Next Article in Journal
A Hierarchical Authorization Reversible Data Hiding in Encrypted Image Based on Secret Sharing
Previous Article in Journal
Radii of γ-Spirallike of q-Special Functions
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

One-Bit Function Perturbation Impact on Robust Set Stability of Boolean Networks with Disturbances

Research Center of Semi-Tensor Product of Matrices: Theory and Applications, School of Mathematical Sciences, Liaocheng University, Liaocheng 252000, China
*
Author to whom correspondence should be addressed.
Mathematics 2024, 12(14), 2258; https://doi.org/10.3390/math12142258
Submission received: 29 May 2024 / Revised: 17 July 2024 / Accepted: 17 July 2024 / Published: 19 July 2024

Abstract

:
This paper investigates the one-bit function perturbation (OBFP) impact on the robust set stability of Boolean networks with disturbances (DBNs). Firstly, the dynamics of these networks are converted into the algebraic forms utilizing the semi-tensor product (STP) method. Secondly, OBFP’s impact on the robust set stability of DBNs is divided into two situations. Then, by constructing a state set and defining an index vector, several necessary and sufficient conditions to guarantee that a DBN under OBFP can stay robust set stable unchanged are provided. Finally, a biological example is proposed to demonstrate the effectiveness of the obtained theoretical results.

1. Introduction

A Boolean network is a typical binary logical dynamic system, which was first introduced by Kauffman for modeling and analyzing gene regulatory networks (GRNs) [1]. Now, it has attracted extensive attention and has become an effective model of many other complex networks, including wireless sensor networks, neural networks and networked evolutionary games, etc. [2,3,4]. With the development of practical research problems, BNs have been generalized in many aspects [5,6]. It turns out that when modeling BNs, the undesired signals (or, equivalently, the disturbances) are unavoidable due to internal or external environmental perturbations. For instance, in gene regulatory networks, the disturbances may be gene mutation, the duplication or deletion of fragments in genetic recombination, and external environmental stimuli, etc. [7]. Based on the H complimentary sensitivity function, the design method of a decentralized control scheme was provided in reference [8], which can improve the performance of the system in terms of disturbance rejection and tracking. Considering the model subject to disturbance, the concept of BNs with disturbances (DBNs) was presented. In fact, DBNs serve as models of complex networks, which describe complex biological phenomena and have been widely investigated [9,10,11].
In classical control theory, there is a fundamental and meaningful issue, that is, the robust set stability of system [12]. The robust set stability of system means that all the initial states can eventually converge to an attractor subset of a given set under arbitrary disturbance sequence. Recently, the semi-tensor product (STP) method has been introduced, which establishes an algebraic state space representation to analyze the robust set stability of DBNs [13]. Specifically, Zhong et al. presented a robust reachable sets method for investigating the robust set stability of DBNs [14]. The robust set stability of probabilistic DBNs was studied in [15], and some efficient criteria for robust set stability were proposed based on the largest robust invariant set. Moreover, STP was also used to study various control problems of DBNs, such as stabilization [16], controllability [17], detectability [18], synchronization [19] and output tracking [20], etc. In addition to DBNs, the STP method has been also successfully applied to many other logical networks, including switched BNs [21], mix-valued logical networks [22], game theory [23], etc.
It is noted that gene mutation is universal in GRNs. These mutations have a significant impact on organisms. For instance, sickle cell anemia is caused by gene mutation in hemoglobin [24]. When modeling GRNs with BNs, function perturbation is introduced to describe gene mutation [25]. Recently, the effect of function perturbation on the dynamics of logical networks has been widely investigated. Under STP framework, reference [16] studied OBFP impact on the stability of BNs, while references [5,26] first migrated this issue to probabilistic BNs and switched BNs, respectively. Additionally, the effect of OBFP on the robust stability of DBNs was discussed in [27]. The effect of function perturbation on other fundamental problems of logical networks, such as optimal control [28], observability [29], detectability [30], has been investigated. It should be pointed out that function perturbation may change the attractors of the original DBNs. In fact, the robust set stability of DBNs is closely related to the attractors of DBNs, which may also be influenced due to function perturbation. There is a question that comes up naturally: how will the OBFP influence the robust set stability of DBNs? From the perspective of network models, most existing works do not consider disturbances. When the system contains disturbances, the evolution trajectory of each state is not unique, which will make the considered problem more complicated. In terms of the research issue, many references studied the stability problem of the system under OBFP. If the target set is a set rather than a fixed point, the robust set stability must consider the relationship between the trajectories of perturbed state and the target set. However, robust stability does not need to consider this aspect. To our best knowledge, there exist few results about the robust set stability for DBNs subject to function perturbation at present.
In this paper, we aim to propose some criteria to detect the robust set stability for DBNs affected by OBFP. The main contributions are as follows. (i) The concept of OBFP in DBNs is first proposed. Based on the possible relationship between the perturbed state and the largest invariant set, the robustness analyses for the set stability of DBNs are divided into two situations. For the case in which the perturbed state does not belong to the largest invariant set, a necessary and sufficient condition that DBNs stay robust set stable unchanged is derived. The condition to verify whether the DBN is still robust set stable is established, when the perturbed state belongs to the largest invariant set. (ii) Our results can be seen as an extension of reference [27]. When the given set becomes a single point, our results will degenerate into the results of robust stability of DBNs. However, the methods proposed in this article are easier to understand and detect than previous techniques.
The rest of this paper is organized as follows. Section 2 shows some notations and definitions about semi-tensor product, and presents the algebraic state space representation of a BN with disturbances. Section 3 presents the main results. Section 4 provides a biological example to describe the validity of the proposed method, and Section 5 is a brief conclusion.

2. Preliminaries

This section gives some necessary symbols and definitions, as well as algebraic representations of BNs with disturbances.

2.1. Semi-Tensor Product of Matrices

We first give some notations in Table 1.
Some other notations can be explained as follows. If Col ( A ) Δ m , then A M m × n is called a logical matrix. If M = [ δ n i 1 , δ n i 2 , , δ n i m ] , then briefly denote it as M = δ n [ i 1 i 2 i m ] . A matrix A M m × n is called a Boolean matrix, if all its entries are either 0 or 1. Assume A = ( a i j ) , B = ( b i j ) B m × n , then A + B B = ( a i j b i j ) , where “∨” represents the logical operator “or”. ( B ) i = 1 n L i : = L 1 + B L 2 + B + B L n . A ( k ) = A ( k 1 ) × B A , where k is a positive integer.
Definition 1
([13]). The semi-tensor product of two matrices A M m × n and B M p × t is defined as
A B = ( A I α n ) ( B I α p ) ,
where α = l c m ( n , p ) is the least common multiple of n and p, and is the Kronecker product.
Semi-tensor product is a generalization of ordinary matrix product, and it retains almost all the basic properties of ordinary matrix product. Throughout this paper, we omit the symbol “ ”.
Next, we give an example to illustrate how to calculate the semi-tensor product of two matrices by Definition 1.
Example 1.
Let
A = 1 2 3 1 2 3 1 2 3 2 1 0 and B = 1 2 2 1 ,
then
A B = A ( B I 2 ) = 3 4 3 5 4 7 5 8 5 2 7 4 .
For a logical variable x D , we define its vector form as ( x , 1 x ) T , then there is an equivalence relationship between D and Δ. It is easy to see that if x i is the vector form of logical variable X i , then there is a one-to-one correspondence between X = ( X 1 , X 2 , , X n ) T D n and x = i = 1 n x i Δ 2 n . We call x the vector form of X.
Lemma 1
([13]). Consider a logical mapping f : D n D . There exists a unique matrix M f L 2 × 2 n , called the structure matrix of f such that
f ( X 1 , X 2 , , X n ) = M f i = 1 n x i ,
where x i Δ is the vector form of X i D , i = 1 , 2 , , n .

2.2. Algebraic Representations of BNs with Disturbances

A BN with finite disturbance inputs can be described as
X i ( t + 1 ) = f i ( X ( t ) , ξ ( t ) ) , i = 1 , 2 , , n ,
where X ( t ) = ( X 1 ( t ) , X 2 ( t ) , , X n ( t ) ) D n , ξ ( t ) = ( ξ 1 ( t ) , ξ 2 ( t ) , , , ξ q ( t ) ) D q are the state and disturbance, respectively, f i : D n + q D are Boolean functions.
Since the number of variables in (1) is finite, and each variable just takes values from a finite set D , we can see that (1) is a standard finite-valued discrete dynamical system.
Denote the vector forms of X i and ξ i by x i and ε i , respectively, that is, x i = ( X i , 1 X i ) T ε i = ( ξ i , 1 ξ i ) T . By Lemma 1, system (1) can be expressed as
x i ( t + 1 ) = M f i ε ( t ) x ( t ) , i = 1 , 2 , , n ,
where x ( t ) = i = 1 n x i Δ 2 n , ε ( t ) = i = 1 q ε i Δ 2 q , and M f i L 2 × 2 q + n .
Multiplying the n equations in (2) together yields
x ( t + 1 ) = L ε ( t ) x ( t ) ,
where L = M f 1 M f 2 M f n L 2 n × 2 q + n , and ∗ is the Khatri–Rao product of matrices. System (3) is called the algebraic form of BN (1), and the matrix L : = [ L 1 L 2 L 2 q ] L 2 n × 2 q + n is called the state transition matrix of system (3).
For initial state x ( 0 ) Δ 2 n , under disturbance sequence ε : = { ε ( t ) , t [ 0 , τ ] } Δ 2 q , the state of system (3) at time τ + 1 is indicated as x ( τ + 1 ; x ( 0 ) , ε ) . According to the algebraic form (3), the concept for robust set stability of DBNs is reviewed below [14].
Definition 2
([14]). System (3) is said to be robustly stable to the nonempty set W Δ 2 n , if for any initial state x ( 0 ) Δ 2 n , there exists τ Z + such that x ( t ; x ( 0 ) , ε ) W for any t τ and arbitrary disturbance sequence ε.
In the following, a numerical example is provided to check whether the system is robustly stable to set W via Definition 2.
Example 2.
Consider a DBN as follows:
x ( t + 1 ) = L ε ( t ) x ( t ) ,
where the state transition matrix of system (4) is L = [ L 1 L 2 ] , L 1 = δ 4 [ 2 1 1 3 ] and L 2 = δ 4 [ 1 1 2 2 ] . In the following, we check whether system (4) will robustly stable to set W = { δ 4 1 , δ 4 2 } . For x ( 0 ) = δ 4 1 , through simple calculations, it holds that
x ( 1 ; x ( 0 ) = δ 4 1 , ε ( 0 ) = δ 2 1 ) = L ε ( 0 ) x ( 0 ) = L δ 2 1 δ 4 1 = L 1 δ 4 1 = δ 4 2 , x ( 1 ; x ( 0 ) = δ 4 1 , ε ( 0 ) = δ 2 2 ) = L ε ( 0 ) x ( 0 ) = L δ 2 2 δ 4 1 = L 2 δ 4 1 = δ 4 1 ,
which means that state δ 4 1 can reach set W in one step under arbitrary disturbance input ε. Similarly, for x ( 0 ) = δ 4 2 , we have
x ( 1 ; x ( 0 ) = δ 4 2 , ε ( 0 ) = δ 2 1 ) = L ε ( 0 ) x ( 0 ) = L δ 2 1 δ 4 2 = L 1 δ 4 2 = δ 4 1 , x ( 1 ; x ( 0 ) = δ 4 2 , ε ( 0 ) = δ 2 2 ) = L ε ( 0 ) x ( 0 ) = L δ 2 2 δ 4 2 = L 2 δ 4 2 = δ 4 1 .
Combining with Equations (5) and (6), we can obtain that the states in set W will always remain in set W under arbitrary disturbance sequence ε. Thus, W is a robust invariant set. For x ( 0 ) = δ 4 3 , skipping some redundant calculations, it can be obtained that x ( 1 ; x ( 0 ) = δ 4 3 , ε ) W under arbitrary disturbance input ε.
Next, we will judge whether x ( 0 ) = δ 4 4 can be robustly stabilized to the set W . By simple calculations, we obtain x ( 1 ; x ( 0 ) = δ 4 4 , ε ( 0 ) = δ 2 1 ) = δ 4 3 and x ( 1 ; x ( 0 ) = δ 4 4 , ε ( 0 ) = δ 2 2 ) = δ 4 2 , which means that state δ 4 4 can reach set { δ 4 2 , δ 4 3 } in one step. According to the above discussion, we obtain that both state δ 4 2 and state δ 4 3 can robustly reach set W in the next step, which means that state δ 4 4 can reach set W at the second step under arbitrary disturbance sequence ε . It follows that the trajectory of the system (4) starting from any initial state x ( 0 ) Δ 4 will robustly reach set W and then stay there forever under arbitrary disturbance sequence ε . Based on Definition 2, system (4) is robustly stable to set W .
As is well known, the largest robust invariant subset of a given set plays an important role in robust set stability. The following criterion is reviewed for the robust set stability of DBNs.
Lemma 2
([22]). System (3) is robustly stable to W if and only if it can be robustly stable to the largest invariant subset of W .
There are many methods to calculate the largest robust invariant subset; thus, we will not elaborate on them further. For more details, please refer to [10,22]. This paper assumes that the largest robust invariant subset contained in W is I ( W ) .
When using DBNs to model gene regulatory networks, gene mutation can be regarded as the function perturbation. The definition of one-bit function perturbation is proposed as below.
Definition 3.
The one-bit function perturbation on system (3) is that only one column in the state transition matrix L is changed.
In order to study the robust set stability of DBNs subject to OBFP, we give a natural assumption as follows.
Assumption 1.
Before OBFP occurs, system (3) is robustly stable to set W .

3. Main Results

In this section, we devote to discussing the impact of OBFP on the robust set stability of DBNs. First, we analyze the change in state transition matrix when the OBFP occur.
Given l { 1 , , 2 n + q } . Assume that after OBFP occurs, Col l ( L ) is perturbed from δ 2 n γ to δ 2 n γ , where γ γ . The state δ 2 n γ is called the perturbed state. Obviously, the state transition matrix L of (3) is changed into a new matrix L ^ L 2 n × 2 n + q , where
Col i ( L ^ ) = δ 2 n γ , if i = l ; Col i ( L ) , otherwise .
Hence, system (3) under OBFP becomes the following form:
x ( t + 1 ) = L ^ ε ( t ) x ( t ) .
Similarly, for initial state x ( 0 ) Δ 2 n , under disturbance sequence ε : = { ε ( t ) , t [ 0 , τ ] } Δ 2 q , the state of system (8) at time τ + 1 is indicated as x ^ ( τ + 1 ; x ( 0 ) , ε ) .
Lemma 3
([13]). For any integer 1 i 2 n + q , there exist unique positive integers i 1 [ 1 , 2 q ] and i 2 [ 1 , 2 n ] such that
δ 2 n + q i = δ 2 q i 1 δ 2 n i 2 ,
where i = ( i 1 1 ) 2 n + i 2 .
Set l = ( k 1 ) 2 n + φ . It follows from Definition 3 that OBFP only affects state δ 2 n φ when ε = δ 2 n k . Therefore, for any x = δ 2 n φ and any ε = δ 2 q k , if φ φ , it follows that
L ε x = δ 2 n α φ k = L ^ ε x .
If φ = φ and k = k , one has
L ε x = δ 2 n γ δ 2 n γ = L ^ ε x .
The possible relationship between the perturbed state δ 2 n γ and the largest robust invariant set I ( W ) can be divided into two cases: Case 1: δ 2 n γ I ( W ) ; Case 2: δ 2 n γ I ( W ) . Next, we analyze how OBFP affects the robust set stability of system (3) based on the above two cases.
Firstly, let P = ( B ) k = 1 2 q L k and construct a state set:
Ω φ = { δ 2 n θ : [ Q ] φ , θ > 0 } { δ 2 n φ } ,
where Q = ( B ) i = 1 2 n P ( i ) . Thus the set Ω φ contains all the states that can reach state δ 2 n φ under some disturbance sequence before OBFP, and includes δ 2 n φ itself. Then, construct a matrix Q ^ = ( B ) i = 2 n 2 n + 1 P ^ ( i ) , where P ^ = ( B ) k = 1 2 q L ^ k .
Denote the index vector of a given set W as J W B 2 n × 1 , where
( J W ) i = 1 , if δ 2 n i W , 0 , if δ 2 n i W ,
and ( J W ) i is the i-th element of J W .
In the light of the set Ω φ , matrix Q ^ and index vector J W , we provide several criteria to detect whether a BN with arbitrary disturbance is still robustly stable to the set W after OBFP.
Theorem 1.
Suppose Assumption 1 holds and δ 2 n γ I ( W ) . System (3) under OBFP is still robustly stable to the set W , if and only if one of the following two conditions holds
(i) 
δ 2 n γ Ω φ ,
(ii) 
δ 2 n γ Ω φ , J Δ 2 n W T Col φ ( Q ^ ) = 0 .
Proof. 
(Necessity) We prove the necessity by contradiction. Assume that δ 2 n γ Ω φ and J Δ 2 n W T Col φ ( Q ^ ) 0 . It follows from Assumption 1 that for any initial state x ( 0 ) Δ 2 n , it can robustly reach set I ( W ) in finite steps before OBFP occurs. This together with δ 2 n γ Ω φ means that there exists at least one path from δ 2 n γ to I ( W ) include δ 2 n φ before OBFP. Without loss of generality, we suppose that δ 2 n γ can be steered to δ 2 n φ at the s 1 th step and δ 2 n γ can be steered to I ( W ) at the sth step, where s 1 < s . Then, the path from δ 2 n γ to I ( W ) can be described as
δ 2 n γ ε ( 0 ) ε ( s 1 1 ) δ 2 n φ ε ( s 1 ) I ( W ) ,
where the corresponding disturbance sequence is δ 2 q k 0 , , δ 2 q k s 1 1 , , δ 2 q k s 1 .
Based on Equation (11), one has δ 2 n γ = L ^ δ 2 q k δ 2 n φ , that is, δ 2 n φ can reach δ 2 n γ in one step under disturbance input ε = δ 2 q k after OBFP. By selecting disturbance sequence ε 1 = : { δ 2 q k , δ 2 q k 0 , , δ 2 q k s 1 1 } , we can obtain the following path
δ 2 n φ δ 2 n γ δ 2 n φ .
There forms a new cycle (14) for system (3) after OBFP.
Since J Δ 2 n W T Col φ ( Q ^ ) 0 , we know that there is a positive integer τ 2 n satisfying x ( τ ; δ 2 n φ , ε ) W in the above cycle (14). That is, the state δ 2 n φ could not be stabilized set W in finite time after OBFP, which is a contradiction to the fact that system (3) is still robustly stable to set W .
(Sufficiency) Suppose condition (i) holds firstly. By following Assumpution 1, for any initial state x ( 0 ) Δ 2 n , it can robustly reach set I ( W ) in finite steps before OBFP occurs. Hence, for initial state x ( 0 ) = δ 2 n θ , the paths from δ 2 n θ to set I ( W ) have the following two situations.
(i)
δ 2 n θ Ω φ , which implies that set I ( W ) is reachable from δ 2 n θ and there exists no path from δ 2 n θ to set I ( W ) containing δ 2 n φ , simultaneously.
(ii)
δ 2 n θ Ω φ , which implies that set I ( W ) is reachable from δ 2 n θ and there exists at least one path from δ 2 n θ to set I ( W ) containing δ 2 n φ , simultaneously.
First, we discuss δ 2 n θ Ω φ . Without loss of generality, we suppose that I ( W ) is reachable from δ 2 n θ at the λ th step. The path from δ 2 n θ to set I ( W ) is described as
δ 2 n θ x ( t ) I ( W ) ,
where ε : = { ε ( t ) = δ 2 q k t , t [ 0 , λ 1 ] } Δ 2 q , and the { x ( 1 ) , , x ( λ 1 ) } is a sequence of states in the path from δ 2 n θ to I ( W ) . Apparently, x ( t ) δ 2 n φ , t [ 1 , λ 1 ] .
After OBFP, it follows from (10) that
x ^ ( λ ; δ 2 n θ , ε ) = L ^ ε ( λ 1 ) x ( λ 1 ) = L ^ ε ( λ 1 ) L ^ ε ( λ 2 ) x ( λ 2 ) = = t = λ 1 0 ( L ^ ε ( t ) ) δ 2 n θ = L ε ( λ 1 ) x ( λ 1 ) = L ε ( λ 1 ) L ε ( λ 2 ) x ( λ 2 ) = = t = λ 1 0 ( L ε ( t ) ) δ 2 n θ = x ( λ ; δ 2 n θ , ε ) I ( W ) .
Thus, OBFP has no effect on the path (15). Due to the arbitrariness of path (15), it holds I ( W ) is robustly reachable from any state δ 2 n θ Δ 2 n .
In the following, we consider δ 2 n θ Ω φ . Select an arbitrary path from δ 2 n θ to I ( W ) as
δ 2 n θ x ( t 1 ) δ 2 n φ δ 2 n η x ( t 2 ) I ( W ) ,
where ε : = { ε ( t ) = δ 2 q i t : t [ 0 , τ 1 + τ 2 1 ] } Δ 2 q , τ 1 + τ 2 indicates the number of steps from δ 2 n θ to I ( W ) . Here, the corresponding state sequence in the path from δ 2 n θ to δ 2 n η is { x ( t 1 ) = δ 2 n i t 1 : t 1 [ 1 , τ 1 1 ] } , and the corresponding state sequence from δ 2 n η to I ( W ) is { x ( t 2 ) = δ 2 n i t 2 : t 2 [ τ 1 + 1 , τ 1 + τ 2 1 ] } . Clearly, x ( τ 1 1 ) = δ 2 n φ , x ( τ 1 ) = δ 2 n η and x ( t ) δ 2 n φ , t { 1 , . . . , τ 1 + τ 2 1 } { τ 1 1 } .
In path (16), the relationship between the state δ 2 n η and perturbed state δ 2 n γ can be divided into two situations: (i) δ 2 n η δ 2 n γ ; (ii) δ 2 n η = δ 2 n γ . For δ 2 n η δ 2 n γ , similar to the analysis of path (15), OBFP has no effect on the path (16), and every state δ 2 n θ Δ 2 n can still robustly reach to I ( W ) after OBFP. For δ 2 n η = δ 2 n γ , when OBFP occurs, it holds that
x ^ ( τ 1 1 ; δ 2 n θ , ε ) = t = τ 1 2 0 ( L ^ δ 2 q i t ) δ 2 n θ = t = τ 1 2 0 ( L δ 2 q i t ) δ 2 n θ = δ 2 n φ , x ^ ( 1 ; δ 2 n φ , ε ) = L ^ δ 2 q k δ 2 n φ = δ 2 n γ .
Due to δ 2 n γ Ω φ , we know that δ 2 n φ is not reachable from δ 2 n γ . Combined with Assumption 1, we derive that
x ^ ( τ 3 1 ; δ 2 n γ , ε ) = t = τ 3 1 0 ( L ^ δ 2 q j t ) δ 2 n γ = t = τ 3 1 0 ( L δ 2 q j t ) δ 2 n γ I ( W ) ,
where ε : = { ε ( t ) = δ 2 q j t : t [ 0 , τ 3 1 ] } Δ 2 q and τ 3 indicates the number of steps from δ 2 n γ to I s ( W ) . Combining with (17) and (18), it can be concluded that
x ^ ( τ 1 + τ 3 ; δ 2 n θ , ε ) = t = τ 3 1 0 ( L ^ δ 2 q j t ) L ^ δ 2 q k t = τ 1 2 0 ( L ^ δ 2 q i t ) δ 2 n θ = t = τ 1 + τ 3 1 0 ( L ^ ε ( t ) ) δ 2 n θ I ( W ) ,
which shows that path (16) can be rewritten as
δ 2 n θ x ( t 1 ) δ 2 n φ δ 2 n γ x ( t 2 ) I ( W ) δ 2 n γ x ( t 3 ) I ( W ) ,
where ε : = { ε ( t ) = δ 2 q i t : t [ 0 , τ 1 2 ] } { ε ( t ) = δ 2 q k : t = τ 1 1 } { ε ( t ) = δ 2 q j t τ 1 : t [ τ 1 , τ 1 + τ 3 1 ] } , τ 1 + τ 3 denotes the number of steps from δ 2 n θ to set I ( W ) . Here, { x ( t 3 ) : t 3 [ τ 1 + 1 , τ 1 + τ 3 1 ] } is a sequence of states in the path from δ 2 n γ to set I ( W ) . Due to the arbitrariness of path (19), we obtain that δ 2 n θ can robustly reach to I ( W ) if δ 2 n η = δ 2 n γ . On the basis of the above analysis, for δ 2 n θ Ω φ , it holds that set I ( W ) is still robustly reachable from every state δ 2 n θ Δ 2 n after OBFP occurs.
To sum up, if condition (i) holds, system (3) is still robustly stable to the set I ( W ) .
Next, we suppose that condition (ii) holds. For any state δ 2 n θ Δ 2 n , we just discuss the situation: δ 2 n θ Ω φ and δ 2 n η = δ 2 n γ . The analysis of other situations is similar to the proof in condition (i). If δ 2 n θ Ω φ and δ 2 n η = δ 2 n γ , without loss of generality, the path from δ 2 n θ to δ 2 n γ can be described as
δ 2 n θ x ( t 1 ) δ 2 n φ δ 2 n γ ,
where ε : = { ε ( t ) = δ 2 q l t : t [ 0 , l 1 2 ] } { ε ( t ) = δ 2 q k : t = l 1 1 } , l 1 denotes the number of steps from δ 2 n θ to δ 2 n γ . This together with δ 2 n γ Ω φ shows that a new cycle as (14) is formed for system (3) after OBFP. Denote the cycle (14) by Λ = { δ 2 n φ , δ 2 n γ , δ 2 n γ 1 δ 2 n γ s } .
Since J Δ 2 n W T Col φ ( Q ^ ) = 0 , we have Λ W , which means state δ 2 n θ Δ 2 n can robustly reach to set W after OBFP occurs. Due to the arbitrariness of δ 2 n θ , by Definition 2, system (3) is still robustly stable to the set W . □
Below we discuss when OBFP is the case 2, that is, δ 2 n γ I ( W ) . The following theorem can be drawn.
Theorem 2.
Suppose Assumption 1 holds and δ 2 n γ I ( W ) . Then, system (3) under OBFP is still robustly stable to the set W .
Proof. 
The relationship between the perturbed state δ 2 n γ and the set Ω φ can be divided into two situations: (1) δ 2 n γ Ω φ and (2) δ 2 n γ Ω φ . Below, we demonstrate that OBFP has no effect on the robust set stability of system (3) in the above two situations.
If δ 2 n γ Ω φ , we can obtain from the proof of the sufficiency of Theorem 1 that the path from δ 2 n θ to set I ( W ) can be described as (15). Moreover, OBFP does not affect the path (15). Combining with Assumption 1, we can conclude that every δ 2 n θ Δ 2 n can be stabilized to set W under arbitrary disturbance sequence.
If δ 2 n γ Ω φ , the path from δ 2 n θ to set I ( W ) can be described as (16). When ε ( τ 1 1 ) δ 2 q k , the path (16) is not affected by OBFP. When ε ( τ 1 1 ) = δ 2 q k , after OBFP occurs, the path (16) changes to be
δ 2 n θ x ( t 1 ) δ 2 n φ δ 2 n γ .
Since δ 2 n γ I ( W ) , it follows from the property of the largest robust invariant set that δ 2 n θ can be stabilized to set I ( W ) and stay in set I ( W ) forever under arbitrary disturbance sequence. Thus, every δ 2 n θ Δ 2 n can robustly reach to I ( W ) after OBFP occurs.
Due to the arbitrariness of δ 2 n θ , one has that system (3) is still robustly stable to the set W under Assumption 1 and Case 2 of OBFP. □
Remark 1.
In [27], OBFP impact is only considered for the robust stability problem, where the target set is a single point set. The system is robust stable only when the trajectories of perturbed state cannot form a cycle. If the trajectory of perturbed state does not form a cycle, then the system can maintain robust set stability. However, even if a new cycle is formed, the system may still be robust set stable. As long as the new cycle is in the target set, the robust set stability of the system can be achieved. It is a difficult work to determine whether the new cycle is in the target set, which is the main technical difficulty [16] (see Theorem 1). In addition, this article needs to consider whether the perturbation state belongs to the target set, which is also different from References [16,27] (see Theorem 2).
Since both the robust synchronization and the robust output tracking can be transformed into the robust set stability problems, the results of this paper can be extended to the OBFP impact on the robust synchronization and robust output tracking of DBNs, which indicates that the research content of this work is more general than [16,27].

4. Illustrative Example

In this section, an illustrative example is given to show the impact of OBFP on robust set stability for DBNs.
Example 3.
Consider the biological example: a reduced E. coli lactose operon network [21]. The six genes, termed l a c mRNA, the high-concentration lactose, medium-concentration lactose, the extracellular glucose, the extracellular glucose, the high extracellular glucose and the medium extracellular glucose are denoted by state variable X 1 , state variable X 2 , state variable X 3 , input variable U 1 , input variable U 2 and input variable U 3 , respectively. An environmental signal is denoted by disturbance input ξ. The network model is
X 1 ( t + 1 ) = ¬ U 1 ( t ) ( X 2 ( t ) X 3 ( t ) ) , X 2 ( t + 1 ) = ¬ U 1 ( t ) U 2 ( t ) X 1 ( t ) ξ ( t ) , X 3 ( t + 1 ) = ¬ U 1 ( t ) ( U 2 ( t ) ( U 3 ( t ) X 1 ( t ) ) ) .
Denote 1 δ 2 1 and 0 δ 2 2 , the algebraic form of (22) is represented as
x ( t + 1 ) = M u ( t ) ε ( t ) x ( t ) ,
where x ( t ) , u ( t ) , ε ( t ) are the vector forms of ( X 1 ( t ) , X 2 ( t ) , X 3 ( t ) , ( U 1 ( t ) , U 2 ( t ) , U 3 ( t ) , ξ ( t ) respectively, and M = δ 8 [ 8 8 8 8 4 4 4 8 ] .
A feasible state feedback controller is pre-given as
u ( t ) = δ 8 [ 5 8 5 5 5 8 5 5 ] x ( t ) .
By adding the control (24) into (23), we derive the following closed-loop system:
x ( t + 1 ) = L ε ( t ) x ( t ) ,
where L = [ L 1 , L 2 ] with L 1 = δ 8 [ 1 4 1 5 3 4 3 7 ] and L 2 = δ 8 [ 3 4 3 7 3 4 3 7 ] .
Given a set W = { δ 8 1 , δ 8 2 , δ 8 3 } . By simple calculation, it can be obtained that I ( W ) = { δ 8 1 , δ 8 3 } ,
P = L 1 + B L 2 = 1 0 1 0 0 0 0 0 0 0 0 0 0 0 0 0 1 0 1 0 1 0 1 0 0 1 0 0 0 1 1 0 0 0 0 1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 1 0 0 0 1 0 0 0 0 0 0 0 0 ,
and
Q = ( B ) i = 1 8 P ( i ) = 1 1 1 1 1 1 1 1 0 0 0 0 0 0 0 0 1 1 1 1 1 1 1 1 0 1 0 0 0 1 0 0 0 1 0 1 0 1 0 0 0 0 0 0 0 0 0 0 0 1 0 1 0 1 0 1 0 0 0 0 0 0 0 0 .
Apparently, DBN (25) is robustly stable to set { δ 8 1 , δ 8 3 } . The state trajectory graph of DBN (25) before OBFP is shown as Figure 1.
In the following, the impact of OBFP on DBNs will be discussed.
(1) After OBFP, Col 4 ( L ) is perturbed from δ 8 5 to δ 8 8 . Thus, the perturbed state is δ 8 8 . The state transition matrix of system (25) is changed to be L ^ = δ 8 [ 1 4 1 8 3 4 3 7 3 4 3 7 3 4 3 7 ] . By following Lemma 3, we obtain k = 1 and φ = 4 .
According to Equation (27), one has Ω 4 = { δ 8 2 , δ 8 4 , δ 8 6 } . Since δ 8 8 I ( W ) and δ 8 8 Ω 4 , it follows from Theorem 1 that DBN (25) is still robustly stable to the set W after OBFP. The corresponding state trajectory graph of dynamics can be described by Figure 2.
(2) After OBFP, Col 14 ( L ) is perturbed from δ 8 4 to δ 8 3 , that is the perturbed state is δ 8 3 . From Lemma 3, we obtain k = 2 and φ = 6 . The state transition matrix of system (28) is changed to be L ^ = δ 8 [ 1 4 1 5 3 4 3 7 3 4 3 7 3 3 3 7 ] .
Since δ 8 3 I ( W ) , we know that OBFP is the Case 2. Therefore, we can conclude from Theorem 2 that DBN (25) under OBFP is still robustly stable to set W . The state trajectory graph of dynamics is described in Figure 3.

5. Conclusions

We have investigated robust set stability about DBNs affected by OBFP. Based on the algebraic representation of a DBN, we have provided several necessary and sufficient conditions to guarantee that a DBN under OBFP can stay robust set stable unchanged. In the actual GRNs, gene mutations often occur in a stochastic manner and occur at multiple bits simultaneously. Hence, future work can study multi-bit stochastic function perturbations impact on the behavior of DBNs.

Author Contributions

Conceptualization, L.D. and X.C.; methodology, L.D. and X.C.; writing—original draft preparation, L.D.; writing—review and editing, L.D.; funding acquisition, J.Z. All authors have read and agreed to the published version of the manuscript.

Funding

This work was supported by the National Natural Science Foundation of China under grant 62103176, and the Natural Science Foundation of Shandong Province under grants ZR2019BF023 and ZR2022MA030.

Data Availability Statement

The data presented for this study are available from the corresponding author on reasonable request.

Conflicts of Interest

The authors declare no conflicts of interest.

References

  1. Kauffman, S.A. Metabolic stability and epigenesis in randomly constructed genetic nets. J. Theor. Biol. 1969, 22, 437–467. [Google Scholar] [CrossRef] [PubMed]
  2. Nazi, A.; Raj, M.; Di Francesco, M.; Ghosh, P.; Das, S.K. Deployment of robust wireless sensor networks using gene regulatory networks: An isomorphism-based approach. Pervasive Mob. Comput. 2014, 13, 246–257. [Google Scholar] [CrossRef]
  3. Wang, L.; Pichler, E.E.; Ross, J. Oscillations and chaos in neural networks: An exactly solvable model. Proc. Natl. Acad. Sci. USA 1990, 87, 9467–9471. [Google Scholar] [CrossRef] [PubMed]
  4. Guo, P.; Wang, Y.; Li, H. Algebraic formulation and strategy optimization for a class of evolutionary networked games via semi-tensor product method. Automatica 2013, 49, 3384–3389. [Google Scholar] [CrossRef]
  5. Li, H.; Wang, S.; Li, X.; Zhao, G. Perturbation analysis for controllability of logical control networks. SIAM J. Control Optim. 2020, 58, 3632–3657. [Google Scholar] [CrossRef]
  6. Zhong, J.; Yu, Z.; Li, Y.; Lu, J. State estimation for probabilistic Boolean networks via outputs observation. IEEE Trans. Neural Netw. Learn. Syst. 2021, 33, 4699–4711. [Google Scholar] [CrossRef] [PubMed]
  7. Sun, Y.; Feng, G.; Cao, J. Robust stochastic stability analysis of genetic regulatory networks with disturbance attenuation. Neurocomputing 2012, 79, 39–49. [Google Scholar] [CrossRef]
  8. KR, A.G.; Mahapatra, S.; Ranjan Mahapatro, S. Design of a decentralized control law for variable area coupled tank systems using H complimentary sensitivity function. Asian J. Control 2024, 26, 1540–1552. [Google Scholar]
  9. Sun, Q.; Li, H.; Gao, H. Lebesgue sampling approach to robust stabilization of Boolean control networks with external disturbances. J. Frankl. Inst. 2023, 360, 2794–2810. [Google Scholar] [CrossRef]
  10. Li, H.; Xie, L.; Wang, Y. On robust control invariance of Boolean control networks. Automatica 2016, 68, 392–396. [Google Scholar] [CrossRef]
  11. Achu Govind, K.; Mahapatra, S.; Mahapatro, S.R. Enhanced decentralised fractional-order control using tree seed optimisation and singular value analysis. Int. J. Syst. Sci. 2024, 55, 1437–1464. [Google Scholar] [CrossRef]
  12. Li, L.; Zhang, A.; Lu, J. Robust set stability of probabilistic Boolean networks under general stochastic function perturbation. Inf. Sci. 2022, 582, 833–849. [Google Scholar] [CrossRef]
  13. Cheng, D.; Qi, H.; Li, Z. Analysis and Control of Boolean Networks; Springer: London, UK, 2011. [Google Scholar]
  14. Zhong, J.; Ho, D.W.; Lu, J.; Xu, W. Global robust stability and stabilization of Boolean network with disturbances. Automatica 2017, 84, 142–148. [Google Scholar] [CrossRef]
  15. Wang, J.; Liu, W.; Fu, S.; Xia, J. On robust set stability and set stabilization of probabilistic Boolean control networks. Appl. Math. Comput. 2022, 422, 126992. [Google Scholar] [CrossRef]
  16. Li, H.; Yang, X.; Wang, S. Robustness for stability and stabilization of Boolean networks with stochastic function perturbations. IEEE Trans. Autom. Control 2020, 66, 1231–1237. [Google Scholar] [CrossRef]
  17. Li, F.; Tang, Y. Pinning controllability for a Boolean network with arbitrary disturbance inputs. IEEE Trans. Cybern. 2019, 51, 3338–3347. [Google Scholar] [CrossRef] [PubMed]
  18. Wang, B.; Feng, J. Detectability of Boolean networks with disturbance inputs. Syst. Control Lett. 2020, 145, 104783. [Google Scholar] [CrossRef]
  19. Chen, H.; Liang, J. Local synchronization of interconnected Boolean networks with stochastic disturbances. IEEE Trans. Neural Netw. Learn. Syst. 2019, 31, 452–463. [Google Scholar] [CrossRef]
  20. Zhao, Y.; Zhao, X.; Fu, S.; Xia, J. Robust Output Tracking of Boolean Control Networks over Finite Time. Mathematics 2022, 10, 4078. [Google Scholar] [CrossRef]
  21. Li, F.; Tang, Y. Set stabilization for switched Boolean control networks. Automatica 2017, 78, 223–230. [Google Scholar] [CrossRef]
  22. Wang, J.; Fu, S.; De Leone, R.; Xia, J.; Qiao, L. On robust control invariance and robust set stabilization of mix-valued logical control networks. Int. J. Robust Nonlinear Control 2022, 32, 10347–10357. [Google Scholar] [CrossRef]
  23. Fu, S.; Pan, Y.; Feng, J.; Zhao, J. Strategy optimisation for coupled evolutionary public good games with threshold. Int. J. Control 2022, 95, 562–571. [Google Scholar] [CrossRef]
  24. Chen, R.; Eshleman, J.; Brodsky, R.; Medof, M. Glycophosphatidylinositol-anchored protein deficiency as a marker of Mutator phenotypes in cancer. Cancer Res. 2001, 61, 654–658. [Google Scholar] [PubMed]
  25. Xiao, Y.; Dougherty, E.R. The impact of function perturbations in Boolean networks. Bioinformatics 2007, 23, 1265–1273. [Google Scholar] [CrossRef] [PubMed]
  26. Wu, J.; Liu, Y.; Ruan, Q.; Lou, J. Robust stability of Switched Boolean Networks with function perturbation. Nonlinear Anal. Hybrid Syst. 2022, 46, 101216. [Google Scholar] [CrossRef]
  27. Deng, L.; Fu, S.; Wang, J.; Zhang, F. Function Perturbation Impact on Robust Stability and Stabilization of Boolean Networks with Disturbances. IEEE Access 2023, 11, 84514–84521. [Google Scholar] [CrossRef]
  28. Li, H.; Yang, X. Robust optimal control of logical control networks with function perturbation. Automatica 2023, 152, 110970. [Google Scholar] [CrossRef]
  29. Wang, S.; Li, H. Graph-based function perturbation analysis for observability of multivalued logical networks. IEEE Trans. Neural Netw. Learn. Syst. 2020, 32, 4839–4848. [Google Scholar] [CrossRef]
  30. Chen, Q.; Li, H. Robust weak detectability analysis of Boolean networks subject to function perturbation. IEEE Trans. Circuits Syst. II Express Briefs 2022, 69, 5004–5008. [Google Scholar] [CrossRef]
Figure 1. The state trajectory of DBN (25) before function perturbation.
Figure 1. The state trajectory of DBN (25) before function perturbation.
Mathematics 12 02258 g001
Figure 2. State trajectory graph of dynamics after function perturbation in Case 1.
Figure 2. State trajectory graph of dynamics after function perturbation in Case 1.
Mathematics 12 02258 g002
Figure 3. State trajectory graph of dynamics after function perturbation in Case 2.
Figure 3. State trajectory graph of dynamics after function perturbation in Case 2.
Mathematics 12 02258 g003
Table 1. Notations.
Table 1. Notations.
NotationsDefinitions
Z + the set of positive integers
M m × n the set of m × n real matrices
A T the transpose of matrix A
D 0 , 1
D n D × D × × D n
Col i ( A ) the i-th column of matrix A
Col ( A ) the set of columns of matrix A
δ n i Col i ( I n )
Δ n { δ n 1 , δ n 2 , , δ n n }
0 n ( 0 , 0 , , 0 ) n T
1 n ( 1 , 1 , , 1 ) n T
L m × n the set of m × n logical matrices
B m × n the set of m × n Boolean matrices
[ A ] i , j ( i , j ) -element of matrix A
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Deng, L.; Cao, X.; Zhao, J. One-Bit Function Perturbation Impact on Robust Set Stability of Boolean Networks with Disturbances. Mathematics 2024, 12, 2258. https://doi.org/10.3390/math12142258

AMA Style

Deng L, Cao X, Zhao J. One-Bit Function Perturbation Impact on Robust Set Stability of Boolean Networks with Disturbances. Mathematics. 2024; 12(14):2258. https://doi.org/10.3390/math12142258

Chicago/Turabian Style

Deng, Lei, Xiujun Cao, and Jianli Zhao. 2024. "One-Bit Function Perturbation Impact on Robust Set Stability of Boolean Networks with Disturbances" Mathematics 12, no. 14: 2258. https://doi.org/10.3390/math12142258

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop