This paper was converted on www.awesomepapers.org from LaTeX by an anonymous user.
Want to know more? Visit the Converter page.

Invariant and Dual Invariant Subspaces of k-valued Networks

Daizhan Cheng [email protected]    Hongsheng Qi [email protected]    Xiao Zhang [email protected]    Zhengping Ji [email protected] Key Laboratory of Systems and Control, Academy of Mathematics and Systems Science, Chinese Academy of Sciences Research Center of Semi-tensor Product of Matrices: Theory and Applications, Liaocheng 252026, P.R. China National Center for Mathematics and Interdisciplinary Sciences, Academy of Mathematics and Systems Science, Chinese Academy of Sciences
Abstract

Consider a kk-valued network. Two kinds of (control) invariant subspaces, called state and dual invariant subspaces, are proposed, which are subspaces of state space and dual space respectively. Algorithms are presented to verify whether a dual subspace is a dual or dual control invariant subspace. The bearing space of kk-valued (control) networks is introduced. Using the structure of bearing space, the universal invariant subspace is introduced, which is independent of the dynamics of particular networks. Finally, the relationship between state invariant subspace and dual invariant subspace of a network is investigated. A duality property shows that if a dual subspace is invariant then its perpendicular state subspace is also invariant and vice versa.

keywords:
kk-valued (control) network; state (or dual) invariant subspace; bearing space; finite ring; finite lattice.
thanks: This work is supported partly by the National Natural Science Foundation of China (NSFC) under Grants 62073315 and 61733018, and the China Postdoctoral Science Foundation 2021M703423 and 2022T150686.

, , ,

1 Introduction

Since the state-space approach proposed by Kalman in 1960 [26], the (control) invariant subspace became one of the most important concepts in modern control theory. Consider a linear control system

x˙=Ax+Bu,xn,um.\displaystyle\dot{x}=Ax+Bu,\quad x\in\mathbb{R}^{n},u\in\mathbb{R}^{m}. (1)

A subspace VnV\subset\mathbb{R}^{n} is called an (A,B)(A,B)- invariant (or control-invariant) subspace, if AVV+AV\subset V+{\mathcal{B}}, where {\mathcal{B}} is a subspace spanned by Col(B)\operatorname{Col}(B)[42]. It is clear that this concept is a generalization of AA invariant subspace from linear algebra when there is no control. That is, a subspace VV is AA-invariant if AVVAV\subset V.

This concept has then been extended to non-linear control systems. Consider an affine non-linear control system

x˙=f(x)+i=1mgi(x)ui,xM,um,\displaystyle\dot{x}=f(x)+\mathop{\sum}\limits_{i=1}^{m}g_{i}(x)u_{i},\quad x\in M,u\in\mathbb{R}^{m}, (2)

where MM is an nn-dimensional manifold. Then a distribution 𝒟{\mathcal{D}} is called an (f,g)(f,g)-invariant distribution, if Lf𝒟𝒟+𝒢L_{f}{\mathcal{D}}\subset{\mathcal{D}}+{\mathcal{G}}, where Lf𝒟={Lf(X)|X𝒟}L_{f}{\mathcal{D}}=\{L_{f}(X)\;|\;X\in{\mathcal{D}}\} is the set of Lie derivatives of XX with respect to ff, 𝒢{\mathcal{G}} is the distribution generated by {gi|i=1,,m}\{g_{i}\;|\;i=1,\cdots,m\} [23]. It is also clear that without control, 𝒟{\mathcal{D}} becomes ff-invariant.

It is well known that VV is the control-invariant subspace of (1), if and only if, there exists a state-feedback control U=FxU=Fx, such that VV is A+BFA+BF invariant [42]. Similar result is also true for (2) [23]. Roughly speaking, a control-invariant subspace is an invariant subspace for a controlled (or closed-loop) system. Hence, the invariant subspace and control-invariant subspace are essentially the same and can be discussed simultaneously.

In general, the invariant subspace plays a fundamental role in system analysis and control design. In most cases, an invariant subspace is established to represent specific properties of a dynamic system. Hence, it is used for solving various control problems, such as decomposition and disturbance decoupling problems; stability and stabilization problems; output tracking problems, etc.

The Boolean network (BN) was firstly proposed by Kauffman to formulate and analyze the genetic regulation networks [27]. Many biological systems have exogenous inputs. To deal with them or to manipulate BNs, the Boolean control networks (BCNs) have then been investigated [22, 13]. In the light of the semi-tensor product (STP) of matrices, the BNs and BCNs have been formulated into the framework of the linear and bi-linear state space model, called the algebraic state space representation (ASSR) [6, 8]. The last decade or more has witnessed unprecedented progress in the investigation of BNs and BCNs, stimulated by STP.

When the state space approach was introduced to formulate BNs and BCNs, the (control) invariant subspace becomes a useful tool for analyzing the structure and properties of BNs and the control design of BCNs. Under the regularity assumption, the invariant subspace has been introduced to BNs to solve the disturbance decoupling problem [7]. Then a new concept about invariant subspace, which removed the assumption of regularity has been proposed and used to solve decomposition problem [46] and disturbance decoupling problem [45]. State feedback invariant subspace has also been proposed and used for designing controls for BCNs [18, 33].

A recent work [11] investigates the realization of BNs using their invariant subspace. It reveals that for a BN with nn nodes, since the state variables Xi(t)𝒟:={0,1}X_{i}(t)\in{\mathcal{D}}:=\{0,1\}, i[1,n]i\in[1,n], the state space should be 𝒳=𝒟n{\mathcal{X}}={\mathcal{D}}^{n}. The set of logical functions, denoted by 𝒳:=(X1,X2,,Xn){\mathcal{X}}^{*}:={\mathcal{F}}_{\ell}(X_{1},X_{2},\cdots,X_{n}), is then called the dual space of 𝒳{\mathcal{X}}. It follows that |𝒳|=22n|{\mathcal{X}}^{*}|=2^{2^{n}}, hence the dual space is much larger than the original state space.

Based on this observation, it is easy to find that all the (control) invariant subspaces considered in the literature (precisely speaking, in previously mentioned papers) are subspaces of dual spaces. Hereafter, they should be correctly called the dual (control) invariant subspaces.

A Boolean network approach is the approximation of the active levels of nodes (cells) by quantizing them to {0,1}\{0,1\}. To improve the accuracy of approximation, kk-valued network is a natural solution [1, 2, 25]. Using the STP, the ASSR approach for BNs can easily be extended to multi-valued networks [28].

The multi-valued network approach is not only useful for biological networks but also very useful for other finite-valued problems such as finite games [17, 9]. To see more applications of the multi-valued ASSR approach to finite (networked) games, you are referred to the survey paper [10]. In fact, the multi-valued ASSR approach can be used for many other finite-value-based problems, such as intelligent problems [43], circuit design [4], etc. Hence, it is worth paying more attention to kk-valued networks.

When a dynamic system is considered, the state variables take values from a preassigned set. We call it the bearing space. For instance, when linear control system (1) or nonlinear control system (2) are considered, the bearing space is \mathbb{R}. When a BN is considered, the bearing space is the Boolean set 𝒟:={0,1}{\mathcal{D}}:=\{0,1\}.

The structures and properties of the bearing space do affect the properties of a dynamic system over the space. For BNs, Boolean algebra has been developed to describe the bearing space of BNs [39]. Similarly, a kk-valued algebra, proposed firstly by Post and then named by Post algebra, has been developed to describe the bearing space of kk-valued networks [36, 14, 37, 38, 41].

Post lattice (or Post algebra) is not the only structure for bearing space of kk-valued networks. Recently, when the multi-valued networks are deeply investigated, people started to pay more attention to the structure of bearing spaces of the networks, and various bearing spaces are proposed. For instance, the networks over finite fields have been studied by several authors [40, 35, 29, 30, 31, 34]. It follows that the networks over finite rings and networks over finite lattices have also been investigated [11, 24].

Exploring some bearing spaces of kk-valued networks, we found some state invariant subspaces appear naturally and these state invariant subspaces play a fundamental role in both structure analysis and control design for kk-valued networks. This is the motivation for us to investigate both dual and state (control) invariant subspaces of kk-valued (control) networks.

The main work and contribution of this paper consist of the following:

  • (i)

    Though the concept of (control) invariant subspaces has been used for a considerable long time, they have been classified clearly into two kinds of invariant subspaces for the first time, which clarified some confusing points in the past use.

  • (ii)

    An algorithm is presented to verify whether a dual subspace of a kk-valued network is a dual control-invariant subspace. If the answer is “yes”, the algorithm can also produce the state-feedback controls to make the subspace a dual invariant subspace for the closed-loop network. The algorithm can also be used for BCNs. To our best knowledge, there was no known algorithm for BCNs.

  • (iii)

    By investigating bearing space and its bearing subspace, the concept of universal state invariant subspace is proposed. Correspondingly, a universal cascading normal form is obtained. Here “universal” means that the invariant subspace and the normal form are independent of the dynamics of individual networks, while they depend on the structure of bearing spaces only.

  • (iv)

    The duality relationship of state subspaces with their perpendicular dual subspaces is revealed, which shows that if a state subspace is invariant then its perpendicular dual subspace is also invariant, and vice versa. This relationship leads to the discovery of universal dual invariant subspaces.

The rest of this paper is outlined as follows: Section 2 investigates dual (control) invariant subspace. Necessary and sufficient conditions are obtained for dual control invariant subspaces. Two algorithms are proposed to numerically verify whether a subspace is a dual (or a dual control) invariant subspace. As a special kind of dual (control) subspaces, the node invariant subspaces are also studied. Section 3 considers the state invariant subspaces, including the attractor-based state invariant subspaces and the bearing space-based invariant subspaces. The universal state invariant subspace is investigated in Section 4. Using universal state invariant subspace the universal cascading normal form is obtained. Section 5 reveals the duality of state invariant subspace with dual invariant subspace. Using duality, the universal dual invariant subspace is also discovered. Section 6 is a brief summary. Finally, an appendix is attached, which consists of two parts: Part 1 is a quick survey on the STP of matrices and the ASSR of networks. Part 2 is a brief introduction to some bearing spaces, including field, ring, and lattice.

Before ending this section, we give a list of notations:

  1. 1.

    m×n{\mathcal{M}}_{m\times n}: the set of m×nm\times n real matrices.

  2. 2.

    Col(M)\operatorname{Col}(M) (Row(M)\operatorname{Row}(M)): the set of columns (rows) of MM. Coli(M)\operatorname{Col}_{i}(M) (Rowi(M)\operatorname{Row}_{i}(M)): the ii-th column (row) of MM.

  3. 3.

    𝒟k:={1,2,,k},k2{\mathcal{D}}_{k}:=\left\{1,2,\cdots,k\right\},\quad k\geq 2.

  4. 4.

    δni\delta_{n}^{i}: the ii-th column of the identity matrix InI_{n}.

  5. 5.

    Δn:={δni|i=1,,n}\Delta_{n}:=\left\{\delta_{n}^{i}|i=1,\cdots,n\right\}.

  6. 6.

    𝟏=(1,1,,1)T{\bf 1}_{\ell}=(\underbrace{1,1,\cdots,1}_{\ell})^{\mathrm{T}}.

  7. 7.

    𝟎p×q{\bf 0}_{p\times q}: a p×qp\times q matrix with zero entries.

  8. 8.

    A matrix Lm×nL\in{\mathcal{M}}_{m\times n} is called a logical matrix if the columns of LL are of the form of δmk\delta_{m}^{k}. That is, Col(L)Δm\operatorname{Col}(L)\subset\Delta_{m}. Denote by m×n{\mathcal{L}}_{m\times n} the set of m×nm\times n logical matrices.

  9. 9.

    L=[δni1,δni2,,δnir]n×rL=[\delta_{n}^{i_{1}},\delta_{n}^{i_{2}},\cdots,\delta_{n}^{i_{r}}]\in{\mathcal{L}}_{n\times r} is briefly denoted as L=δn[i1,i2,,ir]L=\delta_{n}[i_{1},i_{2},\cdots,i_{r}].

  10. 10.

    \ltimes: the semi-tensor product of matrices.

  11. 11.

    *: Khatri-Rao product of matrices.

  12. 12.

    PRk:=diag(δk1,δk2,,δkk){PR}_{k}:=diag(\delta_{k}^{1},\delta_{k}^{2},\cdots,\delta_{k}^{k}) is called the kk-th power-reducing matrix.

  13. 13.

    W[m,n]:=[Inδm1,Inδm2,,Inδmm]W_{[m,n]}:=[I_{n}\otimes\delta_{m}^{1},I_{n}\otimes\delta_{m}^{2},\cdots,I_{n}\otimes\delta_{m}^{m}] is called the (m,n)(m,n)-th swap matrix.

  14. 14.

    ,,¬\wedge,\vee,\neg: The conjunction, disjunction, negation operators.

2 Two Kinds of Invariant Subspaces

2.1 Invariant Dual Subspace

Consider a kk-valued network

{X1(t+1)=f1(X1(t),,Xn(t)),X2(t+1)=f2(X1(t),,Xn(t)),Xn(t+1)=fn(X1(t),,Xn(t)),\displaystyle\begin{cases}X_{1}(t+1)=f_{1}(X_{1}(t),\cdots,X_{n}(t)),\\ X_{2}(t+1)=f_{2}(X_{1}(t),\cdots,X_{n}(t)),\\ \vdots\\ X_{n}(t+1)=f_{n}(X_{1}(t),\cdots,X_{n}(t)),\\ \end{cases} (3)

where Xi𝒟kX_{i}\in{\mathcal{D}}_{k}, fi:𝒟kn𝒟kf_{i}:{\mathcal{D}}_{k}^{n}\rightarrow{\mathcal{D}}_{k} are kk-valued logical functions, i[1,n]i\in[1,n].
Its control version is

{X1(t+1)=f1(X1(t),,Xn(t),U1(t),,Um(t)),X2(t+1)=f2(X1(t),,Xn(t),U1(t),,Um(t)),Xn(t+1)=fn(X1(t),,Xn(t),U1(t),,Um(t)),\displaystyle\begin{cases}X_{1}(t+1)=f_{1}(X_{1}(t),\cdots,X_{n}(t),U_{1}(t),\cdots,U_{m}(t)),\\ X_{2}(t+1)=f_{2}(X_{1}(t),\cdots,X_{n}(t),U_{1}(t),\cdots,U_{m}(t)),\\ \vdots\\ X_{n}(t+1)=f_{n}(X_{1}(t),\cdots,X_{n}(t),U_{1}(t),\cdots,U_{m}(t)),\\ \end{cases} (4)

where Uj𝒟k,j=1,2,,mU_{j}\in{\mathcal{D}}_{k},~{}j=1,2,\cdots,m are controls.

Assume Xi=j[1,k]X_{i}=j\in[1,k], its vector form expression is denoted by

xi=Xi:=δkj.x_{i}=\vec{X}_{i}:=\delta_{k}^{j}.

Using vector form expression, kk-valued network (3) can be expressed by its component-wise ASSR as

xi(t+1)=Mix(t),i[1,n],\displaystyle x_{i}(t+1)=M_{i}x(t),\quad i\in[1,n], (5)

where x(t)=j=1nxj(t)x(t)=\ltimes_{j=1}^{n}x_{j}(t), Mik×knM_{i}\in{\mathcal{L}}_{k\times k^{n}} is the structure matrix of fif_{i}. Moreover, the overall ASSR of (3) is

x(t+1)=Mx(t),\displaystyle x(t+1)=Mx(t), (6)

where M=M1M2Mnkn×knM=M_{1}*M_{2}*\cdots*M_{n}\in{\mathcal{L}}_{k^{n}\times k^{n}}.

Similarly, the kk-valued control network (4) can be expressed by its component-wise ASSR as

xi(t+1)=Liu(t)x(t),i[1,n],\displaystyle x_{i}(t+1)=L_{i}u(t)x(t),\quad i\in[1,n], (7)

where u(t)=j=1muj(t)u(t)=\ltimes_{j=1}^{m}u_{j}(t), Lik×kn+mL_{i}\in{\mathcal{L}}_{k\times k^{n+m}} is the structure matrix of fif_{i}. Moreover, the overall ASSR of (4) is

x(t+1)=Lu(t)x(t),\displaystyle x(t+1)=Lu(t)x(t), (8)

where L=L1L2Lnkn×kn+mL=L_{1}*L_{2}*\cdots*L_{n}\in{\mathcal{L}}_{k^{n}\times k^{n+m}}.

The invariant subspace of network (3) or control networks (4) is generated by some kk-valued logical functions. In a recent work [11], the concept of invariant subspace for Boolean (control) networks has been clearly stated and certain fundamental properties have also been provided. This concept and properties can be easily extended to kk-valued networks. So we just state them in the kk-valued version.

Denote by 𝒳={X1,X2,,Xn}{\mathcal{X}}=\{X_{1},X_{2},\cdots,X_{n}\} the state space of the networks; (X1,X2,,Xn){\mathcal{F}}_{\ell}(X_{1},X_{2},\cdots,X_{n}) the set of kk-valued logical functions with arguments X1,X2,,XnX_{1},X_{2},\cdots,X_{n}; 𝒳:=(X1,X2,,Xn){\mathcal{X}}^{*}:={\mathcal{F}}_{\ell}(X_{1},X_{2},\cdots,X_{n}) the dual space of 𝒳{\mathcal{X}}. Then we have the following definition.

Definition \thethm.

Consider the kk-valued network (3). Let {Z1,Z2,,Zr}𝒳\{Z_{1},Z_{2},\cdots,Z_{r}\}\subset{\mathcal{X}}^{*} be a set of logical functions. Define 𝒵:=(Z1,Z2,,Zr){\mathcal{Z}}:={\mathcal{F}}_{\ell}(Z_{1},Z_{2},\cdots,Z_{r}) the subspace generated by {Z1,Z2,,Zr}\{Z_{1},Z_{2},\cdots,Z_{r}\}. 𝒵{\mathcal{Z}} is said to be an invariant (dual) subspace of (3) if Z(0)=(Z1(0),Z2(0),,Zr(0))𝒵Z(0)=(Z_{1}(0),Z_{2}(0),\cdots,Z_{r}(0))\in{\mathcal{Z}} implies Z(t)𝒵,t+Z(t)\in{\mathcal{Z}},~{}\forall t\in\mathbb{Z}_{+}.

Let Zi=gi(X1,X2,,Xn)Z_{i}=g_{i}(X_{1},X_{2},\cdots,X_{n}) with zi=Ziz_{i}=\vec{Z}_{i} and the structure matrix of gig_{i} be Gik×knG_{i}\in{\mathcal{L}}_{k\times k^{n}}. Then

z:=i=1rzi=Gx,\displaystyle z:=\ltimes_{i=1}^{r}z_{i}=Gx, (9)

where G=G1G2Grkr×knG=G_{1}*G_{2}*\cdots*G_{r}\in{\mathcal{L}}_{k^{r}\times k^{n}}.

Now we have the following conclusion, which is an immediate extension of the corresponding result in [11]:

Proposition \thethm.

[11] 𝒵{\mathcal{Z}} is an invariant dual subspace of (3), if and only if, there exists a logical matrix Hkr×krH\in{\mathcal{L}}_{k^{r}\times k^{r}} such that

GM=HG.\displaystyle GM=HG. (10)

Moreover, let z(t)=Gx(t)z(t)=Gx(t). Then the dynamics of z(t)z(t) is determined by

z(t+1)=Hz(t).\displaystyle z(t+1)=Hz(t). (11)

𝒵{\mathcal{Z}} is also called the MM-invariant dual subspace.

Definition \thethm.

Consider the kk-valued control network (4). Let {Z1,Z2,,Zr}𝒳\{Z_{1},Z_{2},\cdots,Z_{r}\}\subset{\mathcal{X}}^{*} be a set of logical functions. Define 𝒵:=(Z1,Z2,,Zr){\mathcal{Z}}:={\mathcal{F}}_{\ell}(Z_{1},Z_{2},\cdots,Z_{r}) the subspace generated by {Z1,Z2,,Zr}\{Z_{1},Z_{2},\cdots,Z_{r}\}. 𝒵{\mathcal{Z}} is said to be control-invariant dual subspace of (4) if for any X(0)=(X1(0),X2(0),,Xn(0))𝒵X(0)=(X_{1}(0),X_{2}(0),\cdots,X_{n}(0))\in{\mathcal{Z}} there exists a control sequence {U(t)|t0}\{U(t)\;|\;t\geq 0\} such that 𝒵{\mathcal{Z}} is invariant to the controlled network. In other words, the controlled network satisfies X(t)𝒵X(t)\in{\mathcal{Z}}.

Splitting LL into kmk^{m} equal blocks as

L=[M1,M2,,Mkm],L=[M_{1},M_{2},\cdots,M_{k^{m}}],

where Mi=Lδkmikn×kn,i[1,km].M_{i}=L\delta_{k^{m}}^{i}\in{\mathcal{L}}_{k^{n}\times k^{n}},~{}i\in[1,k^{m}].

For a fixed Hkr×krH\in{\mathcal{L}}_{k^{r}\times k^{r}}, we define a set of index sets as follows:

Jj:={i|Colj(GMi)=Colj(HG)},j[1,kn].\displaystyle J_{j}:=\left\{i\;|\;\operatorname{Col}_{j}(GM_{i})=\operatorname{Col}_{j}(HG)\right\},\quad j\in[1,k^{n}]. (12)
Theorem 1.

Consider the kk-valued control network (4). 𝒵:=(Z1,Z2,,Zr){\mathcal{Z}}:={\mathcal{F}}_{\ell}(Z_{1},Z_{2},\cdots,Z_{r}) is a dual control-invariant subspace of (4), if and only if, one of the following two equivalent conditions is satisfied.

  • (i)

    There exists an Hkr×krH\in{\mathcal{L}}_{k^{r}\times k^{r}}, such that j[1,kn]\forall j\in[1,k^{n}],

    Jj.\displaystyle J_{j}\neq\emptyset. (13)
  • (ii)

    There exists a state feedback control

    u(t)=Fx(t),\displaystyle u(t)=Fx(t), (14)

    where Fkm×knF\in{\mathcal{L}}_{k^{m}\times k^{n}}, such that 𝒵{\mathcal{Z}} is MM-invariant, where M:=LFPRknM:=LF{PR}_{k^{n}}.

Proof: (Necessity) According to Proposition 2.1, at each time tt there must exist a u(t)u(t) and an Hkr×krH\in{\mathcal{L}}_{k^{r}\times k^{r}}, such that for the controlled system,

z(t+1)=Hz(t).\displaystyle z(t+1)=Hz(t). (15)

Assume u(t)=δkmiu(t)=\delta_{k^{m}}^{i}, then (15) leads to

GMix(t)=HGx(t).\displaystyle GM_{i}x(t)=HGx(t). (16)

Assume x(t)=δknjx(t)=\delta_{k^{n}}^{j}, then (16) implies iJji\in J_{j}, that is, JjJ_{j}\neq\emptyset.

Next, from (13) we know that for each x(t)=δknjx(t)=\delta_{k^{n}}^{j} we can find that u(t)=δkmiu(t)=\delta_{k^{m}}^{i}, where iJji\in J_{j} may not be unique, such that (15) holds. Then the state-feedback matrix FF exists.

(Sufficiency) Assume (13) holds. We can construct state feedback control as aforementioned. Using this state feedback control, (16) ensures x(t+1)𝒵x(t+1)\in{\mathcal{Z}} as long as x(t)𝒵x(t)\in{\mathcal{Z}}. \Box

Next, we look for numerical algorithms to verify whether a dual subspace is (control) invariant.

To begin with, observing condition (10), one can search HH as follows: Assume Colj(G)=δkrj\operatorname{Col}_{j}(G)=\delta_{k^{r}}^{\ell_{j}}, then Colj(HG)=Colj(H)\operatorname{Col}_{j}(HG)=\operatorname{Col}_{\ell_{j}}(H). Hence, to satisfy (10), it is enough to choose

Colj(H)=Colj(GM),j[1,kn].\displaystyle\operatorname{Col}_{\ell_{j}}(H)=\operatorname{Col}_{j}(GM),\quad j\in[1,k^{n}]. (17)

The following corollary is obvious:

Corollary 2.

Consider the kk-valued network (3). Define a set of index sets as

Si:={j|Colj(G)=δkri},i[1,kr].\displaystyle S_{i}:=\left\{j\;|\;\operatorname{Col}_{j}(G)=\delta_{k^{r}}^{i}\right\},\quad i\in[1,k^{r}]. (18)

Then 𝒵{\mathcal{Z}} is MM-invariant, if and only if,

Colj(GM)=const.,jSi.\displaystyle\operatorname{Col}_{j}(GM)=const.,\quad j\in S_{i}. (19)

Proof: Necessity comes from the fact that (18) forces (19) to be true. As for the sufficiency, as long as (19) holds, we can simply set

Coli(H):=Colj(GM),i[1,kr],\displaystyle\operatorname{Col}_{i}(H):=\operatorname{Col}_{j}(GM),\quad i\in[1,k^{r}], (20)

which verifies (10). \Box

Remark 3.

It Si=S_{i}=\emptyset, Eq. (19) is automatically true. Then the corresponding Coli(H)\operatorname{Col}_{i}(H) can be chosen arbitrarily.

The algorithm follows immediately.

Algorithm 1.

Let 𝒵{\mathcal{Z}} be a dual subspace of (3) and its structure matrix be GLkr×knG\in L_{k^{r}\times k^{n}}.

  • Step 1: Construct SiS_{i}, i[1,kr]i\in[1,k^{r}] by (18).

  • Step 2: Check if (19) holds.

    If the answer is “yes”, 𝒵{\mathcal{Z}} is MM-invariant. (HH can be constructed by (20).)

    Otherwise, 𝒵{\mathcal{Z}} is not MM-invariant.

Consider the control network (4).

Observing condition (13) one can search HH as follows: Assume Colj(G)=δkrj\operatorname{Col}_{j}(G)=\delta_{k^{r}}^{\ell_{j}}, then Colj(HG)=Colj(H)\operatorname{Col}_{j}(HG)=\operatorname{Col}_{\ell_{j}}(H). According to (16), there exists at least one ii such that (18) holds for M=MiM=M_{i}. It follows that

Colj(H)i=1kmColj(GMi),j[1,kn].\displaystyle\operatorname{Col}_{\ell_{j}}(H)\in\bigcup_{i=1}^{k^{m}}\operatorname{Col}_{j}(GM_{i}),\quad j\in[1,k^{n}]. (21)

Hence, we have the following conclusion.

Corollary 4.

Consider the control network (4). 𝒵{\mathcal{Z}} is control invariant, if and only if,

jSi(=1kmColj(GM)),i[1,kr].\displaystyle\bigcap_{j\in S_{i}}\left(\bigcup_{\ell=1}^{k^{m}}\operatorname{Col}_{j}(GM_{\ell})\right)\neq\emptyset,\quad i\in[1,k^{r}]. (22)

Then the corresponding algorithm can be obtained as follows:

Algorithm 2.

Let 𝒵{\mathcal{Z}} be a dual subspace of (4) and its structure matrix be GLkr×knG\in L_{k^{r}\times k^{n}}.

  • Step 1: Construct SiS_{i}, i[1,kr]i\in[1,k^{r}] by (18).

  • Step 2: Check if (22) holds.

    If the answer is “yes”, 𝒵{\mathcal{Z}} is the control invariant. Go to Step 3.

    Otherwise, 𝒵{\mathcal{Z}} is not control invariant. Stop.

  • Step 3: (Construct state feed control) For each i[1,kr]i\in[1,k^{r}], choose a (anyone)

    ξijSi(=1kmColj(GM))\xi_{i}\in\bigcap_{j\in S_{i}}\left(\bigcup_{\ell=1}^{k^{m}}\operatorname{Col}_{j}(GM_{\ell})\right)

    Then for each jj, there is (at least) a j[1,km]\ell_{j}\in[1,k^{m}], such that

    ξi=Colj(GMj).\xi_{i}=\operatorname{Col}_{j}(GM_{\ell_{j}}).

    Set

    u=δkmj,x=δknj,jSi.\displaystyle u=\delta_{k^{m}}^{\ell_{j}},\quad x=\delta_{k^{n}}^{j},\;j\in S_{i}. (23)

Note that Remark 3 remain true. That is, if Si=S_{i}=\emptyset, then ξi\xi_{i} can be arbitrary.

Remark 5.

Using (23), the state feedback matrix FF as in (14) is obtained. By construction, it is ready to verify that 𝒵{\mathcal{Z}} is M=LFPRknM=LF{PR}_{k^{n}} invariant. That is, control invariant.

Example 6.

Consider the 33-valued control network

{X1(t+1)=X2(t)U(t),X2(t+1)=X1(t)U(t).\displaystyle\begin{cases}X_{1}(t+1)=X_{2}(t)\vee U(t),\\ X_{2}(t+1)=X_{1}(t)\wedge U(t).\end{cases} (24)

Assume 𝒵={Z}{\mathcal{Z}}={\mathcal{F}}_{\ell}\{Z\}, where

z=Z=δ3[1,2,1,1,3,3,2,3,2]x:=Gx.z=\vec{Z}=\delta_{3}[1,2,1,1,3,3,2,3,2]x:=Gx.

Check whether 𝒵{\mathcal{Z}} is a control dual invariant subspace.

The structure matrices of \vee and \wedge are as follows:

Md:=M=δ3[1,1,1,1,2,2,1,2,3],Mc:=M=δ3[1,2,3,2,2,3,3,3,3].\begin{array}[]{l}M_{d}:=M_{\vee}=\delta_{3}[1,1,1,1,2,2,1,2,3],\\ M_{c}:=M_{\wedge}=\delta_{3}[1,2,3,2,2,3,3,3,3].\end{array}

Then the component-wise ASSR is

{x1(t+1)=Mdu(t)x2(t)=Md(I3𝟏3TI3)u(t)x(t):=L1u(t)x(t),x2(t+1)=Mcu(t)x1(t)=Mc(I9𝟏3T)u(t)x(t):=L2u(t)x(t),\displaystyle\left\{\begin{array}[]{ccl}x_{1}(t+1)&=&M_{d}u(t)x_{2}(t)\\ {}\hfil&=&M_{d}(I_{3}\otimes{\bf 1}_{3}^{\mathrm{T}}\otimes I_{3})u(t)x(t)\\ {}\hfil&:=&L_{1}u(t)x(t),\\ x_{2}(t+1)&=&M_{c}u(t)x_{1}(t)\\ {}\hfil&=&M_{c}(I_{9}\otimes{\bf 1}_{3}^{\mathrm{T}})u(t)x(t)\\ {}\hfil&:=&L_{2}u(t)x(t),\end{array}\right. (31)

where

L1=δ3[1,1,1,1,1,1,1,1,1,1,2,2,1,2,2,1,2,2,1,2,3,1,2,3,1,2,3].L2=δ3[1,1,1,2,2,2,3,3,3,2,2,2,2,2,2,3,3,3,3,3,3,3,3,3,3,3,3].\begin{array}[]{ccl}L_{1}&=&\delta_{3}[1,1,1,1,1,1,1,1,1,1,2,2,1,2,\\ {}\hfil&{}\hfil&~{}~{}~{}2,1,2,2,1,2,3,1,2,3,1,2,3].\\ L_{2}&=&\delta_{3}[1,1,1,2,2,2,3,3,3,2,2,2,2,2,\\ {}\hfil&{}\hfil&~{}~{}~{}2,3,3,3,3,3,3,3,3,3,3,3,3].\\ \end{array}

Then

L=L1L2=δ9[1,1,1,2,2,2,3,3,3,2,5,5,2,5,5,3,6,6,3,6,9,3,6,9,3,6,9].\begin{array}[]{ccl}L&=&L_{1}*L_{2}\\ {}\hfil&=&\delta_{9}[1,1,1,2,2,2,3,3,3,2,5,5,2,5,\\ {}\hfil&{}\hfil&~{}~{}~{}5,3,6,6,3,6,9,3,6,9,3,6,9].\\ \end{array}

Next, we calculate GMiGM_{i}, where Mi=Lδ3iM_{i}=L\delta_{3}^{i}, i=1,2,3i=1,2,3. Put them into Table 1.


Table 1: Searching Common Vectors in GMiGM_{i}
jj 11 22 33 44 55 66 77 88 99
Colj(GM1)\operatorname{Col}_{j}(GM_{1}) δ31\delta_{3}^{1} δ31¯\underline{\delta_{3}^{1}} δ31\delta_{3}^{1} δ32\delta_{3}^{2} δ32\delta_{3}^{2} δ32\delta_{3}^{2} δ31\delta_{3}^{1} δ31\delta_{3}^{1} δ31¯\underline{\delta_{3}^{1}}
Colj(GM2)\operatorname{Col}_{j}(GM_{2}) δ32¯\underline{\delta_{3}^{2}} δ33\delta_{3}^{3} δ33\delta_{3}^{3} δ32¯\underline{\delta_{3}^{2}} δ33\delta_{3}^{3} δ33¯\underline{\delta_{3}^{3}} δ31\delta_{3}^{1} δ33\delta_{3}^{3} δ33\delta_{3}^{3}
Colj(GM3)\operatorname{Col}_{j}(GM_{3}) δ31\delta_{3}^{1} δ33\delta_{3}^{3} δ32¯\underline{\delta_{3}^{2}} δ31\delta_{3}^{1} δ33¯\underline{\delta_{3}^{3}} δ32\delta_{3}^{2} δ31¯\underline{\delta_{3}^{1}} δ33¯\underline{\delta_{3}^{3}} δ32\delta_{3}^{2}

Now we search for possible H=[h1,h2,h3]H=[h_{1},h_{2},h_{3}]:

Since

G=δ3[1,2,1,1,3,3,2,3,2],G=\delta_{3}[1,2,1,1,3,3,2,3,2],

we have

S1={1,3,4},S2={2,7,9},S3={5,6,8}.\begin{array}[]{l}S_{1}=\{1,3,4\},\\ S_{2}=\{2,7,9\},\\ S_{3}=\{5,6,8\}.\end{array}

Consider S1S_{1}, we have

h1j=1,3,4{Colj(GM1)Colj(GM2)Colj(GM3)}.h_{1}\in\bigcap_{j=1,3,4}\{\operatorname{Col}_{j}(GM_{1})\bigcup\operatorname{Col}_{j}(GM_{2})\bigcup\operatorname{Col}_{j}(GM_{3})\}.

Then we can have h1{δ31,δ32}h_{1}\in\{\delta_{3}^{1},\delta_{3}^{2}\}. We choose, say, h1=δ32h_{1}=\delta_{3}^{2}. Correspondingly, for j=1j=1 we can choose M2M_{2}, for j=3j=3 we can choose M3M_{3}, for j=4j=4 we can choose either M1M_{1} or M2M_{2}, say, we choose M2M_{2}. Then we underline the corresponding MiM_{i} in Table 1.

Similarly, considering S2S_{2}, we have

h2j=2,7,9{Colj(GM1)Colj(GM2)Colj(GM3)}.h_{2}\in\bigcap_{j=2,7,9}\{\operatorname{Col}_{j}(GM_{1})\bigcup\operatorname{Col}_{j}(GM_{2})\bigcup\operatorname{Col}_{j}(GM_{3})\}.

Then we have h2=δ31h_{2}=\delta_{3}^{1}. Corresponding MiM_{i} are also underlined in the Table.

Finally, for S3S_{3} we have

h3j=5,6,8{Coli(GM1)Colj(GM2)Colj(GM3)}.h_{3}\in\bigcap_{j=5,6,8}\{\operatorname{Col}_{i}(GM_{1})\bigcup\operatorname{Col}_{j}(GM_{2})\bigcup\operatorname{Col}_{j}(GM_{3})\}.

Then we have h3=δ33h_{3}=\delta_{3}^{3}. Corresponding MiM_{i} are also underlined in the Table.

According to Theorem 1, we conclude that 𝒵{\mathcal{Z}} is a control-invariant dual subspace. Moreover, using (23), the state feedback can be constructed as

u(x)={δ31,x=δ92,δ99,δ32,x=δ91,δ94,δ96,δ33,x=δ93,δ95,δ97,δ98.u(x)=\begin{cases}\delta_{3}^{1},\quad x=\delta_{9}^{2},\delta_{9}^{9},\\ \delta_{3}^{2},\quad x=\delta_{9}^{1},\delta_{9}^{4},\delta_{9}^{6},\\ \delta_{3}^{3},\quad x=\delta_{9}^{3},\delta_{9}^{5},\delta_{9}^{7},\delta_{9}^{8}.\\ \end{cases}

Equivalently,

u(x)=Fx,u(x)=Fx,

where F=δ3[2,1,3,2,3,2,3,3,1].F=\delta_{3}[2,1,3,2,3,2,3,3,1].

A straightforward verification shows that

GLFPR9=HG,GLF{PR}_{9}=HG,

where H=δ3[2,1,3].H=\delta_{3}[2,1,3].

From the above process, one sees easily that the state feedback control is not unique.

2.2 Node Invariant Subspace

Definition 7.
  • (i)

    Assume the kk-valued network (3) can be expressed by

    {X1(t+1)=F1(X1(t)),X2(t+1)=F2(X1(t),X2(t)),\displaystyle\begin{cases}X^{1}(t+1)=F_{1}(X^{1}(t)),\\ X^{2}(t+1)=F_{2}(X^{1}(t),X^{2}(t)),\\ \end{cases} (32)

    where (X1,X2)(X^{1},X^{2}) is a partition of {X1,X2,,Xn}\{X_{1},X_{2},\cdots,X_{n}\}. Then X1X^{1} is called a node invariant subspace. ***The node-invariant subspace was called a regular invariant subspace in previous literature, e.g., [7].

  • (ii)

    Consider the kk-valued control network (4). Assume under a suitable (state feedback) control U(t)=GX(t)U(t)=GX(t), the closed-loop network of (4) can be expressed into the form of (32), then X1X^{1} is called a node control-invariant subspace.

Both node invariant subspace and node control-invariant subspace are particularly useful in decoupling problems and has been discussed in detail by [7] under the name of regular subspace.

To verify whether a subspace is a node invariant subspace the key issue is to know when a subspace is a node subspace. The following result is fundamental.

Proposition 8.

[7] Consider the kk-valued network (3) with its ASSR (6). Let ={h1,h2,,hs}𝒳{\mathcal{H}}^{*}=\{h_{1},h_{2},\cdots,h_{s}\}\subset{\mathcal{X}}^{*} be a dual subspace, and HH is the structure matrix of {\mathcal{H}}^{*}. {\mathcal{H}} is a node (or regular) subspace, if and only if,

|{j|Colj(H)=δksi}|=kns,i[1,ks].\displaystyle\left|\left\{j\;|\;\operatorname{Col}_{j}(H)=\delta_{k^{s}}^{i}\right\}\right|=k^{n-s},\quad\forall i\in[1,k^{s}]. (33)
Remark 9.
  • (i)

    Both node invariant subspace and node control-invariant subspace are special cases of dual invariant subspace and dual control-invariant subspace respectively. The only special point of node invariant subspaces lies in that the subspaces are generated by a set of coordinate functions.

  • (ii)

    To get the decomposed form (32) a coordinate change may be required.

  • (iii)

    Intuitively, a node invariant subspace {\mathcal{H}}^{*} is a set of nods, which form a subgraph in the network graph. Moreover, the in-degree of the subgraph is zero. (Refer to Fig. 1).

    \cdots\cdots{\mathcal{H}}^{*}
    Figure 1: Node Subspace {\mathcal{H}}^{*}
  • (iv)

    For a control network, to verify the node control-invariant subspace the method provided for the dual invariant subspace is also applicable. The only difference lies in verifying whether the subspace is a node (or regular) one.

3 State Invariant Subspace

Definition 10.
  • (i)

    Consider the kk-valued network (3). Assume V𝒟knV\subset{\mathcal{D}}_{k}^{n} is a subset of the state space 𝒳{\mathcal{X}}. Let X(0)={X1(0),X2(0),,Xn(0)}VX(0)=\{X_{1}(0),X_{2}(0),\cdots,X_{n}(0)\}\in V. If the trajectory X(t,X(0))VX(t,X(0))\in V, t0t\geq 0, then VV is called a state invariant subspace of (3).

  • (ii)

    Consider the kk-valued control network (4). Assume V𝒟knV\subset{\mathcal{D}}_{k}^{n} be a subset of the state space 𝒳{\mathcal{X}}. Let X(0)={X1(0),X2(0),,Xn(0)}VX(0)=\{X_{1}(0),X_{2}(0),\cdots,X_{n}(0)\}\in V. Assume there is a control sequence {U(t)|t0}\{U(t)\;|\;t\geq 0\} If the trajectory X(t,U(0),X(0))VX(t,U(0),X(0))\in V, t0t\geq 0, then VV is called a state control-invariant subspace of (4).

Proposition 11.

Let V𝒳V\subset{\mathcal{X}} with |V|=r|V|=r.

  • (i)

    VV is invariant with respect to network (3) (or MM-invariant), if and only if, there exists a logical matrix Er×rE\in{\mathcal{L}}_{r\times r} such that

    MV=VE.\displaystyle MV=VE. (34)
  • (ii)

    VV is control-invariant to the control network (4), if and only if, there exists a state feedback

    u(t)=Gx(t),\displaystyle u(t)=Gx(t), (35)

    where Gkm×knG\in{\mathcal{L}}_{k^{m}\times k^{n}}, such that VV is LGPRknLG{PR}_{k^{n}}-invariant.

Proof:

  • (i)

    The existence of a real matrix EE is well known in linear algebra. Since each column of MVMV is a logical vector, it must be a column of VV, which ensures EE to be a logical matrix.

  • (ii)

    The argument is similar to the proof of Theorem 1.

\Box

State invariant subspace is closely related to the topological structure of networks. The normal form of Boolean networks was firstly revealed by [15]. The following form comes from [15, 32], which is for Boolean networks. It is also true for kk-valued networks:

Proposition 12.

Consider the kk-valued network (3). Under a suitable coordinate frame z=Txz=Tx, its ASSR can be expressed as

z(t+1)=M~z(t),\displaystyle z(t+1)=\tilde{M}z(t), (36)

where

M~=diag(M~1,M~2,,M~k),\tilde{M}=diag\left(\tilde{M}_{1},\tilde{M}_{2},\cdots,\tilde{M}_{k}\right),

and each block can be expressed as

M~j=[CjDj0,Nj],j[1,k],\tilde{M}_{j}=\begin{bmatrix}C_{j}&D_{j}\\ 0,N_{j}\end{bmatrix},\quad j\in[1,k],

where CjC_{j} is a cyclic matrix, that is,

Cj=δnj[2,3,,n,1],C_{j}=\delta_{n_{j}}[2,3,\cdots,n,1],

corresponding to a cycle of length njn_{j}; NjN_{j} is a nilpotent matrix, that is, there exists an sj>0s_{j}>0 such that (Nj)sj=0(N_{j})^{s_{j}}=0, corresponding to the basin of attraction of CjC_{j}.

Since a coordinate transformation of networks is only a state rename, it does not change the topological structure (including attractors and their basins of attraction), the structure of normal form represents general forms. From the normal form, it is clear that a state invariant subspace of a network consists of several attractors with (might be a subset of) their basins of attraction. This is the only form of state invariant subspaces.

State (control) invariant subspaces have been applied to set reachability [47], set stability [19, gou19], output regulation [44], etc. under terminologies of “invariant set” and “control invariant set”. We omit further discussion here.

In the following, we consider a special kind of state invariant subspaces, which are caused by the structure of the bearing space. The first example considers a network over a finite ring [12].

Example 13.

Consider a 66-valued network as

{X1(t+1)=p1(X1(t),X2(t),,Xn(t)),X2(t+1)=p2(X1(t),X2(t),,Xn(t)),,Xn(t+1)=pn(X1(t),X2(t),,Xn(t)),\displaystyle\begin{cases}X_{1}(t+1)=p_{1}(X_{1}(t),X_{2}(t),\cdots,X_{n}(t)),\\ X_{2}(t+1)=p_{2}(X_{1}(t),X_{2}(t),\cdots,X_{n}(t)),\\ \cdots,\\ X_{n}(t+1)=p_{n}(X_{1}(t),X_{2}(t),\cdots,X_{n}(t)),\\ \end{cases} (37)

where Xi(t)6X_{i}(t)\in{\mathbb{Z}}_{6}, pip_{i} are polynomials, i[1,n]i\in[1,n].

Note that 6={0,1,2,3,4,5}.{\mathbb{Z}}_{6}=\{0,1,2,3,4,5\}. The addition \oplus and the product is \odot and defined as follows:

ab:=a+b(mod6),ab:=ab(mod6).\displaystyle\begin{array}[]{l}a\oplus b:=a+b(mod~{}6),\\ a\odot b:=ab(mod~{}6).\end{array}

Under these aba\oplus b and aba\odot b, 6{\mathbb{Z}}_{6} is a commutative ring with identity 11, and the functions over 6{\mathbb{Z}}_{6} can be expressed as polynomials. For system (37) the state space is

𝒳={X1,X2,,Xn}.{\mathcal{X}}=\{X_{1},X_{2},\cdots,X_{n}\}.

In vector form, set

i{δ6i,i[1,5],δ66,i=0.i\sim\begin{cases}\delta_{6}^{i},\quad i\in[1,5],\\ \delta_{6}^{6},\quad i=0.\end{cases}

Then the state space can be expressed as

𝒳=Δ6n.{\mathcal{X}}=\Delta_{6}^{n}.

It is well known that

J:={0,3}{δ66,δ63}J:=\{0,3\}\sim\{\delta_{6}^{6},\delta_{6}^{3}\}

is an ideal of 6{\mathbb{Z}}_{6}. If each XiJX_{i}\in J, then we have a subset

Jn={δ63,δ66}nΔ6n,J^{n}=\{\delta_{6}^{3},\delta_{6}^{6}\}^{n}\subset\Delta_{6}^{n},

which is a state subspace of 𝒳{\mathcal{X}}. Moreover, Since JJ is an ideal of 6{\mathbb{Z}}_{6}, JnJ^{n} is a state invariant subspace of the network (34).

The next example is a network over finite lattice [24].

Example 14.

Consider a control network over lattice LL as

{X1(t+1)=X2(t)U(t),X2(t+1)=X3(t)X1(t),X3(t+1)=(X1(t)X2(t))X3(t),Y(t)=X2(t)X3(t).\displaystyle\begin{array}[]{l}\begin{cases}X_{1}(t+1)=X_{2}(t)\vee U(t),\\ X_{2}(t+1)=X_{3}(t)\wedge X_{1}(t),\\ X_{3}(t+1)=\left(X_{1}(t)\vee X_{2}(t)\right)\wedge X_{3}(t),\end{cases}\\ ~{}~{}~{}Y(t)=X_{2}(t)\vee X_{3}(t).\end{array} (40)

The lattice LL has its Hasse diagram as in Fig. 2.


δ55\delta_{5}^{5}δ54\delta_{5}^{4}δ52\delta_{5}^{2}δ53\delta_{5}^{3}δ51\delta_{5}^{1}
Figure 2: Hasse Diagram of LL

According to the Hasse diagram, the structure matrices of \vee and \wedge can easily be calculated:

M=δ5[1,1,1,1,1,1,2,1,2,2,1,1,3,3,3,1,2,3,4,4,1,2,3,4,5].\displaystyle\begin{array}[]{ccl}M_{\vee}&=&\delta_{5}[1,1,1,1,1,1,2,1,2,2,1,1,3,3,3,\\ {}\hfil&{}\hfil&~{}~{}~{}~{}1,2,3,4,4,1,2,3,4,5].\end{array} (43)
M=δ5[1,2,3,4,5,2,2,4,4,5,3,4,3,4,5,4,4,4,4,5,5,5,5,5,5].\displaystyle\begin{array}[]{ccl}M_{\wedge}&=&\delta_{5}[1,2,3,4,5,2,2,4,4,5,3,4,3,4,5,\\ {}\hfil&{}\hfil&~{}~{}~{}~{}4,4,4,4,5,5,5,5,5,5].\end{array} (46)

Using the structure matrices of \vee and \wedge, we can calculate the structure matrices of the logical functions in (35).

Mux2=M(𝟏5TI5𝟏5TI5)ux:=L1ux,\begin{array}[]{l}M_{\vee}ux_{2}=M_{\vee}({\bf 1}_{5}^{\mathrm{T}}\otimes I_{5}\otimes{\bf 1}_{5}^{\mathrm{T}}\otimes I_{5})ux\\ :=L_{1}ux,\end{array}

where

L1=M(𝟏5TI5𝟏5TI5)=δ5[1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,2,2,2,2,2,3,3,3,3,3,4,4,4,4,4,5,5,5,5,5].\begin{array}[]{ccl}L_{1}&=&M_{\vee}({\bf 1}_{5}^{\mathrm{T}}\otimes I_{5}\otimes{\bf 1}_{5}^{\mathrm{T}}\otimes I_{5})\\ {}\hfil&=&\delta_{5}[1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,\\ {}\hfil&{}\hfil&\cdots\\ {}\hfil&{}\hfil&2,2,2,2,2,3,3,3,3,3,4,4,4,4,4,5,5,5,5,5].\\ \end{array}
Mx1x2=M(𝟏5TI5𝟏5TI5)ux:=L2ux,\begin{array}[]{l}M_{\wedge}x_{1}x_{2}=M_{\wedge}({\bf 1}_{5}^{\mathrm{T}}\otimes I_{5}\otimes{\bf 1}_{5}^{\mathrm{T}}\otimes I_{5})ux\\ :=L_{2}ux,\end{array}

where

L2=M(𝟏5TI5𝟏5TI5)=δ5[1,2,3,4,5,1,2,3,4,5,1,2,3,4,5,1,2,3,4,5,5,5,5,5,5,5,5,5,5,5,5,5,5,5,5,5,5,5,5,5].\begin{array}[]{ccl}L_{2}&=&M_{\wedge}({\bf 1}_{5}^{\mathrm{T}}\otimes I_{5}\otimes{\bf 1}_{5}^{\mathrm{T}}\otimes I_{5})\\ {}\hfil&=&\delta_{5}[1,2,3,4,5,1,2,3,4,5,1,2,3,4,5,1,2,3,4,5,\\ {}\hfil&{}\hfil&\cdots\\ {}\hfil&{}\hfil&5,5,5,5,5,5,5,5,5,5,5,5,5,5,5,5,5,5,5,5].\\ \end{array}
MMx1x2x3=MM(𝟏5TI125)ux:=L3ux,\begin{array}[]{l}M_{\wedge}M_{\vee}x_{1}x_{2}x_{3}=M_{\wedge}M_{\vee}({\bf 1}_{5}^{\mathrm{T}}\otimes I_{125})ux\\ :=L_{3}ux,\end{array}

where

L3=MM(𝟏5TI125)=δ5[1,2,3,4,5,1,2,3,4,5,1,2,3,4,5,1,2,3,4,5,2,2,4,4,5,3,4,3,4,5,4,4,4,4,5,5,5,5,5,5].\begin{array}[]{ccl}L_{3}&=&M_{\wedge}M_{\vee}({\bf 1}_{5}^{\mathrm{T}}\otimes I_{125})\\ {}\hfil&=&\delta_{5}[1,2,3,4,5,1,2,3,4,5,1,2,3,4,5,1,2,3,4,5,\\ {}\hfil&{}\hfil&\cdots\\ {}\hfil&{}\hfil&2,2,4,4,5,3,4,3,4,5,4,4,4,4,5,5,5,5,5,5].\\ \end{array}

It follows that

L=L1L2L3=δ125[1,2,3,4,5,1,2,3,4,5,1,2,3,4,5,,47,47,49,49,50,73,74,73,74,75,99,99,99,99,100,125,125,125,125,125].\begin{array}[]{ccl}L&=&L_{1}*L_{2}*L_{3}\\ {}\hfil&=&\delta_{125}[1,2,3,4,5,1,2,3,4,5,1,2,3,4,5,\\ {}\hfil&{}\hfil&\cdots,47,47,49,49,50,73,74,73,74,75,\\ {}\hfil&{}\hfil&99,99,99,99,100,125,125,125,125,125].\\ \end{array}

Finally, since J={δ54,δ55}J=\{\delta_{5}^{4},\delta_{5}^{5}\} is a sub-lattice of LL (precisely speaking, JJ is an ideal of LL), when all the state variables (i.e., x1,x2,x3x_{1},x_{2},x_{3}), take values from JJ, the corresponding states form an invariant subspace. Denote it by VV. That is,

V={x=x1x2x3|x1,x2,x3{δ54,δ55}}={δ54δ54δ54,δ54δ54δ55,,δ55δ55δ55}=δ125[94,95,99,100,119,120,124,125]125×8.\displaystyle\begin{array}[]{ccl}V&=&\left\{x=x_{1}x_{2}x_{3}\;|\;x_{1},x_{2},x_{3}\in\{\delta_{5}^{4},\delta_{5}^{5}\}\right\}\\ {}\hfil&=&\left\{\delta_{5}^{4}\delta_{5}^{4}\delta_{5}^{4},\delta_{5}^{4}\delta_{5}^{4}\delta_{5}^{5},\cdots,\delta_{5}^{5}\delta_{5}^{5}\delta_{5}^{5}\right\}\\ {}\hfil&=&\delta_{125}[94,95,99,100,119,120,124,125]\\ {}\hfil&\in&{\mathcal{L}}_{125\times 8}.\end{array}

If the control u=δ54Ju=\delta_{5}^{4}\in J, we have

M4=Lδ54125×125.M_{4}=L\delta_{5}^{4}\in{\mathcal{L}}_{125\times 125}.

Then VV is M4M_{4}-invariant. A straightforward computation shows that

M4V=VE1,M_{4}V=VE_{1},

where E1=δ8[1,4,1,4,3,4,4,4].E_{1}=\delta_{8}[1,4,1,4,3,4,4,4].

If the control u=δ55Ju=\delta_{5}^{5}\in J, we have

M5=Lδ55125×125.M_{5}=L\delta_{5}^{5}\in{\mathcal{L}}_{125\times 125}.

Then VV is M5M_{5}-invariant. It is also easy to show that

M5V=VE2,M_{5}V=VE_{2},

where E2=δ8[1,4,5,8,3,4,8,8].E_{2}=\delta_{8}[1,4,5,8,3,4,8,8].

Remark 15.

In both Example 13 and Example 14 the invariant subspaces come from the “subspace” structure of the bearing spaces, from which the nodes of networks take values. Such invariant subspaces are independent of the particular networks.

4 Universal Cascading Form

4.1 Universal Invariant Subspace

Definition 16.

Assume BB is the bearing space of a network with its operators tit_{i}, i=1,2,,si=1,2,\cdots,s. HBH\subset B and the restrictions of ti|Ht_{i}|_{H}, i=1,2,,si=1,2,\cdots,s are properly defined, then HH is called a bearing subspace of BB.***In fact, HH is a subuniverse of the universal algebra BB [3].

Example 17.
  • (i)

    Consider a ring 6{\mathbb{Z}}_{6}, assume H={0,3}H=\{0,3\} which is a sub-ring of 6{\mathbb{Z}}_{6}. Then the operators |H\oplus|_{H} and |H\odot|_{H} are properly defined. So, if 6{\mathbb{Z}}_{6} is a bearing space of a network, then HH is a bearing subspace of the network.

  • (ii)

    Consider a lattice LL with its Hasse diagram as in Fig. LABEL:Fig.1.2.1. If LL is a bearing space of a network, Then H0={D}H_{0}=\{D\}, H1={B,D}H_{1}=\{B,D\}, H2={A,B,D}H_{2}=\{A,B,D\}, as sub-lattices of LL, are all bearing subspaces.

Consider kk-valued network (3) (or kk-valued control network (4)). Assume its bearing space is BB and HBH\subset B is a bearing subspace. The state subspace corresponding to HH is defined by

𝒳|H={(X1,X2,,Xn)𝒳|XiH,i[1,n]}.{\mathcal{X}}|_{H}=\{(X_{1},X_{2},\cdots,X_{n})\in{\mathcal{X}}\;|\;X_{i}\in H,\;i\in[1,n]\}.

The following proposition comes from the definition of bearing space.

Proposition 18.

Assume kk-valued network (3) (or kk-valued control network (4)) has its bearing space BB, and HBH\subset B is a bearing subspace. Then the 𝒳|H{\mathcal{X}}|_{H} is the state invariant subspace of (3). It is also a control-invariant subspace of (4)). Moreover, 𝒳|H{\mathcal{X}}|_{H} is independent of a particular network. It is, therefore, called the universal state invariant subspace.

Remark 19.
  • (i)

    Assume

    H={δkr1,δkr2,,δkrs}.H=\left\{\delta_{k}^{r_{1}},\delta_{k}^{r_{2}},\cdots,\delta_{k}^{r_{s}}\right\}.

    Then

    𝒳|H={i=1nδkji|ji{r1,r2,,rs},i[1,n]}.\displaystyle{\mathcal{X}}|_{H}=\left\{\ltimes_{i=1}^{n}\delta_{k}^{j_{i}}\;|\;j_{i}\subset\{r_{1},r_{2},\cdots,r_{s}\},\;i\in[1,n]\right\}. (47)
  • (ii)

    To see 𝒳|H{\mathcal{X}}|_{H} is also a control-invariant state subspace, we simply set ujHu_{j}\in H, j[1,m]j\in[1,m], the conclusion follows.

4.2 Cascading Normal Form

Proposition 20.

Let H1H2Hs=BH_{1}\subset H_{2}\subset\cdots\subset H_{s}=B be a set of nested bearing subspaces.

  • (i)

    Consider kk-valued network (3) with BB as its bearing space. Then there exists a coordinate transformation Z=T(X)Z=T(X), such that under the coordinate frame ZZ, the ASSR of (3) becomes

    z(t+1)=Mz(t),\displaystyle z(t+1)=Mz(t), (48)

    where MM has the cascading form (upper block triangular form) as

    M=[D1,1D1,2D1,s0D2,2D2,s00Dss],\displaystyle M=\begin{bmatrix}D_{1,1}&D_{1,2}&\cdots&D_{1,s}\\ 0&D_{2,2}&\cdots&D_{2,s}\\ \vdots&~{}&~{}&~{}\\ 0&0&\cdots&D_{ss}\\ \end{bmatrix}, (49)

    where the nested diagonal square blocks

    D1,1,[D1,1D1,20D2,2],,MD_{1,1},~{}\begin{bmatrix}D_{1,1}&D_{1,2}\\ 0&D_{2,2}\end{bmatrix},~{}\cdots,~{}M

    correspond to the nested H1H2HsH_{1}\subset H_{2}\subset\cdots\subset H_{s} respectively.

  • (ii)

    Consider kk-valued control network (4) with BB as its bearing space, and assume uHru\in H_{r}. Then there exists a coordinate transformation Z=T(X)Z=T(X), such that under the coordinate frame ZZ, the ASSR of (4) becomes

    z(t+1)=L~(u)z(t),\displaystyle z(t+1)=\tilde{L}(u)z(t), (50)
    L~(u)=[L1,1L1,20L2,2],\displaystyle\tilde{L}(u)=\begin{bmatrix}L_{1,1}&L_{1,2}\\ 0&L_{2,2}\\ \end{bmatrix}, (51)

    where L1,1L_{1,1} corresponds to HrH_{r}.

Proof:

  • (i)

    We give constructive proof. Define

    Ti:={j=1nxji|xjiHi}.T_{i}:=\left\{\ltimes_{j=1}^{n}x^{i}_{j}\;|\;x^{i}_{j}\in H_{i}\right\}.

    It follows from the construction that if XTiX\in T_{i}, YTj𝔗iY\in T_{j}\mathfrak{T}_{i}, j>ij>i, then

    X,Y=0.\displaystyle\left<X,Y\right>=0. (52)

    Then we construct a kn×knk^{n}\times k^{n} matrix as

    T:=[T1|T2\T1|T3\T2||Ts\Ts1].\displaystyle T:=\left[T_{1}\;|\;T_{2}\backslash T_{1}\;|\;T_{3}\backslash T_{2}\;|\;\cdots\;|\;T_{s}\backslash T_{s-1}\right]. (53)

    Using some properties of the STP, a straightforward computation verifies that TT is a coordinate transformation, and

    T1=TT.T^{-1}=T^{\mathrm{T}}.

    Moreover, set x=Tzx=Tz, then it is easy to verify that

    • TiT_{i} and Tj\TiT_{j}\backslash T_{i} are orthogonal, where j>ij>i.

    • MTiTiMT_{i}\subset T_{i}.

    These two facts lead to the conclusion that under the coordinate frame zz the transition matrix TTMTT^{\mathrm{T}}MT has the form (49).

  • (ii)

    Since uHru\in H_{r}, HrH_{r} is L(u)L(u) invariant. The conclusion becomes a special case of (i).

\Box

Example 21.

Consider a 44-valued network

{X1(t+1)=X1(t)X2(t),X2(t+1)=X1(t)X2(t).\displaystyle\begin{cases}X_{1}(t+1)=X_{1}(t)\wedge X_{2}(t),\\ X_{2}(t+1)=X_{1}(t)\vee X_{2}(t).\end{cases} (54)

Assume its bearing space is a lattice LL with its Hasse diagram as in Fig. LABEL:Fig.1.2.1. Denote by A=δ41A=\delta_{4}^{1}, B=δ42B=\delta_{4}^{2}, C=δ43C=\delta_{4}^{3}, and D=δ44D=\delta_{4}^{4}. Skipping the tedious calculation, which is similar to Example 14, the ASSR form of (53) can be obtained as

x(t+1)=Mx(t),\displaystyle x(t+1)=Mx(t), (55)

where

M=δ16[1,5,9,13,5,6,13,14,9,13,11,15,13,14,15,16].M=\delta_{16}[1,5,9,13,5,6,13,14,9,13,11,15,13,14,15,16].

It is easy to calculate that

T1={δ44δ44},T2\T1={δ44δ42,δ42δ44,δ42δ42},T3\T2={δ44δ41,δ41δ44,δ42δ41,δ41δ42},T4\T3={δ41δ41,δ44δ43,δ43δ44,δ42δ43,δ43δ42,δ41δ43,δ43δ41,δ43δ43}.\begin{array}[]{ccl}T_{1}&=&\{\delta_{4}^{4}\delta_{4}^{4}\},\\ T_{2}\backslash T_{1}&=&\{\delta_{4}^{4}\delta_{4}^{2},\delta_{4}^{2}\delta_{4}^{4},\delta_{4}^{2}\delta_{4}^{2}\},\\ T_{3}\backslash T_{2}&=&\{\delta_{4}^{4}\delta_{4}^{1},\delta_{4}^{1}\delta_{4}^{4},\delta_{4}^{2}\delta_{4}^{1},\delta_{4}^{1}\delta_{4}^{2}\},\\ T_{4}\backslash T_{3}&=&\{\delta_{4}^{1}\delta_{4}^{1},\delta_{4}^{4}\delta_{4}^{3},\delta_{4}^{3}\delta_{4}^{4},\delta_{4}^{2}\delta_{4}^{3},\\ {}\hfil&{}\hfil&\delta_{4}^{3}\delta_{4}^{2},\delta_{4}^{1}\delta_{4}^{3},\delta_{4}^{3}\delta_{4}^{1},\delta_{4}^{3}\delta_{4}^{3}\}.\\ \end{array}

Then we got

T=[T1,T2\T1,T3\T2,T4\T3]=δ16[16,14,8,6,13,4,5,2,1,15,12,7,10,3,9,11];\begin{array}[]{ccl}T&=&\left[T_{1},T_{2}\backslash T_{1},T_{3}\backslash T_{2},T_{4}\backslash T_{3}\right]\\ {}\hfil&=&\delta_{16}[16,14,8,6,13,4,5,2,1,15,12,7,10,3,9,11];\end{array}

Finally, we set x=Tzx=Tz and calculate the transition matrix under the zz coordinate frame as

z(t+1)=TTMTz(t):=M~z(t),\displaystyle z(t+1)=T^{\mathrm{T}}MTz(t):=\tilde{M}z(t), (56)

where

M~=δ16[1,2,2,4,5,5,7,7,9,10,10,5,5,15,15,16],\displaystyle\tilde{M}=\delta_{16}[1,2,2,4,5,5,7,7,9,10,10,5,5,15,15,16], (57)

which is in cascading form with

[1]H1,δ4[1,2,2,4]H2,δ8[1,2,2,4,5,5,7,7]H3,M~B.\begin{array}[]{lll}[1]&\rightarrow&H_{1},\\ \delta_{4}[1,2,2,4]&\rightarrow&H_{2},\\ \delta_{8}[1,2,2,4,5,5,7,7]&\rightarrow&H_{3},\\ \tilde{M}&\rightarrow&B.\\ \end{array}
Remark 22.

Precisely speaking, bearing subspaces depend also on network dynamics in certain sense. For instance, in Example 21, only \wedge and \vee are used in dynamic equation (54), hence all the sun-lattices of the lattice LL in Fig. LABEL:Fig.1.2.1 are its bearing subspaces.

  • (i)

    Since LL is a complementation lattice, each element aa has its complement ¬a\neg a ***A lattice is called a complementation lattice if LL has a maximum element 𝟏{\bf 1} and minimum element 𝟎{\bf 0} such that for each element aLa\in L there is an element, called the complement of aa and denoted by ¬a\neg a, such that a¬a=𝟏,a¬a=𝟎.a\vee\neg a={\bf 1},\quad a\wedge\neg a={\bf 0}. . Now if ¬\neg is used in the dynamic equation (54), then only the complementation sub-lattice can be considered as a bearing subspace. That is, we have only H1={A,D}LH_{1}=\{A,D\}\subset L as its bearing subspace.

  • (ii)

    If we consider conjunctive networks over LL, which are similar to conjunctive Boolean networks [16], since (L,)(L,\wedge) is a semi-lattice, any sub-semi-lattices can be considered as its bearing subspace. For instance, a nested bearing subspaces can be H1={D}H_{1}=\{D\}, H2={B,D}H_{2}=\{B,D\} H3={D,B,C}H_{3}=\{D,B,C\}, H4=LH_{4}=L.

5 Duality of Invariant Subspaces

5.1 Invariant Subspace vs Dual Invariant Subspace

Assuming the bearing space BB of a finite-valued network has a “zero”, then we consider the duality of invariant subspaces with invariant dual subspaces. We give a precise definition.

Definition 23.

Given a bearing space BB of a finite-valued network Σ\Sigma, as described by (3) with its ASSR (6). Assume there is a θB\theta\in B, and a binary operator \odot over BB, such that

bθ=θb=θ,bB,b\odot\theta=\theta\odot b=\theta,\quad\forall b\in B,

then BB is said to have a zero element θ\theta, and the operator \odot is considered as a product over BB.

Example 24.
  • (i)

    Assume BB is a finite ring (including finite field), then BB is with zero, where θ=0\theta=0 and \odot is the product of the ring.

  • (ii)

    Assume BB is a kk-valued logic (including Boolean logic), then BB is with zero, where θ=0\theta=0 with product \wedge. (If you wish, you can also set θ=1\theta=1 with product \vee.)

  • (iii)

    Assume BB is a finite lattice, then BB is with zero, where θ=min\theta=\min (smallest element) with product inf\inf.

Definition 25.

Given a bearing space BB of a finite-valued network Σ\Sigma, as described by (3), and assume BB has zero θ\theta.

  • (i)

    Let 𝒢=(g1,g2,,gr){\mathcal{G}}^{*}={\mathcal{F}}_{\ell}(g_{1},g_{2},\cdots,g_{r}) be a dual subspace of 𝒳{\mathcal{X}}^{*}. Then

    𝒢:={X𝒳|gi(X)=θ,i[1,r]}\displaystyle{{\mathcal{G}}^{*}}^{\perp}:=\{X\in{\mathcal{X}}\;|\;g_{i}(X)=\theta,\;i\in[1,r]\} (58)

    is called the state space perpendicular to 𝒢{\mathcal{G}}^{*}.

  • (ii)

    Let 𝒱={X1,X2,,Xs}{\mathcal{V}}=\{X_{1},X_{2},\cdots,X_{s}\} be a subspace of 𝒳{\mathcal{X}}. Then

    𝒱:={f𝒳|f(Xi)=θ,i[1,s]}\displaystyle{\mathcal{V}}^{\perp}:=\{f\in{\mathcal{X}}^{*}\;|\;f(X_{i})=\theta,\;i\in[1,s]\} (59)

    is called the dual state space perpendicular to 𝒱{\mathcal{V}}.

The following result shows the relationship between invariant subspace and invariant dual subspace.

Theorem 26.

Consider kk-valued network (3) with its ASSR (6) and assume its bearing space BB has zero element θ\theta.

  • (i)

    Assume 𝒢{\mathcal{G}}^{*} is an MM-invariant dual subspace. Then its perpendicular subspace 𝒱=𝒢{\mathcal{V}}={{\mathcal{G}}^{*}}^{\perp} is an MM-invariant subspace.

  • (ii)

    Assume 𝒱{\mathcal{V}} is an MM-invariant subspace. Then its perpendicular dual subspace 𝒢=𝒱{\mathcal{G}}^{*}={\mathcal{V}}^{\perp} is an MM-invariant dual subspace.

Proof: We prove (i) only, the proof of (ii) is similar.

Let x𝒢x\in{{\mathcal{G}}^{*}}^{\perp}. Consider MxMx: Since Gkr×knG\in{\mathcal{L}}_{k^{r}\times k^{n}} is MM-invariant, there exists HH such that

GMx=HGx.GMx=HGx.

Now since HGSpan{Row(G)}HG\subset\operatorname{Span}\{Row(G)\}, HGx=θrHGx=\theta^{r}. Hence Mx𝒢Mx\in{{\mathcal{G}}^{*}}^{\perp}. \Box

The following is an immediate consequence.

Corollary 27.

Given a bearing space BB of a finite control network Σ\Sigma, as described by the kk-valued control network (4) with its ASSR (6) and assume its bearing space BB has zero element θ\theta.

  • (i)

    Assume 𝒢{\mathcal{G}}^{*} is a control-invariant dual subspace. Then its perpendicular subspace 𝒱=𝒢{\mathcal{V}}={{\mathcal{G}}^{*}}^{\perp} is a control invariant subspace.

  • (ii)

    Assume 𝒱{\mathcal{V}} is a control-invariant subspace. Then its perpendicular dual subspace 𝒢=𝒱{\mathcal{G}}^{*}={\mathcal{V}}^{\perp} is a control-invariant dual subspace.

We use a simple example to verify Theorem 26.

Example 28.

Consider a Boolean network

{X1(t+1)=X1(t)X2(t),X2(t+1)=X1(t)X2(t),X3(t+1)=X1(t)X3(t).\displaystyle\begin{cases}X_{1}(t+1)=X_{1}(t)\vee X_{2}(t),\\ X_{2}(t+1)=X_{1}(t)\wedge X_{2}(t),\\ X_{3}(t+1)=X_{1}(t)\leftrightarrow X_{3}(t).\end{cases} (60)

Then it is obvious that 𝒢=(X1,X2){\mathcal{G}}^{*}={\mathcal{F}}_{\ell}(X_{1},X_{2}) is a node invariant subspace. The ASSR of (60) can easily be calculated as

x(t+1)=Mx(t),\displaystyle x(t+1)=Mx(t), (61)

where M=δ8[1,2,3,4,4,3,8,7].M=\delta_{8}[1,2,3,4,4,3,8,7].

Let the structure matrix of 𝒢{\mathcal{G}}^{*} be GG. Then it is easy to calculate that

G=δ4[1,1,2,2,2,2,4,4].G=\delta_{4}[1,1,2,2,2,2,4,4].

A straightforward verification shows that

GM=HG,GM=HG,

where H=I4H=I_{4}.

Consider E:=𝒢E:={{\mathcal{G}}^{*}}^{\perp}. Then

E={δ22δ22x3|x3Δ2}={δ87,δ88}.\begin{array}[]{ccl}E&=&\{\delta_{2}^{2}\delta_{2}^{2}x_{3}\;|\;x_{3}\in\Delta_{2}\}\\ {}\hfil&=&\{\delta_{8}^{7},\delta_{8}^{8}\}.\end{array}

It is ready to verify that

ME=Eδ2[2,1]E.ME=E\delta_{2}[2,1]\subset E.

5.2 Universal Dual Invariant Subspace

Using the duality of invariant subspaces with dual invariant subspaces, one sees easily that the universal invariant subspaces also have their corresponding (perpendicular) dual invariant subspaces. According to Theorem 26, it is obvious that the dual invariant subspaces are also independent of the particular network dynamics. Hence we have the following result.

Proposition 29.

Consider the kk-valued network (3). Assume its bearing space BB has zero θ\theta. If 𝒱{\mathcal{V}} is a universal invariant subspace, then 𝒢=𝒱{\mathcal{G}}^{*}={\mathcal{V}}^{\perp} is also universal. That is, it is independent of particular network dynamics.

Example 30.

Recall Example 21 and observe Fig.LABEL:Fig.1.2.1. There is a sequence of universal invariant subspaces:

H1H2H3H4=L,H_{1}\subset H_{2}\subset H_{3}\subset H_{4}=L,

where HiH_{i} corresponds to Ti,i=1,2,3,4T_{i},~{}i=1,2,3,4.

Then we have a sequence of universal dual invariant subspaces as

𝒢4𝒢3𝒢2𝒢1,{\mathcal{G}}_{4}^{*}\subset{\mathcal{G}}_{3}^{*}\subset{\mathcal{G}}_{2}^{*}\subset{\mathcal{G}}_{1}^{*},

where 𝒢i=Hi,i=1,2,3,4.{\mathcal{G}}_{i}^{*}=H_{i}^{\perp},~{}i=1,2,3,4.

Then it is clear that the elements of 𝒢i{\mathcal{G}}_{i}^{*}, denoted their vector forms by gig_{i}, i=1,2,3,4i=1,2,3,4, are

g4=δ4[4,4,4,4,4,4,4,4,4,4,4,4,4,4,4,4],g3=δ4[4,4,,4,4,4,,4,,,,,4,4,,4],g2=δ4[,,,,,4,,4,,,,,,4,,4],g1=δ4[,,,,,,,,,,,,,,,4],\begin{array}[]{ccl}g_{4}&=&\delta_{4}[4,4,4,4,4,4,4,4,4,4,4,4,4,4,4,4],\\ g_{3}&=&\delta_{4}[4,4,*,4,4,4,*,4,*,*,*,*,4,4,*,4],\\ g_{2}&=&\delta_{4}[*,*,*,*,*,4,*,4,*,*,*,*,*,4,*,4],\\ g_{1}&=&\delta_{4}[*,*,*,*,*,*,*,*,*,*,*,*,*,*,*,4],\\ \end{array}

where {1,2,3,4}*\in\{1,2,3,4\} stands for arbitrary value.

Using the coordinate transformation

T=δ16[16,14,8,6,13,4,5,2,1,15,12,7,10,3,9,11],g~4:=g4T=δ4[4,4,4,4,4,4,4,4,4,4,4,4,4,4,4,4],g~3:=g3T=δ4[4,4,4,4,4,4,4,4,4,,,,,,,],g~2:=g2T=δ4[4,4,4,4,,,,,,,,,,,,],g~1:=g1T=δ4[4,,,,,,,,,,,,,,,].\begin{array}[]{ccl}T&=&\delta_{16}[16,14,8,6,13,4,5,2,1,15,12,7,10,3,9,11],\\ \tilde{g}_{4}&:=&g_{4}T=\delta_{4}[4,4,4,4,4,4,4,4,4,4,4,4,4,4,4,4],\\ \tilde{g}_{3}&:=&g_{3}T=\delta_{4}[4,4,4,4,4,4,4,4,4,*,*,*,*,*,*,*],\\ \tilde{g}_{2}&:=&g_{2}T=\delta_{4}[4,4,4,4,*,*,*,*,*,*,*,*,*,*,*,*],\\ \tilde{g}_{1}&:=&g_{1}T=\delta_{4}[4,*,*,*,*,*,*,*,*,*,*,*,*,*,*,*].\\ \end{array}

It is ready to verify that 𝒢i={g~i}i=1,2,3,4{\mathcal{G}}_{i}^{*}=\{\tilde{g}_{i}\}~{}i=1,2,3,4 are M~\tilde{M}-invariant, where M~\tilde{M} is given in (57).

6 Conclusion

Though the concept of “invariant subspace” has been used in the STP-based study of Boolean (control) networks for a considerable long time, it has not been clearly defined and there are some unclear or murky issues. In this paper, the two kinds of (control) invariant subspaces of kk-valued networks have been clearly defined. They are the state invariant and dual invariant subspaces of the state space and the dual space respectively. Then their properties have been investigated.

First, for invariant dual subspaces, two algorithms have been proposed to verify if a dual subspace of a network is an invariant subspace and a dual subspace of a control network is a dual control invariant subspace respectively. Second, for state invariant subspaces, the relationship between the topological structure and the state invariant subspaces is revealed. Then a special kind of state invariant subspaces, called universal subspaces, are considered. They are caused by the structure of bearing space and are independent of the dynamics of individual networks. Based on universal invariant subspaces the universal normal form is revealed. Finally, the duality of state invariant subspaces and dual invariant subspaces is obtained, which shows that if a dual subspace is invariant, then its perpendicular state subspace is also invariant, and vice versa.

Since invariant subspace is a fundamental concept and a useful tool in many control problems of networks, this paper may help to build a solid theoretical foundation for further investigation and applications.

References

  • [1] A. Adamatzky, On dynamically non-trivial three-valued logics: oscillatory and bifurcatory spaces, Chaos Solitons Fractals, Vol. 18, 917-936, 2003.
  • [2] T. Akutsi, M. Hayashida, W. Ching, M. Ng, Control of Boolean networks: hardness results and algorithms for three structured networks, J. Theor. Biol., Vol. 244, No. 4, 670-769, 2007.
  • [3] S. Burris, H.H. Sankappanavar, A Course in Universal Algebra, Springer-verlag, New York, 1981.
  • [4] R.E. Bryant, A switch-level model and simulator for MOS digital systems, IEEE Trans. Comput., Vol. C-33, No. 2, 160-177, 1984.
  • [5] D. Cheng, H. Qi, State space analysis of Boolean networks, IEEE Trans. Neural Netw., Vol. 21, No .4, 584-594, 2010.
  • [6] D. Cheng, H. Qi, Z. Li, Analysis and Control of Boolean Networks: A Semi-tensor Product Approach, Springer, London, 2011.
  • [7] D. Cheng, Disturbance decoupling of Boolean control networks, IEEE Trans. Aut. Contr., Vol. 56, No. 1, 2-10, 2011.
  • [8] D. Cheng, H. Qi, Y. Zhao, An Introduction to Semi-tensor Product of Matrices and Its Applications, World Scientific, Singapore, 2012.
  • [9] D. Cheng, F. He, H. Qi, T. Xu, Modeling analysis and control of networked evolutionary games, IEEE Trans. Aut. Contr., Vol. 60, No. 9, 2402-2415, 2015.
  • [10] D. Cheng, Y. Wu, G. Zhao, S. Fu, A comprehensive survey on STP approach to finite games, J. Sys. Sci. Compl., Vol. 34, No. 5, 1666-1680, 2021.
  • [11] D. Cheng, L. Zhang, D. Bi, Invariant subspace approach to Boolean (control) networks, IEEE Trans. Aut. Contr., (on line) ieeexplore.ieee.org/document/9775567, 2022.
  • [12] D. Cheng, Z. Ji, On networks over finite rings, J. Franklin Inst., Vol. 359, No. 14, 7562-7599, 2022.
  • [13] A. Datta, A. Choudhary, M.L. Bittner, E.R. Dougherty, External control in Markovian genetic regulatory networks, Mach. Learn., Vol. 52, 169-191, 2003.
  • [14] G. Epstein, The lattice theory of Post algebras, Trans. Am. Soc., Vol. 95, 300-317, 1960.
  • [15] E. Fornasini, M.E. Valcher, Observability, reconstructibility and state observers of Boolean control networks, IEEE Trans. Aut. Contr., Vol. 58, No. 6, 1390-1401, 2013.
  • [16] Z. Gao, X. Chen, T. Başar, Stability structures of conjunctive Boolean networks, Automatica, Vol. 89, 8-20, 2018.
  • [17] P. Guo, Y. Wang, H. Li, Algebraic formulation and strategy optimization for a class of evolutionary networked games via semi-tensor product method, Automatica, Vol. 49, 3384-3389, 2013.
  • [18] Y. Guo, P. Wang, W. Gui, C. Yang, Set stability and set stabilization of Boolean control networks based on invariant subsets, Automatica, Vol. 61, 106,112, 2015.
  • [19] Y. Guo, Y. Ding, D. Xie, Invariant subset and set stability of Boolean networks under arbitrary switching signals, IEEE Trans. Aut. Contr., Vol. 62, No. 8, 4209-4214, 2017.
  • [20] Y. Guo, R. Zhou, Y. Wu, W. Gui, C. Yang, Stability and set stability in distribution of probabilistic Boolean networks, IEEE Trans. Aut. Contr., Vol. 64, No. 2, 736-742, 2019.
  • [21] T.W. Hungerford, Algebra, Springer-Verlag, Now York, 1974.
  • [22] T. Ideker, T. Galitski, L. Hood, A new approach to decoding life: systems biology, Annu. Rev. Genom. Hum. Genet, Vol. 2, 343-372, 2001.
  • [23] A. Isidori, Non-linear Control Systems, 3rd ed., Springer-Verlag, New York, 1995.
  • [24] Z. Ji, D. Cheng, Control networks over finite lattices, preprint, arxiv:2208.03716, 2022.
  • [25] J. de Jong, Modeling and simulation of genetic regulatory systems: a literature review, J. Comput. Biol., Vol. 9, No. 1, 67-103, 2012.
  • [26] R.E. Kalman, On the general theory of control systems, in Automatic and Remote control (Proc. 1st Int. Congr. Internat. Fed. Aut. Contr., Moscow, 1960), Butterworths, London, Vol. 1, 481-492, 1961.
  • [27] S.A. Kauffman, Metabolic stability and epigenesis in randomly constructed genetic nets, J. Theoret. Biol., Vol. 22, 437-467, 1969.
  • [28] Z. Li, D. Cheng, Algebraic approach to dynamics of multi-valued networks, Int. J. Bifurc. Chaos, Vol. 20, No. 3, 561-582, 2010.
  • [29] X. Li, M. Chen, H. Su, C. Li, Consensus networks with switching topology and time-delays over finite fields, Automatica 68 (2016) 39-43.
  • [30] H. Li, G. Zhao, P. Guo, Analysis and Control of Finite-Valued Systems, CRC Press, 2018.
  • [31] Y. Li, H. Li, X. Ding, G. Zhao, Leader-follower consensus of multiagent systems with time delays over finite fields, IEEE Trans. Cyb. 49 (8) (2019) 3203-3208.
  • [32] Z. Liu, D. Cheng, Canonical form of Boolean networks, Proc. 38th CCC, 1801-1806, 2019.
  • [33] A. Liu, H. Li, On feedback invariant subspace of Boolean control networks, Sci. China Inf. Sci., 63, 229201, 2020.
  • [34] M. Meng, X. Li, G. Xiao, Synchronization of networks over finite fields, Automatica 115 (2020) 108877.
  • [35] F. Pasqualetri, D. Borra, F. Bullo, Consensus networks over finite fields, Automatica 50 (2) (2014) 349-358.
  • [36] E.L. Post, Introduction to a general theory of elementary propositions, AM.J. Math., Vol. 43, 163-185, 1921.
  • [37] E. Remy, P. Ruet, D. Thieffry, Positive or negative regulatory circuit inference from multilevel dynamics, in Positive Systems: Theory and Applications, Lecture Notes in Control and Information Science, Vol. 341, Springer, Berlin, 263-270, 2006.
  • [38] A. Richard, J.P. Comet, Necessary conditions for multistationarity in discrete dynamical systems, Disc. Appl. Math., Vol. 155, 2403-2413, 2007.
  • [39] K.A. Ross, C.R.B. Wright, Discrete Mathematics, 5th Ed., Prentice Hall, New Jersey, 2003.
  • [40] S. Sundaram, C.N. Hadjicostis, Structural controllability and observability of linear systems over finite fields with applications to multi-agent systems, IEEE Trans. Aut. Contr. 58 (1) (2012) 60-73.
  • [41] R. Thomas, M. Kaufman, Multistationrity, the basis of cell differentiation and memory, I& II, Chaos, Vol. 11, 170-195, 2001.
  • [42] W.M. Wonham, Linear Multivariable Control, A Geometric Approach, Springer-Verlag, Berlin, 1974.
  • [43] X. Zhang, Y. Wang, D. Cheng, Incomplete logical control system and its application to some intellectual problems, Asian J. Contr., Vol. 20, No. 2, 697-706, 2018.
  • [44] X. Zhang, Y. Wang, D. Cheng, Output tracking of Boolean control networks, IEEE Trans. Aut. Contr., Vol. 65, No. 6, 2730-2735, 2020.
  • [45] J. Zhu, P. Lu¨\ddot{u}, Regular subspaces and invariant subspaces, IET Contr. Theory Appl., Vol. 10, No. 5, 504-508, 2016.
  • [46] Y. Zou, J. Zhu, Kalman decomposition for Boolean control networks, Automatica, Vol. 54, 65-71, 2015.
  • [47] R. Zhou, Y. Guo, Set reachability and observability of probabilistic Boolean networks, Automatica, Vol. 106, 230-241, 2019.

Appendix A Semi-tensor Product of Matrices

The semi-tensor product of matrices is defined as follows [6, 8]:

Definition 31.

Let Mm×nM\in{\mathcal{M}}_{m\times n}, Np×qN\in{\mathcal{M}}_{p\times q}, and t=lcm{n,p}t=\operatorname{lcm}\{n,p\} be the least common multiple of nn and pp. The semi-tensor product (STP) of MM and NN is defined as

MN:=(MIt/n)(NIt/p)mt/n×qt/p,\displaystyle M\ltimes N:=\left(M\otimes I_{t/n}\right)\left(N\otimes I_{t/p}\right)\in{\mathcal{M}}_{mt/n\times qt/p}, (62)

where \otimes is the Kronecker product.

The STP of matrices is a generalization of the conventional matrix product, and all the computational properties of the conventional matrix product remain available. Throughout this paper, the default matrix product is STP, so the product of two arbitrary matrices is well defined, and the symbol \ltimes is mostly omitted.

The following properties will be used in the sequel:

Proposition 32.

Let XtX\in\mathbb{R}^{t}. Then for a given matrix AA we have

XA=(ItA)X.\displaystyle XA=(I_{t}\otimes A)X. (63)

A swap matrix W[m,n]mn×mnW_{[m,n]}\in{\mathcal{M}}_{mn\times mn} is defined as

W[m,n]:=[Inδm1,Inδm2,,Inδmm].\displaystyle W_{[m,n]}:=[I_{n}\otimes\delta_{m}^{1},I_{n}\otimes\delta_{m}^{2},\cdots,I_{n}\otimes\delta_{m}^{m}]. (64)

It is used to swap two vectors.

Proposition 33.

Let XmX\in\mathbb{R}^{m}, YnY\in\mathbb{R}^{n} be two column vectors. Then

W[m,n]XY=YX.\displaystyle W_{[m,n]}XY=YX. (65)

A power reducing matrix PRkk2×k{PR}_{k}\in{\mathcal{M}}_{k^{2}\times k} is defined as

PRk:=diag(δk1,δk2,,δkk).\displaystyle{PR}_{k}:=diag(\delta_{k}^{1},\delta_{k}^{2},\cdots,\delta_{k}^{k}). (66)

It is used to reduce the power of a vector.

Proposition 34.

Let XkX\in\mathbb{R}^{k}. Then

PRkX=X2.\displaystyle{PR}_{k}X=X^{2}. (67)

Using STP to kk-valued logical mappings, we have the following result.

Proposition 35.

Let f:ΔknΔkf:\Delta_{k}^{n}\rightarrow\Delta_{k}. Then there exists a unique matrix, called the structure matrix of ff and denoted by Mfk×knM_{f}\in{\mathcal{L}}_{k\times k^{n}}, such that

f(x1,x2,,xn)=Mfi=1nxi,xiΔk,i[1,n].\displaystyle f(x_{1},x_{2},\cdots,x_{n})=M_{f}\ltimes_{i=1}^{n}x_{i},\quad x_{i}\in\Delta_{k},\;i\in[1,n]. (68)
Definition 36.

Let Ap×nA\in{\mathcal{M}}_{p\times n} and Bq×nB\in{\mathcal{M}}_{q\times n}. The Khatri-Rao product of AA and BB, denoted by ABA*B, is defined as follows.

AB=[Col1(A)Col1(B),Col2(A)Col2(B),,Coln(A)Coln(B)]pq×n.\displaystyle\begin{array}[]{ccl}A*B&=&\left[\operatorname{Col}_{1}(A)\operatorname{Col}_{1}(B),\operatorname{Col}_{2}(A)\operatorname{Col}_{2}(B),\cdots,\right.\\ {}\hfil&{}\hfil&\left.\operatorname{Col}_{n}(A)\operatorname{Col}_{n}(B)\right]\in{\mathcal{M}}_{pq\times n}.\end{array} (71)

Appendix B Some Bearing Spaces

In this section, we give a brief introduction to some basic algebraic structures, which are used to describe structures of some commonly used bearing spaces of kk-valued networks.

Definition 37.

[21] A set GG\neq\emptyset with a binary operator :G×G*:G\times G is a group, if

  • (i)

    a(bc)=(ab)c,a,b,cG;a*(b*c)=(a*b)*c,\quad a,b,c\in G;

  • (ii)

    there exists an identity eGe\in G, such that

    ae=ea=a,aG;a*e=e*a=a,\quad\forall a\in G;
  • (iii)

    for each aGa\in G there exists a inverse a1a^{-1}, such that

    aa1=a1a=e.a*a^{-1}=a^{-1}*a=e.

If only (i) is satisfied, GG is a semi-group. If only (i) and (ii) are satisfied, GG is a monoid (or semi-group with identity).

In addition, if a group satisfies

ab=ba,a,bG,a*b=b*a,\quad a,b\in G,

then GG is called an Abelian group.

Definition 38.

[21] A set RR\neq\emptyset with two binary operators ++ and * is called a ring, denoted by (R,+,)(R,+,*), if

  • (i)

    (R,+)(R,+) is an Abelian group with identity 𝟎{\bf 0},

  • (ii)

    (R,)(R,*) is a semi-group,

  • (iii)

    the following distributive rule is satisfied:

    (a+b)c=ac+bc,c(a+b)=ca+cb,a,b,cR.\begin{array}[]{l}(a+b)*c=a*c+b*c,\\ c*(a+b)=c*a+c*b,\quad a,b,c\in R.\end{array}

When (R,)(R,*) is with identity 𝟏{\bf 1}, it is called a ring with identity. If ab=baa*b=b*a for a,bRa,b\in R, RR is called a commutative ring. If ERE\subset R and (E,+,)(E,+,*) is also a ring, EE is said to be a sub-ring of RR. If EE is a sub-ring of RR and for any rr\in{\mathbb{R}} and eEe\in E

re,erE,r*e,~{}e*r\in E,

then EE is called an ideal of RR.

Definition 39.

[21] A set (F,+,)(F,+,*) is a field, if it is a ring, and (F\{𝟎},)(F\backslash\{{\bf 0}\},*) is also an Abelion group.

Definition 40.

[3] A partial ordered set (L,)(L,\prec) is called a lattice, if for any two elements a,bLa,b\in L, there exists a least upper bound, denoted by sup(a,b)=ab\sup(a,b)=a\vee b, and a greatest lower bound, denoted by inf(a,b)=ab\inf(a,b)=a\wedge b.

If (L,)(L,\prec) is a lattice, HLH\subset L and (H,)(H,\prec) is also a lattice, then HH is said to be a sub-lattice of LL. A sub-lattice HH is called an ideal, if for any aLa\in L there exists an hHh\in H such that aha\prec h implies aHa\in H.

A lattice can be described by a figure called the Hasse diagram. For instance, Fig. 3 shows a lattice LL, where L={A,B,C,D}L=\{A,B,C,D\}. It is easy to verify that AB=AA\vee B=A, AB=BA\wedge B=B, BC=AB\vee C=A, BC=DB\wedge C=D, etc.


AABBDDCC
Figure 3: Hasse Diagram of LL