui))|z2,i|bηiml,iuiˆθ2,i. (3.28)

    Substituting (3.28) into (3.11) yields

    ˙V2,i˙V1,i+z2,igσ(t),i(x2,i)|z2,i|ηibml,iuiˆθ2,iz2,i˙α1,i1r2˜θ2,i˙ˆθ2,i. (3.29)

    Based on the above discussion of (1) and (2), in Case 2, when subjected to the control law defined in (3.12), (3.11) can be formulated as

    ˙V2,i˙V1,i+z2,igσ(t),i(x2,i)|z2,i|ηibml,iuiˆθ2,iz2,i˙α1,i1r2˜θ2,i˙ˆθ2,i. (3.30)

    Due to θ2,i=hσ(t),iηimi and mi=min{mr,i,ml,i}, the following inequalities are obtained:

    |z2,i|ηibmr,iuiˆθ2,i|z2,i|θ2,iuiˆθ2,i|z2,i|ηibml,iuiˆθ2,i|z2,i|θ2,iuiˆθ2,i.

    Therefore, according to the discussions in Cases 1 and 2, from (3.20) and (3.29), we have

    ˙V2,i˙V1,i+z2,igσ(t),i(x2,i)|z2,i|θ2,iuiˆθ2,iz2,i˙α1,i1r2˜θ2,i˙ˆθ2,i. (3.31)

    According to Lemma 1, we can approximate the unknown function F2,i(X) using fuzzy logic functions ΦT2,iξ2,i(X). Similarly, one easily obtains

    z2,i˙α1,i12a22z22,iθ2,iξT2,iξ2,i+12a22+12z22,i+12ε22,i. (3.32)

    Following a procedure akin to Step 1, we can derive the subsequent inequality:

    1r2˜θ2,i˙ˆθ2,i=12a22z22,i˜θ2,iξT2,iξ2,iτ2,ir2˜θ2,iˆθ2,iτ2,ir2˜θ2,iˆθ2,iτ2,i2r2,i˜θ22,i+τ2,i2r2θ22,i. (3.33)

    It follows from the young's inequality that we have

    z2,igσ(t),i=z2,iNσ(t),iRz22,iN2σ(t),i2R2+12. (3.34)

    Applying (3.32)–(3.34), we have

    ˙V2,i˙V1,i|z2,i|θ2,iuiˆθ2,i+12z22,i(Nσ(t),iR)2+12a22z22,iθ2,iξT2,iξ2,i12a22z22,i˜θ2,iξT2,iξ2,i+12a22+12z22,i+12ε22,i+12τ2,i2r2˜θ22,i+τ2,i2r2θ22,i. (3.35)

    Now, ui in control law ui can be defined by

    ui=1θ2,iˆθ2,i[12(diRqmax,i)2z21,iz2,i+12z2,i(Nσ(t),iR)212a22z2,iˆθ2,iξT2,iξ2,i]. (3.36)

    Substituting (3.9) and (3.36) into (3.35) yields

    ˙V2,i12z21,i+12a21+12ε21,iτ1,i2r1˜θ21,i+τ1,i2r1θ21,i+12z22,i+12a22+12ε22,iτ2,i2r2˜θ22,i+τ2,i2r2θ22,iKiV2,i+i (3.37)

    where Ki=min{1,τ1,i,τ2,i}, i=2j=1(12a2j+12ε2j,i+τj,i2rjθ2j,i).

    Consider the following Lyapunov function:

    V=ni=1V2,i. (3.38)

    Substitute V2,i, the derivative of (3.38) can be given by

    ˙VKV+ (3.39)

    where K=ni=1Ki, =ni=1i.

    Obviously, V satisfies the following inequality

    0VeKtV(0)+K. (3.40)

    It is readily apparent from (3.40) that V is bounded. The demonstration of Theorem 1 is now concluded.

    This chapter simulates the proposed AQM network congestion control algorithm and evaluates the efficiency and superiority of the controller. A multi-bottleneck network featuring three bottlenecks is examined, and its topology is illustrated in Figure 1. Matlab is used to simulate the presented method, the parameters of the TCP/AQM network system are set as follows:

    c1,1=3;c1,2=3;c1,3=3;c2,1=15000;c2,2=9000;c2,3=9000;a1=1;a2=5;r1=1;r2=0.003;d1=1;d2=2;d3=2;R=0.08;N1=85;N2=85;N3=80;C=3500;qref=0.25;qmax,1=730;qmax,2=750;qmax,3=720;ω=cos(t).
    Figure 1.  Multi-bottleneck network topology.

    The initial state of the system is x0=[0.205,1,0.205,1,0.205,1,1,1,1,1, 1,1,1], and the results of the simulations are depicted in Figures 28.

    Figure 2.  The queue length.
    Figure 3.  The tracking error.
    Figure 4.  The packet loss probability.
    Figure 5.  The adaptive law.
    Figure 6.  The comparison results of node 1.
    Figure 7.  The comparison results of node 2.
    Figure 8.  The comparison results of node 3.

    In Figure 2, the dynamic evolution of the queue length for each node is illustrated. Notably, as the target queue length is set at 180, the queue length for each node converges to a stable state, demonstrating a rapid response and effective control. This underscores the robustness and superiority of the AQM scheme devised in this paper.

    Figure 3 showcases the trajectory of the tracking error for each node. As depicted in the Figure 3, the tracking error remains stable, confined within the specified upper and lower bounds, and converges in close proximity to the origin. This observation underscores the superior transient performance of the controller devised in this paper.

    In Figure 4, the packet loss probability is introduced, and it is obvious that the packet loss probability is always in p[0,1].

    Figure 5 represents the variation of the adaptive law. After 1s, the adaptive law tends to be stable and bounded, indicating that the controller formulated in this paper can make good use of the adaptive law for precise estimation of link capacity.

    In order to verify the effectiveness of the proposed algorithm, the tracking error and queue length are compared respectively. The comparison results are shown in Figures 611. The comparison objects are the proposed algorithm, single bottleneck network (different topographs)[31], EO-PID[39], PSO-PID, and RED.

    Figure 9.  The comparison results of node 1.
    Figure 10.  The comparison results of node 2.
    Figure 11.  The comparison results of node 3.

    In Figures 6-8, obviously, the single-bottleneck network and the multi-bottleneck network in this paper are the most stable in the experimental results. The single-bottleneck network tends to be stable at 0.88s, while the multi-bottleneck network in this paper tends to be stable at 1.56s. However, it is worth noting that the queue length of the multi-bottleneck network in this paper is 2.5 times that of the single bottleneck, so the multi-bottleneck network in this paper is more suitable for actual congestion control.

    In Figures 68, the tracking error of the five algorithms tends to 0 stably, but EO-PID and PSO-PID have obvious jitter, while the tracking error of RED is stable but larger than that of other algorithms. Compared with other algorithms, the tracking error of the multi-bottleneck network and the single-bottleneck network in this paper is the most stable and the smallest. Careful comparison shows that the multi-bottleneck network in this paper is superior to the single-bottleneck network. It shows that the multi-bottleneck AQM algorithm in this paper has good robustness.

    In this paper, a novel adaptive congestion control algorithm is developed specifically for multi-bottleneck TCP/AQM network system, considering both dead zone and saturated input interference for the first time. Combined with the approximation characteristics of the FLS and the backstepping technology, the algorithm regards the multi-bottleneck network as a cohesive entity. The adaptive fuzzy controller enhances the robustness of individual nodes within the multi-bottleneck network, and all the network nodes can track the required queue length according to different queue capacity. Finally, through simulation, the feasibility of the designed AQM network congestion control algorithm is verified.

    The authors declare they have not used Artificial Intelligence (AI) tools in the creation of this article.

    This project is funded by the National Natural Science Foundation of China, No. 61932005.

    The authors have declared no conflicts of interest.



    [1] A. Osiadacz, Simulation and analysis of gas networks, 1987. Available from: https://www.osti.gov/biblio/5141539.
    [2] A. Bressan, S. Čanić, M. Garavello, M. Herty, B. Piccoli, Flows on networks: Recent results and perspectives, EMS Surv. Math. Sci., 1 (2014), 47–111. https://doi.org/10.4171/emss/2 doi: 10.4171/emss/2
    [3] J. Brouwer, I. Gasser, M. Herty, Gas pipeline models revisited: Model hierarchies, nonisothermal models, and simulations of networks, Multiscale Model. Simul., 9 (2011), 601–623. https://doi.org/10.1137/100813580 doi: 10.1137/100813580
    [4] H. Guillard, C. Viozat, On the behaviour of upwind schemes in the low Mach number limit, Comput. Fluids, 28 (1999), 63–86. https://doi.org/10.1016/S0045-7930(98)00017-6 doi: 10.1016/S0045-7930(98)00017-6
    [5] H. Guillard, A. Murrone, On the behavior of upwind schemes in the low Mach number limit: Ⅱ. Godunov type schemes, Comput. Fluids, 33 (2004), 655–675. https://doi.org/10.1016/j.compfluid.2003.07.001 doi: 10.1016/j.compfluid.2003.07.001
    [6] F. Rieper, On the dissipation mechanism of upwind-schemes in the low Mach number regime: A comparison between roe and hll, J. Comput. Phys., 229 (2010), 221–232. https://doi.org/10.1016/j.jcp.2009.09.043 doi: 10.1016/j.jcp.2009.09.043
    [7] S. Jin, Runge-Kutta methods for hyperbolic conservation laws with stiff relaxation terms, J. Comput. Phys., 122 (1995), 51–67. https://doi.org/10.1006/jcph.1995.1196 doi: 10.1006/jcph.1995.1196
    [8] S. Jin, Efficient asymptotic-preserving (AP) schemes for some multiscale kinetic equations, SIAM J. Sci. Comput., 21 (1999), 441–454. https://doi.org/10.1137/S1064827598334599 doi: 10.1137/S1064827598334599
    [9] J. Hu, S. Jin, Q. Li, Asymptotic-preserving schemes for multiscale hyperbolic and kinetic equations, In: Handbook of Numerical Analysis, Elsevier, 18 (2007), 103–129. https://doi.org/10.1016/bs.hna.2016.09.001
    [10] J. Hu, R. Shu, X. Zhang, Asymptotic-preserving and positivity-preserving implicit-explicit schemes for the stiff BGK equation, SIAM J. Numer. Anal., 56 (2018), 942–973. https://doi.org/10.1137/17M1144362 doi: 10.1137/17M1144362
    [11] S. Jin, L. Pareschi, G. Toscani, Uniformly accurate diffusive relaxation schemes for multiscale transport equations, SIAM J. Numer. Anal., 38 (2000), 913–936. https://doi.org/10.1137/S0036142998347978 doi: 10.1137/S0036142998347978
    [12] S. Jin, Asymptotic preserving (AP) schemes for multiscale kinetic and hyperbolic equations: A review, Riv. Math. Univ. Parma (N.S.), 3 (2012), 177–216.
    [13] S. Jin, Asymptotic-preserving schemes for multiscale physical problems, Acta Numer., 31 (2022), 415–489. https://doi.org/10.1017/S0962492922000010 doi: 10.1017/S0962492922000010
    [14] W. Ren, H. Liu, S. Jin, An asymptotic-preserving Monte Carlo method for the Boltzmann equation, J. Comput. Phys., 276 (2014), 380–404. https://doi.org/10.1016/j.jcp.2014.07.029 doi: 10.1016/j.jcp.2014.07.029
    [15] B. Zhang, H. Liu, S. Jin, An asymptotic preserving Monte Carlo method for the multispecies Boltzmann equation, J. Comput. Phys., 305 (2016), 575–588. https://doi.org/10.1016/j.jcp.2015.11.006 doi: 10.1016/j.jcp.2015.11.006
    [16] F. Fei, A time-relaxed Monte Carlo method preserving the Navier-Stokes asymptotics, J. Comput. Phys., 486 (2023), 112128. https://doi.org/10.1016/j.jcp.2023.112128 doi: 10.1016/j.jcp.2023.112128
    [17] F. Fei, A Navier-Stokes asymptotic preserving Direct Simulation Monte Carlo method for multi-species gas flows, arXiv preprint arXiv: 2410.20322, 2024.
    [18] S. Jin, Z. Ma, K. Wu, Asymptotic-preserving neural networks for multiscale time-dependent linear transport equations, J. Sci. Comput., 94 (2023), 57. https://doi.org/10.1007/s10915-023-02100-0 doi: 10.1007/s10915-023-02100-0
    [19] S. Jin, Z. Ma, K. Wu, Asymptotic-preserving neural networks for multiscale kinetic equations, Commun. Comput. Phys., 35 (2024), 693–723. https://doi.org/10.4208/cicp.oa-2023-0211 doi: 10.4208/cicp.oa-2023-0211
    [20] K. R. Arun, S. Samantaray, An asymptotic preserving time integrator for low Mach number limits of the Euler equations with gravity, arXiv preprint arXiv: 1902.00221, 2019.
    [21] K. R. Arun, S. Samantaray, Asymptotic preserving low Mach number accurate IMEX finite volume schemes for the isentropic Euler equations, J. Sci. Comput., 82 (2020), 1–32. https://doi.org/10.1007/s10915-020-01138-8 doi: 10.1007/s10915-020-01138-8
    [22] S. Boscarino, J. M. Qiu, G. Russo, T. Xiong, A high order semi-implicit IMEX WENO scheme for the all-Mach isentropic Euler system, J. Comput. Phys., 392 (2019), 594–618. https://doi.org/10.1016/j.jcp.2019.04.057 doi: 10.1016/j.jcp.2019.04.057
    [23] P. Degond, M. Tang, All speed scheme for the low Mach number limit of the isentropic Euler equations, Commun. Comput. Phys., 10 (2011), 1–31. https://doi.org/10.4208/cicp.210709.210610a doi: 10.4208/cicp.210709.210610a
    [24] G. Dimarco, R. Loubère, M. H. Vignal, Study of a new asymptotic preserving scheme for the Euler system in the low Mach number limit, SIAM J. Sci. Comput., 39 (2017), A2099–A2128. https://doi.org/10.1137/16M1069274 doi: 10.1137/16M1069274
    [25] G. Dimarco, R. Loubère, V. Michel-Dansac, M. H. Vignal, Second-order implicit-explicit total variation diminishing schemes for the Euler system in the low Mach regime, J. Comput. Phys., 372 (2018), 178–201. https://doi.org/10.1016/j.jcp.2018.06.022 doi: 10.1016/j.jcp.2018.06.022
    [26] J. Haack, S. Jin, J. G. Liu, An all-speed asymptotic-preserving method for the isentropic Euler and Navier-Stokes equations, Commun. Comput. Phys., 12 (2012), 955–980. https://doi.org/10.4208/cicp.250910.131011a doi: 10.4208/cicp.250910.131011a
    [27] S. Samantaray, Asymptotic preserving linearly implicit additive IMEX-RK finite volume schemes for low Mach number isentropic Euler equations, arXiv preprint arXiv: 2409.05854, 2024.
    [28] S. Avgerinos, F. Bernard, A. Iollo, G. Russo, Linearly implicit all Mach number shock capturing schemes for the Euler equations, J. Comput. Phys., 393 (2019), 278–312. https://doi.org/10.1016/j.jcp.2019.04.020 doi: 10.1016/j.jcp.2019.04.020
    [29] G. Bispen, M. Lukáčová-Medviˇdová, L. Yelash, Asymptotic preserving IMEX finite volume schemes for low Mach number Euler equations with gravitation, J. Comput. Phys., 335 (2017), 222–248. https://doi.org/10.1016/j.jcp.2017.01.020 doi: 10.1016/j.jcp.2017.01.020
    [30] R. Klein, Semi-implicit extension of a Godunov-type scheme based on low Mach number asymptotics Ⅰ: One-dimensional flow, J. Comput. Phys., 121 (1995), 213–237. https://doi.org/10.1016/S0021-9991(95)90034-9 doi: 10.1016/S0021-9991(95)90034-9
    [31] V. Kučera, M. Lukáčová-Medviˇdová, S. Noelle, J. Schütz, Asymptotic properties of a class of linearly implicit schemes for weakly compressible Euler equations, Numer. Math., 150 (2022), 79–103. https://doi.org/10.1007/s00211-021-01240-5 doi: 10.1007/s00211-021-01240-5
    [32] S. Noelle, G. Bispen, K. R. Arun, M. Lukáčová-Medviˇdová, C. D. Munz, A weakly asymptotic preserving low Mach number scheme for the Euler equations of gas dynamics, SIAM J. Sci. Comput., 36 (2014), B989–B1024. https://doi.org/10.1137/120895627 doi: 10.1137/120895627
    [33] J. Zeifang, J. Schütz, K. Kaiser, A. Beck, M. Lukáčová-Medviˇdová, S. Noelle, A novel full-Euler low Mach number IMEX splitting, Commun. Comput. Phys., 27 (2020), 292–320. https://doi.org/10.4208/cicp.oa-2018-0270 doi: 10.4208/cicp.oa-2018-0270
    [34] W. Boscheri, M. Dumbser, M. Ioriatti, I. Peshkov, E. Romenski, A structure-preserving staggered semi-implicit finite volume scheme for continuum mechanics, J. Comput. Phys., 424 (2021), 109866. https://doi.org/10.1016/j.jcp.2020.109866 doi: 10.1016/j.jcp.2020.109866
    [35] F. Cordier, P. Degond, A. Kumbaro, An asymptotic-preserving all-speed scheme for the Euler and Navier-Stokes equations, J. Comput. Phys., 231 (2012), 5685–5704. https://doi.org/10.1016/j.jcp.2012.04.025 doi: 10.1016/j.jcp.2012.04.025
    [36] M. Dumbser, V. Casulli, A conservative, weakly nonlinear semi-implicit finite volume scheme for the compressible Navier-Stokes equations with general equation of state, Appl. Math. Comput., 272 (2016), 479–497. https://doi.org/10.1016/j.amc.2015.08.042 doi: 10.1016/j.amc.2015.08.042
    [37] I. Peshkov, M. Dumbser, W. Boscheri, E. Romenski, S. Chiocchetti, M. Ioriatti, Simulation of non-Newtonian viscoplastic flows with a unified first order hyperbolic model and a structure-preserving semi-implicit scheme, Comput. Fluids, 224 (2021), 104963. https://doi.org/10.1016/j.compfluid.2021.104963 doi: 10.1016/j.compfluid.2021.104963
    [38] G. Bispen, K. R. Arun, M. Lukáčová-Medviˇdová, S. Noelle, IMEX large time step finite volume methods for low Froude number shallow water flows, Commun. Comput. Phys., 16 (2014), 307–347. http://doi.org/10.4208/cicp.040413.160114a doi: 10.4208/cicp.040413.160114a
    [39] W. Boscheri, M. Tavelli, C. E. Castro, An all Froude high order IMEX scheme for the shallow water equations on unstructured Voronoi meshes, Appl. Numer. Math., 185 (2023), 311–335. https://doi.org/10.1016/j.apnum.2022.11.022 doi: 10.1016/j.apnum.2022.11.022
    [40] G. Huang, Y. Xing, T. Xiong, High order well-balanced asymptotic preserving finite difference WENO schemes for the shallow water equations in all Froude numbers, J. Comput. Phys., 463 (2022), 111255. https://doi.org/10.1016/j.jcp.2022.111255 doi: 10.1016/j.jcp.2022.111255
    [41] S. Vater, R. Klein, A semi-implicit multiscale scheme for shallow water flows at low Froude number, Commun. Appl. Math. Comput. Sci., 13 (2018), 303–336. https://doi.org/10.2140/camcos.2018.13.303 doi: 10.2140/camcos.2018.13.303
    [42] X. Xie, H. Dong, M. Li, High order well-balanced asymptotic preserving IMEX RKDG schemes for the two-dimensional nonlinear shallow water equations, J. Comput. Phys., 510 (2024), 113092. https://doi.org/10.1016/j.jcp.2024.113092 doi: 10.1016/j.jcp.2024.113092
    [43] H. Zakerzadeh, The RS-IMEX scheme for the rotating shallow water equations with the Coriolis force, In: Finite volumes for complex applications Ⅷ—Hyperbolic, Elliptic and Parabolic Problems, Cham: Springer, 200 (2017), 199–207. https://doi.org/10.1007/978-3-319-57394-6-22
    [44] S. Busto, M. Dumbser, A staggered semi-implicit hybrid finite volume / finite element scheme for the shallow water equations at all Froude numbers, Appl. Numer. Math., 175 (2022), 108–132. https://doi.org/10.1016/j.apnum.2022.02.005 doi: 10.1016/j.apnum.2022.02.005
    [45] A. Duran, F. Marche, R. Turpault, C. Berthon, Asymptotic preserving scheme for the shallow water equations with source terms on unstructured meshes, J. Comput. Phys., 287 (2015), 184–206. https://doi.org/10.1016/j.jcp.2015.02.007 doi: 10.1016/j.jcp.2015.02.007
    [46] A. Kurganov, Y. Liu, M. Lukáčová-Medviˇdová, A well-balanced asymptotic preserving scheme for the two-dimensional rotating shallow water equations with nonflat bottom topography, SIAM J. Sci. Comput., 44 (2022), A1655–A1680. https://doi.org/10.1137/21M141573X doi: 10.1137/21M141573X
    [47] X. Liu, A. Chertock, A. Kurganov, An asymptotic preserving scheme for the two-dimensional shallow water equations with Coriolis forces, J. Comput. Phys., 391 (2019), 259–279. https://doi.org/10.1016/j.jcp.2019.04.035 doi: 10.1016/j.jcp.2019.04.035
    [48] H. Egger, J. Giesselmann, T. Kunkel, N. Philippi, An asymptotic-preserving discretization scheme for gas transport in pipe networks, IMA J. Numer. Anal., 43 (2023), 2137–2168. https://doi.org/10.1093/imanum/drac032 doi: 10.1093/imanum/drac032
    [49] H. Egger, N. Philippi, An asymptotic preserving hybrid-dG method for convection-diffusion equations on pipe networks, arXiv preprint arXiv: 2209.04238, 2022. https://doi.org/10.48550/arXiv.2209.04238
    [50] A. Kurganov, S. Noelle, G. Petrova, Semidiscrete central-upwind schemes for hyperbolic conservation laws and Hamilton-Jacobi equations, SIAM J. Sci. Comput., 23 (2001), 707–740. https://doi.org/10.1137/S1064827500373413 doi: 10.1137/S1064827500373413
    [51] A. Kurganov, E. Tadmor, Solution of two-dimensional Riemann problems for gas dynamics without Riemann problem solvers, Numer. Methods Partial Differ. Equations, 18 (2002), 584–608. https://doi.org/10.1002/num.10025 doi: 10.1002/num.10025
    [52] G. Wanner, E. Hairer, Solving Ordinary Differential Equations II, New York: Springer Berlin Heidelberg, 1996.
    [53] X. Zhong, Additive semi-implicit Runge-Kutta methods for computing high-speed nonequilibrium reactive flows, J. Comput. Phys., 128 (1996), 19–31. https://doi.org/10.1006/jcph.1996.0193 doi: 10.1006/jcph.1996.0193
    [54] M. K. Banda, M. Herty, A. Klar, Gas flow in pipeline networks, Netw. Heterog. Media, 1 (2006), 41–56. https://doi.org/10.3934/nhm.2006.1.41 doi: 10.3934/nhm.2006.1.41
    [55] H. Egger, J. Giesselmann, Stability and asymptotic analysis for instationary gas transport via relative energy estimates, Numer. Math., 153 (2023), 701–728. https://doi.org/10.1007/s00211-023-01349-9 doi: 10.1007/s00211-023-01349-9
    [56] K. Ehrhardt, M. C. Steinbach, Nonlinear optimization in gas networks, In: Modeling, Simulation and Optimization of Complex Processes, Berlin Heidelberg: Springer, 2005,139–148. https://doi.org/10.1007/3-540-27170-8-11
    [57] M. Herty, N. Izem, M. Seaid, Fast and accurate simulations of shallow water equations in large networks, Comput. Math. Appl., 78 (2019), 2107–2126. https://doi.org/10.1016/j.camwa.2019.03.049 doi: 10.1016/j.camwa.2019.03.049
    [58] J. Caputo, D. Dutykh, B. Gleyse, Coupling conditions for water waves at forks, Symmetry, 11 (2019), 434. https://www.mdpi.com/2073-8994/11/3/434
    [59] R. M. Colombo, M. Garavello, A well posed Riemann problem for the p-system at a junction, Netw. Heterog. Media, 1 (2006), 495–511. https://doi.org/10.3934/nhm.2006.1.495 doi: 10.3934/nhm.2006.1.495
    [60] F. M. White, H. Xue, Fluid Mechanics, New York: McGraw-hill, 2003.
    [61] A. Ambroso, C. Chalons, F. Coquel, E. Godlewski, F. Lagoutière, P. A. Raviart, et al., Coupling of general Lagrangian systems, Math. Comp., 77 (2008), 909–941. https://doi.org/10.1090/S0025-5718-07-02064-9 doi: 10.1090/S0025-5718-07-02064-9
    [62] R. Borsche, Numerical schemes for networks of hyperbolic conservation laws, Appl. Numer. Math., 108 (2016), 157–170. https://doi.org/10.1016/j.apnum.2016.01.006 doi: 10.1016/j.apnum.2016.01.006
    [63] G. Bretti, R. Natalini, B. Piccoli, Fast algorithms for the approximation of a traffic flow model on networks, Discrete Contin. Dyn. Syst. Ser. B, 6 (2006), 427–448. https://doi.org/10.3934/dcdsb.2006.6.427 doi: 10.3934/dcdsb.2006.6.427
    [64] C. Chalons, P. A. Raviart, N. Seguin, The interface coupling of the gas dynamics equations, Quart. Appl. Math., 66 (2008), 659–705. https://doi.org/10.1090/S0033-569X-08-01087-X doi: 10.1090/S0033-569X-08-01087-X
    [65] F. Dubois, P. LeFloch, Boundary conditions for nonlinear hyperbolic systems of conservation laws, J. Differ. Equations, 71 (1988), 93–122. https://doi.org/10.1016/0022-0396(88)90040-X doi: 10.1016/0022-0396(88)90040-X
    [66] E. Godlewski, P. A. Raviart, The numerical interface coupling of nonlinear hyperbolic systems of conservation laws: Ⅰ. The scalar case, Numer. Math., 97 (2004), 81–130. http://link.springer.com/10.1007/s00211-002-0438-5 doi: 10.1007/s00211-002-0438-5
    [67] E. Godlewski, P. A. Raviart, A method of coupling non-linear hyperbolic systems: Examples in CFD and plasma physics, Int. J. Numer. Methods Fluids, 47 (2005), 1035–1041. https://doi.org/10.1002/fld.856 doi: 10.1002/fld.856
    [68] H. Holden, N. H. Risebro, A mathematical model of traffic flow on a network of unidirectional roads, SIAM J. Math. Anal., 26 (1995), 999–1017. https://doi.org/10.1137/S0036141093243289 doi: 10.1137/S0036141093243289
    [69] L. O. Müller, P. J. Blanco, A high order approximation of hyperbolic conservation laws in networks: Application to one-dimensional blood flow, J. Comput. Phys., 300 (2015), 423–437. https://doi.org/10.1016/j.jcp.2015.07.056 doi: 10.1016/j.jcp.2015.07.056
    [70] A. Harten, P. D. Lax, B. van Leer, On upstream differencing and Godunov-type schemes for hyperbolic conservation laws, SIAM Rev., 25 (1983), 35–61. https://doi.org/10.1137/1025002 doi: 10.1137/1025002
    [71] K. A. Lie, S. Noelle, On the artificial compression method for second-order nonoscillatory central difference schemes for systems of conservation laws, SIAM J. Sci. Comput., 24 (2003), 1157–1174. https://doi.org/10.1137/S1064827501392880 doi: 10.1137/S1064827501392880
    [72] H. Nessyahu, E. Tadmor, Nonoscillatory central differencing for hyperbolic conservation laws, J. Comput. Phys., 87 (1990), 408–463. https://doi.org/10.1016/0021-9991(90)90260-8 doi: 10.1016/0021-9991(90)90260-8
    [73] P. K. Sweby, High resolution schemes using flux limiters for hyperbolic conservation laws, SIAM J. Numer. Anal., 21 (1984), 995–1011. https://doi.org/10.1137/0721062 doi: 10.1137/0721062
    [74] M. Garavello, K. Han, B. Piccoli, Models for Vehicular Traffic on Networks, American Institute of Mathematical Sciences, 2016.
    [75] O. Kolb, J. Lang, P. Bales, An implicit box scheme for subsonic compressible flow with dissipative source term, Numer. Algor., 53 (2010), 293–307. https://doi.org/10.1007/s11075-009-9287-y doi: 10.1007/s11075-009-9287-y
    [76] H. Egger, A robust conservative mixed finite element method for isentropic compressible flow on pipe networks, SIAM J. Sci. Comput., 40 (2018), A108–A129. https://doi.org/10.1137/16M1094373 doi: 10.1137/16M1094373
    [77] J. G. Caputo, D. Dutykh, Nonlinear waves in networks: Model reduction for the sine-Gordon equation, Phys. Rev. E, 90 (2014), 022912. https://link.aps.org/doi/10.1103/PhysRevE.90.022912 doi: 10.1103/PhysRevE.90.022912
    [78] D. Dutykh, J. G. Caputo, Wave dynamics on networks: Method and application to the sine-Gordon equation, Appl. Numer. Math., 131 (2018), 54–71. https://doi.org/10.1016/j.apnum.2018.03.010 doi: 10.1016/j.apnum.2018.03.010
    [79] R. Borsche, J. Kall, ADER schemes and high order coupling on networks of hyperbolic conservation laws, J. Comput. Phys., 273 (2014), 658–670. https://doi.org/10.1016/j.jcp.2014.05.042 doi: 10.1016/j.jcp.2014.05.042
    [80] M. Herty, N. Kolbe, S. Müller, Central schemes for networked scalar conservation laws, Netw. Heterog. Media, 18 (2023), 310–340. https://doi.org/10.3934/nhm.2023012 doi: 10.3934/nhm.2023012
  • This article has been cited by:

    1. Yanxin Li, Jiqing Chen, Shangkun Liu, Weimin Zheng, Runan Guo, Fixed-Time Congestion Control for a Class of Uncertain Multi-Bottleneck TCP/AWM Networks, 2024, 13, 2076-0825, 388, 10.3390/act13100388
  • Reader Comments
  • © 2025 the Author(s), licensee AIMS Press. This is an open access article distributed under the terms of the Creative Commons Attribution License (http://creativecommons.org/licenses/by/4.0)
通讯作者: 陈斌, bchen63@163.com
  • 1. 

    沈阳化工大学材料科学与工程学院 沈阳 110142

  1. 本站搜索
  2. 百度学术搜索
  3. 万方数据库搜索
  4. CNKI搜索

Metrics

Article views(359) PDF downloads(27) Cited by(0)

Figures and Tables

Figures(7)  /  Tables(3)

Other Articles By Authors

/

DownLoad:  Full-Size Img  PowerPoint
Return
Return

Catalog