
In networked control systems, channel packet loss is inevitable due to the restricted bandwidth, especially in control (from supervisory controller to some remote actuators), which will lead to the occurrence of failure control. In this paper, the controllability of networked finite state machine (NFSM) is investigated within the framework of matrix semi-tensor product (STP), where random channel packet losses are considered. Firstly, to capture the transition dynamics under random packet losses in the control channel, we introduce a stochastic variable to estimate the state evolution, and the variable is assumed to obey the Bernoulli binary distribution. Meanwhile, the NFSM with random channel packet losses can be expressed as a probabilistic logic representation. Subsequently, by means of the delicate operation of matrix STP, some concise validation conditions for the controllability with a probability of one (w.p. 1), are derived for NFSM based on the probabilistic logic representation. Finally, a typical computing instance is used to demonstrate the validity of the proposed method. The conclusions are conducive to study the security issues of the system involving opacity, fault detection, controller design and so on.
Citation: Weiwei Han, Zhipeng Zhang, Chengyi Xia. Modeling and analysis of networked finite state machine subject to random communication losses[J]. Mathematical Modelling and Control, 2023, 3(1): 50-60. doi: 10.3934/mmc.2023005
[1] | Yuyang Zhao, Yang Liu . Output controllability and observability of mix-valued logic control networks. Mathematical Modelling and Control, 2021, 1(3): 145-156. doi: 10.3934/mmc.2021013 |
[2] | Hongli Lyu, Yanan Lyu, Yongchao Gao, Heng Qian, Shan Du . MIMO fuzzy adaptive control systems based on fuzzy semi-tensor product. Mathematical Modelling and Control, 2023, 3(4): 316-330. doi: 10.3934/mmc.2023026 |
[3] | Yunsi Yang, Jun-e Feng, Lei Jia . Recent advances of finite-field networks. Mathematical Modelling and Control, 2023, 3(3): 244-255. doi: 10.3934/mmc.2023021 |
[4] | Lei Wang, Xinyun Liu, Ting Li, Jiandong Zhu . Skew-symmetric games and symmetric-based decomposition of finite games. Mathematical Modelling and Control, 2022, 2(4): 257-267. doi: 10.3934/mmc.2022024 |
[5] | Naiwen Wang . Solvability of the Sylvester equation $ AX-XB = C $ under left semi-tensor product. Mathematical Modelling and Control, 2022, 2(2): 81-89. doi: 10.3934/mmc.2022010 |
[6] | Lusong Ding, Weiwei Sun . Neuro-adaptive finite-time control of fractional-order nonlinear systems with multiple objective constraints. Mathematical Modelling and Control, 2023, 3(4): 355-369. doi: 10.3934/mmc.2023029 |
[7] | Daizhan Cheng, Ying Li, Jun-e Feng, Jianli Zhao . On numerical/non-numerical algebra: Semi-tensor product method. Mathematical Modelling and Control, 2021, 1(1): 1-11. doi: 10.3934/mmc.2021001 |
[8] | Daizhan Cheng, Zhengping Ji, Jun-e Feng, Shihua Fu, Jianli Zhao . Perfect hypercomplex algebras: Semi-tensor product approach. Mathematical Modelling and Control, 2021, 1(4): 177-187. doi: 10.3934/mmc.2021017 |
[9] | Jianhua Sun, Ying Li, Mingcui Zhang, Zhihong Liu, Anli Wei . A new method based on semi-tensor product of matrices for solving reduced biquaternion matrix equation $ \sum\limits_{p = 1}^l A_pXB_p = C $ and its application in color image restoration. Mathematical Modelling and Control, 2023, 3(3): 218-232. doi: 10.3934/mmc.2023019 |
[10] | Naveen Kumar, Km Shelly Chaudhary . Position tracking control of nonholonomic mobile robots via $ H_\infty $-based adaptive fractional-order sliding mode controller. Mathematical Modelling and Control, 2025, 5(1): 121-130. doi: 10.3934/mmc.2025009 |
In networked control systems, channel packet loss is inevitable due to the restricted bandwidth, especially in control (from supervisory controller to some remote actuators), which will lead to the occurrence of failure control. In this paper, the controllability of networked finite state machine (NFSM) is investigated within the framework of matrix semi-tensor product (STP), where random channel packet losses are considered. Firstly, to capture the transition dynamics under random packet losses in the control channel, we introduce a stochastic variable to estimate the state evolution, and the variable is assumed to obey the Bernoulli binary distribution. Meanwhile, the NFSM with random channel packet losses can be expressed as a probabilistic logic representation. Subsequently, by means of the delicate operation of matrix STP, some concise validation conditions for the controllability with a probability of one (w.p. 1), are derived for NFSM based on the probabilistic logic representation. Finally, a typical computing instance is used to demonstrate the validity of the proposed method. The conclusions are conducive to study the security issues of the system involving opacity, fault detection, controller design and so on.
Finite state machine (FSM) has found successful applications in many complex artificial systems, including network intrusion detection and cyber-physical ones. In a classical finite state machine, it is assumed that the controller is close to the actuator, the event command can be transmitted to the controlled plant instantaneously through the control channel. After decades of development, many problems for such these systems have been well studied, such as monitor theory [1], state estimate and detectability [2], controllability [3,4] and so on. It is important to note that [5,6,7] converting the cyber-physical systems in the logical networks and obtained a series of meaningful and innovative results about the cyber-physical system. On the one hand, the need for the interconnection of all things makes it is easier for information to be transferred by means of communication networks; and on the other hand, the introduction of communication networks renders the system with many excellent performances, such as cost reduction, convenient maintenance friendly, easy tests and so on. Hence, the control problems of NFSM have attracted increasing attention and has become a very active field.
Generally, due to the relatively far transmission distance, it is inevitable to introduce delays or packet losses between supervisory controller and actuator. Specifically, an event occurring spontaneously or a control command generated by the monitor could be transferred at random in the model of NFSM. If the monitor is designed without considering the delays or packet losses in the control channel (from supervisory controller and actuator), the command issued by a supervisor may not be effectively or successfully accepted by the plant. Hence, in consideration of the complex evolutionary behavior, the modeling and analyzing of communication delays and packet losses has given rise to new challenges. Meanwhile, the utilization of communication networks in the control loops have also considerable theoretical and practical significance for NFSM.
From the analysis of the current literature, many researches on NFSM almost always concentrate on the channel delays, such as centralized control [8] and decentralized control [9], robust control [10] and distributed failure prognosis [11] and so on. In recent years, Lin [12] investigated the bounded communication losses in the control and observation channel from the perspective of supervisory control, and obtained the existence conditions for networked supervisor, i.e., network observability and controllability need to be met simultaneously. Up to now, There are fewer works to address the issues on the controllability problem with communication losses in the control channel, except our previous work [13], which has solved the reachability problem with communication losses from a switched perspective. However, in [13], we assumed that the communication losses occur determinately, i.e., the probability of random channel packet losses from the controller to the actuator is not considered, which lacks the strict quantitative analysis for random packet losses.
Inspired by the methods in [13], i.e., matrix STP method, this paper continues to study the influence of random packet losses on controllability in the control channel of NFSM. We refer to the work in [8], and assume that all the events are disabled by default, and then, construct another finite state machine affected by packet losses, where the set of transitions with communication losses are disabled and the predecessor of such transitions will remain unchanged with respect to the lost events. To characterize the dynamics with random channel packet losses, the state estimator is introduced by utilizing a stochastic variable, which is assumed to obey the Bernoulli random binary distribution. Some key contributions include the following points:
● The matrix expression of NFSM with random channel packet losses in control is proposed by an algebraic state space method.
● The validation criteria for the reachability and controllability w.p. 1 are given for NFSM on the basis of the transition probability matrix.
The remaining sections are structured as follows: Section 2 brings in some basic notations and knowledge about the NFSM and matrix STP. Section 3 focuses on the key results of this paper, including the algebraic representation for NFSM with random channel packet losses, and the validation criteria for the existence of controllability. In section 4, one typical simulation example is illustrated to validate the proposed results. Finally, in Section 5, we summarize the whole paper and give a brief prospect of the future study.
● N+ is said to be the set of all positive integers.
● Mm×l is expressed as the set of m×l-dimensional real matrices.
● A(i,j)∈Mm×l represents the element with the i-th row and j-th column of matrix M.
● The j-th column of A∈Mm×l can be expressed as Colj(M), and furthermore, the set of all columns is Col(M).
● ⋁ is termed as the logical 'OR' operation.
● 1n=[1,1,⋯,1⏟n].
● δkn is the k-th column of identity matrix In, k∈{1,2,⋯,n}.
● Δn:={δ1n,δ2n,⋯,δnn}.
● ν=[ν1,ν2,…,νn]T∈Rn is said to be sub-stochastic logical vector if every element is satisfied that νi≥0 and ∑ni=1νi⩽1; Especially, it is defined as stochastic logical vector if ∑ni=1νi=1.
● The set of n-dimensional sub-stochastic logical vector is denoted by ˜Lsn, making Lsn as the set of n-dimensional stochastic logical vector.
● E[y] is called the expected value of sub-stochastic or stochastic logical vector y.
● Σ∗ denotes the set, which is composed of all finite-length and non-empty strings on the finite set Σ.
In the classical FSM, the distance from controller to actuator is assumed to be close, and the supervisory command can be transmitted to the plant instantaneously through the control channel. In general, the finite state machine can be briefly written as G=(Q,Σ,f,q0), and it consists of four-tuple, including the set of events Σ and states Q from the initial state q0, the (partial) state transition function f: Q×Σ→Q, generating all possible transitions f={(q,σ,q′):f(q,σ)=q′}. Additionally, the transition function f can be generalized over Σ∗ by an iterative way.
Due to the relatively far transmission distance, it is noted that packet losses between the supervisory controller and actuator will be introduced inevitably. According to the actual situation of engineering system modeling and the information transmission network, those transitions affected by the actuators that are far away from the supervisor may be lost at random. We define such transitions as the set fl⊆f, and the remaining transitions are supposed to not be absolutely lost, which is written as ful=f−fl. That is, the set of all transitions can be divided into two parts, i.e., f=fl∪ful. In view of the above condition, a NFSM can be characterized as A={A,fl}.
At the beginning of the 21-st century, a novel algebraic framework is proposed on the basis of the matrix semi-tensor product, which transforms the logic dynamic system into algebraic representation and extends the application scope of the classical linear state space approach. Since then, the STP-based algebraic state space method has inspired and generated an abound of excellent works in related areas, such as logic control networks [14,15,16,17,18,19,20], multi-agent systems [21], networked evolution games [22,23,24,25] and discrete event systems [26,27,28] and so on [29]. First of all, for the convenience of understanding, we give some related definitions and properties of matrix STP.
Definition 2.1 ([30]). Given two matrices of arbitrary dimensions H∈Mm×n, D∈Mp×q, the corresponding STP ('⋉') of H and D is defined as:
H⋉D:=(H⊗Ir/n)(D⊗Ir/p), | (2.1) |
where r is called the least common multiple of n and p.
(1) For χ∈Mm×1,φ∈Mn×1, the pseudo-commutativity of χ and φ is satisfied that φ⋉χ=Ψ[m,n]⋉χ⋉φ, where Ψ[m,n] is a constructed swap matrix, defined as:
Ψ[m,n]=[δ1mn,δm+1mn,δ2m+1mn,⋯,δ(n−1)m+1mn,δ2mn,δm+2mn,⋯,δ(n−1)m+2mn,⋯,δmmn,⋯,δnmmn], |
where δjmn is termed as the j-th column of identity matrix Imn
(2) Given a matrix of arbitrary dimension X∈Mm×n, if it is supposed that X(0):=In, then for k∈N+, the STP power is denoted by
X(k):=X⋉X⋉⋯⋉X⏟k. | (2.2) |
The STP-based algebraic state space method can be described as the following two procedures:
● Firstly, by using the matrix STP, the logical variables involved in the system are represented by a vector of finite dimensions (xi∼δin);
● Secondly, the logical dynamic system is transferred into a bilinear system on the finite state set. The bilinear representation is used to study the process of the logical dynamic system.
In accordance with the modeling process of algebraic state space method, a NFSM A can be redefined as Q={q1,q2,⋯,qn} and Σ={σ1,σ2,⋯,σm}, and these variables are further set as qi=δin (i∈{1,2…,n}) and σk=δkm (k∈{1,2…,m}). Meanwhile, for the convenience, we list some variable symbols used later. qul(ς)=[qul1(ς),qul2(ς),⋯,quln(ς)]T (ql(ς)=[ql1(ς),ql2(ς),⋯,qln(ς)]T) is expressed as the vector form of state reached at t steps with (no) control packet loss, and quli(ς)=1 (qli(ς)=1) is defined if, and only, if there is a transition that qi is reachable from q0 with (no) control packet loss; u(ς)=[u1(ς),u2(ς),⋯,um(ς)]T is termed as the event vector on Σ, and uk(ς)=1 if σk is enabled at ς steps. In the next section, we present the model dynamics and controllability analysis of NFSM with packet losses based on the representations.
In networked control systems, channel packet loss is inevitable due to the restricted bandwidth, especially in control (from supervisory controller to some remote actuators), which will lead to the occurrence of failure control. Firstly, given a NFSM A=(A,fl),
Assumption 3.1. Before we present the main results, some assumptions are made in the following:
1. Each event in Σ is disabled by default, and is only allowed to occur if it is enabled by a control command.
2. The communication losses are random, i.e., the transitions in fl may or may not be communicated in control.
On the one hand, if the transitions in set fl are assumed to be communicated successfully in the control channel, the algebraic representation can be constructed in a manner similar to that described in the reference [13], and the dynamics of NFSM is shown as a discrete-time bi-linear form in the following form:
qul(ς+1)=Ful⋉u(ς)⋉qul(ς), | (3.1) |
where Ful is called the state transition structure matrix with no control packet loss, and it is specifically defined as
Ful:=[Ful1,Ful2,⋯,Fulm]∈Mn×mn, | (3.2) |
where Fulk∈Mn×n is defined as:
Fulk(j,i)={1,δjn∈f(δin,δkm)0,otherwise. | (3.3) |
On the other hand, if the transitions in fl fails to be communicated to the plant, such transitions are disabled and will be permitted to occur until the transitions are not lost in a later step. In particular, for (q,σ,q′)∈fl, not any transition labeled by σ is enabled from state q to q′. In this situation, state q will remain unchanged in itself with respect to event σ under communication losses, which will alter the transition structure of NFSM. In order to characterize such changed transitions, we construct a new finite state machine, in which the transitions will be replaced with a self-loop if (q,σ,q′)∈fl is not transmitted to the performer. Let's illustrate the above process with a simple example.
Example 3.1. Consider a NFSM A=(A,fl), where fl={(q1,σ2,q3),(q3,σ1,q2)}, and if the transitions in fl are hypothesized to be transmitted through the control channel, and Figure 1 shows the state transition relationship among various states. Otherwise, the newly constructed finite state machine is represented as Figure 2. Note that the added self-loops in Figure 2 are represented by the dashed arrows on account of the communication losses, which can be obtained by substituting (q1,σ2,q3), (q3,σ1,q2) with (q1,σ2,q1), (q3,σ1,q3), respectively.
According to (3.2) and (3.3), we define a new structure matrix Fl:=[Fl1,Fl2,⋯,Flm]∈Mn×mn for the constructed NFSM, and the dynamics with control packet losses will be iterated according to the following equation:
ql(ς+1)=Fl⋉u(ς)⋉ql(ς). | (3.4) |
However, the dynamics expressed by (3.1) and (3.4) can characterize both cases with complete communication losses, and the case with no packet loss. In practice, the losses in the control channel are random, i.e., the transitions in fl may or may not be communicated in the control channel. So as to cope with the random packet losses, we introduce a state estimation with random channel packet losses, which can be depicted as follows:
q(ς)=(1−γ)qul(ς)+γql(ς), | (3.5) |
where γ is a random variable on behalf of the packet loss rate, which is independent of system state. Note that q(ς) is also stochastic because it merely refers to the source of randomness from γ, which is indeed a random variable, then the expectation of q(ς) will be implemented. In this work, it is assumed that the communication losses may happen according to the following Bernoulli random binary distribution:
Prob{γ=1}=E[γ]=λ | (3.6) |
Prob{γ=0}=1−E[γ]=1−λ, | (3.7) |
where λ∈[0,1) is a constant and represents the probability that any transition in fl will be lost.
In the following theorem, the dynamics of NFSM with random channel packet losses can be established.
Theorem 3.1. Given a NFSM A=(A,fl) with channel packet loss rate λ, the evolutionary dynamics can be described by the following stochastic logical equation:
E[q(ς+1)]=Fu(ς)E[q(ς)], | (3.8) |
where F=(1−λ)Ful+λFl is termed as the probabilistic transition structure matrix (PTSM), and E[q(ς)]∈Lsn denotes the expected value of the reachable state q(ς) and E[q(0)]=q0.
Proof. : For any state q in the transition (q,σ,q′)∈ful, q(ς)=qul(ς)=ql(ς) is satisfied. According to (3.5), (3.6) and (3.7), we can obtain that
E[q(ς+1)]=E[(1−γ)qul(ς+1)+γql(ς+1)]=E[(1−γ)]E[qul(ς+1)]+E[γ]E[ql(ς+1)]=(1−E(γ))Ful⋉u(ς)⋉E[qul(ς)]+E[γ]Fl⋉u(ς)⋉E[ql(ς)]=((1−λ)Ful+λFl)u(ς)E[q(ς)]. | (3.9) |
For state q in the transition (q,σ,q′)∈fl, q(ς)=qul(ς)=ql(ς) may be not satisfied. Generally, it is not hard to get that E[q(ς+1)] equals to E[(1−γ)qul(ς+1)+γ0] or equals to E[(1−γ)0+γql(ς+1)]. To sum up, E[q(ς+1)]=((1−λ)Ful+λFl)u(ς)E[q(ς)] represents the state transitions of NFSM with random packet loss rate.
In fact, the aforementioned theorem tells us that the NFSM with random channel packet losses can be captured by a special probabilistic finite state machine [31]. Next, by means of the matrix expression in Theorem 3.1, controllability of NFSM with random channel packet losses will be investigated.
Remark 3.1. In the previous work [13], we discussed the influence of arbitrary packet loss on the reachability, and a novel theoretical framework is proposed to analyze the robustness of reachable state from a switched perspective. Here, the controllability is studied by the matrix STP, but we concentrates on its analysis from a stochastic view. We firmly believe that the models proposed in this paper and [13] provide a very important basis for studying the control problem with network packet loss.
In this subsection, we continue to investigate the controllability of NFSM (network controllability), where random packet losses are considered. Here, the definition of controllability with random channel packet losses are given as follows:
Definition 3.1. Given a NFSM A=(A,fl) with channel packet loss rate λ,
(1) from the initial state q0=δin, the target state qj=δjn is reachable at the k-th step w.p. 1 (k-th reachable) if there is an event string s=σl0σl1…,σlk−1∈Σ∗ so that Prob{q(k)=qj∣q(0)=q0}=1.
(2) the set of all k-th reachable states from q0 is denoted by Rk(q0). Furthermore, R(q0) is said to be the set of all states reachable w.p. 1 from q0, and R(q0)=∪i∈N+Ri(q0).
(3) system is said to be controllable w.p. 1 from q0 if R(q0)=Δn.
Let us first introduce the notion of k-th transition probability matrix (TPM) with some sequence of events. Consider a NFSM with random channel packet losses. Suppose a specified input u(ς)=δkm, Theorem 3.1 means E[q(ς+1)]=FδkmE[q(ς)]=FkE[q(ς)]; in this case, Fk∈Mm×n is called the first step TPM from the current state q(ς) to the next q(ς+1) with the input u(ς), and rewritten as P1. Denote k-th TPM by Pk∈Mn×n, whose (i,j) entry is Prob{q(t+k)=qj∣q(ς)=qi}, i.e., the probability from the state vector q(ς)=δin to q(ς+k)=δjn under a sequence of events ⋉k−1c=0u(ς+c) that is executed. By using the matrix STP and Theorem 3.1, Pk can be equivalently calculated through the iterative computation, and established in the following proposition.
Theorem 3.2. Given a NFSM A=(A,fl) with a sequence of events s=σl0σl1…,σlk−1∈Σ∗, then the k-th TPM satisfies.
Pk=D(k)⋉k−1c=0δlcm, | (3.10) |
where D(k)=(FΨ[n,m])(k)Ψ[mk,n]∈Mn×nmk, and Ψ[n,m] can be referred to the pseudo-commutativity.
Proof. Based on the matrix expression (3.8), we have the following result:
E[q(1)]=FΨ[n,m]E[q(0)]u(0)E[q(2)]=FΨ[n,m]E[q(1)]u(1)=(FΨ[n,m])(2)E[q(0)]u(0)u(1)⋮E[q(k)]=FΨ[n,m]E[q(k−1)]u(k−1)=(FΨ[n,m])(k)E[q(0)]⋉k−1c=0δlcm=(FΨ[n,m])(k)Ψ[mk,n]⋉k−1c=0δlcmE[q(0)]. | (3.11) |
If (FΨ[n,m])(k)Ψ[mk,n] is abbreviated as D(k), then, k-th TPM Pk with a sequence of events s=σl0σl1…,σlk−1∈Σ∗ can be calculated as D(k)⋉k−1c=0δlcm.
Theorem 3.2 reveals that the matrix D(k)∈Mn×nmks consists of the current state transition probability and the event strings with respect to the reachable paths of A, which provides an important basis for system control analysis and design. Here, let us go further to split D(k) into mk blocks, and D(k)i∈Mn×n, i.e., D(k)=[D(k)1,D(k)2,…,D(k)mk]. To characterize the controllability of NFSM with random channel packet losses, an operator ⟨∙⟩ is introduced and defined by
Lk:=⟨D(k)⟩:=D(k)1∨D(k)2∨⋯∨D(k)mk=mk⋁i=1D(k)i. | (3.12) |
Finally, the main results to validate the criterion are derived based on the above preliminaries.
Theorem 3.3. Given a NFSM A=(A,fl) with channel packet loss rate λ,
(1) the target state qj=δjn is k-th reachable from q0=δin iff
Lk(j,i)=1; | (3.13) |
(2) the target state qj=δjn is reachable w.p. 1 from q0=δin iff there is a positive integer α, such that
α⋁k=1Lk(j,i)=1; | (3.14) |
(3) the NFSM is controllable w.p. 1 from q0=δin iff the positive integer α satisfies the following condition
α⋁k=1Coli(Lk)=1n. | (3.15) |
Proof. (1) 'if' part: According to the definition of operator ⟨∙⟩ in Eq. (3.12), Lk(j,i)=1, i.e., ⟨D(k)⟩(j,i)=1 iff there is a positive integer β∈{1,2,…,mk}, such that (D(k)β)(j,i)=1. According to (3.11), it means that a sequence of events s=σl0σl1…,σlk−1∈Σ∗ exists that (D(k)⋉k−1c=0δlcm)(j,i)=1, i.e., Pk(j,i)=1 is satisfied. Then, an input string s=σl0σl1…,σlk−1∈Σ∗ can satisfy the condition Prob{q(k)=qj∣q(0)=q0}=1.
'only if' part: If state qj=δjn is k-th reachable from q0=δin, we prove that Lk(j,i)=1 is satisfied. Based on the matrix expression (3.8) and Theorem 3.2, the condition shows that there is a sequence of events s=σl0σl1…,σlk−1∈Σ∗, such that δjn=E[x(k)]=Pkδin, i.e., Pk(j,i)=1, which implies that β∈{1,2,…,mk} exists, such that (D(k)β)(j,i)=1. Then clearly, Lk(j,i)=(⟨D(k)⟩)(j,i)=1 is tenable.
(2) 'if' part: we suppose that there is a positive integer α such that
α⋁k=1Lk(j,i)=L1(j,i)∨L2(j,i)∨⋯∨Lα(j,i)=1, |
and the existence of k∈{1,2,…,α} makes the formula Lk(j,i)=1 true. Based on Eq. (3.13), the target state qj=δjn is k-th reachable w.p. 1 from q0=δin. i.e., state qj=δjn is reachable w.p. 1 from q0=δin.
'only if' part: If state qj=δjn is reachable w.p. 1 from q0=δin, based on the result mentioned above, we can obtain that Lk1(j,i)=1, Lk2(j,i)=1, ⋯, or Lkτ(j,i)=1. Thus, ⋁αk=1Lk(j,i)=1 can be arrived at, where α=max{k1,k2,…,kτ}.
(3) 'if' part: If there is a positive integer α such that
α⋁k=1Coli(Lk)=Coli(L1)∨Coli(L2)∨⋯∨Coli(Lα)=1n, |
it is satisfied that Lk1(1,i)=1, Lk2(2,i)=1, ⋯, Lkτ(n,i)=1, where ki∈{1,2,…,α}. Based on the aforementioned result, state qj=δjn is kj-th reachable w.p. 1 from q0=δin, i.e., the kj-step reachable set w.p. 1 Rkj(q0)=qj, and R(q0)=∪j≤αRkj(q0)=Δn. Henceforth, the NFSM system with random packet loss is thought to be controllable w.p. 1 from q0.
'only if' part: If the system is controllable w.p. 1 from q0=δin, it is obvious that the reachable states w.p. 1 from q0 satisfy R(q0)=Δn. According to Eq. (3.13), we can derive that Lk1(1,i)=1, Lk2(2,i)=1, ⋯, Lkτ(n,i)=1. In brief, ⋁αk=1Coli(Lk)=1n, where α=max{k1,k2,…,kτ}.
Remark 3.2. In this paper, the impact of random channel packet losses on the controllability of NFSM is systematically studied. We discover that the dynamics of NFSM with random channel packet losses can be expressed as a probabilistic finite state machine by utilizing the state estimation, and such dynamics take into account the probability λ of random channel packet losses from the controller to actuator, which provides us an important model for quantitative analysis.
Remark 3.3. On a broader note, the underlying evolution of the states seems analogous to that of a discrete-time finite Markov chain, where the transition probabilities depend on the packet loss. The results in this paper are equivalent to the irreducibility of the Markov chain. However, we put more emphasis on the controllable paths from the initial state. With the assistance of matrix STP, the algebraic representation of NFSM with channel packet loss rate λ is established, and the verification criteria for the controllability w.p. 1 are derived by the k-th transition probability matrix Pk.
In this section, we utilize a typical example to validate the theoretical results in Section 3.
Example 4.1. Considering a networked flexible manufacturing system, it is characterized as a FSM A=(Q,Σ,f,q0), and its corresponding evolution graph is depicted in Figure 3, where Q={q1,⋯,q9} and Σ={σ1,⋯,σ4} denote the different states and signal indicators. Due to the relatively far transmission distance, it is assumed that the occurrences in fl={(q1,σ2,q7),(q7,σ3,q1),(q2,σ3,q8),(q8,σ4,q2),(q3,σ1,q9),(q9,σ3,q3)} is communicated with channel packet loss rate λ=0.25. The following graph (see Figure 4) represents the state transition diagram with packet losses.
When taking the packet loss rate into account, the evolution dynamics on NFSM can be termed as E[q(ς+1)]=Fu(ς)E[q(ς)], and its corresponding PTSM can be written as F={F1,F2,F3,F4}, which is calculated based on Theorem 3.1. The resulting constructed state diagram is shown as Figure 5 by adding the channel packet loss rate λ=0.25. In this manufacturing system, some transactions are always assigned to accomplish important tasks, for example, from interface states q2,q5 to q1. Next, we will show how to verify the controllability w.p. 1.
F1=[100000000000000000000.75100000000000000010000000000000000000000000000000000000.25000000] |
F2=[0.75000000000000000000000000000100100000010000000000000000.2500000000000001000000100100] |
F3=[0000000.251000.750001000000000000.250000000000000100001000000000000000.750000.250000000000000000.75] |
F4=[00000000100000000.25000000000000000000000000000000000000000000000000000000.750000000000] |
According to Theorem 3.3, when k=3, the reachability matrix with random packet loss rate ⋁kμ=1L(μ) can be obtained in the following:
3⋁μ=1L(μ)=[110.311111110.60000.80.3110.1110.8110.30.30.211111100.30.31111110.30.30.310.30.31011110.30.10.300.30.70.30.310.20000.30.3110.3110.8110.80.30.6] |
Notice that ⋁3μ=1L(μ)(1,5)=⋁3μ=1L(μ)(1,2)=1, state q1=δ19 is reachable w.p. 1 from q2=δ29 and q5=δ59, respectively.
When considering system information security issues, some states are supposed to be safe, such as q1=δ19 and the state will be labeled as a target state, which is required to be arrived from all states. Through some iterative calculations, if k=4, the reachability matrix with random packet loss rate ⋁4μ=1L(μ) is computed as:
[11111111110.60.31011111111110.30.30.31111110.3111111110.311110.31111110.30.30.10.30.30.30.60.30.310.30.31011111111110.80.30.6]. |
Clearly, ⋁4μ=1L(μ)(1,:)=1T9, i.e., state q1=δ19 is reachable w.p. 1, which implies that state q1=δ19 is reachable with random packet loss.
In conclusion, the controllability of NFSM with random channel packet losses is explored, in terms of an algebraic state space approach. With the help of matrix STP, the probabilistic logic representation of NFSM with packet loss rate is proposed, which converts the NFSM with random channel packet losses to a special probabilistic automaton. Then, starting from the strict algebraic derivation, some concise validation conditions for the controllability w.p. 1 are obtained for NFSM. Finally, the numerical example demonstrates that the proposed model is succinct and effective.
In future studies, we are planning to address some more complicated problems. For example, opacity [32,33] is a very important concept of security information flow, and stochastic opacity with random channel packet losses can be investigated, based on the reachability concept proposed in this paper.
We acknowledge the funding support of the National Natural Science Foundation of China under Grant 62203328 and 62173247, Tianjin Natural Science Foundation of China Grant No. 21JCQNJC00840 and Tianjin Research Innovation Project for Postgraduate Students under Grant No. 2021YJSB251.
The authors declare that there are no potential conflicts of interests.
[1] |
X. Yin, S. Lafortune, Synthesis of maximally permissive supervisors for partially observed discrete event systems, IEEE Trans. Autom. Control, 61 (2016), 1239–1254. http://doi.org/10.1109/tac.2015.2460391 doi: 10.1109/tac.2015.2460391
![]() |
[2] |
S. Shu, F. Lin, Enforcing detectability in controlled discrete event systems, IEEE Trans. Autom. Control, 58 (2013), 2125–2130. http://doi.org/10.1109/tac.2013.2251796 doi: 10.1109/tac.2013.2251796
![]() |
[3] |
T. Ushio, Controllability and control-invariance in discrete-event systems, Int. J. Control, 50 (1989), 1507–1515. http://doi.org/10.1080/00207178908953442 doi: 10.1080/00207178908953442
![]() |
[4] |
Y. Yan, Z. Chen, Z. Liu, Semi-tensor product approach to controllability and stabilizability of finite automata, J. Syst. Eng. Electron., 26 (2015), 134–141. http://doi.org/10.1109/jsee.2015.00018 doi: 10.1109/jsee.2015.00018
![]() |
[5] |
D. Cheng, C. Li, X. Zhang, F. He, Controllability of Boolean networks via mixed controls, IEEE Contr. Syst. Lett., 2 (2018), 254–259. http://doi.org/10.1109/lcsys.2018.2821240 doi: 10.1109/lcsys.2018.2821240
![]() |
[6] |
G. Zhao, H. Li, T. Hou, Input-output dynamical stability analysis for cyber-physical systems via logical networks, IET CONTROL THEORY A., 14 (2020), 2566–2572. http://doi.org/10.1049/iet-cta.2020.0197 doi: 10.1049/iet-cta.2020.0197
![]() |
[7] |
L. Du, Z. Zhang, C. Xia, A state-flipped approach to complete synchronization of boolean networks, Appl. Math. Comput., 443 (2022), 127788. https://doi.org/10.1016/j.amc.2022.127788 doi: 10.1016/j.amc.2022.127788
![]() |
[8] |
S. Park, K. Cho, Supervisory control of discrete event systems with communication delays and partial observations, SYST. CONTROL. LETT., 56 (2007), 106–112. http://doi.org/10.1016/j.sysconle.2006.08.002 doi: 10.1016/j.sysconle.2006.08.002
![]() |
[9] |
S. Park, K. Cho, Decentralized supervisory control of discrete event systems with communication delays based on conjunctive and permissive decision structures, Automatica, 43 (2007), 738–743. http://doi.org/10.1016/j.automatica.2006.10.016 doi: 10.1016/j.automatica.2006.10.016
![]() |
[10] |
W. Sadid, L. Ricker, S. Hashtrudi-Zad, Robustness of synchronous communication protocols with delay for decentralized discrete-event control, DISCRETE EVENT DYN. S., 25 (2015), 159–176. http://doi.org/10.1007/s10626-014-0184-8 doi: 10.1007/s10626-014-0184-8
![]() |
[11] |
S, Takai, R. Kumar, Distributed failure prognosis of discrete event systems with bounded-delay communications, IEEE Trans. Autom. Control, 57 (2012), 1259–1265. http://doi.org/10.1109/tac.2011.2173419 doi: 10.1109/tac.2011.2173419
![]() |
[12] |
F. Lin, Control of networked discrete event systems: Dealing with communication delays and losses, SIAM J. Control. Optim., 52 (2014), 1276–1298. http://doi.org/10.1137/130914942 doi: 10.1137/130914942
![]() |
[13] |
Z. Zhang, C. Xia, S. Chen, T. Yang, Z. Chen, Reachability analysis of networked finite state machine with communication losses: A switched perspective, IEEE J. SEL. AREA. COMM., 38 (2020), 845–853. http://doi.org/10.1109/jsac.2020.2980920 doi: 10.1109/jsac.2020.2980920
![]() |
[14] |
D. Cheng, H. Qi, Controllability and observability of boolean control networks, Automatica, 45 (2009), 1659–1667. http://doi.org/10.1016/j.automatica.2009.03.006 doi: 10.1016/j.automatica.2009.03.006
![]() |
[15] |
B. Jiang, Y. Lou, J. Lu, Input-to-state stability of delayed systems with bounded-delay impulses, Mathematical Modelling and Control, 2 (2022), 44–54. http://doi.org/10.3934/mmc.2022006 doi: 10.3934/mmc.2022006
![]() |
[16] |
Y. Zhao, Y. Liu, Output controllability and observability of mix-valued logic control networks, Mathematical Modelling and Control, 1 (2021), 145–156. http://doi.org/10.3934/mmc.2021013 doi: 10.3934/mmc.2021013
![]() |
[17] |
B. Wang, J. Feng, D. Cheng, On identification of boolean control networks, SIAM J. Control. Optim., 60 (2022), 1591–1612. http://doi.org/10.1016/j.automatica.2011.01.083 doi: 10.1016/j.automatica.2011.01.083
![]() |
[18] |
Y. Li, J. Feng, B. Wang, Output feedback observability of switched boolean control networks, Inf. Sci., 612 (2022), 612–625. http://doi.org/10.1016/j.ins.2022.08.116 doi: 10.1016/j.ins.2022.08.116
![]() |
[19] |
R. Zhao, B. Wang, J. Feng, Synchronization of drive-response singular boolean networks, Nonlinear Anal., Hybrid Syst., 44 (2022), 101141. https://doi.org/10.1016/j.nahs.2021.101141 doi: 10.1016/j.nahs.2021.101141
![]() |
[20] |
H. Li, X. Yang, S. Wang, Robustness for stability and stabilization of boolean networks with stochastic function perturbations, IEEE Trans. Autom. Control, 66 (2021), 1231–1237. https://doi.org/10.1109/tac.2020.2997282 doi: 10.1109/tac.2020.2997282
![]() |
[21] |
Y. Li, H. Li, X. Ding, G. Zhao, Leader-follower consensus of multiagent systems with time delays over finite fields, IEEE Trans. Cybern., 49 (2019), 3203–3208. https://doi.org/10.1109/tcyb.2018.2839892 doi: 10.1109/tcyb.2018.2839892
![]() |
[22] |
C. Li, Y. Xing, F. He, D. Cheng, A strategic learning algorithm for state-based games, Automatica, 113 (2020), 108615. https://doi.org/10.1016/j.automatica.2019.108615 doi: 10.1016/j.automatica.2019.108615
![]() |
[23] |
Y. Wu, D. Cheng, B. Ghosh, T. Shen, Recent advances in optimization and game theoretic control for networked systems, Asian J. Control, 21 (2019), 2493–2512. https://doi.org/10.1002/asjc.2303 doi: 10.1002/asjc.2303
![]() |
[24] |
C. Li, F. He, T. Liu, D. Cheng, Verification and dynamics of group-based potential games, IEEE Trans. Control, 6 (2018), 215–224. https://doi.org/10.1109/tcns.2018.2808138 doi: 10.1109/tcns.2018.2808138
![]() |
[25] |
C. Li, F. He, T. Liu, D. Cheng, Symmetry-based decomposition of finite games, Sci. China Inf. Sci., 62 (2019), 1–13. https://doi.org/10.1007/s11432-017-9411-0 doi: 10.1007/s11432-017-9411-0
![]() |
[26] |
X. Xu, Y. Hong, Matrix expression and reachability analysis of finite automata, Journal of Control Theory and Applications, 10 (2012), 210–215. https://doi.org/10.1007/s11768-012-1178-4 doi: 10.1007/s11768-012-1178-4
![]() |
[27] |
Z. Zhang, C. Xia, J. Fu, Z. Chen, Initial-state observability of mealy-based finite-state machine with nondeterministic output functions, IEEE Trans. Syst. Man and Cyber.: Syst., 52 (2022), 6396–6405. https://doi.org/10.1109/tsmc.2022.3145449 doi: 10.1109/tsmc.2022.3145449
![]() |
[28] |
Z. Chen, Y. Zhou, Z. Zhang, Z. Liu, Semi-tensor product of matrices approach to the problem of fault detection for discrete event systems (dess), IEEE Trans. Circuits Syst. II, Exp. Briefs, 67 (2020), 3098–3102. https://doi.org/10.1109/tcsii.2020.2967062 doi: 10.1109/tcsii.2020.2967062
![]() |
[29] |
D. Cheng, Y. Li, J. Feng, J. Zhao, On numerical/non-numerical algebra: Semi-tensor product method, Mathematical Modelling and Control, 1 (2021), 1–11. https://doi.org/10.3934/mmc.2021001 doi: 10.3934/mmc.2021001
![]() |
[30] | D. Cheng, H. Qi, Z. Li, Analysis and control of Boolean networks: a semi-tensor product approach, Springer Science & Business Media, 2010. |
[31] |
Z. Zhang, Z. Chen, Z. Liu, Modeling and reachability of probabilistic finite automata based on semi-tensor product of matrices, Sci. China Inf. Sci., 61 (2018), 129202. https://doi.org/10.1007/s11432-018-9507-7 doi: 10.1007/s11432-018-9507-7
![]() |
[32] | L. Mei, R. Liu, J. Lu, J. Qiu, Matrix approach for verification of opacity of partially observed discrete event systems, CIRC. SYST. SIGNAL PR., 2020. https://doi.org/10.1007/s00034-020-01462-2 |
[33] |
Z. Zhang, S. Shu, C. Xia, Networked opacity for finite state machine with bounded communication delays, Inf. Sci., 572 (2021), 57–66. https://doi.org/10.1016/j.ins.2021.04.072 doi: 10.1016/j.ins.2021.04.072
![]() |