Next Article in Journal
Determining Number of Factors in Dynamic Factor Models Contributing to GDP Nowcasting
Next Article in Special Issue
Comparative Assessment between Five Control Techniques to Optimize the Maximum Power Point Tracking Procedure for PV Systems
Previous Article in Journal
Trading Cryptocurrencies Using Second Order Stochastic Dominance
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Set Stability and Set Stabilization of Boolean Control Networks Avoiding Undesirable Set

Research Center of Semi-Tensor Product of Matrices, School of Mathematical Sciences, Liaocheng University, Liaocheng 252059, China
*
Author to whom correspondence should be addressed.
Mathematics 2021, 9(22), 2864; https://doi.org/10.3390/math9222864
Submission received: 12 October 2021 / Revised: 1 November 2021 / Accepted: 2 November 2021 / Published: 11 November 2021

Abstract

:
The traditional set stability of Boolean networks (BNs) refers to whether all the states can converge to a given state subset. Different from the existing results, the set stability investigated in this paper is whether all states in a given initial set can converge to a given destination set. This paper studies the set stability and set stabilization avoiding undesirable sets of BNs and Boolean control networks (BCNs), respectively. First, by virtue of the semi-tensor product (STP) of matrices, the dynamics of BNs avoiding a given undesirable set are established. Then, the set reachability and set stability of BNs from the initial set to destination set avoiding an undesirable set are investigated, respectively. Furthermore, the set stabilization of BCNs from the initial set to destination set avoiding a given undesirable set are investigated. Finally, a design method for finding the time optimal set stabilizer is proposed, and an example is provided to illustrate the effectiveness of the results.

1. Introduction

A Boolean network (BN) was first proposed by Kauffman, which laid the foundation for the study of gene regulation networks [1]. Since then, BNs have been widely investigated by researchers from biology, physics, and many other fields [2,3,4,5].
Two basic issues, stability and stabilization have been studied extensively [6,7,8,9], where the limit behavior of BNs is considered. For example, stable functions of BNs are studied in [6]. The stability of equilibria states and limit cycles in sparsely connected BNs is investigated by [7]. However, it is difficult to find all the limit cycles and fixed points for general BNs before the emergence of semi-tensor products (STP) of matrices.
STP is a new matrix product that overcomes the constraint of dimension in traditional matrix product [10,11]. All the limit cycles and fixed points of general BNs are revealed by using STP [12]. In addition, controllability [13,14], observability [15,16], optimal control [17], perturbation [18,19], and other properties [20,21,22,23,24,25,26] have also been investigated. It can be seen that STP is becoming an effective tool for studying BNs.
This paper investigates the set stability and set stabilization of Boolean control networks (BCNs) avoiding a given undesirable set. The motivations for investigating set stability and set stabilization come from two aspects.
(a) Practical problems:  In some cases, the research interest focuses on whether a subset of state space of an interconnected subsystem converges to or can be stabilized to another subset, which is termed set stability from the initial set to destination set in this paper. A typical example of set stability is the partial synchronization of a collection of locally interconnected systems [27]. The other example is the finite-time consensus of finite field networks with a probabilistic time delay, which can be converted into the set stability from the state space to destination set [28].
(b) Hotspot of recent research:  Set stability and set stabilization have been a research hotspot recently. Professor Guo [29] investigated the set stability and set stabilization of BCNs based on invariant subsets. The set stabilization of multivalued logical systems was studied in [30]. However, the existing results on set stability and set stabilization are from the full state space to a given state subset. Different from the existing results, the set stability and set stabilization problem studied in this paper are from the initial state set to the destination state set, which is the generation of traditional set stability and set stabilization.
Another concern that frequently occurs in biological systems is to prevent certain states of genes from being in an unfavorable or dangerous environment [31]. For example, in the treatment of diseases, some states of the genes or cell may cause new diseases, and they should be avoided [32]. In BCNs, such a situation is called state or input constrained. There are some works that focus on BCNs with state or input constraints. The reachability and controllability of BCNs under certain constraints were investigated in [33]. Professor Guo [34] studied the observability of BCNs with input constraints. The set controllability of logical control networks with state constraints was considered in [35]. Therefore, it is crucial to consider state constraints when studying the set stability and set stabilization of BCNs.
This paper investigates the set stability and set stabilization of BCNs with state constraints in the framework of STP. The contributions of this paper are as follows.
(i)
The dynamics of BNs and BCNs avoiding given undesirable set is established using STP.
(ii)
The set reachability and set stability of BNs and BCNs from the initial set to destination set are provided avoiding a given undesirable set, respectively. The criteria are provided with matrix forms, which are easily verified.
(iii)
The calculation formula of the transition period from each state of an initial set to a given destination set is given. The algorithm of a time optimal stabilizer is designed.
The organization of the rest of this paper is as follows: In Section 2, some preliminaries and symbol explanations of STP of matrices are provided. In Section 3, the definition of set stability of BNs avoiding undesirable states is first provided. Then, a discrete-time dynamic system is constructed, based on which the necessary and sufficient condition of set stability avoiding an undesirable set is obtained. In Section 4, the problem of the set stabilization of BCNs avoiding undesirable sets is discussed. In Section 5, a design method for finding the time optimal set stabilizer is proposed, and an example is provided to illustrate the effectiveness of the results. A brief conclusion is given in Section 6.

2. Preliminaries

In this section, we first list some notations:
(1)
M m × n is the set of all m × n real matrices; R n is the set of n-dimensional real vectors.
(2)
Col i ( M ) Row i ( M ) is the i-th column (row) of matrix M; Col ( M ) Row ( M ) is the set of columns (rows) of matrix M.
(3)
δ n i is the i-th column of n-dimensional identity matrix I n .
(4)
D : = { 0 , 1 } .
(5)
Δ n = Col ( I n ) , Δ : = Δ 2 .
(6)
Assume L = [ δ m i 1 δ m i 2 δ m i n ] , and then its shorthand form is L = δ m [ i 1 i 2 i n ] .
(7)
1 r ( 0 r ) represents the column vector of length r whose all terms are 1(0).
(8)
Let A M m × n , A is called a logical matrix if Col ( A ) Δ m .
(9)
Denote by L m × n the set of m × n dimension logical matrices.
(10)
Let A M m × n , A i , j denotes the ( i , j ) -element of matrix A.
(11)
A = ( a i j ) is called a Boolean matrix if a i j D , and denote by B m × n the set of m × n dimension Boolean matrices.
(12)
The following is the definition of Boolean addition of Boolean matrices
α + B β : = α β , α , β D ( B ) i = 1 n α i : = α 1 α 2 α n , α i D X + B Y = ( x i j + B y i j ) B m × n , X , Y B m × n .
(13)
For any X B m × n , Y B n × p , X × B Y : = Z = ( z i j ) m × p is called the Boolean product of X and Y, where z i j = ( B ) k = 1 n x i k y k j D .
(14)
If X B n × n , then X ( k ) : = X × B X × B × B X k .
(15)
Let X , Y R n , then X > Y represents ( X ) i , 1 > ( Y ) i , 1 , i { 1 , 2 , , n } .
(16)
Assume that X = ( x i j ) B m × n , Y = ( y i j ) L m × n . Then, X Y = ( x i j y i j ) L m × n .
(17)
For any F B m × n , the logical sub-matrix of F is defined as F L m × n , if F F = F . Let φ ( F ) denotes the set of all logical sub-matrix of F , that is, φ ( F ) : = { F L m × n | F F = F } . In particular, for any nonzero vector x B m × 1 , φ ( x ) = { z Δ m | z x = z } . For convenience, define φ T ( x ) : = φ ( x T ) for any x B 1 × n .
Definition 1
(Ref. [11]). The STP of two matrices A M m × n and B M p × t is defined as
A B = ( A I α n ) ( B I α p ) ,
where α = l c m ( n , p ) is the least common multiple of n and p, and is the Kronecker product.
Remark 1.
The STP is a generalization of the ordinary matrix product, thus, we can simply call it “product” and omit the symbol “” without confusion.
Proposition 1
(Ref. [11]). Let X R t and A M m × n . Then,
X A = ( I t A ) X .
Definition 2
(Ref. [11]). Define a matrix W [ m , n ] M m n × m n as follows
W [ m , n ] : = [ δ n 1 δ m 1 , , δ n n δ m 1 , δ n 1 δ m 2 , , δ n n δ m 2 , , δ n 1 δ m m , , δ n n δ m m ] ,
where W [ m , n ] is called the swap matrix.
Proposition 2
(Ref.  [11]). Let X R m and Y R n be two column vectors. Then,
W [ m , n ] X Y = Y X .
A function f : D n D is called a Boolean function. To use matrix expression we identify 0 δ 2 1 and 1 δ 2 2 , then Δ D . Denote x ( t ) = i = 1 n x i ( t ) , where x i ( t ) Δ , we have the following proposition:
Proposition 3
(Ref.  [11]). Let f : Δ n Δ be a logical function. Then, there exists a unique matrix M f M 2 n × 2 , such that
f ( x 1 , , x n ) = M f i = 1 n x i , x i Δ ,
where M f is called the structure matrix of f.

3. Set Stability Avoiding Undesirable Set

In this section, we consider the stability of BN from the initial set to destination set avoiding undesirable set.

3.1. Algebraic Expression of Bn under Restricted State Set

A Markov-type BN with n nodes is described as [11]
x 1 ( t + 1 ) = f 1 ( x 1 ( t ) , , x n ( t ) ) , x 2 ( t + 1 ) = f 2 ( x 1 ( t ) , , x n ( t ) ) , x n ( t + 1 ) = f n ( x 1 ( t ) , , x n ( t ) ) ,
where x i D , i = 1 , , n are state variables; f i : D n D , i = 1 , , n are Boolean functions.
By virtue of Proposition 3, we obtain its algebraic expression as follows:
x ( t + 1 ) = L x ( t ) ,
where x ( t ) = i = 1 n x i ( t ) , and L L 2 n × 2 n is called the structure matrix of (1).
Consider BN (1) and suppose the undesirable set Ω is
Ω = { δ 2 n k 1 , , δ 2 n k γ } Δ 2 n .
Define the initial set S 0 and the destination set S d as follows
S 0 : = δ 2 n i 1 , δ 2 n i 2 , , δ 2 n i α Δ 2 n \ Ω , S d : = δ 2 n j 1 , δ 2 n j 2 , , δ 2 n j β Δ 2 n \ Ω .
For simplicity, assume
i 1 < i 2 < < i α , j 1 < j 2 < < j β .
Using the initial set and destination set, we give the definition of set stability avoiding undesirable set Ω of BN (1).
Definition 3.
Consider BN (1) with the initial set S 0 and the destination set S d . BN (1) is said to be set stable from S 0 to S d avoiding Ω, if, for any initial state x 0 S 0 , there exists a positive integer T ( x 0 ) > 0 such that
x ( t , x 0 ) S d , t T ( x 0 ) ,
and
x ( k , x 0 ) Ω , k = 0 , 1 , 2 , .
Let T min ( x 0 ) represent the smallest integer such that (3) and (4) hold, which is called the transient period from x 0 S 0 to S d avoiding Ω . The transient period of BN (1) is defined as T S : = max x 0 S 0 T min ( x 0 ) .
In the following, we give the algebraic expression of BN (1) under restricted state set Δ 2 n \ Ω by constructing a matrix I Ω .
Define a Boolean matrix I Ω B 2 n × 2 n related to Ω as follows
Col i ( I Ω ) = 0 2 n , δ 2 n i Ω , Col i ( I 2 n ) , δ 2 n i Ω .
Denote by
L Ω = I Ω L I Ω .
According to L Ω , we know that, for the initial state x ( 0 ) Ω , if x ( 1 ) = L Ω x ( 0 ) = 0 2 n , then state x ( 0 ) evolves to Ω at the first step. We can construct the algebraic expression of BN (1) under restricted state set Δ 2 n \ Ω as
X ( t + 1 ) = L Ω X ( t ) ,
where X ( t ) B 2 n × 1 is the state that belongs to ( Δ 2 n \ Ω ) { 0 2 n } .
Using Equation (6), we can obtain
X ( t ) = L Ω X ( t 1 ) = L Ω L Ω X ( t 2 ) = = L Ω t X ( 0 ) ,
where X ( 0 ) = x ( 0 ) . Assume x ( 0 ) Ω . X ( t ) = 0 2 n indicates that state x ( 0 ) will evolve to Ω within t steps. If X ( t ) 0 2 n , this indicates that the state x ( 0 ) can stay away from Ω at the first t steps.

3.2. Reachability Avoiding States Set

Theorem 1.
Consider BN (1). The state δ 2 n i is reachable from state δ 2 n j at s-th step while avoiding Ω, if and only if ( L Ω s ) i , j = 1 .
Proof of Theorem 1. 
Note that the state of BN (1) at time t can be expressed as x ( t , x 0 ) = L t x 0 . According to Definition 3, we know that BN (1) is reachable from δ 2 n j to δ 2 n i while avoiding Ω at s-th step, if and only if,
L s δ 2 n j = δ 2 n i , L k δ 2 n j Ω , k = 0 , 1 , 2 , s .
It follows from the construction of L Ω that Equation (8) is equivalent to
L Ω s δ 2 n j = δ 2 n i ,
which is further equivalent to
( δ 2 n i ) T L Ω s δ 2 n j = 1 ,
that is, ( L Ω s ) i , j = 1 .    □
Remark 2.
On the basis of algebraic Equation (7), Theorem 1 proposes a necessary and sufficient condition to detect the reachability between two states while avoiding Ω. This is prepared for the Proof of Theorem 2.
In the following, we consider the set reachability of BN (1) avoiding undesirable set. According to (2), define matrix J 0 L 2 n × α related to S 0 and the index vector J d R 2 n related to S d as follows, respectively,
J 0 = δ 2 n [ i 1 i 2 i α ] , J d i , 1 = 1 , δ 2 n i S d , 0 , δ 2 n i S d .
Theorem 2.
Consider BN (1) with the initial set S 0 and destination set S d as defined by (2).
(1)
BN (1) is reachable from δ 2 n j S 0 to S d avoiding Ω, if and only if, there exists an integer s j , such that
J d T L Ω s j δ 2 n j > 0 .
(2)
BN (1) is reachable from S 0 to S d avoiding Ω, if and only if, there exists an integer s, such that
J d T ( k = 1 s L Ω k ) J 0 > 0 α T ,
where α = | S 0 | is the cardinality of S 0 .
Proof of Theorem 2. 
(1) According to Theorem 1, we know that BN (1) is reachable from δ 2 n j S 0 to S d avoiding Ω , if and only if there exists an integer s j such that ( L Ω s j ) r , j = 1 , where δ 2 n r S d . That is to say,
L Ω s j δ 2 n j = δ 2 n r S d .
From the construction of J d , we have
J d = ( B ) i = 1 β δ 2 n j i ,
then Equation (12) holds if and only if
J d T L Ω s j δ 2 n j = 1 > 0 ,
which is equivalent to (10).
(2) We know that x 0 S 0 can reach S d avoiding Ω if and only if conclusion (10) holds. Denoted by s j the integer that makes conclusion (10) hold when the initial state x 0 = δ 2 n j S 0 . Let s = max { s i 1 , s i 2 , , s i α } , then BN (1) is reachable from S 0 to S d avoiding Ω if and only if conclusion (11) can be obtained.    □
Remark 3.
By definition of matrix J 0 and the index vector J d , Theorem 2 gives a method to verify whether the given initial state set S 0 can reach the destination set S d while avoiding set Ω. It is noted that all the calculations involved are matrix operations, which are easy to validate by mathematical software.
The following corollary is obvious.
Corollary 1.
(1) BN (1) is reachable from δ 2 n j S 0 to S d avoiding Ω, if and only if,
J d T k = 1 2 n ( L Ω ) k δ 2 n j > 0 .
(2) 
BN (1) is reachable from S 0 to S d avoiding Ω, if and only if,
J d T k = 1 2 n ( L Ω ) k J 0 > 0 α T .

3.3. Set Stability Avoiding States Set

In the following, we consider the set stability problem of a BN avoiding Ω using the largest invariant subset.
Definition 4
(Ref. [29]). A subset S Δ 2 n is called an invariant subset of BN (1) if, for any state x 0 S , x ( t , x 0 ) S , t 0 .
The union of all the invariant subsets contained in S d is the largest invariant subset of  S d .
Lemma 1
(Ref. [29]). Consider a state subset S d Δ 2 n of BN (1) with | S d | = β . Define a matrix M d B 2 n × 2 n related to S d as follows
Col i ( M d ) = δ 2 n i , δ 2 n i S d , 0 2 n , δ 2 n i S d .
Then, the largest invariant subset, denoted by I ( S d ) , contained in S d is
I ( S d ) = Col ( Q S d ) \ { 0 2 n } ,
where
Q S d = ( M d L ) β M d .
Using (9) and (14), we can define a vector, called the set stability vector avoiding Ω , as
H : = J d T × B Q S d × B L Ω 2 n × B J 0 .
Remark 4.
According to the properties of the largest invariant set I ( S d ) , we know that, for any state x 0 I ( S d ) , it holds that x ( t , x 0 ) I ( S d ) , t 0 , and I ( S d ) S d . Therefore, the stability from the initial set S 0 to destination set S d is equivalent to the reachability from the initial set S 0 to the largest invariant set I ( S d ) .
Theorem 3.
Consider BN (1) with the initial set S 0 and destination set S d as defined by (2).
(1) 
BN (1) is set stable from δ 2 n i j S 0 to S d avoiding Ω, if and only if,
Col j ( H ) = 1 .
(2) 
BN (1) is set stable from S 0 to S d avoiding Ω, if and only if,
H = 1 α T .
(3) 
If BN (1) is set stable from S 0 to S d avoiding Ω, then for any δ 2 n i j S 0 , we have
T min ( δ 2 n i j ) = min { τ | J d T Q S d L Ω τ δ 2 n i j = 1 } .
Proof of Theorem 3. 
(1) Note that ( J d T Q S d ) T is the index vector related to I ( S d ) . According to Theorem 2, we know that BN (1) is reachable from δ 2 n i j S 0 to I ( S d ) avoiding Ω , if and only if, there exists an integer s i j , such that
( J d T Q S d ) L Ω s i j δ 2 n i j = 1 > 0 .
Combining the properties of the largest invariant set I ( S d ) , we can find that Equation (17) holds if and only if BN (1) is stable from δ 2 n i j S 0 to I ( S d ) avoiding Ω .
In addition, since system (1) has 2 n finite states, then it is easy to obtain from (17) that
J d T Q S d L Ω 2 n δ 2 n i j = 1 > 0 ,
that is,
Col j ( H ) = J d T Q S d L Ω 2 n J 0 δ 2 n i j = J d T Q S d L Ω 2 n δ 2 n i j = 1 .
(2) BN (1) is set stable from S 0 to S d avoiding Ω , if and only if it is stable from x 0 to S d avoiding Ω for any x 0 S 0 . That is, Col j ( H ) = 1 for any j = 1 , 2 , , α . The result is proven.
(3) If BN (1) is set stable from S 0 to S d avoiding Ω , then, for any δ 2 n i j S 0 , we have Col j ( H ) = 1 . That is to say, there exists a smallest integer τ such that
J d T Q S d L Ω τ δ 2 n i j = J d T Q S d L Ω τ J 0 δ 2 n i j = H δ 2 n i j = Col j ( H ) = 1 .
Combining to the definition of transient period, it is easy to verify that
T min ( δ 2 n i j ) = min { τ | J d T Q S d L Ω τ δ 2 n i j = 1 } , δ 2 n i j S 0 .
   □
Remark 5.
Theorem 3 not only presents the criteria of set stability of BNs from the initial set S 0 to destination S d , but also gives the method to calculate the transition period of any given state from S 0 to set S d . In addition, the criteria are provided in vector form to facilitate verification.
Example 1.
Consider the Drosophila melanogaster segmentation polarity gene network
x 1 ( t + 1 ) = x 1 ( t ) ¬ x 2 ( t ) ¬ x 4 ( t ) , x 2 ( t + 1 ) = ¬ x 1 ( t ) x 2 ( t ) ¬ x 3 ( t ) , x 3 ( t + 1 ) = x 1 ( t ) x 3 ( t ) , x 4 ( t + 1 ) = x 2 ( t ) x 4 ( t ) , x 5 ( t + 1 ) = ¬ x 2 ( t ) ¬ x 4 ( t ) x 5 ( t ) ¬ x 1 ( t ) ¬ x 3 ( t ) , x 6 ( t + 1 ) = ¬ x 1 ( t ) ¬ x 3 ( t ) x 6 ( t ) ¬ x 2 ( t ) ¬ x 4 ( t ) ,
where x 1 , x 2 , x 3 , x 4 represent four different secreted proteins wingless, and x 5 and x 6 represent two different transmembrane receptor proteins patched. Please refer to  [32] and [26] for their specific meanings.
Let x ( t ) = i = 1 6 x i ( t ) . Then, the algebraic form of (18) can be obtained as follows
x ( t + 1 ) = L x ( t ) ,
where
L = δ 64 [ 52 52 52 52 52 52 52 52 52 52 52 52 52 52 52 52 52 52 52 52 21 22 21 22 52 52 52 52 21 22 21 22 52 52 52 52 52 52 52 52 41 41 43 43 41 41 43 43 52 52 52 52 53 54 53 54 57 57 59 59 61 61 61 61 ] .
Suppose
S 0 = { δ 64 13 , δ 64 20 , δ 64 44 , δ 64 47 , δ 64 51 , δ 64 60 } , S d = { δ 64 23 , δ 64 43 , δ 64 52 , δ 64 59 , δ 64 62 } ,
and the undesirable set
Ω = { δ 64 29 , δ 64 42 , δ 64 48 } .
First, according to (9) and (13), we have
J 0 = δ 64 [ 13 20 44 47 51 60 ] , J d = [ 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 1 0 0 0 0 0 0 0 0 1 0 0 0 0 0 0 1 0 0 1 0 0 ] ,
and
M d = δ 64 [ 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 23 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 43 0 0 0 0 0 0 0 0 52 0 0 0 0 0 0 59 0 0 62 0 0 ] ,
where δ 64 0 is a zero column vector with dimension 64.
By Lemma 1, we obtain
Q S d = ( M d L ) 5 M d = δ 64 [ 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 43 0 0 0 0 0 0 0 0 52 0 0 0 0 0 0 59 0 0 0 0 0 ] .
Then, the largest invariant subset of S d is obtained as follows
I ( S d ) = { δ 64 43 , δ 64 52 , δ 64 59 } .
Next, according to the undesirable set Ω , L Ω can be obtained as
L Ω = δ 64 [ 52 52 52 52 52 52 52 52 52 52 52 52 52 52 52 52 52 52 52 52 21 22 21 22 52 52 52 52 0 22 21 22 52 52 52 52 52 52 52 52 41 0 43 43 41 41 43 0 52 52 52 52 53 54 53 54 57 57 59 59 61 61 61 61 ] .
By a direct calculation, we find the set stability vector avoiding set Ω as follows
H = J d T Q S d ( L Ω ) 64 J 0 , = [ 1 1 1 1 1 1 ] .
According to Theorem 3, Drosophila melanogaster segmentation polarity gene network (18) is set stable from set S 0 to S d avoiding set Ω .
Finally, it is easily checked that T S = min { τ | J d T Q S d ( L Ω ) τ J 0 = 1 6 T } = 1 . Thus, after one step, gene network (18) is set stable from set S 0 to S d avoiding set Ω .

4. Set Stabilization Avoiding Undesirable Set

In this section, we consider the set stabilization of BCN from the initial set to destination set avoiding undesirable set Ω .

4.1. Algebraic Expression of Bcn under Restricted State Set

Consider the following Markov-type BCN
x 1 ( t + 1 ) = f 1 ( x 1 ( t ) , , x n ( t ) , u 1 ( t ) , , u m ( t ) ) , x 2 ( t + 1 ) = f 2 ( x 1 ( t ) , , x n ( t ) , u 1 ( t ) , , u m ( t ) ) , x n ( t + 1 ) = f n ( x 1 ( t ) , , x n ( t ) , u 1 ( t ) , , u m ( t ) ) ,
where x i ( t ) D are state variables of node i N at time t, u j ( t ) D are controls of input node j M at time t, and f i : D m + n D , i = 1 , 2 , , n are Boolean functions.
The algebraic expression of BCN (19) is
x ( t + 1 ) = L u ( t ) x ( t ) ,
where x ( t ) = i = 1 n x i ( t ) , u ( t ) = j = 1 m u j ( t ) and L L 2 n × 2 m + n is called the structure matrix of (19).
Definition 5.
Let Ω be the undesirable set. Consider BCN (19) with the initial set S 0 and the destination set S d . BCN (19) is said to be set stabilizable from S 0 to S d avoiding Ω, if for any initial state x 0 S 0 , there exists a sequence of controls u : = { u ( 0 ) , u ( 1 ) , } and a positive integer T ( x 0 , u ) > 0 such that
x ( t , x 0 , u ) S d , t T ( x 0 , u ) ,
and
x ( k , x 0 , u ) Ω , k = 0 , 1 , 2 , .
Let T ¯ min ( x 0 ) represent the smallest integer such that (20) and (21) hold under a proper control sequence u 0 , which is called the transient period from x 0 S 0 to S d avoiding Ω , where u 0 is called the time optimal control sequence from x 0 S 0 to S d avoiding Ω . The transient period of BCN (19) is defined as T ¯ S : = max x 0 S 0 T ¯ min ( x 0 ) .
For BCN (19) I Ω is defined similarly as (5). L Ω is defined as [33]
L Ω : = I Ω L ( I 2 m I Ω ) .
Then, construct the algebraic expression of BCN (19) under restricted state set Δ 2 n \ Ω
X ( t + 1 ) = L Ω u ( t ) X ( t ) ,
where X ( t ) B 2 n × 1 is the state that belongs to ( Δ 2 n \ Ω ) { 0 2 n } .

4.2. Reachability Avoiding States Set

Define
C k , Ω : = ( L Ω × B 1 2 m ) ( k ) ,
and set
C Ω : = ( B ) k = 1 2 n C k , Ω .
Lemma 2
(Ref. [33]). For BCN (19), the state δ 2 n i is reachable from state δ 2 n j at s-th step with proper control sequence while avoiding Ω, if and only if ( C s , Ω ) i , j = 1 .
Assume J 0 and J d are defined as (9). From Definition 5 and Lemma 2, the following results are obtained.
Theorem 4.
Consider BCN (19) with the initial set S 0 and destination set S d as defined by (2).
(1) 
BCN (19) is reachable from δ 2 n j S 0 to S d avoiding Ω, if and only if, there exists an integer s j such that
J d T C s j , Ω δ 2 n j > 0 .
(2) 
BCN (19) is reachable from S 0 to S d avoiding Ω, if and only if, there exists an integer s, such that
J d T ( B ) k = 1 s C k , Ω J 0 > 0 α T ,
where α = | S 0 | .
Proof of Theorem 4. 
(1) (Necessity): Assume (19) is reachable from δ 2 n j to S d avoiding Ω . According to Lemma 2, for the initial state δ 2 n j , there exists an integer s j such that ( C s j , Ω ) r , j = 1 , where δ 2 n r S d . This is equivalent to
δ 2 n r C s j , Ω δ 2 n j = 1 .
According to the definition of J d , we have
J d T C s j , Ω δ 2 n j > 0 .
(Sufficiency): Suppose there exists an integer s j , such that Equation (24) holds. Then, there is at least one state δ 2 n r S d such that
δ 2 n r C s j , Ω δ 2 n j = 1 ,
which implies that
( C s j , Ω ) r , j = 1 .
According to Lemma 2, we know that BCN (19) is reachable from δ 2 n j to S d avoiding Ω .
(2) (Necessity): Assume BCN (19) is reachable from S 0 to S d avoiding Ω . That is, for any δ 2 n j S 0 , BCN (19) is reachable from δ 2 n j to S d avoiding Ω . Then, according to (24), for each δ 2 n j S 0 , there exists an integer s j such that
J d T C s j , Ω δ 2 n j > 0 .
Taking s = max { s i 1 , s i 2 , , s i α } , then we have
J d T ( B ) k = 1 s C k , Ω J 0 > 0 α T .
(Sufficiency): Suppose there exists an integer s such that
J d T ( B ) k = 1 s C k , Ω J 0 > 0 α T .
Therefore, for each δ 2 n j S 0 , there exists an integer s j < s such that
J d T C s j , Ω δ 2 n j > 0 ,
which implies that BCN (19) is reachable from S 0 to S d avoiding Ω .    □
Corollary 2.
(1) BCN (19) is reachable from δ 2 n j S 0 to S d avoiding Ω, if and only if, J d T C Ω δ 2 n j > 0 .
(2) 
BCN (19) is reachable from S 0 to S d avoiding Ω, if and only if, J d T C Ω J 0 > 0 α T .

4.3. Set Stabilization Avoiding States Set

In the following, we consider the set stabilization problem of a BCN avoiding Ω by using the largest control invariant subset.
Definition 6
(Ref. [29]). A subset S Δ 2 n is called a control invariant subset of BCN (19) if for any state x 0 S , there exists a control sequence u such that x ( t , x 0 , u ) S , t 0 .
Similarly, for BCN (19), the largest control invariant subset of a given set S d is the union of all the control invariant subsets contained in S d , denoted by I C ( S d ) .
Define
C k : = ( L × B 1 2 m ) ( k ) ,
and set
C : = ( B ) k = 1 2 n C k .
Lemma 3
(Ref. [29]). Consider a state subset S d Δ 2 n of BCN (19) with | S d | = β . Then, the largest control invariant subset I C ( S d ) is
I C ( S d ) = Col I 2 n ( Q S d , C T × B Q S d , C ) \ { δ 2 n 0 } ,
where
Q S d , C = ( M d × B C 1 ) ( β ) × B M d ,
and M d is defined in (13).
Similarly, based on (9) and (27), we can define a vector, called the set stabilization vector avoiding Ω , as
H C : = J d T × B Q ¯ S d , C × B C Ω × B J 0 ,
where
Q ¯ S d , C = I 2 n ( Q S d , C T × B Q S d , C ) .
Theorem 5.
Consider BCN (19) with the initial set S 0 and destination set S d as defined by (2).
(1) 
BCN (19) is set stabilizable from δ 2 n i j S 0 to S d avoiding Ω, if and only if,
Col j ( H C ) = 1 .
(2) 
BCN (19) is set stabilizable from S 0 to S d avoiding Ω, if and only if,
H C = 1 α T .
(3) 
If BCN (19) is set stabilizable from S 0 to S d avoiding Ω, then for any δ 2 n i j S 0 , we have
T ¯ min ( δ 2 n i j ) = min { τ | J d T × B Q ¯ S d × B C τ , Ω δ 2 n i j = 1 } .
Proof of Theorem 5. 
(1) Note that Col ( Q ¯ S d , C ) = I C ( S d ) { 0 2 n } ; thus, ( J d T Q ¯ S d , C ) T is the index vector of I C ( S d ) . According to Corollary 2 and the property of I C ( S d ) , we know that BCN (19) is set stabilizable from δ 2 n i j S 0 to I C ( S d ) S d avoiding Ω , if and only if,
( J d T Q ¯ S d , C ) C Ω δ 2 n i j > 0 .
Since × B is a Boolean product, and δ 2 n i j S 0 , then (31) is equivalent to
( J d T × B Q ¯ S d , C ) × B C Ω δ 2 n i j = J d T × B Q ¯ S d , C × B C Ω × B J 0 δ α j = H C δ α j = Col j ( H C ) = 1 .
(2) The conclusion of (2) can be easily obtained from (1).
(3) According to Theorem 4 and the property of I C ( S d ) , we know that BCN (19) is stabilizable from δ 2 n i j S 0 to S d avoiding Ω , if and only if, there exists an integer s i j , such that
J d T Q ¯ S d , C C s i j , Ω δ 2 n i j > 0 .
Combined with the definition of T ¯ min ( x 0 ) , we obtain that, for any δ 2 n i j S 0 ,
T ¯ min ( δ 2 n i j ) = min { τ | J d T × B Q ¯ S d , C × B C τ , Ω δ 2 n i j = 1 } .
   □
Example 2.
Consider the BCN model presented in [36], which is a simplified model of the lac operon in the bacterium Escherichia coli:
x 1 ( t + 1 ) = ¬ u 1 ( t ) ( x 2 ( t ) x 3 ( t ) ) , x 2 ( t + 1 ) = ¬ u 1 ( t ) u 2 ( t ) x 1 ( t ) , x 3 ( t + 1 ) = ¬ u 1 ( t ) ( u 2 ( t ) ( u 3 ( t ) x 1 ( t ) ) ) ,
where x 1 , x 2 , x 3 represent the lac mRNA, lactose in high concentrations, and lactose in medium concentrations, respectively. Moreover, u 1 , u 2 , u 3 represent the extracellular glucose, high extracellular lactose, and medium extracellular lactose, respectively, and are regarded as the control of input node.
Let x ( t ) = i = 1 3 x i ( t ) , then the algebraic expression of (32) is
x ( t + 1 ) = L u ( t ) x ( t ) ,
where
L = δ 8 [ 8 8 8 8 8 8 8 8 8 8 8 8 8 8 8 8 8 8 8 8 8 8 8 8 8 8 8 8 8 8 8 8 1 1 1 5 3 3 3 7 1 1 1 5 3 3 3 7 3 3 3 7 4 4 4 8 4 4 4 8 4 4 4 8 ] .
The one-step transition matrix of (32) can be calculated as follows
C 1 = 1 1 1 0 0 0 0 0 0 0 0 0 0 0 0 0 1 1 1 0 1 1 1 0 1 1 1 0 1 1 1 0 0 0 0 1 0 0 0 0 0 0 0 0 0 1 0 0 0 0 0 1 0 0 0 1 1 1 1 1 1 1 1 1 .
Suppose
S 0 = { δ 8 4 , δ 8 6 , δ 8 8 } , S d = { δ 8 1 , δ 8 3 } ,
and the undesirable set is
Ω = { δ 8 5 } .
We first calculate the largest control invariant subset of S d .
According to (9) and (13), we have
J 0 = δ 8 [ 4 6 8 ] , J d = [ 1 0 1 0 0 0 0 0 ] T ,
and
M d = δ 8 [ 1 0 3 0 0 0 0 0 ] ,
where δ 8 0 is the 8-dimensional all-zero column vector. Using Lemma 3, we find
Q S d , C = ( M d × B C 1 ) ( 2 ) × B M d = 1 0 1 0 0 0 0 0 0 0 0 0 0 0 0 0 1 0 1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 .
Furthermore,
Q ¯ S d , C = I 8 ( Q S d , C T × B Q S d , C ) = δ 8 [ 1 0 3 0 0 0 0 0 ] .
Therefore, the largest control invariant subset of S d is
I C ( S d ) = { δ 8 1 , δ 8 3 } .
Next, we verify whether system (32) can be stabilized from set S 0 to set I C ( S d ) .
Since Ω = { δ 8 1 , δ 8 2 } , then we can obtain the following constrained transition matrix:
C Ω = 1 1 1 1 0 1 1 1 0 0 0 0 0 0 0 0 1 1 1 1 0 1 1 1 1 1 1 1 0 1 1 1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 1 1 1 1 0 1 1 1 1 1 1 1 0 1 1 1 .
By a direct calculation, the set stabilization vector is obtained as follows
H C = J d T × B Q ¯ S d , C × B C Ω × B J 0 = [ 1 1 1 ] ,
according to Theorem 5, we know that system (32) is set stabilizable from the initial set S 0 to destination set S d avoiding Ω .
Finally, it is easily checked that T ¯ S = min { τ | J d T × B Q ¯ S d , C × B C τ , Ω × B J 0 = 1 3 T } = 2 . That is to say, after two steps, BCN (32) can be stabilized from the initial set S 0 to destination set S d avoiding Ω .

5. Design of Time Optimal Set Stabilizers

In this section, we consider the design of a state feedback controller with form
u ( t ) = G x ( t ) ,
where G L 2 m × 2 n , such that the closed loop system can be stabilized from S 0 to S d avoiding Ω . In general, the stabilizer is not unique. This section only considers the design of the time optimal stabilizer. That is to say, under the time optimal stabilizer, the BCN (19) can be stabilized from set S 0 to set S d in the shortest time T ¯ S while avoiding Ω .
First, we detect the time T ¯ S . It is easy to obtain from Theorem 5 and the definition of T ¯ S that if BCN (19) is set stabilizable from S 0 to S d avoiding Ω , then
T ¯ S = min { τ | J d T × B Q ¯ S d , C × B C τ , Ω × B J 0 = 1 α T } .
Therefore, we can find the shortest time T ¯ S by Equation (34) and denote it as s * = T ¯ S .
It is easy to verify that Remark 4 is also applicable to BCNs. Thus, the stabilizer design problem from S 0 to S d is equivalent to the stabilizer design problem from S 0 to I C ( S d ) .
Next, we calculate the largest control invariant subset I C ( S d ) and set R s I C ( S d ) , where R s I C ( S d ) is the k-step reachable set composed of all the initial state x 0 Δ 2 n \ Ω , which can be steered to I C ( S d ) in s steps by proper control sequences.
Lemma 4.
Consider BCN (19) with S 0 , S d and Ω, then
φ T ( J d T × B Q ¯ S d , C × B C s , Ω × B I Ω ) = R s I C ( S d ) ,
where I Ω is defined as (5).
Proof of Lemma 4. 
A direct calculation shows that δ 2 n j φ T ( J d T × B Q ¯ S d , C × B C s , Ω × B I Ω ) is equivalent to
( J d T × B Q ¯ S d , C × B C s , Ω × B I Ω ) δ 2 n j = 1 .
This implies that I Ω δ 2 n j 0 2 n T , i.e., I Ω δ 2 n j = δ 2 n j Δ 2 n \ Ω . Then,
( J d T × B Q ¯ S d , C × B C s , Ω × B I Ω ) δ 2 n j = ( J d T Q ¯ S d , C ) × B C s , Ω × B ( I Ω δ 2 n j ) = J d T Q ¯ S d , C × B C s , Ω δ 2 n j = ( J d T Q ¯ S d , C ) × B Col j ( C s , Ω ) .
In addition, since ( J d T Q ¯ S d , C ) T is the index vector of I C ( S d ) , then ( J d T Q ¯ S d , C ) × B Col j ( C s , Ω ) = 1 if and only if there exists at least one state δ 2 n i I C ( S d ) , such that
( C s , Ω ) i , j = 1 .
According to Lemma 2, we know that ( C s , Ω ) i , j = 1 is equivalent to that state δ 2 n i I C ( S d ) is reachable from state δ 2 n j Δ 2 n \ Ω at s-th step with proper control sequence while avoiding Ω , that is δ 2 n j R s I C ( S d ) .    □
We divide the set R s * I C ( S d ) into s * + 1 subsets, as follows:
E 0 : = I C ( S d ) , E 1 : = φ T ( J d T × B Q ¯ S d × B C 1 , Ω × B I Ω ) \ E 0 , E 2 : = φ T ( J d T × B Q ¯ S d × B C 2 , Ω × B I Ω ) \ ( E 0 E 1 ) , E s * : = φ T ( J d T × B Q ¯ S d × B C s * , Ω × B I Ω ) \ ( E 0 E 1 E s * 1 ) .
It follows that the states in set E s can reach set I C ( S d ) only at the s-th step.
Then, denote by
R ¯ ( W ) = { δ 2 n i | ( C 1 , Ω ) i , j = 1 , δ 2 n j W } ,
where W Δ 2 n is a set, and C 1 , Ω is defined in (23). We further process E i , i = 0 , 1 , , s * as follows:   
W s * : = E s * S 0 , W s * 1 : = E s * 1 S 0 R ¯ ( W s * ) , W s * 2 : = E s * 2 S 0 R ¯ ( W s * 1 ) , W 1 : = E 1 S 0 R ¯ ( W 2 ) , W 0 : = E 0 .
It follows that, for any state x W i , i = 0 , 1 , , s * , it holds that x R i I C ( S d ) and there must exist a state x 0 S 0 and a control sequence u such that x ( x 0 , u ) = x .
Finally, we give the design method of G to steer system (19) from S 0 to S d avoiding Ω .
Using Proposition 2, we find the equivalent form of expression (22):
X ( t + 1 ) = L ¯ Ω X ( t ) u ( t ) ,
where L ¯ Ω = L Ω W [ 2 m , 2 n ] B 2 n × 2 m + n . Then, system (19) can reach set W s 1 from any state δ 2 n j W s under state feedback control (33), if and only if the j-th column of G is designed as
Col j ( G ) U j ,
where U j = { δ 2 m ρ j | L ¯ Ω δ 2 n j δ 2 m ρ j W s 1 } , s = 0 , 1 , , s * , and W 1 : = W 0 .
If δ 2 n j i = 0 s * W i , then the j-th column of G can be designed freely.
Theorem 6.
Consider BCN (19) with S 0 , S d and Ω. Then, the feedback control (33) with the state feedback matrix G given by Algorithm 1 can set stabilize BCN (19) from S 0 to S d avoiding Ω.
Algorithm 1 Algorithm for designing time optimal set stabilizers.
1:
Find the optimal time s * according to T ¯ S = min { τ | J d T × B Q ¯ S d × B C τ , Ω × B J 0 = 1 α T } , where J d T , Q ¯ S d and C τ , Ω are defined as (9), (28) and (23), respectively;
2:
Calculate E s , s = 0 , 1 , 2 , , s * according to (35);
3:
Calculate W s , s = 0 , 1 , 2 , , s * according to (36);
4:
If δ 2 n j W s , s = 0 , 1 , 2 , , s * , then design the j-th column of G as Col j ( G ) U j , where U j = { δ 2 m ρ j | L ¯ Ω δ 2 n j δ 2 m ρ j W s 1 } , s = 0 , 1 , s * , and W 1 : = W 0 . If δ 2 n j i = 0 s * W i , then the j-th column of G can be designed freely.
It is easy to verify the correctness, so we omit its proof.
Example 3.
Recall Example 2, we know that the largest control invariant subset I C ( S d ) = { δ 8 1 , δ 8 3 } and the smallest integer T ¯ S = 2 . In the following, we intend to design a state feedback controller (33) under which system (32) can be stabilized from S 0 to S d avoiding Ω in two steps.
First, according to Lemma 4, we can find the 2-step reachable set of I C ( S d ) as follows:
R 2 I C ( S d ) = Δ 8 .
Next, according to (35), we divide the set R 2 I C ( S d ) into 3 subsets as
E 0 = I C ( S d ) = { δ 8 1 , δ 8 3 } , E 1 = { δ 8 2 , δ 8 6 , δ 8 7 } , E 2 = { δ 8 4 , δ 8 8 } .
Then, according to (36), we obtain that
W 2 = E 2 S 0 = { δ 8 4 , δ 8 8 } , W 1 = E 1 S 0 R ¯ ( W 2 ) = { δ 8 6 , δ 8 7 } , W 0 = E 0 = { δ 8 1 , δ 8 3 } .
Finally, we know from (37) that when δ 8 j W s , s = 0 , 1 , 2 , control δ 2 m ρ j should satisfy L Ω δ 2 m ρ j δ 2 n j W s 1 ,where W 1 = W 0 , then we have
ρ 4 = 7 , ρ 8 = 6 , ρ 6 = 6 , ρ 7 = 6 , ρ 1 = 6 or 7 , ρ 3 = 6 or 7 ,
that is, Col 1 ( G ) { δ 8 6 , δ 8 7 } , Col 3 ( G ) { δ 8 6 , δ 8 7 } , Col 4 ( G ) = δ 8 7 , Col 6 ( G ) = Col 7 ( G ) = Col 8 ( G ) = δ 8 6 , and columns 2 and 5 of G are designed freely.
Then, a feasible stabilizer is:
u ( t ) = G x ( t ) ,
where
G = δ 8 [ 6 1 6 7 2 6 6 6 ] .
In addition, we can see that the state transition diagram of the closed-loop network is shown in Figure 1 under the stabilizer (38), and T ¯ S = 2 . Then, the stabilizer (38) is the time optimal stabilizer for system (32).

6. Conclusions

In this paper, set stability and set stabilization avoiding undesirable set of BNs and BCNs have been investigated, respectively. Using the STP of matrices, necessary and sufficient conditions for set reachability and set stability of BNs and BCNs with constraint states have been obtained, respectively. In addition, for BNs and BCNs, the formulas for calculating the transition period from each state of initial set to a given destination set have been given, respectively. Based on the transition period, a design method of the time optimal stabilizer is proposed.
By means of matrix L Ω , the test method of reachability from one state to the others was given. Moreover, we constructed the set stability vector H (set stabilization vector H C ) based on constrained matrix L Ω , which can give the criteria of set stability (set stabilization) under the state constraint in vector form. It is noted that all the calculations involved are matrix operations, which are easy to validate by mathematical software. In general, all the results in this paper can be extended to mixed-valued logical (control) networks. The method proposed in this paper is helpful to the study of partial stability and partial stabilization under state constraints.
However, computational complexity is the main obstacle to study large-scale logical (control) networks using STP. In this paper, the set stability under state constraints was studied theoretically. We will consider the problem of reducing computational complexity in the future.

Author Contributions

W.L., S.F. and J.Z. obtained the set stability of BNs and set stabilization of BCNs avoiding undesirable set with the STP of matrices, and W.L. drafted the paper. All authors have read and agreed to the published version of the manuscript.

Funding

This work were supported by the Natural Science Foundation of Shandong Province ZR2019BF023 and the National Natural Science Foundation (NNSF) of China under Grants 62103176.

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Data Availability Statement

Not applicable.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Kauffman, S.A. Metabolic stability and epigenesis in randomly constructed genetic nets. J. Theor. Biol. 1969, 22, 437–467. [Google Scholar] [CrossRef]
  2. Akutsu, T.; Hayashida, M.; Ching, W.K.; Ng, M.K. Control of Boolean networks: Hardness results and algorithms for tree structured networks. J. Theor. Biol. 2007, 244, 670–679. [Google Scholar] [CrossRef] [PubMed]
  3. Albert, R.; Barabási, A.L. Dynamics of complex systems: Scaling laws for the period of Boolean networks. Phys. Rev. Lett. 2000, 84, 5660. [Google Scholar] [CrossRef] [PubMed] [Green Version]
  4. Fauré, A.; Naldi, A.; Chaouiya, C.; Thieffry, D. Dynamical analysis of a generic Boolean model for the mammalian cell cycle. Bioinformatics 2006, 22, e124–e131. [Google Scholar] [CrossRef] [Green Version]
  5. Shmulevich, I. On the Lyapunov Exponent of Monotone Boolean Networks. Mathematics 2020, 8, 1035. [Google Scholar] [CrossRef]
  6. Rämö, P.; Kesseli, J.; Yli-Harja, O. Stability of functions in Boolean models of gene regulatory networks. Chaos 2005, 15, 034101. [Google Scholar] [CrossRef] [PubMed]
  7. Walker, C.C. Stability of equilibrial states and limit cycles in sparsely connected, structurally complex Boolean nets. Complex Syst. 1987, 1, 1063–1086. [Google Scholar]
  8. Watta, P.B.; Wang, K.; Shringarpure, R. Dynamical Boolean systems: Stability analysis and applications. In Proceedings of the SPIE’s 1995 Symposium on OE/Aerospace Sensing and Dual Use Photonics, SPIE 2492, Orlando, FL, USA, 17 April 1995; pp. 512–523. [Google Scholar]
  9. Bilke, S.; Sjunnesson, F. Stability of the Kauffman model. Phys. Rev. E 2001, 65, 016129. [Google Scholar] [CrossRef] [Green Version]
  10. Cheng, D.; Qi, H.; Zhao, Y. An Introduction to Semi-Tensor Product of Matrices and Its Applications; World Scientific: Singapore, 2012. [Google Scholar]
  11. Cheng, D.; Qi, H. Analysis and Control of Boolean Networks: A Semi-Tensor Product Approach; Springer: London, UK, 2011. [Google Scholar]
  12. Cheng, D.; Qi, H. A linear represeatation of dynamics of Boolean networks. IEEE Trans. Autom. Control 2010, 55, 2251–2258. [Google Scholar] [CrossRef]
  13. Zhu, Q.; Gao, Z.; Liu, Y.; Gui, W. Categorization problem on controllability of boolean control networks. IEEE Trans. Autom. Control 2020, 66, 2297–2303. [Google Scholar] [CrossRef]
  14. Jiang, B.; Liu, Y.; Kou, K.; Wang, Z. Controllability and observability of linear quaternion-valued systems. Acta Math. Sin. Engl. Ser. 2021, 36, 1299–1314. [Google Scholar] [CrossRef]
  15. Yu, Y.; Meng, M.; Feng, J.E. Observability of Boolean networks via matrix equations. Automatica 2020, 111, 108621. [Google Scholar] [CrossRef]
  16. Yang, Y.; Liu, Y.; Lou, J.; Wang, Z. Observability of switched Boolean control networks using algebraic forms. Discret. Contin. Dyn. Syst.-S 2021, 14, 1519–1533. [Google Scholar] [CrossRef]
  17. Wu, Y.; Guo, Y.; Toyoda, M. Policy iteration approach to the infinite horizon average optimal control of probabilistic Boolean networks. IEEE Trans. Neural Netw. Learn. Syst. 2021, 32, 2910–2924. [Google Scholar] [CrossRef]
  18. Li, H.; Wang, S.; Li, X.; Zhao, G. Perturbation analysis for controllability of logical control networks. SIAM J. Control Optim. 2020, 58, 3632–3657. [Google Scholar] [CrossRef]
  19. Wang, S.; Li, H. Graph-based function perturbation analysis for observability of multi-valued logical networks. IEEE Trans. Neural Netw. Learning Syst. 2020. [Google Scholar] [CrossRef]
  20. Wang, S.; Li, H. Resolution of fuzzy relational inequalities with Boolean semi-tensor product composition. Mathematics 2021, 9, 937. [Google Scholar] [CrossRef]
  21. Lu, J.; Li, B.; Zhong, J. A novel synthesis method for reliable feedback shift registers via Boolean networks. Sci. China Inf. Sci. 2021, 64, 152207. [Google Scholar] [CrossRef]
  22. Guo, Y.; Wu, Y.; Gui, W. Stability of discrete-time systems under restricted switching via logic dynamical generator and STP-based mergence of hybrid states. IEEE Trans. Autom. Control 2021. [Google Scholar] [CrossRef]
  23. Wu, J.; Zhong, J.; Liu, Y.; Gui, W. State Estimation of Networked Finite State Machine with Communication Delays and Losses. IEEE Trans. Circuits Syst. II Express Briefs 2021. [Google Scholar] [CrossRef]
  24. Liu, Z.; Zhong, J.; Liu, Y.; Gui, W. Weak Stabilization of Boolean Networks Under State-Flipped Control. IEEE Trans. Neural Netw. Learn. Syst. 2021. [Google Scholar] [CrossRef]
  25. Fu, S.; Zhao, J.; Wang, J. Input-output decoupling control design for switched Boolean control networks. J. Frankl. Inst. 2018, 355, 8576–8596. [Google Scholar] [CrossRef]
  26. Li, H.; Yang, X.; Wang, S. Robustness for stability and stabilization of Boolean networks with stochastic function perturbations. IEEE Trans. Autom. Control 2021, 66, 1231–1237. [Google Scholar] [CrossRef]
  27. Chen, H.; Liang, J.; Lu, J. Partial synchronization of interconnected Boolean networks. IEEE Trans. Cybern. 2017, 47, 258–266. [Google Scholar] [CrossRef] [PubMed]
  28. Li, Y.; Li, H.; Wang, S. Finite-time consensus of finite field networks with stochastic time delays. IEEE Trans. Circuits Syst. II Express Briefs 2020, 67, 3128–3132. [Google Scholar] [CrossRef]
  29. Guo, Y.; Wang, P.; Gui, W.; Yang, C. Set stability and set stabilization of Boolean control networks besed on invariant subsets. Automatica 2015, 61, 106–112. [Google Scholar] [CrossRef]
  30. Li, F.; Li, H.; Xie, L. On stabilization and set stabilization of multivalued logical systems. Automatica 2017, 80, 41–47. [Google Scholar] [CrossRef]
  31. Sui, H. Gene expression profiling, genetic networks, and cellular states: An integrating concept for tumorigenesis and drug discovery. J. Mol. Med. 1999, 77, 469–480. [Google Scholar] [CrossRef]
  32. Xiao, Y.; Dougherty, E. The impact of function perturbations in Boolean networks. Bioinformatics 2007, 23, 1265–1273. [Google Scholar] [CrossRef] [Green Version]
  33. Li, Z.; Song, J. Controllability of Boolean control networks avoiding states set. Sci. China Inf. Sci. 2014, 57, 1–13. [Google Scholar] [CrossRef]
  34. Guo, Y.; Ding, Y. Observability of Boolean control networks with input constraints. In Proceedings of the 2017 13th IEEE International Conference on Control & Automation (ICCA), Ohrid, Macedonia, 3–6 July 2017; pp. 719–722. [Google Scholar]
  35. Li, Y.; Li, H.; Li, Y. Constrained set controllability of logical control networks with state constraints and its applications. Appl. Math. Comput. 2021, 405, 126259. [Google Scholar] [CrossRef]
  36. Montalva-Medel, M.; Ledger, T.; Ruz, G.A.; Goles, E. Lac Operon Boolean Models: Dynamical Robustness and Alternative Improvements. Mathematics 2021, 9, 600. [Google Scholar] [CrossRef]
Figure 1. The state transition diagram of Example 3.
Figure 1. The state transition diagram of Example 3.
Mathematics 09 02864 g001
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Share and Cite

MDPI and ACS Style

Liu, W.; Fu, S.; Zhao, J. Set Stability and Set Stabilization of Boolean Control Networks Avoiding Undesirable Set. Mathematics 2021, 9, 2864. https://doi.org/10.3390/math9222864

AMA Style

Liu W, Fu S, Zhao J. Set Stability and Set Stabilization of Boolean Control Networks Avoiding Undesirable Set. Mathematics. 2021; 9(22):2864. https://doi.org/10.3390/math9222864

Chicago/Turabian Style

Liu, Wen, Shihua Fu, and Jianli Zhao. 2021. "Set Stability and Set Stabilization of Boolean Control Networks Avoiding Undesirable Set" Mathematics 9, no. 22: 2864. https://doi.org/10.3390/math9222864

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop