This paper was converted on www.awesomepapers.org from LaTeX by an anonymous user.
Want to know more? Visit the Converter page.

Controllability scores of linear time-varying network systems

Kota Umezu and Kazuhiro Sato K. Umezu and K. Sato are with the Department of Mathematical Informatics, Graduate School of Information Science and Technology, The University of Tokyo, Tokyo 113-8656, Japan, email: [email protected] (K. Umezu), [email protected] (K. Sato)
Abstract

For large-scale network systems, network centrality based on control theory plays a crucial role in understanding their properties and controlling them efficiently. The controllability score is such a centrality index and can give a physically meaningful measure. Nevertheless, the existing work is limited to linear time-invariant (LTI) systems and the controllability score cannot be applied to linear time-varying (LTV) systems, which include essential models such as temporal networks for real application. This paper extends it to apply to LTV systems. Since it is defined as an optimal solution to some optimization problem, it is not necessarily uniquely determined. Its uniqueness must be guaranteed for reproducibility and interpretability. This paper also shows its uniqueness in most practical cases, which guarantees its use as a network centrality. In addition, we propose a data-driven method to compute it for its practical use. Finally, in numerical experiments, we compare controllability scores between LTI and LTV systems and assess the performance of the proposed data-driven method.

Index Terms:
controllability score, LTV system, temporal network, data-driven method

I Introduction

I-A Background

Large-scale dynamical systems on networks are ubiquitous across various fields: power grids [1] and multi-agent systems [2] in engineering, brain networks [3] and ecosystems [4] in natural sciences, and opinion networks [5] in social sciences. Although nonengineering network systems are not necessarily controlled artificially, like engineering systems, they alter their dynamics in response to input signals and thus fall within the scope of modern control theory. For instance, the brain alters its dynamics for task demands [3], and ecosystems shift their dynamics in response to external disturbances [4]. Therefore, studying these networks from the perspective of modern control theory is crucial for performing efficient control or uncovering system properties, whether for engineering or nonengineering network systems, and has become an active area of research [6].

One approach to analyzing large-scale network systems is to identify key nodes in their dynamics. Among such approaches, a prominent method is the one proposed in [7], which is based on structural controllability [8], a qualitative concept. The method utilizes graph-theoretic tools and identifies a minimum set of nodes with which structural controllability is ensured when signals are applied. The selected nodes are considered key nodes for control. However, structural controllability is not necessarily a physically meaningful concept since structurally controllable systems may require a vast amount of energy for control [9], and thus controlling them is sometimes unrealistic. Consequently, as pointed out in [10], quantitative approaches are more favorable.

One of the prominent quantitative approaches is discussed in [11]. The method also identifies a set of key nodes by solving a combinatorial optimization problem based on a quantitative controllability metric. Alternatively, assessing network centrality quantitatively is also a frequently utilized way [11, 10]. For instance, ranking by centrality measure based on quantitative controllability is applied to brain networks [3]. The advantage of network centrality is that it provides a relative measure of importance rather than a binary assessment of whether being a key node or not. The controllability score is such a centrality index introduced in [12], and some numerical experiments show that it provides a more reasonable measure than other existing indices.

However, the controllability score still faces many challenges. One of them is that the applicability is limited to linear time-invariant (LTI) systems:

x˙(t)=Ax(t).\dot{x}(t)=Ax(t). (1)

Although much effort for large-scale network systems has been focused on LTI systems [7, 11], there is an issue that they cannot capture dynamics on a network whose structure varies over time, such as temporal networks [13], unlike linear time-varying (LTV) systems:

x˙(t)=A(t)x(t).\dot{x}(t)=A(t)x(t). (2)

Recent research reports that LTV systems on temporal networks and LTI systems exhibit qualitatively and quantitatively different properties, such as the minimum energy for control [14] and driver nodes [15]. Thus, the controllability score should be extended to apply to LTV systems. Moreover, the extension causes another challenge regarding reproducibility and interpretability. Since the controllability score is defined as an optimal solution to some optimization problem, it is not necessarily unique. Nevertheless, the uniqueness must be guaranteed to use it as a network centrality, as explained in more detail in Section II-D.

Another challenge is the requirement for knowledge of the system. Since the controllability score measures centrality quantitatively, the computation of it requires the value of the system matrix. Nevertheless, system identification is sometimes difficult, especially for LTV systems 2, since the system matrix A(t)A(t) changes over time. Thus, a data-driven method should be developed to compute the controllability score using experimental data instead of the system matrix.

I-B Contribution

  • We extend the controllability score to apply to LTV systems. Furthermore, we prove that it is uniquely determined in two scenarios: the first for general systems and the second for temporal networks. The proof for general systems is similar to that in [16] but needs to be appropriately modified to suit the setting. Since the assumptions required for the proof are weak, we consider that the controllability score is unique in most practical cases. The uniqueness of the controllability score is critical for its use as a network centrality; thus, we can utilize it to measure the centrality of each node in networks. The second result is obtained by restricting the systems to temporal networks and modifying the assumptions. This leads to a stronger guarantee of uniqueness for temporal networks. Numerical experiments show different scores between LTI and LTV systems, which suggests the importance of the extension.

  • We propose a data-driven method to compute the controllability Gramian, which is required to calculate controllability scores. Although related work [17, 18] has proposed data-driven methods for the controllability Gramian, the methods are limited to LTI systems since they employ the Lyapunov equation, which applies to LTI systems but not LTV systems. In contrast, our proposed method can be applied to LTV systems since it relies on the integral representation. Moreover, we emphasize that the advantage of our proposed method is its applicability not only to temporal network systems, where the system matrix switches at certain times but remains piecewise constant, but also to general systems whose system matrices change continuously over time. Systems that are suitably modeled by the former are somewhat easier to identify [19]. However, for systems where the latter is appropriate, identification is significantly challenging, highlighting the advantage of this method. Numerical experiments show that our proposed method can accurately compute the controllability Gramian and the controllability scores.

I-C Outline

The rest of the paper is organized as follows. In Section II, we introduce notations and summarize essential concepts such as temporal networks, the controllability Gramian, and the controllability score. In Section III, we extend the controllability score to apply to LTV systems and prove its uniqueness under some assumptions. In Section IV, we summarize the optimization algorithm to compute controllability scores and propose a data-driven method. In Section V, we show numerical experiments to compare controllability scores between LTI and LTV systems and to assess the performance of the proposed data-driven method. The concluding remarks are given in Section VI.

II Preliminaries

II-A Notation

The set of all real numbers and the set of all complex numbers are denoted by \mathbb{R} and \mathbb{C}, respectively. Let nn denote the number of nodes, and let II and OO denote the identity matrix of order nn and the n×nn\times n zero matrix, respectively. Let ei:-(0,,0,1,0,,0)ne_{i}\coloneq(0,\ldots,0,1,0,\ldots,0)^{\top}\in\mathbb{R}^{n} be a standard vector whose iith element is 11 and other elements are 0. For a vector v=(v1,,vn)nv=(v_{1},\ldots,v_{n})^{\top}\in\mathbb{R}^{n}, v:-i=1nvi2\left\|{v}\right\|\coloneq\sqrt{\sum_{i=1}^{n}v_{i}^{2}} denotes the standard Euclidean norm. The symbol L2[0,T]L^{2}[0,T] denotes the set of all square-integrable functions u:[0,T]nu\colon[0,T]\to\mathbb{R}^{n}, i.e., L2[0,T]:-{u:[0,T]n0Tu(t)2dt<}L^{2}[0,T]\coloneq\left\{u\colon[0,T]\to\mathbb{R}^{n}\mid\int_{0}^{T}\left\|{u(t)}\right\|^{2}\mathrm{d}t<\infty\right\}. For a square-integrable function uL2[0,T]u\in L^{2}[0,T], uL2:-0Tu(t)2dt\left\|{u}\right\|_{L^{2}}\coloneq\sqrt{\int_{0}^{T}\left\|{u(t)}\right\|^{2}\mathrm{d}t} denotes the L2L^{2} norm.

For a matrix An×nA\in\mathbb{R}^{n\times n}, eA\mathrm{e}^{A}, detA\det A, and tr(A)\mathrm{tr}(A) denote the exponential of AA, the determinant of AA, and the trace of AA, respectively. When AA is symmetric, we write AOA\succ O to mean that AA is positive definite. For a vector v=(v1,,vn)nv=(v_{1},\ldots,v_{n})^{\top}\in\mathbb{R}^{n}, let diag(v1,,vn)\mathrm{diag}(v_{1},\ldots,v_{n}) denote the diagonal matrix with the diagonal elements v1,,vnv_{1},\ldots,v_{n}. Instead of diag(v1,,vn)\mathrm{diag}(v_{1},\ldots,v_{n}), we also use diag(v)\mathrm{diag}(v). Let SnS_{n} denote the symmetric group of order nn. For σSn\sigma\in S_{n}, sgn(σ)\mathrm{sgn}(\sigma) denotes the sign of the permutation σ\sigma. Let Δ\Delta be a standard simplex in n\mathbb{R}^{n}, i.e., Δ:-{pn|pi0(i=1,,n),i=1npi=1}\Delta\coloneq\left\{p\in\mathbb{R}^{n}\;\middle|\;p_{i}\geq 0\ (i=1,\ldots,n),\ \sum_{i=1}^{n}p_{i}=1\right\}. Let >0m:-{(t1,,tm)mtk>0(k=1,,m)}\mathbb{R}^{m}_{>0}\coloneq\{(t_{1},\ldots,t_{m})^{\top}\in\mathbb{R}^{m}\mid t_{k}>0\ (k=1,\ldots,m)\}.

For an LTV system 2, Φτt\Phi^{t}_{\tau} denotes the state transition matrix, which satisfies

tΦτt=A(t)Φτt,Φττ=I.\dfrac{\partial}{\partial t}\Phi_{\tau}^{t}=A(t)\Phi_{\tau}^{t},\quad\Phi_{\tau}^{\tau}=I. (3)

As a caution, we often address cases where A(t)A(t) is discontinuous, in which case we consider 3 in the sense of one-sided differentials at each discontinuous point.

II-B Dynamical systems on temporal networks

Temporal networks [13] are an important subject targeted by this paper. A temporal network is represented by a chronologically ordered sequence of mm separate networks, where the node set is shared across all networks, but edge sets and edge weights vary in each network. Thus, each network can be expressed by a constant weighted adjacency matrix AkA_{k}. Let its duration be Δtk(k=1,,m)\Delta t_{k}\ (k=1,\ldots,m).

Dynamical systems on temporal networks are modeled in [14] as LTV systems 2 with

A(t)=Ak,{t[tk1,tk)if k=1,,m1,t[tm1,tm]if k=m,A(t)=A_{k},\quad\begin{cases}t\in[t_{k-1},t_{k})&\text{if $k=1,\ldots,m-1$},\\ t\in[t_{m-1},t_{m}]&\text{if $k=m$},\end{cases} (4)

where t0=0,tk==1kΔtt_{0}=0,\ t_{k}=\sum_{\ell=1}^{k}\Delta t_{\ell}. In this paper, we also call the system 2 with 4 a temporal network, where the state transition matrix can be expressed as

Φτt=eAk(ttk1)eAk1Δtk1eA+1Δt+1eA(tτ),\Phi_{\tau}^{t}=\mathrm{e}^{A_{k}(t-t_{k-1})}\mathrm{e}^{A_{k-1}\Delta t_{k-1}}\cdots\mathrm{e}^{A_{\ell+1}\Delta t_{\ell+1}}\mathrm{e}^{A_{\ell}(t_{\ell}-\tau)}, (5)

where t[tk1,tk],τ[t1,t]t\in[t_{k-1},t_{k}],\ \tau\in[t_{\ell-1},t_{\ell}], and τt\tau\leq t.

II-C Controllability Gramian and minimum-energy control

In this subsection, we quickly review the controllability Gramian and then summarize the results of minimum-energy control.

We consider the following LTV system with control input:

x˙(t)=A(t)x(t)+B(t)u(t).\dot{x}(t)=A(t)x(t)+B(t)u(t). (6)

The finite-time controllability Gramian for it is defined as

WLTV(T):-0TΦτTB(τ)B(τ)(ΦτT)dτ,W_{\mathrm{LTV}}(T)\coloneq\int_{0}^{T}\Phi_{\tau}^{T}B(\tau)B(\tau)^{\top}\left(\Phi_{\tau}^{T}\right)^{\top}\mathrm{d}\tau,

which is a symmetric positive semidefinite matrix. It is well-known that this matrix is related to the controllability of the system 6. The system is, for instance, controllable on the time interval [0,T][0,T] if and only if WLTV(T)OW_{\mathrm{LTV}}(T)\succ O [20].

Here, controllability itself is a concept that focuses solely on whether some control input can steer the state vector from the origin to any desired state within a finite time. The magnitude of the energy required for such a control input is not considered. That is, even if a system is controllable, achieving the desired state may be unrealistic since the required energy may be too large [9]. Thus, assessing the ability to control quantitatively is crucial when controlling a system. In this paper, we also refer to the quantitative control ability as “controllability”.

The controllability Gramian is also related to quantitative controllability, and the following result is known.

Proposition 1 (minimum energy for control [20])

Assume that the LTV system 6 is controllable on the time interval [0,T][0,T], which is equivalent to WLTV(T)OW_{\mathrm{LTV}}(T)\succ O. Then, for any desired state vector xfnx_{\mathrm{f}}\in\mathbb{R}^{n}, the minimum energy required for driving the state vector from the origin at time 0 to xfx_{\mathrm{f}} at time TT is given by

minuL2[0,T]{uL22|x(0)=0,x(T)=xfunder 6}\displaystyle\min_{u\in L^{2}[0,T]}\left\{\left\|{u}\right\|_{L^{2}}^{2}\;\middle|\;x(0)=0,\ x(T)=x_{\mathrm{f}}\ \textrm{under \lx@cref{creftype~refnum}{eq:ltv}}\right\}
=xfWLTV(T)1xf.\displaystyle=x_{\mathrm{f}}^{\top}W_{\mathrm{LTV}}(T)^{-1}x_{\mathrm{f}}.

LTV systems 6 include LTI systems

x˙(t)=Ax(t)+Bu(t)\dot{x}(t)=Ax(t)+Bu(t) (7)

as a special case. For an LTI system 7, let us specifically denote the controllability Gramian WLTV(T)W_{\mathrm{LTV}}(T) as WLTI(T)W_{\mathrm{LTI}}(T):

WLTI(T):-0Te(Tτ)ABBe(Tτ)Adτ.W_{\mathrm{LTI}}(T)\coloneq\int_{0}^{T}\mathrm{e}^{(T-\tau)A}BB^{\top}\mathrm{e}^{(T-\tau)A^{\top}}\mathrm{d}\tau.

Obviously, the statement in Proposition 1, where the LTV system 6 is replaced by the LTI system 7 and WLTV(T)W_{\mathrm{LTV}}(T) by WLTI(T)W_{\mathrm{LTI}}(T), holds.

Therefore, by employing the controllability Gramian, we can quantitatively evaluate the controllability of LTI systems 7 and LTV systems 6. More specifically, we can utilize the following result, which follows from Proposition 1.

Proposition 2

Assume that the LTV system 6 is controllable on the time interval [0,T][0,T]. Then, the reachable space defined as

(T)\displaystyle\mathcal{E}(T)
:-{xfn|There exists uL2[0,T] s.t. uL21,x(0)=0,x(T)=xfunder 6.}\displaystyle\coloneq\left\{x_{\mathrm{f}}\in\mathbb{R}^{n}\;\middle|\;\begin{gathered}\text{There exists $u\in L^{2}[0,T]$ s.t. $\left\|{u}\right\|_{L^{2}}\leq 1$,}\\ x(0)=0,\ x(T)=x_{\mathrm{f}}\ \textrm{under \lx@cref{creftype~refnum}{eq:ltv}}.\end{gathered}\right\}

can be expressed as

(T)={yn|yWLTV(T)1y1},\mathcal{E}(T)=\left\{y\in\mathbb{R}^{n}\;\middle|\;y^{\top}W_{\mathrm{LTV}}(T)^{-1}y\leq 1\right\},

and, therefore, its volume is proportional to detWLTV(T)\sqrt{\det W_{\mathrm{LTV}}(T)}.

The same claim also holds for LTI systems 7 when WLTV(T)W_{\mathrm{LTV}}(T) is replaced with WLTI(T)W_{\mathrm{LTI}}(T).

The reachable space (T)\mathcal{E}(T) is a set of all state vectors that can be achieved by some control input whose energy is less than or equal to 11. We consider that the larger the volume of (T)\mathcal{E}(T) is, the easier the system is to control. Thus, we can use detWLTV(T)\sqrt{\det W_{\mathrm{LTV}}(T)}, or logdetWLTV(T)\log\det W_{\mathrm{LTV}}(T), as a measure of controllability in the case of LTV systems 6. Since logdetWLTV(T)\log\det W_{\mathrm{LTV}}(T) can often be computed more stably than detWLTV(T)\sqrt{\det W_{\mathrm{LTV}}(T)} and its concavity is useful for optimization, we use logdetWLTV(T)\log\det W_{\mathrm{LTV}}(T) rather than detWLTV(T)\sqrt{\det W_{\mathrm{LTV}}(T)}. Similarly, in the case of LTI systems 7, we use logdetWLTI(T)\log\det W_{\mathrm{LTI}}(T) as a measure of controllability.

Alternatively, we can also utilize the following result.

Proposition 3

Assume that the LTV system 6 is controllable on time interval [0,T][0,T]. Then, the average of the minimum energy required to drive the state vector from the origin to the point on the unit sphere {yny=1}\{y\in\mathbb{R}^{n}\mid\left\|{y}\right\|=1\} over the uniform distribution is proportional to tr(WLTV(T)1)\mathrm{tr}\left(W_{\mathrm{LTV}}(T)^{-1}\right).

The same claim holds for LTI systems 7 by replacing WLTV(T)W_{\mathrm{LTV}}(T) with WLTI(T)W_{\mathrm{LTI}}(T).

The smaller the average of the minimum energy is, the more controllable we consider the system to be. Thus, in the case of LTV systems 6, we can regard tr(WLTV(T)1)\mathrm{tr}\left(W_{\mathrm{LTV}}(T)^{-1}\right) as a measure of controllability, and in the case of LTI systems 7, tr(WLTI(T)1)\mathrm{tr}\left(W_{\mathrm{LTI}}(T)^{-1}\right).

To define the controllability score, in [12], logdetWLTI(T)\log\det W_{\mathrm{LTI}}(T) or tr(WLTI(T)1)\mathrm{tr}\left(W_{\mathrm{LTI}}(T)^{-1}\right) is used to evaluate the controllability of LTI systems 7. Similarly, in this paper, we use logdetWLTV(T)\log\det W_{\mathrm{LTV}}(T) or tr(WLTV(T)1)\mathrm{tr}\left(W_{\mathrm{LTV}}(T)^{-1}\right) to evaluate the controllability of LTV systems 6.

II-D Controllability score

The controllability score [12] is a network centrality measure that assesses the significance of each node in the dynamical system on the network. Previous studies [12, 16] have focused on LTI system models 1 of dynamical systems on large-scale networks. Here, x(t)=(x1(t),,xn(t))nx(t)=(x_{1}(t),\ldots,x_{n}(t))^{\top}\in\mathbb{R}^{n} and AA in 1 represent the states of nodes and the structure of the network, respectively.

To define the controllability scores, we consider the following equation, which adds a hypothetical control input term to 1:

x˙(t)=Ax(t)+diag(p1,,pn)u(t),\dot{x}(t)=Ax(t)+\mathrm{diag}(\sqrt{p_{1}},\ldots,\sqrt{p_{n}})u(t), (8)

where u(t)=(u1(t),,un(t))nu(t)=(u_{1}(t),\ldots,u_{n}(t))^{\top}\in\mathbb{R}^{n} is a hypothetical control input and p=(p1,,pn)np=(p_{1},\ldots,p_{n})^{\top}\in\mathbb{R}^{n} is assumed to satisfy

pi0(i=1,,n),i=1npi=1.\displaystyle p_{i}\geq 0\quad(i=1,\ldots,n),\quad\sum_{i=1}^{n}p_{i}=1. (9)

Equation 8 corresponds to an LTI system 7 where B=diag(p1,,pn)B=\mathrm{diag}(\sqrt{p_{1}},\ldots,\sqrt{p_{n}}). From 8, node xix_{i} and input uiu_{i} correspond one-to-one. The larger pip_{i} is, the more significant the influence of control input uiu_{i} on node xix_{i} can be.

Here, let us regard pp as a design variable and consider maximizing the controllability of the system 8 concerning some measure. When the optimal solution is p=(p1,,pn)p^{*}=(p_{1}^{*},\ldots,p_{n}^{*})^{\top}, if pip_{i}^{*} is large, it indicates that we can efficiently control the system 8 by actively influencing node xix_{i}. Thus, we can consider node xix_{i} as a pivotal node. On the other hand, if pip_{i}^{*} is small, it suggests that we can control the system 8 without significantly influencing node xix_{i}, meaning that node xix_{i} is not a critical node. Therefore, the optimal solution pp^{*} can be interpreted as the importance of each node, and the constraint 9 represents the importance distribution, where they are nonnegative and the sum equals 11. The controllability score is defined as the optimal solution pp^{*}.

As described in Section II-C, several indices for controllability are possible. Accordingly, let us consider the following two optimization problems.

Problem 1
minimizep\displaystyle\operatorname*{minimize}_{p} logdetWLTI(p;T)\displaystyle\quad-\log\det W_{\mathrm{LTI}}(p;T)
subjectto\displaystyle\mathrm{subject\ to} pΔ,WLTI(p;T)O.\displaystyle\quad p\in\Delta,\ W_{\mathrm{LTI}}(p;T)\succ O.
Problem 2
minimizep\displaystyle\operatorname*{minimize}_{p} tr(WLTI(p;T)1)\displaystyle\quad\mathrm{tr}\left(W_{\mathrm{LTI}}(p;T)^{-1}\right)
subjectto\displaystyle\mathrm{subject\ to} pΔ,WLTI(p;T)O.\displaystyle\quad p\in\Delta,\ W_{\mathrm{LTI}}(p;T)\succ O.

Here,

WLTI(p;T):-0Te(Tτ)A{diag(p)}e(Tτ)AdτW_{\mathrm{LTI}}(p;T)\coloneq\int_{0}^{T}\mathrm{e}^{(T-\tau)A}\left\{\mathrm{diag}(p)\right\}\mathrm{e}^{(T-\tau)A^{\top}}\mathrm{d}\tau

is the controllability Gramian for the considered LTI system 8. The constant T>0T>0 is the final time to evaluate the controllability, a parameter one must choose to meet their objective. Note that the constraint pΔp\in\Delta is equivalent to 9. The optimal solutions to Problems 1 and 2 are referred to as volumetric controllability score (VCS) and average energy controllability score (AECS), respectively.

However, there are two points to be noted when interpreting the controllability score as the importance of each node. The first point is that an optimal solution must exist, but this is not an issue since it has been shown that it exists for all LTI systems 1 and the final time T>0T>0 [12]. The second point, a more significant issue, is that an optimal solution must be unique. If the optimal solution is not unique, a reproducibility issue arises since different researchers analyzing the same network may arrive at different conclusions. Additionally, from the perspective of interpretability, there is also an issue of how to determine node importance based on the solutions, which is not clear. For these reasons, the controllability score must be unique; however, there exists a case where both the optimal solutions to Problems 1 and 2 are not unique [12].

Therefore, clarifying the conditions under which controllability scores are uniquely determined is crucial for utilizing it as a centrality measure. The following results have been shown regarding this issue.

Proposition 4 ([12])

Assume that AA in 1 is stable, i.e., each eigenvalue has a negative real part. Then, for any final time T>0T>0, both the optimal solutions to Problems 1 and 2 are unique.

Proposition 5 ([16])

Assume that AA in 1 is arbitrary. Then, for almost all final time T>0T>0, both the optimal solutions to Problems 1 and 2 are unique.

From Proposition 5, when considering LTI systems 1 on networks, the controllability score is unique in most practical cases.

III Controllability scores for LTV systems

In this section, we extend the concept of the controllability score, initially proposed for LTI systems on networks, to LTV systems on networks by formulating optimization problems similar to Problems 3 and 4. First, we clarify assumptions for LTV systems, formulate optimization problems, and define the controllability score for LTV systems in Section III-A. As discussed in Section II-D, the uniqueness of the optimal solutions is crucial for our objective. Thus, we next prove the uniqueness of the optimal solutions for general LTV systems that include temporal networks. Although we require Assumption 2, it is unrestrictive, and we conjecture that most systems satisfy it, as detailed in Remark 2. However, conditions under which A(t)A(t) satisfies this assumption are not yet known. Thus, we also show another result where the scope of systems is limited to temporal networks. The discussion does not require such assumptions; it holds for almost all time parameters. This result leads to a stronger guarantee of uniqueness for temporal networks. We consider that the controllability score is unique in most practical cases from the two results.

III-A Problem settings, formulation, and definition

Let us consider LTV system models 2 of dynamical systems on large-scale networks. Similar to the case of LTI systems, let x(t)=(x1(t),,xn(t))nx(t)=(x_{1}(t),\ldots,x_{n}(t))^{\top}\in\mathbb{R}^{n} represent the states of nodes, and A(t)A(t) represent the time-varying structure of the network. We consider the following assumption for A(t)A(t).

Assumption 1

The matrix A(t)A(t) is piecewise real analytic. To be precise, there exist (m+1)(m+1) times 0=t0<t1<<tm1<tm=tf0=t_{0}<t_{1}<\cdots<t_{m-1}<t_{m}=t_{\mathrm{f}}, where tft_{\mathrm{f}} is the final time of the system 2, and the following hold:

  • A(t)A(t) is continuous on [tk1,tk)(k=1,,m1)[t_{k-1},t_{k})\ (k=1,\ldots,m-1) and on [tm1,tm][t_{m-1},t_{m}].

  • A(t)A(t) is real analytic on (tk1,tk)(k=1,,m)(t_{k-1},t_{k})\ (k=1,\ldots,m).

  • A(t)A(t) has a finite left-hand limit at tk(k=1,,m1)t_{k}\ (k=1,\ldots,m-1).

Note that Assumption 1 is not restrictive at all. In fact, temporal networks, as described in Section II-B, satisfy Assumption 1, and any piecewise continuous matrix can be arbitrarily well approximated by A(t)A(t) that satisfies Assumption 1. Thus, the range of systems that satisfy Assumption 1 is sufficiently broad for practical purposes.

The main idea of the controllability score for LTV systems is the same as that for LTI systems. Let us consider the following equation, which adds a hypothetical control input term to 2:

x˙(t)=A(t)x(t)+diag(p1,,pn)u(t).\dot{x}(t)=A(t)x(t)+\mathrm{diag}(\sqrt{p_{1}},\ldots,\sqrt{p_{n}})u(t). (10)

Similar to the case of LTI systems, p=(p1,,pn)np=(p_{1},\ldots,p_{n})^{\top}\in\mathbb{R}^{n} is assumed to satisfy 9. Note that pp is not dependent on tt, as detailed in Remark 1. Since 10 corresponds to the case where B(t)diag(p1,,pn)B(t)\equiv\mathrm{diag}(\sqrt{p_{1}},\ldots,\sqrt{p_{n}}) in 6, this assumption can be interpreted as B(t)B(t) being a diagonal constant matrix.

For LTV systems 6, we can consider the optimal solutions to the following optimization problems similar to Problems 1 and 2 as the importance of each node.

Problem 3
minimizep\displaystyle\operatorname*{minimize}_{p} logdetWLTV(p;T)\displaystyle\quad-\log\det W_{\mathrm{LTV}}(p;T)
subjectto\displaystyle\mathrm{subject\ to} pΔ,WLTV(p;T)O.\displaystyle\quad p\in\Delta,\ W_{\mathrm{LTV}}(p;T)\succ O.
Problem 4
minimizep\displaystyle\operatorname*{minimize}_{p} tr(WLTV(p;T)1)\displaystyle\quad\mathrm{tr}\left(W_{\mathrm{LTV}}(p;T)^{-1}\right)
subjectto\displaystyle\mathrm{subject\ to} pΔ,WLTV(p;T)O.\displaystyle\quad p\in\Delta,\ W_{\mathrm{LTV}}(p;T)\succ O.

Here,

WLTV(p;T):-0TΦτT{diag(p)}(ΦτT)dτW_{\mathrm{LTV}}(p;T)\coloneq\int_{0}^{T}\Phi_{\tau}^{T}\left\{\mathrm{diag}(p)\right\}\left(\Phi_{\tau}^{T}\right)^{\top}\mathrm{d}\tau

is the controllability Gramian for the considered LTV system 10, and TT is a final time that satisfies 0=t0<Ttf0=t_{0}<T\leq t_{\mathrm{f}}. While tft_{\mathrm{f}} is the final time of the time interval over which A(t)A(t) is defined, TT is the final time of the time interval for evaluating the controllability of the system 10. One must choose TT appropriately to meet their objective. Since the controllability score is unique in most cases as shown in Section III-B, we consider that setting T=tfT=t_{\mathrm{f}} poses no practical issues.

Similar to the case of LTI systems, let us refer to the optimal solutions to Problems 3 and 4 as VCS and AECS, respectively. As discussed in Section II-D, their existence and uniqueness are crucial to utilize them as a centrality measure. Their existence can be easily proved without assuming Assumption 1, in the same manner as the case of LTI systems.

Theorem 1

The optimal solutions to Problems 3 and 4 exist.

Proof

See [12, Theorem 2]. \Box

Proving the uniqueness is more complicated. For a certain system, the optimal solution is not unique at a specific final time TT [12]. However, the uniqueness at almost all final time TT is sufficient for practical use. We can prove it under Assumption 1 since we can utilize the identity theorem, as shown in Section III-B.

In addition, calculating controllability scores is also an important issue. A specific algorithm is described in Section IV. The convexity of the objective function, which can be proved in the same manner as the case of LTI systems, is crucial for computation.

Theorem 2

The objective functions of Problems 3 and 4 are convex.

Proof

See [12, Theorems 1 and 3]. \Box

Therefore, the optimal solution can be efficiently computed.

Remark 1

We explain why we assume that pp is not dependent on tt. As described above, pp is treated as a design variable, and the optimal solution to some optimization problem is regarded as the importance of each node. Thus, if we assume that pp can depend on tt, the optimal solution would represent the time-dependent importance of each node, that is, the importance of each node at each time point tt. Although it seems to contain rich information, the importance of the nodes over the entire time interval is not at all clear, and further analysis is required. Additionally, in cases where the number of nodes nn is large or the final time of the system tft_{\mathrm{f}} is large, the computational cost required to calculate the functions for nn nodes over the time interval [0,T][0,T] is enormous.

On the other hand, if we assume that pp does not depend on tt, the optimal solution is also not dependent on tt. Thus, it can be considered a measure of importance reflecting the temporally global dynamics. Therefore, we assume that pp does not depend on tt.

III-B Uniqueness of controllability scores for general cases

In this subsection, we describe the result of the uniqueness of controllability scores under Assumption 1. As stated in Section III-A, Assumption 1 is not restrictive and holds in practice. The main idea is to modify the proof of [16] to apply to systems that satisfy Assumption 1. In this process, Assumption 2, which will be described later, is additionally required; however, we consider that it is also sufficiently weak and that it does not cause a practical issue, as explained in Remark 2 later.

The following well-known lemma [21] plays an essential role in the proof, and Assumption 1 is required to use this lemma.

Lemma 1

Let φ(T)\varphi(T) be a univariate real analytic function on some open interval (a,b)(a,b). If φ(T)0\varphi(T)\not\equiv 0, then the Lebesgue measure of the zero set {T(a,b)φ(T)=0}\{T\in(a,b)\mid\varphi(T)=0\} is 0. Therefore, φ(T)0\varphi(T)\neq 0 for almost all T(a,b)T\in(a,b) with respect to the Lebesgue measure.

Moreover, the following lemma is also crucial, which can be proved in the same manner as [16]. Assumption 1 is not required to use this lemma.

Lemma 2

Let TT be fixed to satisfy 0<Ttf0<T\leq t_{\mathrm{f}}. If R(T;s)R(T;s) is regular for some s[0,tf]s\in[0,t_{\mathrm{f}}], then both optimal solutions to Problems 3 and 4 are unique, where

R(T;s):-0T[(e1Φτse1)2(e1Φτsen)2(enΦτse1)2(enΦτsen)2]dτ.R(T;s)\coloneq\int_{0}^{T}\begin{bmatrix}\left(e_{1}^{\top}\Phi_{\tau}^{s}e_{1}\right)^{2}&\ldots&\left(e_{1}^{\top}\Phi_{\tau}^{s}e_{n}\right)^{2}\\ \vdots&\ddots&\vdots\\ \left(e_{n}^{\top}\Phi_{\tau}^{s}e_{1}\right)^{2}&\ldots&\left(e_{n}^{\top}\Phi_{\tau}^{s}e_{n}\right)^{2}\end{bmatrix}\mathrm{d}\tau. (11)
Proof

See Appendix A. \Box

Roughly speaking, the regularity of R(T;s)R(T;s) is a sufficient condition that the objective functions in Problems 3 and 4 are strictly convex functions on the feasible region, which guarantees the uniqueness of the optimal solution. Although a similar matrix is introduced in [16], the major difference lies in the second variable ss, which can be used to modify the technique in [16] to the setting in this paper.

Related to Lemma 2, we make the following assumption.

Assumption 2

There exists sk(tk1,tk)s_{k}\in(t_{k-1},t_{k}) such that each Jordan block of R(sk;sk)R(s_{k};s_{k}) corresponding to eigenvalue zero has size 11 for all k=1,,mk=1,\ldots,m.

Assumption 2 is not restrictive, as detailed in Remark 2.

From Lemmas 1 and 2, we can prove the following theorem.

Theorem 3

Assume that the system 2 satisfies Assumptions 1 and 2. Then, both the optimal solutions to Problems 3 and 4 are unique for almost all T(0<Ttf)T\ (0<T\leq t_{\mathrm{f}}).

Proof

We prove that for all k=1,,mk=1,\ldots,m, R(T;sk)R(T;s_{k}) is regular for almost all T(tk1,tk)T\in(t_{k-1},t_{k}). Then, the proof is completed from Lemma 2. Since A(t)A(t) is real analytic on (tk1,tk)(t_{k-1},t_{k}) by Assumption 1, Φτsk\Phi_{\tau}^{s_{k}} is also real analytic on (tk1,tk)(t_{k-1},t_{k}) with respect to τ\tau. Thus, R(T;s)R(T;s) is also real analytic on (tk1,tk)(t_{k-1},t_{k}) with respect to TT. Since φ(T):-detR(T;sk)\varphi(T)\coloneq\det R(T;s_{k}) is a polynomial of elements of R(T;sk)R(T;s_{k}), it is also real analytic. By Lemma 1, it suffices to prove that φ(T)0\varphi(T)\not\equiv 0.

Let the characteristic polynomial of R(sk;sk)R(s_{k};s_{k}) have \ell roots at 0, and nonzero roots be λ1,,λn\lambda_{1},\ldots,\lambda_{n-\ell}. By Assumption 2, there exists a regular matrix Pn×nP\in\mathbb{C}^{n\times n} such that

P1R(sk;sk)P=[λ1λn1λn00]P^{-1}R(s_{k};s_{k})P=\begin{bmatrix}\lambda_{1}&\ast\\ &\ddots&\ddots\\ &&\lambda_{n-\ell-1}&\ast\\ &&&\lambda_{n-\ell}\\ &&&&0\\ &&&&&\ddots\\ &&&&&&0\end{bmatrix}

holds, where \ast is 0 or 11. Moreover, from Φsksk=I\Phi_{s_{k}}^{s_{k}}=I, we have

R(T;sk)T|T=sk=I.\left.\dfrac{\partial R(T;s_{k})}{\partial T}\right|_{T=s_{k}}=I.

Thus, by letting

Q(T):-P1R(T;sk)Pn×nQ(T)\coloneq P^{-1}R(T;s_{k})P\in\mathbb{C}^{n\times n}

and qij(T)q_{ij}(T) be the (i,j)(i,j)th element of Q(T)Q(T), the following hold:

qij(sk)\displaystyle q_{ij}(s_{k}) ={λiif i=j and 1in,0 or 1if i=j1 and 1in1,0otherwise,\displaystyle=\begin{cases}\lambda_{i}&\text{if $i=j$ and $1\leq i\leq n-\ell$},\\ \text{$0$ or $1$}&\text{if $i=j-1$ and $1\leq i\leq n-\ell-1$},\\ 0&\text{otherwise},\end{cases} (12a)
dqijdT(s)\displaystyle\dfrac{\mathrm{d}q_{ij}}{\mathrm{d}T}(s) ={1if i=j,0otherwise.\displaystyle=\begin{cases}1&\text{if $i=j$},\\ 0&\text{otherwise}.\end{cases} (12b)

By the definition of determinant, φ(T)\varphi(T) can be expressed as

φ(T)\displaystyle\varphi(T) =detR(T;sk)=detQ(T)\displaystyle=\det R(T;s_{k})=\det Q(T)
=σSnsgn(σ)i=1nqiσ(i)(T).\displaystyle=\sum_{\sigma\in S_{n}}\mathrm{sgn}(\sigma)\prod_{i=1}^{n}q_{i\sigma(i)}(T).

Let us consider dφdT(sk)\dfrac{\mathrm{d}^{\ell}\varphi}{\mathrm{d}T^{\ell}}(s_{k}). When σSn\sigma\in S_{n} is the identity permutation, i=1nqii(T)\prod_{i=1}^{n}q_{ii}(T) is a product of nn-\ell nonzero elements and \ell zero elements at T=skT=s_{k}. Thus, when this term is differentiated \ell times, only the terms where qn+1,n+1,,qnnq_{n-{\ell}+1,n-{\ell}+1},\ldots,q_{nn} are differentiated exactly once are left nonzero. Since there are !\ell! ways to differentiate \ell terms exactly once, from 12, we have

ddT(i=1nqii)|T=sk\displaystyle\left.\dfrac{\mathrm{d}^{\ell}}{\mathrm{d}T^{\ell}}\left(\prod_{i=1}^{n}q_{ii}\right)\right|_{T=s_{k}} =!i=1nqii(sk)i=n+1ndqiidT(sk)\displaystyle=\ell!\prod_{i=1}^{n-{\ell}}q_{ii}(s_{k})\prod_{i=n-{\ell}+1}^{n}\dfrac{\mathrm{d}q_{ii}}{\mathrm{d}T}(s_{k})
=!i=1nλi0.\displaystyle=\ell!\prod_{i=1}^{n-\ell}\lambda_{i}\neq 0.

When σSn\sigma\in S_{n} is not the identity permutation, the product i=1nqiσ(i)(T)\prod_{i=1}^{n}q_{i\sigma(i)}(T) is composed of more than \ell zero elements at T=skT=s_{k}. Thus, no matter how at most \ell terms to differentiate are chosen from q1σ(1),,qnσ(n)q_{1\sigma(1)},\ldots,q_{n\sigma(n)}, there exists at least one term qiσ(i)q_{i\sigma(i)} such that qiσ(i)(sk)=0q_{i\sigma(i)}(s_{k})=0, resulting in

ddT(i=1nqiσ(i))|T=sk=0.\displaystyle\left.\dfrac{\mathrm{d}^{\ell}}{\mathrm{d}T^{\ell}}\left(\prod_{i=1}^{n}q_{i\sigma(i)}\right)\right|_{T=s_{k}}=0.

From the above, we can obtain

dφdT(sk)=!i=1nλi0.\dfrac{\mathrm{d}^{\ell}\varphi}{\mathrm{d}T^{\ell}}(s_{k})=\ell!\prod_{i=1}^{n-\ell}\lambda_{i}\neq 0.

Therefore, φ(T)0\varphi(T)\not\equiv 0 on (tk1,tk)(t_{k-1},t_{k}), and this completes the proof. \Box

As mentioned repeatedly, the uniqueness of the controllability score is crucial to utilizing it as a centrality measure. From Theorem 3, we consider that the controllability score is unique in most practical cases.

Remark 2

In Theorem 3, Assumption 2 is assumed, where the existence of sks_{k} is guaranteed with which the size of each Jordan block of R(sk;sk)R(s_{k};s_{k}) corresponding to eigenvalue zero is 11. Note that this assumption is not restrictive. For instance, the following are sufficient conditions for this assumption:

  • R(sk;sk)R(s_{k};s_{k}) is diagonalizable over \mathbb{C}.

  • R(sk;sk)R(s_{k};s_{k}) is regular.

The set of n×nn\times n matrices that are not diagonalizable over \mathbb{C} has Lebesgue measure zero in n×n\mathbb{R}^{n\times n}. Furthermore, the set of diagonalizable matrices contains a dense open set in n×n\mathbb{R}^{n\times n} [22, Section 5.6]. A similar claim for regularity also holds. Therefore, at least one of the sufficient conditions can be practically assumed to be satisfied.

III-C Uniqueness of controllability scores for temporal networks

In this subsection, we show the uniqueness of controllability scores for temporal networks, i.e., LTV systems 2 with 4. The main idea is to focus on the time parameters rather than the final time, unlike Section III-B. This discussion allows us to show that, without Assumption 2, the controllability scores are uniquely determined in most cases.

Throughout this subsection, we assume that A(t)A(t) is expressed as 4. Let weight matrices A1,,AmA_{1},\ldots,A_{m} in 4 be fixed in this subsection. Let us express the time constants of A(t)A(t) by durations Δt=(Δt1,,Δtm)>0m\Delta t=(\Delta t_{1},\ldots,\Delta t_{m})^{\top}\in\mathbb{R}^{m}_{>0} rather than switching times t0,,tmt_{0},\ldots,t_{m}. Accordingly, we redefine the notation only in this subsection and represent the state transition matrix as Φτt(Δt1,,Δtm)\Phi_{\tau}^{t}(\Delta t_{1},\ldots,\Delta t_{m}) or Φτt(Δt)\Phi_{\tau}^{t}(\Delta t), which can be calculated as 5 and the controllability Gramian as

WLTV(p;Δt):-0tfΦτtf(Δt){diag(p)}(Φτtf(Δt))dτ,W_{\mathrm{LTV}}(p;\Delta t)\coloneq\int_{0}^{t_{\mathrm{f}}}\Phi_{\tau}^{t_{\mathrm{f}}}(\Delta t)\left\{\mathrm{diag}(p)\right\}(\Phi_{\tau}^{t_{\mathrm{f}}}(\Delta t))^{\top}\mathrm{d}\tau,

where tf:-k=1mΔtkt_{\mathrm{f}}\coloneq\sum_{k=1}^{m}\Delta t_{k}. Furthermore, let the final time TT to evaluate the controllability of the system 10 be fixed to tft_{\mathrm{f}}. This assumption is merely for notational simplicity since the final time tft_{\mathrm{f}} can be altered by shortening the time over which the system is defined.

Under these settings, Problems 3 and 4 can be rewritten as follows.

Problem 5
minimizep\displaystyle\operatorname*{minimize}_{p} logdetWLTV(p;Δt)\displaystyle\quad-\log\det W_{\mathrm{LTV}}(p;\Delta t)
subjectto\displaystyle\mathrm{subject\ to} pΔ,WLTV(p;Δt)O.\displaystyle\quad p\in\Delta,\ W_{\mathrm{LTV}}(p;\Delta t)\succ O.
Problem 6
minimizep\displaystyle\operatorname*{minimize}_{p} tr(WLTV(p;Δt)1)\displaystyle\quad\mathrm{tr}\left(W_{\mathrm{LTV}}(p;\Delta t)^{-1}\right)
subjectto\displaystyle\mathrm{subject\ to} pΔ,WLTV(p;Δt)O.\displaystyle\quad p\in\Delta,\ W_{\mathrm{LTV}}(p;\Delta t)\succ O.

Note that Problems 5 and 6 are the same problems as Problems 3 and 4, differing only in notation.

For temporal networks, the following lemma is important.

Lemma 3

Let

Rk(Δt):-Rk(Δt1,,Δtm)\displaystyle R_{k}(\Delta t)\coloneq R_{k}(\Delta t_{1},\ldots,\Delta t_{m})
:-0tk[{e1Φτtk(Δt)e1}2{e1Φτtk(Δt)en}2{enΦτtk(Δt)e1}2{enΦτtk(Δt)en}2]dτ,\displaystyle\coloneq\int_{0}^{t_{k}}\begin{bmatrix}\left\{e_{1}^{\top}\Phi_{\tau}^{t_{k}}(\Delta t)e_{1}\right\}^{2}&\ldots&\left\{e_{1}^{\top}\Phi_{\tau}^{t_{k}}(\Delta t)e_{n}\right\}^{2}\\ \vdots&\ddots&\vdots\\ \left\{e_{n}^{\top}\Phi_{\tau}^{t_{k}}(\Delta t)e_{1}\right\}^{2}&\ldots&\left\{e_{n}^{\top}\Phi_{\tau}^{t_{k}}(\Delta t)e_{n}\right\}^{2}\end{bmatrix}\mathrm{d}\tau,

where tk:-=1kΔtt_{k}\coloneq\sum_{\ell=1}^{k}\Delta t_{\ell} for k=1,,mk=1,\ldots,m. Then, Rk(Δt)R_{k}(\Delta t) is real analytic with respect to Δtk0\Delta t_{k}\geq 0.

Proof

See Appendix B. \Box

Note that Rk(Δt)R_{k}(\Delta t) coincides with 11 when T=s=tkT=s=t_{k}. From Lemmas 1, 2, and 3, we can prove the following theorem.

Theorem 4

Let us assume that the system 2 with 4. Then, both the optimal solutions to Problems 5 and 6 are unique for almost all Δt=(Δt1,,Δtm)>0m\Delta t=(\Delta t_{1},\ldots,\Delta t_{m})^{\top}\in\mathbb{R}^{m}_{>0}.

Proof

We will prove that for almost all Δt>0m\Delta t\in\mathbb{R}^{m}_{>0}, the matrix Rm(Δt)R_{m}(\Delta t) is regular. Then, the proof is completed from Lemma 2.

Suppose that Rm(Δt)R_{m}(\Delta t) is not regular, then at least one of the following holds:

  • detR1(Δt)=0\det R_{1}(\Delta t)=0.

  • detRk1(Δt)0\det R_{k-1}(\Delta t)\neq 0 and detRk(Δt)=0\det R_{k}(\Delta t)=0 for some k(k=2,,m)k\ (k=2,\ldots,m).

First, let us consider the first case. We can obtain

R1(Δt1,,Δtm)\displaystyle R_{1}(\Delta t_{1},\ldots,\Delta t_{m})
:-0Δt1[(e1eA1τe1)2(e1eA1τen)2{eneA1τe1)2(eneA1τen)2]dτ,\displaystyle\coloneq\int_{0}^{\Delta t_{1}}\begin{bmatrix}\left(e_{1}^{\top}\mathrm{e}^{A_{1}\tau}e_{1}\right)^{2}&\ldots&\left(e_{1}^{\top}\mathrm{e}^{A_{1}\tau}e_{n}\right)^{2}\\ \vdots&\ddots&\vdots\\ \left\{e_{n}^{\top}\mathrm{e}^{A_{1}\tau}e_{1}\right)^{2}&\ldots&\left(e_{n}^{\top}\mathrm{e}^{A_{1}\tau}e_{n}\right)^{2}\end{bmatrix}\mathrm{d}\tau,

and this coincides with the case of LTI systems. As shown in [16], for almost all Δt1>0\Delta t_{1}>0, detR1(Δt1,,Δtm)0\det R_{1}(\Delta t_{1},\ldots,\Delta t_{m})\neq 0 holds. Thus, the set of Δt=(Δt1,,Δtm)\Delta t=(\Delta t_{1},\ldots,\Delta t_{m})^{\top} with which the first case occurs has Lebesgue measure zero in >0m\mathbb{R}^{m}_{>0}.

Next, let us consider the second case. From the definition, detRk1(Δt1,,Δtm)\det R_{k-1}(\Delta t_{1},\ldots,\Delta t_{m}) does not depend on Δtk,,Δtm\Delta t_{k},\ldots,\Delta t_{m}, and

detRk(Δt1,,Δtm)|Δtk=0=detRk1(Δt1,,Δtm)\left.\det R_{k}(\Delta t_{1},\ldots,\Delta t_{m})\right|_{\Delta t_{k}=0}=\det R_{k-1}(\Delta t_{1},\ldots,\Delta t_{m})

holds. Thus, when detRk1(Δt1,,Δtm)0\det R_{k-1}(\Delta t_{1},\ldots,\Delta t_{m})\neq 0 holds, detRk(Δt1,,Δtm)0\det R_{k}(\Delta t_{1},\ldots,\Delta t_{m})\neq 0 also holds for almost all Δtk>0\Delta t_{k}>0 from Lemmas 1 and 3. This implies the set of Δt=(Δt1,,Δtm)\Delta t=(\Delta t_{1},\ldots,\Delta t_{m})^{\top} with which the second case occurs has Lebesgue measure zero in >0m\mathbb{R}^{m}_{>0}.

Therefore, detRm(Δt)0\det R_{m}(\Delta t)\neq 0 holds for almost all Δt>0m\Delta t\in\mathbb{R}^{m}_{>0}, and this completes the proof. \Box

The scope of Theorem 4 is narrower than that of Theorem 3, but it does not require Assumption 2 and guarantees uniqueness of the controllability score for almost all time parameters.

IV Algorithm and data-driven computation

In this section, we discuss an algorithm to compute the controllability scores. The algorithm consists of two primary parts. The controllability Gramians are computed in the first step, and then the optimization algorithm is performed. The optimization algorithm is identical to the one used in [12] and summarized in Section IV-A. The computation of the controllability Gramians requires knowledge of the system. In Section IV-B, we elaborate on the computation in the case where the system is already identified. However, system identification is challenging, especially for LTV systems; thus, the assumption that the system is already identified is not necessarily practical. Therefore, we propose a data-driven method to compute the controllability Gramians in Section IV-C.

Suppose that the final time TT is already chosen and fixed throughout this section, and let us abbreviate WLTV(p;T)W_{\mathrm{LTV}}(p;T) as WLTV(p)W_{\mathrm{LTV}}(p). Thanks to Theorem 3, assuming that controllability scores are uniquely determined does not cause a problem in most practical cases.

IV-A Algorithm for controllability scores

0:  The terminal condition ε>0\varepsilon>0 and the initial point p(0):-(1/n,,1/n)p^{(0)}\coloneq(1/n,\ldots,1/n)^{\top}.
1:  Compute Wi(i=1,,n)W_{i}\ (i=1,\ldots,n) in 13.
2:  for k=0,1,k=0,1,\ldots do
3:     Determine a step size α(k)\alpha^{(k)} by Algorithm 2.
4:     p(k+1)ΠΔ(p(k)α(k)f(p(k)))p^{(k+1)}\leftarrow\Pi_{\Delta}\left(p^{(k)}-\alpha^{(k)}\nabla f(p^{(k)})\right)
5:     if p(k)p(k+1)ε\left\|{p^{(k)}-p^{(k+1)}}\right\|\leq\varepsilon then
6:        return  p(k+1)p^{(k+1)}
7:     end if
8:  end for
Algorithm 1 The projected gradient method for Problems 3 and 4
0:  The point p(k)p^{(k)} in Algorithm 1, the parameters σ,ρ(0,1)\sigma,\rho\in(0,1), and the initial step size α>0\alpha>0.
1:  α(k)α\alpha^{(k)}\leftarrow\alpha
2:  while true do
3:     p~(k)ΠΔ(p(k)α(k)f(p(k)))\widetilde{p}^{(k)}\leftarrow\Pi_{\Delta}\left(p^{(k)}-\alpha^{(k)}\nabla f(p^{(k)})\right)
4:     if f(p~(k))f(p(k))+σf(p(k))(p~(k)p(k))f(\widetilde{p}^{(k)})\leq f(p^{(k)})+\sigma\nabla f(p^{(k)})^{\top}(\widetilde{p}^{(k)}-p^{(k)}) then
5:        break
6:     else
7:        α(k)ρα(k)\alpha^{(k)}\leftarrow\rho\alpha^{(k)}
8:     end if
9:  end while
10:  return  α(k)\alpha^{(k)}
Algorithm 2 The Armijo rule

To calculate controllability scores, the optimal solutions to Problems 3 and 4, we can employ the projected gradient method (Algorithm 1), which is the same algorithm as the case of LTI systems [12]. Here, ff is the objective function, ΠΔ\Pi_{\Delta} is a Euclidian projection onto Δ\Delta, and WiW_{i} is defined as

Wi:-0TΦτTeiei(ΦτT)dτ(i=1,,n).W_{i}\coloneq\int_{0}^{T}\Phi_{\tau}^{T}e_{i}e_{i}^{\top}\left(\Phi_{\tau}^{T}\right)^{\top}\mathrm{d}\tau\quad(i=1,\ldots,n). (13)

In the first step of Algorithm 1, we precompute controllability Gramians Wi(i=1,,n)W_{i}\ (i=1,\ldots,n). The knowledge of the system is utilized exclusively in the precomputation and is not required elsewhere. We summarize the computation in the case where the system matrix A(t)A(t) in 2 is known in Section IV-B and propose a data-driven method in Section IV-C.

By employing Wi(i=1,,n)W_{i}\ (i=1,\ldots,n), we can calculate the controllability Gramian as

WLTV(p)=i=1npiWi,W_{\mathrm{LTV}}(p)=\sum_{i=1}^{n}p_{i}W_{i},

and the objective functions to Problems 3 and 4 can be computed:

g(p):-logdetWLTV(p),\displaystyle g(p)\coloneq-\log\det W_{\mathrm{LTV}}(p),
h(p):-tr(WLTV(p)1).\displaystyle h(p)\coloneq\mathrm{tr}\left(W_{\mathrm{LTV}}(p)^{-1}\right).

Furthermore, their gradients can also be computed as

(g(p))i=tr(WLTV(p)1Wi),\displaystyle(\nabla g(p))_{i}=-\mathrm{tr}\left(W_{\mathrm{LTV}}(p)^{-1}W_{i}\right),
(h(p))i=tr(WLTV(p)1WiWLTV(p)1),\displaystyle(\nabla h(p))_{i}=-\mathrm{tr}\left(W_{\mathrm{LTV}}(p)^{-1}W_{i}W_{\mathrm{LTV}}(p)^{-1}\right),

respectively. Thus, after calculating WiW_{i}, the time complexity at each iteration of Algorithm 1 is O(n3)O(n^{3}).

The feasible region for Problems 3 and 4 is expressed as

:-{pn|pΔ,WLTV(p)O}.\mathcal{F}\coloneq\left\{p\in\mathbb{R}^{n}\;\middle|\;p\in\Delta,\ W_{\mathrm{LTV}}(p)\succ O\right\}.

By setting the initial point p(0)=(1/n,,1/n)p^{(0)}=(1/n,\ldots,1/n)^{\top}, we can guarantee that the initial point p(0)p^{(0)}\in\mathcal{F}. The important points are that ΠΔ\Pi_{\Delta} is employed in Algorithm 1 instead of the projection onto \mathcal{F}, and that ΠΔ\Pi_{\Delta} can be efficiently computed [23]. Thus, we can perform the projected gradient method efficiently. Furthermore, since the objective function is convex, as stated in Theorem 2, the convergence to the global optimal solution is guaranteed [12, 24]. For more details about the algorithm, see [12].

IV-B Model-based computation of controllability Gramians

In this subsection, we elaborate on the model-based computation of the controllability Gramians Wi(i=1,,n)W_{i}\ (i=1,\ldots,n) in two cases. The first case is where the system matrix A(t)A(t) is general, and the second case is where the system is a temporal network. We assume that the system matrix A(t)A(t) in 2 is already known in this subsection.

Since the matrix ΦτT\Phi_{\tau}^{T} is the inverse of ΦTτ\Phi_{T}^{\tau}, by 3, it is the solution to

τΦτT=ΦτTA(τ),ΦTT=I.\dfrac{\partial}{\partial\tau}\Phi_{\tau}^{T}=-\Phi_{\tau}^{T}A(\tau),\quad\Phi_{T}^{T}=I.

Thus, for general systems, we can naively calculate WiW_{i} as

Wi=0Tyi(τ)yi(τ)dτ,W_{i}=\int_{0}^{T}y_{i}(\tau)y_{i}(\tau)^{\top}\mathrm{d}\tau, (14a)
where Y(t)=[y1(t),,yn(t)]n×nY(t)=[y_{1}(t),\ldots,y_{n}(t)]\in\mathbb{R}^{n\times n} is the solution to
ddtY(t)=Y(t)A(t),Y(T)=I.\dfrac{\mathrm{d}}{\mathrm{d}t}Y(t)=-Y(t)A(t),\quad Y(T)=I. (14b)

In numerical calculation, the differential equation and the integration are discretized with some time step size Δτ\Delta\tau, and the time complexity is O(n3T/Δτ)O(n^{3}T/\Delta\tau).

Alternatively, for temporal networks 2 with 4, we can also use the Lyapunov equations. Here, we make the following assumption.

Assumption 3

The matrices AkA_{k} and Ak-A_{k} do not have a common eigenvalue for k=1,,mk=1,\ldots,m.

Then, we can use the following representation [25]:

Wi=k=1mEkWi(k)Ek,\displaystyle W_{i}=\sum_{k=1}^{m}E_{k}W_{i}^{(k)}E_{k}^{\top}, (15a)
Ek=eAmΔtmeAm1Δtm1eAk+1Δtk+1,\displaystyle E_{k}=\mathrm{e}^{A_{m}\Delta t_{m}}\mathrm{e}^{A_{m-1}\Delta t_{m-1}}\ldots\mathrm{e}^{A_{k+1}\Delta t_{k+1}}, (15b)
AkWi(k)+Wi(k)Ak=eiei+eAkΔtkeieieAkΔtk.\displaystyle A_{k}W_{i}^{(k)}+W_{i}^{(k)}A_{k}^{\top}=-e_{i}e_{i}^{\top}+\mathrm{e}^{A_{k}\Delta t_{k}}e_{i}e_{i}^{\top}\mathrm{e}^{A_{k}^{\top}\Delta t_{k}}. (15c)

It follows from Assumption 3 that 15c has a unique solution [26, Theorem 2.4.4.1]. More specifically, the calculation is performed by Algorithm 3. We can use the Bartels–Stewart algorithm [27] or the CF–ADI algorithm [28] to solve 15c in 7. The choice of method should be determined by considering the time complexity and accuracy.

0:  The adjacency matrices A1,,AmA_{1},\ldots,A_{m} and the durations Δt1,,Δtm\Delta t_{1},\ldots,\Delta t_{m}
1:  for i=1,,ni=1,\ldots,n do
2:     WiOn×nW_{i}\leftarrow O\in\mathbb{R}^{n\times n}
3:  end for
4:  EIn×nE\leftarrow I\in\mathbb{R}^{n\times n}
5:  for k=m,,1k=m,\ldots,1 do
6:     for i=1,,ni=1,\ldots,n do
7:        Compute Wi(k)W_{i}^{(k)} by solving 15c.
8:        WiWi+EWi(k)EW_{i}\leftarrow W_{i}+EW_{i}^{(k)}E^{\top}
9:     end for
10:     EEeAkΔtkE\leftarrow E\mathrm{e}^{A_{k}\Delta t_{k}}
11:  end for
11:  Wi(i=1,,n)W_{i}\ (i=1,\ldots,n)
Algorithm 3 Model-based computation of WiW_{i} for temporal networks 2 with 4

The Bartels–Stewart algorithm is a direct method that can be performed with the time complexity O(n3)O(n^{3}). Therefore, the overall time complexity of Algorithm 3 is O(n4m)O(n^{4}m) when the Bartels–Stewart algorithm is used in 7.

The CF–ADI algorithm is an iterative method whose output is a low-rank approximation. In the case of 15c, Wi(k)W_{i}^{(k)} can be represented as Wi(k)=Wi,1(k)Wi,2(k)W_{i}^{(k)}=W_{i,1}^{(k)}-W_{i,2}^{(k)} where

AkWi,1(k)+Wi,1(k)Ak=eiei,\displaystyle A_{k}W_{i,1}^{(k)}+W_{i,1}^{(k)}A_{k}^{\top}=-e_{i}e_{i}^{\top}, (16a)
AkWi,2(k)+Wi,2(k)Ak=eAkΔtkeieieAkΔtk.\displaystyle A_{k}W_{i,2}^{(k)}+W_{i,2}^{(k)}A_{k}^{\top}=-\mathrm{e}^{A_{k}\Delta t_{k}}e_{i}e_{i}^{\top}\mathrm{e}^{A_{k}^{\top}\Delta t_{k}}. (16b)

By applying the CF–ADI algorithm to 16a and 16b, we can obtain approximations Zi,1(k)n×r1Z_{i,1}^{(k)}\in\mathbb{R}^{n\times r_{1}} and Zi,2(k)n×r2Z_{i,2}^{(k)}\in\mathbb{R}^{n\times r_{2}} where Zi,1(k)(Zi,1(k))Zi,2(k)(Zi,2(k))Wi(k)Z_{i,1}^{(k)}(Z_{i,1}^{(k)})^{\top}-Z_{i,2}^{(k)}(Z_{i,2}^{(k)})^{\top}\approx W_{i}^{(k)} and r1,r2nr_{1},r_{2}\ll n. The accuracy depends on the matrix AkA_{k} and the iteration number.

When the CF–ADI algorithm is used in Algorithm 3, the time complexity excluding 7 is O(n3rm)O(n^{3}rm), where rr is the maximum rank of the approximations. Here, note that the matrix multiplication in 8 can be performed in O(n2r)O(n^{2}r) thanks to the low-rank structure. It is difficult to evaluate the time complexity of the CF–ADI algorithm since the total number of iterations depends on the tolerance of the approximation and the matrix AkA_{k}.

Remark 3

Although Wi(k)=Wi,1(k)Wi,2(k)W_{i}^{(k)}=W_{i,1}^{(k)}-W_{i,2}^{(k)} is positive semidefinite if the computation is exact, the approximation Zi,1(k)(Zi,1(k))Zi,2(k)(Zi,2(k))(Wi(k))Z_{i,1}^{(k)}(Z_{i,1}^{(k)})^{\top}-Z_{i,2}^{(k)}(Z_{i,2}^{(k)})^{\top}(\approx W_{i}^{(k)}) is not necessarily positive semidefinite. If WiW_{i} is not positive semidefinite, Algorithm 1 might be unstable. Therefore, the tolerance of the CF–ADI algorithm must be small.

IV-C Data-driven computation of controllability Gramians

In this subsection, we propose a data-driven method to compute the controllability Gramians Wi(i=1,,n)W_{i}\ (i=1,\ldots,n). We make the following assumption.

Assumption 4

The data of state trajectories x(k)(t),t[0,T](k=1,,N)x^{(k)}(t),\ t\in[0,T]\ (k=1,\ldots,N) are given, and their initial values x(1)(0),,x(N)(0)x^{(1)}(0),\ldots,x^{(N)}(0) span n\mathbb{R}^{n}.

Under Assumption 4, x(k)(t)(k=1,,n)x^{(k)}(t)\ (k=1,\ldots,n) also span n\mathbb{R}^{n} for all t[0,T]t\in[0,T]. Thus, for i=1,,ni=1,\ldots,n, there exists αi(t)N\alpha_{i}(t)\in\mathbb{R}^{N} which satisfies

X(t)αi(t)=ei,X(t)\alpha_{i}(t)=e_{i}, (17)

where X(t)[x(1)(t),,x(N)(t)]n×NX(t)\coloneqq[x^{(1)}(t),\ldots,x^{(N)}(t)]\in\mathbb{R}^{n\times N}. We can represent WiW_{i} as

Wi\displaystyle W_{i} =0TΦτTeiei(ΦτT)dτ\displaystyle=\int_{0}^{T}\Phi_{\tau}^{T}e_{i}e_{i}^{\top}\left(\Phi_{\tau}^{T}\right)^{\top}\mathrm{d}\tau
=0TΦτTX(τ)αi(τ)αi(τ)X(τ)(ΦτT)dτ\displaystyle=\int_{0}^{T}\Phi_{\tau}^{T}X(\tau)\alpha_{i}(\tau)\alpha_{i}(\tau)^{\top}X(\tau)^{\top}\left(\Phi_{\tau}^{T}\right)^{\top}\mathrm{d}\tau
=0TX(T)αi(τ)αi(τ)X(T)dτ.\displaystyle=\int_{0}^{T}X(T)\alpha_{i}(\tau)\alpha_{i}(\tau)^{\top}X(T)^{\top}\mathrm{d}\tau.

Thus, we can approximate WiW_{i} as

Wi=0T/ΔτX(T)αi(Δτ)αi(Δτ)X(T)Δτ,W_{i}\approx\sum_{\ell=0}^{T/\Delta\tau}X(T)\alpha_{i}(\ell\Delta\tau)\alpha_{i}(\ell\Delta\tau)^{\top}X(T)^{\top}\Delta\tau, (18)

where Δτ\Delta\tau is the discretization width, and we do not require knowledge of A(t)A(t) itself. Although there may exist multiple solutions to 17, we can use any of them. The simplest choice is the least-norm solution, and we use it in Section V-B.

0:  The NN observed data X(t)n×NX(t)\in\mathbb{R}^{n\times N} and the discretization width Δτ\Delta\tau.
1:  for i=1,,ni=1,\ldots,n do
2:     WiOn×nW_{i}\leftarrow O\in\mathbb{R}^{n\times n}
3:  end for
4:  for =0,1,,T/Δτ\ell=0,1,\ldots,T/\Delta\tau do
5:     Perform a singular value decomposition for X(Δτ)X(\ell\Delta\tau).
6:     for i=1,,ni=1,\ldots,n do
7:        Compute the least-norm solution αi(Δτ)\alpha_{i}(\ell\Delta\tau) to 17 with t=Δτt=\ell\Delta\tau.
8:        WiWi+X(T)αi(Δτ)αi(Δτ)X(T)ΔτW_{i}\leftarrow W_{i}+X(T)\alpha_{i}(\ell\Delta\tau)\alpha_{i}(\ell\Delta\tau)^{\top}X(T)^{\top}\Delta\tau
9:     end for
10:  end for
10:  Wi(i=1,,n)W_{i}\ (i=1,\ldots,n)
Algorithm 4 Data-driven approximation of WiW_{i} for general systems 2

More specifically, the approximation 18 is performed by Algorithm 4. In 5, we perform a singular value decomposition for X(Δτ)n×NX(\ell\Delta\tau)\in\mathbb{R}^{n\times N} in O(n2N)O(n^{2}N). The important point for our task is that 17 for each ii shares the same coefficient matrix X(t)X(t). Thus, once the decomposition is performed, we can compute the least-norm solution αi(Δτ)\alpha_{i}(\ell\Delta\tau) in 7 in O(nN)O(nN). 8 can be computed in O(nN)O(nN). Therefore, the time complexity of the overall procedure is O(n2NT/Δτ)O(n^{2}NT/\Delta\tau).

TABLE I: Methods to compute the controllability Gramians.
Model-based Data-driven
Algorithm Algorithm 3 Algorithm 3 14 Algorithm 4
Bartels–Stewart CF–ADI
Target Temporal networks 2 with 4 General systems 2
Constraint Assumption 3 Assumption 3 Assumption 4
Remark 3
Complexity O(n4m)O(n^{4}m) O(n3rm)O(n^{3}rm)a O(n3T/Δτ)O(n^{3}T/\Delta\tau) O(n2NT/Δτ)O(n^{2}NT/\Delta\tau)
  • a

    The time complexity excludes 7.

The methods to compute the controllability Gramians and their properties are summarized in Table I. The three methods on the left are model-based ones discussed in Section IV-B, while the rightmost method is the data-driven one proposed in this section. The two methods on the left are applicable only to temporal networks 2 with 4, while the two methods on the right are applicable to general systems 2. The methods for temporal networks require Assumption 3. Furthermore, the tolerance of the CF–ADI algorithm must be small, as detailed in Remark 3. The proposed data-driven method requires Assumption 4, which guarantees that the observed data span the entire space.

Which method is superior in terms of time complexity depends on the number of snapshots mm, the maximum rank of the approximations rr, the final time TT, and the discretization width Δτ\Delta\tau. In each model-based method, the controllability Gramians Wi(i=1,,n)W_{i}\ (i=1,\ldots,n) can be computed independently, allowing for parallel processing. In Algorithm 4, they cannot be computed independently in the same way due to 5. However, since sequential computation with respect to time parameter \ell is not necessary, we can perform parallel processing by offsetting \ell. Therefore, when the number of processing units is less than or equal to nn, the scalability is linear in both the model-based and data-driven methods.

V Numerical experiments

In this section, we compare controllability scores between LTI and LTV systems. Moreover, we assess the performance of the data-driven method proposed in Section IV-C.

Throughout this section, we use a simple example of a temporal network, as depicted in Fig. 1, and the aggregated network, as depicted in Fig. 1. The temporal network has four snapshots, and each duration time is 22. All the weights of the edges drawn in Fig. 1 are 11. Although each node if all the snapshots has a negative self-loop with a weight of 0.20.2, we here omit to draw them for simplicity. The aggregated network is defined on 0t80\leq t\leq 8 as the mean of the four snapshots; thus, all the weights of the edges drawn in Fig. 1 are 0.50.5, and each node has a negative self-loop with a weight of 0.20.2. Here, the final time is set to T=8T=8. Throughout all numerical experiments, we used the terminal condition parameter ε=107\varepsilon=10^{-7} in Algorithm 1.

12345678910
(a) 0t<20\leq t<2
12345678910
(b) 2t<42\leq t<4
12345678910
(c) 4t<64\leq t<6
12345678910
(d) 6t86\leq t\leq 8
Figure 1: The structure of the temporal network
12345678910
Figure 2: The structure of the aggregated network

V-A Comparison of the controllability scores between LTI systems and LTV systems

TABLE II: The controllability scores of Figs. 1 and 2.
Node VCS AECS
Fig. 1 Fig. 2 Fig. 1 Fig. 2
1 0.059 0.077 0.154 0.168
2 0.142 0.165 0.105 0.115
3 0.150 0.163 0.154 0.177
4 0.107 0.117 0.136 0.117
5 0.000 0.000 0.000 0.000
6 0.000 0.000 0.000 0.000
7 0.341 0.249 0.232 0.165
8 0.000 0.000 0.000 0.000
9 0.167 0.192 0.115 0.120
10 0.034 0.036 0.105 0.139

Table II shows the controllability scores of Figs. 1 and 2. The remarkable point is that node 7 is the most important node in the AECS of Fig. 1, although it is not in the AECS of Fig. 2. In other words, increasing the temporal resolution and considering the chronological order might change the most important node in the AECS. Therefore, for networks with time-varying structures, approximating them using an LTI system on the aggregated network is insufficient for understanding their dynamics. Instead, modeling them as an LTV system on a temporal network is considered to allow for a more precise understanding.

Similar to the results in [12], the VCS tends to assign higher scores to upstream nodes than the AECS in the case of both Figs. 1 and 2. Thus, we can use the AECS to assess the importance of each node by not only the network structure since since upstream nodes in hierarchical networks are obviously important, as explained in [12].

V-B Performance of data-driven method

In this subsection, we examined the accuracy of the proposed data-driven method. Since it is natural in real applications to assume that the observed data is generated by a temporal network rather than the aggregated network, we used only the temporal network in Fig. 1 in the experiment. The number of the nodes is n=10n=10, as depicted in Fig. 1, and the number of the observed data is here set to N=15N=15. We generated the observed data x(k)(t)x^{(k)}(t) as follows:

Step 1.

The initial state x(k)(0)x^{(k)}(0) is randomly generated by the uniform distribution over the unit sphere, i.e., x(k)(0)=1\left\|{x^{(k)}(0)}\right\|=1.

Step 2.

The state trajectory x(k)(t)x^{(k)}(t) is obtained accurately.

Step 3.

The state trajectory x(k)(Δτ)(=1,,T/Δτ)x^{(k)}(\ell\Delta\tau)\ (\ell=1,\ldots,T/\Delta\tau) is observed with the sampling period Δτ=103\Delta\tau=10^{-3}.

By Step 1., Assumption 4 is satisfied with probability 11. By using the observed data, we computed controllability scores.

TABLE III: The error of the proposed data-driven method.
VCS Error AECS Error Gramian Error
mean 3.590×1063.590\times 10^{-6} 5.051×1065.051\times 10^{-6} 8.082×1058.082\times 10^{-5}
sd. 2.930×10142.930\times 10^{-14} 2.618×10142.618\times 10^{-14} 1.082×10131.082\times 10^{-13}

We conducted the experiment 100 times. Table III shows the result. Here, the error of controllability scores is defined as the maximum error, and the error of controllability Gramian is defined as the maximum relative error. The errors are sufficiently small regardless of the initial states. Therefore, we conclude that the proposed data-driven method can compute controllability scores accurately.

VI Concluding remarks

We have extended the controllability score to apply to LTV systems, which include dynamical systems on temporal networks. We have also proved the uniqueness of the controllability score in two settings. The first assumes Assumptions 1 and 2, and the second assumes that the system is a temporal network. From the two results, we consider that the controllability score is unique in most practical cases. Furthermore, we have proposed a data-driven method to compute controllability scores for practical use and compared it with model-based methods.

Numerical experiments show that the controllability scores of LTI and LTV systems are different. Therefore, the extension is essentially important in analyzing network systems that are more naturally modeled by LTV systems rather than LTI systems. Furthermore, numerical experiments also show that the proposed data-driven method can compute controllability scores accurately. Hence, the proposed method allows us to assess network centrality using experimental data rather than knowledge of the system matrix.

Appendix A Proof of Lemma 2

To prove Lemma 2, we employ the following lemma, which can be proven in the same manner as [12].

Lemma 4

Let TT be fixed to satisfy 0<Ttf0<T\leq t_{\mathrm{f}}. If

WLTV(x;T)=Ox=0W_{\mathrm{LTV}}(x;T)=O\Longrightarrow x=0 (19)

holds, then both the optimal solutions to Problems 3 and 4 are unique.

Proof

See [12, Lemma 2 and Theorems 1 and 3].

Proof (Lemma 2)

Suppose that R(T;s)R(T;s) is regular. From Lemma 2, it suffices to prove that 19 holds. If WLTV(x;T)=OW_{\mathrm{LTV}}(x;T)=O holds, then

W(x;T)\displaystyle W^{\prime}(x;T)
:-i=1nxi0TΦτtfeiei(Φτtf)dτ\displaystyle\coloneq\sum_{i=1}^{n}x_{i}\int_{0}^{T}\Phi_{\tau}^{t_{\mathrm{f}}}e_{i}e_{i}^{\top}\left(\Phi_{\tau}^{t_{\mathrm{f}}}\right)^{\top}\mathrm{d}\tau
=0TΦτtf{diag(x1,,xn)}(Φτtf)dτ\displaystyle=\int_{0}^{T}\Phi_{\tau}^{t_{\mathrm{f}}}\left\{\mathrm{diag}(x_{1},\ldots,x_{n})\right\}\left(\Phi_{\tau}^{t_{\mathrm{f}}}\right)^{\top}\mathrm{d}\tau
=ΦTtf[0TΦτT{diag(x1,,xn)}(ΦτT)dτ](ΦTtf)\displaystyle=\Phi_{T}^{t_{\mathrm{f}}}\left[\int_{0}^{T}\Phi_{\tau}^{T}\left\{\mathrm{diag}(x_{1},\ldots,x_{n})\right\}\left(\Phi_{\tau}^{T}\right)^{\top}\mathrm{d}\tau\right]\left(\Phi_{T}^{t_{\mathrm{f}}}\right)^{\top}
=ΦTtfWLTV(x;T)(ΦTtf)=O\displaystyle=\Phi_{T}^{t_{\mathrm{f}}}W_{\mathrm{LTV}}(x;T)\left(\Phi_{T}^{t_{\mathrm{f}}}\right)^{\top}=O

also holds. Thus, by letting vj,s:-(Φstf)ejv_{j,s}\coloneq\left(\Phi_{s}^{t_{\mathrm{f}}}\right)^{-\top}e_{j},

0\displaystyle 0 =vj,sW(x;T)vj,s\displaystyle=v_{j,s}^{\top}W^{\prime}(x;T)v_{j,s}
=i=1nxivj,s{0TΦτtfeiei(Φτtf)dτ}vj,s\displaystyle=\sum_{i=1}^{n}x_{i}v_{j,s}^{\top}\left\{\int_{0}^{T}\Phi_{\tau}^{t_{\mathrm{f}}}e_{i}e_{i}^{\top}\left(\Phi_{\tau}^{t_{\mathrm{f}}}\right)^{\top}\mathrm{d}\tau\right\}v_{j,s}
=i=1nxiej{0TΦτseiei(Φτs)dτ}ej\displaystyle=\sum_{i=1}^{n}x_{i}e_{j}^{\top}\left\{\int_{0}^{T}\Phi_{\tau}^{s}e_{i}e_{i}^{\top}\left(\Phi_{\tau}^{s}\right)^{\top}\mathrm{d}\tau\right\}e_{j}
=i=1nxi0T(ejΦτsei)2dτ,\displaystyle=\sum_{i=1}^{n}x_{i}\int_{0}^{T}(e_{j}^{\top}\Phi_{\tau}^{s}e_{i})^{2}\mathrm{d}\tau,

yielding

R(T;s)x=0.R(T;s)x=0. (20)

Since R(T;s)R(T;s) is assumed to be regular, 20 yields x=0x=0. This means that 19 follows the regularity of R(T;s)R(T;s). Therefore, both the optimal solutions to Problems 3 and 4 with the final time TT are unique. \Box

Appendix B Proof of Lemma 3

Proof

Let rij(Δt;t,τ):-eiΦτt(Δt)ejr_{ij}(\Delta t;t,\tau)\coloneq e_{i}^{\top}\Phi_{\tau}^{t}(\Delta t)e_{j}. Then, the (i,j)(i,j)th element of Rk(Δt)R_{k}(\Delta t) is given by

(Rk(Δt))ij=0tk{rij(Δt;tk,τ)}2dτ.(R_{k}(\Delta t))_{ij}=\int_{0}^{t_{k}}\left\{r_{ij}(\Delta t;t_{k},\tau)\right\}^{2}\mathrm{d}\tau. (21)

Since Φτtk(Δt)=Φtk1tk(Δt)Φτtk1(Δt)\Phi_{\tau}^{t_{k}}(\Delta t)=\Phi_{t_{k-1}}^{t_{k}}(\Delta t)\Phi_{\tau}^{t_{k-1}}(\Delta t) holds, we can obtain

rij(Δt;tk,τ)==1nri(Δt;tk,tk1)rj(Δt;tk1,τ).r_{ij}(\Delta t;t_{k},\tau)=\sum_{\ell=1}^{n}r_{i\ell}(\Delta t;t_{k},t_{k-1})r_{\ell j}(\Delta t;t_{k-1},\tau). (22)

Let Δt1,,Δtk1,Δtk+1,,Δtm\Delta t_{1},\ldots,\Delta t_{k-1},\Delta t_{k+1},\ldots,\Delta t_{m} be fixed to investigate the dependency on Δtk\Delta t_{k}. Then, ri(Δt;tk,tk1)r_{i\ell}(\Delta t;t_{k},t_{k-1}) does not depend on τ\tau and is real analytic with respect to Δtk0\Delta t_{k}\geq 0 since (5) yields Φtk1tk(Δt)=eAkΔtk\Phi_{t_{k-1}}^{t_{k}}(\Delta t)=\mathrm{e}^{A_{k}\Delta t_{k}}. As long as τ[0,tk]\tau\in[0,t_{k}], rj(Δt;tk1,τ)r_{\ell j}(\Delta t;t_{k-1},\tau) does not depend explicitly on Δtk\Delta t_{k} and is real analytic with τ[tk1,tk]\tau\in[t_{k-1},t_{k}] since Φτtk1(Δt)=eAk(τtk1)\Phi_{\tau}^{t_{k-1}}(\Delta t)=\mathrm{e}^{-A_{k}(\tau-t_{k-1})} for τ[tk1,tk]\tau\in[t_{k-1},t_{k}].

Thus, by combining 21 and 22, we can represent (Rk(Δt))ij(R_{k}(\Delta t))_{ij} as

(Rk(Δt))ij=0tki=1Ifi(Δtk)gi(τ)dτ,(R_{k}(\Delta t))_{ij}=\int_{0}^{t_{k}}\sum_{i=1}^{I}f_{i}(\Delta t_{k})g_{i}(\tau)\mathrm{d}\tau,

where fi(Δtk)f_{i}(\Delta t_{k}) is real analytic on Δtk\Delta t_{k}, gig_{i} is real analytic on τ[tk1,tk]\tau\in[t_{k-1},t_{k}], and II is the number of terms. Furthermore,

0tkfi(Δtk)gi(τ)dτ\displaystyle\int_{0}^{t_{k}}f_{i}(\Delta t_{k})g_{i}(\tau)\mathrm{d}\tau
=(0tk1gi(τ)dτ+tk1tk1+Δtkgi(τ)dτ)fi(Δtk)\displaystyle=\left(\int_{0}^{t_{k-1}}g_{i}(\tau)\mathrm{d}\tau+\int_{t_{k-1}}^{t_{k-1}+\Delta t_{k}}g_{i}(\tau)\mathrm{d}\tau\right)f_{i}(\Delta t_{k})

holds. The first term 0tk1gi(τ)dτ\int_{0}^{t_{k-1}}g_{i}(\tau)\mathrm{d}\tau is constant with respect to Δtk\Delta t_{k}, and the second term tk1tk1+Δtkgi(τ)dτ\int_{t_{k-1}}^{t_{k-1}+\Delta t_{k}}g_{i}(\tau)\mathrm{d}\tau is real analytic with respect to Δtk0\Delta t_{k}\geq 0 since gi(τ)g_{i}(\tau) is real analytic on τ[tk1,tk1+Δtk]\tau\in[t_{k-1},t_{k-1}+\Delta t_{k}]. Therefore, (Rk(Δt))ij(R_{k}(\Delta t))_{ij} is real analytic with respect to Δtk0\Delta t_{k}\geq 0 and this completes the proof. \Box

Acknowledgment

This work was supported by the Japan Society for the Promotion of Science KAKENHI under Grant 23K03899.

References

  • [1] A. Fuchs and M. Morari, “Placement of HVDC links for power grid stabilization during transients,” in IEEE Grenoble Conference, 2013, pp. 1–6. [Online]. Available: https://doi.org/10.1109/PTC.2013.6652508
  • [2] K. Fitch and N. E. Leonard, “Optimal leader selection for controllability and robustness in multi-agent networks,” in European Control Conference, 2016, pp. 1550–1555. [Online]. Available: https://doi.org/10.1109/ECC.2016.7810511
  • [3] S. Gu, F. Pasqualetti, M. Cieslak, Q. K. Telesford, A. B. Yu, A. E. Kahn, J. D. Medaglia, J. M. Vettel, M. B. Miller, S. T. Grafton, and D. S. Bassett, “Controllability of structural brain networks,” Nat. Commun., vol. 6, no. 1, 2015. [Online]. Available: https://doi.org/10.1038/ncomms9414
  • [4] H. Zhang, X. Liu, Q. Wang, W. Zhang, and J. Gao, “Co-adaptation enhances the resilience of mutualistic networks,” J. R. Soc. Interface, vol. 17, no. 168, 2020. [Online]. Available: https://doi.org/10.1098/rsif.2020.0236
  • [5] H. Chen and E. H. Yong, “Energy cost study for controlling complex social networks with conformity behavior,” Phys. Rev. E, vol. 104, no. 1, 2021. [Online]. Available: https://link.aps.org/doi/10.1103/PhysRevE.104.014301
  • [6] R. M. D’Souza, M. di Bernardo, and Y.-Y. Liu, “Controlling complex networks with complex nodes,” Nat. Rev. Phys., vol. 5, no. 4, pp. 250–262, 2023. [Online]. Available: https://doi.org/10.1038/s42254-023-00566-3
  • [7] Y.-Y. Liu, J.-J. Slotine, and A.-L. Barabási, “Controllability of complex networks,” Nature, vol. 473, pp. 167–173, 2011. [Online]. Available: https://doi.org/10.1038/nature10011
  • [8] C. T. Lin, “Structural controllability,” IEEE Trans. Automatic Control, vol. AC-19, pp. 201–208, 1974. [Online]. Available: https://doi.org/10.1109/tac.1974.1100557
  • [9] G. Yan, G. Tsekenis, B. Barzel, J.-J. Slotine, Y.-Y. Liu, and A.-L. Barabási, “Spectrum of controlling and observing complex networks,” Nat. Phys., vol. 11, pp. 779–786, 2015. [Online]. Available: https://doi.org/10.1038/nphys3422
  • [10] F. Pasqualetti, S. Zampieri, and F. Bullo, “Controllability metrics, limitations and algorithms for complex networks,” IEEE Trans. Control Netw. Syst., vol. 1, no. 1, pp. 40–52, 2014. [Online]. Available: https://doi.org/10.1109/TCNS.2014.2310254
  • [11] T. H. Summers, F. L. Cortesi, and J. Lygeros, “On submodularity and controllability in complex dynamical networks,” IEEE Trans. Control Netw. Syst., vol. 3, no. 1, pp. 91–101, 2016. [Online]. Available: https://doi.org/10.1109/TCNS.2015.2453711
  • [12] K. Sato and S. Terasaki, “Controllability scores for selecting control nodes of large-scale network systems,” IEEE Trans. Automat. Control, vol. 69, no. 7, pp. 4673–4680, 2024. [Online]. Available: https://doi.org/10.1109/tac.2024.3355806
  • [13] P. Holme and J. Saramäki, “Temporal networks,” Phys. Rep., vol. 519, no. 3, pp. 97–125, 2012. [Online]. Available: https://doi.org/10.1109/tac.1974.1100557
  • [14] A. Li, S. P. Cornelius, Y.-Y. Liu, L. Wang, and A.-L. Barabási, “The fundamental advantages of temporal networks,” Science, vol. 358, no. 6366, pp. 1042–1046, 2017. [Online]. Available: https://doi.org/10.1126/science.aai7488
  • [15] M. V. Srighakollapu, R. K. Kalaimani, and R. Pasumarthy, “Optimizing driver nodes for structural controllability of temporal networks,” IEEE Trans. Control Netw. Syst., vol. 9, no. 1, pp. 380–389, 2022. [Online]. Available: https://doi.org/10.1109/tcns.2021.3106454
  • [16] K. Sato and R. Kawamura, “Uniqueness analysis of controllability scores and their application to brain networks,” 2024. [Online]. Available: https://doi.org/10.48550/arXiv.2408.03023
  • [17] I. Banno, S. Azuma, R. Ariizumi, T. Asai, and J. Imura, “Data-driven estimation and maximization of controllability Gramians,” in 60th IEEE Conference on Decision and Control, 2021, pp. 5053–5058. [Online]. Available: https://doi.org/10.1109/CDC45484.2021.9683701
  • [18] K. Tsuji, S. Azuma, I. Banno, R. Ariizumi, T. Asai, and J. Imura, “A small-data solution to data-driven Lyapunov equations: data reduction from O(n2)O(n^{2}) to O(n)O(n),” IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences, vol. E107-A, no. 5, pp. 806–812, 2024. [Online]. Available: https://doi.org/10.1587/transfun.2023MAP0010
  • [19] Z. Wang, R. M. Jungers, M. Petreczky, B. Chen, and L. Yu, “Learning stability of partially observed switched linear systems,” Automatica, vol. 164, 2024. [Online]. Available: https://doi.org/10.1016/j.automatica.2024.111643
  • [20] R. E. Kalman, Y. C. Ho, and K. S. Narendra, “Controllability of linear dynamical systems,” Contrib. Differential Equations, vol. 1, pp. 189–213, 1963.
  • [21] B. Mityagin, “The zero set of a real analytic function,” 2015. [Online]. Available: https://doi.org/10.48550/arXiv.1512.07276
  • [22] M. W. Hirsch, S. Smale, and R. L. Devaney, Differential Equations, Dynamical Systems, and an Introduction to Chaos, 3rd ed.   Academic Press, 2012.
  • [23] L. Condat, “Fast projection onto the simplex and the l1l_{1} ball,” Math. Program., vol. 158, no. 1-2, pp. 575–585, 2016. [Online]. Available: https://doi.org/10.1007/s10107-015-0946-6
  • [24] A. N. Iusem, “On the convergence properties of the projected gradient method for convex optimization,” Comput. Appl. Math., vol. 22, no. 1, pp. 37–52, 2003. [Online]. Available: https://doi.org/10.1590/S0101-82052003000100003
  • [25] B. Hou, “Time parameters shape the controllability of temporally switching networks,” IEEE Trans. Automat. Control, vol. 68, no. 4, pp. 2064–2078, 2023. [Online]. Available: https://doi.org/10.1109/TAC.2022.3170079
  • [26] R. A. Horn and C. R. Johnson, Matrix Analysis, 2nd ed.   Cambridge University Press, 2012.
  • [27] R. H. Bartels and G. W. Stewart, “Solution of the matrix equation ax + xb = c,” Commun. ACM, vol. 15, no. 9, pp. 820–826, 1972. [Online]. Available: https://doi.org/10.1145/361573.361582
  • [28] J.-R. Li and J. White, “Low rank solution of Lyapunov equations,” SIAM J. Matrix Anal. Appl., vol. 24, no. 1, pp. 260–280, 2002. [Online]. Available: https://doi.org/10.1137/S0895479801384937