Skip to main content
Entropy logoLink to Entropy
. 2018 Mar 19;20(3):204. doi: 10.3390/e20030204

Output-Feedback Control for Discrete-Time Spreading Models in Complex Networks

Luis A Alarcón Ramos 1, Roberto Bernal Jaquez 2,*, Alexander Schaum 3
PMCID: PMC7512718  PMID: 33265295

Abstract

The problem of stabilizing the spreading process to a prescribed probability distribution over a complex network is considered, where the dynamics of the nodes in the network is given by discrete-time Markov-chain processes. Conditions for the positioning and identification of actuators and sensors are provided, and sufficient conditions for the exponential stability of the desired distribution are derived. Simulations results for a network of N=106 corroborate our theoretical findings.

Keywords: complex networks, discrete-time Markov-chain spreading models, feedback control

1. Introduction

Modeling, analysis and control of the spreading of information and of infectious diseases have become a relevant problem of an interdisciplinary nature. Studies on spreading range from propagation of computer viruses in networks [1,2,3,4], epidemics in human populations [5,6,7,8,9,10,11,12], to spreading of rumors and information [13,14,15,16].

One of the early works for epidemic spreading [17] gave birth to the so-called SIRmodel that divides the population into three different compartments or groups: susceptible, infected and recover (or removed); and later, as many diseases do not confer any immunity, a simplified version of the SIR model was created, the so-called SIS (Susceptible-Infected-Susceptible) model, which has become one of the classical model of disease spreading. Although this model was proposed for modeling spreading in populations with no structure, nowadays, the SIS model has been extended to model the spreading process in a population mapped on a complex network.

In the field of computer virus propagation, Kephart and White [18,19] proposed one of the first models on networks, the so-called homogeneous model. This model is called homogeneous because every node of the network has the same probability of interaction with other nodes. Using a rate of infection and a death rate, they were able to calculate the infection threshold. Unfortunately, this model fails to capture real-world complexity. Data available show that real-world computer networks are not homogeneous and, instead, follow a power law structure in the number of connections of the nodes [20,21,22].

Another important method to study disease propagation is the so-called Degree Mean Field Approximation model (DMFA), which considers nodes with the same degree as dynamically equivalent [23]. Using this model, it is possible to calculate the epidemic threshold. Although this approach is quite interesting, it is not applicable in many realistic cases because nodes with the same degree do not necessarily behave the same way. Besides, the model does not provide information about the probability of individual nodes.

In recent years, Markov chain-based models for a Susceptible-Infected-Susceptible (SIS) dynamics over complex networks have been used [8,9,10,11,12,24]. Using these models, it is possible to determine the macroscopic properties of the system, as well as the description of the dynamics of individual nodes. One interesting result is that the calculated infection threshold depends on the value of the spectral radius of the adjacency matrix.

In spite of the fact that an increasing number of studies on the analysis of epidemic spreading have been published in the last decade, the studies dedicated to the control of these process are not very great in number. Different authors with interesting insights have been working on this subject, but at the end, we have three main categories for controlling complex networks (see also [25]): spectral control, optimal control and heuristic feedback control.

In the spectral optimization control methods, one of the goals is to make the eigenvalue λ(A) of the adjacency matrix A as small as possible. This could be achieved removing nodes from A that could be feasible by either immunizing or quarantining certain individuals [26]. The removal of links to reduce λ is also possible isolating cities or, more difficultly, restricting interactions among individuals.

In the optimization control methods for complex networks, the necessary and sufficient condition for spreading extinction poses an optimal control problem, where the curing rates are allowed to vary over time, depending on the evolving state of the system.

In [27], the linearization of the non-linear Markovian equation for the SIR model is studied around the extinction state and showed that the optimal solution is a bang-bang controller with at most one switch. This kind of control deserves further research, although, up to this date, it presents several flaws: it assumes that direct control over infection and recovery rates is always possible. These assumptions considered that these probabilities can be controlled for an entire population in an instantaneous way, which generally is unfeasible in a human population. This method is considered in different works [28,29].

In the heuristic feedback control extensions of the SIS and SIRS (Susceptible-Infectious-Recovered- Susceptible) model are considered. In this case, the model and its control are developed concurrently in such a way that the stability conditions can be derived. For example, in these models, we can have states corresponding to individuals that disconnect themselves from the net when they suspect that they have become infected (Protected state (P)). This means that control structures are already built in and available in the model itself in a heuristic fashion. As examples in the literature, we have the works of [30,31], which gives humans the possibility to take actions once they are in an Aware state (A). One of the flaws of these models is their great specificity.

In this work, we will study the spreading of information (diseases, rumors, gossip) using a Markov chain-based model for a Susceptible-Infected-Susceptible (SIS) dynamics over complex networks that has been used by different authors [8,9,10,11,12].

Using this model, we present a solution for the long-standing problem of epidemic spreading extinction. First of all, we present a model that generalizes the interaction among nodes and reproduces results after choosing some particular interaction. Afterwards, we determine sufficient conditions for stabilizing the spreading of information to the extinction state in complex networks of arbitrary topology. At the same time, these conditions give us a clue about how viruses are propagated, allowing us to identify the nodes that do not need any control to reach the extinction state and to distinguish them from the nodes that need to be controlled. Inspired by the ideas of control theory, we associate the set of nodes that do not need to be controlled (in order to reach the extinction state) with the zero dynamics of the system [32]. The set of nodes to be monitored and controlled are identified, as well, and a feedback control is applied to them in order to stabilize the extinction state. Accordingly, we have proven that the extinction state is an asymptotically-stable fixed point for the zero dynamics.

We performed numerical simulations using a scale-free complex network constructed as disused by Barabasi et al. [22] with one million nodes and show a complete agreement of the numerical results with our theoretical findings.

The remainder of this paper is organized as follows: Section 2 presents the problem statement and definitions. In Section 3, we determine sufficient conditions that allow us to identify the set of nodes that need to be controlled in order to reach the extinction state. In Section 4, we propose a linear feedback control to stabilize the system. Simulations and results are shown in Section 5. Finally, in Section 6, the conclusions are presented.

2. Problem Formulation

In this section, (i) the considered class of systems is introduced and the underlying model discussed, and (ii) the specific control problem addressed in this study is introduced.

2.1. System Class

Consider a network of N nodes described by an undirected graph G(V,E) with V={v1,v2,,vN} being the set of nodes and E={ei,j} the connecting edges, together with the corresponding adjacency matrix A={aij} where aij=1 if (i,j)E, and zero otherwise. According to the graph G(V,E), the neighbors’ set Vi of a node viV is defined as:

Vi={vjV|aij=aji=1}V, (1)

and the number of neighbors (or degree) is given by Ni=|Vi|.

The underlying process for every node is depicted in Figure 1, as a discrete time Markov process.

Figure 1.

Figure 1

State transition diagram for a node viV.

According to Figure 1, a node viV can be in state a with probability pi(t) or in state b with probability 1pi(t), where tN0 denotes the discrete time. The state a represents that the node vi has or knows the information to spread, and the state b represents the opposite. Any node vjVi is able to spread information by interacting with some neighbor node vi, but if the node vj does not know the information (i.e., pj=0), then it does not contribute to spreading the information. Furthermore, each node has a manipulable variable ui(t)[0,1], which is amenable for feedback control.

The probability pi(t) is updated as follows: at each time step, every node vi can transit from b to a with probability ηi(Pi(t),Ui(t)) under the influence of its neighbors, or transit from state a to b with a probability μi, where:

0μi,ηi(Pi(t),Ui(t)),pi(t),ui(t)1,i:viV,

and Ui(t),Pi(t) are vectors such that:

Ui(t)=ui(t),uk1(t),uk2(t),,ukNi(t)TP[Ni+1],Pi(t)=pk1(t),pk2(t),,pkNi(t)TP[Ni],kl:vklVi,

with:

P[N]=[0,1]N.

The transition probability ηi(Pi(t),Ui(t)) depends on the state of the neighbors given by Pi(t) and a set of parameters Ui(t) that are amenable to manipulation and models the interaction that spreads the information over vi due to its neighbor nodes. Note that despite the interaction between vi and its neighbor nodes, if Pi=0, then ηi(Pi,Ui)=0 for any value of UiP[Ni+1], because in this case, the neighbor nodes do not know the information, and therefore, they do not contribute to spreading it.

Any change in ηi(Pi(t),Ui(t)) with respect to Pi(t) is assumed bounded and depends on Ui(t) such that for each pair (i,j) where i:viV and j:vjVi, there exists a function mij(Ui(t)):P[Ni+1]R+ such that:

ηi(Pi(t),Ui(t))pjmij(Ui(t)),

or in terms of entries of the adjacency matrix:

ηi(Pi(t),Ui(t))pjmij(Ui(t))aij. (2)

The above means that the transition probability η is a continuous function with bounded slope, which do not change abruptly.

Furthermore, throughout the paper, it is assumed that for all PiP[Ni], ηi(Pi,Ui) strictly monotonically increases with uk, i.e.,

ηi(Pi(t),Ui(t))uk>0,fork:vkVi{vi}, (3)

Finally, in order to be consistent with (3), it is assumed that:

mij(Ui(t))uk>0,fori,j,k:viV,vjVi,vkVi{vi}. (4)

The dynamics for the probability pi(t) of node viV to be in state a is given by (compare with [8,10,12]):

pi(t+1)=(1μi)pi(t)+ηi(Pi(t),Ui(t))(1pi(t)),pi(0)=pi0, (5)

or in vector form:

P(t+1)=EμP(t)+N(P(t),U(t))(1P(t)),P(0)=P0 (6)

where P(t) is the system state, and U(t) the control parameters are given by:

P(t)=[p1(t),p2(t),,pN(t)]TP[N],U(t)=[u1(t),u2(t),,uN(t)]TP[N]

with 1 being a vector with unity entries and:

Eμ=diag(1μi),N(P,U)=diag(ηi(Pi,Ui)),

Additionally, for later use:

MU={mij(Ui)},fori:vi:V,andj:vjVi. (7)

2.2. Control Problem

The purpose of the control design is to bring the state of the network to the extinction state. When the extinction state is not stable, the control must be designed in such a way that destabilizing components are compensated and self-stabilization mechanisms are enhanced. This can be accomplished in different ways, e.g., by changing the network structure [33,34,35] or node-specific parameters [27,36,37,38]. As for complex networks, not all node parameters are subject to control, and a systematic adaptation of parameters also implies computational complexity and may imply necessary communication structures, a set of nodes whose parameters should be adapted in order to achieve stabilization must be chosen. Once this set of nodes has been defined, it must be clarified what kind of adaptation mechanism provides the desired stabilization. A central question in this step is the decision about whether implementing a central computation structure, which decides on all parameters, or implementing a local, so-called decentralized control structure, which implies that the decision about how the control parameters are adapted, is computed locally at the node level. The implementation of this control on the other side requires some sensory information about the network state. Locating sensors in all nodes again implies high costs and complex communication structures, in particular if a centralized control structure is implemented that has to collect all the sensory data. Thus, a set of nodes for which sensor information must be provided in order to implement the control must be specified. In the sequel, the nodes for which sensor data are available are said to be monitored. A feedback control that depends on knowledge of the complete network state is called a state-feedback, while a control scheme that only requires the existing sensor information from the monitored nodes is called output-feedback control.

On the basis of the above discussion and terminology, the problem considered in this paper consists of designing a decentralized output-feedback control strategy to ensure the stabilization of the desired extinction state P*=0 over the complex network G(V,E). In particular, this includes the determination of:

  1. the set of M nodes that have to be monitored, i.e.,
    Vm={vm1,vm2,,vmM},Y(t)=y1(t),y2(t),,yM(t)T,yi(t)=pmi(t),vmiV,
    where the number M has to be determined and Y(t) is the measurement vector,
  2. the set of K nodes to be controlled, i.e.,
    Vc={vc1,vc2,,vcK},vciV,
    where the number K has to be determined and,
  3. the feedback control laws for the nodes viVc
    ui(t)=φi(Yi(t)) (8)
    where Yi(t)RMi is the part of the measurement vector Y(t) that has to be accessible to node viVc.

The approach for achieving this objective follows the constructive (passivity-based) control idea and consists of two steps: (i) assigning the necessary outputs so that the associated zero dynamics, i.e., the dynamics constrained to a submanifold:

M0={PP[N]|viVc:pi=0} (9)

is asymptotically stable, and (ii) designing the controllers ui=φi(Yi) so that for some 0γ<1, it holds that:

pi(t)pi0γt. (10)

The decision about which nodes need to be measured will depend on the control laws φi to be designed and is addressed in the subsequent analysis.

3. Selection of Monitored and Controlled Nodes

In this section, the central question about which nodes should be monitored in order to ensure a stabilization of the desired state probability distribution P*=0 is addressed by determining a condition for exponential stability on the associated zero dynamics. Before analyzing this, notice that the fixed points associated with the dynamics (5) for some constant Ui*P[Ni+1] can be determined substituting the relation pi(t+1)=pi(t)=pi*. After some algebra, it follows that:

pi*=ηi(Pi*,Ui*)μi+ηi(Pi*,Ui*). (11)

According to the above equation, we point out that the extinction state P*=0 is a fixed point when ηi(0,Ui*)=0; however, it is not clear if the extinction state or any other fixed point given by (11) is stable. The extinction state means that no information is spreading. In the virus spreading context, this condition plays an important role in order to explain how a virus is propagated.

The following lemma gives an important basis for the subsequent analysis.

Lemma 1.

The set P[N]=[0,1]N is positively invariant for the dynamics (6).

Proof. 

Consider the case that for some i:viV, it holds that pi(t)=0 for some t0. By (5), it follows that pi(t+1)=η(P(t),U(t))0. On the other hand, assume that pi(t)=1 for some t0. It follows that pi(t+1)=(1μi)1. Thus, for all i:viV, it holds that 0pi(t)1 for all t0, showing that P[N] is a positively invariant set for the dynamics (6).  ☐

For the purpose of analyzing the stability properties, consider a constant U*=[u1*,u2*,,uN*]T in the dynamics (6) with the fixed point given by (11). The following fundamental result on the stability of the origin of the dynamics (6) is obtained using a similar reasoning as in the analysis of epidemic spreading in [8].

Lemma 2.

Consider the dynamics (6) on a complex network with graph G(V,E) and adjacency matrix A={aij}, and let mij(Ui*):P[Ni+1]R+ be a function satisfying (2) and (4). Then, the origin P=0 of the dynamical system (6) is globally asymptotically stable if the constants ui* are such that:

σ(Eμ+MU)<1,U*=[u1*,u2*,,uN*]TP[N], (12)

where Eμ and MU are defined in (7) and σ(·) is the spectral radius of a matrix.

Proof. 

Using the mean value theorem [39] over ηi(Pi(t),Ui*) in order to proof the Lemma, one obtains:

ηi(Pi(t),Ui*)ηi(0,Ui*)=Pηi(αPi(t),Ui*)·P(t)forsomeα[0,1],

where P denotes the gradient with respect to the vector P.

Recalling that when Pi=0, the neighbor nodes of vi do not contribute to spreading the information and, therefore, ηi(0,Ui*)=0, it follows from the mean value theorem that:

ηi(Pi(t),Ui*)=ηi(Pi(t),Ui*)ηi(0,Ui*)=Pηi(αPi(t),Ui*)·Pi(t)=jViηi(αpi(t),Ui*)pjpj(t),α[0,1]. (13)

Substituting the above equation into (5), one obtains:

pi(t+1)=(1μi)pi(t)+jViηi(αpi(t),Ui*)pjpj(t)(1pi(t)),α[0,1]. (14)

Taking the absolute values on both sides of (14) yields:

|pi(t+1)|=(1μi)pi(t)+jViηi(αpi(t),Ui*)pjpj(t)(1pi(t))|1μi||pi(t)|+jViηi(αpi(t),Ui*)pj|pj(t)||1pi(t)|(1μi)pi(t)+jViηi(αpi(t),Ui*)pjpj(t).

By (2), the slope of ηi is bounded, so it holds that:

pi(t+1)(1μi)pi(t)+j=1Nmij(Ui*)aijpj(t).

Consider the auxiliary states xi(t)0,i=1,,N, so that pi(t)xi(t) and:

xi(t+1)=(1μi)xi(t)+j=1Nmij(Ui*)aijxj(t). (15)

These dynamics can be written in vector form as:

X(t+1)=[Eμ+MU]X(t), (16)

with X(t)=[x1(t),x2(t),,xN(t)]T and Eμ and MU defined in (7). It follows that limX(t)=0 if and only if σ(Eμ+MU)<1, i.e., all eigenvalues of Eμ+MU are within the unit circle around the origin in the complex plane. As for all i=1,,N, it holds that pi(t)xi(t), and it follows that limtP(t)=0 for all initial values P0P[N].  ☐

The asymptotic stability condition (12) is of a very general nature, given that it involves the complete network. One can refine it to gain insight into the conditions that every node viV has to satisfy in order to ensure that the complete state PP[N] converges to P*=0.

Lemma 3.

For a constant Ui*P[Ni+1] and for every viV, the state vector P(t)P[N] globally asymptotically converges to the desired state P*=0 if:

viV:j=1Nmij(Ui*)aij<μi. (17)

Proof. 

The proposition is proven according to Gerschgorin’s theorem [40], which provides an upper-bound estimate for the spectral radius of a given matrix. For the matrix Eμ+MU, the theorem yields the following inequality:

λ(1μi)j=1Nmij(Ui*)aij

where λ represents an eigenvalue of matrix Eμ+MU. The above inequality is bounded as follows:

|λ|1μiλ(1μi)j=1Nmij(Ui*)aij|λ|λ(1μi)+1μij=1Nmij(Ui*)aij+1μi

Now, the solution of (16) converges asymptotically to zero if |λ|<1. Therefore, we bound the above inequality as follows:

|λ|j=0Nmij(Ui*)aij+1μi<1

Given that for all i:viV, it holds that μi1, a sufficient condition to ensure asymptotic convergence in (15), and therefore in (5), is given by:

j=1Nmij(Ui*)aij<μi.

This completes the proof.  ☐

Note that if this condition does not hold, it gives a hint about how to choose the nodes to be monitored. Under this hypothesis, it seems appropriate to consider the set of controlled nodes viVc as those nodes that do no satisfy the condition (17) and the monitored nodes as those neighbor nodes vjVi of the controlled node viVc including the controlled node vi. As we will show later, it is sufficient to take Vm=Vc.

Provided a controller exists, which steers the controlled nodes vi exponentially to pi*=0, the dynamics converges exactly to the submanifold M0 defined in (9), called the zero dynamics [32,41]. By the control action, this manifold is a positively invariant subspace of P[N]. Furthermore, note that with the monitored nodes pi=0, they no longer influence the spreading process, so that the zero dynamics correspond to a spreading process over a reduced network, from which the monitored nodes have been withdrawn. As the nodes included in this reduced network by construction satisfy Condition (17), the desired state vector P*=0 is the unique attractor fixed point in M0. This is summarized in the following corollaries.

Corrollary 1.

If the nodes that do not satisfy the condition (17) are controlled, then the zero-dynamics has P*=0 as the unique asymptotically stable fixed-point.

Note that the establishment of the asymptotic stability of P*M0 for the zero dynamics is a key step in the constructive control approach [41], but does not yet ensure the asymptotic stability of P*P[N]. This will be addressed later.

The condition (17), for a given node viV, establishes a relation between the amount of the interaction neighbors-to-node, with the properties of the node (given by μi). A high interaction neighbors-to-node, regardless of the number of neighbors, can produce the spreading of information over the network. Thus, these nodes should be controlled.

On the other hand, it is possible to establish an alternative bounding dynamics for (5) in the same sense of Lemma 3, which yields the stability condition stated next.

Lemma 4.

For a constant Ui*P[Ni+1], the state vector P(t)P[N] globally asymptotically converges to the desired state P*=0 if:

viV:j=1Nmji(Uj*)aji<μi. (18)

Proof. 

Consider the average probability of (5) and (13) as follows:

1Ni=1Npi(t+1)=1Ni=1N(1μi)pi(t)+ηi(P(t),Ui*)(1pi(t))=1Ni=1N(1μi)pi(t)+jViηi(αpi(t),Ui*)pjpj(t)(1pi(t)),α[0,1]. (19)

Taking the absolute value on the above equation and recalling (2) as in the proof of Lemma 2, it follows that:

1Ni=1Npi(t+1)=1Ni=1Npi(t+1)=1Ni=1N(1μi)pi(t)+jViηi(αpi(t),Ui*)pjpj(t)(1pi(t)),i=1N(1μi)pi(t)+j=1Nmij(Ui*)pj(t)aij.

The last term in the above inequality includes the entries of the matrix Eμ+MU and the state vector P(t) as follows:

[E+MU]P(t)=(1μ1)p1(t)+j=1Nm1j(U1*)pj(t)a1j(1μ2)p2(t)+j=1Nm2j(U2*)pj(t)a2j(1μN)pN(t)+j=1NmNj(UN*)pj(t)aNj=(1μ1)p1(t)+m12(U1*)p2(t)a12++m1N(U1*)pN(t)a1Nm21(U2*)p1(t)a21+(1μ2)p2(t)++m2N(U2*)pN(t)a2NmN1(UN*)p1(t)aN1+mN2(UN*)p2(t)aN2++(1μN)pN(t).

Note that the summation in (19) is performed over each entry of the vector [Eμ+MU]P(t), where i represents the i-th row entry. Therefore, it is possible to rearrange the above vector as follows:

[Eμ+MU]P(t)=(1μ1)p1(t)m21(U2*)p1(t)a21mN1(UN*)p1(t)aN1+m12(U1*)p2(t)a12(1μ2)p2(t)mN2(UN*)p2(t)aN2++m1N(U1*)pN(t)a1Nm2N(U2*)pN(t)a2N(1μN)pN(t)

Summing over each entry of the column vector, and later over each column, we have:

i=1N(1μi)pi(t)+j=1Nmij(Ui*)pj(t)aij=(1μ1)p1(t)+j=1Nmj1(Uj*)p1(t)aj1+(1μ2)p2(t)+j=1Nmj2(Uj*)p2(t)aj2++(1μN)pN(t)+j=1NmjN(Uj*)pN(t)ajN=i=1N(1μi)pi(t)+j=1Nmji(Uj*)pi(t)aji=i=1N(1μi)+j=1Nmji(Uj*)ajipi(t).

Summarizing:

i=1Npi(t+1)i=1N(1μi)pi(t)+j=1Nmij(Ui*)pj(t)aij=i=1N(1μi)+j=1Nmji(Uj*)ajipi(t).

Associating the corresponding terms for every node vi, we obtain:

pi(t+1)(1μi)+j=1Nmji(Uj*)ajipi(t).

Consider the auxiliary states wi(t)0, i=0,1,,N, so that pi(t)wi(t) and:

wi(t+1)=(1μi)+j=1Nmji(Uj*)ajiwi(t). (20)

A condition to ensure asymptotic convergence to zero in (20) is given by:

1μi+j=1Nmji(Uj*)aji<1.

Thus:

j=1Nmji(Uj*)aji<μi.

Hence, given that pi(t)wi(t), the above inequality is a sufficient condition to ensure asymptotic convergence in the dynamics (5).  ☐

The preceding result gives another criterion about how to choose nodes to be monitored. In this case, the set of controlled nodes Vc contains those nodes vi that do not satisfy (18), but it is not clear which nodes have to be monitored. However, the vectors Uj* (vjVi) in (18) have something in common: all have the same entry ui*. Thus, in this case, it seems appropriate considering that Vm=Vc. Finally, the dynamics (20) establishes an alternative upper bound for (5).

In the same sense of the condition of Lemma 3, if the controlled nodes are chosen as those that do not satisfy the condition (18), then by construction, the zero-dynamics has the origin as the asymptotically-stable fixed point, and this is summarized in the following corollary.

Corrollary 2.

If the nodes that do not satisfy the condition (18) are controlled, then the zero-dynamics is asymptotically stable.

Note that the condition (18) has a similar interpretation as the condition (17). In this case, a high interaction node-to-neighbors, regardless of the number of neighbors, can produce information spreading over the network. Therefore, those nodes that do not satisfy the above condition should be controlled.

4. Feedback Control Design

In this section, the question is addressed about how to design the feedback control (8) for the nodes viVc so that limt|pi(t)pi*|=0. Up to this point, the dependency of the transition probability ηi on the control input Ui(t) has been neglected, given that Ui(t) was considered as a set of constant parameters. For the nodes to be controlled, it is now supposed that the dependency of ηi on Ui(t) is of a certain structure, which allows one to explicitly determine a control law that steers the nodes viVc to their desired values pi*=0. Before addressing the control design step, the following helpful result is established.

Lemma 5.

Let Ui,1=[ui,1,uk1,1,uk2,1,,ukNi,1]T,Ui,2=[ui,2,uk1,2,uk2,2,,ukNi,2]TP[Ni+1] with uk,1uk,2,k=i,1,,Ni and viV, then mij(Ui,1)mij(Ui,2) for all j such that vjVi.

Proof. 

By virtue of the mean value theorem, it holds that:

mij(Ui,2)mij(Ui,1)=k=1Nmij(U¯i)uk(uk,2uk,1)aik,

where U¯i=Ui,1+δ(Ui,2Ui,1), δ(0,1). Recalling the condition (4), having uk,2uk,1, it follows that:

mij(Ui,2)mij(Ui,1)0.

This completes the proof.  ☐

On the basis of the above developments, the set Vc of nodes to be controlled is determined either according to Corollary 1 or Corollary 2, i.e., those nodes that do not satisfy either (17) or (18). For both cases, a sufficient condition for the asymptotic stability of the closed-loop system is provided next.

Theorem 1.

Consider the dynamics (5) where the set Vc of nodes to be controlled is determined according either according to Corollary 1 or 2, i.e., Vc is the set of those nodes that do not satisfy either (17) or (18), respectively. Let Vm=Vc, i.e., all controlled nodes are monitored, and let for all i:viVc the value u¯i be such that the condition (17) or (18), respectively, holds true. If the controls ui(t) satisfy:

0ui(t)<u¯i,

then limtpi(t)=0.

Proof. 

Let U¯iP[Ni+1] be such that for all nodes viVc whose control input appears in Ui, its value is replaced by u¯i. Given ui(t)u¯i, it follows from Lemma 5 that mij(Ui(t))mij(U¯i), and thus:

j=1Nmij(Ui(t))aijj=1Nmij(U¯i)aij<μi,
j=1Nmji(Uj(t))ajij=1Nmji(U¯j)aji<μi.

The above inequalities satisfy Lemmas 3 and 4, respectively, so limtpi(t)=0.  ☐

From Theorem 1, in order to stabilize the system (5) to the extinction state, it is necessary to design a feedback control ui(t), viVc, that takes values below the upper-bound u¯i. This can be ensured, e.g., by the linear feedback control:

ui(t)=αu¯i(1pi(t)),α(0,1).

5. Feedback Control Example

To corroborate our results, we design a feedback control in the model proposed by Gomez [11] in order to stabilize the system to the extinction state. This is a discrete-time Markov contact-based epidemic spreading model that establishes the probability of infection of each node. However, we do not consider reinfection in the same time step, and in contrast with Gomez’s model, each node has different values for the recovery probability (μ), infection rate (β) and contact probability (r).

The probability of infection of each node i at time t+1 is given by:

pi(t+1)=(1μi)pi(t)+(1pi(t))(1ζi(t)),ζi(t)=j=1N(1βirjpj(t)aij). (21)

where ζi(t) is the probability for node i to be not infected by any neighbor and aij are the entries of the corresponding adjacency matrix. The network is described by the set of nodes V, and the set of neighbors of node i is given by Vi, i:viV. There are N=|V| nodes in the network, and each node i has a degree Ni=|Vi|. According to our framework, ηi(Pi(t),Ui(t)) is given by:

ηi(Pi(t),Ui(t))=1ζi(t)=1j=1N(1βirjpj(t)aij). (22)

Suppose that the parameters that are amenable to manipulation are βi and/or ri, i.e., we assume that it is possible to improve the health of the nodes or avoid a node performing several contact attempts with its neighbors. Accordingly, the entries of the vector Ui(t) are given by the infection rate (β) and the contact probability (r), i.e.,

Ui(t)=[βi,rk1,rk2,,rkNi],iV,andkl:vklVi. (23)

The fixed points pi* associated with the dynamics (21) are:

pi*=1j=1N(1βi*rj*pj*aij)μi+1j=1N(1βi*rj*pj*aij),

for some constant values βi* and ri*. Note that pi*=0 is a fixed point that represents the extinction state, but its stability is unknown. However, Lemmas (3) and (4) give us sufficient conditions to ensure asymptotic stability in the extinction state of the system (21).

According to our definition for ηi, it is necessary to determine if ηi satisfy conditions (2) and (4), i.e., we have to prove that ηi strictly monotonically increases with uk and to find a mij strictly monotonically increases with uk.

Condition (2) can be established taking the derivative with respect to pk (k=1,2,,N) as follows:

ηi(Pi(t),Ui(t))pk=pk1j=1N(1βirjpj(t)aij)=βirkaikj=1,jkN(1βirjpj(t)aij)βirkaik=mik(Ui(t))aik,iV,k:vkVi. (24)

The above equation shows that mik(Ui(t)) monotonically increases with uk, and its arguments are reduced to mik(Ui(t))=mik(βi,rk).

The second condition is proven taking the derivative with respect to βk (k=1,2,,N):

ηi(Pi(t),Ui(t))βk=βk1j=1N(1βirjpj(t)aij)=0ifikl=1Nrlpl(t)ailj=1,jlN(1βirjpj(t)aij)ifi=k.0.

and then with respect to rk (k=1,2,,N):

ηi(Pi(t),Ui(t))rk=rk1j=1N(1βirjpj(t)aij)=0ifikl=1Nβlpl(t)ailj=1,jlN(1βirjpj(t)aij)ifi=k.0.

In both cases, ηi monotonically increases with β or r.

Using Lemmas (3) and (4), we can conclude that the system (21) globally asymptotically converges to the desired state P*=0, if all nodes viV satisfy any of the following conditions:

j=1Nβirjaij<μi, (25)

or:

j=1Nβjriaji<μi. (26)

Note that the above conditions give us a hint about how to design a feedback control to stabilize the extinction state and to assign the output of the system:

Y(t)=[yi(t)]T=[pi(t)]T,wherevidoes not satisfy (25), (27)

or:

Y(t)=[yi(t)]T=[pi(t)]T,wherevidoes not satisfy (26). (28)

5.1. Simulations

We perform several simulations of the dynamical system (21) for different initial conditions, with the following considerations:

  1. We incorporate preferential attachment in a network with N=106 nodes, according to [22]. To incorporate the growing character of the network, we started with a small number mo=9 of vertices (linked randomly), and at every time step, we add a new vertex with m=3 edges until we reach N=106 nodes. In spite of the fact that we are using a scale-free network, we emphasize that our results are independent of the network’s topology.

  2. The constant values for the recovery probability (μi*), infection rate (βi*) and contact probability (ri*) were distributed uniformly over the nodes with values into the interval [0.2,0.7].

  3. In order to verify our results, we calculated the average probability as follows:
    ρ(t)=1Ni=1Npi(t). (29)

The system simulated is given by:

pi(t+1)=(1μi)pi(t)+ηi(Pi(t),Ui(t))(1pi(t)),ηi(Pi(t),Ui(t))=1j=1N(1βirjpj(t)aij), (30)

where:

|V|=N=106,Ni=|Vi|,μi*,βi*,ri*[0.2,0.7],
Pi(t)=[pk1(t),pk2(t),,pkNi(t)]T,Ui(t)=[βi(t),rk1(t),rk2(t),,rkNi(t)]T,kl:vklVi,
0pi(t),βi(t),ri(t),μi(t)1,viV,
Y(t)=[pi(t)]T,viVca or Vcb,

where Vca is the set of those nodes i that do not satisfy (25) and Vcb is the set of those nodes i that do not satisfy (26).

5.1.1. Behavior of the System in the Absence of Control

Figure 2 shows the simulations results for the system (30) in the absence of control. The result shows that the system (30) presents an endemic state independent of the initial conditions, and it shows that about 30% of the nodes are probably infected.

Figure 2.

Figure 2

ρ(t) for several initial conditions without control.

Our results give us 495,091 nodes do not satisfy Condition (25) and 477,061 nodes that do no satisfy (26); therefore, we identify these nodes as the nodes to be controlled and monitored in order to steer the system to the extinction state.

5.1.2. Behavior of the Nodes Associated with the Zero Dynamics

In order to corroborate that the associated zero dynamics is asymptotically stable, we set Y(t)=0, i.e., for those nodes that do not satisfy (25), we consider βi=0, and for those nodes that do not satisfy (26), we consider ri=0; the action of considering βi=0 or ri=0 is equivalent to unlinking the node i.

Under this conditions, the dynamical evolution of the system (30) is shown in Figure 3a,b. Note that, in both cases, the extinction state is reached after 15 time steps approximately.

Figure 3.

Figure 3

Simulation of the zero dynamics, i.e., without those nodes that do not satisfy (25) or (26). (a) Simulation of (30) with βi=0 where i:viVca; (b) simulation of (30) with ri=0 where i:viVcb.

5.1.3. Behavior of the System with a Linear Feedback Control

We perform two separate simulations that will show the dynamical evolution of the system when a control is implemented. In the first one, we propose a linear control that will act only on those nodes that do not satisfy Condition (25). In the second one, a linear control will act only on those nodes that do not satisfy Condition (26). According to Theorem 1, we must establish an upper bound, in either case, namely β¯i and r¯i, respectively. These upper bounds can be determined using Equation (25) or (26). For Condition (25), we have:

j=1Nβ¯irj*aij=μi*,β¯i=μi*j=1Nrj*aij. (31)

and for Condition (26):

j=1Nβj*r¯iaji=μi*,r¯i=μi*j=1Nβj*aji. (32)

Note that (31) relates the infection probability βi of the node i with its recovery probability μi and the contact capacity of its neighbor nodes, given by j=1Nrj*aij. On the other hand, Equation (32) relates the contact probability ri of the node i, with its recovery probability μi and the infection capacity of its neighbor nodes, given by j=1Nβj*aji. This means that a node with a high rate of contact can be infected with a great probability; besides, a node with weak neighbor nodes (those with a high probability of infection) can be a focus of infection, as is intuitively clear.

Thus, the controls proposed should be such that:

βi(t)<β¯iandri(t)<r¯i. (33)

It follows that for the nodes that do not satisfy (25), the control proposed could be given by:

βi(t)=γβ¯i(1pi(t)), (34)

and for those nodes that do not satisfy (26):

ri(t)=γr¯i(1pi(t)),0<γ<1. (35)

Note that both controls above depend on the state of the node i given by pi(t) and the properties of its neighbor nodes given by β¯i and r¯i. The value γ must be in the interval (0,1) in order to satisfy (33).

Figure 4a,b shows the results of the simulation of the system (30) with the applied controls (34) and (35), respectively, with γ=0.9. In both cases, it is shown that the extinction state is a closed-loop attractor, although not as fast as in the case of Figure 3a,b, corresponding to the evolution of the zero dynamics.

Figure 4.

Figure 4

Linear feedback control. (a) Simulation with linear feedback control given by (34) where i:viVca; (b) simulation with linear feedback control given by (35) where i:viVcb.

6. Conclusions and Outlook

A Markov chain-based model for a Susceptible-Infected-Susceptible (SIS) dynamics over complex networks has been analyzed, and a control mechanism has been proposed in order to stabilize the extinction state. Given that the system presents a high non-linear behavior, our analytical approach is based on determining a bilinear dynamics (15) and (20) that upper bounds the non-linear system. Following this approach, it is possible to determine two sufficient conditions (17) and (18) that ensure that the extinction state will be asymptotically stable. As a result of these conditions, we have determined which nodes are suitable for monitoring and controlling, in order to achieve the extinction of the propagation of the information. A linear feedback control scheme was tested for the stabilization of the extinction state in numerical simulation studies with N=106 nodes, showing the performance of the approach.

Future studies will consider generalizations of this approach to higher-dimensional node dynamics, multilayer networks [42,43], complex networks of agents [44,45] and analyzing the possibility of applying these kinds of control strategies for financial market models and decision dynamics [46,47,48].

Acknowledgments

This work was partially sponsored by Rector office of UAM Cuajimalpa through “Programa de Apoyo a Proyectos Interdisciplinarios”. We also thank DMAS for partially supporting the publication of this work.

Author Contributions

All authors designed and did the research, in particular the stability analysis; Luis A. Alarcón Ramos and Alexander Schaum conceived and designed the control and the numerical experiments; Luis A. Alarcón Ramos performed the numerical experiments; All authors analyzed the data; Alexander Schaum and Roberto Bernal Jaquez wrote the paper; All authors reviewed the manuscript; All authors have read and approved the final manuscript.

Conflicts of Interest

The authors declare no conflict of interest.

References

  • 1.Berger N., Borgs C., Chayes J.T., Saberi A. On the spread of viruses on the internet; Proceedings of the Sixteenth Annual ACM-SIAM Symposium on Discrete Algorithms (SODA ’05); Vancouver, BC, Canada. 23–25 January 2005; pp. 301–310. [Google Scholar]
  • 2.Yang L., Yang X. A new epidemic model of computer viruses. Commun. Nonlinear Sci. Numer. Simul. 2014;19:1935–1944. doi: 10.1016/j.cnsns.2013.09.038. [DOI] [Google Scholar]
  • 3.Serazzi G., Zanero S. Computer Virus Propagation Models. In: Calzarossa M.C., Gelenbe E., editors. Performance Tools and Applications to Networked Systems. Volume 2965. Springer; Berlin/Heidelberg, Germany: 2004. pp. 26–50. Lecture Notes in Computer Science. [Google Scholar]
  • 4.Li Y., Pan J., Zhen J. Dynamic Modeling and Analysis of the Email Virus Propagation. Discret. Dyn. Nat. Soc. 2012;2012:1–22. doi: 10.1155/2012/472072. [DOI] [Google Scholar]
  • 5.Wang W., Tang M., Zhang H., Do Y., Liu Z. Epidemic spreading on complex networks with general degree and weight distributions. Phys. Rev. E. 2014;90:1–8. doi: 10.1103/PhysRevE.90.042803. [DOI] [PubMed] [Google Scholar]
  • 6.Leventhal G., Hill A., Nowak M., Bonhoeffer S. Evolution and emergence of infectious diseases in theoretical and real-world networks. Nat. Commun. 2015;6:1–11. doi: 10.1038/ncomms7101. [DOI] [PMC free article] [PubMed] [Google Scholar]
  • 7.Tomovski I., Trpevski I., Kocarev L. Topology independent SIS process: An engineering viewpoint. Commun. Nonlinear Sci. Numer. Simul. 2014;19:627–637. doi: 10.1016/j.cnsns.2013.06.033. [DOI] [Google Scholar]
  • 8.Wang Y., Chakrabarti D., Wang C., Faloutsos C. Epidemic spreading in real networks: An eigenvalue viewpoint. IEEE SRDS. 2003:25–34. doi: 10.1109/RELDIS.2003.1238052. [DOI] [Google Scholar]
  • 9.Chakrabarti D., Wang Y., Wang C., Leskovec J., Faloutsos C. Epidemic thresholds in real networks. ACM Trans. Inf. Syst. Secur. 2008;10:13:1–13:26. doi: 10.1145/1284680.1284681. [DOI] [Google Scholar]
  • 10.Gomez S., Arenas A., Borge-Holthoefer J., Meloni S., Moreno Y. Discrete-time Markov chain approach to contact-bases disease spreading in complex networks. Europhys. Lett. 2010;89:38009p1–38009p6. doi: 10.1209/0295-5075/89/38009. [DOI] [Google Scholar]
  • 11.Gomez S., Arenas A., Borge-Holthoefer J., Meloni S., Moreno Y. Probabilistic framework for epidemic spreading in complex networks. Int. J. Complex Syst. Sci. 2011;1:47–54. [Google Scholar]
  • 12.Meloni S., Arenas A., Gomez S., Borge-Holthoefer J., Moreno Y. Modeling Epidemic Spreading in Complex Networks: Concurrency and Traffic. In: Thai M.T., Pardalos P.M., editors. Handbook of Optimization in Complex Networks. Springer; New York, NY, USA: 2012. pp. 435–462. [Google Scholar]
  • 13.Moreno Y., Nekovee M., Pacheco A. Dynamics of rumor spreading in complex networks. Phys. Rev. E. 2004;69:1–7. doi: 10.1103/PhysRevE.69.066130. [DOI] [PubMed] [Google Scholar]
  • 14.Borge-Holthoefer J., Moreno Y. Absence of influential spreaders in rumor dynamics. Phys. Rev. E. 2012;85:1–5. doi: 10.1103/PhysRevE.85.026116. [DOI] [PubMed] [Google Scholar]
  • 15.Singh A., Nath Singh Y. Rumor Spreading and Inoculation of Nodes in Complex Networks; Proceedings of the 21st International Conference on World Wide Web (WWW ’12 Companion); Lyon, France. 16–20 April 2012; pp. 675–678. [DOI] [Google Scholar]
  • 16.Xie M., Jia Z., Chen Y., Deng Q. Simulating the Spreading of Two Competing Public Opinion Information on Complex Network. Appl. Math. 2012;3:1074–1078. doi: 10.4236/am.2012.39158. [DOI] [Google Scholar]
  • 17.McKendrick A. Applications of Mathematics to Medical Problems. Edinb. Math. Soc. 1925;44:98–130. doi: 10.1017/S0013091500034428. [DOI] [Google Scholar]
  • 18.Kephart J.O., White S.R. Directed-graph epidemiological models of computer viruses; Proceedings of the 1991 IEEE Computer Society Symposium on Research in Security and Privacy; Oakland, CA, USA. 20–22 May 1991; pp. 343–359. [DOI] [Google Scholar]
  • 19.Kephart J.O., White S.R. Measuring and modeling computer virus prevalence; Proceedings of the 1993 IEEE Computer Society Symposium on Research in Security and Privacy; Oakland, CA, USA. 24–26 May 1993; pp. 2–15. [DOI] [Google Scholar]
  • 20.Wang W., Tang M., Stanley H.E., Braunstein L.A. Unification of theoretical approaches for epidemic spreading on complex networks. Rep. Prog. Phys. 2017;80:036603. doi: 10.1088/1361-6633/aa5398. [DOI] [PubMed] [Google Scholar]
  • 21.Ferraz de Arruda G., Rodrigues F., Rodríguez P., Cozzo E., Moreno Y. A General Markov Chain Approach for Disease and Rumor Spreading in Complex Networks. J. Complex Netw. 2016 doi: 10.1093/comnet/cnx024. [DOI] [Google Scholar]
  • 22.Barabási A.L., Albert R. Emergence of scaling in random networks. Science. 1999;286:509–512. doi: 10.1126/science.286.5439.509. [DOI] [PubMed] [Google Scholar]
  • 23.Pastor-Satorras R., Vespignani A. Epidemic Spreading in Scale-Free Networks. Phys. Rev. Lett. 2001;86:3200–3203. doi: 10.1103/PhysRevLett.86.3200. [DOI] [PubMed] [Google Scholar]
  • 24.Schaum A., Bernal Jaquez R. Estimating the state probability distribution for epidemic spreading in complex networks. Appl. Math. Comput. 2016;29:197–206. doi: 10.1016/j.amc.2016.06.037. [DOI] [Google Scholar]
  • 25.Nowzari C., Preciado V.M., Pappas G.J. Analysis and Control of Epidemics: A Survey of Spreading Processes on Complex Networks. IEEE Control Syst. 2016;36:26–46. doi: 10.1109/MCS.2015.2495000. [DOI] [Google Scholar]
  • 26.Bernal Jaquez R., Schaum A., Alarcon L., Rodriguez C. Stability analysis for virus spreading in complex networks with quarantine. Publ. Mat. Urug. 2013;14:221–233. [Google Scholar]
  • 27.Khanafer A., Basar T. An optimal control problem over infected networks; Proceedings of the International Conference of Control, Dynamic Systems, and Robotics; Ottawa, ON, Canada. 15–16 May 2014; pp. 1–6. [Google Scholar]
  • 28.Eshghi S., Khouzani M.H.R., Sarkar S., Venkatesh S.S. Optimal patching in clustered epidemics of malware. IEEE Trans. Netw. 2015;24:283–298. doi: 10.1109/TNET.2014.2364034. [DOI] [Google Scholar]
  • 29.Bloem M., Alpcan T., Basar T. Optimal and robust epidemic response for multiple networks. Control Eng. Pract. 2009;17:525–533. doi: 10.1016/j.conengprac.2008.10.007. [DOI] [Google Scholar]
  • 30.Theodorakopoulos G., Le Boudec J.Y., Baras J.S. Selfish response to epidemic propagation. IEEE Trans. Autom. Control. 2013;58:363–376. doi: 10.1109/TAC.2012.2209949. [DOI] [Google Scholar]
  • 31.Sahneh F.D., Scoglio C. Epidemic spread in human networks; Proceedings of the IEEE Conference on Decision and Control and European Control Conference (CDC-ECC); Orlando, FL, USA. 12–15 December 2011; pp. 3008–3013. [DOI] [Google Scholar]
  • 32.Isidori A. Nonlinear Control Systems, an Introduction. Springer; Berlin/Heidelberg, Germany: 1989. The Zero Dynamics. [Google Scholar]
  • 33.Bishop A.N., Shames I. Link operations for slowing the spread of disease in complex networks. EPL. 2011;95:18005p1–18005p6. doi: 10.1209/0295-5075/95/18005. [DOI] [Google Scholar]
  • 34.Enns E., Mounzer J., Brandeau M. Optimal link removal for epidemic mitigation: A two-way partitioning approach. Math. Biosci. 2012;235:138–147. doi: 10.1016/j.mbs.2011.11.006. [DOI] [PMC free article] [PubMed] [Google Scholar]
  • 35.Tomovski I., Kocarev L. Simple Algorithm for Virus Spreading Control on Complex Networks. IEEE Trans. Circuits Syst. I Regul. Pap. 2012;59:763–771. doi: 10.1109/TCSI.2011.2169853. [DOI] [Google Scholar]
  • 36.Liu F., Buss M. Optimal control for information diffusion over heterogeneous networks; Proceedings of the IEEE 55th Conference on Decision and Control (CDC); Las Vegas, NV, USA. 12–14 December 2016; pp. 141–146. [DOI] [Google Scholar]
  • 37.Khanafer A., Başar T., Gharesifard B. Stability of epidemic models over directed graphs: A positive systems approach. Automatica. 2016;74:126–134. doi: 10.1016/j.automatica.2016.07.037. [DOI] [Google Scholar]
  • 38.Schaum A., Alarcon-Ramos L., Bernal R., Rodriguez C., Alvarez J. Continuous-time Markov-Chain-based control for SIS epidemics in complex networks; Proceedings of the 2014 International Conference on Circuits, Systems and Control; Interlaken, Switzerland. 22–24 February 2014; pp. 106–111. [DOI] [Google Scholar]
  • 39.Edwards C.H., Jr. Advanced Calculus of Several Variables. Academic Press; New York, NY, USA: 1973. The Multivariable Mean Value Problem; pp. 172–180. [Google Scholar]
  • 40.Cullen C.G. Matrices and Linear Transformations. Courier Corporation; Dover, DE, USA: 1990. pp. 282–286. [Google Scholar]
  • 41.Sepulchre R., Jankovic M., Kokotovic P.V. Constructive Nonlinear Control. Springer; Berlin/Heidelberg, Germany: 1997. The zero Dynamics and Passivity Concepts as Design Tools. [Google Scholar]
  • 42.Kivelä M., Arenas A., Barthelemy M., Gleeson J., Moreno Y., Porter M. Multilayer networks. J. Complex Netw. 2014;2:203–271. doi: 10.1093/comnet/cnu016. [DOI] [Google Scholar]
  • 43.Menichetti G., Dall’Asta L., Bianconi G. Control of Multilayer Networks. Sci. Rep. 2016;6:20706. doi: 10.1038/srep20706. [DOI] [PMC free article] [PubMed] [Google Scholar]
  • 44.Kononovicius A., Gontis V. Agent based reasoning for the non-linear stochastic models of long-range memory. Phys. A Stat. Mech. Appl. 2012;391:1309–1314. doi: 10.1016/j.physa.2011.08.061. [DOI] [Google Scholar]
  • 45.Alfarano S., Lux T., Wagner F. Estimation of Agent-Based Models: The Case of an Asymmetric Herding Model. Comput. Econ. 2005;26:19–49. doi: 10.1007/s10614-005-6415-1. [DOI] [Google Scholar]
  • 46.Sznajd-Weron K., Sznajd J. Opinion evolution in closed community. Int. J. Mod. Phys. C. 2000;11:1157–1165. doi: 10.1142/S0129183100000936. [DOI] [Google Scholar]
  • 47.Liggett T.M. Coexistence in Threshold Voter Models. Ann. Probab. 1994;22:764–802. doi: 10.1214/aop/1176988729. [DOI] [Google Scholar]
  • 48.Rodriguez Lucatero C., Schaum A., Alarcon Ramos L., Bernal-Jaquez R. Message survival and decision dynamics in a class of reactive complex systems subject to external fields. Phys. A Stat. Mech. Appl. 2014;405:338–351. doi: 10.1016/j.physa.2014.03.024. [DOI] [Google Scholar]

Articles from Entropy are provided here courtesy of Multidisciplinary Digital Publishing Institute (MDPI)

RESOURCES