x | 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 | 11 | 12 |
πM(x) | 2 | 6 | 4 | 4 | 6 | 2 | 1 | 11 | 3 | 9 | 5 | 7 |
Vector form expression of logical (control) networks is presented. From this aspect, the trajectory table is proposed to investigate Boolean networks. Based on it, the topology structure, controllability and observability of logical (control) networks are analyzed. Compared to the method of logical matrix, vector form expression called structure vector method decreases the computational complex. Numerical examples show that the complexity of the structure vector method is greatly reduced.
Citation: Xiaoyu Zhao, Shihua Fu. Trajectory tracking approach to logical (control) networks[J]. AIMS Mathematics, 2022, 7(6): 9668-9682. doi: 10.3934/math.2022538
[1] | Qinghua Zhou, Li Wan, Hongbo Fu, Qunjiao Zhang . Pullback attractor of Hopfield neural networks with multiple time-varying delays. AIMS Mathematics, 2021, 6(7): 7441-7455. doi: 10.3934/math.2021435 |
[2] | Wenxv Ding, Ying Li, Anli Wei, Zhihong Liu . Solving reduced biquaternion matrices equation $ \sum\limits_{i = 1}^{k}A_iXB_i = C $ with special structure based on semi-tensor product of matrices. AIMS Mathematics, 2022, 7(3): 3258-3276. doi: 10.3934/math.2022181 |
[3] | Fengxia Zhang, Ying Li, Jianli Zhao . The semi-tensor product method for special least squares solutions of the complex generalized Sylvester matrix equation. AIMS Mathematics, 2023, 8(3): 5200-5215. doi: 10.3934/math.2023261 |
[4] | Liyuan Xia, Jianjun Wang, Shihua Fu, Yuxin Gao . Control design to minimize the number of bankrupt players for networked evolutionary games with bankruptcy mechanism. AIMS Mathematics, 2024, 9(12): 35702-35720. doi: 10.3934/math.20241694 |
[5] | Yimeng Xi, Zhihong Liu, Ying Li, Ruyu Tao, Tao Wang . On the mixed solution of reduced biquaternion matrix equation $ \sum\limits_{i = 1}^nA_iX_iB_i = E $ with sub-matrix constraints and its application. AIMS Mathematics, 2023, 8(11): 27901-27923. doi: 10.3934/math.20231427 |
[6] | Pattrawut Chansangiam, Arnon Ploymukda . Riccati equation and metric geometric means of positive semidefinite matrices involving semi-tensor products. AIMS Mathematics, 2023, 8(10): 23519-23533. doi: 10.3934/math.20231195 |
[7] | Mauro Costantini, Pierpaolo Soravia . On the optimal second order decrease rate for nonlinear and symmetric control systems. AIMS Mathematics, 2024, 9(10): 28232-28255. doi: 10.3934/math.20241369 |
[8] | Yajun Xie, Changfeng Ma, Qingqing Zheng . On the nonlinear matrix equation $ X^{s}+A^{H}F(X)A = Q $. AIMS Mathematics, 2023, 8(8): 18392-18407. doi: 10.3934/math.2023935 |
[9] | Arnon Ploymukda, Pattrawut Chansangiam . Metric geometric means with arbitrary weights of positive definite matrices involving semi-tensor products. AIMS Mathematics, 2023, 8(11): 26153-26167. doi: 10.3934/math.20231333 |
[10] | Arnon Ploymukda, Kanjanaporn Tansri, Pattrawut Chansangiam . Weighted spectral geometric means and matrix equations of positive definite matrices involving semi-tensor products. AIMS Mathematics, 2024, 9(5): 11452-11467. doi: 10.3934/math.2024562 |
Vector form expression of logical (control) networks is presented. From this aspect, the trajectory table is proposed to investigate Boolean networks. Based on it, the topology structure, controllability and observability of logical (control) networks are analyzed. Compared to the method of logical matrix, vector form expression called structure vector method decreases the computational complex. Numerical examples show that the complexity of the structure vector method is greatly reduced.
Since Kauffman proposed the Boolean network to formulate a genetic regulatory network in 1969 [1], there has been considerable researches going on in this field. The most important problem is the topological structure of a Boolean network, which involves the fixed points, cycles, and their basins of attraction [2].
Since 2009, the semi-tensor product (STP) of matrices has been introduced into the study of Boolean networks [3,4]. STP provides a convenient way to formulate Boolean networks [5]. It, therefore, promotes the development of the theory of Boolean network. The development has been merged mainly in two directions. One is the control of Boolean networks. Various of control problems, such as controllability [6,7,8], observability [9,10,11], stabilization [12,13,14], optimal control [15,16], tracking [17,18], decoupling [19,20] etc. Another direction is that the values of states in the networks have been generated from Boolean case, which allows only {0,1}, to k-valued logical networks [21], mix-valued logical networks [22], or finite fields [23]. Based on the applications of STP to finite valued systems, many valuable results have been obtained, such as game theory [24], quantum networks [25], shift registers [26,27], {finite automaton} [28,29], fuzzy systems [30], and so on. In addition, STP has important applications in the analysis of finite base spaces, such as numerical/non-numerical algebra [31], finite Boolean-type algebras [32], etc. Besides, researchers have focused on reinforcement learning-based techniques to study Boolean networks. Literature [33,34,35] uses a model-free method based on reinforcement learning to study control issues such as stability and output tracking problems, which is a good alternative to the STP-based methods when the actual system is unknown.
Although the previous research about Boolean networks has tended to be perfect, a severe obstacle in applying STP to finite-valued networks is the computational complexity. Using previous algebraic methods to study finite-value networks tends to bring a high computational cost. In order to reduce the computational complexity, vector form expression of logical (control) networks is proposed in this paper, which is called the structure vector method (SVM). Then, through a one-step trajectory table, some classical problems in control theory, such as topology structure, controllability, and observability, are analyzed again to demonstrate the effectiveness of this method in reducing computational complexity. In fact, 2n×2n dimensional matrices should be computed in the algebraic method used in the existing literature, while only 2n dimensional vectors are used in the structure vector method. Therefore, compared with the algebraic method, the vector form expression can greatly reduce the computational complexity.
The rest of this paper is organized as follows: Section 2 presents some relevant previous results on STP and Boolean networks. Section 3 is devoted to analyzing the attractor and its basin of logical networks. Sections 4 and 5 discuss the controllability and observability of logical networks with some numerical examples. Section 6 summarizes our results in this paper.
Before ending this section, we give a list of notations:
(1)Mm×n: The set of m×n dimensional real matrices.
(2)Rn: The set of n-dimensional real vectors.
(3)Col(A) : The set of columns (rows) of A; Coli(A) (Rowi(A)): The i-th column (row) of A.
(4)Dk: Dk={1,2,⋯,k−1,0}.
(5)δik: The i-th column of identity matrix Ik.
(6)Δk: Δk=Col(Ik)={δik|i=1,⋯,k}
(7)A∈Mm×n is called a logical matrix, if Col(A)⊂Δm.
(8)Lm×n: The set of m×n logical matrices.
(9) Assume L∈Lm×n, then L=[δi1m,δi2m,⋯,δinm]:=δm[i1,i2,⋯,in].
(10)Mij: The (i,j)-th element of matrix M, and M=[Mij] denotes a matrix whose (i,j)-th element is Mij.
(11)AT denotes the transpose of matrix A.
Since STP is a fundamental tool in our construction, this section will give a brief survey for STP. We refer to [36] for more details.
Definition 2.1. Let A∈Mm×n and B∈Mp×q, t=lcm(n,p) be the least common multiple of n and p. Then the STP of A and B, denoted by A⋉B, is defined as
A⋉B:=(A⊗It/n)(B⊗It/p), | (1) |
where ⊗ is Kronecker product.
It is easy to see that STP is a generalization of conventional matrix product. That is, when n=p, it degenerates to the conventional matrix product, i.e., A⋉B=AB. Because of this, we omit the symbol ⋉ in most cases.
One of the most important advantages of STP is that it keeps most properties of conventional matrix product available, including association, distribution, etc. In the following we introduce some additional properties of STP, which will be used in the sequel.
Define a swap matrix W[m,n]∈Mmn×mn as follows:
W[m,n]:=[In⊗δ1m,In⊗δ2m,⋯,In⊗δmm,]∈Lmn×mn. | (2) |
Proposition 2.2. Let x∈Rm and y∈Rn be two column vectors. Then
W[m,n]x⋉y=y⋉x. | (3) |
The following proposition shows how to "swap" a vector with a matrix:
Proposition 2.3. Let x∈Rt be a column vector, and A be an arbitrary matrix. Then
x⋉A=(It⊗A)⋉x. | (4) |
Definition 2.4. Let A∈Mp×n and B∈Mq×n. The Kratri-Rao product of A and B, denoted by A∗B∈Mpq×n, is defined by
Coli(A∗B)=Coli(A)⋉Coli(B),i∈[1,n]. | (5) |
Define a matrix PRk∈Lk2×k, called the power reducing matrix, as follows:
PRk:=diag(δ1k,δ2k,⋯,δkk). | (6) |
The function of the power reducing matrix is the following.
Proposition 2.5. Assume x∈Δk, then
x2=PRkx. | (7) |
Throughout this paper the default matrix product is assumed to be STP, and the symbol ⋉ is omitted if there is no possible confusion.
Assume X∈Dk. The vector form expression of X, denoted by x=→X is defined as
x={δXk,1≤X≤k−1δkk,X=0. |
It is worth noting that since the data values used in this paper are all integers, the intervals in the following refer to integer values unless otherwise specified. For example, [1,n] refers to integers from 1 to n.
Definition 2.6. Let Xi∈Dki, i∈[1,n].
(i) A mapping F:∏ni=1Dki→Dk0 is called a mix-valued logical function, expressed by
Y=F(X1,X2,⋯,Xn). | (8) |
(ii) If ki=k, i∈[1,n], F is called a k-valued logical function.
(iii) If ki=2, i∈[1,n], F is called a Boolean function.
Proposition 2.7. [5] Let F:∏ni=1Dki→Dk0 be a mix-valued logical function. Then there exists a unique logical matrix MF, called the structure matrix of F, such that {vector form} (8) can be expressed as
y=MF⋉ni=1xi:=MFx, | (9) |
where y and xi, i∈[1,n] are vector form of Y and Xi, i∈[1,n] respectively.
Definition 2.8. Let Xi(t)∈Dki, i∈[1,n], t=0,1,⋯ be a set of time-varying logical variables, G=(N,E) be a directed graph with N={1,2,⋯,n} and Xi(t) as the logical value of node i at time t, i∈[1,n].
(i)
{X1(t+1)=F1(Xj(t)|j∈N1)X2(t+1)=F2(Xj(t)|j∈N2)⋯Xn(t+1)=Fn(Xj(t)|j∈Nn) | (10) |
is called a mix-valued logical network, where Fi, i∈[1,n] are mix-valued logical functions, Nii∈[1,n] are neighborhood of node i.
(ii) If there are controls Uj∈Dαj, j∈[1,m] and outputs Yℓ∈Dβℓ, ℓ∈[1,p], such that
{X1(t+1)=F1(Xj(t),Us(t)|j,s∈N1)X2(t+1)=F2(Xj(t),Us(t)|j,s∈N2)⋯Xn(t+1)=Fn(Xj(t),Us(t)|j,s∈Nn)Yℓ(t)=Hℓ(X1(t),⋯,Xn(t)),ℓ∈[1,p], | (11) |
then (11) is called a mix-valued logical control network.
(iii) If ki=αs=βℓ=k, i∈[1,n], s∈[1,m] and ℓ∈[1,p], then (10) is called a k-valued logical network, and (11) is called a k-valued logical control network.
(iv) If ki=αs=βℓ=2, i∈[1,n], s∈[1,m] and ℓ∈[1,p], then (10) is called a Boolean network, and (11) is called a Boolean control network.
Set κ=∏ni=1ki, α=∏ms=1αs, β=∏pℓ=1βℓ. Using Proposition 2.7 to network (10) and control network (11) respectively yields the following result.
Proposition 2.9. [5]
(i) Vector form (10) can be expressed as
{x1(t+1)=M1x(t)x2(t+1)=M2x(t)⋯xn(t+1)=Mnx(t), | (12) |
where x(t)=⋉ni=1xn(t), Mi∈Lki×κ, i∈[1,n].
(ii) In vector form (11) can be expressed as
{x1(t+1)=L1u(t)x(t)x2(t+1)=L2u(t)x(t)⋯xn(t+1)=Lnu(t)x(t),yℓ(t)=Eℓx(t),ℓ∈[1,p]. | (13) |
(12) and (13) are called the component-wise algebraic state space representation (ASSR) of(10) and (11) respectively.
Putting all the components together yields the following overall ASSR.
Proposition 2.10. [5]
(i) The component-wise ASSR (12) can be expressed into (overall) ASSR as
x(t+1)=Mx(t), | (14) |
where M=M1∗M2∗⋯∗Mn∈Lκ×κ.
(ii) The component-wise ASSR (13) can be expressed into (overall) ASSR as
x(t+1)=Lu(t)x(t)y(t)=Ex(t), | (15) |
where L=L1∗L2∗⋯∗Ln∈Lκ×κα and E=E1∗E2∗⋯∗Ep∈Lβ×κ.
Consider the ASSR of a logical network (14). Since M∈L2n×2n, using short-hand expression, one sees easily that a mix-valued logical network can be expressed as a κ-dimensional vector, which is called the structure vector of network (10).
Next, we consider how to use this structure vector to calculate the attractors of (10). We give an example to depict this.
Example 3.1. Assume X1(t),X3(t)∈D2, X2(t)∈D3, and the network dynamics is as follows.
{X1(t+1)=X1(t)∨X3(t)X2(t+1)=X2(t)▽X3(t)X3(t+1)=¬X1(t), | (16) |
where ▽:D3×D2→D3, ∨:D2×D2→D2, ¬:D2→D2 with their structure matrices as
M▽=δ3[1,3,2,2,3,1],M∨=δ2[1,1,1,2],M¬=δ2[2,1]. |
It is easy to calculate the structure matrices of Mii=1,2,3 as follows:
M1=M∨[I2⊗1T3⊗I2]=δ2[1,1,1,1,1,1,1,2,1,2,1,2]. |
M2=M▽[1T2⊗I6]=δ3[1,3,2,2,3,1,1,3,2,2,3,1]. |
M3=M¬[I2⊗1T6]=δ2[2,2,2,2,2,2,1,1,1,1,1,1]. |
It follows that
M=M1∗M2∗M3=δ12[2,6,4,4,6,2,1,11,3,9,5,7]. | (17) |
Hence, the ASSR of (16) is
x(t+1)=Mx(t), | (18) |
where M is shown in (17). Hence, the network is uniquely determined by the vector
VM=[2,6,4,4,6,2,1,11,3,9,5,7], |
which is called the structure vector of network (16).
The physical meaning of VM is: It determines a mapping πM:Δ2n→Δ2n. Say, the first element in VM is 2 meaning that πM(δ112)=δ212, which can also be briefly denoted by πM(1)=2. Hence, we have the mapping as shown in Table 1.
x | 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 | 11 | 12 |
πM(x) | 2 | 6 | 4 | 4 | 6 | 2 | 1 | 11 | 3 | 9 | 5 | 7 |
δ112, briefly 1, is maps to 2, denoted by 1→2, and
2→6,3→4,⋯,12→7. |
Using this mapping, it is easy to calculate the attractors of network (16) by the following Table 1.
Using this mapping, we can start from any state to calculate whole trajectory as described in Table 2. Note that for each trajectory, if an old state appears again, we use a ∗ to stop the trajectory. That means the trajectory start to go on the second round of cycle.
x0 | 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 | 11 | 12 | |
πM(x) | 2 | 6 | 4 | 4 | 6 | 2 | 1 | 11 | 3 | 9 | 5 | 7 | |
π2M(x) | 6 | 2 | 4 | * | 2 | 6 | 2 | 5 | 4 | 3 | 6 | 2 | |
π3M(x) | 2 | * | * | 6 | * | 6 | 6 | 4 | 4 | 2 | 6 | ||
π4M(x) | * | * | 2 | 2 | * | 4 | 6 | 2 | |||||
π5M(x) | * | 6 | * | * | * | ||||||||
π6M(x) | * |
From Table 2, one sees easily that there is a fixed point, which is P=δ412∼(1,2,2), and a cycle, which is C:δ212↔δ612 or C:(1,1,2)↔(1,3,2). The basin of attraction of each attractor is also clear. That is,
BP={δ312∼(1,2,1),δ912∼(2,2,1),δ1012∼(2,2,2)};BC={δ112∼(1,1,1),δ512∼(1,3,1),δ712∼(2,1,1),δ812∼(2,1,2),δ1112∼(2,3,1),δ1212∼(2,3,2)}. |
Remark 3.2. Assume Xi∈Dki, i∈[1,n]. The states have two expressions:
(i) Component-wise expression:
X=(X1,X2,⋯,Xn). |
(ii) Vector form: Assume xi=→Xi, i∈[1,n], then the state X can be expressed into its vector form as
x=⋉ni=1xi. |
Now there are two ways to convert them from one form to the other.
(i) Tabulator method:
Arrange (X1,X2,⋯,Xn) in alphabetic order, then their corresponding vector expressions are in order. For instance, recall Example 3.1. If (X1,X2,X3) are in alphabetic order, then their vector forms are already in order. See Table 3 for this.
X | (1, 1, 1) | (1, 1, 2) | (1, 2, 1) | (1, 2, 2) | (1, 3, 1) | (1, 3, 2) |
x=→X | δ112 | δ212 | δ312 | δ412 | δ512 | δ612 |
X | (2, 1, 1) | (2, 1, 2) | (2, 2, 1) | (2, 2, 2) | (2, 3, 1) | (2, 3, 2) |
x=→X | δ712 | δ812 | δ912 | δ1012 | δ1112 | δ1212 |
(ii) Formula method:
(X1,X2,⋯,Xn)⇒(x1,x2,⋯,xn)⇒x=⋉ni=1xi |
is easily calculated. We consider how to convert x back to (X1,X2,⋯,Xn). Define
Φi={Ik1⊗1Tk2k3⋯kn,i=1,1Tk1k2⋯ki−1⊗Ii⊗1Tki+1⋯kn,1<i<n,1Tk1k2⋯kn−1⊗Ikni=n. |
Then
xi=Φix,i∈[1,n]. |
To describe the transition mapping of a control network, we first introduce a {multi-valued} transition matrix.
Definition 4.1. Let N={1,2,⋯,κ} be a given finite set. A multi-valued transition matrix is an κ×κ matrix M=[Mi,j], where Mi,j∈N.
Mi,j∈N means that each element of the matrix M belongs to set N, which is also the origin of the name of multi-valued transition matrix.
Definition 4.2. For system (11), let X(0)∈Dκ be the initial state and k>0.
● X(k)∈Dκ is said to be reachable from X(0) at time k if there exists a control sequence U(t), t=1,2,…,k−1, that leads system (11) from X(0) to X(k). The reachable set from X(0) at time k is denoted by Rk(X(0)). The overall reachable set from X(0) is denoted by R(X(0))=Dκ.
● System (11) is said to be controllable at X(0) if R(X(0))=Dκ.
● System (11) is said to be controllable if it is controllable at every X(0)∈Dκ.
It is well known that in game theory bi-matrix is widely used [37]. Multi-valued matrix can be considered as a generalization of bi-matrix. We give an example to depict it.
Example 4.3. Consider a mix-valued network
{X1(t+1)=X2(t)ΔU(t)X2(t+1)=X1(t)◻X2(t), | (19) |
where X1(t),U(t)∈D2, X2(t)∈D3, Δ:D3×D2→D2 is determined by its structure matrix
MΔ=δ2[2,1,1,1,2,1], |
and ◻:D2×D3→D3 is determined by its structure matrix
M◻=δ3[3,1,1,2,2,2]. |
The component-wise ASSR of (19) can be calculated as
x1(t+1)=MΔx2(t)u(t)=MΔW[2,3]u(t)x2(t)=MΔW[2,3](I2⊗1T2⊗I3)u(t)x(t):=L1u(t)x(t). |
Then
L1=MΔW[2,3](I2⊗1T2⊗I3)=δ2[2,1,2,2,1,2,1,1,1,1,1,1]. |
x2(t+1)=M◻x1(t)x2(t)=M◻(1T2⊗I6)u(t)x(t):=L2u(t)x(t). |
Then
L2=M◻(1T2⊗I6)=δ3[3,1,1,2,2,2,3,1,1,2,2,2]. |
Finally, we have ASSR of (19) as
x(t+1)=Lu(t)x(t), | (20) |
where
L=L1∗L2=δ6[6,1,4,5,2,5,3,1,1,2,2,2]. |
Since u can be either 0 or 1, as x(0)=δ16 the one step transition mapping, denoted by πL, maps δ16 into two possible values δ66 and δ36. We briefly denote it by πL(1)={6,3}. Similarly for other states, we have the {multi-valued} transition mapping, described in Table 4.
x | 1 | 2 | 3 | 4 | 5 | 6 |
πL(x) | 6, 3 | 1 | 4, 1 | 5, 2 | 2 | 5, 2 |
Using this mapping, the controllability of (19) can easily be calculated. We construct a set transition matrix. The constructing process is similar to the construction of Table 2. The only difference is now each step the image of πL is a set. Moreover, in the following we construct each column of entries only by picking out new elements. As the process does not provide new element, we stop this column with ∅. Then we have Table 5 as follows.
x | 1 | 2 | 3 | 4 | 5 | 6 | |
R1 | 6, 3 | 1 | 4, 1 | 5, 2 | 2 | 5, 2 | |
R2 | 5, 2, 4, 1 | 6, 3 | 5, 2, 6, 3 | 1 | 1 | 1 | |
R3 | ∅ | 5, 2, 4 | ∅ | 6, 3 | 6, 3 | 6, 3 | |
R4 | ∅ | 4 | 5, 4 | 4 | |||
R5 | ∅ | ∅ | ∅ |
By construction the following result is obvious.
Proposition 4.4. Consider the multi-valued trajectory matrix of a control network.The union of elements of each column of set entries, denoted by R(i), i∈[1,κ], is the reachable set of the initial element corresponding to this column. So δiκ is reachable (to any δjκ, j∈[1,κ]), if and only if, R(i)=N={1,2,⋯,κ}. The network is completely controllable, if and only if, R(i)=N, ∀i∈[1,κ].
Proof. The union of elements of each column of set entries is actually the reachable set R(X(0)) mentioned in Definition 4.2, where the first element of each column corresponds to the initial state X(0). R(i)=N={1,2,⋯,κ} means that R(X(0))=Dκ, which is exactly the second rule of the definition of controllability. ∀i∈[1,κ], R(i)=N means that it is controllable at every X(0)∈Dκ, which is exactly the third rule of the definition of controllability.
Example 4.5. Consider network (19). Observe its multi-valued trajectory matrix in Table 5. According to Proposition 4.4, (19) is completely controllable.
Definition 5.1. System with outputs (11) is said to be observable if for any initial state X(0), there exists at least a control sequence, such that the initial state can be determined by the output sequence.
Observability of Boolean networks has been discussed for long time [3]. [38] proposed a method to solve the observability of Boolean networks via set controllability. Following the technique of [38], the method of multi-valued trajectory matrix can be used to solve observability of mix-valued control networks.
We use an example to describe this.
Example 5.2. Recall network (19). Assume the output is
Y(t)=X1(t)ΔX2(t)∈D2. | (21) |
Following [38], we construct an auxiliary system as
{X1(t+1)=X2(t)ΔU(t)X2(t+1)=X1(t)◻X2(t)Z1(t+1)=Z2(t)ΔU(t)Z2(t+1)=Z1(t)◻Z2(t). | (22) |
Set Ξ(t)=[X1(t),X2(t),Z1(t),Z2(t)]. Then the ASSR of Ξ can be obtained as follows:
ξ(t+1)=x(t+1)z(t+1)=Lu(t)x(t)Lu(t)z(t)=L(I12⊗L)u(t)x(t)u(t)z(t)=L(I12⊗L)u(t)W[2,6]u(t)x(t)z(t)=L(I12⊗L)(I2⊗W[2,6])u2(t)ξ(t)=L(I12⊗L)(I2⊗W[2,6])PR2u(t)ξ(t):=Ψu(t)ξ(t), | (23) |
where
Ψ=L(I12⊗L)(I2⊗W[2,6])PR2=δ36[36,31,34,35,32,35,6,1,4,5,2,5,24,19,22,23,20,23,30,25,28,29,26,29,12,7,10,11,8,11,30,25,28,29,26,29,15,13,13,14,14,14,3,1,1,2,2,2,3,1,1,2,2,2,9,7,7,8,8,8,9,7,7,8,8,8,9,7,7,8,8,8]. |
The mapping πΨ:N→2N can then be determined by Ψ as:
πΨ(1)={36,15},πΨ(2)={31,13},πΨ(3)={34,13},πΨ(4)={35,14},⋯,πΨ(35)={26,8},πΨ(36)={29,8}. |
The ξ(t)=x(t)z(t) is called the one-step indistinguishable state, if x(t)≠z(t) and y(x(t))=y(z(t)). The set of one-step indistinguishable states is denoted by I. If x(t)≠z(t) and y(x(t))≠y(z(t)), ξ(t) is called the one-step distinguishable state, and the set of one-step distinguishable states is denoted by J. Then it is clear that [38] a control network is observable, if and only if, each state ξ∈I can be driven into J.
Using MΔ, it is easy to verify that for network (23) we have
I=δ36{5,9,10,12,16,18,24},J=δ36{2,3,4,6,11,17,23,30}. |
Now we construct the multi-valued trajectory matrix for I in Table 6. In each column, when J is reached J is used to end the trajectory. If there is no new state appearing, ∅ is used to end the trajectory, which means the ξ=xz in this column is not distinguishable at all.
ξ | 5 | 9 | 10 | 12 | 16 | 18 | 24 | |
R1 | 32, 14 | 4, 1 | 5, 2 | 5, 2 | 23, 2 | 23, 2 | 29, 8 | |
R2 | 25, 7, 19, 1 | J | J | J | J | J | 1 | |
R3 | 12, 9, 6, 3, 30, 15, 36 | 36, 15 | ||||||
R4 | J | 22 | ||||||
R5 | ∅ |
Now it is clear that the network (19)–(21) is not observable. The only indistinguishable initial pair is δ2436=δ46δ66∼{(2,1),(2,3)}.
Proposition 5.3. Consider the multi-valued trajectory matrix of a control network. The network is observable if and only if for any state δi2n∈I, it holds thatR(i)∩J≠∅.
Proof. R(i)∩J≠∅ holds for any δi2n∈I, if and only if each element in the set of one-step indistinguishable states I can be driven into the set of one-step distinguishable states J by a proper control, which means that any two initial states can be distinguished, i.e., any initial state can be determined by the output sequence.
Remark 5.4. Assume a mix-valued logical network with n nodes, m inputs and p outputs. Assume Xi∈Dki, Us∈Dαs, Yl∈Dβl, i=1,2,…,n, s=1,2,…,m, l=1,2,…,p. Next we consider the computational complexity of the methods in this paper when the vector form of the system is known. For the method of calculating the attractors in Section 3, since there are at most κ states, each column of the table will end after at most κ−1 steps. Hence, the computational complexity of calculating the attractors is O(κ(κ−1)) in the worse case, where κ=∏ni=1ki. For the method of determining controllability in Section 4, there are also at most κ states, and the state generated by every step should be compared with the previous states. Each state needs to be compared at most 1+2+⋯+(κ−1) times. Therefore, the computational complexity of determining controllability is O(κ2(κ−1)2) in the worse case. For the method of determining observability in Section 5, there are also at most 1+2+⋯+(κ−1) state pairs, and each column of the table will end after at most κ−1 steps. Hence, the computational complexity of determining observability is O(κ(κ−1)22) in the worse case, where κ=∏ni=1ki.
Structure vector method for logical (control) networks has been proposed in order to reduce the computational complexity. Using trajectory table, topology structure, controllability and observability has been analyzed. Compared with the existing method, the vector form expression greatly reduces the computational complexity. The method can be used to discuss other problems of logical networks, such as decoupling, delectability, tracking, etc.
This work is supported by the National Natural Science Foundation of China (62103716), and the Natural Science Foundation of Shandong Province (ZR2019BF023).
All authors declare no conflicts of interest in this paper.
[1] |
S. A. Kauffman, Metabolic stability and epigenesis in randomly constructed genetic nets, J. Theor. Biol., 22 (1969), 437–467. https://doi.org/10.1016/0022-5193(69)90015-0 doi: 10.1016/0022-5193(69)90015-0
![]() |
[2] |
S. Wang, J. E. Feng, Y. Yu, J. Zhao, Further results on dynamic-algebraic Boolean control networks, Sci. China Inform. Sci., 62 (2019), 1–14. https://doi.org/10.1007/s11432-018-9447-4 doi: 10.1007/s11432-018-9447-4
![]() |
[3] |
D. Cheng, H. Qi, Controllability and observability of Boolean control networks, Automatica, 45 (2009), 1659–1667. https://doi.org/10.1016/j.automatica.2009.03.006 doi: 10.1016/j.automatica.2009.03.006
![]() |
[4] |
D. Cheng, Input-state approach to Boolean networks, IEEE T. Neural Networ., 20 (2009), 512–521. https://doi.org/10.1109/TNN.2008.2011359 doi: 10.1109/TNN.2008.2011359
![]() |
[5] | D. Cheng, H. Qi, Z. Li, Analysis and control of Boolean networks: A semi-tensor product approach, London: Springer, 2011. |
[6] | J. Zhong, D. W. C. Ho, J. Lu, A new approach to pinning control of Boolean networks, IEEE T. Control Netw., 2021. https://doi.org/10.1109/TCNS.2021.3106453 |
[7] |
M. R. Rafimanzelat, F. Bahrami, Attactor controllability of Boolean networks by fipping a subset of their nodes, Chaos, 28 (2018), 043120. https://doi.org/10.1063/1.4999950 doi: 10.1063/1.4999950
![]() |
[8] |
F. Li, Y. Tang, Pinning controllability for a Boolean network with arbitrary disturbance inputs, IEEE T. Cybernetics, 51 (2021), 3338–3347. https://doi.org/10.1109/TCYB.2019.2930734 doi: 10.1109/TCYB.2019.2930734
![]() |
[9] | Y. Yu, M. Meng, J. Feng, G. Chen, Observability criteria for Boolean networks, IEEE T. Automat. Contr., 2021. https://doi.org/10.1109/TAC.2021.3131436 |
[10] |
Y. Yu, M. Meng, J. Feng, Observability of Boolean networks via matrix equations, Automatica, 111 (2020), 108621. https://doi.org/10.1016/j.automatica.2019.108621 doi: 10.1016/j.automatica.2019.108621
![]() |
[11] |
J. Yang, W. Qian, Z. Li, Redefined reconstructibility and state estimation for Boolean networks, IEEE T. Control Netw., 7 (2020), 1882–1890. https://doi.org/10.1109/TCNS.2020.3007820 doi: 10.1109/TCNS.2020.3007820
![]() |
[12] |
H. Li, X. Yang, S. Wang, Robustness for stability and stabilization of Boolean networks with stochastic function perturbations, IEEE T. Automat. Contr., 66 (2021), 1231–1237. https://doi.org/10.1109/TAC.2020.2997282 doi: 10.1109/TAC.2020.2997282
![]() |
[13] |
Q. Zhang, J. Feng, Y. Zhao, J. Zhao, Stabilization and set stabilization of switched Boolean control networks via flipping mechanism, Nonlinear Anal.: Hybrid Syst., 41 (2021), 101055. https://doi.org/10.1016/j.nahs.2021.101055 doi: 10.1016/j.nahs.2021.101055
![]() |
[14] |
B. Chen, X. Yang, Y. Liu, J. Liu, Controllability and stabilization of Boolean control networks by the auxiliary function of flipping, Int. J. Robust Nonlinear Control, 30 (2020), 5529–5541. https://doi.org/10.1002/rnc.5091 doi: 10.1002/rnc.5091
![]() |
[15] |
Y. Wang, P. Guo, Optimal control of singular Boolean control networks via Ledley solution method, J. Franklin Inst., 358 (2021), 6161–6173. https://doi.org/10.1016/j.jfranklin.2021.06.006 doi: 10.1016/j.jfranklin.2021.06.006
![]() |
[16] |
X. Ding, H. Li, Optimal control of random evolutionary Boolean games, Int. J. Control, 94 (2021), 144–152. https://doi.org/10.1080/00207179.2019.1585957 doi: 10.1080/00207179.2019.1585957
![]() |
[17] |
Y. Zheng, J. Feng, Output tracking of delayed logical control networks with multi-constraints, Front. Inform. Technol. Electron. Eng., 21 (2020), 316–323. https://doi.org/10.1631/FITEE.1900376 doi: 10.1631/FITEE.1900376
![]() |
[18] |
Q. Zhang, J. Feng, T. Jiao, Finite horizon tracking control of probabilistic Boolean control networks, J. Franklin Inst., 358 (2021), 9909–9928. https://doi.org/10.1016/j.jfranklin.2021.10.003 doi: 10.1016/j.jfranklin.2021.10.003
![]() |
[19] |
Y. Li, J. Zhu, B. Li, Y. Liu, J. Lu, A necessary and sufficient graphic condition for the original disturbance decoupling of Boolean networks, IEEE T. Automat. Contr., 66 (2021), 3765–3772. https://doi.org/10.1109/TAC.2020.3025507 doi: 10.1109/TAC.2020.3025507
![]() |
[20] |
Y. Yu, J. Feng, J. Pan, D. Cheng, Block decoupling of Boolean control networks, IEEE T. Automat. Contr., 64 (2019), 3129–3140. https://doi.org/10.1109/TAC.2018.2880411 doi: 10.1109/TAC.2018.2880411
![]() |
[21] |
M. Meng, J. Feng, Z. Hou, Synchronization of interconnected multi-valued logical networks, Asian J. Control, 16 (2014), 1659–1669. https://doi.org/10.1002/asjc.835 doi: 10.1002/asjc.835
![]() |
[22] |
Y. Li, J. Feng, S. Zhu, Controllability and reachability of periodically time-variant mixed-valued logical control networks, Circuits, Syst., Signal Process., 40 (2021), 3639–3654. https://doi.org/10.1007/s00034-021-01648-2 doi: 10.1007/s00034-021-01648-2
![]() |
[23] |
Y. Li, H. Li, X. Ding, Set stability of switched delayed logical networks with application to finite-field consensus, Automatica, 113 (2021), 108768. https://doi.org/10.1016/j.automatica.2019.108768 doi: 10.1016/j.automatica.2019.108768
![]() |
[24] | Y. Wu, S. Le, K. Zhang, X. Sun, Ex-ante agent transformation of Bayesian games, IEEE T. Automat. Contr., 2021. https://doi.org/10.1109/TAC.2021.3122372 |
[25] |
H. Qi, B. Mu, I. R. Petersen, G. Shi, Measurement-induced Boolean dynamics and controllability for closed quantum networks, Automatica, 114 (2020), 108816. https://doi.org/10.1016/j.automatica.2020.108816 doi: 10.1016/j.automatica.2020.108816
![]() |
[26] |
J. Zhong, D. Lin, Decomposition of nonlinear feedback shift registers based on Boolean networks, Sci.China Inform. Sci., 62 (2019), 1–3. https://doi.org/10.1007/s11432-017-9460-4 doi: 10.1007/s11432-017-9460-4
![]() |
[27] |
J. Lu, B. Li, J. Zhong, A novel synthesis method for reliable feedback shift registers via Boolean networks, Sci. China Inform. Sci., 64 (2021), 1–14. https://doi.org/10.1007/s11432-020-2981-4 doi: 10.1007/s11432-020-2981-4
![]() |
[28] | X. Xu, Y. Hong, Observability analysis and observer design for finite automata via matrix approach, IET Control Theory Appl., 7 (2013), 1609–1615. |
[29] |
X. Han, Z. Chen, Z. Liu, Q. Zhang, Calculation of siphons and minimal siphons in petri nets based on semi-tensor product of matrices, IEEE T. Syst., Man, Cybern.: Syst., 47 (2017), 531–536. https://doi.org/10.1109/TSMC.2015.2507162 doi: 10.1109/TSMC.2015.2507162
![]() |
[30] | H. Lyu, W. Wang, X. Liu, Universal approximation of multi-variable fuzzy systems by semi-tensor product, IEEE T. Fuzzy Syst., 28 (2020), 2972–2981. |
[31] |
D. Cheng, Y. Li, J. Feng, J. Zhao, On numerical/non-numerical algebra: Semi-tensor product method, Math. Model. Control, 1 (2021), 1–11. https://doi.org/10.3934/mmc.2021001 doi: 10.3934/mmc.2021001
![]() |
[32] |
S. Fu, D. Cheng, J. Feng, J. Zhao, Matrix expression of finite Boolean-type algebras, Appl. Math. Comput., 395 (2021), 125880. https://doi.org/10.1016/j.amc.2020.125880 doi: 10.1016/j.amc.2020.125880
![]() |
[33] | Z. Liu, J. Zhong, Y. Liu, W. Gui, Weak stabilization of Boolean networks under state-flipped control, IEEE T. Neural Netw. Learn. Syst., 2021. https://doi.org/10.1109/TNNLS.2021.3106918 |
[34] |
A. Acernese, A. Yerudkar, L. Glielmo, C. Del Vecchio, Model-free self-triggered control co-design for probabilistic Boolean control networks, IEEE Control Syst. Lett., 5 (2021), 1639–1644. https://doi.org/10.1109/LCSYS.2020.3042394 doi: 10.1109/LCSYS.2020.3042394
![]() |
[35] |
A. Acernese, A. Yerudkar, L. Glielmo, C. Del Vecchio, Double deep-Q learning-based output tracking of probabilistic Boolean control networks, IEEE Access, 8 (2020), 199254–199265. https://doi.org/10.1109/ACCESS.2020.3035152 doi: 10.1109/ACCESS.2020.3035152
![]() |
[36] | D. Cheng, H. Qi, Y. Zhao, An introduction to semi-tensor product of matrices and its applications, Singapore: World Scientific, 2012. |
[37] | R. Gibbons, A primer in game theory, New York: Printice Hall, 1992. |
[38] |
D. Cheng, C. Li, F. He, Observability of Boolean networks via set controllability, Syst. Control Lett., 115 (2018), 22–25. https://doi.org/10.1016/j.sysconle.2018.03.004 doi: 10.1016/j.sysconle.2018.03.004
![]() |
1. | Yanfei Wang, Changxi Li, Jun-e Feng, Distributed pinning controllers design for set stabilization of $ k $-valued logical control networks, 2023, 3, 2767-8946, 61, 10.3934/mmc.2023006 | |
2. | Junjie Geng, Lingling Chen, Xin Guo, Rui Chen, Mengge Wang, 2023, Lower Limb Muscle State Transition Control Based on Complex Network, 978-988-75815-4-3, 869, 10.23919/CCC58697.2023.10240441 |
x | 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 | 11 | 12 |
πM(x) | 2 | 6 | 4 | 4 | 6 | 2 | 1 | 11 | 3 | 9 | 5 | 7 |
x0 | 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 | 11 | 12 | |
πM(x) | 2 | 6 | 4 | 4 | 6 | 2 | 1 | 11 | 3 | 9 | 5 | 7 | |
π2M(x) | 6 | 2 | 4 | * | 2 | 6 | 2 | 5 | 4 | 3 | 6 | 2 | |
π3M(x) | 2 | * | * | 6 | * | 6 | 6 | 4 | 4 | 2 | 6 | ||
π4M(x) | * | * | 2 | 2 | * | 4 | 6 | 2 | |||||
π5M(x) | * | 6 | * | * | * | ||||||||
π6M(x) | * |
X | (1, 1, 1) | (1, 1, 2) | (1, 2, 1) | (1, 2, 2) | (1, 3, 1) | (1, 3, 2) |
x=→X | δ112 | δ212 | δ312 | δ412 | δ512 | δ612 |
X | (2, 1, 1) | (2, 1, 2) | (2, 2, 1) | (2, 2, 2) | (2, 3, 1) | (2, 3, 2) |
x=→X | δ712 | δ812 | δ912 | δ1012 | δ1112 | δ1212 |
x | 1 | 2 | 3 | 4 | 5 | 6 |
πL(x) | 6, 3 | 1 | 4, 1 | 5, 2 | 2 | 5, 2 |
x | 1 | 2 | 3 | 4 | 5 | 6 | |
R1 | 6, 3 | 1 | 4, 1 | 5, 2 | 2 | 5, 2 | |
R2 | 5, 2, 4, 1 | 6, 3 | 5, 2, 6, 3 | 1 | 1 | 1 | |
R3 | ∅ | 5, 2, 4 | ∅ | 6, 3 | 6, 3 | 6, 3 | |
R4 | ∅ | 4 | 5, 4 | 4 | |||
R5 | ∅ | ∅ | ∅ |
ξ | 5 | 9 | 10 | 12 | 16 | 18 | 24 | |
R1 | 32, 14 | 4, 1 | 5, 2 | 5, 2 | 23, 2 | 23, 2 | 29, 8 | |
R2 | 25, 7, 19, 1 | J | J | J | J | J | 1 | |
R3 | 12, 9, 6, 3, 30, 15, 36 | 36, 15 | ||||||
R4 | J | 22 | ||||||
R5 | ∅ |
x | 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 | 11 | 12 |
πM(x) | 2 | 6 | 4 | 4 | 6 | 2 | 1 | 11 | 3 | 9 | 5 | 7 |
x0 | 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 | 11 | 12 | |
πM(x) | 2 | 6 | 4 | 4 | 6 | 2 | 1 | 11 | 3 | 9 | 5 | 7 | |
π2M(x) | 6 | 2 | 4 | * | 2 | 6 | 2 | 5 | 4 | 3 | 6 | 2 | |
π3M(x) | 2 | * | * | 6 | * | 6 | 6 | 4 | 4 | 2 | 6 | ||
π4M(x) | * | * | 2 | 2 | * | 4 | 6 | 2 | |||||
π5M(x) | * | 6 | * | * | * | ||||||||
π6M(x) | * |
X | (1, 1, 1) | (1, 1, 2) | (1, 2, 1) | (1, 2, 2) | (1, 3, 1) | (1, 3, 2) |
x=→X | δ112 | δ212 | δ312 | δ412 | δ512 | δ612 |
X | (2, 1, 1) | (2, 1, 2) | (2, 2, 1) | (2, 2, 2) | (2, 3, 1) | (2, 3, 2) |
x=→X | δ712 | δ812 | δ912 | δ1012 | δ1112 | δ1212 |
x | 1 | 2 | 3 | 4 | 5 | 6 |
πL(x) | 6, 3 | 1 | 4, 1 | 5, 2 | 2 | 5, 2 |
x | 1 | 2 | 3 | 4 | 5 | 6 | |
R1 | 6, 3 | 1 | 4, 1 | 5, 2 | 2 | 5, 2 | |
R2 | 5, 2, 4, 1 | 6, 3 | 5, 2, 6, 3 | 1 | 1 | 1 | |
R3 | ∅ | 5, 2, 4 | ∅ | 6, 3 | 6, 3 | 6, 3 | |
R4 | ∅ | 4 | 5, 4 | 4 | |||
R5 | ∅ | ∅ | ∅ |
ξ | 5 | 9 | 10 | 12 | 16 | 18 | 24 | |
R1 | 32, 14 | 4, 1 | 5, 2 | 5, 2 | 23, 2 | 23, 2 | 29, 8 | |
R2 | 25, 7, 19, 1 | J | J | J | J | J | 1 | |
R3 | 12, 9, 6, 3, 30, 15, 36 | 36, 15 | ||||||
R4 | J | 22 | ||||||
R5 | ∅ |