Next Article in Journal
Generalized Lagrangian Path Approach to Manifestly-Covariant Quantum Gravity Theory
Next Article in Special Issue
An Approach for the Generation of an Nth-Order Chaotic System with Hyperbolic Sine
Previous Article in Journal
Computational Information Geometry for Binary Classification of High-Dimensional Random Tensors
Previous Article in Special Issue
Some Iterative Properties of ( F 1 , F 2 ) -Chaos in Non-Autonomous Discrete Systems
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Output-Feedback Control for Discrete-Time Spreading Models in Complex Networks

by
Luis A. Alarcón Ramos
1,
Roberto Bernal Jaquez
2,* and
Alexander Schaum
3
1
Posgrado en Ciencias Naturales e Ingeniería, Universidad Autónoma Metropolitana, Cuajimalpa, Mexico-City 05348, Mexico
2
Departamento de Matemáticas Aplicadas y Sistemas, Universidad Autónoma Metropolitana, Cuajimalpa, Mexico-City 05348, Mexico
3
Chair of automatic control, Kiel-University, Kiel 24143, Germany
*
Author to whom correspondence should be addressed.
Submission received: 3 February 2018 / Revised: 6 March 2018 / Accepted: 7 March 2018 / Published: 19 March 2018
(This article belongs to the Special Issue Research Frontier in Chaos Theory and Complex Networks)

Abstract

:
The problem of stabilizing the spreading process to a prescribed probability distribution over a complex network is considered, where the dynamics of the nodes in the network is given by discrete-time Markov-chain processes. Conditions for the positioning and identification of actuators and sensors are provided, and sufficient conditions for the exponential stability of the desired distribution are derived. Simulations results for a network of N = 10 6 corroborate our theoretical findings.

1. Introduction

Modeling, analysis and control of the spreading of information and of infectious diseases have become a relevant problem of an interdisciplinary nature. Studies on spreading range from propagation of computer viruses in networks [1,2,3,4], epidemics in human populations [5,6,7,8,9,10,11,12], to spreading of rumors and information [13,14,15,16].
One of the early works for epidemic spreading [17] gave birth to the so-called SIRmodel that divides the population into three different compartments or groups: susceptible, infected and recover (or removed); and later, as many diseases do not confer any immunity, a simplified version of the SIR model was created, the so-called SIS (Susceptible-Infected-Susceptible) model, which has become one of the classical model of disease spreading. Although this model was proposed for modeling spreading in populations with no structure, nowadays, the SIS model has been extended to model the spreading process in a population mapped on a complex network.
In the field of computer virus propagation, Kephart and White [18,19] proposed one of the first models on networks, the so-called homogeneous model. This model is called homogeneous because every node of the network has the same probability of interaction with other nodes. Using a rate of infection and a death rate, they were able to calculate the infection threshold. Unfortunately, this model fails to capture real-world complexity. Data available show that real-world computer networks are not homogeneous and, instead, follow a power law structure in the number of connections of the nodes [20,21,22].
Another important method to study disease propagation is the so-called Degree Mean Field Approximation model (DMFA), which considers nodes with the same degree as dynamically equivalent [23]. Using this model, it is possible to calculate the epidemic threshold. Although this approach is quite interesting, it is not applicable in many realistic cases because nodes with the same degree do not necessarily behave the same way. Besides, the model does not provide information about the probability of individual nodes.
In recent years, Markov chain-based models for a Susceptible-Infected-Susceptible (SIS) dynamics over complex networks have been used [8,9,10,11,12,24]. Using these models, it is possible to determine the macroscopic properties of the system, as well as the description of the dynamics of individual nodes. One interesting result is that the calculated infection threshold depends on the value of the spectral radius of the adjacency matrix.
In spite of the fact that an increasing number of studies on the analysis of epidemic spreading have been published in the last decade, the studies dedicated to the control of these process are not very great in number. Different authors with interesting insights have been working on this subject, but at the end, we have three main categories for controlling complex networks (see also [25]): spectral control, optimal control and heuristic feedback control.
In the spectral optimization control methods, one of the goals is to make the eigenvalue λ ( A ) of the adjacency matrix A as small as possible. This could be achieved removing nodes from A that could be feasible by either immunizing or quarantining certain individuals [26]. The removal of links to reduce λ is also possible isolating cities or, more difficultly, restricting interactions among individuals.
In the optimization control methods for complex networks, the necessary and sufficient condition for spreading extinction poses an optimal control problem, where the curing rates are allowed to vary over time, depending on the evolving state of the system.
In [27], the linearization of the non-linear Markovian equation for the SIR model is studied around the extinction state and showed that the optimal solution is a bang-bang controller with at most one switch. This kind of control deserves further research, although, up to this date, it presents several flaws: it assumes that direct control over infection and recovery rates is always possible. These assumptions considered that these probabilities can be controlled for an entire population in an instantaneous way, which generally is unfeasible in a human population. This method is considered in different works [28,29].
In the heuristic feedback control extensions of the SIS and SIRS (Susceptible-Infectious-Recovered- Susceptible) model are considered. In this case, the model and its control are developed concurrently in such a way that the stability conditions can be derived. For example, in these models, we can have states corresponding to individuals that disconnect themselves from the net when they suspect that they have become infected (Protected state (P)). This means that control structures are already built in and available in the model itself in a heuristic fashion. As examples in the literature, we have the works of [30,31], which gives humans the possibility to take actions once they are in an Aware state (A). One of the flaws of these models is their great specificity.
In this work, we will study the spreading of information (diseases, rumors, gossip) using a Markov chain-based model for a Susceptible-Infected-Susceptible (SIS) dynamics over complex networks that has been used by different authors [8,9,10,11,12].
Using this model, we present a solution for the long-standing problem of epidemic spreading extinction. First of all, we present a model that generalizes the interaction among nodes and reproduces results after choosing some particular interaction. Afterwards, we determine sufficient conditions for stabilizing the spreading of information to the extinction state in complex networks of arbitrary topology. At the same time, these conditions give us a clue about how viruses are propagated, allowing us to identify the nodes that do not need any control to reach the extinction state and to distinguish them from the nodes that need to be controlled. Inspired by the ideas of control theory, we associate the set of nodes that do not need to be controlled (in order to reach the extinction state) with the zero dynamics of the system [32]. The set of nodes to be monitored and controlled are identified, as well, and a feedback control is applied to them in order to stabilize the extinction state. Accordingly, we have proven that the extinction state is an asymptotically-stable fixed point for the zero dynamics.
We performed numerical simulations using a scale-free complex network constructed as disused by Barabasi et al. [22] with one million nodes and show a complete agreement of the numerical results with our theoretical findings.
The remainder of this paper is organized as follows: Section 2 presents the problem statement and definitions. In Section 3, we determine sufficient conditions that allow us to identify the set of nodes that need to be controlled in order to reach the extinction state. In Section 4, we propose a linear feedback control to stabilize the system. Simulations and results are shown in Section 5. Finally, in Section 6, the conclusions are presented.

2. Problem Formulation

In this section, (i) the considered class of systems is introduced and the underlying model discussed, and (ii) the specific control problem addressed in this study is introduced.

2.1. System Class

Consider a network of N nodes described by an undirected graph G ( V , E ) with V = { v 1 , v 2 , , v N } being the set of nodes and E = { e i , j } the connecting edges, together with the corresponding adjacency matrix A = { a i j } where a i j = 1 if ( i , j ) E , and zero otherwise. According to the graph G ( V , E ) , the neighbors’ set V i of a node v i V is defined as:
V i = { v j V | a i j = a j i = 1 } V ,
and the number of neighbors (or degree) is given by N i = | V i | .
The underlying process for every node is depicted in Figure 1, as a discrete time Markov process.
According to Figure 1, a node v i V can be in state a with probability p i ( t ) or in state b with probability 1 p i ( t ) , where t N 0 denotes the discrete time. The state a represents that the node v i has or knows the information to spread, and the state b represents the opposite. Any node v j V i is able to spread information by interacting with some neighbor node v i , but if the node v j does not know the information (i.e., p j = 0 ), then it does not contribute to spreading the information. Furthermore, each node has a manipulable variable u i ( t ) [ 0 , 1 ] , which is amenable for feedback control.
The probability p i ( t ) is updated as follows: at each time step, every node v i can transit from b to a with probability η i ( P i ( t ) , U i ( t ) ) under the influence of its neighbors, or transit from state a to b with a probability μ i , where:
0 μ i , η i ( P i ( t ) , U i ( t ) ) , p i ( t ) , u i ( t ) 1 , i : v i V ,
and U i ( t ) , P i ( t ) are vectors such that:
U i ( t ) = u i ( t ) , u k 1 ( t ) , u k 2 ( t ) , , u k N i ( t ) T P [ N i + 1 ] , P i ( t ) = p k 1 ( t ) , p k 2 ( t ) , , p k N i ( t ) T P [ N i ] , k l : v k l V i ,
with:
P [ N ] = [ 0 , 1 ] N .
The transition probability η i ( P i ( t ) , U i ( t ) ) depends on the state of the neighbors given by P i ( t ) and a set of parameters U i ( t ) that are amenable to manipulation and models the interaction that spreads the information over v i due to its neighbor nodes. Note that despite the interaction between v i and its neighbor nodes, if P i = 0 , then η i ( P i , U i ) = 0 for any value of U i P [ N i + 1 ] , because in this case, the neighbor nodes do not know the information, and therefore, they do not contribute to spreading it.
Any change in η i ( P i ( t ) , U i ( t ) ) with respect to P i ( t ) is assumed bounded and depends on U i ( t ) such that for each pair ( i , j ) where i : v i V and j : v j V i , there exists a function m i j ( U i ( t ) ) : P [ N i + 1 ] R + such that:
η i ( P i ( t ) , U i ( t ) ) p j m i j ( U i ( t ) ) ,
or in terms of entries of the adjacency matrix:
η i ( P i ( t ) , U i ( t ) ) p j m i j ( U i ( t ) ) a i j .
The above means that the transition probability η is a continuous function with bounded slope, which do not change abruptly.
Furthermore, throughout the paper, it is assumed that for all P i P [ N i ] , η i ( P i , U i ) strictly monotonically increases with u k , i.e.,
η i ( P i ( t ) , U i ( t ) ) u k > 0 , for k : v k V i { v i } ,
Finally, in order to be consistent with (3), it is assumed that:
m i j ( U i ( t ) ) u k > 0 , for i , j , k : v i V , v j V i , v k V i { v i } .
The dynamics for the probability p i ( t ) of node v i V to be in state a is given by (compare with [8,10,12]):
p i ( t + 1 ) = ( 1 μ i ) p i ( t ) + η i ( P i ( t ) , U i ( t ) ) ( 1 p i ( t ) ) , p i ( 0 ) = p i 0 ,
or in vector form:
P ( t + 1 ) = E μ P ( t ) + N ( P ( t ) , U ( t ) ) ( 1 P ( t ) ) , P ( 0 ) = P 0
where P ( t ) is the system state, and U ( t ) the control parameters are given by:
P ( t ) = [ p 1 ( t ) , p 2 ( t ) , , p N ( t ) ] T P [ N ] , U ( t ) = [ u 1 ( t ) , u 2 ( t ) , , u N ( t ) ] T P [ N ]
with 1 being a vector with unity entries and:
E μ = diag ( 1 μ i ) , N ( P , U ) = diag ( η i ( P i , U i ) ) ,
Additionally, for later use:
M U = { m i j ( U i ) } , for i : v i : V , and j : v j V i .

2.2. Control Problem

The purpose of the control design is to bring the state of the network to the extinction state. When the extinction state is not stable, the control must be designed in such a way that destabilizing components are compensated and self-stabilization mechanisms are enhanced. This can be accomplished in different ways, e.g., by changing the network structure [33,34,35] or node-specific parameters [27,36,37,38]. As for complex networks, not all node parameters are subject to control, and a systematic adaptation of parameters also implies computational complexity and may imply necessary communication structures, a set of nodes whose parameters should be adapted in order to achieve stabilization must be chosen. Once this set of nodes has been defined, it must be clarified what kind of adaptation mechanism provides the desired stabilization. A central question in this step is the decision about whether implementing a central computation structure, which decides on all parameters, or implementing a local, so-called decentralized control structure, which implies that the decision about how the control parameters are adapted, is computed locally at the node level. The implementation of this control on the other side requires some sensory information about the network state. Locating sensors in all nodes again implies high costs and complex communication structures, in particular if a centralized control structure is implemented that has to collect all the sensory data. Thus, a set of nodes for which sensor information must be provided in order to implement the control must be specified. In the sequel, the nodes for which sensor data are available are said to be monitored. A feedback control that depends on knowledge of the complete network state is called a state-feedback, while a control scheme that only requires the existing sensor information from the monitored nodes is called output-feedback control.
On the basis of the above discussion and terminology, the problem considered in this paper consists of designing a decentralized output-feedback control strategy to ensure the stabilization of the desired extinction state P * = 0 over the complex network G ( V , E ) . In particular, this includes the determination of:
  • the set of M nodes that have to be monitored, i.e.,
    V m = { v m 1 , v m 2 , , v m M } , Y ( t ) = y 1 ( t ) , y 2 ( t ) , , y M ( t ) T , y i ( t ) = p m i ( t ) , v m i V ,
    where the number M has to be determined and Y ( t ) is the measurement vector,
  • the set of K nodes to be controlled, i.e.,
    V c = { v c 1 , v c 2 , , v c K } , v c i V ,
    where the number K has to be determined and,
  • the feedback control laws for the nodes v i V c
    u i ( t ) = φ i ( Y i ( t ) )
    where Y i ( t ) R M i is the part of the measurement vector Y ( t ) that has to be accessible to node v i V c .
The approach for achieving this objective follows the constructive (passivity-based) control idea and consists of two steps: (i) assigning the necessary outputs so that the associated zero dynamics, i.e., the dynamics constrained to a submanifold:
M 0 = { P P [ N ] | v i V c : p i = 0 }
is asymptotically stable, and (ii) designing the controllers u i = φ i ( Y i ) so that for some 0 γ < 1 , it holds that:
p i ( t ) p i 0 γ t .
The decision about which nodes need to be measured will depend on the control laws φ i to be designed and is addressed in the subsequent analysis.

3. Selection of Monitored and Controlled Nodes

In this section, the central question about which nodes should be monitored in order to ensure a stabilization of the desired state probability distribution P * = 0 is addressed by determining a condition for exponential stability on the associated zero dynamics. Before analyzing this, notice that the fixed points associated with the dynamics (5) for some constant U i * P [ N i + 1 ] can be determined substituting the relation p i ( t + 1 ) = p i ( t ) = p i * . After some algebra, it follows that:
p i * = η i ( P i * , U i * ) μ i + η i ( P i * , U i * ) .
According to the above equation, we point out that the extinction state P * = 0 is a fixed point when η i ( 0 , U i * ) = 0 ; however, it is not clear if the extinction state or any other fixed point given by (11) is stable. The extinction state means that no information is spreading. In the virus spreading context, this condition plays an important role in order to explain how a virus is propagated.
The following lemma gives an important basis for the subsequent analysis.
Lemma 1.
The set P [ N ] = [ 0 , 1 ] N is positively invariant for the dynamics (6).
Proof. 
Consider the case that for some i : v i V , it holds that p i ( t ) = 0 for some t 0 . By (5), it follows that p i ( t + 1 ) = η ( P ( t ) , U ( t ) ) 0 . On the other hand, assume that p i ( t ) = 1 for some t 0 . It follows that p i ( t + 1 ) = ( 1 μ i ) 1 . Thus, for all i : v i V , it holds that 0 p i ( t ) 1 for all t 0 , showing that P [ N ] is a positively invariant set for the dynamics (6).  ☐
For the purpose of analyzing the stability properties, consider a constant U * = [ u 1 * , u 2 * , , u N * ] T in the dynamics (6) with the fixed point given by (11). The following fundamental result on the stability of the origin of the dynamics (6) is obtained using a similar reasoning as in the analysis of epidemic spreading in [8].
Lemma 2.
Consider the dynamics (6) on a complex network with graph G ( V , E ) and adjacency matrix A = { a i j } , and let m i j ( U i * ) : P [ N i + 1 ] R + be a function satisfying (2) and (4). Then, the origin P = 0 of the dynamical system (6) is globally asymptotically stable if the constants u i * are such that:
σ ( E μ + M U ) < 1 , U * = [ u 1 * , u 2 * , , u N * ] T P [ N ] ,
where E μ and M U are defined in (7) and σ ( · ) is the spectral radius of a matrix.
Proof. 
Using the mean value theorem [39] over η i ( P i ( t ) , U i * ) in order to proof the Lemma, one obtains:
η i ( P i ( t ) , U i * ) η i ( 0 , U i * ) = P η i ( α P i ( t ) , U i * ) · P ( t ) for some α [ 0 , 1 ] ,
where P denotes the gradient with respect to the vector P.
Recalling that when P i = 0 , the neighbor nodes of v i do not contribute to spreading the information and, therefore, η i ( 0 , U i * ) = 0 , it follows from the mean value theorem that:
η i ( P i ( t ) , U i * ) = η i ( P i ( t ) , U i * ) η i ( 0 , U i * ) = P η i ( α P i ( t ) , U i * ) · P i ( t ) = j V i η i ( α p i ( t ) , U i * ) p j p j ( t ) , α [ 0 , 1 ] .
Substituting the above equation into (5), one obtains:
p i ( t + 1 ) = ( 1 μ i ) p i ( t ) + j V i η i ( α p i ( t ) , U i * ) p j p j ( t ) ( 1 p i ( t ) ) , α [ 0 , 1 ] .
Taking the absolute values on both sides of (14) yields:
| p i ( t + 1 ) | = ( 1 μ i ) p i ( t ) + j V i η i ( α p i ( t ) , U i * ) p j p j ( t ) ( 1 p i ( t ) ) | 1 μ i | | p i ( t ) | + j V i η i ( α p i ( t ) , U i * ) p j | p j ( t ) | | 1 p i ( t ) | ( 1 μ i ) p i ( t ) + j V i η i ( α p i ( t ) , U i * ) p j p j ( t ) .
By (2), the slope of η i is bounded, so it holds that:
p i ( t + 1 ) ( 1 μ i ) p i ( t ) + j = 1 N m i j ( U i * ) a i j p j ( t ) .
Consider the auxiliary states x i ( t ) 0 , i = 1 , , N , so that p i ( t ) x i ( t ) and:
x i ( t + 1 ) = ( 1 μ i ) x i ( t ) + j = 1 N m i j ( U i * ) a i j x j ( t ) .
These dynamics can be written in vector form as:
X ( t + 1 ) = [ E μ + M U ] X ( t ) ,
with X ( t ) = [ x 1 ( t ) , x 2 ( t ) , , x N ( t ) ] T and E μ and M U defined in (7). It follows that lim X ( t ) = 0 if and only if σ ( E μ + M U ) < 1 , i.e., all eigenvalues of E μ + M U are within the unit circle around the origin in the complex plane. As for all i = 1 , , N , it holds that p i ( t ) x i ( t ) , and it follows that lim t P ( t ) = 0 for all initial values P 0 P [ N ] .  ☐
The asymptotic stability condition (12) is of a very general nature, given that it involves the complete network. One can refine it to gain insight into the conditions that every node v i V has to satisfy in order to ensure that the complete state P P [ N ] converges to P * = 0 .
Lemma 3.
For a constant U i * P [ N i + 1 ] and for every v i V , the state vector P ( t ) P [ N ] globally asymptotically converges to the desired state P * = 0 if:
v i V : j = 1 N m i j ( U i * ) a i j < μ i .
Proof. 
The proposition is proven according to Gerschgorin’s theorem [40], which provides an upper-bound estimate for the spectral radius of a given matrix. For the matrix E μ + M U , the theorem yields the following inequality:
λ ( 1 μ i ) j = 1 N m i j ( U i * ) a i j
where λ represents an eigenvalue of matrix E μ + M U . The above inequality is bounded as follows:
| λ | 1 μ i λ ( 1 μ i ) j = 1 N m i j ( U i * ) a i j | λ | λ ( 1 μ i ) + 1 μ i j = 1 N m i j ( U i * ) a i j + 1 μ i
Now, the solution of (16) converges asymptotically to zero if | λ | < 1 . Therefore, we bound the above inequality as follows:
| λ | j = 0 N m i j ( U i * ) a i j + 1 μ i < 1
Given that for all i : v i V , it holds that μ i 1 , a sufficient condition to ensure asymptotic convergence in (15), and therefore in (5), is given by:
j = 1 N m i j ( U i * ) a i j < μ i .
This completes the proof.  ☐
Note that if this condition does not hold, it gives a hint about how to choose the nodes to be monitored. Under this hypothesis, it seems appropriate to consider the set of controlled nodes v i V c as those nodes that do no satisfy the condition (17) and the monitored nodes as those neighbor nodes v j V i of the controlled node v i V c including the controlled node v i . As we will show later, it is sufficient to take V m = V c .
Provided a controller exists, which steers the controlled nodes v i exponentially to p i * = 0 , the dynamics converges exactly to the submanifold M 0 defined in (9), called the zero dynamics [32,41]. By the control action, this manifold is a positively invariant subspace of P [ N ] . Furthermore, note that with the monitored nodes p i = 0 , they no longer influence the spreading process, so that the zero dynamics correspond to a spreading process over a reduced network, from which the monitored nodes have been withdrawn. As the nodes included in this reduced network by construction satisfy Condition (17), the desired state vector P * = 0 is the unique attractor fixed point in M 0 . This is summarized in the following corollaries.
Corrollary 1.
If the nodes that do not satisfy the condition (17) are controlled, then the zero-dynamics has P * = 0 as the unique asymptotically stable fixed-point.
Note that the establishment of the asymptotic stability of P * M 0 for the zero dynamics is a key step in the constructive control approach [41], but does not yet ensure the asymptotic stability of P * P [ N ] . This will be addressed later.
The condition (17), for a given node v i V , establishes a relation between the amount of the interaction neighbors-to-node, with the properties of the node (given by μ i ). A high interaction neighbors-to-node, regardless of the number of neighbors, can produce the spreading of information over the network. Thus, these nodes should be controlled.
On the other hand, it is possible to establish an alternative bounding dynamics for (5) in the same sense of Lemma 3, which yields the stability condition stated next.
Lemma 4.
For a constant U i * P [ N i + 1 ] , the state vector P ( t ) P [ N ] globally asymptotically converges to the desired state P * = 0 if:
v i V : j = 1 N m j i ( U j * ) a j i < μ i .
Proof. 
Consider the average probability of (5) and (13) as follows:
1 N i = 1 N p i ( t + 1 ) = 1 N i = 1 N ( 1 μ i ) p i ( t ) + η i ( P ( t ) , U i * ) ( 1 p i ( t ) ) = 1 N i = 1 N ( 1 μ i ) p i ( t ) + j V i η i ( α p i ( t ) , U i * ) p j p j ( t ) ( 1 p i ( t ) ) , α [ 0 , 1 ] .
Taking the absolute value on the above equation and recalling (2) as in the proof of Lemma 2, it follows that:
1 N i = 1 N p i ( t + 1 ) = 1 N i = 1 N p i ( t + 1 ) = 1 N i = 1 N ( 1 μ i ) p i ( t ) + j V i η i ( α p i ( t ) , U i * ) p j p j ( t ) ( 1 p i ( t ) ) , i = 1 N ( 1 μ i ) p i ( t ) + j = 1 N m i j ( U i * ) p j ( t ) a i j .
The last term in the above inequality includes the entries of the matrix E μ + M U and the state vector P ( t ) as follows:
[ E + M U ] P ( t ) = ( 1 μ 1 ) p 1 ( t ) + j = 1 N m 1 j ( U 1 * ) p j ( t ) a 1 j ( 1 μ 2 ) p 2 ( t ) + j = 1 N m 2 j ( U 2 * ) p j ( t ) a 2 j ( 1 μ N ) p N ( t ) + j = 1 N m N j ( U N * ) p j ( t ) a N j = ( 1 μ 1 ) p 1 ( t ) + m 12 ( U 1 * ) p 2 ( t ) a 12 + + m 1 N ( U 1 * ) p N ( t ) a 1 N m 21 ( U 2 * ) p 1 ( t ) a 21 + ( 1 μ 2 ) p 2 ( t ) + + m 2 N ( U 2 * ) p N ( t ) a 2 N m N 1 ( U N * ) p 1 ( t ) a N 1 + m N 2 ( U N * ) p 2 ( t ) a N 2 + + ( 1 μ N ) p N ( t ) .
Note that the summation in (19) is performed over each entry of the vector [ E μ + M U ] P ( t ) , where i represents the i-th row entry. Therefore, it is possible to rearrange the above vector as follows:
[ E μ + M U ] P ( t ) = ( 1 μ 1 ) p 1 ( t ) m 21 ( U 2 * ) p 1 ( t ) a 21 m N 1 ( U N * ) p 1 ( t ) a N 1 + m 12 ( U 1 * ) p 2 ( t ) a 12 ( 1 μ 2 ) p 2 ( t ) m N 2 ( U N * ) p 2 ( t ) a N 2 + + m 1 N ( U 1 * ) p N ( t ) a 1 N m 2 N ( U 2 * ) p N ( t ) a 2 N ( 1 μ N ) p N ( t )
Summing over each entry of the column vector, and later over each column, we have:
i = 1 N ( 1 μ i ) p i ( t ) + j = 1 N m i j ( U i * ) p j ( t ) a i j = ( 1 μ 1 ) p 1 ( t ) + j = 1 N m j 1 ( U j * ) p 1 ( t ) a j 1 + ( 1 μ 2 ) p 2 ( t ) + j = 1 N m j 2 ( U j * ) p 2 ( t ) a j 2 + + ( 1 μ N ) p N ( t ) + j = 1 N m j N ( U j * ) p N ( t ) a j N = i = 1 N ( 1 μ i ) p i ( t ) + j = 1 N m j i ( U j * ) p i ( t ) a j i = i = 1 N ( 1 μ i ) + j = 1 N m j i ( U j * ) a j i p i ( t ) .
Summarizing:
i = 1 N p i ( t + 1 ) i = 1 N ( 1 μ i ) p i ( t ) + j = 1 N m i j ( U i * ) p j ( t ) a i j = i = 1 N ( 1 μ i ) + j = 1 N m j i ( U j * ) a j i p i ( t ) .
Associating the corresponding terms for every node v i , we obtain:
p i ( t + 1 ) ( 1 μ i ) + j = 1 N m j i ( U j * ) a j i p i ( t ) .
Consider the auxiliary states w i ( t ) 0 , i = 0 , 1 , , N , so that p i ( t ) w i ( t ) and:
w i ( t + 1 ) = ( 1 μ i ) + j = 1 N m j i ( U j * ) a j i w i ( t ) .
A condition to ensure asymptotic convergence to zero in (20) is given by:
1 μ i + j = 1 N m j i ( U j * ) a j i < 1 .
Thus:
j = 1 N m j i ( U j * ) a j i < μ i .
Hence, given that p i ( t ) w i ( t ) , the above inequality is a sufficient condition to ensure asymptotic convergence in the dynamics (5).  ☐
The preceding result gives another criterion about how to choose nodes to be monitored. In this case, the set of controlled nodes V c contains those nodes v i that do not satisfy (18), but it is not clear which nodes have to be monitored. However, the vectors U j * ( v j V i ) in (18) have something in common: all have the same entry u i * . Thus, in this case, it seems appropriate considering that V m = V c . Finally, the dynamics (20) establishes an alternative upper bound for (5).
In the same sense of the condition of Lemma 3, if the controlled nodes are chosen as those that do not satisfy the condition (18), then by construction, the zero-dynamics has the origin as the asymptotically-stable fixed point, and this is summarized in the following corollary.
Corrollary 2.
If the nodes that do not satisfy the condition (18) are controlled, then the zero-dynamics is asymptotically stable.
Note that the condition (18) has a similar interpretation as the condition (17). In this case, a high interaction node-to-neighbors, regardless of the number of neighbors, can produce information spreading over the network. Therefore, those nodes that do not satisfy the above condition should be controlled.

4. Feedback Control Design

In this section, the question is addressed about how to design the feedback control (8) for the nodes v i V c so that lim t | p i ( t ) p i * | = 0 . Up to this point, the dependency of the transition probability η i on the control input U i ( t ) has been neglected, given that U i ( t ) was considered as a set of constant parameters. For the nodes to be controlled, it is now supposed that the dependency of η i on U i ( t ) is of a certain structure, which allows one to explicitly determine a control law that steers the nodes v i V c to their desired values p i * = 0 . Before addressing the control design step, the following helpful result is established.
Lemma 5.
Let U i , 1 = [ u i , 1 , u k 1 , 1 , u k 2 , 1 , , u k N i , 1 ] T , U i , 2 = [ u i , 2 , u k 1 , 2 , u k 2 , 2 , , u k N i , 2 ] T P [ N i + 1 ] with u k , 1 u k , 2 , k = i , 1 , , N i and v i V , then m i j ( U i , 1 ) m i j ( U i , 2 ) for all j such that v j V i .
Proof. 
By virtue of the mean value theorem, it holds that:
m i j ( U i , 2 ) m i j ( U i , 1 ) = k = 1 N m i j ( U ¯ i ) u k ( u k , 2 u k , 1 ) a i k ,
where U ¯ i = U i , 1 + δ ( U i , 2 U i , 1 ) , δ ( 0 , 1 ) . Recalling the condition (4), having u k , 2 u k , 1 , it follows that:
m i j ( U i , 2 ) m i j ( U i , 1 ) 0 .
This completes the proof.  ☐
On the basis of the above developments, the set V c of nodes to be controlled is determined either according to Corollary 1 or Corollary 2, i.e., those nodes that do not satisfy either (17) or (18). For both cases, a sufficient condition for the asymptotic stability of the closed-loop system is provided next.
Theorem 1.
Consider the dynamics (5) where the set V c of nodes to be controlled is determined according either according to Corollary 1 or 2, i.e., V c is the set of those nodes that do not satisfy either (17) or (18), respectively. Let V m = V c , i.e., all controlled nodes are monitored, and let for all i : v i V c the value u ¯ i be such that the condition (17) or (18), respectively, holds true. If the controls u i ( t ) satisfy:
0 u i ( t ) < u ¯ i ,
then lim t p i ( t ) = 0 .
Proof. 
Let U ¯ i P [ N i + 1 ] be such that for all nodes v i V c whose control input appears in U i , its value is replaced by u ¯ i . Given u i ( t ) u ¯ i , it follows from Lemma 5 that m i j ( U i ( t ) ) m i j ( U ¯ i ) , and thus:
j = 1 N m i j ( U i ( t ) ) a i j j = 1 N m i j ( U ¯ i ) a i j < μ i ,
j = 1 N m j i ( U j ( t ) ) a j i j = 1 N m j i ( U ¯ j ) a j i < μ i .
The above inequalities satisfy Lemmas 3 and 4, respectively, so lim t p i ( t ) = 0 .  ☐
From Theorem 1, in order to stabilize the system (5) to the extinction state, it is necessary to design a feedback control u i ( t ) , v i V c , that takes values below the upper-bound u ¯ i . This can be ensured, e.g., by the linear feedback control:
u i ( t ) = α u ¯ i ( 1 p i ( t ) ) , α ( 0 , 1 ) .

5. Feedback Control Example

To corroborate our results, we design a feedback control in the model proposed by Gomez [11] in order to stabilize the system to the extinction state. This is a discrete-time Markov contact-based epidemic spreading model that establishes the probability of infection of each node. However, we do not consider reinfection in the same time step, and in contrast with Gomez’s model, each node has different values for the recovery probability ( μ ), infection rate ( β ) and contact probability (r).
The probability of infection of each node i at time t + 1 is given by:
p i ( t + 1 ) = ( 1 μ i ) p i ( t ) + ( 1 p i ( t ) ) ( 1 ζ i ( t ) ) , ζ i ( t ) = j = 1 N ( 1 β i r j p j ( t ) a i j ) .
where ζ i ( t ) is the probability for node i to be not infected by any neighbor and a i j are the entries of the corresponding adjacency matrix. The network is described by the set of nodes V, and the set of neighbors of node i is given by V i , i : v i V . There are N = | V | nodes in the network, and each node i has a degree N i = | V i | . According to our framework, η i ( P i ( t ) , U i ( t ) ) is given by:
η i ( P i ( t ) , U i ( t ) ) = 1 ζ i ( t ) = 1 j = 1 N ( 1 β i r j p j ( t ) a i j ) .
Suppose that the parameters that are amenable to manipulation are β i and/or r i , i.e., we assume that it is possible to improve the health of the nodes or avoid a node performing several contact attempts with its neighbors. Accordingly, the entries of the vector U i ( t ) are given by the infection rate ( β ) and the contact probability (r), i.e.,
U i ( t ) = [ β i , r k 1 , r k 2 , , r k N i ] , i V , and k l : v k l V i .
The fixed points p i * associated with the dynamics (21) are:
p i * = 1 j = 1 N ( 1 β i * r j * p j * a i j ) μ i + 1 j = 1 N ( 1 β i * r j * p j * a i j ) ,
for some constant values β i * and r i * . Note that p i * = 0 is a fixed point that represents the extinction state, but its stability is unknown. However, Lemmas (3) and (4) give us sufficient conditions to ensure asymptotic stability in the extinction state of the system (21).
According to our definition for η i , it is necessary to determine if η i satisfy conditions (2) and (4), i.e., we have to prove that η i strictly monotonically increases with u k and to find a m i j strictly monotonically increases with u k .
Condition (2) can be established taking the derivative with respect to p k ( k = 1 , 2 , , N ) as follows:
η i ( P i ( t ) , U i ( t ) ) p k = p k 1 j = 1 N ( 1 β i r j p j ( t ) a i j ) = β i r k a i k j = 1 , j k N ( 1 β i r j p j ( t ) a i j ) β i r k a i k = m i k ( U i ( t ) ) a i k , i V , k : v k V i .
The above equation shows that m i k ( U i ( t ) ) monotonically increases with u k , and its arguments are reduced to m i k ( U i ( t ) ) = m i k ( β i , r k ) .
The second condition is proven taking the derivative with respect to β k ( k = 1 , 2 , , N ):
η i ( P i ( t ) , U i ( t ) ) β k = β k 1 j = 1 N ( 1 β i r j p j ( t ) a i j ) = 0 if i k l = 1 N r l p l ( t ) a i l j = 1 , j l N ( 1 β i r j p j ( t ) a i j ) if i = k . 0 .
and then with respect to r k ( k = 1 , 2 , , N ):
η i ( P i ( t ) , U i ( t ) ) r k = r k 1 j = 1 N ( 1 β i r j p j ( t ) a i j ) = 0 if i k l = 1 N β l p l ( t ) a i l j = 1 , j l N ( 1 β i r j p j ( t ) a i j ) if i = k . 0 .
In both cases, η i monotonically increases with β or r.
Using Lemmas (3) and (4), we can conclude that the system (21) globally asymptotically converges to the desired state P * = 0 , if all nodes v i V satisfy any of the following conditions:
j = 1 N β i r j a i j < μ i ,
or:
j = 1 N β j r i a j i < μ i .
Note that the above conditions give us a hint about how to design a feedback control to stabilize the extinction state and to assign the output of the system:
Y ( t ) = [ y i ( t ) ] T = [ p i ( t ) ] T , where v i does   not   satisfy   ( 25 ) ,
or:
Y ( t ) = [ y i ( t ) ] T = [ p i ( t ) ] T , where v i does   not   satisfy   ( 26 ) .

5.1. Simulations

We perform several simulations of the dynamical system (21) for different initial conditions, with the following considerations:
  • We incorporate preferential attachment in a network with N = 10 6 nodes, according to [22]. To incorporate the growing character of the network, we started with a small number m o = 9 of vertices (linked randomly), and at every time step, we add a new vertex with m = 3 edges until we reach N = 10 6 nodes. In spite of the fact that we are using a scale-free network, we emphasize that our results are independent of the network’s topology.
  • The constant values for the recovery probability ( μ i * ), infection rate ( β i * ) and contact probability ( r i * ) were distributed uniformly over the nodes with values into the interval [ 0.2 , 0.7 ] .
  • In order to verify our results, we calculated the average probability as follows:
    ρ ( t ) = 1 N i = 1 N p i ( t ) .
The system simulated is given by:
p i ( t + 1 ) = ( 1 μ i ) p i ( t ) + η i ( P i ( t ) , U i ( t ) ) ( 1 p i ( t ) ) , η i ( P i ( t ) , U i ( t ) ) = 1 j = 1 N ( 1 β i r j p j ( t ) a i j ) ,
where:
| V | = N = 10 6 , N i = | V i | , μ i * , β i * , r i * [ 0.2 , 0.7 ] ,
P i ( t ) = [ p k 1 ( t ) , p k 2 ( t ) , , p k N i ( t ) ] T , U i ( t ) = [ β i ( t ) , r k 1 ( t ) , r k 2 ( t ) , , r k N i ( t ) ] T , k l : v k l V i ,
0 p i ( t ) , β i ( t ) , r i ( t ) , μ i ( t ) 1 , v i V ,
Y ( t ) = [ p i ( t ) ] T , v i V c a   or   V c b ,
where V c a is the set of those nodes i that do not satisfy (25) and V c b is the set of those nodes i that do not satisfy (26).

5.1.1. Behavior of the System in the Absence of Control

Figure 2 shows the simulations results for the system (30) in the absence of control. The result shows that the system (30) presents an endemic state independent of the initial conditions, and it shows that about 30% of the nodes are probably infected.
Our results give us 495,091 nodes do not satisfy Condition (25) and 477,061 nodes that do no satisfy (26); therefore, we identify these nodes as the nodes to be controlled and monitored in order to steer the system to the extinction state.

5.1.2. Behavior of the Nodes Associated with the Zero Dynamics

In order to corroborate that the associated zero dynamics is asymptotically stable, we set Y ( t ) = 0 , i.e., for those nodes that do not satisfy (25), we consider β i = 0 , and for those nodes that do not satisfy (26), we consider r i = 0 ; the action of considering β i = 0 or r i = 0 is equivalent to unlinking the node i.
Under this conditions, the dynamical evolution of the system (30) is shown in Figure 3a,b. Note that, in both cases, the extinction state is reached after 15 time steps approximately.

5.1.3. Behavior of the System with a Linear Feedback Control

We perform two separate simulations that will show the dynamical evolution of the system when a control is implemented. In the first one, we propose a linear control that will act only on those nodes that do not satisfy Condition (25). In the second one, a linear control will act only on those nodes that do not satisfy Condition (26). According to Theorem 1, we must establish an upper bound, in either case, namely β ¯ i and r ¯ i , respectively. These upper bounds can be determined using Equation (25) or (26). For Condition (25), we have:
j = 1 N β ¯ i r j * a i j = μ i * , β ¯ i = μ i * j = 1 N r j * a i j .
and for Condition (26):
j = 1 N β j * r ¯ i a j i = μ i * , r ¯ i = μ i * j = 1 N β j * a j i .
Note that (31) relates the infection probability β i of the node i with its recovery probability μ i and the contact capacity of its neighbor nodes, given by j = 1 N r j * a i j . On the other hand, Equation (32) relates the contact probability r i of the node i, with its recovery probability μ i and the infection capacity of its neighbor nodes, given by j = 1 N β j * a j i . This means that a node with a high rate of contact can be infected with a great probability; besides, a node with weak neighbor nodes (those with a high probability of infection) can be a focus of infection, as is intuitively clear.
Thus, the controls proposed should be such that:
β i ( t ) < β ¯ i and r i ( t ) < r ¯ i .
It follows that for the nodes that do not satisfy (25), the control proposed could be given by:
β i ( t ) = γ β ¯ i ( 1 p i ( t ) ) ,
and for those nodes that do not satisfy (26):
r i ( t ) = γ r ¯ i ( 1 p i ( t ) ) , 0 < γ < 1 .
Note that both controls above depend on the state of the node i given by p i ( t ) and the properties of its neighbor nodes given by β ¯ i and r ¯ i . The value γ must be in the interval ( 0 , 1 ) in order to satisfy (33).
Figure 4a,b shows the results of the simulation of the system (30) with the applied controls (34) and (35), respectively, with γ = 0.9 . In both cases, it is shown that the extinction state is a closed-loop attractor, although not as fast as in the case of Figure 3a,b, corresponding to the evolution of the zero dynamics.

6. Conclusions and Outlook

A Markov chain-based model for a Susceptible-Infected-Susceptible (SIS) dynamics over complex networks has been analyzed, and a control mechanism has been proposed in order to stabilize the extinction state. Given that the system presents a high non-linear behavior, our analytical approach is based on determining a bilinear dynamics (15) and (20) that upper bounds the non-linear system. Following this approach, it is possible to determine two sufficient conditions (17) and (18) that ensure that the extinction state will be asymptotically stable. As a result of these conditions, we have determined which nodes are suitable for monitoring and controlling, in order to achieve the extinction of the propagation of the information. A linear feedback control scheme was tested for the stabilization of the extinction state in numerical simulation studies with N = 10 6 nodes, showing the performance of the approach.
Future studies will consider generalizations of this approach to higher-dimensional node dynamics, multilayer networks [42,43], complex networks of agents [44,45] and analyzing the possibility of applying these kinds of control strategies for financial market models and decision dynamics [46,47,48].

Acknowledgments

This work was partially sponsored by Rector office of UAM Cuajimalpa through “Programa de Apoyo a Proyectos Interdisciplinarios”. We also thank DMAS for partially supporting the publication of this work.

Author Contributions

All authors designed and did the research, in particular the stability analysis; Luis A. Alarcón Ramos and Alexander Schaum conceived and designed the control and the numerical experiments; Luis A. Alarcón Ramos performed the numerical experiments; All authors analyzed the data; Alexander Schaum and Roberto Bernal Jaquez wrote the paper; All authors reviewed the manuscript; All authors have read and approved the final manuscript.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Berger, N.; Borgs, C.; Chayes, J.T.; Saberi, A. On the spread of viruses on the internet. In Proceedings of the Sixteenth Annual ACM-SIAM Symposium on Discrete Algorithms (SODA ’05), Vancouver, BC, Canada, 23–25 January 2005; pp. 301–310. [Google Scholar]
  2. Yang, L.; Yang, X. A new epidemic model of computer viruses. Commun. Nonlinear Sci. Numer. Simul. 2014, 19, 1935–1944. [Google Scholar] [CrossRef]
  3. Serazzi, G.; Zanero, S. Computer Virus Propagation Models. In Performance Tools and Applications to Networked Systems; Calzarossa, M.C., Gelenbe, E., Eds.; Lecture Notes in Computer Science; Springer: Berlin/Heidelberg, Germany, 2004; Volume 2965, pp. 26–50. [Google Scholar]
  4. Li, Y.; Pan, J.; Zhen, J. Dynamic Modeling and Analysis of the Email Virus Propagation. Discret. Dyn. Nat. Soc. 2012, 2012, 1–22. [Google Scholar] [CrossRef]
  5. Wang, W.; Tang, M.; Zhang, H.; Do, Y.; Liu, Z. Epidemic spreading on complex networks with general degree and weight distributions. Phys. Rev. E 2014, 90, 1–8. [Google Scholar] [CrossRef] [PubMed]
  6. Leventhal, G.; Hill, A.; Nowak, M.; Bonhoeffer, S. Evolution and emergence of infectious diseases in theoretical and real-world networks. Nat. Commun. 2015, 6, 1–11. [Google Scholar] [CrossRef] [PubMed]
  7. Tomovski, I.; Trpevski, I.; Kocarev, L. Topology independent SIS process: An engineering viewpoint. Commun. Nonlinear Sci. Numer. Simul. 2014, 19, 627–637. [Google Scholar] [CrossRef]
  8. Wang, Y.; Chakrabarti, D.; Wang, C.; Faloutsos, C. Epidemic spreading in real networks: An eigenvalue viewpoint. IEEE SRDS 2003, 25–34. [Google Scholar] [CrossRef]
  9. Chakrabarti, D.; Wang, Y.; Wang, C.; Leskovec, J.; Faloutsos, C. Epidemic thresholds in real networks. ACM Trans. Inf. Syst. Secur. 2008, 10, 13:1–13:26. [Google Scholar] [CrossRef]
  10. Gomez, S.; Arenas, A.; Borge-Holthoefer, J.; Meloni, S.; Moreno, Y. Discrete-time Markov chain approach to contact-bases disease spreading in complex networks. Europhys. Lett. 2010, 89, 38009p1–38009p6. [Google Scholar] [CrossRef]
  11. Gomez, S.; Arenas, A.; Borge-Holthoefer, J.; Meloni, S.; Moreno, Y. Probabilistic framework for epidemic spreading in complex networks. Int. J. Complex Syst. Sci. 2011, 1, 47–54. [Google Scholar]
  12. Meloni, S.; Arenas, A.; Gomez, S.; Borge-Holthoefer, J.; Moreno, Y. Modeling Epidemic Spreading in Complex Networks: Concurrency and Traffic. In Handbook of Optimization in Complex Networks; Thai, M.T., Pardalos, P.M., Eds.; Springer: New York, NY, USA, 2012; pp. 435–462. ISBN 978-1-4614-0753-9. [Google Scholar]
  13. Moreno, Y.; Nekovee, M.; Pacheco, A. Dynamics of rumor spreading in complex networks. Phys. Rev. E 2004, 69, 1–7. [Google Scholar] [CrossRef] [PubMed]
  14. Borge-Holthoefer, J.; Moreno, Y. Absence of influential spreaders in rumor dynamics. Phys. Rev. E 2012, 85, 1–5. [Google Scholar] [CrossRef] [PubMed]
  15. Singh, A.; Nath Singh, Y. Rumor Spreading and Inoculation of Nodes in Complex Networks. In Proceedings of the 21st International Conference on World Wide Web (WWW ’12 Companion), Lyon, France, 16–20 April 2012; pp. 675–678. [Google Scholar] [CrossRef]
  16. Xie, M.; Jia, Z.; Chen, Y.; Deng, Q. Simulating the Spreading of Two Competing Public Opinion Information on Complex Network. Appl. Math. 2012, 3, 1074–1078. [Google Scholar] [CrossRef]
  17. McKendrick, A. Applications of Mathematics to Medical Problems. Edinb. Math. Soc. 1925, 44, 98–130. [Google Scholar] [CrossRef]
  18. Kephart, J.O.; White, S.R. Directed-graph epidemiological models of computer viruses. In Proceedings of the 1991 IEEE Computer Society Symposium on Research in Security and Privacy, Oakland, CA, USA, 20–22 May 1991; pp. 343–359. [Google Scholar] [CrossRef]
  19. Kephart, J.O.; White, S.R. Measuring and modeling computer virus prevalence. In Proceedings of the 1993 IEEE Computer Society Symposium on Research in Security and Privacy, Oakland, CA, USA, 24–26 May 1993; pp. 2–15. [Google Scholar] [CrossRef]
  20. Wang, W.; Tang, M.; Stanley, H.E.; Braunstein, L.A. Unification of theoretical approaches for epidemic spreading on complex networks. Rep. Prog. Phys. 2017, 80, 036603. [Google Scholar] [CrossRef] [PubMed]
  21. Ferraz de Arruda, G.; Rodrigues, F.; Rodríguez, P.; Cozzo, E.; Moreno, Y. A General Markov Chain Approach for Disease and Rumor Spreading in Complex Networks. J. Complex Netw. 2016. [Google Scholar] [CrossRef]
  22. Barabási, A.L.; Albert, R. Emergence of scaling in random networks. Science 1999, 286, 509–512. [Google Scholar] [PubMed]
  23. Pastor-Satorras, R.; Vespignani, A. Epidemic Spreading in Scale-Free Networks. Phys. Rev. Lett. 2001, 86, 3200–3203. [Google Scholar] [CrossRef] [PubMed]
  24. Schaum, A.; Bernal Jaquez, R. Estimating the state probability distribution for epidemic spreading in complex networks. Appl. Math. Comput. 2016, 29, 197–206. [Google Scholar] [CrossRef]
  25. Nowzari, C.; Preciado, V.M.; Pappas, G.J. Analysis and Control of Epidemics: A Survey of Spreading Processes on Complex Networks. IEEE Control Syst. 2016, 36, 26–46. [Google Scholar] [CrossRef]
  26. Bernal Jaquez, R.; Schaum, A.; Alarcon, L.; Rodriguez, C. Stability analysis for virus spreading in complex networks with quarantine. Publ. Mat. Urug. 2013, 14, 221–233. [Google Scholar]
  27. Khanafer, A.; Basar, T. An optimal control problem over infected networks. In Proceedings of the International Conference of Control, Dynamic Systems, and Robotics, Ottawa, ON, Canada, 15–16 May 2014; Volume 125, pp. 1–6. [Google Scholar]
  28. Eshghi, S.; Khouzani, M.H.R.; Sarkar, S.; Venkatesh, S.S. Optimal patching in clustered epidemics of malware. IEEE Trans. Netw. 2015, 24, 283–298. [Google Scholar] [CrossRef]
  29. Bloem, M.; Alpcan, T.; Basar, T. Optimal and robust epidemic response for multiple networks. Control Eng. Pract. 2009, 17, 525–533. [Google Scholar] [CrossRef]
  30. Theodorakopoulos, G.; Le Boudec, J.Y.; Baras, J.S. Selfish response to epidemic propagation. IEEE Trans. Autom. Control 2013, 58, 363–376. [Google Scholar] [CrossRef]
  31. Sahneh, F.D.; Scoglio, C. Epidemic spread in human networks. In Proceedings of the IEEE Conference on Decision and Control and European Control Conference (CDC-ECC), Orlando, FL, USA, 12–15 December 2011; pp. 3008–3013. [Google Scholar] [CrossRef]
  32. Isidori, A. The Zero Dynamics. In Nonlinear Control Systems, an Introduction; Springer: Berlin/Heidelberg, Germany, 1989; ISBN 978-3-662-02583-3. [Google Scholar]
  33. Bishop, A.N.; Shames, I. Link operations for slowing the spread of disease in complex networks. EPL 2011, 95, 18005p1–18005p6. [Google Scholar] [CrossRef]
  34. Enns, E.; Mounzer, J.; Brandeau, M. Optimal link removal for epidemic mitigation: A two-way partitioning approach. Math. Biosci. 2012, 235, 138–147. [Google Scholar] [CrossRef] [PubMed]
  35. Tomovski, I.; Kocarev, L. Simple Algorithm for Virus Spreading Control on Complex Networks. IEEE Trans. Circuits Syst. I Regul. Pap. 2012, 59, 763–771. [Google Scholar] [CrossRef]
  36. Liu, F.; Buss, M. Optimal control for information diffusion over heterogeneous networks. In Proceedings of the IEEE 55th Conference on Decision and Control (CDC), Las Vegas, NV, USA, 12–14 December 2016; pp. 141–146. [Google Scholar] [CrossRef]
  37. Khanafer, A.; Başar, T.; Gharesifard, B. Stability of epidemic models over directed graphs: A positive systems approach. Automatica 2016, 74, 126–134. [Google Scholar] [CrossRef]
  38. Schaum, A.; Alarcon-Ramos, L.; Bernal, R.; Rodriguez, C.; Alvarez, J. Continuous-time Markov-Chain-based control for SIS epidemics in complex networks. In Proceedings of the 2014 International Conference on Circuits, Systems and Control, Interlaken, Switzerland, 22–24 February 2014; pp. 106–111. [Google Scholar] [CrossRef]
  39. Edwards, C.H., Jr. The Multivariable Mean Value Problem. In Advanced Calculus of Several Variables; Academic Press: New York, NY, USA, 1973; pp. 172–180. ISBN 0-12-32550-8. [Google Scholar]
  40. Cullen, C.G. Matrices and Linear Transformations; Courier Corporation: Dover, DE, USA, 1990; pp. 282–286. ISBN 978-0-486-66328-9. [Google Scholar]
  41. Sepulchre, R.; Jankovic, M.; Kokotovic, P.V. The zero Dynamics and Passivity Concepts as Design Tools. In Constructive Nonlinear Control; Springer: Berlin/Heidelberg, Germany, 1997; ISBN 978-1-4471-1245-7. [Google Scholar]
  42. Kivelä, M.; Arenas, A.; Barthelemy, M.; Gleeson, J.; Moreno, Y.; Porter, M. Multilayer networks. J. Complex Netw. 2014, 2, 203–271. [Google Scholar] [CrossRef]
  43. Menichetti, G.; Dall’Asta, L.; Bianconi, G. Control of Multilayer Networks. Sci. Rep. 2016, 6, 20706. [Google Scholar] [CrossRef] [PubMed]
  44. Kononovicius, A.; Gontis, V. Agent based reasoning for the non-linear stochastic models of long-range memory. Phys. A Stat. Mech. Appl. 2012, 391, 1309–1314. [Google Scholar] [CrossRef]
  45. Alfarano, S.; Lux, T.; Wagner, F. Estimation of Agent-Based Models: The Case of an Asymmetric Herding Model. Comput. Econ. 2005, 26, 19–49. [Google Scholar] [CrossRef]
  46. Sznajd-Weron, K.; Sznajd, J. Opinion evolution in closed community. Int. J. Mod. Phys. C 2000, 11, 1157–1165. [Google Scholar] [CrossRef]
  47. Liggett, T.M. Coexistence in Threshold Voter Models. Ann. Probab. 1994, 22, 764–802. [Google Scholar] [CrossRef]
  48. Rodriguez Lucatero, C.; Schaum, A.; Alarcon Ramos, L.; Bernal-Jaquez, R. Message survival and decision dynamics in a class of reactive complex systems subject to external fields. Phys. A Stat. Mech. Appl. 2014, 405, 338–351. [Google Scholar] [CrossRef]
Figure 1. State transition diagram for a node v i V .
Figure 1. State transition diagram for a node v i V .
Entropy 20 00204 g001
Figure 2. ρ ( t ) for several initial conditions without control.
Figure 2. ρ ( t ) for several initial conditions without control.
Entropy 20 00204 g002
Figure 3. Simulation of the zero dynamics, i.e., without those nodes that do not satisfy (25) or (26). (a) Simulation of (30) with β i = 0 where i : v i V c a ; (b) simulation of (30) with r i = 0 where i : v i V c b .
Figure 3. Simulation of the zero dynamics, i.e., without those nodes that do not satisfy (25) or (26). (a) Simulation of (30) with β i = 0 where i : v i V c a ; (b) simulation of (30) with r i = 0 where i : v i V c b .
Entropy 20 00204 g003
Figure 4. Linear feedback control. (a) Simulation with linear feedback control given by (34) where i : v i V c a ; (b) simulation with linear feedback control given by (35) where i : v i V c b .
Figure 4. Linear feedback control. (a) Simulation with linear feedback control given by (34) where i : v i V c a ; (b) simulation with linear feedback control given by (35) where i : v i V c b .
Entropy 20 00204 g004

Share and Cite

MDPI and ACS Style

Alarcón Ramos, L.A.; Bernal Jaquez, R.; Schaum, A. Output-Feedback Control for Discrete-Time Spreading Models in Complex Networks. Entropy 2018, 20, 204. https://0-doi-org.brum.beds.ac.uk/10.3390/e20030204

AMA Style

Alarcón Ramos LA, Bernal Jaquez R, Schaum A. Output-Feedback Control for Discrete-Time Spreading Models in Complex Networks. Entropy. 2018; 20(3):204. https://0-doi-org.brum.beds.ac.uk/10.3390/e20030204

Chicago/Turabian Style

Alarcón Ramos, Luis A., Roberto Bernal Jaquez, and Alexander Schaum. 2018. "Output-Feedback Control for Discrete-Time Spreading Models in Complex Networks" Entropy 20, no. 3: 204. https://0-doi-org.brum.beds.ac.uk/10.3390/e20030204

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop