This paper was converted on www.awesomepapers.org from LaTeX by an anonymous user.
Want to know more? Visit the Converter page.

Edge Augmentation with Controllability Constraints in
Directed Laplacian Networks

Waseem Abbas, Mudassir Shabbir, Yasin Yazıcıoğlu and Xenofon Koutsoukos W. Abbas M Shabbir and X. Koutsoukos are with the Electrical Engineering and Computer Science Department at Vanderbilt University, Nashville, TN, USA (Emails: {waseem.abbas,mudassir.shabbir, xenofon.koutsoukos}@vanderbilt.edu). Y. Yazıcıoğlu is with the Department of Electrical and Computer Engineering at the University of Minnesota, Minneapolis, MN, USA (Email: ayasin@umn.edu).
Abstract

In this paper, we study the maximum edge augmentation problem in directed Laplacian networks to improve their robustness while preserving lower bounds on their strong structural controllability (SSC). Since adding edges could adversely impact network controllability, the main objective is to maximally densify a given network by selectively adding missing edges while ensuring that SSC of the network does not deteriorate beyond certain levels specified by the SSC bounds. We consider two widely used bounds: first is based on the notion of zero forcing (ZF), and the second relies on the distances between nodes in a graph. We provide an edge augmentation algorithm that adds the maximum number of edges in a graph while preserving the ZF-based SSC bound, and also derive a closed-form expression for the exact number of edges added to the graph. Then, we examine the edge augmentation problem while preserving the distance-based bound and present a randomized algorithm that guarantees an α\alpha–approximate solution with high probability. Finally, we numerically evaluate and compare these edge augmentation solutions.

Index Terms:
Edge augmentation, structural controllability, zero forcing, graph distances.

I Introduction

In a networked multi-agent system, a frequent approach to improve network connectivity is to systematically increase interconnections between agents. On the one hand, edge augmentation is useful for improving network connectivity, robustness to link failures, and resilience to malicious intrusions, but on the other hand, adding edges could adversely impact network controllability [1, 2, 3, 4]. In this paper, we study the problem of maximum edge augmentation in a directed network of agents with Laplacian dynamics while preserving the controllability specification. We consider the network’s strong structural controllability (SSC), which depends (apart from the set of input nodes) only on the structure of the underlying graph defined by the edge set of the graph. To measure how much of the network is strong structurally controllable with a given set of leader (input) nodes, the concept of the dimension of strong structurally controllable subspace (SSCS) is typically used (Section II-B). The exact computation of the dimension of SSCS is a hard task, so various graph-theoretic bounds on the dimension of SSCS have been proposed in the literature. We utilize two widely used bounds that are based on the ideas of Zero Forcing (ZF) [5, 6, 7, 8] and distances between nodes in graphs [9, 10]. We discuss these bounds in detail in Sections III-A and IV-A, respectively. Our main objective is to add the maximum number of edges in a given directed graph while preserving the lower bound (ZF-based or distance-based) on the dimension of SSCS. Our contributions are listed below.

1) We present an optimal edge augmentation algorithm for adding the maximum number of edges in a directed graph while preserving the ZF-based bound on the dimension of SSCS. We analyze the algorithm and provide a closed-form expression for the number of edges added in the graph.

2) We also discuss edge augmentation in graphs that preserves the distance-based bound on the dimension of SSCS. For a given node pair (u,v)(u,v) in a directed graph, we characterize the optimal solution of the distance preserving edge augmentation problem in which the objective is to add maximum edges in a graph without changing the distance from node uu to node vv.

3) We then provide a randomized algorithm that adds maximal edges in a directed graph while preserving the distance-based bound on the dimension of SSCS. We also analyze the approximation ratio of the algorithm.

4) Finally, we numerically evaluate and compare various edge augmentation solutions.

We studied the edge augmentation problem while preserving the distance-based bound on SSC in undirected networks in [11]. In this paper, we focus on directed networks and consider both the ZF-based bound and the distance-based bound on the dimension of SSCS. It is worth emphasizing that the edge augmentation problem differs fundamentally between directed and undirected networks. This is due to the fact that adding an edge between nodes uu and vv in an undirected network means adding two directed edges (from uu to vv and vv to uu) simultaneously. However, no such constraint exists when adding edges to directed networks. This work is also related to [3], which only considers directed networks that are strong structurally controllable and studies the problem of adding edges while retaining their SSC. Our setup is more general because we consider directed networks that are not necessarily strong structurally controllable. We note that such a setup is very relevant to the notion of target controllability in linear networks, where the goal is to control only a subset of agents (targets) instead of the entire network. Since controlling the entire network might not be required in certain applications and could be costly, it is desired to control only target nodes (for instance, [12, 13, 6]). Moreover, this “partial controllability” specification could improve other network attributes, which could not be improved otherwise due to complete controllability requirements, for instance, robustness to external perturbations (which could be achieved through link additions).

II Preliminaries and Problem Description

We consider a network of agents modeled by a directed graph G=(V,E)G=(V,E), where VV is the set of agents and EE is the set of directed edges. An edge from node uu to vv is denoted by (u,v)(u,v), and uu is the in-neighbor, or simply the neighbor of vv. We use the terms node and agent interchangeably. The set of all neighbors of uu, denoted by 𝒩u\mathcal{N}_{u}, is called the neighborhood of uu. The distance from uu to vv in GG, denoted by dG(u,v)d_{G}(u,v), is the number of edges in the shortest directed path from uu to vv. Accordingly, dG(u,u)=0d_{G}(u,u)=0 and dG(u,v)=d_{G}(u,v)=\infty if there is no directed path from uu to vv. We may ignore the subscript GG when it is clear from the context. The directed graph is strongly connected if there is a path from any node to any other node. The union of G=(V,E)G=(V,E) and G=(V,E)G^{\prime}=(V^{\prime},E^{\prime}) is GG=(VV,EE)G\cup G^{\prime}=(V\cup V^{\prime},E\cup E^{\prime}). The edges in a graph are assigned positive weights by some weighting function:

w:E+,w:E\rightarrow\mathbb{R}^{+}, (1)

where +\mathbb{R}^{+} is the set of positive real numbers.

II-A System Model

Each agent uu in the network has a state xux_{u}\in\mathbb{R}, and the overall state of the network is xnx\in\mathbb{R}^{n}, where n=|V|n=|V|. The network dynamics are given by the following equation:

x˙=Lwx+Bu,\dot{x}=-L_{w}x+Bu, (2)

where LwL_{w} is the weighted Laplacian matrix of GG and defined as Lw=(DegAw)L_{w}=(\text{Deg}-A_{w}). Here, Awn×nA_{w}\in\mathbb{R}^{n\times n} is the weighted adjacency matrix of GG whose uvthuv^{th} entry is

[Aw]u,v={w(u,v)if uv, and (u,v)E0otherwise,[A_{w}]_{u,v}=\left\{\begin{array}[]{cc}w(u,v)&\text{if }u\neq v,\text{ and }(u,v)\in E\\ 0&\text{otherwise,}\end{array}\right. (3)

and Degn×n\text{Deg}\in\mathbb{R}^{n\times n} is the degree matrix defined as

[Deg]u,v={k=1n[Aw]u,kif u=v,0otherwise.[\text{Deg}]_{u,v}=\left\{\begin{array}[]{cc}\sum_{k=1}^{n}[A_{w}]_{u,k}&\text{if }u=v,\\ 0&\text{otherwise.}\end{array}\right. (4)

In (2), Bn×mB\in\mathbb{R}^{n\times m} is the input matrix, where mm is the number of inputs, which is equal to the number of leader nodes. If V={1,2,,m}VV_{\ell}=\{\ell_{1},\ell_{2},\cdots,\ell_{m}\}\subset V is the set of leader nodes, then

[B]u,v={1if node u is also a leader v0otherwise.[B]_{u,v}=\left\{\begin{array}[]{cc}1&\text{if node }u\text{ is also a leader }\ell_{v}\\ 0&\text{otherwise.}\end{array}\right. (5)

II-B Strong Structural Controllability (SSC)

A state xnx^{\prime}\in\mathbb{R}^{n} is reachable if there is an input uu that can drive the network in (2) from origin (initial state) to xx^{\prime} in a finite amount of time. A network G=(V,E)G=(V,E) with edge weights defined by ww and leader set VV_{\ell} is completely controllable, that is every point in n\mathbb{R}^{n} is reachable, if and only if the following controllability matrix is full rank.

Γ(Lw,V)=[B(Lw)B(Lw)2B(Lw)n1B].\small\Gamma(L_{w},V_{\ell})=\left[\begin{array}[]{ccccc}B&(-L_{w})B&(-L_{w})^{2}B&\cdots&(-L_{w})^{n-1}B\end{array}\right].

The rank of Γ(Lw,V)\Gamma(L_{w},V_{\ell}) defines the dimension of the controllable subspace consisting of all the reachable states. A Laplacian network G=(V,E)G=(V,E) with a given set of leader nodes is called strong structurally controllable (SSC) if it is completely controllable for any choice of ww as in (1). At the same time, the dimension of strong structurally controllable subspace (SSCS), denoted by γ(G,V)\gamma(G,V_{\ell}), is the minimum rank of the controllablility matrix Γ(Lw,B)\Gamma(L_{w},B) over all feasible ww (edge weights), i.e.,

γ(G,V)=minwrank(Γ(Lw,V)).\gamma(G,V_{\ell})=\min\limits_{w}\;\text{rank}(\Gamma(L_{w},V_{\ell})). (6)

II-C Problem Formulation

The main objective in the paper is to identify the maximum number of missing edges in a given network such that the dimension of SSCS of the network is preserved even after adding those edges. Since computing the dimension of SSCS is computationally challenging, we consider its lower bounds, including the zero forcing (ZF) and distance-based bounds (explained in Sections III and IV, respectively). These bounds are tight and have numerous applications [10]. If δ\delta is a (ZF-based or distance-based) lower bound on the dimension of SSCS of the network, then the goal is to maximally densify the graph while maintaining the dimension of SSCS to be at least δ\delta. Formally, we state the problem below.

Problem Let G=(V,E)G=(V,E) be a directed network of agents in which VVV_{\ell}\subseteq V be a set of leaders and the network dynamics are defined by (2). Let the dimension of SSCS of the network be at least δ\delta. Then, find the maximum size edge set EE^{\prime} such that EEE\subseteq E^{\prime} and the dimension of SSCS of the network G=(V,E)G^{\prime}=(V,E^{\prime}) with the same set of leaders VV_{\ell} is also at least δ\delta, i.e., δγ(G,V)\delta\leq\gamma(G^{\prime},V_{\ell}).

III Adding Edges through Zero Forcing Bound

In this section, we present an edge augmentation algorithm that optimally adds edges in a network while preserving the zero forcing-based bound on the dimension of SSCS.

III-A Zero Forcing (ZF) Bound for SSC

First, we explain the notion of Zero Forcing process and its relation to the dimension of SSCS [5, 6, 7].

  • Definition

    (Zero Forcing Process) Consider a directed graph G=(V,E)G=(V,E) such that each node vVv\in V is initially assigned either a white or black color. The following coloring defines the zero forcing process: if a black colored node vVv\in V has exactly one white in-neighbor uu, then change the color of uu to black. We say that vv infected uu.111Since an edge (u,v)(u,v) indicates that the state of node uu is influenced by the state of vv in our system model (as in (2) and (3)), we use in-neighbors in the ZF process for consistency. If an edge (u,v)(u,v) indicates that node uu influences node vv’s state, then out-neighbors should be used in the ZF process, as done in some other works.

  • Definition

    (Derived Set) Consider a directed graph G=(V,E)G=(V,E) where VVV^{\prime}\subseteq V is an initial set of black nodes (also called the input set), and apply the zero forcing process until no further color changes are possible. The resulting set of black nodes is the derived set, denoted by dset(G,V)V\text{dset}(G,V^{\prime})\subseteq V. For a given set of input nodes, the derived set is unique [14]. Moreover, an input set VV^{\prime} is called a zero forcing set (ZFS) if dset(G,V)=V\text{dset}(G,V^{\prime})=V.

As an example, consider GG in Figure 1, where V={v1,v2}V^{\prime}=\{v_{1},v_{2}\} is the set of input nodes. As a result of ZF process, v1v_{1} infects v3v_{3}, v2v_{2} infects v4v_{4} and the resulting derived set is {v1,v2,v3,v4}\{v_{1},v_{2},v_{3},v_{4}\}.

Refer to caption
(a)
Refer to caption
(b)
Figure 1: An example of zero forcing and derived set.

In the context of SSC, the cardinality of the derived set is significant as it provides a lower bound on the dimension of SSCS, as stated in the following result.

Theorem 3.1

[6] For any network G=(V,E)G=(V,E) with the leaders VVV_{\ell}\subseteq V,

ζ(G,V)γ(G,V),\zeta(G,V_{\ell})\leq\gamma(G,V_{\ell}), (7)

where ζ(G,V)=|dset(G,V)|\zeta(G,V_{\ell})=|\text{dset}(G,V_{\ell})| is the size of the derived set corresponding to the input set VV_{\ell}.

III-B Edge Augmentation Algorithm Using ZF

We provide an algorithm to add edges to a directed graph with a given set of leaders. The algorithm ensures that the derived set of the graph remains the same after adding edges, thus, preserving the ZF-based bound on the dimension of SSCS. The proposed algorithm is a modification of the ZF process. In summary, we look for a BLACK node with a single WHITE in-neighbor, add edges incident to the BLACK node that do not change change the size of the derived set, change the WHITE node’s color, and then repeat the same procedure until there is no BLACK node with a single WHITE in-neighbor. When this process concludes, we add any extra edges that can be added while preserving the derived set. The algorithm is outlined below. We denote the color of the node vv by COLOR(vv).

Algorithm 1 ZF-based Edge Augmentation
Given G=(V,E)G=(V,E), VV_{\ell} \triangleright VV_{\ell} is a leader set.
Initialize G=(V,E)G^{\prime}=(V,E^{\prime}), EEE^{\prime}\leftarrow E
For all vVv\in V, COLOR(v)WHITE\text{COLOR}(v)\leftarrow\text{WHITE}
For all vVv\in V_{\ell}, COLOR(v)BLACK\text{COLOR}(v)\leftarrow\text{BLACK}
while u\exists u a BLACK node with a single WHITE in-neighbor vv do
    COLOR(v)BLACK\text{COLOR}(v)\leftarrow\text{BLACK}
    For all wVw\in V, with COLOR(w)=BLACK\text{COLOR}(w)=\text{BLACK},
    set EE{(w,u)}E^{\prime}\leftarrow E^{\prime}\cup\{(w,u)\} \triangleright Add edges to uu from all BLACK nodes.
end while
For all nodes uu not considered in the loop above,
set EE{(w,u):wV}E^{\prime}\leftarrow E^{\prime}\cup\{(w,u):w\in V\} \triangleright Add edges to uu from all nodes. return G=(V,E)G^{\prime}=(V,E^{\prime}).

Figure 2(b) illustrates an example of edge augmentation due to Algorithm 1. The derived set in GG and GG^{\prime} is same.

Refer to caption
(a) GG
Refer to caption
(b) GG^{\prime}
Figure 2: Example of edge augmentation due to Algorithm 1

.

Next, we show that Algorithm 1 is optimal and adds the maximum number of edges while preserving the size of the derived set returned by the ZF process.

Proposition 3.2

For a directed graph G=(V,E)G=(V,E) with a leader set VVV_{\ell}\subseteq V, let G=(V,E)G^{\prime}=(V,E^{\prime}) be a graph returned by Algorithm 1. Then, dset(G,V)=dset(G,V)\text{dset}(G,V_{\ell})=\text{dset}(G^{\prime},V_{\ell}).

Proof:

Let Δ\Delta be the derived set of GG with a leader set VV_{\ell}. In GG^{\prime}, all leader nodes in VV_{\ell} are colored BLACK due to the initial condition of the ZF process. Consider an arbitrary iteration in the ZF process, where a BLACK node uu colors its only WHITE in-neighbor vv BLACK. Algorithm 1 adds edges in GG^{\prime} from (currently) BLACK nodes to uu. Since no edge from a currently WHITE node to uu is added, vv must be the only WHITE in-neighbor of uu in GG^{\prime} as well. Thus, the ZF process proceeds by assigning the BLACK color to node vv, which is the only WHITE in-neighbor of the BLACK node uu in GG^{\prime}. This holds for every iteration in the ZF process. Thus, the ZF process in GG and GG^{\prime} will change the colors of nodes exactly the same way.  

We can count the number of edges in the directed graph G=(V,E)G^{\prime}=(V,E^{\prime}) returned by Algorithm 1 in terms of |V||V|, |V||V_{\ell}| and the size of the derived set.

Proposition 3.3

For a graph G=(V,E)G^{\prime}=(V,E^{\prime}) returned by Algorithm 1 with a leader set VV_{\ell} and derived set Δ\Delta,

|E||Δ|(|Δ|+1)2m(m+1)2+(m+n|Δ|)nn,\begin{split}|E^{\prime}|&\geq\frac{|\Delta|(|\Delta|+1)}{2}-\frac{m(m+1)}{2}+(m+n-|\Delta|)n-n,\end{split}

where n=|V|n=|V| and m=|V|m=|V_{\ell}|.

Proof:

In each iteration of the WHILE loop in Algorithm 1, edges from all BLACK nodes to a fixed node are added. There are |V|=m|V_{\ell}|=m BLACK nodes when the WHILE loop starts, and this number increases by one in each iteration. Thus, we add m,m+1,,|Δ|1m,m+1,\ldots,|\Delta|-1 edges in the WHILE loop. Outside the loop, we add n1n-1 incoming edges for each of the remaining n|Δ|+mn-|\Delta|+m nodes. Therefore,

|E|(n1)(n|Δ|+m)+i=m|Δ|1i=|Δ|(|Δ|+1)2m(m+1)2+(m+n|Δ|)nn.\begin{split}|E^{\prime}|\geq&\;(n-1)(n-|\Delta|+m)+\sum_{i=m}^{|\Delta|-1}i\\ =&\;\frac{|\Delta|(|\Delta|+1)}{2}-\frac{m(m+1)}{2}+(m+n-|\Delta|)n-n.\end{split}

 

Theorem 3.4

Let G=(V,E)G=(V,E) be a directed graph with |V|=n|V|=n nodes, leader set VV_{\ell} and derived set Δ=dset(G,V)\Delta=\text{dset}(G,V_{\ell}), then Algorithm 1 returns a graph G=(V,E)G^{*}=(V,E^{*}) where EEE^{*}\supseteq E and |E||E^{*}| is maximum while preserving the size of the derived set Δ\Delta. Moreover, the number of edges in the optimal graph is

|Δ|(|Δ|+1)2m(m+1)2+(m+n|Δ|)nn,\frac{|\Delta|(|\Delta|+1)}{2}-\frac{m(m+1)}{2}+(m+n-|\Delta|)n-n,

where m=|V|.m=|V_{\ell}|.

Proof:

Let G=(V,E)G^{*}=(V,E^{*}) be a graph satisfying the conditions stated in the theorem, and G=(V,E)G^{\prime}=(V,E^{\prime}) be a graph returned by Algorithm 1. We will count the number of edges in GG^{*} and show that |E||E^{*}| is upper bound by the expression in Proposition 3.3. Clearly |E||E^{\prime}| can not be larger than |E||E^{*}|, we will get the desired result.

Since GG^{*} preserves the size of the derived set, we should be able to run |Δ||V||\Delta|-|V_{\ell}| iterations of the ZF process in some arbitrary order. When the ZF process starts, there are mm BLACK nodes and (nm)(n-m) WHITE nodes. At this point, there must exist a BLACK node uu which has only one in-coming edge from a WHITE in-neighbor. Therefore, at least nm1n-m-1 edges of the form (v,u)(v,u), where vv is a WHITE node, are missing from GG^{*}. In each iteration, the number of WHITE nodes decreases by exactly one. This means that in the second iteration, at least (nm2)(n-m-2) edges are missing, and these edges are distinct from previously counted edges because none of these involve the node uu. Similarly, in iteration ii, there are at least (nmi)(n-m-i) distinct edges missing. We can upper bound the number of edges in GG^{*} by subtarting the minimum number of missing edges in the graph from the maximum possible n2nn^{2}-n edges. Thus,

|E|n2ni=1|Δ|m(nmi)=n2ni=nm(|Δ|m)nm1i=n2n(nm1)(nm)2+(n|Δ|)(n|Δ|1)2.\begin{split}|E^{*}|\leq&\;n^{2}-n-\sum_{i=1}^{|\Delta|-m}(n-m-i)=\;n^{2}-n-\sum_{i=n-m-(|\Delta|-m)}^{n-m-1}i\\ =&\;n^{2}-n-\frac{(n-m-1)(n-m)}{2}+\frac{(n-|\Delta|)(n-|\Delta|-1)}{2}.\end{split}

Using Proposition 3.3, we get |E||E||E^{*}|\leq|E^{\prime}|. However, |E||E^{*}| is optimal, which means |E||E||E^{*}|\geq|E^{\prime}|. Thus, we deduce that |E|=|E||E^{*}|=|E^{\prime}| and conclude the desired statement.  

The time complexity of Algorithm 1 is O(n2)O(n^{2}) where nn is the number of nodes in the graph. Note that the main task in the algorithm is the addition of edges to the edge set EE^{\prime}. If the edges are kept in an adjacency matrix, each addition takes a constant amount of time. We do not add an edge twice to this set, so the time complexity is bounded by the maximum number of possible edges in a directed graph. We also observe that the time complexity is:

Ω(|E|)=Ω((|Δ|2)+(m+n|Δ|)n).\Omega(|E^{\prime}|)=\Omega({|\Delta|\choose{2}}+(m+n-|\Delta|)n).

When the size of derived set is at least n/2n/2, the first term is Ω(n2)\Omega(n^{2}), and when it is less than n/2n/2, the second term is Ω(n2)\Omega(n^{2}). Thus, the time complexity of Algorithm 1 is Θ(n2)\Theta(n^{2}).

Remark 3.5

An important observation here is that the number of edges that one can add to a directed graph while preserving the derived set is independent of the topology of the given graph. Note, however, that the size of the derived set in an arbitrary graph is not independent of the topology.

IV Adding Edges through Distance-based Bound

In this section, first, we review a tight lower bound on the dimension SSCS based on the distances of nodes to leaders in a graph [9]. Second, we present a method to add edges while preserving distances between specific node pairs, which also preserves the bound on the dimension of SSCS. The distance-based bound on the dimension of SSCS is typically better than the ZF-based bound, especially when the network is not strong structurally controllable [10].

IV-A Distance-based Bound for SSC

Given a network with mm leaders V={1,,m}V_{\ell}=\{\ell_{1},\cdots,\ell_{m}\}, we define the distance-to-leaders (DL) vector of each viVv_{i}\in V as

Di=[d(vi,1)d(vi,2)d(vi,m)]Tm.D_{i}=\left[\begin{array}[]{ccccc}d(v_{i},\ell_{1})&d(v_{i},\ell_{2})&\cdots&d(v_{i},\ell_{m})\end{array}\right]^{T}\in\mathbb{Z}^{m}.

The jthj^{th} component of DiD_{i}, denoted by [Di]j[D_{i}]_{j}, is equal to the distance of viv_{i} to j\ell_{j}. Next, we provide the definition of pseudo-monotonically increasing sequences of DL vectors.

  • Definition

    (Pseudo-monotonically Increasing (PMI) Sequence) A sequence of distance-to-leaders vectors 𝒟\mathcal{D} is PMI if for every ithi^{th} vector in the sequence, denoted by 𝒟i\mathcal{D}_{i}, there exists some π(i){1,2,,m}\pi(i)\in\{1,2,\cdots,m\} such that

    [𝒟i]π(i)<[𝒟j]π(i),j>i.[\mathcal{D}_{i}]_{\pi(i)}<[\mathcal{D}_{j}]_{\pi(i)},\;\;\forall j>i. (8)

    In other words, (8) needs to be satisfied for all the subsequent distance-to-leader vectors 𝒟j\mathcal{D}_{j} appearing after 𝒟i\mathcal{D}_{i} in the sequence. We say that 𝒟i\mathcal{D}_{i} satisfies the PMI property at coordinate π(i)\pi(i) whenever [𝒟i]π(i)<[𝒟j]π(i),j>i[\mathcal{D}_{i}]_{\pi(i)}<[\mathcal{D}_{j}]_{\pi(i)},\;\forall j>i.

An example of DL vectors is illustrated in Fig. 3. A PMI sequence of length five can be constructed as

𝒟=[[𝟎3],[1𝟎],[𝟏4],[2𝟏],[𝟐2]].\mathcal{D}=\left[\left[\begin{array}[]{c}\mathbf{0}\\ 3\end{array}\right],\left[\begin{array}[]{c}1\\ \mathbf{0}\end{array}\right],\left[\begin{array}[]{c}\mathbf{1}\\ 4\end{array}\right],\left[\begin{array}[]{c}2\\ \mathbf{1}\end{array}\right],\left[\begin{array}[]{c}\mathbf{2}\\ 2\end{array}\right]\right]. (9)

Indices of bold values in (9) are the coordinates, π(i)\pi(i), at which the corresponding distance-to-leaders vectors are satisfying the PMI property.

Refer to caption
Figure 3: A network with two leaders, V={v1,v2}V_{\ell}=\{v_{1},v_{2}\}, and the corresponding distance-to-leaders (DL) vectors.

The longest PMI sequence of DL vectors is related to the dimension of SSCS as stated in the following result.

Theorem 4.1

[9] Consider any network G=(V,E)G=(V,E) with the leaders VVV_{\ell}\subseteq V. Let δ(G,V)\delta(G,V_{\ell}) be the length of the longest PMI sequence of distance-to-leaders vectors with at least one finite entry. Then, δ(G,V)γ(G,V)\delta(G,V_{\ell})\leq\gamma(G,V_{\ell}).

Remark 4.2

While the bound in Theorem 4.1 was presented for connected undirected graphs in [9, Theorem 3.2], it also holds for any choice of leaders on strongly connected directed graphs as shown in [9, Remark 3.1]. Such connectivity properties already ensure that all DL vectors have only finite entries. The bound can be extended easily to directed graphs without strong connectivity by excluding the DL vectors with all \infty entries.

IV-B Adding Edges While Preserving Node Distances

Let G=(V,E)G=(V,E) be a graph with a leader set VV_{\ell}, 𝒟\mathcal{D} be a PMI sequence of length δ\delta, and V~V\tilde{V}\subseteq V be the set of nodes whose DL vectors are included in 𝒟\mathcal{D}. If we add edges in GG to obtain a new graph G=(V,E)G^{\prime}=(V,E^{\prime}) such that the DL vectors of nodes in V~\tilde{V} remain the same in GG^{\prime}, then 𝒟\mathcal{D} will also be a PMI sequence of GG^{\prime} and δγ(G,V)\delta\leq\gamma(G^{\prime},V_{\ell}). Therefore, one approach to augment edges in a graph while preserving a bound on the dimension of SSCS is to ensure that the distances from a certain set of nodes to leaders do not change due to edge additions. In this direction, we first need to study the maximal edge augmentation in a graph while preserving the distance from a given node aa to another node bb.

  • Definition

    (Distance Preserving Edge Augmentation (DPEA) Problem) Given a directed graph G=(V,E)G=(V,E) and nodes a,bVa,b\in V such that dG(a,b)=kd_{G}(a,b)=k, find a graph G(V,E)G^{\prime}(V,E^{\prime}) with the (same) node set VV and an edge set EEE^{\prime}\supseteq E such that dG(a,b)=kd_{G^{\prime}}(a,b)=k and |E||E^{\prime}| is maximized.

Next, we characterize optimal solutions of the DPEA problem for a given node pair (a,b)(a,b) in GG. We show that the optimal solution belongs to a special class of graphs, which is obtained by the union of clique chains and modified clique chains described below.

  • Definition

    (Directed clique chain) A directed graph 𝒞k=(V,E)\mathcal{C}_{k}=(V,E) is a directed clique chain if the node set VV can be partitioned into sets V0,V1,V2,,VkV_{0},V_{1},V_{2},\ldots,V_{k}, such that there is an edge from every node in ViV_{i} to every node in Vi1ViVi+1V_{i-1}\cup V_{i}\cup V_{i+1} for all 1ik11\leq i\leq k-1. Moreover, nodes in each of V0V_{0} and VkV_{k} induce cliques.222In a clique, there is an edge between every pair of nodes.

  • Definition

    (Directed modified clique chain) A directed graph k=(V,E)\mathcal{M}_{k}=(V,E) is a directed modified clique chain if the node set VV can be partitioned into sets V0,V1,V2,,VkV_{0},V_{1},V_{2},\ldots,V_{k}, such that there is an edge from every node in ViV_{i} to every node in VjV_{j} for all jij\leq i.

Examples of directed clique chain and directed modified clique chain are shown in Figure 4.

Refer to caption
(a) 𝒞3\mathcal{C}_{3}
Refer to caption
(b) 3\mathcal{M}_{3}
Figure 4: (a) Directed clique chain and (b) directed modified clique chain. The node set VV is partitioned into four subsets: V0={v1}V_{0}=\{v_{1}\}, V1={v2}V_{1}=\{v_{2}\}, V2={v3,v4}V_{2}=\{v_{3},v_{4}\} and V3={v5}V_{3}=\{v_{5}\}.
Theorem 4.3

Let G=(V,E)G=(V,E) be a directed graph and let a,ba,b be two fixed vertices in GG with dG(a,b)=kd_{G}(a,b)=k. Then, an augmented graph G=(V,E),EEG^{\prime}=(V,E^{\prime}),E^{\prime}\supseteq E, that preserves the distance from aa to bb, and contains the maximum number of edges is a union of a directed clique chain 𝒞k\mathcal{C}_{k} and a directed modified clique chain k\mathcal{M}_{k} for some partition V0={a},V1,V2,,Vk={b}V_{0}=\{a\},V_{1},V_{2},\ldots,V_{k}=\{b\} of the node set VV.

Proof:

Let dG(a,b)=kd_{G}(a,b)=k. Then, it is clear that for all vertices vVv\in V, dG(a,v)kd_{G^{\prime}}(a,v)\leq k because otherwise we can add an edge from an arbitrary node at distance k1\leq k-1 to vv. Also, an arbitrary vertex vv in GG^{\prime} at distance ii from aa, we may assume that dG(v,b)=kid_{G^{\prime}}(v,b)=k-i. Clearly, dG(v,b)d_{G^{\prime}}(v,b) can not be less than kik-i, and if it is more, we can add an edge from vv to a vertex ww where dG(w,b)=ki1d_{G^{\prime}}(w,b)=k-i-1. Thus, every vertex in GG^{\prime} lies on a shortest path from aa to bb. Let u,vu,v be two vertices such that dG(a,u)=id_{G^{\prime}}(a,u)=i, and dG(a,v)=jd_{G^{\prime}}(a,v)=j. We have the following cases:

  1. 1.

    i=ji=j or i=j1i=j-1 : an edge from uu to vv doesn’t change the distance from aa to bb. Thus, we may assume that all such edges exist in GG^{\prime}.

  2. 2.

    i<j1i<j-1: since both of u,vu,v lie on a shortest path from aa to bb, we know that dG(v,b)=kjd_{G^{\prime}}(v,b)=k-j. So an edge u,vu,v will create a path from aa to bb of distance j2+1+kj=k1\leq j-2+1+k-j=k-1. This is a contradiction to the fact that GG^{\prime} preserves a,ba,b distance. Therefore, GG^{\prime} doesn’t contain any edge of the form u,vu,v.

  3. 3.

    i>ji>j: in this case, an edge from uu to vv doesn’t create any new shortest paths from aa to bb. Thus, we may assume that all such edges exist in GG^{\prime}.

Let us define V0,V1,,VkV_{0},V_{1},\ldots,V_{k} a partition of VV where Vi={vV:dG(a,v)=i}V_{i}=\{v\in V:d_{G^{\prime}}(a,v)=i\}. It is clear that with this partition, the graph GG is a union of a directed clique chain and a directed modified clique chain. This provides a complete characterization of edges in GG^{\prime} and completes the proof.  

From Theorem 4.3, we obtain a simple way to greedily construct a maximally dense graph that preserves the distance from node aa to node bb in a given graph GG as follows:

Algorithm 2 Distance Preserving Edge Augmentation (DPEA)
1:Given G=(V,E)G=(V,E), a,bVa,b\in V.
2:Initialize EEE^{\prime}\leftarrow E, G(V,E)G^{\prime}\leftarrow(V,E^{\prime})
3:While \exists (u,v)V×V(u,v)\in V\times V with dG(a,u)dG(a,v)1d_{G^{\prime}}(a,u)\geq d_{G^{\prime}}(a,v)-1
4:EE{(u,v)}E^{\prime}\leftarrow E^{\prime}\cup\{(u,v)\}, G(V,E)G^{\prime}\leftarrow(V,E^{\prime}).
5:End While
6:Return G=(V,E)G^{\prime}=(V,E^{\prime})

An example of the DPEA is shown in Figure 5 in which edges are augmented to preserve the distance from node a=v1a=v_{1} to node b=v5b=v_{5}.

Refer to caption
(a) GG
Refer to caption
(b) GG^{\prime}
Figure 5: Distance preserving edge augmentation for the node pair (v1,v5)(v_{1},v_{5}). In (b), red edges are the ones that are added as a result of Algorithm 2.

We note that the time complexity of Algorithm 2 is O(n2logn)O(n^{2}\log n) because we can implement this using runs of Dijkstra’s shortest path algorithm. We can use DPEA to add edges in a graph G(V,E)G(V,E) with a leader set VV_{\ell} while preserving a bound on the dimension of SSCS. Let 𝒟\mathcal{D} be a PMI sequence of length δ\delta and V~V\tilde{V}\subseteq V be the set of nodes whose DL vectors are included in 𝒟\mathcal{D}. By solving the DPEA problem for the node pair (v,l)(v,l), where vV~v\in\tilde{V} and lVl\in V_{\ell}, we can obtain edges, say Ev,lE_{v,l}, whose addition to the graph will preserve the distance from node vv to leader ll. By solving DPEA problem for all node pairs (v,l)(v,l), where vV~v\in\tilde{V} and lVl\in V_{\ell}, we can obtain edges that are common in all solutions, that is, Ecomm=vV~,lVEv,lE_{comm}=\cap_{v\in\tilde{V},l\in V_{\ell}}E_{v,l}. By adding these common edges in the given graph GG, we obtain a new graph G=(V,EEcomm)G^{\prime}=(V,E\cup E_{comm}) such that dG(v,l)=dG(v,l)d_{G}(v,l)=d_{G^{\prime}}(v,l), vV~\forall v\in\tilde{V} and lV\forall l\in V_{\ell}. Consequently, 𝒟\mathcal{D} will also be PMI sequence of GG^{\prime}, which means that the dimension of SSCS in the augmented graph GG^{\prime} will also be at least δ\delta. Thus, by solving multiple instances of DPEA problem, we can determine edges whose addition to the graph will preserve the distance-based bound on the dimension of SSCS.

Since the problem of finding an optimal set of edges while preserving the distance-based bound is computationally challenging, in the next subsection, we present and analyze a randomized edge augmentation algorithm that is simple to understand, easy to implement, and offers good numerical results in our experiments.

IV-C Randomized Edge Augmentation Algorithm Preserving the Distance-based Bound

First, we discuss that for a given GG, if 𝒟\mathcal{D} is a PMI sequence of length δ\delta containing DL vectors of nodes V~V\tilde{V}\subseteq V, then we can add edges in GG to obtain an augmented graph GG^{\prime} with the same leader set VV_{\ell}. Moreover GG^{\prime} will also have a PMI sequence of length δ\delta even if dG(v,l)dG(v,l)d_{G}(v,l)\neq d_{G^{\prime}}(v,l), vV~,lV\forall v\in\tilde{V},\forall l\in V_{\ell}. In particular, for every node pair (v,l)(v,l), where vV~v\in\tilde{V}, lVl\in V_{\ell}, there exists an integer ϵv,l\epsilon_{v,l}\in\mathbb{Z} such that if ϵv,l<dG(v,l)dG(v,l)\epsilon_{v,l}<d_{G^{\prime}}(v,l)\leq d_{G}(v,l), then GG^{\prime} will have a PMI sequence consisting of DL vectors of nodes in V~\tilde{V} and having a length δ\delta. We will then provide a randomized edge augmentation algorithm satisfying conditions to preserve the distance-based bound on the dimension of SSCS. Finally, we will analyze the performance of the algorithm.

Let 𝒟i\mathcal{D}_{i} be the ithi^{th} vector in the PMI sequence 𝒟\mathcal{D} of the given graph GG. Then by the definition of PMI sequence, for each element [𝒟i]j[\mathcal{D}_{i}]_{j}, there is an integer, say ϵi,j\epsilon_{i,j}, such that [𝒟i]j>ϵi,j[\mathcal{D}_{i}]_{j}>\epsilon_{i,j}. We denote the maximum possible value of ϵi,j\epsilon_{i,j} by ϵi,j\epsilon^{\ast}_{i,j} and define ϵi:=[ϵi,1ϵi,2ϵi,|V|]T\epsilon^{\ast}_{i}:=\left[\begin{array}[]{rrrr}\epsilon_{i,1}^{\ast}&\epsilon_{i,2}^{\ast}&\cdots&\epsilon_{i,|V_{\ell}|}^{\ast}\end{array}\right]^{T}. For instance, consider the PMI sequence in (9). The vectors 𝒟i\mathcal{D}_{i} in the sequence and the corresponding ϵi\epsilon^{\ast}_{i} are given below.

𝒟1=[03],ϵ1=[11];𝒟2=[10],ϵ2=[01];𝒟3=[14],ϵ3=[00];𝒟4=[21],ϵ4=[10];𝒟5=[22],ϵ5=[11];\begin{split}&\mathcal{D}_{1}=\left[\begin{array}[]{c}0\\ 3\end{array}\right],\;\epsilon^{\ast}_{1}=\left[\begin{array}[]{c}-1\\ -1\end{array}\right];\;\;\mathcal{D}_{2}=\left[\begin{array}[]{c}1\\ 0\end{array}\right],\;\epsilon^{\ast}_{2}=\left[\begin{array}[]{c}0\\ -1\end{array}\right];\\ &\mathcal{D}_{3}=\left[\begin{array}[]{c}1\\ 4\end{array}\right],\;\epsilon^{\ast}_{3}=\left[\begin{array}[]{c}0\\ 0\end{array}\right];\;\;\mathcal{D}_{4}=\left[\begin{array}[]{c}2\\ 1\end{array}\right],\;\epsilon^{\ast}_{4}=\left[\begin{array}[]{c}1\\ 0\end{array}\right];\\ &\mathcal{D}_{5}=\left[\begin{array}[]{c}2\\ 2\end{array}\right],\;\epsilon^{\ast}_{5}=\left[\begin{array}[]{c}1\\ 1\end{array}\right];\\ \end{split}

We can think of ϵi,j\epsilon^{\ast}_{i,j} as a strict lower bound on [𝒟i]j[\mathcal{D}_{i}]_{j}. From a given PMI sequence of length δ\delta, we can always obtain ϵi\epsilon^{\ast}_{i} for all i{1,2,,δ}i\in\{1,2,\cdots,\delta\}.

Observation 4.4

In a PMI sequence 𝒟\mathcal{D}, if we replace [𝒟i]j[\mathcal{D}_{i}]_{j} by some integer xx, where ϵi,j<x[𝒟i]j\epsilon^{\ast}_{i,j}<x\leq[\mathcal{D}_{i}]_{j}, then the resulting sequence will still be a PMI sequence.

For instance, consider the sequence 𝒟¯\bar{\mathcal{D}} below, which is obtained from 𝒟\mathcal{D} in (9) by replacing [𝒟1]2=3[\mathcal{D}_{1}]_{2}=3 and [𝒟3]2=4[\mathcal{D}_{3}]_{2}=4 by [𝒟¯1]2=1[\bar{\mathcal{D}}_{1}]_{2}=1 and [𝒟¯3]2=1[\bar{\mathcal{D}}_{3}]_{2}=1, respectively. Since ϵ1,2=1\epsilon^{\ast}_{1,2}=-1 and ϵ3,2=0\epsilon^{\ast}_{3,2}=0, the resulting sequence 𝒟¯\bar{\mathcal{D}} is a PMI sequence.

𝒟¯=[[01],[10],[11],[21],[22]].\bar{\mathcal{D}}=\left[\begin{array}[]{ccccc}\left[\begin{array}[]{c}0\\ 1\end{array}\right],\left[\begin{array}[]{c}1\\ 0\end{array}\right],\left[\begin{array}[]{c}1\\ 1\end{array}\right],\left[\begin{array}[]{c}2\\ 1\end{array}\right],\left[\begin{array}[]{c}2\\ 2\end{array}\right]\end{array}\right]. (10)

Next, we present a randomized algorithm to add edges in a graph GG with a leader set VV_{\ell}. GG has a PMI sequence 𝒟\mathcal{D} of length δ\delta consisting of DL vectors of nodes V~V\tilde{V}\subseteq V. Moreover, let S=[s1s2sδ]S=\left[\begin{array}[]{llllll}s_{1}&s_{2}&\cdots&s_{\delta}\end{array}\right], where sis_{i} is the index of the node whose DL vector is the ithi^{th} element (vector) in 𝒟\mathcal{D}. For instance, 𝒟\mathcal{D} in (9) is a PMI sequence of the graph in Figure 3. The corresponding V~\tilde{V} is {v1,v2,,v5}\{v_{1},v_{2},\cdots,v_{5}\} and SS is [12345]\left[\begin{array}[]{llllll}1&2&3&4&5\end{array}\right]. For every ithi^{th} vector in the sequence, the algorithm first computes the corresponding vector ϵi\epsilon_{i}^{\ast}, which basically provides minimum distances that need to be maintained from node vsiv_{s_{i}} to all leaders during the edge augmentation. The algorithm then selects a missing edge randomly and augments it to the graph if its addition does not violate distance conditions (line 8 in Algorithm 3), otherwise discards it. This process is repeated until all missing edges from the original graph are either added to the graph, or discarded. The details are outlined in Algorithm 3.

Algorithm 3 Randomized Algorithm for the Distance-based Edge Augmentation
1:Given G=(V,E)G=(V,E), V={1,,m}V_{\ell}=\{\ell_{1},\cdots,\ell_{m}\}, 𝒟\mathcal{D}, SS.
2:Initialize EEE^{\prime}\leftarrow E
3:Compute ϵi,j\epsilon^{\ast}_{i,j} for each element [𝒟i]j[\mathcal{D}_{i}]_{j} in 𝒟\mathcal{D}.
4:Compute EcE^{c} (set of all missing edges).
5:While EcE^{c}\neq\emptyset
6:Randomly select eEce\in E^{c}, and obtain H=(V,E{e})H=(V,E^{\prime}\cup\{e\}).
7:Compute dH(vsi,j)d_{H}(v_{s_{i}},\ell_{j}) for all j{1,,m}j\in\{1,\cdots,m\} and for all i{1,,|S|}i\in\{1,\cdots,|S|\}.
8:If (ϵi,j<dH(vsi,j)[𝒟i]j(\epsilon^{\ast}_{i,j}<d_{H}(v_{s_{i}},\ell_{j})\leq[\mathcal{D}_{i}]_{j} for all j{1,,m}j\in\{1,\cdots,m\} and for all i{1,,|S|}i\in\{1,\cdots,|S|\}, then EE{e}.E^{\prime}\leftarrow E^{\prime}\cup\{e\}.
9:Update EcEc{e}E^{c}\leftarrow E^{c}\setminus\{e\}.
10:End While
11:Return EE^{\prime}

Figure 6(a) illustrates an example of edge augmentation due to Algorithm 3 with the graph GG in Figure 3 and a PMI sequence of length 44 as inputs. The red edges indicate the augmented edges. We observe that the graph GG^{\prime} in Figure 6(a) contains a total of 29 edges compared to the graph in Figure 2(b)(b), which contains a total of 25 edges after the ZF-based edge augmentation.

Refer to caption
(a) GG^{\prime}
Refer to caption
(b) G′′G^{\prime\prime}
Figure 6: Distance-based edge augmentation due to Algorithm 3. (a) GG^{\prime} is the augmented graph when PMI sequence of length 4 consisting of DL vectors of nodes v1,,v4v_{1},\cdots,v_{4} is the input to the algorithm. (b) G′′G^{\prime\prime} is the augmented graph with a PMI sequence of length 5 (given in (9)) as the input.
Remark 4.5

We note that the distance-based bound on the dimension of SSCS is typically better than the ZF-based bound, especially when the graph is not SSC [10]. Thus, edge augmentation using Algorithm 3 allows to add edges while preserving a better bound on the dimension of SSCS. For instance, the distance-based bound on the dimension of SSCS in GG is 5, which is better than the ZF-based bound. We see that using Algorithm 3, we can have a total of 27 edges in the augmented graph G′′G^{\prime\prime} (as illustrated in Figure 6(b)) while maintaining the dimension of SSCS to be 5, which is not possible by the edge augmentation using the ZF-based bound.

Next, we analyze the performance of Algorithm 3 by the following result.

Proposition 4.6

If we repeat Algorithm 3 a constant cc number of times and then return the best graph among these iterations, then the returned graph is an α\alpha–approximation with probability at least 1ec(OPTβ)α×OPT1-e^{-c\left(\frac{OPT}{\beta}\right)^{\alpha\times OPT}}, where OPTOPT is the optimal number of edges and β\beta is the number of edges that can each be added without changing the PMI.

We omit the proof of this proposition, because it follows the same arguments given in [11, Proposition 4.2] for a similar result on the undirected graphs. Moreover, the time complexity of Algorithm 3 is O(|E|×|Ec|×mlogn)O(|E|\times|E^{c}|\times m\log n), where |Ec||E^{c}| is the number of edges not in the input graph. The term O(|E|×mlogn)O(|E|\times m\log n) is the cost of running Dijkstra’s shortest path algorithm for all leader nodes and we do it for all of the missing edges EcE^{c} in the randomized algorithm.

V Numerical Evaluation

We illustrate and compare the ZF-based and the distance-based edge augmentation algorithms on random directed networks with N=100N=100 nodes in which edge (i,j)(i,j) exists with probability p=0.075p=0.075, ij\forall i\neq j. Each point in plots in Figure 7 is an average of 30 randomly generated instances.

In Figure 7(a), we plot ZF-based and distance-based bounds on the dimension of SSCS as a function of number of leaders, which are chosen randomly. The distance-based bound is better than the ZF-based, especially for a smaller number of leaders (as discussed in [10]). Figure 7(b) plots the number of edges added in graphs as a function of number of (randomly selected) leaders. We note that Algorithms 1 and 3 augment edges while preserving the ZF-based and distance-based bounds on the dimension of SSCS, respectively. For the same number of leaders, the number of edges augmented by Algorithm 1 is greater than the Algorithm 3 because the controllability bound preserved by the ZF-based augmentation (Algorithm 1) is smaller than the distance-based augmentation. The number of edges in the original graphs are also shown. Figure 7(c) illustrates the result when we augment edges using Algorithms 1 and 3 while preserving the same controllability bound, which is ZFS-based.

Refer to caption
(a)
Refer to caption
(b)
Refer to caption
(c)
Figure 7: (a) Lower bounds on the dimension of SSCS. (b) Number of edges added by ZF-based and distance-based augmentation algorithms while preserving their respective bounds. (c) Number of edges added by Algorithms 1 and 3 while preserving the same (ZF-based) bound.

VI Conclusion

Network connectivity and robustness can be improved by augmenting extra links between nodes. However, adding new links may degrade the network’s controllability. In this paper, we presented edge augmentation algorithms to add the maximum number of edges in a network while preserving the ZF-based bound and the distance-based bounds on the dimension of SSCS. When the bound on the dimension of SSCS to be preserved is smaller, a large number of edges can be augmented. Though we considered networks with Laplacian dynamic (2), both the distance-based and the ZF-based methods are applicable to more generalized dynamics in the form x˙=Px+Bu\dot{x}=Px+Bu (e.g., [12, 5]). In particular, the ZF-based bound holds for any such linear dynamics on a network where an edge (vi,vj)(v_{i},v_{j}) denotes that the corresponding entry in the system matrix, PijP_{ij}, is non-zero. In comparison, the distance-based method requires the system matrix, PP, to be in a class of matrices called the distance-information-preserving matrices (as explained in [12]), which contain the graph Laplacian as a special case. We aim to further explore the relation between network controllability and edge density to co-optimize robustness and controllability in the future.

References

  • [1] W. Abbas, M. Shabbir, Y. Yazıcıoğlu, and A. Akber, “Trade-off between controllability and robustness in diffusively coupled networks,” IEEE Transactions on Control of Network Systems, vol. 7, no. 4, 2020.
  • [2] F. Pasqualetti, C. Favaretto, S. Zhao, and S. Zampieri, “Fragility and controllability tradeoff in complex networks,” in American Control Conference (ACC), 2018, pp. 216–221.
  • [3] S. S. Mousavi, M. Haeri, and M. Mesbahi, “Strong structural controllability of networks under time-invariant and time-varying topological perturbations,” IEEE Transactions on Automatic Control, 2020.
  • [4] G. Lindmark and C. Altafini, “Investigating the effect of edge modifications on networked control systems,” arXiv preprint arXiv:2007.13713, 2020.
  • [5] N. Monshizadeh, S. Zhang, and M. K. Camlibel, “Zero forcing sets and controllability of dynamical systems defined on graphs,” IEEE Transactions on Automatic Control, vol. 59, pp. 2562–2567, 2014.
  • [6] N. Monshizadeh, K. Camlibel, and H. Trentelman, “Strong targeted controllability of dynamical networks,” in 54th IEEE Conference on Decision and Control (CDC), 2015, pp. 4782–4787.
  • [7] M. Trefois and J.-C. Delvenne, “Zero forcing number, constrained matchings and strong structural controllability,” Linear Algebra and its Applications, vol. 484, pp. 199–218, 2015.
  • [8] S. S. Mousavi, M. Haeri, and M. Mesbahi, “On the structural and strong structural controllability of undirected networks,” IEEE Transactions on Automatic Control, vol. 63, no. 7, pp. 2234–2241, 2018.
  • [9] A. Y. Yazıcıoğlu, W. Abbas, and M. Egerstedt, “Graph distances and controllability of networks,” IEEE Transactions on Automatic Control, vol. 61, no. 12, pp. 4125–4130, 2016.
  • [10] A. Y. Yazıcıoğlu, M. Shabbir, W. Abbas, and X. Koutsoukos, “Strong structural controllability of diffusively coupled networks: Comparison of bounds based on distances and Zero Forcing,” in IEEE Conference on Decision and Control (CDC), 2020.
  • [11] W. Abbas, M. Shabbir, H. Jaleel, and X. Koutsoukos, “Improving network robustness through edge augmentation while preserving strong structural controllability,” in American Control Conference (ACC), 2020, pp. 2544–2549.
  • [12] H. J. Van Waarde, M. K. Camlibel, and H. L. Trentelman, “A distance-based approach to strong target control of dynamical networks,” IEEE Transactions on Automatic Control, vol. 62, no. 12, 2017.
  • [13] J. Gao, Y.-Y. Liu, R. M. D’souza, and A.-L. Barabási, “Target control of complex networks,” Nature Communications, vol. 5, 2014.
  • [14] A. M. R.-S. G. W. Group, “Zero forcing sets and the minimum rank of graphs,” Linear Algebra and its Applications, vol. 428, no. 7, pp. 1628–1648, 2008.