This paper was converted on www.awesomepapers.org from LaTeX by an anonymous user.
Want to know more? Visit the Converter page.

Minimal controllability problem on linear structural descriptor systems with forbidden nodes

Shun Terasaki and Kazuhiro Sato S. Terasaki and K. Sato are with the Department of Mathematical Informatics, Graduate School of Information Science and Technology, The University of Tokyo, Tokyo 113-8656, Japan, email:[email protected] (S. Terasaki), [email protected] (K. Sato)
Abstract

We consider a minimal controllability problem (MCP), which determines the minimum number of input nodes for a descriptor system to be structurally controllable. We investigate the “forbidden nodes” in descriptor systems, denoting nodes that are unable to establish connections with input components. The three main results of this work are as follows. First, we show a solvability condition for the MCP with forbidden nodes using graph theory such as a bipartite graph and its Dulmage–Mendelsohn decomposition. Next, we derive the optimal value of the MCP with forbidden nodes. The optimal value is determined by an optimal solution for constrained maximum matching, and this result includes that of the standard MCP in the previous work. Finally, we provide an efficient algorithm for solving the MCP with forbidden nodes based on an alternating path algorithm.

Index Terms:
structural controllability, large-scale system, descriptor system, bipartite graph, DM decomposition

I Introduction

Controllability analysis for large-scale network systems, such as multi-agent systems[1, 2], brain networks[3, 4], and power networks[5, 6] has received a great deal of interest in recent years, because it can be used to find important nodes [7]. Controllability analysis problems include:

  • quantitative problems; the maximization problems of controllability metrics [8, 9, 10, 11, 12].

  • qualitative problems; selecting input problems that render the system controllable [7, 13, 14, 15, 16].

The quantitative problems require the system parameters, which are not precisely determined in practical systems. In addition, quantitative problems often become computationally intractable when the state dimension becomes large. Conversely, the structural information of a system, i.e., the nonzero patterns of system parameters, is usually known. This is an advantage for qualitative problems that deal only with nonzero patterns. Also, it is known that the structural controllability [17] of a structural system can be checked efficiently using graph algorithms. Thus, for large-scale network systems, it is more appropriate to consider qualitative problems.

Therefore, we consider a Minimal Controllability Problem (MCP) of the following structural descriptor network system with state x(t)nx(t)\in\mathbb{R}^{n} and input u(t)mu(t)\in\mathbb{R}^{m}, where \mathbb{R} is the set of real numbers:

Fx˙(t)=Ax(t)+Bu(t),\displaystyle F\dot{x}(t)=Ax(t)+Bu(t), (1)

where F,An×n,Bn×mF,A\in\mathbb{R}^{n\times n},B\in\mathbb{R}^{n\times m}, and Fn×nF\in\mathbb{R}^{n\times n} can be a singular matrix. That is, we assume that although the specific elements of FF, AA, and BB remain unknown, their nonzero patterns are known. The descriptor formulation aptly models practical systems featuring algebraic constraints, such as those found in electric circuit systems [18, 19, 20]. MCPs can be divided into two main problems[21]:

  • MCP0: A problem that finds an n×mn\times m matrix BB for system (1) to be structurally controllable where mm is minimum. For F=InF=I_{n} or FInF\neq I_{n}, efficient algorithms exist for solving MCP0 [7, 13, 14, 16].

  • MCP1: A problem that finds an n×nn\times n diagonal matrix BB for system (1) to be structurally controllable and the number of nonzero elements in BB is minimum [14]. Although a polynomial time algorithm exists [15] for a special case of (1) with FInF\neq I_{n}, MCP1 is known to be NP-hard [16] in general.

It should be noted that as mentioned in Section 3.2 in [22], there are only a few papers on MCP0 or MCP1 for system (1) with FInF\neq I_{n} although just structural controllability analysis under the assumption of a given (F,A,B)(F,A,B) has been studied in [23, 19, 24].

The previous work in [16] on structural descriptor system (1) has not considered constraints on the input destination. There is a gap between practical situations since most physical systems have state variables to which inputs cannot be directly connected. For instance, consider a system in which the position x(t)x(t) and velocity v(t)v(t) of an object are the state variables. In this case, the state equation involves x˙(t)=v(t)\dot{x}(t)=v(t), but it does not make practical sense to add an input to this equation. Thus, specifying forbidden targets that cannot be connected to inputs is an important practical constraint. Therefore, [13] introduced forbidden nodes to MCP1 for system (1) with F=InF=I_{n}. However, no work applies MCPs with FInF\neq I_{n}.

In this paper, we address MCP0 with forbidden nodes for structural descriptor system (1), because, in general, MCP1 for system (1) with FInF\neq I_{n} is NP-hard, as shown in [16]. Here, the forbidden nodes correspond to the indices of “equations”, while those in [13], which studied (1) with F=InF=I_{n}, correspond to the indices of “variables”. This naturally generalizes to FInF\neq I_{n}. In fact,

  • for F=InF=I_{n}, the time evolution of xix_{i} is characterized by the ii-th equation of (1). Thus, in this case, we can regard the index of equations as that of variables.

  • for FInF\neq I_{n}, the time evolution of xix_{i} is not characterized by the ii-th equation of (1). Thus, in contrast to the case of F=InF=I_{n}, here we cannot regard the index of equations as that of variables.

The contributions of this study can be summarized as follows.

  • We show a necessary and sufficient condition for the existence of the optimal solution of MCP0 with forbidden equations for structural descriptor system (1), which is described in the language of graph theory. This result is also useful in constructing the optimal solution.

  • We provide the optimal value of MCP0 with forbidden equations for structural descriptor system (1), by employing the graph-theoretic properties of the system, such as a bipartite graph and its Dulmage–Mendelsohn (DM) decomposition. The optimal value shows that the minimum number of input nodes is determined by a variant of the maximum matching problem with constraints on the matched nodes. This result includes that of the MCP0 without forbidden equations for descriptor system (1) [16].

  • We also provide an efficient algorithm for solving the above special matching problem by using the alternating path algorithm. The time complexity of this algorithm is O(|V|+|E||V|)O(|V|+|E|\sqrt{|V|}), which is on par with the algorithm for the MCP0 [7, 16] without forbidden equations, where |V||V| and |E||E| are the numbers of nodes and edges of the bipartite graph corresponding to descriptor system (1), respectively.

The remainder of this paper is organized as follows. The basic concepts of graph theory are summarized in Section II. The formulation of MCP0 with forbidden equations for structural descriptor systems is described in Section III. In Section IV, we provide the analysis and the algorithm of MCP0 with forbidden equations for the descriptor system (1). The conclusions are presented in Section V.

II Basic concepts of graph theory

In this section, we present a comprehensive overview of the fundamental concepts of graph theory that are used in this paper.

A strongly connected component (SCC) of a directed graph with node set VV is a maximal subset CVC\subseteq V whose nodes u,vCu,v\in C can be connected by a directed path on the graph.

Let G=(V+,V;E)G=(V^{+},V^{-};E) be a bipartite graph. For an edge e=(v+,v)Ee=(v^{+},v^{-})\in E, +e\partial^{+}e and e\partial^{-}e denote the nodes of v+V+v^{+}\in V^{+} and vVv-\in V^{-}, respectively. That is, +:EV+\partial^{+}:E\rightarrow V^{+} and :EV\partial^{-}:E\rightarrow V^{-}. The edge set MEM\subseteq E is a matching if it does not share nodes of each edge. A matching MM is termed maximum matching if MM contains the largest possible number of edges. We define symbol ν(G)\nu(G) as the size of a maximum matching of GG.

We introduce the DM decomposition for a bipartite graph G=(V+,V;E)G=(V^{+},V^{-};E), which is the unique decomposition algorithm for bipartite graphs (see [19] for details). Algorithm 1 describes DM decomposition. We define MM as a maximum matching of GG and an auxiliary directed graph G~M\tilde{G}_{M}. The edges of G~M\tilde{G}_{M} are oriented from V+V^{+} to VV^{-} except for MM. The decomposition is illustrated in Fig. 1.

Algorithm 1 Algorithm for DM decomposition.
1:Find a maximum matching MM on GG.
2:Construct an auxiliary directed graph G~M\tilde{G}_{M}.
3:V0:={vV+VuV++MuG~Mv}V_{0}:=\{v\ \in V^{+}\cup V^{-}\mid\exists u\in V^{+}\setminus\partial^{+}M\ u\to_{\tilde{G}_{M}}v\}, where uG~Mvu\to_{\tilde{G}_{M}}v indicates the existence of a directed path on G~M\tilde{G}_{M} from uu to vv.
4:V:={vV+VuVMvG~Mu}V_{\infty}:=\{v\ \in V^{+}\cup V^{-}\mid\exists u\in V^{-}\setminus\partial^{-}M\ v\to_{\tilde{G}_{M}}u\}.
5:Let GG^{\prime} be the subgraph of G~M\tilde{G}_{M} defined by deleting all nodes of V0VV_{0}\cup V_{\infty} and all edges adjacent to the nodes.
6:Let Vk(k=1,,b)V_{k}\ (k=1,\dots,b) be the SCCs of GG^{\prime}. Let undirected graph Gk(k=0,1,,b,)G_{k}\ (k=0,1,\dots,b,\infty) be the subgraph of GG induced on Vk(k=0,1,,b,)V_{k}\ (k=0,1,\dots,b,\infty).

Subgraphs Gk(k=0,,b,)G_{k}\ (k=0,\dots,b,\infty) in Step 6 of Algorithm 1 are called DM components of GG. Gk(k=1,,b)G_{k}\ (k=1,\dots,b) are called consistent DM components; G0G_{0} and GG_{\infty} are called inconsistent DM components. The order GiGjG_{i}\preceq G_{j} for the consistent DM components GiG_{i} and GjG_{j} is defined as

“There is a directed path on G~M\tilde{G}_{M} from GjG_{j} to GiG_{i},”

and the order between the consistent DM component GiG_{i} and inconsistent DM components G0G_{0} and GG_{\infty} are defined as G0GiG_{0}\preceq G_{i} and GiGG_{i}\preceq G_{\infty}, respectively. Then, \preceq is a partial order. Moreover, the decomposition constructed by Algorithm 1 does not depend on an initially chosen maximum matching MM of GG in step 1), as shown in Lemma 2.3.35 in [19]. For example, in Fig. 1, there is a directed edge from G2G_{2} to G1G_{1}, and thus

G0G1G2G.\displaystyle G_{0}\preceq G_{1}\preceq G_{2}\preceq G_{\infty}.

The greatest computational bottleneck in the construction of the DM decomposition is to find the maximum matching of GG. This can be achieved in O(|E||V|)O(|E|\sqrt{|V|}) by using the augmentation path algorithm [25]. Thus, the computational complexity of DM decomposition is O(|E||V|)O(|E|\sqrt{|V|}).

Refer to caption
Figure 1: Construction of DM decomposition. The bold edges represent maximum matching MM.

III Problem Settings

In this section, we formulate MCP0 with forbidden equations for the descriptor system (1).

First, we assume that system (1) is solvable, i.e., for any initial state x(0)x(0) with an admissible input u(t)u(t), there exists a unique solution x(t)x(t) to Eq. (1). This condition is equivalent to

rank(AsF)=n,\displaystyle\operatorname{rank}(A-sF)=n, (2)

where ss is an indeterminant [19] [26].

In this paper, we call system (1) controllable if for any admissible initial state x(0)x(0) that satisfies equation (1), there exists an input u(t)u(t) and a final time T0T\geq 0 such that x(T)=0x(T)=0. This controllability is usually referred to as R-controllability. Additional controllability concepts can be found within the framework of descriptor system theory [27].

An algebraic characterization of controllability can be described as follows [26, 27]:

Proposition 1

Descriptor system (1) is controllable if and only if

rank[AzFB]\displaystyle\operatorname{rank}\left[A-zF\mid B\right] =n,\displaystyle=n, (3)

where zz is any complex number.

System (1) is termed structurally controllable if condition (3) in Proposition 1 holds for (1) with generic matrices FF, AA, and BB. It should be noted that a matrix is considered generic if each nonzero element is an independent parameter. For a more precise definition of the generic matrix, see [19].

We now introduce MCP0 with forbidden equations for descriptor system (1). Let R={e1,,en}R=\{e_{1},\dots,e_{n}\} be a set of equation indices and \mathcal{F} be a subset of RR that denotes forbidden equations. Then, MCP0 with forbidden equations for descriptor system (1) can be formalized as

(4)

where 𝒢n×m\mathcal{G}^{n\times m} denote the set of all n×mn\times m generic matrices. The significant difference between the standard MCP0 and Problem (4) is II) in (4). This constraint limits the input destination.

For instance, consider descriptor system (1) with

F=[0f100f2f300000f4000000f5000000],A=[a10000a20000a3000000a40a500a6a70].\displaystyle F=\begin{bmatrix}0&f_{1}&0&0&f_{2}\\ f_{3}&0&0&0&0\\ 0&f_{4}&0&0&0\\ 0&0&0&f_{5}&0\\ 0&0&0&0&0\end{bmatrix},\ A=\begin{bmatrix}a_{1}&0&0&0&0\\ a_{2}&0&0&0&0\\ a_{3}&0&0&0&0\\ 0&0&a_{4}&0&a_{5}\\ 0&0&a_{6}&a_{7}&0\end{bmatrix}. (6)

Then, R={e1,e2,,e5}R=\{e_{1},e_{2},\dots,e_{5}\}. Let ={e3,e4}\mathcal{F}=\{e_{3},e_{4}\} be the set of indices of forbidden equations. The matrices

B1=[b10000],B2=[0000b20b1000]\displaystyle B_{1}=\begin{bmatrix}b_{1}&0&0&0&0\end{bmatrix}^{\top},\ B_{2}=\begin{bmatrix}0&0&0&0&b_{2}\\ 0&b_{1}&0&0&0\end{bmatrix}^{\top} (7)

satisfy condition II).

IV Analysis and Algorithm

In this section, we provide the analysis and the algorithm of MCP0 with forbidden equations for descriptor system (1) with generic matrices using a graph-theoretic approach.

To this end, we first describe the graph representation of the descriptor system (1) with generic matrices and graph-theoretical controllability. Although there are several graph representations for descriptor system (1) [24, 28, 19], we used the bipartite graph representation [19] in this study. While the directed graph representation is common for system (1) with F=InF=I_{n}, the bipartite graph representation is often used for FInF\neq I_{n} [23].

The bipartite graph G=(V+,V;E)G=(V^{+},V^{-};E) associated with descriptor system (1) is defined as follows: the node sets V+V^{+} and VV^{-} are defined as

{V+:=XU,V:={e1,,en},\displaystyle\begin{cases}V^{+}:=X\cup U,\\ V^{-}:=\{e_{1},\dots,e_{n}\},\end{cases}

where the state node set XX and the input node set UU are defined as

X:={x1,,xn},U:={u1,,um},\displaystyle X:=\{x_{1},\dots,x_{n}\},\quad U:=\{u_{1},\dots,u_{m}\},

respectively, and eie_{i} in VV^{-} corresponds to the ii-th equation of system (1). That is, V+V^{+} consists of state variables and inputs, and VV^{-} is the set of indices of equations. Then, the edge set EE is defined as

E:=EAEFEB,\displaystyle E:=E_{A}\cup E_{F}\cup E_{B}, (8)

with EA:={(ei,xj)Aij0}E_{A}:=\{(e_{i},x_{j})\mid A_{ij}\neq 0\}, EF:={(ei,xj)Fij0}E_{F}:=\{(e_{i},x_{j})\mid F_{ij}\neq 0\} and EB={(ei,uj)Bij0}E_{B}=\{(e_{i},u_{j})\mid B_{ij}\neq 0\}. An edge belonging to EFE_{F} is termed an s-arc. We also define important subgraphs of GG as GAsF=(X,V;EAEF)G_{A-sF}=(X,V^{-};E_{A}\cup E_{F}), G[AB]=(V+,V;EAEB)G_{\left[A\mid B\right]}=(V^{+},V^{-};E_{A}\cup E_{B}), and GA=(X,V;EA)G_{A}=(X,V^{-};E_{A}). For example, the bipartite representation of descriptor system (1) with (6) and B2B_{2} in (7), and its subgraphs are illustrated in Fig. 2.

Refer to caption
(a) GAG_{A}
Refer to caption
(b) GAsFG_{A-sF}
Refer to caption
(c) G[AB]G_{\left[A\mid B\right]}
Refer to caption
(d) GG
Figure 2: Bipartite graph representation of descriptor system (1) with (6) and B2B_{2} in (7). The bold edges represent s-arcs.
Refer to caption
Figure 3: DM decomposition of GAsFG_{A-sF} of descriptor system (1) with (6). The bold edges represent s-arcs.
Refer to caption
Figure 4: DM decomposition of GG of descriptor system (1) with (6) and B1B_{1} in (7). The bold edges represent s-arcs.
Refer to caption
Figure 5: The optimal solution BB in (12) to Problem (4) with ={e3,e4}\mathcal{F}=\{e_{3},e_{4}\}. The bold edges represent the maximum matching MM^{\ast} of G[AB]G_{\left[A\mid B\right]}. The optimality of BB will be shown in Section IV-D.

Furthermore, for a DM component of 𝒢\mathcal{G} that has s-arcs [16], we call it a DM s-component, where 𝒢\mathcal{G} is GG or GAsFG_{A-sF}. Let Gk(k=0,,b,)G_{k}\ (k=0,\dots,b,\infty) be DM components of 𝒢\mathcal{G}, and Gk(k=1,,b)G_{k}\ (k=1,\dots,b) are called consistent DM components; G0G_{0} and GG_{\infty} are termed inconsistent DM components. The maximal consistent DM s-component is a consistent DM s-component GkG_{k} of 𝒢\mathcal{G} such that no other DM s-components are greater than GkG_{k} related to the partial order \preceq. Note that there can be multiple maximal consistent DM s-components.

For instance, consider descriptor system (1) with parameters given in (6). The corresponding DM decomposition of the bipartite representation GAsFG_{A-sF} is depicted in Fig. 3. G1G_{1}, G2G_{2}, and G3G_{3} are the consistent DM components of GAsFG_{A-sF}, and G3G2G1G_{3}\preceq G_{2}\preceq G_{1}. That is, a maximal consistent DM s-component of this graph is G1G_{1}, because there is no edge to enter G1G_{1} from other DM components.

The following graph-theoretic characterization of structural controllability for descriptor system (1) is found in [19].

Proposition 2

Descriptor system (1) is structurally controllable if and only if

  1. 1.

    ν(GAsF)=n\nu(G_{A-sF})=n,

  2. 2.

    ν(G[AB])=n\nu(G_{\left[A\mid B\right]})=n,

  3. 3.

    No consistent DM components of GG contain s-arcs,

where ν(𝒢)\nu(\mathcal{G}) is the size of a maximum matching of a bipartite graph 𝒢\mathcal{G}.

Condition 1) represents the solvability of the system described in Eq. (2) in Section III, and the latter two conditions correspond to (3) in Proposition 1. From assumption (2), condition 1) in Proposition 2 is always satisfied. Assumption (2) also implies that there are no inconsistent DM components G0G_{0} and GG_{\infty} of GAsFG_{A-sF}. This is because if we choose a maximum matching MM with a size of nn in GAsFG_{A-sF}, then V0V_{0} and VV_{\infty} in Steps 3–4 in Algorithm 1 are both empty.

The following lemma describes the characterization of the consistent DM components of GAsFG_{A-sF} and GG.

Lemma 1

Consider descriptor system (1) which satisfies solvability condition (2). Then, the following conditions are equivalent:

  1. 1.

    A node vXVv\in X\cup V^{-} of a consistent DM component GiG_{i} in GAsFG_{A-sF} belongs to an inconsitent DM component G0G_{0} in GG.

  2. 2.

    There is a directed path on G~M\tilde{G}_{M} from an input node uUu\in U to vXVv\in X\cup V^{-} in Step 2 of Algorithm 1 for GG.

Proof

From assumption (2), condition 1) in Proposition 2 holds. This means that we can find the same maximum matching MM with size of nn in Step 1 of Algorithm 1 for GAsFG_{A-sF} and GG. Then, in Step 2 of Algorithm 1, G~M\tilde{G}_{M} of GAsFG_{A-sF} is a directed subgraph of G~M\tilde{G}_{M} of GG, as illustrated in Fig. 1. Also, V+=XUV^{+}=X\cup U, +M=X\partial^{+}M=X, V=MV^{-}=\partial^{-}M. Thus, V++MV^{+}\setminus\partial^{+}M and VMV^{-}\setminus\partial^{-}M in Steps 3 and 4 of Algorithm 1 coincide with UU and \emptyset, respectively. That is, the node sets V0V_{0} and VV_{\infty} of the inconsistent DM components in GG are as follows:

V0=U{vXVuUuG~Mv},V=.\displaystyle V_{0}=U\cup\{v\in X\cup V^{-}\mid\exists u\in U\ u\to_{\tilde{G}_{M}}v\},\ V_{\infty}=\emptyset.

This implies that 1) and 2) are equivalent. \Box

For instance, consider descriptor system (1) with (6) and B1B_{1} in (7). The DM decomposition of the bipartite representation GG is depicted in Fig. 4. G0G_{0} is the inconsistent DM component, G1G_{1} is the consistent DM component, and G0G1G_{0}\preceq G_{1}. That is, G1G_{1} is the maximal consistent DM s-component. Then, the consistent DM component G1G_{1} in GAsFG_{A-sF} (Fig 3) is also consistent in GG (Fig. 4), since there is no directed path from u1u_{1} to e2e_{2} or x1x_{1} in GG. Note that in general, there is a directed path from uUu\in U to xXx\in X, because edges in a matching are undirected.

Lemma 1 gives another characterization of the structural controllability condition for system (1) which satisfies solvability condition (2). This property will be used in the proof of Theorem 1 in the next subsection.

Corollary 1

Consider descriptor system (1) which satisfies solvability condition (2). Then, descriptor system (1) is structurally controllable if and only if

  • 2’)

    ν(G[AB])=n\nu(G_{\left[A\mid B\right]})=n,

  • 3’)

    For each maximal consistent DM s-component GiG_{i} in GAsFG_{A-sF}, which is a subgraph of GG, there is a directed path on G~M\tilde{G}_{M} from UU to GiG_{i} in Step 2 of Algorithm 1 for GG.

Proof

From assumption (2), condition 1) in Proposition 2 holds. Condition 2’) is equivalent to condition 2) in Proposition 2. Also, condition 3) in Proposition 2 holds if and only if all nodes vXVv\in X\cup V^{-} of consistent DM s-components GiG_{i} in GAsFG_{A-sF} belong to an inconsistent DM s-component G0G_{0} in GG, since consistent DM s-components contain s-arcs. Using Lemma 1, this is equivalent to the following:

  • 3*)

    For each consistent DM s-component GiG_{i} in GAsFG_{A-sF}, which is a subgraph of GG, there is a directed path on G~M\tilde{G}_{M} from UU to GiG_{i}.

This condition is also equivalent to 3’) in Corollary 1, since the non-maximal consistent DM components in GAsFG_{A-sF} have a directed path from the maximal consistent DM component in GAsFG_{A-sF} from the definition of the partial order \preceq. \Box

Consider descriptor system (1) with AA and FF given in (6) and B1B_{1} in (7) again. In GAsFG_{A-sF}, there is no directed path from u1u_{1} to G1G_{1} (Fig. 4). This means condition 3’) in Corollary 1 does not hold. Thus, descriptor system (1) with (6) and B1B_{1} in (7) is not structurally controllable.

IV-A Existence of solution to Problem (4)

Unlike the traditional MCP0, it is not obvious whether or not an optimal solution exists for MCP0 with forbidden equations. By using Proposition 2 and Corollary 1, we obtain the following theorem which characterizes the existence of solutions to Problem (4). This theorem is employed to construct the optimal solution to Problem (4) in Section IV-D.

Theorem 1

Problem (4) has a solution if and only if both of the following conditions hold simultaneously:

  1. a).

    For each node set ViV_{i} of maximal consistent DM s-components GiG_{i} in GAsFG_{A-sF}, there exists eViVe\in V_{i}\cap V^{-} such that ee\not\in\mathcal{F}.

  2. b).

    The graph-theoretic problem

    {maximize𝑀|M|subject toM is matching of GA,M\displaystyle\begin{cases}\underset{\text{$M$}}{\text{maximize}}&|M|\\ \text{subject to}&\text{$M$ is matching of $G_{A}$,}\\ &\mathcal{F}\subseteq\partial^{-}M\end{cases} (10)

    is feasible.

Proof

We assume that B𝒢n×mB\in\mathcal{G}^{n\times m} is a solution to Problem (4), and prove that conditions a) and b) hold. Note that this BB defines EBE_{B} in (8). Suppose that a maximal consistent DM s-component GiG_{i} of GAsFG_{A-sF}, which is a subgraph of GG, is not connected to UU, where UU denotes the set of input nodes. This means that there is no directed path on G~M\tilde{G}_{M} for GG from UU to GiG_{i} in Step 2 of Algorithm 1. From Corollary 1, this implies that system (1) with the given BB is not structurally controllable, which contradicts the assumption. Thus, in GAsFG_{A-sF}, for the all node set ViV_{i} of maximal consistent DM s-components GiG_{i}, there exists an equation node eVVie\in V^{-}\cap V_{i} which is connected to an input uUu\in U. This means that ee\not\in\mathcal{F} and condition a) holds. Moreover, condition 2) in Proposition 2 implies that the maximum matching MM^{\ast} of G[AB]=(V+,VU;EEB)G_{[A\mid B]}=(V^{+},V^{-}\cup U;E\cup E_{B}) and |M|=n|M^{\ast}|=n exists. Then, MEBM^{\ast}\setminus E_{B} is a matching in GAG_{A} and (MEB)\partial^{-}(M^{\ast}\setminus E_{B}) contains \mathcal{F} since EBV\partial^{-}E_{B}\subseteq V^{-}\setminus\mathcal{F} (Fig. 5). Thus, MEBM^{\ast}\setminus E_{B} is a feasible solution to Problem (10), and condition b) holds.

Next, we assume that conditions a) and b) hold, and prove that Problem (4) has a solution. Consider the input nodes UU with a size of n|M|n-|M^{\ast}|, where MM^{\ast} is the optimal solution to Problem (10). Then we can connect each equation node eVMVe\in V^{-}\setminus\partial^{-}M^{\ast}\subseteq V^{-}\setminus\mathcal{F} to an input node. This means that the edge set EBE_{B} in (8) with size |EB|=n|M||E_{B}|=n-|M^{\ast}| was constructed and forms a part of a matching of G[AB]G_{\left[A\mid B\right]}. That is, MEBM^{\ast}\cup E_{B} is a maximum matching of G[AB]G_{\left[A\mid B\right]}, and thus condition 2’) in Corollary 1 holds. Also, for each maximal consistent DM s-component ViV_{i} of GAsFG_{A-sF}, we can connect an equation node eVie\in V_{i}\setminus\mathcal{F} to an input from condition a). That is, all maximal consistent DM s-components of GAsFG_{A-sF} have directed paths from the input node set UU. This means that condition 3’) in Corollary 1 holds. Thus, Problem (4) has a solution. \Box

Theorem 1 implies that the existence of an optimal solution to MCP0 with forbidden equations for system (1) can be verified using pure graph theory.

For instance, consider descriptor system (1) with (6) depicted in Figs. 2 and 3.

  1. 1.

    Consider the case ={e1,e3}\mathcal{F}=\{e_{1},e_{3}\}. Then, MCP0 with \mathcal{F} is not feasible since condition b) in Theorem 1 does not hold. In fact, the maximal consistent DM s-component G1G_{1} in GAsFG_{A-sF} has a node e2e_{2} which does not belong to \mathcal{F}. This means that condition a) in Theorem 1 holds. However, since a set of nodes that connect to e1e_{1} or e3e_{3} is {x1}\{x_{1}\} in GAG_{A} in Fig. 2-(a), there is no matching MM of GAG_{A} which satisfies M\mathcal{F}\subseteq\partial^{-}M. Thus, Problem (10) is not feasible.

  2. 2.

    Consider the case ={e2}\mathcal{F}=\{e_{2}\}. Then, MCP0 with \mathcal{F} is not feasible since condition a) does not hold. In fact, we can choose a feasible solution for Problem (10) as M:={(e2,x1)}M_{\mathcal{F}}:=\{(e_{2},x_{1})\} which satisfies M={e2}\partial^{-}M_{\mathcal{F}}=\{e_{2}\}\supseteq\mathcal{F}. Thus, condition b) holds. However, a node of a maximal consistent DM s-component G1G_{1} in GAsFG_{A-sF} is only e2e_{2} and e2e_{2}\in\mathcal{F}.

IV-B Optimal value for Problem (4)

Using the solution to Problem (10), we can compute the optimal value for Problem (4).

Theorem 2

Suppose that an optimal solution to Problem (4) exists. If the optimal value of Problem (10) is mm^{\ast}, then the minimum number of inputs that satisfy the constraints of Problem (4) is

nD=max{nm,1}.\displaystyle n_{D}=\max\{n-m^{\ast},1\}. (11)
Proof

We assume that BB is an optimal solution with nDn_{D} column size to Problem (4), and prove that nDnmn_{D}\geq n-m^{\ast}, where mnm^{*}\leq n by the definition. To this end, we assume nD<nmn_{D}<n-m^{\ast}. From condition 2) in Proposition 2, ν(G[AB])=n\nu(G_{\left[A\mid B\right]})=n holds. Let MM be a maximum matching of G[AB]G_{\left[A\mid B\right]}. Then, M:=MEBM^{\prime}:=M\setminus E_{B} is a feasible solution to Problem (10) and |M|nnD|M^{\prime}|\geq n-n_{D}. Thus, we obtain |M|>m|M^{\prime}|>m^{\ast}. This contradicts the maximality of mm^{\ast}.

If nD=0n_{D}=0, the corresponding system of the form (1) does not satisfy condition I) of Problem (4). Thus, nDmax{nm,1}n_{D}\geq\max\{n-m^{\ast},1\}.

To prove that the equality holds, that is, (11) holds, we assume that MM_{\mathcal{F}}^{\ast} is an optimal solution to Problem (10) such that |M|=m|M_{\mathcal{F}}^{\ast}|=m^{\ast}, and construct a system that satisfies the constraints of Problem (4) as follows.

  1. 1.

    Connect each input node to a node of VMV^{-}\setminus\partial^{-}M_{\mathcal{F}}^{\ast}. Then, ν(G[AB])=n\nu(G_{\left[A\mid B\right]})=n is satisfied and i.e., condition 2’) in Corollary 1 holds.

  2. 2.

    Connect the input nodes to all maximal consistent DM s-components of GAsFG_{A-sF}. Then condition 3’) in Corollary 1 is satisfied without increasing the number of input nodes.

A system constructed by 1) and 2) satisfies condition I) of Problem (4). Moreover, a system constructed by 1) satisfies condition II), which is equivalent to that EBV\partial^{-}E_{B}\subseteq V^{-}\setminus\mathcal{F}. This is because M\mathcal{F}\subseteq\partial^{-}M_{\mathcal{F}}^{\ast}. Note that in 2), we can choose nodes so that condition II) is satisfied, because condition a) in Theorem 1 implies that all maximal consistent DM s-component has at least one node that is not in \mathcal{F}. Therefore, this system of the form (1) satisfies the constraints of Problem (4) and nDn_{D} is given by (11). \Box

If the set \mathcal{F} of forbidden equations is empty, Eq. (11) can be written as nD=max{nν(GA),1}n_{D}=\max\{n-\nu(G_{A}),1\}. This result is consistent with the result of the standard MCP0 for system (1) [16].

The argument in the proof of Theorem 2 will be used to develop an algorithm for Problem (4) in Section IV-D.

IV-C Algorithm for Problem (10)

Algorithm 2 describes an algorithm for solving Problem (10) based on an alternating path algorithm [25]. Steps 1–4 check the feasibility of solving Problem (10). This is because if there is a feasible solution MM to Problem (10), by restricting the matching nodes in M\partial^{-}M to M\mathcal{F}\cap\partial^{-}M, a matching MM_{\mathcal{F}} of G=(V+,;EA)G_{\mathcal{F}}=(V^{+},\mathcal{F};E_{A}) is obtained that satisfies ||=|M||\mathcal{F}|=|M_{\mathcal{F}}| (Fig. 6). The converse is shown to hold by the following alternating path algorithm in Steps 5–9, as shown in the proof of Theorem 3.

Refer to caption
Figure 6: GAG_{A} and G=(V+,;EA)G_{\mathcal{F}}=(V^{+},\mathcal{F};E_{A}). The bold edges on the left are a feasible solution MM to Problem (10) while the right is a matching MM_{\mathcal{F}} of GG_{\mathcal{F}} which satisfies ||=|M||\mathcal{F}|=|M_{\mathcal{F}}|.

The alternating path algorithm that is used in Steps 5–9 is explained as follows: Let MM^{\ast} be a maximum matching of GAG_{A} which does not satisfy the condition M\mathcal{F}\subseteq\partial^{-}M^{\ast} in (10). That is, MM^{\ast} is not a feasible solution to Problem (10). Note that MM^{\ast} can be computed by the Hopcraft-Karp algorithm [25]. Then, vMv^{-}\in\mathcal{F}\setminus\partial^{-}M^{\ast} exists. Suppose a path

P\displaystyle P =p1Mp2M\displaystyle=p_{1}\not\in M^{\ast}\to p_{2}\in M^{\ast}\to\cdots
p2l1Mp2lM,l=1,2,,\displaystyle\to p_{2l-1}\not\in M^{\ast}\to p_{2l}\in M^{\ast},\quad l=1,2,\dots,

exists, which starts with vv^{-} and ends with vtVv_{t}^{-}\in V^{-}\setminus\mathcal{F}. Then, a new maximum matching MM^{\prime} is defined by the symmetric difference (MP)(PM)(M^{*}\setminus P)\cup(P\setminus M^{*}) between MM^{\ast} and PP. Moreover, the number of M\mathcal{F}\setminus\partial^{-}M^{\prime} is just one less than the number of M\mathcal{F}\setminus\partial^{-}M^{\ast} since M=(M{vt}){v}\partial^{-}M^{\prime}=(\partial^{-}M^{\ast}\setminus\{v_{t}^{-}\})\cup\{v^{-}\}. This procedure is illustrated in Fig. 7. By repeating this process, we can finally have a maximum matching MM_{\mathcal{F}}^{\ast} of GAG_{A} which satisfies M\mathcal{F}\subseteq\partial^{-}M_{\mathcal{F}}^{\ast}. Note that from the construction of the alternating path, no paths that start at different vertices vMv^{-}\in\mathcal{F}\setminus\partial^{-}M^{\ast} share edges with each other. This means that all desired alternating paths can be found by visiting each edge only once. Thus, we can execute Steps 6–9 by the breadth-first search algorithm with time complexity of O(|E|+|V|)O(|E|+|V|) [25].

Refer to caption
Figure 7: Alternating path algorithm.
Algorithm 2 Algorithm for solving Problem (10)
1:Find the maximum matching MM^{\ast}_{\mathcal{F}} of the graph G:=(V+,;EA)G_{\mathcal{F}}:=(V^{+},\mathcal{F};E_{A}).
2:if ||>|M||\mathcal{F}|>|M^{\ast}_{\mathcal{F}}| then
3:    Problem (10) is infeasible.
4:end if
5:Find the maximum matching MM^{\ast} of GAG_{A}.
6:for vMv^{-}\in\mathcal{F}\setminus\partial^{-}M^{\ast} do
7:    Find an alternating path P={p1,,p2l}P=\{p_{1},\cdots,p_{2l}\} which starts with vv^{-} and ends with vtVv_{t}^{-}\in V^{-}\setminus\mathcal{F}
8:    M:=M{p1,p3,,p2l1}{p2,p4,,p2l}M^{\ast}:=M^{\ast}\cup\{p_{1},p_{3},\cdots,p_{2l-1}\}\setminus\{p_{2},p_{4},\cdots,p_{2l}\}
9:end for
10:Output MM^{\ast}.
Algorithm 3 Algorithm for solving Problem (4)
1:if condition a) in Theorem 1 is not satisfied then
2:    Problem (4) is infeasible.
3:end if
4:Run Algorithm 2 and let MM^{\ast} be its output that is an optimal solution to Problem (10).
5:Connect inputs U:={u1,,unD}U:=\{u_{1},\dots,u_{n_{D}}\} to each equation node of VMV^{-}\setminus\partial^{-}M^{\ast}, where nDn_{D} is (11) in Theorem 2.
6:Connect inputs UU to an arbitrary node of each maximal consistent DM s-components of GAsFG_{A-sF}, which does not belong to \mathcal{F}.
Theorem 3

If Problem (10) is feasible, Algorithm 2 outputs the optimal solution of Problem (10).

Proof

Let MM^{\ast} be a maximum matching of GAG_{A}. From the feasibility assumption of Problem (10), there exists a maximum matching MM_{\mathcal{F}}^{\ast} of the bipartite graph (V+,V;EA)(V^{+},V^{-}\cap\mathcal{F};E_{A}) by Steps 1–4 in Algorithm 2. Because of the construction of Algorithm 2, it is sufficient to show that there is an alternating path PP for each vMv^{-}\in\mathcal{F}\setminus\partial^{-}M^{\ast}. In particular, we show that such PP alternates between edges of MM^{\ast} and MMM_{\mathcal{F}}^{\ast}\setminus M^{\ast}. From the definition of MM_{\mathcal{F}}^{\ast}, an edge pMp\in M_{\mathcal{F}}^{\ast} exists that connects to vv^{-}. Also, there exists pMp^{\prime}\in M^{\ast} that +p=+p\partial^{+}p^{\prime}=\partial^{+}p. This is because otherwise M{p}M^{\ast}\cup\{p\} is a matching, whose size is larger than MM^{\ast} and this contradicts the maximality of MM^{\ast}. Thus, there is a path with alternating the edges of MM^{\ast} and MMM_{\mathcal{F}}^{\ast}\setminus M^{\ast} with a length of at least 2. To show that all alternating paths end with a node vtv_{t}^{-} of VV^{-}, not of V+V^{+}, suppose that an alternating path PP exists that ends with v~+V+\tilde{v}^{+}\in V^{+}. We also assume that PP alternates between the edges of MM^{\ast} and MMM_{\mathcal{F}}^{\ast}\setminus M^{\ast}. In this case, we have |MP|=|MP|+1|M_{\mathcal{F}}^{\ast}\cap P|=|M^{\ast}\cap P|+1, since PP must start with p1Mp_{1}\in M_{\mathcal{F}}^{\ast} and end with p2l1Mp_{2l-1}\in M_{\mathcal{F}}^{\ast} (Fig. 8). Thus, by replacing the MPM^{\ast}\cap P edges with MPM_{\mathcal{F}}^{\ast}\cap P edges, we can obtain a matching larger than MM^{\ast} in size. This contradicts the maximality of MM^{\ast}. Thus, p2lMp_{2l}\in M^{\ast} exists and P{p2l}P\cup\{p_{2l}\} is an alternating path. That is, p2lp_{2l} connects vtVv_{t}^{-}\in V^{-}. If vtVv_{t}^{-}\in V^{-}\cap\mathcal{F}, there is an edge pMMp^{\prime}\in M_{\mathcal{F}}^{\ast}\setminus M^{\ast} that satisfies vt=pv_{t}^{-}=\partial^{-}p^{\prime}, and P{p2l}{p}P\cup\{p_{2l}\}\cup\{p^{\prime}\} is a new alternating path between the edges of MM^{\ast} and MMM_{\mathcal{F}}^{\ast}\setminus M^{\ast}. Thus, by inductively applying the above argument, we finally have an alternating path PP which ends with a node of VV^{-}\setminus\mathcal{F}. \Box

Refer to caption
Figure 8: Alternating path P={p1,p2,p2l1}P=\{p_{1},p_{2}\dots,p_{2l-1}\}. p1,p3,,p2l1p_{1},p_{3},\dots,p_{2l-1} are in MM_{\mathcal{F}}^{\ast}, and p2,p4,,p2l2p_{2},p_{4},\dots,p_{2l-2} are in MM^{\ast}.

To explain how Algorithm 2 works, consider Problem (10) with GAG_{A} of descriptor system (6) and forbidden equations ={e3,e4}\mathcal{F}=\{e_{3},e_{4}\}. We can choose MM_{\mathcal{F}}^{\ast} in Step 1 of Algorithm 2 as M={(e3,x1),(e4,x3)}M_{\mathcal{F}}^{\ast}=\{(e_{3},x_{1}),(e_{4},x_{3})\}. In Step 5, we have the maximum matching M={(e3,x1),(e4,x3),(e5,x4)}M^{\ast}=\{(e_{3},x_{1}),(e_{4},x_{3}),(e_{5},x_{4})\}. Moreover, Step 6–9 illustrated in Fig. 9 produces the new maximum matching M={(e3,x1),(e4,x3),(e5,x4)}M^{\prime}=\{(e_{3},x_{1}),(e_{4},x_{3}),(e_{5},x_{4})\} that satisfies M={e3,e4,e5}\mathcal{F}\subseteq\partial^{-}M^{\prime}=\{e_{3},e_{4},e_{5}\} in (10). In fact, we can find an alternating path P={(e1,x1),(e3,x1)}P=\{(e_{1},x_{1}),(e_{3},x_{1})\} and obtain the new matching MM^{\prime}.

Refer to caption
Figure 9: Example of Step 6–9 in Algorithm 2. The bold edges represent MM^{\ast} (left) and MM^{\prime} (right).

IV-D Algorithm for Problem (4)

Algorithm 3 shows an algorithm for solving Problem (4) and has the following property.

Theorem 4

If Problem (4) has a feasible solution, then Algorithm 3 outputs the optimal solution to Problem (4). If Problem (4) is infeasible, Algorithm 3 determines the infeasibility. Furthermore, the time complexity is O(|V|+|E||V|)O(|V|+|E|\sqrt{|V|}).

Proof

Algorithm 3 is based on the argument in the proof of Theorem 2. Steps 1–4 determine whether or not Problem (4) is feasible, and Steps 1–3 are computed by Algorithm 1. Step 4 checks condition b) in Theorem 1 and output an optimal solution MM^{\ast} of Problem (10). Steps 5 and 6 in Algorithm 3 output the optimal solution to Problem (4), as shown in the proof of Theorem 2.

Next, we show that the time complexity is O(|V|+|E||V|)O(|V|+|E|\sqrt{|V|}). Step 1–3 in Algorithm 3 can be checked by Algorithm 1, its time complexity is O(|E||V|)O(|E|\sqrt{|V|}). The time complexity of Step 4 is O(|V|+|E||V|)O(|V|+|E|\sqrt{|V|}). In fact, in Steps 1–5 in Algorithm 2 are computed by using the Hopcroft-Karp algorithm[25], the time complexity is O(|E||V|)O(|E|\sqrt{|V|}). Moreover, Steps 6–9 in Algorithm 2 can be computed by breadth-first search algorithm in O(|V|+|E|)O(|V|+|E|), as mentioned already. Steps 5–6 in Algorithm 3 can be computed in O(|V|)O(|V|) at most. Therefore, the time complexity of Algorithm 2 is O(|V|+|E||V|)O(|V|+|E|\sqrt{|V|}). \Box

Theorem 4 means that more general problems than those of [7, 16] can be solved with the same computational complexity. In fact, the problem addressed by [7] is a special case of Problem (4) with =\mathcal{F}=\emptyset and F=InF=I_{n}, and it can be solved in O(|V|+|E||V|)O(|V|+|E|\sqrt{|V|}). Moreover, the algorithm proposed in [16] deals with Problem (4) with =\mathcal{F}=\emptyset, and the time complexity is O(|V|+|E||V|)O(|V|+|E|\sqrt{|V|}).

To illustrate how Algorithm 3 works, consider descriptor system (1) with (6) and forbidden equations ={e3,e4}\mathcal{F}=\{e_{3},e_{4}\}. In this case, Steps 1–4 determine that Problem (4) is feasible. In fact, the maximal consistent DM s-component G1G_{1} in Fig. 3 has a node e2e_{2} which does not belong to \mathcal{F}. Also, in Step 4, we obtain M={(e3,x1),(e4,x3),(e5,x4)}M^{\ast}=\{(e_{3},x_{1}),(e_{4},x_{3}),(e_{5},x_{4})\} from the discussion of how Algorithm 2 works in IV-C. Thus, Problem (4) is feasible, since conditions a) and b) in Theorem 1 hold. Furthermore, Steps 5 and 6 produce

B=[b200000b1000],\displaystyle B=\begin{bmatrix}b_{2}&0&0&0&0\\ 0&b_{1}&0&0&0\end{bmatrix}^{\top}, (12)

that is an optimal solution to Problem (4). In fact, from Theorem 2, we have the minimum number of inputs nD=n|M|=2n_{D}=n-|M^{\ast}|=2. Also, VM={e1,e2}V^{-}\setminus\partial^{-}M^{\prime}=\{e_{1},e_{2}\}. Thus, connecting u1u_{1} to e1e_{1}, and u2u_{2} to e2e_{2} , we have BB as (12).

V Conclusion

In this study, we introduced the forbidden equations to MCP0 for structural descriptor systems. We gave a necessary and sufficient condition for the existence of solutions to the problem and provided the solution to MCP0. The algorithm for solving the problem can be computed in polynomial time as for the standard MCP0. That is, our proposed algorithm is well positioned for applications to large-scale descriptor systems.

In this paper, we focused on MCP0 for a structural descriptor system, since, for a structural descriptor system, MCP1 is NP-hard in general as shown in [16]. Thus, finding a solvable condition for MCP1 with forbidden equations in polynomial time would be a future project.

Furthermore, structural controllability considered in this paper requires that the system parameters be algebraically independent. This means that all non-zero system parameters are free, which may be a strong assumption for practical situations. To avoid this assumption, strong structural controllability has been proposed in [29], and studied from a graph-theoretic perspective in [30]. A strong structural controllability problem version in this paper is one of the future works.

Acknowledgment

This work was supported by the Japan Society for the Promotion of Science KAKENHI under Grant 20K14760 and 23K03899.

References

  • [1] M. Mesbahi and M. Egerstedt, Graph theoretic methods in multiagent networks.   Princeton University Press, 2010.
  • [2] A. Rahmani, M. Ji, M. Mesbahi, and M. Egerstedt, “Controllability of multi-agent systems from a graph-theoretic perspective,” SIAM Journal on Control and Optimization, vol. 48, no. 1, pp. 162–186, 2009.
  • [3] S. Gu, F. Pasqualetti, M. Cieslak, Q. K. Telesford, B. Y. Alfred, A. E. Kahn, J. D. Medaglia, J. M. Vettel, M. B. Miller, S. T. Grafton et al., “Controllability of structural brain networks,” Nature Communications, vol. 6, no. 1, pp. 1–10, 2015.
  • [4] S. F. Muldoon, F. Pasqualetti, S. Gu, M. Cieslak, S. T. Grafton, J. M. Vettel, and D. S. Bassett, “Stimulation-based control of dynamic brain networks,” PLoS Computational Biology, vol. 12, no. 9, p. e1005076, 2016.
  • [5] G. A. Pagani and M. Aiello, “The power grid as a complex network: a survey,” Physica A: Statistical Mechanics and its Applications, vol. 392, no. 11, pp. 2688–2700, 2013.
  • [6] D.-S. Yang, Y.-H. Sun, B.-W. Zhou, X.-T. Gao, and H.-G. Zhang, “Critical nodes identification of complex power systems based on electric cactus structure,” IEEE Systems Journal, vol. 14, no. 3, pp. 4477–4488, 2020.
  • [7] Y.-Y. Liu, J.-J. Slotine, and A.-L. Barabási, “Controllability of complex networks,” Nature, vol. 473, no. 7346, pp. 167–173, 2011.
  • [8] F. Pasqualetti, S. Zampieri, and F. Bullo, “Controllability metrics, limitations and algorithms for complex networks,” IEEE Transactions on Control of Network Systems, vol. 1, no. 1, pp. 40–52, 2014.
  • [9] T. H. Summers, F. L. Cortesi, and J. Lygeros, “On submodularity and controllability in complex dynamical networks,” IEEE Transactions on Control of Network Systems, vol. 3, no. 1, pp. 91–101, 2015.
  • [10] A. Clark, B. Alomair, L. Bushnell, and R. Poovendran, “Submodularity in input node selection for networked linear systems: Efficient algorithms for performance and controllability,” IEEE Control Systems Magazine, vol. 37, no. 6, pp. 52–74, 2017.
  • [11] L. Romao, K. Margellos, and A. Papachristodoulou, “Distributed actuator selection: Achieving optimality via a primal-dual algorithm,” IEEE Control Systems Letters, vol. 2, no. 4, pp. 779–784, 2018.
  • [12] K. Sato and A. Takeda, “Controllability maximization of large-scale systems using projected gradient method,” IEEE Control Systems Letters, vol. 4, no. 4, pp. 821–826, 2020.
  • [13] A. Olshevsky, “Minimal controllability problems,” IEEE Transactions on Control of Network Systems, vol. 1, no. 3, pp. 249–258, 2014.
  • [14] S. Pequito, S. Kar, and A. P. Aguiar, “A framework for structural input/output and control configuration selection in large-scale systems,” IEEE Transactions on Automatic Control, vol. 61, no. 2, pp. 303–318, 2015.
  • [15] A. Clark, B. Alomair, L. Bushnell, and R. Poovendran, “Input selection for performance and controllability of structured linear descriptor systems,” SIAM Journal on Control and Optimization, vol. 55, no. 1, pp. 457–485, 2017.
  • [16] S. Terasaki and K. Sato, “Minimal controllability problems on linear structural descriptor systems,” IEEE Transactions on Automatic Control, vol. 67, no. 5, pp. 2522–2528, 2022.
  • [17] C.-T. Lin, “Structural controllability,” IEEE Transactions on Automatic Control, vol. 19, no. 3, pp. 201–208, 1974.
  • [18] L. Dai, Singular control systems.   Springer, 1989.
  • [19] K. Murota, Matrices and matroids for systems analysis.   Springer Science & Business Media, 2009.
  • [20] G.-R. Duan, Analysis and design of descriptor linear systems.   Springer Science & Business Media, 2010.
  • [21] Y.-Y. Liu and A.-L. Barabási, “Control principles of complex systems,” Reviews of Modern Physics, vol. 88, p. 035006, 2016.
  • [22] G. Ramos, A. P. Aguiar, and S. Pequito, “An overview of structural systems theory,” Automatica, vol. 140, p. 110229, 2022.
  • [23] K. Murota, “Structural controllability of a system in descriptor form expressed in terms of bipartite graphs (in japanese),” Transactions of the Society of Instrument and Control Engineers, vol. 20, no. 3, pp. 272–274, 1984.
  • [24] K. J. Reinschke and G. Wiedemann, “Digraph characterization of structural controllability for linear descriptor systems,” Linear Algebra and its Applications, vol. 266, pp. 199–217, 1997.
  • [25] B. Korte, J. Vygen, B. Korte, and J. Vygen, Combinatorial optimization.   Springer, 2012, vol. 2.
  • [26] E. Yip and R. Sincovec, “Solvability, controllability, and observability of continuous descriptor systems,” IEEE Transactions on Automatic Control, vol. 26, no. 3, pp. 702–707, 1981.
  • [27] T. Berger and T. Reis, “Controllability of linear differential-algebraic systems—a survey,” in Surveys in differential-algebraic equations I.   Springer, 2013, pp. 1–61.
  • [28] T. Yamada and D. Luenberger, “Generic controllability theorems for descriptor systems,” IEEE Transactions on Automatic Control, vol. 30, no. 2, pp. 144–152, 1985.
  • [29] H. Mayeda and T. Yamada, “Strong structural controllability,” SIAM Journal on Control and Optimization, vol. 17, no. 1, pp. 123–138, 1979.
  • [30] J. Jia, H. J. Van Waarde, H. L. Trentelman, and M. K. Camlibel, “A unifying framework for strong structural controllability,” IEEE Transactions on Automatic Control, vol. 66, no. 1, pp. 391–398, 2021.